scholarly journals Unfolding the Past, Proving the Present: Social Media Evidence in Terrorism Finance Court Cases

2020 ◽  
Vol 14 (4) ◽  
pp. 382-398 ◽  
Author(s):  
Tasniem Anwar

Abstract During terrorism trials, social media activities such as tweeting, Facebook posts, and WhatsApp conversations have become an essential part of the evidence presented. Amidst the complexity of prosecuting crimes with limited possibilities for criminal investigations and evidence collection, social media interactions can provide valuable information to reconstruct events that occurred there-and-then, to prosecute in the here-and-now. This paper follows social media objects as evidentiary objects in different court judgments to research how security practices and knowledge interact with legal practices in the court room. I build on the notion of the folding object as described by Bruno Latour and Amade M'charek to research the practices and arguments of the judges through which they unfold some of the histories, interpretations, and politics inside the object as reliable evidence. This concept allows for an in-depth examination of how histories are entangled in the presentation of an evidentiary object and how these references to histories are made (in)visible during legal discussions on security and terrorism. The paper therefore contributes to the field of critical security studies by focusing on how security practices are mediated in the everyday legal settings of domestic court rooms.

Author(s):  
Christopher Smith Ochoa ◽  
Frank Gadinger ◽  
Taylan Yildiz

Abstract Current debates about surveillance demonstrate the complexity of political controversies whose uncertainty and moral ambiguities render normative consensus difficult to achieve. The question of how to study political controversies remains a challenge for IR scholars. Critical security studies scholars have begun to examine political controversies around surveillance by exploring changing security practices in the everyday. Yet, (de)legitimation practices have hitherto not been the focus of analysis. Following recent practice-oriented research, we develop a conceptual framework based on the notion of ‘narrative legitimation politics’. We first introduce the concept of ‘tests’ from Boltanski's pragmatic sociology to categorise the discursive context and different moral reference points (truth, reality, existence). Second, we combine pragmatic sociology with narrative analysis to enable the study of dominant justificatory practices. Third, we develop the framework through a practice-oriented exploration of the Snowden controversy with a focus on the US and Germany. We identify distinct justificatory practices in each test format linked to narrative devices (for example, plots, roles, metaphors) whose fluid, contested dynamics have the potential to effect change. The framework is particularly relevant for IR scholars interested in legitimacy issues, the normativity of practices, and the power of narratives.


2018 ◽  
Vol 49 (4) ◽  
pp. 289-305 ◽  
Author(s):  
Catherine Eschle

This article extends the emergent focus on ‘the everyday’ in critical security studies to the topic of nuclear (in)security, through an empirical study of anti-nuclear peace activists understood as ‘everyday security practitioners’. In the first part of the article, I elaborate on the notion of everyday security practitioners, drawing particularly on feminist scholarship, while in the second I apply this framework to a case study of Faslane Peace Camp in Scotland. I show that campers emphasize the everyday insecurities of people living close to the state’s nuclear weapons, the blurred boundaries between ‘us’ and ‘them’, and the inevitability of insecurity in daily life. Moreover, campers’ security practices confront the everyday reproduction of nuclear weapons and prefigure alternative modes of everyday life. In so doing, I argue, they offer a distinctive challenge to dominant deterrence discourse, one that is not only politically significant, but also expands understanding of the everyday in critical security studies.


