首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
To date, critical terrorism studies (CTS) has been very good at critiquing contemporary counterterrorism, but has not yet offered an alternative model which could be used for research and evaluation, as well as policy advice. This article seeks to address this gap by constructing a CTS model of counterterrorism. The first section of the article explicates the appropriation of “emancipation”, and why it is key for an alternative model of counterterrorism. The article then goes on to outline a CTS model and explain how it addresses all the main weaknesses of contemporary counterterrorism models, because it is based on a more robust ontology and epistemology which addresses terrorism as deep politics, it is normatively based on emancipation, it approaches terrorism and security holistically, and it is rooted in means/ends consistency. The final section of the article argues that the CTS model is not a theoretical utopia. A comparison with Norwegian counterterrorism shows that it can be useful for evaluating and advising real-world counterterrorism.  相似文献   

2.
This article discusses US counterterrorism from a class perspective. It sees counterterrorism as a state policy with differential effects on different social classes. In doing so, the article starts to address a lacuna in critical studies of counterterrorism, which tend to be rather structural and formal, thus ignoring the pertinence of counterterrorism to the field of social dynamics. To partly rectify this blind spot by addressing some class implications of counterterrorism, the article examines the effects of counterterrorism policy on capital accumulation and its social conditions. It notes that counterterrorism has different implications along class-lines: for dominant capital, it signifies appropriation of public money and direct participation in political decisions; for everyone else, it means material dispossession and political exclusion. Given that counterterrorism was developed between two crises of neoliberalism, the article distinguishes between economic crises, which tend to benefit capitalism, and political crises, which can be destructive, and suggests that counterterrorism is partly a restructuring of the neoliberal state so that it can manage recurring economic crises, while preventing their evolution into political ones.  相似文献   

3.
While it is sensible that governments and academics endeavour to assess the effectiveness of counterterrorism policies, this article argues that it is almost impossible to measure arithmetically the outcome of counterterrorism efforts for a variety of reasons. However, this does not mean that the effect of governmental policy cannot and should not be assessed. This article argues that it is not necessarily the policy measures and their intended results as such, but much more the way in which they are presented and perceived, that determine the overall effect of the policy in question. The article introduces the concept of ‘performativity’, which involves the extent to which a national government, by means of its official counterterrorism policy and corresponding discourse, is successful in selling its representation of events, its set of solutions to the terrorist problem, as well as being able to set the tone for the overall discourse on terrorism and counterterrorism. Due to the distinct relation between the performative power of counterterrorism efforts and the arc of violence carried out by terrorist movements, analysing the level of performativity will provide an indication to the effectiveness of counterterrorism policies. It is argued that a low level of performative power generally has a more rapidly neutralising effect on radicalisation and political violence than large-scale, public counterterrorism efforts.  相似文献   

4.
5.
When policy-makers use force to achieve political ends, they use the word ‘victory’, yet its meaning is frequently left unclear. Policy-makers are using force for new purposes (peace operations, preemption, state-building, democracy promotion, counterinsurgencies and counterterrorism), but the language and thinking on victory in these new situations has not kept pace with the times. The essential problem is that the term ‘victory’ is an imprecisely defined concept for guiding decisions about military intervention. Everyone, from scholars to policy-makers, should understand that the failure historically to develop a precise concept of victory weakens the ability of policy-makers to use force effectively and contributes to confusion when societies debate whether to use force. This article seeks to make three fundamental contributions towards reducing the ambiguity that surrounds the term ‘victory’ in the strategic studies literature. First, it establishes the renewed importance of the question: ‘what is precisely the meaning of “victory?”’ Second, it presents a typology for understanding the nature of victory. Third, it uses this typology to reevaluate the contributions of prominent and lesser-known thinkers in strategic studies whose ideas have contributed to the scholarship on what it means to achieve victory in war.  相似文献   

