Escolar Documentos
Profissional Documentos
Cultura Documentos
MARK B. SALTER*
School of Politics, University of Ottawa, Canada
Introduction
C
UTTING ACROSS NATIONAL AND INTERNATIONAL bound-
aries, as well as economic, political, and social divisions, civil aviation
is a vital sector of contemporary global life. Since first becoming a
high-profile target for terrorists and hijackers in the late 1960s, aviation
security has waxed and waned in the public imagination. Tolerance for secu-
rity procedures and delays at airports decreases as the memory of attacks
fades, while demands for a secure and efficient sector are made continuously
by industry members and the businesses that depend on global mobility.
Since the attacks of 11 September 2001, more scholarly attention has been
paid to aviation and airport security. However, this kind of public and schol-
arly attention focuses on the role of government or the private sector in secu-
rity screening, or on evaluations of various detection technologies. Informed
by the international political sociology of the Paris School, the present article
takes a different methodological tack to analyze the aviation security sector.
I follow the work of Didier Bigo, Louise Amoore, Marieke de Goede, and
Aviation Security
1
Aviation security is engaged within the ‘air transportation management’ field and the ‘terrorism studies’
field, both of which are entirely state-centric. Air transport management experts, often from airlines, air-
port firms, consultancies, or specialist aviation universities, focus on aviation security from a problem-
solving perspective: public vs. private security screeners, effective technologies, the role of human factor
analysis, appropriate screening procedures, etc. Within terrorism studies, aviation security is seen as sub-
set of national security. Neither perspective is particularly ‘critical’, in the Cox sense of the term, in ques-
tioning the status quo (see Salter, 2007b).
2
See the two exceptions for thoughtful considerations of the imperial politics of the international airport:
Fuller & Harley (2005) and Aaltola (2005).
raison d’état and rational choice (Heal & Kunreuther, 2005). The obvious
symbolic connection of civil aviation targets and other conflicts or interests is
dismissed as a form of asymmetric warfare. In short, aviation security is an
accidental byproduct of national security: ‘aircraft security is at the mercy of
erratic foreign policy’ (St. John, 1999: 46). St. John’s conclusion is that Middle
Eastern geopolitical problems must be solved to prevent the problem of avia-
tion security and terrorism. Szyliowicz (2004: 58) makes a similar point that a
‘systemic’ response is needed to the problem of global terrorism: ‘widespread
changes in all aspects of aviation – in planning, design, implementation, and
operation – are required if such a [resilient, flexible] system is to emerge. The
goal should be to incorporate security into every element of the system to the
extent possible’. Thus, the solution to aviation insecurity is portrayed as
either the resolution of high political dramas, which has the effect of reinforc-
ing the position of states – and particularly the USA as a superpower – as the
primary problem-solvers of global politics, or the securitization of the entire
aviation system. Hainmüller & Lemnitzer (2003: 22) conduct a careful
analysis of US and European airport security regimes, but conclude that the
sovereign state should solidify its monopoly on the provision of security and
resist the temptation to outsource security screening. Though civil aviation is
a network on which global economic, social, and political spheres depend, the
effects of those global networks is erased in the national examination of
attacks. Consequently, the report of the 9/11 Commission (2004) detailed the
ways that the airport security screening system failed – rather than the net-
works of international travel that made the easy transport of 19 terrorists
across the globe possible.3 Morgan’s (2004: 5) analysis starkly separates
society from the garrison-state: ‘The garrison and society are starkly juxta-
posed in the atmosphere of the airport, and even in this restrictive manifesta-
tion of the state’s police power, terrorists were able to exploit vulnerabilities
to carry out the most massive single terrorist operation in world history’. In
short, traditional analyses of the aviation security network remained stuck in
a realist, state-centric universe of rational public actors.
We can point to three provocative articulations of contemporary aviation
security. Aaltola contextualizes the structure of international airport hub-
and-spoke architecture in terms of US imperialism. He argues that ‘the
meaning of the hierarchical world order is passed on to an aggregation of
people caught in the airport’s frame and flow . . . airports teach people the
central rituals of acknowledgements that are needed to navigate the
Byzantine structures of the modern hierarchical world order’ (Aaltola, 2005:
261). I argue that international mobility is a form of deviance or abnormality
that is contained through specific technologies of the international self,
3
This is not to say that the 9/11 Commission did not place the attacks within a global or historically sensi-
tive context, merely that the responses to this have been to expand the systems of surveillance at airports
and through the international civil aviation sector – rather than to reconsider the ease of global mobility.
including the passport, the visa, and the confession within the multiplicitous
site of the airport (Salter, 2006, 2007a). Aaltola and I concur that the circula-
tion of anxiety is central to the governance of the globally mobile through
modern airports. Though examining automobility, Packer (2006: 392) pushes
this argument further:
mobility could be replacing the individual as the means by which dangerous identities
are formulated. This production of a predictive mode of mobility assessment creates a
risk identity for that mobility which in no way depends on the individual driver. . . .
