Skip Nav Destination
Close Modal
Search Results for
security state
Update search
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Subjects
Journal
Article Type
Date
Availability
1-20 of 391 Search Results for
security state
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
1
Sort by
Journal Article
boundary 2 (2003) 30 (3): 19–27.
Published: 01 August 2003
...James Der Derian Duke University Press 2003 y 2 / 30:3 / sheet 23 of 252
6943 boundar
Decoding The National Security Strategy of the
United States of America...
Journal Article
boundary 2 (2015) 42 (1): 195–215.
Published: 01 February 2015
...Robert P. Marzec This essay situates the critical work of William V. Spanos in relation to the liminal event of anthropocentric planetary climate change—specifically the manner in which this event is being subordinated to military ends by the US national security state in particular and the global...
Journal Article
boundary 2 (2010) 37 (1): 215–238.
Published: 01 February 2010
... Vermeule's Terror in the Balance: Security, Liberty, and the Courts argues that far from it being the case that judicial oversight of government-imposed security measures should be heightened in states of emergency, on the contrary, it is precisely at such times that they should be given the broadest...
Journal Article
boundary 2 (2017) 44 (2): 241–256.
Published: 01 May 2017
... “Invisible Man” to “Three Days before the Shooting” ( New Haven, CT : Yale University Press , 2010 ). © 2017 by Duke University Press 2017 Ralph Ellison digital age American literature security state politics References Baker Jeff . 2010 . “Q&A with John Callahan...
Journal Article
boundary 2 (2014) 41 (1): 153–170.
Published: 01 February 2014
... of the direc-
tors of these institutes are women.13 The synergy between the oil and gas
trade and security services creates a hypermasculine, cynical, and misogy-
nistic culture: petromachismo, as I prefer to call it.
For Russia’s hyperextractive state, the population is superfluous. On
Facebook...
Journal Article
boundary 2 (2017) 44 (3): 165–195.
Published: 01 August 2017
... sufficient to assess the state of American poetry, but historical research reveals an unsuspected and uncharted world. It would behoove those who take historicism seriously to reinvestigate the lost terrain of book-length poems, regional authors, so-called light verse, as well as mainstream figures whose...
Journal Article
boundary 2 (2003) 30 (3): 1–18.
Published: 01 August 2003
... strategies through which the Bush administration effected a shift in the
nation’s governing self-representations—from a secured innocent nation to
a wounded, insecure emergency state. At the conclusion of these remarks, I
shall also...
Journal Article
boundary 2 (2006) 33 (3): 73–101.
Published: 01 August 2006
... as a historical turning point that
brought about a change in the entire symbolic apparatus.This resulted in the
inauguration of a sociopolitical compact that was crystallized in the phrase
Homeland Security State. This compact required U.S. citizens to place the
instinct for hatred and a compulsion toward...
Journal Article
boundary 2 (2010) 37 (2): 89–105.
Published: 01 May 2010
... Bush’s
homeland security state with demands that he end state policies that vio-
lated the United States Constitution—preemptive strikes, the opening of
the detention center at Guantánamo Bay, unauthorized domestic surveil-
lance—the Tea Party goers forged a Contract from America through which...
Journal Article
boundary 2 (2014) 41 (1): 229–231.
Published: 01 February 2014
... © 2014 by Duke University Press 2014 Books Received
Amar, Paul. The Security Archipelago: Human-Security States, Sexuality Politics,
and the End of Neoliberalism. Durham, NC: Duke University Press, 2013.
Anderson, Crystal S. Beyond the Chinese Connection: Contemporary Afro-Asian...
Journal Article
boundary 2 (2005) 32 (3): 169–197.
Published: 01 August 2005
... this argument directly. His stated thesis is merely that ‘‘the Consti-
tution applies in time of war, but the special demands of war may affect the
application of the Constitution’’ (543). He here implies that subsequent con-
stitutional review and eventual remorse for wartime internal security mea-
sures...
Journal Article
boundary 2 (2020) 47 (1): 251–252.
Published: 01 February 2020
...) and They Must Be Represented: The Politics of Documentary (1994). She is currently work- ing on a project entitled Cold War Dads, on fathers and the national security state. Bruce Robbins is Old Dominion Foundation Professor of the Humanities at Colum- bia University. His latest books are The Beneficiary...
Journal Article
boundary 2 (2002) 29 (2): 29–43.
Published: 01 May 2002
... that Martin’s house and property be destroyed and that Martin’s
first son, Gabriel, be hanged as a spy. I have described Martin’s violence as
state-preserving because his band of militia exercises the force necessary
to sustain the survivability of the Continental Army, which was the security
state apparatus...
Journal Article
boundary 2 (2017) 44 (4): 141–154.
Published: 01 November 2017
..., the US government became a “committed affect theorist”
to a degree that renders the 9/11 response very much a repetition of the
“launch of the national security state in 1947” (Masco 2014: 5, 17). But
there is a crucial difference, and one that Masco elides, because during
the Cold War...
Journal Article
boundary 2 (2013) 40 (2): 239–241.
Published: 01 May 2013
..., 2012.
Melley, Timothy. The Covert Sphere: Secrecy, Fiction, and the National Security
State. Ithaca, NY: Cornell University Press, 2012.
Milian, Claudia. Latining America: Black-Brown Passages and the Coloring of
Latino/a Studies. Athens: University of Georgia Press, 2013.
Morris, Meaghan...
Journal Article
boundary 2 (2006) 33 (1): 151–169.
Published: 01 February 2006
... states affords insufficient protection from attacks by gangs,
which can now inflict the kind of damage only states fighting wars
used to be able to achieve. In that sense, the course for Bush’s sec-
ond term remains that of his first one: the restoration of security in a
suddenly...
Journal Article
boundary 2 (2007) 34 (1): 115–133.
Published: 01 February 2007
... by Duke University Press
116 boundary 2 / Spring 2007
by the United States, to be sure, hailing disparate countries from Korea
to Australia and Chile into its motivated transnational mapping of region,
place, and cultural identity. For APEC, Asia-Pacific Region means securing...
Journal Article
boundary 2 (2018) 45 (2): 221–242.
Published: 01 May 2018
... to withstand all the attacks that were directed
against her in the Senate hearings on Benghazi, despite the fact that she
was imagined to be responsible for the deaths of insecure and unsecured
white males. The office—her office as President Obama’s secretary of
state—that should have secured white...
Journal Article
boundary 2 (2006) 33 (3): 35–59.
Published: 01 August 2006
... that the
current ascendant configuration of power is the security state, and that the
only ‘‘trans-population’’ social existence the state will permit is the market.
In that configuration, the effort of any population to constitute itself as a
hypersocial entity, such as the umma, results in a violence...
Journal Article
boundary 2 (2000) 27 (2): 1–19.
Published: 01 May 2000
... powers of the
national security state. He also described the crew as the internal limit to
Ahab’s totalitarian governance. The crew held the place of the rule of law,
and, as such, they were comparably empowered...
1