首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
This article critically analyses the securitisation of Islam post-9/11 in the US and argues that this securitisation is a remote securitisation whereby the securitisers – the security practitioners – are placed at a distance from the securitisees – the Muslim community. This is achieved through two processes of security practice: linguistically by euphemising language and using metaphors, and analytically by understanding radicalisation through a rationalist perspective, which follows the “logic of expected consequences”. This article further problematises the rationalist view of radicalisation in the counterterrorism sector in the US and concludes by introducing a Bourdieusan concept of relationality to critical counter-radicalisation studies.  相似文献   

2.
3.
Kenya’s state discourse on terrorism and counterterrorism securitises Somali refugees and refugee camps. Using the securitisation theory, a perspective of social constructivism as a theoretical framework, the article attempts to establish the relationship between the securitisation of Somali refugees and refugee camps and refoulement as a measure to counter the securitisation. The arguments raised are the speech acts of Kenya’s securitising actors expressed in the terrorism discourse present Somali refugees and refugee camps as existential threats to peace and security in the country. Consequently, their speech acts expressed in the counterterrorism discourse present non-refoulement of the refugees as an existential threat to national security so as to justify, to the targeted audience, the adoption of refoulement, a norm-violating measure, to counter the fear of the threat of terrorism from Somali refugees and refugee camps. Terrorism and counterterrorism in Kenya have, therefore, been “Somalinised”. The conclusion offers ways of preventing the “Somalinisation” of terrorism and counterterrorism in Kenya.  相似文献   

4.
ABSTRACT

This article explores questions of justice and moral permissibility of state action in counterterrorism through Robert Nozick’s Anarchy, State, and Utopia. Using the case of the Berlin attack in December of 2016 and the ensuing political debate over whether potential terrorists could be put into preventive custody as an illustrative example, it engages Nozick’s argument on prevention, knowledge and justice. In Nozick’s fierce defence of individual rights, the state comes into being as an aggregate of individuals and their inviolable rights, and thus possesses no moral legitimacy of its own. Individual rights must therefore not be violated for the sake of common goods. In conjunction with his emphasis on free will and the ensuing unpredictability of human decision-making, the article highlights the Nozickian position as a powerful account against the justification of preventive custody, thereby providing a moral “fail-safe” in counterterrorism discourses that build on just war theory and utilitarianism.  相似文献   

5.
To date, critical terrorism studies (CTS) has been very good at critiquing contemporary counterterrorism, but has not yet offered an alternative model which could be used for research and evaluation, as well as policy advice. This article seeks to address this gap by constructing a CTS model of counterterrorism. The first section of the article explicates the appropriation of “emancipation”, and why it is key for an alternative model of counterterrorism. The article then goes on to outline a CTS model and explain how it addresses all the main weaknesses of contemporary counterterrorism models, because it is based on a more robust ontology and epistemology which addresses terrorism as deep politics, it is normatively based on emancipation, it approaches terrorism and security holistically, and it is rooted in means/ends consistency. The final section of the article argues that the CTS model is not a theoretical utopia. A comparison with Norwegian counterterrorism shows that it can be useful for evaluating and advising real-world counterterrorism.  相似文献   

6.
Alex Wilner 《安全研究》2013,22(4):740-772
New theoretical approaches have been developed that apply deterrence and coercion to counterterrorism. Critics have suggested, however, that in the particular case of deterring terrorism by threats of punishment, a mismatch exists between deterrent goals and counterterrorism intentions: the twin aims of destroying and deterring a single opponent is logically and theoretically incompatible. These criticisms, however, neglect to take two important factors into consideration. First, threats of punishment in counterterrorism can be applied against a wide assortment of actors involved in and associated with terrorism and political violence. Second, the concept of “intra-war deterrence” suggests ways in which a state can deter certain behavior or a specific form of warfare while engaging in open conflict with that same adversary. In exploring both factors, this article posits that states can gain coercive leverage over different actors involved in terrorism, including organizations with which they are actively hoping to defeat.  相似文献   

