Governing Border Security Infrastructures: Maintaining Large-Scale Information Systems

Europe is an interconnected space, built upon different kinds of infrastructures that organise the circulation of people and “stuff” – capital, commodities, energy, data, etc. Among these infrastructures are large-scale IT systems that allow state authorities to share biographical information (e.g. names, passport numbers) and biometric data on people crossing borders. For example, French border guards may conduct security checks at airports by consulting digitised information that has been previously collected and stored in a database by German police authorities. Migration offices in Spain may access data files created by visa-issuing administrations in Greece. Dutch authorities may access digitised profiles of asylum seekers that have been created when they first arrived in Italy.

”IT systems are not just infrastructures channelling the power to govern international mobility, but also referent objects of government”

Critical studies on security and borders have explored how IT systems (re)configure the management of international mobility and migration. However, we have largely overlooked the maintenance labour through which such digital infrastructures are made functional; labour that supports the flows of data across the spaces where mobile subjects (travellers, migrants, refugees) become targets of control practices. This lack of attention to maintenance leaves some pressing questions unanswered. Do IT systems always perform as expected by those actors who have previously designed them or do they counter-perform and, potentially, fail after their deployment? If infrastructures, such as IT systems, their components, interdependencies and liveliness become visible when they malfunction and break down, then what does it take to make them invisible – docile machines that operate according to the rules and procedures specified in the documents that lay down their design characteristics? 

In my article “Governing Border Security Infrastructures: Maintaining Large-Scale Information Systems” (Security Dialogue), I seek to answer these questions by presenting in-depth empirical material from my research on eu-LISA. This is the EU Agency entrusted with the operational management (i.e. maintenance and protection) of IT systems deployed for border and migration management purposes. By synthesizing elements of Michel Foucault’s work on biopolitics and governmentality with ideas inspired by the New Materialisms movement, I argue that IT systems are not just infrastructures channelling the power to govern international mobility, but also referent objects of government – both “rulers” that monitor and govern bodies on the move, and unruly infrastructures that are themselves governed through maintenance.

The observation that IT systems require maintenance to function should not come as a surprise to scholars investigating the digitisation of border security and migration management. Perhaps it is the mundanity of maintenance that makes it invisible and unquestioned. Yet, overlooking this process hinders a more a complete appreciation of ongoing “technological work”[1] through which digitised borders are implemented and made functional. This technological work matters politically because it conditions the control and surveillance of subjects on the move, and thus sustains the power to govern international mobility by digital means. My goal is, then, to broaden the research agenda exploring “border security as practice”[2], by directing attention towards a neglected group of actors who, by maintaining IT systems, seek to sustain the continuity of data-based controls that performatively produce the borders regulating international mobility.





Overview of the information exchange environment in the field of EU Justice and Home Affairs (JHA)
Visit link to see larger image
Source: Council of the European Union (2017) Document Number 6253/17

[1] Walters W (2011). Rezoning the global: technological zones, technological work and the (un-)making of biometric borders.” In Squire V (ed) The contested politics of mobility. Borderzones and Irregularity. London: Routledge: 51–73.

[2] Côté-Boucher K, Infantino F, and Salter MB (2014) Border security as practice: an agenda for research. Security Dialogue 45(3): 195–208.

Conflating societal and national security – Resilience and civil preparedness in Sweden

In May 2018, the Swedish government distributed a pamphlet entitled “If the Crisis or the War Comes” to 4.8 million households in Sweden. Both the pamphlet (pictured above) [1] and its distribution may be are unprecedented in the current era. The stated purpose of the pamphlet from the government’s perspective was “to help increase people’s knowledge about how to prepare themselves for various crises, elevated readiness, and, in the final extreme, war”[2]. The title was consciously chosen because of its association with the earlier pamphlet If War Comes, which had been distributed to Swedish households and summarized in telephone directories in the past. If War Comes was first published in 1943, with subsequent revisions appearing in 1952, 1961, 1983, and 1987. After the version in the late the communication on how to prepare and contribute during war situations was put to a halt, only to be reissued 30 years later. Sweden, which has not been at war for over 200 years all of sudden finds it necessary to ensure that all of its citizens are prepared for both crisis and war and are encouraged to stockpile water, food, and other necessities in order to care for their own and their close one’s security. The pamphlet and the Swedish approach to potential crisis and war became international news covered by well-known international media, including The New York Times and The Guardian

At a first glance, the pamphlet may seem to come out of the blue, and represent a return to traditional state security present during the Cold War era. Yet, if we follow the development in Sweden from the end of the Cold War it is clear that the pamphlet is part of wider discourse of building resilience as a way to cope with societal security challenges. In 2015, another layer was added to idea of resilience and responsible/prepared citizens, which includes a return to an interest in national security. This new and encompassing approach to crisis and war also entails radical shifts between Swedish crisis- and security management and the role ascribed to the population and individual citizens for sustaining and supporting the state and the society during hardships. Looking at the front page of the pamphlet we can see at the top how a family is ‘prepping’ food items in a box and at the bottom there is an image that potentially shows a natural disaster situation (flooding) and a war situation side by side, seamless in the same frame. In my article, “Resilience, Morality, and Solidarity in Sweden: Societal and National Security through Civil Preparedness” published with Security Dialogue, I offer a genealogical analysis of how the population and individual citizens are incorporated in the management of societal and national security that expands the notion of total defense beyond war situations and state of exceptions.

