Hostname: page-component-586b7cd67f-dsjbd Total loading time: 0 Render date: 2024-11-20T12:28:49.412Z Has data issue: false hasContentIssue false

The exceptionalism of risk: Trump's Wall and travel ban

Published online by Cambridge University Press:  21 December 2020

William Clapton*
Affiliation:
School of Social Sciences, The University of New South Wales, Sydney, Australia
*
*Corresponding author. Email: [email protected]

Abstract

Risk has recently become a core aspect of the study and practice of security. This raises the question of how the governing of security issues has changed and how risk is situated vis-à-vis other approaches, particularly securitisation theory. One approach is to distinguish securitisation and risk within typologies of ideal-type logics of security, which suggest that while both are useful, securitisation and risk are fundamentally different. One of the crucial distinctions made here is that risk is geared towards the longer-term, routine, and ‘normal’ governance of security issues, while securitisation involves the employment of exceptional measures justified via invocations of existential threat. This article interrogates this distinction, arguing that the division between risk as the normal or routine and securitisation as the exceptional is not as clear as has been suggested in either theory or practice. Risk can and repeatedly has resulted in exceptionalism. This argument is demonstrated empirically through an analysis of the immigration practices and policies of the Trump administration, particularly the travel ban and the declaration of a national emergency to fund construction of a wall along the US-Mexico border.

Type
Research Article
Copyright
Copyright © The Author(s), 2020. Published by Cambridge University Press on behalf of the British International Studies Association

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

1 See Beck, Ulrich, ‘The terrorist threat: World risk society revisited’, Theory, Culture and Society, 19:4 (2002), pp. 3955CrossRefGoogle Scholar; Beck, Ulrich, ‘The silence of words: On war and terror’, Security Dialogue, 34:3 (2003), pp. 255–67CrossRefGoogle Scholar; Heng, Yee-Kuang, ‘The “transformation of war” debate: Through the looking glass of Ulrich Beck's world risk society’, International Relations, 20:1 (2006), pp. 6991CrossRefGoogle Scholar; Heng, Yee-Kuang, War as Risk Management: Strategy and Conflict in an Age of Globalised Risks (New York: Routledge, 2006)CrossRefGoogle Scholar.

2 Beck, Ulrich, Risk Society: Towards a New Modernity (London: Sage, 1992)Google Scholar; Beck, Ulrich World Risk Society (Malden: Polity, 1999)Google Scholar.

3 Aradau, Claudia and Munster, Rens van, ‘Governing terrorism through risk: Taking precautions, (un)knowing the future’, European Journal of International Relations, 13:1 (2007), pp. 89115CrossRefGoogle Scholar; Aradau, Claudia, Lobo-Guerrero, Luis, and Munster, Rens van, ‘Security, technologies of risk, and the political: Guest editors’ introduction’, Security Dialogue, 39:2–3 (2008), pp. 147–54CrossRefGoogle Scholar; Mythen, Gabe and Walklate, Sandra, ‘Terrorism, risk and international security: The perils of asking “what if?”’, Security Dialogue, 39:2–3 (2008), pp. 221–42CrossRefGoogle Scholar; Amoore, Louise and de Goede, Marieke (eds), Risk and the War on Terror (Oxon: Routledge, 2008)CrossRefGoogle Scholar.

4 Corry, Olaf, and, ‘Securitisationriskification”: Second-order security and the politics of climate change’, Millennium: Journal of International Studies, 40:2 (2012), p. 238Google Scholar.

5 See Hameiri, Shahar and Jones, Lee, Governing Borderless Threats: Non-Traditional Security and the Politics of State Transformation (Cambridge: Cambridge University Press, 2015), pp. 22–4CrossRefGoogle Scholar.

6 Wæver, Ole, ‘Politics, security, theory’, Security Dialogue, 42:4–5 (2011), p. 474CrossRefGoogle Scholar.

7 See Corry, ‘Securitisation and “riskification”’ and Hameiri and Jones, Governing Borderless Threats.

8 Corry, ‘Securitisation and “riskification”’, pp. 236–7.

9 Ibid., p. 247.

10 Buzan, Barry, Wæver, Ole, and de Wilde, Jaap, Security: A New Framework for Analysis (London: Lynne Rienner, 1997), p. 27Google Scholar.

11 O'Malley, Pat, ‘Experiments in risk and criminal justice’, Theoretical Criminology, 12:4 (2008), p. 453CrossRefGoogle Scholar.

12 Clarke, Ronald V., Situational Crime Prevention: Successful Case Studies (New York: Harrow and Heston, 1992)Google Scholar.

