1NC DA Dems will hold the Senate now—most accurate models Logiurato 9-17-14 (Brett, staff writer, "Meet The New Nate Silver" Business Insider) www.businessinsider.in/Meet-TheNew-Nate-Silver/articleshow/42727612.cms In 2012, as President Barack Obama fell behind in pre-election polls but not in election statistician Nate Silver's odds, this phrase quickly caught on: "Keep calm and trust Nate Silver!" This summer, Democrats have a new election guru to turn to for comfort: Sam Wang, a neuroscientist and professor at Princeton University who runs a model at Princeton's Election Consortium. Most of the 2014 election models - from The Washington Post, The New York Times, and from Silver, among others - have for a while projected Republicans not only furthering their grip on control of the House of Representatives, but also having a good chance of flipping Senate control as well. But Wang's model has been the most bullish for Democrats. His model has two forecasts: If the election were held today, Democrats would have an 80% chance of retaining control of the Senate. Predicting for Election Day, he estimates slightly less bullish 70% odds. He predicts that as of today, Senate Democrats and Independents that caucus with the party will make up 50 seats in the chamber, enabling them to keep control by the thinnest of margins. (In such a 50-50 situation, Vice President Joe Biden would cast the theoretical deciding vote.) On Tuesday, other models began shifting toward a better chance for Democratic control of the Senate. The Washington Post on Tuesday put Democrats' odds at 51%. The New York Times' new "Leo" model has control of the Senate at a 50-50 tossup. And Silver's site, FiveThirtyEight, has Republicans' chances slimming to about 53%. "My model is slightly more favorable because it relies on current polling conditions" as its main factor, Wang said in a recent interview with Business Insider. The differences between their models - and their differing predictions - has opened up a pseudo-rivalry between Wang and Silver in the lead-up to the midterm elections. During an interview with WNYC's Brian Lehrer last week, Silver claimed Wang's model uses "arbitrary assumptions," something Wang rejected as an "out-and-out falsehood." In a blog post on Tuesday, Wang playfully responded to a comment from Silver in which he said he'd like to "place a large wager against" Wang. He called Silver's forecast that day, which gave Republicans a 64% chance of swinging Senate control, into question, saying the "special sauce" (or formula) Silver uses for his model is "messy stuff." But the difference between Wang and Silver, Wang says, is substantive. It is predicated on the divide between the models - Wang's relies only on a reading of the latest polls, while Silver's model adds in the "fundamentals" of the race when making predictions. Those fundamentals vary by state. They can take into account fundraising, the liberal-conservative ideology of individual candidates, and national factors like presidential approval rating and the history of the president's party performing badly in the sixth year of his presidency, for example. "When he started in 2008, he brought lively commentary and the addition of econometric assumptions to predict the future," Wang told Business Insider of Silver. "He made the hobby fun for people to read about. All horse race commentators owe him a debt. "The difference between us is substantive. In most years, adding assumptions doesn't alter the picture too much: 2008, 2010, and 2012 were not hard prediction problems. However, this year's Senate race is as close as 2004, and giving an accurate picture of the race is challenging. Adding assumptions can bias an analyst's interpretation ." Nate Silver's model relies on more than just polls. Somewhat similar to Silver, Wang's interest in political prognostication grew out of the insatiable need to fuel what had been a hobby. He is the son of Taiwanese immigrants, grew up in California, graduated with a B.S. from the California Institute of Technology by the age of 19, and subsequently graduated with a PhD from Stanford. He began his model in 2004, when he was intensely following the presidential campaign that pitted President George W. Bush against Democrat John Kerry. In the constant horse-race mentality and the overreporting on single polls, he said, he saw an opportunity to contribute a new, more comprehensive and accurate element to the conversation. "I was motivated by the extreme closeness of the Kerry-Bush contest, and the news stories about single polls were driving me crazy," Wang told Business Insider. "I thought a simple way to summarize all the polls at once would improve the quality of coverage." Since then, his model has nearly nailed the result in every national election . In 2004, the model predicted Bush would grab 286 electoral votes to Kerry's 252. That was off by only a single electoral vote . (He made a personal prediction that turned out to be wrong.) The 2008 presidential election was similar - off by a single vote in each direction. The model only missed Nevada's Senate race in 2010, a race in which nearly every poll was off the mark. And the model in 2012 correctly predicted the vote in 49 of 50 states, the popular vote count of 51.1% to 48.9%, and 10 out of 10 tight Senate races - including Montana and South Dakota, which Silver missed. To Wang, it proves that a model that solely focuses on polls is a reliable indicator of eventual electoral outcomes. And he thinks models based on "fundamentals" like Silver's and like The New York Times' new model, dubbed "Leo," significantly alter the picture this year . "As of early September, both the New York Times's model 'Leo' and the FiveThirtyEight model exert a pull equivalent to adjusting Senate polls in key races by several percentage points. In other words, Republican candidates have slightly underperformed analyst expectations," Wang said. And this year, that could mean the expected Republican "wave" might never materialize. Wang sees Democratic candidates outperforming expectations all over the map. Plan hurts the dems—even if legalization is popular in general, it’s unpopular among LIKELY voters. New Republic, 10/24/13, “Marijuana is America's Next Political Wedge Issue” http://www.newrepublic.com/article/115334/marijuana-americas-next-great-political-wedge-issue To date, Democrats haven’t had many incentives to take a risk on the issue. Democrats are already winning the winnable culture war skirmishes , at least from a national electoral perspective, and they have a winning demographic hand. And let’s get perspective: Marijuana legalization may be increasingly popular, but it’s not clearly an electoral bonanza. Support for legalization isn’t very far above 50 percent, if it is in fact, and there are potential downsides. National surveys show that a third of Democrats still oppose marijuana legalization. Seniors, who turnout in high numbers in off year elections, are also opposed. Altogether, it’s very conceivable that there are more votes to be lost than won by supporting marijuana . After all, marijuana legalization underperformed President Obama in Washington State. A GOP senate destroys the Iran deal Julian Pecquet, journalist, “GOP Senate Takeover Could Kill Iran Deal,” THE HILL, 1—23—14, http://thehill.com/policy/international/196170-gop-senate-takeover-could-kill-iran-nuclear, accessed 5-31-14. A Republican takeover of the Senate this fall could scuttle one of President Obama’s biggest second term goals — a nuclear deal with Iran. Republicans have lambasted the interim agreement with Iran, calling for the Senate to move an Iran sanctions bill. The House last year passed a measure in an overwhelming and bipartisan 400-20 vote. Both the Obama administration and Iran have warned moving such a measure could kill a final deal. A number of Democrats have also criticized the interim accord, which lifted $6 billion in sanctions on Iran in exchange for a commitment to restrictions on enriching uranium. Critics in both parties say the deal gave away too much to Iran. Senate Majority Leader Harry Reid (D-Nev.) has given Obama cover by refusing to bring sanctions legislation to the floor. If Senate Minority Leader Mitch McConnell (R-Ky.) becomes majority leader, sanctions legislation could move quickly to the floor and could attract a veto-proof majority. “If Republicans held the majority, we would have voted already; with Democrats in charge, Harry Reid denies the American people the bipartisan diplomatic insurance policy they deserve,” a senior Republican Senate aide complained. The aide suggested Republicans would use the issue of Iran to show how a GOP-run Senate would differ with the status quo. “So the question really is, what kind of Senate would people rather have — one that puts politics over good policy, or one that holds Iran accountable and A total of 59 senators — 16 Democrats and every Republican save two — have co-sponsored the sanctions bill from Sens. Robert Menendez (D-N.J.) and Mark Kirk (R-Ill.). Republicans need to gain six seats to win back the majority, works overtime to prevent a world with Iranian nuclear weapons?” the aide asked. something within their grasp this year. The party is a solid favorite to pick up seats in West Virginia, South Dakota and Montana, and believes it could also secure wins in Alaska, Arkansas, Louisiana and North Carolina. Causes Israel strikes Perr 13 – B.A. in Political Science from Rutgers University; technology marketing consultant based in Portland, Oregon. Jon has long been active in Democratic politics and public policy as an organizer and advisor in California and Massachusetts. His past roles include field staffer for Gary Hart for President (1984), organizer of Silicon Valley tech executives backing President Clinton's call for national education standards (1997), recruiter of tech executives for Al Gore's and John Kerry's presidential campaigns, and co-coordinator of MassTech for Robert Reich (2002). 12/24 (Jon, “Senate sanctions bill could let Israel take U.S. to war against Iran” Daily Kos, http://www.dailykos.com/story/2013/12/24/1265184/-Senate-sanctions-bill-could-let-Israel-take-U-S-to-war-againstIran# As 2013 draws to close, the negotiations over the Iranian nuclear program have entered a delicate stage. But in 2014, the tensions will escalate dramatically as a bipartisan group of Senators brings a new Iran sanctions bill to the floor for a vote. As many others have warned, that promise of new measures against Tehran will almost certainly blow up the interim deal reached by the Obama administration and its UN/EU partners in Geneva. But Congress' highly unusual intervention into the President's domain of foreign policy doesn't just make the prospect of an American conflict with Iran more likely. As it turns out, the Nuclear Weapon Free Iran Act essentially empowers Israel to decide whether the United States will go to war against Tehran. On their own, the tough new sanctions imposed automatically if a final deal isn't completed in six months pose a daunting enough challenge for President Obama and Secretary of State Kerry. But it is the legislation's commitment to support an Israeli preventive strike against Iranian nuclear facilities that almost ensures the U.S. and Iran will come to blows. As Section 2b, part 5 of the draft mandates: If the Government of Israel is compelled to take military action in legitimate self-defense against Iran's nuclear weapon program, the United States Government should stand with Israel and provide, in accordance with the law of the United States and the constitutional responsibility of Congress to authorize the use of military force, diplomatic, military, and economic support to the Government of Israel in its defense of its territory, people, and existence. Now, the legislation being pushed by Senators Mark Kirk (R-IL), Chuck Schumer (D-NY) and Robert Menendez (D-NJ) does not automatically give the President an authorization to use force should Israel attack the Iranians. (The draft language above explicitly states that the U.S. government must act "in accordance with the law of the United States and the constitutional responsibility of Congress to authorize the use of military force.") But there should be little doubt that an AUMF would be forthcoming from Congressmen on both sides of the aisle. As Lindsey Graham, who with Menendez co-sponsored a similar, non-binding "stand with Israel" resolution in March told a Christians United for Israel (CUFI) conference in July: "If nothing changes in Iran, come September, October, I will present a resolution that will authorize the use of military force to prevent Iran from developing a nuclear bomb." Graham would have plenty of company from the hardest of hard liners in his party. In August 2012, Romney national security adviser and pardoned Iran-Contra architect Elliott Abrams called for a war authorization in the pages of the Weekly Standard. And just two weeks ago, Norman Podhoretz used his Wall Street Journal op-ed to urge the Obama administration to "strike Iran now" to avoid "the nuclear war sure to come." But at the end of the day, the lack of an explicit AUMF in the Nuclear Weapon Free Iran Act doesn't mean its supporters aren't giving Prime Minister Benjamin Netanyahu de facto carte blanche to hit Iranian nuclear facilities. The ensuing Iranian retaliation against to Israeli and American interests would almost certainly trigger the commitment of U.S. forces anyway. Even if the Israelis alone launched a strike against Iran's atomic sites, Tehran will almost certainly hit back against U.S. targets in the Straits of Hormuz, in the region, possibly in Europe and even potentially in the American homeland. Israel would face certain retaliation from Hezbollah rockets launched from Lebanon and Hamas missiles raining down from Gaza. That's why former Bush Defense Secretary Bob Gates and CIA head Michael Hayden raising the alarms about the "disastrous" impact of the supposedly surgical strikes against the Ayatollah's nuclear infrastructure. As the New York Times reported in March 2012, "A classified war simulation held this month to assess the repercussions of an forecasts that the strike would Israeli attack on Iran lead to a wider regional war , which could draw in the United States and leave hundreds of Americans dead, according to American officials." And that September, a bipartisan group of U.S. foreign policy leaders including Brent Scowcroft, retired Admiral William Fallon, former Republican Senator (now Obama Pentagon chief) Chuck Hagel, retired General Anthony Zinni and former Ambassador Thomas Pickering concluded that American attacks with the objective of "ensuring that Iran never acquires a nuclear bomb" would "need to conduct a significantly expanded air and sea war over a prolonged period of time, likely several years." (Accomplishing regime change, the authors noted, would mean an occupation of Iran requiring a "commitment of resources and personnel greater than what the U.S. has expended over the past 10 years in the Iraq and Afghanistan wars combined.") The anticipated blowback? Serious costs to U.S. interests would also be felt over the longer term, we believe, with problematic consequences for global and regional stability, including economic stability. A dynamic of escalation , action, and counteraction could produce serious unintended consequences that would significantly increase all of these costs and lead, potentially, to all-out regional war. Escalates to major power war Trabanco 9 – Independent researcher of geopoltical and military affairs (1/13/09, José Miguel Alonso Trabanco, “The Middle Eastern Powder Keg Can Explode at anytime,” **http://www.globalresearch.ca/index.php?context=va&aid=11762**) In case of an Israeli and/or American attack against Iran, Ahmadinejad's government will certainly respond. A possible countermeasure would be to fire Persian ballistic missiles against Israel and maybe even against American military bases in the regions. Teheran will unquestionably resort to its proxies like Hamas or Hezbollah (or even some of its Shiite allies it has in Lebanon or Saudi Arabia) to carry out attacks against Israel, America and their allies, effectively setting in flames a large portion of the Middle East. The ultimate weapon at Iranian disposal is to block the Strait of Hormuz. If such chokepoint is indeed asphyxiated, that would dramatically increase the price of oil, this a very threatening retaliation because it will bring intense financial and economic havoc upon the West, which is already facing significant trouble in those respects. In short, the necessary conditions for a major war of control in the Middle East and thus a relatively minor clash could are given . Such conflict could rapidly spiral out quickly and dangerously escalate by engulfing the whole region and perhaps even beyond. There are many key players: the Israelis, the Palestinians, the Arabs, the Persians and their respective allies and some great powers could become involved in one way or another (America, Russia, Europe, China). Therefore, any miscalculation by any of the main protagonists can trigger something no one can stop. Taking into consideration that the stakes are too high, perhaps it is not wise to be playing with fire right in the middle of a powder keg. CP Text: Nearly all states of the United States should institute ballot initiatives in the 2014 elections to legalize marijuana. Counterplan solves the aff – ballot initiatives for legalization will be approved Andrea Billups, staffwriter for News Max, 5/6/14, “Marijuana Initiatives Could Bump Youth Vote, Help Democrats” http://www.newsmax.com/Newsfront/marijuana-youth-vote-Florida-election/2014/05/06/id/569803/ As for changes in public opinion, Walker says it is only a matter of time before full legalization occurs, noting that one recent poll found that 75 percent of Americans think that it is "inevitable." Differences in support are marked between seniors who oppose it in high numbers and younger voters, who support it overwhelmingly. "The success of marijuana reform has often been driven by going to the ballot ," he has been the modus operandi of the reform movement . I think we are going to see this play out big time over the next two elections" in 2014 and 2016. said. " That Counterplan solvency doesn’t prove their link turns – even if legalization is popular, it isn’t important enough to make people vote FOR Democrats. The counterplan incentivizes people who aren’t voting now but agree with Democrats on most issues to come out in order to ensure that pot is legalized. Waldman ‘14 (Paul Waldman, contributing editor for The American Prospect, 4/7/14, “What Marijuana Legalization Won't Be in 2016” http://prospect.org/article/what-marijuana-legalization-wont-be-2016) *gender modified And with the rapid movement of public opinion in favor of legalization, it would be easy to predict that politicians are going to be changing their positions very soon, or as the Atlantic puts it in an article today, "Weed Is the Sleeper Issue of 2016." OK, so we can put that headline down to an overzealous editor; the article itself, which runs through the positions of a number of potential presidential candidates, shows that none of them have actually changed their minds. (And a note of warning: if you see a reference to Rick Perry and "decriminalization," don't be confused. Though he has used the word himself out of what may be confusion, what heactually wants is for the cops to arrest you for possession and then send you to rehab instead of to jail. Which is better than going to jail, but not as good as just not being arrested in the first place.) There's no question that the political profile of this issue is changing fast. But I doubt we're going to see much change from presidential candidates about it. This is where the analogy with same-sex marriage doesn't hold. As we all know, public opinion on marriage equality shifted rapidly, and politicians shifted in response. In 2008, for instance, all the contending Democratic presidential candidate supported civil unions, but none supported full marriage rights. In the next presidential primary, all the Democrats will support marriage equality, and most if not all of the Republicans will probably be in favor of some form of civil unions. Public opinion on marijuana legalization is very similar to that of marriage equality, both in the pattern of change and the correlation with age. Here are two graphs from the Pew Research Center that make it clear: Just looking at that, you might predict that Democratic politicians would already be stampeding over each other to come out for legalization. But the ones with national ambitions aren't yet, and they may not for some time. The reason is that neither they nor voters see pot as nearly the kind of profound moral question that marriage equality is. Putting aside for the moment the awful consequences of the drug war, what we're mostly talking about when we talk about full legalization is whether people can use pot recreationally without breaking the law, which is great for those who enjoy it, but doesn't rise to a question of their fundamental dignity as human beings. So it's hard to see cannabis legalization becoming a non-negotiable litmus-test issue for Democrats in the way marriage equality has become. A Democrat today who doesn't support marriage equality will be told that he (they) has (have) fundamentally different values from liberal voters. A Democrat who doesn't support legalization? Well, he may be out step a bit, or behind the times, or cowardly for worrying he'll be called soft on crime, or a general stick-in-the-mud. But not too many people are going to say that he (they) can't honestly call himself (themselves) a liberal. That might change if the Colorado and Washington experiments are successful and legalization spreads to other states. And legalization might still be a powerful tool to get young voters to the polls wherever it gets put on the ballot. But I think we'll have to wait an election or two before the effects rise all the way up to the presidential candidates. Marijuana ballot initiatives can help Democrats keep the Senate – empirics prove voter turnout increases when pot is on the ballot, and these voters will vote for Democrats Werleman ‘14 (CJ Werleman, staffwriter for San Diego Free Press and US political and social commentator and author of “Crucifying America,” 2/23/14, “Why Surging Support for Marijuana Is Hurting the GOP and Will For Years to Come” http://sandiegofreepress.org/2014/02/why-surging-support-for-marijuana-is-hurting-the-gop-and-will-for-years-tocome/#.U_T9z7xdXpY) With Republicans likely to remain opposed, marijuana could emerge as a big cultural wedge issue winner in both the 2014 and 2016 elections. The GOP holds a majority in the House of Congress and is threatening in the Senate come November, but in state elections, marijuana on the ballot has big potential to harm Republican candidates . In January, the Florida Supreme Court approved a proposed constitutional amendment that would legalize medical marijuana, assuring that the initiative will appear on the state’s November ballot. The referendum on pot may, in turn, determine the winner of the state’s gubernatorial race. According to the most recentQuinnipiac University poll, 70 percent of Floridians favor medical marijuana, which augers well for Democratic challenger Charlie Christ, given Gov. Rick Scott opposes the bill. There is considerable evidence that vote turnout rises when pot is on the ballot, especially for young voters who would naturally favor a candidate who supports it. K Discourse of a terrorist threat locks in violence and ensures a self-fulfilling prophecy Jackson 7 (Volume 42, Issue 3, Pages 394-426 Published Online: 21 Jun 2007, Constructing Enemies: 'Islamic Terrorism' in Political and Academic Discourse Richard Jackson) In this case, for example, it can be argued that by denying the rational-political demands of insurgent groups, demonizing them as fanatics and essentializing them as violent, irrational, savage and fanatical, the 'Islamic terrorism discourse normalizes and legitimizes a restricted set of coercive and punitive counter-terrorism strategies, whilst simultaneously making non-violent alternatives such as dialogue, compromise and reform appear inconceivable and nonsensical. This understanding of discourse further draws our attention to the ways in which discourse can be deployed as a political technology in the hegemonic projects of various agents, such as state elites. In this case, it is possible to describe a number of means by which the 'Islamic terrorism' discourse functions to reify and expand the hegemonic power of particular states. For example, by locating the source of contemporary terrorism in religious extremism, the discourse works to deny and obscure its political origins and the possibility that it is a response to specific Western policies. That is, by assigning non-rational, cosmic aims to violent groups, the discourse depoliticizes, decontextualizes and de-historicizes the grievances and political struggles of groups and societies, thereby de-linking the motives of the terrorists from the policies of Western states or their allies. Such socially constructed 'knowledge' of 'Islamic terrorism' thus facilitates or enables the uninterrupted exercise of US and British power in the international sphere by obviating the need for policy reappraisal . At the same time, it functions directly as a powerful discursive tool designed to de-invest insurgent groups of any political authority or wider social-cultural legitimacy they may have, in large part by appealing to the secular prejudice of Western societies.104 More prosaically, it can be seen that many of the policies made possible by the discourse also function directly to extend and consolidate state power, and provide direct material and discursive benefits to elements of the national security sector. For example, intrusive surveillance, expanded police powers, control orders, theregulation of public speech, investigations of charities and the like, can and have been used to limit political dissent, strengthen state security institutions and bring previously unregulated social arenas like charities and religious activities under greater state control. Linked to this, the analysis of public discourse by politicians clearly demonstrates that elites in the USA and Britain frequently deploy the discourse of 'Islamic terrorism' to legitimize or 'sell' a range of international and domestic political projects, including: regime change in states like Afghanistan and Iraq; the expansion of a military presence to new regions such as Central Asia; the control of strategic resources like oil; increased military and political support for allies in strategic regions like the Horn of Africa and Central America; increased resources and power for the military establishment; the construction of domestic and international surveillance systems; the control of international institutions and processes; and more broadly, the preservation and extension of a Western-dominated liberal international order. The frequency of narratives of 'Islamic terrorism' in contemporary political speeches suggests that, following earlier patterns,105 the discourse is being used in a deliberative fashion as a political technology. Beyond exposing the ideological functions of the discourse, another purpose of second-order critique is to examine the ethical normative consequences of the discourse. In this case, it is suggested that the 'Islamic terrorism' discourse is proving harmful to community relations, public morality and the search for effective, proportionate and legitimate responses to terrorist acts. First, given the way the Western self has been constructed in opposition to the Islamic other, and given the negative subject positioning and predication within the discourse, the evidence of rising tensions between and within local, national and global communities does not seem at all surprising. A recent survey of global opinion found that many Westerners see Muslims as fanatical, violent and intolerant, while many Muslims have an aggrieved view of the West.106 There is also evidence of increasing levels of Islamophobia across the European Union107 and increases in faith-hate crime in Britain and elsewhere.108 It seems reasonable to assume that this situation is at least in part due to the ubiquitous public discourse that identifies Islam and Muslims as a source of terrorism, extremism and threat. Related to this, it is possible to detect an erosion of public morality in polling data that shows that significant proportions of the public in many Western countries, but most notably in the United States, now agree that torturing terrorist suspects is justified in some circumstances.109 It can also be seen in the absence of public concern or outrage at the public evidence of torture and abuse, the muted response to human rights abuses committed by the security forces during counter-terrorism operations and the ongoing and very serious public debate by academics, officials and journalists about the necessity and ethics of torture and other human rights abuses against terrorist suspects. This erosion of public morality is, I would suggest, directly linked to the social and political construction of a pervasive discourse of threatening, murderous, fanatical 'Islamic terrorists' who must be eradicated in the name of national security.110 At a more practical level, it can also be argued that the 'Islamic terrorism' discourse is proving to be counter-productive in its effects on the broader counter-terrorism campaign of the war on terrorism. For example, it seems obvious that the discourse assists certain militant groups in promoting their message that there is a fundamental conflict between Islam and the West ; in this sense, the language works to co-constitute the very threat it purports to counter . In addition , narratives of fanatical, murderous, suicidal 'Islamic terrorists' functions to amplify rather than allay the social fear generated by terrorist actions because it reinforces the perception that the attackers are inhuman killing machines who cannot be deterred or reasoned with . In terms of foreign policy, the construction of a global Islamic threat can contribute to support for governments who actively suppress popular Islamic movements or cancel elections, thus creating a self-fulfilling prophecy in which imprisoned, tortured and harassed activists decide that the use of violence is their only recourse .111 More broadly, there seems little doubt that Western counter-terrorism policies, based in large part on the productive categories of the 'Islamic terrorism' discourse, are at least partly responsible for intensifying cycles of violence and instability . That is, the Iraq invasion, the destruction of Falluja, the Abu Ghraib abuses, the Guantanamo prison camp, the practice of extraordinary rendition and public support for Israel's war against Lebanon – among others – are helping to construct further political grievances that could provide the justification for further acts of terrorism. In part, these patently self-defeating policies persist because the discourse restricts and constructs the legitimate 'knowledge' that is allowed to inform policy debate whilst simultaneously establishing the parameters of legitimate action . Security discourse is constructed and shapes policy- root cause of war, causes dehumanization and extermination Talbot 8 ( 'Us' and 'Them': Terrorism, Conflict and (O)ther Discursive Formations by Steven Talbot Defence Science and Technology Organisation Sociological Research Online, Volume 13, Issue 1Published: 21/3/2008 As a point of departure, this paper aims to explore the significance of identity1formation and negotiation as it pertains to various representations of terrorism. Particularly, this paper examines the ways in which adversarial identities are socially constructed according to notions of difference which simultaneously encourages a comparison to, and rejection of, [O]thers. Drawing upon the notion of the Other, this paper examines some of the ways in which identity is constructed through a variety of social and historical processes, and articulated within a range of discourses evoking different and often mutually exclusive combinations of sameness and difference. Using a social constructionist lens, I argue that representations of terrorism are constructed from within specific discourses which accentuate difference. My analysis therefore positions identity formation within a dynamic and relational context where discursive representation, ways of knowing, power and language intertwine. 