Abstract
“Terrorism” remains “essentially contested” in its meaning and yet it is often and uncritically used by various actors. Here, I draw from and modify the Copenhagen School’s securitization theory to outline a “terroristization” approach. This terroristization approach is useful in studying and analyzing when rhetoric of terrorism is used and its sociopolitical consequences. A terroristization approach can be used to study how acts, actions, events become understood as “terrorism” as it focuses attention on how the term “terrorism” is used during specific interactions, what terrorism means, and to the sociopolitical and ethical implications of labeling practices. In doing so, it also draws attention to spaces and modes by which the usage of “terrorism” can be questioned and challenged. Additionally, a focus on the meaning-making of terrorism directs attention to how various violent acts are legitimated in different contexts and the self-other identities produced in the process of labelling actors, events, acts as “terrorist” (or not). This chapter also outlines a brief example of the consequences of terroristization, focusing specifically on post-9/11 debates and discussions on surveillance and monitoring by the US state.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
For more information on the report, please see the American Civil Liberties Union (ACLU’s) coverage of torture at: http://www.thetorturereport.org/. Harris and Mak (2014) have some additional features of the Report. Mazetti (2014) describes how there is a lack of accountability for those authorizing and conducting such acts.
- 2.
For a comprehensive overview of the developments of this and related programs, please see The Guardian’s “The NSA Files” web site at http://www.theguardian.com/us-news/the-nsa-files.
- 3.
The Associated Press first made the story public and the outcome of its investigations can be found here: http://www.ap.org/Index/AP-In-The-News/NYPD.
- 4.
- 5.
Hansen (2012) footnote no. 2 summarizes a series of readings on desecuritization and how it relates to the ethico-political aspects of security.
References
Ackerman, S. (2014, November 24). 41 men targeted but 1,147 people killed: US drone strikes, the facts on the ground. The Guardian. http://www.theguardian.com/us-news/2014/nov/24/-sp-us-drone-strikes-kill-1147.
American Civil Liberties Union (2014b). Factsheet: The NYPD Muslim surveillance program. https://www.aclu.org/national-security/factsheet-nypd-muslim-surveillance-program. Accessed 30 Nov 2014.
Apuzzo, M., & Goldstein, J. (2014, April 15). New York drops unit that spied on Muslims. The New York Times. http://www.nytimes.com/2014/04/16/nyregion/police-unit-that-spied-on-muslims-is-disbanded.html?_r=0.
Ashkenas, J., Fairfield, H., Keller, J., & Volpe, P. (2014, December 9). 7 key points from the CIA torture report. New York Times. http://www.nytimes.com/interactive/2014/12/09/world/cia-torture-report-key-points.html?_r=0.
Bajekal, N. (2014, October 23). The rise of the lone wolf terrorist. Time.com. http://time.com/3533581/canada-ottawa-shooting-lone-wolf-terrorism/.
Balzacq, T. (2005). The three faces of securitization: Political agency, audience and context. European Journal of International Relations, 11(2), 171–201.
Balzacq, T., & Guzzini, S. (2014). Introduction: What kind of theory—if any—is securitization? International Relations, 1–7. doi:10.1177/0047117814526606. (online first view)
Balzacq, T., Guzzini, S., Williams, M. C., Waever, O., & Patomakki, H. (2014). Forum: What kind of theory—if any—is securitization? International Relations, 1–41. doi:10.1177/0047117814526606. (online first view)
Becker, J., & Shane, S. (2012, May 29). Secret “kill list” proves a test of Obama’s principles and will. The New York Times. http://www.nytimes.com/2012/05/29/world/obamas-leadership-in-war-on-al-qaeda.html?pagewanted=all&_r=0.
Bendery, J. (2014, December 13). Dianne Feinstein: No, the CIA did not use rectal hydration as ‘a medical procedure’ on detainees. The Huffington Post. http://www.huffingtonpost.com/2014/12/12/dianne-feinstein-cia-torture-report_n_6318336.html.
Bigo, D. (2014). The (in)securitization practices of the three universes of EU border control: Military/Navy, border guards/police, database analysts. Security Dialogue, 45(3), 209–225.
Buzan, B., & Waever, O. (1997). Slippery? contradictory? sociologically untenable? The Copenhagen School replies. Review of International Studies, 23(2), 241–250.
Buzan, B., Waever, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder: Lynne Reiner Publishers.
Buzan, B., & Waever, O. (2003). Regions and powers: The structure of international security. Cambridge: Cambridge University Press.
City University of New York. (2013, March 11). Mapping Muslims: NYPD spying and its impact on American Muslims. http://www.law.cuny.edu/academics/clinics/immigration/clear/Mapping-Muslims.pdf.
Dixit, P. (2013). US foreign policy and targeted Killings. In R. Carter. (Ed.), Cases in US foreign policy. Washington, DC: CQ Press.
