Ruth Blakeley, Ph.D.
r.blakeley@sheffield.ac.uk
Full Professor
The University of Sheffield
Year of PhD: 2007
Phone: +44114 222 8377
Address: University of Sheffield
City: Sheffield, England
Country: United Kingdom
Ruth Blakeley joined the University of Sheffield in 2017 as Professor of Politics and International Relations.After completing an MSc and PhD in International Relations at the University of Bristol, her first post was as a lecturer in International Relations at the University of Kent. In 2015, she was promoted to Professor. She held several leadership positions at Kent, including Head of School of Politics and International Relations (2016), and Sub-Dean and Director of Graduate Studies for the Faculty of Social Sciences (2012-2015). She was appointed Director of the White Rose Social Sciences Doctoral Training Partnership at Sheffield from September 2017 to January 2020.Professor Blakeley is the Vice Chair of the British International Studies Association (BISA). She was lead Editor of the Review of International Studies from 2016 to 2020. She is a member of the editorial advisory boards for several journals. Professor Blakeley’s research and teaching focus on international security, terrorism and political violence, and human rights.
Research Interests
Human Rights
Conflict Processes & War
Political Violence
Terrorism
Research Methods & Research Design
Torture
Extraordinary Rendition
State Violence
Countries of Interest
United States
United Kingdom
My Research:
My research focuses on a range of issues across the areas of international security, terrorism and political violence, and the global governance of human rights. My interests include US power, imperialism, US and UK foreign policy, state violence and state terrorism, and torture. I am particularly interested in the relationship between the evolution of the international political economy and state violence. These interests lead me to frequently engage with questions on the potential of human rights norms and laws as vehicles for political and social change. My current research projects are: Rendition, Detention, and Torture in the War on Terror. Ruth is co-director (with Sam Raphael, University of Westminster) of The Rendition Project. This provides the most comprehensive analysis to date of the CIA’s Rendition, Detention and Interrogation programme. Funded by an Economic and Social Research Council (ESRC) grant, research findings are disseminated through an extensive and innovative project website (www.therenditionproject.org.uk) that houses the world’s only comprehensive database of flights known or suspected to have been involved in rendition. The aim now is to draw on this extensive empirical research on one of the most controversial state-led security programmes in the 21st century, to begin addressing pressing questions about the global governance of human rights.
While the UK's official position is that it neither uses nor condones torture or cruel, inhuman and degrading treatment (CIDT), it is now a matter of public and parliamentary record that UK security services and military personnel colluded in rendition, torture, and cruel, inhuman and degrading treatment, both as part of the CIA's Rendition, Detention and Interrogation (RDI) programme, at military detention facilities in Afghanistan and Iraq, and through involvement in the detention and interrogation of prisoners by allied security forces. This paper will explain why the government is falling short of its obligations under international law, and why considerable risks remain that UK intelligence and security services will continue to collude in torture and CIDT.
The conventional wisdom among US foreign policymakers is that drones enable precise strikes, and therefore limit collateral damage. In contrast, critics point out that many civilian casualties have ensued, and they variously cite poor intelligence and imprecision of the strikes as reasons for this. Critics have also raised concerns that the US and its allies are engaging in “lawfare” to legitimise violations of human rights law. As such, some have questioned whether academic engagement with the legal questions surrounding targeted killings amount to collusion with state attempts to legitimise human rights violations. This article will argue that by conceptualising the targeted killings programme as a form of state terrorism, we are better equipped to provide a critical analysis of the drones programme within the context of a long history of violence and terrorism which has underpinned the imperial and neo-imperial projects of the UK and US. The article will then argue that there are important similarities between the targeted killings programme, and previous UK and US counterinsurgency operations, including prior uses of air power, and operations involving the internment of terror suspects, and the targeting of specific individuals for interrogation and torture or disappearance. Common to these programmes is that they are forms of policing aimed at crushing rebellions, stifling disorder and constructing or maintaining particular political economies, through terror. Also common to these programmes are the attempts made either to conceal illicit actions, or in the event they are exposed, to shroud them in a veil of legitimacy. The article concludes by offering some brief reflections on why we should not abandon the quest to resolve the thorny legal questions around the targeted killings programme.
