You are on page 1of 8

SYMPOSIUM

bringing the state back into


terrorism studies
ruth blakeley
Department of Politics and International Relations, Rutherford College, University of
Kent, Canterbury CT2 7NX, UK
E-mail: r.j.blakeley@kent.ac.uk

doi:10.1057/palgrave.eps.2210139

Abstract
Orthodox terrorism studies tend to focus on the activities of illiberal non-
state actors against the liberal democratic states in the North. It thus
excludes state terrorism, which is one of a number of repressive tools that
great powers from the North have used extensively in the global South in
the service of foreign policy objectives. I establish the reasons for the
absence of state terrorism from orthodox accounts of terrorism and argue
that critical–normative approaches could help to overcome this major
weakness.

Keywords state terrorism; terrorism studies; political violence; torture;


repression

S
tate terrorism, along with other their allies by non-state groups supplied
forms of repression, has been an and controlled by ‘rogue’ states or ele-
ongoing feature of the foreign ments located in the South. This is only
policies of democratic great powers from partially accurate. While such groups
the North and the United States (US) in have carried out attacks against Northern
particular. The use of repression by the US democracies, including the devastating
was particularly intense during the Cold attacks of September 11th, 2001, it is
War, and we are seeing a resurgence of its also the case that Northern democracies
use in the ‘war on terror’. State terrorism, have condoned and used terrorism, along
of which torture can sometimes be a tool, with other forms of repression, against
is defined as threats or acts of violence millions of citizens in the South over
carried out by representatives of the state many decades.
against civilians to instill fear for political There are three reasons for the notable
purposes. According to dominant views in absence of state terrorism – particularly
mainstream policy, media and academic that practised by Northern democracies –
circles, terrorism constitutes the target- from scholarly debate within terrorism
ing of Northern democratic states and studies. The first has to do with the
228 european political science: 6 2007

