(Download PDF) Critical Security Studies in The Digital Age Social Media and Security Joseph Downing Full Chapter PDF

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 69

Critical Security Studies in the Digital

Age: Social Media and Security Joseph


Downing
Visit to download the full and correct content document:
https://ebookmass.com/product/critical-security-studies-in-the-digital-age-social-medi
a-and-security-joseph-downing/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

The Five Technological Forces Disrupting Security: How


Cloud, Social, Mobile, Big Data And IoT Are
Transforming Physical Security In The Digital Age 1st
Edition Edition Steve Van Till
https://ebookmass.com/product/the-five-technological-forces-
disrupting-security-how-cloud-social-mobile-big-data-and-iot-are-
transforming-physical-security-in-the-digital-age-1st-edition-
edition-steve-van-till/

Media & Culture: Mass Communication in a Digital Age


Thirteenth Edition Richard Campbell

https://ebookmass.com/product/media-culture-mass-communication-
in-a-digital-age-thirteenth-edition-richard-campbell/

Social Media and Digital Dissidence in Zimbabwe Trust


Matsilele

https://ebookmass.com/product/social-media-and-digital-
dissidence-in-zimbabwe-trust-matsilele/

Japan Prepares for Total War: The Search for Economic


Security, 1919–1941 (Cornell Studies in Security
Affairs) 1st Edition Barnhart

https://ebookmass.com/product/japan-prepares-for-total-war-the-
search-for-economic-security-1919-1941-cornell-studies-in-
security-affairs-1st-edition-barnhart/
Journalism and Truth in an Age of Social Media James E.
Katz

https://ebookmass.com/product/journalism-and-truth-in-an-age-of-
social-media-james-e-katz/

Game Theory, Diplomatic History and Security Studies


Frank C. Zagare

https://ebookmass.com/product/game-theory-diplomatic-history-and-
security-studies-frank-c-zagare/

The US Navy and the National Security Establishment: A


Critical Assessment John T. Hanley

https://ebookmass.com/product/the-us-navy-and-the-national-
security-establishment-a-critical-assessment-john-t-hanley/

Cybersecurity and Decision Makers: Data Security and


Digital Trust Marie De Fréminville

https://ebookmass.com/product/cybersecurity-and-decision-makers-
data-security-and-digital-trust-marie-de-freminville/

Revolutions in Communication: Media History from


Gutenberg to the Digital Age 2nd Edition, (Ebook PDF)

https://ebookmass.com/product/revolutions-in-communication-media-
history-from-gutenberg-to-the-digital-age-2nd-edition-ebook-pdf/
Critical Security Studies
in the Digital Age
Social Media and Security

Joseph Downing
New Security Challenges

Series Editor
George Christou, University of Warwick, Coventry, UK
The last decade has demonstrated that threats to security vary greatly in
their causes and manifestations and that they invite interest and demand
responses from the social sciences, civil society, and a very broad policy
community. In the past, the avoidance of war was the primary objective,
but with the end of the Cold War the retention of military defence as
the centrepiece of international security agenda became untenable. There
has been, therefore, a significant shift in emphasis away from traditional
approaches to security to a new agenda that talks of the softer side of secu-
rity, in terms of human security, economic security, and environmental
security. The topical New Security Challenges series reflects this pressing
political and research agenda.
For an informal discussion for a book in the series, please contact the
series editor George Christou (G.Christou@warwick.ac.uk), or Palgrave
editor Alina Yurova (alina.yurova@palgrave-usa.com).
This book series is indexed by Scopus.
Joseph Downing

Critical Security
Studies in the Digital
Age
Social Media and Security
Joseph Downing
Senior Lecturer of International
Relations and Politics
Department of Politics, History
and International Relations
Aston University
Birmingham, UK
Visiting Fellow
European Institute
London School of Economics
and Political Science
London, UK

ISSN 2731-0329 ISSN 2731-0337 (electronic)


New Security Challenges
ISBN 978-3-031-20733-4 ISBN 978-3-031-20734-1 (eBook)
https://doi.org/10.1007/978-3-031-20734-1

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer
Nature Switzerland AG 2023
This work is subject to copyright. All rights are solely and exclusively licensed by the
Publisher, whether the whole or part of the material is concerned, specifically the rights
of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on
microfilms or in any other physical way, and transmission or information storage and
retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology
now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc.
in this publication does not imply, even in the absence of a specific statement, that such
names are exempt from the relevant protective laws and regulations and therefore free for
general use.
The publisher, the authors, and the editors are safe to assume that the advice and informa-
tion in this book are believed to be true and accurate at the date of publication. Neither
the publisher nor the authors or the editors give a warranty, expressed or implied, with
respect to the material contained herein or for any errors or omissions that may have been
made. The publisher remains neutral with regard to jurisdictional claims in published maps
and institutional affiliations.

Cover illustration: © metamorworks/Shutterstock

This Palgrave Macmillan imprint is published by the registered company Springer Nature
Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Acknowledgements

This book owes the most to the two data science specialist that were
instrumental in producing the data analysis for some of the examples in
this book. To Wasim Ahmed and Richard Dron, this book owes a huge
debt of gratitude. Also, from a theoretical and conceptual perspective,
Jennifer Jackson-Preece was key in introducing me to the critical security
literature and has been positive and encouraging throughout my academic
career thus far. Additionally, Estelle E. Brun provided significant coding
support and very mature scholarly reflections on some of the examples in
this book.

v
Contents

1 Introduction to Social Media and Critical Security


Studies in the Digital Age 1
1.1 Introducing Social Media and Critical Security
in the Digital Age 1
1.2 Challenges and Limits to Investigating Social Media
and Security 3
1.3 Take Home Messages 4
1.3.1 The Need to Shatter Disciplinary Boundaries
in the Digital Age 4
1.3.2 Empirical Security Paradoxes: Expecting
the Unexpected on Social Media 5
1.3.3 The Temperamental Topography of Social
Media: The Rise, Rise and Fall of Platforms,
Data and Methods 6
1.3.4 The Unrealised Promises of Critical Theory:
Social Media and Discursive Emancipation 7
1.4 Charting the Road Ahead: Critical Insights
into the Social Media Securityscape 9
Bibliography 18
2 Conceptualising Social Media and Critical Security
Studies in the Digital Age 23
2.1 Introducing International Relations and Security 23

vii
viii CONTENTS

2.2 Classical Security Studies: Realism, Liberalism,


Constructivism 28
2.3 The Critical Security Studies World Tour: Copenhagen,
Paris and Wales 31
2.3.1 The Discursive Turn and the Copenhagen School 33
2.3.2 Security and the Prospects of Emancipation:
The Welsh School of Security Studies 42
2.3.3 Crossing the Chanel: The Paris School
of Security Studies 45
2.4 From the General to the Specific: More Particular
Developments in Critical Security Studies 50
2.4.1 Voices from Below: Vernacular Security Studies 51
2.4.2 Making Sense of the Post-9/11 World: Critical
Terrorism Studies 52
2.5 Security and Technology: Social Media
and CyberSecurity Debates 55
2.6 Conclusions on Critical Security Studies, Technology
and Social Media 62
Bibliography 64
3 Social Media, Digital Methods and Critical Security
Studies 71
3.1 Introducing Digital Methods, Critical Security Studies
and Social Media 71
3.2 Conceptualising Social Media, Security and Methods 74
3.3 Digital Research Challenges: Data Access,
Demographics and Ethics 79
3.3.1 Digital Demographics: Lessons from the Fake
Warren Buffett and the Twitter Blue Tick 82
3.3.2 Digital Data: Financial, Ethical and Access
Challenges 85
3.4 Digital Approaches to Critical Security Studies:
Methodological Notes 87
3.4.1 Social Network Analysis and Critical Security
Studies 88
3.4.2 Netnography, “Self-Destruction” and Critical
Security Studies 89
3.4.3 Digital Discourse: Security Speak and Social
Media 94
CONTENTS ix

3.5 Conclusions on Methods, Critical Security and Social


Media 100
Bibliography 101
4 Social Media, Security and Terrorism in the Digital Age 109
4.1 Introducing Social Media, Security and Terrorism
in the Digital Age 109
4.2 Conceptualising Social Media, Security and Terrorism
in a Digital Age 112
4.3 Social Media, Terrorism and Local Themes
of Resistance 120
4.3.1 Social Media, Re-Constructing Terrorism
and Urban Identity 124
4.3.2 Social Media, Terrorism and Football
Resistance 127
4.4 Conclusions on Social Media and Terrorism
in the Digital Age 128
Appendices 130
Bibliography 132
5 Social Media and Vernacular Security in the Digital Age 141
5.1 Introducing Social Media and Vernacular Approaches
to Security in the Digital Age 142
5.2 Conceptualising Social Media and Vernacular Security
in the Digital Age 145
5.3 Investigating Social Media and Vernacular Security
in the Digital Age 149
5.3.1 Social Media and Vernacular Resistance
to Non-State Actors on YouTube 149
5.3.2 Social Media and Vernacular Insecurity
on Snapchat 158
5.4 Conclusions on Social Media Vernacular Security
in the Digital Age 167
Appendices 170
Bibliography 171
6 Social Media, Security and Democracy in the Digital
Age 179
6.1 Introducing Social Media, Security and Democracy
in the Digital Age 179
x CONTENTS

6.2 Conceptualising Social Media, Security and Democracy


in the Digital Age 183
6.3 Investigating Social Media, Security and Democracy
in the Digital Age 190
6.3.1 Social Media, Security, Democracy and Election
Meddling 192
6.3.2 Social Media, Security, Democracy
and Abstention 197
6.4 Conclusions on Social Media, Security and Democracy
in the Digital Age 200
Appendices 201
Bibliography 203
7 Social Media, Security and Identity in the Digital Age 209
7.1 Introducing Social Media, Security and Identity
in the Digital Age 209
7.2 Conceptualising Social Media, Security and Identity
in the Digital Age 211
7.3 Investigating Social Media, Security and Identity
in the Digital Age 218
7.3.1 Social Media, Security and National Identity
on Twitter 219
7.3.2 Social Media, Security and Internationalising
Muslim Identity on Twitter 224
7.4 Conclusions on Social Media, Security and Identity
in the Digital Age 228
Appendices 230
Bibliography 231
8 Conclusions on Social Media and Critical Security
Studies in a Digital Age 239
8.1 Introducing Conclusions on Social Media and Security
in the Digital Age 239
8.2 Macro Reflections on Social Media and Critical
Security in a Digital Age 240
8.2.1 The Centrality of Interdisciplinary Approaches 240
8.2.2 Expecting the Unexpected and Broadening
the Empirical Insights into Security 240
8.2.3 New Platforms, New Insights 241
8.2.4 Discursive Emancipation and Social Media 241
CONTENTS xi

8.3 Conclusions on Social Media and Critical Security


Concepts 242
8.4 Conclusions on Social Media, Digital Methods
and Critical Security Studies 246
8.5 Conclusions on Social Media, Security and Terrorism 248
8.6 Conclusions on Social Media and Vernacular Security
in the Digital Age 251
8.7 Conclusions on Social Media, Security and Democracy
in the Digital Age 253
8.8 Conclusions on Social Media, Security and Identity
in the Digital Age 255
Bibliography 256

Index 261
CHAPTER 1

Introduction to Social Media and Critical


Security Studies in the Digital Age

1.1 Introducing Social Media


and Critical Security in the Digital Age
Social media has become one of the key components of the contemporary
global political landscape. From the circulation of horrific ISIS recruit-
ment videos to the will they/won’t they/oh they have de-platforming
debate about the Twitter account of the 45th president of the United
States of America, Donald Trump, “social media” is never far from the
political headlines. However, the headlines, as always, can be simplistic,
sensationalist and essentialising of “social media”. Is it really true that
jokes, spread online, won the 2017 presidential election for Donald
Trump? (Nussbaum, 2017). Giving primacy to the role of “digital” social
media narratives above and beyond the archaic “analogue”, structural and
social factors seems to have become quite a trend. If we are to inter-
rogate such claims with scholarly rigour, a set of questions, some even
beyond the scope of this book raise their head. To what extent is social
media “new” or simply an extension of, or means of articulating, old
social cleavages and grievances? Is social media really the driving force
behind a populist social movement, rooted in rising inequality and the
de-alignment of voters from traditional left-wing parties that become
increasingly concerned with middle-class (Thomas, 2022), young (Rosen-
tiel, 2008), urban (Thompson, 2019) voters at the expense of their
traditional power bases? Clearly, social media needs to be situated with

© The Author(s), under exclusive license to Springer Nature 1


Switzerland AG 2023
J. Downing, Critical Security Studies in the Digital Age, New Security
Challenges, https://doi.org/10.1007/978-3-031-20734-1_1
2 J. DOWNING

the much broader social context in which it is only one part of the much
larger political jigsaw of the early twenty-first century.
However, essentialisation of social media does not stop at discussions
of its posited unstoppable capacity for social and political transforma-
tion. Rather, “social media” is used unproblematically as if it describes
a unitary entity with clear and unidirectional implications. However, this
catch all term homogenises an incredibly bewildering array of technolo-
gies, platforms and communication technologies with significantly varying
and multifaceted possibilities for human use, interaction and subversion.
Indeed, there is a lot to be said for abandoning the term “social media” as
essentialising and homogenising to the point of uselessness. For example,
to lumber telegram, a smart phone app used for private communication
under the same umbrella term as YouTube and Twitter seems extremely
reductivist.
Another common folie in the discussion of communications tech-
nologies is presenting them in ahistorical terms. The communications
“revolution” of social media, opening up new avenues for those at the
“bottom” to contest the political agenda of those at the “top” is arguably
not as new, or as revolutionary as it seems. Indeed, the possibilities
afforded by technology for challenging those in authority was not some-
thing lost on those seeking to disrupt political, religious and social order
since with technology since antiquity (Reuter, 2019).
However analogue this may sound, the “digitalisation” of communi-
cation technologies and how these have sent ripples through the political
and social order is also something not unique to the adoption of the smart
phone. Indeed, there is a much longer historical relationship between
media, security and international relations. The revolutionary Islamist
messages carried on the cassette tapes of the Iranian revolution, Alge-
rian FLN and Egyptian Muslim brotherhood changed the political field
of North Africa and the Middle East, ushering in a dark and sinister
era of conspiratorial anti-systemic politics that shook the foundations of
authoritarian regimes long before anyone could conceive the possibilities
of tweeting about the Arab spring. Indeed, the deposed Shah of Iran
and the bloodied and battered regime of ex-freedom fighters in Algiers
saw first-hand the devastating consequences of how long-neglected struc-
tural social grievances could be given new life and meanings through
communications technologies.
1 INTRODUCTION TO SOCIAL MEDIA AND CRITICAL … 3