Identities become risk assessment algorithms of mobilities. It is not who is a threat, but
what vehicular movement can be used to predict a threat.
Aradau & van Munster (2007) argue convincingly that the trope of risk has
come to dominate many aspects of contemporary security politics within
public, private, national, and transnational spheres. From their admirable
analysis, I differ little. In this section, I will briefly summarize the argument
and then expand on the notion of the dispositif of security. Aradau & van
Munster coin the term ‘dispositif of risk’, to which I want to add the ‘dispositif
of security’. While the dispositif of risk makes the management of popula-
tions, practices, and institutions amenable to governance in the name of
risk, there is something critically different about how the aviation security
Dispositif
Aradau & van Munster use the Foucauldian term ‘dispositif’ for their analysis
of risk. They aver that ‘despite the peril of exoticism . . . “dispositif” has been
preserved as such in English . . . due to the perceived inadequacy of transla-
tions such as mechanism and apparatus’ (Aradau & van Munster, 2007: 109).
Foucault’s sense of dispositif is not mechanistic as a structure, an apparatus, or
a network per se, but rather a constellation of institutions, practices, and
beliefs that create the conditions of possibility within a particular field. It is a
capability for governance, or the disposition of a field towards a mode of
governance. As Agamben (2007: 27) writes, ‘dispositifs must always imply a
process of subjectification. They must produce their own subject’. This is why
caused by the free market. State security, then, is a matter of keeping civil
peace in times of tension, rather than the distribution of scarce food.
Building from this notion of management, the dispositif of security is conse-
quently not exclusively a fixed attempt to protect or enclose something, but
‘the specific space of security refers then to a series of possible events; it refers
to the temporal and the uncertain, which have to be inserted within a given
space’ (Foucault, 2007: 20). Foucault (2007: 44–46) draws a distinction
between disciplinary power and the dispositif of security:
Discipline is essentially centripetal. I mean that discipline functions to the extent that it
isolates a space . . . discipline concentrates, focuses, and encloses. . . . The [dispositifs] of
security have the constant tendency to expand; they are centrifugal. New elements are
constantly being integrated. . . . Security therefore involves organizing, or anyway
allowing the development of ever-wider circuits.
The dispositif of security, consequently, suits far more easily the continual
expansion of security fields in the ‘war on terror’.
It is normalization that has the effect of rendering the object of security
invisible. The opposite of the disciplinary power, which seeks to separate
normal and abnormal, the trick of the dispositif of security is to render the sum
of all possible objects of governance as part of a continuum to be governed.
Vaccination, Foucault (2007: 62) says, is indicative of this dispositif:
It is not the division of those who are sick and those who are not. It takes all who are sick
and all who are not as a whole, that is to say, in short, a population, and it identifies
the coefficient of probable morbidity in this population. . . . Thus we get the idea of a
‘normal’ morbidity or mortality. . . . What technique is to be used in relation to this? It
will be to try and reduce the most unfavourable, deviant normalities in relation to the
normal, the general curve.
5
There is slight disagreement between sectors as to whether risk analysis or risk management is the general
category.
6
Different standards take risk to include only negative risks, while the British, Australian, and New Zealand
models take risk to be neither necessarily positive nor necessarily negative.
A key part of Foucault’s (1997) discussion of the transition in the 16th and
17th centuries from a pastoral model of sovereignty that focused on terri-
torial integrity towards a population-based model of biopolitics is the devel-
opment of statistics as a form of authoritative knowledge practice. To control
the population, it is necessary to know the population, and the late 17th and
early 18th centuries see the development of a wide range of statistical and
demographic tools through which administrators figured the population.7 As
Hacking (1990: 1) argues, ‘society became statistical’. Statistics came to be
treated as social facts, rather than mathematical expressions of probability.
The strategy of quantification is particularly amenable to the centripetal
forces of the security dispositif. Once the paradigm of probability becomes
dominant, ‘the incalculable is only the not yet calculable, and organisation is
given priority’ (Elden, 2006: 140). Security chases risk – that is to say
that security may colonize areas of social, public, and political life when the
quantitative, probabilistic, statistical case is made. Just as the dispositif of
vaccination erases the categories of infected and not-infected, the categories
of sick, vagrant, criminal, and insane were placed within the context of a
normal distribution of abnormality within a population (Foucault, 2007: 60).