(228 – 235) & 2007 European Consortium for Political Research. 1680-4333/07 $30 www.palgrave-journals.com/eps
methods deployed by orthodox terrorism ‘For orthodox terrorism
scholars. The second relates to their
institutional affiliations. The third is con-
scholars, the aim of their
nected to the marginalisation of explicitly work is not to challenge
normative approaches to foreign policy these institutions and
within international relations (IR) scholar-
ship more broadly. I will outline some of
power relations, but to
the main flaws in the approaches of consider the problem of
mainstream terrorism scholarship and terrorism within the
show how these are exacerbated by the
institutional affiliations of leading experts.
context of these existing
I will then map out how this serious institutions and power
omission could be overcome. dynamics’.
THE STATE OF
CONTEMPORARY force, it is assumed that this is in
TERRORISM STUDIES response to credible threats or as a
means of protecting others. Yet as Alex-
The way in which terrorism is theorised ander George accurately notes, ‘on any
and defined in conventional terrorism reasonable definition of terrorism, taken
studies is one of the main reasons why literally, the United States and its friends
state terrorism by Northern democracies are the major supporters, sponsors, and
is largely absent from debate. This is perpetrators of terrorist incidents in the
correctly attributed to the way in which world today’ (George, 1991: 1).
‘the term ‘‘terrorism’’ has been virtually A ‘reasonable definition of terrorism’ is
appropriated by mainstream political dis- offered by leading terrorism expert, Paul
cussion to signify atrocities targeting the Wilkinson. He argues that terrorism has
West’ (George, 1991: 1). It is in turn a five main characteristics:
consequence of the fact that most scho-
It is premeditated and aims to create a
larship within terrorism studies is
climate of extreme fear or terror; it is
grounded in ‘problem-solving theory’. As
directed at a wider audience or target
Robert Cox argues, problem-solving the-
than the immediate victims of the
ory ‘takes the world as it finds it, with the
violence; it inherently involves attacks
prevailing social and power relationships
on random and symbolic targets,
and the institutions into which they are
including civilians; the acts of violence
organised, as the given framework for
committed are seen by the society in
action’ (Cox, 1981: 128). For orthodox
which they occur as extra-normal, in
terrorism scholars, the aim of their work
the literal sense that they breach the
is not to challenge these institutions and
social norms, thus causing a sense of
power relations, but to consider the
outrage; and terrorism is used to try to
problem of terrorism within the context
influence political behaviour in some
of these existing institutions and power
way (Wilkinson, 1992: 228–229).
dynamics. Furthermore, the parameters
of analysis for most terrorism scholars Despite this, Wilkinson’s only discussion
have been dictated by dominant neo- of state terrorism is by Marxist–
realist approaches that tend to accept Leninist regimes and their client insur-
the benign character of the foreign po- gencies (Wilkinson, 1992: 232). He
licies of Northern democratic states, and makes no mention of the extensive ter-
the US in particular. When such states use rorism used by right-wing states that
ruth blakeley european political science: 6 2007 229
during the Cold War, sought to repress Counterterrorism as ‘premeditated, poli-
left-wing movements across Latin Amer- tically motivated violence perpetrated
ica, often with US backing. Underpinning against non-combatant targets by sub-
Wilkinson’s work is an inbuilt assumption national groups or clandestine agents,
that Northern democracies are primarily usually intended to influence an audi-
victims and not perpetrators of terrorism. ence’. This means that rather than taking
Importantly, it is not the content of a literal approach to the study of terror-
Wilkinson’s definition that precludes a ism, by which we determine what consti-
focus on state terrorism by Northern tutes terrorism and then seek instances of
democracies, but simply its inconsistent the phenomenon to try and determine
application in research. causes and remedies, the US government
The Centre for the Study of Terrorism takes a propagandistic approach that
and Political Violence (CSTPV) at St focuses solely on actors seen as antitheti-
Andrew’s University worked with the RAND cal to US interests (Chomsky, 1991: 12).
Corporation to develop a database of Importantly, the RAND–St Andrew’s
international terrorism incidents between database also follows this pattern: the
1968 and 1997; it is widely recognised as designated enemies are those non-state
the most authoritative source of data on ‘rogue’ groups that seek to target foreign
international terrorism. The RAND Cor- or domestic interests, and terrorist acts
poration is a non-profit-making research are those perpetrated by such groups
foundation with close links to the Penta- against those targets. In this sense, the
gon. The largest private research centre ‘terrorist’ label is used as a political tool to
in the world with an estimated annual de-legitimise certain groups, rather than
budget of $160 million, it maintains close as an analytical category.
ties to the US government (Burnett and The selective ways in which terrorism is
Whyte, 2005: 8). The RAND–St Andrew’s conceived and studied comes as no sur-
data set defines international terrorism as prise considering the close connections
‘incidents in which the perpetrators go between, first, RAND and the successive
abroad to strike their targets, select US administrations, and, second, between
domestic targets associated with a for- RAND and supposedly independent aca-
eign state, or create an international demic experts on terrorism, including Paul
incident by attacking airline passengers Wilkinson. Other leading academics asso-
or equipment’. From 1998, the data set ciated with both RAND and the CSTPV are
was extended to include acts of domestic Bruce Hoffman who temporarily left the
terrorism, which it defines as ‘incidents RAND Corporation in 1993 to found the
perpetrated by local nationals against a CSTPV at St Andrew’s and who remains an
purely domestic target’ (RAND, 2007). honorary senior researcher there, and
Under both of these definitions, the Brian Jenkins, a senior analyst with RAND
assumption is that the perpetrators will who is also a member of the CSTPV’s
not be the state itself, but sub-national advisory council (Burnett and Whyte,
individuals or groups acting against 2005: 8). Individuals associated with the
foreign or local interests. This is a crucial CSTPV and RAND also retain key editorial
flaw. Explicitly excluded are acts of state positions in the two most prominent
terror committed by governments against English language journals in the field of
