Escolar Documentos
Profissional Documentos
Cultura Documentos
http://tcr.sagepub.com
Published by:
http://www.sagepublications.com
Additional services and information for Theoretical Criminology can be found at:
Email Alerts: http://tcr.sagepub.com/cgi/alerts
Subscriptions: http://tcr.sagepub.com/subscriptions
Reprints: http://www.sagepub.com/journalsReprints.nav
Permissions: http://www.sagepub.co.uk/journalsPermissions.nav
Citations http://tcr.sagepub.com/cgi/content/refs/9/3/265
Theoretical Criminology
2005 SAGE Publications
London, Thousand Oaks
and New Delhi.
www.sagepublications.com
Vol. 9(3): 265287; 13624806
DOI: 10.1177/1362480605054811
Key Words
biopolitics community safety governmentality security
sovereignty
Introduction
The management of crime, risk and fear and the recoding of other
governmental issues under these headings have ascended the political
265
Downloaded from http://tcr.sagepub.com by alonso pelayo on April 13, 2009
266
267
268
269
270
Narratives of security
Political science analyses of shifts in governmental architecture in other
European countries (Crawford, 2002b) involve a mix of idiographic case
studies and attempts to identify national, or international trends. Drawing
on both discursive governmentality theory and political science research,
there are narratives that generalize about the new forms through which
crime is governed in the advanced liberal democracies (Garland, 2001).
271
272
273
274
Reallocating sovereignty
The state reallocates sovereign powers upwards to international bodies like
the EU, Interpol and NATO and downwards to local government, other
sites of civil and commercial governance, the family, local communities and
the individual citizen (Stenson, 2001b). In European countries, state sovereign powers are reallocated in part to local executive agents to assess and
manage crime and related problems through links between mayors, police
chiefs, prosecutors, judges and other criminal justice agents. However, this
is mediated by different modes of governmental architecture, history,
culture and jurisdiction (Crawford, 2002b; and this issue inter alia).
Sovereignty is analytically operationalized in the ways its technologies,
or instrumental means, operate with others. Punitive sovereign technologies
aim to regain control over disorderly populations and areas, for example
through the disruption and control of open drugs and prostitution markets,
homeless beggars, street robbers and anti-social behaviour.8 The goal is to
improve the quality of urban life for the majority, and to drive offenders,
the homeless, graffiti taggers and psychologically damaged from public
spaces, re-conquered for mainstream economic and social life (Stenson,
2000b).
These technologies operate with CCTV, environmental redesign and
target hardening/actuarial risk management to impede offenders, reduce
victimization and increase use of public spaces; and community security
275
276
277
278
Conclusion
Advancing intra- and inter-national comparative studies of community or
public safety needs a theoretical framework to identify commonalities of
objects and concerns. It has been argued that it is better provided by realist
governmentality theory rather than theories of security. Given disruptions
to older links between population, identity, solidarity and territory, this
focuses on the struggle for sovereign, and less formal, biopolitical control.
279
280
Notes
Thanks to Adam Edwards, Gordon Hughes and Eugene McLaughlin for
comments on a prior draft.
1. This also illustrates one pole in the tension between generalizing, nomothetic and, on the other hand, idiographic, knowledge aiming to uncover
contextual differences (see Edwards and Hughes, this issue).
2. The Crime and Disorder Act 1998 strengthened links between local authorities, police and other agencies in developing crime control strategies,
reinforced by the Local Government Act 2002, strengthening the executive
powers of mayors and chief executives. Furthermore, the Police Reform Act
2002 reinforced the sharing of policing tasks between statutory, voluntary
and commercial sectors. This was extended in 2004 with the expansion of
community support auxiliaries to sworn police officers and the formation of
plural Reassurance Policing teams (Innes, 2004).
3. This is illustrated, for example, in the UK, through the use of anti-social
behaviour orders, restricting the movement and behaviour of those targeted,
authorized by the Crime and Disorder Act 1998 and the Anti-Social
Behaviour Act 2003.
281
282
References
Anderson, B. (1983) Imagined Communities: Reflections on the Origin and
Spread of Nationalism. London: Verso.
Audit Commission (1999) Safety in Numbers: Promoting Community Safety.
London: Audit Commission.
Chakraborti, N. and J. Garland (eds) (2004) Rural Racism. Cullompton:
Willan.
Clarke, R. (2004) Technology, Criminology and Crime Science, European
Journal on Criminal Policy and Research 10(1): 5563.
Coleman, R. and J. Sim (2002) Power, Politics and Partnerships: The State of
Crime Prevention on Merseyside, in G. Hughes and A. Edwards (eds) Crime
Control and Community: The New Politics of Public Safety, pp. 86108.
Cullompton: Willan.
Corbett, C. (2003) Car Crime. Cullompton: Willan.
Countryside Agency (2001) The State of the Countryside 2001an Introduction. London: The Countryside Agency.
Cowan, D. and D. Lomax (2003) Policing and Unauthorised Camping,
Journal of Law and Society 30: 283308.
283
284
285
286
287