1.4 Consequently, the following discussion explores identity formation and terrorism through an interpretive, constitutive and discursive lens. I start my discussion with an overview of the socially constructed or constituted nature of identity. This is followed by an exploration of the roles various discursive frameworks play in shaping representations of identity. I then examine some of the implications for viewing terrorism and identities within dichotomous frameworks, particularly within notions of Self and Other, and consequently, the discursive practice of ‘Othering.’ Finally, I interrogate the relational and discursive context of identity further by exploring the relationship between the above theoretical concerns as they pertain to polarised collective identities and intractable conflicts. Socially constituted identities 2.1 Identity construction pertains to the creation, maintenance and articulation of social identities by individuals or groups. Rummens (2001), draws a distinction between personal and social identities. Personal identity usually refers to the result of an identification of self, by self, or in other words the self-identification on the part of the individual. Social identity in contrast refers to the outcome of an identification of self by others, or the identity that is assigned an individual by another (p.3). Both of these concepts differ from self-identity, the individual self which is reflexively understood and worked upon by the individual through selfmonitoring and self reflection (Beck, 1992; Giddens, 1991). 2.2 Sociological research into identity tends to focus on issues concerning the ascribed nature of identity, and the social construction and negotiation of group differences, whereas psychological approaches are more inclined to look at identity development and formation within the individual (i.e. identity searching, self concept and identity crisis). However it is important to r emember that identities are not just ascribed or ‘achieved’ through socialisation processes, but are also socially constructed and negotiated between social actors. Through a sociological lens, identities by definition are socially constituted phenomena. I n this sense, an individual’s or group’s identity is created, negotiated, and actively recreated through interaction with others. Identity can therefore be viewed as being a verb – it is something that one does, or is accomplished through social interaction (West and Zimmerman, 1987). 2.3 Identity underscores how humans organise and therefore understand their social world. The notion of collective identity has been examined i n classic sociological constructs like Marx’s (1977) ‘class consciousness,’ Durkheim’s (1960) ‘collective conscience’ and Weber’s (1922) Verstehen (meaningful understanding). The commonality between these works is found in their emphasis on shared attributes, similarities, or the ‘We-ness’ of groups (Cerulo, 1997, p.386). Thus, the construction of group identities often involves a normative component, or in other words, individuals need to be able to recognise themselves in certain qualities, characteristic or behaviours associated with their group (Schulte-Tenckhoff, 2001, p.6). This recognition of ‘we-ness’ is important given the origins of the term identity. Identity finds its linguistic roots in the Latin noun identitas, with titas being a derivation of the Latin adjective idem meaning the same. Thus, the term is comparative in nature in relation to sharing a degree of sameness with others (Rummens, 2001, p.3). Identity is therefore a relational construct, or as Connolly astutely asserts, ‘[t]here is no identity without difference’ (1995, p.xx). 2.4 More significantly, identity constructions often emerge in response to the types of political systems governing that society. Political systems are extensions of societal identity. For example, liberal democracy is a political structure that forms and reflects a part of a societal identity construction in that it proscribes certain ideals and practices which inform members of liberal democratic societies how to live together and treat , the pursuit of political goals is also linked to the pursuit of identity (superpower identities inform superpower interests). Consequently, a political system can also be viewed as a source of threat to societal identity (Hughes, others. In turn 2004, p.26). As Hughes observes, for those societies who draw their identity from non-liberal democratic (Western) traditions, the liberal democratic structure, and the values contained within this structure, may be perceived as a threat to group identity. The rhetoric of Osama Bin Laden is an example of this, with its emphasis on acts of violence against the Western, liberal democratic influences and their perceived threat to Islamic identity. 2.5 Political structures and associated organising principles exert influence on political agendas, policy and collective self-definition. Moreover, political elites create, manipulate and dismantle identities of nations and thus shape the subsequent construction of allies and enemies (Corse, 1996; Gillis, 1994; Zerubavel, 1995 cited in Cerulo, 1997 p.390). Identity shifts can therefore also occur based on changing socio-political factors, for example, as a result of changing policy, increased ethnic politics, and political activism. Constructivists would contend that identities, norms, and culture play an integral role for understanding world politics (and related policy) and international relations, particularly with its emphasis on those processes through which behaviour and identity construction is conceptualised and legitimated by various political agencies. The roles knowledge construction and discourse plays in facilitating this process will be explored in the following discussion. Discourse and identity 3.1 Cultural constructions of identity are shaped by ‘a series of specific dialogues, impositions, and inventions’ (Clifford, 2004, p.14). Such a position invariably requires a closer examination of the relationship between identity Hall, a discourse: ‘defines and produces the objects of our knowledge. It governs the way that a topic can be meaningfully talked construction, language, power, knowledge creation and associated discursive practices. 3.2 For about and reasoned about. It also influences how ideas are put into practice and used to regulate the conduct of others’ (1997, p.44). 3.3 The same discourse (which characterises a way of thinking or the given state of knowledge at one time) can appear throughout a range of texts, across numerous sites. When these discursive events refer to the same object, say terrorism for example, and share a similar style and support a strategy, they are said to belong to the It is through these discursive formations that things/practices acquire their meaning. However, discursive representation is not a benign practice , for it same discursive formation (Hall, 1997, p.44). is often those in positions of power and authority who are able to construct ‘reality’ and thus knowledge itself. As Klein (1994) explains: ‘[a] discourse, then, is not a way of learning ‘about’ something out there in the ‘real world’; it is rather a way of producing that something as real, as identifiable, classifiable, knowable, and therefore, meaningful. Discourse creates the conditions of knowing’ (cited in George, 1994, p.30). 3.4 Foucault Moreover, Foucault argues that knowledge (when linked to power) assumes the authority of ‘the truth’ contends that knowledge is a form of power, and that power is present or exercised within decisions regarding what circumstances knowledge is applied or not. and has the power to make itself true through a variety of regulatory and disciplining practices (Hall, 1997, p.49). Knowledge (ways of knowing about others through discursive representations) therefore is constructed by humans through their interactions with the world around them and is a reflection of existing social, historical and political factors, and as such, is never neutral. 3.5 In his analysis of the socially constructed nature of knowledge, Foucault explores the production of knowledge through discourse, and particularly how knowledge about the social, the individual, and associated shared meanings are produced in specific periods. In Madness and Civilization: A History of Insanity in the Age of Reason (1988) and The History of Sexuality Volume One (1981), Foucault provides examples of the shifting historical significance of sexuality and mental illness and the emergence of deviant identities. In this respect, mental illness and sexuality did not exist as independent objects, which remained the same and meant the same thing throughout all periods. Rather, it was through distinct discursive formations that the objects ‘madness’ or ‘heterosexuality’ emerged and appeared as meaningful constructs. Sexual relations and desires have always been present, but the constructs ‘heterosexual’ and ‘homosexual’ were produced through moral, legal, and medical discourses and practices. Through these discourses and practices, behaviours and acts were aligned with the construction of ‘types of’ people or identities - identities which were subject to medical treatment and legal constraints designed to regulate behaviour. In this respect, social and self identities are a consequence of power reflected in historically and institutionally specific systems/sites of discourse. 3.6 As social constructs, it is important therefore to view knowledge and discourse production through the socio-historical conditions in which they are produced. In this respect, discourses concerning terrorism, security dilemmas and threat , and world order, are produced within specific historical, geographical and socio-political contexts as well as within social relations of power . Furthermore, the controlling and legitimising aspects of discourse are such that proponents of violence are not likely to construct a narrative that is contrary to their values. For instance, Al Qaeda is unlikely to construct a narrative that posits them in a contrary manner to their own moral values by engaging in ‘terrorist’ activities. Rather, they would position themselves as acting morally, and as victims of oppression or humiliation (Cobb, 2004). Similarly, the US and her coalition allies are also likely to construct a narrative which posits their involvement in a ‘fight against terror’ within a discursive framework of liberty and democracy, rather than expansionist or imperialist terms. 3.7 This paper now turns its attention to some of the ways in which identities are constituted through discursive practices which accentuate difference or sameness through the use of binaries. Dichotomous logic and identity construction Self/Other binaries 4.1 Notions of self and other and their implications for identity formation have been explored through psychoanalytical and postcolonial inquiry. In his book The Analysis of the Self: A Systematic Analysis of the Treatment of the Narcissistic Personality Disorders (1971), the founder of the psychology of the self Heinz Kohut extends Freud’s theory of narcissism (which has a dual orientation) in his examination of narcissistic rage and accompanying desires for revenge, and introduces the idea of ‘self-object relationships and transferences’ associated with mirroring and idealisation. Lacan (2002) also draws upon the notion of mirroring in regard to the identity formation of infants. Lacan’s ‘mirror stage’ occurs when the infant recognises its reflection and begins to view itself as being separate from its mother, or observes its mirrored image as viewed by the mother. The mirror stage represents the initial recognition of self as a unified subject, apart from external world and the ‘Other.’ This ‘Other’ (the first ‘big Other’ in an infant’s life being the mother) is fundamental to the constitution of self, as well as sexual identity. 4.2 In his foundational work Orientalism (1978), Edward Said examines the historical construction of the East (Them/Other) and West (Us/Self) as essentially different entities through discursive practices. Drawing upon Foucault’s notion of discourse, Said contends that Orientalism is a discourse: by which European culture was able to manage – and even produce – discourse draws upon assumptions that are imperialist by design, privilege European sensibilities and representations of the Other, and reinforce ideas concerning the fixed nature the Orient politically, sociologically, militarily, ideologically, scientifically, and imaginatively during the post-Enlightenment period (p. 3). 4.3 Such a of states of being and difference (McDowell, 2003). Said argues that Orientalist ideas can be found in current representations of ‘Arab’ cultures as backward, lacking democracy, threatening and anti-Western (2003). Similarly, Occidentalism2 can be found in stereotypical representations of an “imperialist, corrupting, decadent and alienating West” (Nadje Al-Ali cited in Freund, 2001). As I suggest later, these representations have become a feature of the current Western perceptions of terrorism. 4.4 As a practice, Othering is not solely a province of East versus West relations, but also exists as a strategy within other non-Westerns nations. For example, Shah (2004), Kennedy-Pipe and Welch (2005) and Baev (2007) note how the ‘war on international terrorism’ discourse has been used by Russia to legitimate it actions against former Soviet republics like Chechnya . 4.5 Within a sociological context, identity discourse is often characterised by issues concerning essentialising and marginalising social groups, as well as totalising and categorising individuals and groups (Gaudelli, 2001, p.60). Categorisation results as a response to diversity, wherein categorisation assists with making the diversity (of people) more understandable. As a consequence of this, people become viewed as being more typical of certain categories (eg. a Muslim from Iraq is stereotypically viewed as being ‘Muslim’ in comparison to an Australian Muslim in Cronulla within some discursive frameworks). Following the construction and application of these categories, is a tendency to essentialise (belief in Dividing practices evident in the categorisation and essentialising processes which inform the production of binaries reflect power struggles, as they primarily entail an external authority imposing a ‘condition of life upon people’ (Gaudelli, 2001, p.74) that are supposed to have certain essences. These essence) as is evident in notions of ‘the laconic Aussie,’ ‘the whingeing Pom,’ and the ‘fanatical terrorist.’ In this sense, the act of ‘naming’ is akin to ‘knowing.’ 4.6 power relations become evident in the abilities of claim-makers or particular agents to make certain discourses, categories and labels acceptable and make them ‘stick’ as it were. In turn, essentialism results in reifying culture by viewing cultural systems as being discrete and homogeneous units (nationally, ethnically and ideologically), which are ‘naturally given’ and fixed in locality (Jones, 1999). Here it is important to remember, that it is not culture that is ‘found’ or ‘discovered’ out in the field, but individuals who act and interact and express their views of culture (Schulte-Tenckhoff, 2001, p.5). This paper contends that it is the relations between groups and related boundary making practices (insider/outsider, Self/Other) rather than ‘traits’ which are important indicators and producers of identity. As discussed above, binaries such as those of Self/Other have a tendency to convey world views in concrete , simplified and often imperialist ways (Berry, 2006). The process of ‘Othering’ is commensurate with identification (as culture, community, or nation) which further entails an act of differentiation, authentication, and at times, exclusion – creating boundaries between members of the ‘in’ group and outsiders. In this sense the: ‘Self/Other relation induces comparisons used by social actors to describe themselves or to describe others, depending on their location. In locking a given group into a substantially transformed identity, one constructs and immobilises this relation so that it operates in favour of those to whose advantage it is’ (Schulte-Tenckhoff, 2001, p.11). 4.7 Self/Other relations are therefore ‘matters of power and rhetoric rather than of essence’ (Clifford, 2004, p.14). Within this context, boundary-making practices are a way of ‘locking’ ‘imagined communities’ into strategically informed ontological states of being. Moreover, these boundaries are inter-subjectively determined, that is, they are constructed through an emphasis on only a subset of many identity labels that apply (eg. religion). President George Bush has described his war on terror as a ‘crusade’ and a ‘divine plan’ guided by God. These sentiments are similar to Islamic calls for Jihad, with religious terrorists viewing themselves as God’s people and their enemies as God’s enemies, ‘infidels’, or sinners. As a consequence, for both sides, the conflict takes on the form of a ‘spiritual battle.’ Thus religious doctrine acts as fuel for Islamic-based terrorism as it does for the US led ‘war on terror’. Inside this discursive framework, both would contend that each party’s religion is the only construction of identity plays a key role in relation to the prospect for religious and political violence. Hence, identity claims invariably informs interests. The call by meaningful one (Berry, 2006 p.4). Indeed, the fundamentalist Islamists for a Jihad on Western nations for example is a realisation of both interests and identities simultaneously. In this sense, identities and interests are mutually reinforcing concepts and incapable of being pursued separately (Hughes, 2004, p.7). 4.8 Identity negotiation highlights the political nature of social identifications of Self and Others within and between groups. Contestation arises out of those ascribed social or collective identities that do not align with an individual’s or group’s self- definition, highlighting global and national tensions, as well as power dynamics which frequently underplay such identification processes. Hence Self/Other struggles are ultimately struggles of legitimacy and meaning, frequently enacting and fuelling conflict. Indeed, it is in the creation of Self and an all-threatening Other that the state, or prominent figures within terrorist networks like Al Qaeda, use their power and available resources for legitimated violence (Grondin, 2004). Enemies and Others 4.9 Identity boundaries are functional in that they allow us to distinguish humans from animals, culture from nature, as well as differences between classes and nations. Using identity to distinguish in this way is the foundation for insecurity and conflict . Such boundaries allow the demarcation of ‘Us’ versus ‘Them’ and ‘domestic’ versus ‘foreign.’ Without the creation of these distinctions, the ‘enemy’ could not be identified (Campbell, 1998 cited in Hughes 2004). 4.10 Sociology of the enemy examines the social process of constructing enemies , and within the context of identity politics and negotiation, creating Others for advantageous reasons . Politicians, other charismatic leaders, social elites, and the military alike, are in prime positions to construct particular representations of the enemy. In turn, these representations are also influenced by a host of other actors (academics and intellectuals, advisors), and array of sources and representations at their disposal. The proliferation of these representations through the internet, media reports, government documents, books, articles, and film has led to an expansion of an enemy discourse (as part of a deliberate and incidental public diplomacy3), assisting the articulation of a dualistic collective moral righteousness which attempts to legitimate the destruction of the Other (Aho, 1994; cited in Cerulo 1997; Berry, 2006; Hansen, 2004). 4.11 Orientalist and occidentalist inspired representations of ‘enemies’ can be seen at work within the current terrorism discourse. The Australian and US national security ideology for example frames the terrorism discourse within a system of representations that defines Australian and US national identities through their reference to the Un-Australian, Un-American, Un-Western Other, usually confined to a Muslim/Islamic centre located in the Middle East, but also extending by association to Muslim/Islamist global diasporas. Similarly, representations of the Un-Eastern, Un-Muslim or Non-Islamic Other are employed by some Islamic fundamentalist groups to assert their identity and cause. Both parties construct an enemy that reflect and fuel ideological strains within the American/Australian body politic and Islamist terrorist networks (Grondin, 2004, pp.15-16). The use of dichotomous logic in these representations fails to account for degrees of ‘Otherness’ and ‘Usness,’ or diversity, within both populations. In this sense, the homogenising effects of such a discourse fails to acknowledge an ‘other – Other,’ namely, a more moderate Muslim population located within an Islamic centre and its periphery. Similarly, distinctions can be drawn between an Australian ‘Us’ and her United States counterpart. In either case, the discursive construction of a homogenous West and ‘Rest’ has the effect of silencing dissenting voices residing within both camps. 4.12 Using simple dichotomies like ‘Us’ and ‘Them’ or ‘friend’ or ‘foe’ ignore the multidimensionality of identity and fail to recognise the interconnectedness and complexity of modern life. The use of such terms also highlights the emotional underpinnings for With their use of an enemy discourse which incorporates notions of religiosity, good versus evil, and right and wrong, both the Taliban and US led ‘coalition of the willing’ appeal to beliefs over issues of security. empiricism (what is knowable, measurable and debatable) – belief systems grounded in notions of faith where it is important to believe things to be true, rather than actually being true (Berry, 2006, p.5). Similarly, claim making of this nature appeals to emotions (like hatred, revenge and fear) in contrast to logic in the sense that they encourage communities to feel in particular ways which are less likely to be challenged than appeals to think in particular ways (Loseke, 2003, p.76). Hence, Berry (2006) contends, that because definitions of enemies are often not empirically based, they can fluctuate according to the needs of the definers. 4.13 With the creation of ‘identifiable’ enemies, defining ‘Us’ automatically entails defining ‘Them,’ with ‘Them’ being the social foe or ‘evil’ (Huntington, 1996). As Burman and MacLure (2005) remind us, ‘there is always a hierarchy in these oppositions’ for there is an essence of a higher principle or ideal articulated in one, and something lesser, or subordinate in the other (p.284). Thus, within this hierarchical value system of prioritised logic, good is seen as coming before evil, positive before negative, Us before Them, and real over the written. Moreover, to label a population as evil is to render the other ‘sub-human.’ We are told of the ‘Evil doers,’ Axis of evil,’ Osama Bin Laden the evil, America the evil, capitalism the evil, and terrorism the evil, and evil acts (Davetian, 2001). eradication of this evil within the context of calls for jihad and a corresponding ‘war on terror’ also implies a ‘promotion of war more willingly than accommodation’ (Armitage, 2003, p.202). However, as is the case with dichotomous logic, good and evil The ensuing pursuit and are two sides of the same coin, or mutually sustaining concepts. Thus, to speak of eradicating evil in this context is a nonsensical pursuit. As Baudrillard explains: ‘We believe naively that the progress of the Good, its advance in all fields (the sciences, technology, democracy, human rights), corresponds to a defeat of Evil. No one seems to have understood that Good and Evil advance together, as part of the same movement…Good does not conquer Evil, nor indeed does the reverse happen: they are once both irreducible to each other and inextricably interrelated’ (2002, p.13). Dichotomous logic can be applied to an examination of security and associated threat discourses. Threats and (in)security 4.14 Stern defines terrorism as ‘an act or threat of violence against non-combatants with the objective of exacting revenge, intimidation, or otherwise influencing an audience’ (2003, p.xx). One of the aims of this act of violence is to instil fear in the target audience. However, to better understand this notion of terrorism and threat, one also needs to understand the discursive power of claim makers, and those in positions of authority (whether they be political parties, clerics and other elites or the military for that matter) in shaping or co-constituting them so. As Campbell (1998) alludes: ‘[d]anger is not an objective condition. It is not a thing which exists independently of those to whom it may become a threat…nothing is a risk in itself;…it all depends on how one analyses the danger, considers the event’ (pp.1-2). 4.15 To this end, the securitization school of thought developed by the Copenhagen School examines the socially constructed dimension of security threats by looking at the ways in which processes like social interaction form as well as alter interests, and in the process, construct or constitute security. By using an inter-subjective lens to look at security, proponents of this school explore the extent to which power relationships and language as expressed through discourse shape understandings of threats and subsequent security responses . They argue that by labelling something a security issue or threat, actors invoke the right to use whatever means to stop that threat. Here language is akin to a ‘speech act,’ or in other words, relates to the act of speaking in a way that gets someone else to act (Hughes, 2004, p.14). 4.16 Labelling something as a security issue, or some group or community as a threat can therefore be seen as a powerful political tool in terms of the behaviour of governments and other interest groups. Indeed, to label a problem a ‘security’ issue or a ‘threat’ gives this problem a special status, and one which can legitimate extraordinary measures to tackle it. Within the current climate of terrorism, threats to security are often characterised as emanating from Others who view their global neighbours rapaciously and are ready to pounce at first sign of weakness. 4.17 The following discussion examines the relational and socially constructed nature of identity and its relevance to various discursive representations of terrorism through its analysis of polarised collective identities and intractable conflict. Polarised collective identities and conflict 5.1 Protracted conflicts have dominated the international arena and have resulted in much of the violence and terrorism witnessed today. These types of conflict usually centre on deep-rooted issues such as struggles over material, human needs, or an historical grievance. The relationships which feature in these forms of conflict comprise of self-perpetuating spiral of violent interactions in which each party develops a vested interest in the continuation of the conflict. They also characteristically entail ‘polarised perceptions of hostility and enmity’ (Bercovitch, 2003). 5.2 In the case of polarised collective identities and protracted conflict, conflict invariably centres on identity struggles, categorisation, and perceived difference (and related issues concerning values and beliefs). Social and collective identity construction is by nature a source of indirect and direct threat. As Hughes explains: ‘[i]ndirectly, identity construction contains the possibility for identity threat since the adoption and practice of one identity necessarily precludes the fulfilment of another by the same audience’ (2004, p.24). 5.3 Direct threats are expressed in terms of an identity’s stance toward the existence and identification of ‘others.’ These stances can occur along a continuum ranging from accepting to eliminating (Hughes, 2004, p.24). It is important to note, however that identity contains the potential for, rather than the inevitability of conflict. Nevertheless, an examination of the literature and theories concerning identity, Self-Other differentiation, highlights the extent to which individuals not only display a tendency for assigning people with whom they interact into a class of Self/Other, but also show how individuals treat more favourably other individuals whom they consider Self, than those who they regard as Other. ‘Inclusive fitness’ and social identity theories for example have shown how sharing ‘genetic material,’ or having similar observable characteristics such as looks, religion, ethnicity (markers of ‘in-group’ and ‘out-group’ status) informs behaviour between groups/others (Ben-ner, McCall, Stephane, and Wang, 2006). 5.4 The concept collective identity refers to a ‘shared place’ in the social world, or the ‘we’ aspect of identity that develops through a process of self-categorization, identification and social interaction. Moreover, whilst these identities can be chosen freely by individuals, they can also be imposed by others who have the resources and authority to do so (as is the case with labelling Others evil, a threat, or enemies through the discursive practices highlighted above). Collective identities serve many symbolic, practical and normative functions such as fulfilling needs for belonging, distinctiveness, respect, unity and status. They also provide a justification for claims and a focus for the maintenance of a distinctive culture or way of life (Coleman, 2004). Such a position presumes or utilises a sense of ‘we-ness,’ or group homogeneity, which discounts levels of heterogeneity that may exist. 5.5 As stated above, protracted conflicts are rooted in the perceived threat to basic human needs and values, as well as concerns over group dignity, recognition, security and distributive justice. When these aspects of collective identities are denied or threatened in some way, intractable conflict occurs. As the conflict intensifies, antagonistic groups become increasingly polarised through an in-group discourse and out-group hostilities focussed on the negation, defamation and vilification of the out-group (Druckman, 2001; Fordham and Ogbu, 1984; Hicks, 1999; Kelman, 1999 cited in Coleman, 2004). 5.6 In his review of the literature, Coleman (2004) highlights a series of conditions, processes and structural issues that are conducive to the development and maintenance of polarised collective identities and related conflict. Eight of these conditions include: 1. ‘Situations where there is a pervasive belief in enduring hostilities where the disputants feel locked – into the intensity and oppression of the conflict relationship’ (Coleman, 2004, p.11; Fordham and Ogbu, 1984). 