+1 Recommend
1 collections

      If you have found this article useful and you think it is important that researchers across the world have access, please consider donating, to ensure that this valuable collection remains Open Access.

      Journal of Global Faultlines is published by Pluto Journals, an Open Access publisher. This means that everyone has free and unlimited access to the full-text of all articles from our international collection of social science journals, and the authors don’t pay an author processing charge (APC’s).

      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      State terrorism: are academics deliberately ignoring it?

      Journal of Global Faultlines
      Pluto Journals


            This article seeks to examine whether there is a deliberate ignorance on the part of scholars over the possibility of state terrorism. According to Jackson, Smyth, and Gunning (2009: 78), academics who ignore the “possibility of state terrorism … as a field with academic and political authority … can be considered … conditions that … make state terrorism possible.” The argument will incorporate realism, with its focus on state-centric security, with liberalism, with its focus on human security, to identify which theoretical perspective best evaluates whether academics are deliberately ignoring the possibility of state terrorism. It will also draw on interviews conducted with a small group of academics, all specialists in the fields of security, international relations, and intelligence, during the spring of 2019, for the purpose of this research.


            Author and article information

            Journal of Global Faultlines
            Pluto Journals
            1 December 2019
            : 6
            : 2 ( doiID: 10.13169/jglobfaul.6.issue-2 )
            : 204-214
            Joshua Wright is a Birmingham City University graduate, studying for a Masters in Security Studies.
            This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.

            All content is freely available without charge to users or their institutions. Users are allowed to read, download, copy, distribute, print, search, or link to the full texts of the articles in this journal without asking prior permission of the publisher or the author. Articles published in the journal are distributed under a http://creativecommons.org/licenses/by/4.0/.

            Custom metadata

            Social & Behavioral Sciences


            1. Anthony, M.C. (2016) An Introduction to Non-traditional Security Studies: A Transnational Approach. Los Angeles: Sage.

            2. Bilandzić, M. (2013) “Contribution to the Debate on Terrorism: Is there a State Terrorism?” International Scientific Defence, Security and Peace Journal 13(24): 39–57.

            3. Blakeley, R. (2007) “Bringing the State Back into Terrorism Studies,” European Political Science 6(3): 228–235.

            4. Blakeley, R. (2009) State Terrorism and Neoliberalism: The North in the South. Abingdon: Routledge.

            5. Burke, A. (2008) “The End of Terrorism Studies,” Critical Studies on Terrorism 1(1): 37–49.

            6. Buzan, B. (1991) People, States and Fear: An Agenda for International Security Studies in the Post-Cold War Era. Revised ed. New York: Harvester Wheatsheaf.

            7. Buzan, B. & Hansen, L. (2009) The Evolution of International Security Studies. Cambridge: Cambridge University Press.

            8. Cavelty, M.D. & Balzacq, T. (Eds) (2012) Routledge Handbook of Security Studies. Abingdon: Routledge.

            9. Cavelty, M.D. & Balzacq, T. (Eds) (2016) Routledge Handbook of Security Studies. 2nd ed. Abingdon: Routledge.

            10. Christie, R. (2010) “Critical Voices and Human Security: To Endure, to Engage or to Critique?” Security Dialogue 41(2): 169–190.

            11. Collins, A. (2016) Contemporary Security Studies. 4th ed. Oxford: Oxford University Press.

            12. Dannreuther, R. (2013) International Security: The Contemporary Agenda. 2nd ed. Cambridge: Polity Press.

            13. Della Porta, D. (2013) Clandestine Political Violence. Cambridge Studies in Contentious Politics. Cambridge: Cambridge University Press, pp. 1–32.

            14. Doty, R. (1993) “Foreign Policy as Social Construction: A Post-positivist Analysis of US Counterinsurgency Policy in the Philippines,” International Studies Quarterly 37(3): 297–320.

            15. Farruku, E. (2016) “Redefining Human Security The Case of Albania,” Annales. Ethics in Economic Life 19(4): 81–99.

            16. Hameiri, S. & Jones, L. (2013) “The Politics and Governance of Non-Traditional Security,” International Studies Quarterly 57(3): 462–473.

            17. Herman, E.S. & O'Sullivan, G. (1989) The Terrorism Industry: The Experts and Institutions that Shape our View of Terror. New York: Pantheon.

            18. Herring, E. & Stokes, D. (2011) “Critical Realism and Historical Materialism as Resources for Critical Terrorism Studies,” Critical Studies on Terrorism 4(1): 5–21.

            19. Hewitt, S. (2008) The British War on Terror: Terrorism and Counter-terrorism on the Home Front since 9–11. Continuum: London.

            20. Hoffman, B. (Ed.) (2006) Inside Terrorism. New York: Columbia University Press.

            21. Hoogensen, G. & Rottem, S.V. (2004) “Gender Identity and the Subject of Security,” Security Dialogue 35(2): 155–171.

            22. Jackson, R. (2008) “The Ghosts of State Terror: Knowledge Politics and Terrorism Studies,” Critical Studies on Terrorism 1(3): 377–392.