It is important to note that these are only a few selected examples


of a wide range of questions that one could pose about the relation-
ship between social media, politics and security more generally. Thus,
grafting this confounding array of technological possibilities to a body
of theoretical and conceptual work as diverse critical security studies is
no straightforward task. Once again one needs to beg the question if the
elite-centric, discursively pre-occupied Copenhagen school (Buzan et al.,
1997) should or can be considered under the same rubric as Critical
Terrorism Studies (Breen Smyth et al., 2008; Jackson et al., 2007) or the
emergent vernacular security studies. Also, to what extent do ongoing
debates about the intersecting questions of gender, race and ethnicity in
the security field (inter alia Howell & Richter-Montpetit, 2020) under-
mine the validity of the CSS endeavour entirely? Opening up these twin
Pandora’s boxes could be seen to set up this book to fail miserably in
its primary purpose to give answers to the desperately needed discussion
of how the CSS needs to reconsider its key conceptual underpinnings in
the wake of a sea change in communications and discourse because there
are too many “critical security studies” and “social medias” to enable
a modest work of circa 80,000 words to make any significant headway.
Indeed, this is a discussion that has, and is, going to take up volumes of
work in the field in the coming decades as these two hydras will only grow
more and more heads, and become ever more intertwined in an awkward
and at times combative embrace. It is better than to consider this book
a starting point for some of these discussions and a point of departure
rather than a point of arrival. Reminiscent of a joke I share frequently
during research design seminars with my students, it is always wise for
an academic to recommend the need for further research in the field
not only for instrumental reasons of future utility and employment, but
because the process of intellectual enquiry into the social world around
us is never-ending.

1.2 Challenges and Limits


to Investigating Social Media and Security
It is also important to set the limits of this book before we go on to offer
insights into what it seeks to address. The first important point to note
is the empirical limits of this book from a number of perspectives. It is
important to foreground that there are indeed several “missing chapters”
that would warrant significant engagement and discussion. These include
4 J. DOWNING

empirical areas such as environmentalism, gender and state-based violence


as areas where social media has important intersection with them. Indeed,
the ongoing Russian invasion of Ukraine has thrown up an array of ques-
tions for scholars of technology and conflict, and more specifically the
use of social media by the open-source intelligence community and the
geolocation of targets from social media pictures are likely going to be
important points of enquiry for years to come. Conceptually, the decolo-
nial turn in social theory has received some attention from critical security
scholars (Adamson, 2020) and could have easily been a chapter in its own
right as these debates rage on social media. Additionally, there could have
also been a far wider range of empirical contexts included in this book
as the engagement between critical security studies and social media “in
the wild” knows no geographical, linguistic or platform-based boundaries.
Thus while acknowledging the well-documented Western bias in security
studies (Bilgin, 2010) more generally, this book acknowledges its Western
case study bias. Additionally, it is important to remain critical of critical
security studies throughout, as this is a field of theory that has numerous
issues. An important and difficult one to square here has been the focus
of much of critical security studies on “emancipation” (Aradau, 2004;
Bigo & McCluskey, 2018; Wyn Jones, 1999) which while admirable, has
been often poorly defined and operationalised in the literature. That said,
perhaps in a thin sense, social media offers at the bare minimum a sort
of discursive emancipation where some previously excluded voices find a
place to articulate narratives of security.

1.3 Take Home Messages


It is also important to offer some key, if brief, summaries of the “take
home” messages from the enquiries undertaken in this book.

1.3.1 The Need to Shatter Disciplinary Boundaries in the Digital


Age
The first of these relates to how attempting to understand the myriad ways
that social media relates to security requires the shattering of disciplinary
boundaries. This is a core commitment of critical security studies (Bigo &
McCluskey, 2018; Jarvis, 2019), and scholars have gone as far as to argue
that boundary nationalism plays a role in “Hiding the struggles and hier-
archies inside these discursive activities” (Bigo & McCluskey, 2018, p. 5).
1 INTRODUCTION TO SOCIAL MEDIA AND CRITICAL … 5

As such, the early critical work done in the discursive turn by the Copen-
hagen school (Buzan et al., 1997) which broke open the security studies
discipline has been widely critiqued for a poorly defined sense of inter-
disciplinarity and a “methodological elitism” (Stanley & Jackson, 2016)
that focuses too much on the speech of dominant actors (McDonald,
2008, p. 563). An important intervention here can be found in the calls
to include a range of disciplinary approaches into security studies, such
as the tools of sociology and criminology (Bigo & McCluskey, 2018).
Perhaps the most extreme articulation of this has been found in the
vernacular school of security studies which advocates a theoretical “empti-
ness” (Jarvis, 2019, p. 110) which “allows for greater fidelity to the
diversity of everyday stories” (Jarvis, 2019, p. 110). However, while this
is important, it is not only in the everyday that this finds resonance, but
in a range of contexts. This leads onto the second key take home message
of this book.

1.3.2 Empirical Security Paradoxes: Expecting the Unexpected


on Social Media
The second take home message from this book in examining social media
from the perspective of critical security studies is that it is important to
remember to “expect the unexpected”. When examining social media
empirics, security can pop up in the most unusual places, articulated by
those without any previous security pedigree, with users becoming influ-
ential in social media debates on security who again have no previous
security credentials. This comes hand in hand with opening up security
studies to a range of disciplinary perspectives. As mentioned, in the most
“extreme” form of this, the theoretical “emptiness” (Jarvis, 2019, p. 110)
of the vernacular school opens up security in significant ways. However,
this relies a lot on the view of the observer of security, and begs the
important questions are we prepared to see constructions of security in
unexpected places? In scholarship on critical terrorism studies, we can
see a turn to examining questions of how terror becomes embedded
in popular culture such as TV shows (Erickson, 2008; Holland, 2011)
and comic books (Veloso & Bateman, 2013). This demands that scholars
and observers take seriously that security is increasingly found in unex-
pected places, articulated in unexpected ways. Social media offers users
numerous, if not endless, opportunities for users to articulate themselves
however they like. Put simply, one needs to be prepared to not only see
6 J. DOWNING

security where they don’t expect, for example in a meme, or on YouTube,


but also to see it articulated and constructed in ways we don’t expect—for
example through adapted football slogans as seen in later chapters of this
book. As such, important opportunities to study security on social media
can come from anywhere, and can take the most unexpected and coun-
terintuitive directions. A valuable observation has been made in relation
to identifying methods and methodologies in security studies that “Both
method and methodology are instrumental in identifying what counts for
research” (Aradau, Coward et al., 2015, p. 59). This shows that there is
still significant debate about what “counts” as worthy of attention. Social
media, and the analysis to come in this book, demonstrates that not only
do the disciplinary boundaries of security studies need to be broadened
by social media, but that the empirical boundaries of security studies need
to also be dramatically revised if we are to get to grips with social media.

1.3.3 The Temperamental Topography of Social Media: The Rise,


Rise and Fall of Platforms, Data and Methods
As we begin to think about how method and methodology can help us to
consider what “counts for research” (Aradau, Coward et al., 2015, p. 59)
when it comes to engaging with social media, we need to move beyond
the ongoing debates about the diversification of international relations.
This is because as much as debates in international relations are dynamic
and fluid, the social media landscapes move just as fast. For example, in
2022 Facebook loosed overall users’ figures for the first time in its history
(Dwoskin et al., 2022). While this does not mean the giant will close
anytime soon, it does demonstrate how the landscape can dramatically
shift. This is also true for the tools and data access questions that are
central to social media analysis. This is well-illustrated by a particularly
valuable resource that was one of the first I consulted when considering
a pivot into social media research which was a blog piece on “Using
Twitter as a data source” (Ahmed, 2021). This resource is referred to
as a “long running series” having been published initially in 2015, then
re-published in 2017, 2019 and then 2021 (Ahmed, 2021), rather than
a fixed point blog entry. Indeed, the 2021 edition was necessitated by
a sea change in social media research—Twitter’s release of an “academic
research product track” offering academics free access to its data (Ahmed,
2021). This demonstrates something important—the rapid, unpredictable
and enormous change that the tools and data of social media analysis
1 INTRODUCTION TO SOCIAL MEDIA AND CRITICAL … 7

go through constantly. This is only part of the story as new platforms


emerge, become popular, and indeed less popular over time. Thus, there
is no easy answer here, and the most important take home from these
issues and changes for aspiring scholars of social media and security is to
be extremely flexible and open to new tools as well as new social media
platforms. An example of adaptability here in this book is the application
of netnographic methods to the app Snapchat in part to overcome the
“self-destructing” (Bayer et al., 2016) ephemeral nature of its data which
means it is neither kept on the company’s servers, nor is it downloadable
for off-line analysis as Twitter data is. These data access issues clearly don’t
make the platform less important for analysis—and indeed they may actu-
ally render it even more important given that users can be sure that their
data will disappear, but it did require some imaginative methodological
thinking.

1.3.4 The Unrealised Promises of Critical Theory: Social Media


and Discursive Emancipation
The emancipatory burden weighs extremely heavily on critical theory, and
thus by extension it places an equally important burden on critical secu-
rity studies. Indeed, some have argued that that without the emancipatory
dimension, critical security studies should not be referred to as critical
(Hynek & Chandler, 2013). The rationale goes that the horizons have
been lowered to such an extent that it undermines the very normative
impulse that is a key underpinning of the project more broadly (Hynek &
Chandler, 2013). A range of critical security scholars have attempted to
promote this commitment to emancipation, from the Welsh school (Wyn
Jones, 1999) to the Paris school (Bigo & McCluskey, 2018). In partic-
ular, the Welsh school changes the nature of the world and emancipates
individuals from both the physical and mental constraints that they may
even be unaware of (Wyn Jones, 1995).
However, this is not a burden that critical security studies has shoul-
dered well. The Copenhagen school, who kicked out the discursive, and
to a certain extent, the critical turn in security studies (Buzan et al.,
1997) has received critique for lacking a clear normative commitment
to an emancipatory agenda (Filimon, 2016), focusing more on security
elites. This is set against a broader, and indeed troubling, observation
that theory has failed to bring better societies into existence (Wyn Jones,
1999, p. 21). In particular, the lack of concrete examples of “what types of
8 J. DOWNING

institutions and relationships might characterise a more emancipated soci-


ety” and “the commitment of critical theorists to emancipation became
merely metaphysical in character” (Wyn Jones, 1999, p. 35). While crit-
ical security scholars have attempted to theorise emancipatory alternatives
(Aradau, 2004), this is still an area in which the theory is found lacking.
Add to this, despite early optimism that social media would be an
“emancipatory” technology, a much more complex picture has emerged.
Social media has been conceptualised as locked in a complex struggle
between emancipation and control (Dencik & Leistert, 2015), where
causes can use social media for emancipatory projects, but thus open
themselves up to new forms of censorship, surveillance and control
(Dencik & Leistert, 2015). Added to this are the many questions of the
commodification of social media (Allmer, 2015), and how it is being
dominated by commercial interests, and indeed commercial interests
that are at times diametrically opposed to emancipatory causes. Add to
this, the observation that a significant digital divide exists, where global
inequalities exclude many from the ownership of the devices, and the
fast data connectivity required, and indeed even the literacy to be able
to compose a tweet (Ali, 2011). This is also not just a simple global
north/south divide, as this divide can exist within national, regional and
even local contexts (Cullen, 2001; van Dijk, 2006).
This leaves us at quite a pessimistic juncture, where critical theory, crit-
ical security studies and social media all fail at providing viable recipes
for global emancipation. This is without even begging the question as to
whether or not the “powerless” even see themselves as such, nor want
to seek emancipation through the dismantling of global capitalism at all,
and who may instead prefer to take their chances under capitalism than
to either wage an uncertain class struggle or wait to be emancipated by
theorists at universities thousands of miles away.
However, perhaps all is not lost when we consider questions of
discourse and voice on social media. Scholars that have argued that a
central tenant of critical approaches to social media needs to include an
emancipatory component (Allmer, 2015) perhaps offer an insight. This
has taken the form of advocating “a normative and partial approach giving
voice to the voiceless and supporting the oppressed classes of society”
(Allmer, 2015, p. 7). Here, despite a digital divide, the failures of eman-
cipatory theory and the control and commodification of social media
output, there is a glimmer of hope that communications technologies
1 INTRODUCTION TO SOCIAL MEDIA AND CRITICAL … 9

can at least give a voice to the voiceless, a sort of “discursive emancipa-


tion”. Here, from a critical security perspective and highlighted by some
examples provided in this book, individuals who would not have previ-
ously been able to articulate security narratives, and how actually may
have become influential in security debates, have been significantly aided
in this by social media technologies. This dovetails well with the “vernac-
ular security studies” literature that seeks to highlight the importance of
everyday voices and how they construct security from a range of perspec-
tives (Bubandt, 2005; Jarvis, 2019) and it is likely that for a number of
years to come, a range of synergies between vernacular security studies
and social media data will become ever more apparent.

