Journal articles on the topic 'Targeted killing – Government policy – United States'

To see the other types of publications on this topic, follow the link: Targeted killing – Government policy – United States.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Targeted killing – Government policy – United States.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

FORCESE, CRAIG, and LEAH WEST SHERRIFF. "Killing Citizens: Core Legal Dilemmas in the Targeted Killing Abroad of Canadian Foreign Fighters." Canadian Yearbook of international Law/Annuaire canadien de droit international 54 (July 18, 2017): 134–87. http://dx.doi.org/10.1017/cyl.2017.13.

Full text
Abstract:
AbstractFor the first time since the introduction of the Canadian Charter of Rights and Freedoms, Canada is in an armed conflict with an insurgency that has actively recruited Canadians and directed them to use or promote violence against Canada. In the result, the Canadian government may ask its soldiers to target and kill fellow Canadians abroad or to assist allies in doing so. This situation raises a host of novel legal issues, including the question of “targeted killing.” This matter arose for the United Kingdom in 2015 when it directed the use of military force against several Britons believed to be plotting a terrorist attack against the United Kingdom from abroad. This incident sparked a report from the British Parliament highlighting legal dilemmas. This article does the same for Canada by focusing on the main legal implications surrounding a targeted killing by the Canadian government of a Canadian citizen abroad. This exercise shows that a Canadian policy of targeted killing would oblige Canada to make choices on several weighty legal matters. First, the article discusses the Canadian public law rules that apply when the Canadian Armed Forces deploy in armed conflicts overseas. It then analyzes international law governing state uses of military force, including the regulation of the use of force (jus ad bellum) and the law of armed conflict (jus in bello). It also examines an alternative body of international law: that governing peacetime uses of lethal force by states. The article concludes by weaving together these areas of law into a single set of legal questions that would necessarily need to be addressed prior to the targeted killing of a Canadian abroad.
APA, Harvard, Vancouver, ISO, and other styles
2

Elliot, Michael. "Where Precision Is the Aim: Locating the Targeted Killing Policies of the United States and Israel within International Humanitarian Law." Canadian Yearbook of international Law/Annuaire canadien de droit international 47 (2010): 99–160. http://dx.doi.org/10.1017/s0069005800009851.

Full text
Abstract:
SummaryIf state practice is any indication, targeted killing is increasingly becoming regarded as a viable and effective response to the threat posed by terrorist organizations. Its growing role in armed conflict makes it particularly important that international humanitarian law (IHL) prove capable of providing an effective framework within which this practice may be governed. As it is currently conceived, however, IHL has shown itself ill-suited to the particular nature of armed conflicts between states and terrorist organizations on a broad level and, more specifically, to the practice of targeted killing. This article examines the decision of the Israeli supreme Court in Public Committee against Torture in Israel v. Government of Israel as an example of an effort to fit targeted killing within IHL, focusing on its characterization of “terrorists” and its imposition of the “least harmful means” requirement. The author suggests that, while the former exposes the difficulty of reconciling this development in armed conflict with existing rules, the latter demonstrates the benefits of relying on fundamental principles of IHL, in this case that of military necessity. The article concludes by contending that it is these principles, rather than existing rules, that should be viewed as the appropriate mechanism by which to accommodate targeted killing within IHL.
APA, Harvard, Vancouver, ISO, and other styles
3

Rothschild, Amanda J. "Rousing a Response: When the United States Changes Policy toward Mass Killing." International Security 42, no. 2 (November 2017): 120–54. http://dx.doi.org/10.1162/isec_a_00295.

Full text
Abstract:
When do U.S. presidents change policy to respond with increased intensity to mass killings of civilians in other countries? The twentieth century witnessed a series of state-sponsored mass killings in a variety of regions around the world. Conventional arguments suggest that although the United States has the capability of responding to such atrocities, it often fails to do so because of a lack of political will for action. Historical evidence suggests, however, that although the modal response of the United States is inaction, at times U.S. presidents reverse course to respond more forcefully to mass killings. Three factors explain when and why these policy shifts happen: the level at which dissent occurs within the U.S. government, the degree of congressional pressure for policy change, and the extent to which the case of mass killing poses a political liability for the president. President Franklin D. Roosevelt's creation of the War Refugee Board in 1944 during the Holocaust supports this theory.
APA, Harvard, Vancouver, ISO, and other styles
4

Molloy, Taran. "Qassem Soleimani, Targeted Killing of State Actors, and Executive Order 12,333." Victoria University of Wellington Law Review 52, no. 1 (June 27, 2021): 163–96. http://dx.doi.org/10.26686/vuwlr.v52i1.6849.

Full text
Abstract:
The targeted killing of the Iranian military leader Qassem Soleimani in an American drone strike in January 2020 marked a novel development in the operation of the United States' drone programme; targeting a member of a state's armed forces as opposed to a member of a non-state armed group. Soleimani's killing offers an opportunity to re-examine the scope of Executive Order 12,333, which prohibits employees of the United States Government from committing assassinations. This article applies Executive Order 12,333's "assassination ban" to the Soleimani strike. The assassination ban's scope varies depending on whether it is applied in a wartime or peacetime context. This article concludes from the surrounding factual and legal context that the strike should be analysed according to the peacetime definition of assassination, which necessitates an analysis of the strike's compliance with the jus ad bellum, the legal framework applicable to uses of interstate force. It finds that the strike's non-compliance with the jus ad bellum, in addition to its likely political motive create a strong argument that the strike would constitute a prohibited assassination under the terms of the Executive Order, but the legal framework surrounding the Executive Order limits its direct enforceability with respect to presidentially authorised uses of force. It ultimately concludes that, despite the assassination ban's lack of direct enforceability, it nevertheless creates a strong normative counterbalance against an increasing tendency toward expansive uses of extraterritorial force.
APA, Harvard, Vancouver, ISO, and other styles
5

Lum, Grande. "The Community Relations Service's Work in Preventing and Responding to Unfounded Racially and Religiously Motivated Violence after 9/11." Texas A&M Journal of Property Law 5, no. 2 (December 2018): 139–55. http://dx.doi.org/10.37419/jpl.v5.i2.2.

Full text
Abstract:
On the morning of September 11, 2001, New York City-based Community Relations Service (“CRS”) Regional Director Reinaldo Rivera was at a New Jersey summit on racial profiling. At 8:46 a.m., an American Airlines 767 crashed into the North Tower of New York City’s World Trade Center. Because Rivera was with the New Jersey state attorney general, he quickly learned of the attack. Rivera immediately called his staff members, who at that moment were traveling to Long Island, New York, for an unrelated case. Getting into Manhattan had already become difficult, so Rivera instructed his conciliators to remain on standby. At 9:03 a.m., another 767, United Airlines Flight 175, flew into the World Trade Center’s South Tower. September 11 initiated a new, fraught-filled era for the United States. For CRS, an agency within the United States Department of Justice, it was the beginning of a long-term immersion into conflict issues that involved discrimination and violence against those whose appearance led them to be targets of anti-terrorist hysteria or mis- placed backlash. Appropriately, in the days following 9/11, the federal government, including the Federal Bureau of Investigation (“FBI”), concentrated on ferreting out the culprits of the heinous acts. However, the FBI discovered that Middle Eastern terrorists were responsible for the tragedies, and communities around the nation saw a surge of violence against people who appeared to be of Middle Eastern descent, requiring a response to protect those who were unfairly targeted. These outbreaks began as soon as September 12. Police in Illinois stopped 300 people from marching on a Chicago-area mosque. In Gary, Indiana, a masked gunman shot twenty-one times at a Yemeni- American gas station attendant. In Texas, a mosque was hit by six bullets. On September 15, a man who had been reported by an Applebee’s waiter as saying that he wanted to “shoot some rag heads” shot a Chevron gas station owner Balbir Singh Sodhi, a Sikh-American. The man, Frank Roque, shot through his car window, and five bullets hit Sodhi, killing him instantly. Roque drove to a home he previously owned and had sold to an Afghan-American couple and fired on it. He then shot a Lebanese-American man. According to a police report, Roque said in reference to the 9/11 tragedy, “I [cannot] take this anymore. They killed my brothers and sisters.” Former Transportation Secretary Norman Mineta said, reflecting ten years later on the hate crimes that followed the attack on the World Trade Center, “The tragedy of September 11th should be remembered in the sense of making sure that we [do not] let our emotions run away in terms of trying to show our commitment and conviction about patriotism [and] loyalty.” The events created a new chapter in American race relations, one in which racial tensions and fear were higher than ever for Arabs, Muslims, South Asians, Sikhs, and others who could be targeted in anti-Islamic hysteria because of their physical appearance or dress. In 2011, a CBS–New York Times poll found that 78% agreed that Muslims, Arab-Americans, and immigrants from the Middle East are singled out unfairly by people in this country. Shortly after the September 11 attacks, this number stood at 90%. The same poll also found that one in three Americans think Muslim-Americans are more sympathetic to terrorists than other Americans. To address these misconceptions in the years following 9/11, CRS has done a significant amount of outreach, dispute resolution, and training to mitigate unfounded backlash against Arabs, Muslims, and Sikhs. Under CRS Director Freeman, the agency produced Sikh and Muslim cultural-competency trainings and two training videos: On Common Ground, which provides background on Sikhism and concerns about safety held by Sikhs in America; and The First Three to Five Seconds, which provides background on Muslims and information on their interactions with law enforcement. In 2009, President Obamas signed the Matthew Shepard-James Byrd Junior Hate Crimes Prevention Act. The Act explicitly gave CRS jurisdiction to respond to and prevent hate crimes. For the first time, CRS jurisdiction expanded beyond race. Specifically, CRS was now authorized to work on issues of religion, gender, sexual orientation, gender identity, and disability in addition to race, color, and national origin. When I became CRS Director in 2012, following the continued incidents of unfounded violence and prejudice against those perceived as sharing heritage with Middle Eastern terrorists, I directed the agency to update the trainings and launched an initiative for regional offices to conduct these Sikh and Muslim cultural-competency trainings. In the years following 9/11, controversy has continued over racial profiling of Arab, Muslim, and Sikh individuals. Owing to the nature of the attack, one particular area of ongoing concern is access to airplane flights. Director of Transportation Mineta recalled how the racial profiling he witnessed echoed his own experience as a Japanese-American citizen: [T]here were a lot of people saying, “[We are] not [going to] let Middle Easterners or Muslims on the planes.” And I thought about my own experience [during World War II] because people [could not] make the distinction between the people who were flying the airplanes that attacked Pearl Harbor and the people who were living in Washington, Oregon, and California, who looked like the people flying the airplanes. In response to this problem, CRS trained thousands of law enforcement and Transit Security Association employees on cultural professionalism in working with Arab, Muslim, and Sikh individuals. The work of addressing the profiling and mistreatment of Arab-Americans, Muslims, and Sikhs also spiked after the 2013 bombing of the Boston Marathon. CRS conciliators again reached out to leaders throughout the country at mosques and gurdwaras to confront safety and security issues regarding houses of worship and concerns about backlash violence based on faith, nationality, and race. Since 9/11, CRS’s work on racial profiling continues to respond to increasing conflicts and tensions both within the United States and around the globe. In the wake of the 9/11 tragedy, CRS adjusted its priorities and reallocated resources in the wake of the September 11 tragedy to address the needs of targeted communities and further intercultural understanding. CRS did so by increasing the religious awareness training provided to law enforcement and other agencies, and it committed more resources to working with Muslim and Sikh faith and advocacy organizations and people. This work was not originally envisioned when the 1964 Civil Rights Act created CRS. How- ever, this new focus reflects how the model of the African-American civil rights movement has inspired other efforts to attain equality and justice for minority groups in the United States. Just as the tragedy in Selma helped lead to the passage of the 1965 Voting Rights Act, the Oak Creek tragedy helped lead the FBI to update its hate crime categories. Former FBI Director James Comey articulated this idea best in his speech to the Anti-Defamation League, stating “do a better job of tracking and reporting hate crime to fully understand what is happening in our communities and how to stop it.” The Community Relations Service has evolved over time since its 1964 origins, and a substantial component has been the work in response to post 9/11 unfounded racial and religious violence.
APA, Harvard, Vancouver, ISO, and other styles
6

Decker, Ryan A., Robert J. Kurtzman, Byron F. Lutz, and Christopher J. Nekarda. "Across the Universe: Policy Support for Employment and Revenue in the Pandemic Recession." AEA Papers and Proceedings 111 (May 1, 2021): 267–71. http://dx.doi.org/10.1257/pandp.20211058.

Full text
Abstract:
Using data from 14 government sources, we develop comprehensive estimates of US economic activity by sector, legal form of organization, and firm size to characterize how four government direct-lending programs--the Paycheck Protection Program, Main Street Lending Program, Corporate Credit Facilities, and Municipal Liquidity Facility--relate to these classes of economic activity in the United States. The classes targeted by these programs are vast--accounting for 97 percent of total US employment--though entity-specific financial criteria limit coverage within specific programs. These programs notionally cover a far larger universe than what was targeted by analogous Great Recession-era lending policies.
APA, Harvard, Vancouver, ISO, and other styles
7

Romaniuk, Scott Nicholas, and Stewart Tristan Webb. "Extraordinary Measures: Drone Warfare, Securitization, and the “War on Terror”." Slovak Journal of Political Sciences 15, no. 3 (July 1, 2015): 221–45. http://dx.doi.org/10.1515/sjps-2015-0012.

Full text
Abstract:
Abstract The use of unmanned aerial vehicles or “drones,” as part of the United States’ (US) targeted killing (TK) program dramatically increased after the War on Terror (WoT) was declared. With the ambiguous nature and parameters of the WoT, and stemming from the postulation of numerous low-level, niche-, and other securitizations producing a monolithic threat, US drone operations now constitute a vital stitch in the extensive fabric of US counterterrorism policy. This article employs the theories of securitization and macrosecuritization as discussed by Buzan (1991, 2006), and Buzan and Wæver (2009) to understand targeted killing, by means of weaponized drones, as an extraordinary measure according to the Copenhagen School’s interpretation. An overarching securitization and the use of the “security” label warrants the emergency action of targeted killing through the use of drones as an extraordinary measure. We argue that the WoT serves as a means of securitizing global terrorism as a threat significant enough to warrant the use of drone warfare as an extraordinary use of force. By accepting the WoT as a securitization process we can reasonably accept that the US’ response(s) against that threat are also securitized and therefore become extraordinary measures.
APA, Harvard, Vancouver, ISO, and other styles
8

Decker, Ryan A., Robert J. Kurtzman, Byron F. Lutz, and Christopher J. Nekarda. "Across the Universe: Policy Support for Employment and Revenue in the Pandemic Recession." Finance and Economics Discussion Series 2020, no. 099 (December 4, 2020): 1–32. http://dx.doi.org/10.17016/feds.2020.099.

Full text
Abstract:
Using data from 14 government sources, we develop comprehensive estimates of U.S. economic activity by sector, legal form of organization, and firm size to characterize how four government direct lending programs—the Paycheck Protection Program, the Main Street Lending Program, the Corporate Credit Facilities, and the Municipal Lending Facilities—relate to these classes of economic activity in the United States. The classes targeted by these programs are vast—accounting for 97 percent of total U.S. employment—though entityspecific financial criteria limit coverage within specific programs. These programs notionally cover a far larger universe than what was targeted by analogous Great Recession-era lending policies. We relate our estimates to those from timely alternative data sources, which do not typically cover the majority of the economic universe.
APA, Harvard, Vancouver, ISO, and other styles
9

Lester, Joelle M., and Stacey Younger Gagosian. "Finished with Menthol: An Evidence-Based Policy Option That Will Save Lives." Journal of Law, Medicine & Ethics 45, S1 (2017): 41–44. http://dx.doi.org/10.1177/1073110517703322.

