首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
    
This article examines the security certificate process that has been in effect in Canada since 1978 and the 2008 amendment (Bill C-3) of the Immigration and Refugees Protection Act. It highlights how democratic means can be used to subvert meaningful policy changes, and underscores the antinomy inherent in a nation-state's zeal to protect its citizens and appeals by a group of Arab Muslim men held under security certificates for suspected terrorist activities for their human rights to be recognised and respected by a state in which they are non-citizens. The problematic immanent in nation-states serving as guarantors of human rights and its concomitant misconstruing of human rights for citizenship rights are used to demonstrate that an ‘internal Other’ has been created in Canada. The security certificate, it is argued, in stipulating that detainees may request to be deported to countries where they regularly reside or hold nationality, makes them akin to Hannah Arendt's notion of the ‘rightless’ – people who have not only lost their home (i.e., polity) or ‘distinct place in the world’, but also their legal status. Consequently, even in an advanced democracy with grandiose claims to, and assurances of, individual liberty and fundamental freedoms, ‘rightless’ people face a great danger by the fact of being nothing beyond ‘human’.  相似文献   

2.
Why would a terrorist group target nongovernmental organizations (NGOs)? We theorize that certain types of NGOs, namely those using mainly nonviolent pressure to advocate for changes in government human rights practices, influence the behaviors of potential terrorist group supporters in ways not liked by terrorist organizations. These advocacy-based human rights NGOs make terrorism attacks against the whole NGO sector more likely by changing the dynamics of terrorist-domestic audience relations in ways that threaten to limit audience support of terrorist groups. Other types of NGOs, especially those that do not have an advocacy focus, are less likely to directly challenge the terrorist organization or the state and can provide resources utilized by terrorist groups and potential sympathizers. Thus, their presence would not increase the likelihood of any NGO-targeted terrorist attacks. A global test of these dynamics supports our basic hypotheses.  相似文献   

3.
    
This article examines the transformation of the Chechen conflict from a predominately nationalist to jihadist struggle, and compares the similar changes that took place in the Kashmiri insurgency. Using global jihadist strategy and ideology, and the accompanying influence of Al Qaida, both conflicts are shown to have taken on a new ideology and to have expanded beyond previous areas of operation. In both instances, the political leadership wrapped themselves in the mantle of political Islam (Islamism) as ensuing violence led to rapid socioeconomic transformation and social breakdown, thus allowing foreign jihadists to exert power and take up/divert the cause. In the past few years, two main groups originating in Chechnya and Kashmir have taken on Western targets and become more indoctrinated in Al Qaida's global jihadist ideology: the Caucasus Emirate (CE) and Lashkar-e-Taiba (LeT). The opportunist franchising strategy of Al Qaida could come to play a role in the future of both groups, especially if the CE is able to coalesce into a more unified front. More importantly, the global jihadist attributes of the CE must begin to garner the same attention in the Western world as that of LeT.  相似文献   

4.
    
If politics and military affairs often raise moral questions, terrorism is a politico‐military matter that veritably flings moral problems in our faces. This essay, initially prepared for military chaplains, explains why terrorism is a form of political depravity and a form of armed activity bearing little resemblance to legitimate guerrilla warfare. Dr Harmon analyzes how terrorists nonetheless use arguments ‐ moral and political ‐ to try to transform public attitudes and even paralyze the body politic into inaction and impotence. Common arguments of the terrorists and their public supporters and apologists are analyzed and rebutted. Conclusions include the proposition that internecine blood‐letting among terrorists themselves, and the self‐defeating character of terrorist logic, make these ostensible architects of new societies more adept with the wrecking ball than with the blueprint.  相似文献   

5.
ABSTRACT

Despite the contribution of Foucaultian inspired approaches to Critical Terrorism Studies, this article invites us to consider Hegel’s epistemological insights. Foucault’s power-knowledge nexus is an invaluable intellectual tool which reveals how terrorism can be a “social fact”, yet it rests on a genealogical account of history and a passive notion of subjectivity determined by power (regimes). Hegelian philosophy maintains some of the benefits met in Foucault’s approach (sociality and contingency of knowledge) while providing a richer epistemological account. This article introduces Hegel’s epistemological insights to: i) challenge the portrayal of terrorism as a major external threat against the western liberal democratic states in the vein of “New Terrorism” or the “Clash of Civilizations”; and ii) domestically explore how the concept of liberal democratic rights, equality, freedom affect the interpretation of counter-terrorist bills, the threat perception of terrorism and domestic polarisation. Hegel’s insights critically interrogate the notions of “liberal rights”, “equality” and “freedom”, revealing how their ambiguous definition accommodates inherent contradictions which can fuel a controversial interpretation of counter-terrorist bills, leading to domestic polarisation and (reciprocal) radicalisation. Therefore, Hegel’s epistemological insights reveal how the defective definition of human rights, equality and liberty can amplify the effects of Terrorism and radicalisation.  相似文献   

