{"title":"The jihadists are coming! Abyssal thinking and the spatial politics of un/knowing in Ghana’s terrorism discourse","authors":"Muhammad Dan Suleiman","doi":"10.1080/17539153.2023.2250142","DOIUrl":"https://doi.org/10.1080/17539153.2023.2250142","url":null,"abstract":"ABSTRACTCoastal West African countries are in a threat anticipatory anxiety mode: over the fear that subaltern violent “jihadist” groups (SVJGs) are breaching their borders and heading south from across the Sahel. In Ghana, this fear has led to a build-up of commentaries, political statements, and counter-extremism/counterterrorism programs. This article interrogates the terrorism discourse in this West African country at the intersection of critical security studies and the politics of space, by applying securitisation theory and critical discourse analysis. In what is the most comprehensive academic review of news articles on the terrorism discourse in Ghana yet, I contend that the discourse evokes what Boaventura de Sousa Santos calls ‘abyssal thinking’ and creates cognitive and physical spatial abyssal lines. On the invisible side, insecurity within Ghana gets “normalised” by the discourse. On the visible side, however, SVJGs are securitised as abnormal, foreign, and uniquely threatening. This nature of the discourse effectively places events and conditions in the country that are either terroristic or constitutive of terrorism on the invisible side of Ghana’s security priorities. The discourse, therefore, hides much about the reality of insecurity and political violence within the country. These arguments advance the frontiers of security/terrorism knowledge and practice in West Africa by demonstrating the pervasiveness of “global war on terror” systems of representation, two decades after their inception and despite its flaws and adverse implications for human and national security.KEYWORDS: Ghanaterrorismabyssal thinkingspatial politicssecuritisation theorySahel region AcknowledgmentsThe author expresses his gratitude to three anonymous reviewers for their useful suggestions and comments on an earlier version of this article.Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1. It remains essential to keep stressing that the usage of terms such as “jihadism” and “Islamism” (and others like “Salafism” “Salafi-jihadism”, and “Wahhabism”) remains speculative and prejudiced or, worse, cloaked in calculated ignorance. I use subaltern violent “jihadist” groups (SVJGs) instead, to bring some nuance and to avoid some of the problems associated with practices of un/naming. “jihadist” have been used, they must always be read as being in inverted commas.2. Some of these policies and frameworks are the Ghana National Security Strategy (Government of Ghana Citation2020), the National Framework for Preventing and Countering Violent Extremism and Terrorism in Ghana (NAFPCVET) (Government of Ghana Citation2019), and a Practitioners’ Guide on Preventing and Countering Violent Extremism (The Commonwealth and National Peace Council Citation2022). In 2017, Ghana hosted several West African countries leading to the Accra Initiative (AI), a West African sub-regional security mechanism to address common concerns. The AI has ","PeriodicalId":46483,"journal":{"name":"Critical Studies on Terrorism","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135959909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Foreign Fighters and International Peace: Joining Global Jihad and Marching Back Home","authors":"Simon Schwesig","doi":"10.1080/17539153.2023.2254608","DOIUrl":"https://doi.org/10.1080/17539153.2023.2254608","url":null,"abstract":"","PeriodicalId":46483,"journal":{"name":"Critical Studies on Terrorism","volume":"148 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73707521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Counter-terror by proxy: the Spanish State’s illicit war with ETA","authors":"Kathryn Loosemore","doi":"10.1080/17539153.2023.2251226","DOIUrl":"https://doi.org/10.1080/17539153.2023.2251226","url":null,"abstract":"","PeriodicalId":46483,"journal":{"name":"Critical Studies on Terrorism","volume":"140 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83422557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Jihacktivism: the Islamic State’s model of digital resistance","authors":"M. Maarouf","doi":"10.1080/17539153.2023.2243663","DOIUrl":"https://doi.org/10.1080/17539153.2023.2243663","url":null,"abstract":"ABSTRACT This study explores the main building blocks of participatory activism utilised by sympathisers of the Islamic State within their online media networks. The organisation has named this militant