2,193
Views
17
CrossRef citations to date
0
Altmetric
Articles

The remote securitisation of Islam in the US post-9/11: euphemisation, metaphors and the “logic of expected consequences” in counter-radicalisation discourse

Pages 246-265 | Received 07 Jan 2015, Accepted 15 May 2015, Published online: 30 Jun 2015

References

  • Adler-Nissen, R. 2013. “Introduction: Bourdieu and International Relations theory.” In Bourdieu in International Relations: Rethinking Key Concepts in IR, edited by R. Adler-Nissen, 1–23. Oxon: Routledge.
  • Ahmed, S. 2003. “The Politics of Fear in the Making of Worlds.” International Journal of Qualitative Studies in Education 16 (3): 377–398. doi:10.1080/0951839032000086745.
  • Aly, A. 2015. “Countering Violent Extremism: Social Harmoney, Community Resilience and the Potential of Counter-Narratives in the Australian Context.” In Counter-radicalisation: Critical Perspectives, edited by C. Baker-Beall, C. Heath-Kelly, and J. Lee, 71–87. Oxon: Routledge.
  • Amin-Khan, T. 2012. “New Orientalism, Securitisation and the Western Media’s Incendiary Racism.” Third World Quarterly 33 (9): 1595–1610. doi:10.1080/01436597.2012.720831.
  • Amoore, L., and M. De Goede. 2008. Risk and the War on Terror. Oxon: Routledge.
  • Aradau, C., L. Lobo-Guerrero, and V. M. Rens. 2008. “Security, Technologies of Risk, and the Political: Guest Editors’ Introduction.” Security Dialogue 39 (2–3): 147–154. doi:10.1177/0967010608089159.
  • Arendt, H. 1963. Eichmann in Jerusalem: A Report on the Banality of Evil. London: Penguin Books.
  • Associated Press. 2011. “AP’s Probe Into NYPD Intelligence Operations.” Accessed June 3, 2014. http://www.ap.org/Index/AP-In-The-News/NYPD
  • Baker-Beall, C., C. Heath-Kelly, and L. Jarvis, eds. 2015. Counter-radicalisation: Critical Perspectives. Oxon: Routledge.
  • Balzacq, T., ed. 2011. Securitisation Theory: How Security Problems Emerge and Dissolve. Oxon: Routledge.
  • Bauman, Z. 1989. Modernity and the Holocaust. Cambridge, MA: Polity Press.
  • Bauman, Z. 1991. Modernity and Ambivalence. Cambridge: Cambridge University Press.
  • Baumeister, R. F. 2001. Evil: Inside Human Violence and Cruelty. New York, NY: Henry Holt.
  • Beck, U. 1992. Risk Society: Towards a New Modernity. London: Sage.
  • Bigo, D. 2006. “Security, Exception, Ban and Surveillance.” In Theorizing Surveillance, The Panopticon and Beyond, edited by D. Lyon, 46–68. Cullompton: Wlilan Publishing.
  • Bigo, D. 2008. “Globalized (In)Security: The Field and the Ban-Opticon.” In Terror, Insecurity and Liberty: Illiberal Practices of Liberal Regimes after 9/11, edited by D. Bigo and A. Tsoukala, 10–48. Oxon: Routledge.
  • Bigo, D., and A. Tsoukala. 2008. “Terror, Insecurity and Liberty: Illiberal Practices of Liberal Regimes after 9/11.” In Introduction, edited by D. Bigo and A. Tsoukala. Oxon: Routledge.
  • Bilgin, P. 2011. “The Politics of Studying Securitization? The Copenhagen School in Turkey.” Security Dialogue 42 (4–5): 399–412. doi:10.1177/0967010611418711.
  • Bjelopera, J. P. 2014. Countering Violent Extremism in the United States. Washington, DC: Congressional Research Service.
  • Borum, R. 2011. “Radicalization into Violent Extremism I: A Review of Social Science Theories.” Journal of Strategic Security 4 (4): 7–36. doi:10.5038/1944-0472.
  • Bosco, R. M. 2014. Securing the Sacred: Religion, National Security, and the Western State. Michigan: The University of Michigan Press.
  • Bourdieu, P. 1977. Outline of a Theory of Practice. Translated by Richard Nice. Cambridge: Cambridge University Press.
  • Bourdieu, P. 1998. Practical Reason. Cambridge, MA: Polity Press and Blackwell Publishers.
  • Bourdieu, P. 2001. Language et Pouvoir Symbolique. Paris: Éditions du Seuil.
  • Bourdieu, P. ([1980] 1992). The Logic of Practice. Translated by Richard Nice. Cambridge: Polity Press.