6.
ABSTRACT

It is astonishing how many researchers adopt a counterterrorism agenda and suggest researching terrorist learning in order to shape security countermeasures. Posing different questions would lead to different answers. One such question would be, “What makes terrorist learning different?” Terrorist groups operate clandestinely, which means the environment in which they learn is different. This paper investigates the context in which Al Qaeda in the Islamic Maghreb (AQIM) has learned. Thus, a qualitative case study analysis of the influence of meso- and macro-level factors on AQIM’s tactical and strategic patterns between 1999 and 2013 will shed light on terrorist learning. Meso-level influences are conceptualised as cooperation and ultimate merging with Al Qaeda, and macro-level influences as government action. The result is puzzling: AQIM has learned tactically from Al Qaeda and strategically from counterterrorism. This is puzzling because scholars commonly question whether it is possible to learn under pressure. Nevertheless, AQIM’s learning has been more profound when faced with pressure than when cooperating voluntarily. The sustainable answer to the question of the political implication thereof is not how to boost counterterrorism measures but how to redefine them. If what is different about terrorist learning is above all the context, we need to question the context.  相似文献   

7.
Arie Perliger 《安全研究》2013,22(3):490-528
While the academic study of counterterrorism has gained momentum in recent years, it still suffers from major theoretical weaknesses. One of the most prominent shortcomings is an absence of theories that can effectively explain the factors that shape the counterterrorism policies of democratic regimes. The present study attempts to fill this theoretical void in two ways. First, it proposes an analytical framework for a classification of counterterrorism policies. Second, it presents a theoretical framework that strives to uncover the factors that have influenced the struggle against domestic terrorism in democratic regimes. The analyses, which have used a unique and comprehensive dataset that documents counterterrorism policies in eighty-three democracies, show that the robustness of the regime's democratic foundations as well as the symbolic effect of terrorism are major forces in shaping the democratic response to it, while the direct impact of terrorism is less influential than assumed in the literature.  相似文献   

8.
The article addresses some of the key issues that are raised for researchers engaging with counterterrorism police officers and initiatives, when undertaking research. A significant area to explore in this context is, in fact, the issue of relationships with counterterrorism police officers who may themselves directly have been covert police officers in the past and/or who may be continuing in their current, apparently more open, role (wittingly or otherwise) as agents of broader state strategies of exploiting trust for intelligence-gathering purposes. This article suggests that it is important for researchers to understand that working within the counterterrorism field involves degrees and shades of risk in the service of trust-building, sensitivity and the empowerment of communities, and that researchers themselves can (wittingly and unwittingly) be part of wider strategies instigated by security-minded individuals or groups of counterterrorism police officers. Reflecting upon the research that we have undertaken individually and collectively over the last number of years, in the light of the most recent spate of allegations about counterterrorism police officers infiltrating activist and political protest groups, having sexual relationships, and indeed, on occasion, children, with women whilst undercover and of potentially working to entrap vulnerable individuals into planning terrorist acts, this article raises questions around trust, credibility, legitimacy, the prevalence and near unavoidability of dysfunctional agendas and the implications of all of the above for community-based approaches to counterterrorism.  相似文献   

9.
Recent years have witnessed a significant increase in the amount of counterterrorism legislation worldwide. The commonly held assumption behind the adoption of counterterrorism legislation links it to the terrorist threat in a state. However, little research has focused on empirically testing reasons driving states to legislate. This article addresses this void by analyzing the puzzle of why states choose to adopt new terrorism-specific legislation. The article presents empirical analysis of the probability of states to legislate before and after September 11, 2001, and is based on a new database of counterterrorism legislation. The findings reveal that before September 11, state decisions to adopt new legislation correlated with the number of terrorist organizations operating in their territory. Since September 11, however, the most significant predictors for the adoption of new legislation have become the existence of previous counterterrorism legislation and the participation of a state in the War on Terror.  相似文献   

