Hostname: page-component-745bb68f8f-lrblm Total loading time: 0 Render date: 2025-02-10T23:51:41.283Z Has data issue: false hasContentIssue false

The ‘dark’ side of normative argumentation – The case of counterterrorism policy

Published online by Cambridge University Press:  06 June 2012

REGINA HELLER*
Affiliation:
Institute for Peace Research and Security Policy at the University of Hamburg (IFSH), Germany
MARTIN KAHL*
Affiliation:
Institute for Peace Research and Security Policy at the University of Hamburg (IFSH), Germany
DANIELA PISOIU*
Affiliation:
Institute for Peace Research and Security Policy at the University of Hamburg (IFSH), Germany
Rights & Permissions [Opens in a new window]

Abstract

After 9/11 state actors in different parts of the world and to various degrees decided to give security and counterterrorism measures priority over human rights and fundamental freedoms. In order to legitimize their policy choices, governmental actors used normative argumentation to redefine what is ‘appropriate’ to ensure security. We argue that, in the long run, this may lead to a setback dynamic hollowing out established human and civil rights norms. In this article, we develop a theoretical and analytical framework, oriented along the model of the life cycle of norms, in order to trace ‘bad’ norm dynamics in the field of counterterrorism. We conceptualize the norm erosion process, particularly focusing on arguments such as speech acts put forward by governmental norm challengers and their attempts to create new meaning and understanding. We also draw on convergence theory and argue that when a coalition of norm challengers develops, using the same or similar patterns of arguments, established international normative orders protecting human rights and civil liberties might be weakened over time and a more fundamental process of norm erosion may take place.

Type
Research Article
Copyright
Copyright © Cambridge University Press 2012

Introduction

As a result of the terrorist attacks in New York and Washington in September 2001 many governments around the world developed new counterterrorism strategies and policies to address the new threat of so-called ‘jihadist’ terrorism. They introduced numerous measures, with and without a given suspicion,Footnote 1 inducing a significant modification or reduction of established constraints to political (executive) action. With respect to counterterrorist measures without suspicion, in the USA and Europe, for example, provisions on the protection of privacy were loosened in order to simplify home searches. Other state interventions such as seizure and rendition as well as dragnet investigations of suspects and controls were made easier. Moreover, authorities widened surveillance of telecommunication and the internet as well as the control of financial transactions (e.g. via SWIFTFootnote 2). Biometric control devices were introduced in personal identification documents, and databases for the capturing of specific groups, such as asylum seekers, were expanded (e.g. Poleine et al. Reference Poleine2009; Crelinsten Reference Crelinsten2009). In Russia, the counterterrorism policy of the Putin government also curtailed the rights of non-commercial and non-governmental organizations (Riskin Reference Riskin2004) and led to restrictions on civil liberties such as political participation (Babaeva and Bovt Reference Babaeva and Bovt2004; Kostjukov Reference Kostyukov2004) and media freedom (Siegert Reference Siegert and Hassel2003; Panfilov Reference Panfilov2005: 21–7).

Measures with a given suspicion were generally even more drastic. In the USA, for example, provisions on arbitrary arrest were altered and controversial practices were induced, e.g. targeted killings, the use of torture-like and other physical and non-physical assaults against suspects (as has been widely discussed with respect to the Guantanamo Bay camp) or the kidnapping of terrorist suspects in order to conduct inquiries in states that use torture, circumventing, in this way, the due process demanded in such cases.Footnote 3 In Europe, reports from the Council of Europe revealed that governmental agents from EU-countries participated in inquiries of kidnapped persons suspected of terrorism (Council of Europe 2006; Wade and Maljevic Reference Wade and Maljevic2010). With the justification of effectively fighting terrorism in Chechnya, the Russian government expanded the prosecution competences of the national security services (Stykow Reference Stykow, Glaeßner and Lorenz2004; Plater-Zyberk Reference Plater-Zyberk2005; Shumilov and Safonov Reference Shumilov, Safonov and Trunov2005). According to human rights organizations, this led to an increase in extralegal forms of counterterrorism practices, for example killings of terrorist suspects, executed by special task forces operating in the North Caucasian republic or so-called ‘counter-capture’ as a means of information retrieval and enforcing concessions (Golts Reference Golts2004; Soldatov and Borogan Reference Soldatov and Borogan2005; Omelicheva Reference Omelicheva2007).

Overall, it seems that under the threat of terrorism the responsibility felt by decision makers to maintain security and order has, in many cases and to various degrees, come into conflict with guarantees to civil and political rights.Footnote 4 The latter, however, are recognized by the international community and guaranteed in different international human rights protection documents. As such they are inviolable by law, internationally and nationally binding, and have a deeper constitutive character (Ruggie Reference Ruggie1998: 871) – at least in Western societies.Footnote 5 Governmental actors, therefore, have attempted to persuade their constituencies of the necessity and usefulness of the counterterrorism measures they have taken. To a significant extent, these actors have used normative argumentation as a discursive and rhetorical tool to legitimize the introduction or use of contested policy measures or even the breach of taboos (e.g. Bush and Nordlinger Reference Bush, Nordlinger, Noonan and Nordlinger2003; Wolfe Reference Wolfe2008; Jarvis Reference Jarvis2009). In public statements they have presented terrorism as an ‘existential threat’, ‘trivialized’ or ‘re-contextualized’ counterterrorism practices in order to circumvent accusations that the state uses unlawful measures, with strategies varying from denial, to justification, to actual attempts to redefine the content and sphere of application of certain norms (Liese Reference Liese2009: 30f.).

Public justification and legitimization are not trivial. Norms retain their validity even when actors continue to violate them. Therefore, in order to maintain or enlarge room for action in the long run, norm violators have to establish a new sense of what is appropriate under certain circumstances and within certain contexts. This means that over the course of time they must try to see to it that public beliefs are changed or replaced by other considerations of what is appropriate and legitimate. It has been noted in the literature that the imperative to legitimize invasive security measures is not only valid for democratic communities (Liese Reference Liese2009), but also for authoritarian regimes (Holm Reference Holm, Guzzini and Jung2004; Vuori Reference Vuori2008: 68). This again underlines the cardinal importance of public justification of contentious practices. The observation that ‘[i]f the practice changes so will the meaning of the norm’, put forward by Wiener (Reference Wiener2004: 192), can thus be sharpened in the sense that normative change is not only a consequence of changing practices, but that those who change their practices also actively try to trim the meaning of certain inhibiting norms to these practices. Thus, when using normative argumentation, state actors have often tried to contest existing norms by presenting new interpretations and potential policy solutions to the problem of terrorism. Sometimes they have also tried to create entirely new understandings, thus, de- or re-constructing given meanings of how certain things should be or work. The ‘ticking-bomb’ scenario is a good illustration: A moral dilemma is constructed in which one norm (security, i.e. the physical integrity of a large number of possible victims) is pitted against another (the prohibition of torture). The intention is to demonstrate that under certain circumstances, torture may be an appropriate means: one has to do ‘bad’ things in order to avert something even worse (McKeown Reference McKeown2009: 16).

So far, the erosion processes evoked by normative argumentation in the field of counterterrorism policy, particularly when considering their consequences on conflicting civil and political rights norms, have not been adequately accounted for in academic research. The effect of normative argumentation has been conceptualized particularly in the context of the global spread and diffusion of principled ideas and international norms (as socially constructed entities of collective orientation) which restrict state behavior.Footnote 6 The constructivist – or reflectivist – literature has taught us much about how norms and the respective expectations are constructed, propagated and finally diffuse to the international level where they can turn into dominant, behavior-structuring global scripts (Powell and DiMaggio Reference Powell and DiMaggio1991; Finnemore Reference Finnemore1996; Meyer et al. Reference Meyer1997; Finnemore and Sikkink Reference Finnemore and Sikkink1998; Keck and Sikkink Reference Keck and Sikkink1998; Risse Reference Risse and Medick-Krakau1999; Risse et al. Reference Risse1999). Scholars have tried to explain why human rights, and as part of them, civil and political rights, have gained increasing acceptance since the last quarter of the 20th century over time and regions and created a noticeable social and political impact. Most prominent within the multitude of works that try to explain this process of human rights diffusion is the ‘human rights spiral’, put forward by Risse et al. (Reference Risse1999), where normative argumentation pursued by ‘norm entrepreneurs’ and the establishment of new rhetorical arrangements in a social community are seen as preconditions for the realization of human rights.

Much less has been written on whether, how and why such dominant global normative scripts erode, let alone on a comprehensive theoretical model that could capture these processes and its consequences in detail. What is needed to hollow out established human rights norms, to create acceptance for contested policies? Notwithstanding the effects of political processes and differentiated political cultures on threat perceptions and policy making as such, by reason of our specific research focus, we draw on scholarship dealing with normative language and the construction of meaning. Some theories and research strands provide useful building blocks and links, among them the literature on the breach of taboos (Daase Reference Daase2003; Rosert and Schirmbeck Reference Rosert and Schirmbeck2007), norm contestation (e.g. Wiener Reference Wiener2004; Liese Reference Liese2009), also first works on norm regress (McKeown Reference McKeown2009), critical terrorism studies (Krebs and Jackson Reference Krebs and Jackson2007; Chowdhury and Krebs Reference Chowdhury and Krebs2010) and, not least, securitization theory (Buzan et al. Reference Buzan1998).

Our article aims at bringing together ideas from these various theoretical strands and merging them in a theoretical and analytical framework, structured along the ‘life circle’ theory of norm development as put forward by Finnemore and Sikkink (Reference Finnemore and Sikkink1998). We determine that the paths of norm transformation in counterterrorism are the same, but under opposing signs. Normative argumentation in counterterrorism enhances the emergence and salience of ‘bad’ norms, meaning behavioral norms and practices which conflict with the norms protecting civil and political rights and are outlawed by international human rights treaties – e.g. torture, arbitrary arrest and unfair treatment before the courts, cut-down in political freedoms and rights. We identify the three main determinants of inverse norm development – trigger, agents of change, and ‘tipping point’ for diffusion – in the field of counterterrorism as well. The consequences of argumentation directed towards ‘bad’ norms are not only to allow governmental actors temporary room for maneuver for certain contested policy measures. In the long run, altering normative expectations may set in motion a negative spiral of normative change, a setback with respect to the international human rights regime. In our conclusions, we summarize our main assumptions and make a number of suggestions, also with respect to the method for further investigation of the subject matter.

Theorizing norm erosion in the field of counterterrorism

How can we analytically capture the processes and consequences of normative argumentation in the field of counterterrorism? Our theoretical approach is based on the notion that the validity of a norm must continuously be stabilized through rhetorical arrangements and, conversely, that when these rhetorical arrangements change, the value of a norm in society can change as well. Norms are, according to Krebs and Jackson, ‘inherently subject to challenge’ and one should be ‘reluctant to characterize any normative change as “lasting” in the sense of forestalling normative contestation over the long run’ (Krebs and Jackson Reference Krebs and Jackson2007: 41). The literature on norm contestation and the breech of taboos in international politics (e.g. Daase Reference Daase2003; Wiener Reference Wiener2004; Liese Reference Liese2009; McKeown Reference McKeown2009; Badescu and Weiss Reference Badescu and Weiss2010) supports the claim that constitutive and identity-building norms and codes of conduct, which are laid down in international treaties and enforced by international institutions, can be rhetorically and argumentatively challenged – without necessarily changing the formal validity of the norm. For example, Rosert and Schirmbeck (Reference Rosert and Schirmbeck2007) show how two internationally established norms, the torture ban and the ‘nuclear taboo’ (see also Daase Reference Daase2003), were discursively challenged in the United States. Similarly, Liese (Reference Liese2009) and McKeown (Reference McKeown2009) have shown how even the prohibition of torture and ill-treatment can become subject to contestation and reinterpretation through discourse. The contestation of taboo-like norms may not be the everyday course of events, but in our view no existing social norm is set in stone. Norms can erode even in political communities where they have been internalized for a long time, and, on top of this, this change can be actively promoted.

