6,093
Views
60
CrossRef citations to date
0
Altmetric
Articles

The epistemological crisis of counterterrorism

Pages 33-54 | Received 21 Oct 2014, Accepted 18 Dec 2014, Published online: 09 Apr 2015

References

  • Aradau, C., and R. Van Munster. 2007. “Governing Terrorism Through Risk: Taking Precautions, (Un)Knowing the Future.” European Journal of International Relations 13 (1): 89–115. doi:10.1177/1354066107074290.
  • Araj, B. 2008. “Harsh State Repression as a Cause of Suicide Bombing: The Case of the Palestinian-Israeli Conflict.” Studies in Conflict & Terrorism 31 (4): 284–303. doi:10.1080/10576100801925273.
  • Baker-Beall, C., and N. Robinson. 2014. “The Emergence of the Security-Industrial Complex.” In Neoliberalism and/as Terror: Critical Studies on Terrorism Working Group (CSTWG) Annual Conference, September 15–16. Nottingham: Nottingham Trent University.
  • Baudrillard, J. 1994. Simulacra and Simulation. Ann Arbor: University of Michigan Press.
  • Beck, U. 1992. Risk Society: Towards a New Modernity. London: Sage.
  • Beck, U. 1996. “World Risk Society as Cosmopolitan Society?: Ecological Questions in a Framework of Manufactured Uncertainties.” Theory, Culture and Society 13 (4): 1–32. doi:10.1177/0263276496013004001.
  • Bin Laden, O. 2002. “Letter to America.” The Observer, November 24. Accessed September 2, 2012. http://www.guardian.co.uk/world/2002/nov/24/theobserver.
  • Campbell, D. 1998a. Writing Security: United States Foreign Policy and the Politics of Identity (Revised). Manchester: Manchester University Press.
  • Campbell, D. 2002. “Time Is Broken: The Return of the Past in the Response to September 11.” Theory & Event 5 (4): 1–16.
  • Campbell, J. 1998b. “Institutional Analysis and the Role of Ideas in Political Economy.” Theory and Society 27 (3): 377–409. doi:10.1023/A:1006871114987.
  • Clendenning, A. 2012. “Paragliding Terror Suspects’ Arrest in Spain Put Paragliding in Spotlight.” Huffington Post World, August 7. Accessed August 30, 2012. http://www.huffingtonpost.com/2012/08/07/paragliding-terror-suspects_n_1751191.html?utm_hp_ref=world.
  • Cooper, S. 2007. “Fire Hydrant Anti-Terrorism Project Ok’d.” The Augusta Chronicle, May 8. Accessed August 30, 2012. http://chronicle.augusta.com/stories/2007/05/08/met_127596.shtml.
  • Crenshaw, M. 2009. “The Debate over ‘New’ vs. ‘Old’ Terrorism.” In Values and Violence: Intangible Aspects of Terrorism, Studies in Global Justice, edited by I. Karawan, W. McCormack, and S. Reynolds. Dordrecht: Springer.
  • Daase, C., and O. Kessler. 2007. “Knowns and Unknowns in the `War on Terror’: Uncertainty and the Political Construction of Danger.” Security Dialogue 38 (4): 411–434. doi:10.1177/0967010607084994.
  • De Goede, M. 2011. European Security Culture: Preemption and Precaution in European Security. Amsterdam: Amsterdam University Press.
  • Department of Homeland Security. 2009. “Infrastructure Protection Report: Amusement, Theme, and Water Parks.” Accessed August 30, 2012. http://publicintelligence.net/infrastructure-protection-report-amusement-theme-and-water-parks/.
  • Der Derian, J. 2002. “In Terrorem: Before and After 9/11.” In Worlds in Collision: Terror and the Future of Global Order, edited by K. Booth and T. Dunne. New York: Palgrave Macmillan.
  • Du Bois, C., and C. Buts. 2014, “Military Support and Transnational Terrorism.” Defence and Peace Economics 1–18. doi:10.1080/10242694.2014.972087.
  • Duyvesteyn, I., and L. Malkki. 2012. “The Fallacy of the New Terrorism Thesis.” In Contemporary Debates on Terrorism, edited by R. Jackson and S. Sinclair. Abingdon: Routledge.
  • Eland, E. 1998. “Does U.S. Intervention Overseas Breed Terrorism? The Historical Record.” CATO Institute Foreign Policy Briefing, December 17. Accessed September 5, 2011. http://www.cato.org/pubs/fpbriefs/fpb-050es.html.
  • English, R. 2009. Terrorism: How to Respond. Oxford: Oxford University Press.
