7,603
Views
22
CrossRef citations to date
0
Altmetric
Articles

Radicalisation theories, policing practices, and “the future of terrorism?”

&
Pages 393-413 | Received 11 Nov 2015, Accepted 22 Mar 2016, Published online: 06 Jun 2016

References

  • Aas, K. F. 2011. “Visions of Global Control: Cosmopolitan Aspirations in a World of Friction.” In What Is Criminology? edited by M. Bosworth and C. Hoyle, 406–422. London: Oxford University Press.
  • Ahmed, S. 2015. “Citizenship, Belonging and Attachment in the ‘War on Terror’.” Critical Criminology 24 (1): 111–125. doi:10.1007/s10612-015-9279-2.
  • Amoore, L. 2011. “Data Derivatives: On the Emergence of a Security Risk Calculus for Our Times.” Theory, Culture and Society 28 (6): 24–43. doi:10.1177/0263276411417430.
  • Amoore, L. 2014. “Security and the Claim to Privacy.” International Political Sociology 8 (1): 109–112. doi:10.1111/ips.12044.
  • Aradau, C., and R. Van Munster. 2007. “Governing Terrorism through Risk: Taking Precautions,(Un) Knowing the Future.” European Journal of International Relations 13 (1): 89–115. doi:10.1177/1354066107074290.
  • Awan, I. 2012. “‘I Am a Muslim Not an Extremist’: How the Prevent Strategy Has Constructed a “Suspect” Community.” Politics & Policy 40 (6): 1158–1185. doi:10.1111/j.1747-1346.2012.00397.x.
  • Borum, R. 2011. “Rethinking Radicalization.” Journal of Strategic Security 4 (4): 37–62. doi:10.5038/1944-0472.4.4.2.
  • Bramadat, P., and L. Dawson, eds. 2014. Religious Radicalization and Securitization in Canada and Beyond. Toronto: University of Toronto Press.
  • Breen-Smyth, M. 2014. “Theorising the “Suspect Community”: Counterterrorism, Security Practices and the Public Imagination.” Critical Studies on Terrorism 7 (2): 223–240. doi:10.1080/17539153.2013.867714.
  • Bronskill, J. 2012. “Flying the Secret Skies.” In Brokering Access: Power, Politics, and Freedom of Information Process in Canada, edited by M. Larsen and K. Walby, 97–114. Vancouver: UBC Press.
  • Carrier, N. 2006. “Academics’ Criminals: The Discursive Formations of Criminal Deviance.” Penal Field 6. Accessed August 12, 2015. http://champpenal.revues.org/3143#tocto2n5.
  • Chan, J., and B. M. Lyria. 2015. “Is Big Data Challenging Criminology?” Theoretical Criminology 1–19. Advance online publication. doi:10.1177/1362480615586614.
  • Coolsaet, R. 2011. “Epilogue: Terrorism and Radicalisation: What Do We Now Know?” In Jihadi Terrorism and the Radicalisation Challenge: American and European Experiences, edited by R. Coolsaet, 259–268. Farnham: Ashgate.
  • Croft, S. 2012. Securitising Islam. Cambridge: Cambridge University Press.
  • CSIS. 2015. “Personality Traits and Terrorism.” TSAS Working Paper Series, No. 15-05, December 2015.
  • Dalgaard-Nielsen, A. 2010. “Violent Radicalization in Europe: What We Know and What We Do Not Know.” Studies in Conflict & Terrorism 33 (9): 797–814. doi:10.1080/1057610X.2010.501423.
  • de Goede, M., and S. Simon. 2013. “Governing Future Radicals in Europe.” Antipode 45 (2): 315–335. doi:10.1111/j.1467-8330.2012.01039.x.
  • Eroukhmanoff, C. 2015. “The Remote Securitisation of Islam in the US Post-9/11: Euphemisation, Metaphors and the “Logic of Expected Consequences” in Counter-Radicalisation Discourse.” Critical Studies on Terrorism 8 (2): 246–265. doi:10.1080/17539153.2015.1053747.
  • Filoramo, G. 2003. “Religious Pluralism and Crises of Identity.” Diogenes 50 (3): 31–44. doi:10.1177/03921921030503003.