1.4 Charting the Road Ahead: Critical


Insights into the Social Media Securityscape
Indeed, it is examining a range of theoretical observations and their syner-
gies with social media that begins this book. Security studies has been on
a journey in the past century. From post-World War II realism (inter alia
Gorski, 2013; Huysmans, 1998) to the “critical turn” of the Copenhagen,
Welsh and Paris schools (inter alia Buzan et al., 1997; Didier Bigo &
McCluskey, 2018; Floyd, 2007), the field has developed in tandem with,
and in opposition to a range of political and social developments and
events as well as technologies. However, an important caveat of this is
to not fall into the trap of seeing these theories as discrete and separate.
It is important, as many have argued (Floyd, 2007) not to see various
“schools” of CTS as discreet and isolated entities—they owe each other
and a far broader range of social theory considerable intellectual debts.
Thus, it is vital to consider the synergies and contradictions between
them, for example in the “hierarchical” understandings of security speak
in the Copenhagen school (Buzan et al., 1997) and the “flat” under-
standing of security speak in vernacular security studies (Jarvis & Lister,
2012). This sets the ground for an informed understanding of how these
bodies of work can, or cannot, account for the disruptive potential of
social media.
Chapter 2 of this book seeks to highlight key aspects of these theo-
ries that are important for the coming discussion of how critical security
studies informs social media. The discursive turn, marked by the Copen-
hagen school’s schema of (de)securitisation (Buzan et al., 1997) was a
significant shift in security studies. Here, the Copenhagen school had
10 J. DOWNING

“established itself—for European scholars at least—as the canon and indis-


pensable reference point for students of security” (McSweeney, 1996).
An important take-home for this book that emerges from the Copen-
hagen school can be seen in the ability to see security as a construct—i.e.
the material realities of security only go so far in deciding if a particular
situation is threatening. Thus we must also examine the way that actors,
in this case security elites “speak” threats into existence, and on what
grounds they make claims about particular situations requiring partic-
ular responses. Cleary for an understanding of social media, this ability
to examine narrations of security, and to consider that security is not
simply an objective material reality, but part of a political process of threat
construction is valuable. However, the elite-centric notion articulated by
the Copenhagen school, that elites speak security and the audience listens,
is very much complicated by changes in communications technologies and
struggles to consider the disruptive potential of social media. This is not
the only critique of the Copenhagen school, as it has been argued to be
thin on emancipatory commitments (Filimon, 2016; Hynek & Chandler,
2013) and lacking in considering the racialised dynamics of global and
domestic security situations (Howell & Richter-Montpetit, 2020). It also
does not have the monopoly on critical understandings of security and
while laying some crucial groundwork for critical takes on security prob-
lems, we are necessitated to delve further into the murky depths of the
theoretical pond.
Bigger on emancipatory commitments is the Welsh school of security
studies (Wyn Jones, 1995). The Welsh school, like much of critical secu-
rity studies, emerges in the wake of the end of the Cold War. This was
buoyed by the optimism of the end of the bi-polar conflict and the new
possibilities this could bring, and the developing “interregnum” of this
old system of states and an emerging borderless world community (Wyn
Jones, 1995). The Welsh school committed to the idea of bringing about
change and aiding in the production of a new world that would emanci-
pate individuals from both the physical and mental constraints that they
may even be unaware of (Wyn Jones, 1995). This “emancipation” has
some significant rhetorical synergies with some narrations about the possi-
bilities of social media to bring voice to the masses, especially in the early,
more positive, days when it was seen that social media could spark a wave
of democratisation, peace and stability (Persily & Tucker, 2020). Clearly
both ideas, that the end of the Cold War and the emergence of social
media would bring about a utopian state of emancipation, have proved
1 INTRODUCTION TO SOCIAL MEDIA AND CRITICAL … 11

somewhat naïve. However, in approaching social media, it is important


to consider how an albeit thin notion of discursive emancipation might
be possible to a certain extent on social media, as it undeniably does
give “voices to the voiceless” and enables a range of actors to construct
security narratives that would have previously been excluded from doing
so.
However, to understand the range and scope of these new security
narratives, we need to go further as the tools of international relations
are not sufficient to do this. One key take-home of the Paris school can
be seen in its rallying cry to smash disciplinary boundaries and hierarchies
(Bigo & McCluskey, 2018). This in fact proves to be a sage and highly
insightful observation in the context of critical security studies and social
media because precisely the broadening of the narrative security landscape
on social media requires new tools to understand how individuals subvert,
contest and contort security in tandem with a range of sociological, crim-
inological and anthropological means. If it seems superfluous for the Paris
school to deny a geographical label and to instead propose to be known
as the “Political Anthropological Research for International Sociology”
(Bigo & McCluskey, 2018), then the anthropological and sociological
parts are spot on.
The journey does not stop here, however, as the field of critical secu-
rity studies remains in constant flux, responding as it does to the flux
of the global system. Two exciting developments in the last two decades
have been the more recent additions to the landscape of critical security
studies in “Vernacular” security studies (Bubandt, 2005; Jarvis & Lister,
2012) and critical terrorism studies (Richard Jackson, 2007). Given that
social media gives the audience the ability to “speak” security and become
an important part of the security discussion, vernacular security studies
has an important part to play in conceptualising how binary, hierarchical
understandings of relationships of the “audience” and the “elite” central
to critical security studies (Buzan et al., 1997) begins to break down on
social media. However, it is not as simple as embracing a completely “flat”
conception of security speak on social medial, as metrics such as influence
enable a small number of non-security elite users to reach large audi-
ences in sometimes ephemeral ways. Critical terrorism studies fits in here
as it seeks to apply the critical, constructivist perspective to the sub-field
of terrorism (Richard Jackson, 2007). Rather than narrowing the focus,
it also seeks to broader the discussion of terrorism away from problem-
solving perspectives so beloved of security elites, but to understand the
12 J. DOWNING

much broader context in which terrorism is constructed. This has even


gone as far as to include how terrorism infiltrates into, and is constructed
by, popular culture (Holland, 2011), an observation that validates the
vital importance of bringing in disciplinary approaches such as sociology,
cultural studies and anthropology into the security discussion.
However, just because there is some novelty in bringing social media
into greater dialogue with critical security studies, this does not mean
we are the first to produce scholarship on social media. In fact, far from
it as social media, and indeed more broadly questions of technology
in politics and security are well advanced fields in many ways, and one
that can give insights into the discursive, emancipatory and interdisci-
plinary positions of security that critical approaches offer. Additionally,
the synergies between technology, politics and IR are nothing new and
have a history almost as long as humanity itself (Reuter et al., 2019). It is
important here to consider the literatures on critical approaches to social
media to get a better handle on the difficult relationship between critical
theory and social media technologies. For example, while early theory
highlighted the emancipatory potential of new media technologies, the
picture has become far more complex (Dencik & Leistert, 2015). This
is because not only are social media companies’ capitalist entities and
thus commodify social media output (Allmer, 2015), they can also be
monitored by governments and give new opportunities for authoritarian
governments to surveil and control their populations (Dencik & Leistert,
2015).
Building on these observations, Chapter 3 of this book examines the
important questions of method and methodology. This is because social
media presents an enormous, diverse and ever-changing cornucopia of
“data” and opportunities for study that can be quite frankly bewildering
and intimidating. Access costs, and indeed whether it is possible to access
data at all, change constantly between and within platforms. However,
“data” questions are only one part of a much larger discussion about
approaching social media that is required here. Critical security studies
has done a lot in the past decade to both broaden and deepen the
method and methodological approaches that the field offers, resulting in
the production of some excellent tomes containing important insights
(inter alia Aradau, Huysmans et al., 2015; Salter & Mutlu, 2013). This
demonstrates both that solid foundations have been laid in considering
the vital question of exactly what critical in critical security studies actu-
ally means from a method’s perspective (Salter & Mutlu, 2013). This is
1 INTRODUCTION TO SOCIAL MEDIA AND CRITICAL … 13

important because this sets the scene for a larger discussion, and theme
within this book, about the diversity of social media platforms and the
need to nuance what constitutes “social media” in any given context that
we are analysing. Indeed, a key insight is that “both method and method-
ology are instrumental in identifying what counts for research” (Aradau,
Coward et al., 2015, p. 59) and it is important to make a case as to
why social media deserves greater attention from critical security scholars.
Indeed, “doing it right” in terms of research ethics in social media is far
from settled and straightforward and how we both sample and analyse
social media for insights into security requires reflection.
It is important to consider the limitations of social media research,
especially in light of some of the key commitments of critical security
studies. If we are to make even the thinnest claim about discursive eman-
cipation, it is important to understand how the demographics of social
media are extremely skewed and unrepresentative. The digital divide both
between the global North and South, and indeed even within particular
societies, massively complicates notions that the globally “oppressed” can
use digital media as a liberation technology because frankly they often do
not have access to it.
This chapter then moves on to offer some initial reflections on
operationalising methods for social media research in terms of some
methodological notes on approaches used to produce some of the conclu-
sions to come in later chapters of this book. This includes some reflections
on social network analysis, netnography and aspects of discursive methods
that not only can be used by security researchers when considering
questions of social media, but also inform the empirical chapters to come.
Chapter 4 forms the first chapter that seeks to bring in specific empirics
into questions of critical security and social media through questions of
terrorism. “Terrorism” and indeed the post-9/11 “war on terror” have
been key features of the post-Cold War security landscape (Council of
Councils, 2021). More recently, the emergence of ISIS and the Charlie
Hebdo and Bataclan concert hall attacks in Paris have once again cata-
pulted “terrorism” into the public eye (Titley et al., 2017). Critical
terrorism studies has emerged into this context to bring the construc-
tivist orientation offered by critical security studies to understand how
terrorism is not only a set of objective security occurrences, but also a
social construct that should be studied away from the “problem-solving”
concerns of classical terrorism studies (Herring, 2008; Jackson et al.,
2007; Richard Jackson, 2007). This opens up not only the ability to
14 J. DOWNING

investigate terrorism without foregrounding the need to “solve it” as a


problem, and thus look into the broader dynamics of terrorism, but also
to see on what terms it is constructed as a meaning-making exercise.
These are both vital observations for considering how communications
technologies and terrorism can be seen to relate to each other, and indeed
how this relationship changes. Indeed, while “the 9/11 spectacle of terror
was a global media event” (Kellner, 2007, p. 123) projected into the
living rooms of people the world over, 14 years later the emergence of
#JeSuisCharlie enabled one to dialogue with, and re-construct terrorism
from their smartphone (An et al., 2016; Titley et al., 2017). While crit-
ical terrorism studies has found application in a range of contexts, such
as the UK prevent strategy (Qurashi, 2018) and social media as a place
of communication by extremists and a place for possible recruitment
(Davey & Weinberg, 2021; Laytouss, 2021; Prothero, 2019), there has
been little application of critical terrorism studies to social media. This
chapter seeks to offer two examples that demonstrate two aspects of the
way that terrorism is discussed and constructed on social media to estab-
lish the unexpected symbolic and discursive repertoires that users use of
social media to discuss terrorism. This is tackled thematically, looking at
the Twitter responses to both a threat made against France by ISIS and
the response to the Manchester bombing in the UK. Both of these exam-
ples demonstrate the importance of the disciplinary plurality of critical
security studies because it allows us to conceive of local identity structures,
such as crime, violence and football, and how these become impor-
tant in constructions of terrorism. Dialoguing with the literature that
examines the broader culture context in which terrorism is constructed,
this example demonstrates that when examining social media, instead of
bringing terrorism into culture, bring culture into the construction of
terrorism.
Chapter 5 continues this dialogue with questions of social media and
critical security studies by specifically considering in more depth the
recent, exciting, vernacular turn in security studies. This is aided greatly
by vernacular security studies overt theoretical position of “theoretical
emptiness” (Jarvis, 2019, p. 110). This “allows for greater fidelity to the
diversity of everyday stories” (Jarvis, 2019, p. 110). This is important
when considering a key mission of the critical turn in security studies is to
increase the range of “what counts for research” (Aradau, Coward et al.,
2015). Thus rather than schools of critical security thought such as the
Copenhagen school which begin with the assumption of the primacy of
1 INTRODUCTION TO SOCIAL MEDIA AND CRITICAL … 15

elite discourses of security (Buzan et al., 1997), this approach enables a


far greater range of security speech to be captured and analysed. A caveat,
however, is to remember that the social media landscape is not completely
democratic nor “flat”, as we have seen the issues with access and control
that social media presents (Dencik & Leistert, 2015).
This said, the vernacular turn does enable us to consider important
security questions as will be examined through the two examples included
in this chapter. The first example examines YouTube as a site of the
construction of vernacular security debates by offering an in-depth exam-
ination of a video uploaded by a football YouTuber that responds to ISIS
terrorism in France. This demonstrates the importance of local, and at
times offensive and profane, discourses in further pushing the boundaries
of how vernacular security studies relate to social media technologies.
The second example pushes vernacular security studies research further
by flipping one of its key themes. It has to date championed how indi-
viduals from below contest and re-construct security imposed from above
in local idioms (Bubandt, 2005; Jarvis & Lister, 2012). However, the
example of a netnography conducted on the application Snapchat analyses
how those seeking to foster insecurity from below discuss this insecurity
in their own local idioms. This demonstrates the importance of both the
methodological innovation of examining apps with ephemeral data (Bayer
et al., 2016) in security studies, but also highlights the way that users go
to great efforts to “brand” their insecurity in specific ways. This draws
on the sociological and criminological literature on deviance, space and
place.
Chapter 6 shifts gears from examining social media and security from
below, to considering the intersection of social media, security and the
political system “from above” in terms of constructions of democracy.
Both the increases in polarisation in advanced democracies, and the radical
transformation of the media landscape has once again thrust threats to
democracy into the headlines. It has long been argued that a key aspect
of democracies have been free and independent media outlets (Baker,
2001). However, social media radically alters this idea, which formed in
the context of free and fair “old” media outlets. While this book refutes
simplistic arguments about social media and democracy, for example
that memes won Trump the US presidential election (Nussbaum, 2017),
it is clear that the rise of social media has important implications not
only for democracy more broadly, but also more specifically for ques-
tions of democracy and security. This is because the new social media
16 J. DOWNING