”The new normality is the preparation and resilience for future events.”  

A key finding of the article is that citizens and their behavior becomes a focal point in the emerging societal security schema after the end of the Cold War in Sweden. However, as Sweden rediscovers the need for national defense and security, it merges societal and national security into a new total defense discourse. This discourse includes elements of societal security, resilience, and neoliberal governmentality, and places threats, crises, and wars on a single continuum. This reconfiguration shifts the state-citizen relationship with citizen-citizen relations in current security discourse it and dissolves war/peace and crisis/security distinctions. Thus, while war preparedness in previous eras was an exceptional aspect of human life and citizenship, the wider conception of security now evolving bind together societal and national security such that civil and war preparedness are merged into a dimension of everyday existence. The new normality is the preparation and resilience for future events.  

The resulting new security approach and accompanying new image of an ideal citizen give rise to a moral dimension of security that resides upon and operates by means of voluntary actions, even though it is framed as constituted through solidarity with one’s fellow citizens. This development has implications for the social contract and follows from a logic of “better safe than sorry” that sustains expanding securitization, growing fear and growing social control to sustain societal resilience beyond the state. 


[1] MSB (2018) ”If Crisis or War Comes” Pamphlet.

[2] The Swedish Government 2017 Uppdrag till MSB att öka människors kunskap om förberedelser inför kriser och höjd beredskap. Stockholm: Regeringskansliet, Justitiedepartementet.

Conflicting visibilities of migrant-squatters on the northern border of Chile

The inhabitants of the squatter settlements in the border city of Arica, mostly indigenous migrants from the Peruvian-Bolivian highlands, feel the effects of the racialized geography of northern Chile through social discrimination, economic exploitation, and deprivation of their political rights.

In these settlements, migrant residents make palpable the pervasive tension between a mode of visibility that I in my recent article in Security Dialogue analyse in terms of a ‘politics of presence’ and another kind of visibility that is created by the state’s ‘legibility’ techniques.

Granaderos camp (foreground) and Granaderos brigade (background). Photo by the author.

How do we understand the emergence of unauthorized settlements at state borders? The ethnography of these places, which are mostly inhabited by migrants, often leads to a contradictory description as formations that are simultaneously constrained and made possible by border regimes. I argue that such tension may create the conditions in which political relations—as a driving force for community—emerge, generating new social actors and political worlds. The struggles of migrants living in unauthorised camps to become legitimate urban actors creates unprecedented citizenship practices, which in turn produce new political subjectivities.

In borderlands such as the far north of Chile, a visibility neither framed by the police order nor driven by biopower emerges through the refusal of border migrants to be dispossessed of the lands they occupy. Their commoning practices shed light on our understanding of how politics could emerge from non-citizen actors as a force capable of transforming subjects and places.

Young mother with her children leaving the camp. Photo by the author.

The experiences of camp residents on Chile’s northern border provide clues to understanding what the collective act of becoming present from the margins involves. On the basis of such experiences, we have realized that presence, in its urban expression, reveals a point of political potential that opens up spaces for new forms of engagement in urban life. Through this phenomenon, we find a form of politics of presence that is expressed both in the refusal of the migrant squatters to become a mass of uprooted people and in their perseverance toward state recognition of their settlements. 

The visibility achieved by the politics of presence of migrant squatters and its translation by the state into a differential inclusion within the nation revealed the gap between the democratic as the enactment of egalitarianism and the police order. In this persistent struggle between the political logic of equality and the police logic of domination, the residents of the unauthorized camps in Arica forge cunning and rebellious political subjectivities that challenge the border regimes by questioning the basis on which rights, and the boundaries of citizenship, are defined. 

Unauthorized camp on the outskirts of Arica, northern Chile. Photo by the author.

Book review: Disordered Violence: How Race, Gender, and Heteronormativity Structure Terrorism

by Caron Gentry. Edinburgh University Press, p. 216. Hardback: 9781474424806

The best question I have been asked about my work was ‘if you were to use this text to teach, what would you like to students to learn?’. This is a useful question for establishing your own argument but also for thinking about what you take from another’s contribution. If I were Caron Gentry answering that question, I would say: how we study global politics—in this instance, terrorism and the use of violence—is deeply rooted in gendered, racialised, sexualised, and classed structures. These power structures organise and order how we talk about and research global political issues. And they are beholden to and reproduce IR’s Westphalian story. What Gentry shows in Disordered Violence: How Race, Gender, and Heteronormativity Structure Terrorism is that these structures are often willingly (re)produced in ways that benefit a state-centrist organisation of global politics underpinned by European colonial imaginaries, white supremacy, misogyny, and heterosexism. 

Disordered Violence is a timely contribution that deepens our understanding of the racialised, gendered, and sexualised structure of (academic) debates on and representations of terrorism and violence.”