Despite long-standing allegations of UK involvement in prisoner abuse during counterterrorism operations as part of the US-led ‘war on terror’, a consistent narrative emanating from British government officials is that Britain neither uses, condones nor facilitates torture or other cruel, inhuman or degrading treatment and punishment. We argue that such denials are untenable. We have established beyond reasonable doubt that Britain has been deeply involved in post-9/11 prisoner abuse, and we can now provide the most detailed account to date of the depth of this involvement. We argue that it is possible to identify a peculiarly British approach to torture in the ‘war on terror’, which is particularly well-suited to sustaining a narrative of denial. To explain the nature of UK involvement, we argue that it can be best understood within the context of how law and sovereign power have come to operate during the ‘war on terror’. We turn here to the work of Judith Butler, and explore the role of Britain as a ‘petty sovereign’, operating under the state of exception established by the US executive. UK authorities have not themselves suspended the rule of law so overtly; indeed, they have repeatedly insisted on their commitment to it. Nevertheless, they have been able to construct a rhetorical, legal and policy ‘scaffold’ that has enabled them to demonstrate at least procedural adherence to human rights norms while, at the same time, allowing UK officials to acquiesce in the arbitrary exercise of sovereignty over individuals who are denied any access to appropriate representation or redress in compliance with the rule of law.
This paper explores how to conduct effective research into state complicity in human rights abuses. This type of research is challenging: the secretive nature of state violence presents considerable difficulties for the researcher, in terms of both access to evidence, and the safety and security of the researcher and victims. Recent developments in the methods and types of data available present new opportunities for strengthening research. Drawing on our own experience, specifically our work to map the CIA’s rendition, detention and interrogation programme, we aim to show how we have navigated the difficult terrain of human rights investigation. The paper begins by exploring a number of challenges involved. We then discuss recent developments in human rights investigation techniques, as well as the emerging body of critical scholarship that is beginning to shape this kind of work among practitioners and academics alike. We consider some of the imbalances of power that affect this type of research. We then demonstrate how we tried to embrace new opportunities, while being mindful of the risks involved and the limitations of what we can achieve. We close with some reflections on ways forward for this type of research.
We examine how the tracking of rendition aircraft has provided a much fuller understanding of the CIA's rendition, detention and interrogation programme. In particular, we show how this illuminated the role played by European states. Through various investigative methods, new rendition aircraft were identified, significant amounts of flight data were gathered, and data on all known and suspected rendition flights were collated into one public, searchable database. We show that examining logistical elements of covert programmes can prove fruitful for security and human rights research. Furthermore, we demonstrate the benefits of close academic–practitioner collaboration in the field of human rights.
This article demonstrates the significance of human rights for challenging state violence and terrorism. It is intended to enhance understanding of the concept of emancipation. Critical Security Studies has tended to focus on the individual as the agent of her/his own liberation. Yet many victims of oppression are not able to free themselves. Drawing on historical materialism, it is argued that collective agency on behalf of the oppressed has a necessary role to play in emancipatory politics. Emancipation is contingent on the capacity of specific agents, located socially and historically, to identify practices that might bring about change, structures that might be transformed, and appropriate agents that are in the best position to facilitate such change. This article shows how such collective social action has forced a reversal of some of the Bush administration's repressive policies, and has partially succeeded in curtailing the arbitrary use of US state power. This has been achieved through the national and international human rights architecture. Therefore, Marxian claims that human rights should be eschewed are mistaken, since they fail to acknowledge the emancipatory potential of human rights, the opportunities they provide for collective social action, and the role they can play in transformative social change.
The War on Terror has generated fierce debate on torture as a means of thwarting terrorist threats. The argument is polarized between those who take a utilitarian position and those who seek to uphold the absolute prohibition on torture. Within the utilitarian camp, there are those who argue that torture, while immoral, should be legalized for use in the fight against terrorism, so that it can be better controlled and regulated. This article will provide new insights through its analysis of the CIA Inspector General's 2004 Special Review of Counterterrorism, Detention and Interrogation Activities, declassified in 2009. This offers important evidence that counters the key assumptions of contemporary torture apologists. Specifically, the Inspector General's findings reinforce the argument that torture is not effective, that efforts to legalize its use under controlled conditions are futile, and that, even where torture is permitted by higher authorities, recriminations against the perpetrators are still likely to ensue. Furthermore, torture tends not to be aimed at thwarting imminent threats. Its use by the CIA in the War on Terror is no exception. In any case it has yielded little evidence that could not have been obtained through legitimate means.
I develop a framework to account for torture, which I argue should be understood with reference to international relations. I show that torture is intended as a tool to ensure the security, stability and legitimacy of elites, often transnationally, but there is often a disjuncture between its intended and actual outcomes. Despite dominant claims that torture is used to defeat security threats, most torture is intended to deter political opposition and secure legitimacy for elites. I conclude that torture should be renounced, both on moral grounds, and because it is not necessary for the functions it is intended to serve.