  • Ewald, F. 2002. “‘The Return of Descartes’ Malicious Demon’: An Outline of a Philosophy of Precaution.”.” In Embracing Risk: The Changing Culture of Insurance and Responsibility, edited by. T. Baker and J. Simon and translated by Stephen Utz, 273–301. Chicago, IL: University of Chicago Press.
  • Fahim, K. 2007. “Where Candy Machines Are Eyed with Suspicion.” New York Times, October 12. Accessed August 30, 2012. http://www.nytimes.com/2007/10/12/nyregion/12gumballs.html?_r=2&pagewanted=print.
  • Ferguson, J. 1994. The Anti-Politics Machine: ‘Development’, Depoliticization, and Bureaucratic Power in Lesotho. Minneapolis: University of Minnesota Press.
  • Fitzgerald, J. 2012. “Why Me? An Autoethnographic Account of the Bizarre Logic of Counter-Terrorism.” Dublin City University. Accessed August 28, 2014. http://www.academia.edu/3712937/Why_Me_An_Autoethnographic_Account_of_The_Bizarre_Logic_of_Counter-Terrorism.
  • Frank, M. 2014. “Narrating Terror: The Cultural Imaginary of Terrorism in Public Discourse, Literature, and Film.” Habilitation Thesis, University of Constance.
  • Furedi, F. 2002. Culture of Fear: Risk-Taking and the Morality of Low Expectation (Revised). London: Continuum.
  • Ghamari-Tabrizi, S. 2006. “Lethal Fantasies.” Bulletin of the Atomic Scientists 62: 20–22. doi:10.2968/062001007.
  • Heath-Kelly, C. 2012a. “Reinventing Prevention or Exposing the Gap? False Positives in UK Terrorism Governance and the Quest for Pre-emption.” Critical Studies on Terrorism 5 (1): 69–87. doi:10.1080/17539153.2012.659910.
  • Heath-Kelly, C. 2012b. “Can We Laugh Yet? Reading Post-9/11 Counterterrorism Policy as Magical Realism and Opening a Third-Space of Resistance.” European Journal on Criminal Policy and Research 18: 343–360. doi:10.1007/s10610-012-9180-4.
  • Hellmich, C. 2011. Al-Qaeda: From Global Network to Local Franchise. London: Zed.
  • Hellmich, C. 2012. “Here Come the Salafis: The Framing of Al-Qaeda’s Ideology within Terrorism Research.” In Knowing Al-Qaeda: The Epistemology of Terrorism, edited by C. Hellmich and A. Behnke. Farnham: Ashgate.
  • Hellmich, C., and A. Behnke, eds. 2012. Knowing Al-Qaeda: The Epistemology of Terrorism. Farnham: Ashgate.
  • Hoffman, B. 2006. Inside Terrorism (Revised). New York: Columbia University Press.
  • Hofstadter, R. 1964. The Paranoid Style in American Politics and Other Essays. Cambridge, MA: Harvard University Press.
  • Hurst, D., and K. Murphy. 2014. “Terrorism Alert Level Raised to High, But Tony Abbott Says No Attack Is Imminent.” The Guardian, September 12. Accessed September 12, 2014. http://www.theguardian.com/world/2014/sep/12/terrorism-alert-level-raised-to-high.
  • Jackson, R. 2007. “Playing the Politics of Fear: Writing the Terrorist Threat in the War on Terrorism.” In Playing Politics with Terrorism: A User’s Guide, edited by G. Kassimeris, 176–202. New York: Columbia University Press.
  • Jackson, R. 2012a. “Fantasy and the Epistemological Crisis of Counter-Terrorism.” Richardjacksonterrorismblog. Accessed August 30, 2012. http://richardjacksonterrorismblog.wordpress.com/2012/08/22/fantasy-and-the-epistemological-crisis-of-counter-terrorism/.
  • Jackson, R. 2012b. “Unknown Knowns: The Subjugated Knowledge of Terrorism Studies.” Critical Studies on Terrorism 5 (1): 11–29. doi:10.1080/17539153.2012.659907.
  • Jackson, R. 2013. “The Politics of Terrorism Fear.” In The Political Psychology of Terrorism Fears, edited by J. Sinclair. Cambridge: Cambridge University Press.
  • Jackson, R. 2014. Confessions of a Terrorist: A Novel. London: Zed Books.
  • Jackson, R. 2015. “Bin Laden’s Ghost and the Epistemological Crisis of Counter-Terrorism.” In After Bin Laden: Global Media and the Representation of Terrorism, edited by S. Jeffords and F. Al-Sumait. Champaign: University of Illinois Press.
  • Lawrence, B., ed. 2005. Messages to the World: The Statements of Osama Bin Laden. Translated by J. Howarth. London: Verso.
