Results for 'Counterintelligence, counter-terrorism, strategic counterintelligence, strategic intelligence'

965 found
Order:
  1.  16
    TRAC: Developing Counterintelligence for Strategic Application into the Counter-Terrorism Space.Andrew D. Henshaw - 2014 - Intelligence Analysis.
    SummaryThe practice of counterintelligence traditionally lies in its application to the function of catching spies, stopping espionage and protecting national security and the national interest. More recently though counterintelligence has matured and is frequently being deployed into fields such as counter-terrorism, however it still remains that counterintelligence is often poorly understood, and the practice of counterintelligence operations in the counter-terrorism space presents new challenges as well as conflicts of purpose with the contemporary partners of intelligence and security (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  2.  49
    Rights in the Context of Counter-Terrorism Measures: United States of America.Andrius Lygutas - 2009 - Jurisprudencija: Mokslo darbu žurnalas 117 (3):145-161.
    The terror attacks of September 11, 2001, facilitated a transformation in federal Governance in the United States of America (hereinafter – the USA). The events of that day showed that the counter-terrorism system of the USA was ineffective. Law enforcement agencies failed to prevent terrorist attacks and thus changes were necessary. The most significant transformations were the following: dozens of new laws were passed; the bureaucracy of the US Government was reorganized; a war was launched to eliminate a sanctuary (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  3.  37
    Discourses on Countering Violent Extremism: The Strategic Interplay Between Fear and Security After 9/11.Michael Stohl, Benjamin Smith & Musa Al-Gharbi - forthcoming - Critical Studies on Terrorism.
    This article explores the construction of extremism in media discourse, the factors driving specific constructions and the implications of these constructions for counterterrorism policy. We contend that extremism has predominantly and increasingly been framed as a security issue. This article explores the implications of this practice through the framework of securitisation. We measure the average intensity of security framing in 38,616 articles found in three major US newspapers, New York Times, Wall Street Journal and Los Angeles Times, between 20 January (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  19
    Counter-narrative strategies in deradicalisation: A content analysis of Indonesia’s anti-terrorism laws.Joko Setiyono & Sulaiman Rasyid - 2022 - HTS Theological Studies 78 (1):8.
    This article analysed the Indonesian government’s strategy in eradicating terrorism and radicalism. This study was designed with quantitative methods within the framework of normative legal research using anti-terrorism-related regulations as the sample. Data analysis was carried out with content analysis to identify the conception of terrorism, radicalism and deradicalisation in the legislation. The research found that most of Indonesia’s counter-terrorism regulations associate terrorism with criminal actions. However, regulatory developments also present a decreasing association between terrorism and acts of violence (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5.  29
    Perpetrators’ strategic communication: Framing and identity building on ethno-nationalist terrorists’ websites.María Martín Villalobos, Arlinda Arizi, Natalia Angulo Mejía, Yulia An & Liane Rothenberger - 2018 - Communications 43 (2):133-171.
    The study explores communication strategies of ethno-nationalist terrorists with respect to their framing and identity building. Strategies of eight ethno-nationalist terrorist groups were analyzed using 70 articles published on the groups’ websites. Three cluster-analytic procedures and a correlational analysis were applied to strategies of problem definition, cause and responsibility attribution, treatment recommendations, and identity building. The analysis revealed various dimensions on which terrorists frame their content. No group-specific strategies of framing and identity building have been found yet, suggesting that the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  7
    Weaponized Words: The Strategic Role of Persuasion in Violent Radicalization and Counter-Radicalization.Kurt Braddock - 2020 - Cambridge University Press.
    Strengthen your understanding of the persuasive mechanisms used by terrorist groups and how they are effective in order to defeat them. Weaponized Words applies existing theories of persuasion to domains unique to this digital era, such as social media, YouTube, websites, and message boards to name but a few. Terrorists deploy a range of communication methods and harness reliable communication theories to create strategic messages that persuade peaceful individuals to join their groups and engage in violence. While explaining how (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  22
