The List, one of the most archaic means of written enumeration and classification, has made a forceful recurrence in the post-9/11 global security landscape. From terrorist sanctions lists and No-Fly lists to “kill-lists” for drone warfare; from the privately compiled lists of risky banking clients to the regulatory lists of untrustworthy or incompliant companies, the list seems to proliferate as a contemporary technology of security and regulation. How and why are lists becoming newly embedded in security practices? What work do lists perform as specific techniques of government and forms of normative ordering? And what consequences follow for how problems of legal accountability and political responsibility are currently understood and addressed? This paper frames security lists as inscription devices that are heterogeneous, unpredictable and productive in unforeseen ways. It draws attention to the ways they materialise the categories they purport to describe, and how they enact novel forms of knowledge, jurisdiction and targeting. We suggest that critiques could be strengthened by making visible and contesting the fragmented and diffuse conditions through which security lists are produced.
AalbertsTLeanderA (2013) Introduction: The Co-Constitution of Legal Expertise and International Security. Leiden Journal of International Law26(4): 783–792.
AmooreL (2011) Data derivatives: On the emergence of a security risk calculus of our times. Theory, Culture and Society28(6): 24–43.
6.
AmooreL (2013) The Politics of Possibility: Risk and Security Beyond Probability, Durham, NC: Duke University Press.
7.
AmooreL (2014) Security and the claim to privacy. International Political Sociology8(1): 108–112.
8.
AradauCvan MunsterR (2011) Politics of Catastrophe: Genealogies of the Unknown, London: Routledge.
9.
BarryA (2013) The translation zone: Between actor-network theory and international relations. Millennium41(3): 413–429.
10.
BeckerJShaneS (2012) Secret ‘kill list’ proves a test of Obama’s principles and will. The New York Times29: A1.
11.
BelknapR (2000) The literary list: A survey of its uses and deployments. Literary Imagination2(1): 35–54.
12.
BellanovaRGonzález FusterG (2013) Politics of disappearance: Scanners and (unobserved) bodies as mediators of security practices. International Political Sociology7(2): 188–209.
13.
BennettCJ (2008) Unsafe at any altitude: The comparative politics of no-fly lists. In: SalterM (ed.) Politics at the Airport, Minneapolis: University of Minnesota Press.
14.
BernsteinA (2013) The hidden costs of terrorist watch lists. Buffalo Law Review61(3): 461–535.
15.
(2013) Forum: Actor-network theory and international relationality. In: BestJWaltersW (eds) International Political Sociology7(3): 332–349.
16.
Biersteker, TJ and SE Eckert (eds) (2007) Countering the Financing of Terrorism. London: Routledge.
17.
BlakelyR (2007) Why torture?Review of International Studies33(3): 373–394.
18.
BowkerGCStarSL (1999) Sorting Things Out: Classification and Its Consequences, Cambridge: The MIT Press.
19.
BraunBWhatmoreS (2010) The stuff of politics: An introduction. In: BraunWhatmore (ed.) Political Matter: Technoscience, Democracy, and Public Life, Minneapolis: University of Minnesota Press.
20.
Bueger, C (2015) Making Things Known: Epistemic Practices, the United Nations, and the Translation of Piracy. International Political Sociology 9(1): 1–18.
21.
ButlerJ (2004) Precarious Life: The Powers of Mourning and Violence, London: Verso.
22.
ChristodoulidisE (2009) Strategies of rupture. Law and Critique20(1): 3–26.
23.
ClaytonM (2013) Terrorist watch lists: Are they working as they should?Christian Science Monitor. 22 May.
24.
CloatreE (2013) Pills for the Poorest: An Exploration of TRIPS and Access to Medication in sub-Saharan Africa, London: Palgrave MacMillan.
25.
de BúrcaG (2010) European court of justice and the international legal order after Kadi. Harvard International Law Journal51(1): 1–49.
26.
de GoedeM (2011) Blacklisting and the ban: Contesting targeted sanctions in Europe. Security Dialogue42(6): 499–515.
27.
de GoedeM (2012) Speculative Security: The Politics of Pursuing Terrorist Monies, Minneapolis: University of Minnesota Press.
ErtukIFroudJJohalS (2013) (How) do devices matter in finance?Journal of Cultural Economy6(3): 336–352.
30.
EspelandWNStevensML (2008) A sociology of quantification. European Journal of Sociology49(3): 401–436.