There are, however, different assumptions in the literature about the outcomes of processes of norm contestation. Some scholars assume that the ‘state of exception’, created through normative argumentation and rhetoric challenging, may over time in fact become the norm (Dillon Reference Dillon2007). There seem to be clear signs that particularly with regard to civil and political rights, norm regress is possible. For instance McKeown (Reference McKeown2009) has shown that the torture norm is under ‘regress’, intentionally put under pressure, and may even ‘die’. Panke and Petersohn (Reference Panke and Petersohn2011) equally argue that international norms can sometimes ‘disappear’, lose their prescriptive status and be replaced – either incrementally or instantly. While this camp of scholars anticipates the possibility of norm regress, it cannot be ruled out that under ‘usual’ contestation processes norms get only temporarily off balance and may ultimately lead to the reaffirmation of the established norm. A number of global reactions to U.S. counterterrorism policy under former U.S. President George W. Bush as well as domestic reactions to U.S. conduct under current President Barack Obama might have limited the momentum of the ‘bad’ norm cascade. Whether processes of norm contestation lead to the erosion or strengthening of a given norm is an empirical question and cannot be decided on purely conceptual grounds.

Building on the above insights on the vulnerability of norms under the influence of argumentative speech and its particular relevance in the field of counterterrorism, we proceed to conceptualizing a theoretical framework to capture norm contestation and its consequences somewhat more systematically. We are particularly interested in understanding processes of norm erosion and regress and the mechanisms through which established norms may lose their prescriptive function. To this end, we rely on the normative ‘life cycle’ model developed by Finnemore and Sikkink (Reference Finnemore and Sikkink1998). According to this model, at least three conditions must be in place to bring new social (in this case human rights) norms into life or replace existing ones: First, there has to be a trigger for normative dynamics. Second, norms have to be promoted by ‘principled’ actors in the form of normative argumentation. Third, in order for these new social norms to spread beyond national boundaries, a ‘tipping point’ of resonance in other social contexts is needed. This model has been developed to explain the rise and spread of human rights norms – that is ‘good’ norms. It can, nevertheless be generalized and should therefore, in its basic assumptions, also be applicable to social norms other than human rights, as well as prove useful for the explanation of reverse processes – the establishment of ‘bad’ norms and norm erosion. In the field of counterterrorism, the direction and actors of normative change, as we will argue below, have been modified, so that overall a ‘dark’ version of the life cycle of social norms appears, where the logic of normative change is basically turned upside down.

International terrorism as a trigger for ‘bad’ norm dynamics

As the life cycle model stipulates, the initial condition for a social norm to come into life is the existence of a trigger. This means that there must be specific circumstances allowing for new social ideas to enter the political agenda of an actor, a ‘norm entrepreneur’, who then starts promoting this new idea to others. Such windows of opportunity’, according to Finnemore and Sikkink, can come through wars, revolutions, upheavals or other crisis situations. These, in turn, lead to shifts of power and/or interests and accelerate the acceptance and evolution of new ideas and norms among the population (Finnemore and Sikkink Reference Finnemore and Sikkink1998).

It can well be hypothesized that the emergence of the new ‘jihadist’ terrorism represents such a trigger. The 9/11 terrorist attacks came as a shock to politicians and citizens alike all around the globe. They clearly marked a shift in the international security environment and, as such, represent a crisis situation: First, they had significant repercussions on the definitions and perceptions of global (in)security. The threat represented by al-Qaeda and/or its affiliates was deemed to have taken on a new, global dimension. It was assumed that jihadist terrorist attacks could take place everywhere and anytime in the future. Surveys carried out shortly after the 9/11 attacks show that public awareness and fear of transnational terrorism increased dramatically, even in countries that had not had traumatic experiences with terrorism on their territory before (e.g. for the European context see: European Commission 2002: 5).

Second, the 9/11 experience triggered an intensive – and still ongoing – debate on how security should be ensured in the face of the new terrorist threat (e.g. Burgess and Spence Reference Burgess, Spence, Bailes and Frommelt2004). With the background of a perception that existing means are not appropriate anymore, decision makers put forward new policy-solutions for the maintenance of (domestic) security, in the course of which the normative reference point in public statements changed: The ‘appropriateness’ of a policy instrument applied in fighting terrorism is more likely, nowadays, to be legitimized along categories of supposed security effectiveness and not necessarily along its ‘moral’ compatibility with respect to civil and political rights.

Thus, 9/11 events can in the logic of the life cycle model be understood as a trigger for a normative setback dynamic to start, and the post 9/11 environment as a window of opportunity that opened the door to new agenda-setting. The effects are twofold: On the one hand, this produces irritation about the existing normative structure of a social system, making societies more receptive to new ideas while old ones are easier to contest. On the other hand, it allows (or if one may: places the burden on) state actors to actively widen the boundaries of the socially accepted. This way, political entrepreneurs are able to significantly influence and shape the political agenda (Kingdon Reference Kingdon1994).

It is important here to make some observations on the meaning of the concept ‘window of opportunity’ as used in this article. The argument is not that governments ‘use’ terrorism and the terrorist threat instrumentally to (as part of a wider political strategy) domestically crack down on established freedom rights (although in some instances, this can also be the case). Terrorism is not necessarily a pretext for reinforced executive action, but rather a facilitating factor for it. As the risk of new terrorist attacks is seemingly hanging over the international society like the sword of Damocles, governments feel immense political pressure to find, often under time constraints, new and adequate policy solutions. Moreover, terrorism is essentially a communicative and symbolic enterprise, it is, as Jenkins (Reference Jenkins, Carlton and Schaerf1975: 16) put it, ‘open-air theater’, in quest of gaining the attention of large audiences (Chowdhury and Krebs Reference Chowdhury and Krebs2010: 133). Counterterrorism measures, in turn, are often intended to respond to this symbolism by carrying out immediate, strict and visible action intended to signal resolve to the public and the terrorists.

Governmental actors as ‘norm challengers’

The second basic assumption of the life cycle of social norms put forward by Finnemore and Sikkink (Reference Finnemore and Sikkink1998) is that a new norm, in order to develop, must be actively promoted by actors who have an interest in it, the so-called ‘principled agents’ or ‘norm entrepreneurs’ (869). The basic mechanism behind this promotion normative argumentation has emerged as the coin of the constructivist realm (see among many others: Keck and Sikkink Reference Keck and Sikkink1998; Risse et al. Reference Risse1999; Risse Reference Risse2000; Crawford Reference Crawford2002; Jackson Reference Jackson2007b). Constructivist research understands norms as ideas, ‘social constructions – invented social categories that exist only because people believe and act as if they exist’ (Schmitz and Sikkink Reference Schmitz, Sikkink and Carlsnaes2002: 517). These norms, as ideational reality, are constructed and sustained through language. Language creates narratives about the world and defines how things work and what is socially acceptable and ‘adequate’ (March and Olsen Reference March and Olsen1998: 950).

The role of normative argumentation is to persuade and to achieve normative and, as one consequence, political change as well, by developing ‘shared understandings’ (Krebs Reference Krebs2006: 21). ‘Normative claims’, as Finnemore (Reference Finnemore1996: 141) asserts, ‘become powerful and prevail by being persuasive’ (see also: Payne Reference Payne2001). Normative argumentation, thus, is a tool that can be used intentionally and strategically by an actor or a group. It is the ‘means to an end, where the end is to persuade those addressed of the accuracy of a factual statement, the validity of a norm, or the fairness of a claim’ (Crawford Reference Crawford2002: 14; Holzinger Reference Holzinger2004: 199). The targets of persuasive rhetorical moves do not comply grudgingly, but rather sincerely internalize new beliefs and consequently adopt new identities and preferences. Through persuasion, ‘agent action becomes social structure, ideas become norms, and the subjective becomes the intersubjective’ (Finnemore and Sikkink Reference Finnemore and Sikkink1998: 914).

Who are the agents of change and how do they exert influence? In the logic of ‘good’ norm construction, these norm entrepreneurs are usually non-state actors (human rights NGOs or other human rights-promoting actors), who make use of discursive practices in order to push rule-violating governments towards a change in domestic politics. Their influence and power stems from the high degree of legitimacy as principled agents in the area of human rights. They rhetorically make use of pre-existing normative reference points, such as the prescriptions of the UN human rights conventions, in order to support their aims vis-à-vis a broader (international or national) audience. This way, these actors become the driving forces and ‘agents of normative change’ (Risse and Sikkink Reference Risse and Medick-Krakau1999: 5). For the case of our reverse life cycle, we have different actors, with different sources of legitimacy and different types of normative argumentation. Governments rather than non-state actors appear as the main generators of new ideas contesting established norms (see also: Liese Reference Liese2009: 23) and they draw legitimacy from their competence in security issues; they are ‘more influential’ in the interpretation of threats than many other actors (Meyer Reference Meyer2009: 653). With respect to argumentation, they ‘challenge’ established norms rather than actively pushing for new ones in their urgency to find adequate reasons and arguments for the restriction of civil and political rights to justify this trade-off vis-à-vis the public. They do this by creating ‘the initial ideational conditions of possible action, while simultaneously constructing the wider meaning structures or common sense that make those actions intelligible and legitimate’ (Jackson Reference Jackson2007a: 234; see also: Jackson Reference Jackson2007b).

Obviously, when looking into public statements on counterterrorism from state officials, the ‘necessity’ logic is one of the recurring arguments for legitimizing questionable practices. For instance, then U.S. President George W. Bush argued in September 2006 on the capturing of terrorist suspects in Guantanamo Bay, Abu Ghraib and elsewhere that ‘it has been necessary [highlighted by the authors] to move these individuals to an environment where they can be held secretly, questioned by experts, and – when appropriate – prosecuted for terrorist acts.’Footnote 7 Equally, White House Deputy Press Secretary Tony Fratto in February 2008 justified enhanced interrogation techniques used by the CIA in the fight against terrorism in the following way: ‘[…] any technique that you use, you use it under certain circumstance. It [enhanced interrogation techniques, the authors] was something that they [the CIA, the authors] felt at that time necessary [highlighted by the authors] […].’Footnote 8 Equally, in Russia governmental and state agency representatives have frequently, particularly after a terrorist attack – be it the Beslan hostage taking in 2004 or the Moscow metro bombings in 2010 – referred to the necessity [‘neobkhodimost’] logic, in the Russian context with particular regard to the necessity to strengthen the competences of law enforcement and secret service agencies and introduce tougher control mechanisms and legal provisions.Footnote 9

Beyond this more general ‘necessity’ argument, one can identify more complex justification and argumentation strategies. Liese (Reference Liese2009), for instance, has identified different types of arguments, according to which the Bush administration has tried to redefine and reinterpret the nature and scope of the torture ban norm both in domestic constitutional and international settings. The Bush administration attempted to rhetorically affect the meaning and implications of torture and ill-treatment through three patterns of arguments: first, the exception from the absoluteness of the prohibitions in cases of emergency, second, the trivialization of abuses and third, the reaffirmation of an absolute ban on torture but not on ill-treatment (27). These patterns can be found in numerous respective public statements by representatives of the Bush administration.Footnote 10 In other areas, where counterterrorism policies affect norms with a much lower level of tabooization, e.g. privacy rights, through surveillance measures or limitations of expression of speech, state actors presumably use other or varying argumentative strategies, also depending on the status of the norm and the assumed level of tolerance on the part of the population. Another pattern of argumentation that becomes obvious in the field of counterterrorism – not only in the USA but also extensively in Russia as well as to a significant extent within the EU – is one that accentuates and prefers the ‘right to security’ over the right to liberty as the new guiding norm.Footnote 11

There is, however, no further holistic and theory-informed analysis on the various types of argumentative strategies governmental actors use to contest established norms. In our view, securitization and framing are key concepts here. Securitization theory, as developed by the Copenhagen School (CS), captures the fundamental process of (re)framing policy-issues into and linking them with the notion of security. Frames themselves are ‘schemata of interpretation’ that enable individuals ‘to locate, perceive, identify, and label’ occurrences within their life space and the world at large (Goffman Reference Goffman1974). In an alternative conceptualization, collective beliefs or ‘thought-world’ (Oberschall Reference Oberschall1989) are ‘a structure of classifications and distinctions by means of which information gets framed, stored, and retrieved in organized meaning-bundles for thought and action’ (13); they are social, shared, and exist independently of the individual (Klandermans Reference Klandermans, Morris and McClurg Mueller1992). In the social movement tradition, framing has been conceptualized as an essential mechanism of mobilization, i.e. a mechanism consciously employed to motivate adherence to readings of certain situations as problematic and in need of change, and actual involvement in protest actions. Frames and framing have already been employed in the context of norm creation (Keck and Sikkink Reference Keck and Sikkink1998) and are considered essential in the first stage of the norm life cycle: ‘Norm entrepreneurs devote significant attention to constructing a suitable cognitive frame in order to persuade target states [...] to embrace the normative idea they support. Frames are therefore seen as a key means by which advocates impute social knowledge into their communicative acts,’ (Payne Reference Payne2001: 43). It appears plausible that when we look at norm challengers in the field of counterterrorism, securitization and framing processes are central to norm erosion, through their facilitating role with respect to adherence to new or modified interpretations of norm expectations, along with the commonly shared values on which they rest.