    Education, Security and Intelligence Studies.Liam Gearon - 2015 - British Journal of Educational Studies 63 (3):263-279.
    Reference to security and intelligence in education today will undoubtedly elicit concerns over terrorism, radicalisation and, in the UK, counter-terrorism measures such as Channel and Prevent (UK...
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  8.  50
    Spying Through a Glass Darkly: The Ethics of Espionage and Counter-Intelligence.Cécile Fabre - 2022 - Oxford University Press.
    Cécile Fabre draws back the curtain on the ethics of espionage and counterintelligence. In a book rich with historical examples she argues that spying is only justified to protect against ongoing violations of fundamental rights. Blackmail, bribery, mass surveillance, cyberespionage, treason, and other nefarious activities are considered.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  9. Minimum force meets brutality: Detention, interrogation and torture in british counter-insurgency campaigns.Andrew Mumford - 2012 - Journal of Military Ethics 11 (1):10-25.
    Abstract This paper explores brutality and torture in the history of British counter-insurgency campaigns. Taking as a pretext the British government's announcement in January 2012 to scrap a judicial review into the rendition and torture of UK citizens at Guantanamo Bay by American intelligence operatives with the complicity of British intelligence agencies, the paper posits that the actions this review was supposed to evaluate are not restricted to counter-terrorism. By examining the historical usage of interrogation methods (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  10. Transnational macro-narrative descendancy in violent conflict: a case study of the Mujahidin Indonesia Timur in central Sulawesi.Andrew D. Henshaw - unknown
    This thesis investigates transnational macro-narrative decendancy in violent conflicts and identifies enabling dynamics that facilitate re-framing. To date there has been little focus on processes involved, explicitly narrative descendancy, bridging, resonance building, or grafting, representing a critical knowledge gap. -/- This thesis reviews relevant literature on constructivism and rational choice theory and tests the findings against an empirical case study in Central Sulawesi. The findings demonstrate a mixture of approaches is present, though this is likely due to a range of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11. The paradox of terrorism in civil war.Stathis N. Kalyvas - 2004 - The Journal of Ethics 8 (1):97-138.
    A great deal of violence in civil wars is informed by the logic of terrorism: violence tends to be used by political actors against civilians in order to shape their political behavior. I focus on indiscriminate violence in the context of civil war: this is a type of violence that selects its victims on the basis of their membership in some group and irrespective of their individual actions. Extensive empirical evidence suggests that indiscriminate violence in civil war is informed by (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  12.  66
    Policing, profiling and discrimination law: US and European approaches compared.Aaron Baker & Gavin Phillipson - 2011 - Journal of Global Ethics 7 (1):105 - 124.
    Counter-terrorism officials in the USA and the UK responded to the events of 11 September 2001 and 7 July 2005 with an increasing resort to the use of ?intelligence-led policing? methods such as racial and religious profiling. Reliance on intelligence, to the effect that most people who commit a certain crime have a certain ethnicity, can lead to less favourable treatment of an individual with that ethnicity because of his membership in that group, not because of any (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  13.  45
    Corporate Psychopathy: Can ‘Search and Destroy’ and ‘Hearts and Minds’ Military Metaphors Inspire HRM Solutions?Alasdair J. Marshall, Melanie J. Ashleigh, Denise Baden, Udechukwu Ojiako & Marco G. D. Guidi - 2015 - Journal of Business Ethics 128 (3):495-504.
    Corporate psychopathy thrives perhaps as the most significant threat to ethical corporate behaviour around the world. We argue that Human Resources Management professionals should formulate strategic solutions metaphorically by balancing what strategic military planners famously call ‘Search and Destroy’ and ‘Hearts and Minds’ counter-terrorist strategy. We argue that these military metaphors offer creative inspiration to help academics and practitioners theorise CP in richer, more reflective and more balanced and complementary ways. An appreciation of both metaphors is likely (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  14.  5
    Making Voltaires out of Bureaucrats? Revisiting the Policy of Counter-Enlightenment.Олег Николаевич Смолин - 2023 - Russian Journal of Philosophical Sciences 66 (3):30-50.
