Advertisement

Securitization and Terroristization: Analyzing States’ Usage of the Rhetoric of Terrorism

  • Priya Dixit
Chapter
Part of the Staat – Souveränität – Nation book series (SSN)

Abstract

“Terrorism” remains “essentially contested” in its meaning and yet it is often and uncritically used by various actors. Here, I draw from and modify the Copenhagen School’s securitization theory to outline a “terroristization” approach. This terroristization approach is useful in studying and analyzing when rhetoric of terrorism is used and its sociopolitical consequences. A terroristization approach can be used to study how acts, actions, events become understood as “terrorism” as it focuses attention on how the term “terrorism” is used during specific interactions, what terrorism means, and to the sociopolitical and ethical implications of labeling practices. In doing so, it also draws attention to spaces and modes by which the usage of “terrorism” can be questioned and challenged. Additionally, a focus on the meaning-making of terrorism directs attention to how various violent acts are legitimated in different contexts and the self-other identities produced in the process of labelling actors, events, acts as “terrorist” (or not). This chapter also outlines a brief example of the consequences of terroristization, focusing specifically on post-9/11 debates and discussions on surveillance and monitoring by the US state.

Keywords

Kansas City Central Intelligence Agency Muslim Population Structural Violence Linguistic Practice 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Ackerman, S. (2014, November 24). 41 men targeted but 1,147 people killed: US drone strikes, the facts on the ground. The Guardian. http://www.theguardian.com/us-news/2014/nov/24/-sp-us-drone-strikes-kill-1147.
  2. American Civil Liberties Union (2014b). Factsheet: The NYPD Muslim surveillance program. https://www.aclu.org/national-security/factsheet-nypd-muslim-surveillance-program. Accessed 30 Nov 2014.
  3. Apuzzo, M., & Goldstein, J. (2014, April 15). New York drops unit that spied on Muslims. The New York Times. http://www.nytimes.com/2014/04/16/nyregion/police-unit-that-spied-on-muslims-is-disbanded.html?_r=0.
  4. Ashkenas, J., Fairfield, H., Keller, J., & Volpe, P. (2014, December 9). 7 key points from the CIA torture report. New York Times. http://www.nytimes.com/interactive/2014/12/09/world/cia-torture-report-key-points.html?_r=0.
  5. Bajekal, N. (2014, October 23). The rise of the lone wolf terrorist. Time.com. http://time.com/3533581/canada-ottawa-shooting-lone-wolf-terrorism/.
  6. Balzacq, T. (2005). The three faces of securitization: Political agency, audience and context. European Journal of International Relations, 11(2), 171–201.CrossRefGoogle Scholar
  7. Balzacq, T., & Guzzini, S. (2014). Introduction: What kind of theory—if any—is securitization? International Relations, 1–7. doi:10.1177/0047117814526606. (online first view)Google Scholar
  8. Balzacq, T., Guzzini, S., Williams, M. C., Waever, O., & Patomakki, H. (2014). Forum: What kind of theory—if any—is securitization? International Relations, 1–41. doi:10.1177/0047117814526606. (online first view)Google Scholar
  9. Becker, J., & Shane, S. (2012, May 29). Secret “kill list” proves a test of Obama’s principles and will. The New York Times. http://www.nytimes.com/2012/05/29/world/obamas-leadership-in-war-on-al-qaeda.html?pagewanted=all&_r=0.
  10. Bendery, J. (2014, December 13). Dianne Feinstein: No, the CIA did not use rectal hydration as ‘a medical procedure’ on detainees. The Huffington Post. http://www.huffingtonpost.com/2014/12/12/dianne-feinstein-cia-torture-report_n_6318336.html.
  11. Bigo, D. (2014). The (in)securitization practices of the three universes of EU border control: Military/Navy, border guards/police, database analysts. Security Dialogue, 45(3), 209–225.CrossRefGoogle Scholar
  12. Buzan, B., & Waever, O. (1997). Slippery? contradictory? sociologically untenable? The Copenhagen School replies. Review of International Studies, 23(2), 241–250.CrossRefGoogle Scholar
  13. Buzan, B., Waever, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder: Lynne Reiner Publishers.Google Scholar
  14. Buzan, B., & Waever, O. (2003). Regions and powers: The structure of international security. Cambridge: Cambridge University Press.Google Scholar
  15. City University of New York. (2013, March 11). Mapping Muslims: NYPD spying and its impact on American Muslims. http://www.law.cuny.edu/academics/clinics/immigration/clear/Mapping-Muslims.pdf.
