1887
Volume 16, Issue 5
  • ISSN 1569-2159
  • E-ISSN: 1569-9862
USD
Buy:$35.00 + Taxes

Abstract

This article addresses the question of how draconian counter-terrorism policies are legitimized in long-established democracies. Being the heartland of liberal rights, the UK comes to the fore as a striking case where some of the most controversial security policies have been enacted. The study undertakes a systematic frame analysis of UK parliamentary debates with the help of ATLAS.ti, which allows the analyst to trace and map out recurrent concepts, themes, and arguments as well as their overall distribution. While demonstrating the workings of securitization in the formulation of key counter-terrorism legislation, the study unearths how the security narrative in the UK context evidently relies on the language of rights in invoking legitimacy. The study suggests that far from negating the indispensable status of human rights, security narrative resorts to the latter’s moral power and mimics rights language, heralding the weight of these international norms even in hard-core security matters.

Loading

Article metrics loading...

/content/journals/10.1075/jlp.15043.dem
2017-05-10
2019-10-17
Loading full text...

Full text loading...

References

  1. Agamben, Giorgio
    2003State of Exception. Chicago: University of Chicago Press.
    [Google Scholar]
  2. Balzacq, Thierry
    2010 “A theory of securitization: Origins, Core assumptions and variants.” InSecuritization Theory: How Security Problems Emerge and Dissolve, edited by Thierry Balzacq . Routledge: New York.
    [Google Scholar]
  3. Brown, Anne M.
    2002Human Rights and the Borders of Suffering: The Promotion of Human Rights in International Politics. New York: Manchester University Press. doi: 10.7228/manchester/9780719061059.001.0001
    https://doi.org/10.7228/manchester/9780719061059.001.0001 [Google Scholar]
  4. Buzan, Barry , Ole Wæver , and Jaap de Wilde
    1998Security: A New Framework for Analysis. London: Lynne Rienner Publishers.
    [Google Scholar]
  5. Counter-Terrorism and Security Act
    Counter-Terrorism and Security Act 2015 Accessed10 June 2015. Available atwww.legislation.gov.uk/ukpga/2015/6/part/2/enacted.
  6. Slack, James
    2016 “EU may ban deporting terrorism suspects: Top Brussels court plans power grab on human rights cases,” Daily Mail, 11May. Accessed10 July 2016. www.dailymail.co.uk/news/article-3583959/EU-ban-deporting-terrorism-suspects-Brussels-court-plans-power-grab-human-rights-cases.html.
    [Google Scholar]
  7. Donnelly, Jack
    1999 “The Social Construction of International Human Rights.” in Dunne, T. and Wheeler, N.J. (eds.) Human Rights in Global Politics, 71–101. Cambridge: Cambridge University Press. doi: 10.1017/CBO9781139171298.004
    https://doi.org/10.1017/CBO9781139171298.004 [Google Scholar]
  8. Dunne, Tim
    2010 “The English School,” inInternational Relations Theories: Discipline and Diversity, edited by Tim Dunne , Milja Kurki , and Steve Smith , 132–152. Oxford: Oxford University Press.
    [Google Scholar]
  9. Fisher, Kathryn Marie
    2015Security, Identity, and British Counterterrorism Policy. London: Palgrave Macmillan. doi: 10.1007/978‑1‑137‑52422‑5
    https://doi.org/10.1007/978-1-137-52422-5 [Google Scholar]
  10. Forsythe, David P.
    2000Human Rights in International Relations. Cambridge: Cambridge University Press. doi: 10.1017/CBO9780511755866
    https://doi.org/10.1017/CBO9780511755866 [Google Scholar]
  11. Goffman, Erving
    1986Frame Analysis: An Essay on the Organization of Experience. Boston: Northeastern University Press.
    [Google Scholar]
  12. Goold, Benjamin J. and Lazarus, Liora
    2007Security and Human Rights. Portland: Hart Publishing.
    [Google Scholar]
  13. HM Government
    HM Government 2011Review of Counter-terrorism and Security Powers. Accessed10 February 2013. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/97972/review-findings-and-rec.pdf.
    [Google Scholar]
  14. House of Lords