    The article discusses the legal and regulatory aspects of enlightenment activities within the context of the socio-cultural objectives of contemporary Russian educational policy. The author examines social and education-policy factors that underscore the need for extensive enlightenment efforts in the country. One of these factors is the increasing pragmatization of attitudes towards knowledge, leading to a decline in the cultural literacy of the population. Among the manifestations of this issue is the undervaluation of the importance of fostering a well-rounded cultural (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  29
    (1 other version)The ‘Bush Doctrine’ as a hegemonic discourse strategy.Mark Rigstad - 2009 - Critical Review of International Social and Political Philosophy 12 (3):377-398.
    Even if preventive military counter-terrorism may sometimes be ethically justifiable, it remains an open question whether the Bush Doctrine presented a discursively coherent account of the relevant normative conditions. With a view towards answering this question, this article critically examines efforts to ground the morally personifying language of the Bush Doctrine in term of hegemonic stability theory. Particular critical attention is paid to the arguments of leading proponents of this brand of game theory, including J. Yoo, E. Posner, A. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  16.  12
    Counter-Terrorism: Narrative Strategies.Ajit Maan - 2014 - Upa.
    Counter-Terrorism makes a connection, unique to terrorism studies, between the mechanisms of colonizing narratives and psychological warfare aimed at recruitment. There is an urgent need to understand the narrative tactics of terrorist recruitment and an equal if not greater need to destabilize and exploit the weaknesses of those narratives.
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  11
    Strategies of Peace.Daniel Philpott & Gerard Powers - 2010 - Oxford University Press USA.
    How can a just peace be built in sites of genocide, massive civil war, dictatorship, terrorism, and poverty? In Strategies of Peace, the first volume in the Studies in Strategic Peacebuilding series, fifteen leading scholars propose an imaginative and provocative approach to peacebuilding. Today the dominant thinking is the "liberal peace," which stresses cease fires, elections, and short run peace operations carried out by international institutions, western states, and local political elites. But the liberal peace is not enough, the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  17
    Salam-Online: Preventive Measures against extreme online messages among Muslims in Germany. Insights into a pilot project at the Center for Islamic Theology, Münster.Marcel Klapp - 2018 - Lodz Papers in Pragmatics 14 (1):181-201.
    The article sheds light on programs and measures against Islamist-extremist messages both by governmental and non-governmental institutions in Germany. The “German way” for the most part is characterized through its renouncement of counter-terrorist narration through campaigns. Instead, decentralized, horizontal and “value-based” forms of strategic communication are being established. Therefore, German governmental as well as non-governmental institutions are currently developing educational programs in order to not only debunk extremist myths but rather to enable youngsters to critically reflect on mechanisms (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  19.  10
    The Fog of Peace: War on Terror, Surveillance States, and Post-human Governance.Nandita Biswas Mellamphy - 2023 - Washington University Review of Philosophy 3:63-82.
    The War on Terror is an ambiguous term that has been used to circumvent the international laws of warfare. Instead of moving toward peace by way of limited warfare, and instead of preserving the independence of war and peace, War on Terror advances by masking itself in a fog of peace; it proliferates by overlapping the logic of “war-time” and “peace-time” operations. The fog of peace—as it shall herein be called—is a condition wherein the uncertainty qua “fog” of war,2 along (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20. Privacy, Bulk Collection and "Operational Utility".Tom Sorell - 2021 - In Seumas Miller, Mitt Regan & Patrick Walsh (eds.), National Security Intelligence and Ethics. Routledge. pp. 141-155.
    In earlier work, I have expressed scepticism about privacy-based criticisms of bulk collection for counter-terrorism ( Sorell 2018 ). But even if these criticisms are accepted, is bulk collection nonetheless legitimate on balance – because of its operational utility for the security services, and the overriding importance of the purposes that the security services serve? David Anderson’s report of the Bulk Powers review in the United Kingdom suggests as much, provided bulk collection complies with strong legal safeguards ( Anderson (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  21. Counter-terrorism and lethal force.Seumas Miller - 2019 - In David Edmonds (ed.), Ethics and the Contemporary World. New York: Routledge.
     