online landscape presents significant security questions to the practice


of democracy. The second round of the French 2017 presidential elec-
tion offers two examples through two very different hashtag campaigns
with quite different implications for democracy. The first is within the
context of a “hack and leak” operation of data from Emmanuel Macron’s
campaign team (Vilmer, 2019). It is argued here that rather than just
looking at the hack and leak part of this, it is also important to examine
the broader context of social media discourses that relate to it under
the rise of the hashtag #MacronLeaks to understand which kinds of
discourses about democracy emerge. The coverage on Twitter is domi-
nated by anti-Macron sentiment that delve into anti-Semitic conspiracy
theories, connect Macron to terrorism and the “Islamisation” of France
and refute Russian involvement in the leak. This demonstrates that the
critical discursive turn in the security studies enables us to go further in
examining how the social media environment can construct democracies,
and indeed direct threats to them, in connection with other key themes in
contemporary security and politics, like conspiracy theories and terrorism.
The second example examines abstention under #SansMoi7Mai that high-
lights how political distrust is constructed on social media shines a light
on something quite different in terms of security and democracy. This is
through a hashtag that promotes voter abstention. This highlights how
social media discourses of abstention are centred on themes of political
distrust. Trust in institutions has been conceptualised as an important
part of feeling “ontologically” secure (Perry, 2021; van der Does, 2018).
However, this becomes problematic in light of contemporary trends in
political distrust away from distrust in particular politicians to the entire
system itself (Bertsou, 2019). Within the discussion of non-participation
under the hashtag #SansMoi7Mai distrust in the French media and in the
broader political system as at the service of the oligarchy are important
themes which emerge. This highlights how discussions of political distrust
on social media share common features with a range of conspiracy theo-
ries that separate the world into an honest “us” exploited by “them” the
corrupt political elite (Oliver & Wood, 2014).
Chapter 7 intervenes in examining questions of identity on social
media. Identity emerges as important in critical security studies in the
context of the end of the Cold War, and how identity concerns emerged
as key security concerns in conflicts such as the civil war in the former
Yugoslavia. Identity concerns have retained their centrality to questions
of security in a range of contemporary arenas, which have catapulted
1 INTRODUCTION TO SOCIAL MEDIA AND CRITICAL … 17

social media to the fore as a key area where identity concerns are created,
contested and discussed. These include #BlackLivesMatter and the quest
for greater social justice (Mourão & Brown, 2022), as well as the specifics
of the various groups that seek to articulate particular notions of what an
Islamic identity means in a political context such as ISIS (Awan, 2017).
Examples are presented here of how identities are contested and re-
constructed in a range of arenas in the social media context. There is the
example of the emergence of the hashtag #JeSuisAhmed in the context
of the Charlie Hebdo attacks (Arceneaux, 2018) which co-occurs with,
and sits alongside, discourses which support and contest #JeSuisCharlie.
Here, narratives emerge in a range of ways that re-construct both Ahmed,
and by extention French Muslims as defenders of the nation and as
important aspects of state security. A range of discourses and symbols are
deployed on social media that construct Ahmed as an important defender
of the freedom of speech upon which the French republic is founded,
and comments seek to nuance questions of where Muslims stand vis-à-
vis terrorism in France by discussing how a Muslim dies as a police offer
attempting to protect French values. The second example is a comparison
of the globalisation of Muslim identity debates in the wake of security
situations in the UK. Both the Grenfell tower fire and the Manchester
Arena bombing resulted in significant social media activity.
The social media activity in the wake of both events demonstrates
the way that security and identity debates become internationalised on
social media in a context of the contested nature of Muslim identity and
its broader place in the global context. The two examples also demon-
strate something that critical security studies needs to consider when
approaching questions of social media in what a notion of security elite
means in the social media context. Both users presented here become
important in the debates and in a sense could be considered “elites”, but
this is not only unpredictable, but also extremely fleeting and ephemeral.
As such, it is difficult to reproduce the notion of elites when it comes
to security speech on social media. While discussing the intersection of
British security concerns, and the role of Muslims within them, the debate
can become highly decontextualised. Thus these debates can, and often
do, become about the more general questions of Islam and terrorism, and
the nexus of identity and security on social media, resulting in discussions
that lack nuance and structure. Thus, while it can be argued that social
media makes security debates more diffuse, and can offer users an albeit
“thin” kind of discursive emancipation, as they can contribute, and even
18 J. DOWNING

become elite in debates about security and identity, this processes are
complex and multifaceted.

Bibliography
Adamson, F. (2020). Pushing the boundaries: Can we ‘decolonize’ security
studies? Journal of Global Security Studies, 5(1), 129–135. https://doi.org/
10.1093/jogss/ogz057
Ahmed, W. (2021, May 18). Using Twitter as a data source an overview of social
media research tools. Impact of Social Sciences. https://blogs.lse.ac.uk/imp
actofsocialsciences/2021/05/18/using-twitter-as-a-data-source-an-overview-
of-social-media-research-tools-2021/
Ali, A. H. (2011). The power of social media in developing nations: New tools
for closing the global digital divide and beyond note. Harvard Human Rights
Journal, 24(1), 185–220.
Allmer, T. (2015). Critical theory and social media: Between emancipation and
commodification. Routledge. https://doi.org/10.4324/9781315750491
An, J., Kwak, H., Mejova, Y., De Oger, S. A. S., & Fortes, B. G. (2016). Are you
Charlie or Ahmed? Cultural pluralism in Charlie Hebdo response on twitter.
Tenth International AAAI Conference on Web and Social Media. https://
www.aaai.org/ocs/index.php/ICWSM/ICWSM16/paper/view/12997
Aradau, C. (2004). Security and the democratic scene: Desecuritization and
emancipation. Journal of International Relations and Development, 7 (4), 26.
Aradau, C., Coward, M., Herschinger, E., Thomas, O. D., & Veolkner, N. 2015.
Discourse/materiality. In Critical security methods: New framework for analysis
(pp. 57–84). The New International Relations Series. Routledge.
Aradau, C., Huysmans, J., Neal, A., & Voelkner, N. (2015). Critical security
methods: New frameworks for analysis. The New International Relations Series.
Routledge.
Arceneaux, P. (2018). The public interest behind #JeSuisCharlie and #JeSu-
isAhmed: Social media and hashtag virality as mechanisms for western cultural
imperialism. The Journal of Public Interest Communications, 2(1), 41–41.
https://doi.org/10.32473/jpic.v2.i1.p41
Awan, I. (2017). Cyber-extremism: Isis and the power of social media. Society,
54(2), 138–149. https://doi.org/10.1007/s12115-017-0114-0
Baker, C. E. (2001). Media, markets, and democracy. Cambridge University
Press.
Bayer, J. B., Ellison, N. B., Schoenebeck, S. Y., & Falk, E. B. (2016). Sharing
the small moments: Ephemeral social interaction on Snapchat. Information,
Communication & Society, 19(7), 956–977. https://doi.org/10.1080/136
9118X.2015.1084349
1 INTRODUCTION TO SOCIAL MEDIA AND CRITICAL … 19

Bertsou, E. (2019). Rethinking political distrust. European Political Science


Review, 11(2), 213–230. https://doi.org/10.1017/S1755773919000080
Bigo, D., & McCluskey, E. (2018). What is a PARIS approach to
(in)securitization? Political anthropological research for international soci-
ology. In The Oxford handbook of international security. https://doi.org/10.
1093/oxfordhb/9780198777854.013.9
Bilgin, P. (2010). The ‘western-centrism’ of security studies: ‘Blind spot’ or
constitutive practice? Security Dialogue, 41(6), 615–622.
Breen Smyth, M., Gunning, J., Jackson, R., Kassimeris, G., & Robinson,
P. (2008). Critical terrorism studies—An introduction. Critical Studies on
Terrorism, 1(1), 1–4. https://doi.org/10.1080/17539150701868538
Bubandt, N. (2005). Vernacular security: The politics of feeling safe in global,
national and local worlds. Security Dialogue, 36(3), 275–296. https://doi.
org/10.1177/0967010605057015
Buzan, B., Waever, O., & de Wilde, J. (1997). Security: A new framework for
analysis (UK ed.). Lynne Rienner.
Council of Councils. (2021). The 9/11 effect and the transformation of global
security. Council of Councils. https://www.cfr.org/councilofcouncils/global-
memos/911-effect-and-transformation-global-security
Cullen, R. (2001). Addressing the digital divide. Online Information Review,
25(5), 311–320. https://doi.org/10.1108/14684520110410517
Davey, J., & Weinberg, D. (2021). Inspiration and influence: Discussions of the
US military in extreme right-wing telegram channels. Institute for Strategic
Dialogue.
Dencik, L., & Leistert, O. (2015). Critical perspectives on social media and
protest: Between control and emancipation. Rowman & Littlefield.
Dwoskin, E., Oremus, W., & Lerman, R. (2022). Facebook loses users for first
time in history. The Washington Post. https://www.washingtonpost.com/tec
hnology/2022/02/02/facebook-earnings-meta/
Erickson, C. W. (2008). Thematics of counterterrorism: Comparing 24 and MI-
5/Spooks. Critical Studies on Terrorism, 1(3), 343–358. https://doi.org/10.
1080/17539150802515012
Filimon, L.-M. (2016). An overview of the Copenhagen school’s approach to
security studies: Constructing (in)security through performative power. The
Romanian Journal for Baltic and Nordic Studies, 8(2), 47–72.
Floyd, R. (2007). Towards a consequentialist evaluation of security: Bringing
together the Copenhagen and the Welsh Schools of security studies. Review
of International Studies, 33(2), 327–350.
20 J. DOWNING

Fredette, J. (2014). Constructing Muslims in France: Discourse, public identity,


and the politics of citizenship. Temple University Press. https://www.amazon.
co.uk/Constructing-Muslims-France-Discourse-Citizenship-ebook/dp/B00
HSFS6V0/ref=sr_1_1?ie=UTF8&qid=1538397208&sr=8-1&keywords=Mus
lims+in+France+%E2%80%93+Discourse%2C+Public+Identity%2C+and+the+
Politics+of+Citizenship
Gorski, P. S. (2013). What is critical realism? And why should you care? Contem-
porary Sociology, 42(5), 658–670. https://doi.org/10.1177/009430611349
9533
Herring, E. (2008). Critical terrorism studies: An activist scholar perspective.
Critical Studies on Terrorism, 1(2), 197–211. https://doi.org/10.1080/175
39150802187507
Holland, J. (2011, July). ‘When you think of the Taliban, think of the Nazis’:
Teaching Americans ‘9/11’ in NBC’s The West Wing. Millennium. https://
doi.org/10.1177/0305829811408680
Howell, A., & Richter-Montpetit, M. (2020). Is securitization theory racist?
Civilizationism, methodological whiteness, and antiblack thought in the
Copenhagen school. Security Dialogue. https://doi.org/10.1177/096701
0619862921
Huysmans, J. (1998). The question of the limit: Desecuritisation and the
aesthetics of horror in political realism. Millennium: Journal of Interna-
tional Studies, 27 (3), 569–589. https://doi.org/10.1177/030582989802
70031301
Hynek, N., & Chandler, D. (2013). No emancipatory alternative, no critical
security studies. Critical Studies on Security, 1(1), 46–63. https://doi.org/
10.1080/21624887.2013.790202
Jackson, R. (2007). The core commitments of critical terrorism studies. Euro-
pean Consortium for Political Research. https://www.researchgate.net/pub
lication/32031958_The_Core_Commitments_of_Critical_Terrorism_Studies
Jackson, R., Gunning, J., & Breen-Smyth, M. (2007). Introduction: The case for a
critical terrorism studies. Paper of the American Political Science Association.
Jarvis, L. (2019). Toward a vernacular security studies: Origins, interlocutors,
contributions, and challenges. International Studies Review, 21(1), 107–126.
https://doi.org/10.1093/isr/viy017
Jarvis, L., & Lister, M. (2012). Vernacular securities and their study: A quali-
tative analysis and research agenda. International Relations, 27 (2), 158–179.
https://doi.org/10.1177/0047117812460880
Kellner, D. (2007). The media in and after 9/11. International Journal of
Communication, 1, 123–142.
Laytouss, B. (2021). New terrorism and the use of electronic Jihad. Brussels Inter-
national Center. https://www.bic-rhr.com/sites/default/files/inline-files/
New%20Terrorism%20and%20the%20Use%20of%20Electronic%20Jihad_1.pdf
1 INTRODUCTION TO SOCIAL MEDIA AND CRITICAL … 21

