1-20 of 382 Search Results for

security state

Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Article
boundary 2 (2003) 30 (3): 19–27.
Published: 01 August 2003
...James Der Derian Duke University Press 2003 y 2 / 30:3 / sheet 23 of 252 6943 boundar Decoding The National Security Strategy of the United States of America...
Journal Article
boundary 2 (2015) 42 (1): 195–215.
Published: 01 February 2015
...Robert P. Marzec This essay situates the critical work of William V. Spanos in relation to the liminal event of anthropocentric planetary climate change—specifically the manner in which this event is being subordinated to military ends by the US national security state in particular and the global...
Journal Article
boundary 2 (2010) 37 (1): 215–238.
Published: 01 February 2010
... Vermeule's Terror in the Balance: Security, Liberty, and the Courts argues that far from it being the case that judicial oversight of government-imposed security measures should be heightened in states of emergency, on the contrary, it is precisely at such times that they should be given the broadest...
Journal Article
boundary 2 (2017) 44 (2): 241–256.
Published: 01 May 2017
... “Invisible Man” to “Three Days before the Shooting” ( New Haven, CT : Yale University Press , 2010 ). © 2017 by Duke University Press 2017 Ralph Ellison digital age American literature security state politics References Baker Jeff . 2010 . “Q&A with John Callahan...
Journal Article
boundary 2 (2017) 44 (3): 165–195.
Published: 01 August 2017
... sufficient to assess the state of American poetry, but historical research reveals an unsuspected and uncharted world. It would behoove those who take historicism seriously to reinvestigate the lost terrain of book-length poems, regional authors, so-called light verse, as well as mainstream figures whose...
Journal Article
boundary 2 (2014) 41 (1): 153–170.
Published: 01 February 2014
... of the direc- tors of these institutes are women.13 The synergy between the oil and gas trade and security services creates a hypermasculine, cynical, and misogy- nistic culture: petromachismo, as I prefer to call it. For Russia’s hyperextractive state, the population is superfluous. On Facebook...
Journal Article
boundary 2 (2003) 30 (3): 1–18.
Published: 01 August 2003
... strategies through which the Bush administration effected a shift in the nation’s governing self-representations—from a secured innocent nation to a wounded, insecure emergency state. At the conclusion of these remarks, I shall also...
Journal Article
boundary 2 (2006) 33 (3): 73–101.
Published: 01 August 2006
... as a historical turning point that brought about a change in the entire symbolic apparatus.This resulted in the inauguration of a sociopolitical compact that was crystallized in the phrase Homeland Security State. This compact required U.S. citizens to place the instinct for hatred and a compulsion toward...
Journal Article
boundary 2 (2010) 37 (2): 89–105.
Published: 01 May 2010
... Bush’s homeland security state with demands that he end state policies that vio- lated the United States Constitution—preemptive strikes, the opening of the detention center at Guantánamo Bay, unauthorized domestic surveil- lance—the Tea Party goers forged a Contract from America through which...
Journal Article
boundary 2 (2014) 41 (1): 229–231.
Published: 01 February 2014
... © 2014 by Duke University Press 2014 Books Received Amar, Paul. The Security Archipelago: Human-­Security States, Sexuality Politics, and the End of Neoliberalism. Durham, NC: Duke University Press, 2013. Anderson, Crystal S. Beyond the Chinese Connection: Contemporary Afro-Asian­...
Journal Article
boundary 2 (2005) 32 (3): 169–197.
Published: 01 August 2005
... this argument directly. His stated thesis is merely that ‘‘the Consti- tution applies in time of war, but the special demands of war may affect the application of the Constitution’’ (543). He here implies that subsequent con- stitutional review and eventual remorse for wartime internal security mea- sures...
Journal Article
boundary 2 (2002) 29 (2): 29–43.
Published: 01 May 2002
... that Martin’s house and property be destroyed and that Martin’s first son, Gabriel, be hanged as a spy. I have described Martin’s violence as state-preserving because his band of militia exercises the force necessary to sustain the survivability of the Continental Army, which was the security state apparatus...
Journal Article
boundary 2 (2020) 47 (1): 251–252.
Published: 01 February 2020
...) and They Must Be Represented: The Politics of Documentary (1994). She is currently work- ing on a project entitled Cold War Dads, on fathers and the national security state. Bruce Robbins is Old Dominion Foundation Professor of the Humanities at Colum- bia University. His latest books are The Beneficiary...
Journal Article
boundary 2 (2017) 44 (4): 141–154.
Published: 01 November 2017
..., the US government became a “committed affect theorist” to a degree that renders the 9/11 response very much a repetition of the “launch of the national security state in 1947” (Masco 2014: 5, 17). But there is a crucial difference, and one that Masco elides, because during the Cold War...
Journal Article
boundary 2 (2013) 40 (2): 239–241.
Published: 01 May 2013
..., 2012. Melley, Timothy. The Covert Sphere: Secrecy, Fiction, and the National Security State. Ithaca, NY: Cornell University Press, 2012. Milian, Claudia. Latining America: Black-Brown­ Passages and the Coloring of Latino/a Studies. Athens: University of Georgia Press, 2013. Morris, Meaghan...
Journal Article
boundary 2 (2006) 33 (1): 151–169.
Published: 01 February 2006
... states affords insufficient protection from attacks by gangs, which can now inflict the kind of damage only states fighting wars used to be able to achieve. In that sense, the course for Bush’s sec- ond term remains that of his first one: the restoration of security in a suddenly...
Journal Article
boundary 2 (2007) 34 (1): 115–133.
Published: 01 February 2007
... by Duke University Press 116  boundary 2  /  Spring 2007 by the United States, to be sure, hailing disparate countries from Korea to Australia and Chile into its motivated transnational mapping of region, place, and cultural identity. For APEC, Asia-Pacific Region means securing...
Journal Article
boundary 2 (2018) 45 (2): 221–242.
Published: 01 May 2018
... to withstand all the attacks that were directed against her in the Senate hearings on Benghazi, despite the fact that she was imagined to be responsible for the deaths of insecure and unsecured white males. The office—her office as President Obama’s secretary of state—that should have secured white...
Journal Article
boundary 2 (2006) 33 (3): 35–59.
Published: 01 August 2006
... that the current ascendant configuration of power is the security state, and that the only ‘‘trans-population’’ social existence the state will permit is the market. In that configuration, the effort of any population to constitute itself as a hypersocial entity, such as the umma, results in a violence...
Journal Article
boundary 2 (2000) 27 (2): 1–19.
Published: 01 May 2000
... powers of the national security state. He also described the crew as the internal limit to Ahab’s totalitarian governance. The crew held the place of the rule of law, and, as such, they were comparably empowered...