their own citizens or acts of violence in terrorism and political violence: Wilkinson
warlike situations, even though such acts as co-editor of Terrorism and Political
clearly fit Wilkinson’s definition. Violence; Hoffman and Jenkins as mem-
Terrorism is defined by the US State bers of its editorial Board and Hoffman as
Department’s Office of the Coordinator for editor-in-chief of Studies in Conflict and
230 european political science: 6 2007 bringing the state back into terrorism studies
Terrorism, a journal originally founded and Northern Irish men in 1972. These men
editorially managed by RAND (Burnett and were subjected to beatings with batons
Whyte, 2005: 9). Burnett and Whyte and kicking, often until they passed out;
correctly note that this means ‘peer re- hooding; stripping; sensory assault, in-
viewed publications are dominated by cluding being subject for a whole week to
academics connected with this nexus of constant noise at various levels of inten-
influence’, and while they are not in any sity; food, water and sleep deprivation,
way suggesting that the system of peer and prolonged stress positions (Conroy,
review is corrupt or less rigorous than it is 2001: 5–11). It can be argued that these
in other publications, ‘if we consider that counter-terrorism measures themselves
two of the key journals are dominated by constituted a form of state terrorism.
scholars from the RAND–St Andrew’s The French also made extensive use of
nexus, then this does say something about torture against large sectors of the Alger-
their ability to impose their influence upon ian population, both in Algeria itself by
the field’ (2005: 9). This may explain why police forces and in France (Vidal-Naquet,
there is so little scholarly literature pub- 1963: 4044). General Jacques Massu,
lished in the key journals that discusses Commander of the Tenth Parachute Divi-
the use of state terrorism by Northern sion responsible for policing in Algiers
democracies: it simply does not fit within from 1957, justified the use of torture
the established frame of reference of on the grounds that the circumstances
dominant scholarship on terrorism. demanded its use and military necessity
dictated it (Massu, 1997). The context of
NORTHERN DEMOCRACIES the counter-insurgency (CI) campaign
AND COMPLICITY IN saw French troops employing torture not
REPRESSION simply as a means to secure intelligence
about imminent threats to French forces,
Northern democracies have a long history although this was the justification used by
of complicity in repression, including Massu, but as an attempt to undermine
state terrorism, often through providing the morale of the leaders and supporters
military and financial support to highly of the Algerian insurgency. Used in
repressive governments or to terrorist this manner, torture is a tool of state
groups. For example, the US, Britain and terrorism.
Australia all backed Indonesia while it
engaged in widespread repression against US REPRESSION IN
the people of East Timor (Chomsky, CONTEXT
2000: 51–61). Similarly, in Northern
Ireland, British forces made extensive The primary aims of US foreign policy are
use of repression and torture and tacitly to maintain the dominant global position
supported acts of Loyalist violence. For a of the US and to ensure access to
long period, official British policy was to resources and markets in the South;
intern, without charge or trial, the sus- these priorities are enshrined most
pected members of paramilitary groups. openly in the Monroe doctrine, pro-
The British army also used torture as part nounced by US President James Monroe
of its interrogation of suspected Repub- in 1923, when he declared the US the
lican terrorists, as documented by protector of the nations of the Americas
Amnesty International (1972), which from European states, whose efforts to
concluded that the British government extend their territory could undermine
had violated national and international the security and the dominant position
law in relation to its treatment of fourteen of the US in the Western Hemisphere
ruth blakeley european political science: 6 2007 231
(see Perkins, 1927; Shoup and Minter, activities that would threaten US interests
1977). During the Cold War, US foreign (Blakeley, 2006). The forces trained
policy strategy was dominated by the use would thereby act as US allies in pursuit
of repression (see Blum, 2003; Blakeley, of US objectives.
2006). As Chomsky and Herman (1979) US involvement in state terrorism also
demonstrated in their study of US rela- included the use of torture as part of its CI
tions with the South, the US was organis- strategy during the war with Vietnam.
ing under its sponsorship a system of This occurred primarily through the Phoe-
allied states, which ruled their popula- nix Program that was intended to improve
tions primarily by terror. intelligence and wipe out what was known
US repression in the South has involved among the CIA as the Vietcong Infra-
orchestrating or backing coups, as in structure (VCI). Valentine’s (2000) defi-
Guatemala, Chile, Indonesia, Haiti and nitive account shows that Phoenix had the
elsewhere, and in direct military inter- effect not simply of destroying the VCI,
vention, such as in the Dominican Repub- but also of instilling terror among Vietna-
lic, Indochina, Panama and others (see mese civilians. Large numbers of civi-
Blum, 2003). One of the most significant lians, often not even members of the VCI
ways in which the US has been complicit but simply family members or neighbours
in repression in the South has been of suspected members, were killed in
through the provision of training for their sleep by US and South Vietnamese
military forces from the area, something military personnel:
that has had far-reaching consequences,
Phoenix was, among other things, an
not only in terms of human rights, but
instrument of counter-terror – the psy-
also in terms of the capacity of the
chological warfare tactic in which VCI
US to achieve its foreign policy objec-
members were brutally murdered along
tives. US military training of forces from
with their families or neighbours as a
the South since World War II has steadily
means of terrorising the neighbouring
increased and is now given to military
population into a state of submission.
personnel from over 150 countries each
Such horrendous acts were, for propa-
year. This has been most intense in Latin
ganda purposes, often made to look as
America: between 1950 and 1993, the US
if they had been committed by the
trained over 100,000 Latin American
enemy (Valentine, 2000: 13).
military and police personnel. A signifi-
cant reason for the training is that the US
As well as murder, torture was also
prefers local elites to carry out its objec-
widely practised, often at Province Inter-
tives in the South (Blakeley, 2006). This
rogation Centres (PICs). Some of the