Full text
Abstract:
Smoking remains the leading cause of preventable disease and death in the United States, killing approximately 480,000 people each year. This crushing health burden falls disproportionately, and recent CDC data shows that large disparities in adult cigarette smoking remain. One factor in these disparities is the use of flavors. Menthol cigarettes and other flavored tobacco products are used at higher rates by vulnerable populations including youth and young adults, African Americans, women, Hispanics and Asian Americans. This is no accident; the tobacco industry has long targeted these same groups. Given FDA's failure to act to ban flavored tobacco products, states and municipalities are considering taking matters into their own hands to protect their communities from these dangerous products. The authors will explore state and local authority to restrict the sales of these products and review the evidence base indicating that removing flavored tobacco products – and menthol combustible products in particular - from the market would significantly reduce the toll of illness and death caused by these products.
APA, Harvard, Vancouver, ISO, and other styles
10

Colbrook, Stephen. "Why Pandemics Matter to the History of U.S. State Development." Modern American History 4, no. 3 (November 2021): 315–33. http://dx.doi.org/10.1017/mah.2021.26.

Full text
Abstract:
When a new strain of influenza circled the globe in the fall and winter of 1918, it swept through the United States at terrifying speed, infecting at least 25 million Americans—roughly one-quarter of the population—over the next two years. Based on any metric, the pandemic was the country's largest mass-mortality episode of the twentieth century, killing approximately 675,000 Americans and surpassing the death toll of World War I. Even as the virus struck the United States with unprecedented ferocity, however, the federal government left most public health decisions to the states, producing a disjointed and hyper-localized approach to a crisis that was national and global in scope. In the absence of a strong federal role, state governments carved out their own policy paths, adopting widely divergent strategies to stem the spread of the disease. This preventive playing field was wildly uneven. Some states were well-equipped with robust public health infrastructures; others lacked the tools to manage the disease's rampant spread.
APA, Harvard, Vancouver, ISO, and other styles
11

Decker, Ryan A., Robert J. Kurtzman, Byron F. Lutz, and Christopher J. Nekarda. "Across the Universe: Policy Support for Employment and Revenue in the Pandemic Recession." Finance and Economics Discussion Series 2020, no. 099r1 (June 23, 2021): 1–56. http://dx.doi.org/10.17016/feds.2020.099r1.

Full text
Abstract:
Using data from 14 government sources, we develop comprehensive estimates of U.S. economic activity by sector, legal form of organization, and firm size to characterize how four government direct lending programs—the Paycheck Protection Program, the Main Street Lending Program, the Corporate Credit Facilities, and the Municipal Lending Facilities—related to these classes of economic activity in the United States. The classes targeted by these programs are vast—accounting for 97 percent of total U.S. employment—though entity-specific financial criteria limited coverage within specific programs. We relate our estimates to those from timely alternative data sources, which do not typically cover the majority of the economic universe.
APA, Harvard, Vancouver, ISO, and other styles
12

Sampaio, Alexandre Andrade, and Luís Renato Vedovato. "With the Stroke of a Pen: Legal Standards for Adding Names to Government Kill Lists." International Human Rights Law Review 4, no. 2 (November 13, 2015): 194–221. http://dx.doi.org/10.1163/22131035-00402001.

Full text
Abstract:
United States (us) government officials disclosed, in 2010, that Anwar Al-Aulaki, a dual us-Yemeni citizen alleged to be a leader of the terrorist group Al-Qaeda in the Arabian Peninsula, had been added to a list of individuals that the Central Intelligence Agency (cia) and the Joint Special Operations Command (jsoc) were authorised to target for death. It is clear that the right to life is affected by targeted killing actions, as the objective of the practice is to kill the targeted individual. For such a practice to be lawful, it has to be considered non-arbitrary according to international standards. The two main instruments of universal scope that provide a legal protection for this right are the International Covenant on Civil and Political Rights and the Universal Declaration of Human Rights. The use of lethal force by a State would be legally justified by: (1) the carrying out of a lawfully imposed death penalty; (2) during an armed conflict, under international humanitarian law; and (3) if the force used was necessary, proportional and not the first option. This article examines the question of whether adding names to kill list remains legal under international human rights and humanitarian law, and if so, under what circumstances?
APA, Harvard, Vancouver, ISO, and other styles
13

Bashevkin, Sylvia. "Losing Common Ground: Feminists, Conservatives and Public Policy in Canada during the Mulroney Years." Canadian Journal of Political Science 29, no. 2 (June 1996): 211–42. http://dx.doi.org/10.1017/s0008423900007691.

Full text
Abstract:
AbstractThis article examines relations between organized feminism and the federal Conservative government of Brian Mulroney, focusing on elements of the Canadian women's movement that targeted federal policy change from 1984 to 1993. In questioning the main priorities of both sides and the potential for conflict between them, the discussion uses the conceptual literature on social movement evolution as a base. It assesses formal decision making across five major policy sectors identified by Canadian feminism and presents the perspectives of movement activists on the Mulroney period. Although comparisons with policy action under the Thatcher and Reagan governments indicate a more pro-feminist record in Canada than the United Kingdom or the United States, Canadian materials suggest a narrowing of common ground between the organized women's movement and federal elites during the Mulroney years.
APA, Harvard, Vancouver, ISO, and other styles
14

Kruikemeier, Sanne, Susan Vermeer, Nadia Metoui, Tom Dobber, and Brahim Zarouali. "(Tar)getting you: The use of online political targeted messages on Facebook." Big Data & Society 9, no. 2 (July 2022): 205395172210896. http://dx.doi.org/10.1177/20539517221089626.

Full text
Abstract:
This study examines how mainstream political actors and other organizations use political targeted messages. For this purpose, a data set from ProPublica is used. The study examines 55,918 sponsored Facebook ads that were posted by 236 political actors (i.e., political elites and other organizations) in the United States. (1) Topic classification was used to identify policy issues, (2) network analysis to identify the main policy issues from the various political actors, and (3) Sankey diagrams to visualize microtargeted messages. Our findings indicate that actors focus on traditionally owned issues (i.e., the Democratic Party: environmental policy, social issues, and social welfare; the Republican Party: foreign affairs, law, and government finances). No clear evidence for a focus on wedge issues can be found, however, some first indications (e.g., a focus on reproductive rights, LGBTQ+) are present in a targeted media environment. All in all, the current study helps us to understand in what way political actors deploy targeted messages.
APA, Harvard, Vancouver, ISO, and other styles
15

Moroz, Ivanna. "Peculiarities of public debt management policy in the United States of America: experience for Ukraine." ScienceRise, no. 4 (August 31, 2021): 58–67. http://dx.doi.org/10.21303/2313-8416.2021.002040.

Full text
Abstract:
The object of research is the policy of public debt management of the United States of America and Ukraine. The problem solved is the low level of efficiency of the policy of public external and internal debt management of Ukraine in the context of financing economic growth. The main scientific results: based on the analysis of the policy of public debt management of the United States of America, it has been proved, that the public debt and the US budget deficit should be perceived not as a problem or threat to macroeconomic stability, but as a tool to stimulate economic growth. It is substantiated, that in order to optimize the policy of internal and external public debt management of Ukraine it is expedient to introduce a debt rule, which is based on the program-targeted method of attracting public debt and provides for the use of public borrowing exclusively to finance economic development programs. In this case, Ukraine, following the example of the United States, will be able to achieve sustainable economic growth, because changing the priorities from debt financing of current state budget expenditures to financing capital expenditures will allow the Ukrainian government to develop economic infrastructure, create conditions for high value-added goods and to develop small and medium business, which will ultimately ensure macroeconomic stability and progressive economic development of the state. The scope of practical use of research results. The results of the study can be used by the Cabinet of Ministers of Ukraine, and in particular by the Ministry of Finance during the formation of the Medium-Term public debt management strategy of Ukraine. Innovative technological product: The debt rule is based on the program-target method of attraction and use of the state internal and external debt that allows to use effectively the state borrowings for financing of economic growth. Scope of application of an innovative technological product: Policy of management of the state internal and external debt of Ukraine
APA, Harvard, Vancouver, ISO, and other styles
16

Knopman, Debra, Martin Wachs, Benjamin Miller, Scott Davis, and Katherine Pfrommer. "Renewing America’s Infrastructure: An Agenda for Federal Transportation and Water Policy." Public Works Management & Policy 23, no. 4 (August 15, 2018): 310–23. http://dx.doi.org/10.1177/1087724x18789703.

Full text
Abstract:
Federal infrastructure investment is receiving a great deal of attention, largely about money: how to finance capital investment, operations, and maintenance. Less discussed but very important is modernizing federal policy to support the mature and urban-centered economy of the United States—rather than the economy it had when most of the terms of federal engagement were set. This article summarizes a RAND Corporation report which addresses recent trends in infrastructure spending and finance and proposes improvements in federal infrastructure policy. We argue for modernizing federal policies related to funding, finance, and project selection. Modernization should recognize the centrality of regional initiatives that transcend local government and state boundaries and should encourage different types of financing—public, private, and public–private partnerships. Poorly targeted investment comes from poorly designed policy. Inadequate maintenance often is a symptom of failure of management and governance. More money will help, but it is not nearly enough.
APA, Harvard, Vancouver, ISO, and other styles
17

Parente, Stephen T., Charles E. Phelps, and Patrick J. O'Connor. "Economic analysis of medical practice variation between 1991 and 2000: The impact of patient outcomes research teams (PORTs)." International Journal of Technology Assessment in Health Care 24, no. 03 (July 2008): 282–93. http://dx.doi.org/10.1017/s0266462308080380.

Full text
Abstract:
Objectives:The aim of this study was to examine the impact of the multi-hundred million dollar investment by the federal government in the developing Patient Outcomes Research Teams (PORTs) in over a dozen major academic medical centers in the United States throughout the 1990s. The objective of the PORTs was to reduce unnecessary clinical variation in medical treatment.Methods:Using an economic derivation of welfare loss attributable to medical practice variation and hospital admission claims data for 2 million elderly patients generalizable to the nation, we estimate the change in welfare between 1991 and 2000, the period within which the PORTs were designed and executed and their results disseminated.Results:Our results show inpatient admission types targeted by the PORTs did have less welfare loss relative to their total expenditure by 2000, but that there was not a net decrease in the welfare loss for all hospital admissions affected by the PORT.Conclusions:We conclude that PORTs may have had favorable effects on welfare, most likely by reducing variation in clinical care, but that causality cannot be proved, and the effects were not equal across all conditions targeted by PORTs. This research provides a methodological template that may be used to evaluate the impact of patient safety research on welfare loss and on variation in medical treatment in both hospital and ambulatory settings.
APA, Harvard, Vancouver, ISO, and other styles
18

Avshenyuk, Nataliya. "USA Education Policy in Transnationalization of Higher Education." Comparative Professional Pedagogy 8, no. 1 (March 1, 2018): 7–12. http://dx.doi.org/10.2478/rpp-2018-0001.

Full text
Abstract:
AbstractThe analysis of American experience of higher education transnationalization, as well as influence of these processes on various spheres of social development has been done. The main factor is the desire to improve the quality of higher education national system, which leads to positive competition between local and foreign universities and serves as an important incentive for improving the quality of educational services. The obtained results testify that over the past decades the higher education transnationalization has become a subject of state “soft power” policy aimed at addressing specific internal political, social and financial problems. The “soft power” policy concept (by J. Nye) defines it as the ability of a country to get the desired issue by self-attractiveness rather than conquest power or money. The key of “soft power” is the image of the state, which is formed and managed not only by the government, but the citizens themselves, the country as a whole, including its history, achievements, culture, etc. The study leads to the conclusion that higher education transnationalization in the United States is a result of active international marketing activities of universities, as well as targeted state economic, political and information support. The prognostic potential of the conducted scientific research enables the concept development of Ukrainian higher education integration into the world educational space on the basis of constructive ideas of foreign experience consideration at the state and institutional levels.
APA, Harvard, Vancouver, ISO, and other styles
19

Gaibulloev, Khusrav, James A. Piazza, and Todd Sandler. "Regime Types and Terrorism." International Organization 71, no. 3 (2017): 491–522. http://dx.doi.org/10.1017/s0020818317000169.

Full text
Abstract:
AbstractRegime type has opposing effects on terrorism. If a regime constrains the executive branch, then terrorism may be more prevalent. If, however, a regime allows all viewpoints to be represented, then grievances may be held in check, resulting in less terrorism. Regimes that value constituents’ lives and property will also act to limit attacks. We formulate a game-theoretic model, containing a terrorist group and targeted government, that captures these opposing forces and supports a nonlinear relationship between regime type and terrorism. This model indicates how diverse samples in the literature can result in different relationships between regime type and terrorism. Seldom does it support the positive relationship that is prevalent in the terrorism literature. We apply a large variety of empirical techniques to show that regime type has a robust inverted U-shaped impact on various terrorism measures. Foreign policy variables (e.g., alliance with the United States) are not a robust influence on terrorism.
APA, Harvard, Vancouver, ISO, and other styles
20

حسون عباس, ا. د. صبحي. "دور أدوات السياسة المالية في ردم فجوة الناتج دراسة تحليلية في عينة من الدول للمدة 2000-2020." Iraqi Journal For Economic Sciences 2022, no. 72 (March 1, 2022): 42–65. http://dx.doi.org/10.31272/ijes2022.72.3.

Full text
Abstract:
The importance of the research and its distinction from the previous research lies not in dealing with the ability of fiscal policy tools, i.e., government spending and taxes, to bridge the output gap, but also in it calculating the required amount of spending and taxes to close the output gap, as long as there is some amount of spending and taxes more or less than that. The required limit may cause damage to the economy, i.e., the outbreak of inflation or recession. Consequently, this research is considered as a guide for policy makers to know the required change in government spending and taxes accurately to avoid economic problems and achieve economic stability. The output gap, whether positive or negative, is a non-positive case, as long as it generates damage to the economy, represented by inflation or recession. Fiscal policy, with its various tools, may be unable to close the output gap due to the deficiency in the performance of these tools, which requires monetary policy assistance. The research problem is also indicated that when there is a recession, an expansionary fiscal policy (increasing government spending and reducing taxes) is necessary. But when there is inflation, a contractionary policy should be followed (reducing spending and raising taxes). However, the problem is that if the exact amount of government spending and taxes changes is not determined, severe damages are generated, such as an inaccurate drug dose. This is not to mention the slowdowns or lags in the transmission of the impact of fiscal policy measures to the targeted variables. The research chose a time frame that extended from 2000 to 2020. As for the spatial aspect, it was represented in a sample from different continents in order to make a successful comparison between them. These countries are the United States, Germany, Japan and Iraq. The research found that in all countries of the research sample, the government spending gap was positive, which means that it is at a level higher than the level required to bridge the output gap, perhaps because there are other items for spending on it other than closing the output gap, as is the case for the tax gap, which exceeded the required limit to eliminate Output gap, excluding Iraq.
APA, Harvard, Vancouver, ISO, and other styles
21

Kandrac, John. "Can the Federal Reserve Effectively Target Main Street? Evidence from the 1970s Recession." Finance and Economics Discussion Series 2021, no. 060 (September 24, 2021): 1–75. http://dx.doi.org/10.17016/feds.2021.061.

Full text
Abstract:
Modern central bankers confront a challenge of providing economic stimulus even when the policy rate is constrained by a lower bound. This challenge has led to substantial innovation by policymakers and a proliferation of new policy tools. In this paper, I offer evidence on the efficacy of a new tool known as funding for lending, which provides banks with subsidized funding to make additional loans. I focus on a historical episode from the United States in which the Federal Reserve provided banks with steeply subsidized loans to promote the expansion of credit within their local communities. I show that the cheap funding succeeded in generating more lending by countering banks' excessive liquidity preference. The additional credit benefited the real economy. Local areas enjoyed higher rates of small business formation and more rapid employment growth. Finally, I show that the cost of the subsidy provided by the government was more than offset by the additional payroll taxes paid out of higher wages and salaries. These results suggest that funding for lending programs deserve consideration for the modern central banker's toolkit and demonstrate that certain unconventional tools can offer monetary policymakers the means to pursue more targeted objectives.
APA, Harvard, Vancouver, ISO, and other styles
22

Walker, Tony R. "Effectiveness of the National Pollutant Release Inventory as a Policy Tool to Curb Atmospheric Industrial Emissions in Canada." Pollutants 2, no. 3 (July 1, 2022): 289–305. http://dx.doi.org/10.3390/pollutants2030019.