McDonald, M. (2008). Securitization and the construction of security. Euro-


pean Journal of International Relations, 14(4), 563–587. https://doi.org/
10.1177/1354066108097553
McSweeney, B. (1996). Identity and security: Buzan and the Copenhagen school.
Review of International Studies, 22(1), 81–93. https://doi.org/10.1017/S02
60210500118467
Mourão, R. R., & Brown, D. K. (2022). Black lives matter coverage: How
protest news frames and attitudinal change affect social media engagement.
Digital Journalism, 10(4), 626–646. https://doi.org/10.1080/21670811.
2021.1931900
Nussbaum, E. (Ed.). (2017, January 23). How Jokes won the election. The New
Yorker.
Oliver, J. E., & Wood, T. J. (2014). Conspiracy theories and the paranoid style(s)
of mass opinion. American Journal of Political Science, 58(4), 952–966.
Perry, J. (2021). Trust in public institutions: Trends and implications for
economic security | DISD. United Nations Department of Economic
and Social Affairs. https://www.un.org/development/desa/dspd/2021/07/
trust-public-institutions/
Persily, N., & Tucker, J. A. (2020). Introduction. In Social media and democracy:
The state of the field and prospects for reform (pp. 1–9). Cambridge University
Press.
Prothero, M. (2019). ISIS supporters secretly staged a mass migration from
messaging app Telegram to a little-known Russian platform after the London
Bridge attack. Insider. https://www.insider.com/isis-sympathisers-telegram-
tamtam-london-bridge-2019-12
Qurashi, F. (2018). The prevent strategy and the UK ‘war on terror’: Embedding
infrastructures of surveillance in Muslim communities. Palgrave Communica-
tions, 4(1), 17. https://doi.org/10.1057/s41599-017-0061-9
Reuter, C. (2019). Information technology for peace and security: IT applications
and infrastructures in conflicts, crises, war, and peace. Springer.
Reuter, C., Aldehoff, L., Riebe, T., & Kaufhold, M.-A. (2019). IT in peace,
conflict and security research. In Information technology for peace and security:
IT applications and infrastructures in conflicts, crises, war and peace. Springer.
Rosentiel, T. (2008, April 28). Gen Dems: The party’s advantage among young
voters widens. Pew Research Center. https://www.pewresearch.org/2008/
04/28/gen-dems-the-partys-advantage-among-young-voters-widens/
Salter, M. B., & Mutlu, C. E. (2013). Research methods in critical security studies.
Routledge.
Stanley, L., & Jackson, R. (2016). Introduction: Everyday narratives in world
politics. Politics, 36(3), 223–235. https://doi.org/10.1177/026339571665
3423
22 J. DOWNING

Thomas, M. (2022, May 11). How the democrats became the party of the
rich. UnHerd. https://unherd.com/2022/05/how-the-democrats-became-
the-party-of-the-rich/
Thompson, D. (2019, September 13). How democrats conquered the city.
The Atlantic. https://www.theatlantic.com/ideas/archive/2019/09/brief-
history-how-democrats-conquered-city/597955/
Titley, G., Freedman, D., Khiabany, G., & Mondon, A. (2017). After Charlie
Hebdo: Terror. Bloomsbury.
van der Does, R. (2018). Political institutions, trust, and security. https://www.
leidensecurityandglobalaffairs.nl/articles/political-institutions-trust-and-sec
urity
van Dijk, J. A. G. M. (2006). Digital divide research, achievements and short-
comings. Poetics, 34(4), 221–235. https://doi.org/10.1016/j.poetic.2006.
05.004
Veloso, F., & Bateman, J. (2013). The multimodal construction of acceptability:
Marvel’s Civil War comic books and the PATRIOT Act. Critical Discourse
Studies, 10(4), 427–443. https://doi.org/10.1080/17405904.2013.813776
Vilmer, J.-B. J. (2019). The ‘Macron Leaks’ operation. Atlantic Council.
Wyn Jones, R. (1995). ‘Message in a bottle’? Theory and praxis in critical security
studies. Contemporary Security Policy. https://doi.org/10.1080/135232695
08404119
Wyn Jones, R. (1999). Security, strategy and critical theory. Lynne Rienner.
CHAPTER 2

Conceptualising Social Media and Critical


Security Studies in the Digital Age

2.1 Introducing International


Relations and Security
Security studies has been on quite a journey in the past century. From
post-World War II realism (inter alia Gorski, 2013; Huysmans, 1998) to
the “critical turn” of the Copenhagen, Welsh and Paris schools (inter alia
Buzan et al., 1997; Didier Bigo & McCluskey, 2018; Floyd, 2007), the
field has developed in tandem with, and often in opposition to, domi-
nant trends in the broader global security evolution. For example, the
increased salience of concerns around terrorism in light of the post-9/11
war on terror, spawned its own mini-field of critical analysis, in terms of
the emergence of critical terrorism studies (Jackson, 2007). It is important
here to note that when considering the critical turn that “CSS takes on a
larger burden” (Buzan et al., 1997, p. 35). This is precisely to attempt to
provide the means by which to analyse security that can keep pace with
developments in the field. Thus the field is immense, diverse and highly
contested. This is even prior to mentioning developments in social media
and the technological landscape. To enable some progress on this book’s
raison d’etre of patching the revolutionary and monumental social media
developments to the already gargantuan field of CTS, it is important to lay
some of the conceptual foundations that this book will then draw upon.
This second chapter thus sets the theoretical groundwork for the
enquiry into social media and critical security studies. This requires an
understanding of the emergence of security studies, the turn to critical

© The Author(s), under exclusive license to Springer Nature 23


Switzerland AG 2023
J. Downing, Critical Security Studies in the Digital Age, New Security
Challenges, https://doi.org/10.1007/978-3-031-20734-1_2
24 J. DOWNING

security studies and more importantly how they conceive of discourse


and communication. This is fundamental to understanding the disrup-
tive potential of social media. This chapter proceeds as follows. Firstly,
it introduces the emergence of security studies in the classical realist and
liberal understandings of security. This gives the broader, state-centric,
elite-centric conceptions of security that dominated the field in the latter
half of the twentieth century. It is important to understand because of the
narrow field of study out of which critical interventions later emerge. It is
important to be nuanced here and not to construct “traditional” security
studies as a “non-reflective” “straw man” (Hynek & Chandler, 2013).
Even seemingly stable and concrete ideas within “traditional” security
studies, such as a national interest, were always shifting, changing and
diverse (Hynek & Chandler, 2013). With this said, it remains evident
that both realism, with its focus on states seeking power in an anarchical
international system, and the liberal modification that sought to add to
this the importance of the internal composition of states offers little in
the way of conceptions upon which social media can be understood.
Secondly, this book uses this discussion of classical security as a spring-
board into understanding the emergence of the critical turn in security
studies. Of particular importance here is conceptualising the move in
security studies away from a concentration on the material aspects of secu-
rity, i.e. the size of standing armies or structures of security governance
emerge. The resulting shift in focus to socially constructivist understand-
ings of security (Buzan et al., 1997) will be discussed, but also the broader
underpinnings of the critical school of social theory to give a broader
context to understanding critical security studies. Indeed, it is difficult to
overestimate the magnitude of the change that the Copenhagen school
facilitated. The Copenhagen school had “established itself-for Euro-
pean scholars at least-as the canon and indispensable reference point for
students of security” (Mcsweeney, 1996). The chapter then moves to
go into detail about the various approaches to critical security studies—
including the Copenhagen school (Buzan et al., 1997). Important here
is the discursive turn and the opening up of the field by the work of the
Copenhagen school. Their focus moves from either the inherent power-
seeking nature of states (realism) or the composition of states (liberalism)
onto discourse and the “speaking” of security by security elites. Here,
while not completely excluding the material or state-centric aspects of the
security equation, the Copenhagen school sought to argue for the impor-
tance of threat construction and how this can also be understood as a
2 CONCEPTUALISING SOCIAL MEDIA AND CRITICAL … 25

central means by which insecurity occurs in the international system. This


has, after some thirty years of informing the security debate, been robustly
critiqued but remains an extremely important intervention into the very
creation of the critical field of security studies.
It is also important to note that the Copenhagen school is not alone
in applying a critical lens to the security debate. The Welsh school sought
to set out an agenda for critically understanding security but with one
caveat—an increased focus on normative aspects of security. Indeed, a
critique of the Copenhagen school is its lack of normative commitments
to emancipation. Indeed, some have argued that without the emancipa-
tory dimension, critical security studies should not be referred to as critical
(Hynek & Chandler, 2013). The rationale goes that the horizons have
been lowered to such an extent that it undermines the very normative
impulse that is a key underpinning of the project more broadly (Hynek &
Chandler, 2013).
It is into this discussion about the necessity and importance of a
normative, emancipatory dimension that the Welsh school of securitisa-
tion intervenes. This emerges out of the optimist at the end of the Cold
War and the hopes raised across the political spectrum by the possible
opportunities that the end of this bi-polar conflict could bring. For the
Welsch school, the post-Cold War era was an “interregnum” between the
decline of the “old” Westphalian system of states and an emerging border-
less world community (Wyn Jones, 1995). To them, this opened the way
for an “emancipatory” project that sought to not only describe the world
as is, but also to go further and to change the nature of the world and
emancipate individuals from both the physical and mental constraints that
they may even be unaware of (Wyn Jones, 1995). This “emancipation”
has some significant rhetorical synergies with some narrations about the
possibilities of social media to bring voice to the masses, especially in
the early, more positive, days when it was seen that social media could
spark a wave of democratisation, peace and stability (Persily & Tucker,
2020). Clearly, with nearly thirty years of hindsight, there is little evidence
that the Welsh school, like many other intellectual movements who advo-
cated increased emancipation at the end of the Cold War, have achieved
much if any, significant progress. However, an important aspect of the
Welsh school that still has purchase, is its valuable advocacy, like many
CSS perspectives, of opening up of the security studies field much more
broadly (Wyn Jones, 1999). If perhaps the material and mental emancipa-
tory ambitions of the Welsh school remain unfulfilled, then perhaps being
26 J. DOWNING

part of the call for the emancipation of broader areas of study as counting
as part of IR has been partially fulfilled.
It is in this broadening of the field that this book finds the Paris school
of security studies of particular interest. One key issue with the Paris
school if, however, is its inbuilt ambiguity. This goes as far as an overt
rejection of being referred to as a “Paris” approach, and the redefinition
away from the city itself to the “Political Anthropological Research for
International Sociology” (Didier Bigo & McCluskey, 2018). Here, they
seek to highlight that a “Paris” approach is much broader in terms of its
approaches, and cultural and geographical influences than either the city
of light or the broader Francophone world (Didier Bigo & McCluskey,
2018). The Paris school makes a bold claim, that it should not be consid-
ered a theoretical school or a particular line of thought per se, but rather
a “problematisation” (problématique) to enable the questioning of estab-
lished knowledge (Didier Bigo & McCluskey, 2018). Thus while it is
somewhat difficult to pin down the key tenants of a Paris school of secu-
ritisation, even being seemingly requested not to utter its very name, it
is however possible to take away a clear observation that is important
for the coming discussions in this book—the integration of a broader
range of data and approaches to the study of security. This is of upmost
importance, as the revolutionary nature of this assertion is easy to forget
given the progress that some aspects of international relations have made
through a greater dialogue with sociological concepts and theories. Thus,
discussing the Copenhagen (Buzan et al., 1997), Welsh (Wyn Jones,
1999) and the Paris schools (D. Bigo, 2008) is a vital step in bringing
out the synergies and contradictions between these different schools. A
key argument is that while they all have bases in both social construc-
tivism and critical theory, the various ways in which they apply them
have different implications for bringing a focus on CSS and social media
studies.
More specifically, given the discourse focused nature of the social
media landscape, and of many aspects of critical security studies, it is
of particular importance to begin to unpick synergies and contradictions
between notions of “security speak”. It is important, as many have argued
(Floyd, 2007) not to see various “schools” of CTS as discrete and isolated
entities—they owe each other and a far broader range of social theory
considerable intellectual debts. Thus, it is vital to consider the syner-
gies and contradictions between them, for example in the “hierarchical”
understandings of security speak in the Copenhagen school (Buzan et al.,
2 CONCEPTUALISING SOCIAL MEDIA AND CRITICAL … 27

1997) and the “flat” understanding of security speak in vernacular secu-


rity studies (Jarvis & Lister, 2012). This sets the ground for an informed
understanding of how these bodies of work can, or cannot, account for
the disruptive potential of social media. Where they cannot, suggestions
would then be made about the empirically and theoretically informed
discussions to come.
Beyond this, there is an observation about the scale of the theories
themselves. In a sense these Copenhagen, Welsh and Paris theories are
at the macro scale of the analysis of security—i.e. the broader interna-
tional system, the range of security challenges and the broader workings
of security within it. While this is a gross over simplification as their
approaches are far more diverse and multifaceted, it does offer somewhat
of a necessary delineation between them and two more niche theoret-
ical schools that have significant importance within this book. These are
the more recent additions to the field of critical security studies in “Ver-
nacular” security studies (Bubandt, 2005; Jarvis & Lister, 2012) and
critical terrorism studies (Jackson, 2007). Given social media gives the
audience the ability to “speak” security and become an important part of
the discussion vernacular security studies has an important part to play in
conceptualising how binary, hierarchical understandings of relationship of
the “audience” and the “elite” central to critical security studies (Buzan
et al., 1997) begin to break down on social media. However, it is not
as simple as embracing a completely “flat” conception of security speak
on social medial, as metrics such as influence enable a small number of
non-security elite users to reach large audiences in sometimes ephemeral
ways. Critical terrorism studies fits in here as it seeks to apply the critical,
constructivist perspective to the sub-field of terrorism (Jackson, 2007).
Rather than narrowing the focus, it also seeks to broaden the discussion
of terrorism away from problem-solving perspectives so beloved of secu-
rity elites, but to understand the much broader context in which terrorism
is constructed. This has even gone as far as to include how terrorism
infiltrates into, and is constructed by, popular culture (Holland, 2011).
It is also important to look up and out from the specifics of the social
media landscape when we consider how social media can be related to
critical security studies. Specifically, social media is, after all, a “technol-
ogy” and the synergies between technology, politics and IR are nothing
new and have a history almost as long as humanity itself (Reuter et al.,
2019). Building on this observation and considering that social media is
one in a universe of cases of technology, security and politics, the final
28 J. DOWNING

task of this chapter is in looking specifically at questions of this chapter


to importantly tease out the key means by which scholarship accounts
for this relationship. While it is important to consider the contending
understandings the various schools of critical security studies have of tech-
nologies of security, we need to go further. For example, the Copenhagen
school’s later work began to consider the “little security nothings” where
technologies of security become an increasingly large parts of the fabric
of daily life with phenomena such as CCTV (Huysmans, 2011). While an
interesting starting point in considering the possibilities that communi-
cations technologies open up, this remains underdeveloped. Additionally,
it is important to consider how the Foucaultian understanding of secu-
rity bureaucracies in the Paris school (D. Bigo, 2008) can be applied to
how large social media companies work in their inadvertent “doing” of
security in de-platforming users and patrolling the digital landscape.

