Abstract
“Innocent lives” would be put at risk, Theresa May, then UK Home Secretary, told the House of Commons in January 2015, unless new legislation would give the security agencies “the capabilities they need” in the surveillance of email, social media, and other communications data (May 2015a). Her statement came one week after the terrorist attacks on the satirical magazine Charlie Hebdo and a kosher supermarket in Paris, which had evoked worldwide solidarity with the attacked (“Je suis Charlie”). In the face of “such threats” to the United Kingdom, May reaffirmed five months later, there was a “duty” to ensure that security services had the powers they needed “to keep us safe” (May 2015b).
A twenty-first-century political science that focuses on peaceful conflict settlement may be facing a number of domestic and international security dilemmas. These dilemmas might not least be cast in terms of the need to develop concepts of “soft” policing and de-radicalization strategies against millennialist violence, rather than relying solely on repressive measures which threaten fundamental democratic values, without actually offering prospects of success.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Former Washington District Judge James Robertson, who had served on FISC from 2002 to 2005, criticized in 2013 that the court had “turned into something like an administrative agency”, not least because it was ruling on “entire surveillance systems” (Braun 2013).
- 2.
Along with the US Senate Select Committee’s on Intelligence Committee Study of the Central Intelligence Agency’s Detention and Interrogation Program. Executive Summary (Washington 2012, Declassification Revisions and Release 2014), Blakeley’s and Raphael’s article provides required reading for anyone wishing to obtain a realistic picture about the dehumanizing impact of covert practices under the “war on terror” umbrella. (Ruth Blakeley is Professor of Politics and International Relations at Sheffield University. Sam Raphael works at Westminster University as Senior Lecturer in the same field.) In this context, Henning Glaser’s observation on the “functional value” of the recourse to torture warrants consideration: “The systematic transgression of a taboo conveys an important message. By breaking the taboo, the perpetrator [i.e., the United States] can demonstrate the fact of a sovereign foundation of a new order” (Glaser 2017b: 325). Using a term coined by Judith Butler, Blakeley and Raphael argued that UK agencies, exploiting the international extension of sovereign US power with regard to torture, were able to emerge as “petty sovereigns” (Blakeley and Raphael 2016: 245/246, 261). Their article also reveals that the extent of the UK government’s dissembling on British involvement in prisoner abuse would make a fitting addition to this book’s chapter on mendocracy.
References
Acharya, Arabinda (2017): “The Right War, the Just War? Assessing the Fight Against Terrorism Since 9/11.” In: Hennig Glaser (ed.): Talking to the Enemy. Deradicalization and Disengagement of Terrorists. Baden-Baden: Nomos, 35–66.
Altheide, David L. (2006): Terrorism and the Politics of Fear. Landam/Oxford: AltaMira Press.
Anderson, David (2015): A Question of Trust. Report of the Investigatory Powers Review. London: Crown Copyright. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/434399/IPR-Report-Web-Accessible1.pdf, accessed February 16, 2018.
Anderson, David (2016): Report of the Bulk Powers Review. London: Crown Copyright. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/546925/56730_Cm9326_WEB.PDF, accessed February 28, 2018.
Archick, Kristin/Belkin, Paul/Blanchard, Christopher M. et al. (2011): “Muslims in Europe: Promoting Integration and Countering Extremism.” Congressional Research Service. http://www.fas.org/sgp/crs/row/RL33166.pdf, accessed March 26, 2018.
Assemblée Nationale (2016): Rapport d’Information sur le Contrŏle Parlementaire de l’Etat d’Urgence. http://www2.assemblee-nationale.fr/documents/notice/14/rap-info/i4281/(index)depots, accessed March 16, 2018.
Atanassow, Ewa/Katznelson, Ira (2017): “Governing Exigencies: On Liberal Democracy and National Security.” In: Hertie School of Governance (ed.): The Governance Report 2017. Oxford: Oxford University Press, 95–110.
Awan, Imran (2012): “‘I Am a Muslim Not an Extremist’: How the Prevent Strategy Has Constructed a ‘Suspect’ Community.” Politics & Policy, Vol. 40, 1158–1185.
Banlaoi, Rommel C. (2017): “Counter-Terrorism Measures and De-Radicalization Efforts in Southeast Asia: A View From the Philippines.” In: Henning Glaser (ed.): Talking to the Enemy. Deradicalization and Disengagement of Terrorists. Baden-Baden: Nomos, 91–104.
Blakeley, Ruth/Raphael, Sam (2016): “British Torture in the ‘War on Terror’”. European Journal of International Relations, Vol. 23, 243–266.
Borges, Julian (2013): “NSA Files: Why the Guardian in London Destroyed Hard Drives of Leaked Files.” Guardian, August 20. https://www.theguardian.com/world/2013/aug/20/nsa-snowden-files-drives-destroyed-london, accessed March 1, 2018.
Braun, Stephen (2013): “Former Judge Admits Flaws With Secret FISA Court.” Associated Press/CBS News. https://www.cbsnews.com/news/former-judge-admits-flaws-with-secret-fisa-court/, accessed March 3, 2018.
Chassany, Anne-Sylvaine (2017): “France: The Permanent State of Emergency.” Financial Times, October 2. https://www.ft.com/content/f5309ff8-a521-11e7-9e4f-7f5e6a7c98a2, accessed March 16, 2018.