Securitization theory: Security speech and its context. Securitization refers to processes by which mostly governmental actors try to establish, argumentatively, acceptance on the part of the public for extraordinary measures as necessary and adequate solutions for the defense against perceived security threats. This process is presumably driven by the de- and reconstruction of meaning: it is the ‘process of constructing a shared understanding of what is to be considered and collectively responded to as a threat’ (Buzan et al. Reference Buzan1998: 26). Securitization is understood as a ‘speech act’ that consists of the utterance of words, including specific reference and predication, with the aim of producing a particular effect in the addressee: ‘[…] by uttering “security”, a state representative moves a particular development into a specific area, and thereby claims a special right to use whatever means necessary to block it’ (Wæver Reference Wæver and Lipshutz1995: 55).Footnote 12 If successful, the main effect is to let a respective audience tolerate violations of, or limitations on norms or rules that would otherwise have been obeyed (Buzan et al. Reference Buzan1998: 25).

Thus, securitization is the most intense rhetorical instrument governmental actors can use to persuade an audience and ‘to break free of procedures or rules he or she would otherwise be bound by’ (ibid.). It can be used to legitimize certain practices already in place or to create room for maneuver with respect to planned measures. Security practices may follow securitization, but they may also be intended to pave the way for certain future measures. Governmental actors may, in this way, become norm entrepreneurs – ‘agents’ of normative change (Wæver Reference Wæver1989, Reference Wæver and Lipshutz1995; Buzan Reference Buzan1997: 14; Buzan et al. Reference Buzan1998: 21; see also: Neal Reference Neal2009: 335).Footnote 13 In this sense, we can hypothesize that in counterterrorism state actors basically challenge existing norms by securitizing certain events related to terrorism. Surprisingly, although studies on securitization have been conducted for a wide range of actors, issue areas and jurisdictions,Footnote 14 there are only a few of them in the counterterrorism area (Karyotis Reference Karyotis2007). Furthermore, none deals particularly with the question of the interaction between securitization on the one hand and the limitation of civil and political rights on the other or with the related erosion of norms (but see: Kelstrup Reference Kelstrup, Guzzini and Jung2004; Bigo et al. Reference Bigo2007; Salter Reference Salter and Balzacq2011).

This is even more surprising as it is quite obvious that governmental actors, when legitimizing counterterrorism measures, have securitized a wide range of issues somehow connected to terrorism, such as migration, asylum or religion. The use of the notion ‘war on terror’ as an all-embracing interpretation and imperative for action is a prominent example for securitization in counterterrorism (Buzan Reference Buzan2006). In fact, terrorism was subject to security ‘threat agenda setting’ (Eriksson and Noreen Reference Eriksson and Erik2002), long before the 9/11 terrorist attacks, so that it seems rather more appropriate to speak of ‘hyper-securitization’ – a notion introduced by Buzan (Reference Buzan2004: 172) to describe an expansion of securitization beyond a ‘normal’ level of threats and dangers by defining ‘a tendency both to exaggerate threats and to resort to excessive countermeasures’ (see also: Hansen and Nissenbaum Reference Hansen and Nissenbaum2009: 1163) – when characterizing the securitization process with respect to international (‘jihadist’) terrorism in the post-9/11 period and the dramatized ‘security statements’ presented by governmental actors. Applying securitization theory to counterterrorism may, therefore, help to understand how ‘security’ in this field is invoked to legitimize contentious legislation, policies or practices (including secrecy, additional executive powers or the use of force) that would otherwise not have been deemed legitimate.

While we regard securitization theory as a very useful means to understand how actors in general try to legitimize certain practices by challenging existing norms, we contend that the theory can only unfold its full explanatory capacity when it is amended by a number of aspects to which critics of the CS have pointed and when supplemented by the framing theory approach. An important aspect here is the CS’ problematic characterization of securitization as ‘self-referential’. According to Buzan et al. (Reference Buzan1998: 24), an ‘issue becomes a security issue – not necessarily because a real existential threat exists but because the issue is presented as such a threat’ (see also: Balzacq Reference Balzacq2005: 181). This is problematic because the audience must accept this presentation before the issue can be regarded as securitized (Buzan et al. Reference Buzan1998: 25). Buzan (Reference Buzan1997: 27) has moreover written that securitization ‘is constituted by the intersubjective establishment of an existential threat with a saliency sufficient to have substantial political effects’. This, however, is not a self-referential process and it implies that with the simple uttering of ‘security’, the process of securitization does not come to an end. Securitization ‘moves’ must be understood as only one part of the securitization process, as an attempt to securitize a certain issue. The CS acknowledges that for securitization to ‘work’, several conditions need to be fulfilled: ‘(1) the demand internal to the speech act of following the grammar of security, (2) the social conditions regarding the position of authority for the securitizing actor – that is, the relationship between speaker and audience and thereby the likelihood of the audience accepting the claims made in a securitizing attempt, and (3) features of the alleged threats that either facilitate or impede securitization’ (Buzan et al. Reference Buzan1998: 33; Wæver Reference Wæver, Kelstrup and Williams2000: 252–5; see also: Buzan and Wæver Reference Buzan and Wæver2003: 71–4).Footnote 15

Nevertheless, critics have contended that the CS has not worked on the facilitating conditions as differentiatedly and intensively as might be necessary (see e.g. Stritzel Reference Stritzel2007). Generally, they point out the need to better ‘embed’ securitization in a more process-like and a more ‘interactive’, audience-related set of conditions (see: Balzacq Reference Balzacq2005; Reference Balzacq and Balzacq2011: 27; McDonald Reference McDonald2008; Williams Reference Williams and Balzacq2011). In order to understand how securitization works and how it contributes to the transcending of a given normative setting, one has to contextualize the use of language, i.e. a) take into account the cultural context into which this use of language is embedded, and b) look at the very particular way a securitizing actor makes use of language.

With respect to the first point, Balzacq (Reference Balzacq2005: 172) puts forward the argument that ‘securitization is better understood as a strategic (pragmatic) practice that occurs within, and as part of, a configuration of circumstances, including the context, the psycho-cultural disposition of the audience, and the power that both speaker and listener bring to the interaction’ (see also: Leonard and Kaunert Reference Leonard, Kaunert and Balzacq2011). McDonald (Reference McDonald2008: 573) also underlines this when he argues that one has to keep in mind that ‘those interested in the construction of security must pay attention to the social, political and historical contexts in which particular discourses of security (even those defined narrowly in terms of the designation and articulation of threat) become possible’. One could object, however, that governmental actors, especially when they are part of the security establishment, unremittingly make securitizing moves because it is part of their business to do so. Most probably, they often do not really care whether each single act is actually successful. Be that as it may, the debate about the contexts and ‘facilitating conditions’ of securitization is important even in such a case, because securitizing actors must always take into account the cultural contexts and conditions in order to maintain the chance of their ‘securitizing moves’ becoming successful (see: McDonald Reference McDonald2008; Balzacq Reference Balzacq2005, Reference Balzacq and Balzacq2011; Stritzel Reference Stritzel2007).

Moreover, a securitizing actor not only needs to consider the respective discourse or context, but also has to frame the arguments in a way that they find resonance with the audience. This is in accordance with Balzacq’s (Reference Balzacq2005: 184) observation that ‘the success of securitization is highly contingent upon the securitizing actor’s ability to identify with the audience’s feelings, needs, and interests’, and that ‘the speaker has to tune his/her language to the audience’s experience’ (see also: McDonald Reference McDonald2008: 564; Balzacq Reference Balzacq and Balzacq2011: 9). In order to be successful, the speaker must use the appropriate language and heuristic artifacts that ‘facilitate the mobilization of the audience – analogies, metaphors, metonymies, emotions, stereotypes’ (Balzacq Reference Balzacq2005: 173; see also Reference Balzacq and Balzacq2011: 9). Therefore, the speaker has to skillfully employ language that resonates with the audience. This is even more important where the ideas, practices or measures to be legitimized extend to issues considered taboo. Norm challengers even have to anticipate that attempts to bring an established norm into question may, in the end, lead to its reaffirmation. In other words, it is not only what is said that is important but also the manner in which the securitizing actor makes the case for an issue, his ‘capacity to use appropriate words and cogent frames of reference in a given context’ (Balzacq Reference Balzacq2005: 190, 192; see also Reference Balzacq and Balzacq2011: 14).

This again points to the importance of the use of frames in order to structure various properties of an issue under the label ‘security threat’. As Vultee (Reference Vultee and Balzacq2011: 79) has put it: ‘[S]ecuritization is a form of framing that highlights the existential threat of an issue.’ Buzan et al. (Reference Buzan1998: 23) obviously had this in mind when they wrote that ‘“[s]ecurity” is the move that takes politics beyond the established rules of the game and frames the issue either as a special kind of politics or as above politics.’ However, the CS has not elaborated much on the framing issue. Securitization theory is also underspecified in this regard. Most critics, although pointing to the necessity of analyzing pragmatic aspects such as the ‘wording’, the concrete use of language in securitization, have not had recourse to framing theory, at least not explicitly. This comes as a surprise, as some researchers have argued for the use of framing theory for setting the threat agenda. Eriksson and Noreen (Reference Eriksson and Erik2002) for example contend that categorizing something as a ‘security threat’ (or ‘securitization’) is a form of ‘threat framing’. Based on the assumption that political speech is supposed to ‘convince’, applying framing theory appears useful; in addition, we can make the empirical observation that such framing methods, which are supposed to convince and persuade, are indeed being used in practice (see below).

Frame-analysis: Resonance as a condition for making securitization work. Basically, what we learn from the discussion of securitization theory and the CS for our theoretical and analytical model of ‘bad norm’ development in counterterrorism is, that in order to grasp exactly how norm challengers make use of securitization in counterterrorism policy, we have to study how they utilize the contexts in which discourses about security are embedded – in short: how issues are being framed. Securitization theory has developed a couple of categories which need to be considered when contextualizing argumentation. However, these remain fairly general. The concepts of frames and framing have been mentioned several times in securitization research (for a further example see: Balzacq Reference Balzacq and Balzacq2011: 36), yet rather in the more general sense of ‘ways of formulating’ arguments in order to find resonance with an audience. Conceptually and methodologically, however, it appears useful for our model to make a more systematic use of these concepts in their analytical sense. They are, in this form, not only a useful methodological tool for the analysis of securitization speech in the area of counterterrorism, but also a further element of the aforementioned conditions necessary for securitization moves to ‘work’. This should constitute a solid basis for analysis to be able to identify and compare the way in which certain interpretative frames are constructed by governmental norm challengers to change perceptions and obtain approval for exceptional policy measures.

Framing theory, especially in its social-movement variant, is a specification and methodological tool for the more in-depth analysis of the argumentative processes and dynamics that lead to a transcending of given normative settings. A particularly useful function for our undertaking of analyzing persuasive political speech is the construction of ‘resonance’. The concept has been developed in the specific context of social movements and with application to the power of mobilizing constituencies. There is, however, no reason why this scheme should not be applied in the context of securitization moves, since the short-term purpose is the same, that of persuading and potentially changing existing frames in the respective constituencies. The concept of resonance has also been invoked within research on norm establishment, where it has been found that norm entrepreneurs frame normative ideas with a view of resonance with the audiences (Nadelmann Reference Nadelmann1990: 482). And, ‘the idea of frame resonance potentially explains both the persuasive success of these instruments and their social function in the persuasive process. Norm-building depends upon persuasive communicative acts. If particular frames resonate, they are properly viewed as key rhetorical tools used by advocates to create support for normative ideas’ (Payne Reference Payne2001: 44). Therefore, it makes sense to look at frame resonance the other way around as well, in the case of norm erosion.