7.
ABSTRACT

It is astonishing how many researchers adopt a counterterrorism agenda and suggest researching terrorist learning in order to shape security countermeasures. Posing different questions would lead to different answers. One such question would be, “What makes terrorist learning different?” Terrorist groups operate clandestinely, which means the environment in which they learn is different. This paper investigates the context in which Al Qaeda in the Islamic Maghreb (AQIM) has learned. Thus, a qualitative case study analysis of the influence of meso- and macro-level factors on AQIM’s tactical and strategic patterns between 1999 and 2013 will shed light on terrorist learning. Meso-level influences are conceptualised as cooperation and ultimate merging with Al Qaeda, and macro-level influences as government action. The result is puzzling: AQIM has learned tactically from Al Qaeda and strategically from counterterrorism. This is puzzling because scholars commonly question whether it is possible to learn under pressure. Nevertheless, AQIM’s learning has been more profound when faced with pressure than when cooperating voluntarily. The sustainable answer to the question of the political implication thereof is not how to boost counterterrorism measures but how to redefine them. If what is different about terrorist learning is above all the context, we need to question the context.  相似文献   

8.
This article analyses the tentative de-securitising move of the Russian counterterrorism frame under Medvedev’s presidency. It suggests that de-securitisation involves a normalisation process that articulates three main points: terrorism as a result of internal troubles, counterterrorism seen as a “positive process” and Islam not being stigmatised. It nevertheless shows that this process remains far from complete, given the embedding of framing into cultural and normative contexts that make security, integrity and sovereignty leading norms. On the contrary, the ambiguities that shape framing entail a (re-)securitisation of social and societal issues that were not previously directly related to the root causes of terrorism.  相似文献   

9.
Renewed interest on how and why terrorism ends has emerged in parallel with increased visibility of some new and innovative approaches to counterterrorism. These are collectively known, whether for good or bad, as “de-radicalization programs.” However, and despite their popularity, data surrounding even the most basic of facts about these programs remains limited. This article presents an overview of the results of a one-year pilot study of select de-radicalization programs and investigates critical issues surrounding assessment of their effectiveness and outcomes. We argue that Multi Attribute Utility Technology (MAUT) may offer promise for future empirical assessment of what we prefer to designate “terrorism risk reduction initiatives.” Perhaps less obviously, and until more data surrounding the efficacy of such initiatives becomes available, MAUT may also provide a conceptual basis for planning, evaluating, and guiding the development of future such initiatives and may have the unanticipated consequence of facilitating progress by encouraging greater exploration of efforts to change behavior from other contexts.  相似文献   

10.
“Intersectionality” as a concept is increasingly finding its way into development work. In order to develop an understanding of the concept, this article shows how intersectionality can be used as a conceptual framework to analyse identity-based development claims. The article builds on qualitative research with people living in the countryside in northwest Pakistan to develop an intersectional methodology to engage with development claims. It uses a three-step analytical model to identify subject positions from which different people negotiate “eligibility for development'' and ‘‘responsibility to develop”. The paper shows how frequently used categorisations such as gender and class should be complicated by development practitioners and worked with in a more nuanced way.  相似文献   

11.
While social media has had profound effects in many realms, the theory and practice of negotiation have remained relatively untouched by this potent phenomenon. In this article, we survey existing research in this area and develop a broader framework for understanding the wider roles and effects of social media on negotiation. Through a series of detailed case studies, we explore how social media can drive important negotiations either off the rails or toward beneficial outcomes—and how savvy practitioners can harness this often‐neglected factor to their advantage, or else find themselves outmaneuvered by more digitally sophisticated parties. Applying the lens of the “3D negotiation” approach developed by Lax and Sebenius, we describe a number of potentially decisive roles that social media can play to enhance actions by negotiators “at the table,” with respect to deal design, and “away from the table.” In this 3D context, we show how social media can help negotiators learn about their counterparts (interests, perceptions, relationships, and networks), directly and indirectly influence the parties, mobilize supporters, and neutralize potential opponents. We show that being proactive—both in cultivating digital influence or allies and in building resilience to threats across online information ecosystems—can provide critical advantages for negotiators navigating a hyperconnected world. We develop a preliminary framework to help identify the full range of platforms, tools, and methodologies appropriate for the use of social media in negotiations, including network mapping software and open‐source intelligence techniques. Throughout our analysis, we stress the importance of ethical and privacy considerations.  相似文献   