5.7 During his speech to the National Guard in February 2006, President George Bush talks of the ongoing nature and progress of the War on Terror: …On September the 11th, 2001, our nation saw that vast oceans and great distances could no longer keep us safe. I made a decision that day -- that America will not wait to be attacked again. (Applause.) And since that day, we've taken decisive action to protect our citizens against new dangers. We're hunting down the terrorists using every element of our national power -- military, intelligence, law enforcement, diplomatic, and financial. We're clarifying the choice facing every nation: In this struggle between freedom and terror, every nation has responsibilities -- and no one can remain neutral… 5.8 Implied within this discourse is the notion that if you are not with us, then you are against us, and thus a potential enemy. The discussion also makes it clear that there is no room for negotiation with, or accommodation to, the enemy. The view that terrorists are also locked into a zero-sum battle has also been reported. R. James Woolsey has been quoted in the National Commission of terrorism as saying, “today’s terrorists don’t want a seat at the table, they want to destroy the table and everyone sitting at it” (Morgan, 2004, pp.30-31). 2. The involvement of ‘salient aspects of identity’ (cultural differences) ‘where the in-group and out-group can be easily differentiated’ (Coleman, 2004, p.12; Gurr, 2000). 5.9 The representation of the Muslim/Islamic Other with its emphasis on radically different values systems, becomes evident in references to religious motivations for terrorist attacks – religious ideals which are positioned in opposition to more ‘moderate’ Christian values. As argued above, both often use religious justifications as part of their claims making and their respective calls for a ‘Jihad’ on the US and her Allies, and the US led ‘War on Terror.’ Similarly, Esmer (2002) and Norris and Inglehart (2002) note how hallmarks of Western democracies which are built upon principles of rights (the ‘Land of the Free’), gender equality, sexual liberation pose a threat to traditional values extant in some Islamic cultures. Representations of this kind accentuate perceived cultural differences. In this sense, culture can be viewed as having three components: an empirical aspect (culture understood as communities with their own sets of identifiable, observable, and transferable cultural traits); an analytical aspect (culture used as a conceptual tool) and more significantly a strategic aspect (instrumentalisation of culture/religion to advance identity claims) (LCC, 2001, p.4). 3. ‘Where there exists the perception of negative treatment or threat to an identity group of high centrality and importance’ (Coleman, 2004, p.12; Fordham and Ogbu, 1984). 5.10 There will be in most issues concerning security, a structure of two basic discourses, which articulate radically differing representations of identity (whether they be the humiliated other, the freedom fighting champion, or fanatical terrorist). Many ethnic and religious conflicts that cover the globe are fuelled by stories of humiliation, which in turn, are the basis for stories of revenge. Authors like Hassan (2004), Bendle (2002), Cobb, (2004) and Davetian (2001) have noted how (suicide) terrorist attacks offer self empowerment in the face of powerlessness, redemption in the face of damnation and honour in the face of humiliation. 5.11 Group boundaries are also often delineated according to symbolic, spatial, religious and social referents, ensuring collective identification within, while simultaneously ensuring the exclusion of outsiders. In this respect, the symbolic attacks on the Pentagon, Twin Towers, and the planned attack on the Whitehouse, represent an attack on the pillars of Western democracy and capitalism, and as such, threats to ‘ways of life’ and identity. 4. ‘High mortality salience where death-related anxieties motivate people to become more deeply committed to their cultural groups as a means of buffering such anxiety’ (Coleman, 2004, p.12; McCauley, 2001). 5.12 September 11th as reported by real time coverage on international television networks, “was seductive in conjuring up the sense that we are living in an era of ubiquitous and even worldending violence” (2004: 3). The fear of apocalyptic violence posed by WMD was a major justification for pursuing a pre-emptive war against Afghanistan and Iraq. In turn, a ‘death-related Humphrey argues that the impact of anxiety’ was felt by Western nations with the prospect of Weapons of Mass Destruction (WMD) falling into the hands of Osama Bin Laden and Al Qaeda terrorist networks. These fears were not alleviated when George W. Bush for example asserted the ‘terrorist groups’ would use WMD ‘without a hint of conscience’ (Bullimer 2002). By linking these two issues (terrorism and WMD) political discourses of this kind reified terrorism and WMD , setting into action a series of actions designed to control their proliferation. 5.13 Structural issues which act to reinforce and maintain polarised collective identities include: 5. ‘A negation of the Other’ (Coleman, 2004, p.17). 5.14 This, according to Coleman is the ‘fundamental aspect of the in-group’s identity’ (17). Identity creation through negation entails making a statement of in-group’ identity with reference to what it is not, or does not consist of, for example ‘I am a Christian, not a Muslim.’ Strategies employed in the negation of the Other also include: marginalisation of ethnic and religious groups through naming; racialisation; criminalisation; and stigmatisation. Response strategies of the ‘out-group’ include: collective resistance to ascribed identities; group empowerment; demands for collective group rights (territorial claims) in an attempt to secure greater autonomy, legitimisation and social control (Rummens, 2001, p.18). 6. ‘The outgroup images become negative, homogeneous, abstract and stereotypical’…particularly in regards to the productions of ‘enemy images’ which ‘contain an emotional dimension of strong dislike…these images tend to become self-fulfilling and self-reinforcing , serving important interests and needs’ (Coleman, 2004, pp.17-18; Stein, 1999; Toscano, 1998). 5.15 Implicit within ‘Us/Them,’ ‘East/West,’ ‘Good/Bad’ and ‘Self/Other’ binaries is the notion that opposing identities are relatively homogenous. The use of these non-specific yet all-inclusive tags also serves to dehumanise and depersonalise a highly abstracted Other. In turn, depersonalisation allows social stereotyping, group cohesiveness and collective action to occur. The construction of absolutist discourses of this kind are an important vehicle for understanding conflict: ‘[a]lthough generally described as integrated and homogensous, communities as loci of production, transmission, and evolution of group membership foster conflict through the negotiation and manipulation of social representations’ (LCC, 2001, p.6). 5.16 Here, the demarcation of the common Identity demarcation of this kind further allows the mobilisation of audiences to carry out conflict. President Bush for example has made many references to ‘evil doers’. He has been enemy/Other assists with the mobilisation of one group against another (Aho, 1994). quoted as saying ‘we're on the hunt...got the evildoers on the run...we're bringing them to justice’ and ‘they kill without mercy because they hate our freedoms...’ (Sample, 2006, The White House, 2001). The emotive language used in ‘speech acts’ of this kind are designed to elicit ‘in-group’ distinctiveness and cohesion through the negation and disparagement of the ‘out-group’ (terrorist organisations). The use of terms ‘evil doers,’ ‘them,’ and ‘they’ are interesting however in the sense that they refer to an enemy that extends beyond the confines of terrorist organisations like Al Qaeda. 7. ‘A clear and simplified depiction of good (us) and evil (them) that serves many functions’ (Brown and Gaertner, 2001; Coleman, 2004, p.18). 5.17 By framing their conflict within a discourse which accentuates a struggle between good and evil, both religious terrorist groups and their Western-led protagonists, view non-members of either camp to be ‘infidels’ or ‘apostates’ (Cronin, 2003) and ‘immoral’ or ‘fanatical’ respectively. The maintenance of such a discourse can be seen as serving a dual purpose; namely, to dehumanise the respective victims on both sides of the conflict, and sustain in-group and out-group identities. 8. ‘In extreme cases, pain and suffering for one’s group and one’s cause come to be considered meritorious’ (Coleman, 2004, p.19; Zartman, 2001). 5.18 Martyrdom is a well documented motivation for engaging in terrorist activity. From 1996-1999, Nasra Hassan, a United Nations relief worker in Gaza interviewed 250 aspiring suicide bombers. In one interview, the late spiritual leader of Hamas, Sheikh Yasin, told her that martyrdom was a way of redemption, "[l]ove of martyrdom is something deep inside the heart. But these rewards are not in themselves the goal of the martyr. The only aim is to win Allah's satisfaction. That can be done in the simplest and speediest manner by dying in the cause of Allah. And it is Allah who selects martyrs" (Hassan, 2004, p.1). Conclusion 6.1 This paper has explored some of the issues concerned with identity formation, construction and negotiation. In doing so, this paper has focussed on the socially constructed aspects of identity, and in particular, the extent to which social identities are subjectively constructed according to perceived differences in comparison to others. Hansen contends, identity is “always a relational concept, and it is constructed within discourses, not given by the thing itself” (2004, p.4). 6.2 Meaning is therefore also relational, for the identification of/with difference between imagined communities like the East and West denotes, or holds meaning. Consequently, identity construction involves a degree of ‘Othering’, and within this context, social identities can be constructed and understood as being more or less threatening and different. Issues of Otherness are central to understanding terrorist activity, and are a feature of security discourses girding the current ‘war on terror.’ To this end, this paper has examined the relationship between power and the formation, emergence, and mobilisation of culturally-based collective identities and their expression through representation, narratives, discourse and language. 6.3 Using a social constructionist and a somewhat postcolonialist inspired analysis, this paper questions the utility of dichotomies like Self/Other, insider/outsider, Us/Them, Good/Evil used within terrorist discourses. The ensuing discursive formation shapes the ways in which terrorism can be meaningfully talked about, understood, and tackled. In the process of defining and establishing difference, the discourse of the Other is also highlighted, since such definitions invariably allude to an object in terms of what it is not. Such a practice entails the social construction of some other person, group, culture or nation as being different and deficient from one’s own. Hence as Simon Dalby (1997) observes, “specifying difference is a linguistic, epistemological and, most importantly, a political act; it constructs a space for the other distanced and inferior from the vantage point of the person specifying the difference” (cited in Grondin, 2004, p.5-6). For Said, accentuating difference in this way is central to dichotomous representations of the Self and Other, and through the lens of Orientalism, the creation When examining issues concerning what is terrorism, who practices it and why, as well as appropriate responses to this activity, this paper contends that such issues are often clouded by a rhetoric (discourse) that has deflected attention away from political and moral concerns underlying political violence. This paper has also argued that utilising dichotomous logic in the construction of an enemy is a counterproductive strategy for grappling with terrorism. The use of binaries like Good/Evil and Us/Them assist with the construction of a dehumanised Other who cannot be reasoned with, thus repudiating calls for negotiation, and in the process, reducing incentives to understand difference. Demonising the enemy in such a manner, amplifies fear and alarm, and perpetuates cycles of revenge and retaliation which necessitate more violent of a self serving discourse which privileges the world-view of the West. 6.4 responses to perceived injustices. In this sense , the production and maintenance of a West and Rest dichotomy, a dichotomy which characterises current terrorist and security discourses, has also lead to the creation of mutually sustaining antagonisms ensuring further conflict. 6.5 Consequently, it is important to rethink the binary oppositions employed within the social constructions of other socio-cultural groups, enemies or threats, and national identities. When employed within a national security context, these dichotomies not only serve to reify imagined differences between communities, but also may inflame hostilities through the continuation of oppositional identities and relations which are viewed as being fixed, and thus resistant to change . A way around this binary impasse is the construction of counter-discourses which contain dual positions for both parties as victims and as agents of conflict. As long as both sides represent themselves as being victims, rather than perpetrators of violence, more violence will ensue. Moreover, another way to challenge the legitimacy of dichotomous logic is to create a counter-discourse highlighting the diversity extant within ‘socalled’ homogenous populations. Role of the ballot is to either accept or reject the affs securitization—prior to action Saltera 8 (Securitization and desecuritization: a dramaturgical analysis of the Canadian Air Transport Security Authority Mark B Saltera School of Politics, University of Ottawa, Ottawa, Ontario, Canada K1N 6N5. E-mail: msalter@uottawa.ca, , 2008 This model of settings for securitizing moves fits cleanly with Paris School interventions on the trope of risk (Aradau and van Munster 2007; Aradau et al. 2008). However, it is precisely because security plays differently to each audience, is used differently by different speakers, and changes in its meaning that we need to expand our analysis of how securitizing moves are accepted or rejected. Bigo (2006: 7) uses the notion of 'field' to demonstrate how 'these professions do not share the same logics of experience or practice and do not converge neatly into a single function under the rubric of security. Rather, they are both heterogeneous and in competition with each other'. This article offers a way into that field analysis of securitization, that is not reduced to linguistic analysis, through a dramaturgical analysis of setting: within each securitizing move, we must consider who may speak, what may be spoken, and what is heard. Top of page Securitization Securitization theory has been an incredibly fruitful approach for the study of security. Having disaggregated 'state security' into several sectors (military, political, societal, economic, and ecological), Buzan argues that 'the question of when a threat becomes a national security issue depends not just on what type of threat it is, and how much the recipient state perceives it, but also on the intensity with which the threat operates' (1991: 133–4). This was expanded by Buzan, Waever, and de Wilde in the formal model of securitization: 'the The attempt at securitization is called a 'securitizing move', which must be 'accepted' or rejected by the target audience. The authors argue that the conditions for success are (1) the internal grammatical form of the act, (2) 'the social intersubjective establishment of an existential threat to have substantial political effects...to break free of procedures or rules he or she would otherwise be bound by...' (1998: 25). conditions regarding the position of authority for the securitizing actor — that is, the relationship between the speaker and the audience and thereby the likelihood of the audience accepting the claims made in a securitizing attempt, and (3) features of the alleged threats that either facilitate or impede securitization' (1998: 33). There is room within the original cast of the theory to expand the notion of facilitating conditions or impediments for securitizing moves — but little direction as to what those might be. In this reading, the second factor — these social conditions — is under-determined and must be explored further. In the debate between the CS, so named in a response by McSweeney (1996, 1998), subsequent replies (Buzan and Waever, 1997), and a provocative intervention by Williams (2003), a number of critiques of the model of securitization were raised. The CS was faulted by McSweeney for appearing to give an ontological pre-existence to the 'speaker' and 'audience' that is at odds with a more processual or constructivist perspective of identity (1996: 83). Williams argued that different kinds of speech might constitute an act, and made an important theoretical connection to Schmittian politics of sovereign exceptionality. Williams wrote that the CS process of securitization — notably that securitization implies depoliticization — can be found in other theories of sovereign authority, and that securitizing moves are an attempt by the sovereign to decide the exception and thus remove the sector from democratic debate (2003). Buzan, presented a spectrum of how issues might be weighted: 'nonpoliticized... through politicized... or securitized' (1998: 23). Within this account, the CS appears to represent securitization as a threshold — particularly within a democratic society. Either a threat is represented and then accepted as a security issue, or it remains contested within the realm of normal, deliberative politics. Successful securitization is at root a political process, but the actual politics of the acceptance are left radically under-determined by this model. The authors argue that 'the issue is securitized only if and when the audience accepts it as such... ( it must) gain enough resonance for a platform to be made from which it is possible to legitimize emergency measures...' (1998: 25). It is precisely the dynamics of this acceptance, this resonance, this politics of consent that must be unpacked further. The Copenhagen School, certainly open their model to consideration of the 'external, contextual, and social roles and authorized speakers' of the speech act 'and, not least, under what conditions (i.e. is the securitization successful)' (1998: 32). But, within their model, there is no frame for how securitizations are successful or fail. A subsidiary point that is worth noting: these external and internal conditions for securitization appear to work in reverse for the process of desecuritization (Wæver 1995). The speaker proposes that there is not a threat, or at least not a threat that is existential, and that the problem can be comprehended or managed within the rubric of normal politics. There are a number of assumptions within articles about securitization theory about the differential ease or difficulty of securitization and desecuritization. These unexplored assumptions arise because there is no theory for the actual process of the success or failure for a securitizing or desecuritizing move. The statist model of securitization does not match the complexity of contemporary social dynamics of security. First, other non-state actors must be included in the model, as demonstrated by Bigo (2006) and others. Security is not contained solely within the traditional boundaries of the state and the authority to make securitizing moves not limited to state actors. Second, two temporal dimensions must be added to considerations of securitization and desecuritization: the duration of the securitization and the entropy of the public imagination. Some issues, such as the war on drugs, rose and faded in the public imagination, largely independent from the 'actual' or empirical degree of threat (Campbell 1993; Aradau 2001). Third, securitization is not an instantaneous or irrevocable act. Rather securitization reflects the complex constitution of social and political communities and may be successful and unsuccessful to different degrees in different settings within the same issue area and across issues. Floyd demonstrates convincingly that desecuritization is entirely 'issue-dependent rather than static' (2007: 349). Nor is securitization an act that removes an issue from deliberative politics forever. Rather, studies of securitization need to account for the movement of issues into and out of the security sector over time. An issue that has faded from the public view may rest within the security frame or enjoy a kind of 'entropy' where the public, elite, technocratic, or scientific communities assume that exceptional security measures have lapsed in the face of a threat that no longer seems pressing or relevant. Hysteria over the presence of communists and homosexuals within government departments no longer seems a national security threat, in the way that McCarthy and others described. For example, a securitization act may be successful with a scientific or technocratic community, and yet fail in the elite and popular realm, such as the debate over global warming during the 1980s and 1990s. A process of desecuritization may occur within popular politics, while elites and professionals remain unconvinced, such as transportation safety. Doty examines how the Minutemen along the US–Mexico border consider themselves to be acting in a 'decisionist' mode, even though they are not sovereign actors (2007: 129–31). A particular group has successfully securitized illegal migration at the border for a segment of the population, while simultaneously human rights groups — by placing water in the desert and advocating for amnesty — act as if the issue is politicized. John McCain (Arizona Senator and Republican Presidential nominee) proposed legislation (with Democratic Senator Edward Kennedy, for whom 'all politics are local') that would provide a 'path to citizenship' and border security — only to withdraw it in the face of public criticism. In this case, the issue was the subject of intense 'normal' political debate, and the securitizing move was incomplete and heterogeneous across the political landscape. The model provided by the CS gives us no way to measure the success or failure of a securitizing move. In this article, I gauge the success or failure of a securitizing move by ranking the degree to which policies, legislation, and opinion accords with the prescriptions of the speech act: 1. To what degree is the issue-area discussed as part of a wider political debate? 2. Is the description of the threat as existential accepted or rejected? 3. Is the solution accepted or rejected? 4. Are new or emergency powers accorded to the securitizing agent? Unfortunately we are unable to provide accessible alternative text for this. If you require assistance to access this image, please contact help@nature.com or the author This scale of success–failure is particularly useful in assessing the persistence of a security issue within different audiences. A more nuanced notion of success and failure also gives us a purchase on whether an issue remains securitized over time so that we may develop a theory of the public imagination in the future. Two recent contributions to securitization theory stand out for my analysis.1 Balzacq and Stritzel share my excitement about the potential of the CS, and my worry about the under-developed social aspect of securitization. Stritzel leads the theoretical debate, and provides a strong grounding for this present article. He argues 'too much weight is put on the semantic side of the speech act articulation at the expense of its social and linguistic relatedness and sequentiality' (2007: 358). He critiques the under-theorization of the speaker–audience relations, stating that 'in empirical studies one cannot always figure out clearly which audience is when and why most relevant, what implications it has if there are several audiences, and when exactly an audience is "persuaded"' (2007: 363). Stritzel proposes an embedded analysis of securitization: '(1) the performative force of the articulated threat texts, (2) their embeddedness in existing discourses, and (3) the positional power of actors who influence the process of defining meaning' (2007: 370). By this, he argues, the discourse of securitization must be understood as situated within a relationship between speaker–audience and within a context that predates the actual securitizing act. What makes a securitizing move successful is, for Stritzel, the extent to which the actor has the power to make the threat and the discursive weight of that threat (has it been well established, or is this a new threat?). Stritzel's general model of embedded securitization is productive, but does not explain the success or failure of securitizing moves with any greater clarity than the CS. It is a useful framework that can guide empirical work, but it does not allow us to generate any hypotheses about the politics of securitization and, in particular, about securitizing moves that fail to garner acceptance or resonance. Adding the range of success/failure, as detailed above, helps Stritzel's embedded analysis disaggregate 'persuasion' into multiple steps of audience acceptance. Balzacq also offers a model of the social aspect of securitization that includes 'the context, the psycho-cultural disposition of the audience, and the power that both the speaker and the listener bring to the interaction' (2005: 172). In posing the question of strategic or pragmatic practice, Balzacq argues that 'the positive outcome of securitization, whether it be strong or weak, lies with the securitizing actor's choice of determining appropriate times within which the recognition, including the integration of "imprinting" object — a threat — by the masses is facilitated' (2005: 182). His examples demonstrate that these choices are constrained by history, memory, and discursive tropes. What a dramaturgical analysis adds is the notion that — just as there are different national and psycho-cultural contexts — so too are there different sociological, political, bureaucratic, and organizational contexts within a populace. A popular audience will 'accept' securitization of threats differently to an elite or scientific audience. Global warming as an environmental securitization, for example, has had creeping success — but on radically different grounds with scientists, bureaucrats, elite politicians, and the populace (both within states and between states). It is unclear to me if 'securitizing agents always strive to convince as broad an audience as possible' (2005: 185), particularly within the context of security professionals (Balzacq 2008). In the case study below, the securitization of Canadian civil aviation security was pitched to narrow, specific audiences — and there was little effort to securitize the issues for the general public. At a base level, popular politics (at least in democratic societies) operates differently than scientific politics; technocratic politics from elite politics. In short, in addition to the 'régime of truth, [a society's] "general politics" of truth' (Foucault 1980: 131), there are also specific politics of truth. Foucault hints at these specific regimes of truth in discussing the relationship between the specific intellectual and 'direct and localised relation[s] to scientific knowledge and institutions' (1980: 128). I return to these notions of direct and localized relations in the case study. This is why a dramaturgical approach to the actual evolution of particular securitizing moves is so productive; the language and political games at stake in each setting are radically different. Balzacq has gone on to argue that 'securitization sometimes occurs and produces social and political consequences without the explicit assent of an audience' (2008: 76). He uses the new governance literature to propose a new investigation into policy tools that are 'instruments of securitization' (2008: 79). Both Balzacq's work and this article are attempting to remedy the same flaw in the CS's methodology: an overreliance on speech acts to the neglect of the social. A dramaturgical analysis of setting, however, provides the audience that Balzacq displaces. It is crucial to our analysis that form of securitizing move. the audience is determinative of the Even if those audiences are internal or organizational, as Goffman explains: 'no audience, no performance' (1974: 125). He argues, "if one individual attempts to direct the activity of others by means of example, enlightenment, persuasion, exchange, manipulation, authority, threat, punishment, or coercion, it will be necessary, regardless his power position, to convey effectively what he wants done, what he is prepared to do to get it done and what he will do if it is not done. Power of any kind must be clothed in effective means of displaying it, and will have different effects depending upon how it is dramatized. (1959: 241, emphasis added)" Viewing securitizing moves as a kind of performance, we can see the importance of 'front' and 'backstage': that the same securitizing speech acts may be framed differently within the professional team and in front of an audience. Among themselves, (security) agents may speak in one way, but use other ways to conform to the expectations of a popular audience — and there are some that are always totally excluded from the securitizing process (1959: 145). The audience is not always the public. There is a network of bureaucrats, consultants, parliamentarians, or officials that must be convinced that securitization is appropriate, efficient, useful, or effective. Balzacq identifies a series of backstage securitizing moves that have public effects, though are never securitized publicly. Rather than disappear the audience, a more flexible notion of the setting of securitization allows for micro-sociologies of the particular securitizing moves. Top of page Dramaturgical Analysis Dramaturgical analysis uses the vocabulary of the theatre to understand social settings, roles, and performances of identity. Sociologist Goffman also introduced the notion of the 'framing' of identities and issues, to which much critical scholarship is indebted (1974).2 Much post-structuralist work relies on notions of performance, and critical work in international relations often assumes that key political divisions such as inside/outside, order/anarchy, self/other must be continually performed and reinforced to have effect. In this research programme, I am interested less in the national application of Butler's notion of the performativity of gendered and other identities (1990), Campbell's (1993) notion of foreign policy as an articulation of danger that acts as an identity function, Sylvester's analysis of 'dramaturgies of violence' (2003a) or 'development' (2003b), important and provocative though they may be. Instea d, this dramaturgical theory argues that the setting of a securitizing move is determined by the actors and their roles, the rules of the discourse permissible within that space, and the expectations of the audience. When we push this theatrical metaphor, we can classify the different types of securitizing moves that all share similar conventions, narratives, characters, and tropes. The use of specialized language, procedural forms, and common conventions all suggest a common setting.3 For example, terms, precedents, or issues whose specialized meanings both speaker and audience share.4 Buzan et al. themselves use dramatic language: 'the staging of existential issues in politics to lift them above politics...an issue is dramatized and presented as an issue of supreme priority...' (1998: 26). Huysmans alludes to the 'security drama' and leads to this focus on 'the processes of security' (1995: 66). Rather than classify securitizing moves as comedies, tragedies, and histories, we can classify them according to the setting: popular, elite, technocratic, and scientific settings. Each of these settings structures