In social movement theory, the conditions for the mobilizing potency of frames, or their ‘resonance’, have been subsumed under the criteria of credibility and salience. Credibility is, in turn, determined by frame consistency, empirical credibility and the credibility of the frame articulators (Johnson Reference Johnson and Kriesberg1997; Benford and Snow Reference Benford and Snow2000). Salience refers to the centrality, experiential commensurability and narrative fidelity of the frame in relation to the targets of mobilization (Snow and Benford Reference Snow and Benford1988). Similarly to the conceptualization in securitization research, the role of these conditions is to assess the ‘workability’ of a movement’s message – its resonance – for a given audience. They are, however, developed to a higher and more concrete degree in social movements theory and therefore seem promising as analytical tools for our model as well. While a systematic analysis of counterterrorism political speech still needs to be conducted, some examples from the Bush era already make it apparent that many frame resonance mechanisms have been put to use for legitimizing the exception through the creation of changes in meaning and reference to security. The following is an excerpt from a speech delivered by former U.S. President George W. Bush in support of and as justification for the CIA Terrorist Surveillance Program. Bush rhetorically mobilizes public acceptance for exceptional measures by redefining the logic and function of law. The core argument is not, as one would expect, that counterterrorism measures should be taken in accordance with existing legal specifications, but, quite on the contrary, that the existing legislation needs to be changed to fit the respective measures and, thus, render them ‘legal’:

Article III of the Geneva Convention is hard for a lot of citizens to understand. Let’s see if I can put it this way for people to understand – there is a very vague standard that the Court said must kind of be the guide for our conduct in the war on terror and the detainee policy. […] And so we worked with members of both bodies and both parties to try to help bring some definition to Common Article III. I really don’t think most Americans want international courts being able to determine how we protect ourselves. And my assurance to people is that we can pass law here in the United States that helps define our treaty – international treaty obligations. We have done that in the past. It is not the first time that we have done this. And I believe it’s necessary to do it this time in order for the program to go forward.Footnote 16

These kinds of arguments are usually delivered not in isolation but in discourses meant to obtain the approval of the audience, namely by their being resonant. The other way around, identifying the resonance mechanisms associated with normative arguments would inform us about their persuasion potential. Such a resonance mechanism is for instance that of frame consistency. Outlined by framing theory research (Gerhards and Rucht Reference Gerhards and Rucht1992; Zuo and Benford Reference Zuo and Benford1995; Johnson Reference Johnson and Kriesberg1997), consistency, in the sense of compatibility between claims and actions, can be operationalized in the form of the adequacy and success of the means employed. Within the same text, Bush lists a series of operational successes in order to increase the credibility of the argument:

We’ve also learned information from the CIA program that has helped stop other plots, including attacks on the U.S. Marine base in East Africa, or American consulate in Pakistan, or Britain’s Heathrow Airport. This program has been one of the most vital tools in our efforts to protect this country. It’s been invaluable to our country, and it’s invaluable to our allies.Footnote 17

The same speech offers an illustration of a further mechanism, empirical credibility (the resonance with everyday experiences), pointed out in several empirical studies of social movements (Erwin Reference Erwin1993; Zuo and Benford Reference Zuo and Benford1995; Babb Reference Babb1996). It has also been referred to as a resonance condition for securitization moves see: Balzacq Reference Balzacq2005). In our example, President Bush illustrates the frame of imminent danger and urgency of action through the recurrence of attacks:

It’s a dangerous world. I wish it wasn’t that way. I wish I could tell the American people, don’t worry about it, they’re not coming again. But they are coming again. And that’s why I’ve sent this legislation up to Congress, and that’s why we’ll continue to work with allies in building a vast coalition, to protect not only ourselves, but them. The facts are, is that after 9/11, this enemy continued to attack and kill innocent people.Footnote 18

Culture is another important element in frame analysis, since frames are already present in the memory and culture of the actors. As Donati (Reference Donati and Keller2001: 150) argues, ‘cognition is nothing else but re-cognition [...], and actors give sense to things through their “re-cognition” as elements of a meaningfully ordered world. A consequence of that is that nothing can be perceived which is not already known; that is why the meaning needs always to be sought in the existing culture’. Cultural resonance or narrative fidelity as a means to affect mobilization has been conceptualized as a resort to culturally embedded frames and has been emphasized by several authors in social movements theory (Noonan Reference Noonan1995; Zuo and Benford Reference Zuo and Benford1995; Berbrier Reference Berbrier1998; d’Anjou and Van Male Reference d’Anjou and Van Male1998; Kubal Reference Kubal1998; Park Reference Park1998) and more recently has been referred to as ‘deep cultural grammar’ (Johnston Reference Johnston2008).

Narrative fidelity is observable through the invocation of historical events, of collective memories, as well as of a series of core values (honor, decency, toughness, liberty, justice, fairness, equality, dignity, courage, determination, vigilance, democracy, freedom, peace, etc.), albeit in partly different and contradictory contexts from the ones in which they were used originally – an instance of re-framing. In a 2006 radio address, the President uses narrative fidelity in order to produce an exception with an emotional reference to 9/11 and the collective memory of loss:

This Monday, our Nation will mark the 5th anniversary of the attacks of September the 11th, 2001 […] Our Nation honors the memory of every person we lost on that day of terror, and we pray that the Almighty will continue to comfort the families who had so much taken away from them.Footnote 19

Against this background then, the identification and qualification of the enemy responsible for the loss as opposed to what the American nation, as victim, stands for, follows:

On this anniversary, we also remember the brutality of the enemy who struck our country and renew our resolve to defeat this enemy and secure a future of peace and freedom.Footnote 20

The framing of the ‘enemy’ as exceptional and essentially different from ‘us’ functions as a basis for differential or ‘exceptional’ treatment, as the following example demonstrates:

I meet frequently myself with the head of the ICRC and I think you will find that when the ICRC has questions, we try to give them answers. But we are in a different kind of war here. We’re in a situation in which we have people who would, not as a matter of collateral damage but as a matter of design, kill innocent people were they released onto the streets. And we’re simply not going to let it happen.Footnote 21

A further example, this time from a speech held by Dmitri Rogozin, then Russian Duma’s vice-speaker,Footnote 22 evolves along the same lines of differential treatment for essentially different individuals and at the same time an approach of ‘purpose excuses the means’:

International terrorism is a young phenomenon. International law does not regulate the juridical aspects of the fight against it in an appropriate manner [...] Terrorism originates in an absolutely distinct type of mentality. Trying to understand it from the point of view of traditional European political culture is pointless. However, this circumstance should not act as an obstacle to a rigid and uncompromising fight against this evil. The paradoxical nature, the unpredictability and the severity of the threat of modern terrorism compels a more flexible application of existing laws.Footnote 23

It might, of course, be argued that such an ‘exception’ argument, in effect, leaves the norm intact. After all, the speaker does not contest the validity of the norm as such, but rather its area of applicability, namely only to ‘us’ but not to ‘them’. However, a process of norm erosion also seems plausible in this context in two ways: one is the eventuality of exceptions becoming the rule by means of repetitive application; the other is the effect on the nature of the norm itself, as universally applicable. On a broader level, it would be premature to argue that all justification patterns revolve around the concept of ‘exception’. Indeed, justification of measures might well be found to occur in the context of certain conceptions of legality, defense, prevention or operational effectiveness. The latter can be illustrated by two further quotes, the first one from the EU:

The necessity of having access to traffic data in such cases [of child pornography] was also recently demonstrated in a large international child porn investigation, coordinated by Europol. In that particular case, IP addresses of persons who were downloading child pornography of the internet were found by law enforcement in one Member State, and subsequent arrests were made in 12 Member States, based on those IP addresses. However, in five further Member States those IP-addresses could not be linked anymore to individual users, since the relevant data had already been deleted by the Internet Service Providers.Footnote 24

And the second one from the USA:

Inside our country, where the war began, we must continue to give homeland security and law enforcement personnel every tool they need to defend us. And one of those essential tools is the Patriot Act, which authorizes federal law enforcement to share more intelligence information, to track terrorists, to disrupt their cells, and to seize their assets. We use these tools to catch embezzlers and drug traffickers, and we need these tools, as well, to hunt terrorists.’Footnote 25

A final factor that can be assumed to influence the degree of resonance has been identified in social movements as the credibility of the speaker (Hovland and Weiss Reference Hovland and Weiss1951; Aronson and Golden Reference Aronson and Golden1962), including the speaker’s status and knowledge, expertise on the issue (Hovland and Weiss Reference Hovland and Weiss1951; McGuire Reference McGuire, Lindzey and Aronson1985; Fiske and Taylor Reference Fiske and Taylor1991; Hass Reference Hass and Petty1991; Benford and Snow Reference Benford and Snow2000; Roskos-Ewoldsen et al. Reference Roskos-Ewoldsen2002), as well as his/her reputation and likeability (Vanderford Reference Vanderford1989; Benford Reference Benford1993; Slater and Rouner Reference Slater and Rouner1996; McCaffrey and Keys Reference McCaffrey and Keys2000). Furtell (Reference Futrell2003: 380) has observed this aspect in relation to framing in general: ‘expert authority may powerfully shape the contours of framing activities. The language of science and expertise can stall efforts of non-experts to understand what is going on. Lay citizens have to place a great deal of faith in the authority and judgment of experts’. Securitization research has also mentioned the element of status in the form of the power position of the securitization actor (see above). In the case of normative speech, the credibility of the frame articulator would therefore depend on the politician’s perceived knowledge of the subject, general credibility – in the sense of support rates, for instance, and status with regard to a particular problem issue. The American president enjoys the status of Commander-in-Chief and primary responsibility for the insurance of state security, including in the context of the so-called ‘war on terror’.Footnote 26

Frames and framing have been mentioned in the securitization research and the conditions for securitization moves to ‘work’ resemble conceptually those of resonance. However it remains a fact that their full potential has not yet been put to use in this area, in particular with respect to specific counterterrorism measures (see McKeown Reference McKeown2009 as an exception). As the selected examples above show, a strong case can be made for the use of social movements framing categories in the analysis of political speech to justify exceptional counterterrorism measures. Specific types of resonance criteria are not only present in actual political speech, but can also provide a substantial analytical enrichment for the analysis of arguments.

In search of a ‘tipping moment’: Argumentative convergence as an amplifier for broader norm erosion?

The first two phases and conditions of the life cycle model of social norms can be well adapted to the field of counterterrorism. There is, however, according to Finnemore and Sikkink (Reference Finnemore and Sikkink1998), a third phase in norm development, which is characterized by a global diffusion of social norms. Sunstein (Reference Sunstein1997) has introduced the idea that from a certain moment in time – a so-called ‘tipping point’ – new principled ideas trickle down and diffuse into the international realm in form of a ‘norms cascade’, in the course of which they gain wider international acceptance and thus contribute ‘to a significant transformation of the international system’ (Schmitz and Sikkink Reference Schmitz, Sikkink and Carlsnaes2002: 521). Such a ‘tipping point’ for the norms cascade to start is reached when the new principled ideas resonate in a critical number of jurisdictions. A precondition for this to happen is not least that norm entrepreneurs, i.e. those actors who permanently argue in favor or against a specific idea, ‘speak’ in the same way beyond borders, using the same or similar patterns of argumentation, thus forming ‘coalitions’ of norm entrepreneurs that set and uphold narratives of legitimate behavior (Finnemore Reference Finnemore1996; Finnemore and Sikkink Reference Finnemore and Sikkink1998: 896; Keck and Sikkink Reference Keck and Sikkink1998; Risse and Sikkink Reference Risse1999: 35; Liese Reference Liese2006).Footnote 27

The question remains whether there is also such a ‘tipping moment’ with respect to our ‘bad’ norm model in counterterrorism. If so, what does that ‘tipping moment’ constitute, and how should we then think about transnational coalitions of norm challengers in argumentative terms? Can new counterterrorism frames, which in our logic are at first generated domestically, and ‘bad’ norms diffuse into the international realm? This would imply that other governments take up such arguments – be it by actively referring to them because they serve their own problem-solving well, or simply by being subject to contagion through the recurring use of a specific frame.Footnote 28 It is convergence theory, in particular, which tells us that such effects are particularly likely in the context of the phenomenon of international terrorism. Problems that are of a transnational nature, according to the convergence literature, produce interdependencies, globalized pressures and similar forms of problem-solving in different jurisdictions. Moreover, it is argued that under the influence of such transnational phenomena, national policies tend to homogenize dynamically and converge, i.e. become equal over time (see: Holzinger Reference Holzinger2006). Policy convergence in this sense is defined as ‘any increase in the similarity between one or more characteristics of a certain policy (e.g. policy objectives, policy instruments, policy settings) across a given set of political jurisdictions (supranational institutions, states, regions, local authorities) over a given period of time’ (Knill Reference Knill2005: 768; see also: Heichel et al. Reference Heichel2005: 828) – including material as well as non-material ‘policies’, under which Dolowitz and Marsh (Reference Dolowitz and Marsh2000: 12) also subsume ‘structures of meaning’. Thus, following their interpretation, the notion of policy convergence can also include convergence in normative argumentation.

