Beyond Border Security: Feminist Approaches to Human Trafficking


Lobasz, Jennifer K. 2009. “Beyond Border Security: Feminist Approaches to Human Trafficking.” Security Studies 18 (2): 319-44.

Author: Jennifer K. Lobasz


International human trafficking—sometimes referred to as modern-day slavery—has increasingly come to be seen as a security threat. The question remains as to what kind of threat human trafficking poses. Traditional security approaches to international human trafficking call for analysis of trafficking as a threat to the state and to state control of borders. Traditional security analyses of trafficking therefore emphasize border security, migration controls, and international law enforcement cooperation. Feminist analyses of human trafficking challenge the traditional security framework, prioritizing the security of trafficked persons and recognizing the manner in which victims are threatened by both traffickers and the state itself. I argue that feminist approaches to human trafficking are essential for understanding and combating the phenomenon. Feminists identify the ethical and pragmatic grounds for broadening the analytical focus from states to people. Feminists' most important contribution, however, lies in the investigations of the social construction of human trafficking, which highlight the destructive role that sexist and racist stereotypes play in constructing the category of trafficking victims.

Topics: Feminisms, Gender, Security, Trafficking, Human Trafficking

Year: 2009

© 2024 CONSORTIUM ON GENDER, SECURITY & HUMAN RIGHTSLEGAL STATEMENT All photographs used on this site, and any materials posted on it, are the property of their respective owners, and are used by permission. Photographs: The images used on the site may not be downloaded, used, or reproduced in any way without the permission of the owner of the image. Materials: Visitors to the site are welcome to peruse the materials posted for their own research or for educational purposes. These materials, whether the property of the Consortium or of another, may only be reproduced with the permission of the owner of the material. This website contains copyrighted materials. The Consortium believes that any use of copyrighted material on this site is both permissive and in accordance with the Fair Use doctrine of 17 U.S.C. § 107. If, however, you believe that your intellectual property rights have been violated, please contact the Consortium at