Abstract
Latest since the 9/11 attack on the World Trade Center in 2001, academic as well as public discourses in the West and elsewhere have shifted towards a perception that deems violent non-state actors, frequently associate with the term global terrorism, as the main threat to freedom and security. Thus, acts of violence that are not committed by non-state actors and have been labeled acts of (global) terrorism seldom make it into the news and do not necessarily receive the public and scholarly attention they deserve.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
- 2.
For the full text of the Protocol Additional to the Geneva Convention of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts (Protocol 1), 8 June 1977 see https://www.icrc.org/ihl/intro/470.
- 3.
In order to provide some examples, in addition to well-known outsourcing of violence through private security forces like Blackwater in the last Iraq war, Pakistan, for instance nurtured jihadist groups in the conflict over Kashmir with India that were later relocated to the Pakistan-Afghanistan borderlands (Dorronsoro 2012).
References
Ahmed, A. (2013). The thistle and the drone: How America’s war on terror became a global war on Tribal Islam. Washington, D.C.: Brookings Institution Press.
Blakeley, R. (2010). State terrorism in the social sciences: Theories, methods and concepts. In R. Jackson, E. Murphy, & S. Poynting (Eds.), Contemporary state terrorism: Theory and practice (pp. 12–25). London: Routledge.
Burt, J. M. (2010). Political violence in the authoritarian state of Peru: Silencing civil society. Houndmills: Palgrave Macmillan.
Chaliand, G., & Blin, A. (2007). Introduction. In G. Chaliand & A. Blin (Eds.), The history of terrorism: From antiquity to AL Qaeda (pp. 1–11). Berkeley: University of California Press.
Cobain, I. (Feb 6, 2013). More than 50 countries backed US project to torture terror suspects, report alleges. The Guardian, 17.
Dorronsoro, G. (2012). The transformation of the Afghanistan-Pakistan border. In S. Bashir & R. D. Crews (Eds.), Under the drones: Modern lives in the Afghanistan-Pakistan borderlands (pp. 30–44). Cambridge: Harvard University Press.
Dussel, E. (2013). Ethics of liberation: In the age of globalization and exclusion. Durham: Duke University Press.
Esparaza, M., Huttenbach, H. R., & Feierstein, D. (Eds.). (2010). State violence and genocide in Latin America: The Cold War years. London: Routledge.
Ganesan, N., & Kim, S. C. (Eds.). (2013). State violence in East Asia. Lexington: University Press of Kentucky.
Ghassem-Fachandi, P. (2012). Pogrom in Gujarat: Hindu nationalism and anti-Muslim violence in India. Princeton: Princeton University Press.
Goodin, R. E. (2006). What’s wrong with terrorism? Cambridge: Polity.
Hennis, W. (2009). Legitimacy: On a category of civil society. In W. Hennis (Ed.), Politics as practical science (pp. 77–120). Basingstoke: Palgrave Macmillan.
Höfer, M. F. (2013). Gezielte Tötungen: Terrorismusbekämpfung und die neuen Feinde der Menschheit. Tübingen: Mohr Siebeck.
Human Rights Watch. (2014). Saudi Arabia: New terrorism regulations assault rights. http://www.hrw.org/news/2014/03/20/saudi-arabia-new-terrorism-regulations-assault-rights. Accessed 20 Mar 2014.
Jackson, R. (2007). The Core Commitments of Critical Terrorism Studies. European Political Science, 6, 244–251.
Jackson, R., Smyth, M. B., & Gunning, J. (2009). Critical terrorism studies: Framing a new research agenda. In R. Jackson, M. B. Smyth, & J. Gunning (Eds.), Critical terrorism studies: A new research agenda (pp. 216–236). Abingdon: Routledge.
Jackson, R., Murphy, E., & Poynting, S. (Eds.). (2010). Contemporary state terrorism: Theory and practice. London: Routledge.
Neumann, P. R., & Smith, M. (2008). The strategy of terrorism: How it works, and why it fails. Oxon: Routledge.
Revealed: How torture was used to foil al-Qaeda 2010 plot to bomb two airliners 17 min before explosion (2015). http://www.independent.co.uk/news/uk/home-news/revealed-how-torture-was-used-to-foil-alqaeda-plot-to-bomb-two-airliners-17-minutes-before-explosion-10077722.html. Accessed 1 Mar 2015.
Shue, H. (1978). Torture. Philosophy & Public Affairs, 7(2), 124–143.
Siems, L. (2011). The torture report: What the documents say about America’s post-9/11 torture program. New York: OR Books.
Waldron, J. (2010). Torture, terror, and trade-Offs: Philosophy for the White House. Oxford: Oxford University Press.
Weber, M. (1980). Wirtschaft und Gesellschaft: Grundriß der verstehenden Soziologie. 5th rev ed. Tübingen: Mohr Siebeck.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Fachmedien Wiesbaden
About this chapter
Cite this chapter
Koch, B. (2016). Terror, Violence, Coercion: States and the Use of (Il)legitimate Force. In: Koch, B. (eds) State Terror, State Violence. Staat – Souveränität – Nation. Springer VS, Wiesbaden. https://doi.org/10.1007/978-3-658-11181-6_1
Download citation
DOI: https://doi.org/10.1007/978-3-658-11181-6_1
Published:
Publisher Name: Springer VS, Wiesbaden
Print ISBN: 978-3-658-11180-9
Online ISBN: 978-3-658-11181-6
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)