Disordered Violence is a timely contribution that deepens our understanding of the racialised, gendered, and sexualised structure of (academic) debates on, and representations of, terrorism and violence. The book outlines how race, sexuality, and gender are implicated in security discourses and shows why security studies must take an intersectional, feminist, queer, and critical race analytic seriously. Gentry shows us how to do this by drawing on Matsuda (1991) to describe how ‘asking the other question’ (e.g., when confronted with misogyny ask how race functions, too) allowed her to see and explore the connections between race, gender, and sexuality as they relate to terrorism. While focused on terrorism, this book is relevant to scholars researching international security issues more broadly. 

The book opens with several examples of how immensely political acts—whether we call them ‘terrorism’, ‘protest’, or ‘political violence’—are constituted through racialised-gendered-sexualised logics. Opening with this, Gentry prompts us to ask how events might have unfolded differently had the wielders of violence been differently racialised, differently gendered, and so on. I use the ‘racialised-gendered-sexualised’ formulation (Cooper-Cunningham 2020) because it supports Gentry’s argument about their inseparability. In chapter one, Gentry asks us: “Why are mass shootings in the US not seen as an act of terrorism if they are perpetrated by white men, but are when they are perpetrated by brown men?” (38). This is a point Gentry returns to in the conclusion when exploring how Black Lives Matter co-founder Patrisse Khan-Cullors was constituted as a ‘terrorist’ and the movement compared to the Ku Klux Klan. Why is it that the terrorism/terrorist labels only stick to certain (gendered-racialised-sexualised) actors? 

Gentry concludes that “[t]errorism as a label works because it makes sense given the historical legacies of whose violence is legitimated, whose lives matter more and whose bodies are seen as expendable. This is the ordering of violence, in which state violence is legitimated and terrorism is always seen in opposition” (195-6). If IR, a Western-centric discipline, is founded on the Westphalian ideal where legitimate authority and wielding of violence are “tied closely to white, Western liberal democracies” then we must problematise and deconstruct those structures, asking qui bono? One lesson that is reiterated throughout, it is that we must dig into the concepts that we use: how do they (re)produce gendered-sexualised-racialised power structures and discourses?

Unpacking the gendered-racialised-sexualised foundations of key concepts in terrorism studies, Gentry deconstructs the dichotomies at the core of current and historical discourses about terrorism—West/Islam, counter-terrorist/terrorist, developed/undeveloped, rational/emotional, progressive/radicalised, moral/immoral, reasoned/pathological, legitimate/illegitimate violence to name a few—rendering them more complicated and less coherent. It is this destabilisation of the dichotomies structuring the field that makes Gentry’s contribution novel and incredibly important; the queer logics of this could, however, be emphasised more. Not only does this destabilisation force terrorism scholars to think deeper and more critically about the concepts they use and the power structures their work (re)produces—after all, knowledge is power—it also forces us to question the larger assumptions IR as a discipline is founded on. This book can, therefore, be read as a deconstruction of the gendered-racialised-sexualised dichotomies through which terrorism and international security are written about.

”Global order, politics, and the study of it, are rooted in convenient ‘forgettings’ of colonial history, misogyny, and heteronormative structures that support the way the world is ordered.”

One of the key concepts Gentry brings into terrorism studies—or more broadly, security studies—is ‘forgettings’. ‘Forgettings’ (re)produce global political orders by (re)inscribing the “divisions of the world and power between European whites and people of colour” (27). Gentry argues that a definition of terrorism is futile and always reliant on (and reproductive of) gendered, racialised, imperialist, a heteronormative ‘forgettings’. Global order, politics, and the study of it, are rooted in convenient ‘forgettings’ of colonial history, misogyny, and heteronormative structures that support the way the world is ordered. Addressing these ‘forgettings’ Gentry asks: Who/what is represented? How are they represented? In whose interests are these representations? What is invisibilised, sought silent, and pushed out? These questions bring what is invisibilised and/or actively sought silent into focus: that is, the racialised-gendered-sexualised machinations of discourses about ‘terrorism’ and how they enable a particular world order to be (re)produced in a way that favours Western norms and structures. 

Nevertheless, no book is perfect. While the book is intersectional in its theoretical and methodological set up, sexuality often drops out. This is perhaps because heteronormativity “is one of the hardest forgettings to see” (48). While Gentry acknowledges this limitation, there was space for a deeper engagement with sexuality and its structuring of international politics. Noting the important work of feminism in identifying the dichotomies that structure social and political life, Gentry argues that feminism has not offered a way beyond them, whereas Queer theory does. This is a call for feminist and queer security scholars to build on this book. 

There was also a missed opportunity to draw on queer theorising and expand the argument about misogynistic terrorism. Heteronormativity is founded in an essentialist ideology around sex/gender, it is often violently enforced (conversion camps, murder, beatings), it has a wide audience in the general public (conform or be punished), and it aims to coerce into (heteronormative) action. To see the work of heteronormativity in ‘the West’ as terroristic would develop Gentry’s point that “see[ing] violence against women as a form of terrorism within the West means seeing those who are typically aligned with counter-terrorists as suddenly aligned with the terrorists themselves [the counter-/terrorist dichotomy]” (166). Analysing Anders Breivik’s manifesto, Gentry points to his desire to sustain the privilege of “native Christian European heterosexual males” (167). Like ‘misogynistic terrorism’, heteronormativity is a sociopolitical power structure that controls all bodies and enables the surveillance and punishment of individuals for sexual/gender deviance: it is systematic and intentional. 