10.
India has been a major victim of Islamist terrorism and has long fought against an array of Islamist terrorist groups. Since the 9/11 terrorist attacks, India's previously lonely struggle against terrorism has taken place against the background of the US-led Global War on Terror (GWOT). After outlining India's Islamist terrorist challenge, this article examines India's evolving approach to counterterrorism and how the GWOT has influenced it. It concludes that India has adopted a localized, defensive, law-and-order approach to counterterrorism which has evolved in response to various attacks over the years but still remains seriously underdeveloped. The GWOT has influenced Indian counterterrorism in important ways, although its influence has been subtle and indirect rather than transformative. The GWOT has enhanced Indo-American counterterror cooperation, shaped India's terror environment by launching the war in Afghanistan and enriched Indian counterterrorism with American experience. Just as important, it has also had an impact on India's debate on counterterrorism, civil liberties and human rights.  相似文献   

11.
ABSTRACT

This article examines domestic counterterrorism sting operations in the USA. It considers why critics consider these operations unethical and illegitimate. In particular, it looks at claims that counterterrorism sting operations have entrapped innocent people. This article explains why the U.S. courts have rejected claims of entrapment. It discusses different standards of entrapment used by the U.S. courts and sets out how these standards apply to counterterrorism sting operations. The article will show how key pieces of evidence convinced the courts that the targets of sting operations were predisposed towards terrorism. As a result, defendants were not able to mount successful entrapment defenses. By the end of the article, the reader will have a better understanding of the ethical and legal safeguards governing counterterrorism sting operations in the USA.  相似文献   

12.
Kenya’s state discourse on terrorism and counterterrorism securitises Somali refugees and refugee camps. Using the securitisation theory, a perspective of social constructivism as a theoretical framework, the article attempts to establish the relationship between the securitisation of Somali refugees and refugee camps and refoulement as a measure to counter the securitisation. The arguments raised are the speech acts of Kenya’s securitising actors expressed in the terrorism discourse present Somali refugees and refugee camps as existential threats to peace and security in the country. Consequently, their speech acts expressed in the counterterrorism discourse present non-refoulement of the refugees as an existential threat to national security so as to justify, to the targeted audience, the adoption of refoulement, a norm-violating measure, to counter the fear of the threat of terrorism from Somali refugees and refugee camps. Terrorism and counterterrorism in Kenya have, therefore, been “Somalinised”. The conclusion offers ways of preventing the “Somalinisation” of terrorism and counterterrorism in Kenya.  相似文献   

13.
This work addresses the structural weaknesses that threaten to derail counterterrorism efforts by the Malaysian government. It also highlights the links between various pre-September 11 security issues in Southeast Asia and the terrorism threat facing Malaysia at present. The limitations of the current counterterrorism approach by the government are highlighted. In addition, the paper identifies structural problems such as systemic corruption, weaknesses in border security, and inadequate private sector regulation as key areas of concern. The paper concludes by highlighting the symbiotic relationship between a successful counterterrorism campaign and the rule of law.  相似文献   

14.
This article offers an analysis of Europol's counterterrorism role. Based on official EU documents, internal reports, and secondary sources, it dissects the contemporary counterterrorism activities of both Europol and the informal arrangements outside of the EU structure that are frequently utilized by some EU Member States. Although Europol does not perform any indispensable counterterrorism functions at the moment due to its limited powers and lack of trust from national agencies, the author contends that Europol has the potential to make a substantial contribution to the fight against terrorism.  相似文献   

15.
The use of Unmanned Aerial Vehicles (UAVs) or drones in counterterrorism has changed the face of warfare and is challenging international law on a number of levels. This article assesses some of those challenges in the context of the Obama administration’s justifications to use drones for targeted killing. It focuses on the US as a norm entrepreneur that purposefully works to alter prevalent norms related to the use of drones in counterterrorism efforts. The article analyses normative developments and the meaning-in-use of existing legal provisions that are invoked to justify US policy in this area. By focusing on norm entrepreneurs, this article moves away from purely structural accounts of normative change towards a stronger emphasis on actors and the role of agency. Rather than understanding US drone policy as violating international law, this article argues that the Obama administration was acting as a norm entrepreneur in its counterterrorism efforts, aiming to change the meaning of a number of international legal concepts to justify its policy decisions.  相似文献   

