1,137
Views
14
CrossRef citations to date
0
Altmetric
Articles

Security and polarization in Trump’s America: securitization and the domestic politics of threatening others

&
Pages 55-70 | Received 30 Oct 2019, Accepted 23 Feb 2020, Published online: 03 Mar 2020

References

  • @RealDonaldTrump. (2016). Just had a very open …  Twitter. https://twitter.com/realdonaldtrump/status/796900183955095552
  • @RealDonaldTrump. (2017a). When a country is no longer …  Twitter. https://twitter.com/realdonaldtrump/status/827864176043376640
  • @RealDonaldTrump. (2017b). Protesters and the tears of …  Twitter. https://twitter.com/realdonaldtrump/status/826042483155013632
  • @RealDonaldTrump. (2017c). Everybody is arguing whether …  Twitter. https://twitter.com/realdonaldtrump/status/826774668245946368
  • @RealDonaldTrump. (2017d). We must keep “evil” out of our country! …  Twitter. https://twitter.com/realdonaldtrump/status/827655062835052544
  • @RealDonaldTrump. (2017e). If U.C. Berkeley does not allow …  Twitter. https://twitter.com/realdonaldtrump/status/827112633224544256
  • @RealDonaldTrump. (2017f). Courageous Patriots have fought …  Twitter. https://twitter.com/realdonaldtrump/status/912037003923005440
  • @RealDonaldTrump. (2017g). We must stop being politically correct …  Twitter. https://twitter.com/realdonaldtrump/status/871325606901895168
  • Al Jazeera. (2019). ‘Disgusting, racist': Trump slammed for attack on congresswomen. Al Jazeera, 15 July.
  • Al-Tameemi, M. (2017). The U.S. once invited me here because I'm Iraqi. Now Trump wants to ban me for it. The Washington Post, February 1.
  • Côté, A. (2016). Agents without agency: Assessing the role of the audience in securitization theory. Security Dialogue, 47(6), 541–558. doi: 10.1177/0967010616672150
  • Balzacq, T. (2005). The three faces of securitization: Political agency, audience and context. European Journal of International Relations, 11(2), 171–201. doi: 10.1177/1354066105052960
  • Balzacq, T. (2015). The ‘essence’ of securitization: Theory, ideal type, and a sociological science of security. International Relations, 29(1), 103–113. doi: 10.1177/0047117814526606b
  • Balzacq, T., Léonard, S., & Ruzicka, J. (2016). ‘Securitization’ revisited: Theory and cases. International Relations, 30(4), 494–531. doi: 10.1177/0047117815596590
  • Biegon, R., & Watts, T. (2020). When ends Trump means: Continuity versus change in US counterterrorism policy. Global Affairs. doi: 10.1080/23340460.2020.1734956
  • Booker, C. (2017). Travel Ban. Congressional Record, S480–S481.
  • Burns, A. (2017). Legal challenges mount against Trump's travel ban. New York Times, January 30.
  • Buzan, B., Waever, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder, CO: Lynne Rienner.
  • Campbell, D. (1998). Writing security. Manchester: Manchester University Press.
  • Churchill, D., Crawford, A., & Barker, A. (2018). Thinking forward through the past: Prospecting for urban order in (Victorian) public parks. Theoretical Criminology, 22(4), 523–544. doi: 10.1177/1362480617713986
  • Donoghue, M. (2018). Beyond hegemony: Elaborating on the use of Gramscian concepts in critical discourse analysis for political studies. Political Studies, 66(2), 392–408. doi: 10.1177/0032321717722362
  • Dowd, M. (2019). Scaling Wokeback mountain. New York Times, 13 July.
  • Emburrey-Dennis, T. (2019). Pelosi in escalating feud with AOC and fellow young female Democrat progressives: ‘stop tweeting about us’. The Independent, 12 July.
  • Espaillat, A. (2017). Opposition to the Muslim Ban. Congressional Record, H760.
  • Fermor, B. & Holland, J. (forthcoming). Trump’s discursive war of position and America’s white working class: Andrew Jackson versus Thomas Jefferson, 2016–18.
  • Floyd, R. (2007). Towards a consequentialist evaluation of security: Bringing together the Copenhagen and the Welsh Schools of security studies. Review of International Studies, 33(2), 327–350. doi: 10.1017/S026021050700753X
  • Floyd, R. (2016). Extraordinary or ordinary emergency measures: What, and who, defines the ‘success’ of securitization? Cambridge Review of International Affairs, 29(2), 677–694. doi: 10.1080/09557571.2015.1077651
  • Fontana, B. (2008). Hegemony and power in Gramsci. In R. Howson, & K. Smith (Eds.), Hegemony: Studies in consensus and coercion (pp. 80–106). New York: Routledge.
  • Gohmert, L. (2017). Trump’s refugee actions. Congressional Record, H803–H806.
  • Gramsci, A. (1971). Selections from the Prison Notebooks (trans. Q Hoare and GN Smith). New York: International Publishers.
  • Grijalva, R. (2017). Realign the Democratic Party. USA Today, November 16.
  • Gutfield, G. (2017) President Trump got some backlash over withdrawal on the Paris Climate Accord … , with Guilfoyle, K., Williams, J., Watters, J. & Perino, D. The Five. Fox News
  • Hansen, L. (2006). Security as practice: Discourse analysis and the Bosnian War. Abingdon: Routledge.