Full text
Abstract:
To curb greenhouse gas emissions and reduce atmospheric pollutants in Canada, many pieces of environment legislation are targeted at reducing industrial emissions. Traditional regulation prescribes penalties through fines to discourage industries from polluting, but, in the past two decades, alternative forms of environmental regulation, such as the National Pollutant Release Inventory (NPRI), have been introduced. NPRI is an information management tool which requires industries to self-report emissions data based on a set of guidelines determined by Environment and Climate Change Canada, a federal agency. The tool works to inform the public regarding industry emissions and provides a database that can be analyzed by researchers and regulators to inform emissions trends in Canada. These tools have been successful in other jurisdictions (e.g., United States and Australia). However, research assessing the U.S. Toxic Release Inventory suggests there are fundamental weaknesses in the self-reported nature of the data and incidences of under-reporting. This preliminary study aimed to explore NPRI in Canada and test its effectiveness against the National Air Pollutant Surveillance Network (NAPS), an air quality monitoring program administered by the federal government. While instances of under-reporting were undetected, this study identified areas of weakness in the NPRI tool and instances of increasing emissions across various industrial sectors in Canada.
APA, Harvard, Vancouver, ISO, and other styles
23

Baskoro, Riski M., Amalia Agustina Theresia, and Anggara Raharyo. "China’s Public Diplomacy Through the Utilization of Investment and Censorship in Hollywood (2012 – 2016)." JURNAL SOSIAL POLITIK 5, no. 1 (August 5, 2019): 165. http://dx.doi.org/10.22219/sospol.v5i1.7765.

Full text
Abstract:
The conduct of traditional public diplomacy was merely concerned on the engagement of state actors. Not to mention, diplomatic communication is only occurred between the government officials by intention to earned political changes in targeted countries. Recently, public diplomacy is mainly focused on the positive reputation building in the other country and is conducted through political and economic cooperation among two countries or more, by involving the non-state actors also. Starting from its economic reforms initiative, China is engaged in international trade and successfully became one of global economic powers. By its rapid raise, China is feared to be a national threat to other countries, be it politically, economically, or even for the national security. Even more, the Western media often portrays China’s image in a negative light. Hence, in improving its global image, China expands its global outreach by establishing cooperation with the United States film industry, Hollywood, that strengthen by the 2012’s Memorandum of Understanding upon film industry, also by implementing Chinese censorship policy, where negative portrayals of China is prohibited. The conduct of censorship itself would be supervised under state-ruled agency, the SAPPRFT, and is supported by the involvement of Chinese multinational companies investors. Through this research study, the effort of China’s public diplomacy on the utilization of Hollywood as the United States film industry would be proven through new public diplomacy theory. Further, the role of multinational corporations will be assessed due to its essential contribution in enhancing Chinese censorship in Hollywood films for its global release.
APA, Harvard, Vancouver, ISO, and other styles
24

Shrubb, Richard. "The UK homelessness epidemic – radical roots needing radical solutions." Praca Socjalna 35, no. 1 (February 29, 2020): 13–34. http://dx.doi.org/10.5604/01.3001.0014.1172.

Full text
Abstract:
Using newspaper articles, government and charity reports and other secondary sources, this paper looks at the new problem of widespread homelessness brought about by the UK austerity economic policy after 2010. It assesse the growth of the problem due in particular to the re-engineering of welfare benefits. Looking at those who have fallen through the net, the paper focuses on the ability of local authorities to use the law to decline to support those presenting as homeless, including those released from prison. Addressing punitive measures taken by local authorities and law enforcement agencies, it highlights the difficulties faced by those targeted by such agencies. In the final section I look at two contrasting models of policy vis-à-vis homeless people – those in use in the United States and in Finland. The UK neither officially countenances homeless camps, as in the US, nor offers housing as a right, as in Finland. Drawing on an accusation made by Chris Glover in a December 2018 academic paper, I conclude that Friedrich Engels 1844 concept of social murder has been committed against thousands of people in an act of a term I coin as ‘Classism’. This act of class war against the most vulnerable has made many thousands more homeless and in precarious housing.
APA, Harvard, Vancouver, ISO, and other styles
25

Rule, Troy. "Toward a More Strategic National Shortage." Texas A&M Law Review 9, no. 1 (December 2021): 49–108. http://dx.doi.org/10.37419/lr.v9.i1.2.

Full text
Abstract:
The COVID–19 pandemic exposed major deficiencies in the United States’ approach to stockpiling for emergencies. States, cities, and hospitals across the country had meager inventories of critical medical items on hand when the pandemic first reached U.S. soil, and the federal government’s Strategic National Stockpile proved far too small to serve the country’s needs in the first several months of the crisis. As nationwide shortages spread, many state governments were compelled to bid against each other to procure scarce medical supplies—a distribution approach that disadvantaged low-income and minority communities and left countless healthcare professionals and staff ill-equipped to protect themselves against a deadly virus. These severe supply shortages, which hindered the country’s early pandemic response, have since generated an unprecedented push to reform the nation’s stockpiling policy structure. This Article uses a simple cost-benefit model to highlight shortcomings in the existing U.S. stockpiling policy regime and to identify specific avenues for addressing them. Among other things, U.S. stockpiling policies need to better account for important differences in the rotatability of supplies and should incentivize more private stockpiling of the most rotatable emergency items. Targeted reforms of commandeering laws and price-gouging restrictions could further strengthen private incentives to stockpile and may even help to clarify how states and the federal government share responsibilities in the nation’s stockpiling effort. And much more federal support is needed to incentivize the build-out and maintenance of domestic supply chains for the least-rotatable emergency goods. Such tailoring of policies and programs to better fit the unique attributes of stockpiling activities can help ensure the nation is far better equipped to respond the next time disaster strikes.
APA, Harvard, Vancouver, ISO, and other styles
26

Precht, William. "Failure to respond to a coral disease epizootic in Florida: causes and consequences." Rethinking Ecology 6 (January 20, 2021): 1–47. http://dx.doi.org/10.3897/rethinkingecology.6.56285.

Full text
Abstract:
Stony coral tissue loss disease (SCTLD) was first observed in September 2014 near Virginia Key, Florida. In roughly six years, the disease spread throughout Florida and into the greater Caribbean basin. The high prevalence of SCTLD and high resulting mortality in coral populations, and the large number of susceptible species affected, suggest that this outbreak is one of the most lethal ever recorded. The initial recognition and management response to this catastrophic disease in Florida was slow, which delayed the start of monitoring programs and prevented coordinated research programs by at least two years. The slow management response was a result of several factors that operated concurrently. First, the Port Miami dredging project was ongoing during the coral disease epidemic and dredging rather than SCTLD was blamed by some managers and local environmental groups for the extreme coral losses reported in the project’s compliance monitoring program. Second, this blame was amplified in the media because dredging projects are intuitively assumed to be bad for coral reefs. Third, during this same time State of Florida policy prohibited government employees to acknowledge global warming in their work. This was problematic because ocean warming is a proximal cause of many coral diseases. As a result, the well-known links between warming and coral disease were ignored. A consequence of this policy was that the dredging project provided an easy target to blame for the coral mortality noted in the monitoring program, despite convincing data that suggested otherwise. Specifically, results from the intensive compliance monitoring program, conducted by trained scientific divers, were clear. SCTLD that was killing massive numbers of corals throughout Florida was also killing corals at the dredge site – and in the same proportions and among the same suite of species. While eradication of the disease was never a possibility, early control measures may have slowed its spread or allowed for the rescue of significant numbers of large colonies of iconic species. This coral disease outbreak has similarities to the COVID-19 pandemic in the United States and there are lessons learned from both that will improve disease response outcomes in the future, to the benefit of coral reefs and human populations.
APA, Harvard, Vancouver, ISO, and other styles
27

Ziegler, Charles E. "Sanctions in U.S. - Russia Relations." Vestnik RUDN. International Relations 20, no. 3 (December 15, 2020): 504–20. http://dx.doi.org/10.22363/2313-0660-2020-20-3-504-520.

Full text
Abstract:
Given America’s leading position in the global economy, the U.S. government has frequently leveraged that power to punish “rogue states”, discourage nuclear proliferation, promote democratization, and create pressure for regime change. Washington relied on economic incentives in relations with Russia after 1991, but since 2012 the United States has utilized a broad range of economic sanctions against Russian side, leading to a significant deterioration in what was already a troubled relationship. In contrast to earlier comprehensive sanctions like those imposed on Iraq and Haiti, the U.S. is now crafting “smart” or targeted sanctions designed to exert maximum pressure on selected Russian elites and firms. Rather than evaluating the effectiveness of these measures on changing Russian behavior, the author explores the neglected domestic dimension of the U.S. sanctions process to improve understanding of U.S. foreign policy. This article draws on primary sources in the form of Congressional legislation, executive orders, and official statements to analyze U.S. sanctions imposed on Russia, and develops three brief case studies - the Magnitsky Act, post-Ukraine sanctions, and the Countering America’s Adversaries Through Sanctions Act - to explicate the main issues and actors driving U.S. sanctions. The author argues that domestic factors, including Congressional pressures and interest group activity, are critical to understanding U.S. sanctions regimes. While President Donald Trump has frequently resisted congressionally imposed sanctions, expectations for a more conciliatory approach towards Russia under the Trump administration have not materialized.
APA, Harvard, Vancouver, ISO, and other styles
28

Rupiya, Martin. "South Africa-US Contest over Africa Policy Dominance: A Study with Emphasis on AFRICOM, BRICS and Libyan Issues." Journal of US-Africa Studies International Journal of US and African Studies 1, no. 1 (2019): 48–74. http://dx.doi.org/10.21747/21846251/joura2.

Full text
Abstract:
Foreign policy is embodied in the pursuit of national interests by States in their interaction with other countries. The attainment of Nelson Mandela’s African National Congress (ANC) led majority rule statehood and its relationship with the midwife, the United States, provides us with one of the most complex case study examined between the late 1980s until the present. At the end of the Cold War, a period which coincided with the decolonisation of several countries in Southern Africa including Namibia and South Africa, following mediation by the US, Assistant Secretary of State for Africa Affairs, Chester Crocker United States, predicted on its new found relationship with the then United Soviet Socialist Republics (USSR) and its presence in Angola, informed the decolonization of the sub-regional in which the US targeted South Africa’s apartheid regime towards abandoning its military destabilisation activities and providing security guarantees to the white minority community under the new African majority regime.The result was the withdrawal of Cuban forces in Angola, Namibia independence and finally, the ANC led by the long imprisoned Nelson Mandela at the head of the first coalition government. Consequently, this immediate post-independence arrangement constrained the freedom of action of the ANC during its first term in power. In the subsequent era, the evidence reveals tension and clashes of interests between Washington and Pretoria manifest in at least three areas: creating an African coalition during 2006 against US policy preferences such as the deployment of Africa Command (AFRICOM) on the continent; the 2010 entering into an international political economy of BRICS against Washington’s global dominance and finally, the 2011 coalition attempts under the auspices of the African Union (AU) challenge towards Western intervention in Libya and the deposition of Colonel Muammar Gaddafi on 23 October 2011.Based on secondary sources, newspaper, academic thesis and other official reports this article examines the tensions that developed between Washington and Tshwane/Pretoria over their intentions over Africa. This assesses three areas of foreign policy relationships depicting: contestation, belligerence and finally belated confrontation.These phases begin with the 2006 US intention to locate AFRICOM in Africa, a development openly opposed by President Thabo Mbeki through the AU. This is followed by South Africa joining the global economic competitors made up of Brazil, Russia, India, China and South Africa (BRICS) at the invitation by China. This competitive relationship not only challenged the existing World Bank and IMF dominance but created an entry point for China in Africa. Finally, the article examines the US policy on Libya of Colonel Muammar Gaddafi in 2011 after adopting UN Resolution 1973 in a subsequent development that went against the AU and South Africa, culminating in the capture and assassination of Gaddaffi on 23 October 2011. Conclusively, the US-South Africa relationship over Africa has been characterised by phases of belligerence, collegial neutrality and uncooperative behaviour.
APA, Harvard, Vancouver, ISO, and other styles
29

Verdichevski, Marina, Robin Burns, James K. Cunningham, Joey Tavares, and Russell C. Callaghan. "Trends in Primary Methamphetamine-Related Admissions to Youth Residential Substance Abuse Treatment Facilities in Canada, 2005–2006 and 2009–2010." Canadian Journal of Psychiatry 56, no. 11 (November 2011): 696–700. http://dx.doi.org/10.1177/070674371105601108.

Full text
Abstract:
Objective: During the last decade, methamphetamine use and issues surrounding its toxicity have triggered major concern in the Canadian government, leading to significant changes in drug policy and funding strategies to limit the societal impact of methamphetamine-related harms. This concern appears justified by research which found in 2005–2006 that 21 % of all youth admissions to inpatient substance abuse treatment centres in Canada were due primarily to methamphetamine abuse. Given these patterns of treatment use and targeted governmental initiatives, an open question is whether the demand for methamphetamine treatment found in 2005–2006 has decreased. Our study aims to provide follow-up estimates of admissions for 2009–2010, as well as important trend information for these periods. Method: We developed a comprehensive list of all Canadian residential youth substance abuse treatment facilities. The executive director of each facility was asked about the site's annual caseload, and the proportion of cases primarily due to methamphetamine abuse within the past 12 months. Results: Our survey data for the periods of 2005–2006 and 2009–2010 show marked reductions in admissions. In 2009–2010, we found that about 6% of all admissions were due primarily to methamphetamine abuse, a substantial drop from the 21% reported in our 2005–2006 study. Conclusions: Our data show a significant national reduction in methamphetamine-related admissions. Other reports show that methamphetamine-related treatment admissions in the United States and Mexico declined sharply during 2005–2008, reportedly in association with Mexico's methamphetamine precursor chemical controls, raising the possibility that the controls may also be associated with the declines reported here.
APA, Harvard, Vancouver, ISO, and other styles
30

Tang, Xiaolan, and John Adekunle Adesina. "Biodiversity Conservation of National Parks and Nature-Protected Areas in West Africa: The Case of Kainji National Park, Nigeria." Sustainability 14, no. 12 (June 15, 2022): 7322. http://dx.doi.org/10.3390/su14127322.