Security-related issues and counterterrorism in particular have not, so far, been of much interest in the research on policy convergence (see: Hill Reference Hill1997, Jones and Newburn Reference Jones and Newburn2002),Footnote 29 although the new ‘jihadist’ terrorism is broadly understood as a transnational (insecurity producing) phenomenon. Hence, if we follow the assumptions put forward in the convergence literature, then international (‘jihadist’) terrorism is likely to lead to such convergence effects – both with respect to material politics as well as perceptions – and, subsequently, also rhetoric. On an argumentative level, governmental actors may frame the ‘threat’ and securitize terrorism in the same way all around the world in order to legitimize counterterrorism measures using the same or similar frames and patterns of frames – at least on a macro (or meta) and meso level of argumentation and justification. If we consider that international terrorism is an issue of ‘hyper-securitization’, i.e. perceived as a major security threat, in many regions of the world, and that the respective governments need to – in one way or the other – justify state measures in counterterrorism, then it appears most likely that governments across political, institutional and cultural borders and differences increasingly securitize and might argue in the same direction and with similar patterns of content. This could open the way, in the long term, to a permanent global normative change (Fordham and Asal Reference Fordham and Asal2007; Sandholtz Reference Sandholtz2008: 109).

From this follow a number of other consequences with respect to the ‘bad’ norm dynamic: Strong convergence in normative argumentation could – in the logic of the life cycle of norm development – function like a ‘tipping moment’ for these new, ‘bad’ norms to cause wider negative social repercussions on a global scale. In so doing, governmental actors not only challenge established domestic but also international norms and contribute to the spread of ‘bad’ norms, thus, undermining an existing (national and/or international) normative order or even contributing to its erosion. If governmental actors in influential states or other jurisdictions use the same arguments for legitimizing ‘bad’ counterterrorism policies, if they ‘speak one language’, and do so over a longer period of time (Adler and Haas Reference Adler and Haas1992; Haas Reference Haas1992), then they are on the way, willingly or not, to establishing a ‘coalition of norm challengers’ bringing combined and increased leverage to bear on globally established norms protecting civil and political rights. Consider, for instance, governmental actors in the USA, Europe and Russia using similar or convergent arguments in the field of counterterrorism: A ‘hegemonic group’ of norm challengers would emerge, that could have a severe long-term erosive impact on the worldwide validity of civil and political rights (see also McKeown Reference McKeown2009: 12, 20). Their rhetorical force originates from their cohesive rhetorical action (Keck and Sikkink Reference Keck and Sikkink1998), and the robustness of the coalition (Sabatier and Jenkins-Smith Reference Sabatier and Jenkins-Smith1993). We know that ‘[g]reat powers play a crucial role in norm-setting and norm-upholding in international relations and their public behavior legitimates the behavior of others within the international community’ (Jackson Reference Jackson2007b: 369). As a consequence, new ideas – ‘bad norms’ – can spread and take root internationally, while other established norms erode.

The hypothesis can be formulated that the more manifest, in terms of content and frequency, a justification argument occurs over time and place, the stronger the global resonance of its meaning and, subsequently, its potential to oust existing, competing ideas about appropriate behavior (see also: Chong and Druckmann Reference Chong and Druckmann2007: 113–16). When analyzing counterterrorist political speech, it seems therefore necessary to compare several jurisdictions and search for similar patterns of argumentation. In qualitative terms, such patterns would relate to convergent frame contents and contextualization (What kind of new meaning is constructed? What context do the governmental actors relate to?). If convergent justificatory frames are found across different regions and cultural contexts, this would be a strong indicator for the validity of our hypothesis. Quantitative indicators will also be relevant: If patterns in content can be detected, then it is important to know how frequently they occur and how stable they are. However, we should be interested not only in convergence patterns, but also in approximation effects over time. While the patterns can give us a static picture of convergence effects, approximation effects reflect the dynamics of convergence processes. In qualitative terms, one would need to ask, whether and how securitization moves, frame contents and contexts change, whether for instance the security impetus (securitization, hyper-securitization) becomes stronger over time, what clusters of frames are concerned and whether we can detect any target course of argumentation. Again, such dynamics also have to be studied in quantitative terms in order to trace argumentative continuity or possible ‘argumentative cycles’ over time.

Some nuances might need to be considered in the process, namely the extent to which culture and narratives play a role in framing particular arguments and the subsequent differences across countries and between discourse aimed at national and international audiences respectively. It might be the case that, while arguments converge structurally, the supporting frames differ depending on political culture and audience expectations. This observation was made for instance in relation to the coalition of the willing argumentation patterns for involvement in Iraq (McDonald Reference McDonald2007). However, the case might also be that contagion and amalgamation effects occur in the context of a homogenization in threat perceptions. McKeown (Reference McKeown2009: 11) speaks of ‘emulation’. Due to differences in requirements of policy-solutions in various jurisdictions, we assume that under a convergence effect micro-frames, i.e. those frames identifying certain concrete problems and solutions, will converge the least. We expect more convergence on the meso level (identifying the bigger picture problem, namely terrorism as security threat) and on the macro or meta level of frames (more general worldviews).

So far, the convergence argument is only a hypothesis that has to be proven empirically. But if we really find argumentative convergence in counterterrorism rhetoric cross-nationally, this would show that there are globally resonant and permeating frames and arguments that have the potential to put pressure on established norms. Such a result would consequently be a strong case for proving that a ‘bad’ norm spiral, i.e. a process of norm regress, is in fact at work. We would have identified a mechanism through which the spread of ‘bad’ norms can be traced, and through which it is amplified, facilitated and accelerated. Notwithstanding, we cannot rule out that rhetorical attempts to bring down established social ideas may lead in some cases to other dynamics, e.g. the reaffirmation of an existing norm. Whether, how and under what circumstances ‘bad’ norms spread globally and contribute to a more fundamental process of norm erosion, thus, needs further investigation within the framework of the ‘bad’ norms dynamic outlined here.

Conclusion

We developed in this article a theoretical and analytical framework to capture and explain normative setback dynamics in the field of counterterrorism. Our starting point was the observation that governments all around the globe, when developing and pursuing counterterrorist measures which come into conflict with established human rights norms, argumentatively legitimize these measures. Normative argumentation paves the way for the transformation of structures of meaning and a redefinition of socially ‘appropriate’ behavior and its respective norms. We further hypothesized that such argumentative behavior might account for more general and fundamental negative effects on principled ideas and international norms, particularly on international human rights, marking the start of a ‘bad’ norm spiral and allowing for new or continued ‘bad’ practices such as rendition or torture at worst.

We embedded our ideas, also derived from other theoretical discussions and research strands, into a theoretical ‘life cycle’ model of norm development and examined them along its three main determinants and phases. We came to the conclusion that first, the period since the terrorist attacks of 9/11 marks an ongoing ‘crisis’ situation for new ideas about ‘appropriate’ political behavior in security policy to emerge, while old ones, the normative limitations to security policy, are put under pressure. Second, we argued that when tracing the ‘bad’ norm dynamic in the counterterrorism field, we need to consider in more detail the role of governments and the way they argue in favor of new policies. State actors appear as the main generators of ‘bad’ norms in the field of counterterrorism. They can be understood as principled ‘norm challengers’ in their attempt to push through and, with securitization, create societal acceptance for effective counterterrorism policies. And third, we put forward the hypothesis that cross-national argumentative convergence might serve as an accelerator for a more fundamental and broader process of norm erosion beyond the borders of a specific jurisdiction. It is plausible to assume that the more often (over time and space) and the more vehemently governmental actors appeal cross-nationally to the public in favor of these new solutions and policies in a similar way, the higher the probability that this new meaning will become established within the framework of a ‘world society’.

With these considerations in mind, we argue that when conducting research on counterterrorism and its negative impact and consequences, it is important to thoroughly look at argumentative processes – at normative argumentation and justification – in counterterrorism policies and the discursive dynamics that follow thereon. It is most important to stretch such an analysis beyond the borders of a given jurisdiction as ideas, in particular, can easily diffuse to the international realm and be taken up in other jurisdictions as well. This is all the more the case as many arguments are simultaneously directed to domestic and international audiences and are picked up and dispatched by media networks all around the globe. In order to capture these processes in detail, we need to conduct a systematic analysis of persuasive counterterrorism political speech. Methodologically, this should be done by employing an interpretive, discourse-analytical rather than a causative approach. We suggest conducting a frame analysis of normative argumentation and justification by governmental actors over time and space since 9/11, with a focus on the statements of political leaders, their securitization moves and frames and the way they evolve.Footnote 30 This should result in a conclusive picture of how such patterns of argumentation emerge, if and how they might converge and to what extent they have an erosive impact on established norms, in particular those in the area of civil and political rights.

Acknowledgement

This article was written in the course of the research project: Justification with the same arguments? Analysing arguments in favor of restricting human and civil rights under the pretext of combating terrorism in the USA, EU and Russia, funded by Deutsche Forschungsgemeinschaft (DFG), http://www.subjecting-freedom.org. Our particular thanks go to Richard Jackson, Christoph O. Meyer and Ken McDonagh for providing valuable comments on an earlier draft of this article. We would also like to thank the two anonymous reviewers for their insightful comments.

Footnotes

1 Measures applied with suspicion are directed at alleged criminals only, while measures without suspicion affect all citizens.

2 Society for Worldwide Interbank Financial Telecommunication.

3 See for instance: Bowden Reference Bowden2003; Danner Reference Danner2004; Hersh Reference Hersh2004; Johnston and Risen Reference Johnston and Risen2004; Lewis Reference Lewis2004; Greenberg and Dratel Reference Greenberg and Dratel2005; Jehl Reference Jehl2005; Lelyveld Reference Lelyveld2005; Lewis and Schmitt Reference Lewis and Schmitt2005; Mayer Reference Mayer2005a, Reference Mayer2005b; Hoge Reference Hoge2006; Nowak Reference Nowak2006; Roth Reference Roth and Roth2006; Slater Reference Slater2006; Paust Reference Paust2007; Evangelista Reference Evangelista2008; Greenberg Reference Greenberg2008; Jaffer and Singh Reference Jaffer and Singh2009; Amnesty International 2005, 2008: 317–21; Human Rights Watch 2005, 2006, 2008; OSCE Parliamentary Assembly 2005, 2007.

4 There are varying definitions of what civil and political rights mean; sometimes their meanings also overlap. In order to make the two groups of rights more operable for our purpose, we define civil rights as those rights which protect the individual from arbitrary interference by the state (with direct applicability). Civil rights include the right of life and the protection of a person’s physical integrity, the prohibition of torture, the right of individual freedom and safety, substantive due process and equality before the courts, secrecy of post as well as the freedom of thought, religion and opinion. Political rights in our understanding constitute a group of rights which enable citizens to actively participate in and influence public affairs. Such rights include the freedom of association, the right to vote and the right to join a political party or other societal groups. In this definition, civil and political rights represent the so-called ‘rights of the first generation’ which are part of the more comprehensive international human rights catalogue guaranteed in the United Nations International Covenant on Civil and Political Rights (ICCPR) of 1966.

5 The system of international protection of these rights includes the Universal Declaration of Human Rights of 1948 proclaimed by the United Nations General Assembly (as a resolution with non-binding character, but recognized as constituting customary international law), Art. 3 of the Geneva Convention, the Convention on the Prevention and Punishment of the Crime of Genocide of 1948, the ICCPR (1966), the UN Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment (1984), and in a regional context also the European Convention for the Protection of Human Rights (ECHR) and Fundamental Freedoms of 1950 as well as the European Convention for the Prevention of Torture and Inhuman or Degrading Treatment or Punishment (1987).

6 Diffusion here means the socially mediated incremental permeation of international norms to the domestic level (Risse Reference Risse and Hellmann2003: 119).

7 The White House: President Discusses Creation of Military Commission to Try Suspected Terrorists, Office of the Press Secretary, September 6, 2006: http://georgewbush-whitehouse.archives.gov/news/releases/2006/09/20060906-3.html.

8 The White House: Press Briefing by Tony Fratto, Office of the Press Secretary, 6, February, 2008: http://georgewbush-whitehouse.archives.gov/news/releases/2008/02/20080206-3.html.

9 See for instance: Nikolai Patrushev: A front against terrorism, in: Rossiskaya Gazeta 24.11.2005; also: V. V. Putin held a meeting on strengthening transport security, March 30, 2010, homepage of the Russian Government: http://premier.gov.ru/events/news/9976/.