Electronic Frontier Foundation. (2014). NSA spying on Americans. Eff.org. https://www.eff.org/nsa-spying. Accessed 18 Dec 2014.
Eriksson, J. (1999). Observers or advocates? On the political role of security analysts. Cooperation and Conflict, 34(3), 311–330.
Finn, P., & Nakashima, E. (2013). Obama defends sweeping surveillance efforts. The Washington Post. http://www.washingtonpost.com/politics/obama-defends-sweeping-surveillance-efforts/2013/06/07/2002290a-cf88-11e2-9f1a-1a7cdee20287_story.html.
Friedersdorf, C. (2012, October 24). How team Obama justifies the killing of a 16-year old American. The Atlantic. http://www.theatlantic.com/politics/archive/2012/10/how-team-obama-justifies-the-killing-of-a-16-year-old-american/264028/.
Friedersdorf, C. (2013, March 28). The horrifying effects of NYPD ethnic profiling on innocent Muslim Americans. The Atlantic. http://www.theatlantic.com/politics/archive/2013/03/the-horrifying-effects-of-nypd-ethnic-profiling-on-innocent-muslim-americans/274434/.
Galtung, J. (1969). Violence, peace, peace research. Journal of Peace Research, 6(3), 167–191.
Galtung, J. (1990). Cultural violence. Journal of Peace Research, 27(3), 291–305.
Goldman, A., & Apuzzo, M. (2012, October 21). NYPD: Muslim spying led to no leads, terror cases. The Huffington Post. http://www.huffingtonpost.com/2012/08/21/nypd-muslim-spying-led-to_n_1817149.html.
Guantanamo, C. (2014). Prisoners. http://www.closeguantanamo.org/Prisoners. Accessed 20 Dec 2014.
Hansen, L. (2000). The Little Mermaid’s silent security dilemma and the absence of gender in the Copenhagen School. Millennium, 29(2), 285–306.
Hansen, L. (2012). Reconstructing desecuritisation: The normative-political in the Copenhagen School and directions for how to apply it. Review of International Studies, 38, 525–546.
Harper, S. (2014, October 22). Stephen Harper’s speech on the Ottawa shooting, full text. National Post. http://news.nationalpost.com/2014/10/22/stephen-harpers-speech-on-the-ottawa-shooting-full-text/.
Harris, S., & Mak, T. (2014, December 9). The most gruesome moments in the CIA ‘torture report’. Daily Beast. http://www.thedailybeast.com/articles/2014/12/09/the-most-gruesome-moments-in-the-cia-torture-report.html.
Helmer, A. (2014, December 15). ‘Lone wolf’ terror attacks hard to intercept: Expert. Ottawa Sun. http://www.ottawasun.com/2014/12/15/lone-wolf-terror-attacks-hard-to-intercept–expert.
Herald, M. (2014, December 23). By the numbers. Miami Herald online. http://www.miamiherald.com/news/nation-world/world/americas/guantanamo/article2163210.html.
Jackson, R., Breen Smyth, M., & Gunning, J. (Eds.). (2009). Critical terrorism studies: A new research agenda. New York: Routledge.
Jensen, L. C. (2013). Seduced and surrounded by security: A post-structuralist take on Norwegian high north securitizing discourses. Cooperation and Conflict, 48(1), 80–99.
Kapitan, T. (2004). ’Terrorism’ as a method of terrorism. In G. Meggle. (Ed.), Ethics of terrorism and counterterrorism. Rutgers: Transactions Books.
Karyotis, G. (2007). Securitization ofGreek terrorism and arrest of the revolutionary organization November 17. Cooperation and Conflict, 42(3), 271–293.
Kearney, L. (2014, October 24). NYC police say hatchet attack by Islam convert was terrorism. Reuters.com. http://www.reuters.com/article/2014/10/24/us-usa-newyork-hatchet-idUSKCN0IC2RG20141024.
Lackey, K. (2014, October 25). NYC police: Hatchet attack was terrorist act. USA Today. http://www.usatoday.com/story/news/nation/2014/10/25/new-york-city-hatchet-attack/17899003/.
Lauter, D. (2014, December 15). Majority in U.S. say CIA interrogation methods were justified. Los Angeles Times online. http://www.latimes.com/nation/politics/politicsnow/la-pn-cia-torture-poll-20141215-story.html.
Lisle, D. (2013). Frontline leisure: Securitizing tourism in the war on terror. Security Dialogue, 44(2), 127–146.
MacAskill, E. (2013, June 10). Edward Snowden, NSA files source: “If they want to get you, in time they will”. The Guardian. http://www.theguardian.com/world/2013/jun/09/nsa-whistleblower-edward-snowden-why.
Mazetti, M. (2014, December 26). After scrutiny, C.I.A. mandate is untouched. New York Times. http://www.nytimes.com/2014/12/27/us/politics/after-scrutiny-cia-mandate-is-untouched-.html.