If the label ‘terrorism’ is rooted in colonial, racists, gendered, and sexualised discourses then it is not a leap to view the enforcement of a particular form of sexual behaviour as terrorist. If misogyny is used to uphold patriarchal order, homophobia is used to uphold heteronormativity (173). It is political, coercive, and there is always a threat of (state) violence. 

Putting these minor points aside, as with Gentry’s other work, this book provides a thorough and critical engagement with terrorism studies, feminist IR, critical race, and queer. It serves as a provocation for scholars to do better and more intersectional work that attends to the racialised-sexualised-gendered foundations of international relations; both small and large caps. It is a lesson in how to do outstanding intersectional feminist work that should be emulated. Disordered Violence reiterates how it is no longer acceptable to say ‘I am not asking the gender (or race, or sexuality) question’ when these are baked into (the study of) international politics.

Bibliography

Cooper-Cunningham, Dean. 2020. “Drawing Fear of Difference: Race, Gender, and National Identity in Ms. Marvel Comics.”  Millennium: Journal of International Studies 48(2):165-97.

Gentry, Caron. 2020. Disordered Violence. Edinburgh: Edinburgh University Press.

Matsuda, MJ. 1991. “Beside My Sister, Facing the Enemy: Legal Theory out of Coalition.”  Stanford law review 43(6):1183-92.

Book review: Data Justice and COVID-19. Global Perspectives

Edited by Linnet Taylor, Gargi Sharma, Aaron Martin & Shazade Jameson. Meatspace press. 306p

Data Justice and COVID-19 questions how the widespread deployment of digital technologies to fight COVID-19 has affected data governance and data justice. Written in ‘real-time’ during the first wave of the pandemic, the volume brings together 38 essays – comprising 28 “dispatches” from individual countries or regions and 10 commentaries problematizing the dispatches. Contributions stem from scholarship on data justice, defined in earlier work from Linnet Taylor (2017) as examining “fairness in the way people are made visible, represented and treated as a result of their production of digital data.”

”[T]he book’s main strength is to provide …useful pointers for future analytical research that go beyond data justice scholarship – and make this book relevant to a wider audience… .”

The geographic diversity and topical breadth of the contributions provide a valuable snapshot of the deployment of digital technologies during the first three months of the COVID-19 pandemic. But the book’s main strength is to provide at least three useful pointers for future analytical research that go beyond data justice scholarship – and make this book relevant to a wider audience, including the general public and scholars working in the fields of critical security studies, information technology, humanitarian studies and global health. First, it documents the expansion of state surveillance in the name of public health, or what the editors call ‘the epidemiological turn in digital surveillance’. Second, it problematizes the hype around technological fixes or ‘techno-solutionism’ by exploring its consequences for inequalities and social justice. Third – and this might be the book’s most original contribution – it questions the entanglement of state and corporate power by unpacking the cooperation between public and private-sector actors that makes the deployment of digital technologies possible.  

The ‘epidemiological turn’ in digital surveillance

The volume offers a damning account of how governments around the world have taken advantage of the pandemic to expand digital surveillance of citizens without appropriate legal basis and adequate democratic oversight. Accounts from Argentina (Ugarte), China (Wang), Hungary (Böröcz), Mexico (Cruz-Santiago), The Philippines (Lucero) and Poland (Brewczyńska) all raise deep concerns about the potential misuse of digital surveillance technologies such as contact tracing apps for repression and human right violations within a wider context of (rising) authoritarianism and/or a track-record of state-power abuses. Even more troubling, the dispatches reveal similarly hasty and legally dubious deployment of surveillance technology in democratic societies such as Norway, where the government ultimately abandoned its pilot contact-tracing app after much public debate and an enquiry from the data protection authority (Sandvik).

Whereas security and the fight against terrorism have traditionally been invoked to justify digital surveillance, the COVID-19 pandemic – the editors argue – provides a radically new set of justifications to legitimize and expand digital surveillance in the name of public health. This ‘epidemiological turn’ in digital surveillance could have deep and long-lasting effects on democratic and authoritarian societies alike that will undoubtedly be analyzed by critical security studies in the years to come.

Techno-solutionism’ and inequalities

Many contributors problematized the hype surrounding the digital technologies deployed to fight COVID-19 pandemic as ‘techno-solutionism’ (Marda; Arroyo & Luján; Appelman, Toh, Fathaigh & van Hoboken; Cohen) or what Sean McDonald calls ‘techno-theatre’, which is a way for politicians and companies to focus “public attention on elaborate, ineffective procedures to mask the absence of a solution to a complex problem” (McDonald, p23). 