INVENSI ◽  
2018 ◽  
Vol 3 (1) ◽  
pp. 15-22
Author(s):  
Iskandar Iskandar

Kartun merupakan salah satu bentuk dialektika tanda dalam kategori bahasa verbal dan nonverbal, yang membuat dirinya unik adalah karena karakternya yang menyimpang, lucu, bersifat satir atau menyindir, baik terhadap orang atau tindakannya. Sebagai salah satu bahasa politik, kartun telah menjadi instrumen pokok untuk menceritakan realitas, segala tindakan dalam kartun merupakan studi tentang tanda. Penelitian ini bertujuan untuk mengetahui metafora yang digunakan dalam kartun bertema korupsi. Metodologi penelitian yang digunakan adalah metodologi kualitatif, dengan pendekatan deskriptif, yaitu dimana data yang dikumpulkan adalah karya visual kartun G.M. Sudharta yang dibuat tahun 2012 untuk koran Kompas, dan yang dipublikasikan pada media sosial Facebook-nya. Hasil penelitian ini menunjukkan bahwa terdapatnya metafora yang sangat dominan dan beragam dalam kartun bertema korupsi yang menandakan terdapatnya proses yang kritis dalam memandang budaya komunikasi. Setiap kartunis menciptakan tokoh kartun fiktif sebagai identitas yang mewakili dirinya untuk menyampaikan opini, kritik, dan olok-olok terhadap sesuatu yang sedang berlaku dalam realitas sehari-hari. Selain itu, setiap kartunis memiliki keunikan dalam menyampaikan pesan, hal tersebut merupakan gaya yang dipengaruhi oleh latar belakangnya masing-masing. Cartoon is a form of dialectic sign in the category of verbal and nonverbal language, which makes it unique is that deviant character, humorous, satirical or sarcatic, either against the person or his actions. As one of the political languages, cartoons have become a staple instrument to communicate the reality, every action in cartoon are the study of signs. This study aims to determine the metaphor used in cartoons with the theme of corruption. The research methodology used is qualitative methodology, with descriptive approach, that is where the data collected is a visual work of cartoon G.M. Sudarta made in 2012 for Kompas newspaper, and published on social media Facebook. The results of this study indicate that there is a very dominant and varied metaphor in a corruption-themed cartoon that signifies the existence of a critical process in viewing the culture of communication. Each cartoonist creates a fictitious cartoon character as an identity representing him/herself to convey opinions, criticisms, and banter towards something that is prevailing in the everyday reality. In addition, each cartoonist is unique in conveying the message, it is a style influenced by their background.


2019 ◽  
Vol 50 (6) ◽  
pp. 531-546 ◽  
Author(s):  
Linda Monsees

This article contributes to the emerging literature on publics within critical security studies. Its particular focus is on contestation in the context of diffuse security technology. Contemporary security practices are characterized by diffusion and dispersion. As a result, contestation of security technology is also dispersed and diffuse and requires an account of publics that is sensitive to this aspect. The article conceptualizes ‘multiple publics’ as a mode of fundamental contestation of established political institutions. In order to do so, it discusses previous approaches to sociotechnical controversies and material participation. As a result of this discussion, it becomes apparent that we need a concept of publics that does not reduce political contestation to a pre-existing set of institutions. I develop a notion of publicness that emphasizes the way in which publics are embedded in societal struggles. This is achieved by reading John Dewey as a theorist to whom contestation is a vital part of democracy. It becomes possible to understand contestation against diffuse security practices – such as surveillance – as forms of emerging publics, even though they might not feed back into governmental decisionmaking.


2018 ◽  
Vol 43 (4) ◽  
pp. 190-206
Author(s):  
Thorsten Bonacker

In this article, I examine the role security plays in creating a socioterritorial order in statebuilding policies. I argue that security contributes to the creation of center–periphery asymmetries, for example, through the portrayal of the center as threatened by a dangerous periphery or the periphery as disloyal and untrustworthy. In particular, I explore how security practices work in two distinct center–periphery figurations: in internal colonization, where a specific population, located within a dominant power, is subordinated; and in international intervention, where a society is internationally ruled. The article incorporates the literature on internal colonialism and international intervention from a critical security studies perspective to show how security functions as a mode of governing by creating specific center–periphery figurations in statebuilding. The overall aim is to provide a new theoretical perspective by intertwining critical security and postcolonial studies and to stimulate empirical research on the function of security as a principle of socioterritorial ordering.


2015 ◽  
Vol 46 (1) ◽  
pp. 3-14 ◽  
Author(s):  
Myriam Dunn Cavelty ◽  
Mareile Kaufmann ◽  
Kristian Søby Kristensen

Diverse, sometimes even contradictory concepts and practices of resilience have proliferated into a wide range of security policies. In introducing this special issue, we problematize and critically discuss how these forms of resilience change environments, create subjects, link temporalities, and redefine relations of security and insecurity. We show the increased attention – scholarly as well as political – given to resilience in recent times and provide a review of the state of critical security studies literature on resilience. We argue that to advance this discussion, resilience needs to be conceptualized and investigated in plural terms. We use temporalities and subjectivities as key analytical aspects to investigate the plural instantiations of resilience in actual political practice. These two issues – subjectivity and temporality – form the overall context for the special issue and are core themes for all the articles collected here.