            23. Jackson, R. (2009) “The 9/11 Attacks and the Social Construction of a National Narrative,” in Morgan, M. (Ed.) The Impact of 9/11 on the Media, Arts, and Entertainment: The Day Changed Everything? Basingstoke: Palgrave Macmillan, pp. 25–35.

            24. Jackson, R. (2011) “In Defence of Terrorism: Finding a Way through a Forest of Misconceptions,” Behavioral Sciences of Terrorism and Political Aggression 3(2): 116–130.

            25. Jackson, R. (Ed.) (2016) Routledge Handbook of Critical Terrorism Studies. Abingdon: Routledge.

            26. Jackson, R., Jarvis, L., Gunning, J., & Breen-Smyth, M. (2011) Terrorism: A Critical Introduction. Basingstoke: Palgrave Macmillan.

            27. Jackson, R., Smyth, M., & Gunning, J. (2009) Critical Terrorism Studies: A New Research Agenda. New York: Routledge.

            28. Jarvis, L. & Lister, M. (2014) “State Terrorism Research and Critical Terrorism Studies: An Assessment,” Critical Studies on Terrorism 7(1): 43–61.

            29. Jenkins, M., B. (1980) The Study of Terrorism: Definitional Problems. Santa Monica: The Rand Corporation. Available at: www.rand.org/content/dam/rand/pubs/papers/2006/P6563.pdf (accessed 7 January 2019).

            30. Jones, D.M. & Smith, M.L.R. (2009) “We're All Terrorists Now: Critical - or Hypocritical -Studies on Terrorism?” Studies in Conflict and Terrorism 32(4): 292–302.

            31. Jongman, A.J. (2017) Political Terrorism: A New Guide to Actors, Authors, Concepts, Databases, Theories, and Literature. 2nd ed. New York: Routledge.

            32. Kerr, P. (2007) “Human Security”, in Collins, A. (2009) Contemporary Security Studies. 2nd ed. Oxford: Oxford University Press, pp. 91–108.

            33. Khong, Y.F. (2001) “Human Security: A Shotgun Approach to Alleviating Human Misery?” Global Governance 7(3): 231–237.

            34. Krause, K. (2004) “The Key to a Powerful Agenda, if Properly Delimited,” Security Dialogue 35(3): 367–368.

            35. Mark, A. (2004) “A Signifier of Shared Values,” Security Dialogue 35(3): 366–367.

            36. Martin, G. (2018) Understanding Terrorism: Challenges, Perspectives, and Issues. 6th ed. California: Sage.

            37. Martin, M. & Owen, T. (2014) Routledge Handbook of Human Security. Abingdon: Routledge.

            38. Monaghan, M.P. & Prideaux, S. (2016) State Crime and Immorality: The Corrupting Influence of the Powerful. Bristol: Policy Press.

            39. Owens, P. (2012) “Human Security and the Rise of the Social,” Review of International Studies 38(3): 547–567.

            40. Peoples, C. & Vaughan-Williams, N. (2010) Critical Security Studies: An Introduction. Abingdon: Routledge.

            41. Ramsay, G. (2015) “Why Terrorism Can, but Should Not be Defined,” Critical Studies on Terrorism 8(2): 211–228.

            42. Rummel, R.J., (2011) Death by Government. New Brunswick: Transaction Publisher.

            43. Snyder, C.A. (Ed.) (2012) Contemporary Security and Strategy. 3rd ed. Basingstoke: Palgrave Macmillan.

            44. Soeya, Y. (2005) “Japanese Security Policy in Transition: The Rise of International and Human Security,” Asia Pacific Review 12(1): 103–116.

            45. Sproat, P. (1997) “Can the State Commit Acts of Terrorism? An Opinion and Some Qualitative Replies to a Questionnaire,” Terrorism and Political Violence 9(4): 117–150.

            46. Stohl, M. (2006) “The State as Terrorist: Insights and Implications,” Democracy and Security 2(1): 1–25.

            47. Stohl, M. (2008) “Old Myths, New Fantasies, and the Enduring Realities of Terrorism,” Critical Studies on Terrorism 1(1): 5–16.

            48. Stohl, M. & Lopez, G.A. (Eds) (1984) The State as Terrorist: The Dynamics of Governmental Violence and Repression. Westport: Greenwood Press.

            49. UN Commission on Global Governance (1995) Our Global Neighbourhood: The Report of the Commission on Global Governance. Oxford: Oxford University Press.

            50. UN Commission on Human Security (2003) Human Security Now. Available at: www.un.org/humansecurity/reports-resolutions/ (accessed 25 January 2019).

            51. Viotti, P.R. & Kauppi, M.V. (2008) International Relations and World Politics: Security, Economy, Identity. 4th ed. Prentice Hall, Harlow.

            52. Williams, P.D. & McDonald, M. (Eds) (2018) Security Studies: An Introduction. 3rd ed. Abingdon: Routledge.

            53. Winslow, D. & Eriksen, T.H. (2004) “A Broad Concept that Encourages Interdisciplinary Thinking,” Security Dialogue 35(3): 361–362.


            Comment on this article