10 See as examples: The White House: President Bush Previews War on Terror Speech November 1, 2007, http://georgewbushwhitehouse.archives.gov/news/releases/2007/11/20071101.html; The White House: Press Briefing by Dana Perino, October 5, 2007, http://georgewbush-whitehouse.archives.gov/news/releases/2007/10/20071005-4.html; The White House: Press Briefing by White House Counsel Judge Alberto Gonzales, DoD General Counsel William Haynes, DoD Deputy General Counsel Daniel Dell’Orto and Army Deputy Chief of Staff for Intelligence General Keith Alexander, June 22, 2004, http://georgewbush-whitehouse.archives.gov/news/releases/2004/06/20040622-14.html.

11 Prime examples include former German Interior Minister Otto Schily, who advocated for the right to security in Basic Law, or the former Australian Attorney General Ruddock. See for a discussion of these examples Michaelsen Reference Michaelsen2006. Within Russia, the ‘right to security’ is also often framed as the ‘right to life’, see for instance: Tamara Shkel: Duma counteracts terrorism. In the first reading, in Rossiskaya Gazeta, 18.12.2004; Dmitri Medvedev: Verbatim to the meeting of the Advisory Council for the Promotion of Civil Society and Human Rights, 19.5.2010, homepage of the Russian President: http://kremlin.ru/transcripts/7792.

12 Buzan et al. (Reference Buzan1998: 28) acknowledge that ‘[s]ome security practices are not legitimized in public by security discourse, because they are not out in the public at all’. They point to ‘black programs’ to illustrate this. With respect to counterterrorism, one could mention torture-like interrogation practices or detentions. They nevertheless subsume such programs under the security logic: ‘[I]t is […] possible to have black security boxes in the political process. The speech act reduces public influence on this issue […]’. In such cases, securitization works to silence opposition and to give governmental actors ‘a right to handle something with less democratic control and constraint’ (29).

13 See also: McSweeney Reference McSweeney1996; Baldwin Reference Baldwin1997; Buzan and Wæver Reference Buzan1997; Eriksson Reference Eriksson1999; Knudsen Reference Knudsen2001; Aradau Reference Aradau2004; Guzzini and Jung Reference Guzzini and Jung2004; with a critical view.

14 For an overview see: Buzan Reference Buzan1997; Williams Reference Williams2003; Balzacq Reference Balzacq2005, Reference Balzacq and Balzacq2011; for different policy fields see: Huysmans Reference Huysmans1998, Reference Huysmans2000 (migration); Wæver Reference Wæver, Adler and Barnett1999 (security communities); Bigo Reference Bigo, Kelstrup and Williams2000 (domestic security/justice and home affairs); Kostakopoulou Reference Kostakopoulou2000 (migration); Guiraudon Reference Guiraudon2003 (immigration policies); Roe Reference Roe2004 (minorities); Sasse Reference Sasse2005 (minorities/migrants); Elbe Reference Elbe2006 (HIV, AIDS); Diez et al. Reference Diez2006 (border conflicts in Europe).

15 By ‘grammar of security’ the CS means the ‘security form’ of a speech act, to ‘construct a plot that includes existential threat, point of no return, and possible way out’ and, in addition, the ‘particular dialect’ of a specific sector, in the political sector ‘recognition and sovereignty’ for example. ‘Authority’ for the securitizing actor refers to the ‘social capital’ of the speaker. He or she ‘must be in a position of authority’. ‘Features’ comprise factors making it more or less likely that ‘certain objects can be referred to that are generally held to be threatening’ (Buzan et al. Reference Buzan1998: 33).

16 The White House: Press Conference of the President, September 15, 2006, http://georgewbush-whitehouse.archives.gov/news/releases/2006/09/20060915-2.html.

17 Ibid.

18 Ibid.

19 President’s Radio address, September 9, 2006, http://georgewbush-whitehouse.archives.gov/news/releases/2006/09/20060909.html.

20 Ibid.

21 Secretary Condoleezza Rice, Interview with British Foreign Secretary Jack Straw on the Jonathan Dimbleby Programme ITV1, Liverpool, England April 1, 2006.

22 To be clear, parliamentary representatives belong to the legislative authorities and are, by definition, not governmental actors. In the Russian case, however, an informal stretching of governmental power and influence to other constitutional authorities, particularly to the Duma and its parties, has taken place under the Putin regime. Therefore, it makes sense for the Russian case to expand the analysis to a wider group of people who belong to this ‘informal network’ and who are likely to transport ‘state’ opinion in their statements.

23 Dmitri Rogozin, Duma, Release, 19 August 2003.

24 Commission Staff Working Document, Annex to the: Proposal for a Directive of the European Parliament and of the Council on the retention of data processed in connection with the provision of public electronic communication services and amending Directive 2002/58/EC, Extended Impact Assessment, {COM(2005) 438 final}, Brussels, 21.9.2005, SEC(2005) 1131.

25 Remarks by the Vice President at National Republican Congressional Committee Event Donald E. Stevens Convention Center Rosemont, Illinois, February 7, 2004.

26 The support rates for George W. Bush up to the end of 2003 never went below 50%, with a historical record of 90% immediately after the 9/11 attacks; http://www.pollingreport.com/BushJob.htm.

27 The direction of normative change is basically from the ‘outside-in’: The norm entrepreneurs are external actors, traditionally non-governmental organizations, human rights NGOs such as Amnesty International or others. They act as public ‘whistleblowers’ whenever human rights are being grossly violated, mobilizing society and putting rhetorical pressure on governments. Other constructivist authors have put forward the idea of transnational advocacy networks, which are basically coalitions of different norm entrepreneurs, ‘capturing cooperation among NGOs, but also connections to potentially like-minded actors in church and union organizations, foundations, the media, international governmental organizations, or governmental bureaucracies’ (Schmitz and Sikkink Reference Schmitz, Sikkink and Carlsnaes2002: 523).

28 What mechanisms stand behind such a spread is certainly very difficult to find out empirically.

29 So far, convergence research has concentrated mainly on ‘low politics’ (e.g. fiscal, environmental or social politics).

30 We acknowledge that there are also other forms of representation and sources in the discursive field of counterterrorism, such as national media coverage, that can contribute to changes in perceptions and attitudes in a society. For instance, the television images of September 11 were also important with respect to the development of perceptions of security and threat in the U.S. context (see: McDonald Reference McDonald2008: 569).

