Query Result Set
Skip Navigation Links
   ActiveUsers:5458Hits:24603145Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
SECURITY DIALOGUE VOL: 53 NO 3 (5) answer(s).
 
SrlItem
1
ID:   185638


Modular sovereignty and infrastructural power: the elusive materiality of international statebuilding / Bakonyi, Jutta   Journal Article
Bakonyi, Jutta Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article uses the example of the Mogadishu International Airport zone and takes a spatio-temporal lens to explore how (sovereign) power unfolds in international interventions that aim at building a sovereign state. I show that the Mogadishu International Airport zone emerges as an elastic frontier zone that contradicts the sovereign imaginary intervenors aim to project and undermines many of the taken-for-granted boundaries that states tend to produce. The Mogadishu International Airport and similar zones emphasize the centrality of logistics and circulation in interventions, but also point towards their temporal and liminal character. Modularity became the material answer to the demand to secure circulation while adapting to the rapid rhythm and short timeframes of statebuilding. Modular designs enable the constant adaptation of the intervention terrain, allow intervenors to deny their power and imprint and facilitate the commercialization of supply chains and intervention materials. Sovereign power that operates through such zones becomes modular itself. It is exercised as an adaptable, in parts exchangeable, and highly mobile form of power that operates through crises and emergencies. The spaces and materials created by modular forms of sovereign power remain elusive, but nonetheless stratify experiences of power and security.
Key Words Sovereignty  Statebuilding  Mogadishu  Infrastructures  Modularity  Zones 
        Export Export
2
ID:   185636


Motioning the politics of security: the primacy of movement and the subject of security / Huysmans, Jef   Journal Article
Huysmans, Jef Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The article explores challenges that giving conceptual primacy to movement poses for thinking the politics of security. In security studies, there has been an intense interest in mobile phenomena and the nature of security techniques that seek to control, contain or steer them. However, when exploring how these mobile phenomena bear upon conceptions of politics and their contestation, the analytics tend to turn back to more static or sedentary categories and reference points. Against this background, the article develops an analytical framework for security and its politics that gives conceptual primacy to movement. Giving conceptual primacy to movement implies three key moves: (a) changing lines from enclosures and connectors to pathways; (b) shifting from understanding movement through positions and nodes to the continuity of movement; and (c) displacing architectural and infrastructural readings of the relations between movements with readings of continuously unfolding confluences of movements moving in relation to one another. Applying these three moves displaces conceptions of movement as border crossings and networked connections with the notion of entangling movements moving in relation to one another. One of the implications for security studies is that taking such a point of view challenges the use of ‘the subject of security’, understood in terms of state sovereignty and the positioning of differential security claims hooked into group identity, as a key device for making security politically meaningful and contested. The article concludes that giving conceptual primacy to movement invites security studies not to limit itself to studying the politics of movement but to also incorporate a motioning of politics.
Key Words Insecurity  Mobility  Critical Theory  Movement  Subject of Security 
        Export Export
3
ID:   185635


Resettling Afghan and Iraqi interpreters employed by Western armies: the Contradictions of the Migration–Security Nexus / De Jong, Sara   Journal Article
de Jong, Sara Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article develops a novel analytical framework for capturing the multiple, competing configurations that the migration-security nexus invokes in discourse and practice, combining insights from critical migration and security scholarship. The framework’s application is illustrated with an empirical case study of the protection and relocation of Afghan and Iraqi former local interpreters and other locally employed civilians working for Western armies. The analysis demonstrates that locally employed civilians (LECs) are simultaneously considered security actors in the East and security risks in the West, the ‘best and brightest’ causing brain drain and potential terrorists when crossing borders, both ‘model migrants’ and threats to western values. By uncovering the nexus’s multiple configurations and its contradictions, the framework supports the project of denaturalizing the migration-security nexus, while also showing that the discourses and practices justified through its various configurations include the legitimation of border violence and the denial of protection to migrants.
Key Words Migration  Refugees  Iraq  Afghanistan  Critical Security Studies  Interpreters 
        Export Export
4
ID:   185631


Technical ecstasy: Network-centric warfare redux / Guha, Manabrata   Journal Article
Guha, Manabrata Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract How can we think about modes of martial operability that are responsive to the transformative conditions engendered by the information age? This article assumes an exploratory stance and reconsiders the theory of network-centric warfare (NCW) in concert with some elements of Gilbert Simondon’s work. It suggests that the Simondonian concepts of individuation, transduction and information, coupled with his understanding of technical objects, help us shift our focus from the platform-centric to the network-centric, thus enabling us to reengage with the theory of NCW in a manner that is responsive to the information age.
Key Words War  Network-centric Warfare  Theory of War  Simondon 
        Export Export
5
ID:   185633


Technological obstructions of asylum: Asylum seekers as forced techno-users and governing through disorientation / Tazzioli, Martina   Journal Article
Tazzioli, Martina Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article deals with the technologies and apps that asylum seekers need to navigate as forced hindered techno-users in order to get access to asylum and financial support. With a focus on the Greek refugee system, it discusses the multiple technological intermediations that asylum seekers face when dealing with the cash assistance programme and how asylum seekers are obstructed in accessing asylum and financial support. It explores the widespread disorientation that asylum seekers experience as they navigate un-legible techno-scripts that change over time. The article critically engages with the literature on the securitization and victimization of refugees, and it argues that asylum seekers are not treated exclusively as potential threats or as victims, but also as forced hindered subjects; that is, they are kept in a condition of protracted uncertainty during which they must find out the multiple technological and bureaucratic steps they are requested to comply with. In the final section, the article illustrates how forced technological mediations actually reinforce asylum seekers’ dependence on humanitarian actors and enhance socio-legal precarity.
        Export Export