Ericson & Haggerty (1997: 112) argue that ‘in the nineteenth century the risk-
profiling of populations became an instrumental part of liberal utilitarian
political reform in matters of public health and security, and it has been so
ever since’.
Contemporary analyses of the numeration of contemporary governance
can be seen in a number of disciplines. To focus on the security field, Bigo
(2002) demonstrates clearly the ways in which the ‘authority of statistics’ is
used to bolster the specific regimes of truth and expertise behind the devel-
opment of the transnational field of ‘managers of unease’. According to
Ericson & Haggerty (1997: 114), ‘like expertise, risk technologies are self-
legitimating. Their very availability justifies the need for them. . . . As they set
out in search of problems, risk technologies masquerade as solutions’.
Profiles of groups ‘at risk’, which are always already overdetermined by
racial, ethnic, historical, linguistic, and national narratives, are repositioned
as having arisen from the data themselves. Following a dispositif of security,
the development of profiles does not seek to eliminate the risk presented by
these groups or profiles, but to manage the circulation of the risk. The circu-
lation of risk enables the dispositif to better dispose the resources of society,
the government, the policing agencies, and the managers of unease them-
selves. Quantification becomes a dominant strategy, because it provides the
cloak of objectivity:
7
For more historical analysis of the role of chance, probability, and statistics in the development of Western
societies, see Hacking (1990), Gigerenzer et al. (2000), Elden (2006).
If experts often claim too much, however, it is the political and social system that
permits, even encourages their pretensions. The objectivity and techniques of the
modern expert parallel the impartiality and rules of the modern bureaucrat. Both
exclude personal discretion and emphasize the consistent and even mechanical applica-
tion of established procedures across the board to avoid bias, the one aiming at truth to
fact, the other at fairness. Both seek the high ground, above the political fray (Gigerenzer
et al., 2000: 236).
2007a: 61–62). Experts from the ICAO and responsible government agencies
draft a list of prohibited items that are screened for using metal detectors,
explosives-detection systems, backscatter or millimeter-wave x-rays, and
human screeners. While the separation of airports into ‘sterile’ and ‘public’
zones, based on identification cards and authorized entry, might seem to con-
tradict this, it is common practice for even authorized individuals to be
screened for prohibited items as they enter sterile areas. The airport is thus
more typical of the ‘banopticon’ that protects by exclusion, by which Bigo
(2006) inverts the Foucauldian panopticon, which protects by incarceration.
This is not to say that aviation security professionals are not concerned with
identity credentials, perimeter control, and emergency preparedness. But,
the dominant activity of aviation policing is screening (goods, individuals,
identity documents, authorizations and passes, even data). The airport is an
urban, national, and international border. Since the airport is both a continu-
ation of urban space and a radically insecure connection to the globe, the
screening function is central to security. The institutions that compete for the
provision of aviation security represent both the centripetal tendencies of
dispositif and the centrifugal tendencies of discipline.8 Under Annex 17 of the
governing 1947 Chicago Treaty, each signatory state must designate a
national aviation security authority, which then provides regulation that
meets international requirements – systems that are now audited under the
post-9/11 ICAO University Security Audit System Programme. At the
national level, different police forces and security agencies compete for the
provision of aviation security. Air carriers and airport authorities are also
involved in security. Each of these groups often relies on a flock of transna-
tional security consultants and international experts. Because air carriers
carry significant economic risk, while governments and regulators hold
significant political risk, there are conflicting valences within the negotiation
of security procedures (Birkland, 2004: 356).
8
The complexity of this situation is illustrated in the Canadian case (see Salter, 2007a). Recent reports from
the CATSA Act Review Secretariat (2006), the Auditor-General of Canada (2006), and the Standing Senate
Committee on National Security and Defence (2003, 2007) demonstrate some of the adverse results of this
complex environment.
One of the few critical efforts to examine aviation security according to its
own rationality is that of Frederickson & LaPorte (2002). Their analysis of
aviation security as a ‘high reliability’ organization demonstrates the core
problems with organizational rationality. They describe clearly the possible
outcome of security screening in terms of positive, negative, false positive,
and false negative (see Table 1). The question of quantification lies at the
heart of their analysis, precisely because security screening cannot yet be
calculated. Frederickson & LaPorte (2002: 41) argue that ‘it is nearly impossi-
ble to know how many [false negative] threats there were or how many [false
negative] errors there might have been, were it not for effective passenger
and baggage screening’. From the point of view of passengers, false negatives
are pervasive and cause frustrating and pointless delays. From the point of
view of the national aviation security authority, false positives are cata-
strophic. But, there is a crucial problem with the coding of this grid. The
security of the system is not impacted by irrelevant false positives.
