Advertisement

Radicalization, Terrorism, Subversion of Civil Liberties

Conundrums of Twenty-First-Century Political Science
  • Rainer EisfeldEmail author
Chapter

Abstract

“Innocent lives” would be put at risk, Theresa May, then UK Home Secretary, told the House of Commons in January 2015, unless new legislation would give the security agencies “the capabilities they need” in the surveillance of email, social media, and other communications data (May 2015a). Her statement came one week after the terrorist attacks on the satirical magazine Charlie Hebdo and a kosher supermarket in Paris, which had evoked worldwide solidarity with the attacked (“Je suis Charlie”). In the face of “such threats” to the United Kingdom, May reaffirmed five months later, there was a “duty” to ensure that security services had the powers they needed “to keep us safe” (May 2015b).

References

  1. Acharya, Arabinda (2017): “The Right War, the Just War? Assessing the Fight Against Terrorism Since 9/11.” In: Hennig Glaser (ed.): Talking to the Enemy. Deradicalization and Disengagement of Terrorists. Baden-Baden: Nomos, 35–66.CrossRefGoogle Scholar
  2. Altheide, David L. (2006): Terrorism and the Politics of Fear. Landam/Oxford: AltaMira Press.Google Scholar
  3. Anderson, David (2015): A Question of Trust. Report of the Investigatory Powers Review. London: Crown Copyright. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/434399/IPR-Report-Web-Accessible1.pdf, accessed February 16, 2018.
  4. Anderson, David (2016): Report of the Bulk Powers Review. London: Crown Copyright. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/546925/56730_Cm9326_WEB.PDF, accessed February 28, 2018.
  5. Archick, Kristin/Belkin, Paul/Blanchard, Christopher M. et al. (2011): “Muslims in Europe: Promoting Integration and Countering Extremism.” Congressional Research Service. http://www.fas.org/sgp/crs/row/RL33166.pdf, accessed March 26, 2018.
  6. Assemblée Nationale (2016): Rapport d’Information sur le Contrŏle Parlementaire de l’Etat d’Urgence. http://www2.assemblee-nationale.fr/documents/notice/14/rap-info/i4281/(index)depots, accessed March 16, 2018.
  7. Atanassow, Ewa/Katznelson, Ira (2017): “Governing Exigencies: On Liberal Democracy and National Security.” In: Hertie School of Governance (ed.): The Governance Report 2017. Oxford: Oxford University Press, 95–110.Google Scholar
  8. Awan, Imran (2012): “‘I Am a Muslim Not an Extremist’: How the Prevent Strategy Has Constructed a ‘Suspect’ Community.” Politics & Policy, Vol. 40, 1158–1185.CrossRefGoogle Scholar
  9. Banlaoi, Rommel C. (2017): “Counter-Terrorism Measures and De-Radicalization Efforts in Southeast Asia: A View From the Philippines.” In: Henning Glaser (ed.): Talking to the Enemy. Deradicalization and Disengagement of Terrorists. Baden-Baden: Nomos, 91–104.CrossRefGoogle Scholar
  10. Blakeley, Ruth/Raphael, Sam (2016): “British Torture in the ‘War on Terror’”. European Journal of International Relations, Vol. 23, 243–266.CrossRefGoogle Scholar
  11. Borges, Julian (2013): “NSA Files: Why the Guardian in London Destroyed Hard Drives of Leaked Files.” Guardian, August 20. https://www.theguardian.com/world/2013/aug/20/nsa-snowden-files-drives-destroyed-london, accessed March 1, 2018.
  12. Braun, Stephen (2013): “Former Judge Admits Flaws With Secret FISA Court.” Associated Press/CBS News. https://www.cbsnews.com/news/former-judge-admits-flaws-with-secret-fisa-court/, accessed March 3, 2018.
  13. Chassany, Anne-Sylvaine (2017): “France: The Permanent State of Emergency.” Financial Times, October 2. https://www.ft.com/content/f5309ff8-a521-11e7-9e4f-7f5e6a7c98a2, accessed March 16, 2018.
  14. Engelhardt, Tom (2017): “‘Never Leave The House’: Locked In With The National Security State.” https://www.huffingtonpost.com/entry/never-leave-the-house-locked-in-with-the-na-tional-security-state_us_594827b9e4b07499199dd48b, accessed March 5, 2018.
  15. Gellman, Barton/Soltani, Ashkan (2013): “NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say.” Washington Post, October 30. https://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html?utm_term=.70c0239b3d1, accessed March 2, 2018.
