1,099
Views
4
CrossRef citations to date
0
Altmetric
Articles

Securing the Olympics: at what price?

 

Abstract

This study considers the ever-increasing preoccupation those countries hosting mega-sports events have with implementing security and counter-terrorism measures and the consequences of this upon the civil liberties of their citizens. From the seminal, and undoubtedly tragic, events of the Munich Olympics in 1972 until the most recent terrorist attack witnessed at a major sporting event – that which marred the close of the Boston marathon held in April 2013 – this piece reflects upon the full extent of the impact that counter-terrorism measures have had upon the activities of wider society, including the creation of an abnormal host environment prior to and during the sporting spectacle, not to mention its legacy long after the event in question has moved on to its next destination. It suggests that there is a very real danger that mega-sports events create a convenient context within which the impositions of security measures, which are only marginally justifiable in the context of the event in question, continue to be unquestioningly implemented.

Notes

 1.CitationToohey, ‘Mega Events, Fear, and Risk’; CitationSchimmel, ‘Deep Play’; and Bristow, M. ‘China's Olympic Security Dilemma’. BBC News, March 12, 2008, http://news.bbc.co.uk/2/hi/asia-pacific/7292025.stm (accessed January 20, 2011).

 2. Toohey and Taylor, ‘Mega Events, Fear, and Risk’ and CitationJennings, Foul! The Secret World of FIFA.

 3.CitationToohey, ‘Terrorism, Sport and Public Policy’.

 4.CitationBaker, ‘Terrorism’.

 5.CitationPalmer, ‘Outside the Imagined Community’.

 6.CitationHassan and O'Kane, ‘Terrorism and the Abnormality of Sport’.

 7.CitationBoyle and Haggerty, ‘Spectacular Security’.

 8.CitationCoaffee, ‘Strategic Security Planning’ and CitationBale, ‘Virtual Fandoms’.

 9. Schimmel, ‘Deep Play’.

10.CitationRichards, ‘Terrorism, the Olympics and Sport’.

11.CitationFalcous and Silk, ‘Olympic Bidding, Multicultural Nationalism’.

12.CitationSugden, ‘Watched by the Games’ and CitationToohey, Taylor, and Lee, ‘The FIFA World Cup 2002’.

13.CitationBeck, World Risk Society.

14. Coaffee, ‘Strategic Security Planning’.

15.CitationGiulianotti and Klauser, ‘Sport Mega-events and “Terrorism”’.

16.CitationJackson, ‘The Core Commitments’ and CitationJackson, Smyth, and Gunning, Critical Terrorism Studies.

17.CitationHaggerty and Ericson, ‘The Surveillant Assemblage’.

18.CitationToohey and Taylor, ‘Surveillance and Securitization’.

19.CitationLyon, ‘Surveillance, Power and Everyday Life’.

20.CitationFussey and Coaffee, ‘Balancing Local and Global Security Leitmotifs’; Bruce, I. ‘RAF Drones to be Used for 2012 Olympics Security’, The Herald, January 9, 2008, http://www.heraldscotland.com/raf-drones-to-be-used-for-2012-olympics-security-1.872224

21. Hassan and O'Kane, ‘Terrorism and the Abnormality of Sport’.

22.CitationAgamben, State of Exception.

23.CitationTaylor and Toohey, ‘Impacts of Terrorism-Related Safety’.

24. Giulianotti and Klauser, ‘Sport Mega-events and “terrorism”’.

25. Baker, ‘Terrorism’.

26.CitationBairner, ‘Soccer, Masculinity, and Violence’.

27. Fussey and Coaffee, ‘Balancing Local and Global Security Leitmotifs’.

28. Toohey and Taylor, ‘Surveillance and Securitization’.

29.CitationAtkinson and Young, ‘Shadowed by the Corpse of War’ and Atkinson and Young, ‘Terror Games’.

30.CitationSchimmel, ‘Protecting the NFL/Militarizing the Homeland’ and Schimmel, ‘Deep Play’.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.