Furthermore, there is no way to quantify, code, or contextualize failures.
There is no recording how many prohibited items are surrendered per
passenger (is it multiple items on every tenth passenger, or simply one item
per passenger?). There are absolutely no data worldwide on the number of
prohibited items not detected, and there are no processes for secondary
detection once in a sterile area.9 No civil aviation authority currently con-
ducts an impact assessment of the failed detection of prohibited items. There
is simply no ‘root cause analysis’ of routine failures. At best, this kind of
systemic or operational research is performed after spectacular failures.
Consequently, aviation security managers have no idea of the total number
of items not detected, and hence cannot determine detection rate. They
cannot calculate the impact of failures of the system, since the vast majority
of false positives cause neither absolute nor relative decreases in security,
and those false positives that do cause disaster do so on a scale that is impos-
sible to calculate for any individual manager or carrier.
Risk management is an absolute empirical failure in providing real know-
ledge or increasing aviation security. But, it is a success for the dispositif of
security: it continually generates new areas to which security might be
applied. The statistics regarding detection rate, average passenger wait
times, number of prohibited items seized – these imaginary numbers contin-
ually generate new possible objects, profiles, or groups for security screening.
With no consideration of the actual proportion of passengers that represent a
threat, the detection rate, the number of benign prohibited items seized, or
9
Some security agencies engage in infiltration tests, the results of which are not publicly available. As a
result of the Air India bombing in Canada, passengers boarding Air India flights are often rescreened
immediately before they board their planes. Two recent incidents in which prohibited items were detect-
ed at secondary screening at the gate, after not being caught at primary screening, have led to questions
about the implementation of primary screening. But, these incidents are entirely random and cannot be
extrapolated to the general population of passengers, flights, or security procedures.
the cost of delays, several scholars have offered abstract models of aviation
security screening. Babu, Batta & Lin (2004: 633) offer a model for the number
of risk categories and corresponding security stations that minimizes false
positives, although ‘the basic assumption made in [their] model is that all
passengers pose an equal threat’. They suggest that the division of passen-
gers into subgroups with differential screening can be efficient: ‘while it is
widely recognized that security screening efficiency can be improved if
passengers with different threat probabilities are treated differently, what is
perhaps not as obvious is that grouping even initially indistinguishable
passengers can improve screening efficiency when some screening steps are
optional’ (Babu, Batta & Lin, 2004: 643). Even when the population is indis-
tinguishable in terms of threat, ‘efficiency’ is increased by applying enhanced
security procedures to some portion of that population. Here is a perfect
example of calculation, in the absence of data, leading to the increased secu-
ritization of aviation screening. The fetish of quantification obscures this core
dissimilarity between security and safety, the fundamental lack of statistical
data, and the absence of security. Industry experts admit that the quantifica-
tion of impact of successful attacks, the frequency of attacks, and the detec-
tion of prohibited items is beyond current technical means. Internal pressure
from stakeholders, the public, and governments, however, requires some
kind of performance measurement (Auditor-General of Canada, 2006: 35–38;
Hainmüller & Lemnitzer, 2003). As a consequence, what analysts, enter-
prises, and governments alike measure are indirect, measurable variables:
throughput of a screening point, percentage of total sent to secondary screen-
ing, number of prohibited items detected, technical sensitivity of detection
equipment, proportion of time in training/repair, etc. Since there are no data
– no quantification of security is possible – security agencies measure what is
measurable.
For example, there is an international debate on the proper procedure for
screening hold baggage. The European Union has standardized hold-
baggage screening, using a risk-based system. Passenger luggage is screened
with x-ray technology; if no alarms are tripped, it is then loaded. Alarms
cause the luggage to be subject to more refined scans, explosives-detection
systems, CT tomography, and finally hand search, etc. Consequently,
Europeans boast of having the lowest proportion of bags subject to the most
exacting level of search. For their part, US officials subject every bag to CT
tomography, which provides greater reliability and fewer false alarms. Each
side mounts statistical evidence of false-alarm rates, speed of processing,
efficiency of equipment, but there is simply no empirical evidence of the
actual ‘security’ garnered.