12.
Targeted killings have become a central component of counterterrorism strategy. In response to the unprecedented prevalence of this strategy around the world, numerous empirical studies have recently examined whether “decapitating” militant groups with targeted killings is strategically effective. This study builds on that research program by examining the impact of targeted killings on militant group tactical decision-making. Our empirical strategy exploits variation in the attack patterns of militant groups conditional on whether a government’s targeted killing attempt succeeded against them operationally. In both the Afghanistan-Pakistan and Israel-West Bank-Gaza Strip theaters, targeted killings significantly alter the nature of militant group violence. When their leaderships are degraded with a successful strike, militant groups become far less discriminate in their target selection by redirecting their violence from military to civilian targets. We then analyze several potential causal mechanisms to account for these results and find strongest evidence that targeted killings tend to promote indiscriminate organizational violence by empowering lower level members with weaker civilian restraint.  相似文献   

13.
The articles in this special issue are drawn from papers presented at a conference titled Critical Terrorism Studies: Practice, Limits and Experience. The conference was organised by the Critical Studies on Terrorism Working Group of the British International Studies Association (BISA). The event was supported by both a BISA workshop grant and by Loughborough University’s Centre for the Study of International Governance (CSIG) and was held at Loughborough University from 9–10 September 2013. The conference aimed to explore what we know about terrorism and counterterrorism and importantly to ask how we know it. Reflecting the recent “materialist”, “everyday”, “experiential” and “narrative” turns in the fields of International Relations (IR), Geography and Cultural Theory, the event brought together scholars and practitioners to reflect on practices of research and knowledge production in Critical Terrorism Studies and related fields. The articles in this special issue reflect those aims.  相似文献   

14.
This study contributes to the debate on the role of nonnuclear (conventional) deterrence in international security by examining the Israeli practice of this strategy. By analyzing a case outside of Western strategic thought, which traditionally has dominated deterrence theory, it demonstrates how strategic thinking evolves differently in various ideational realms. The article highlights the impact of strategic culture on the Israeli conceptualization of deterrence, explores its deficits, and yields lessons for theoreticians and practitioners from the challenges of intra-war coercion operations. The study introduces the innovative term “culminating point of deterrence,” calls for improving analytical techniques for deterrence evaluation, claims that successful conventional deterrence perpetuates political conflict, stimulates the adversary's dangerous innovations, and argues for a tailored approach not only for formulating deterrence strategy, but also for exploring deterrence policies of different actors. The findings of the study are applicable beyond the Israeli case and are relevant to actors utilizing coercion strategies.  相似文献   

15.
This article describes the nature, origins and consequences of the epistemological crisis at the heart of contemporary counterterrorism. The epistemological crisis of counterterrorism is an identifiable epistemic posture towards knowledge about, as well as a way of acting towards, the terrorist threat. It manifests itself discursively in the manner in which officials, scholars, pundits and others speak about the threat of terrorism, and the way counterterrorism and security practitioners then act in pursuit of security against that threat. The article argues that many of the bizarre counterterrorist practices regularly observed in many Western countries, as well as costly and counterproductive counterterrorist practices such as preemptive war, targeted killings, mass surveillance, torture, control orders and de-radicalisation programmes, among others, are neither anomalous nor irrational in the context of the new paradigm. Rather, they flow logically and directly from the particular paranoid logic, which is constitutive of the epistemological crisis. The article concludes with a discussion about how and why critical scholars can and should attempt to resist and deconstruct it.  相似文献   

16.
During their long exile during 1940–1944, various components of the “Free French” were largely kept out of the “Post-War Planning” process that took place in the American State Department. They perceived this absence as a major, and often deliberate, humiliation that made the circumstances of their exile all the more exasperating. Charles de Gaulle was seen by the “Anglo–Saxon” Allies as a figure of dubious worth and usefulness, and Washington’s general tone was to dismiss the exiles as the “so-called Free French.” They were admitted to the decision-making process only slowly and grudgingly, and not until after many of the key decisions about organising the United Nations had been taken. This article shows how that exclusion affected the French leadership, how they reacted, and suggests some lasting results. It also assesses to what extent France had a coherent contribution to the formation of a global international organisation during 1943–1944, and what factors inhibited France properly articulating that contribution.  相似文献   