References

Adler, Emanuel, and Haas, Peter M.. 1992. “Conclusion: Epistemic Communities, World Order, and the Creation of a Reflective Research Program.” International Organization 46(1):367–90.Google Scholar
Amnesty International. 2005. Guantánamo and beyond: The continuing pursuit of unchecked executive power. London.Google Scholar
Amnesty International. 2008. World Report 2008, The State of the World’s Human Rights. London.Google Scholar
Aradau, Claudia. 2004. “Security and the Democratic Scene: Desecuritization and Emancipation.” Journal of International Relations and Development 7(4):388–413.Google Scholar
Aronson, Elliot, and Golden, Burton W.. 1962. “The effect of relevant and irrelevant aspects of communicator credibility on opinion change.” Journal of Personality 30(2):135–46.CrossRefGoogle ScholarPubMed
Babaeva, Svetlana, and Bovt, Georgi. 2004. September Revolution. Izvestiya 15 September.Google Scholar
Babb, Sarah. 1996. “True American System of Finance: Frame Resonance in the US Labor Movement, 1866 to 1886.” American Sociological Review 61:1033–52.Google Scholar
Badescu, Christina G., and Weiss, Thomas G.. 2010. “Misrepresenting R2P and Advancing Norms: An Alternative Spiral?International Studies Perspective 11(4):354–74.Google Scholar
Baldwin, David. 1997. “The Concept of Security.” Review of International Studies 23(1):5–26.Google Scholar
Balzacq, Thierry. 2005. “The Three Faces of Securitization: Political Agency, Audience and Context.” European Journal of International Relations 11(2):171–201.CrossRefGoogle Scholar
Balzacq, Thierry. 2011. Enquiries into methods: a new framework for securitization analysis. In: Securitization Theory. How security problems emerge and dissolve, edited by Balzacq, Thierry, 31–54. London/New York: Routledge.Google Scholar
Benford, Robert D. 1993. “Frame Disputes within the Nuclear Disarmament Movement.” Social Force 71(3):692–3.CrossRefGoogle Scholar
Benford, Robert D., and Snow, David A.. 2000. “Framing Processes and Social Movements: An Overview and Assessment.” Annual Review of Sociology 26:611–39.CrossRefGoogle Scholar
Berbrier, Mitch. 1998. “Half the battle: Cultural resonance, framing processes, and ethnic affectations in contemporary white separatist rhetoric.” Social Problems 45(4):431–50.CrossRefGoogle Scholar
Bigo, Didier, 2000. “When Two Become One: Internal and External Securitisations in Europe.” In: International Relations Theory and the Politics of European Integration: Power, Security and Community, edited by Kelstrup, Morten and Williams, Michael C., 171–204. London: Routledge.Google Scholar
Bigo, Didier, et al. . 2007. The Changing Landscape of European Liberty and Security: Mid-Term Report on the Results of the CHALLENGE Project; Challenge – Liberty and Security, Research Paper No. 4, February.Google Scholar
Bowden, Mark. 2003. “The Dark Art of Interrogation.” Atlantic Monthly, October, 51–76.Google Scholar
Burgess, Niall, and Spence, David. 2004. “The European Union: new threats and the problem of coherence.” In: Business and Security: Public-Private Sector Relationships in a New Security Environment, edited by Bailes, Alyson and Frommelt, Isabel, 84–101. Stockholm: SIPRI.Google Scholar
Bush, George W., and Nordlinger, Jay. 2003. We Will Prevail: President George W. Bush on War, Terrorism and Freedom. Foreword by Noonan, Peggy; Introduction by Nordlinger, Jay. New York: Continuum.Google Scholar
Buzan, Barry. 1997. “Rethinking Security after the Cold War.” Cooperation and Conflict 32(1):5–28.CrossRefGoogle Scholar
Buzan, Barry. 2004. The United States and the Great Powers: World Politics in the Twenty-First Century. Cambridge: Polity.Google Scholar
Buzan, Barry. 2006. “Will the ‘global war on terrorism’ be the new Cold War?” International Affairs 82(6):1101–18.CrossRefGoogle Scholar
Buzan, Barry, and Wæver, Ole. 1997. “Slippery? Contradictory? Sociologically Untenable? The Copenhagen School Replies.” Review of International Studies 23(2):241–50.CrossRefGoogle Scholar
Buzan, Barry, and Wæver, Ole. 2003. Regions and powers: The structure of international security. Cambridge/New York: Cambridge University Press.Google Scholar
Buzan, Barry, et al. . 1998. Security – A New Framework for Analysis. Boulder, CO/London: Lynne Rienner.Google Scholar
Chong, Dennis, and Druckmann, James N.. 2007. “Framing Theory”. Annual Review of Political Science 10:103–26.Google Scholar
Chowdhury, Arjun, and Krebs, Ronald R.. 2010. “Talking about terror: Counterterrorist campaigns and the logic of representation.” European Journal of International Relations 16(1):125–50.Google Scholar
Council of Europe. 2006. Alleged secret detentions and unlawful inter-state transfers involving Council of Europe member states Draft report - Part II (Explanatory memorandum, Committee on Legal Affairs and Human Rights, Dick Marty (Rapporteur), AS/Jur (2006) 16 Part II, Strasbourg, 7 June 2006, ajdoc 16 2006 Part II.Google Scholar
Crawford, Neta C. 2002. Argument and Change in World Politics Ethics, Decolonization, and Humanitarian Intervention. New York: Cambridge University Press.CrossRefGoogle Scholar
Crelinsten, Ronald D. 2009. Counterterrorism. Cambridge: Wiley.Google Scholar
d’Anjou, Leo, and Van Male, John. 1998. “Between old and new: social movements and cultural change.” Mobilization 3(2):207–26.Google Scholar
Daase, Christopher. 2003. “Der Anfang vom Ende des nuklearen Tabus.” Zeitschrift für Internationale Beziehungen 10(1):7–41.Google Scholar
Danner, Mark, 2004. Torture and Truth: America, Abu Ghraib, and the War on Torture. New York: New York Review of Books.Google Scholar
Diez, Thomas, et al. . 2006. “The European Union and border conflicts: The transformative power of integration.” International Organization 60(3):563–93.Google Scholar
Dillon, Michael. 2007. “Governing Terror: The State of Emergency of Biopolitical Emergence.” International Political Sociology 1(1):7–28.CrossRefGoogle Scholar
Dolowitz, David and Marsh, David. 2000. “Learning from Abroad: the Role of Policy Transfer in Contemporary Policy-Making.” Governance 13(1):5–23.Google Scholar
Donati, Paolo R. 2001. “Die Rahmenanalyse politischer Diskurse.” In: Handbuch sozialwissenschaftliche Diskursanalyse, Vol. 1: Theorien und Methoden, edited by Keller, R., et al. ., 145–76. Opladen: Leske and Budrich.Google Scholar
Elbe, Stefan. 2006. “Should HIV/AIDS Be Securitized? The Ethical Dilemmas of Linking HIV/AIDS and Security.” International Studies Quarterly 50(1):119–44.CrossRefGoogle Scholar
Eriksson, Johan. 1999. “Observers or Advocates? On the Political Role of Security Analysts.” Cooperation and Conflict 34(3):311–30.CrossRefGoogle Scholar
Eriksson, Johan and Erik, Noreen. 2002. Setting the Agenda of Threats: An Explanatory Model. Uppsala Peace Research Paper No. 6.Google Scholar
Erwin, Lorna. 1993. “Neoconservatism and the Canadian pro-family movement.” Canadian Review of Sociology and Anthropology 30(3):401–20.Google Scholar
European Commission, 2002. Standard Eurobarometer 57. Public Opinion in the European Union. First Results, Brussels.Google Scholar
Evangelista, Matthew. 2008. Law, ethics and the war on terror. Cambridge: Polity Press.Google Scholar
Finnemore, Martha. 1996. National Interests in International Society. Ithaca, NY: Cornell University Press.CrossRefGoogle Scholar
Finnemore, Martha, and Sikkink, Kathryn. 1998. “International Norms Dynamics and Political Change.” International Organization 52(4):887–917.Google Scholar
Fiske, Susan T., and Taylor, Shelley E.. 1991. Social Cognition. New York: McGraw-Hill.Google Scholar
Fordham, Benjamin O., and Asal, Victor. 2007. “Billiard Balls or Snowflakes? Major Power Prestige and the International Diffusion of Institutions and Practices.” International Studies Quarterly 51(1):31–52.Google Scholar
Futrell, Robert. 2003. “Framing Processes, Cognitive Liberation, and NIMBY Protest in the U.S. Chemical-Weapons Disposal Conflict.” Social Inquiry 73(3):359–86.Google Scholar
Gerhards, Juergen, and Rucht, Dieter. 1992. “Mesomobilization: Organizing and Framing in Two Protest Campaigns in West Germany.” The American Journal of Sociology 98(3):555–96.CrossRefGoogle Scholar
Goffman, Erving. 1974. Frame Analysis: An Essay on the Organization of Experience. New Yorket al.: Harper & Row.Google Scholar
Golts, Alexander. 2004. “Military Reform in Russia and the Global War against Terrorism.” Journal of Slavic Military Studies 17(1):29–41.CrossRefGoogle Scholar
Greenberg, Karen J. 2008. The Enemy Combatant Papers: American Justice, the Courts, and the War on Terror. Cambridge: Cambridge University Press.Google Scholar
Greenberg, Karen J., and Dratel, Joshua L.. 2005. The Torture Papers: The Road to Abu Ghraib. New York: Cambridge University Press.Google Scholar
Guiraudon, Virginie. 2003. “The Constitution of a European Immigration Policy Domain: A Political Sociology Approach.” Journal of European Public Policy 10(2):263–82.CrossRefGoogle Scholar
Guzzini, Stefano and Jung, Dietrich. 2004. Contemporary Security Analysis and Copenhagen Peace Research. London/New York: Routledge.Google Scholar
Haas, Peter M. 1992, “Introduction: Epistemic Communities and International Policy-Coordination.” International Organization 46(1):1–36.Google Scholar
Hansen, Lene, and Nissenbaum, Helen. 2009. “Digital Disaster, Cyber Security, and the Copenhagen School.” International Studies Quarterly 53(4):1155–75.Google Scholar
Hass, Glen R. 1991. “Effects of source characteristics on cognitive responses and persuasion.” In: Cognitive Responses in Persuasion, edited by Petty, R. E., 141–72. Hillsdale: Erlbaum Associates.Google Scholar
Heichel, Stephan, et al. . 2005. “Is there convergence in convergence research? An overview of empirical studies on policy convergence.” Journal of European Public Policy 12(5):817–40.Google Scholar
Hersh, Seymour M. 2004. Chain of Command: The Road from 9/11 to Abu Ghraib. New York: HarperCollins.Google Scholar
Hill, Michael. 1997. The Policy Process in the Modern State, 3rd edn. London: Prentice Hall/Harvester Wheatsheaf.Google Scholar
Hoge, Warren. 2006. “Investigators for UN Urge U.S. to Close Guantanamo.” New York Times, 17 February.Google Scholar
Holm, Ulla. 2004. “Algeria: Securitization of State/Regime, Nation and Islam.” In: Contemporary Security Analysis and Copenhagen Peace Research, edited by Guzzini, Stefano and Jung, Dietrich, 217–28. London: Routledge.Google Scholar
Holzinger, Katharina. 2004. “Bargaining Through Arguing: An Empirical Analysis Based on Speech Act Theory.” Political Communication 21(2):195–222.CrossRefGoogle Scholar
Holzinger, Katharina. 2006. “Methodological Pitfalls of Convergence Analysis.” European Union Politics 7(2):271–87.CrossRefGoogle Scholar
Hovland, Carl I., and Weiss, Walter. 1951. The Influence of Source Credibility on Communication Effectiveness. The Public Opinion Quarterly 15(4):635–50.Google Scholar
Human Rights Watch. 2005. Leadership Failure Firsthand Accounts of Torture of Iraqi Detainees by the U.S. Army’s 82nd Airborne Division. New York.Google Scholar
Human Rights Watch. 2006. World Report 2006. New York.Google Scholar
Human Rights Watch. 2008. World Report 2008. New York.Google Scholar
Huysmans, Jef. 1998, “Revisiting Copenhagen: Or, On the Creative Development of a Security Studies Agenda in Europe.” European Journal of International Relations 4(4):479–506.Google Scholar
Huysmans, Jef. 2000. “The European Union and the Securitization of Migration.” Journal of Common Market Studies 38(5):751–77.Google Scholar
Jackson, Richard. 2007a. “An analysis of EU counterterrorism discourse post-September 11. Cambridge Review of International Affairs20(2):233–47.Google Scholar
Jackson, Richard. 2007b. “Language, policy and the construction of a torture culture in the war on terrorism.” Review of International Studies 33(3):353–71.Google Scholar
Jaffer, Jameel, and Singh, Amrit. 2009. Administration of torture: a documentary record from Washington to Abu Ghraib and beyond. New York, NY: Columbia University Press.Google Scholar
Jarvis, Lee. 2009. Times of Terror: Discourse, Temporality and the War on Terror. Basingstoke: Palgrave Macmillan.Google Scholar
Jehl, Douglas, 2005. “Report Warned on CIA’s Tactics in Interrogation.” New York Times, 9 November.Google Scholar
Jenkins, Brian. 1975. “International terrorism: A new mode of conflict.” In: International Terrorism and World Security, edited by Carlton, David and Schaerf, Carlo, 13–49. London: Croom Helm.Google Scholar
Johnson, Victoria L. 1997. “Operation Rescue, Vocabularies of Motive, and Tactical Action: A Study of Movement Framing in the Practice of Quasi-Nonviolence.” In: Research in Social Movements, Conflict and Chance, vol. 20 edited by Kriesberg, Louis, et al. , 103–50. Greenwich, CT: Jay Press.Google Scholar
Johnston, David, and Risen, James. 2004. “The Reach of War: The Interrogations.” New York Times, 27 June.Google Scholar
Johnston, Hank. 2008. “Ritual, strategy, and deep culture in the Chechen national movement,” Critical Studies on Terrorism, 1(3):321–42.CrossRefGoogle Scholar
Jones, Trevor, and Newburn, Tim. 2002. “Learning from Uncle Sam? Exploring U.S. Influences on British Crime Control Policy.” Governance: An International Journal of Policy, Administration, and Institutions 15(1):97–119.Google Scholar
Karyotis, Georgios. 2007. “Securitization of Greek Terrorism and Arrest of the Revolutionary Organization November 17.”Cooperation and Conflict 42(3):271–93.CrossRefGoogle Scholar
Keck, Margaret, and Sikkink, Kathryn. 1998. Activists Beyond Borders: Advocacy Networks in International Politics. Ithaca, NY: Cornell University Press.Google Scholar
Kelstrup, Morten. 2004. “Globalisation and societal insecurity: the securitisation of terrorism and competing strategies for global governance.” In: Contemporary Security Analysis and Copenhagen Peace Research, edited by Guzzini, Stefano and Jung, Dietrich, 106–16. London/New York: Routledge.Google Scholar
Kingdon, John W. 1994. Agendas, Alternatives and Public Policies. New York: Harper Collins.Google Scholar
Klandermans, Bert. 1992. “The Social Construction of Protest and Multiorganizational Fields.” In: Frontiers in Social Movement Theory, edited by Morris, Aldon and McClurg Mueller, Carol, 77–103. New Haven, CT: Yale University Press.Google Scholar
Knill, Christoph. 2005. “Introduction: Cross-national policy convergence: concepts, approaches and explanatory factors.” Journal of European Public Policy 12(5):764–74.Google Scholar