Full text
Abstract:
Due to rising global warming and climate change, biodiversity protection has become a critical ecological concern. Rich biodiversity zones are under threat and are deteriorating, necessitating national, regional, and provincial efforts to safeguard these natural areas. The effective conservation of national parks and nature-protected areas help to improve biodiversity conservation, forest, and urban air quality. The continuous encroachment and abuse of these protected areas have degraded the ecosystem over time. While exploring the geophysical ecology and biodiversity conservation of these areas in West Africa, Kainji National Park was selected for this study because of its notable location, naturalness, rich habitat diversity, topographic uniqueness, and landmass. The conservation of national parks and nature-protected areas is a cornerstone of biodiversity conservation globally. This study is aimed at the target United Nations’ Sustainable Development Goal 13, 2030—Climate Action targeted at taking urgent action towards combating climate change and its impacts. The study captures both flora and fauna that are dominant in the study area. The 15 identified tree species were selected from over 30 species with 563,500,000 (an average of 3,700,000 in each sample frame) trees for every tree species/type with a total of 63% tree green canopy cover. The study areas divided into three zones were randomly sampled within a stratum of 25 × 25 km frames divided into 150 sample frames for proper analyses using the i-Tree Eco v6.0.25. It is a United States Department of Agriculture (USDA) Forest Service peer-reviewed application (software) designed which includes tools for urban and rural forestry study and benefits evaluations. The following microclimatic data were captured and analyzed photosynthetically active radiation, rain/precipitation, temperature, transpiration, evaporation, water intercepted by trees, runoff avoided by trees, potential evaporation by trees, and isoprene and monoterpene by trees. This study also further discusses the tree benefits of a green, low carbon, and sustainable environment within the context of biodiversity conservation, considering carbon storage, carbon sequestration, hydrology effects, pollution removal, oxygen production, and volatile organic compounds (VOCs). There is a quick need for remotely-sensed information about the national parks, protected areas and nature reserves at regular intervals, and government policies must be strict against illegal poaching, logging activities, and other hazardous human impacts.
APA, Harvard, Vancouver, ISO, and other styles
31

Richardson, Rashida, and Amba Kak. "Suspect Development Systems: Databasing Marginality and Enforcing Discipline." University of Michigan Journal of Law Reform, no. 55.4 (2022): 813. http://dx.doi.org/10.36646/mjlr.55.4.suspect.

Full text
Abstract:
Algorithmic accountability law—focused on the regulation of data-driven systems like artificial intelligence (AI) or automated decision-making (ADM) tools—is the subject of lively policy debates, heated advocacy, and mainstream media attention. Concerns have moved beyond data protection and individual due process to encompass a broader range of group-level harms such as discrimination and modes of democratic participation. While a welcome and long overdue shift, the current discourse ignores systems like databases, which are viewed as technically “rudimentary” and often siloed from regulatory scrutiny and public attention. Additionally, burgeoning regulatory proposals like algorithmic impact assessments are not structured to surface important –yet often overlooked –social, organizational, and political economy contexts that are critical to evaluating the practical functions and outcomes of technological systems. This Article presents a new categorical lens and analytical framework that aims to address and overcome these limitations. “Suspect Development Systems” (SDS) refers to: (1) information technologies used by government and private actors, (2) to manage vague or often immeasurable social risk based on presumed or real social conditions (e.g. violence, corruption, substance abuse), (3) that subject targeted individuals or groups to greater suspicion, differential treatment, and more punitive and exclusionary outcomes. This framework includes some of the most recent and egregious examples of data-driven tools (such as predictive policing or risk assessments), but critically, it is also inclusive of a broader range of database systems that are currently at the margins of technology policy discourse. By examining the use of various criminal intelligence databases in India, the United Kingdom, and the United States, we developed a framework of five categories of features (technical, legal, political economy, organizational, and social) that together and separately influence how these technologies function in practice, the ways they are used, and the outcomes they produce. We then apply this analytical framework to welfare system databases, universal or ID number databases, and citizenship databases to demonstrate the value of this framework in both identifying and evaluating emergent or under-examined technologies in other sensitive social domains. Suspect Development Systems is an intervention in legal scholarship and practice, as it provides a much-needed definitional and analytical framework for understanding an ever-evolving ecosystem of technologies embedded and employed in modern governance. Our analysis also helps redirect attention toward important yet often under-examined contexts, conditions, and consequences that are pertinent to the development of meaningful legislative or regulatory interventions in the field of algorithmic accountability. The cross-jurisdictional evidence put forth across this Article illuminates the value of examining commonalities between the Global North and South to inform our understanding of how seemingly disparate technologies and contexts are in fact coaxial, which is the basis for building more global solidarity.
APA, Harvard, Vancouver, ISO, and other styles
32

Castel, J. G. "The Legality and Legitimacy of Unilateral Armed Intervention in an Age of Terror, Neo-Imperialism, and Massive Violations of Human Rights: Is International Law Evolving in the Right Direction?" Canadian Yearbook of international Law/Annuaire canadien de droit international 42 (2005): 3–33. http://dx.doi.org/10.1017/s0069005800008481.

Full text
Abstract:
SummaryWith the end of the Cold War, the United States has emerged as the sole remaining superpower whose ambition is to create a new open and integrated world order based on principks of democratic capitalism. To ensure its hegemony, the United States is prepared to resort to military action with or without UN approval when its international and national security interests are at stake. The intervention in Iraq by the Coalition of the Willing is a good example of this policy and raises the question of its legality and legitimacy under contemporary international law. May or must a state resort to military intervention against a state sponsoring terrorism or depriving its nationals of their internationally recognized human rights? The so-called “Bush doctrine” of anticipatory or preventive self-defence against a state accused of supplying weapons of mass destruction to a foreign terrorist organization, which was one of the reasons advanced by the Coalition of the Willing for intervening in Iraq, meets neither the conditions laid out in Article 51 of the UN Charter nor those of customary international law. Thus, at the present stage of development of international law, the Bush doctrine is not even lege ferenda. It is not an extension of the customary international law right of pre-emptive self-defence. Only with the approval of the Security Council pursuant to Chapter VII of the UN Charter or when it takes place within the strict confines of self-defence, can armed intervention be legitimate.The second reason for intervening in Iraq given by the Coalition of the Willing is based on humanitarian considerations, which raises the question whether the protection of human rights can be assured from the outside. Here, international law is evolving in the right direction since the international community is prepared to adopt the concept of responsibility to protect, which justifies the use of force to protect and enforce human rights as an exception to Article 2(4) and (7) of the UN Charter. Again, such intervention is legal only when approved by the Security Council acting pursuant to Chapter VII on the ground that human right crises do not fall “essentially within the jurisdiction of any state.” However, the international community, with the exception of the Coalition of the Willing, is not yet prepared to support a right of unilateral military intervention as a last resort when the Security Council is incapable and unwilling to do so. This includes intervention motivated by the non-democratic form of government of the targeted state. Although the primary responsibility to deal with human right crises rests with the United Nations based on the responsibility to protect, it is argued that one should not rule out unilateral military action based on a customary international law right of intervention to meet the gravity and urgency of the situation provided the intervening state fully observes the necessary precautionary principles governing such type of intervention. The conclusion is that terrorism and human rights abuses can only be effectively challenged through a concerted multilateral collective approach not through the politics of unilateralism.
APA, Harvard, Vancouver, ISO, and other styles
33

Bogaevskaya, O., A. Bunina, A. Davydov, E. Desyatsky, S. Dmitriev, V. Zhuravleva, S. Kislitsyn, et al. "Joe Biden’s First Year in the White House." Analysis and Forecasting. IMEMO Journal, no. 1 (2022): 54–77. http://dx.doi.org/10.20542/afij-2022-1-54-77.

Full text
Abstract:
The article analyzes major trends in domestic, social, economic, trade and foreign policy of the USA in 2021. The past year turned out to be unexpectedly successful for the Democratic administration of Joseph Biden, who managed to use his party's almost maximum control over the federal government to lay the legislative foundation for the implementation of one of the priority items on the election agenda and began the transformation of the foreign policy strategy of the US global leadership. His first year was really eventful — in the difficult conditions of the ongoing pandemic, he opened a new stage of social and foreign policy transformations. The current US President came to the White House with a large-scale social agenda, on which the Democratic Party has been working all 4 years of Trump's presidency in anticipation of revenge. The ambitious plans, in addition to fighting the pandemic, included the subsequent reform of the healthcare system launched by Barack Obama, ensuring racial equality and social justice, updating the country's long and seriously worn out infrastructure, launching a ‘green transition’ and reforming the country's immigration system. All these reforms are long overdue and really needed. However, since the beginning of the XXI century the reform efforts of presidents traditionally produce very little results — an average of one large-scale reform for each president. The list of changes required by the country is growing, but the speed of its implementation is only falling. The reason for this slowdown lies in partisan polarization and radicalization, which grew rapidly during the same period, shrinking the space for compromise, a key condition for reform efforts under the American separation of powers. The Democrats with J. Biden won their chance for a blitz in 2020, however, not only the Republicans, whose numerical minority made it possible to worry less about their resistance, but also the unity of the Democratic Party itself, were on the way to its implementation. Over the past four years, the left wing of the party has expanded its membership in Congress and has become a powerful force, ready to resist even its own president. The large-scale social agenda proposed by J. Biden during the election campaign, which implies the expansion of the social responsibility of the state, eventually caused serious objections from both left-wing Democrats and Republicans. The first considered it insufficient, for the second it offered too revolutionary changes. Biden's centrist position in the face of radicalization proved to be more of an obstacle to pushing forward reforms than an opportunity to implement them. As a result, all participants had to compromise. Paradoxically, radicalization, which destroyed opportunities and room for compromise, itself became a compromise factor in a situation where changes could be too drastic for both the government itself and society. Finally, the Biden administration was able to seize a unique moment of democratic control over federal power to implement an important part of its social agenda. Biden's original plan to reform the country's infrastructure has seriously changed over this year of cross-party agreements, but in general, the adopted ‘Infrastructure Investment and Jobs Act’ launches large-scale changes in several areas at once, on which the further development and competitiveness of the United States depend. Despite a relatively quick recovery, the US economy continues to face major challenges from the COVID-19 pandemic: high inflation and disruption in production chains. The new model for maintaining and expanding US global leadership, formulated and gradually implemented by Joe Biden’s administration, is based on the creation of a single ideological and technological space of allies in opposition to China and other authoritarian states challenging the US. The anti-Chinese vector determines the main directions of the US foreign policy strategy: returning to traditional allied relations, expanding alliances, ending protracted military campaigns, minimal strategic involvement in long-term conflicts, targeted interaction with competitors and adversaries, and controlled confrontation. This article is a result of a collective multi-aspect research of transformations taking place in the US on a real-time basis. The analysis is built methodologically on the systemic approach to studying American political, social and economic trends, both domestically and on an international level.
APA, Harvard, Vancouver, ISO, and other styles
34

Bondarenko, D. "Global Governance and Diasporas: the Case of African Migrants in the USA." World Economy and International Relations, no. 4 (2015): 37–48. http://dx.doi.org/10.20542/0131-2227-2015-4-37-48.

Full text
Abstract:
In 2013, the Institute for African Studies of the Russian Academy of Sciences began a study of black communities in the USA. By now, the research was conducted in six states (Alabama, Illinois, Massachusetts, Minnesota, New York and Pennsylvania); in a number of towns as well as in the cities of Boston, Minneapolis, New York, Philadelphia and Chicago. The study shows that diasporas as network communities have already formed among recent migrants from many African countries in the U.S. These are diasporas of immigrants from individual countries, not a single “African diaspora”. On one hand, diasporas as an important phenomenon of globalization should become objects of global governance by means of regulation at the transnational level of both migration streams and foreign-born communities norms of existence. On the other hand, diasporas can be agents of social and political global governance, of essentially transnational impact on particular societies and states sending and accepting migrants, as evidenced by the African diasporas in the USA. Most American Africans believe that diasporas must and can take an active part in the home countries’ public life. However, the majority of them concentrates on targeted assistance to certain people – their loved ones back home. The forms of this assistance are diverse, but the main of them is sending remittances. At the same time, the money received from migrants by specific people makes an impact on the whole society and state. For many African states these remittances form a significant part of national income. The migrants’ remittances allow the states to lower the level of social tension. Simultaneously, they have to be especially thorough while building relationships with the migrant accepting countries and with diasporas themselves. Africans constitute an absolute minority among recent migrants in the USA. Nevertheless, directly or indirectly, they exert a certain influence on the establishment of the social life principles and state politics (home and foreign), not only of native countries but also of the accepting one, the U.S. This props up the argument that elaboration of norms and setting the rules of global governance is a business of not only political actors, but of the globalizing civil society, its institutions and organizations either. The most recent example are public debates in the American establishment, including President Obama, on the problem of immigration policy and relationships with migrant sending states, provoked by the 2014 U.S.–Africa Leaders Summit. Remarkably, the African diasporas represented by their leaders actively joined the discussion and openly declared that the state pays insufficiently little attention to the migrants’ needs and insisted on taking their position into account while planning immigration reform. However, Africans are becoming less and less “invisible” in the American society not only in connection with loud, but infrequent specific events. Many educated Africans who have managed to achieve a decent social status and financial position for themselves, have a desire not just to promote the adaptation of migrants from Africa, but to make their collective voice heard in American society and the state at the local and national levels. Their efforts take different forms, but most often they result in establishing and running of various diaspora organizations. These associations become new cells of the American civil society, and in this capacity affect the society itself and the government institutions best they can. Thus, the evidence on Africans in the USA shows that diasporas are both objects (to date, mainly potential) and real subjects of global governance. They influence public life, home and foreign policy of the migrant sending African countries and of migrant accepting United States, make a modest but undeniable contribution to the global phenomena and processes management principles and mechanisms. Acknowledgements. The research was supported by the grants of the Russian Foundation for Humanities: no. 14-01-00070 “African Americans and Recent African Migrants in the USA: Cultural Mythology and Reality of Intercommunity Relations”, no. 13-01-18036 “The Relations between African-Americans and Recent African Migrants: Socio-Cultural Aspects of Intercommunity Perception”, and by the grant of the Russian Academy of Sciences as a part of its Fundamental Research Program for 2014. The author is sincerely grateful to Veronika V. Usacheva and Alexandr E. Zhukov who participated in collecting and processing of the evidence, to Martha Aleo, Ken Baskin, Allison Blakely, Igho Natufe, Bella and Kirk Sorbo, Harold Weaver whose assistance in organization and conduction of the research was inestimable, as well as to all the informants who were so kind as to spend their time for frank communication.
APA, Harvard, Vancouver, ISO, and other styles
35

Kerwin, Donald, José Pacas, and Robert Warren. "Ready to Stay: A Comprehensive Analysis of the US Foreign-Born Populations Eligible for Special Legal Status Programs and for Legalization Under Pending Bills." Journal on Migration and Human Security 10, no. 1 (February 4, 2022): 37–76. http://dx.doi.org/10.1177/23315024211065016.

