Abstract

The book provides insights on three levels. First, it examines how Al Qaeda and US narratives in the 1990s were of great importance to the formation of Al Qaeda as organisation, network and ideology. Second, it instructively details the analysis by contrasting narratives (ACN) methodology of identifying, analysing and contrasting relevant security-related macro and micro narratives. Third, it thereby fills a lacuna in intelligence studies by translating insights from discourse analysis, critical theory and security studies to enrich the practice of intelligence analysis and its study. In doing so it also contributes to ongoing debate on securitization in security studies. Rather than seeking to identify successful instances of securitization and their effects, securitization efforts in macro narratives are studied and adopted as conceptual lens. Critical micro narratives are added to highlight tensions and inconsistencies in macro narratives. This can lead to reconsider their consistency and hence the appropriateness of the level of analysis. How contested, divided or pragmatic was ‘Al Qaeda’? By comparing and contrasting narratives, engaging in reflexive ‘narrative net assessment’, the study of Al Qaeda and US narratives has revealed how defining an enemy and attempting to counter terrorist threats also contributed to the manifestation of the threat. In articulating other and self, and acting upon it, processes of identification among members and supporters of adversarial entities were strengthened.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.