    Export citation  
     
    Bookmark  
  22.  48
    Norms and value based reasoning: justifying compliance and violation.Trevor Bench-Capon & Sanjay Modgil - 2017 - Artificial Intelligence and Law 25 (1):29-64.
    There is an increasing need for norms to be embedded in technology as the widespread deployment of applications such as autonomous driving, warfare and big data analysis for crime fighting and counter-terrorism becomes ever closer. Current approaches to norms in multi-agent systems tend either to simply make prohibited actions unavailable, or to provide a set of rules which the agent is obliged to follow, either as part of its design or to avoid sanctions and punishments. In this paper we (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  23. Counter-) terrorism and hybridity.Fiona de Londras - 2017 - In Rosa Freedman & Nicolas Lemay-Hébert (eds.), Hybridity: law, culture and development. New York, NY: Routledge.
  24.  35
    (1 other version)The UK's PREVENT Counter-Terrorism Strategy appears to promote rather than prevent violence.Rob Faure Walker - 2019 - Journal of Critical Realism 18 (5):487-512.
    ABSTRACTThis paper explores the impacts of the PREVENT Counter-Terrorism Strategy. The conclusion is reached that violence may be being promoted rather than prevented by government attempts to counter ‘radicalisation’ and ‘extremism’. The motivation for this paper is the author's experience of the PREVENT Counter-Terrorism Strategy in a school in east London; and its main recommendation is that counter-extremism strategies can and should be contested. This conclusion, and the explanation for it, is reached by using a critical (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  23
    Counter-Terrorism: Torture and Assassination.Haig Khatchadourian - 2004 - In Counter-Terrorism: Torture and Assassination. pp. 177-196.
    Direct download  
     
    Export citation  
     
    Bookmark  
  26.  28
    Debating Targeted Killing: Counter-Terrorism or Extrajudicial Execution?Tamar Meisels & Jeremy Waldron - 2020 - Oup Usa.
    Known terrorists are often targeted for death by the governments of Israel and the United States. Several thousand have been killed by drones or by operatives on the ground in the last twenty years. Is this form of killing justified? Is there anything about it that should disturb us? In this for-and-against book, political theorists Jeremy Waldron and Tamar Meisels engage in extended debate to illuminate these issues. They consider the actions of targeting and hunting down named individuals, and they (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27. I Terrorism & Counter-Terrorism/Semantics.Tomis Kapitan - 2005 - In Georg Meggle (ed.), Ethics of Terrorism and Counter-Terrorism. Ontos. pp. 3--9.
     
    Export citation  
     
    Bookmark  
  28. Bulk Collection, Intrusion and Domination.Tom Sorell - 2018 - In Andrew I. Cohen (ed.), Philosophy and Public Policy. New York, USA: Rowman & Littlefield International. pp. 39-61.
    Bulk collection involves the mining of large data sets containing personal data, often for a security purpose. In 2013, Edward Snowden exposed large scale bulk collection on the part of the US National Security Agency as part of a secret counter-terrorism effort. This effort has mainly been criticised for its invasion of privacy. I argue that the right moral argument against it is not so much to do with intrusion, as ineffectiveness for its official purpose and the lack of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  29. Terrorism and Counter‐Terrorism.Michael Boylan (ed.) - 2008-05-30 - Blackwell.
     
    Export citation  
     
    Bookmark  
  30. European urban (counter)terrorism's spacetimematterings: More-than-human materialisations in situationscaping times.Evelien Geerts, Katharina Karcher, Yordanka Dimcheva & Mireya Toribio Medina - 2023 - In Alice Martini & Raquel Da Silva (eds.), Contemporary Reflections on Critical Terrorism Studies. Routledge. pp. 31-52.
    Infusing contemporary critical terrorism studies (CTS) with concepts and methodologies from philosophy and critical theory via a Baradian posthumanist agential realist perspective and (counter)terrorist cases and vignettes, this chapter argues for a retheorisation of (counter)terrorism. It does so, firstly, by reconceptualising terrorism and counterterrorism as complex assemblages consisting not only of discursive-material components – an entanglement now largely accepted within CTS and critical security studies (CSS) – but also of affective layers and more-than-human phenomena. Secondly, by analysing European (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  52
    Terrorism and Counter-Terrorism: Ethics and Liberal Democracy.Bruce Landesman - 2011 - Australasian Journal of Philosophy 89 (2):364 - 367.
    Australasian Journal of Philosophy, Volume 89, Issue 2, Page 364-367, June 2011.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  32. Commentary: A Failure of Imagination.Scott Atran - unknown
    Intelligence estimates based on models keyed to frequency and recency of past occurrences make people less secure even if they predict most harmful events. The U.S. presidential commission on WMDs, the 9/11 commission, and Spain's comisión 11-M have condemned the status quo mentality of the intelligence community, which they see as being preoccupied with today's “current operations” and tactical requirements, and inattentive to tomorrow's far-ranging problems and strategic solutions. But the overriding emphasis in these commissions' recommendations is (...)
     