13 Heng, War as Risk Management, pp. 35–8; Rasmussen, Mikkel Vedby, The Risk Society at War: Terror, Technology and Strategy in the Twenty-First Century (Cambridge: Cambridge University Press, 2006), pp. 106–08CrossRefGoogle Scholar.

14 Clapton, William, Risk and Hierarchy in International Society: Liberal Interventionism in the Post-Cold War Era (Basingstoke: Palgrave Macmillan, 2014), p. 54CrossRefGoogle Scholar. Also see Garland, David, ‘The limits of the sovereign state: Strategies of crime control in contemporary society’, British Journal of Criminology, 36:4 (1996), pp. 445–71CrossRefGoogle Scholar and Ericson, Richard V. and Haggerty, Kevin D., Policing the Risk Society (Toronto: University of Toronto Press, 1997)CrossRefGoogle Scholar.

15 Gordon Hughes, Understanding Crime Prevention: Social Control, Risk and Late Modernity (Buckingham: Open University Press, 1998), p. 141.

16 Buzan, Wæver, and de Wilde, Security: A New Framework for Analysis, p. 32.

17 Wæver, Ole, ‘Securitisation and desecuritisation’, in Lipschutz, Ronnie D. (ed.), On Security (New York: Columbia University Press, 1995), p. 55Google Scholar.

18 Buzan, Wæver, and de Wilde, Security: A New Framework for Analysis, p. 25.

19 Wæver, ‘Politics, security, theory’, p. 469. On the debates regarding the broadening of security, see Walt, Stephen M., ‘The renaissance of security studies’, International Studies Quarterly, 35:2 (1991), pp. 211–39CrossRefGoogle Scholar and Kolodziej, Edward A., ‘The renaissance of security studies? Caveat lector!’, International Studies Quarterly, 36:4 (1992), pp. 421–38CrossRefGoogle Scholar.

20 Ciuta, Felix, ‘Security and the problem of context: A hermeneutical critique of securitization theory’, Review of International Studies, 35:2 (2009), pp. 306–07CrossRefGoogle Scholar.

21 Ibid., pp. 310–15.

22 Wæver, ‘Politics, security, theory’; Corry, ‘Securitisation and “riskification”’.

23 Wæver, ‘Politics, security, theory’, p. 473.

24 Ibid., p. 474.

25 Rens van Munster, ‘Logics of security: The Copenhagen School, risk management and the War on Terror’, University of Southern Denmark, Political Science Publications 10 (2005), p. 8; Munster, Rens van, Securitizing Immigration: The Politics of Risk in the EU (Basingstoke: Palgrave Macmillan, 2010), p. 10Google Scholar.

26 In his earlier work, van Munster explicitly distinguishes between securitisation and risk management. See van Munster, ‘Logics of security’. In his later work, van Munster instead distinguishes between ‘political realism’ and ‘political liberalism’. He argues that political realism informs securitisation theory, while risk management is central to political liberalism. See van Munster, Securitizing Immigration, pp. 8–10.

27 van Munster, ‘Logics of security’, p. 8.

28 Corry, ‘Securitisation and “riskification”’, p. 249.

29 Ibid., p. 256.

30 Ibid., p. 249.

31 Ibid., p. 245.

32 Beck, ‘The terrorist threat’, p. 40.

33 Hameiri and Jones, Governing Borderless Threats, pp. 22–4.

34 Ibid., p. 24.

36 See Clapton, Risk and Hierarchy in International Society.

37 See Juha A. Vuori, ‘Illocutionary logic and strands of securitization: Applying the theory of securitization to the study of non-democratic political orders’, European Journal of International Relations, 14:1 (2008), pp. 65–99 and Nicola Pratt and Dana Rezk, ‘Securitizing the Muslim Brotherhood: State violence and authoritarianism in Egypt after the Arab Spring’, Security Dialogue, 50:3 (2019), pp. 239–56.

38 Vuori, ‘Illocutionary logic’, p. 69; Pratt and Rezk, ‘Securitizing the Muslim Brotherhood’, p. 240.

39 Beck, ‘The terrorist threat’, p. 43.

40 Ibid., p. 41.

41 Darryl S. L. Jarvis, ‘Risk, globalisation and the state: A critical appraisal of Ulrich Beck and the world risk society thesis’, Global Society, 21:1 (2007), p. 30.

42 One of the interesting distinctions between Beck's concept of the risk society/reflexive modernisation and securitisation theory is that whereas the latter suggests that security issues are elevated above politics, Beck focuses on the emergence of forms of ‘sub-politics’ outside of and beyond the formal institutions of the state in response to new forms of risk. See Beck, Risk Society, pp. 183–236 and Beck, World Risk Society.

