ABSTRACT

This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy.

How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficult to access. This book creatively assesses and analyses the ways in which secrecies operate in security research. The collection sets out new understandings of secrecy, and shows how secrecy itself can be made productive to research analysis. It offers students, PhD researchers and senior scholars a rich toolkit of methods and best-practice examples for ethically appropriate ways of navigating secrecy. It pays attention to the balance between confidentiality, and academic freedom and integrity. The chapters draw on the rich qualitative fieldwork experiences of the contributors, who did research at a diversity of sites, for example at a former atomic weapons research facility, inside deportation units, in conflict zones, in everyday security landscapes, in virtual spaces and at borders, bureaucracies and banks.

The book will be of interest to students of research methods, critical security studies and International Relations in general.

The Open Access version of this book, available at www.taylorfrancis.com, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.

chapter |27 pages

Introduction

Navigating secrecy in security research
Size: 0.71 MB

chapter |2 pages

Interlude

Rigorous research in critical security studies
Size: 0.06 MB

part 1|95 pages

Secrecy complexities

section Section I|47 pages

Secrecy, silence and obfuscation

chapter 1|15 pages

The problem of access

Site visits, selective disclosure, and freedom of information in qualitative security research
Size: 0.46 MB

chapter 2|15 pages

The state is the secret

For a relational approach to the study of border and mobility control in Europe 1
Size: 0.14 MB

chapter 3|16 pages

Postsecrecy and place

Secrecy research amidst the ruins of an atomic weapons research facility 1
Size: 1.03 MB

section Section II|47 pages

Access, confidentiality and trust

chapter 4|17 pages

Navigating difficult terrain

Size: 0.15 MB

chapter 5|15 pages

Accessing lifeworlds

Getting people to say the unsayable
Size: 0.14 MB
Size: 0.13 MB

part 2|102 pages

Mapping secrecy

section Section III|46 pages

Reflexive methodologies

chapter 7|14 pages

Writing secrecy

Size: 0.13 MB
Size: 0.14 MB

chapter 9|16 pages

(In)visible security politics

Reflections on photography and everyday security landscapes
Size: 1.48 MB

section Section IV|55 pages

Ethnographies of technologies

chapter 10|18 pages

The black box and its dis/contents

Complications in algorithmic devices research
Size: 0.16 MB
Size: 0.17 MB

chapter 12|16 pages

Researching the emergent technologies of state control

The court-martial of Chelsea Manning
Size: 1.15 MB

part 3|77 pages

Research secrets

section Section V|43 pages

Critique and advocacy

chapter 13|17 pages

Searching for the smoking gun?

Methodology and modes of critique in the arms trade
Size: 0.23 MB
Size: 0.13 MB

chapter 15|12 pages

Secrecy vignettes

Size: 0.12 MB

section Section VI|33 pages

Research ethics in practice

chapter 16|17 pages

Research ethics at work

Account-abilities in fieldwork on security
Size: 0.15 MB

chapter 17|15 pages

Material guides in ethically challenging fields

Following deportation files
Size: 0.14 MB