It is widely assumed that the School of the Americas (soa), a US training school for Latin American military forces, advocated repression during the Cold War. To demonstrate this, previous research has tended to focus on establishing correlations between training and specific human rights abuses by individuals trained at soa. A stronger case can be made through detailed analysis of soa training manuals within the context of US foreign policy towards the global South. Public protest led to soa's re-launch in 2001. Most protestors assume that this change was purely cosmetic. Based on extensive fieldwork, I argue that changes were genuine, and the School now has a commendable human rights programme. This is in contrast to most US military training, domestic and foreign, which remains secretive and devoid of adequate human rights instruction. The paper argues that a resurgence of support for repression since 9/11 undermines progress at the School.
CIA Torture Unredacted presents the findings from a four-year joint investigation by The Rendition Project and The Bureau of Investigative Journalism into the use of rendition, secret detention and torture by the CIA and its partners in the ‘War on Terror’. Between 2001 and 2009, the CIA established a global network of secret prisons (‘black sites’) for the purpose of detaining terrorism suspects, in secret and indefinitely, and interrogating them through the use of torture and other cruel, inhuman and degrading treatment. The abuses which took place were severe, sustained, and in clear violation of domestic and international law. The perpetrators have never been held to account. This report, combined with the other resources on our website, provides the most detailed public account to date of the CIA torture programme. We move significantly beyond the findings of past investigations, including those published in heavily-redacted form by the Senate Select Committee on Intelligence (SSCI) in December 2014. Our analysis has enabled us to build an unprecedented picture of the programme from the ground up. We are publishing here: A detailed profile of the prisoners held within the torture programme, including their nationalities; capture locations and dates; detention locations, dates and treatment; and fate and whereabouts afterwards; The identity of those prisoners held in the black sites in Thailand, Poland, Romania, Lithuania, Morocco, and Guantánamo Bay; A detailed reconstruction of the shifting geography of secret detention operations in Afghanistan; A granular account of the complex network of companies which provided aircraft to the CIA for rendition operations; Extensive documentary evidence relating to over 60 rendition circuits by these aircraft, which involved over 120 individual renditions; A detailed overview of complicity by a number of key states, including the United Kingdom and those which hosted the black sites. CIA Torture Unredacted stands as a comprehensive public account of one of the most disturbing elements of the ‘War on Terror’: a global programme of systematic disappearance and torture, carried out by the world’s most powerful liberal democratic states. In the face of continued obstruction and denial by the governments involved, which refuse to allow for a full accounting of the crimes which took place, we hope that this report will stand as a central reference point for all those who still seek redress and reparations for the victims of CIA torture, as well as some measure of the truth for us all.
This book explores the complicity of democratic states from the global North in state terrorism in the global South. It evaluates the relationship between the use of state terrorism by Northern liberal democracies and efforts by those states to further incorporate the South into the global political economy and to entrench neoliberalism. Most scholarship on terrorism tends to ignore state terrorism by Northern democracies, focusing instead on terrorist threats to Northern interests from illiberal actors. The book accounts for the absence of Northern state terrorism from terrorism studies, and provides a detailed conceptualisation of state terrorism in relation to other forms of state violence. The book explores state terrorism as used by European and early American imperialists to secure territory, to coerce slave and forced wage labour, and to defeat national liberation movements during the process of decolonisation. It examines the use of state terrorism by the US throughout the Cold War to defeat political movements that would threaten US elite interests. Finally, it assesses the practices of Northern liberal democratic states in the 'War on Terror' and shows that many Northern liberal democracies have been active in state terrorism, including through extraordinary rendition. This book will be of much interest to students of critical terrorism studies, security studies, South American politics, US foreign policy and IR in general.
Cookie Policy
About this Cookie Policy
This Cookie Policy is provided as an addition to this site's Privacy Notice and exists to explain what cookies are and how they are used on this site. Cookies are tiny text files that are stored within your web broswer or hard drive when you visit a website or web applicaiton. These cookies allow servers to deliver content tailored to individual users or understand user behavior.
Types of Cookies we use
This site employs two first-party cookies (served from us and by us that are essential for the site to operate) and two third-party cookies that deliver external services.
First-Party Cookies
We use a server-generated session cookie to remember you when you are logged in to the site. This is essential to making sure that your profile details are those that are updated when you log in to make changes. This also lets us know who is logging into the site and when.