Engelhardt, Tom (2017): “‘Never Leave The House’: Locked In With The National Security State.” https://www.huffingtonpost.com/entry/never-leave-the-house-locked-in-with-the-na-tional-security-state_us_594827b9e4b07499199dd48b, accessed March 5, 2018.
Gellman, Barton/Soltani, Ashkan (2013): “NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say.” Washington Post, October 30. https://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html?utm_term=.70c0239b3d1, accessed March 2, 2018.
Glaser, Henning (2017a): “Talking to the ‘Enemy’: Counterterrorism and Communication – An Introduction”. In: id. (ed.): Talking to the Enemy. Deradicalization and Disengagement of Terrorists. Baden-Baden: Nomos, 11–34.
Glaser, Henning (2017b): “The Margin of Maneuver: Responding to the Terrorist Threat In Times of the Global War on Terror’s Third Phase”. In: id. (ed.): Talking to the Enemy, op. cit., 257–354.
Green, Miranda (2017): “Homeland Secretary: People Would ‘Never Leave The House’ If They Knew What I Knew.” CNN, May 26. https://edition.cnn.com/2017/05/26/politics/john-kelly-terror-threat-people-wouldnt-leave-the-house/index.html, accessed March 5, 2018.
Griffin, Andrew (2016): “Investigatory Powers Act Goes Into Force, Putting UK Citizens Under Intense New Spying regime.” Independent, December 31. https://www.independent.co.uk/life-style/gadgets-and-tech/news/investigatory-powers-act-bill-snoopers-charter-spying-law-powers-theresa-may-a7503616.html, accessed Feb. 16, 2018.
Gunaratna, Rohan (2017): “Fighting Terrorism With Smart Power: The Role of Community Engagement and Terrorist Rehabilitation.” In: Henning Glaser (ed.): Talking to the Enemy, op. cit., 67–89.
Husband, Charles (2011): British Multiculturalism, Social Cohesion and Public Security. Warsaw: Institute of Public Affairs.
Husband, Charles/Alam, Yunis (2011): Social Cohesion and Counter-Terrorism – A Policy Contradiction?, Bristol: Policy Press.
Jobard, Fabien (2017): “Terrorismus – nicht nur ein Problem der inneren Sicherheit.” Leviathan, Vol. 45, 592–599.
MacAskill, Ewen/Borger, Julian/Hopkins, Nick/Davies, Nick/Ball, James (2013): “GCHQ Taps Fibre-Optic Cables for Secret Access to World’s Communications”. Guardian, June 21. https://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa, accessed February 28, 2018.
Madison, Lucy (2013): “Obama Defends ‘Narrow’ Surveillance Programs.” CBS News, June 19. https://www.cbsnews.com/news/obama-defends-narrow-surveillance-programs/, accessed March 3, 2018.
May, Theresa (2015a): “Theresa May Says ‘Lives at Risk’ Without Data Surveillance.” BBC, January 14. http://www.bbc.com/news/uk-politics-30816331, accessed February 16, 2018.
May, Theresa (2015b): “Threats to UK ‘considerable and evolving’.” BBC, June 11. http://www.bbc.com/news/av/uk-33094318/theresa-may-threats-to-uk-considerable-and-evol-ving, accessed February 16, 2018.
Open Rights Group (2016): GCHQ and UK Mass Surveillance. Report, Chapter 9, March. https://www.openrightsgroup.org/assets/files/pdfs/reports/gchq/09-Conclusion__.pdf, accessed March 15, 2018.
Pickering, Sharon/McCulloch, Jude/Wright-Neville, David (2008): “Counter-Terrorism Policing: Towards Social Cohesion.” Crime, Law and Social Change, Vol. 50, 91–109.
Rudenstine, David (2016): The Age of Deference. The Supreme Court, National Security, and the Constitutional Order. New York: Oxford University Press.
Senghaas, Dieter (2013): Dieter Senghaas, Pioneer of Peace and Development Research. Springer Briefs on Pioneers in Science and Practice # 6. Heidelberg/New York 2013. [Quotes are from a 1974 essay included in the volume.]
Spalek, Basia (2010): “Community Policing, Trust, and Muslim Communities in Relation to ‘New Terrorism’.” Politics and Policy, Vol. 38, 798–815.
Tyler, Tom R./Schulhofer, Stephen/Huq, Aziz Z. (2010): “Legitimacy and Deterrence Effects in Counter-Terrorism Policing: A Study of Muslim Americans.” Law & Society Review, Vol. 44, 365–401.
Udall, Mark/Wyden, Ron (2013): “Udall, Wyden Call on National Security Agency Director to Clarify Comments on Effectiveness of Phone Data Collection Program.” U. S. Senate Press Release. June 13. https://www.wyden.senate.gov/news/press-releases/udall-wyden-call-on-national-security-agency-director-to-clarify-comments-on-effectiveness-of-phone-data-collec-tion-program, accessed March 14, 2018.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2019 The Author(s)
About this chapter
Cite this chapter
Eisfeld, R. (2019). Radicalization, Terrorism, Subversion of Civil Liberties. In: Empowering Citizens, Engaging the Public. Palgrave Macmillan, Singapore. https://doi.org/10.1007/978-981-13-5928-6_11
Download citation
DOI: https://doi.org/10.1007/978-981-13-5928-6_11
Published:
Publisher Name: Palgrave Macmillan, Singapore
Print ISBN: 978-981-13-5927-9
Online ISBN: 978-981-13-5928-6
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)