the speaker–audience relationship of knowledge and authority, the weight of social context, and the success of the securitizing move. The setting of a securitizing act includes the stage on which it is made, the genre in which it is made, the audience to which it is pitched, and the reception of the audience. What is particularly useful about Goffman's dramaturgical analysis is precisely the mutual constitution of self and audience. The characters in the drama must use information to convince the audience of a particular story: 'the over-communication of some facts and the under-communication of others... a basic problem for many performances, then, is that of information control' (1959: 141). The setting of a performance, then, communicates the ground-rules for who may speak, what may be said, and what is heard. For example, when Shakespeare was originally staged, groundlings, who paid little admission and sat in the stalls below the stage, might speak to and throw food at the actors — something probably frowned upon at Stratford-upon-Avon today. British pantomime has a particularly interactive audience–actor relationship (oh no it doesn't, oh yes it does), as does the Rocky Horror Picture Show, both of which rely on the audience knowing the call-and-answer structure of the drama. This is to say that in addition to an awareness of the language, tropes, metaphor, plots, and devices that are embedded in the process of securitization, dramaturgical analysis also directs our attention to the constitution of the actor–audience in a particular discursive relationship. Also, Goffman argues that the presentation of the self changes from different social settings, and that an understanding of the setting can illuminate the exigencies of different performances. For him, the character and audience join together in a 'working consensus' to create 'the belief that ([he performer] is related to [the audience] in a more ideal way than is always the case' (1959: 48). Any social scene, such as the setting of securitizing moves, involves the presentation of a self, the setting for that narrative, and audience reception. Speech-act models of securitizing miss the crucial aspect of the 'setting' of the narrative. In particular, the setting of a political speech act includes the stage upon which the securitization is attempted (national, organizational, bureaucratic, or scientific) and also the past narrative history of failed and successful securitizations by lauded or derided characters (Merelman 1969: 225).5 Securitizing moves in popular, elite, technocratic, and scientific settings are markedly different — they operate according to different constitutions of actor and audience. A securitizing move is not the same in all contexts, because it is not simply made up of the internal grammatical elements. Krebs and Jackson analyse the importance of public rhetoric, while bracketing the questions of motivation (2007: 41). Whether the intention of the speaker is entirely calculative or emotive, the rules of the setting remain the same (Goffman 1959: 66). A securitizing move made for political gain or from fear adheres to the same logic, but the effect of the message may be different. This focus on the reflexive relationship between speaker and audience is particularly important for theories of securitization. Securitizing moves follow an internal grammar that is determined not simply by internal rules (i.e. the invocation of an emergency or exception to normal politics), but also to a common, social grammar (i.e. the universe of tropes, images, metaphors, histories that can be invoked). Securitizing moves occur within the universe of the audience imagination. It is not simply a power relationship — but a knowledge-authority game. A popular securitizing move may be prompted by an informal authority such as a civil society group (like the Minutemen along the US–Mexico border); but, civil society groups may be ineffective in scientific settings (Minutemen and similar groups do not participate in academic or professional arguments about border security). A scientist will use different authority to convince her colleagues than her bureaucratic counterparts. For example, the case for the presence of weapons of mass destruction in the lead-up to the most recent American invasion of Iraq illustrates how ambiguity was leeched from the technocratic discourse as it was marshalled in the popular sphere. Uncertainty was purged as the reports were summarized, as technocrats aimed to convince the political elite, and in turn as the elite aimed to convince the general populace. In short, the 'acceptance' of the audience and the 'resonance' of an existential threat is different within different spheres. I argue that we can distinguish these distinct settings by the grand narratives by which truth is authorized, the characters who are empowered to speak, and the relationships between characters and audience. Within the security sphere, different narratives are deployed for security threats in different sectors; different characters may attempt a securitizing speech act; and the . There is a consensus among critical scholars that the amount of social life that is governed by 'security' claims has increased since 9/11 — but not all securitizing moves have been successful. In studying the evolution of civil relationship between the audience and the performer structure how those speech acts are made and received. This model of different settings for securitization stems from research into the widening of public security in post-9/11 politics aviation security, it was clear that the rules of the speech act were different in different settings: who could speak, who could hear, and what could be said all varied radically — even on the same issue within the same sector. Using the case of the CATSA below, I argue that there are four key settings for these securitizing moves. This is not to say that, in other contexts, more settings are not possible, but rather that the four settings are the fewest number of categories that allow for significant differentiation within this case. The changing nature of perceptions of the aviation sector over the past 40 years demonstrates the importance of time and entropy within securitization studies. The gradual and increasing securitization of international aviation has been a long process, one in which terrorist groups rather than government elites have been the organizational and discursive entrepreneurs. The travelling public has a short memory, politicians aim at the next election cycle, and bureaucrats are risk averse. Securitization has occurred at once or necessarily as a result of one speech act that is accepted or rejected but often through the imposition of new regulations or international standards. The setting of securitization is clearly crucial. The success of a securitization act is dependent not exclusively on the formal syntax or on the informal social context, but also on the particular history, dominant narrative, constitutive characters, and the structure of the setting itself. A popular appeal to national security is often effective in popular and elite politics, but may be less convincing in a scientific realm. The restrictions of mandate and bureaucratic thinking will predominate in technocratic politics in (at least potentially) different ways to the decision making of elites bent on maintaining power or gaining reelection. The setting also determines the characters that may attempt a securitizing speech act. Imams and ministers have an authority to name cultural and moral threats to society within the setting of popular politics, but there is a different stage presence about scientific truths. For example, American librarians had a surprise entry onto the popular scene due to their perceived scientific interest in privacy and free speech, which trumped elite policy demands in the realm of popular politics during the debate surrounding the total information awareness proposal (Abdolian and Takooshian 2003; Monahan 2006). The disproportionate effect of librarians in this public debate cannot be explained simply by power differentials as in Stritzel or Balzacq. Different actors possess different authorizations to speak in different political settings. In the following case, the same securitizing move (to expand aviation security and airport passenger security) was made by different actors, to different audiences, with different claims to authority, in different languages, with different effects. This was evident over time as the securitizing move was accepted or rejected by the target audience. Top of page Securitization and CATSA CATSA provides an excellent case for dramaturgical analysis.6 There is a clear and accepted securitizing move in response to the attacks of 9/11: the creation of CATSA. Because the 9/11 attacks were directly connected to failures in airport security, specifically passenger screening, the securitization of civil aviation was relatively straightforward: the external threat of terrorists using planes as weapons of mass destruction had a deep resonance across the populace, political elite, technocrat, and scientific audiences.7 In particular, the real-time broadcast of the second plane hitting the World Trade center, and the repetition of those images, gave aviation security a dominant position in the public imagination of homeland security. Previous to 9/11, in Canada (and the United States) aviation passenger screening was done by airlines according to national standards set by the transportation authority . Airport security was not a realm of emergency or crisis, and could be handled by non-state entities (like airlines or airport authorities). It was depoliticized, expressed in terms of cost and regulations and t echnical standards. To nationalize airport security — make it part of the governmental structure, through CATSA — represented an expansion of governmental powers that was due to a perceived emergency and existential threat.8 The securitizing move was successful, even easy. However, this does not tell us enough about the process of securitization. During 2004–2007, there were several other securitizing and desecuritizing moves. There are clear popular, elite, technocratic, and scientific communities that engaged in these (de)securitization processes. Popular sentiment can be evaluated through public media, particularly in 2006. Furthermore, in 2004, CATSA engaged the scientific community in an examination of its security strategy , the proceedings of which were then published in 2006. Elite, technocratic, and scientific settings are evidenced through a 5-year governmental review of the CATSA Act in 2005–2007 and an Auditor-General Special Examination of CATSA in 2006. In these reviews, experts, bureaucrats, and policy-makers evaluated the security function of CATSA. In particular, the CATSA Act Review, conducted by Transport Canada with a wide range of public consultations, provides a thick slice of public, scient ific, technocratic, and elite opinion after 5 years of operation. During these two critical reviews, the CATSA executive attempted to convince the elite of the need for an expansion of their mandate. In other words, a further securitization of airport security was called for. This was rejected by the technocrats, experts, and the elite. The CATSA case thus provides us with a clear sector that is successfully securitized, popular and expert challenges to that securitization, and a rejection of an expansive securitizing move. There is thus a prima facie case for a successful securitization move in the area of aviation security in Canada. Before 9/11, passenger screening was done by airports and airlines according to standards set by Transport Canada. Despite Vancouver-based attacks on Air India in 1985, there had been a general trend towards the depoliticization of airport security. It was a subject accessible to public debate, but not politically salient (referenced in political campaigns or in parliamentary debates). Transport Canada was the owner/operator of the majority of airports, and consequently was responsible for passenger screening. Airport policing, which had been the responsibility of the federal police force (RCMP), was conducted by regional forces. Following the 9/11 attacks, Finance Minister Paul Martin submitted a budget that included the creation of the CATSA. The CATSA Act received royal assent on 27 March, 2002, as a new crown corporation responsible for 'effective, efficient and consistent screening of persons accessing aircraft or restricted areas through screening points, the screening of the property in their possession or control, and the screening of the belongings or baggage they give to the air carrier for transport' (CATSA Act Review 2006: 13).9 On 31 December 2002, CATSA undertook responsibility for all passenger screening. The creation of CATSA and its initial responsibilities was supported by the Minister of Transport and Finance Minister Paul Martin, who shortly thereafter became t he Prime Minister and issued Canada's first National Security Strategy. There was a clear case for securitization: the threat of terrorism particularly to civil aviation was acute, the previous system of privatized or deregulated screening might lead to inconsistencies among Canadian airports which fundamentally threatened the integrity of the system, and, finally, running counter to the trend towards deregulation in civil aviation, the government had a security role. This opinion was exemplified in the National Security Strategy (Canada. Office of the Auditor General 2006: 36). In the following sections, this article parses the four settings of securitizing moves in the civil aviation security sector during 2004–2007. The traditional CS explanation would go this way: the Canadian state made a securitizing move to define the terror threat to civil aviation as an existential threat that required extraordinary action; this move was accepted by the public, and CATSA was formed in 2001–2002 with new powers and authorities (in evidence through the changes to the Aeronautics Act). The Canadian state has not att empted any significant securitizing moves since the formation of CATSA. However, a close reading of the evolution of CATSA, and, in particular, the reviews in 2005–2006, demonstrates a much more complex picture of securitizing moves and counter-moves. Within the elite setting, political and bureaucratic actors actively debated the roles and responsibilities of CATSA and attempted to increase or decrease the powers and authorities of the organization. Within the popular scene, CATSA became the subject of a number of journalistic and public government reports by a Senate committee that questioned the nature of the threat to aviation security and the appropriate policy responses. Within the scientific setting, academics and experts attempted to desecuritize the work of CATSA through a critical appraisal of the risk management approach. Within a technocratic setting, the ability of CATSA to provide and measure security was radically questioned by the Auditor-General, leading to a desecuritizing move. Running throughout all of these settings, there is a common thread: the CATSA executive wanted to increase its mandate, including more counter-terror operations in its operational purview. This particular securitizing move followed the same pattern: existential threat and new powers needed. However, this same securitizing move was made in different ways in different settings. Elite The CATSA Act Review provides a productive snapshot of the securitizing moves in play between 2005 and 2006. The Minister of Transport, later Transport, Infrastructure and Communities, appointed an expert advisory panel in November 2005 to report on CATSA after 5 years of operation, which was tabled in Parliament on 12 December 2006.10 The Advisory Panel had a wide remit to 'examine the provisions and operations of the CATSA Act to ensure that the legislation provides a sound and adequate statutory basis for CATSA's aviation security mandate, provide advice on future aviation security requirements and other developments that may impact on CATSA's future operations...on other important issues that come to [the Panel's] attention' (CATSA Act Review 2006: 15). In the preparation of their report, the panel conducted a number of public consultations and received submissions from over 40 agencies, institutions, airports, organizations, and individuals. CATSA itself also prepared a number of position papers. This is a complex situation for the study of securitization: the three experts on the advisory panel are the primary authors of the report; they are guided and supported by a bureaucracy from Transport Canada; the final audience is the Minister of Transport. Because the audience of this legislative review was the Minister of Transport, Communities and Infrastructure (and other political decision-makers), I analyze this process as part of the elite process. The Auditor-General's Special Examination, though it occurred in a similar timeframe and with consequences for CATSA's Board, was conducted with reference to the Office of the Auditor-General which has a defined mandate. Thus, I examine the Special Examination below as part of the technocratic audience. It was clear that the mandate of CATSA was in contention. There was a potential within the social space for a securitizing move. The Panel notes: 'it is apparent to the Panel and to many stakeholders that clarification is needed concerning the operation mandate of CATSA and Transport Canada... CATSA thinks it should determine the "hows" [of security functions], while Transport Canada insists they are to be determined within the [Security Screening Order]' (CATSA Act Review 2006: 146). CATSA argued in their submissions that Transport Canada's Security Screening Order was extremely detailed in its prescription, and made security screening inflexible. CATSA made a clear securitizing move: a threat, which was existential, that required extraordinary action — in this case the expansion of its mandate and the transformation of an aviation screening corporation into a counter-terrorism agency (CATSA 2006a: 4). In particular, it was argued before the Advisory Panel that the CATSA Act, Canadian Aviation Security Regulations, and the security screening order, gav e CATSA an extremely clear, but restricted mandate in its passenger screening. CATSA screeners were responsible for and authorized to detect and to interdict prohibited items only, or to validate the identity of some non-passengers entering into secure air-side operations. In other words, CATSA could not use any profiling, risk-management, or policing methods in their security screening. CATSA argued that its ability to use these tools — such as behavioural profiling or risk management — would make the civil aviation security system much more secure. CATSA sought increased access to intelligence, a greater flexibility in screening-point staffing, and screening procedures. These moves were rejected by the expert panel and the Minister in the CATSA Act Review.11 In 'Our vision for aviation security', submitted to the Review, CATSA makes its case for an expanded mandate. CATSA can provide 'a national approach and consistency', 'public security', 'accountability', 'access to intelligence', and 'international networks' (CATSA 2006b: 5–6). The desire for national consistency among Canadian airports was one of the chief reasons for the creation of CATSA. The form of the organization balances accountability across a Board of Directors, the Minister for Transport, Infrastructure and Communities, and the Treasury Board (which approve, among other aspects, CATSA's budget and corporate plans). However, these other three priorities (public security, access to intelligence, and international networks) represent an expansion of its mandate. Airports, in their submissions to the CATSA Act Review, argue that screening can be handled efficiently and effectively by their own private security staff — essentially a desecuritizing move (Aéroports de Montréal 2006; Canadian Airports Council 2006). They argue that security screening is not an existential threat and does not require additional powers or authorities. Aéroports de Montreal concludes: 'ADM strongly opposes any expansion of CATSA's mandate to encompass, for example, access control or policing functions, since this could be a further infringement of airports' control over their operations. Furthermore, the Minister should not be able to grant CATSA new responsibilities without consulting the airports' (2006: 3). The Canadian Airports Council writes: 'With the exception possibly of cargo security, airports are not in favour of an expanded mandate for CATSA, and airports should be consulted thoroughly before any expansion to CATSA's mandate takes place. Some airports have expressed an interest in taking over or sharing some of CATSA's functions at airports' (2006: 1). Against the argument that airports might be able to provide security screening, CATSA argues 'public security is the #1 priority — CATSA's legislated mandate is air transport security — period. We are not in the business of operating parking, leasing space to businesses, airport cleaning and maintenance, or other areas of interest to airport authorities. Public security is compromised when screening operations are "cross-collateralized" with other airport operations' (5). Within this complex discursive environment, securitization/desecuritization is not simply a binary (on/off) condition but more processual. An examination of the submissions to the Advisory Panel illustrates who 'counts' as a stakeholder for the process, who counts as expert, whose voice is heard. While CATSA, the Advisory Panel, and the Review Secretariat clearly had primary speaking roles (with stakeholders in supporting roles) in this particular securitization drama, the important audience was the Minister. This is a failed securitizing move: CATSA attempted to expand their mandate, to widen their security footprint, to convince the political elite that, due to the terror threat, more powers should accrue to the security service. CATSA publications emphasize the threat of terror, memorialize past attacks, and have instituted a training programme on terror for senior staff (David 2006). The attempt by CATSA to expand their mandate and securitize other areas of airport security was rejected by both the expert panel and the political elite. Both elite and experts were convinced of the threat, but none were convinced that special or expanded powers were needed. The Minister argued specifically that 'Responsibility for aviation security will continue to rest with the Minister of Transport, Infrastructure and Communities... CATSA's activities will be focused on its core aviation security-screening role: the effective and efficient screening of persons who access aircraft or restricted areas through screening points, the property in their possession or control, and the belongings or baggage that they give to an air carrier for transport' (Cannon 2007). Experts and elites argued that the public–private system, structured by rules from Transport Canada, could secure the system. In other words, the existential threat was accepted by the audiences, but not an expansion of powers. Consequently, the securitizing move was not accepted by the key audiences, the Advisory Panel and the Minister. Popular Within popular politics, the securitization of airport screening was easy to accomplish, particularly in countries that had 'focusing events' such as 9/11 (Birkland 1997, 2004). As Lyon observes, 'apart from short-term responses to some notorious hijackings over the past 30 years, airport security was never a topic that engaged the public imagination in Canada (or elsewhere for that matter)' (2006: 398). In 1985, the attack on Air India flight originated in Canada. Invest igations determined that it was a result of weak baggage screening and the lack of reconciliation between passengers and luggage. However, passenger screening was not seen as such an important issue — the majority of hijacking or terror attacks occurred in the United States, particularly with reference to Cuba, or in Europe and the Middle East.12 In January 2003, the Standing Senate Committee on National Security and Defence tabled a report in Parliament titled The Myth of Security at Canada's Airports that called for a reinstatement of the RCMP presence and a wide-ranging overhaul of the system. Despite frequent interviews in the popular press by its author, this report did not resonate with the public, the policy, or the political audiences: it represents another failed securitizing move.13 However, the success of the securitization of aviation security can be seen in the popular reaction to two cases of investigative journalism. First, a journalist from the French-language paper Journal de Montréal infiltrated the secure, air-side areas at Trudeau airport in Montreal on a number of occasions through different access points. The journalist entered a catering company's facilities (Cara Foods) and gained access to restricted areas through a disused hanger. The reporter 'found a place to slip under the airport's perimeter fence, but there's no need to get your knees dirty: he also just walked in, repeatedly, as if he belonged. In prohibited zones he gained easy access to the outside of aircraft, to carts full of meals about to be loaded onto planes, and to a truck used to provide water to aircraft' (Gazette 2006). Though none of the checkpoints he passed were staffed by CATSA employees, or indeed the actual regulatory responsibility of CATSA, it was CATSA that was held publicly responsible. While CATSA has responsibility for key elements of aviation security, such as passenger and non-passenger screening at identified checkpoints, it is not responsible for overall perimeter security or security of air-side services. An editorial opined: 'Transport Minister Lawrence Cannon and CATSA chief Maurice Baril have got some explaining to do. Security can't be perfect, but it should surely be better than this'. Minister Cannon summoned Maurice Baril (who was CATSA's Chairman of the Board of Directors, who subsequently resigned) and CATSA President and CEO Jacques Duchesneau to Ottawa 'for further discussions' (Cannon 2006). In Canada, the responsibility for airport security, and the maintenance of air-side security, is shared among a number of different players in the airport and coordinated by Transport Canada through the Aviation Security Regulations. Thus, CATSA is responsible only for its six stated tasks, mandated in the CATSA Act. However, the popular response was that CATSA should be responsible for all of airport security — that all aspects of airport security were the responsibility of the government, because of the existential threat, because of the need for emergency powers. The (inappropriate) critique of CATSA — for, in essence, having a restricted mandate — is a clear demonstration that the public expected that CATSA would be responsible for all airport security (perhaps because of its much larger American counterpart the Transportation Security Administration or a 'misleading' corporate identity). For securitization theory, this implies that the audience, in this case the popular audience, may not simply accept securitization but also initiate an expansion of government powers. The second popular case that demonstrates how the wider public may not simply support, but widen securitization, is the 'revelation' by a Canadian television news programme that CATSA itself had security problems. CBC's investigative journalism programme, The Fifth Estate, broadcast 'Fasten Your Seatbelt' on 5 November 2005 (CBC 2005). A whistle-blower argued that 'customer service' was prioritized over security in passenger screening, and then a security expert, Steve Elson, demonstrated how to circumvent screening points (CBC 2006). The 'security expert' was described as being a former TSA inspector who currently consults on security matters (validating his expertise in both government and liberal economic terms). Once again, a complex web of regulations and responsibilities was simplified (and misconstrued). The whistle-blower was a CATSA employee, and the programme highlighted the role of CATSA in passenger screening and the random nature of non-passenger screening. Within the programme, there was little discussion of the role of the actual regulator and ministry responsible for aviation security: Transport Canada. However, in an unaired portion of the interview with Senator Colin Kenny, one of the authors of The Myth of Security at Canada's Airports said, 'The problem is with Transport Canada. They set the regulations, CATSA simply follows them' (CBC n.d.). CATSA has specifically mentioned their attention to public pressure (Auditor-General 2006), and continuously measures passenger satisfaction rates. Within the popular realm, journalists and government representatives had the roles as experts to 'speak authoritatively'. In these cases, CATSA representatives — who were experts on the legislated mandate of CATSA — were unable to convince the populace through press releases, interviews, etc. that CATSA was not responsible for the security breeches. The socio-political context of Canada also determined 'what might be said'. In particular, the extremely complex interplay of authorities and responsibilities at the airport was radically simplified: CATSA was represented as being solely responsible for aviation security. Any failures of airport security, by themselves or their subcontractors, were laid at the feet of CATSA — as demonstrated by the Minister of Transport calling the President of CATSA back to Ottawa immediately after the Montreal incidents. The success of the securitization of aviation security within this realm is clear in the public criticism of CATSA for not using enough emergency measures to contain this existential threat. The travelling public, which is frequently surveyed by CATSA about its customer service, plays a large role in CATSA's internal discussions, but a smaller role in its discussions with external agencies. These conclusions demonstrate why more nuance is needed in current models of securitization. More is going on than a simple politics of blame or bureaucratic infighting, although plainly some of those dynamics are in play. Rather, CATSA was being responsibilized for all of aviation security in Canada, despite its limited mandate. The popular pressure, I argue, is a representation of the 'facilitating conditions' in the popular imagination: the public was open to securitizing moves by the government. There is also the restriction of 'what might be said': in short, an over-simplification of complex regulatory systems and a misrepresentation of the level of attainable security. No system is completely secure — a fact that is often and easily acknowledged among experts in aviation security. But, this was not portrayed in the popular scene. Investigative journalists, in this case, had the position to speak authoritatively in a way that a Senator and other security experts did not. The public could only express their satisfaction with CATSA's screening as a customer service to CATSA, or in the popular media as a policing and counter-terrorism agency. The failure of the expansion of the security mandate of CATSA in the elite realm and the simultaneous popular critique of CATSA's mandate indicate that the setting matters. Scientific In addition to a set of technical debates, CATSA is also engaged with the scientific community on how to effectively and efficiently screen passengers. I want to focus on the primary adoption of the risk management model, since this has been exam ined in the Auditor-General's Special Examination and CATSA Act Review process. CATSA was responsible for the purchase and implementation of a wide-scale technological upgrade to explosive detection systems, to meet