Glossy tech solutions distract us not only from the deficiencies that have led to inadequate pandemic responses in the first place, such as broken public systems, lack of trust, or social inequalities: the overwhelming focus on their hyped-up potential also conceals their limitations (Marda). Several of the commentaries (Marda; Edwards; Yeung; Keyes; Daly; Sharbain & Anonymous II) warn that digital solutions will inevitably reinforce inequalities by excluding vulnerable groups; those excluded from the digital world due to poverty, techno-illiteracy, or other reasons. Moreover, many of these digital solutions, such as contact tracing apps, are being used experimentally, without evidence of their efficiency, nor appropriate reckoning of their inherent trade-offs – including private companies’ long-term commercial interests. 

Public-private cooperation for the deployment of digital technologies 

For me, this volume’s most exciting contribution is to direct attention to the interaction and cooperation between public authorities and private tech companies during the pandemic. Big Tech companies like Google, Apple and Facebook, which already wielded unprecedented power pre-Covid, have seized the opportunity offered by the crisis to considerably strengthen their positions and advance their interests – what Naomi Klein coined ‘disaster capitalism’.

Big Tech’s contribution to the fight against COVID-19 has often been framed in terms of social corporate responsibility, undertaken pro-bono in the name of social good. Google-Apple developed for instance a common exposure notification system to use free of charge in contact tracing (Veale; Appelman, Toh, Fathaigh & van Hoboken); Amazon pledged to make no profit in its contract with the Canadian government to supply medical equipment (Wylie); and Facebook helped the Australian government develop a chat bot on its platform WhatsApp to facilitate public health communication (Johns). 

”The editors have impressively, and in record time, gathered a diverse group of scholars, and they have succeeded in setting out a promising research agenda.”

Such initiatives, contributors note, provide an efficient PR campaign and useful “reputation laundering” for companies accused of exploiting their employees (Amazon); spreading fake news (Facebook); abusing their market position and extracting and commodifying our data (Google, Apple, Facebook & Amazon). Moreover, many of the authors also note that Big Tech is consolidating and expanding its market power, making important moves towards the highly promising and profitable healthcare market. The digital solutions offered during the current crisis may also potentially create new needs and forms of dependency for the state; as illustrated by the contact-tracing app developed pro-bono by a consortium of public-private entities in France, but carrying relatively high maintenance costs (Musiani). Finally, the entanglement of state and private interests raises questions about the secrecy surrounding their involvement. Several of the dispatches document a worrying lack of accountability and transparency in the contracts awarded to tech companies.

What about ‘the digital turn’ in public health? 

The book explicitly stems from scholarship on ‘data governance’ and ‘data justice’. The editors have impressively, and in record time, gathered a diverse group of scholars, and they have succeeded in setting out a promising research agenda. At the same time, the book would have benefitted from engaging with scholars working not only on the governance of data, but also on the governance and politics of global health. 

The volume does not address, for instance, how digital solutions may originate in and be integrated into the public healthresponses to the pandemic. It remains unclear how the widely discussed issue of digital contact tracing differs from ‘traditional’ contact tracing; and how what we may call a ‘digital turn in public health’ will affect the public health response. While the volume interrogates how public health may legitimize the digital surveillance of citizens, it fails to acknowledge that population and disease surveillance is precisely a key function of public health and a necessary tool to prevent, prepare for and respond to pandemics. Similarly, the book does not contextualize the use of digital technologies in earlier disease control efforts and pandemic preparedness initiatives; nor does it unpack the politics underpinning the deployment of digital technologies within global health security (see for instance: Roberts and Elbe 2017; Bengtsson, Borg, and Rhinard 2019). 

The COVID-19 pandemic offers a unique opportunity to start interdisciplinary dialogue across various scholarships, including data governance, critical security studies and global health politics. Scrutinizing the coming together and cooperation of the public and private sector in the deployment of digital technologies in the health sector offers one promising avenue to do so, as we also have found through our projects and conference organized by the Independent Panel on Global Governance for Health at the University of Oslo.            

References

Bengtsson L, Borg S and Rhinard M (2019) Assembling European health security: Epidemic intelligence and the hunt for cross-border health threats.  Security Dialogue 50 (2): 115-130. 

Roberts SL and Elbe S (2017) Catching the flu: Syndromic surveillance, algorithmic governmentality and global health security.  Security Dialogue 48 (1): 46-62. 

 Antoine de Bengy Puyvallée is a PhD Fellow, University of Oslo’s Centre for Development and the Environment. 

Navigating vulnerabilities and masculinities – how gendered contexts shape the agency of male sexual violence survivors

A persistent cliché about survivors of wartime sexual violence is that they are helpless and ever-vulnerable victims in need of white and patriarchal protection. This stereotypical view is particularly visible for male victims of conflict-related sexual violence, who are typically thought to be indefinitely stripped of their manhood and, as a result, to have lost all agency in the aftermath of their victimisation. 