Full text
Abstract:
This paper offers estimates of US foreign-born populations that are eligible for special legal status programs and those that would be eligible for permanent residence (legalization) under pending bills. It seeks to provide policymakers, government agencies, community-based organizations (CBOs), researchers, and others with a unique tool to assess the potential impact, implement, and analyze the success of these programs. It views timely, comprehensive data on targeted immigrant populations as an essential pillar of legalization preparedness, implementation, and evaluation. The paper and the exhaustive estimates that underlie it, represent the first attempt to provide a detailed statistical profile of beneficiaries of proposed major US legalization programs and special, large-scale legal status programs. The paper offers the following top-line findings: Fifty-eight percent of the 10.35 million US undocumented residents had lived in the United States for 10 years or more as of 2019; 37 percent lived in homes with mortgages; 33 percent arrived at age 17 or younger; 32 percent lived in households with US citizens (the overwhelming majority of them children); and 96 percent in the labor force were employed. The Citizenship for Essential Workers Act would establish the largest population-specific legalization program discussed in the paper. 7.2 million (70 percent) of the total undocumented population would be eligible for legalization under the Act. Approximately two-thirds of undocumented essential workers reside in 20 metropolitan areas. The populations eligible for the original Deferred Action for Childhood Arrivals (DACA) program and for permanent residence on a conditional basis and removal of the conditions on permanent residence under the Dream Act of 2021 are not only ready to integrate successfully, but in most cases have already done so. A high percentage are long-term residents, virtually all have completed high school (or attend school), a third to one-half have attended college, and the overwhelming majority live in households with incomes above the poverty level. The median household income of California, Illinois, New York, and New Jersey residents that are eligible for the original DACA program is higher than the US median household income. New York and New Jersey residents that are eligible for removal of conditions on permanent residence under the Dream Act of 2021 also have median incomes above the US median household income. The total eligible for removal of conditions on permanent residence under the Dream Act of 2021 have median household incomes that are 99 percent of the US median income. Unlike populations eligible for most special legal status and population-specific legalization programs, childhood arrivals can be found in significant numbers and concentrations in communities throughout the United States, particularly in metropolitan areas. More than 1.8 million persons from El Salvador, Guatemala, and Honduras would be eligible for TPS if the Secretary of the Department of Homeland Security (DHS) designated Guatemala for TPS and re-designated El Salvador and Honduras. Local communities can best prepare for legalization by collaborating on: (1) the hard work of assisting individual immigrants to meet their immigration needs; (2) dividing labor, integrating services, screening the undocumented for status, and building legal capacity; and (3) implementation of special legal status programs. This collective work should be viewed as a legalization program in its own right. The populations eligible for legalization and legal status under the programs analyzed in the paper have overlapping needs and large numbers of immigrants would be eligible for more than one program. However, substantial differences between these populations in size, geography, length of residency, education, socio-economic attainment, and English language proficiency argue for distinct preparedness and implementation strategies for each population. The paper also makes several broad policy recommendations regarding legalization bills, special legal status programs, and community-based preparedness and implementation efforts. In particular, it recommends that: Congress should pass broad immigration reform legislation that includes a general legalization program or, in the alternative, a series of population-specific programs for essential workers, childhood arrivals, agricultural workers, persons eligible for Temporary Protected Status (TPS) and Deferred Enforced Departure (DED), and long-term residents. In the interim, the Biden administration should also designate and re-designate additional countries for TPS. Immigration reform legislation should allow the great majority of US undocumented residents to legalize, should reform the underlying legal immigration system, and should provide for the legalization of future long-term undocumented residents through a rolling registry program. Congress, the relevant federal agencies, and advocates should ensure that any legalization program be properly structured and sufficiently funded, particularly the work of CBOs, states, and localities. Local communities should continue to build the necessary partnerships, capacities, skills, and resources to implement a legalization program. They should do so, in part, by collaborating on special legal status programs such as DACA, TPS, and naturalization campaigns, as well as through the steady-state work of assisting immigrants in their individual immigration cases and funding their representation as necessary in removal proceedings. Section I of the paper describes the populations that would be eligible for legalization under pending bills and that are potentially eligible for special legal status programs. Section II presents top-line findings based on the Center for Migration Studies’ (CMS’s) estimates and profiles of these populations. The report offers estimates of each population by characteristics — such as length of time in the country, English language proficiency, education, household income, health insurance, and homeownership — that are relevant to preparedness and implementation activities. Section III makes the case for immigration reform and a broad legalization program. Section IV offers detailed recommendations on the substance, structure, and implementation of these programs.
APA, Harvard, Vancouver, ISO, and other styles
36

Birdsall, Andrea. "New technologies and legal justification: The United Kingdom’s use of drones in self-defence." Global Constitutionalism, March 1, 2022, 1–20. http://dx.doi.org/10.1017/s2045381721000253.

Full text
Abstract:
Abstract This article examines the United Kingdom’s use of drones in an act of self-defence in a counter-terrorism operation. The government justified the targeted killing of a UK citizen in Syria – a country with which it was not at war at the time – with reference to existing laws and norms. In doing so, it contested a number of established concepts to justify its conduct as lawful activity. The article argues that modern weapons such as drones, which are used to address novel threats, lead to legal justification that in turn has the potential to create new laws. In this way, the intersection of norms, warfare and new technologies becomes a productive site of political contestation. The contribution of the article is twofold: empirically, it contributes to debates on targeted killing and discussions surrounding the meaning and interpretation of ‘imminence’ in the context of preventive self-defence in the United Kingdom; and theoretically, it adds to the constructivist literature by examining norm contestation and resulting normativity in this area. The article concludes that the legal justification in this particular instance has important implications for other emerging technologies that require discussions about how states justify their actions to conform with existing legal and normative frameworks.
APA, Harvard, Vancouver, ISO, and other styles
37

Sell, Daniel. "The United States’ Policy of Targeted Killing and the Use of Force: Another Exception to the United Nations Use of Force Regime." SSRN Electronic Journal, 2012. http://dx.doi.org/10.2139/ssrn.2167770.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Martin, Kate. "Preventive Detention of Immigrants and Non-Citizens in the United States since September 11th." Refuge: Canada's Journal on Refugees, August 1, 2002, 23–28. http://dx.doi.org/10.25071/1920-7336.21270.

Full text
Abstract:
The attacks of September 11, 2002, have dramatically altered the policy andscape in Washington, but it is important to reject the notion that there is a necessary trade-off between security and civil liberties. One of the most serious threats to civil liberties has been the adoption of a policy of preventive detention that has resulted in the secret jailing of hundreds of Arabs and Muslims when there is no evidence linking them to terrorist activity. This has been done, not by using the limited new authorities granted the government in the post-September 11 terrorism legislation, but by improperly using pre-existing criminal and immigration authorities. Secret arrests are antithetical to a democratic society. A targeted investigation that focuses on actual terrorist activity and respects the legitimate political and religious activity of citizens and non-citizens would be more effective than a dragnet approach that has resulted in the secret arrests of hundreds of individuals.
APA, Harvard, Vancouver, ISO, and other styles
39

Calderon, Maria Apolonia. "Foundations as “Amigos o Rebeldes”: The Influence of Philanthropic Funding on Local Immigration Policy Outputs." Nonprofit Policy Forum 11, no. 2 (July 24, 2020). http://dx.doi.org/10.1515/npf-2019-0053.

Full text
Abstract:
AbstractResearch on foundations public policy influence, traditionally, focuses on policy reform. Largely unexplored is the influence that philanthropic funding has on recipient communities. Unlike previous research, this study uses a newly compiled dataset on immigration-related giving to study how funding for political citizenship services, integration services, and government-related advocacy influences the identification of deportable immigrants across the continental United States. The quantitative analysis indicates foundations exert indirect influence within local immigration policy outputs through the use of targeted philanthropic grants. However, the effect of the indirect influence depends upon the policy activities receiving funding. Philanthropic foundations’ providing funding for political citizenship and integration services lead to decreases in immigration enforcement. While funding for government-related advocacy can help increase immigration enforcement, it can also help address issues of equity in immigration enforcement. Interviews with foundation grantees provide further insights into how the funding of these policy activities can alter the relationship between the philanthropic community and the government agencies implementing U.S. immigration policy.
APA, Harvard, Vancouver, ISO, and other styles
40

Alger, Justin. "The Political Economy of Protected Area Designations: Commercial Interests in Conservation Policy." Global Environmental Politics, November 30, 2022, 1–20. http://dx.doi.org/10.1162/glep_a_00690.

Full text
Abstract:
Abstract States have increased the pace and scale of conservation efforts in recent years as they strive to meet ambitious terrestrial and marine protected area targets. The ecological gains made in this push for protections, however, seem to be no better than if governments designated protected areas at random. Many critics point to states prioritizing quantity over quality of protections—rightly so—but this point does not fully explain the shortcomings of the global biodiversity network. The problem is more deeply rooted in the processes through which governments designate protected areas. Governments prioritize minimizing short-term commercial losses over maximizing long-term ecological gains in conservation policy processes, leading to two predominant types of protected area: residual and paper park. The causal mechanism driving these processes is how salient industry interests are in an area targeted for protections, which predicts government policy response, demonstrated here through case studies in Australia and the United States.
APA, Harvard, Vancouver, ISO, and other styles
41

Anderson, Robert M. "Killing for the common good? The (bio)politics of wolf management in Washington State." Elementa: Science of the Anthropocene 9, no. 1 (2021). http://dx.doi.org/10.1525/elementa.2020.00179.

Full text
Abstract:
Washington State has been rocked by conflict over wolves, whose return to rural landscapes after their extirpation a century ago has brought them into new, often violent relations with human society. I interpret this emblematic instance of human–wildlife conflict as fundamentally a human–human conflict and a manifestation of different deep-seated sociocultural norms and values toward wolves. This social conflict hinges on two competing, underacknowledged forms of commoning—wildlife as a public trust and grazing access to public lands—that already intertwine the economy of the rural Western United States. Amid these tensions, wildlife managers seek to reduce conflict through the targeted killing (“lethal removal”) of wolves that repeatedly prey on livestock. I draw on ethnographic research examining the ongoing debate over lethal removal policy in Washington’s “Wolf Advisory Group,” an advisory committee aimed at transforming Washington’s wolf conflict through collaborative governance. Drawing together the theoretical frameworks of commoning and conservation environmentality, I frame these debates as an effort to produce shared social norms regarding wolf life and death. In this context, lethal removal of wolves functions as a biopolitical intervention targeted to affect social values, producing “social tolerance” for wolves in Washington’s rural landscapes. The paradox of wolf conservation governance is that achieving the social tolerance necessary for long-term recovery requires that the state kill wolves in the name of shared common interest and responsibility.
APA, Harvard, Vancouver, ISO, and other styles
42

Moy, Naomi, Marcello Antonini, Mattias Kyhlstedt, Gianluca Fiorentini, and Francesco Paolucci. "Standardising policy and technology responses in the immediate aftermath of a pandemic: a comparative and conceptual framework." Health Research Policy and Systems 21, no. 1 (January 25, 2023). http://dx.doi.org/10.1186/s12961-022-00951-x.

Full text
Abstract:
Abstract Background The initial policy response to the COVID-19 pandemic has differed widely across countries. Such variability in government interventions has made it difficult for policymakers and health research systems to compare what has happened and the effectiveness of interventions across nations. Timely information and analysis are crucial to addressing the lag between the pandemic and government responses to implement targeted interventions to alleviate the impact of the pandemic. Methods To examine the effect government interventions and technological responses have on epidemiological and economic outcomes, this policy paper proposes a conceptual framework that provides a qualitative taxonomy of government policy directives implemented in the immediate aftermath of a pandemic announcement and before vaccines are implementable. This framework assigns a gradient indicating the intensity and extent of the policy measures and applies the gradient to four countries that share similar institutional features but different COVID-19 experiences: Italy, New Zealand, the United Kingdom and the United States of America. Results Using the categorisation framework allows qualitative information to be presented, and more specifically the gradient can show the dynamic impact of policy interventions on specific outcomes. We have observed that the policy categorisation described here can be used by decision-makers to examine the impacts of major viral outbreaks such as SARS-CoV-2 on health and economic outcomes over time. The framework allows for a visualisation of the frequency and comparison of dominant policies and provides a conceptual tool to assess how dominant interventions (and innovations) affect different sets of health and non-health related outcomes during the response phase to the pandemic. Conclusions Policymakers and health researchers should converge toward an optimal set of policy interventions to minimize the costs of the pandemic (i.e., health and economic), and facilitate coordination across governance levels before effective vaccines are produced. The proposed framework provides a useful tool to direct health research system resources and build a policy benchmark for future viral outbreaks where vaccines are not readily available.
APA, Harvard, Vancouver, ISO, and other styles
43

Burns, Alex. "Doubting the Global War on Terror." M/C Journal 14, no. 1 (January 24, 2011). http://dx.doi.org/10.5204/mcj.338.