Canadian and international standards. It has also won awards for its technological innovation for the RAIC programme that uses biometric identification.14 There is also a robust debate in expert circles regarding the use of private firms for security screening, whether airport security can be left to the private sector or should be provided by the government (Frederickson and Laporte 2002; Hainmüller and Lemnitzer 200 3; Seidenstat 2004).15 CATSA is mandated to secure key elements of the civil aviation infrastructure through passenger screening. CATSA, however, provides screening according to the 'Security Screening Order', under the Aeronautics Act and the Canadian Aviation Security Regulations. As a crown corporation, CATSA is also bound by government policy to implement a 'risk management strategy', the key elements of which are the evaluation of potential impact and frequency of exposures to different risks. It then formulates a strategy that accepts, avoids, transfers, or mitigates that risk. Within this framework, 'It is government policy to identify, and reduce or eliminate risks to its property, interests and employees, to minimize and contain the costs and consequences in the event of harmful or damaging incidents arising from those risks, and to provide for adequate and timely compensation, restoration and recovery' (Canada. Treasury Board of Canada 2001). CATSA actively engaged the academic and expert communities in formulating its risk management strategy (Brodeur 2006),16 and its proposed Security Management Systems approach (Salter 2007). The CATSA executive asked for training in risk management and, in 2005, the International Centre for Comparative Criminology organized two seminars (in Paris and in Montréal) on risk management. The academic experts at these workshops represented the fields of surveillance studies, criminology, sociology, public health, environmental studies, and risk management itself. The core issues for the experts were the following: 'uncertainty theoretically supersedes risk and rule-based and risk-based models are not mutually exclusive in the promotion of security. Not only can they be reconciled in practice, but they m ust' (Brodeur 2006: 324). This poses two problems for CATSA, which later became evident in the CATSA Act Review and the Auditor-General's Special Examination: uncertainty within the public security fields makes measurement impossible; following security regulations alone would be insufficient to demonstrate risk management. Among the social scientists represented at the Montréal seminar, there was a consensus that the tactic of risk management, used often in environmental planning and other scientific realms, cannot be easily transferred to the social realm (Zedner 2006: 424). Ericson, an internationally renowned criminologist who pioneered the critical study of risk management, argued, 'risk management systems can restrict freedom, invade privacy, discriminate, and exclude populations. Such self-defeating costs and the uncertainties they entail can be minimized only by infusing risk management systems with value questions about human rights, well-being, prosperity, and solidarity' (2006: 346). These experts questioned not only the empirical reliability of risk management (Manning 2006: 457), but also the ideological function of screening by risk (O'Malley 2006: 420). These experts agreed that the move to a risk-based model of airport screening would require more specific intelligence and the widening of CATSA's mandate. But, they also stressed that because of the radical incalculability of the threat of terror, risk-based security screening had to be combined with rules-based screening. Since risk management could not prevent terror, and may cause potential problems, the problem of airport security had to be made explicitly political. Within these seminars, the setting was academic: experts were selected because of their scholarly credentials and the discourse was in an academic mode.17 At root, the experts attempted a desecuritizing move: since uncertainty trumps risk, the lack of metrics makes measurement (and thus management of risk) impossible. Thus, the security screening process must be political. Since a risk-based approach cannot guarantee security, and the risk- and rule-based systems were in some conflict, CATSA (and by implication Transport Canada, the regulator) must deal with these uncertainties and risks, sensitive to the politics of the situation. Screening procedures could not be an emergency, existential threat that required extraordinary powers or policies. Because security was unobtainable, the process had to remain steadfastly political. Though there was a consensus among the scientific field, this desecuritizing move failed — none of the other audiences were convinced, as demonstrated below in the review of the technocratic setting. Technocratic While the CATSA Act Review had the political elite as its audience, the Auditor-General's Special Examination had only the Office of the Auditor-General as its audience. It was also presented to the CATSA Board of Directors, with clear implications for the Minister — but the authors of the report were a team of auditors not politicians. A Special Examination of CATSA was undertaken by the Auditor-General of Canada during November 2005–June 2006 (a similar time period to the CATSA Act Review process). The Auditor-General appraised the extent to which CATSA was fulfilling and measuring its mandate, as well as other financial and management standards.18 It is beyond the mandate of the Auditor-General's Special Examination to analyse the mandate of the organization (Canada. Office of the Auditor General 2006: 9). CATSA tried to use the Special Examination as another venue to expand its mandate, which, as I argue above, is a securitizing move — accruing more governmental power to manage an existential threat. Just as CATSA attempted this with respect to the elite audience of the CATSA Act Review, they also attempted this in the technocratic setting. As the report concludes: 'CATSA does not wish to be constrained by its limited mandate. CATSA would like to have more control over the way screening operations are conducted, the allocation of screening staff, and the selection of screening equipment; and it would like direct access to intelligence information' (3). The case for the expansion of CATSA's mandate is made in terms of security, emergency, and extraordinary powers: it satisfies the internal criteria for a securitizing m ove. Here is the key moment: 'CATSA's view is that counterterrorism is a key aspect of its work. This is evident in CATSA documents . Transport Canada has stated that CATSA's current mandated responsibilities do not specifically include counter-terrorism' (14). The CATSA Act Review Advisory Panel also notes this troubled relationship: 'there appears to be a high level of frustration and mistrust between Transport Canada and CATSA at the national level' (CATSA Act Review 2006: 137). The Auditor-General's report is relatively neutral in this bureaucratic in-fighting but that neutrality stands as a rejection of the securitizing move. In short, the securitizing move fails because it does not accept 'security' as a legitimate justification for reevaluating the mandate of CATSA: 'This Special Examination did not question CATSA's mandate; rather it assessed CATSA's systems and practices within its mandate and the regulations that govern the aviation security system' (9). Despite the best efforts of CATSA to make the mandate part of the audit, in order to use the report as a tool in their securitizing move, the Auditor-General did not accept the move. Within the Auditor-General's review, who may speak and what may be said is radically different. CATSA officials prepared reports for the Auditor-General's team who also consulted with an expert team.19 The terms of reference for the report, however, were specific to the crown corporation model and its relevant legislation regarding financial administration. Essentially, security was not the object of study: however, risk management was under scrutiny. Thus, while similar messages were made by CATSA and Transport Canada, they were expressed in different, more managerial language. The audience for this report was primarily the Board of Directors, and indirectly the responsible Minister, Treasury Board Secretariat, and the Parliament of Canada to which the Auditor-General reports. However, the review results were also marshalled in the CATSA Act Review process, in order This dramaturgical analysis of CATSA during the crucial 2005– 2006 period has demonstrated the need for an analytical disaggregation of the actor–audience model in securitization theory. Within different settings (popular, elite, scientific, and technocratic), different actors were empowered to speak, and different audiences constituted — the rules of those discursive relationships were also impacted by setting. Stakeholders from the CATSA Act Review had no voice in the experts' academic workshop; reports on the measurement of security for the Advisory Panel were not used in the AuditorGeneral's Special Examination. These different settings also defined the content of securitizing moves: though there was a common desire to expand CATSA's security mandate, it was done with different arguments in the expert workshop, the Special Examination, and the CATSA Act Review. Finally, the CATSA case demonstrates the need to parse the success/failure of securitizing moves in a more to bolster the case for a refusal of the securitizing move to increase CATSA's mandate. Thus, the same securitizing/desecuritizing moves are played out, but in a totally different register within different sectors. Settings for Canadian Aviation Security nuanced way. CATSA's securitizing was premised on the acceptance of an existential threat (which is commonly believed), the description of a crisis or emergency (accepted by some and rejected by others), and the accrual of new executive power (which was move completely rejected). Top of page Conclusion The CS model of securitization is provocative and productive of many political and research agendas. Making the model more sensitive to who may speak, who can hear, and what can be said within particular settings allows us to evaluate the politics of successful moves to securitize or desecuritize an issue. This kind of analysis necessarily involves an examination of a particular setting over time, a factor often downplayed in CS analysis. Sector studies in public safety, security studies, migration, trafficking, minority rights, and disease can all benefit from a clearer consideration of audience–speaker co-constitution of authority and knowledge, the weight of social context, and the degree of success of Desecuritization is seen a priori as more politically preferable than securitization (Wæver 1999: 335). Deliberative politics are by definition more democratic than exceptional politics. This particular moves. has led to the important debate led by Aradau (2001, 2004, 2006), Alker (2006), Taureck (2006), Behnke (2006), Huysmans (2006), and Floyd (2007) on the ethical relationship of emancipation and politicization to securitizatio n. This follows analysts and experts must understand the political dynamics of successful securitization and from a productive discussion on the role of security experts (Eriksson 1999; Goldmann 1999; Wæver 1999; Williams 1999). While this article does not engage this debate extensively, we would argue that, tactically, desecuritization processes if they wish to intervene. In this, I once again take the lead from Foucault who says that his own analysis has sprung from his personal experiences and a kind of a malaise with objective, abstract, Archimedian theory. In building from his insider knowledge of and outsider status within institutions (such as the clinic, human sexuality, or the penal system), Foucault conducts a 'history of the present' — to ask not 'what does the prison mean' but 'how does the prison mean?' the process of successful securitization and desecuritization operates differently within different settings. If, as security experts, it is part of our role to intervene in the With particular experience in different realms of security studies, it seems that securitization theory might contribute to this kind of history of the present. This is to say that securitization /desecuritization process, then we must gain a tactical knowledge of the conditions for success and failure. There is an assumption in this debate about securitization/desecuritization that experts are significant or important voices. It is true that 'in writing or speaking security, the analyst him/herself executes a speech act, this speech act is successful if the problem raised becomes recognized as a security problem in the academy and/or in the wider policy making discourse' (Floyd 2007: 336). Case organizations New upgrades prevent grid collapse Kemp 12 -- Reuters market analyst (John, 4/5/12, "COLUMN-Phasors and blackouts on the U.S. power grid: John Kemp," http://www.reuters.com/article/2012/04/05/column-smart-grid-idUSL6E8F59W120120405) The hoped-for solution to grid instability is something called the North American SynchroPhasor Initiative (NASPI), which sounds like something out of Star Trek but is in fact a collaboration between the federal government and industry to improve grid monitoring and control by using modern communications technology. More than 500 phasor monitoring units have so far been installed across the transmission network to take precise measurements of frequency, voltage and other aspects of power quality on the grid up to 30 times per second (compared with once every four seconds using conventional technology). Units are synchronised using GPS to enable users to build up a comprehensive real-time picture of how power is flowing across the grid (www.naspi.org/Home.aspx and). It is a scaled-up version of the monitoring system developed by the University of Tennessee's Power Information Technology Laboratory using inexpensive frequency monitors that plug into ordinary wall sockets. Tennessee's FNET project provides highly aggregated data to the public via its website. The systems being developed under NASPI provide a much finer level of detail that will reveal congestion and disturbances on individual transmission lines and particular zones so that grid managers can act quickly to restore balance or isolate failures (). Terrorism is not an existential threat – at most it will kill a few hundred people a year – the fear of terrorism is overblown. Mueller ‘11 John Mueller is Professor of Political Science at Ohio State University. He is the author of Atomic Obsession. “The truth about al Qaeda”. August 5, 2011. CNN’s Global Public Square. http://globalpublicsquare.blogs.cnn.com/2011/08/05/the-truth-about-alqaeda/ Outside of war zones, the amount of killing carried out by al Qaeda and al Qaeda linkees, maybes, and wannabes throughout the entire world since 9/11 stands at perhaps a few hundred per year. That's a few hundred too many, of course, but it scarcely presents an existential, or elephantine, threat. And the likelihood that an American will be killed by a terrorist of any ilk stands at one in 3.5 million per year, even with 9/11 included. That probability will remain unchanged unless terrorists are able to increase their capabilities massively - and obtaining nuclear weapons would allow them to do so. Although al Qaeda may have dreamed from time to time about getting such weapons, no other terrorist group has even gone so far as to indulge in such dreams, with the exception of the Japanese cult Aum Shinrikyo, which leased the mineral rights to an Australian sheep ranch that sat on uranium deposits, purchased some semi-relevant equipment, and tried to buy a finished bomb from the Russians. That experience, however, cannot be very encouraging to the would-be atomic terrorist. Even though it was flush with funds and undistracted by drone attacks (or even by much surveillance), Aum Shinrikyo abandoned its atomic efforts in frustration very early on. It then moved to biological weapons, another complete failure that inspired its leader to suggest that fears expressed in the United States of a biological attack were actually a ruse to tempt terrorist groups to pursue the weapons. The group did finally manage to release some sarin gas in a Tokyo subway that killed 13 and led to the group's terminal shutdown, as well as to 16 years (and counting) of pronouncements that WMD terrorism is the wave of the future. No elephants there, either. Claims of an existential risk from terrorism are false Fettweis, Professor of Political Science, ‘10 Chris, Professor of Political Science @ Tulane,Threat and Anxiety in US Foreign Policy, Survival, 52:2 Conventional war, much less outright assault, is not the leading security challenge in the minds of most Americans today. Instead, irregular or non- state actors, especially terrorists, top the list of threats to the West since 11 September 2001. The primary guiding principle of US foreign policymaking, for better or worse, is the continuing struggle against terrorism. President Bush repeatedly used the term ‘Islamofascists’ to describe the enemy that he re-oriented the US defence establishment to fight, transforming al-Qaeda from a ragtag band of lunatics into a threat to the republic itself. It is not uncommon for even sober analysts to claim that Islamic terrorists present an ‘existential threat’ to the United States, especially if they were ever to employ nuclear, biological or chemical weapons. Perhaps it is Parkinson’s Law that inspires some analysts to compare Islamic fundamentalists with the great enemies of the past, such as the Nazis or the Communists, since no rational analysis of their destructive potential would allow such a conclu- sion. Threat is a function of capabilities and intent; even if al-Qaeda has the intent to threaten the existence of the United States, it does not possess the capability to do so. Terrorism doesn’t pose an existential risk Fettweis, Professor of Political Science, ‘10 Chris, Professor of Political Science @ Tulane,Threat and Anxiety in US Foreign Policy, Survival, 52:2 Even terrorists equipped with nuclear, biological or chemical weapons would be incapable of causing damage so cataclysmic that it would prove fatal to modern states. Though the prospect of terrorists obtaining and using such weapons is one of the most consistently terrifying scenarios of the new era, it is also highly unlikely and not nearly as dangerous as sometimes portrayed. As the well-funded, well-staffed Aum Shinrikyo cult found out in the 1990s, workable forms of weapons of mass destruction are hard to purchase, harder still to synthesise without state help, and challenging to use effectively. The Japanese group managed to kill a dozen people on the Tokyo subway system at rush hour. While tragic, the attack was hardly the stuff of apocalyptic nightmares. Super-weapons are simply not easy for even the most sophisticated non-state actors to use.31 If terror- ists were able to overcome the substantial obstacles and use the most destructive weapons in a densely populated area, the outcome would of course be terrible for those unfortunate enough to be nearby. But we should not operate under the illusion that doomsday would arrive. Modern industrialised countries can cope with disasters, both natural and man-made. As unpleasant as such events would be, they do not represent existential threats. No Mexican or Latin American failed state—reject media hype by Martín Paredes ·El Paso News February 28, 2014 “George Friedman: Mexico is not a Failed State” http://elpasonews.org/2014/02/george-friedman-mexico-failed-state/ ac 8-27 A failed state read the headlines. Doom and gloom, Mexico was about to implode led the news cycles starting around 2008. A revolution as about to start south of the US border, it was just a matter of days. Fast forward to today and the notion that Mexico is on the verge of becoming a failed state is as idiotic today as it was then . The news reporters happily interviewed the dubious characters predicting Mexico’s failures because to lead with Mexico’s imminent demise was an easy sell for the US appetite for sensational headlines .¶ I understand that the news media has to attract eyeballs in order to stay in business. Eyeballs sell advertising and the more eyeballs the more financially stable the news outlet is. Most of the time when I am discussing the state of the news media with a reporter and news outlet executive the topic of tabloids leads to heated discussions about ethics in journalism. That discussion invariably leads to how blogging has destroyed the profession of the professional news outlet. I always counter that the demise of the newspapers and news outlets to Internet delivered news is a direct result of the failure of the traditional news outlets adhering to the basics of fair and ethical news reporting.¶ The demise of the traditional news media came about when sensationalism became the accepted practice rather than the exception. I don’t blame the so-called experts on everything drug cartel related because they are nothing more than individuals looking to make a quick buck by proclaiming themselves experts on the drug traffickers in Mexico.¶ The notion of the imminent failure of Mexico was started by information peddler George Friedman in May of 2008 with his self-serving, make-another-dollar opinion that was nothing more than another charlatan peddling his goods to those willing to buy. The problem with people like Friedman is that the news media is too happy to label them “experts” in order to ply their sensational headlines to their audience.¶ George Friedman’s company and raison d’ete is his company Stratfor. Stratfor peddles “strategic analysis” about geopolitics. In essence, the company has self-proclaimed itself as an expert in global security in order to sell its publications to individuals and governments. It peddles self-proclaimed expertise in security. The problem though is that their security “expertise” apparently doesn’t include their own operations because in 2011, the hacker group Anonymous broke into their systems. In February 2012, Wikileaks began publishing the stolen emails.¶ Friedman’s Stratfor has taken the position that you can’t trust the released emails because they will not confirm which ones are authenticate and which ones may be doctored after they were stolen. To me, this position is nothing more than a desperate attempt to discount the theft of their emails. Regardless, for a so-called expert on “security” the theft of their emails shows a distinct failure in their ability to protect themselves and thus the security of their clients.¶ For his part, George Friedman, born in Budapest Hungary is a former professor and now an author and owner of Stratfor. He peddles information to those willing to buy it. I am sure you are all aware of the famous phrase; “those who can’t, teach”. Most appropriate for Friedman.¶ A Failed State is generally defined as a country that has lost some or all control over its sovereignty. The fact is that Mexico, even at the height of the Mexican Drug War never relinquished control over its sovereignty. I am sure some of you will argue that there were and are pockets of criminality in Mexico that seem to surpass the government’s ability to maintain control. However, all of that rhetoric ignores a fundamental reality; a failed state has a failed economy and an ineffective government. So, let’s take a look at those two functions.¶ Has the Mexican economy faltered?¶ The World Bank ranks Mexico’s economy as the second largest economy south of the Rio Bravo (Rio Grande), behind Brazil. This month Moody’s rated Mexico as A3, the first time the country has received an “A” rating in its entire history. Keep in mind that the rating is derived from actions taken by two administrations under two different political parties.¶ I wish George Friedman would explain to everyone how it is that a country on the verge of collapse is able to attain an A rating for its economy. Somehow, I don’t expect he will, as it isn’t something he can sell to the news outlets and his subscribers looking for doom-and-gloom coming from Mexico.¶ Somehow, a country on the verge of collapse, according to George Friedman is on the road to becoming the United States’ number one automobile exporter this year. Again, how is it that a country on the verge of collapse continues to build enough automobiles to outpace Canada and Japan?¶ Clearly, the Mexican economy is not on the verge of collapse and therefore the country’s government is in full control. So, let’s a take a look at the transition of power. ¶ On December 1, 2012, President Enrique Peña Nieto took office. Mexico had effectively transitioned power from one government to another. Former President Felipe Calderon Hinojosa, who initiated the Mexican Drug War, democratically relinquished power in a transition from one party to another. Both US president Barack Obama and leftist president Hugo Chavez both agreed that the transfer of power was properly completed.¶ In other words, two opposing political ideologies both agreed that Mexico’s electoral process was completed properly under the law. In fact, Mexico has now transitioned power from one party, to another and back to the original party making Mexico a two-party country.¶ So much for the notion that Mexico was on the verge of collapse.¶ The problem of the drug cartels is a significant problem for Mexico but it is a geopolitical problem with many facets at work at the same time. For the most part Mexico has risen to the occasion and has demonstrated that far from being a failed state, it is in fact an economically growing country in full control of its sovereignty. As much as the naysayers want it to be, the facts are that Mexico is not some backwards country on the border holding the US back. Rather it is a country that the US should be proud to call a friend.¶ Unfortunately, for people like George Friedman and those who subscribe to his voodoo research the facts are just inconvenient things that should be ignored. Proliferation is slow, doesn’t cascade, and doesn’t cause conflict – 60 years of empirics prove DeGarmo 2011 Denise, professor of international relations at Southern Illinois University, “Proliferation Leads to Peace” Unfortunately, while the fear of proliferation is pervasive, it is unfounded and lacks an understanding of the evidence. Nuclear proliferation has been slow . From 1945 to 1970, only six countries acquired nuclear weapons: United States, Russia, United Kingdom, France, China, and Israel. Since the Nuclear Non-Proliferation Treaty came into effect in 1970, only three countries have joined the nuclear club: India, Pakistan, and North Korea. In total, only .05% of the world’s states have nuclear weapons in their possession. Supporters of non-proliferation seem to overlook the fact that there are states currently capable of making nuclear weapons and have chosen not to construct them, which illustrates the seriousness with which states consider their entrance into the nuclear club. Included on this list are such actors as: Japan, Argentina, Brazil, Egypt, Iran, South Korea, Taiwan, and South Africa. The attraction of nuclear weapons is multifold. Nuclear weapons enhance the international status of states that possess them and help insecure states feel more secure. States also seek nuclear capabilities for offensive purposes. It is important to point out that while nuclear weapons have spread very slowly, conventional weapons have proliferated exponentially across the globe. The wars of the 21st century are being fought in the peripheral regions of the globe that are undergoing conventional weapons proliferation. What the pundits of non-proliferation forget to mention are the many lessons that are learned from the nuclear world. Nuclear weapons provide stability just as they did during the Cold War era. The fear ofMutual Assured Destruction (MAD) loomed heavily on the minds of nuclear powers through out the Cold War and continues to be an important consideration for nuclear states today. States do not strike first unless they are assured of a military victory, and the probability of a military victory is diminished by fear that their actions would prompt a swift retaliation by other states. In other words, states with nuclear weapons are deterred by another state’s second-strike capabilities. During the Cold War, the United States and Soviet Union could not destroy enough of the other’s massive arsenal of nuclear weapons to make a retaliatory strike bearable. Even the prospect of a small number of nuclear weapons being placed in Cuba by the Soviets had a great deterrent effect on the United States. Nothing can be done with nuclear weapons other than to use them for deterrent purposes. If deterrence works reliably, as it has done over the past 60 plus years, then there is less to be feared from nuclear proliferation than there is from convention warfare. econ Growth ensures overshoot and extinction--tech can't save us, only rapid collapse spurs consciousness shift Barry, president, Ecological Internet and PhD, Land Resources, University of Wisconsin-Madison, "Ecology Bubble Bursts," Earth Meanders, 7--25--11, www.ecoearth.info/blog/2011/07/earth_meanders_ecology_bubble.asp#more, accessed 2-2-13. Dr. Glen Ever since the human family embraced a growth based mentality and obsequious faith in liberal economics, we have witnessed a series of bubbles. The most recent boom-bust cycle has been the still unresolved financial and mortgage bubbles, but bubbles go as far back as the Dutch tulip mania of 1637. Exuberant yet clearly unsustainable growth, or inversely destruction, appears to be inherent to industrial, speculative, and growth obsessed capitalism. Bubbles represent the human proclivity for greed, to grow too fast, overshooting demand, while often exhausting key resources. Global ecology, the biggest bubble of all, is now collapsing and will soon burst. Voracious economic and human growth have raged for three centuries upon the back of dismantling ecosystems globally. Humanity’s economic outputs have been over-valued relative to the ecologically mediated resources incautiously razed for their production. Earth’s carrying capacity - meaning ecology's finite ability to provide ecosystem services and absorb pollution – has been surpassed. Having grown beyond what Earth can bear, the human family is said to be in "overshoot", which can only lead to collapse. Earth is a living being and like all life can die . Earth is dying now as virus-like humanity destroys its host's ecosystem organs. Every day we scrape Earth of its plants and animals, dig and drill into toxic “resources” not meant to be unearthed, and crap our wastes into air, land and water. Systems biology tells us an exponentially growing system in positive feedback – such as the super-sized economy feasting upon finite and precious global ecology – always eventually destroys itself. This is particularly so given perilous lag times of many ecosystem processes and losses. The ecological systems underlying human existence are beginning to burst like bubbles . Virtually every type of ecosystem and their output – fish, food, water, air, climate, forests, land, wetlands, soil, etc – are now collapsing locally and regionally. We are witnessing this steady biological impoverishment, of virtually every life-giving ecosystem, aggregate to the whole biosphere – the thin mantle of life surrounding an otherwise lifeless Earth. When speaking of a biosphere bubble burst it is accurate to say Earth is dying. And that it need not be that way, if only we were able to change to maintain ecosystems that foster all human and life’s being. Ecology has provided a constant stream of services to humanity and other life, making Earth habitable, for what seems like eternity. Food offers one illustrative example of humanity’s