16.
Since 9/11, the terrorist is often awarded the position of the radical Other: the personified existential threat to the West. The counterterrorism strategy presented by the Danish government describes itself as covering a ‘broad spectrum’ of efforts. It includes an ‘active foreign policy’ in relation to the Muslim world and an ‘active integration policy’ in relation to Muslim migrants. Both inside and outside the nation-state, efforts range from ‘hard power’ security strategies of elimination and control involving military, police and intelligence operations, to ‘soft power’ strategies of information, partnerships and dialogue. This article analyses Danish counterterrorism policy narratives to identify the concepts of dialogue implied and the positions awarded to less-than-radical Muslim Others. This article finds that Muslims might – especially after the Danish Muhammad cartoon affair – in counterterrorism dialogue find a position for talking back, even if it is still a position circumscribed by control and securitisation.  相似文献   

17.
This article describes the nature, origins and consequences of the epistemological crisis at the heart of contemporary counterterrorism. The epistemological crisis of counterterrorism is an identifiable epistemic posture towards knowledge about, as well as a way of acting towards, the terrorist threat. It manifests itself discursively in the manner in which officials, scholars, pundits and others speak about the threat of terrorism, and the way counterterrorism and security practitioners then act in pursuit of security against that threat. The article argues that many of the bizarre counterterrorist practices regularly observed in many Western countries, as well as costly and counterproductive counterterrorist practices such as preemptive war, targeted killings, mass surveillance, torture, control orders and de-radicalisation programmes, among others, are neither anomalous nor irrational in the context of the new paradigm. Rather, they flow logically and directly from the particular paranoid logic, which is constitutive of the epistemological crisis. The article concludes with a discussion about how and why critical scholars can and should attempt to resist and deconstruct it.  相似文献   

18.
This article on drone strikes in Pakistan offers a distinctive empirical case study for critical scholarship of counterterrorism. By asking how cosmopolitanism has developed through UK news discourse, it also provides a constructivist contribution to the literature on drones. I argue that UK news discourse is not cosmopolitan because it focuses on risk and places the Other beyond comprehension. US–UK networked counterterrorism operations have complicated accountability, and while a drive for certainty promoted more scrutiny of policy, news media outlets, academics and activists turned to statistical and visual genres of communication that have inhibited understanding of the Other.  相似文献   

19.
The article examines Israel's successes and failures during the Second Intifada. It argues that Israel's advances came from an effective counterterrorism campaign involving a mix of military operations, defensive measures, and in particular improved intelligence gathering. Domestic resilience also proved strong in the face of a brutal terrorism campaign. Yet long-term victory remains elusive for Israel. Deterrence, always difficult against terrorist groups, is growing harder for Israel. Hamas's control of Gaza, and the mistrust and hatred sown during the Second Intifada, have hindered a political deal between Israel and moderate Palestinians. Much of what went into successful counterterrorism, notably the security barrier and the aggressive campaign of raids and arrests, does not jibe with most visions of what peace would look like and makes a deal harder to achieve. To make a peace deal work, Israeli counterterrorism must change, with measures including relocating parts of the security barrier, bolstering moderate Palestinian politicians, and working with, as opposed to undermining, Palestinian security forces in the West Bank.  相似文献   

20.
Renewed interest on how and why terrorism ends has emerged in parallel with increased visibility of some new and innovative approaches to counterterrorism. These are collectively known, whether for good or bad, as “de-radicalization programs.” However, and despite their popularity, data surrounding even the most basic of facts about these programs remains limited. This article presents an overview of the results of a one-year pilot study of select de-radicalization programs and investigates critical issues surrounding assessment of their effectiveness and outcomes. We argue that Multi Attribute Utility Technology (MAUT) may offer promise for future empirical assessment of what we prefer to designate “terrorism risk reduction initiatives.” Perhaps less obviously, and until more data surrounding the efficacy of such initiatives becomes available, MAUT may also provide a conceptual basis for planning, evaluating, and guiding the development of future such initiatives and may have the unanticipated consequence of facilitating progress by encouraging greater exploration of efforts to change behavior from other contexts.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号