Full text
Abstract:
Photograph by Gonzalo Echeverria (2010)Declaring War Soon after Al Qaeda’s terrorist attacks on 11 September 2001, the Bush Administration described its new grand strategy: the “Global War on Terror”. This underpinned the subsequent counter-insurgency in Afghanistan and the United States invasion of Iraq in March 2003. Media pundits quickly applied the Global War on Terror label to the Madrid, Bali and London bombings, to convey how Al Qaeda’s terrorism had gone transnational. Meanwhile, international relations scholars debated the extent to which September 11 had changed the international system (Brenner; Mann 303). American intellectuals adopted several variations of the Global War on Terror in what initially felt like a transitional period of US foreign policy (Burns). Walter Laqueur suggested Al Qaeda was engaged in a “cosmological” and perpetual war. Paul Berman likened Al Qaeda and militant Islam to the past ideological battles against communism and fascism (Heilbrunn 248). In a widely cited article, neoconservative thinker Norman Podhoretz suggested the United States faced “World War IV”, which had three interlocking drivers: Al Qaeda and trans-national terrorism; political Islam as the West’s existential enemy; and nuclear proliferation to ‘rogue’ countries and non-state actors (Friedman 3). Podhoretz’s tone reflected a revival of his earlier Cold War politics and critique of the New Left (Friedman 148-149; Halper and Clarke 56; Heilbrunn 210). These stances attracted widespread support. For instance, the United States Marine Corp recalibrated its mission to fight a long war against “World War IV-like” enemies. Yet these stances left the United States unprepared as the combat situations in Afghanistan and Iraq worsened (Ricks; Ferguson; Filkins). Neoconservative ideals for Iraq “regime change” to transform the Middle East failed to deal with other security problems such as Pakistan’s Musharraf regime (Dorrien 110; Halper and Clarke 210-211; Friedman 121, 223; Heilbrunn 252). The Manichean and open-ended framing became a self-fulfilling prophecy for insurgents, jihadists, and militias. The Bush Administration quietly abandoned the Global War on Terror in July 2005. Widespread support had given way to policymaker doubt. Why did so many intellectuals and strategists embrace the Global War on Terror as the best possible “grand strategy” perspective of a post-September 11 world? Why was there so little doubt of this worldview? This is a debate with roots as old as the Sceptics versus the Sophists. Explanations usually focus on the Bush Administration’s “Vulcans” war cabinet: Vice President Dick Cheney, Secretary of Defense Donald Rumsfield, and National Security Advisor Condoleezza Rice, who later became Secretary of State (Mann xv-xvi). The “Vulcans” were named after the Roman god Vulcan because Rice’s hometown Birmingham, Alabama, had “a mammoth fifty-six foot statue . . . [in] homage to the city’s steel industry” (Mann x) and the name stuck. Alternatively, explanations focus on how neoconservative thinkers shaped the intellectual climate after September 11, in a receptive media climate. Biographers suggest that “neoconservatism had become an echo chamber” (Heilbrunn 242) with its own media outlets, pundits, and think-tanks such as the American Enterprise Institute and Project for a New America. Neoconservatism briefly flourished in Washington DC until Iraq’s sectarian violence discredited the “Vulcans” and neoconservative strategists like Paul Wolfowitz (Friedman; Ferguson). The neoconservatives' combination of September 11’s aftermath with strongly argued historical analogies was initially convincing. They conferred with scholars such as Bernard Lewis, Samuel P. Huntington and Victor Davis Hanson to construct classicist historical narratives and to explain cultural differences. However, the history of the decade after September 11 also contains mis-steps and mistakes which make it a series of contingent decisions (Ferguson; Bergen). One way to analyse these contingent decisions is to pose “what if?” counterfactuals, or feasible alternatives to historical events (Lebow). For instance, what if September 11 had been a chemical and biological weapons attack? (Mann 317). Appendix 1 includes a range of alternative possibilities and “minimal rewrites” or slight variations on the historical events which occurred. Collectively, these counterfactuals suggest the role of agency, chance, luck, and the juxtaposition of better and worse outcomes. They pose challenges to the classicist interpretation adopted soon after September 11 to justify “World War IV” (Podhoretz). A ‘Two-Track’ Process for ‘World War IV’ After the September 11 attacks, I think an overlapping two-track process occurred with the “Vulcans” cabinet, neoconservative advisers, and two “echo chambers”: neoconservative think-tanks and the post-September 11 media. Crucially, Bush’s “Vulcans” war cabinet succeeded in gaining civilian control of the United States war decision process. Although successful in initiating the 2003 Iraq War this civilian control created a deeper crisis in US civil-military relations (Stevenson; Morgan). The “Vulcans” relied on “politicised” intelligence such as a United Kingdom intelligence report on Iraq’s weapons development program. The report enabled “a climate of undifferentiated fear to arise” because its public version did not distinguish between chemical, biological, radiological or nuclear weapons (Halper and Clarke, 210). The cautious 2003 National Intelligence Estimates (NIE) report on Iraq was only released in a strongly edited form. For instance, the US Department of Energy had expressed doubts about claims that Iraq had approached Niger for uranium, and was using aluminium tubes for biological and chemical weapons development. Meanwhile, the post-September 11 media had become a second “echo chamber” (Halper and Clarke 194-196) which amplified neoconservative arguments. Berman, Laqueur, Podhoretz and others who framed the intellectual climate were “risk entrepreneurs” (Mueller 41-43) that supported the “World War IV” vision. The media also engaged in aggressive “flak” campaigns (Herman and Chomsky 26-28; Mueller 39-42) designed to limit debate and to stress foreign policy stances and themes which supported the Bush Administration. When former Central Intelligence Agency director James Woolsey’s claimed that Al Qaeda had close connections to Iraqi intelligence, this was promoted in several books, including Michael Ledeen’s War Against The Terror Masters, Stephen Hayes’ The Connection, and Laurie Mylroie’s Bush v. The Beltway; and in partisan media such as Fox News, NewsMax, and The Weekly Standard who each attacked the US State Department and the CIA (Dorrien 183; Hayes; Ledeen; Mylroie; Heilbrunn 237, 243-244; Mann 310). This was the media “echo chamber” at work. The group Accuracy in Media also campaigned successfully to ensure that US cable providers did not give Al Jazeera English access to US audiences (Barker). Cosmopolitan ideals seemed incompatible with what the “flak” groups desired. The two-track process converged on two now infamous speeches. US President Bush’s State of the Union Address on 29 January 2002, and US Secretary of State Colin Powell’s presentation to the United Nations on 5 February 2003. Bush’s speech included a line from neoconservative David Frumm about North Korea, Iraq and Iran as an “Axis of Evil” (Dorrien 158; Halper and Clarke 139-140; Mann 242, 317-321). Powell’s presentation to the United Nations included now-debunked threat assessments. In fact, Powell had altered the speech’s original draft by I. Lewis “Scooter” Libby, who was Cheney’s chief of staff (Dorrien 183-184). Powell claimed that Iraq had mobile biological weapons facilities, linked to Abu Musab al-Zarqawi. However, the International Atomic Energy Agency’s (IAEA) Mohamed El-Baradei, the Defense Intelligence Agency, the State Department, and the Institute for Science and International Security all strongly doubted this claim, as did international observers (Dorrien 184; Halper and Clarke 212-213; Mann 353-354). Yet this information was suppressed: attacked by “flak” or given little visible media coverage. Powell’s agenda included trying to rebuild an international coalition and to head off weather changes that would affect military operations in the Middle East (Mann 351). Both speeches used politicised variants of “weapons of mass destruction”, taken from the counterterrorism literature (Stern; Laqueur). Bush’s speech created an inflated geopolitical threat whilst Powell relied on flawed intelligence and scientific visuals to communicate a non-existent threat (Vogel). However, they had the intended effect on decision makers. US Under-Secretary of Defense, the neoconservative Paul Wolfowitz, later revealed to Vanity Fair that “weapons of mass destruction” was selected as an issue that all potential stakeholders could agree on (Wilkie 69). Perhaps the only remaining outlet was satire: Armando Iannucci’s 2009 film In The Loop parodied the diplomatic politics surrounding Powell’s speech and the civil-military tensions on the Iraq War’s eve. In the short term the two track process worked in heading off doubt. The “Vulcans” blocked important information on pre-war Iraq intelligence from reaching the media and the general public (Prados). Alternatively, they ignored area specialists and other experts, such as when Coalition Provisional Authority’s L. Paul Bremer ignored the US State Department’s fifteen volume ‘Future of Iraq’ project (Ferguson). Public “flak” and “risk entrepreneurs” mobilised a range of motivations from grief and revenge to historical memory and identity politics. This combination of private and public processes meant that although doubts were expressed, they could be contained through the dual echo chambers of neoconservative policymaking and the post-September 11 media. These factors enabled the “Vulcans” to proceed with their “regime change” plans despite strong public opposition from anti-war protestors. Expressing DoubtsMany experts and institutions expressed doubt about specific claims the Bush Administration made to support the 2003 Iraq War. This doubt came from three different and sometimes overlapping groups. Subject matter experts such as the IAEA’s Mohamed El-Baradei and weapons development scientists countered the UK intelligence report and Powell’s UN speech. However, they did not get the media coverage warranted due to “flak” and “echo chamber” dynamics. Others could challenge misleading historical analogies between insurgent Iraq and Nazi Germany, and yet not change the broader outcomes (Benjamin). Independent journalists one group who gained new information during the 1990-91 Gulf War: some entered Iraq from Kuwait and documented a more humanitarian side of the war to journalists embedded with US military units (Uyarra). Finally, there were dissenters from bureaucratic and institutional processes. In some cases, all three overlapped. In their separate analyses of the post-September 11 debate on intelligence “failure”, Zegart and Jervis point to a range of analytic misperceptions and institutional problems. However, the intelligence community is separated from policymakers such as the “Vulcans”. Compartmentalisation due to the “need to know” principle also means that doubting analysts can be blocked from releasing information. Andrew Wilkie discovered this when he resigned from Australia’s Office for National Assessments (ONA) as a transnational issues analyst. Wilkie questioned the pre-war assessments in Powell’s United Nations speech that were used to justify the 2003 Iraq War. Wilkie was then attacked publicly by Australian Prime Minister John Howard. This overshadowed a more important fact: both Howard and Wilkie knew that due to Australian legislation, Wilkie could not publicly comment on ONA intelligence, despite the invitation to do so. This barrier also prevented other intelligence analysts from responding to the “Vulcans”, and to “flak” and “echo chamber” dynamics in the media and neoconservative think-tanks. Many analysts knew that the excerpts released from the 2003 NIE on Iraq was highly edited (Prados). For example, Australian agencies such as the ONA, the Department of Foreign Affairs and Trade, and the Department of Defence knew this (Wilkie 98). However, analysts are trained not to interfere with policymakers, even when there are significant civil-military irregularities. Military officials who spoke out about pre-war planning against the “Vulcans” and their neoconservative supporters were silenced (Ricks; Ferguson). Greenlight Capital’s hedge fund manager David Einhorn illustrates in a different context what might happen if analysts did comment. Einhorn gave a speech to the Ira Sohn Conference on 15 May 2002 debunking the management of Allied Capital. Einhorn’s “short-selling” led to retaliation from Allied Capital, a Securities and Exchange Commission investigation, and growing evidence of potential fraud. If analysts adopted Einhorn’s tactics—combining rigorous analysis with targeted, public denunciation that is widely reported—then this may have short-circuited the “flak” and “echo chamber” effects prior to the 2003 Iraq War. The intelligence community usually tries to pre-empt such outcomes via contestation exercises and similar processes. This was the goal of the 2003 NIE on Iraq, despite the fact that the US Department of Energy which had the expertise was overruled by other agencies who expressed opinions not necessarily based on rigorous scientific and technical analysis (Prados; Vogel). In counterterrorism circles, similar disinformation arose about Aum Shinrikyo’s biological weapons research after its sarin gas attack on Tokyo’s subway system on 20 March 1995 (Leitenberg). Disinformation also arose regarding nuclear weapons proliferation to non-state actors in the 1990s (Stern). Interestingly, several of the “Vulcans” and neoconservatives had been involved in an earlier controversial contestation exercise: Team B in 1976. The Central Intelligence Agency (CIA) assembled three Team B groups in order to evaluate and forecast Soviet military capabilities. One group headed by historian Richard Pipes gave highly “alarmist” forecasts and then attacked a CIA NIE about the Soviets (Dorrien 50-56; Mueller 81). The neoconservatives adopted these same tactics to reframe the 2003 NIE from its position of caution, expressed by several intelligence agencies and experts, to belief that Iraq possessed a current, covert program to develop weapons of mass destruction (Prados). Alternatively, information may be leaked to the media to express doubt. “Non-attributable” background interviews to establishment journalists like Seymour Hersh and Bob Woodward achieved this. Wikileaks publisher Julian Assange has recently achieved notoriety due to US diplomatic cables from the SIPRNet network released from 28 November 2010 onwards. Supporters have favourably compared Assange to Daniel Ellsberg, the RAND researcher who leaked the Pentagon Papers (Ellsberg; Ehrlich and Goldsmith). Whilst Elsberg succeeded because a network of US national papers continued to print excerpts from the Pentagon Papers despite lawsuit threats, Assange relied in part on favourable coverage from the UK’s Guardian newspaper. However, suspected sources such as US Army soldier Bradley Manning are not protected whilst media outlets are relatively free to publish their scoops (Walt, ‘Woodward’). Assange’s publication of SIPRNet’s diplomatic cables will also likely mean greater restrictions on diplomatic and military intelligence (Walt, ‘Don’t Write’). Beyond ‘Doubt’ Iraq’s worsening security discredited many of the factors that had given the neoconservatives credibility. The post-September 11 media became increasingly more critical of the US military in Iraq (Ferguson) and cautious about the “echo chamber” of think-tanks and media outlets. Internet sites for Al Jazeera English, Al-Arabiya and other networks have enabled people to bypass “flak” and directly access these different viewpoints. Most damagingly, the non-discovery of Iraq’s weapons of mass destruction discredited both the 2003 NIE on Iraq and Colin Powell’s United Nations presentation (Wilkie 104). Likewise, “risk entrepreneurs” who foresaw “World War IV” in 2002 and 2003 have now distanced themselves from these apocalyptic forecasts due to a series of mis-steps and mistakes by the Bush Administration and Al Qaeda’s over-calculation (Bergen). The emergence of sites such as Wikileaks, and networks like Al Jazeera English and Al-Arabiya, are a response to the politics of the past decade. They attempt to short-circuit past “echo chambers” through providing access to different sources and leaked data. The Global War on Terror framed the Bush Administration’s response to September 11 as a war (Kirk; Mueller 59). Whilst this prematurely closed off other possibilities, it has also unleashed a series of dynamics which have undermined the neoconservative agenda. The “classicist” history and historical analogies constructed to justify the “World War IV” scenario are just one of several potential frameworks. “Flak” organisations and media “echo chambers” are now challenged by well-financed and strategic alternatives such as Al Jazeera English and Al-Arabiya. Doubt is one defence against “risk entrepreneurs” who seek to promote a particular idea: doubt guards against uncritical adoption. Perhaps the enduring lesson of the post-September 11 debates, though, is that doubt alone is not enough. What is needed are individuals and institutions that understand the strategies which the neoconservatives and others have used, and who also have the soft power skills during crises to influence critical decision-makers to choose alternatives. Appendix 1: Counterfactuals Richard Ned Lebow uses “what if?” counterfactuals to examine alternative possibilities and “minimal rewrites” or slight variations on the historical events that occurred. The following counterfactuals suggest that the Bush Administration’s Global War on Terror could have evolved very differently . . . or not occurred at all. Fact: The 2003 Iraq War and 2001 Afghanistan counterinsurgency shaped the Bush Administration’s post-September 11 grand strategy. Counterfactual #1: Al Gore decisively wins the 2000 U.S. election. Bush v. Gore never occurs. After the September 11 attacks, Gore focuses on international alliance-building and gains widespread diplomatic support rather than a neoconservative agenda. He authorises Special Operations Forces in Afghanistan and works closely with the Musharraf regime in Pakistan to target Al Qaeda’s muhajideen. He ‘contains’ Saddam Hussein’s Iraq through measurement and signature, technical intelligence, and more stringent monitoring by the International Atomic Energy Agency. Minimal Rewrite: United 93 crashes in Washington DC, killing senior members of the Gore Administration. Fact: U.S. Special Operations Forces failed to kill Osama bin Laden in late November and early December 2001 at Tora Bora. Counterfactual #2: U.S. Special Operations Forces kill Osama bin Laden in early December 2001 during skirmishes at Tora Bora. Ayman al-Zawahiri is critically wounded, captured, and imprisoned. The rest of Al Qaeda is scattered. Minimal Rewrite: Osama bin Laden’s death turns him into a self-mythologised hero for decades. Fact: The UK Blair Government supplied a 50-page intelligence dossier on Iraq’s weapons development program which the Bush Administration used to support its pre-war planning. Counterfactual #3: Rogue intelligence analysts debunk the UK Blair Government’s claims through a series of ‘targeted’ leaks to establishment news sources. Minimal Rewrite: The 50-page intelligence dossier is later discovered to be correct about Iraq’s weapons development program. Fact: The Bush Administration used the 2003 National Intelligence Estimate to “build its case” for “regime change” in Saddam Hussein’s Iraq. Counterfactual #4: A joint investigation by The New York Times and The Washington Post rebuts U.S. Secretary of State Colin Powell’s speech to the United National Security Council, delivered on 5 February 2003. Minimal Rewrite: The Central Intelligence Agency’s whitepaper “Iraq’s Weapons of Mass Destruction Programs” (October 2002) more accurately reflects the 2003 NIE’s cautious assessments. Fact: The Bush Administration relied on Ahmed Chalabi for its postwar estimates about Iraq’s reconstruction. Counterfactual #5: The Bush Administration ignores Chalabi’s advice and relies instead on the U.S. State Department’s 15 volume report “The Future of Iraq”. Minimal Rewrite: The Coalition Provisional Authority appoints Ahmed Chalabi to head an interim Iraqi government. Fact: L. Paul Bremer signed orders to disband Iraq’s Army and to De-Ba’athify Iraq’s new government. Counterfactual #6: Bremer keeps Iraq’s Army intact and uses it to impose security in Baghdad to prevent looting and to thwart insurgents. Rather than a De-Ba’athification policy, Bremer uses former Baath Party members to gather situational intelligence. Minimal Rewrite: Iraq’s Army refuses to disband and the De-Ba’athification policy uncovers several conspiracies to undermine the Coalition Provisional Authority. AcknowledgmentsThanks to Stephen McGrail for advice on science and technology analysis.References Barker, Greg. “War of Ideas”. PBS Frontline. Boston, MA: 2007. ‹http://www.pbs.org/frontlineworld/stories/newswar/video1.html› Benjamin, Daniel. “Condi’s Phony History.” Slate 29 Aug. 2003. ‹http://www.slate.com/id/2087768/pagenum/all/›. Bergen, Peter L. The Longest War: The Enduring Conflict between America and Al Qaeda. New York: The Free Press, 2011. Berman, Paul. Terror and Liberalism. W.W. Norton & Company: New York, 2003. Brenner, William J. “In Search of Monsters: Realism and Progress in International Relations Theory after September 11.” Security Studies 15.3 (2006): 496-528. Burns, Alex. “The Worldflash of a Coming Future.” M/C Journal 6.2 (April 2003). ‹http://journal.media-culture.org.au/0304/08-worldflash.php›. Dorrien, Gary. Imperial Designs: Neoconservatism and the New Pax Americana. New York: Routledge, 2004. Ehrlich, Judith, and Goldsmith, Rick. The Most Dangerous Man in America: Daniel Ellsberg and the Pentagon Papers. Berkley CA: Kovno Communications, 2009. Einhorn, David. Fooling Some of the People All of the Time: A Long Short (and Now Complete) Story. Hoboken NJ: John Wiley & Sons, 2010. Ellison, Sarah. “The Man Who Spilled The Secrets.” Vanity Fair (Feb. 2011). ‹http://www.vanityfair.com/politics/features/2011/02/the-guardian-201102›. Ellsberg, Daniel. Secrets: A Memoir of Vietnam and the Pentagon Papers. New York: Viking, 2002. Ferguson, Charles. No End in Sight, New York: Representational Pictures, 2007. Filkins, Dexter. The Forever War. New York: Vintage Books, 2008. Friedman, Murray. The Neoconservative Revolution: Jewish Intellectuals and the Shaping of Public Policy. New York: Cambridge UP, 2005. Halper, Stefan, and Jonathan Clarke. America Alone: The Neo-Conservatives and the Global Order. New York: Cambridge UP, 2004. Hayes, Stephen F. The Connection: How Al Qaeda’s Collaboration with Saddam Hussein Has Endangered America. New York: HarperCollins, 2004. Heilbrunn, Jacob. They Knew They Were Right: The Rise of the Neocons. New York: Doubleday, 2008. Herman, Edward S., and Noam Chomsky. Manufacturing Consent: The Political Economy of the Mass Media. Rev. ed. New York: Pantheon Books, 2002. Iannucci, Armando. In The Loop. London: BBC Films, 2009. Jervis, Robert. Why Intelligence Fails: Lessons from the Iranian Revolution and the Iraq War. Ithaca NY: Cornell UP, 2010. Kirk, Michael. “The War behind Closed Doors.” PBS Frontline. Boston, MA: 2003. ‹http://www.pbs.org/wgbh/pages/frontline/shows/iraq/›. Laqueur, Walter. No End to War: Terrorism in the Twenty-First Century. New York: Continuum, 2003. Lebow, Richard Ned. Forbidden Fruit: Counterfactuals and International Relations. Princeton NJ: Princeton UP, 2010. Ledeen, Michael. The War against The Terror Masters. New York: St. Martin’s Griffin, 2003. Leitenberg, Milton. “Aum Shinrikyo's Efforts to Produce Biological Weapons: A Case Study in the Serial Propagation of Misinformation.” Terrorism and Political Violence 11.4 (1999): 149-158. Mann, James. Rise of the Vulcans: The History of Bush’s War Cabinet. New York: Viking Penguin, 2004. Morgan, Matthew J. The American Military after 9/11: Society, State, and Empire. New York: Palgrave Macmillan, 2008. Mueller, John. Overblown: How Politicians and the Terrorism Industry Inflate National Security Threats, and Why We Believe Them. New York: The Free Press, 2009. Mylroie, Laurie. Bush v The Beltway: The Inside Battle over War in Iraq. New York: Regan Books, 2003. Nutt, Paul C. Why Decisions Fail. San Francisco: Berrett-Koelher, 2002. Podhoretz, Norman. “How to Win World War IV”. Commentary 113.2 (2002): 19-29. Prados, John. Hoodwinked: The Documents That Reveal How Bush Sold Us a War. New York: The New Press, 2004. Ricks, Thomas. Fiasco: The American Military Adventure in Iraq. New York: The Penguin Press, 2006. Stern, Jessica. The Ultimate Terrorists. Boston, MA: Harvard UP, 2001. Stevenson, Charles A. Warriors and Politicians: US Civil-Military Relations under Stress. New York: Routledge, 2006. Walt, Stephen M. “Should Bob Woodward Be Arrested?” Foreign Policy 10 Dec. 2010. ‹http://walt.foreignpolicy.com/posts/2010/12/10/more_wikileaks_double_standards›. Walt, Stephen M. “‘Don’t Write If You Can Talk...’: The Latest from WikiLeaks.” Foreign Policy 29 Nov. 2010. ‹http://walt.foreignpolicy.com/posts/2010/11/29/dont_write_if_you_can_talk_the_latest_from_wikileaks›. Wilkie, Andrew. Axis of Deceit. Melbourne: Black Ink Books, 2003. Uyarra, Esteban Manzanares. “War Feels like War”. London: BBC, 2003. Vogel, Kathleen M. “Iraqi Winnebagos™ of Death: Imagined and Realized Futures of US Bioweapons Threat Assessments.” Science and Public Policy 35.8 (2008): 561–573. Zegart, Amy. Spying Blind: The CIA, the FBI and the Origins of 9/11. Princeton NJ: Princeton UP, 2007.
APA, Harvard, Vancouver, ISO, and other styles
44