  • Forcese, C., and K. Roach. 2015. False Security: The Radicalization of Canadian Anti-Terrorism. Toronto: Irvin Law.
  • Frank, M. 2015. “Conjuring Up the Next Attack: The Future-Orientedness of Terror and the Counterterrorist Imagination.” Critical Studies on Terrorism 8 (1): 90–109. doi:10.1080/17539153.2015.1005935.
  • French, M. 2007. “In the Shadow of Canada’s Camps.” Social & Legal Studies 16 (1): 49–69. doi:10.1177/0964663907073446.
  • Githens-Mazer, J. 2012. “The Rhetoric and Reality: Radicalization and Political Discourse.” International Political Science Review 33 (5): 556–567. doi:10.1177/03921921030503003.
  • Goold, B., and L. Lazarus. 2007. “Introduction. Security and Human Rights: The Search for a Language of Reconciliation.” In Security and Human Rights, edited by B. Goold and L. Lazarus, 1–24. Oxford: Hart.
  • Greer, S. 2010. “Anti-Terrorist Laws and the United Kingdom’s ‘Suspect Muslim Community’: A Reply to Pantazis and Pemberton.” British Journal of Criminology 50 (6): 1171–1190. doi:10.1093/bjc/azq047.
  • Griffiths, M. 2015. “Universities Link up to Counter Violent Extremism.” ABC News AM, August 10. Accessed August 12 2015. http://www.abc.net.au/am/content/2015/s4290090.htm
  • Hacking, I. 1995. “The Looping Effects of Human Kinds.” In Causal Cognition: A Multidisciplinary Debate, edited by D. Sperber, 351–383. Gloucestershire: Clarendon Press.
  • Haggerty, K. 2001. Making Crime Count. Toronto: University of Toronto Press.
  • Heath-Kelly, C. 2012. “Reinventing Prevention or Exposing the Gap? False Positives in UK Terrorism Governance and the Quest for Pre-emption.” Critical Studies on Terrorism 5 (1): 69–87. doi:10.1177/1362480614542119.
  • Krasmann, S. 2012. “Law’s Knowledge: On the Susceptibility and Resistance of Legal Practices to Security Matters.” Theoretical Criminology 16 (4): 379–394. doi:10.1177/1362480612446775.
  • Kundnani, A. 2014. “Radicalisation: The Journey of a Concept.” In Counter-Radicalisation: Critical Perspectives, edited by C. Heath-Kelly, L. Jarvis and C. Baker-Beall. Hoboken, NJ: Taylor and Francis.
  • Kurzman, C., and D. Shanzer. 2015. “The Growing Right-Wing Terror Threat.” The New York Times, June 16. Accessed June 20 2015. http://www.nytimes.com/2015/06/16/opinion/the-other-terror-threat.html?_r=0
  • Lakhani, S. 2012. “Preventing Violent Extremism: Perceptions of Policy from Grassroots and Communities.” The Howard Journal of Criminal Justice 51 (2): 190–206. doi:10.1111/j.1468-2311.2011.00685.x.
  • Laqueur, W. 2004. “The Terrorism to Come.” Policy Review August and September 126: 49–64.
  • Martin, T. 2014. “Governing an Unknowable Future: The Politics of Britain’s Prevent Policy.” Critical Studies on Terrorism 7 (1): 62–78. doi:10.1080/17539153.2014.881200.
  • Marx, G. T. 2007. “Rocky Bottoms: Techno-Fallacies of an Age of Information.” International Political Sociology 1 (1): 83–110. doi:10.1111/j.1749-5687.2007.00006.x.
  • Monaghan, J. 2015. “Four Barriers to Access to Information: Perspectives of a Frequent User.” In Access to Information and Social Justice in Canada, edited by J. Brownlee and K. Walby, 53–74. Winnipeg: Arbiter Ring.
  • Neumann, P. 2013. “The Trouble with Radicalisation.” International Affairs 89 (4): 873–893. doi:10.1111/1468-2346.12049.
  • Neumann, P., and S. Kleinmann. 2013. “How Rigorous Is Radicalization Research?” Democracy and Security 9: 360–382. doi:10.1080/17419166.2013.802984.