was particularly the case following the
documented atrocities included:
failure of the US in the Vietnam War, after
which the American public had little sym- Rape, gang rape, rape using eels,
pathy for further US activities overseas snakes, or hard objects, and rape
(Klare, 1989: 97). As a consequence, followed by murder; electrical shock
during the Cold War the US provided (‘the Bell Telephone Hour’) rendered
covert military and intelligence assistance by attaching wires to the genitals or
to elites from many Latin American other sensitive parts of the body, like
states. Much of this involved support for the tongue; the ‘water treatment’; the
CI operations and CI training, which ‘airplane’, in which a prisoner’s arms
advocated repression, including torture, were tied behind the back and the rope
of anyone suspected of being involved in looped over a hook on the ceiling,
or considered likely to become involved in suspending the prisoner in midair, after
232 european political science: 6 2007 bringing the state back into terrorism studies
which he or she was beaten; beatings ‘ycritically oriented
with rubber hoses and whips; the
use of police dogs to maul prisoners
scholars need to reclaim
(Valentine, 2000: 85). the term ‘terrorism’ and
According to CIA officer William Colby,
use it as an analytical
who directed Phoenix between 1968 and tool, rather than a
May 1971, 20,587 alleged Vietcong political tool in the
cadres died as a result of Phoenix. The
South Vietnam government places the
service of elite power’.
number at 40,994. The true number will
never be known, neither will the number the ‘war on terror’. More specifically, by
of those killed under the programme’s reinforcing certain political assumptions
forerunners, operational from 1965 about what constitutes terrorism, they
(Blum, 2003: 324). reinforce the false notion that Northern
democracies, especially the US, simply
THE WAY FORWARD: act to uphold liberal values and protect
CRITICAL APPROACHES TO their populations from threats. In this
STATE VIOLENCE sense, the approach taken by many
terrorism studies scholars tends to serve
In this article, I have tried to show that particular national, sectional or class
two main factors have contributed to the interests, which, as Cox notes, are com-
silence on state terrorism by Northern fortable within the given order (Cox,
democracies from orthodox terrorism 1981: 129).
studies. The first relates to the theoretical For these reasons, critically oriented
framework of most terrorism scholarship scholars need to reclaim the term ‘terror-
and the way in which definitions of ism’ and use it as an analytical tool, rather
terrorism are applied in practice. Accept- than a political tool in the service of elite
ing an orthodoxy within IR that charac- power. There are several necessary steps
terises the foreign policies of Northern in this reclaiming process. First, as Cox
democracies as largely benign, terrorism notes, critical approaches need to chal-
is understood to mean activities by non- lenge institutions and approaches:
state actors, often located in the South,
against Northern democracies and their Critical theory does not take institutions
interests; state terrorism, when it is and social and power relations for
discussed, is assumed to constitute sup- granted but calls them into question
port for terrorists by ‘rogue’ states. The by concerning itself with their origins
reality is that Northern democracies have and how and whether they might be in
been responsible for widespread terror- the process of changing. It is directed
ism against populations in the South. The towards an appraisal of the very frame-
second reason lies in the institutional work for action, or problematic, which
affiliations of leading academic experts problem-solving theory accepts as its
who are frequently tied to the institutions parameters (Cox, 1981: 129).
of state power. The exclusion of state
terrorism from current usage of the term This article has questioned the domi-
‘terrorism’ means that terrorism studies nant interpretation of the foreign policies
scholars function to promote particular of the great powers – that it is benign
political agendas, such as those of the in character – and has analysed the
current US administration and its allies in actual practices of those states and their
ruth blakeley european political science: 6 2007 233
outcomes. This has been with the speci- must not focus solely on state terrorism
fic, normative aim of offering suggestions by Northern powers; this would itself lead
for the emancipation of people in the to a further biasing of the debate. While
South from the oppressive practices of the US was one of the greatest perpetra-
Northern powers. Normative approaches tors of state terrorism in Latin America
of this kind are necessary for two main during the Cold War, it did not act alone,
reasons. First, they enable us to over- collaborating instead with authoritarian
come certain biases in the field, including regimes which were themselves imple-
the selective application of terms such as menting state terror complexes before
‘terrorism’ that serves to fortify rather the provision of US support. In other
than confront illiberal practices. Second, words, the agency of other actors should
they help to diversify and broaden debate not be ignored. We can better understand
beyond the narrow parameters set by state terrorism when we examine the
the dominant, neo-realist and liberal collaborations that are established
approaches within IR. between elites across state boundaries.
It is also obvious that there is a pressing A number of issues present themselves
need to bring the state back into terrorism as areas in need of further examination as
studies. Because terrorism is a tactic and part of the project to integrate state
not an ideology, states of any kind can be terrorism into critical terrorism studies.
perpetrators of terrorism. Equally, the These include, among others: analysing
tactics that states use to combat terror- the relationships between state terrorism
ism can themselves resemble terrorism, and the use of torture; the nature of state
as the cases of British, US and French responses to terrorism, including coun-
counter-terror and CI efforts show. The ter-terrorism and CI operations; the role
field of terrorism studies therefore needs of state military forces and, given their
to reintegrate the state, as a potential recent growth and increased use by
instigator of terrorism, into the debate. states, private military companies, as
This does not simply mean examining the potential agents of state terrorism; and
role of the so-called ‘rogue’ states, but finally, the degree to which the curtail-
also that of states normally considered to ments of civil liberties in the ‘war on
be engaged in combating rather than terror’ may themselves run the risk of
perpetrating terrorism. Importantly, we constituting state terrorism.