How do the multiple and heterogeneous practices of security screening add
up to a dispositif? There are simply no valid or reliable data on aviation secu-
rity (Button, 1999: 74). There are no data on the efficacy of airport or baggage
Expert Panels
The expert panel provides a veil of objectivity for the security dispositif: in
short, it distances the construction of knowledge from systems of control. An
analysis of the global civil aviation security sector bears out Bigo’s (1996)
analysis of European police networks: a transnational cadre of consultants,
technocrats, and experts who determine the grammar and vocabulary of the
field of aviation security, replete with former police and military personnel,
as well as former regulators or administrators. But, as one expects of the
dispositif of security, there is an inherent dynamic within the expert panel to
present essentially imagined threats as real. This i–R translation produces
risk experts who are then enabled to manage the risk they define. The expert
panel has had the clearest effect on aviation screening in the case of new
technologies and screening practices. The banning of liquids/gels – or, more
precisely, the strict limiting of liquids/gels – is another example of the
security dispositif. The international norm of 100ml of liquids/gels is based on
an assumed failure of screening – 100ml of explosives would likely not cause
a catastrophic crash. This limit emerged from within the Israeli aviation secu-
rity community and has been adopted around the globe. An exception to this
general adoption demonstrates the importance of expertise: Australia’s avia-
tion security authorities have refused to impose a liquid ban on the grounds
that their risk analysis demonstrates that other security screening procedures
will detect this threshold of explosives. Again, from what we would predict
from a Foucauldian perspective, the dispositif of security does not tell us any-
thing about the prohibition of explosives – rather, it defines the bandwidth of
acceptable and unacceptable explosions.
Each panel starts by chasing nightmares of low-probability, high-impact
scenarios. The DELPHI method (or similar) used by these groups relies on
numerical coding to poll experts as to threat.10 The earliest research on this
method results in a drive towards ‘common sense’ or consensus through the
quantitative rankings of ‘most likely’ actions and results (Dalkey & Helmer,
1963: 466). The results of groupthink, path dependency, and bureaucratic
inertia are a granting of credibility to threats to which the security agency
10
For example, Transport Canada has conducted a single risk assessment of the aviation security environ-
ment since 2001, using quantitative methodology and ranking (CATSA Act Review Secretariat, 2006: 33).
This exercise has yet to be repeated.
always already has the answer. Consequently, these expert panels both
provide nightmares that promote new expansions of security and reify the
‘common sense’ of current security procedures. Birkland (2004: 362) demon-
strates how post-9/11 aviation security policy, legislation, and regulations
derived directly from the ‘all of the experience with aviation that had been
amassed before these attacks’.
Ericson & Doyle chart the rise of ‘terrorism loss estimate models’ offered by
several companies after the 9/11 attacks. They trace how ‘AIR and Risk
Management Solutions hired former FBI and CIA counterterrorism opera-
tives to make educated guesses about landmark buildings that might be
targets of terrorism. AIR also used its experts to estimate frequency’ (Ericson
& Doyle, 2004: 228). As Ericson (2006: 348) argues, there is a fundamental
problem with this system:
a risk-management system is based on prior conventions for recognition, selection,
assessment, and evaluation, which, in turn, are grounded in institutions, values, inter-
ests, and ways of life. Aggregate data of population risks can never be used precisely to
indicate whether the case under scrutiny is an actual source of harm.
This is not to say that the use of the expert panel is entirely homogeneous or
uncontested. Expert panels failed to change the aviation security sector
before the spectacular failures of Pan Am 103, Air India, or 9/11. The vulner-
abilities of aviation security were well known within the industry, but this
knowledge did not create the possibility for new areas of security. The US
General (now Government) Accounting Office issued a number of damning
reports on airport screeners, with little actual effect (GAO, 2002; Bazerman &
Watkins, 2005: 368; Standing Senate Committee on National Security and
Defence, 2007). Bazerman & Watkins (2005: 370–372) trace the demise of the
1996 White House Commission on Aviation Safety and Security, whose
recommendations were diluted and eventually defeated by a lack of political
will and corporate pressure. In this case, the recommendations of the expert
panel were used by mundane commercial and conservative political interests
– but, even in the refusal of its recommendations, the integrity of the know-
ledge claim by the expert panel was upheld. The argument here is not that
experts may be outmaneuvered, but that the use of expert panels is impli-
cated in a dispositif of security. An ICAO Aviation Security Panel of Experts
was created in 1986 after the Air India bombing as a group of independent
experts that would develop technical knowledge above the fray of politics. In
the 20 years of its operation, the issue of aviation security has become increas-
ingly salient in the popular imagination. But, the panel itself has become
increasingly politicized and the role of independent experts has diminished.
While it was initially established as a board of nationally nominated inde-
pendent experts, over time more national representatives of governments
have been appointed. The ICAO Aviation Security Panel of Experts has
become politicized.