    Export citation  
     
    Bookmark  
  33.  31
    Morphing the counter-terrorist response: Beating the bombers in London’s financial heart.Jon Coaffee - 2003 - Knowledge, Technology & Policy 16 (2):63-83.
    Since the 1970s Western governments have sought to defend selective urban areas from terrorist attack through a plethora of measures aimed at territorially controlling space both physically and technologically where the disruption to the orderly flow of commerce, or other activities, is minimized. Drawing on recent historical accounts, this paper seeks to track the changes to the landscape of Britain’s financial heart, the City of London, from the 1990s to the current day, as its leaders and security agents have sought (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  34.  47
    The Crisis Management Capability of Japan's Self Defense Forces for UN Peacekeeping, Counter-Terrorism, and Disaster Relief.Katsumi Ishizuka - 2013 - Japanese Journal of Political Science 14 (2):201-222.
    This article examines the crisis management capabilities of Japan's Self Defense Forces (SDF) in the areas of United Nations (UN) peacekeeping, counter-terrorism, and disaster relief. The three types of overseas operations were all initiated by Japan as a response to international crises. While SDF crisis management capabilities for UN peacekeeping operations have steadily evolved, room for improvement remains. For example, Japan's commitment to logistic and rapid deployment missions could be strengthened. Regarding the second type of operations, counter-terrorism, Japan's (...)
    No categories
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  35.  53
    Preventive Policing, Surveillance, and European Counter-Terrorism.Tom Sorell - 2011 - Criminal Justice Ethics 30 (1):1-22.
    A European Union counter-terrorism strategy was devised in 2005.1 Of its four strands—prevent, pursue, protect, and respond—only two have a direct connection with policing. Perhaps surprisingly, th...
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  36.  12
    The Cultural Roots of Strategic Intelligence.Gino Lapaglia - 2019 - Lanham: Lexington Books.
    In The Cultural Roots of Strategic Intelligence, Gino LaPaglia argues that Strategic Intelligence is a core dynamic of human rationality and that it has always been foundational for creating meaning in society. For thousands of years the identity of the heroic strategist has provided hope for human life lived in extremis.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  37.  16
    Secrecy provisions in Australian counter-terrorism policy: violating international human rights standards?Katharine Gelber - 2013 - Australian Journal of Human Rights 19 (2):25-46.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  38.  15
    Relationship between Security and Human Rights in Counter-Terrorism: A Case of Introducing Body Scanners in Civil Aviation.Iztok Prezelj - 2015 - International Studies. Interdisciplinary Political and Cultural Journal 17 (1):145-158.
    Changes in security environment after the end of Cold War and 9/11 have strongly affected our security concepts and paradigms. In the field of counter-terrorism, a serious conceptual and practical debate on the relationship between security and human rights and freedoms has begun. The goal of this paper is to reflect on this complex relationship at the conceptual level and introduce the empirical debate on this relationship in the field of civil aviation. The paper’s results show that the concept (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  39.  49
    Ethics, nuclear terrorism, and counter-terrorist nuclear reprisals – a response to John mark mattox's 'nuclear terrorism: The other extreme of irregular warfare'.Thomas E. Doyle - 2011 - Journal of Military Ethics 10 (4):296-308.
    This paper critically examines John Mark Mattox's view of the nature of the moral appropriateness of particular response options. By so doing, I aim to engage the wider readership in a debate, which I hope leads to greater clarity and precision of thinking on these topics. After summarizing Mattox's view, I argue first that in order for Mattox's ultimate conclusion to hold in moral terms, he must abandon the argument on the permissibility of nuclear reprisal to re-establish nuclear deterrence and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  40.  24
    Securitization of Islam: A Vicious Circle: Counter-Terrorism and Freedom of Religion in Central Asia By Kathrin Lenz-Raymann.Ramazan Erdağ - 2017 - Journal of Islamic Studies 28 (3):409-411.
    Securitization of Islam: A Vicious Circle: Counter-Terrorism and Freedom of Religion in Central Asia By Lenz-RaymannKathrin, 324 pp. Price PB €39.99. EAN 978–3837629040.
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  41.  41
    Style Management: Images of Global Counter-Terrorism at the United Nations.Isobel Roele - 2022 - Law and Critique 33 (3):273-297.
    Models of global governance abound: expert governance, networked governance, algorithmic governance, and old-fashioned juridico-political governance vie for explanatory power. This article takes up style as a way of analysing configurations of governance that do not readily fit a particular model of governance. Style is particularly revealing when it comes to deliberately unspecified or over-specified, genre-busting, and bet-hedging ways of imagining governance. The UN’s use of the phrase ‘convening power’ is a case in point. This article looks at how the UN (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  42.  40
    (1 other version)Ethics of Terrorism and Counter-Terrorism.Georg Meggle (ed.) - 2005 - Ontos.
    And, much worse, nearly nobody cares about this conceptual disaster -- the main thing being, whether or not you are taking sides with the good guys. This volume is an analytical attempt to end this disaster. What is Terrorism?
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  43.  37
    Illusions of Terrorism and Counter-Terrorism. [REVIEW]Jeff Horn - 2018 - The European Legacy 23 (4):457-458.
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  44.  43
    Contagious ideas: vulnerability, epistemic injustice and counter-terrorism in education.Aislinn O’Donnell - 2018 - Educational Philosophy and Theory 50 (10):981-997.
    The article addresses the implications of Prevent and Channel for epistemic justice. The first section outlines the background of Prevent. It draws upon Moira Gatens and Genevieve Lloyd’s concept of the collective imaginary, alongside Lorraine Code’s concept of epistemologies of mastery, in order to outline some of the images and imaginaries that inform and orient contemporary counter-terrorist preventative initiatives, in particular those affecting education. Of interest here is the way in which vulnerability is conceptualised in Prevent and Channel, in (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  20
    Philosophy, Terror, and Biopolitics.Cristian Iftode - 2012 - Public Reason 4 (1-2):229-39.
    The general idea of this investigation is to emphasize the elusiveness of the concept of terrorism and the pitfalls of the so-called “War on Terror” by way of confronting, roughly, the reflections made in the immediate following of 9/11 by Habermas and Derrida on the legacy of Enlightenment, globalization and tolerance, with Foucault’s concept of biopolitics seen as the modern political paradigm and Agamben’s understanding of “the state of exception” in the context of liberal democratic governments. The main argument will (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  46. The Responsibility to Protect from Terror: The Ethics of Foreign Counter-terrorist Interventions.Isaac Taylor - 2022 - Global Responsibility to Protect 14 (2):155-177.
    The use of military force abroad is a significant part of some states’ counter-terrorist efforts. Can these operations be ethically justified? This paper considers whether the underlying principles that philosophers have put forward to justify humanitarian interventions (which may underlie the international norm of the responsibility to protect (R2P)) can also give support for foreign counter-terrorist interventions of this sort. While it finds that the limits to international action that are imposed by the need to respect state sovereignty (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  47. The EU, pillar three and counter-terrorism.David Brown - 2000 - Sapientia 1 (4):1-19.
     