Our recent article in Security Dialogue is grounded in our mutual frustration about these and other wrong assumptions that underlie the limited yet growing body of literature on wartime sexual violence against men. Fortunately, the topic has received increasing attention in the last decade, both in scholarship and policy-making. However, much of this growing body of research is not based on empirical data and does not sufficiently take into account the survivor’s point of view. This, we feel, leads to a one-dimensional and often reductionist view of male survivors and their lived realities. One of the central problematic assumptions we tackle in our recent article is that men who were sexually abused in conflict zones are ever-vulnerable, helpless victims. As some of our previous research documents, men who are sexually violated are frequently seen (and at times see themselves) as deprived of their masculine identities. In this process, it is assumed that with this ‘loss of manhood’ comes a loss of any agency, which is typically coded as a masculine trait. A related assumption is that these men hardly ever talk about their experiences and only seldom seek help. 

”One of the central problematic assumptions…is that men who were sexually abused in conflict zones are ever-vulnerable, helpless victims.”

Contrary to that stereotype, the survivors we worked with during our fieldwork in Croatia and Uganda exercise numerous forms of agency, including actively navigating the complexities around silence and disclosure. For instance, they choose when and where to reveal what happened, and when and where to remain silent about it. We found that survivors in Uganda and Croatia often maintain a protective silence surrounding their experiences in certain spaces, for instance within their own homes and communities, while ‘breaking the silence’ and talking about their experiences in other spaces, for instance in forums mediated by non-governmental organizations. Our insights did not emerge from pointed questions about their agency, but rather unfolded throughout the course of our repeated and lengthy interactions with survivors and their testimonies over time. This, we argue, points to the importance of conducting research with sexual violence survivors over extend periods of times, following a relational approach and with utmost sensitive and attention to its methodological and ethical implications and challenges. 

Our findings also point out that the opportunity structure of the local gendered and socio-political context significantly shape the ways in which male survivors exercise agency. The Croatian survivors who were mostly veterans (from the victorious army) for example could apply for reparations, and could access medical care. The Ugandan male survivors, on the other hand, were civilians and belonged to an ethnic minority. Instead of being able to access public forums or reparation schemes, they engage in peer-support in groups on a micro-level, where they are enabled to re-negotiate their gender identities, re-build previously broken relationships and advocate on behalf of male survivors’ needs and demands. These and other examples, explored more fully in the article, paint a differential and more nuanced picture of male sexual violence survivors’ lived realities and of the complexities of gendered experiences in armed conflict more broadly. One-dimensional depictions, as prevalent across the existing literature, cannot do justice to the complexities of male survivors’ lives and realities. Our analysis therefore seeks to break the dichotomies of victim or agents, and of vulnerabilities versus agency, through which male sexual violence survivors’ experiences are usually viewed. Our research therefore contributes to more nuanced and holistic examinations of the gender dynamics of armed conflicts in general, and of sexual violence survivors’ lived realities in particular.

Book Review: Digital Punishment: Privacy, Stigma and the Harms of Data-Driven Criminal Justice

Sarah Esther Lageson. Oxford: Oxford University Press 2020 pp. vii-242. $34.95 cloth. ISBN 9780190872007

Critical studies of security have long examined the role of information technology, databases, dataveillance and predictive risk technologies in emerging security infrastructures. These studies will be immeasurably aided by Sarah E. Lageson’s new book on criminal records in the United States, Digital Punishment: Privacy, Stigma and the Harms of Data-Driven Surveillance.  Ambitious, highly readable and replete with both high-level analysis and intensive subject interviews, Digital Punishment provides a ground-up view of the United States criminal records system and the often maddening constellation of agencies, data brokers, and private citizens involved therein.

The United States has an opaque and fragmented criminal records management “system.” The word system deserves the quotation marks because, as Lageson effectively demonstrates, criminal record keeping is “disordered” and broken up across myriad public databases and private data brokers. In addition, as Lageson explains, the proliferation of private data brokers and self-appointed ‘digilantes’ make it even more difficult to determine what information is available about one’s criminal history. As she points out, an individual will rarely know what is in their ‘rap sheet’ until they are being denied jobs or housing. Unable to speak of a criminal record as a singular object, Dr. Lageson instead refers to the “criminal record canon.” “Cannon” is an effective shorthand that captures how, for example, different versions of someone’s rap sheet may exist on multiple public and private database, while that person’s mugshot may appear on a local ‘crime watch’ website operated by a local citizen who wants to keep their community ‘safe.’

”Using subject interviews and wider collection from news sources, government reports, and legal cases, Dr. Lageson pithily but thoughtfully examines every level of the United States’ criminal records infrastructure”

Criminal records in the United States are, Lageson writes in her introduction, “disordered,” “commodified,” a form of “surveillance” and “disparate.” (pp. 7-9). Disordered in the sense that supposedly authoritative criminal records may come from one of many official government sources, or from a data broker operating in the market for personal data. Also disordered in the sense that individuals looking for criminal record information are able to circumvent legal barriers in order to access supposedly sealed criminal histories using the internet. “Commodified” because, owing in part to the publicly available nature of most criminal histories and governments’ need to contract with private data providers, criminal records are now a sought-after goldmine for data brokers, security firms, and credit rating agencies. “Surveillance” in the sense that they are effective not only for their “real and profound consequences” but also because “the broader gaze of digital punishment hangs over a person like a cloud, marking them with suspicion and distrust even if they were not convicted of a crime.” (p. 8) Finally, they are “disparate” because a subject’s ability to weather and overcome this “broader gaze” is contingent on their access to resources and wherewithal to navigate the often opaque process of expunging a record, or optimizing a search engine to ensure that an old or inaccurate record is not publicly available.