43 Claudia Aradau and Rens van Munster, ‘Exceptionalism and the war on terror: Criminology meets international relations’, British Journal of Criminology, 49:5 (2009), p. 694.

45 Ulrich Beck, ‘The silence of words: On war and terror’, Security Dialogue, 34:3 (2003), p. 258.

46 Corry, ‘Securitisation and “riskification”’, p. 257.

47 Aradau and van Munster, ‘Exceptionalism and the war on terror’, p. 694.

48 See White House, The National Security Strategy of the United States of America (Washington, DC: September 2002).

49 M. J. Williams, ‘(In)security studies, reflexive modernization and the risk society’, Cooperation and Conflict, 43:1 (2008), p. 67; Clapton, Risk and Hierarchy, p. 33.

50 Aradau et al., ‘Security, technologies of risk, and the political’, p. 152.

51 William Clapton, ‘Risk in international relations’, International Relations, 25:3 (2011), p. 283. Also see Deborah Lupton, Risk: Key Concepts (London and New York: Routledge, 1999).

52 Aradau and van Munster, ‘Governing terrorism through risk’, p. 97; Mark Salter, ‘Imagining numbers: Risk, quantification and aviation security’, Security Dialogue, 39:2–3 (2008), pp. 243–66.

53 Clapton, ‘Risk in international relations’, p. 283.

54 Francois Ewald, ‘Insurance and risk’, in Graham Burchell, Colin Gordon, and Peter Miller (eds), The Foucault Effect: Studies in Governmentality (Chicago, IL: Chicago University Press, 1991), p. 199.

55 Pat O'Malley, ‘Governable catastrophes: A comment on Bougen’, Economy and Society, 32:2 (2003), p. 276.

56 Aradau and van Munster, ‘Exceptionalism and the war on terror’, p. 696.

57 Department of Homeland Security, ‘Risk Management Fundamentals: Homeland Security Risk Management Doctrine’ (April 2011), available at: {https://www.dhs.gov/xlibrary/assets/rma-risk-management-fundamentals.pdf} accessed 18 September 2020.

58 I am grateful to one of the reviewers for this point.

59 See Heng, War as Risk Management and Rasmussen, The Risk Society at War.

60 White House, The National Security Strategy of the United States of America (Washington, DC: December 2017), pp. 9–10.

61 Ibid., p. 14.

62 Greg Botelho, ‘San Bernardino shooting investigated as “act of terrorism”’, CNN (5 December 2015), available at: {https://edition.cnn.com/2015/12/04/us/san-bernardino-shooting/index.html} accessed 23 January 2020.

63 Jenna Johnson, ‘Trump calls for “total and complete shutdown of Muslims entering the United States”’, The Washington Post (7 December 2015), available at: {https://www.washingtonpost.com/news/post-politics/wp/2015/12/07/donald-trump-calls-for-total-and-complete-shutdown-of-muslims-entering-the-united-states/} accessed 10 January 2020.

64 Donald Trump, ‘Full text: Donald Trump announces a presidential bid’, Washington Post (16 June 2015), available at: {https://www.washingtonpost.com/news/post-politics/wp//2015/06/16/full-text-donald-trump-announces-a-presidential-bid/?noredirect=on&utm_term=.054af746605b} accessed 5 April 2020.

65 Donald Rumsfeld, ‘DoD News Briefing – Secretary Rumsfeld and Gen. Myers’, Department of Defense (12 February 2002), available at: {https://archive.defense.gov/Transcripts/Transcript.aspx?TranscriptID=2636} accessed 6 May 2020. Trump's line about not knowing is not exactly the same as Rumsfeld's ‘unknown unknowns’. It is more akin to Rumsfeld's ‘known unknowns’ – ‘we know something bad is happening, just not exactly what or where’. In contrast, ‘unknown unknowns’ is a depiction of a more radical uncertainty, risks that have not yet been imagined.

66 White House, ‘Executive Order Protecting the Nation from Foreign Terrorist Entry into the United States’, Executive Order 13769 (27 January 2017), available at: {https://www.whitehouse.gov/presidential-actions/executive-order-protecting-nation-foreign-terrorist-entry-united-states/} accessed 9 May 2020.

69 John F. Kelly, ‘Written Testimony of DHS Secretary John F. Kelly for a House Committee on Homeland Security Hearing Titled “Ending the Crisis: America's Borders and the Path to Security”’, Department of Homeland Security (7 February 2017), available at: {https://www.dhs.gov/news/2017/02/07/written-testimony-dhs-secretary-john-f-kelly-house-commitee-homeland-security} accessed 24 January 2020.