Knudsen, Olav F. 2001. “Post-Copenhagen Security Studies: Desecuritizung Securitization.” Security Dialogue 32(3):355–68.Google Scholar
Kostakopoulou, Dora. 2000. “The ‘Protective’ Union: Change and Continuity in Migration Law and Policy in Post-Amsterdam Europe.” Journal of Common Market Studies 38(3):497–518.CrossRefGoogle Scholar
Kostyukov, Anatoli, 2004. “Restauration. The President announced his plans for state reform.” Nezavisimaya Gazeta, 14 September.Google Scholar
Krebs, Ronald R. 2006. “Fighting for Rights: Military Service and the Politics of Citizenship.” Ithaca, NY: Cornell University Press.Google Scholar
Krebs, Ronald R., and Jackson, Patrick T.. 2007. “Twisting Tongues and Twisting Arms: The Power of Political Rhetoric.” European Journal of International Relations 13(1):35–66.CrossRefGoogle Scholar
Kubal, Timothy J. 1998. “The Presentation of Political Self: Cultural Resonance and the Construction of Collective Action Frames.” The Sociological Quarterly 39(4):539–54.Google Scholar
Legro, Jeffrey W. 2000. “The Transformation of Policy Ideas.” American Journal of Political Science 44(33):419–32.Google Scholar
Lelyveld, Joseph. 2005. “Interrogating Ourselves.” New York Times (Sunday Magazine), 12 June.Google Scholar
Leonard, Sarah, and Kaunert, Christian. 2011. “Reconceptualizing the Audience in Securitization Theory.” In: Securitization Theory. How Security Problems Emerge and Dissolve, edited by Balzacq, Thierry, 57–76. London/New York: Routledge.Google Scholar
Lewis, Anthony. 2004. “Making Torture Legal.” New York Review of Books, 15 July.Google Scholar
Lewis, Neil, and Schmitt, Eric. 2005. “Inquiry Finds Abuses at Guantanamo Bay.” New York Times, 1 May.Google Scholar
Liese, Andrea. 2006. Staaten am Pranger. Zur Wirkung internationaler Regime auf innerstaatliche Menschenrechtspolitik. Wiesbaden: VS Verlag.Google Scholar
Liese, Andrea. 2009. “Exceptional necessity. How liberal democracies contest the prohibition of torture and ill-treatment when countering terrorism.” Journal of International Law and International Relations 5(1):17–47.Google Scholar
March, James J., and Olsen, Johan P.. 1998. “The Institutional Dynamics of International Political Orders.” International Organization 52(4):943–70.Google Scholar
Mayer, Jane. 2005a. “The Experiment.” New Yorker online, 11 and 18 July: http://www.newyorker.com/fact/content/articles/050711fa_fact4.Google Scholar
Mayer, Jane. 2005b. “Outsourcing torture: the secret history of America’s ‘extraordinary rendition’ program.” New Yorker online, 14 February: http://www.newyorker.com/printables/fact/050214fa_fact6.Google Scholar
McCaffrey, Dawn, and Keys, Jennifer. 2000. “Competitive Frame Processes in the Abortion Debate – Polarisation – Vilification, Frame Saving and Frame Debunking.” Sociological Quarterly 41(1):41–6.Google Scholar
McDonald, Matt. 2007. “Justifying Intervention: The Coalition of the Willing and the ‘War on Terror’.” Paper presented at BISA Conference, Cambridge, December.Google Scholar
McDonald, Matt. 2008. “Securitization and the Construction of Security.” European Journal of International Relations 14(4):563–87.Google Scholar
McGuire, William J. 1985. “Attitudes and Attitude Change.” In: Handbook of Social Psychology, edited by Lindzey, Gardner and Aronson, Elliot, 233–346. Hillsdale, NY: Random House.Google Scholar
McKeown, Ryder. 2009. “Norm Regress: US Revisionism and the Slow Death of the Torture Norm.” International Relations 23(1):5–25.Google Scholar
McSweeney, Bill. 1996. “Identity and Security: Buzan and the Copenhagen School.” Review of International Studies 22(1):81–93.Google Scholar
Meyer, Christoph O. 2009. “International terrorism as a force of homogenization? A constructivist approach to understanding cross-national threat perceptions and responses.” Cambridge Review of International Affairs 22(4):647–66.CrossRefGoogle Scholar
Meyer, John W., et al. . 1997. “World Society and the Nation-State.” American Journal of Sociology 103(1):144–81.Google Scholar
Michaelsen, Christopher. 2006. “Balancing Civil Liberties against National Security.” University of New South Wales Law Journal 29(2):1–21.Google Scholar
Nadelmann, Ethan A. 1990. “Global prohibition regimes: the evolution of norms in international society.” International Organization, 44(4):479–526.Google Scholar
Neal, Andrew W. 2009. “Securitization and Risk at the EU Border: The Origins of FRONTEX.” Journal of Common Market Studies 47(2):333–56.CrossRefGoogle Scholar
Noonan, Rita K. 1995. “Women against the state: political opportunities and collective action frames in Chile’s transition to democracy.” Sociological Forum 10(1):81–111.Google Scholar
Nowak, Manfred. 2006. “Das System Guantánamo.” Aus Politik und Zeitgeschichte B 36:23–30.Google Scholar
Oberschall, Anthony. 1989. “Culture change and social movements.” Annual Meeting of the American Sociological Association, San Francisco, CA, 9–13 August.Google Scholar
Omelicheva, Mariya Y. 2007. “Russia’s Counterterrorism Policy: Variations on an Imperial Theme.” Paper for presentation at the Annual Convention of the International Studies Association, San Francisco, CA, 26–29 March.Google Scholar
OSCE Parliamentary Assembly, 2005. Report on Guantanamo, prepared by Mrs. Anne-Marie Lizin, Rapporteur of the committee Human Dimension of the OSCE Parliamentary Assembly to the President of the OSCE Parliamentary Assembly, Mr. Alcee Hastings. Copenhagen.Google Scholar
OSCE Parliamentary Assembly 2007. Report on Guantanamo Bay, by Mrs. Anne-Marie Lizin, Special Representative of the President of the OSCE Parliamentary Assembly, Mr. Göran Lennmarker. Copenhagen, 8 July.Google Scholar
Panfilov, Oleg. 2005. Putin and the Press: The Revival of Soviet-style Propaganda. London: The Foreign Policy Centre.Google Scholar
Panke, Diana, and Petersohn, Ulrich. 2011. “Why international norms disappear sometimes, European Journal of International Relations,” online first, June 14, 2011, available athttp://ejt.sagepub.com/content/early/2011/06/14/1354066111407690.Google Scholar
Park, Kristin. 1998. “The religious construction of sanctuary provision in two congregations. Sociological Spectrum18(4):393–421.CrossRefGoogle Scholar
Paust, Jordan J. 2007. Beyond the law: the Bush administration’s unlawful responses in the ‘war’ on terror. Cambridge: Cambridge University Press.Google Scholar
Payne, Rodger A. 2001. “Persuasion, Frames and Norm Construction.” European Journal of International Relations 7(1):37–61.Google Scholar
Plater-Zyberk, Henry. 2005. Russia’s Special Forces. Conflict Studies Research Centre, Russian Series 05/50, September available athttp://studies.agentura.ru/centres/csrc/rsp.pdf.Google Scholar
Poleine, Martin, et al. . 2009. Counterterrorism Law and Practice – An International Handbook. Oxford: Oxford University Press.Google Scholar
Powell, Walter W., and DiMaggio, Paul J.. 1991. The New Institutionalism in Organizational Analysis. Chicago, IL: University of Chicago Press.Google Scholar
Riskin, Andrei. 2004. “Russia prepares for the Great War.” Nezavisimaya Gazeta, 14 September.Google Scholar
Risse, Thomas. 1999. “Identitäten und Kommunikationsprozesse in der internationalen Politik – Sozialkonstruktivistische Perspektiven zum Wandel in der Außenpolitik.” In: Außenpolitischer Wandel in theoretischer und vergleichender Perspektive – die USA und die Bundesrepublik Deutschland, edited by Medick-Krakau, Monika, 33–57. Baden-Baden: Nomos.Google Scholar
Risse, Thomas. 2000. ‘“Let’s Argue!’: Communicative Action in World Politics.” International Organization 54(1):1–39.Google Scholar
Risse, Thomas. 2003. “Konstruktivismus, Rationalismus und Theorien Internationaler Beziehungen – warum empirisch nichts so heiß gegessen wird, wie es theoretisch gekocht wurde.” In: Die neuen Internationalen Beziehungen. Forschungsstand und Perspektiven in Deutschland, edited by Hellmann, Gunther, 99–132. Baden-Baden: Nomos.Google Scholar
Risse, Thomas, et al. . 1999. The Power of Human Rights. International Norms and Domestic Change. Cambridge: Cambridge University Press.Google Scholar
Risse, Thomas, and Sikkink, Kathryn. 1999. “The Socialization of International Human Rights Norms Into Domestic Practice: Introduction.” In: The Power of Human Rights. International Norms and Domestic Change, edited by Risse, Thomas, et al. ., 1–38. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Roe, Paul. 2004. “Securitization and minority rights: Conditions of desecuritization.” Security Dialogue 35(3):279–94.Google Scholar
Rosert, Elvira, and Schirmbeck, Sonja. 2007. “Zur Erosion internationaler Normen.” Zeitschrift für internationale Beziehungen 14(2):253–87.Google Scholar
Roskos-Ewoldsen, David R., et al. . 2002. “The Influence of Accessibility of Source Likeability on Persuasion.” Journal of Experimental Social Psychology 38(2):137–43.CrossRefGoogle Scholar
Roth, Kenneth, 2006. “Justifying Torture.” In: Torture: Does it Make Us Safer? Is It Ever OK? A Human Rights Perspective, edited by Roth, Kenneth, et al. ., 184–201. New Yorket al.: New Press and Human Rights Watch.Google Scholar
Ruggie, John G. 1998. Constructing the World Polity. Essays on International Institutionalization. London: Routledge.Google Scholar
Sabatier, Paul, and Jenkins-Smith, Hank C.. 1993. Policy change and learning: an advocacy coalition approach. Boulder, CO: Westview Press.Google Scholar
Salter, Mark. 2011. “When securitization fails: the hard case of counterterrorism programs.” In: Securitization Theory. How security problems emerge and dissolve, edited by Balzacq, Thierry, 116–32. London/New York: Routledge.Google Scholar
Sandholtz, Wayne. 2008. “Dynamics of International Norm Change: Rules against Wartime Plunder.” European Journal of International Relations 14(1):101–31.Google Scholar
Sasse, Gwendolyn. 2005. “Securitization or Securing Rights? Exploring the Conceptual Foundations of Policies towards Minorities and Migrants in Europe.” Journal of Common Market Studies 43(4):673–93.Google Scholar
Schmitz, Hans Peter, and Sikkink, Kathryn. 2002. “International Human Rights”. In: Handbook of International Relations, edited by Carlsnaes, Walter, et al. ., 517–37. London: Sage.Google Scholar
Shumilov, A. J., and Safonov, I. I.. 2005. “Typical operational-investigational versions about cases of terrorist acts.” In: Terrorism: Legal aspects of Counteraction, edited by Trunov, I. L., 228–35. Moscow: Eksmo.Google Scholar
Siegert, Jens. 2003. “Angriff auf die Pressefreiheit.” In: Der Krieg im Schatten. Russland und Tschetschenien, edited by Hassel, Florian, 153–72. Frankfurt am Main: Suhrkamp.Google Scholar
Slater, Jerome. 2006. “Tragic Choices in the War on Terrorism: Should We Try to Regulate and Control Torture?Political Science Quarterly 121(1):191–215.Google Scholar
Slater, Michael D., and Rouner, Donna. 1996. “How Message Evaluation and Source Attributes May Influence Credibility Assessment and Belief Change.” Journalism and Mass Communication Quarterly 73(4):974–91.Google Scholar
Snow, David A., and Benford, Robert D.. 1988. “Ideology, frame resonance, and participant mobilization.” International Social Movement Research 1(1):197–218.Google Scholar
Soldatov, Andrei, and Borogan, Irina. 2005. Terrorism prevention in Russia: one year after Beslan, Report of Agentura.Ru Studies and Research Centre, September 2005.Google Scholar
Stritzel, Holger. 2007. “Towards a Theory of Securitization: Copenhagen and Beyond.” European Journal of International Relations 13(3):357–83.Google Scholar
Stykow, Petra. 2004. “Russland: Wandel der Sicherheitspolitik als Funktion der Innen- und Außenpolitik.” In: Europäisierung der inneren Sicherheit. Eine vergleichende Untersuchung am Beispiel von organisierter Kriminalität und Terrorismus, edited by Glaeßner, Gert-Joachim and Lorenz, Astrid, 225–44. Wiesbaden: VS Verlag.Google Scholar
Sunstein, Cass. 1997. Free Markets and Social Justice. New York/Oxford: Oxford University Press.Google Scholar
Vanderford, Marsha L. 1989. “Vilification and Social Movements: A Case Study of Pro-Life and Pro-Choice Rhetoric.” Quarterly Journal of Speech 75(2):166–72.Google Scholar
Vultee, Fred. 2011. “Securitization as a media frame: what happens when the media ‘speak security’.” In: Securitization Theory. How security problems emerge and dissolve, edited by Balzacq, Thierry, 77–93. London/New York: Routledge.Google Scholar
Vuori, Juha A. 2008. “Illocutionary Logic and Strands of Securitization: Applying the Theory of Securitization to the Study of Non-Democratic Political Orders.” European Journal of International Relations 14(1):65–99.Google Scholar
Wade, Marianne, and Maljevic, Almir. 2010. A war on terror? The European stance on a threat, changing laws and human rights implications. New York: Springer.Google Scholar
Wæver, Ole, 1989. “Security, the Speech Act: Analyzing the Politics of a Word.” Working Paper 19, Copenhagen: Center for Peace and Conflict Research.Google Scholar
Wæver, Ole 1995. “Securitization and Desecuritization.” In: On Security, edited by Lipshutz, Ronnie, 46–86. New York: Columbia University Press.Google Scholar
Wæver, Ole 1999. “Insecurity, Security and Asecurity in the West European non-War Community.” In: Security Communities, edited by Adler, Emanuel and Barnett, Michael N., 69–118. Cambridge: Cambridge University Press.Google Scholar
Wæver, Ole 2000. “The EU as a Security Actor: Reflections from a Pessimistic Constructivist on Post Sovereign Security Orders.” In: International Relations Theory and the Politics of European Integration, edited by Kelstrup, Morten and Williams, Michael C, 250–94. London: Routledge.Google Scholar
Wiener, Antje. 2004. “Contested Compliance: Interventions on the Normative Structure of World Politics.” European Journal of International Relations 10(2):189–234.Google Scholar
Williams, Michael C. 2003. “Words, Images, Enemies: Securitization and International Politics.” International Studies Quarterly 47(4):511–31.Google Scholar
Williams, Michael C. 2011. “The continuing evolution of securitization theory.” In: Securitization Theory. How security problems emerge and dissolve, edited by Balzacq, Thierry, 212–22. London/New York: Routledge.Google Scholar
Wolfe, Wojtek Mackiewicz. 2008. Winning the war of words: selling the war on terror from Afghanistan to Iraq. New York: Praeger.Google Scholar
Zuo, Jiping, and Benford, Robert D.. 1995. “Mobilization Processes and the 1989 Chinese Democracy Movement.” The Sociological Quarterly 36(1):131–56.Google Scholar