6.
Post-9/11, law-enforcement agencies have expanded the processing of personal data for terrorist profiles; this is actually among the very reasons why personal data are processed in the first place. De facto terrorist profiles tend to be based predominantly on the use of such criteria as ‘race’, colour, religion, or ethnic and national origin to single out persons for enhanced scrutiny. Terrorist-profiling practices, therefore, raise the question as to their conformity with the right to privacy, the protection of personal data, and the principle of non-discrimination. This article critically examines to what extent, if any, terrorist-profiling practices may be regarded as compatible with the principle of non-discrimination and the fundamental rules pertaining to the protection of personal data. For this purpose, it looks at various approaches to defining profiling in the context of countering terrorism, as well as describing de facto manifestations of terrorist-profiling practices. The conclusion is that terrorist-profiling practices all too often fail to comply with the fundamental requirement that any restrictions on the right to privacy and the protection of personal data are adequately regulated, necessary and proportionate. The so-called ethnic profiling gives rise to particularly serious problems. It tends to assume the nature of ‘racial’ profiling and, accordingly, entail discriminatory effects that can result in feelings of humiliation and stigmatisation among the targeted groups. Since the risk of further marginalisation and even radicalisation within those groups also appears to be a very real consideration, the whole necessity of ethnic profiling in the name of countering terrorism must be called into question in a contemporary democratic society built on the principles of pluralism and respect for different cultures.  相似文献   

7.
This article explores the puzzle of victim dissatisfaction with State-led commemoration following 9/11 and 3/11 by offering a cross-national case study through which to view key areas of theoretical debate in the sociology of human rights, cultural trauma and collective memory, and the politics of victimhood. Although State-led commemorative processes are often highly contested, we would expect them to be less so in the cases of 9/11 and 3/11, given broad social consensus about the victims’ right to commemoration and the traumatic nature of the events, and especially the “ideal nature” of the victims who as symbolic representatives of the State are conferred with great moral authority. Drawing on primary and secondary data on the commemoration of the attacks of 11th September 2001 and 11th March 2004 we find that despite sharp differences between commemorative processes, three common key areas of contestation and dissatisfaction for victims emerge: political instrumentalisation, hierarchies of worth and exclusion. We show how the status of ideal victimhood for victims of transnational terrorism carries within it an inherent paradox which provides the key to their dissatisfaction, namely the moral authority conferred on them as representatives of the State simultaneously depersonalises them, excluding them as individuals with rights and needs.  相似文献   

8.
    
Do interstate relations influence the sources and targets of transnational terrorism? A considerable body of recent research suggests that the answer to this question is yes, and that one state may sponsor terrorist attacks to weaken the bargaining positions of other states. We suggest, in contrast, that positive or cooperative actions invite terrorist attacks from a different source: nonstate groups wishing to spoil interstate cooperation that they oppose. We assess this argument with a dyadic dataset using monthly data on transnational terrorist attacks and cooperative and noncooperative actions between states. Our results suggest that spoiling in response to interstate cooperation is an important determinant of transnational terrorism.  相似文献   

9.
    
The conventional wisdom among US foreign policymakers is that drones enable precise strikes, and therefore limit collateral damage. In contrast, critics point out that many civilian casualties have ensued, and they variously cite poor intelligence and imprecision of the strikes as reasons for this. Critics have also raised concerns that the US and its allies are engaging in “lawfare” to legitimise violations of human rights law. As such, some have questioned whether academic engagement with the legal questions surrounding targeted killings amount to collusion with state attempts to legitimise human rights violations. This article will argue that by conceptualising the targeted killings programme as a form of state terrorism, we are better equipped to provide a critical analysis of the drones programme within the context of a long history of violence and terrorism which has underpinned the imperial and neo-imperial projects of the UK and US. The article will then argue that there are important similarities between the targeted killings programme, and previous UK and US counterinsurgency operations, including prior uses of air power, and operations involving the internment of terror suspects, and the targeting of specific individuals for interrogation and torture or disappearance. Common to these programmes is that they are forms of policing aimed at crushing rebellions, stifling disorder and constructing or maintaining particular political economies, through terror. Also common to these programmes are the attempts made either to conceal illicit actions, or in the event they are exposed, to shroud them in a veil of legitimacy. The article concludes by offering some brief reflections on why we should not abandon the quest to resolve the thorny legal questions around the targeted killings programme.  相似文献   

10.
    