  16. Glaser, Henning (2017a): “Talking to the ‘Enemy’: Counterterrorism and Communication – An Introduction”. In: id. (ed.): Talking to the Enemy. Deradicalization and Disengagement of Terrorists. Baden-Baden: Nomos, 11–34.CrossRefGoogle Scholar
  17. Glaser, Henning (2017b): “The Margin of Maneuver: Responding to the Terrorist Threat In Times of the Global War on Terror’s Third Phase”. In: id. (ed.): Talking to the Enemy, op. cit., 257–354.CrossRefGoogle Scholar
  18. Green, Miranda (2017): “Homeland Secretary: People Would ‘Never Leave The House’ If They Knew What I Knew.” CNN, May 26. https://edition.cnn.com/2017/05/26/politics/john-kelly-terror-threat-people-wouldnt-leave-the-house/index.html, accessed March 5, 2018.
  19. Griffin, Andrew (2016): “Investigatory Powers Act Goes Into Force, Putting UK Citizens Under Intense New Spying regime.” Independent, December 31. https://www.independent.co.uk/life-style/gadgets-and-tech/news/investigatory-powers-act-bill-snoopers-charter-spying-law-powers-theresa-may-a7503616.html, accessed Feb. 16, 2018.
  20. Gunaratna, Rohan (2017): “Fighting Terrorism With Smart Power: The Role of Community Engagement and Terrorist Rehabilitation.” In: Henning Glaser (ed.): Talking to the Enemy, op. cit., 67–89.CrossRefGoogle Scholar
  21. Husband, Charles (2011): British Multiculturalism, Social Cohesion and Public Security. Warsaw: Institute of Public Affairs.Google Scholar
  22. Husband, Charles/Alam, Yunis (2011): Social Cohesion and Counter-Terrorism – A Policy Contradiction?, Bristol: Policy Press.Google Scholar
  23. Jobard, Fabien (2017): “Terrorismus – nicht nur ein Problem der inneren Sicherheit.” Leviathan, Vol. 45, 592–599.CrossRefGoogle Scholar
  24. MacAskill, Ewen/Borger, Julian/Hopkins, Nick/Davies, Nick/Ball, James (2013): “GCHQ Taps Fibre-Optic Cables for Secret Access to World’s Communications”. Guardian, June 21. https://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa, accessed February 28, 2018.
  25. Madison, Lucy (2013): “Obama Defends ‘Narrow’ Surveillance Programs.” CBS News, June 19. https://www.cbsnews.com/news/obama-defends-narrow-surveillance-programs/, accessed March 3, 2018.
  26. May, Theresa (2015a): “Theresa May Says ‘Lives at Risk’ Without Data Surveillance.” BBC, January 14. http://www.bbc.com/news/uk-politics-30816331, accessed February 16, 2018.
  27. May, Theresa (2015b): “Threats to UK ‘considerable and evolving’.” BBC, June 11. http://www.bbc.com/news/av/uk-33094318/theresa-may-threats-to-uk-considerable-and-evol-ving, accessed February 16, 2018.
  28. Open Rights Group (2016): GCHQ and UK Mass Surveillance. Report, Chapter 9, March. https://www.openrightsgroup.org/assets/files/pdfs/reports/gchq/09-Conclusion__.pdf, accessed March 15, 2018.
  29. Pickering, Sharon/McCulloch, Jude/Wright-Neville, David (2008): “Counter-Terrorism Policing: Towards Social Cohesion.” Crime, Law and Social Change, Vol. 50, 91–109.CrossRefGoogle Scholar
  30. Rudenstine, David (2016): The Age of Deference. The Supreme Court, National Security, and the Constitutional Order. New York: Oxford University Press.Google Scholar
  31. Senghaas, Dieter (2013): Dieter Senghaas, Pioneer of Peace and Development Research. Springer Briefs on Pioneers in Science and Practice # 6. Heidelberg/New York 2013. [Quotes are from a 1974 essay included in the volume.]CrossRefGoogle Scholar
  32. Spalek, Basia (2010): “Community Policing, Trust, and Muslim Communities in Relation to ‘New Terrorism’.” Politics and Policy, Vol. 38, 798–815.CrossRefGoogle Scholar
  33. Tyler, Tom R./Schulhofer, Stephen/Huq, Aziz Z. (2010): “Legitimacy and Deterrence Effects in Counter-Terrorism Policing: A Study of Muslim Americans.” Law & Society Review, Vol. 44, 365–401.CrossRefGoogle Scholar
  34. Udall, Mark/Wyden, Ron (2013): “Udall, Wyden Call on National Security Agency Director to Clarify Comments on Effectiveness of Phone Data Collection Program.” U. S. Senate Press Release. June 13. https://www.wyden.senate.gov/news/press-releases/udall-wyden-call-on-national-security-agency-director-to-clarify-comments-on-effectiveness-of-phone-data-collec-tion-program, accessed March 14, 2018.

Copyright information

© The Author(s) 2019

Authors and Affiliations

  1. 1.Fachbereich 1Osnabrück UniversityOsnabrückGermany

Personalised recommendations