Radicalization, Terrorism, Subversion of Civil Liberties
“Innocent lives” would be put at risk, Theresa May, then UK Home Secretary, told the House of Commons in January 2015, unless new legislation would give the security agencies “the capabilities they need” in the surveillance of email, social media, and other communications data (May 2015a). Her statement came one week after the terrorist attacks on the satirical magazine Charlie Hebdo and a kosher supermarket in Paris, which had evoked worldwide solidarity with the attacked (“Je suis Charlie”). In the face of “such threats” to the United Kingdom, May reaffirmed five months later, there was a “duty” to ensure that security services had the powers they needed “to keep us safe” (May 2015b).
- Altheide, David L. (2006): Terrorism and the Politics of Fear. Landam/Oxford: AltaMira Press.Google Scholar
- Anderson, David (2015): A Question of Trust. Report of the Investigatory Powers Review. London: Crown Copyright. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/434399/IPR-Report-Web-Accessible1.pdf, accessed February 16, 2018.
- Anderson, David (2016): Report of the Bulk Powers Review. London: Crown Copyright. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/546925/56730_Cm9326_WEB.PDF, accessed February 28, 2018.
- Archick, Kristin/Belkin, Paul/Blanchard, Christopher M. et al. (2011): “Muslims in Europe: Promoting Integration and Countering Extremism.” Congressional Research Service. http://www.fas.org/sgp/crs/row/RL33166.pdf, accessed March 26, 2018.
- Assemblée Nationale (2016): Rapport d’Information sur le Contrŏle Parlementaire de l’Etat d’Urgence. http://www2.assemblee-nationale.fr/documents/notice/14/rap-info/i4281/(index)depots, accessed March 16, 2018.
- Atanassow, Ewa/Katznelson, Ira (2017): “Governing Exigencies: On Liberal Democracy and National Security.” In: Hertie School of Governance (ed.): The Governance Report 2017. Oxford: Oxford University Press, 95–110.Google Scholar
- Borges, Julian (2013): “NSA Files: Why the Guardian in London Destroyed Hard Drives of Leaked Files.” Guardian, August 20. https://www.theguardian.com/world/2013/aug/20/nsa-snowden-files-drives-destroyed-london, accessed March 1, 2018.
- Braun, Stephen (2013): “Former Judge Admits Flaws With Secret FISA Court.” Associated Press/CBS News. https://www.cbsnews.com/news/former-judge-admits-flaws-with-secret-fisa-court/, accessed March 3, 2018.
- Chassany, Anne-Sylvaine (2017): “France: The Permanent State of Emergency.” Financial Times, October 2. https://www.ft.com/content/f5309ff8-a521-11e7-9e4f-7f5e6a7c98a2, accessed March 16, 2018.
- Engelhardt, Tom (2017): “‘Never Leave The House’: Locked In With The National Security State.” https://www.huffingtonpost.com/entry/never-leave-the-house-locked-in-with-the-na-tional-security-state_us_594827b9e4b07499199dd48b, accessed March 5, 2018.
- Gellman, Barton/Soltani, Ashkan (2013): “NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say.” Washington Post, October 30. https://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html?utm_term=.70c0239b3d1, accessed March 2, 2018.
- Green, Miranda (2017): “Homeland Secretary: People Would ‘Never Leave The House’ If They Knew What I Knew.” CNN, May 26. https://edition.cnn.com/2017/05/26/politics/john-kelly-terror-threat-people-wouldnt-leave-the-house/index.html, accessed March 5, 2018.
- Griffin, Andrew (2016): “Investigatory Powers Act Goes Into Force, Putting UK Citizens Under Intense New Spying regime.” Independent, December 31. https://www.independent.co.uk/life-style/gadgets-and-tech/news/investigatory-powers-act-bill-snoopers-charter-spying-law-powers-theresa-may-a7503616.html, accessed Feb. 16, 2018.
- Husband, Charles (2011): British Multiculturalism, Social Cohesion and Public Security. Warsaw: Institute of Public Affairs.Google Scholar
- Husband, Charles/Alam, Yunis (2011): Social Cohesion and Counter-Terrorism – A Policy Contradiction?, Bristol: Policy Press.Google Scholar
- MacAskill, Ewen/Borger, Julian/Hopkins, Nick/Davies, Nick/Ball, James (2013): “GCHQ Taps Fibre-Optic Cables for Secret Access to World’s Communications”. Guardian, June 21. https://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa, accessed February 28, 2018.
- Madison, Lucy (2013): “Obama Defends ‘Narrow’ Surveillance Programs.” CBS News, June 19. https://www.cbsnews.com/news/obama-defends-narrow-surveillance-programs/, accessed March 3, 2018.
- May, Theresa (2015a): “Theresa May Says ‘Lives at Risk’ Without Data Surveillance.” BBC, January 14. http://www.bbc.com/news/uk-politics-30816331, accessed February 16, 2018.
- May, Theresa (2015b): “Threats to UK ‘considerable and evolving’.” BBC, June 11. http://www.bbc.com/news/av/uk-33094318/theresa-may-threats-to-uk-considerable-and-evol-ving, accessed February 16, 2018.
- Open Rights Group (2016): GCHQ and UK Mass Surveillance. Report, Chapter 9, March. https://www.openrightsgroup.org/assets/files/pdfs/reports/gchq/09-Conclusion__.pdf, accessed March 15, 2018.
- Rudenstine, David (2016): The Age of Deference. The Supreme Court, National Security, and the Constitutional Order. New York: Oxford University Press.Google Scholar
- Udall, Mark/Wyden, Ron (2013): “Udall, Wyden Call on National Security Agency Director to Clarify Comments on Effectiveness of Phone Data Collection Program.” U. S. Senate Press Release. June 13. https://www.wyden.senate.gov/news/press-releases/udall-wyden-call-on-national-security-agency-director-to-clarify-comments-on-effectiveness-of-phone-data-collec-tion-program, accessed March 14, 2018.