McDuffee, A. (2014, December 20). U.S. releases four Afghan detainees from Guantanamo. The Atlantic. http://www.theatlantic.com/international/archive/2014/12/us-releases-four-afghan-detainees-from-guantanamo/383968/.
Mueller, J., & Stewart, M. (2012). The terrorism delusion: America’s overwrought response to September 11. International Security, 37(1), 81–110.
Murphy, D. (2014, December 5). US ‘terrorism’? What’s not being said about Kansas City, Austin attacks. Christian science monitor. http://www.csmonitor.com/World/Security-Watch/Backchannels/2014/1205/US-terrorism-What-s-not-being-said-about-Kansas-City-Austin-attacks.
Pew Research Center. (2014, December 15). About half see CIA interrogation methods as justified. Pew Research Center for the People & the Press. http://www.people-press.org/2014/12/15/about-half-see-cia-interrogation-methods-as-justified/.
Reilly, M. (2013, June 18). Obama defends NSA surveillance program; says it’s “transparent”. The Huffington Post. http://www.huffingtonpost.com/2013/06/17/obama-nsa-surveillance_n_3455771.html.
Roe, P. (2012). Is securitization a ‘negative’ concept? Revisiting the normative debate over normal versus extraordinary politics. Security Dialogue, 43(3), 249–266.
Rushe, D., MacAskill, E., Cobain, I., Yuhas, A., & Laughland, O. (2014, December 11). Rectal rehydration and waterboarding: the CIA torture report’s grisliest findings. The Guardian. http://www.theguardian.com/us-news/2014/dec/09/cia-torture-report-worst-findings-waterboard-rectal.
Schindler, S. (2013, July 2). Intervention—PRISM and the individualization of discipline and security. Antipode Foundation. http://antipodefoundation.org/2013/07/02/intervention-prism-and-the-individualization-of-discipline-and-security/. Accessed 10 Dec 2014.
Schmid, A., & Jongman, A. (2006). Political terrorism. New Brunwick: Transaction Publishers.
Serle, J. (2014, January 23). More than 2,400 dead as Obama’s drone campaign marks five years. The Bureau of Investigative Journalism. http://www.thebureauinvestigates.com/2014/01/23/more-than-2400-dead-as-obamas-drone-campaign-marks-five-years/.
Shane, S. (2014, December 14). Backing C.I.A., Cheney revisits torture debate from Bush era. The New York Times. http://www.nytimes.com/2014/12/15/us/politics/cheney-senate-report-on-torture.html.
Singer, P. (2014, December 10). Horrific details from the torture report. USA Today. http://www.usatoday.com/story/news/nation/2014/12/09/worst-horrors-cia-torture-report/20146081/.
Skoll, G. (2007). Meanings of terrorism. International Journal for the Semiotics of Law, 20, 107–127.
Taureck, R. (2006). Securitisation theory and securitisation studies. Journal of International Relations and Development, 9, 53–61.
The White House. (2009, January 22). Exec. Order No. 13,491–Ensuring lawful interrogations. http://www.whitehouse.gov/the_press_office/EnsuringLawfulInterrogations.
Vanden Heuvel, K., & Cohen, S. F. (2014, November 17). Edward Snowden: A “Nation” interview. The Nation. http://www.thenation.com/article/186129/snowden-exile-exclusive-interview.
Vuori, J. (2008). Illocutionary logic and strands of securitization: Applying the theory of securitization to the study of non-democratic political orders. European Journal of International Relations, 14(1), 65–99.
Waldron, J. (2010). Torture, terror, and trade-offs: Philosophy for the White House. Oxford: Oxford University Press.
Whitehead, T. (2014, December 29). U.K. pulls iconic royal guards from outside Buckingham Palace over fears of Ottawa-style lone wolf attacks. National Post. http://news.nationalpost.com/2014/12/29/u-k-pulls-iconic-royal-guards-from-outside-buckingham-palace-over-fears-over-isis-inspired-lone-wolf-attacks/.
Williams, M. C. (2007). Words, images, enemies: Securitization and international politics. International Studies Quarterly, 47(4), 511–531.
Zavadski, K. (2014, December 9). 5 appalling takeaways from the senate’s CIA torture report. Nymag.com. http://nymag.com/daily/intelligencer/2014/12/senate-report-blasts-cia-torture-methods.html.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Fachmedien Wiesbaden
About this chapter
Cite this chapter
Dixit, P. (2016). Securitization and Terroristization: Analyzing States’ Usage of the Rhetoric of Terrorism. In: Koch, B. (eds) State Terror, State Violence. Staat – Souveränität – Nation. Springer VS, Wiesbaden. https://doi.org/10.1007/978-3-658-11181-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-658-11181-6_3
Published:
Publisher Name: Springer VS, Wiesbaden
Print ISBN: 978-3-658-11180-9
Online ISBN: 978-3-658-11181-6
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)