  16. Dixit, P. (2013). US foreign policy and targeted Killings. In R. Carter. (Ed.), Cases in US foreign policy. Washington, DC: CQ Press.Google Scholar
  17. Electronic Frontier Foundation. (2014). NSA spying on Americans. Eff.org. https://www.eff.org/nsa-spying. Accessed 18 Dec 2014.
  18. Eriksson, J. (1999). Observers or advocates? On the political role of security analysts. Cooperation and Conflict, 34(3), 311–330.CrossRefGoogle Scholar
  19. Finn, P., & Nakashima, E. (2013). Obama defends sweeping surveillance efforts. The Washington Post. http://www.washingtonpost.com/politics/obama-defends-sweeping-surveillance-efforts/2013/06/07/2002290a-cf88-11e2-9f1a-1a7cdee20287_story.html.
  20. Friedersdorf, C. (2012, October 24). How team Obama justifies the killing of a 16-year old American. The Atlantic. http://www.theatlantic.com/politics/archive/2012/10/how-team-obama-justifies-the-killing-of-a-16-year-old-american/264028/.
  21. Friedersdorf, C. (2013, March 28). The horrifying effects of NYPD ethnic profiling on innocent Muslim Americans. The Atlantic. http://www.theatlantic.com/politics/archive/2013/03/the-horrifying-effects-of-nypd-ethnic-profiling-on-innocent-muslim-americans/274434/.
  22. Galtung, J. (1969). Violence, peace, peace research. Journal of Peace Research, 6(3), 167–191.CrossRefGoogle Scholar
  23. Galtung, J. (1990). Cultural violence. Journal of Peace Research, 27(3), 291–305.CrossRefGoogle Scholar
  24. Goldman, A., & Apuzzo, M. (2012, October 21). NYPD: Muslim spying led to no leads, terror cases. The Huffington Post. http://www.huffingtonpost.com/2012/08/21/nypd-muslim-spying-led-to_n_1817149.html.
  25. Guantanamo, C. (2014). Prisoners. http://www.closeguantanamo.org/Prisoners. Accessed 20 Dec 2014.
  26. Hansen, L. (2000). The Little Mermaid’s silent security dilemma and the absence of gender in the Copenhagen School. Millennium, 29(2), 285–306.CrossRefGoogle Scholar
  27. Hansen, L. (2012). Reconstructing desecuritisation: The normative-political in the Copenhagen School and directions for how to apply it. Review of International Studies, 38, 525–546.CrossRefGoogle Scholar
  28. Harper, S. (2014, October 22). Stephen Harper’s speech on the Ottawa shooting, full text. National Post. http://news.nationalpost.com/2014/10/22/stephen-harpers-speech-on-the-ottawa-shooting-full-text/.
  29. Harris, S., & Mak, T. (2014, December 9). The most gruesome moments in the CIA ‘torture report’. Daily Beast. http://www.thedailybeast.com/articles/2014/12/09/the-most-gruesome-moments-in-the-cia-torture-report.html.
  30. Helmer, A. (2014, December 15). ‘Lone wolf’ terror attacks hard to intercept: Expert. Ottawa Sun. http://www.ottawasun.com/2014/12/15/lone-wolf-terror-attacks-hard-to-intercept–expert.
  31. Herald, M. (2014, December 23). By the numbers. Miami Herald online. http://www.miamiherald.com/news/nation-world/world/americas/guantanamo/article2163210.html.
  32. Jackson, R., Breen Smyth, M., & Gunning, J. (Eds.). (2009). Critical terrorism studies: A new research agenda. New York: Routledge.Google Scholar
  33. Jensen, L. C. (2013). Seduced and surrounded by security: A post-structuralist take on Norwegian high north securitizing discourses. Cooperation and Conflict, 48(1), 80–99.CrossRefGoogle Scholar
  34. Kapitan, T. (2004). ’Terrorism’ as a method of terrorism. In G. Meggle. (Ed.), Ethics of terrorism and counterterrorism. Rutgers: Transactions Books.Google Scholar
  35. Karyotis, G. (2007). Securitization ofGreek terrorism and arrest of the revolutionary organization November 17. Cooperation and Conflict, 42(3), 271–293.CrossRefGoogle Scholar
  36. Kearney, L. (2014, October 24). NYC police say hatchet attack by Islam convert was terrorism. Reuters.com. http://www.reuters.com/article/2014/10/24/us-usa-newyork-hatchet-idUSKCN0IC2RG20141024.
  37. Lackey, K. (2014, October 25). NYC police: Hatchet attack was terrorist act. USA Today. http://www.usatoday.com/story/news/nation/2014/10/25/new-york-city-hatchet-attack/17899003/.
  38. Lauter, D. (2014, December 15). Majority in U.S. say CIA interrogation methods were justified. Los Angeles Times online. http://www.latimes.com/nation/politics/politicsnow/la-pn-cia-torture-poll-20141215-story.html.
  39. Lisle, D. (2013). Frontline leisure: Securitizing tourism in the war on terror. Security Dialogue, 44(2), 127–146.CrossRefGoogle Scholar
  40. MacAskill, E. (2013, June 10). Edward Snowden, NSA files source: “If they want to get you, in time they will”. The Guardian. http://www.theguardian.com/world/2013/jun/09/nsa-whistleblower-edward-snowden-why.
  41. Mazetti, M. (2014, December 26). After scrutiny, C.I.A. mandate is untouched. New York Times. http://www.nytimes.com/2014/12/27/us/politics/after-scrutiny-cia-mandate-is-untouched-.html.