The expert panel is a technique that generates authority for the production
of knowledge that subsequently permits the arrangement of economic,
political, and social technologies of security. Since terrorists are always faster
entrepreneurs than governments, prone to gambling on new vectors of
attack, government regulators and operating agencies are necessarily conser-
vative. The expert panel starts brainstorming with low-probability events,
but then allocates scarce resources to those threats that are most frequent or
have the highest potential impact. In the absence of data, the incalculable are
quantified through a consensus-making process that excludes outliers or
low-probability events. Faced with this political economy of risk and secu-
rity, experts generate analyses that lead to solutions that they themselves are
able to provide. The security of the population becomes comprehended in
terms of an ever-expanding assemblage of screening procedures.
Conclusion
The utility of the dispositif as a frame of analysis becomes clear: rather than
seek a clear fungible commodity of security or risk, we have analyzed the
way that the appeal to security and risk makes certain dispositions of forces,
resources, and norms possible. Following on from Aradau & van Munster’s
(2007: 107) formulation of ‘precautionary risk’ as a ‘dispositif at the limit’, I
would argue that the quantification of the security imaginary serves as a
tactic of this rolling expansion of surveillance and control. Furthermore, the
specific practices of risk management in aviation security allow a more
diffuse analytic of ‘decisionist’ politics, in which decisions are justified in the
name of emergencies, crises, and exceptions (Doty, 2007). The dispositif of
security allows for a wide assemblage of actors to engage in this type of
politics and continually to increase the spaces in which security operates.
Within this field of contestation, within the discussion of security, there is no
discussion of the ‘security’ of the object, no voice for the people who are
flown – only the governments, the companies, the experts who can express
their concerns in numbers. The incalculable is impossible to discuss publicly:
one may only discuss the rarification and clarification of quantitative tools
for better getting to grips with aviation security. The description of threats to
aviation security in quantitative terms, especially when spoken by the expert
panel, hides the expansion of the ambit of security in the policing, surveil-
lance, and control of mobile populations. Mobility has become understood,
not as a right, but as a deviation to be explained to agents of the state.
Coupled with the galloping expansion of the definition of enemies within the
‘war on terror’, the dispositif of security is able to justify much more control by
corporate, government, and private actors.
Most often, analysis of aviation security recurs back to sovereignty, the
state, and the question of security management. This is a fundamental
depoliticization of mobility, citizenship, and society. Airports are not simply
places of mobility or incarceration, and to a large extent the model of the dis-
ciplinary society does not explain institutions, policies, or practices there. The
critical work on the airport demonstrates a clear need to move beyond the
sovereignty/discipline dichotomy. We need more critical discussion of the
complicity of air carriers in the international policing of refugees (Walters,
2002) and the role of aviation in creating networks that open or restrict the
potential for global mobility (Aatola, 2005). The actual evaluation of the sys-
tem in terms of ‘security’ is not simply underdetermined, but undetermined.
Within this kind of international biopolitics, the technologies of risk are inter-
preted through security screening practices to make all individuals a source
of danger and to justify all efforts to gather and interpret more information
about travelers with the badge of security.
References
9/11 Commission, 2004. Final Report of the National Commission on Terrorist Attacks upon the
United States. Washington, DC: National Commission on Terrorist Attacks.
Aaltola, Mika, 2005. ‘The International Airport: The Hub-and-Spoke Pedagogy of the
American Empire’, Global Networks 5(3): 261–278.
Adey, Peter, 2007. ‘“May I Have Your Attention”: Airport Geographies of Spectatorship,
Position, and (Im)Mobility’, Environment and Planning D: Society and Space 25(3):
515 – 536.
Advani, Asheesh & Sandford Borins, 2001. ‘Managing Airports: A Test of the New Public
Management’, International Public Management Journal 4(1): 91–107.
Agamben, Giorgio, 2007. Qu’est-ce qu’un dispositif? [What Is a Dispositif?], trans. Martin
Rueff. Paris: Petit Bibliothèque.
Amoore, Louise, 2006. ‘Biometric Borders: Governing Mobilities in the War on Terror’,
Political Geography 25(3): 336–351.
Amoore, Louise, 2007. ‘Vigilant Visualities : The Watchful Politics of the War on Terror’,
Security Dialogue 38(2): 215–232.
Aradau, Claudia & Rens van Munster, 2007. ‘Governing Terrorism Through Risk: Taking
Precautions, (Un)Knowing the Future’, European Journal of International Relations 13(1):
89–115.
Ashley, Richard K. & R. B. J. Walker, 1990. ‘Speaking the Language of Exile: Dissident
Thought in International Relations’, International Studies Quarterly 34(3): 259–268.
Auditor-General of Canada, 2006. Canadian Air Transport Security Authority: Special
Examination Report, redacted version. Ottawa: Office of the Auditor-General of Canada.