Abstract

Ten years after its formal adoption, the R2P doctrine remains an incomplete project in a world of continuing conflicts now aggravated by the existential threat of global terrorism. The debate on the permissibility of military action to stop mass atrocities when authorisation to use force is not forthcoming from the Security Council has produced only a plurality of conflicting theories but hardly any progress at the normative level. A two-pronged approach could be used to consolidate R2P as a doctrine fully integrated into the corpus of international law. The first prong requires the revamping of the largely neglected Article 48 of the ILC Draft on State Responsibility; the second involves using R2P as a platform to initiate a reform of customary international law to make it more consistent with elementary principles of justice and universal human rights.  相似文献   

11.
    
Looking back at the beginnings of academic research on terrorism just over 40 years ago, it is extraordinary to see that what was once a marginal subject for social science has developed into a full-fledged program of “terrorism studies.” In fact, recently a sociologist considered the subject of sufficient importance to write a doctoral dissertation and then a book on the “social construction” of the field (Stampnitzky 2013). This essay highlights some examples of the contributions scholars from different disciplines have made to understanding terrorism. There is no consensus on any general theoretical laws of terrorism (there is no equivalent of a democratic peace theory, for example), but researchers have defined key concepts and deepened explanations of cause, effect, and process.What follows identifies four interrelated areas of explanatory inquiry into terrorism that have emerged over years of research: the effectiveness of terrorism as a strategy of opposition, the determinants and consequences of counterterrorism policies, how campaigns or waves of terrorism end, and how analysis of terrorism can be situated in a broader theoretical framework rather than treated as a phenomenon sui generis. Particular emphasis is placed on studies that are comparative and/or that situate the specific case of terrorism in a general theoretical perspective.  相似文献   

12.
《国际相互影响》2012,38(5):621-645
We examine whether refugee flows increase transnational terrorism in states to which refugees flee. Recent studies find that refugee flows contribute to the spread of interstate and civil war, but to a far lesser extent have studies examined how refugee flows could lead to other forms of political violence. We discuss two ways in which refugee flows can lead to transnational terrorism: how conditions in camps contribute to the radicalization of refugees; and how poorly host states treat refugees. We then conduct empirical tests using data on worldwide international refugee flows and transnational terrorism. Specifically, we model the effect of refugee flows on transnational terror attacks within a directed dyad framework to account for characteristics of origin and host states. Using a rare-events logit model, along with count models to check robustness, we find that refugee flows significantly increase the likelihood and counts of transnational terrorist attacks that occur in the host country, even when controlling for other variables. Given the prominence of refugee flows and populations worldwide, the results suggest that states with significant refugee populations and the international community at large should take measures to address the conditions in refugee camps, as well as the treatment of refugees by host states in order to prevent transnational terrorism.  相似文献   

13.
We investigate the role of international reputation in alliance politics by developing a signaling theory linking past alliance violations with the formation of future alliance commitments. In our theory, past violations Are useful signals of future alliance reliability conditional on whether they effectively separate reliable from unreliable alliance partners. It follows that states evaluating potential alliance partners will interpret past violations in their context when deciding to enter a new alliance, attaching less weight to violations in “harder times,” when many states are defaulting on their alliance commitments together, and more weight to violations in “easier times,” when fewer states are defaulting on their alliances. We test our theory and find that states are empirically more likely to form new alliances with states that violated in harder times compared to states that violated in easier times. The results have important implications for how scholars understand and estimate the impact of international reputation.  相似文献   

14.
ABSTRACT

The international security community is increasingly concerned about the nexus between indiscriminate terrorism and the proliferation of nuclear technology and materials. Many nuclear terrorism threat assessments focus primarily on terrorist motivations to employ an atomic bomb, the availability of nuclear know-how and technology, and the opportunity for clandestine organisations to acquire fissile material. Scholars and experts, however, often neglect to elaborate on the challenges for terrorist organisations in organising and implementing the construction and detonation of a crude atomic bomb. This will most likely be a complex project. This article will therefore explore the organisation of such an endeavour. To be precise, we will highlight the impact of the organisational design of the terrorist group. The organisational design determines the division of tasks and how coordination is achieved among these tasks. It therefore has a strong impact on the functioning of any organisation, especially an innovative and complex terrorism project. Building on a case study of Los Alamos, we inductively infer that terrorist organisations face an inherent effectiveness-efficiency trade-off in designing a nuclear armament project.  相似文献   

