Results for 'counterterrorism'

12 found
Order:
  1. Winning counterterrorism's version of Pascal's wager, but struggling to open the purse.Brian J. Gibbs - 2014 - Behavioral and Brain Sciences 37 (4):368-369.
    Lankford’s (2013) essential empirical argument, which is based on evidence such as psychological autopsies, is that suicide attacks are caused by suicidality. By operationalizing this causal claim in a hypothetical experiment, I show the claim to be provable, and I contend that its truth is supported by Lankford’s data. However, I question the success of his follow-on arguments about beauty and goodness.
    Download  
     
    Export citation  
     
    Bookmark  
  2. Anthropology of Security and Security in Anthropology: Cases of Counterterrorism in the United States.Meg Stalcup & Limor Samimian-Darash - 2017 - Anthropological Theory 1 (17):60-87.
    In our study of U.S. counterterrorism programs, we found that anthropology needs a mode of analysis that considers security as a form distinct from insecurity, in order to capture the very heterogeneity of security objects, logics and forms of action. This article first presents a genealogy for the anthropology of security, and identifies four main approaches: violence and State terror; military, militarization, and militarism; para-state securitization; and what we submit as “security analytics.” Security analytics moves away from studying security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Terrorism, Security, and the Threat of Counterterrorism.Jessica Wolfendale - 2007 - Studies in Conflict and Terrorism 30 (1):75-93.
    Download  
     
    Export citation  
     
    Bookmark  
  4. The Grotius Sanction: Deus Ex Machina. The legal, ethical, and strategic use of drones in transnational armed conflict and counterterrorism.James Welch - 2019 - Dissertation, Leiden University
    The dissertation deals with the questions surrounding the legal, ethical and strategic aspects of armed drones in warfare. This is a vast and complex field, however, one where there remains more conflict and debate than actual consensus. -/- One of the many themes addressed during the course of this research was an examination of the evolution of modern asymmetric transnational armed conflict. It is the opinion of the author that this phenomenon represents a “grey-zone”; an entirely new paradigm of warfare. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. European urban (counter)terrorism's spacetimematterings: More-than-human materialisations in situationscaping times.Evelien Geerts, Katharina Karcher, Yordanka Dimcheva & Mireya Toribio Medina - 2023 - In Alice Martini & Raquel Da Silva (eds.), Contemporary Reflections on Critical Terrorism Studies. Routledge. pp. 31-52.
    Infusing contemporary critical terrorism studies (CTS) with concepts and methodologies from philosophy and critical theory via a Baradian posthumanist agential realist perspective and (counter)terrorist cases and vignettes, this chapter argues for a retheorisation of (counter)terrorism. It does so, firstly, by reconceptualising terrorism and counterterrorism as complex assemblages consisting not only of discursive-material components – an entanglement now largely accepted within CTS and critical security studies (CSS) – but also of affective layers and more-than-human phenomena. Secondly, by analysing European urban (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. What If? Re-imagined Scenarios and the Re-virtualisation of History.Meg Stalcup - 2015 - Media/Culture Journal 18 (6).
    This article explores the process of “re-imagined scenarios,” through which the moments of contact with the 9/11 hijackers were developed into scenarios that came to play a central role in U.S. counterterrorism training and policy. Drawing on fieldwork and interviews with trainers, government officials, and police officers, it is argued that these scenarios do not recreate previous encounters, or conjure up possible futures, but instead rely on “the elasticity of the almost” to reactivate the past. The re-imagined scenarios call (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. Is Terrorism a Serious Threat to International and National Security? NO: The Myth of Terrorism as an Existential Threat.Jessica Wolfendale - 2012 - In Richard Jackson & Samuel Justin Sinclair (eds.), Contemporary Debates on Terrorism. Routledge. pp. 80-87.
    In contemporary academic, political, and media discourse, terrorism is typically portrayed as an existential threat to lives and states, a threat driven by religious extremists who seek the destruction of Western civilization and who are immune to reason and negotiation. In many countries, including the US, the UK, and Australia, this existential threat narrative of terrorism has been used to justify sweeping counterterrorism legislation, as well as military operations and even the use of tactics such as torture and indefinite (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. The Post-9/11 State of Emergency: Reality versus Rhetoric.Edmund F. Byrne - 2004 - Social Philosophy Today 19:193-215.
    After the 9/11 attacks the U.S. administration went beyond emergency response towards imperialism, but cloaked its agenda in the rhetoric of fighting ‘terrorists’ and ‘terrorism.’ After distinguishing between emergency thinking and emergency planning, I question the administration’s “war on terrorism” rhetoric in three stages. First, upon examining the post-9/11 antiterrorism discourse I find that it splits into two agendas: domestic, protect our infrastructure; and foreign, select military targets. Second, I review approaches to emergency planning already in place. Third, after reviewing (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  9. Would you mind being watched by machines? Privacy concerns in data mining.Vincent C. Müller - 2009 - AI and Society 23 (4):529-544.
    "Data mining is not an invasion of privacy because access to data is only by machines, not by people": this is the argument that is investigated here. The current importance of this problem is developed in a case study of data mining in the USA for counterterrorism and other surveillance purposes. After a clarification of the relevant nature of privacy, it is argued that access by machines cannot warrant the access to further information, since the analysis will have to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  10. Technology as Terrorism: Police Control Technologies and Drone Warfare.Jessica Wolfendale - 2021 - In Scott Robbins, Alastair Reed, Seamus Miller & Adam Henschke (eds.), Counter-Terrorism, Ethics, and Technology: Emerging Challenges At The Frontiers Of Counter-Terrorism,. Springer. pp. 1-21.
    Debates about terrorism and technology often focus on the potential uses of technology by non-state terrorist actors and by states as forms of counterterrorism. Yet, little has been written about how technology shapes how we think about terrorism. In this chapter I argue that technology, and the language we use to talk about technology, constrains and shapes our understanding of the nature, scope, and impact of terrorism, particularly in relation to state terrorism. After exploring the ways in which technology (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  11. Policing Uncertainty: On Suspicious Activity Reporting.Meg Stalcup - 2015 - In Rabinow Simimian-Darash (ed.), Modes of Uncertainty: Anthropological Cases. University of Chicago. pp. 69-87.
    A number of the men who would become the 9/11 hijackers were stopped for minor traffic violations. They were pulled over by police officers for speeding or caught by random inspection without a driver’s license. For United States government commissions and the press, these brushes with the law were missed opportunities. For some police officers though, they were of personal and professional significance. These officers replayed the incidents of contact with the 19 men, which lay bare the uncertainty of every (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  12. The Erasure of Torture in America.Jessica Wolfendale - forthcoming - Case Western Journal of International Law.
    As several scholars have argued, far from being antithetical to American values, the torture of nonwhite peoples has long been a method through which the United States has enforced (at home and abroad) a conception of what I will call “white moral citizenship." What is missing from this literature, however, is an exploration of the role that the erasure of torture, and the political and public narratives that are used to justify torture, plays in this function. -/- As I will (...)
    Download  
     
    Export citation  
     
    Bookmark