practice “media jihad” or militancy (munasara), which is built on the cultural patterns of traditional ground-based jihad. The practice involves transferring cultural values and war manoeuvres into the virtual ecosystem. The virtual tactics used by sympathisers are linked to the cultural norms of jihad, resulting in a combination of battlefield jihad values and digital resistance practices. The term “Jihacktivism” is introduced to describe this complex combinative Jihadist contention model promoted by the Islamic State. It is a digital resistance paradigm that decentralises the production and dissemination of the Islamic State’s propaganda and empowers sympathisers to contribute to the organisation’s communication of jihad. By doing so, sympathisers may foster a sense of solidarity and become more identified with the group’s cultural schemas and ideological beliefs.","PeriodicalId":46483,"journal":{"name":"Critical Studies on Terrorism","volume":"13 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2023-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80126402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Book review of UDR Declassified","authors":"Jonathan Arlow","doi":"10.1080/17539153.2023.2243665","DOIUrl":"https://doi.org/10.1080/17539153.2023.2243665","url":null,"abstract":"Click to increase image sizeClick to decrease image size Disclosure statementNo potential conflict of interest was reported by the author.Notes1. The RUC were the police force of Northern Ireland.","PeriodicalId":46483,"journal":{"name":"Critical Studies on Terrorism","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135016122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Book review of Women and the Lebanese civil war: Female fighters in Lebanese and Palestinian Militias,","authors":"Meredith Loken","doi":"10.1080/17539153.2023.2243664","DOIUrl":"https://doi.org/10.1080/17539153.2023.2243664","url":null,"abstract":"","PeriodicalId":46483,"journal":{"name":"Critical Studies on Terrorism","volume":"27 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2023-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86114960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"”Violence, Discourse, and Politics in China’s Uyghur Region: The Terroristization of Xinjiang”","authors":"Chi Zhang","doi":"10.1080/17539153.2023.2239006","DOIUrl":"https://doi.org/10.1080/17539153.2023.2239006","url":null,"abstract":"","PeriodicalId":46483,"journal":{"name":"Critical Studies on Terrorism","volume":"27 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2023-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76957646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"”The European Union as Global Counter-Terrorism Actor”","authors":"Johannes Müller","doi":"10.1080/17539153.2023.2239005","DOIUrl":"https://doi.org/10.1080/17539153.2023.2239005","url":null,"abstract":"","PeriodicalId":46483,"journal":{"name":"Critical Studies on Terrorism","volume":"43 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2023-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88212362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A review of Mali’s counterterrorism approach in the light of African Union interventions","authors":"Isaac Mensah","doi":"10.1080/17539153.2023.2229617","DOIUrl":"https://doi.org/10.1080/17539153.2023.2229617","url":null,"abstract":"ABSTRACT Terrorism is pervasive in Mali. The efforts by Mali to counter terrorism, however, have been inadequate. The lack of institutional capacity and the lack of a workable counterterrorism policy characterised by bad governance are identified as key inadequacies in the fight against terrorism in Mali. In view of these inadequacies, the article demonstrates the need for a continental approach to fight the threat of terrorism in Mali. But for the African Union (AU) to be effective in resolving the Malian impasse, its diplomatic, political, and military approaches have been discussed and critiqued. The article suggests the need to retool the security architecture of the AU – the African Peace and Security Architecture (APSA) – and particularly, to ensure the full operationalisation of the Common African Defence and Security Policy (CADSP) and the African Standby Force (ASF). Importantly, the AU must also have a counterterrorism fund dedicated to support the fight against terrorism in Mali and Africa as a whole.","PeriodicalId":46483,"journal":{"name":"Critical Studies on Terrorism","volume":"140 3 1","pages":"523 - 536"},"PeriodicalIF":1.2,"publicationDate":"2023-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90010712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}