  • Brasset, J., and N. Vaughan-Williams. 2012. “Governing Traumatic Events.” Alternatives: Global, Local, Political 37 (3): 183–187. doi:10.1177/0304375412449786.
  • Bush, G. W. 11 September 2001. “Address to the Nation on the Terrorist Attacks.” The American Presidency Project. Accessed May 29, 2015. http://www.presidency.ucsb.edu/ws/?pid=58057
  • Bush, G. W. 20 September 2001. “Justice Will Be Done.” The Washington Post. Accessed May 29, 2015. http://www.washingtonpost.com/wpsrv/nation/specials/attacked/transcripts/bushaddress_092001.html
  • Buzan, B., O. Wæver, and J. De Wilde. 1998. Security: A New Framework for Analysis. London: Lynne Rienner.
  • Cameron, L. 2012. “Working Paper 5 ‘Dyspathy: The Dynamic Complement of Empathy’.” Living with Uncertainty: Metaphor and the Dynamics of Empathy in Discourse. The Open University. Accessed May 29, 2015. http://www.open.ac.uk/researchprojects/livingwithuncertainty/sites/www.open.ac.uk.researchprojects.livingwithuncertainty/files/pics/d134491.pdf
  • CASE collective. 2006. “Critical Approaches to Security in Europe: A Networked Manifesto.” Security Dialogue 37 (4): 443–487. doi:10.1177/0967010606073085.
  • Cesari, J. 2009. “The Securitisation of Islam in Europe.” Challenge: Security and Liberty, Research Paper No. 15. CEPS CHALLENGE. Accessed May 29, 2015. http://libertysecurity.org/IMG/pdf_The_Securitisation_of_Islam_in_Europe.pdf
  • Cheney, D. 2009. “Cheney: Gitmo Holds ‘Worst of the Worst’.” NBC News. Accessed April 27, 2015. http://www.nbcnews.com/id/31052241/ns/world_news-terrorism/t/cheney-gitmo-holds-worst-worst/ - .VUDVoK1Viko
  • Cheney, D. 2014. “Meet the Press [Transcript].” Accessed April 27, 2015. http://www.nbcnews.com/meet-the-press/meet-press-transcript-december-14-2014-n268181
  • Chilton, P. A. 1996. Security Metaphors: Cold War Discourse from Containment to Common House. New York: Peter Lang Publishing.
  • Cohn, C. 1987. “Sex and Death in the Rational World of Defense Intellectuals.” Signs 12 (4): 687–718.
  • Coolsaet, R. 2011a. “Epilogue: Terrorism and Radicalisation: What Do We Now Know?” In Jihadi Terrorism and the Radicalisation Challenge: American and European Experiences, edited by R. Coolsaet, 259–268. Farnham: Ashgate Publishing Limited.
  • Coolsaet, R. 2011b. “Introduction.” In Jihadi Terrorism and the Radicalisation Challenge: European and American Experiences, edited by R. Coolsaet, 1–6. Farnham: Ashgate Publishing Limited.
  • Croft, S. 2012. Securitising Islam. Cambridge: Cambridge University Press.
  • De Goede, M. 2008. “Beyond Risk: Premediation and the Post-9/11 Security Imagination.” Security Dialogue 39 (2–3): 155–176. doi:10.1177/0967010608088773.
  • De Goede, M., and S. Simon. 2013. “Governing Future Radicals in Europe.” Antipode 45 (2): 315–335. doi:10.1111/j.1467-8330.2012.01039.x.
  • Edmunds, J. 2012. “The ‘New’ Barbarians: Governmentality, Securitization and Islam in Western Europe.” Contemporary Islam 6 (1): 67–84. doi:10.1007/s11562-011-0159-6.
  • Fearon, J., and A. Wendt. 2002. “Rationalism v. Constructivism: A Skeptical View.” In Handbook of International Relations, edited by W. Carlsnaes, T. Risse, and B. A. Simmons, 52–72. London: Sage.
  • Fierke, K. M. 2007. Critical Approaches to International Security. Cambridge, MA: Polity Press.
  • Fierke, K. M. 2015. Critical Approaches to International Security. 2nd ed. Cambridge, MA: Polity Press.
  • Fraihi, T. 2011. “(De)-Escalating Radicalisation: The Debate within Immigrant Communities in Europe.” In Jihadi Terrorism and the Radicalisation Challenge: European and American Perspectives, edited by R. Coolsaet, 205–213. Farnham: Ashgate Publishing Limited.
  • Giddens, A. 1991. Modernity and Self-Identity: Self and Society in the Late Modern Age. Cambridge: Polity Press.