Losh, Elizabeth. "Artificial Intelligence." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2710.

Full text
Abstract:
On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusement – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. Citation reference for this article MLA Style Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>.
APA, Harvard, Vancouver, ISO, and other styles
45

Brandt, Marisa Renee. "Cyborg Agency and Individual Trauma: What Ender's Game Teaches Us about Killing in the Age of Drone Warfare." M/C Journal 16, no. 6 (November 6, 2013). http://dx.doi.org/10.5204/mcj.718.

Full text
Abstract:
During the War on Terror, the United States military has been conducting an increasing number of foreign campaigns by remote control using drones—also called unmanned aerial vehicles (UAVs) or remotely piloted vehicles (RPVs)—to extend the reach of military power and augment the technical precision of targeted strikes while minimizing bodily risk to American combatants. Stationed on bases throughout the southwest, operators fly weaponized drones over the Middle East. Viewing the battle zone through a computer screen that presents them with imagery captured from a drone-mounted camera, these combatants participate in war from a safe distance via an interface that resembles a video game. Increasingly, this participation takes the form of targeted killing. Despite their relative physical safety, in 2008 reports began mounting that like boots-on-the-ground combatants, many drone operators seek the services of chaplains or other mental health professionals to deal with the emotional toll of their work (Associated Press; Schachtman). Questions about the nature of the stress or trauma that drone operators experience have become a trope in news coverage of drone warfare (see Bumiller; Bowden; Saleton; Axe). This was exemplified in May 2013, when former Air Force drone pilot Brandon Bryant became a public figure after speaking to National Public Radio about his remorse for participating in targeted killing strikes and his subsequent struggle with post-traumatic stress (PTS) (Greene and McEvers). Stories like Bryant’s express American culture’s struggle to understand the role screen-mediated, remotely controlled killing plays in shifting the location of combatants’s sense of moral agency. That is, their sense of their ability to act based on their own understanding of right and wrong. Historically, one of the primary ways that psychiatry has conceptualized combat trauma has been as combatants’s psychological response losing their sense of moral agency on the battlefield (Lifton).This articleuses the popular science fiction novel Ender's Game as an analytic lens through which to examine the ways that screen-mediated warfare may result in combat trauma by investigating the ways in which it may compromise moral agency. The goal of this analysis is not to describe the present state of drone operators’s experience (see Asaro), but rather to compare and contrast contemporary public discourses on the psychological impact of screen-mediated war with the way it is represented in one of the most influential science fiction novels of all times (The book won the Nebula Award in 1985, the Hugo Award in 1986, and appears on both the Modern Library 100 Best Novels and American Library Association’s “100 Best Books for Teens” lists). In so doing, the paper aims to counter prevalent modes of critical analysis of screen-mediated war that cannot account for drone operators’s trauma. For decades, critics of postmodern warfare have denounced how fighting from inside tanks, the cockpits of planes, or at office desks has removed combatants from the experiences of risk and endangerment that historically characterized war (see Gray; Levidow & Robins). They suggest that screen-mediation enables not only physical but also cognitive and emotional distance from the violence of war-fighting by circumscribing it in a “magic circle.” Virtual worlds scholars adopted the term “magic circle” from cultural historian Johan Huizinga, who described it as the membrane that separates the time and space of game-play from those of real life (Salen and Zimmerman). While military scholars have long recognized that only 2% of soldiers can kill without hesitation (Grossman), critics of “video game wars” suggest that screen-mediation puts war in a magic circle, thereby creating cyborg human-machine assemblages capable of killing in cold blood. In other words, these critics argue that screen-mediated war distributes agency between humans and machines in such a way that human combatants do not feel morally responsible for killing. In contrast, Ender’s Game suggests that even when militaries utilize video game aesthetics to create weapons control interfaces, screen-mediation alone ultimately cannot blur the line between war and play and thereby psychically shield cyborg soldiers from combat trauma.Orson Scott Card’s 1985 novel Ender’s Game—and the 2013 film adaptation—tells the story of a young boy at an elite military academy. Set several decades after a terrible war between humans and an alien race called the buggers, the novel follows the life of a boy named Ender. At age 6, recruiters take Andrew “Ender” Wiggin from his family to begin military training. He excels in all areas and eventually enters officer training. There he encounters a new video game-like simulator in which he commands space ship battalions against increasingly complex configurations of bugger ships. At the novel’s climax, Ender's mentor, war hero Mazer Rackham, brings him to a room crowded with high-ranking military personnel in order to take his final test on the simulator. In order to win Ender opts to launch a massive bomb, nicknamed “Little Doctor”, at the bugger home world. The image on his screen of a ball of space dust where once sat the enemy planet is met by victory cheers. Mazer then informs Ender that since he began officer training, he has been remotely controlling real ships. The video game war was, "Real. Not a game" (Card 297); Ender has exterminated the bugger species. But rather than join the celebration, Ender is devastated to learn he has committed "xenocide." Screen-mediation, the novel shows, can enable people to commit acts that they would otherwise find heinous.US military advisors have used the story to set an agenda for research and development in augmented media. For example, Dr. Michael Macedonia, Chief Technology Officer of the Army Office for Simulation, Training, and Instrumentation told a reporter for the New York Times that Ender's Game "has had a lot of influence on our thinking" about how to use video game-like technologies in military operations (Harmon; Silberman; Mead). Many recent programs to develop and study video game-like military training simulators have been directly inspired by the book and its promise of being able to turn even a six-year-old into a competent combatant through well-structured human-computer interaction (Mead). However, it would appear that the novel’s moral regarding the psychological impact of actual screen-mediated combat did not dissuade military investment in drone warfare. The Air Force began using drones for surveillance during the Gulf War, but during the Global War on Terror they began to be equipped with weapons. By 2010, the US military operated over 7,000 drones, including over 200 weapons-ready Predator and Reaper drones. It now invests upwards of three-billion dollars a year into the drone program (Zucchino). While there are significant differences between contemporary drone warfare and the plot of Ender's Game—including the fact that Ender is a child, that he alone commands a fleet, that he thinks he is playing a game, and that, except for a single weapon of mass destruction, he and his enemies are equally well equipped—for this analysis, I will focus on their most important similarities: both Ender and actual drone operators work on teams for long shifts using video game-like technology to remotely control vehicles in aerial combat against an enemy. After he uses the Little Doctor, Mazer and Graff, Ender's long-time training supervisors, first work to circumvent his guilt by reframing his actions as heroic. “You're a hero, Ender. They've seen what you did, you and the others. I don't think there's a government on Earth that hasn't voted you their highest metal.” “I killed them all, didn't I?” Ender asked. “All who?” asked Graff. “The buggers? That was the idea.” Mazer leaned in close. “That's what the war was for.” “All their queens. So I killed all their children, all of everything.” “They decided that when they attacked us. It wasn't your fault. It's what had to happen.” Ender grabbed Mazer's uniform and hung onto it, pulling him down so they were face to face. “I didn't want to kill them all. I didn't want to kill anybody! I'm not a killer! […] but you made me do it, you tricked me into it!” He was crying. He was out of control. (Card 297–8)The novel up to this point has led us to believe that Ender at the very least understands that what he does in the game will be asked of him in real life. But his traumatic response to learning the truth reveals that he was in the magic circle. When he thinks he is playing a game, succeeding is a matter of ego: he wants to be the best, to live up to the expectations of his trainers that he is humanity’s last hope. When the magic circle is broken, Ender reconsiders his decision to use the Little Doctor. Tactics he could justify to win the game, reframed as real military tactics, threaten his sense of himself as a moral agent. Being told he is a hero provides no solace.Card wrote the novel during the Cold War, when computers were coming to play an increasingly large role in military operations. Historians of military technology have shown that during this time human behavior began to be defined in machine-like, functionalist terms by scientists working on cybernetic systems (see Edwards; Galison; Orr). Human skills were defined as components of large technological systems, such as tanks and anti-aircraft weaponry: a human skill was treated as functionally the same as a machine one. The only issue of importance was how all the components could work together in order to meet strategic goals—a cybernetic problem. The reasons that Mazer and Graff have for lying to Ender suggest that the author believed that as a form of technical augmentation, screen-mediation can be used to evacuate individual moral agency and submit human will to the command of the larger cybernetic system. Issues of displaced agency in the military cyborg assemblage are apparent in the following quote, in which Mazer compares Ender himself to the bomb he used to destroy the bugger home world: “You had to be a weapon, Ender. Like a gun, like the Little Doctor, functioning perfectly but not knowing what you were aimed at. We aimed you. We're responsible. If there was something wrong, we did it” (298). Questions of distributed agency have also surfaced in the drone debates. Government and military leaders have attempted to depersonalize drone warfare by assuring the American public that the list of targets is meticulously researched: drones kill those who we need killed. Drone warfare, media theorist Peter Asaro argues, has “created new and complex forms of human-machine subjectivity” that cannot be understood by considering the agency of the technology alone because it is distributed between humans and machines (25). While our leaders’s decisions about who to kill are central to this new cyborg subjectivity, the operators who fire the weapons nevertheless experience at least a retrospective sense of agency. As phenomenologist John Protevi notes, in the wake of wars fought by modern military networks, many veterans diagnosed with PTS still express guilt and personal responsibility for the outcomes of their participation in killing (Protevi). Mazer and Graff explain that the two qualities that make Ender such a good weapon also create an imperative to lie to him: his compassion and his innocence. For his trainers, compassion means a capacity to truly think like others, friend or foe, and understand their motivations. Graff explains that while his trainers recognized Ender's compassion as an invaluable tool, they also recognized that it would preclude his willingness to kill.It had to be a trick or you couldn't have done it. It's the bind we were in. We had to have a commander with so much empathy that he would think like the buggers, understand them and anticipate them. So much compassion that he could win the love of his underlings and work with them like a perfect machine, as perfect as the buggers. But somebody with that much compassion could never be the killer we needed. Could never go into battle willing to win at all costs. If you knew, you couldn't do it. If you were the kind of person who would do it even if you knew, you could never have understood the buggers well enough. (298)In learning that the game was real, Ender learns that he was not merely coming to understand a programmed simulation of bugger behavior, but their actual psychology. Therefore, his compassion has not only helped him understand the buggers’ military strategy, but also to identify with them.Like Ender, drone operators spend weeks or months following their targets, getting to know them and their routines from a God’s eye perspective. They both also watch the repercussions of their missions on screen. Unlike fighter pilots who drop bombs and fly away, drone operators use high-resolution cameras and fly much closer to the ground both when flying and assessing the results of their strikes. As one drone operator interviewed by the Los Angeles Times explained, "When I flew the B-52, it was at 30,000 to 40,000 feet, and you don't even see the bombs falling … Here, you're a lot closer to the actual fight, or that's the way it seems" (Zucchino). Brookings Institute scholar Peter Singer has argued that in this way screen mediation actually enables a more intimate experience of violence for drone operators than airplane pilots (Singer).The second reason Ender’s trainers give for lying is that they need someone not only compassionate, but also innocent of the horrors of war. The war veteran Mazer explains: “And it had to be a child, Ender,” said Mazer. “You were faster than me. Better than me. I was too old and cautious. Any decent person who knows what warfare is can never go into battle with a whole heart. But you didn't know. We made sure you didn't know" (298). When Ender discovers what he has done, he loses not only his innocence but his sense of himself as a moral agent. After such a trauma, his heart is no longer whole.Actual drone operators are, of course, not kept in a magic circle, innocent of the repercussions of their actions. Nor do they otherwise feel as though they are playing, as several have publicly stated. Instead, they report finding drone work tedious, and some even play video games for fun (Asaro). However, Air Force recruitment advertising makes clear analogies between the skills they desire and those of video game play (Brown). Though the first generations of drone operators were pulled from the ranks of flight pilots, in 2009 the Air Force began training them from the ground. Many drone operators, then, enter the role having no other military service and may come into it believing, on some level, that their work will be play.Recent military studies of drone operators have raised doubts about whether drone operators really experience high rates of trauma, suggesting that the stresses they experience are seated instead in occupational issues like long shifts (Ouma, Chappelle, and Salinas; Chappelle, Psy, and Salinas). But several critics of these studies have pointed out that there is a taboo against speaking about feelings of regret and trauma in the military in general and among drone operators in particular. A PTS diagnosis can end a military career; given the Air Force’s career-focused recruiting emphasis, it makes sense that few would come forward (Dao). Therefore, it is still important to take drone operator PTS seriously and try to understand how screen-mediation augments their experience of killing.While critics worry that warfare mediated by a screen and joystick leads to a “‘Playstation’ mentality towards killing” (Alston 25), Ender's Game presents a theory of remote-control war wherein this technological redistribution of the act of killing does not, in itself, create emotional distance or evacuate the killer’s sense of moral agency. In order to kill, Ender must be distanced from reality as well. While drone operators do not work shielded by the magic circle—and therefore do not experience the trauma of its dissolution—every day when they leave the cyborg assemblage of their work stations and rejoin their families they still have to confront themselves as individual moral agents and bear their responsibility for ending lives. In both these scenarios, a human agent’s combat trauma serves to remind us that even when their bodies are physically safe, war is hell for those who fight. This paper has illustrated how a science fiction story can be used as an analytic lens for thinking through contemporary discourses about human-technology relationships. However, the US military is currently investing in drones that are increasingly autonomous from human operators. This redistribution of agency may reduce incidence of PTS among operators by decreasing their role in, and therefore sense of moral responsibility for, killing (Axe). Reducing mental illness may seem to be a worthwhile goal, but in a world wherein militaries distribute the agency for killing to machines in order to reduce the burden on humans, societies will have to confront the fact that combatants’s trauma cannot be a compass by which to measure the morality of wars. Too often in the US media, the primary stories that Americans are told about the violence of their country’s wars are those of their own combatants—not only about their deaths and physical injuries, but their suicide and PTS. To understand war in such a world, we will need new, post-humanist stories where the cyborg assemblage and not the individual is held accountable for killing and morality is measured in lives taken, not rates of mental illness. ReferencesAlston, Phillip. “Report of the Special Rapporteur on Extrajudicial, Summary, or Arbitrary Executions, Addendum: Study on Targeted Killings.” United Nations Human Rights Council (2010). Asaro, Peter M. “The Labor of Surveillance and Bureaucratized Killing: New Subjectivities of Military Drone Operators”. Social Semiotics 23.2 (2013): 196-22. Associated Press. “Predator Pilots Suffering War Stress.” Military.com 2008. Axe, David. “How to Prevent Drone Pilot PTSD: Blame the ’Bot.” Wired June 2012.Bowden, Mark. “The Killing Machines: How to Think about Drones.” The Atlantic Sep. 2013.Brown, Melissa T. Enlisting Masculinity: The Construction of Gender in US Military Recruiting Advertising during the All-Volunteer Force. London: Oxford University Press, 2012. Bumiller, Elisabeth. “Air Force Drone Operators Report High Levels of Stress.” New York Times 18 Dec. 2011: n. pag. Card, Orson Scott. Ender’s Game. Tom Doherty Associates, Inc., 1985. Chappelle, Wayne, D. Psy, and Amber Salinas. “Psychological Health Screening of Remotely Piloted Aircraft (RPA) Operators and Supporting Units.” Paper presented at the Symposium on Mental Health and Well-Being across the Military Spectrum, Bergen, Norway, 12 April 2011: 1–12. Dao, James. “Drone Pilots Are Found to Get Stress Disorders Much as Those in Combat Do.” New York Times 22 Feb. 2013: n. pag. Edwards, Paul N. The Closed World: Computers and the Politics of Discourse in Cold War America. Cambridge: MIT Press, 1997.Galison, Peter. “The Ontology of the Enemy: Norbert Wiener and the Cybernetic Vision.” Critical Inquiry 21.1 (1994): 228.Gray, Chris Hables “Posthuman Soldiers in Postmodern War.” Body & Society 9.4 (2003): 215–226. 27 Nov. 2010.Greene, David, and Kelly McEvers. “Former Air Force Pilot Has Cautionary Tales about Drones.” National Public Radio 10 May 2013.Grossman, David. On Killing. Revised. Boston: Back Bay Books, 2009. Harmon, Amy. “More than Just a Game, But How Close to Reality?” New York Times 3 Apr. 2003: n. pag. Levidow, Les, and Robins. Cyborg Worlds: The Military Information Society. London: Free Association Books, 1989. Lifton, Robert Jay. Home from the War: Vietnam Veterans: Neither Victims nor Executioners. New York: Random House, 1973. Mead, Corey. War Play: Video Games and the Future of Armed Conflict. Boston: Houghton Mifflin Harcourt, 2013. Orr, Jackie. Panic Diaries: A Genealogy of Panic Disorder. Durham: Duke University Press, 2006.Ouma, J.A., W.L. Chappelle, and A. Salinas. Facets of Occupational Burnout among US Air Force Active Duty and National Guard/Reserve MQ-1 Predator and MQ-9 Reaper Operators. Air Force Research Labs Technical Report AFRL-SA-WP-TR-2011-0003. Wright-Patterson AFB, OH: Air Force Research Laboratory. 2011.Protevi, John. “Affect, Agency and Responsibility: The Act of Killing in the Age of Cyborgs.” Phenomenology and the Cognitive Sciences 7.3 (2008): 405–413. Salen, Katie, and Eric Zimmerman. Rules of Play: Game Design Fundamentals. Cambridge, MA: MIT Press, 2003. Saleton, William. “Ghosts in the Machine: Do Remote-Control War Pilots Get Combat Stress?” Slate.com Aug. 2008. Schachtman, Nathan. “Shrinks Help Drone Pilots Cope with Robo-Violence.” Wired Aug. 2008.Silberman, Steve. “The War Room.” Wired Sep. 2004: 1–5.Singer, P.W. Wired for War: The Robotics Revolution and Conflict in the Twenty-First Century. New York: Penguin Press, 2009. Zucchino, David. “Drone Pilots Have Front-Row Seat on War, from Half a World Away.” Los Angeles Times 21 Feb. 2010: n. pag.
APA, Harvard, Vancouver, ISO, and other styles
46