31.
Federal Bureau of Investigation (FBI) (2010) Counterterrorism Program Guidance: Watchlisting. December 2010.
32.
FosterLA (2014) Critical cultural translation: A socio-legal framework for regulatory orders. Indiana Journal of Global Legal Studies21(1): 79–105.
33.
FoucaultM (2008) The Birth of Biopolitics: Lectures at the College de France, London: Palgrave Macmillan.
34.
Giumelli F (2011) Coercing, constraining and signalling: explaining UN and EU sanctions after the Cold War. Colchester: ECPR Press.
35.
Government Accountability Office (GAO) (2012) Terrorist Watchlist: Routinely Assessing Impacts of Agency Actions since to December 25, 2009, Attempted Attack Could Help Inform Future Efforts. Report to Congress, Washington, May.
36.
GooSK (2004) Faulty ‘No Fly’ system detailed. Washington Post. A01.
37.
GoodyJ (1977) The Domestication of the Savage Mind, Cambridge: Cambridge University Press.
38.
HandeysideH (2014) Numbers tell the story of our government’s watchlisting binge. ACLU Blog of Rights. 6 August.
39.
IsikselNT (2010) Fundamental rights in the EU after Kadi and Al Barakaat. European Law Journal16(5): 551–577.
40.
Johns F (2013) Non-legality in international law: unruly law. Cambridge University Press: Cambridge.
41.
KrassmanS (2012) Law’s knowledge. On the susceptibility and resistance of legal practices to security matters. Theoretical Criminology16(4): 379–394.
42.
Krisch N (2015) The structure of postnational authority. SSRN 2564579.
43.
LatourB (1986) Visualization and cognition: Drawing things together. Knowledge and Society6: 1–40.
44.
LatourBWoolgarS (1986) Laboratory Life: The Construction of Scientific Facts, Princeton: Princeton University Press.
45.
Latour B and P Weibel (eds) (2005) Making Things Public: Atmospheres of Democracy. Cambridge MS: MIT Press.
46.
Law J, 2012, “Collateral Realities”, in The Politics of Knowledge Eds F Domínguez Rubio, P Baert (London: Routledge) pp. 156–178.
47.
Law J and Mol A (eds) (2002) Complexities: An introduction. In: Law J and Mol A (eds) Complexities: Social Studies of Knowledge Practices. Durham: Duke University Press.
48.
LawJRuppertE (2013) The social life of methods: Devices. Journal of Cultural Economy6(3): 229–240.
49.
LeeseM (2014) The new profiling. Security Dialogue45(5): 494–511.
50.
LeyshonAThriftN (1999) “Lists come alive”: Electronic systems of knowledge and the rise of credit scoring in retail banking. Economy and Society28(3): 434–466.
51.
LichtblauE (2004) Homeland Security Department experiments with new tool to track financial crime. New York Times12.
52.
MerrySE (2011) Measuring the world: Indicators, Human Rights, and Global Governance. Current Anthropology52.S3: S83–S95.
53.
National Counterterrorism Center (NCC) (2013) Watchlisting Guidance. March 2013.
54.
OpitzSTellmannU (2012) Global territories: Zones of economic and legal dis/connectivity. Distinktion13(3): 261–282.
55.
PincusW (2009) 1600 are suggested daily for FBI’s list. The Washington Post1.
Sullivan G (2014) Transnational legal assemblages and global security law: topologies and temporalities of the list. Transnational Legal Theory 5(1): 81–127.
64.
Sullivan G and Hayes B (2011) Blacklisted: Targeted Sanctions, Preemptive Security and Fundamental Rights. Berlin: ECCHR.
65.
Travers R (2010) “Statement for the Record of Mr. Russell Travers,” before the US House of Representatives Hearing on Sharing and Analyzing Information to Prevent Terrorism, Washington, 24 March.
66.
Vismann C (2008) Files: Law and Media Technology. Stanford: Stanford University Press.
67.
Walters W (2002) The power of inscription: Beyond social construction and deconstruction in European integration studies. Millennium 31(1): 83–108.
68.
Walters W (2014) Drone Strikes, Dingpolitik and beyond: Furthering the debate on materiality and security. Security Dialogue 45(2): 101–118.
69.
Zedner L (2007) Pre-crime and post-criminology? Theoretical Criminology 11(2): 261–281.