Babu, Vellara L. Lazar; Rajan Batta & Li Lin, 2004. ‘Passenger Grouping Under Constant
Threat Probability in an Airport Security System’, European Journal of Operational
Research 168(2): 633–644.
Barnett, Arnold, 2004. ‘CAPPS II: A Foundation for Aviation Security?’, Risk Analysis
24(4): 909–916.
Bazerman, Max H. & Michael Watkins, 2005. ‘Airline Security, the Failure of 9/11, and
Predictable Surprises’, International Public Management Journal 8(3): 365–377.
Bigo, Didier, 1996. Polices en réseaux: l’expérience européenne [Police Networks: The
European Experience]. Paris, Presses de Sciences Po.
Bigo, Didier, 2001. ‘The Möbius Ribbon of Security(ies)’, in Mathias Albert, David
Jacobson & Yosef Lapid, eds, Identities, Borders, Orders: Rethinking International Relations
Theory. Minneapolis, MN: University of Minnesota Press (91–116).
Bigo, Didier, 2002. ‘Security and Immigration: Toward a Critique of the Governmentality
of Unease’, Alternatives: Global, Local, Political 27 (special issue): 63–92.
Bigo, Didier, 2006. ‘Globalized (In)Security: The Field and the Ban-Opticon’, in Didier
Bigo & Anastassia Tsoukala, eds, Illiberal Practices of Liberal Regimes: The (In)Security
Games. Paris: l’Harmattan (5–49).
Birkland, Thomas A., 2004. ‘Learning and Policy Improvement After Disaster’, American
Behavioral Scientist 48(3): 341–364.
Brodeur, Jean-Paul, ed., 2006. ‘Air Transportation and Risk Management’, special issue,
Canadian Journal of Criminology and Criminal Justice 48(3).
Button, Kenneth, 1999. ‘The Usefulness of Current International Air Transport Statistics’,
Journal of Transportation and Statistics 2(1): 71–92.
Campbell, David, 1998. Writing Security: United States Foreign Policy and the Politics of
Identity, rev. edn. Minneapolis, MN: University of Minnesota Press.
Canadian Air Transport Security Authority Act Review Secretariat, 2006. ‘Flight Plan:
Managing the Risks in Aviation Security’, Report of the Advisory Panel, Canadian Air
Transport Security Authority Act Review. Ottawa: CATSA Act Review Secretariat.
Canadian Standards Association (CSA), 1997. CAN/CSA-Q850-97 – Risk Management:
Guideline for Decision-Makers. Etobicoke: Canadian Standards Association.
c.a.s.e. collective, 2006. ‘Critical Approaches to Security in Europe: A Networked
Manifesto’, Security Dialogue 37(4): 443–487.
Castel, Robert, 1991. ‘From Dangerousness to Risk’, in Graham Burchell, Colin Gordon &
Peter Miller, eds, The Foucault Effect: Studies in Governmentality. Chicago, IL: Chicago
University Press (281–298).
Dalkey, Norman & Olaf Helmer, 1963. ‘An Experimental Application of the Delphi
Method to the Use of Experts’, Management Science 9(3): 458–467.
De Goede, Marieke, 2008. ‘Beyond Risk: Premediation and the Post-9/11 Security
Imagination’, Security Dialogue 39(2–3): 155–176.
Deleuze, Gilles, 1992. ‘What Is a Dispositif?’, in Timothy J. Armstrong, ed., Michel Foucault:
Philosopher. New York: Routledge (159–168).
Descartes, René, [1637] 1954. Geometry, trans. David Eugene Smith & Marcia L. Latham.
New York : Dover.
Doty, Roxanne Lynn, 2007. ‘States of Exception on the Mexico–U.S. Border: Security,
“Decisions,” and Civilian Border Patrols’, International Political Sociology 1(2): 113–137.
Elden, Stuart, 2006. Speaking Against Number: Heidegger, Language and the Politics of
Calculation. Edinburgh: Edinburgh University Press.
Ericson, Richard V., 2006. ‘Ten Uncertainties of Risk-Management Approaches to
Security’, Canadian Journal of Criminology and Criminal Justice 48(3): 345–357.
Ericson, Richard V. & Aaron Doyle, 2004. Uncertain Business: Risk, Insurance and the Limits
of Knowledge. Toronto: University of Toronto Press.
Ericson, Richard V. & Kevin D. Haggerty, 1997. Policing the Risk Society. Toronto:
University of Toronto Press.
Ewald, François, 1991. ‘Insurance and Risk’, in Graham Burchell, Colin Gordon & Peter
Miller, eds, The Foucault Effect: Studies in Governmentality. Chicago, IL: Chicago
University Press (197–210).