This site also uses a cookie that is created by your browser to remember when you agree to the cookie notice popup. This cookie stores nothing but the word "true" if you have agreed to the terms and is deleted when you close your browser. This cookie's only function is to prevent the cookie notice from popping up every time you refresh the site's homepage.
Third-Party Cookies
This site uses Google Analytics to understand usage trends and server performance. We do not store variables which are personally-identifiable in Google Analytics like browser ids or IP addresses. Google's privacy policy can be found here. If you would prefer have your browser stop supplying information to Google Analytics, Google provides a browser extension to allow you to do so.
This site also uses cookies supplied by Twitter when the Twitter sidebar script is loaded on the homepage. Their cookie policy is available here. Third-party cookies from Twitter are only loaded on this site's homepage and only when you agree to the terms or click the Twitter logo in the navigation bar.
How to Disable Cookies Altogether
Information on how to disable cookies in your browser can be found here. Please keep in mind that disabling cookies will prevent the essential functions of most interactive websites and web applications, this site included.
Privacy Notice
This privacy notice discloses the privacy practices for (womenalsoknowstuff.com). This privacy notice applies solely to information collected by this website. It will notify you of the following:
Information Collection, Use, and Sharing
We are the sole owners of the information collected on this site. We only have access to/collect information that you voluntarily give us via completing your profile or from direct contact from you. We will not sell or rent this information to anyone. However, as you are voluntarily providing your information to a publicly searchable database, anyone using the site will be able to access your information in the directory. We will use your information to respond to you, regarding the reason you contacted us. We will not share your information with any third party outside of our organization. However, anything you enter into your directory profile is publicly searchable and available to anyone using the site. Unless you ask us not to, we may contact you via email in the future to tell you about changes to this privacy policy. Your Access to and Control Over Information You may opt out of any future contacts from us at any time. You can do the following at any time by logging into your account/profile or by contacting us via email.
Security
We take precautions to protect your information. When you submit information via the website, your information is protected both online and offline. Wherever we collect information (provided by you), such as professional information or account passwords, that information is encrypted and transmitted to us in a secure way. You can verify this by looking for a lock icon in the address bar and looking for "https" at the beginning of the address of the Web page. While we use encryption to protect sensitive information transmitted online, we also protect your information offline. We do not have access to your account password, as this information is encrypted and not available to any other site users or administrators. If you forget your password, you may request a password reset. If you feel that we are not abiding by this privacy policy, you should contact us immediately.
Contact Us
If you have any questions about this Privacy Notice, or need to contact us, we can be reached at .
Terms and Conditions
Last updated: August 04, 2019
Please read these Terms and Conditions ("Terms", "Terms and Conditions") carefully before using the http://womenalsoknowstuff.com website (the "Service") operated by Women Also Know Stuff ("us", "we", or "our"). Your access to and use of the Service is conditioned upon your acceptance of and compliance with these Terms. These Terms apply to all visitors, users and others who wish to access or use the Service. By accessing or using the Service you agree to be bound by these Terms. If you disagree with any part of the terms then you do not have permission to access the Service.
Content
Our Service allows you to post, link, store, share and otherwise make available certain information, text, graphics, videos, or other material ("Content"). You are responsible for the Content that you post on or through the Service, including its legality, reliability, and appropriateness. By posting Content on or through the Service, You represent and warrant that: (i) the Content is yours (you own it) and/or you have the right to use it and the right to grant us the rights and license as provided in these Terms, and (ii) that the posting of your Content on or through the Service does not violate the privacy rights, publicity rights, copyrights, contract rights or any other rights of any person or entity. We reserve the right to terminate the account of anyone found to be infringing on a copyright. You retain any and all of your rights to any Content you submit, post or display on or through the Service and you are responsible for protecting those rights. We take no responsibility and assume no liability for Content you or any third party posts on or through the Service. However, by posting Content using the Service you grant us the right and license to use, modify, publicly perform, publicly display, reproduce, and distribute such Content on and through the Service. You agree that this license includes the right for us to make your Content available to other users of the Service, who may also use your Content subject to these Terms. Women Also Know Stuff has the right but not the obligation to monitor and edit all Content provided by users. In addition, Content found on or through this Service are the property of Women Also Know Stuff or used with permission. You may not distribute, modify, transmit, reuse, download, repost, copy, or use said Content, whether in whole or in part, for commercial purposes or for personal gain, without express advance written permission from us.
