Abstract
On Thursday, 12 February 2015, the Counter-Terrorism and Security Bill received Royal Assent, becoming the Counter-Terrorism and Security Act (CTSA 2015) less than three months after the first reading was held in the House of Commons on 26 November 2014. Just over four decades after the first temporary counterterrorism law was introduced, similar measures continue to be passed, legitimized through a necessity of preventing a threat of terrorism constructed as threatening physical and societal insecurity. Such a dual focus on what referent’s survival is at risk brings us back to the earliest days of counterterrorism policy formation and discourses of legitimation. In a House of Commons debate in December 2014 on the then proposed CTSA, Secretary of State for the Home Department Theresa May (Con) started discussion in stating that “when our security and intelligence agencies tell us that the threat that we face is now more dangerous than at any time before or since 9/11, we must act”.1 The following month (January of 2015), Parliamentary Under-Secretary of State for the Home Office Lord Bates (Con) called upon articulations of self and other reminiscent of past discourse in claiming, “[w]e are in the middle of a generational struggle against a ruthless terrorist ideology that challenges the core values of our society. Those charged with our security must be properly equipped to do the job that we ask of them to maintain a free, open and tolerant nation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Notes
Buzan et al., Security; Stefano Guzzini and Dietrich Jung, eds., Contemporary Security Analysis and Copenhagen Peace Research (London: Routledge, 2004). See also Buzan, People, States, and Fear.
Aradau, “Security and the democratic scene”; Floyd, “Can securitization theory be used in normative analysis?”; Holger Stritzel, “Towards a Theory of Securitization: Copenhagen and Beyond,” European Journal of International Relations, 13, no. 3 (2007): 357–384; Mark B. Salter, “When securitization fails,” in Securitization Theory.
On fixed-fluid debates of identity see Bill McSweeney, “Interests and Identity in the Construction of the Belfast Agreement,” Security Dialogue 29, no. 3 (1999): 303–314.
Author information
Authors and Affiliations
Copyright information
© 2015 Kathryn Marie Fisher
About this chapter
Cite this chapter
Fisher, K.M. (2015). (starting) Conclusions. In: Security, Identity, and British Counterterrorism Policy. New Security Challenges. Palgrave Macmillan, London. https://doi.org/10.1007/978-1-137-52422-5_9
Download citation
DOI: https://doi.org/10.1007/978-1-137-52422-5_9
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-57208-3
Online ISBN: 978-1-137-52422-5
eBook Packages: Palgrave Political Science CollectionPolitical Science and International Studies (R0)