  • Hansen, L. (2012). The politics of securitization and the Muhammad Cartoon Crisis: A post-structuralist perspective. Security Dialogue, 42(4–5), 357–369. doi: 10.1177/0967010611418999
  • Hassan, O. (2020). Crisis, narratives, and the construction of US-Middle East Relations: Continuity and change in world History and Trump’s America first. Global Affairs.
  • Holland, J. (2013). Selling the war on terror: Foreign policy discourses after 9/11. Abingdon: Routledge.
  • Holland, J., & Fermor, B. (2017). Trump’s rhetoric at 100 days: Contradictions within effective emotional narratives. Critical Studies on Security, 5(2), 182–186. doi: 10.1080/21624887.2017.1355157
  • Howarth, D. R. (2013). Poststructuralism and after: Structure, subjectivity and power. Basingstoke: Palgrave Macmillan.
  • Huysmans, J. (1998). Security! What do you mean?: From concept to thick signifier. European Journal of International Relations, 4(2), 226–255. doi: 10.1177/1354066198004002004
  • Huysmans, J. (2011). What’s in an act? On security speech acts and little security nothings. Security Dialogue, 42(4–5), 371–383. doi: 10.1177/0967010611418713
  • Jackson, R. (2005). Writing the war on terror: Language, politics and counter-terrorism. Manchester: Manchester University Press.
  • Jacobs, T. (2019). The dislocated universe of Laclau and Mouffe: An introduction to post-structuralist discourse theory. Critical Review, 30(3-4), 294–315. doi: 10.1080/08913811.2018.1565731
  • Keane, J. (2017) Outrage amps up over withdrawal from climate deal … , with Smith, S., Schlapp, M., Herridge, C., Hurt, C., Harf, M., Henry, E. & Stirewalt, C. The story with Martha MacCallum, Fox News
  • Krebs, R. R. (2015). Narrative and the making of US national security. Cambridge: Cambridge University Press.
  • Laclau, E., & Mouffe, C. (1985). Hegemony and Socialist Strategy. London: Verso.
  • Marchart, O. (2014). Institution and dislocation: Philosophical roots of Laclau's discourse theory of space and antagonism. Distinktion: Scandinavian Journal of Social Theory, 15(3), 271–282. doi: 10.1080/1600910X.2014.966272
  • Minder, R. (2017). For Syrian girl in need of medical care, Trump's travel ban adds to a Nomadic Tragedy. New York Times, February 1.
  • Newman, A. (2017). Highlights: Reaction to Trump's travel ban. New York Times, 29 January.
  • O'Reilly, B., & Watters, J. (2017). Trump travel ban examined, the O’Reilly factor. Fox News.
  • Obama, B. (2011). Remarks by the president at “A Concert for Hope”. The White House. [archive] retrieved from: https://obamawhitehouse.archives.gov/the-press-office/2011/09/11/remarks-president-concert-hope.
  • Parmar, I. (2017). The legitimacy crisis of the U.S. elite and the rise of Donald Trump. Insight Turkey, 19(3), 9–22. doi: 10.25253/99.2017193.01
  • Parmar, I. (2018). The US-led liberal order: Imperialism by another name? International Affairs, 94(1), 151–172. doi: 10.1093/ia/iix240
  • Restad, H. E. (2020). What makes America great? Donald Trump, national identity, and U.S. Foreign policy. Global Affairs. doi: 10.1080/23340460.2020.1734955
  • Salter, M. B. (2008). Securitization and desecuritization: A dramaturgical analysis of the Canadian Air Transport security authority. Journal of International Relations and Development, 11(4), 324. doi: 10.1057/jird.2008.20
  • Sanders, S. (2017). Press Briefing by press Secretary Sarah Sanders. White House.
  • Schumer, C. (2017). Travel Ban. Congressional Record, S462–S466.
  • Sessions, J. (2018). Attorney general sessions delivers remarks to the Western Conservative Summit. Department of Justice. Available at: https://www.justice.gov/opa/speech/attorney-general-sessions-delivers-remarks-western-conservative-summit.
  • Siniver, A., & Featherstone, C. (2020). The Plutocrat president: Low-conceptual complexity and Trump’s foreign policy. Global Affairs. doi: 10.1080/23340460.2020.1734953
  • Van Rythoven, E. (2015). Learning to feel, learning to fear? Emotions, imaginaries, and limits in the politics of securitization. Security Dialogue, 46(5), 458–475. doi: 10.1177/0967010615574766
  • Waever, O. (1995). Securitization and desecuritization. In R. Lipschutz (Ed.), On security (pp. 46–86). New York: Columbia University Press.
  • White House. (2018a) President Donald J. Trump’s 500 Days of American Greatness. https://www.whitehouse.gov/briefings-statements/president-donald-j-trumps-500-days-american-greatness/
  • White House. (2018b) Weekly Address. https://www.whitehouse.gov/briefings-statements/president-donald-j-trumps-weekly-address-29/
  • Wilhelmsen, J. (2017). How does war become a legitimate undertaking? Re-engaging the post-structuralist foundation of securitization theory. Cooperation and Conflict, 52(2), 166–183. doi: 10.1177/0010836716648725
  • Wilson, J. (2017). New administration is committed to military readiness. Congressional Record, H708.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.