Anthropological Theory 1 (17):60-87 (2017)

Meg Stalcup
University of Ottawa
In our study of U.S. counterterrorism programs, we found that anthropology needs a mode of analysis that considers security as a form distinct from insecurity, in order to capture the very heterogeneity of security objects, logics and forms of action. This article first presents a genealogy for the anthropology of security, and identifies four main approaches: violence and State terror; military, militarization, and militarism; para-state securitization; and what we submit as “security analytics.” Security analytics moves away from studying security formations, and how much violence or insecurity they yield, to identifying security forms of action, whether or not they are part of the nation-state. As a framework for anthropological inquiry, it is oriented toward capturing how these forms of action work and what types of security they produce. We then illustrate this approach through our fieldwork on counterterrorism in the domains of law enforcement, biomedical research and federal-state counter extremism. In each of our cases, we use security analytics to arrive at a diagnosis of the form of action. The set of conceptual distinctions that we propose as an aid to approaching empirical situations and the study of security is, on another level, a proposal for an approach to anthropology today. We do not expect that the distinctions that aid us will suffice for every situation. Rather, we submit that this work presents a set of specific insights about contemporary U.S. security, and an example of a new approach to anthropological problems.
Keywords security  counterterrorism  anthropology  uncertainty  violence  militarization  securitization
Categories (categorize this paper)
Edit this record
Mark as duplicate
Export citation
Find it on Scholar
Request removal from index
Revision history

Download options

PhilArchive copy

 PhilArchive page | Other versions
External links

Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
Through your library

References found in this work BETA

Observations on Modernity.Niklas Luhmann - 1998 - Stanford University Press.
Policing Uncertainty: On Suspicious Activity Reporting.Meg Stalcup - 2015 - In Rabinow Simimian-Darash (ed.), Modes of Uncertainty: Anthropological Cases. University of Chicago. pp. 69-87.

View all 10 references / Add more references

Citations of this work BETA

No citations found.

Add more citations

Similar books and articles

Where Computer Security Meets National Security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
Security: Against What? For What? With What?André Gorz - 1983 - Telos: Critical Theory of the Contemporary 1983 (58):158-168.
Reve{a,I}Ling the Risks.Wolter Pieters - 2010 - Techne 14 (3):194-206.
Security, Knowledge and Well-Being.Stephen John - 2011 - Journal of Moral Philosophy 8 (1):68-91.
The Fascist Moment: Security, Exclusion, Extermination.Mark Neocleous - 2009 - Studies in Social Justice 3 (1):23-37.
Rethinking East Asian Regional Order and China's Rise.Sun Xuefeng - 2013 - Japanese Journal of Political Science 14 (1):9-30.


Added to PP index

Total views
763 ( #8,218 of 2,455,631 )

Recent downloads (6 months)
85 ( #7,713 of 2,455,631 )

How can I increase my downloads?


My notes