70 White House, ‘Executive Order Protecting the Nation from Foreign Terrorist Entry into the United States’, Executive Order 13780 (6 March 2017), available at: {https://www.whitehouse.gov/presidential-actions/executive-order-protecting-nation-foreign-terrorist-entry-united-states-2/} accessed 3 March 2020. Also see Eunice Lee, ‘Non-discrimination in refugee and asylum law (against travel ban 1.0 and 2.0)’, Georgetown Immigration Law Journal, 31:3 (2017), p. 461.

71 White House, ‘Presidential Proclamation Enhancing Vetting Capabilities and Processes for Detecting Attempted Entry into the United States by Terrorists or Other Public-Safety Threats’, No. 9645 (24 September 2017), available at: {https://www.whitehouse.gov/presidential-actions/presidential-proclamation-enhancing-vetting-capabilities-processes-detecting-attempted-entry-united-states-terrorists-public-safety-threats/} accessed 8 May 2020.

75 White House, ‘Executive Order: Border Security and Immigration Enforcement Improvements’, Executive Order 13767 (25 January 2017), available at: {https://www.whitehouse.gov/presidential-actions/executive-order-border-security-immigration-enforcement-improvements/} accessed 1 May 2020.

76 White House, ‘Secure the Border by Deterring and Swiftly Removing Illegal Entrants’ (8 October 2017), available at: {https://www.whitehouse.gov/briefings-statements/secure-border-deterring-swiftly-removing-illegal-entrants/} accessed 24 April 2020.

77 Jackson, Richard, ‘Language, policy and the construction of a torture culture in the war on terrorism’, Review of International Studies, 33:3 (2007), p. 354CrossRefGoogle Scholar.

78 See Jackson, Richard, Writing the War on Terrorism: Language, Politics, and Counter-Terrorism (Manchester: Manchester University Press, 2005)Google Scholar.

79 Rose, Nikolas, Powers of Freedom: Reframing Political Thought (Cambridge: Cambridge University Press, 1999), p. 237CrossRefGoogle Scholar.

80 See Elisabeth Vallet and Charles-Philippe David, ‘Introduction: The rebuilding of the wall in International Relations’, Journal of Borderlands Studies, 27:2 (2012), pp. 114–15.

81 Donald Trump, ‘Remarks by President Trump on the National Security and Humanitarian Crisis on our Southern Border’ (15 February 2019), available at: {https://www.whitehouse.gov/briefings-statements/remarks-president-trump-national-security-humanitarian-crisis-southern-border/} accessed 11 May 2020.

82 White House, ‘Presidential Proclamation on Declaring a National Emergency Concerning the Southern Border of the United States’, No. 9844 (15 February 2019), available at: {https://www.whitehouse.gov/presidential-actions/presidential-proclamation-declaring-national-emergency-concerning-southern-border-united-states/} accessed 9 May 2020.

84 Mike Pence, ‘Vice President Mike Pence: Congress must act to end the crisis on our border, Fox News (19 April 2019), available at: {https://www.foxnews.com/opinion/vice-president-mike-pence-congress-must-act-to-end-the-crisis-on-our-border} accessed 10 May 2020.

85 Charlie Savage, ‘Presidents have declared dozens of emergencies, but none like Trump's’, New York Times (15 February 2019), available at: {https://www.nytimes.com/2019/02/15/us/politics/trump-presidency-national-emergency.html} accessed 8 May 2020.

86 Nancy Pelosi, ‘Pelosi Remarks at Press Call on Introduction of Privileged Resolution to Terminate President Trump's Emergency Declaration’ (23 February 2019), available at: {https://www.speaker.gov/newsroom/22219-3/} accessed 15 May 2020.

87 Clare Foran and Ted Barrett, ‘Senate passes resolution to overturn Trump's national emergency declaration’, CNN (14 March 2019), available at: {https://edition.cnn.com/2019/03/14/politics/senate-vote-trump-national-emergency-declaration-resolution/index.html} accessed 10 April 2020.

88 Donald Trump, ‘Veto message to the House of Representatives for H.J. Res. 46’, available at: {https://www.whitehouse.gov/briefings-statements/veto-message-house-repres entatives-h-j-res-46/} accessed 3 May 2020.

89 Emanuella Grinburg and Eliott C. McLaughlin, ‘Travel ban protests stretch into third day from US to UK’, CNN (31 January 2017), available at: {https://edition.cnn.com/2017/01/30/politics/travel-ban-protests-immigration/} accessed 23 January 2020.