2019 ◽  
Vol 50 (6) ◽  
pp. 547-563 ◽  
Author(s):  
Johannes Kester

By drawing on critical security studies in the context of a sociotechnical transition, this article calls for more attention to the presence and sometimes alternative use of mostly unobserved security practices in the materialization of everyday consumer goods and services. This call is illustrated through a discussion of the phenomenon of range anxiety and the intra-action between drivers of electric vehicles (EVs), designers, and algorithms that observe, estimate and nudge the remaining range of an EV. Inspired by Foucault and Barad, the range-anxiety discussion offers four alternative security insights. First, it supports an argument to include stress as an embodied instance of insecurity. Second, it draws attention to a security apparatus that is based on a constantly expanding assemblage around range estimates. Third, it shows how this apparatus rests on a novel algorithm that has a continuous instead of a binary output and is governed by a distributed sovereignty: where the driver simultaneously is the object of measurement, subject of governance for more efficient driving and the ultimate sovereign who decides on the trip. Lastly, the discussion highlights how range estimates not only mediate the materialization of EVs and their automobility but also (re)perform epistemological or ontological forms of uncertainty.


2019 ◽  
Vol 50 (1) ◽  
pp. 3-19 ◽  
Author(s):  
Jonathan Luke Austin ◽  
Rocco Bellanova ◽  
Mareile Kaufmann

What does it mean to study security from a critical perspective? This question continues to haunt critical security studies. Conversations about normative stances, political engagement, and the role of critique are mainstays of the discipline. This article argues that these conversations tend to revolve around a too disembodied image of research, where the everyday practice of researchers is sidelined. But researchers do do research: they work materially, socially, and cognitively. They mediate between various feedback loops or fields of critique. In doing so, they actively build and exercise critique. Recognizing that fact, this article resists growing suggestions to abandon critique by, first, returning to the practice of critique through the notion of companionship. This permits us to reinvigorate our attention to the objects, persons, and phenomena through which critique gains inspiration and purpose, and that literally accompany our relationship to critique. Second, we explore what happens when our companions disagree, when critique faces controversies and (a) symmetries. Here, we support research designs of tracing credibility and establishing symmetries in order to move away from critique as denouncing positions we disagree with. Third, we discuss the relation between companionship, critique, reflexivity, and style. Here, the rhetorical practices of critical inquiry are laid out, and possibilities for its articulation in different and less silencing voices are proposed.


2014 ◽  
Vol 12 (4) ◽  
pp. 485-501 ◽  
Author(s):  
Jeffrey Monaghan

Security agencies in Canada have become increasingly anxious regarding the threat of domestic radicalization. Defined loosely as “the process of moving from moderate beliefs to extremist belief,” inter-agency security practices aim to categorize and surveil populations deemed at-risk of radicalization in Canada, particularly young Muslims. To detail surveillance efforts against domestic radicalization, this article uses the Access to Information Act (ATIA) to detail the work of Canada’s inter-agency Combating Violent Extremism Working Group (CVEWG). As a network of security governance actors across Canada, the CVEWG is comprised of almost 20 departments and agencies with broad areas of expertise (intelligence, defence, policing, border security, transportation, immigration, etc.). Contributing to critical security studies and scholarship on the sociology of surveillance, this article maps the contours and activities of the CVEWG and uses the ATIA to narrate the production and iteration of radicalization threats through Canadian security governance networks. Tracing the influence of other states – the U.S. and U.K., in particular – the article highlights how surveillance practices that target radicalization are disembedded from particular contexts and, instead, framed around abstractions of menacing Islam. By way of conclusion, it casts aspersions on the expansion of counter-terrorism resources towards combating violent extremism; raising questions about the dubious categories and motives in contemporary practices of the “war on terror.” 


Sign in / Sign up

Export Citation Format

Share Document