Using subject interviews and wider collection from news sources, government reports, and legal cases, Dr. Lageson pithily but thoughtfully examines every level of the United States’ criminal records infrastructure. Sections explore law enforcement and judicial databases themselves as well as individuals impacted by a digital criminal history and their legal representatives. In perhaps the most interesting part of a fascinating study, Dr. Lageson introduces us to two “digilantes” who public criminal histories in the name of “public safety,” often demanding money in exchange for removing harmful information. The study allows an exploration of how people manage their own criminalization, how political populism fuses with digital records to produce a digilante, and how bureaucratic mismanagement can lead to the irresponsible release of thousands of records.

Digital Punishment illustrates the kaleidoscopic nature of the criminal record, which sometime behaves like a risk-management tool, other times as a commodity, still other times as police data and yet again as a police public relations tool. The criminal record canon’s diverse, opaque and sometimes frankly contradictory nature is one of its most interesting and devilish aspects.

It is difficult of write about areas where Dr. Lageson ‘falls short’ in Digital Punishment. Theorists of security studies may wish for a clearer theoretical framework. But Dr. Lageson’s thick descriptive approach is what is needed. Digital Punishment is only the second book-length scholarly treatment of criminal records in the United States, so description is sorely needed. Dr. Lageson does provide some interesting avenues for future theorizing, particularly in her treatment of stigma, where she goes so far as to suggest that the digitization of criminal records may call for a rethinking of sociological conceptualizations of stigma and its management. Care work is missing from this study, which is probably the only real gap. Scholarship dating back to at least Michel Foucault have pointed out how ‘security,’ ‘control’ and ‘care’ overlap.

”Lageson provide interesting avenues for future theorizing, particularly in her treatment of stigma, where she suggest that the digitization of criminal records may call for a rethinking of sociological conceptualizations of stigma and its management”

Only in the last five years have scholars moved from studying the effect of a criminal record to attempting to understand its role in society more broadly. It was only about six years ago that James Jacobs’ The Eternal Criminal Record grappled with the extent to which criminal records have become implicated in almost every aspect of U.S. social life. Dr. Lageson’s book represents the most thorough analysis yet of the United States’ criminal records infrastructure.

Scholars interested in the role of databases, information technology, predictive threat management and related fields would do well to avail themselves of Dr. Lageson’s intensive and accessible research. They will not be disappointed.

References

Jacobs, James B. 2015. The Eternal Criminal Record, Cambridge, MA: Harvard University Press

Lageson, Sarah Esther 2020. Digital Punishment: Privacy, Stigma and the Harms of Data Driven Criminal Justice, Oxford: Oxford University Press

Miller, Reuben Jonathan and Forrest Stuart 2017. “Carceral Citizenship: Race, Rights and Responsibility in the Era of Mass Supervision,” Theoretical Criminology

Food as a weapon? The geopolitics of food and the Qatar-Gulf rift

On 4 June 2017, residents of Qatar rushed the country’s grocery aisles, stocking up on as much food as they could fit into their carts or their budget. Qatar had just become the subject of a far-reaching embargo by its regional Gulf neighbors, spearheaded by Saudi Arabia and the UAE. In addition to cutting all diplomatic relations, Qatar’s only land border – with Saudi Arabia – was sealed, and air and sea travel was severed with the closing of airspace and territorial waters to all Qatari vessels and aircraft. All travel from the participating countries to Qatar was also barred. With effectively no domestic agriculture to speak of, the embargo’s most direct impact, as demonstrated in this recent Security Dialogue article, was on Qatar’s food supply, which is maintained through its air, sea, and land connections to the outside world. The country’s 2.6 million residents, many of whom flooded the grocery stores in early June 2017, were understandably concerned about their ability to secure food when news about the embargo broke.

New supply chains were established rapidly, however, as the Qatari government and its sovereign wealth fund’s subsidiary Hassad Food worked around the clock with partners in Iran and Turkey to re-source products and establish new distribution and logistics networks (see their account here). Since the beginning of the ‘Qatar-Gulf rift’ in June 2017, Qatar’s ability to quickly overcome the embargo’s impact on food has been framed as a major nationalist victory in official and unofficial discourse – a testament to the strength of the national will and perseverance in the face of hardship. This spirit is vividly captured in the local press coverage about the food situation, but especially about one particular company: Baladna Farms.

Baladna, which means ‘our country’ in Arabic, began in 2014 as a small sheep and goat farm, but was quickly transformed into a major dairy farm in 2017, when it received thousands of milk cows that were ‘airlifted’ by Qatar Airways from Europe and North America. As a Bloomberg article put it, ‘the nine-month Saudi-led embargo of Qatar has an undisputed mascot for Doha’s defiance: the cud-chewing American cow.’ Indeed, Qatar today buzzes with discussions about Baladna’s astonishing rise and its iconic status exemplifying the country’s persistence in the face of what is resoundingly understood to be an unjust and illegal assault on the country’s sovereignty.