    House of Lords 16 December 2004Opinions of the Lords of Appeal for the Judgment in the Cause A (FC) and others (FC) (Appellants) v. Secretary of State for the Home Department (Respondent) X (FC) and another (FC) (Appellants) v. Secretary of State for the Home Department (Respondent). Accessed05 October 2013. www.publications.parliament.uk/pa/ld200405/ldjudgmt/jd041216/aandothers.pdf.
    [Google Scholar]
  15. Human Rights Act 1998 (Designated Derogation) Order
    Human Rights Act 1998 (Designated Derogation) Order 2001 Accessed10 February 2014. www.legislation.gov.uk/uksi/2001/3644/schedule/1/made.
  16. Huysman, Jef and Buonfino, Alessandra
    2008 “Politics of Exception and Unease: Immigration, Terrorism, and Asylum in the Parliamentary Debates in the UK.” InPolitical Studies, 56 (4): 766–788. doi: 10.1111/j.1467‑9248.2008.00721.x
    https://doi.org/10.1111/j.1467-9248.2008.00721.x [Google Scholar]
  17. Jackson, Richard
    2005Writing the War on Terrorism: Language, Politics, and Counter-terrorism. Manchester: Manchester University Press.
    [Google Scholar]
  18. Kuypers, Jim A.
    2009 “Framing Analysis.” InRhetorical Criticism: Perspectives in Action, (ed.) Jim A. Kuypers , 181–204. Plymouth, UK: Lexington Books.
    [Google Scholar]
  19. Neal, Andrew W.
    2012 “Normalization and Legislative Exceptionalism: Counterterrorist Lawmaking and the Changing Times of Security Emergencies.” InInternational Political Sociology, vol.6: 260–276. doi: 10.1111/j.1749‑5687.2012.00163.x
    https://doi.org/10.1111/j.1749-5687.2012.00163.x [Google Scholar]
  20. Parker, Tom
    2006 “The Fateful Triangle: Identity Politics, Security Policy and the Anglo-Irish Relations.” InNational Counter-terrorism Strategies, edited by R. W. Orttung and A. Makarychev , 79–105. Netherlands: IOS Press.
    [Google Scholar]
  21. Risse, Thomas , Ropp Stephen C. , and Sikkink Kathryn
    1999The Power of Human Rights. Cambridge: Cambridge University Press. doi: 10.1017/CBO9780511598777
    https://doi.org/10.1017/CBO9780511598777 [Google Scholar]
  22. Savic, Obrad
    1999 “Introduction: The Global and the Local in Human Rights.” InThe Politics of Human Rights, edited by Obrad Savic , 3–15. London: Verso.
    [Google Scholar]
  23. Travis, Alan
    2013 “Conservatives promise to scrap Human Rights Act after next election.” The Guardian30September. Accessed20 April 2014. www.theguardian.com/law/2013/sep/30/conservitives-scrap-human-rights-act.
    [Google Scholar]
  24. Tsoukala, Anastassia
    2008 “Defining the terrorist threat in the post-September 11 era.” InTerror, Insecurity, and Liberty: Illiberal practices of liberal regime after 9/11, edited by Bigo, Didier and Tsoukala, Anastassia , 50–99. Routledge: New York. doi: 10.4324/9780203926765.ch3
    https://doi.org/10.4324/9780203926765.ch3 [Google Scholar]
  25. Verloo, Mieke and Lombardo, Emanuela
    2007 “Contested Gender Equality and Policy Variety in Europe: Introducing a Critical Frame Analysis Approach.” InMultiple Meanings of Gender Equality: A Critical Frame Analysis of Gender Policies in Europe, edited by Mieke Verloo , 21–50. Budapest: CEU Press.
    [Google Scholar]
  26. Wæver, Ole
    1995 “Securitization and Desecuritization.” InOn Security, edited by R. Lipschutz , pp.46–86. New York: Columbia University Press.
    [Google Scholar]
  27. Wolfendale, Jessica
    2006 “Terrorism, Security and the Threat of Counterterrorism.” Studies in Conflict and Terrorism, 29 (7): 753–770. doi: 10.1080/10576100600791231
    https://doi.org/10.1080/10576100600791231 [Google Scholar]
  28. Zarakol, Ayşe
    2011 “What Makes Terrorism Modern? Terrorism, Legitimacy, and the International System.” Review of International Studies, 37 (5): 2311–2336. doi: 10.1017/S0260210510001518
    https://doi.org/10.1017/S0260210510001518 [Google Scholar]
http://instance.metastore.ingenta.com/content/journals/10.1075/jlp.15043.dem
Loading
/content/journals/10.1075/jlp.15043.dem
Loading

Data & Media loading...

  • Article Type: Research Article
Keyword(s): counter-terrorism , frame analysis , human rights , securitization and United Kingdom
This is a required field
Please enter a valid email address
Approval was successful
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error