Accounts
When you create an account with us, you guarantee that you are above the age of 18, are a woman in the academic field of Political Science, and that the information you provide us is accurate, complete, and current at all times. Inaccurate, incomplete, or obsolete information may result in the immediate termination of your account on the Service. You are responsible for maintaining the confidentiality of your account and password, including but not limited to the restriction of access to your computer and/or account. You agree to accept responsibility for any and all activities or actions that occur under your account and/or password, whether your password is with our Service or a third-party service. You must notify us immediately upon becoming aware of any breach of security or unauthorized use of your account.
Intellectual Property
The Service and its original content (excluding Content provided by users), features and functionality are and will remain the exclusive property of Women Also Know Stuff and its licensors. The Service is protected by copyright, trademark, and other laws of both the United States and foreign countries. Our trademarks and trade dress may not be used in connection with any product or service without the prior written consent of Women Also Know Stuff. Links To Other Web Sites Our Service may contain links to third party web sites or services that are not owned or controlled by Women Also Know Stuff Women Also Know Stuff has no control over, and assumes no responsibility for the content, privacy policies, or practices of any third party web sites or services. We do not warrant the offerings of any of these entities/individuals or their websites. You acknowledge and agree that Women Also Know Stuff shall not be responsible or liable, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods or services available on or through any such third party web sites or services. We strongly advise you to read the terms and conditions and privacy policies of any third party web sites or services that you visit.
Termination
We may terminate or suspend your account and bar access to the Service immediately, without prior notice or liability, under our sole discretion, for any reason whatsoever and without limitation, including but not limited to a breach of the Terms. If you wish to terminate your account, you may simply discontinue using the Service, or notify us that you wish to delete your account. All provisions of the Terms which by their nature should survive termination shall survive termination, including, without limitation, ownership provisions, warranty disclaimers, indemnity and limitations of liability.
Indemnification
You agree to defend, indemnify and hold harmless Women Also Know Stuff and its licensee and licensors, and their employees, contractors, agents, officers and directors, from and against any and all claims, damages, obligations, losses, liabilities, costs or debt, and expenses (including but not limited to attorney's fees), resulting from or arising out of a) your use and access of the Service, by you or any person using your account and password; b) a breach of these Terms, or c) Content posted on the Service.
Limitation Of Liability
In no event shall Women Also Know Stuff, nor its directors, employees, partners, agents, suppliers, or affiliates, be liable for any indirect, incidental, special, consequential or punitive damages, including without limitation, loss of profits, data, use, goodwill, or other intangible losses, resulting from (i) your access to or use of or inability to access or use the Service; (ii) any conduct or content of any third party on the Service; (iii) any content obtained from the Service; and (iv) unauthorized access, use or alteration of your transmissions or content, whether based on warranty, contract, tort (including negligence) or any other legal theory, whether or not we have been informed of the possibility of such damage, and even if a remedy set forth herein is found to have failed of its essential purpose.
Disclaimer
Your use of the Service is at your sole risk. The Service is provided on an "AS IS" and "AS AVAILABLE" basis. The Service is provided without warranties of any kind, whether express or implied, including, but not limited to, implied warranties of merchantability, fitness for a particular purpose, non-infringement or course of performance. Women Also Know Stuff, its subsidiaries, affiliates, and its licensors do not warrant that a) the Service will function uninterrupted, secure or available at any particular time or location; b) any errors or defects will be corrected; c) the Service is free of viruses or other harmful components; or d) the results of using the Service will meet your requirements.
Exclusions
Some jurisdictions do not allow the exclusion of certain warranties or the exclusion or limitation of liability for consequential or incidental damages, so the limitations above may not apply to you.
Governing Law
These Terms shall be governed and construed in accordance with the laws of the state of Arizona and the United States, without regard to its conflict of law provisions. Our failure to enforce any right or provision of these Terms will not be considered a waiver of those rights. If any provision of these Terms is held to be invalid or unenforceable by a court, the remaining provisions of these Terms will remain in effect. These Terms constitute the entire agreement between us regarding our Service, and supersede and replace any prior agreements we might have had between us regarding the Service.
Changes
We reserve the right, at our sole discretion, to modify or replace these Terms at any time. If a revision is material we will provide at least 30 days notice prior to any new terms taking effect. What constitutes a material change will be determined at our sole discretion. By continuing to access or use our Service after any revisions become effective, you agree to be bound by the revised terms. If you do not agree to the new terms, you are no longer authorized to use the Service.
Contact Us
If you have any questions about these Terms, please contact us at .