    Export citation  
     
    Bookmark  
  48.  51
    The moral dimension of asymmetrical warfare: counter-terrorism, democratic values and military ethics.Ted van Baarda & Désirée Verweij (eds.) - 2009 - Boston: Martinus Nijhoff.
    PART I The superpower and asymmetry PART II Jus ad bellum, jus in bello, jus post bellum PART III Leadership and accountability PART IV Soldiersa (TM) ...
    Direct download  
     
    Export citation  
     
    Bookmark  
  49.  15
    The history of Ukrainian Association of Researchers of Religion to the 25th anniversary of establising.Viktoriia Borodina & Ihor Kozlovskyi - 2021 - Ukrainian Religious Studies 92:166-175.
    In this issue, the founder of the Donetsk regional branch of the Ukrainian Association of Religious Studies, theologian, candidate of historical sciences, senior researcher of the Department of Religious Studies of the GS Skovoroda Institute of Philosophy of the National Academy of Sciences of Ukraine, President of the Center for Religious Studies member of the Expert Council on Freedom of Conscience and Religious Organizations under the Ministry of Culture of Ukraine, member of the Strategic Council under the Minister of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  51
    Upholding the Principle of Distinction in Counter-Terrorist Operations: A Dialogue.Avery Plaw - 2010 - Journal of Military Ethics 9 (1):3-22.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 965