2.2 Classical Security Studies:


Realism, Liberalism, Constructivism
To understand the broader interventions, and indeed the founding raison
d’etre of the critical security studies field, it is important to first consider
against what their critique is made. It is fair to say that in this sense,
critical and classic security studies exist in a far more symbiotic and inter-
twined relationship than may at first be clear—for without “traditional”
security studies and its practitioners which remain in the world, it is not
possible to build nor sustain a critique of their methods, assumptions and
practices. Realism, perhaps one of the founding theories of contemporary
security studies, has received renewed attention in the past year owing
to the Russian invasion of Ukraine. This horrific, violent and destructive
conflict has echoes of the early twentieth century when realism was artic-
ulated, being a state-to-state conflict analysed through the lens of state
power and pursuit of state interests through violent means. However, the
renewed attention lavished on realism has been negative, owning to the
critiques of the views of John J Mearsheimer and his lack of sympathy
with Ukraine’s aspirations to look towards the EU, NATO and democ-
racy. Mearsheimer roots his commentary in an observation that elites in
the USA and Europe “tend to believe that the logic of realism holds little
relevance in the twenty-first century and that Europe can be kept whole
and free on the basis of such liberal principles as the rule of law, economic
interdependence, and democracy” (Mearsheimer, 2014, p. 2). In his
2 CONCEPTUALISING SOCIAL MEDIA AND CRITICAL … 29

opinion, as early as the 2014 Russian intervention in Ukraine and annex-


ation of Crimea, it is important to remember that “realpolitik remains
relevant—and states that ignore it do so at their own peril” (Mearsheimer,
2014, p. 2). Here, he points to a provocation of Moscow by the USA
and the European Union (EU) in projecting their power into Eastern
Europe where he highlights the efforts made by the West in “peeling Kiev
away from Moscow” as part of a broader effort to spread Western values
(Mearsheimer, 2014). This view has been rightly critiqued as deeply prob-
lematic for sidelining the autonomy of Ukraine, and seemingly advocating
ignoring their preference to lean into the West. However, it is important
to note that this articulates a very narrow and limited and problematic
conception of realism. It is important to dig deeper than to understand
the key assumptions of realism.
The point here is not to trace the historical development of realism
from antiquity to the present day but to give a brief sketch of some
of realism’s key assumptions about the world of international secu-
rity to understand the context against which critical security studies
emerges. Realism is also far more diverse and contested internally, this
is often visible from the outside, with its different proponents drawing
on differing and competing notions of such fundamental ideas within the
school as human nature. The key principles of realism, such as the pursuit
of self-interest and the futility of higher moral aspirations, can be seen
in an early classical realist “politics among nations” (Morgenthau, 1948).
This draws strongly on ideas of universal laws of nature that apply to state-
to-state relations across time and space, and where the state, and thus
the elite within it, can “master” the intricacies of international politics
through understanding and obeying these laws—i.e. that national interest,
defined as securing greater power, is the basic cut and thrust of interna-
tional politics, or “realpolitik” (Morgenthau, 1948). A second key feature
of the realist school is the notion that states operate on these power-
seeking terms within, and in part because of, the anarchic nature of the
international system that has no higher authority than the state (Waltz,
1979). As such we can easily draw issues here with a homogenisation of
states, noted in the critique of realism being Eurocentric and unable to
explain the historical evolution of states in Asia (Kang, 2003) nor Africa
(Herbst, 2015). Additionally, realism is also extremely state-centric.
However, a differing conception of international politics, also with
long historical roots, also came to prominence in international politics—
liberalism. A key idea here is that states can cooperate to build a system
30 J. DOWNING

of peace and security with shared benefits (Kant, 1795). Thus begins to
emerge notions of the democratic peace theory—where democracies are
unlikely to go to war due to the unpopularity of bloodshed within the
electorate (Kant, 1795). This was given further momentum in the post-
World War II state system, where it was noted that, while democracies do
fight wars, generally it is not with other democracies because of capitalist
ties, and thus the spread of capitalism and democracy globally could, if
not bring conflict to an end, dramatically minimalise it (Keohane & Jr,
1977). Within this, something else becomes a key feature of the inter-
national system as a result of the horrors of the European great wars
of World War I and World War II—international institutions, such as
the United Nations, which aim to foster cooperation that challenge the
realist understandings of states locked in an eternal struggle for power
and influence.
Constructivism emerged out of observations similar to liberalism about
the roles of institutions, norms and ideas in IR towards the end of the
twentieth century. Constructivism paid more attention directly to these
norms and ideas, such as democracy and human rights in an attempt to
add the role of these more diffuse concepts into the equation of how and
why states behave in the ways that they do in an anarchical international
system (Adler, 2012). However, it was met with a significant degree of
scepticism by mainstream international relations (Hopf, 1998) because of
its attempts to give a place to the more ambiguous role of norms and
ideas in shaping the behaviour of states in the international system. Thus
it stood accused of being more interested in “meta theory” than empirical
research (Adler, 2012). Constructivism in IR emerges from the broader
developments in social constructivism more broadly which is important to
understand in some detail given that this school of thought also greatly
informs critical security studies.
Social constructivism has a long and storied history in the social
sciences since it was coined by Berger and Luckman (1966). The concep-
tual underpinning of this school of thought contests that reality is socially
situated and that knowledge is constructed through interaction with social
stimuli in works such as the invention of tradition (Hobsbawm & Ranger,
1984). This is a conceptual tradition that is strongly rooted in the rela-
tional nature of social experience and that meaning is relational—i.e. it
emerges in interactions with individuals, or indeed in the international
system, other states, institutions and non-state actors. Thus while clearly
not primarily rooted in a materialist understanding of security espoused
2 CONCEPTUALISING SOCIAL MEDIA AND CRITICAL … 31

by theories such as realism, it is important to understand that even in a


broader social science sense, social constructivism does not wholly exclude
the material world from this process of meaning-making. Social science
scholars have advocated more “realist” view of social constructivism, such
as Elder-Vass (2013) and Gorski (2013). This seeks to combine the bene-
ficial aspects of social constructivism with the realist work of scholars such
as Bhaskar (2008) to bring the role of social reality and social structures
back into the work of social constructivism. Thus constructivism in an
international relations sense builds upon their complex interplay of mate-
rial realities and social meanings in its attempt to understand the complex
global system of states and occurrences within it. This is a vital obser-
vation as we both draw to a close of our sketch of the more “classical”
understandings of international relations and security, and begin consid-
ering the understandings of international security that centrally situate
the role of construction. This is by no means exhaustive, but rather a
brief and vulgar outlining of classic takes on international security against
which critical security studies emerge.

2.3 The Critical Security Studies World


Tour: Copenhagen, Paris and Wales
Critical security studies has blossomed from its genesis in the late 1990s.
The emergence of critical security studies can be seen as a product of
the tension between the problem-solving orientation dominant in secu-
rity studies at the end of the Cold War vs a deeper reflection on security
and indeed the nature of theorising itself (Hynek & Chandler, 2013).
This “critical” turn in security studies owes much of its genesis to the
Copenhagen school’s early forays into considering how security is not
simply an objective fact but also something that is “constructed”, and
not only constructed, but constructed through “discourse”. Indeed, the
Copenhagen school has “established itself-for European scholars at least-
as the canon and indispensable reference point for students of security”
(Mcsweeney, 1996). However, this has significantly widened and can
be considered critical in several different ways. The Copenhagen school
(Buzan et al., 1997) emerged in response to classical security studies
and sought to integrate social constructivism into the creation of secu-
rity threats, while the Welsh (Wyn Jones, 1999) and Paris (Didier Bigo &
McCluskey, 2018) schools draw more overtly on critical theory of Marx
and Foucault, respectively. There are a couple of observations here that
32 J. DOWNING

are important in situating these theories in the broader range of security


studies. Firstly, the Copenhagen school seeks to be closer to traditional
security studies (Buzan et al., 1997, p. 35). Additionally, it is important
to not construct “traditional” security studies as a “non-reflective” “straw
man” (Hynek & Chandler, 2013). Even seemingly stable and concrete
ideas within “traditional” security studies, such as a national interest, were
always shifting, changing and diverse (Hynek & Chandler, 2013).
They have also been subject to significant application, reformulation
and critique, even within the question of what constitutes the “critical”
in “critical security studies”. Some scholars have argued that without an
overt commitment to an emancipatory dimension of theory and practice,
critical security studies should not be referred to as critical (Hynek &
Chandler, 2013). The rationale goes that the horizons have been lowered
to such an extent that it undermines the very normative impulse that
is a key underpinning of the project more broadly (Hynek & Chandler,
2013). Thus, in this definition the Welsh school, with its commitment to
emancipation, would score highly, and the Copenhagen school with its
lack of an overt commitment to emancipation scores poorly. While this
is a meta point that is important to consider—i.e. what is the point of
theorising security, this book does not advocate the ex-communication
of theories based on their lack of emancipatory potential per se. Rather
the point here is assess their architecture and how their structures offer
possible synergies with social media developments, or as is also the case,
identifying aspects of their architecture that require further work to be
able to take account of social media.
It is worth considering the boundary issues present within the context
of the critical turn, because of the expansion of the field and how this
increasingly wide boundaries of critical security studies necessitate ques-
tioning how far should/can it go (Browning & McDonald, 2013) and
thus does pushing the definition of security further and further mean we
are actually discussing nothing? (Wyn Jones, 1999, p. 37). However, there
have been some progress in this regard with scholars suggesting that the
sub-discipline can be defined by three key commitments:

1. Fundamental critique of realist approaches (Browning & McDonald,


2013)
2. Seeking to understand the politics of security and what security does
politically (Browning & McDonald, 2013)
2 CONCEPTUALISING SOCIAL MEDIA AND CRITICAL … 33

3. Questioning the ethics of security and what progressive practices


look like with respect to security (Browning & McDonald, 2013).
Within this, this ethics dimension is about figuring out normative
positions—i.e. what defines the “good” when it comes to security
(Browning & McDonald, 2013, p. 1). This creates a need to “refor-
mulate” or “escape” the sometimes problematic language and logic
of security altogether (Browning & McDonald, 2013, p. 236).

What will become apparent in the following discussion of the three


key pillars of the critical turn is interesting, if sometimes confusing, syner-
gies between them. Additionally, the different approaches offer different
conceptual and practical suggestions as to the best ways to operationalise
these commitments.

2.3.1 The Discursive Turn and the Copenhagen School


The “critical” turn in security studies owes much to the Copenhagen
school of securitisation from its publication of “security: a new framework
for analysis” (Buzan et al., 1997). The Copenhagen school has “estab-
lished itself-for European scholars at least-as the canon and indispensable
reference point for students of security” (Mcsweeney, 1996, p. 81). While
it is important to acknowledge the robust critiques of the Copenhagen
school, as it has many shortcomings, it is still important as a cornerstone
of the critical security studies landscape. Copenhagen school is a welcome
intervention, but it is lacking in numerous areas (Howell & Richter-
Montpetit, 2020; McDonald, 2008). It is important to begin with the
key contributions of the Copenhagen school before moving onto in more
details the key critiques.
The origin of the Copenhagen school lies in an opposition to the
classical, and especially “realist” understandings of security in the inter-
national system. Discussions of nationalism, ethnic conflict and migration
not only were not discussed in classical security studies, but could also not
be discussed, due to the state-centric focus of traditional security studies
(Buzan & Wæver, 1997). This state-centric approach, with its Cold War
focus on standing armies, “objective” military strength, etc., could not
account for these threats that emerge from more diffuse forces that while
not divorced from the activities of states, owe their importance to a much
wider range of forces.
34 J. DOWNING

A key starting point here sits in questioning the primacy of the state
and the military in conceptualisations of security (Buzan et al., 1997,
p. 1). While acknowledging the issues with including “everything” under
the security rubric and thus rendering it imprecise and meaningless, the
Copenhagen school openly advocated the widening of notions of secu-
rity and taking security discussions to previously neglected arenas by the
narrow focus of orthodox security studies (Buzan et al., 1997, p. 1).
Here, they highlight an important aspect of global developments at the
time by juxtaposing the narrowing of the security agenda to the military
and nuclear obsessions of the Cold War era with the parallel “emerg-
ing” areas of environmental, economic, identity and transnational crime
concerns (Buzan et al., 1997, p. 2). The fact that these observations
appear archaic, self-evident and “old” are to a certain extent because of
the success of the Copenhagen agenda. Here, the security is more than
simply the “political” but rather:

They have to be staged as existential threats to a referent object by a secu-


ritizing actor who thereby generates endorsement of emergency measures
beyond rules that would otherwise bind. (Buzan et al., 1997, p. 5)

This establishes a simple relationship where elites speak security, and


laypeople listen. This is important because the focus here is discourse
and discourse clearly is applicable in many ways to the landscape of
social media, whether as text, images or memes. An important feature
of the Copenhagen school that complicates a simple application to social
media is the elite focus. Thus, it employs a “methodological elitism”
(Stanley & Jackson, 2016) which has characterised much security and
terrorism research. A key issue is a too narrow focus on the speech of
dominant actors (McDonald, 2008, p. 563). Obviously, dominant actors
exist on social media, but the speaking of security, and indeed who is
important in the speaking of security, needs to be pushed much further
(Downing & Dron, 2020). However, neither do new media technologies
totally “flatten” the discursive landscape as clearly opening a Twitter or
YouTube account does not turn one into a security elite with a persuasive
argument that convinces a given audience.
To unpick this discursive landscape, it is worth considering that the
conceptualisation of discourse by the Copenhagen school goes further.
As such in the Copenhagen view, it is not enough that a security issue is
simply “spoken” about in a broad sense, but must follow quite specific
Another random document with
no related content on Scribd:
No. Expended in this Service for Boats Freight, and 28 4 0
25 other Charges in embarking the Troops, Landing
and reimbarking them from time to time as
occasion required, subsistence to them and for
Information, Guides, etc.