utter dependence upon ecology: sun, water, soil, climate, seeds and healthy agro-ecological systems are where food comes from - not grocery stores and mini-marts. That we need air, water, soil and other ecosystems are demonstrable truths – unlike beliefs in unknowable ancient messiahs, which have guided so much of Earth ecology’s destruction. Industrial capitalism is dependent upon destroying ecosystems as resources for temporary increases in the well-being of some. While climate change is one of several global ecosystems that are collapsing due to human over-use, it is important to remember there are other collapsing ecological systems – including soil, water, forest, wetland, nitrogen, ocean, toxic, ecosystem, poverty, food and others - that singly and together threaten continued human and ecological being. It is these potentially cumulative impacts of several assaults upon key global ecosystems that are most problematic and potentially chaotic. And it’s not even done fairly, as 2.5 billion live on under $2 a day. The industrial growth machine’s rampant misuse of inappropriate technology to rip apart Earth’s life-support systems for endless frivolous wants by some as others starve and eke out a living must yield to some basic truths. If we are to sustain the required ecosystem habitats necessary, we cannot cut and burn them simultaneously, or multiply to such numbers that we overwhelm them. If you’ve ever seen an over-grazed pasture you know what over-population does to a limited land and resource base – human population must be urgently and humanely reduced. Hubristic faith in technological solutions to Earth being beyond its carrying capacity is fanatical madness . Continued technological reliance to “solve” Earth’s ecological carrying capacity problem will only inflate the bubble further and result in a bigger bursting , and less remnants from which to try to reconstitute an ecologically based future. Inane techno-optimism such as geoengineering is ecocide right up to the end – pushing Earth to the wall, raping her, before killing her. It is far preferable to begin to adjust human demands upon ecology to reasonable limits. Not only is ecology truth, and you cannot eat money, but collapsing ecosystems are not substitutable with technology. What to do? We need knowledge based solutions to sustaining global ecology that are also just, equitable and enhance human dignity - not superstitious, illogical, greedy, and ignorant responses of god's self-chosen ruling elites. It is too late to stop the global ecology bubble from bursting . Yet a short window exists, perhaps, to lessen the impact of the ecology bubble burst, and provide for some manner of decent existence and potential for restoration and regeneration of a new human/nature project post-collapse. But if we continue to do nothing, or next to nothing, the cumulative impacts of global ecological collapse will intensify and prove to be unrecoverable, unless met with opposing force to end the ecocidal activities surpassing ecology's limits. It is time for us to return to the land, air, water and oceans and fight for their and our protection and restoration. Simply we must embrace ecological restoration, ecosystem protection, industrial power down, escalating protest and a people’s power Earth Revolution. For continued shared survival the human family must protect and restore natural ecosystems as the keystone response to biodiversity, ecosystem, climate, food, water, poverty and rights crises. Few are doing so as rigorously as is necessary. Both the perpetrators and greenwashers of ecosystem destruction must be confronted with a wave of people power protests for ecologically sufficient policies like ending primary forest logging, fossil fuels and industrial agriculture. Existing non-violent, direct action protest is fine and must be enlarged, though it has not yet, nor is it likely to be, scaled to an extent able to win on its own. We will need to further intensify our efforts to use the wide myriad of civil and uncivil disobedience tactics known that disrupt ecocide. And if these appeals are not responded to affirmatively after 40 years of stonewalling, we may need to escalate tactics to sabotage, carefully targeted insurgency, and as a last resort, guerrilla warfare. We face a planetary ecological emergency. Misery and premature death from ecological collapse is all our fates unless we together and all at once resist ecocide. If we all rush and dismantle a coal mine or old forest logging operation, and when asked who did, we respond we all did, we will have won. To speak of sustaining ecology while pursuing anything less than the destruction and overthrow of the industrial growth machine is greenwash and subject itself to being destroyed. The only hope for surviving and regenerating from ecology’s burst bubble is to stop destroying ecosystems and change how we live – including more sustainability, equity and justice. Maybe people aren’t ready for what I have to say, but I am going to keep saying it because it is ecology truth vital for shared human and all life’s survival. At times it is hard to be heard because I and my organization Ecological Internet refuse to sugar coat our message as we take on difficult issues with ecological science based diagnoses and recommendations. In a world of so much hurt, pain and illness; it is outrageous to futilely cling to an industrial consumer way of living that destroys ecology, people and all that is good and necessary to simply live. Do not wait for others to heal yourself or your relationship with Earth. You have to start now and work harder at both, doing what your conscience tells you is necessary, and taking full responsibility for doing so. Collapse spurs transition which solves Lewis, Instructor, UC-Boulder, “Global Industrial Society: The Necessary Collapse,” ON THE EDGE OF SCARSITY, ed. M. Dobkowski & I. Walliman, Syracuse University Press, 2002, p. 25-26. Chris H. The First World’s failure to modernize and civilize the world should be seen not as a tragedy, but as an opportunity. With the increasing recognition of the inability of development to resolve the economic and political contradictions it creates, whether you call it sustainable or not, peoples and communities will be once again forced to draw on their own cultures, histories, religions, and intimate knowledge of their local environments to improve their lives and ensure a “reasonable life” for their children. For most of history, successfully adapting to changing local and regional environments was the fundamental challenge facing human societies. The only alternative we now have is to recognize the very real, imminent collapse of global industrial civilization. Instead of seeing this collapse as a tragedy, and trying to put “Humpty-Dumpty” back together again, we must see it as a real opportunity to solve some of the basic economic, political, and social problems created and exacerbated by the de velopment of global industrial civilization since the I 600s. Instead of insisting on coordinated global actions, we should encourage selfsufficiency through the creation of local and regional economies and trading networks (Norgaard 1994). We must help political and economic leaders understand that the more their countries arc tied to the global economic system, the more risk there is of serious economic and political collapse. The First World~s effort to impose the WTO and globalization on the rest of the world in the 1990s and early 2000s is a last-ditch effort to keep global industrial civilization from unraveling. Who knows, but the recent collapse of the WT() Third Ministerial meeting in Seattle in No— vember 1999, the Jubilee 2000 movement Indeed, we are witnessing the increasing collapse of global industrial civ- ilization. My guess is that sometime between 2010 and 2050 we will see its final collapse. to cancel all Third World debt, and increasing challenges to World Bank and IMF policies might be harbingers of this global collapse. econ decline solves war Daniel Deudney, Hewlett Fellow in Science, Technology, and Society at the Center for Energy and Environmental Studies at Princeton, , “Environment and Security: Muddled Thinking”, BULLETIN OF THE ATOMIC SCIENTISTS, April 1991p. 27, google books, umn-rks Poverty Wars. In a second scenario, declining living standards first cause internal turmoil. then war. If groups at all levels of affluence protect their standard of living by pushing deprivation on other groups class war and revolutionary upheavals could result. Faced with these pressures, liberal democracy and free market systems could increasingly be replaced by authoritarian systems capable of maintaining minimum order.9 If authoritarian regimes are more war-prone because they lack democratic control, and if revolutionary regimes are warprone because of their ideological fervor and isolation, then the world is likely to become more violent. The record of previous depressions supports the proposition that widespread economic stagnation and unmet economic expectations contribute to international conflict. Although initially compelling, this scenario has major flaws. One is that it is arguably based on unsound economic theory. Wealth is formed not so much by the availability of cheap natural resources as by capital formation through savings and more efficient production. Many resource-poor countries, like Japan, are very wealthy, while many countries with more extensive resources are poor. Environmental constraints require an end to economic growth based on growing use of raw materials, but not necessarily an end to growth in the production of goods and services. In addition, economic decline does not necessarily produce conflict. How societies respond to economic decline may largely depend upon the rate at which such declines occur. And as people get poorer, they may become less willing to spend scarce resources for military forces. As Bernard Brodie observed about the modein era, “The predisposing factors to military aggression are full bellies, not empty ones.”’” The experience of economic depressions over the last two centuries may be irrelevant, because such depressions were characterized by under-utilized production capacity and falling resource prices. In the 1930 increased military spending stimulated economies, but if economic growth is retarded by environmental constraints, military spending will exacerbate the problem. Power Wars. A third scenario is that environmental degradation might cause war by altering the relative power of states; that is, newly stronger states may be tempted to prey upon the newly weaker ones, or weakened states may attack and lock in their positions before their power ebbs firther. But such alterations might not lead to war as readily as the lessons of history suggest, because economic power and military power are not as tightly coupled as in the past. The economic power positions of Germany and Japan have changed greatly since World War 11, but these changes have not been accompanied by war or threat of war. In the contemporary world, whole industries rise, fall, and relocate, causing substantial fluctuations in the economic well-being of regions and peoples without producing wars. There is no reason to believe that changes in relative wealth and power caused by the uneven impact of environmental degradation would inevitably lead to war. Even if environmental degradation were to destroy the basic social and economic fabric of a country or region, the impact on international order may not be very great. Among the first casualties in such country would be the capacity to wage war. The poor and wretched of the earth may be able to deny an outside aggressor an easy conquest, but they are themselves a minimal threat to other states. Contemporary offensive military operations require complex organizational skills, specialized industrial products and surplus wealth. 2NC Rejection opens up space for alternatives Burke, School of Political Science and International Studies, University of Queensland 2002 [Anthony, Aporias of Security, Alternatives 27] It is perhaps easy to become despondent, but as countless struggles for freedom, justice, and social transformation have proved, a sense of seriousness can be tempered with the knowledge that many tools are already available—and where they are not, the effort to create a productive new critical sensibility is well advanced. There is also a crucial political opening within the liberal problematic itself, in the sense that it assumes that power is most effective when it is absorbed as truth, consented to and desired— which creates an important space for refusal. As Colin Gordon argues, Foucault thought that the very possibility of governing was conditional on it being credible to the governed as well as the governing. This throws weight onto the question of how security works as a technology of subjectivity. It is to take up Foucault's challenge, framed as a reversal of the liberal progressive movement of being we have seen in Hegel, not to discover who or what we are so much as to refuse what we are. Just as security rules subjectivity as both a totalizing and individualizing blackmail and promise, it is at these levels that we can intervene. We can critique the machinic frameworks of possibility represented by law, policy, economic regulation, and diplomacy, while challenging the way these institutions deploy language to draw individual subjects into their consensual web. This suggests, at least provisionally, a dual strategy. The first asserts the space for agency, both in challenging available possibilities for being and their larger socioeconomic implications. Roland Bleiker formulates an idea of agency that shifts away from the lone (male) hero overthrowing the social order in a decisive act of rebellion to one that understands both the thickness of social power and its "fissures," "fragmentation," and "thinness." We must, he says, "observe how an individual may be able to escape the discursive order and influence its shifting boundaries. ... By doing so, discursive terrains of dissent all of a sudden appear where forces of domination previously seemed invincible." Pushing beyond security requires tactics that can work at many-levels— that empower individuals to recognize the larger social, cultural, and economic implications of the everyday forms of desire, subjection, and discipline they encounter, to challenge and rewrite them, and that in turn contribute to collective efforts to transform the larger structures of being, exchange, and power that sustain (and have been sustained by) these forms. As Derrida suggests, this is to open up aporetic possibilities that transgress and call into question the boundaries of the self, society, and the international that security seeks to imagine and police. The second seeks new ethical principles based on a critique of the rigid and repressive forms of identity that security has heretofore offered. Thus writers such as Rosalyn Diprose, William Connolly, and Moira Gatens have sought to imagine a new ethical relationship that thinks difference not on the basis of the same but on the basis of a dialogue with the other that might, allow space for the unknown and unfamiliar, for a "debate and engagement with the other's law and the other's ethics"—an encounter that involves a transformation of the self rather than the other. Thus while the sweep and power of security must be acknowledged, it must also be refused: at the simultaneous levels of individual identity, social order, and macroeconomic possibility, it would entail another kind of work on "ourselves"—a political refusal of the One, the imagination of an other that never returns to the same. It would be to ask if there is a world after security, and what its shimmering possibilities might be. Method comes first Smith ‘96 [Steve, Professor of International Politics at the University of Wales, Aberystwyth, “Positivism and Beyond,” International theory: Positivism and beyond, New York: Cambridge University Press, 12-1 3] The stakes are high in such a debate. This much is clear from the way that mainstream theorists have responded to the rise of the approaches that Lapid groups together as post-positivist (and which I above called ‘critical theories’). One particularly important response has been that of Robert Keohane, who, in his Presidential Address to the International Studies Association in 1988, spoke of the need to evaluate the rival research paradigms of rationalist (i.e. traditional neo-realism and neo-liberalism) and reflective 9i.e. what I termed ‘critial’) approaches in terms of their testable theories, without which ‘they will remain on the margins of the filed ... [since] it will be impossible to evaluate their research program’ (1989, pp. 173-4). As is noted below, this form of response reveals the dominance of positivism, since Keohane issues the challenge on ground that are themselves positivist. Thus, positivism is precisely what is at issue in what Lapid calls the third debate because of its role in underpinning theory, and ultimately, serving as the criterion for judgin between theory. Crucially, Keohane’s criterion for judging between rationalist and reflective theories takes place on criteria that not only favor rtaionalism, but, more importantly, are exactly the criteria that reflective accounts are attacking. But note that a failure to come up to the (positivist) mark will result in reflective work being confined to questions as to what counts as knowledge but also involve the standing of theories and theorists within academia. All of this makes it very important to be clear as to how positivism operates in international theory, and to show how it is seen not merely as one explicit alternative among many but rather as the implicit ‘gold standard’ against which all approaches are evaluated. But the stakes are also high because of the links between theory and practice. International theory underpins and informs international practice, even if there is a lengthy lag between the high- point of theories and their gradual absorption into political debate. Once established as common sense, theories become incredibly powerful since they delineate not simply what can be known but also what it is sensible to talk about or suggest. Those who swim outside these safe waters risk more than simply the judgement that their theories are wrong; their entire ethical or moral stance may be ridiculed or seen as dangerous iust because their theoretical assumptions are deemed as unrealistic. Defining common sense is therefore the ultimate act of political power. In this sense what is at stake in debates about epistemology is very significant for political practice. Theories do not simply explain or predict, they tell us what possibilities exist for human action and intervention they define not merely our explanatory possibilities but also our ethical and practical horizons. In this Kantian light epistemology matters, and the stakes are far more considerable than at first sight seem to be the case. It’s legit to reject bad theory… policy based on false assumptions is disastrous in unpredictable ways James 05 (Harold, “Empire and Its Alternatives,” Annual Review of Political Science, June, Vol. 8: 23-48) How Theory Can Aid Policy (in Theory) Although many policy makers dismiss academic theorizing and many academics criticize the actions of government officials, theory and policy are inextricably linked. Each day, policy makers must try to figure out which events merit attention and which items or issues can be ignored, and they must select objectives and choose policy instruments that will achieve them. Whether correct or not, they do this on the basis of some sort of theory.¶ Furthermore, policy debates in both domestic and foreign affairs often hinge on competing theoretical claims, and each participant believes his or her preferred policy option will produce the desired result. For example, competing prescriptions for halting the ethnic conflicts in Bosnia and Kosovo rested in part on different theories about the underlying causes of these wars. Those who favored intervening to establish a multiethnic democracy in Bosnia (and Kosovo) tended to blame the fighting on the machinations of autocratic leaders such as Slobodan Milosevic, whereas those who favored ethnic partition blamed the conflict on a security dilemma created by intermingled populations (cf. Kaufmann 1996, Stedman 1997, Sambanis 2000). More recently, the debate over war against Iraq hinged in part on competing factual claims (did Iraq have weapons of mass destruction or not?) but also on competing forecasts about the long-term effects of the war. Advocates believed war would lead to a rapid victory, encourage neighboring regimes to “bandwagon” with the United States, hasten the spread of democracy in the region, and ultimately undermine support for Islamic terrorism. Their opponents argued that the war would have exactly the opposite effects (Sifry & Cerf 2003), and these disagreements arose in part because of fundamentally different views about the basic dynamics of interstate relations.¶ History also shows that bad theories can lead directly to foreign policy disasters. Prior to World War I, for example, Admiral Von Tirpitz's infamous “risk theory” argued that German acquisition of a large battle fleet would threaten British naval supremacy and deter Great Britain from opposing German dominance of the continent; in fact, the building of the fleet merely accelerated Britain's alignment with Germany's continental opponents (Kennedy 1983). During the Cold War, Soviet policy in the Third World was justified by Marxist claims that the developing world was evolving in a socialist direction, and that this evolution would naturally incline these states to ally with the USSR. This theory of cooperation was flawed on both counts, which helps explain why Soviet efforts to build influence in the developing world were costly and disappointing (Rubinstein 1990). Similarly, U.S. intervention in Indochina and Central America was justified in part by the so-called domino theory, even though the logic and evidence supporting the theory were dubious at best (Slater 1987, 1993–1994). All of these examples show how bad IR theories can lead policy makers astray. Securitization causes us to lurch from one constructed threat to another while ignoring real issues- this causes extinction Carafano 9 (Mar 5, 2009 6:50 PM., Moderator James Jay Carafano, Ph.D., is Senior Research Fellow for National Security and Homeland Security in the Douglas and Sarah Allison Center for Foreign Pol-icy Studies, a division of the Kathryn and Shelby Cullom Davis Institute for International Studies) Trying to keep America safe, free, and prosperous by picking the next danger of the day—is just plain stupid. The right answer is to focus on building a nation that is strong and competitive—and then we’ll be able to out run, out compete, out fight, and out last anything that comes along. Lemming Security Washington wants to worry about the danger of the day competing with China, taming Iraq, reacting to Russia, reassuring skittish global financial markets. Sure, the next president will need to deal with these. But if the White House sets its national security priorities by lurching from one crisis to the next, there will be no priorities beyond the morning headlines on CNN . On the flip side, some in Washington want to pick which problems to address and ignore others (usually the ones they pick are the ones that best fit their ideology…and their answer to meeting the preferred challenges turn out to be exactly how they want to handle the threat and cost exactly what they are willing to spend). This amounts to playing Russian roulette with national security. We have done this through out our history….and we often lose (remember The Maine, Pearl Harbor, Just Cause, Desert Storm, and 9/11 to name a few occasions when we wound-up fighting enemies at times and places we did not expect). Washington whipsaws back and forth between Manichean extremes (worrying about today’s headlines or fixating on watching out for burglars while the house is on fire). It is just idiotic to sit in Washington and try to play Nostradamus. We Have Met the Enemy In short, the real danger is us. The greatest proliferation threat to human existence is not weapons of mass destruction, but policymakers with mass disruption on their mind - officials who would label every matter , from avoiding bird flu to procuring fresh water, a “national security” issue . To make matters more confusing, international organizations such as the United Nations have created terms such as “human security,” arguing for a collective responsibility to keep people free from want and fear. The problem with that approach is the tendency, in dealing with security interests, to centralize power and decision-making and restrain individual freedoms and free markets. The concept of national security needs to be put back in the box, reserved for moments of peril in dealing with people It also justifies military solutions for everything from dealing with AIDS to oil. Making every global challenge a security issue trumps free markets and limits personal freedoms. (either states or non-states) who threaten through the use of violence to take away the political freedoms that governments are supposed to protect. We need to put an end to national- Rather than fixating on threats we ought to be focusing on expanding our capacity to keep the nation safe, free, and prosperous regardless of the enemies that rise up against us. What would we should be asking ourselves is what we can do to advance that agenda. The answer to that question is easy. First, focus on the security proliferation. "Real" Security instruments of national power. They all have to be strong from defense to diplomacy. They must be multi-faceted too—able to tackle enemy states and the enemy within. Yes, great powers need to able to “walk and chew gum” at the same time, dealing with different threats in different places. Second, we need to keep the nation strong. Unless Washington adopts an unashamedly pro-competitive agenda in the near term, America will cease to be a first-rate global competitor in the long term. Not even the most competitive liberal democracy can hope to overcome a government that works against the best interests of its citizens. It would be like world-class sprinters who tie their own shoelaces together. Sustaining America's competitive edge is a vital part of ensuring a successful national security. Nobody respects a loser. Promoting free trade, educating the U.S. workforce, unshackling innovation, and investment are key to keeping this a nation a force to be reckoned with. As long as we remain free, safe, and prosperous we will able to outrun any state or non-state threat and…. ....we won’t have to waste our time answering stupid questions. Opposing view: CAP Argument Rebuttal to Opening Arguments: Priorities for National Security I think the Nina Hachigian post is a great example of exactly the wrong approach to take national security. As a way of rebuttal, I would say, "read my post." I did not know what Nina was going to write when I drafted my comments, but my comments were directed at refuting exactly the kinds of things she proposes—treating every world problem as a national security issue. I am not suggesting that we ignore climate change, poverty, There are concrete steps to address global issues like these including: Poverty, corruption, and lack of civil society. pandemics, or any other global issues. I am just arguing let us not treat them as national security problems. Predictions fail—complex systems prove Overcoming Our Aversion to Acknowledging Our Ignorance by Dan Gardner and Philip Tetlock 11 Lead Essay July 11th, 2011 http://www.cato-unbound.org/2011/07/11/dan-gardner-and-philip-tetlock/overcoming-our-aversionto-acknowledging-our-ignorance/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+catounbound+%28Cato+Unbound%29 But only to some extent, unfortunately. Natural science has discovered in the past half-century that the dream of evergrowing predictive mastery of a deterministic universe may well be just that, a dream. There increasingly appear to be fundamental limits to what we can ever hope to predict. Take the earthquake in Japan. Once upon a time, scientists were confident that as their understanding of geology advanced, so would their ability to predict such disasters. No longer. As with so many natural phenomena, earthquakes are the product of what scientists call “complex systems,” or systems which are more than the sum of their parts. Complex systems are often stable not because there is nothing going on within them but because they contain many dynamic forces pushing against each other in just the right combination to keep everything in place. The stability produced by these interlocking forces can often withstand shocks but even a tiny change in some internal conditional at just the right spot and just the right moment can throw off the internal forces just enough to destabilize the system—and the ground beneath our feet that has been so stable for so long suddenly buckles and heaves in the violent spasm we call an earthquake. Barring new insights that shatter existing paradigms, it will forever be impossible to make time-and-place predictions in such complex systems. The best we can hope to do is get a sense of the probabilities involved. And even that is a tall order. Human systems like economies are complex systems, with all that entails. And bear in mind that human systems are not made of sand, rock, snowflakes, and the other stuff that behaves so unpredictably in natural systems. They’re made of people: self-aware beings who see, think, talk, and attempt to predict each other’s behavior—and who are continually adapting to each other’s efforts to predict each other’s behavior, adding layer after layer of new calculations and new complexity. All this adds new barriers to accurate prediction. When governments the world over were surprised by this year’s events in the Middle East, accusing fingers were pointed at intelligence agencies. Why hadn’t they seen it coming? “We are not clairvoyant,” James R. Clapper Jr, director of national intelligence, told a hearing of the House intelligence committee. Analysts were well aware that forces capable of generating unrest were present in Tunisia, Egypt, and elsewhere. They said so often. But those forces had been present for years, even decades. “Specific triggers for how and when instability would lead to the collapse of various regimes cannot always be known or predicted,” Clapper said. That is a considerable understatement. Remember that it was a single suicidal protest by a lone Tunisian fruit seller that set off the tumult, just as an infinitesimal shift can apparently precipitate an earthquake. But even after the unrest had begun, predicting what would follow and how it would conclude was a fool’s errand because events were contingent on the choices of millions of people, and those choices were contingent on perceptions that could and did change constantly. Say you’re an Egyptian. You’re in Cairo. You want to go to the protest but you’re afraid. If you go and others don’t, the protest will fail. You may be arrested and tortured. But if everyone goes, you will have safety in numbers and be much likelier to win the day. Perhaps. It’s also possible that a massive turnout will make the government desperate enough to order soldiers to open fire. Which the soldiers may or may not do, depending in part on whether they perceive the government or the protestors to have the upper hand. In this atmosphere, rumors and emotions surge through the population like electric charges. Excitement gives way to terror in an instant. Despair to hope. And back again. What will people do? How will the government react? Nothing is certain until it happens. And then many pundits declare whatever happened was inevitable. Indeed, they saw it coming all along, or so they believe in hindsight. So we are not blind but there are serious limits to how far we can see. Weather forecasting is a useful model to keep in mind. We joke about weather forecasters but they have some good mental habits we should all practice: making explicit predictions and revising them in response to clear timely feedback. The net result is that weather forecasters are one of the best calibrated of all professional groups studied—up there with professional bridge players. They have a good sense for what they do and do not know. But well calibrated does not mean omniscient. As weather forecasters well know, their accuracy extends out only a few days. Three or four days out, they are less accurate. Beyond a week, you might as well flip a coin. As scientists learn more about weather, and computing power and sophistication grow, this forecasting horizon may be pushed out somewhat, but there will always be a point beyond which meteorologists cannot see, even in theory. We call this phenomenon the diminishing marginal predictive returns of knowledge. In political and economic forecasting, we reach the inflection point surprisingly quickly. It lies in the vicinity of attentive readers of high-quality news outlets, such as The Economist. The predictive value added of Ph.Ds, tenured professorships and Nobel Prizes is not zero but it is disconcertingly close to zero. So we should be suspicious of pundits waving credentials and adopt the old trust-but-verify mantra: test the accuracy of forecasts and continually be on the lookout for new methods that improve results. We must also accept that even if we were to do this on a grand scale, and our forecasts were to become as accurate as we can possibly make them, there would still be failure, uncertainty, and surprise. And The World In Whatever-The-Next-Year-Is would continue to look quite different from the world in whatever the next year is. First, scenario planning is worthless – any action can have disastrous consequences, but the aff’s claims are remote and disprove by years of history Hanson, 05 [Sven Ove - Professor of Philosophy and History at the Royal Institute of Technology, “The Epistemology of Technological Risk,” Volume 9, Winter 2005] http://scholar.lib.vt.edu/ejournals/SPT/v9n2/hansson.html However, it would not be feasible to take such possibilities into account in all decisions that we make. In a sense, any decision may have catastrophic unforeseen consequences. If far-reaching indirect effects are taken into account, then – given the unpredictable nature of actual causation – almost any decision may lead to a disaster. In order to be able to decide and act, we therefore have to disregard many of the more remote possibilities. Cases can also easily be found in which it was an advantage that far-fetched dangers were not taken seriously. One case in point is the false alarm on so-called polywater, an alleged polymeric form of water. In 1969, the prestigious scientific journal Nature printed a letter that warned against producing polywater. The substance might "grow at the expense of normal water under any conditions found in the environment," thus replacing all natural water on earth and destroying all life on this planet. (Donahoe 1969 ) Soon afterwards, it was shown that polywater is a non-existent entity. If the warning had been heeded, then no attempts would had been made to replicate the polywater experiments, and we might still not have known that polywater does not exist. In cases like this, appeals to the possibility of unknown dangers may stop investigations and thus prevent scientific and technological progress. We therefore need criteria to determine when the possibility of unknown dangers should be taken seriously and when it can be neglected. This problem cannot be solved with probability calculus or other exact mathematical methods. The best that we can hope for is a set of informal criteria that can be used to support intuitive judgement. The following list of four criteria has been proposed for this purpose. (Hansson 1996) 1. Asymmetry of uncertainty: Possibly, a decision to build a second bridge between Sweden and Denmark will lead through some unforeseeable causal chain to a nuclear war. Possibly, it is the other way around so that a decision not to build such a bridge will lead to a nuclear war. We have no reason why one or the other of these two causal chains should be more probable, or otherwise more worthy of our attention, than the other. On the other hand, the introduction of a new species of earthworm is connected with much more uncertainty than the option not to introduce the new species. Such asymmetry is a necessary but insufficient condition for taking the issue of unknown dangers into serious consideration. 