  • Githens-Mazer, J., and R. Lambert. 2010. “Why Conventional Wisdom on Radicalization Fails: The Persistence of a Failed Discourse.” International Affairs 86 (4): 889–901. doi:10.1111/inta.2010.86.issue-4.
  • Goldman, A., and M. Apuzzo. 2012. “Informant: NYPD Paid Me to ‘Bait’ Muslims.” The Associated Press, 23 October. Accessed January 05 2015. http://www.ap.org/Content/AP-In-The-News/2012/Informant-NYPD-paid-me-to-bait-Muslims
  • Guillaume, X. 2011. “Resistance and the International: The Challenge of the Everyday.” International Political Sociology (IPS Forum) 5 (4): 459–462. doi:10.1111/ips.2011.5.issue-4.
  • Guzzini, S. 2000. “A Reconstruction of Constructivism in International Relations.” European Journal of International Relations 6 (2): 147–182. doi:10.1177/1354066100006002001.
  • Hanks, W. F. 2005. “Pierre Bourdieu and the Practices of Language.” Annual Review of Anthropology 34: 67–83. doi:10.1146/annurev.anthro.33.070203.143907.
  • Hansen, L. 2006. Security as Practice. Oxon: Routledge.
  • Hansen, L. 2011. “The Politics of Securitization and the Muhammad Cartoon Crisis: A Post-Structuralist Perspective.” Security Dialogue 42 (4–5): 357–369. doi:10.1177/0967010611418999.
  • Haslam, N. 2006. “Dehumanization: An Integrative Review.” Personality and Social Psychology Review 10: 252–264. doi:10.1207/pspr.2006.10.issue-3.
  • Heath-Kelly, C. 2013. “Counter-Terrorism and the Counterfactual: Producing the ‘Radicalisation’ Discourse and the UK PREVENT Strategy.” The British Journal of Politics & International Relations 15 (3): 394–415. doi:10.1111/j.1467-856X.2011.00489.x.
  • Heath-Kelly, C., C. Baker-Beall, and L. Jarvis. 2015. “Introduction.” In Counter-radicalisation: Critical Perspectives, edited by C. Baker-Beall, C. Heath-Kelly, and L. Jarvis, 1–13. Oxon: Routledge.
  • Heng, Y.-K., and M. Kenneth. 2011. “After the ‘War on Terror’: Regulatory States, Risk, Bureaucracies and the Risk-Based Governance of Terror.” International Relations 25 (3): 313–329. doi:10.1177/0047117811415484.
  • Hunter, R., and D. Heinke. 2011. “Radicalization of Islamist Terrorists in the Western World.” Federal Bureau of Investigation. Accessed May 28 2014. http://www.fbi.gov/stats-services/publications/law-enforcement-bulletin/september-2011/perspective
  • Huysmans, J. 2011. “What’s in an Act? On Security Speech Acts and Little Security Nothings.” Security Dialogue 42 (4–5): 371–383. doi:10.1177/0967010611418713.
  • Jackson, R. 2005. Writing the War on Terrorism: Language, Politics and Counter-Terrorism. Manchester: Manchester University Press.
  • Jackson, R. 2007. “Constructing Enemies: ‘Islamic Terrorism’ in Political and Academic Discourse.” Government and Opposition 42 (3): 394–426. doi:10.1111/j.1477-7053.2007.00229.x.
  • Kinnvall, C. 2004. “Globalization and Religious Nationalism: Self, Identity, and the Search for Ontological Security.” Political Psychology 25 (5): 741–767. doi:10.1111/j.1467-9221.2004.00396.x
  • Lakoff, G., and M. Johnson. 1980. Metaphors We Live By. Chicago, IL: University of Chicago Press.
  • Lebow, R. N. 2005. “Reason, Emotion and Cooperation.” International Politics 42: 283–313. doi:10.1057/palgrave.ip.8800113.
  • Levitt, L. 2013. “Everybody Loves Raymond.” Accessed May 1, 2015. http://nypdconfidential.com/columns/2013/130121.html
  • Lifton, R. J. 1986. The Nazi Doctors: Medical Killing and the Psychology of Genocide. New York: Basic Books.
  • Lynn-Jones, S. M. 2000. “Preface.” In Rational Choice and Security Studies: Stephen Walt and his Critics, edited by M. E. Brown, O. R. Jr Coté, S. M. Lynn-Jones, and S. E. Miller, ix–xix. Massachusetts: The MIT Press.
  • Mamdani, M. 2002. “Good Muslim, Bad Muslim: A Political Perspective on Culture and Terrorism.” American Anthropologist 104 (3): 766–775. doi:10.1525/aa.2002.104.issue-3.