References
Amnesty International. (1972) Report of an Inquiry into Allegations of Ill-Treatment in Northern Ireland,
London: Amnesty International.
Blakeley, R. (2006) ‘Still training to torture? US training of military forces from Latin America’, Third World
Quarterly 27(8): 1439–1461.
Blum, W. (2003) Killing Hope: US Military and CIA Interventions Since World War II, London: Zed Books.
Burnett, J and Whyte, D. (2005) ‘Embedded expertise and the new terrorism’, Journal for Crime, Conflict
and the Media 1(4): 1–18.
Chomsky, N. (1991) ‘International Terrorism: Image and Reality’, in A. George (ed.) Western State
Terrorism, Cambridge: Polity Press, pp. 12–38.
Chomsky, N. (2000) Rogue States, London: Pluto Press Ltd.
Chomsky, N. and Herman, E. (1979) The Washington Connection and Third World Fascism: The Political
Economy of Human Rights, Vol. I. Boston: South End Press.
Conroy, J. (2001) Unspeakable Acts, Ordinary People: The Dynamics of Torture, London: Vision
Paperbacks.
Cox, R. (1981) ‘Social forces, states and world orders: beyond international relations theory’, Millennium:
Journal of International Studies 10(2): 126–155.

234 european political science: 6 2007 bringing the state back into terrorism studies
George, A. (1991) Western State Terrorism, Cambridge: Polity Press.
Klare, M. (1989) ‘Subterranean alliances: America’s global proxy network’, Journal of International Affairs
43(1): 97–118.
Massu, J. (1997) La Vraie Bataille d’Alger, Paris: Editions du Rocher.
Perkins, D. (1927) The Monroe Doctrine 1823–1826, Vol. I. Gloucester, MA: Harvard University Press.
RAND. (2007) ‘RAND-MIPT Terrorism Knowledge Base, RAND Corporation (last updated April 2007),
http://www,tkb.org/RandSummary.jsp?page ¼ about.
Shoup, L. and Minter, W. (1977) Imperial Brain Trust: The Council on Foreign Relations and United States
Foreign Policy, New York: Monthly Review Press.
Valentine, D. (2000) The Phoenix Program, Lincoln: Authors Guild BackinPrint.com.
Vidal-Naquet, P. (1963) Torture: Cancer of Democracy, Middlesex: Penguin Books.
Wilkinson, P. (1992) ‘International Terrorism: New Risks to World Order’, in J. Baylis and N. Rengger
(eds.) Dilemmas of World Politics: International Issues in a Changing World, London: Clarendon Press,
pp. 228–257.

About the Author


Ruth Blakeley is Lecturer in International Relations at the University of Kent, Canterbury. She
has published articles on repression and state terrorism in Third World Quarterly and the
Review of International Studies (forthcoming). Her research interests include US foreign
policy, US–Latin American relations, state terrorism, political violence, torture and North–
South relations.

ruth blakeley european political science: 6 2007 235

You might also like