Feb Expended in providing Boats at Leith and Horses


. at Kinghorn for carrying with the utmost
174 Expedition a Quantity of Ammunition for the Army
5/6 at Perth by Order of Lord Justice Clarke of the 8th
No. February
26
1 15 0

Upon the arrival of the Hessian Troops in the River


Forth the 8th February: The Prince of Hesse having sent
Colonel Steuart[623] to Lord Justice Clarke to know
where they were to disembark; Mr. Grosett was
thereupon directed by His Lordship to proceed with the
utmost expedition to the Duke then at Perth to acquaint
His Royal Highness thereof,[624] and to know his
Pleasure, [whether they should disembark at Leith, or be
ordered to the North]; And Mr. Grosett having by three in
the morning received his Royal Highness’s Directions to
prepare for disembarking them at Leith he immediately
returned to Lord Justice Clarke with these Directions.

No. Expended in this Service for Boats Freight to and


27 from Kinghorn, and for Horses from that to and
from Perth, and Coach Hire betwixt Leith and
Edinburgh 2 15 0

[As Aberdeen, Montrose, Inverness, and the other


Places in the North, through which the Army was to
march are supply’d with Coals for fireing from the Ports
in the River Forth, and as no Coals were allowed to go
there while the Rebells were in Possession of these
Places they were in that Country in so great want of
fireing that the Army under the Duke could not march
from Perth till this Want was supply’d, and] As those who
were employed to provide the Army with Coals had in
vain endeavoured it, and the Duke having directed Lord
Justice Clark to be acquainted with the difficulties they
were in Mr. Grosett together with Mr. Henry[625] were
thereupon sent by his Lordship’s Directions of the 11th
February[626] to all the Ports and Creeks upon the River
Forth, and got immediately a considerable Number of
Ships and Vessells loden with Coals, and sent them to
the different Ports and Places in the North where the
Army was to be, and who by these means were instantly
well supply’d, and enabled to March, when and where
his Royal Highness thought proper.

No. Expended in this Service


28
690

Feb The Duke having ordered Blyth’s


., [627]
174 Regiment with about Four hundred Men of
5/6 different Corps to be sent by sea from Leith to join
the Army in the North; Mr. Grosett by Direction of
Lord Justice Clarke of the 23rd February got
proper Transports prepared for that purpose, shipt the
necessary Provisions, and embarked the men, and
which was oblig’d to be done in the night by sending
them three Miles in Boats from the Harbour to the Road
of Leith to prevent the Transports being neaped in the
Harbour.

No. Expended in this Service and sending the Horses


29 of the Regiment from Leith to Kinghorn by water,
they being ordered to go from thence by Land to
the Army 880
Mar The Transports being put back after they had
ch, sailed, and got near their Port and being detained
174 by contrary Winds in the Road of Leith Mr.
5/6 Grosett got them supply’d by order of Lord
Justice Clarke with additional Stores of Provisions
and Boats for bringing on shore such of the
recovered Men of the different Corps as had fallen Ill by
their confinement.

No. Expended in this Service


30
640

Mar The Duke having ordered a considerable


ch, Quantity of Biscuits to be sent him to the North in
174
5/6
order to their being carry’d along with the Army as
they marched into the Highlands Mr. Grosett by
Direction of Lord Justice Clarke of the 6th March
got a sufficient Quantity for that purpose from the Castle
put up in proper Casks and Baggs, and immediately sent
off in to Vessells from Leith, which he had provided for
that Service.

No. Expended in this Service


31
4 13 0

The Duke having sent Directions to Lord Justice


Clarke to provide 10 Boats of 20 and 30 Tons Burthen to
attend the Army with Provisions and other necessaries
as they marched along the Coasts, and as they were
immediately wanted: Mr. Grosett by his Lordships Order
of the 11th March[628] went to the proper Places where
these Boats and small Vessells were to be had and sent
them directly away to his Royal Highness, under the care
of Mr. M‘Gill Commander of one of the Kings Boats at
Leith to whom Mr. Grosett by order of Lord Justice
Clarke gave Ten Pounds towards paying his Expenses.

No. Expended in this Service


32
12 18 0

Mar The Transports with the Troops for the North


ch, being put back a second time and a great number
174
5/6
of the recovered men falling sick again by their
confinement the Duke ordered them to be taken
o’shore and sent across the Forth from Leith to
Kinghorn in Boats and to march from that by Land, which
Mr. Grosett did accordingly on the 14th March.

No. Expended in this Service


33
430

Lord Justice Clarke having received an Express from


his Grace the Duke of Newcastle with a letter from
General Price at Berwick dated 16th March[629]
acquainting His Grace that he had received Information
from a sure hand that Corn from Northumberland and the
adjacent Counties were carried to Wooler a Town 14
Miles from Berwick, and from thence Westward between
Stirling and Dumbarton Castle, and privately embarked
on the River Clyde, and sent thro’ the Western Islands to
Lochaber for the use of the Rebells; Mr. Grosett was
thereupon desired by Lord Justice Clarke to go to
Sterling and from thence across the Country to
Dumbarton Castle, and along the coast to all the Ports
and Creeks on the River Clyde as well to enquire
particularly into the Truth of this Information as to leave
proper Orders and Directions at the Places above
mentioned to prevent Provisions of any sort being carried
from thence to the Rebells and which Mr. Grosett did
accordingly, but did not find that any provisions had gone
that way.

No. Expended in this Service having rode about Two


34 hundred miles therein.
11 18 0

Apri Lord Justice Clarke having upon the 4th of


l, April received an Express from Brigadier Genl.
174
6
Price Governor of Berwick giving an Account that
three large and one smaller Men of War had
appeared off Holy Island and as they made no
Return to the proper Signals that were made them from
that place, and King’s Sloops and Boats that were
cruizing there they believed them to be French Men of
War come to the Assistance of the Rebells and as this
Account was confirmed by an Express from Mr.
Castlelaw, Collector at Dunbar, and Mr. Fall one of the
Magistrates there; and that these ships were come within
the Mouth of the Forth Mr. Grosett at the Desire of the
Lord Justice Clarke went thereupon in the Night and
acquainted the Commanders of the Men of War then
lying in the Road of Leith thereof. But as they were of no
Force to make head against them, these with the other
Ships in the Road prepared to slip their Cables, and
proceed farther up the Firth, upon the approach of the
Men of War above mentioned; After this Mr. Grosett with
the assistance of the Custom House and several fishing
Boats, which he forced out from Newhaven in the night
went in quest of these Men of War, to know certainly
what they were, and next day found them to be Dutch
Men of War to whom the proper Signals had not been
given upon their leaving Holland.

No. Expended in this Service 5 15 0


35
Apri The Duke having sent Orders to the Earl of
l,
174 Home[630] who at this time commanded the
6 Troops that lay at Edinburgh to forward with the
utmost Expedition to the North the Four
Thousand recovered Men of different Corps that
were come there from England, Mr. Grosett at his
Lordship’s and Lord Justice Clarkes desire went and
provided proper Transports, and saw the men embarked
and sent off to his Royal Highness, agreeable to Lord
Home’s Order of the 15th April 1746.[631]

No. Expended in this Service, and for Boats to


36 embark the men in the Road of Leith.
6 10 0

Apri The Transports with these men being detained


l, in the Road of Leith by Contrary Winds, and
174
6
Doctor Maxwell who had the care of the Hospital,
having apply’d to Lord Justice Clarke for an
additional Transport, to put the weakest and most
sickly of the men by themselves Mr. Grosett, was desired
to provide one, and which he did accordingly.

No. Expended in this Service and for Boats employed


37 in removing the men and provisions from one
ship to another.
4 12 0

Commodore Smith[632] upon his Arrival in the Firth of


Forth with the Ships of War under his command being
ordered to proceed to the Orkneys, with these and the
other Ships, and Sloops of War then in the Road of Leith
to prevent their getting assistance from France or making
their Escape from these Coasts and Islands; and having
thereupon apply’d to Lord Justice Clarke to provide him
with proper Pilots for each of the Ships that were to go
on that Service: Mr. Grosett by his Lordship’s Directions
went and got them immediately provided from different
Ports.

No. Expended in this service


38
480

Apri The Great Coats, Blankets, Shoes, Shirts,


l, Waistcoats, Gloves, etc., given by different
174
6
Companies and Corporations in Presents to the
Army being sent to the Care of Lord Justice
Clarke,[633] Mr. Grosett by his Lordships
Directions received and saw them duely forwarded from
time to time to the Army.

No. Expended in this Service


39
10 5 0

His Royal Highness the Duke having directed Lord


Justice Clarke to be apply’d to for his assistance in
procuring what should from time to time be found
necessary for the Army in general; and in particular for
the more speedy embarkation of the Hessian Troops,
and the Four British Regiments ordered for Flanders,
and in getting the Clothing of Major General Wolf’s
Regiment[634] forwarded in the most expeditious manner
from Leith to Perth that Regimt. being upon Receipt
thereof ordered to march to Burnt Island to embark there
with the other British Regiments. Mr. Grosett by his
Lordship’s Directions accordingly assisted Colonel
Steuart and others in procuring what was from time to
time found necessary for these purposes.
No. Expended in this Service
40
780

That besides the services above mentioned Mr.


Grosett was during the Course of the Rebellion
constantly employed by Lord Justice Clarke in the
extraordinary affairs of the Government at this ... to
answer all Imergence ... ty for his keeping Horses at
different ... and as some of them fell into the hands of the
Rebells, and others were lost by hard Riding and other
accidents.

No. Expended on this Account and sundry other


41 Services during the Course of the Rebellion not
mentioned in the Above Articles.
110 0 0
Total Money Expended. 662 11 0
Received of the above Sum from Genl. Guest to Acct. 105 0 0
Ballance 557 11 0

Wal: Grosett.

N.B.—Mr. Grosett being from the first Breaking out of the


Rebellion employed in so open and remarkable a manner in the
service of the Government created against him the particular Ill will
of the Jacobites and their Adherents and who on that account took
every Opportunity of shewing their Resentment against him, they
plundered his House in the Town of Alloa, and in the Country carried
off effects to a very great value, drove all the Cattle from off his
Estate, forced the Payment of the Rents thereof to them, stript his
wife and children of the very cloathes they had on, and used
otherways in a most inhuman manner.
‘Brunstane, 4th Septem. 1747.
‘I do certify that Mr. Grosett was employ’d by me in the
service of the Government in the several matters above
mentioned, and also on other occasions and was zealous
and active in the Execution of whatever was committed to
his care.
‘(Signed)
And. Fletcher,
Lord Justice Clarke.’
N.B.—These Services ... forth and Certify’d in a Pap ...
Cope, the Generals Guest, ... syde and Hawley and by
Lord Home.
Nothing charged for trouble and loss of time, etc.
[This postscript is too torn to decipher accurately but it refers to
the ‘Narrative’ which bears this docquet]:—
We have perused the above Narrative, and do hereby
certify that the same is true so far as regards us
respectively,
R. Handasyde.
Home. H. Hawley.
Jos. Guest.
Jno. Cope.
LETTERS AND ORDERS FROM THE
CORRESPONDENCE OF WALTER
GROSSETT
I
The Lord Advocate to Walter Grossett and others
By the Honl Robt. Craigie Esqr His Majesties Advocate
General
These are ordering and requiring you and each of you
to concur in sending all Vessells of whatever kind upon the
North and Southsides of the Firth from Stirling to Kinghorn
to the Harbours of Leith and Borristounness and in case of
resistance you are to use force in making the Order
effectual Given under my Hand at Edinburgh this ninth day
of Sepr 1745 yeare.
Rob: Craigie.
To all Sherriffs Justices of Peace
Magistrats of Burghs and all
others his Majesties Leedgeses.
Mr. Grosett the Coll. at Alloa has Special Directions to
See this order put in Execution.
Rob: Craigie.