15.
International security cooperation usually takes one of two forms. A classical collective security organization is designed to promote international security through regulating the behavior of its member states. A defensive security organization is designed to protect a group of states from threats emanating from a challenging state or group of states. Both forms of security cooperation bind states to act in concert with respect to threats presented by other states. The emergence of non-state actors such as terrorist or extremist organizations challenges traditional forms of collective security. Threats from political extremism, terrorism, and outlaw organizations have grown in visibility during the past decade in the countries of Eurasia. The terrorist attacks of September 11 and the ensuing global war on terrorism have given added impetus to the Eurasian inter-state cooperation in confronting non-traditional threats and challenges from non-state actors. Bearing in mind the theory of collective security, this article analyzes threats posed by non-state actors with respect to Eurasian collective security organizations including the Shanghai Cooperation Organization, the Conference on Interaction and Confidence Building Measures, and the CIS Collective Security Treaty Organization. The article concludes that the effectiveness of these organizations at achieving stated objectives depends upon their capacity to adopt new criteria of effectiveness.  相似文献   

16.
Abstract

In 2010, the EU agreed its third five year programme for internal security, with the Stockholm Programme building on pre-existing arrangements from Tampere and The Hague. This article seeks, firstly, to highlight the nature of the problem that has confronted the EU in the area of internal security, by exploring a range of thematic concerns regarding both the institutional and conceptual construction of the EU's internal security regime, from the lack of an effective statistical analysis into the nature of the problem confronting the member states to the continued fragmentation of the European level as a practical venue for policy-making. Having considered the consequences of these continuing structural flaws, in terms of both the EU's wider credibility and legitimacy as an actor in this key security field, the second half of the article proceeds to critically appraise the solutions contained both within the 2010 Stockholm Programme and the Treaty of Lisbon. Having considered both, it will be argued that, at best, the ‘Stockholm solution' simply papers over pre-existing cracks, leaving the EU with a continued credibility gap in this important and developing area of co-operation.  相似文献   

17.
    
The existing literature in the terrorism field does not address the absence of terrorism scholarship in developing countries. This article focuses on this intellectual gap using the case of Pakistan. It argues that most decolonised states, including Pakistan, are yet to grasp the complexities of traditional approaches to the study of terrorism, let alone its critical dimensions. The article explores some of the prevailing conditions in developing countries, specifically decolonised states such as Pakistan, which prevent the development of a robust academic discourse on terrorism and the development of a strong field of study. It suggests that the main barriers that account for this shortfall include the state’s legitimacy deficit, a flawed education system that nurtures fictions as truth and inhibits knowledge production, the institutionalised role of conspiracy theories in national politics and the multiplicity of terrorism discourses among government and sociopolitical entities. The conclusion highlights a number of reasons that might help to explain this persistent condition and offers a few policy recommendations.  相似文献   

18.
In order to counter the threat of a coup, states often undertake a number of strategies to “coup-proof” their militaries, such as creating institutional redundancy, severely limiting interbranch communications, and basing promotions on loyalty rather than merit. As a result of such policies, however, the fighting effectiveness of these armed forces is degraded, and the marginal return on military investment is greatly reduced. We argue that leaders who have coup-proofed their militaries undertake several substitution policies in order to offset their military weakness when faced with external threats. These policies include pursuing chemical, biological, or nuclear weapons and forging alliances. We find support for these theoretical predictions in quantitative tests on data with global coverage between 1970 and 2001.  相似文献   

19.
    
Under what conditions can regional and international courts (ICs) make decisions against their governments' preferences? To answer this much debated question, we develop a new, majoritarian model of state‐IC relations. It posits that in cases where well‐established ICs' positions are congruent with policy‐specific public opinion in leading member states, ICs can rule against their governments' position. We apply our approach to a series of landmark decisions by the Court of Justice of the European Union (CJEU) regarding United Nations sanctions against terror suspects. We find that the CJEU was able to harness growing public support to strengthen terror suspects' rights, punish states for superficial compliance with its rulings and ultimately broaden the Court's judicial review powers. Our analysis suggests that ICs can be agents of legal change and advance human rights against governments' resistance, but this role is conditional on the presence of public support.  相似文献   

20.
    
Abstract

The first activation of the European Union’s “Mutual Assistance Clause”, following the 13 November 2015 terrorist attacks in Paris, demonstrated that this article can be used very flexibly, not just to help defend French territory but also its expeditionary operations. But if flexibility is an asset, improvisation is not. In order to maximise the potential of the clause, the role of the EU institutions needs to be clarified, in addition to that of the member states, and new capacities must be created at the EU level, notably in intelligence and planning.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号