2. Novelty: Unknown dangers come mainly from new and untested phenomena. The emission of a new substance into the stratosphere constitutes a qualitative novelty, whereas the construction of a new bridge does not. An interesting example of the novelty factor can be found in particle physics. Before new and more powerful particle accelerators have been built, physicists have sometimes feared that the new levels of energy might generate a new phase of matter that accretes every atom of the earth. The decision to regard these and similar fears as groundless has been based on observations showing that the earth is already under constant bombardment from outer space of particles with the same or higher energies. (Ruthen 1993) 3. Spatial and temporal limitations: If the effects of a proposed measure are known to be limited in space or time, then these limitations reduce the urgency of the possible unknown effects associated with the measure. The absence of such limitations contributes to the severity of many ecological problems, such as global emissions and the spread of chemically stable pesticides. 4. Interference with complex systems in balance: Complex systems such as ecosystems and the atmospheric system are known to have reached some type of balance, which may be impossible to restore after a major disturbance. Due to this irreversibility, uncontrolled interference with such systems is connected with a high degree of uncertainty. (Arguably, the same can be said of uncontrolled interference with economic systems; this is an argument for piecemeal rather than drastic economic reforms.) It might be argued that we do not know that these systems can resist even minor perturbations. If causation is chaotic, then for all that we know, a minor modification of the liturgy of the Church of England may trigger a major ecological disaster in Africa. If we assume that all cause-effect relationships are chaotic, then the very idea of planning and taking precautions seems to lose its meaning. However, such a world-view would leave us entirely without guidance, even in situations when we consider ourselves well-informed. Fortunately, experience does not bear out this pessimistic worldview. Accumulated experience and theoretical reflection strongly indicate that certain types of influences on ecological systems can be withstood, whereas others cannot. The same applies to technological, economic, social, and political systems, although our knowledge about their resilience towards various disturbances has not been sufficiently systematized. They can’t “take back” their speech act- operating outside security is key Trombetta 8 (Maria Julia Trombetta, (Delft University of Technology, postdoctoral researcher at the department of Economics of Infrastructures) 3/19/08 http://archive.sgir.eu/uploads/Trombettathe_securitization_of_the_environment_and_the_transformation_of_security.pdf This is problematic for the School, which argues that “ transcending a security problem by politicising it cannot happen through thematization in security terms, only away from such terms .”(Wæver 1995: 56) For the School, once the enemy logic has been inscribed in a context, it is very difficult to return to an open debate. Nevertheless the various politicizations of environmental issues that followed the appeal to security – those the CopS dismissed as failed securitizations - seem to reinforce the argument, suggested by Edkins, that there is a tendency to politicize issues through their securitization. (Edkins 1999: 11) This represents another signal that securitization, within the environmental sector, can take a different form, and that the problematic aspects of evoking security are not so evident. Securitization theory, for the CopS, is meant to be descriptive, however the environmental sector suggests that some of its aspects prevent it from providing an adequate instrument for analysis. To understand why this occurs, it is necessary to explore in more detail the conceptualization of security by Wæver, who has introduced securitization within the School and is the strongest opponent of any attempt to securitize the environment. Wæver’s formulation of securitization is influenced by what is called a generic interpretation of language. (Huysmans 2002: 45) This approach suggests that the meaning of a word is captured not by looking at its definition but by analysing its common use and the practices that it produces.13[13] In Wæver’s words, “from a study of the discursive practices using the concept of security it is argued, that there is a particular logic of security.” Accordingly, he suggests “distilling this definite usage of the concept of security from security practice.”(Wæver 1997: 361) This approach could be very receptive to the transformations in the use of words and emphasises the transformative potential of discourses. However, this does not seem to be the case with securitization. The following analysis will show how a static and de-contextualised understanding of speech acts contributes to justifying this assumption. Wæver’s understanding of speech acts is based, as noted earlier, on the philosophy of language of Austin. However, Wæver’s reading of Austin is influenced by Derrida’s interpretation14[14]. To clarify the point it is necessary to note that Austin’s work has suggested two interpretations. The first one, largely based on Searle’s work, argues that performative communication is the communication of an intentional meaning: “understanding the utterance consists in recognizing the illocutionary intentions of the author” (Searle 1977: 202) and “these intentions may be more or less perfectly realised by the words uttered” (Searle 1977: 202). The second tradition is that of continental philosophy whose position is clearly expressed by Derrida, who cannot accept Searle’s assumptions on communication and intentionality. Derrida in “Signature Event Context,”(1982) an essay on Austin’s speech act theory, recognizes in Austin the great merit of challenging the traditional theory of communication, opening it up “to what is other than the transmission of thoughtcontent.”(Payne 1995: 9) and accordingly outlining the capability of words of establishing meanings that are not yet in the context, transforming the latter beyond the intention of the speaker. The problem, for Derrida, is that Austin fails to live up to his initial promise, since he still demands “the conscious presence of the intention of the speaking subject” as well as “an exhaustive As a result, “performative communication remains the communication of an intentional meaning, even if this meaning has no referent in the form of a prior or exterior thing or state of things.” (Payne, 1995: 9) For Derrida, on the contrary, a performative can be successful independently determinable context.” (Derrida 1982: 322) from the intention and presence of the speaker. It just needs to conform to a repeatable model . To Austin’s contextualised understanding of 13[13] “In this approach, the meaning of a concept lies in its usage and is not something we can define analytically or philosophically according to what would be ‘best’ ” (Buzan et al., 1998: 24). 14[14] See Ceyhan, 1998. performative, Derrida “opposes … the irreducible absence of intention which is inescapable in all language.”(Payne, 1995: 9) For Waever “A speech act is interesting exactly because it holds the insurrecting potential to break the ordinary, to establish meaning that is not already in the context” (Wæver, 2000: 286, fn7). Wæver, following Derrida, believes that the intention of the speaker and the contextual analysis are irrelevant ( see Ceyhan 1998: 7) since security is a self-referential practice . In other words, the meaning of security held by the speakers (national security or common security) and their intentions (militarising the environment or promoting emancipation) drop out of the picture, the only relevant aspect being the practices (exceptional measures, breaking of the rules, agonistic perspectives) associated with the realist logic of security and brought into presence by a felicitous performative: securitization . As a result of de-contextualizing the analysis and ignoring the intentions of the speaker, the meaning of security needs to be fixed and itereable, independently from the context, because it cannot change and be specified according to the context in which it is to be used. In this way, a set of specific practices becomes the yardstick to identify what security is within different sectors and for different actors. On recognising that the speakers, or writers cannot control the meaning of their utterance. The origin of every speech act can only be more or less anonymous societies, and their results are, to some extent, unpredictable.15[15] Securitization is the one hand, Waever, following Derrida, has the great merit of not only about the strategic use of the word security and the success of securitization moves are uncertain and unpredictable. On the other hand, Waever, seems to limit the unpredictability of securitization to its success, since he seems to assume that to make communication possible, if context and intention are irrelevant, meaning should be fixed and iterable. However, even if signification is possible only through iteration, iterability “supposes a minimal remainder…in order that the identity of the selfsame be repeatable and identifiable in, through and even in view of its alteration.” (Derrida, quoted in Zehfuss 2002: 200) Waever is aware that the logic of security he has described refers to a specific disciplinary discourse and tradition and he has shown that securitization depicts the national security paradigm that emerged after the Second World War (Wæver 2002), capturing a concept that “radically transformed ‘security’ by marrying it to the homeless concept with no name: Raison d’état.”(Wæver 2002: 44). Nevertheless, Waever has provided a mechanism that essentializes a set of security practices, perpetuating the logic of national security and the understanding of the political that lays 15[15] In this way Waever can explain, for instance, the paradoxical effects that turn the attempts to transform and green security into militarization of the environment. bbehind it. Perm leaves fundamental assumptions unchallenged and wards off critique Burke 7 (Anthony Burke, Senior Lecturer @ School of Politics & IR @ Univ. of New South Wales, ‘7 [Beyond Security, Ethics and Violence, p. 231-2] However, the reasons for pursuing a critical analysis relate not only to the most destructive or controversial approaches, such as the war in Iraq, but also to their available (and generally preferable) alternatives . There is a necessity to question not merely extremist versions such as the Bush doctrine, Indonesian militarism or Israeli expansionism, but also their mainstream critiques - whether they take the form of liberal policy approaches in international relations (IR), just war theory, US realism, optimistic accounts of globalisation, rhetorics of sensitivity to cultural difference, or centrist Israeli security discourses based on territorial compromise with the Palestinians. The surface appearance of lively (and often significant) debate masks a deeper agreement about major concepts , forms of political identity and the imperative to secure them . Debates about when and how it may be effective and legitimate to use military force in tandem with other policy options, for example, mask a more fundamental discursive consensus about the meaning of security, the effectiveness of strategic power, the nature of progress, the value of freedom or the promises of national and cultural identity. As a result, political and intellectual debate about insecurity, violent conflict and global injustice can become hostage to a claustrophic structure of political and ethical possibility that systematically wards off critique. *** Displacement DA: The perm only trades one form of securitization for another—also leaves underlying assumption unchallenged Ronnie D. Lipschutz 2-k, Associate Prof at UC-Santa Cruz, “The Insecurity Dilemma,” AFTER AUTHORITY, State University of New York Press: Albany, 2000,, page 56-7. Finally, we might ask why "redefine security?" Who advocates such an idea? During the 1980s, at the time this argument was first made (Ullman, 1983; Mathews, 1989), the individuals comprising this group were an amorphous lot, lacking an integrated institutional base or intellectual framework (a situation that has slowly changed during the 1990s). Most tended to see consensual definitions and dominant discourses of security as failing to properly perceive or understand the objective threat environment, but they did not question the logic whereby threats and security were defined. In other words, the redefiners pro-posed that the "real" threats to security were different from those that policymakers and defense authorities were generally concerned about, but that the threats were "really out there." The redefiners argued further that the failure to recognize real threats could have two serious consequences: First, it might underminine state legitimacy, inasmuch as a national defense that did not serve to protect or enhance the general welfare (which is what "security" often comes to mean) would lose public support. Second, it would repro-duce a response system whose costs would increasingly outweigh benefits. At the same time, however, the redefiners did not propose a shift away from state-based conceptions of security; rather, their arguments sought to buttress eroding state authority by delineating new realms for state action . Thus, for example, discussions of "environmental security" focused on the need for governments to establish themselves as meaningful actors in environmental protection as it related to state maintenance. This would mean establishing a sovereignty claim in a realm heretofore unoccupied, and defining that realm as critical in security terms.23 Profiteers of the drug war use Mexican failed state imagery to continuously create enemies and maintain violence Todd Schack Aug 11 (Assistant Professor, Department of Journalism at Ithaca College, PhD in Media Studies from the University of Colorado; “Twentyfirst-century drug warriors: the press, privateers and the for-profit waging of the war on drugs,” Media, War & Conflict, Vol. 4 No. 2, pg. 142-161, Sage Journals) Here we come to the heart of the matter: the media hype, hyperbole and moral panic have actual consequences , and it is worthwhile asking the cui bono question: who, exactly, is benefitting, because there are billions of dollars at stake, and the question of funding or not funding certain contracts explains more about what’s really happening than all the sensational reports based on exaggeration, un-sourced claims, and lack of statistics. Crucial to understanding this question of funding is one final point: that politicians in favor of the militarized response to the ‘drug war’ (which includes privatizing the effort) must hold at all times the simultaneously contradictory position that, while the problem is worse than ever, they are actually succeeding in their goals. Carlsen (2009: 1) points out that: Through late February and early March, a blitzkrieg of declarations from U.S. government and military officials and pundits hit the media, claiming that Mexico was alternately at risk of being a ‘Failed State,’ a ‘Narco-state’, on the verge of ‘Civil War’, and as posing a direct threat to US National Security through ‘spill-over’ … In the same breath, we’re told that President Calderon with the aid of the US Government is winning the war on drugs, significantly weakening organized crime, and restoring order and legality. None of these claims are true. In fact, this rhetorical double-bind is not only stock-in-trade for the entire drug control establishment, and has been for years, but is familiar to a variety of what Howard S Becker (1963: 157) famously termed ‘moral entrepreneurs’: Enforcement organizations, particularly when they are seeking funds, typically oscillate between two kinds of claims. First, they say that by reason of their efforts the problem they deal with is approaching solution. But, in the same breath, they say the problem is perhaps worse than ever (though through no fault of their own) and requires renewed and increased effort to keep it under control. This rhetorical situation has defined the war on drugs since at least Nixon, and the enforcement organizations – the drug control establishment – have grown into what Reeves and Campbell (1994) call the ‘narco-carceral complex’ which, with the rise of privatization, has become the for-profit industrialization of the drug war. In other words, there is nothing new regarding the rhetorical situation whereby this industry justifies itself, only pages taken out of a well-worn playbook and applied to the newest chapter in the continuing saga that is the drug war. What is new, however, is the fact that the private security contractors stand to benefit most – and that is precisely the point of this article: The motivations behind the recent hype vary. Alarmist cries of a Mexican collapse help clinch the passage of measures to further militarize the southern border and obtain juicy contracts for private defense and security firms. Local politicians are finding they can be a cash cow for federal aid. (Carlsen, 2009: 2) So too are the five firms who won the $15 billion dollar Pentagon contract in 2007, and aiding the effort was every breathless, over-hyped report of Mexico as a ‘failed state’, or of ‘spill-over’ violence, reports that are especially useful during yearly funding cycles, as happened in 2009: The formation of local, state and national budgets at the beginning of the year provides an opportunity for politicians to exaggerate the threat posed by Mexican drug cartels and thereby receive more funding for local police forces … Indeed, Texas Homeland Security Director Steve McCraw stressed that the spillover had already occurred in asking state lawmakers to approve a $135 million increase in funding requested by Texas Governor Rick Perry. (Arana, 2009) Therefore this is not simply a matter of press hype and sensationalism – if it were it would be a matter of cultural relevance perhaps, but not political and economic. Using Becker’s term ‘moral entrepreneurs’, Reeves and Campbell (1994: 150) write that this synergy between the press and those who profit from a crisis is a well-established tactic in war profiteering: In the political economy of drug control, journalism is a market force that often raises the stock of moral entrepreneurs who profit from escalations in the war on drugs … Like the merchants of war devoted to perpetuating the power of the military-industrial complex, the moral entrepreneurs … – and their journalistic comrades – are in the hysteria business. This is precisely where moral panic theory and the concept of disaster capitalism converge, in the advancing of the three aligning interests: the press, which is perpetuating – and profiting from – the notion that the situation is at ‘crisis’ levels; the private security contracting industry, which is financially self-interested in perpetuating the ‘crisis’; and government, which is seeking methods of absolving itself from public accountability for carrying out unpopular policy, and plausible deniability for when things go wrong. What is crucial, and what moral panics have proved to be so proficient at doing, is the creation and maintenance of the notion of ‘crisis’, and the creation of an inextinguishable source of renewable enemies that justify the existence of these moral entrepreneurs-turned-industrialists. Writing about the crack cocaine scare in the 1980s, but relevant here, Reeves and Campbell (1994: 20) conclude that: Consequently, with nothing to gain and everything to lose from declaring a victory in the war on drugs, the drug control establishment’s networks of power, knowledge, and discipline have a vested interest in maintaining a perpetual sense of urgency, even a sense of hysteria, about cocaine pollution. It is in this way that the increasing use of private contractors, and the re-conceptualization of the wars on terror and drugs as for-profit endeavors can be likened to an addiction: ‘Our military outsourcing has become an addiction, and we’re headed straight for a crash’ (Singer, 2007). It is an addiction of policy that – if recent history in Colombia, Iraq, Afghanistan, and now Mexico are any guide – will result in impunity, plausible deniability, will make the 21st-century drug warriors very wealthy, and will not in any measurable manner result in gains made against the global flow of drugs. Discourse of economic catastrophe is a self-fulfilling prophecy Ferguson 9 ( 'There will be blood' Harvard economic historian Niall Ferguson predicts prolonged financial hardship, even civil war, before the ‘Great Recession' ends HEATHER SCOFFIELD Globe and Mail Update February 23, 2009 at 6:45 PM PURPLE Niall Ferguson: “One possibility is that they don't believe these numbers either. They feel that it's good for morale. The truth about the crisis is that it is in large measure psychological. We're not dealing here with mathematics. We're not dealing here with human beings as calculating machines. We're dealing with real people whose emotions influence their individual decisions, and the swing from greed to fear is a very spectacular thing when it happens on this scale . “One possibility is that policy makers are lying in order to encourage people and prevent depression from become a self-fulfilling psychological conditions . That's why it's called a depression … Maybe they don't really believe this, but they're saying it in order to cheer people up, and if they're sufficiently consistent, perhaps people will start to believe it, and then it will magically happen.” Niall “The other way of looking at that is to say every time a politician uses a word like ‘catastrophe' or ‘depression' to pressurize legislators into passing a stimulus package, for example, the signal goes out to the public that this is bad. And it gets worse . That's one of the interesting things that both President Bush and President Obama have done. Bush used that wonderful phrase, “this sucker's going down.” Obama talks about catastrophe at the critical moment when he wanted Congress to pass the package. It reminds me of a wonderful headline that the Onion had last year, in about October. The headline was, Bush calls for panic . I love it because it completely called the situation. There he was calling for panic ... to make people come out of denial. I've been talking a while about this being the Great Repression. It took ages, ages, for people to realize this thing had fallen apart. “August, 2007, was when this crisis began. And if you were really watching the markets carefully, April is when it began, when the various hedge funds started to hemorrhage. The stock markets carried on until October of that year. And in many ways, consumer behaviour in the U.S. did not change until the third quarter of 2008. So there was a massive denial problem. It was like Wile E. Coyote running off a cliff, and they'd run off a cliff and they didn't look down so they didn't start falling. As soon as people realized it was bad, the behaviour switched. Now, people have to try to unscare them before this thing becomes a self-perpetuating downward spiral. I think that's why you have to say ‘growth will return in 2010' with your fingers crossed behind your back.” Alliances are instruments of security – contradictory responses to constructed threats Dillon And Reid 2000 (PHD; researches the problematisation of politics, security and war & PhD in Politics (Michael And Dillon, “Global Governance, Liberal Peace, and Complex Emerge” Alternatives: Local, Global, Political Vol. 25 Issue 1 Jan-Mar 2000 JSTOR http://www.jstor.org/stable/40644986) Emerging political complexes in Africa and Eurasia have therefore become the "strange attractors" around which novel security-development alliances of states, international organiza- tions, international nongovernmental organizations, and local nongovernmental organizations have formed within the domain of liberal peace and at the interface of its turbulent border ter- rain.9 Global liberal governance thus responds to the turbulence of emerging political complexes by forming its own emerging strategic complexes as a means of dealing with the instances of violence that the densely mediated polities of the West periodi-cally find unacceptable there, or in response to the security threats that they are generally said to pose. The resultant assem-blages are often coalitions of the willing, the accidental, and the ready to hand. Their formation and intervention are selective, in-fluenced by media attention, and by economic and geostrategic interests at least as much as by the calculation or anticipation of need. Such diverse multiple international/interagency networks pose novel strategic and political questions not only for their own con-tingent formations but also to the order of liberal peace as such. Their accounts of the sources of disorder are varied and conflict- ing, yet they also offer new rationales for Western armed forces and their allied arms economies. The outcome can be quite con-tradictory: military attachés can be committed both to selling arms and to selling "security reform" measures designed to intro- duce Westernstyle policing, the rule of law, and demilitarization. Through the advent of such emerging strategic de-velopment analysts have become as interested in conflict, war, and security as security specialists have become interested in develop-ment economics, civil society, and conflict resolution.10 In the process, the liberal peace of global governance. exposes its allied face of humanitarian war. An additional feature of these strategic complexes is, however, also a deep and profound confusion about military purpose and military strategy. That in turn promotes a new liberal bull market complexes, for strategic ideas in the aftermath of the dissolution of Cold War discourse.11 1NR Multiple structural factors check war Christopher J Fettweis, National Security Decision Making Department, US Naval War College, December 06, “A Revolution in International Relation Theory: Or, What If Mueller Is Right?”, International Studies Review, Volume 8, Issue 4, Wiley, umn-rks The obsolescence-of-major-war argument is familiar enough to need little introduction (Mueller 1989, 1995, 2004; see also Rosecrance 1986, 1999; Ray 1989; Kaysen 1990; Van Evera 1990–1991; Kegley 1993; Jervis 2002; Mandelbaum 2002). In its most basic and common form, the thesis holds that a broad shift in attitudes toward warfare has occurred within the most powerful states of the international system, virtually removing the possibility for the kind of war that pits the strongest states against each other. Major wars, fought by the most powerful members of the international system, are, in Michael Mandelbaum's (1998/1999:20) words, “somewhere between impossible and unlikely.” The argument is founded upon a traditional liberal faith in the possibility of moral progress within the society of great powers, which has created for the first