Since then, Baladna farms has become a major nationalist icon in Qatar – symbolizing the Qatari ‘defensive’ response to the Saudi and Emirati ‘offensive,’ in which those two governments used their own monopoly of the Gulf dairy markets as a weapon – but which Qatari actors were able to subvert this weaponization of food. Baladna’s operations chief, the Irish-born John Dore explained in a Guardian article, for example: ‘The people that have shot themselves in the foot are the Saudis. If the blockade was lifted, there is so much pro-Qatar sentiment and nationalist pride that the people will buy Qatar milk, not Saudi. […] If we can make enough milk, the people in Qatar will buy it’. Indeed, the embargo stoked a massive rise in nationalism across Qatar, and it is something that ordinary residents now proudly act on by buying Qatari milk. So too can residents tour the farm itself, where they can view the company’s high-tech milking machines, peruse its museum, and watch a short film on the company’s contribution to the nation’s prosperity and success (available at the author’s website with the password ‘national’).

”[F]ood security has been a central narrative in defining agricultural, water, and energy policies in the Gulf region”

The curious rise of Qatar’s dairy industry in the wake of the ongoing embargo may come as a surprise to some, but it is actually part of a much longer history of nationalist thinking about food security or food sovereignty. Food, water, and energy have long been connected with the notions of sovereignty and security – though they have a special history in the Arabian Peninsula because of its desert environment, but also because of local memories about threats made by U.S. President Richard Nixon to use the ‘food weapon’ in retaliation for the OPEC oil embargo in 1973. Since then, food security has been a central narrative in defining agricultural, water, and energy policies in the Gulf region – even when those policies seem fiscally irresponsible and unsustainable. Yet as illustrated by the case of Baladna and the spectacular ‘cowlift’ that managed to overcome the Gulf embargo, symbolic capital can be just as important as real capital. Although the idea of a ‘food weapon’ is more fiction than fact in our globally-connected food markets, it nonetheless has important ideological implications in the Arabian Peninsula, especially by galvanizing people and policymakers to action – even if that action is rallying around the flag.

Rashomon in the Sahel: Conflict Dynamics of Security Regionalism

Between 2013 and 2017, as a Ph.D. student I devoted my efforts to the attempt of analyzing in a comparative way the American, the French, and the European security initiatives towards one of the most unstable and conflict-prone regions in Africa, namely the Sahel. Since the beginnings of the Malian crisis in 2012, the Sahel had effectively attracted international attention, essentially because of the security concerns of different Western countries. The international narrative about this African conflict was particularly focused on two main elements. On the one hand, the collapse of the Malian state was perceived as the victory of the “transnational dark forces” at work in the country, and jihadist forces in particular. On the other hand, the crisis was considered “regional” by nature, as international observers were worried about a possible “domino effect” that could spread conflict over the Mali’s “fragile” neighbors.

At the same time, during the revision of the literature, and even more when I started to conduct fieldwork research (in Paris, Brussels, Washington and Bamako), I was struck by the fact that it was almost impossible to find a shared and uncontested definition, about what the Sahel is. Like in the Akira Kurosawa’s masterpiece Rashomon, all the actors involved seemed to tell their own version of a presumed factual reality, inspired by the projection of their own interests and interpretations, about the kind of security that was at stake in the area. Establishing what was effectively “true” and “real” in that contest was almost impossible, and before the end of my research, I became aware of the fact that the “geographical set” of my work was more a “discursive practice”,[1] than a geopolitical space.[2]

My article “Rashomon in the Sahel: conflict dynamics of security regionalism” starts from these premises, for exploring the effects that this battle about “truth” and “knowledge” is producing, on the dynamics of security and conflict in the area. Four different collective agents – the international interveners, the regional governmental elites, the jihadist insurgent groups and the local communities – are struggling, from different positions of force, not only for delimiting their space of action, but also for defining which kind of order should rule this space, and whose security the resulting region should guarantee. As a matter of fact, none of the actors involved are able to master the consequences of their interactions with the other regionalizing agents. At the same time, through his presence and his action, every actor unintentionally justifies his competitors’ pursuit of their regional projects.  

Nowadays, all figures show that violence is on the rise in the Sahel, while abuses and indiscriminate exactions are reported and practiced by all the actors involved. As I claim in the article, thinking in terms of competing security regionalisms can help us, in disentangling the various and interconnected processes which are producing and furthering violent conflict in the area. At the same time, it could also help to start imagining a different, and more peaceful “truth” about the Sahel.    


[1] ÓTuathail G and Agnew J (1992) Geopolitics and discourse: Practical geopolitical reasoning in American foreign policy. Political Geography 11(2): 190-204

[2] With regard to my Ph.D. thesis, at a the end I had to “accept” to participate to this multi-vocal discursive production of a geographical space, limiting my attention on the five states – Mali, Mauritania, Niger, Burkina Faso and Chad – that US and European strategies considered as the “core” of the Sahel, and which formed the G5 Sahel in 2014.