  • Lee, T. 2014. “The Government’s Biggest Terrorist Watchlist Has More than a Million Names.” Vox, August 5. Accessed September 10, 2014. http://www.vox.com/2014/8/5/5972403/the-governments-terrorism-watchlist-explained.
  • Luft, G. 2003. “The Logic of Israel’s Targeted Killing.” Middle East Quarterly 10 (1): 3–13.
  • Martin, T. 2014. “Pre-emptive Policing and Depoliticisation: Making Sense of Domestic Extremism, Counter-Radicalisation and Digital Surveillance.” In Neoliberalism and/as Terror, Critical Studies on Terrorism Working Group (CSTWG) Annual Conference, September 15–16. Nottingham: Nottingham Trent University.
  • Merton, R. 1968. Social Theory and Social Structure. New York: Free Press.
  • Mignolo, W. 2009. “Epistemic Disobedience, Independent Thought and De-Colonial Freedom.” Theory, Culture & Society 26 (7–8): 159–181. doi:10.1177/0263276409349275.
  • Mueller, J. 2006. Overblown: How Politicians and the Terrorism Industry Inflate National Security Threats, and Why We Believe Them. New York: Free Press.
  • Mueller, J., and M. Stewart. 2011. “Balancing the Risks, Benefits and Costs of Homeland Security.” Homeland Security Affairs, 7. Accessed August 30, 2012. http://www.hsaj.org/?fullarticle=7.1.16.
  • Mueller, J., and M. Stewart. 2012. “The Terrorism Delusion: America’s Overwrought Response to September 11.” International Security 37 (1): 81–110. doi:10.1162/ISEC_a_00089.
  • Nationwide SAR Initiative. n.d. Accessed August 28, 2014. http://nsi.ncirc.gov/about_nsi.aspx.
  • Neocleous, M. 2014. “Pigs, Pirates, Zombies, Satan and the Class War: Or, ‘The Universal Adversary Will Attack’.” In Neoliberalism and/as Terror: Critical Studies on Terrorism Working Group (CSTWG) Annual Conference, September 15–16. Nottingham: Nottingham Trent University.
  • Pengelly, M. 2014. “‘Terror Doodles’ Prompt Removal of Australian Man from Tiger Flight.” The Guardian, September 20. Accessed February 1, 2015. http://www.theguardian.com/world/2014/sep/20/terror-doodles-removal-australian-man-tiger-airways
  • Priest, D., and W. Arkin. 2011. Top Secret America: The Rise of the New American Security State. New York: Little Brown.
  • Seely, H. 2003. Pieces of Intelligence: The Existential Poetry of Donald H. Rumsfeld. New York: Free Press.
  • Shafir, G., and C. Schairer. 2013. “The War on Terror as Political Moral Panic.” In Lessons and Legacies of the War on Terror: From Moral Panic to Permanent War, edited by G. Shafir, E. Meade, and W. Aceves. Abingdon: Routledge.
  • Singh, R. 2012. “Measuring Al-Qaeda: The Metrics of Terror.” In Knowing Al-Qaeda: The Epistemology of Terrorism, edited by C. Hellmich and A. Behnke. Farnham: Ashgate.
  • Stampnitzky, L. 2013. Disciplining Terror: How Experts Invented “Terrorism”. Cambridge: Cambridge University Press.
  • The Local. 2014. “Nervous Student Causes Manhunt in Copenhagen.” August 28. Accessed August 29, 2014. http://www.thelocal.dk/20140828/nervous-student-causes-manhunt-in-copenhagen.
  • The Rendition Project. n.d. Accessed October 3, 2014. http://www.therenditionproject.org.uk/.
  • UK Home Office. n.d. The Counter-terrorism Strategy. Accessed August 30, 2012. http://www.homeoffice.gov.uk/counter-terrorism/uk-counter-terrorism-strat/.
  • Woolf, N. 2014. “Did Police’s Militarised Response to a Small Town Pumpkin Patch Riot Just Make It Worse?.” The Guardian, October 22. Accessed December 18, 2014. http://www.theguardian.com/us-news/2014/oct/22/new-hampshire-keene-pumpkin-riots-police-militarisation.
  • Zulaika, J. 2009. Terrorism: The Self-Fulfilling Prophecy. Chicago: The University of Chicago Press.
  • Zulaika, J. 2012. “Drones, Witches and Other Flying Objects: The Force of Fantasy in US Counterterrorism.” Critical Studies on Terrorism 5 (1): 51–68. doi:10.1080/17539153.2012.659909.
  • Zulaika, J., and W. Douglass. 1996. Terror and Taboo: The Follies, Fables, and Faces of Terrorism. New York: Routledge.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.