Foucault, Michel, 1997. ‘The Birth of Biopolitics’, in Paul Rabinow, ed., Ethics: Subjectivity
and Truth – Essential Works of Michel Foucault. New York: Norton (73–79).
Foucault, Michel, 2007. Security, Territory, Population: Lectures at the Collège de France,
1977–78, trans. Graham Burchill. London: Palgrave.
Frederickson, H. George & Todd R. LaPorte, 2002. ‘Airport Security, High Reliability, and
the Problem of Rationality’, Public Administration Review 62 (supplement 1): 33–43.
Fuller, Gillian & Ross Harley, 2005. Aviopolis: A Book About Airports. London: Black Dog.
General Accounting Office (GAO), 2002. Vulnerabilities and Potential Improvements for the
Air Cargo System, December. Washington, DC: US GAO.
Gigerenzer, Gerd; Zeno Swijtink, Theodore Porter, Lorraine Daston, John Beatty & Lorenz
Kruger, 2000. The Empire of Change: How Probability Changed Science and Everyday Life.
Cambridge: Cambridge University Press.
Hacking, Ian, 1990. The Taming of Chance. New York: Cambridge University Press.
Haggerty, Kevin D. & Richard V. Ericson, 2001. ‘The Surveillant Assemblage’, British
Journal of Sociology 51(4): 605–622.
Hainmüller, Jens & Jan Martin Lemnitzer, 2003. ‘Why Do Europeans Fly Safer? The
Politics of Airport Security in Europe and the US’, Terrorism and Political Violence 15(4):
1–36.
Heal, Geoffrey & Howard Kunreuther, 2005. ‘IDS Models of Airline Security’, The Journal
of Conflict Resolution 49(2): 201–217.
Hood, Christopher & Guy Peters, 2004. ‘The Middle Aging of New Public Management:
Into the Age of Paradox?’, Journal of Public Administration Research and Theory 14(3):
267–282.
Hood, Christopher; Henry Rothstein & Robert Baldwin, 2001. The Government of Risk:
Understanding Risk Regulation Regimes. Oxford: Oxford University Press.
International Organization for Standardization (ISO), 2002. Risk Management – Vocabulary
– Guidelines for Use in Standards, ISO/IEC Guide No. 73:2002. Geneva: ISO.
Leander, Anna, 2005. ‘The Power To Construct International Security: On the Significance
of Private Military Companies’, Millennium: Journal of International Studies 33(3):
803–826.
Leiss, William, 2001. In the Chamber of Risks: Understanding Risk Controversies. Montreal &
Kingston: McGill-Queen’s University Press.
McLay, Laura A.; Sheldon H. Jacobson & John E. Kobza, 2006. ‘Multilevel Passenger
Screening Strategies for Aviation Security Systems’, Naval Research Logistics 53(3):
183–197.
Merari, Ariel, 1999. ‘Attacks on Civil Aviation: Trends and Lessons’, in Paul Wilkinson &
Brian M. Jenkins, eds, Aviation Security and Terrorism. Portland, OR: Frank Cass (9–26).
Morgan, Matthew J., 2004. ‘The Garrison State Revisited: Civil–Military Relations of
Terrorism and Security’, Contemporary Politics 10(1): 5–19.
Olapiriyakul, Sun & Sanchoy Das, 2007. ‘Design and Analysis of a Two-Stage Security
Screening and Inspection System’, Journal of Air Transport Management 13(2): 67–74.
Packer, Jeremy, 2006. ‘Becoming Bombs: Mobilizing Mobility in the War on Terror’,
Cultural Studies 20(4–5): 378–399.
Rose, Nikolas; Pat O’Malley & Mariana Valverde, 2006. ‘Governmentality’, Annual Review
of Law and Social Science 2: 83–104.
Russell, Perry A. & Frederick W. Preston, 2004. ‘Airline Security After the Event’, American
Behavioral Scientist 47(11): 1419–1427.
Salter, Mark B., 2006. ‘The Global Visa Regime and the Political Technologies of the
International Self: Borders, Bodies, Biopolitics’, Alternatives: Global, Local, Political 31(2):
167–189.
Salter, Mark B., 2007a. ‘Governmentalities of an Airport: Heterotopia and Confession’,
International Political Sociology 1(1): 49–66.
Salter, Mark B., 2007b. ‘SeMS and Sensibility: Security Management Systems and the
Management of Risk in the Canadian Air Transport Security Authority’, Journal of Air
Transport Management 13(6): 389–398.
Standing Senate Committee on National Security and Defence, 2003. The Myth of Security
at Canada’s Airports. Ottawa: Senate of Canada.
Standing Senate Committee on National Security and Defence, 2007. Canadian Security