time “an almost universal sense that the deliberate launching of a war can no longer be justified” (Ray 1989:425; also Luard 1986, 1989). To use Francis Fukayama's (1992) phrase, it is the “autonomous power of ideas” that has brought major war to an end. Whereas past leaders were at times compelled by the masses to use force in the defense of the national honor, today popular pressures urge peaceful resolutions to disputes between industrialized states. This normative shift has all but removed warfare from the set of options before policymakers, making it a highly unlikely outcome. Mueller (1989:11) has referred to the abolition of slavery and dueling as precedents. “Dueling, a form of violence famed and fabled for centuries, is avoided not merely because it has ceased to seem ‘necessary,’ but because it has sunk from thought as a viable, conscious possibility. You can't fight a duel if the idea of doing so never occurs to you or your opponent.” By extension, states cannot fight wars if doing so does not occur to them or to their opponent. Major war has become, in Mueller's words, “sub-rationally unthinkable.” Obviously, the obsolescence-of-majorwar argument is not without critics. First, and most basic, the literature is sometimes quite vague about what constitutes a “major war” and who exactly the “great powers” are. In Retreat from Doomsday, Mueller (1989) alternately describes his data set as consisting of “developed countries” (p. 4), the “first and second worlds” (p. 256), the “major and not-somajor countries” (p. 5), and the 44 wealthiest states (p. 252). Others refer to the great powers as those states with a certain minimum standard of living, especially those in Europe (Luard 1986:398); modern, “industrial societies” (Kaysen 1990); the “leading global powers” (Väyrynen 2006:13); or merely “the most powerful members of the international system” (Mandelbaum 1998/1999:21). What constitutes a “major” war is also often left unclear. Some analyses use arbitrary quantitative values (for example, 1,000 battle deaths); others study only world wars, those fought by the most powerful members of the international system, drawing on all their resources, with the potential to lead to outcomes of “revolutionary geopolitical consequences including the birth and death of regimes, the redrawing of borders, and the reordering of the hierarchy of sovereign states” (Mandelbaum 1998/1999:20). Definitions are often the last refuge of academic scoundrels—many IR theories deal with potentially contradictory information by simply refining or redefining the data under consideration. Perhaps the best way to avoid this pitfall is to err on the side of inclusion, expanding the analysis as broadly as possible. While the obsolescence-ofmajor-war argument clearly covers the kind of catastrophic wars that Mandelbaum analyzes, any big war between industrialized, powerful states would render the proposition false. At its essence, like pornography, one knows major war when one sees it. Major powers will likely occasionally deem it in their interest to strike the minor, and at times small, states, especially those led by nondemocratic, unenlightened leaders. But societal unease at the continuation of small wars—such as those in Afghanistan and Iraq or between poor, weak states like Ethiopia and Eritrea—should be ameliorated by the knowledge that, for the first time in history, world war is exceedingly unlikely. Determining which states are great powers is slightly more complicated, but not by much. Two decades ago, Jack Levy (1983:10) noted that the importance of the concept of “great power” was not matched by anything approaching analytical precision in its use and the field has not progressed much since. Relevant states for this analysis are those with the potential to be great powers, whether that potential is realized or not. The choice not to devote a large portion of one's national resources toward territorial defense was not available to most states in other, bygone eras. If today's rich states can choose not to prepare for war without consequence, then the nature of the system may well have changed. Broadly speaking, there is an indirect relationship between the relative level of development and the chances of being involved in a major war against a peer. In its most basic, inclusive, and falsifiable form, the obsolescence-of-major-war argument postulates that the most advanced countries—roughly speaking, those in the global north—are unlikely to fight one another ever again. Precise determination of which countries are in the “north” and which are not is less important than it may seem at first, since current versions of the argument do not restrict themselves to the great powers. As will be discussed below, if the logic behind the obsolescence-of-major-war argument is correct, a drastic diminution of all kinds of war everywhere may be on the horizon. It is important to note that this argument does not suggest that competition is coming to a conclusion, only that the means to compete have changed. Rivalry will continue; envy, hubris, and lust for power will likely never disappear. Rogues and outlaws will probably always plague humanity, but very rarely as leaders of powerful states, especially in the northern democracies. The Mueller argument merely holds that war need not follow from any of this, especially major wars. States can compete in nonviolent ways, addressing the logic of war with the grammar of commerce, to paraphrase Edward Luttwak (1990:19). The conflicts of the future may be fought in boardrooms rather than battlefields, using diplomacy, sanctions, and the methods of commerce rather than brute force. One of the obvious strengths of the obsolescence-of-major-war argument is that it carries clear routes to falsification. It can be proven incorrect by virtually any big war in Western Europe, in the Pacific Rim, or in North America. If Japan attacks Australia, if the United States moves north, or if Germany rises again and makes another thrust at Paris and Moscow, Retreat from Doomsday will join The Great Illusion (Angell [1909] 1913) in the skeptical realist's list of utopian fantasies. Until that happens, however, scholars are left to explain one of the great anomalies in the history of the international system.Most IR scholarship carries on as if such an anomaly simply does not exist. This is especially true of realists, whose theories typically leave little room for fundamental systemic change (Lebow 1994). “The game of politics does not change from age to age,” argued a skeptical Colin Gray (1999:163), “let alone from decade to decade.” Indeed, the most powerful counterargument to Mueller—and one that is ultimately unanswerable—is that this period of peace will be temporary and that someday these trends will be reversed. Neorealists traditionally contend that the anarchic structure of the system stacks the deck against long-term stability, which accounts for “war's dismal recurrence throughout the millennia,” in the words of Kenneth Waltz (1989:44). Other scholars are skeptical about the explanatory power of ideas, at least as independent variables in models of state behavior (Mearsheimer 1994/1995; Brooks and Wohlforth 2000/2001; Copeland 2003). However, one need not be convinced about the potential for ideas to transform international politics to believe that major war is extremely unlikely to recur. Mueller, Mandelbaum, Ray, and others may give primary credit for the end of major war to ideational evolution akin to that which made slavery and dueling obsolete, but others have interpreted the causal chain quite differently. Neoliberal institutionalists have long argued that complex economic interdependence can have a pacifying effect upon state behavior (Keohane and Nye 1977, 1987). Richard Rosecrance (1986, 1999) has contended that evolution in socio-economic organization has altered the shortest, most rational route to state prosperity in ways that make war unlikely. Finally, many others have argued that credit for great power peace can be given to the existence of nuclear weapons, which make aggression irrational (Jervis 1989; Kagan et al. 1999). With so many overlapping and mutually reinforcing explanations, at times the end of major war may seem to be overdetermined (Jervis 2002:8–9). For purposes of the present discussion, successful identification of the exact cause of this fundamental change in state behavior is probably not as important as belief in its existence. In other words, the outcome is far more important than the mechanism. The importance of Mueller's argument for the field of IR is ultimately not dependent upon why major war has become obsolete, only that it has. Almost as significant, all these proposed explanations have one important point in common: they all imply that change will be permanent. Normative/ideational evolution is typically unidirectional—few would argue that it is likely, for instance, for slavery or dueling to return in this century. The complexity of economic interdependence is deepening as time goes on and going at a quicker pace. And, obviously, nuclear weapons cannot be uninvented and (at least at this point) no foolproof defense against their use seems to be on the horizon. The combination of forces that may have brought major war to an end seems to be unlikely to allow its return. The twentieth century witnessed an unprecedented pace of evolution in all areas of human endeavor, from science and medicine to philosophy and religion. In such an atmosphere, it is not difficult to imagine that attitudes toward the venerable institution of war may also have experienced rapid evolution and that its obsolescence could become plausible, perhaps even probable, in spite of thousands of years of violent precedent. The burden of proof would seem to be on those who maintain that the “rules of the game” of international politics, including the rules of war, are the lone area of human interaction immune to fundamental evolution and that, due to these immutable and eternal rules, war will always be with us. Rather than ask how major war could have grown obsolete, perhaps scholars should ask why anyone should believe that it could not. No asia war - costs of aggression are too high Porter 14 Dr. Patrick Porter is a reader in War and International Security and Leverhulme Research Fellow at the University of Reading, and a fellow of the UK Chief of the Defence Staff’s Strategic Forum, War on the Rocks, January 28, 2014, "IT’S TIME TO ABANDON THE GLOBAL VILLAGE MYTH", http://warontherocks.com/2014/01/its-time-to-abandon-the-global-village-myth/ Strategic space is not a politically uncontested thoroughfare of climate and terrain simply to be moved through. (That is not even true of tourism!) Space is a medium into which other humans intrude, through which (and for which) violent political struggle takes place. Amidst the white noise of globalisation rhetoric, this distinction has been lost. Nowhere is this more true than along Asia’s maritime peripheries. New weapons and instruments have widened, rather than shrunk, the Asia-Pacific space . Surveillance assets in the hands of watchful defenders make it harder to inflict a sudden surprise missiles— make long-range attack like Pearl Harbor. Tools of “access denial”—such as long-range anti-ship it easier for states to fend off enemy fleets and raise the costs of aggression. Even weaker enemies can inflict a devastating, even fatal sting on aggressors . This makes it harder for America to intervene in a war with China—but harder also for China to expand. Conquest has become an expensive rarity. US-Russian nuclear war highly improbable. Desmond Ball, professor at the Strategic Defence Studies Centre of The Australian National University, “The probabilities of 'On the Beach' Assessing 'Armageddon Scenarios' in the 21st Century,” Manning Clark House Symposium Science and Ethics: Can Homo sapiens Survive?, May 2005. http://www.manningclark.org.au/papers/se05_ball.html. The prospects of a nuclear war between the US and Russia must now be deemed fairly remote. There are now no geostrategic issues that warrant nuclear competition and no inclination in either Washington or Moscow to provoke such issues. US and Russian strategic forces have been taken off day-to-day alert and their ICBMs 'de-targeted', greatly reducing the possibilities of war by accident, inadvertence or miscalculation. On the other hand, while the US-Russia strategic competition is in abeyance, there are several aspects of current US nuclear weapons policy which are profoundly disturbing. In December 2001 President George W. Bush officially announced that the US was withdrawing from the Anti-Ballistic Missile (ABM) Treaty of 1972, one of the mainstays of strategic nuclear arms control during the Cold War, with effect from June 2002, and was proceeding to develop and deploy an extensive range of both theatre missile defence (TMD) and national missile defence (NMD) systems. The first anti-missile missile in the NMD system, designed initially to defend against limited missile attacks from China and North Korea, was installed at Fort Greely in Alaska in July 2004. The initial system, consisting of 16 interceptor missiles at Fort Greely and four at Vandenberg Air Force in California, is expected to be operational by the end of 2005. The Bush Administration is also considering withdrawal from the Comprehensive Test Ban Treaty (CTBT) and resuming nuclear testing. (The last US nuclear test was on 23 September 1992). In particular, some key Administration officials believe that testing is necessary to develop a 'new generation' of nuclear weapons, including low-yield, 'bunker-busting', earth-penetrating weapons specifically designed to destroy very hard and deeply buried targets (such as underground command and control centres and leadership bunkers No arctic war Dyer 12 (Gwynne Dyer, OC is a London-based independent Canadian journalist, syndicated columnist and military historian., His articles are published in 45 countries, 8/4/2012, "Race for Arctic Mostly Rhetoric", www.winnipegfreepress.com/opinion/columnists/race-for-arctic-mostly-rhetoric-164986566.html) Russian television contacted me last night asking me to go on a program about the race for Arctic resources. The ice is melting fast, and it was all the usual stuff about how there will be big strategic conflicts over the seabed resources -- especially oil and gas -- that become accessible when it's gone. The media always love conflict, and now that the Cold War is long gone, there's no other potential military confrontation between the great powers to worry about. Governments around the Arctic Ocean are beefing up their armed forces for the coming struggle, so where are the flashpoints and what are the strategies? It's great fun to speculate about possible wars. In the end I didn't do the interview because the Skype didn't work, so I didn't get the chance to rain on their parade. But here's what I would said to the Russians if my server hadn't gone down at the wrong time. First, you should never ask the barber if you need a haircut. The armed forces in every country are always looking for reasons to worry about impending conflict, because that's the only reason their governments will spend money on them. Sometimes they will be right to worry, and sometimes they will be wrong, but right or wrong, they will predict conflict. Like the barbers, it's in their professional interest to say you need their services. So you'd be better off to ask somebody who doesn't have a stake in the game. As I don't own a single warship, I'm practically ideal for the job. And I don't think there will be any significant role for the armed forces in the Arctic, although there is certainly going to be a huge investment in exploiting the region's resources. There are three separate "resources" in the Arctic. On the surface, there are the sea lanes that are opening up to commercial traffic along the northern coasts of Russia and Canada. Under the seabed, there are potential oil and gas deposits that can be drilled once the ice retreats. And in the water in between, there is the planet's last unfished ocean. The sea lanes are mainly a Canadian obsession, because the government believes the Northwest Passage that weaves between Canada's Arctic islands will become a major commercial artery when the ice is gone. Practically every summer, Prime Minister Stephen Harper travels north to declare his determination to defend Canada's Arctic sovereignty from -- well, it's not clear from exactly whom, but it's a great photo op. Canada is getting new Arctic patrol vessels and building a deep-water naval port and Arctic warfare training centre in the region, but it's all much ado about nothing. The Arctic Ocean will increasingly be used as a shortcut between the North Atlantic and the North Pacific, but the shipping will not go through Canadian waters. Russia's "Northern Sea Route" will get the traffic, because it's already open and much safer to navigate. Then there's the hydrocarbon deposits under the Arctic seabed, which the U.S. Geological Survey has forecast may contain almost one-fourth of the world's remaining oil and gas resources. But from a military point of view, there's only a problem if there is some disagreement about the seabed boundaries. There are only four areas where the boundaries are disputed. Two are between Canada and its eastern and western neighbours in Alaska and Greenland, but there is zero likelihood of a war between Canada and the United States or Denmark (which is responsible for Greenland's defence). In the Bering Strait, there is a treaty defining the seabed boundary between the United States and Russia, signed in the dying days of the Soviet Union, but the Russian Duma has refused to ratify it. The legal uncertainty caused by the dispute, however, is more likely to deter future investment in drilling there than lead to war. And then there was the seabedboundary dispute between Norway and Russia in the Barents Sea, which led Norway to double the size of its navy over the past decade. But last year, the two countries signed an agreement dividing the disputed area right down the middle and providing for joint exploitation of its resources. So no war between NATO (of which Norway is a member) and the Russian Federation. Which leaves the fish, and it's hard to have a war over fish. The danger is rather that the world's fishing fleets will crowd in and clean the fish out, as they are currently doing in the Southern Ocean around Antarctica. If the countries with Arctic coastlines want to preserve this resource, they can only do so by creating an international body to regulate the fishing. And they will have to let other countries fish there, too, with agreed catch limits, since they are mostly international waters. They will be driven to co-operate, in their own interests. So no war over the Arctic . All we have to worry about now is the fact the ice is melting, which will speed global warming (because open water absorbs far more heat from the sun than highly reflective ice), and ultimately melt the Greenland icecap and raise sea levels worldwide by seven metres. But that's a problem for another day. Water wars are constructed to spur political action on scarcity—reject anything not from a peer reviewed study Allouche 11 The sustainability and resilience of global water and food systems: Political analysis of the interplay between security, resource scarcity, political systems and global trade ☆ Development Studies, Brighton, UK Available online 22 January 2011. Jeremy Allouche Institute of In a so-called age of uncertainty, a number of alarmist scenarios have linked the increasing use of water resources and food insecurity with wars. The idea of water wars (perhaps more than food wars) is a dominant discourse in the media (see for example Smith, 2009), NGOs (International Alert, 2007) and within international organizations (UNEP, 2007). In 2007, UN Secretary General Ban Ki-moon declared that ‘waterscarcity threatens economic and social gains and is a potent fuel for wars and conflict’ (Lewis, 2007). Of course, this type of discourse has an instrumental purpose; security and conflict are here used for raising water/food as key policy priorities at the international level . No european war Joseph Nye 04, Kennedy School of Government Dean and Professor of International Relations at Harvard, 2004, Soft Power, p. 19-20 A second important change was the way that modern communications technology fomented the rise and spread of nationalism, which made it more difficult for empires to rule over socially awakened populations. In the nineteenth century Britain ruled a quarter of the globe with a tiny fraction of the world’s population. As nationalism grew, colonial rule became too expensive and the British empire collapsed. Formal empires with direct rule over subject populations such as Europe exercised during the nineteenth and twentieth centuries are simply too costly in the twenty-first century. In addition to nuclear and communications technology, social changes inside the large democracies also raised the costs of using military power. Postindustrial democracies are focused on welfare rather than glory, and they dislike high casualties. This does not mean that they will not use force, even when casualties are expected-witness Britain, France, and the United States in the 1991 Gulf War, and Britain and the United States in the 2003 Iraq War. But the absence of a prevailing warrior ethic in modern democracies means that the use of force requires an elaborate moral justification to ensure popular support, unless actual survival is at stake. For advanced democracies, war remains possible, but it is much less acceptable than it was a century, or even a half century, ago. 28 The most powerful states have lost much of the lust to conquer. 29 Robert Kagan has correctly pointed out that these social changes have gone further in Europe than the United States, although his clever phrase that Americans are from Mars and Europeans from Venus oversimplifies the differences. 30 After all, Europeans joined in pressing for the use of force in Kosovo in 1999, and the Iraq War demonstrated that there were Europeans from Mars and Americans who preferred Venus. Nonetheless, the success of the European countries in creating an island of peace on the continent that had been ravaged by three Franco-German wars in less than a century may predispose them toward more peaceful solutions to conflict. burnout The Independent 3 [UK “Future Tense: Is Mankind Doomed?”, http://www.commondreams.org/headlines03/0725-04.htm 7/25/03] Maybe - though plenty of experienced graduate students could already have a stab. But nature knows that infectious diseases are very hard to get right. Only HIV/Aids has 100 per cent mortality, and takes a long time to achieve it. By definition, lethal diseases kill their host. If they kill too quickly, they aren't passed on; if too slowly, we can detect them and isolate the infected. Any mutant smallpox or other handmade germ would certainly be too deadly or too mild. And even Sars killed fewer people worldwide than die on Britain's roads in a week. As scares go, this one is ideal - overblown and unrealistic. Magnitude—nuke war is survivable, eco-doom is forever Richard Tobin 90, The Expendable Future, 1990, p. 22 Norman Meyers observes, no other form of environmental degradation “is anywhere so significant as the fallout of species.” Harvard biologist Edward O. Wilson is less modest in assessing the relative consequences of human-caused extinctions. To Wilson, the worst thing that will happen to earth is not economic collapse, the depletion of energy supplies, or even nuclear war. As frightful as these events might be, Wilson reasons that they can “be repaired within a few generations. The one process ongoing…that will take millions of years to correct is the loss of genetic and species diversity by destruction of natural habitats. evaluate extinction first--ethical obligation Milbrath, Director Emeritus, Environment and Society Program, SUNY-Buffalo, “Envisioning a Sustainable Society,” EXPLORATIONS IN ENVIRONMENTAL POLITICAL THEORY, ed. J.J. Kassiola, 2003, p. 51. Lester W. Our common journey promises to be challenging and exciting, even though difficult. It will be much easier, and more likely to be successful, if we face it optimistically with a deep understanding of the pace and character of social transformation. We humans are special. Not because of our reason-other species can reason-rather it is our ability to recall the past and foresee the future. We are the only creatures that can imag- ine our extinction. That special gift of understanding places a unique moral responsibility on humans. Once we have contemplated the future, every decision that could affect that future becomes a moral decision. Even the decision not to act, or to decide not to decide, becomes a moral iudgment. We humans, given the ability to anticipate the consequences of our actions, will become the conscious mind of the biocommunity, a global mind that will guide and hasten social transformation. Those who understand what is happening to our world are not free to shrink from this responsibility. economic inequality and resource extraction --strong historical support- NASA study proves Dr Nafeez Ahmed 3-14-14 is executive director of the Institute for Policy Research & Development “Nasa-funded study: industrial civilisation headed for 'irreversible collapse'?” http://www.theguardian.com/environment/earthinsight/2014/mar/14/nasa-civilisation-irreversible-collapse-study-scientists A new study sponsored by Nasa' s Goddard Space Flight Center has highlighted the prospect that global industrial civilisation could collapse in coming decades due to unsustainable resource exploitation and increasingly unequal wealth distribution .¶ Noting that warnings of 'collapse' are often seen to be fringe or controversial, the study attempts to make sense of compelling historical data showing that "the process of rise-and-collapse is actually a recurrent cycle found throughout history." Cases of severe civilisational disruption due to " precipitous collapse - often lasting centuries - have been quite common ."¶ The research project is based on a new cross-disciplinary 'Human And Nature DYnamical' (HANDY) model, led by applied mathematician Safa Motesharrei of the US National Science Foundation-supported National Socio-Environmental Synthesis Center, in association with a team of natural and social scientists. The study based on the HANDY model has been accepted for publication in the peer-reviewed Elsevier journal, Ecological Economics.¶ It finds that according to the historical record even advanced, complex civilisations are susceptible to collapse, raising questions about the sustainability of modern civilisation:¶ "The fall of the Roman Empire, and the equally (if not more) advanced Han, Mauryan, and Gupta Empires, as well as so many advanced Mesopotamian Empires, are all testimony to the fact that advanced, sophisticated, complex, and creative civilizations can be both fragile and impermanent."¶ By investigating the human-nature dynamics of these past cases of collapse, the project identifies the most salient interrelated factors which explain civilisational decline, and which may help determine the risk of collapse today: namely, Population, Climate, Water, Agriculture, and Energy.¶ These factors can lead to collapse when they converge to generate two crucial social features: "the stretching of resources due to the strain placed on the ecological carrying capacity"; and "the economic stratification of society into Elites [rich] and Masses (or "Commoners") [poor]" These social phenomena have played "a central role in the character or in the process of the collapse ," in all such cases over "the last five thousand years." ¶ Currently, high levels of economic stratification are linked directly to overconsumption of resources, with "Elites" based largely in industrialised countries responsible for both:¶ "... accumulated surplus is not evenly distributed throughout society, but rather has been controlled by an elite. The mass of the population, while producing the wealth, is only allocated a small portion of it by elites, usually at or just above subsistence levels."¶ The study challenges those who argue that technology will resolve these challenges by increasing efficiency:¶ "Technological change can raise the efficiency of resource use, but it also tends to raise both per capita resource consumption and the scale of resource extraction, so that, absent policy effects, the increases in consumption often compensate for the increased efficiency of resource use."¶ Productivity increases in agriculture and industry over the last two centuries has come from "increased (rather than decreased) resource throughput," despite dramatic efficiency gains over the same period.¶ Modelling a range of different scenarios, Motesharri and his colleagues conclude that under conditions "closely reflecting the reality of the world today... we find that collapse is difficult to avoid ." In the first of these scenarios, civilisation:¶ ".... appears to be on a sustainable path for quite a long time, but even using an optimal depletion rate and starting with a very small number of Elites, the Elites eventually consume too much, resulting in a famine among Commoners that eventually causes the collapse of society. It is important to note that this Type-L collapse is due to an inequality-induced famine that causes a loss of workers, rather than a collapse of Nature."¶ Another scenario focuses on the role of continued resource exploitation, finding that "with a larger depletion rate, the decline of the Commoners occurs faster, while the Elites are still thriving, but eventually the Commoners collapse completely, followed by the Elites."¶ In both scenarios, Elite wealth monopolies mean that they are buffered from the most "detrimental effects of the environmental collapse until much later than the Commoners", allowing them to "continue 'business as usual' despite the impending catastrophe." The same mechanism, they argue, could explain how "historical collapses were allowed to occur by elites who appear to be oblivious to the catastrophic trajectory (most clearly apparent in the Roman and Mayan cases)."¶ Applying this lesson to our contemporary predicament, the study warns that:¶ "While some members of society might raise the alarm that the system is moving towards an impending collapse and therefore advocate structural changes to society in order to avoid it, Elites and their supporters, who opposed making these changes, could point to the long sustainable trajectory 'so far' in support of doing nothing."¶ However, the scientists point out that the worst-case scenarios are by no means inevitable, and suggest that appropriate policy and structural changes could avoid collapse, if not pave the way toward a more stable civilisation.¶ The two key solutions are to reduce economic inequality so as to ensure fairer distribution of resources, and to dramatically reduce resource consumption by relying on less intensive renewable resources and reducing population growth:¶ "Collapse can be avoided and population can reach equilibrium if the per capita rate of depletion of nature is reduced to a sustainable level, and if resources are distributed in a reasonably equitable fashion."¶ The NASA-funded HANDY model offers a highly credible wake-up call to governments, corporations and business - and consumers - to recognise that 'business as usual' cannot be sustained, and that policy and structural changes are required immediately.¶ Although the study is largely theoretical, a number of other more empirically-focused studies - by KPMG and the UK Government Office of Science for instance - have warned that the convergence of food, water and energy crises could create a 'perfect storm' within about fifteen years . But these 'business as usual' forecasts could be very conservative.