II
Lieutenant-General Handasyde to Walter Grossett
By the Honble Roger Handasyde Esqr Lieutenant
General and Commander in Cheif of All His Majesty’s
Forces, in North Britain etc.
Whereas it has been found Injurious to His Majesty’s
Service that any Boats shou’d pass from Leith to Kinghorn
or from Kinghorn to Leith, These are therefore Requiring
All Magistrates, Justices of the Peace, Constables and
Others concerned to be Aiding and Assisting to you in
bringing all the Passage Boats and Yauls from Kinghorn
and all other places on the North Side of the Forth to the
Harbour of Leith where they are to be kept till His
Majesty’s Service shall allow of their being returned to
their Respective Ports.
Given under my hand at Edinburgh this 26th Novemr
1745.
R: Handasyde.
To Walter Grosett Esqr Collector of
His Majesty’s Customs.

III
Lieutenant-General Handasyde to Walter Grossett
By the Honble Roger Handasyd Esqr. Leutt General and
Commander in Chief of all His Majs Forces in North
Brittain.
Whereas it has been found Injurious to His Majesties
Service that any Boats should pass from the North or
South sides of the Forth or that any Vessells whatever
should be allowed to remain upon the North side of the
said River These are therefore requiring all Magistrats,
Justices of the Peace, Constables and others concerned
to be aiding and assisting to you in Stoping the said
passage and removeing all Boats and Vessells whatever
from the North to the South Side of the Forth from
Kinghorn to Stirling Bridge and in case of resistance or
refussall to Burn or otherwise Destroy such Boats and
Vessells as shall after due Intimation made be found upon
the North Side of the said River.
Given under my Hand at Edinburgh this 27th November
1745.
R: Handasyde.
To Walter Grosett Esqr, Collr of His
Majesties Customs at Alloa, and
one of His Majs Justices of ye
Peace.

IV
The Commissioners of Customs to Walter Grossett
Mr. Grosett.
Inclosed We send You for Your Government and
Direction, a Copy of a Letter from the Lord Justice Clerk
and General Guest Commander in Chief of His Majestys
Forces in Scotland, Containing an order and Instructions
for bringing over all Ships, Vessels, Boats and Yoals of all
sorts and sizes lying in the Harbours and Creeks betwixt
Stirling Bridge and St Andrews inclusive on the North side
of the Frith with their Apparel and Furniture, and for laying
them up in the several Harbours therein Specified on the
South side of the Frith, and in the Execution of these
Directions and Instructions, all Officers whatsoever under
Our direction, are to give You their utmost assistance
when required so to do, as they will answer the Contrary
at their Peril, and You are particularly to apply to the
respective Officers in the several Ports and Precincts for
their Aid and Information. The General having given
proper orders to the Captain of the Milford Man of war to
concur and assist You in this Servise, You are to meet and
Concert with him proper measures for the Effectual
Execution thereof. We are,
Your Loving Friends,
Co: Campbell.
Alex Arbuthnott.
Rd. Somers.

Customho Edinbr
8th Decemr 1745. }
Collr Alloa.
Enclosure to No. IV.
Edinbr Decemr 9th 1745.
Gentlemen—We think it absolutely necessary for the
Good and Service of the Government at this Conjuncture,
that all the Ships, Vessels, Boats and Yoals of all sorts and
Sizes, with their Apparel and Furniture, in all Harbours and
Creeks etc. betwixt Stirling Bridge and St Andrews
inclusive on the North side of the Frith of Forth, be brought
over and Moord in the several Harbours of Dunbar, Leith,
Queensferry and Borrowstoness, and these on the South
side of the said River, betwixt Cramond and Eymouth be
Carried to Leith and Dunbar, as the Persons to be
Employed by You in the Execution hereof, shall Judge to
be most Conveneint, all to remain in these respective
Harbours untill further orders; We therefore earnestly
recommend it to You as proper Judges, to Nominate and
Appoint such of Your Officers under Your Direction and
Government to Execute our Orders as You shall think
most fit to be Employed for the doing of so necessary a
Duty, And as some former Orders of this Nature have not
been observed and obeyed so punctually as Directed for
want of other proper Assistance, We do therefore hereby
direct and ordain all Magistrates of Burghs Justices of the
Peace, Constables etc. within the respective bounds
aforesaid, laying aside all Excuses whatsoever, to be
aiding and assisting to the Person or Persons that are
possessed of Copys hereof, and of Your Instructions given
by You to them, as they will be answerable upon their
highest Peril; and in Case any of the Proprietors or others
Concerned in said Ships etc. as abovementd shall not
forthwith Comply with these Our orders, Then the Persons
so Employed are hereby ordained to burn and Destroy the
same, where any objections or refusals are made to obey
and Comply herewith, and the aforesaid Copys hereof
with your Instructions as above, shall be to them a
Sufficient Warrant for destroying of the above Ships etc.
not doubting of Your Compliance and Concurrence, We
are,
And: Fletcher.
Sign’d
{ Jos: Guest.
N.B.—Buys Boat who has been often Employed in
transporting of Rebels frequently, should be burnt out of
hand.
Honble Commrs of the Customs Edr.

V
Lieutenant-General Guest to Walter Grossett
Edenburgh December the 15th 1745.
Sr,—I agree to your hiring the Borrowstness Ship at
the Rate you mention, provided the owners dont insist on
my Insuring her from the Enemy, for that I cant consent to
—if they comply, you’l immediatly station her at Higgins
Nook, and Nicol at Carse’s Nook, or wherever they can be
best placed for His Majestys Service. You’l give them
positive Derections to be very carefull, in watching both
sides the River, and sending immediat Intelligence to the
Ld Justice Clerk, on discovering any Motions of the
Enemy.
You’l consider the Ship is not ensured now, and is in as
much, or more danger than when employd by his Majesty.
—I am Sr your most Obedt humble Servant,
Jos: Guest.

VI
Walter Grossett to the Commissioners of Customs
Hond. Sirs,—In Obedience to your directions of the
8th Instant Inclosing an Order and Warrand from Lord
Justice Clerk and General Guest Commander in chief of
the Forces in Scotland, for bringing over all Ships,
Vessells and Boats, lying in any of the Harbours or
Creeks, betwixt Stirling and S: Andrews on the North side
of the Firth, to the Harbours therein specified on the south
side thereof, and for Burning or destroying the ships and
Vessells etc., of such of the Proprieters thereof as should
refuse to comply with these Orders; I have with the
assistance of the Kings Boats at Queensferry and
Borristounness, and two Boats Crews belonging to the
Happy Janet stationed off Queensferry, removed,
disabled, or destroyed, all Boats and Vessells that lay
betwixt Stirling and Aberdour. But as the doing of this,
would not have hinder the Rebell Army from geting a
Cross the River, while Boats and Vessells were allowed to
remain at the severall Creeks in Carron Water, and at
Hargens Nuik Airth, and Elphingstone, and other Creeks
on the south side of the Forth betwixt Borristounness and
Stirling; I therefore proceeded to these places, and
prevailed with severall of the Proprieters of Boats and
Vessells there, to remove them from thence, but as some
of them refused to comply, by reason of their not being
included in the Order and Warrand above mentioned, I am
therefore Humbly of Opinion, that Lord Justice Clerk and
General Guest should be applyed to, for a Warrand for the
removing or destroying of them. And as there are at this
time at Alloa, a considerable quantity of Deals and Learge
Loggs of Wood, of 30 or 40 feet in Length, of which Floots
may not only easely be made, for the Transporting of Men,
Horses etc.; from the one side of the River to the other,
but upon which Flooting Batteries may be reased, to move
from place to place, to play upon such of His Majesties
Forces or others, who may be employed in Defending the
Banks of the River, to prevent the Landing of the Rebells.
It is therefore Humbly submitted, how far it may be thought
proper at this Juncture, to have these Deals and Loggs
removed from Alloa. If this is approven off, what I would
propose as the easiest method of removing them, would
be to put them on Board of Vessells, to ly at
Borristounness till the danger is over. With this view I
spook to several shipmasters of my acquaintance, (who I
knew to be good Whiggs and well wishers to the common
Cause) on Tuesday last at Borristounness, and who at my
request, readily agreed to take them on Board their
Vessells, upon their only being paid the Charges they
should be put to in going to Alloa to Load and unload
them. All which is Humbly Submitted by Hon: Sirs Your
Hors Most Obedt Huml Servt
Wat: Grosett.
Edinburgh 16th Decr 1745.
Endorsements.
16th Decr 1745.
Mr. Grosett to wait upon the Justice Clerk and Genl
Guest with this Lre. and to Report their Opinion.
W. H. for the Secry.
The Board approve Mr. Grosetts Conduct and Zeal in
this whole Affair and his proposal is agreed to if the Lord
Justice Clerk and Genl Guest think proper.
W. H. for the Secretary.
VII
The Commissioners of Customs to Walter Grossett,
forwarding approval of Lord Justice Clerk and General
Guest
Edinburgh 16th Decr 1745.
We approve of Mr. Grosetts Conduct and proposalls
and desire the Board of Customs may give him the proper
directions for puting the same in Execution and for which
end a proper Warrant shall be granted by us.
And Fletcher.
Jos: Guest.
Mr. Grosett
Having considered the above Approbation of the Lord
Justice Clerk and General Guest, We heartily agree with
the same and direct you to proceed accordingly, having
first obtained their Warrant for the purposes as mentioned
in Your Letter of this date.
Co: Campbell.
Alexr Arbuthnott.
Rd. Somers.
Custom Ho Edinburgh
16th December 1745.

VIII
The Lord Justice Clerk to Walter Grossett
(Holograph but not signed)
Pray forward the Inclosed, and get all Stirling shire in
Arms immediately, If Ld Home approves G. Blackney will
give arms—raise ye Hue and Cry—Cause the Sherriff
distribute ye papers yt comes wt ys bearer.
Go on and prosper.
Edr 19th Decr 1745.
I have paid none of the Expresses yt they may make
more hast but given every one two shills. wch is not to be
deducted out of yr hire if they make Speed.

IX
Lieutenant-General Guest to Walter Grossett
Joshua Guest Esqr Lieut. General and Commander in
Cheif of all His Majesty’s Forces, Castles, Forts and
Barracks in North Britain etc.
His Majesty’s Service Requiring that all Vessells and
Boats of whatever Size be instantly removed out of the
Harbours of Borrostouness, Queensferry, Leith or any
where else upon the South Coast of the Forth betwixt
Leith and Stirling, Those at Borrostouness and
Queensferry to the Road of Borrostouness or Such other
place or places as you shall think most for His Majesty’s
Service at this Juncture; those at Leith to the Road of
Leith or such other place as you shall judge most proper
for said Service; These are therefore Authorizing and
Empowering you to put the said order in Execution, and to
which purpose the Commanders of His Majesty’s Ships of
War or others employ’d in the Kings Service, are hereby
Required to give you their Utmost Assistance, as are all
Magistrates, Justices of the Peace, Constables, and all
other Persons, Civil or Military whom these may Concern.
A Copy hereof sign’d by you shall be a sufficient warrant
to any Person required or empower’d by you in the
Execution hereof as they will answer to the Contrary at
their highest Peril.
Given at Edinburgh the 21st day of Decemr 1745.
Jos: Guest.
To Walter Grosett Esqr Collector of
His Majesty’s Customs.

X
Lieutenant-General Guest’s Directions
Directions for the Master of the Boat that goes to
Borrostouness.
Edinburgh 22d Decem. 1745.
He is to sail directly for Borrostouness, lye out in the
Road of that place and send in his Boat or yawl, to
Collector Grosett who is there and get directions from him
how he is to dispose of his Cargo, part of which is to go to
Stirling Viz. the 9 pounders Cannon Ball, Spunges, etc.
The Pouder and small Cannon Ball is for the use of the
Jean of Alloa, and Pretty Janet, that are stationed near
that place or at Higgens Nuik. The Biscuit which is to be
taken in at Leith from Mr. Walker is to be disposed of at
Bosness as Mr. Grosett will direct. In case of any accident
of your not meeting with Mr. Grosett, I desire Cap. Knight
of the Happy Janet may forward im̅ ediately the 9 pound
Cannon Ball, Spunges etc. to Stirling, where General
Blakeney has present occasion for them.
Jos: Guest.
To the Master of the Boat Order’d to
sail for Borrostouness.

XI
Captain Knight R.N. to Walter Grossett
Sir,—Having Sent 7 pounds of powder, 20 Sheets fine
paper made in Cartridges and 15 pounds Musquet Shot to
be used, if occasion required it, by my people in
preventing the Rebells passage at Higgens-Nook, which I
understand you gaue to John Peirson Master of the Pretty
Jennett, I desire you will be pleased to procure an Order
from General Guest to me for supplying these Ordnance
Stores to him, with his Ricept to Alexander Wedderburn
Master of the Armed Vessel under my Command of the
Same, and to transmit both to me at this place with the
first opportunity.—I am Sir, Your very humble Servant,
Jno. Knight.
Happy Jennett Queensferry Road
22d December 1745.
Walter Grosett Esq. Collector of his
Majts Customs at Alloa.

XII
Lieutenant-General Guest to Walter Grossett
Joshua Guest Esqr Lieut. General and Commander in
Cheif of all His Majesty’s Forces, Castles, Forts and
Barracks in North Britain etc.
His Majesty’s Service Requiring that a number of
Vessells and Boats be hired for Transporting of His
Majesty’s Forces, These are therefore authorizing and
Empowering you to hire such a number of Vessells and
Boats and make such agreement with them as you shall
judge necessary at this Juncture, and I hereby oblige
myself to make good such agreement, for which this shall
be your Warrant. Given at Edinburgh this 22d December
1745.
Jos: Guest.
To Walter Grosett Esqr Collector of
His Majesty’s Customs.

You might also like