  • O’Neill, M., and B. Loftus. 2013. “Policing and the Surveillance of the Marginal: Everyday Contexts of Social Control.” Theoretical Criminology 17 (4): 437–454. doi:10.1177/1362480613495084.
  • OIC (Office of the Information Commissioner). 2014. Annual Report 2013-2014. Ottawa: Government of Canada.
  • Pantazis, C., and S. Pemberton. 2009. “From the ‘Old’ to the ‘New’ Suspect Community: Examining the Impacts of Recent UK Counter-Terrorist Legislation.” The British Journal of Criminology 49 (5): 646–666. doi:10.1093/bjc/azp031.
  • Parmar, A. 2011. “Stop and Search in London: Counter-Terrorist or Counter-Productive?” Policing and Society: An International Journal of Research and Policy 21 (4): 369–382. doi:10.1080/10439463.2011.617984.
  • Perry, B., and R. Scrivens. 2016. “Uneasy Alliances: A Look at the Right-Wing Extremist Movement in Canada.” Studies in Conflict & Terrorism Ahead-of-print release. doi:10.1080/1057610X.2016.1139375.
  • PSC (Public Safety Canada). 2013. Access to Information Act Request A-2013-00017. Ottawa: Government of Canada.
  • PSC (Public Safety Canada). 2014. Access to Information Act Request 2014–293. Ottawa: Government of Canada.
  • Qureshi, A. 2015. “PREVENT: Creating “Radicals” to Strengthen Anti-Muslim Narratives.” Critical Studies on Terrorism 8 (1): 181–191. doi:10.1080/17539153.2015.1005938.
  • RCMP (Royal Canadian Mounted Police). 2009. Radicalization: A Guide for the Perplexed. Ottawa: RCMP.
  • RCMP (Royal Canadian Mounted Police). 2013. Access to Information Act Request A-2013-1509.Ottawa: Government of Canada.
  • RCMP (Royal Canadian Mounted Police). 2015. Officer Safety: ISIS, Powerpoint Presentation. Ottawa: Government of Canada.
  • Sageman, M. 2004. Understanding Terror Networks. Philadelphia: University of Pennsylvania Press.
  • Sageman, M. 2008. Leaderless Jihad: Terror Networks in the Twenty-First Century. Philadelphia: University of Pennsylvania Press.
  • Said, E. 1979. Orientalism. New York: Vintage Books.
  • Sanders, C., and S. Hannem. 2012. “Policing ‘the Risky’: Technology and Surveillance in Everyday Patrol Work.” Canadian Review of Sociology 49 (4): 389–410. doi:10.1111/j.1755-618X.2012.01300.x.
  • Senate. 2015. Countering the Terrorist Threat in Canada: An Interim Report. Ottawa: Standing Senate Committee on National Security and Defence.
  • Skolnick, J. 1966. Justice Without Trial: Law Enforcement in a Democratic Society. New York: John Wiley.
  • Tator, C., and F. Henry. 2006. Racial Profiling in Canada: Challenging the Myth of “A Few Bad Apples”. Toronto: University of Toronto Press.
  • Thomas, P. 2010. “Failed and Friendless: The UK’s ‘Preventing Violent Extremism’ Programme.” British Journal of Politics and International Relations 12 (3): 442–458. doi:10.1111/j.1467-856X.2010.00422.x.
  • Walby, K., and N. Carrier. 2010. “The Rise of Biocriminology: Capturing Observable Bodily Economies of ‘Criminal Man’.” Criminology & Criminal Justice 10 (3): 261–285. doi:10.1177/1748895810370314.
  • Walby, K., and M. Larsen. 2011. “Getting at the Live Archive: On Access to Information Research in Canada.” Canadian Journal of Law and Society 26 (3): 623–633. doi:10.3138/cjls.26.3.623.
  • Wortley, S., and A. Owusu-Bempah. 2011. “The Usual Suspects: Police Stop and Search Practices in Canada.” Policing and Society: An International Journal of Research and Policy 21 (4): 395–407. doi:10.1080/10439463.2011.610198.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.