  • March, J. G., and J. P. Olsen. 1998. “The Institutional Dynamics of International Political Orders.” International Organization 52 (4): 943–969. doi:10.1162/002081898550699.
  • Martin, T. 2014. “Governing an Unknowable Future: The Politics of Britain’s Prevent Policy.” Critical Studies on Terrorism 7 (1): 62–78. doi:10.1080/17539153.2014.881200.
  • Mavelli, L. 2013. “Between Normalisation and Exception: The Securitisation of Islam and the Construction of the Secular Subject.” Millennium: Journal of International Studies 41 (2): 159–181. doi:10.1177/0305829812463655.
  • Muslim American Civil Liberties Coalition, The Asian American Legal Defense and Education Fund, and Creating Law Enforcement Accountability & Responsibility Project. 2012. “Mapping Muslims: NYPD Spying and Its Impact on American Muslims.” New York: CUNY School of Law. Accessed May 29, 2015. http://www.law.cuny.edu/academics/clinics/immigration/clear/Mapping-Muslims.pdf
  • Mythen, G., and S. Walklate. 2008. “Terrorism, Risk and International Security: The Perils of Asking ‘What If?’” Security Dialogue 39 (2–3): 221–242. doi:10.1177/0967010608088776.
  • Neocleous, M. 2012. “‘Don’t Be Scared, Be Prepared’: Trauma-Anxiety Resilience.” Alternatives: Global, Local, Political 37 (3): 188–198. doi:10.1177/0304375412449789.
  • Neumann, P. R. 2013. “The Trouble with Radicalization.” International Affairs 89 (4): 873–893. doi:10.1111/inta.2013.89.issue-4.
  • Neumann, P. R., and S. Kleinmann. 2013. “How Rigorous is Radicalization Research?” Democracy and Security 9 (4): 360–382. doi:10.1080/17419166.2013.802984.
  • NYPD. 2014. “Terrorist Plots Targeting New York City.” Accessed July 2, 2014. http://www.nyc.gov/html/nypd/html/pr/plots_targeting_nyc.shtml
  • Obama, B. 2013. “Remarks by the President at the National Defense University.” Council on Foreign Relations, May 23. Accessed February 14, 2014. http://www.cfr.org/counterterrorism/president-obamas-speech-national-defense-university-future-our-fight-against-terrorism-may-2013/p30771
  • Obama, B. 2015. “Obama Tells Muslims: Don’t Let Isis Hijack your Religion and Identity.” The Guardian, February 19. Accessed April 27, 2015. http://www.theguardian.com/us-news/2015/feb/19/obama-tells-moderate-muslims-dont-let-isis-hijack-islam
  • Peoples, C., and V.-W. Nick. 2010. Critical Security Studies: An Introduction. Abingdon: Routledge.
  • Pouliot, V., and M. Frédéric. 2013. “Bourdieu’s Concepts.” In Bourdieu in International Relations: Rethinking Key Concepts in IR, edited by R. Adler-Nissen, 24–44. Oxon: Routledge.
  • Salter, M. B. 2008. “Securitization and Desecuritization: A Dramaturgical Analysis of the Canadian Air Transport Security Authority.” Journal of International Relations and Development 11 (4): 321–349. doi:10.1057/jird.2008.20.
  • Silber, M. D., and A. Bhatt. 2007. Radicalization in the West: The Homegrown Threat. New York: The New York City Department.
  • Taylor, C. 1993. “To Follow a Rule.” In Bourdieu: Critical Perspectives, edited by M. Postpone, E. Lipuma, and C. Calhoun, 45–60. Chicago, IL: Chicago Press.
  • US Government. 2003. “The National Strategy for Combating Terrorism.” The White House. Washington, DC. Accessed May 29, 2015. https://www.cia.gov/news-information/cia-the-war-on-terrorism/Counter_Terrorism_Strategy.pdf
  • US Government. 2011. “Strategic Implementation Plan for Empowering Local Partners to Prevent Violent Extremism in the United States (SIP).” The White House. Washington, DC. Accessed May 29, 2015. https://www.whitehouse.gov/sites/default/files/sip-final.pdf
  • Thompson, J. B. 2001. “Preface.” Translated by Émilie Colombani, Language et Pouvoir Symbolique. Paris: Éditions du Seuil.
  • Walker, R. E., and A. Seegers. 2012. “Securitisation: The Case of Post 9/11 United States Africa Policy.” Scientia Militaria: South African Journal of Military Studies 40 (2): 22–45.
  • Wilkinson, C. 2007. “The Copenhagen School on Tour in Kyrgyzstan: Is Securitization Theory Useable Outside Europe?” Security Dialogue 38 (1): 5–25. doi:10.1177/0967010607075964.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.