17.
As peacebuilding discourses increasingly stress the importance of including women, to what degree have security-related practices taken heed? It has been over 10 years since the United Nations Security Council passed Resolution 1325 on Women, Peace, and Security, yet it remains a “confused and confusing” tool for scholars and practitioners in assessing women's inclusion in peacebuilding. This article adds to our understanding on women and peacebuilding by engaging 1325 as an operationalizable concept and then applying it to peace agreements to understand how women's security is addressed as part of formal peace processes. Given previous difficulties in operationalizing 1325’s mandate, this article engages it as a three-level concept useful for studying the ways in which women are “brought into” security, called (en)gendered security. Using this concept of (en)gendered security, I assess intrastate peace agreements between 1991 and 2010 to elucidate where and how women are included in peace processes. This article illustrates the potential of a systematized and practical approach to security embodied in 1325 and a preliminary discussion of what accounts for better approaches to (en)gendered security during peacebuilding.  相似文献   

18.
By suggesting predictable and controllable patterns of development, the literature on global governance seems to simplify the world for decision-making tractability. In this respect, security narratives often remain analytically frozen, while the dynamics of global life are not. Relying on complexity thinking, this article both comments on the construction and potential reconstruction of the concept of security as it relates to the question of global governance and engages with the cognitive multiplicity of the notion of global security governance. Such an exploration suggests the need for the complexification of the discourses and practices of security governance through the adaptive contingency of “security as resilience”, which rejects the detachment between human and natural systems and the ability of the former to control the latter. The argument is that the logic of “security as resilience” is more appropriate than the conventional logic of “security as control”. In policy terms, therefore, the complexity of global security governance intimates an ability to cope with vulnerabilities, defy adversity and construct a new proficiency in response to the uncertainty, cognitive challenges, complex unbounded risks and the need for continuing adaptation prompted by the alterations in global life.  相似文献   

19.
ABSTRACT

This article assesses the role, influence and core aspects of the EU High Representatives’ (HR/VPs) “political leadership” in the context of their efforts to advance the institutionalisation of the EEAS and its crisis management structures in the post-Lisbon era. By combining analytical lenses from the literature on “European political leadership”, foreign policy analysis (FPA) and political psychology with insights from a wide range of semi-structured interviews and primary sources, the article analyses how the leadership approaches of Catherine Ashton and Federica Mogherini were influenced by core aspects, such as institutional setting, situational factors and “personal qualities”. By examining how both HR/VPs and their chosen advisors sought to shape the EU’s EEAS and crisis management institutions, scholars can gain important insights about how “personal qualities” and prior foreign policy experience can influence the HR/VPs strategic choices and their impact within and across the EEAS. Finally, the article considers the differing effects between “maverick” and “orthodox” leadership and approaches and concludes that whilst outside perspectives can bring fresh ideas and institutional innovations, they will fail to be of lasting significance and permanence if not accompanied by sufficient support from the dominant foreign and security policy conventions.  相似文献   

20.
How does branding militant groups as “Foreign Terrorist Organizations” (FTOs) affect them? Beyond its obvious policy importance, this question speaks to debates about counterterrorism, terrorism financing, and organizational dynamics of subnational violence. This article analyzes FTO designation, a key policy used by the U.S. government since 1997 to impose costs on foreign terrorist groups and those who might support them. Contrary to arguments that sanctions are ineffective and that terrorism is too “cheap” to be affected, it is argued that designation should weaken terrorist groups, reducing their attacks over time. However, the effect is probably conditional. FTO designation should be especially effective against groups operating in U.S.-aligned countries, given the importance of international cooperation in counterterrorism. Global quantitative analyses suggest that FTOs operating in U.S.-aligned countries carry out fewer attacks over time than other groups, taking many other factors into consideration.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号