90 Tsoukas, Haridimos, ‘Leadership, the American Academy of Management, and President Trump's travel ban: A case study in moral imagination’, Journal of Business Ethics, 163:1 (2020), p. 1Google Scholar.

91 American Civil Liberties Union, ‘ACLU of Massachusetts Statement in Support of the Victims of President Trump's Muslim Ban’ (30 January 2017), available at: {https://www.aclu.org/press-releases/aclu-massachusetts-statement-support-victims-president-trumps-muslim-ban} accessed 21 September 2020.

92 For testimonies before the hearing and a full list of written submissions, see House Committee on the Judiciary, ‘Oversight of the Trump Administration's Muslim Ban’ (24 September 2019), available at: {https://judiciary.house.gov/calendar/eventsingle.aspx?EventID=2268} accessed 21 September 2020.

93 Pyle, Andrew S., Linvill, Darren L., and Gennett, S. Paul, ‘From silence to condemnation: Institutional responses to “travel ban” Executive Order 13769’, Public Relations Review, 44:2 (2018), p. 214CrossRefGoogle Scholar.

94 Lee, ‘Non-discrimination in refugee and asylum law’, p. 465.

95 Caitlin Oprysko, Anita Kumar, and Nahal Toosi, ‘Trump administration expands travel ban’ (31 January 2020), available at: {https://www.politico.com/news/2020/01/31/trump-administration-expands-travel-ban-110005} accessed 17 September 2020.

96 I am grateful to one of the reviewers for this point.

97 Ciuta, ‘Security and the problem of context’, pp. 321–2.

98 Corry, ‘Securitisation and “riskification”’, p. 248.

99 Heng, War as Risk Management; Heng, ‘The “transformation of war” debate’; Williams, ‘(In)security studies’, pp. 65–6.

100 Griner, Shlomo, ‘Living in a world risk society: A reply to Mikkel V. Rasmussen’, Millennium: Journal of International Studies, 31:1 (2002), p. 157Google Scholar.

101 Williamson, Piers R., Risk and Securitization in Japan 1945–60 (London and New York: Routledge, 2014), pp. 32–6Google Scholar.

102 Corry, ‘Securitisation and “riskification”’, p. 247.

103 Heng and McDonagh highlight the everyday, mundane practices of risk management in the context of the WoT that occur alongside more exceptional actions such as the use of military force. See Heng, Yee-Kuang and McDonagh, Ken, Risk, Global Governance and Security: The Other War on Terror (Oxon: Routledge, 2009)CrossRefGoogle Scholar. Amoore also highlights the everyday, less visible practices of risk management in the context of what she terms ‘algorithmic war’, the use of algorithmic calculations in surveillance networks and border control that embed a logic of pre-emption in mundane spaces. Again, risk here can result in both exceptional and mundane practices, but Amoore also argues that representations of risky others are located both inside and outside the spaces of daily life in Western societies. See Amoore, Louise, ‘Algorithmic security: Everyday geographies of the War on Terror’, Antipode, 41:1 (2009), p. 56CrossRefGoogle Scholar.

104 George W. Bush, ‘Excerpts from Remarks in Louisiana Welcome’ (3 December 2002), available at: {https://georgewbush-whitehouse.archives.gov/news/releases/2002/12/20021203-4.html} accessed 10 May 2020.

105 Corry, ‘Securitisation and “riskification”’, p. 257.

106 George W. Bush, ‘President Bush Holds Press Conference’ (13 March 2002), available at: {https://georgewbush-whitehouse.archives.gov/news/releases/2002/03/20020313-8.html} accessed 8 September 2020.

107 George W. Bush, ‘President Bush Discusses Iraq with Congressional Leaders’ (26 September 2002), available at: {https://georgewbush-whitehouse.archives.gov/news/releases/2002/09/20020926-7.html} accessed 8 September 2020.

108 For more on the risk-based logics informing the War on Terror, including the invasions of Afghanistan and Iraq, see Heng, War as Risk Management; Rasmussen, The Risk Society at War; and Clapton, Risk and Hierarchy.

109 While the Obama administration's approach to risk management is not discussed in depth here, it too employed a logic of risk in the assessment and representation of the US's strategic environment and the identification of security issues. See, for example, Department of Homeland Security, Risk Management Fundamentals.

110 Clapton, Risk and Hierarchy, p. 30.

111 See Heng, War as Risk Management.

112 Corry, ‘Securitisation and “riskification”’, p. 249.