  42. McDuffee, A. (2014, December 20). U.S. releases four Afghan detainees from Guantanamo. The Atlantic. http://www.theatlantic.com/international/archive/2014/12/us-releases-four-afghan-detainees-from-guantanamo/383968/.
  43. Mueller, J., & Stewart, M. (2012). The terrorism delusion: America’s overwrought response to September 11. International Security, 37(1), 81–110.CrossRefGoogle Scholar
  44. Murphy, D. (2014, December 5). US ‘terrorism’? What’s not being said about Kansas City, Austin attacks. Christian science monitor. http://www.csmonitor.com/World/Security-Watch/Backchannels/2014/1205/US-terrorism-What-s-not-being-said-about-Kansas-City-Austin-attacks.
  45. Pew Research Center. (2014, December 15). About half see CIA interrogation methods as justified. Pew Research Center for the People & the Press. http://www.people-press.org/2014/12/15/about-half-see-cia-interrogation-methods-as-justified/.
  46. Reilly, M. (2013, June 18). Obama defends NSA surveillance program; says it’s “transparent”. The Huffington Post. http://www.huffingtonpost.com/2013/06/17/obama-nsa-surveillance_n_3455771.html.
  47. Roe, P. (2012). Is securitization a ‘negative’ concept? Revisiting the normative debate over normal versus extraordinary politics. Security Dialogue, 43(3), 249–266.CrossRefGoogle Scholar
  48. Rushe, D., MacAskill, E., Cobain, I., Yuhas, A., & Laughland, O. (2014, December 11). Rectal rehydration and waterboarding: the CIA torture report’s grisliest findings. The Guardian. http://www.theguardian.com/us-news/2014/dec/09/cia-torture-report-worst-findings-waterboard-rectal.
  49. Schindler, S. (2013, July 2). Intervention—PRISM and the individualization of discipline and security. Antipode Foundation. http://antipodefoundation.org/2013/07/02/intervention-prism-and-the-individualization-of-discipline-and-security/. Accessed 10 Dec 2014.
  50. Schmid, A., & Jongman, A. (2006). Political terrorism. New Brunwick: Transaction Publishers.Google Scholar
  51. Serle, J. (2014, January 23). More than 2,400 dead as Obama’s drone campaign marks five years. The Bureau of Investigative Journalism. http://www.thebureauinvestigates.com/2014/01/23/more-than-2400-dead-as-obamas-drone-campaign-marks-five-years/.
  52. Shane, S. (2014, December 14). Backing C.I.A., Cheney revisits torture debate from Bush era. The New York Times. http://www.nytimes.com/2014/12/15/us/politics/cheney-senate-report-on-torture.html.
  53. Singer, P. (2014, December 10). Horrific details from the torture report. USA Today. http://www.usatoday.com/story/news/nation/2014/12/09/worst-horrors-cia-torture-report/20146081/.
  54. Skoll, G. (2007). Meanings of terrorism. International Journal for the Semiotics of Law, 20, 107–127.CrossRefGoogle Scholar
  55. Taureck, R. (2006). Securitisation theory and securitisation studies. Journal of International Relations and Development, 9, 53–61.CrossRefGoogle Scholar
  56. The White House. (2009, January 22). Exec. Order No. 13,491–Ensuring lawful interrogations. http://www.whitehouse.gov/the_press_office/EnsuringLawfulInterrogations.
  57. Vanden Heuvel, K., & Cohen, S. F. (2014, November 17). Edward Snowden: A “Nation” interview. The Nation. http://www.thenation.com/article/186129/snowden-exile-exclusive-interview.
  58. Vuori, J. (2008). Illocutionary logic and strands of securitization: Applying the theory of securitization to the study of non-democratic political orders. European Journal of International Relations, 14(1), 65–99.CrossRefGoogle Scholar
  59. Waldron, J. (2010). Torture, terror, and trade-offs: Philosophy for the White House. Oxford: Oxford University Press.Google Scholar
  60. Whitehead, T. (2014, December 29). U.K. pulls iconic royal guards from outside Buckingham Palace over fears of Ottawa-style lone wolf attacks. National Post. http://news.nationalpost.com/2014/12/29/u-k-pulls-iconic-royal-guards-from-outside-buckingham-palace-over-fears-over-isis-inspired-lone-wolf-attacks/.
  61. Williams, M. C. (2007). Words, images, enemies: Securitization and international politics. International Studies Quarterly, 47(4), 511–531.CrossRefGoogle Scholar
  62. Zavadski, K. (2014, December 9). 5 appalling takeaways from the senate’s CIA torture report. Nymag.com. http://nymag.com/daily/intelligencer/2014/12/senate-report-blasts-cia-torture-methods.html.

Copyright information

© Springer Fachmedien Wiesbaden 2016

Authors and Affiliations

  1. 1.Department of Political ScienceVirginia Polytechnic Institute & State UniversityBlacksburgUSA

Personalised recommendations