McDonald, Matt. "Fear, Security and the Politics of Representing Asylum Seekers." M/C Journal 5, no. 1 (March 1, 2002). http://dx.doi.org/10.5204/mcj.1943.

Full text
Abstract:
The stand-off involving the asylum-seekers on board the Tampa, off the coast of Australia in August-September 2001, represented a critical confluence of security, fear. The Australian government’s response to the issue of stranded asylum-seekers, it is argued here, was a directly calculated political representation aimed at creating fear in the Australian populace: fear of a threat to Australian security. The fear generated by the Australian government, in which the national media was a willing accomplice, allowed for a perception among Australians that the government’s actions, in refusing to allow the Tampa to offload its passengers, were consistent with the provision of national security. The government was preserving the territorial integrity and sovereignty of the state in the face of this constructed ‘threat’ to Australia’s security. The provision of security is central to the state’s reason for being. If the state is not capable of providing security, however that security is to be defined, the continued legitimacy and even existence of the state itself must necessarily be questioned, as Michael Dillon has argued. The power and importance of the security narrative can therefore not be underestimated. Further, Dillon argues, this security has generally been conceived as the security of the ‘self’ against the ‘other’. Attempts to be seen to be ‘doing the job’ of security has throughout history involved the identification and vilification of this other, with the fear of the other consequently constituting or reifying the self and contributing to the legitimacy of governments. The nature of this relationship between identity, security and fear is central to the government’s politics of representing the asylum seekers. The Howard government acknowledged, rightly, that making people afraid of the threat posed by waves of foreign asylum seekers and evoking the narrative of security would contribute to a solidification of the Australian self, and unite the people of Australia behind its political leaders, who were working to protect Australians from this ‘threat’. The fear created by the Australian government was constructed in a number of ways. First, the government argued that Australia was faced with a possible future wave of illegal immigrants, a situation that threatened the future security of the country. Seen in this light, the decision to prevent the Tampa from offloading asylum seekers was a means of achieving security by sending a message to would-be boat people that Australia was not a ‘soft touch’. Second, the government evoked a range of images central to traditional discourses of security, concerned predominantly with the preservation of the nation-state from military attack. As Burke argues, the government variously talked of ‘territorial integrity’, ‘sovereignty’ and ‘national interests’, concepts that, when spoken of together, would seem more suited to a situation of armed conflict rather than one involving the captain of a cargo boat looking to offload asylum seekers for processing in Australia. The consistency of this type of language with earlier depictions of the threat of Japanese invasion during World War II, for example, is not an historical coincidence. It is argued here that the use of such language helped create a context in which the idea of asylum seekers as threatening to Australian security, and therefore to be feared, had resonance with the domestic population. Finally, the government constructed fear through its attempts to depict the asylum-seekers as an ‘other’, foreign to Australian identity. This was achieved in part through questioning the legitimacy of their claims to asylum over others awaiting processing, and also through the very act of depicting them as threats to security. Their religious and ethnic otherness was not played on specifically by the government, although claims that asylum seekers threw children into the ocean, which were to later be proved erroneous, portrayed asylum-seekers as less than human. The combination of these acts constructed a fear in the Australian populace, a fear of the threat to Australian self from a foreign other, thus pointing to the relationship between fear, security and identity. In an excellent recent text on Australian security, Anthony Burke convincingly argues that the government’s response to, or indeed creation of, the Tampa crisis can be viewed as the continuation of an enduring narrative of security and fear that has been the cornerstone of Australian identity and subjectivity since 1788. This narrative, he argues, has been constitutive and reflective of Australia’s sense of self, and has allowed for politics that has denied the rights of the other throughout Australia’s history. This perspective is not limited to the Australian subject. In a seminal text on US security, David Campbell argues that the provision of security in the United States has similarly been linked to identity politics in which the fear of a vilified other was central to the constitution of the self and the legitimacy of governments. The relationship between fear, identity politics and security is particularly evident, Campbell argues, in the McCarthy era attacks on ‘communist dissidents’ during the early years of the Cold War. The point to be made from these examples is that fear is not just implicated in the construction of security and indeed the self: it is integral to that project. Facile as the comparison may be, the approach of the Australian government to this issue is reminiscent of the plot of the 1995 movie, Canadian Bacon. In the film, a US President suffering from low popularity ratings invents a confrontation with Canada in order to unite the American people behind him and enhance his chances of winning a second term in office. In inventing this threat, his administration portrayed Canadians residing in the United States as possible spies for the Canadian administration and also expressed suspicion of the hegemonic aspirations of the Canadian government in general. The fear created through such a depiction, it was hoped, would allow the President enough popularity to be re-elected. Perhaps the central difference between this example and the Howard government’s approach to the asylum seeker ‘threat’ is that the fictional US President in question was not successful in his bid for re-election. Joseph Camilleri has persuasively argued that security is a psychological rather than material state. In other words, security is about feeling rather than being secure. As such, governments must seek to create conditions in which this feeling of security is engendered in order to retain legitimacy. Enter the narrative of fear. Fear creates a basis for perceptions that the government is providing security, because once a population becomes concerned at threats posed by different actors, that population becomes almost necessarily supportive of actors viewed as capable of addressing that threat. Seen in this light, the creation of threat, regardless of the material significance of the threat itself, is a useful tool for governments to maintain legitimacy. Importantly, in the case of the asylum-seekers, these individuals themselves, and the nature of their plight, had limited relevance to the political project of the Australian government. This is aside from the important caveat that they were not of Anglo-Saxon appearance, and therefore ‘different’ to dominant depictions of the Australian self, a difference reinforced by claims of their willingness to endanger the lives of their own children. The fact that many asylum seekers were escaping the oppression of a regime Howard himself had described as evil, and whose invasion he was simultaneously supporting, seems to have slipped through the cracks of popular consciousness. This paradox did not seem to bother the Australian government, whose political representation of asylum seekers did not require any attention to where they had come from or why they had been willing to risk their lives in seeking refuge. The government merely had to point to a future ‘wave of boat-people’: queue-jumping ‘illegals’ who had targeted Australia as an international ‘soft touch’. The fear created by such an image was enough to suppress any lingering form of empathy or, for that matter, rationality. Even a rationalist would struggle to reconcile the government’s commitment to international human rights norms, its support for the war against terrorism and depiction of the evil Taliban regime of Afghanistan, and its commitment to preventing Afghani asylum-seekers from having claims processed in Australia. The government was riding on a wave of fear, a fear that would play a significant role in the re-election of the Howard government and the continued popular support for mandatory detention of asylum-seekers and the government’s ‘Pacific Solution’. Can we imagine a situation in which security can mean something other than the security of the self (in this case the Australian nation-state) at the expense of the other (asylum seekers)? Can we imagine a situation in which security is associated with emancipation of individuals, as Critical Security theorists advocate, rather than the (military) protection of the sovereignty of the state? Burke is sceptical, largely because the narrative of security as fear has permeated Australian politics, and the Australian subject, since the initial dispossession of indigenous people in the eighteenth century. In an international climate where fear still prevails, particularly in the wording of President Bush’s recent State of the Union address in which he warned Americans of the ‘Axis of Evil’, it is difficult to see how, or where, normatively progressive security politics would be located. When government or regime legitimacy can be assisted through recourse to an identity politics predicated on fear, what incentive could we imagine for an acknowledgment of the claims of ‘others’? The answer to this question lies partly in this paper itself, and in the other contributions in this journal to the question of fear and social relations. The power of fear, it is argued here, is necessarily undermined by an analysis of the construction of fear itself. This form of critique, following Foucault, is critical to breaking down a knowledge-power nexus that, in the case of security and the asylum seekers renders us secure through the suffering of others. While we may not expect critical analysis to reconstitute politics and identity in the short-term, we can reasonably expect such analyses to undermine the resonance of such narratives of fear. References Burke, Anthony. In Fear of Security: Australia’s Invasion Anxiety. Sydney: Pluto, 2002. Camilleri, Joseph. ‘The security dilemma revisited: Implications for the Asia-Pacific’, in W. Tow, R. Thakur and I. Hyun eds. Asia’s Emerging Regional Order: Reconciling Traditional and Human Security. Tokyo: UN University Press, 2000. Campbell, David. Writing Security: United States Foreign Policy and the Politics of Identity. Minneapolis: University of Minnesota Press. Dillon, Michael. The Politics of Security: Towards a Philosophy of Continental Thought. London: Routledge, 1996. Foucault, Michel. Discipline and Punish: The Birth of the Prison. New York: Vintage, 1979. Canadian Bacon. Dir. Micheal Moore. PolyGram, 1995 (Screenplay by Michael Moore). Citation reference for this article MLA Style McDonald, Matt. "Fear, Security and the Politics of Representing Asylum Seekers" M/C: A Journal of Media and Culture 5.1 (2002). [your date of access] < http://www.media-culture.org.au/0203/security.php>. Chicago Style McDonald, Matt, "Fear, Security and the Politics of Representing Asylum Seekers" M/C: A Journal of Media and Culture 5, no. 1 (2002), < http://www.media-culture.org.au/0203/security.php> ([your date of access]). APA Style McDonald, Matt. (2002) Fear, Security and the Politics of Representing Asylum Seekers. M/C: A Journal of Media and Culture 5(1). < http://www.media-culture.org.au/0203/security.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
47

Green, Lelia, and Anne Aly. "Bastard Immigrants: Asylum Seekers Who Arrive by Boat and the Illegitimate Fear of the Other." M/C Journal 17, no. 5 (October 25, 2014). http://dx.doi.org/10.5204/mcj.896.

Full text
Abstract:
IllegitimacyBack in 1987, Gregory Bateson argued that:Kurt Vonnegut gives us wary advice – that we should be careful what we pretend because we become what we pretend. And something like that, some sort of self-fulfilment, occurs in all organisations and human cultures. What people presume to be ‘human’ is what they will build in as premises of their social arrangements, and what they build in is sure to be learned, is sure to become a part of the character of those who participate. (178)The human capacity to marginalise and discriminate against others on the basis of innate and constructed characteristics is evident from the long history of discrimination against people whose existence is ‘illegitimate’, defined as being outside the law. What is inside or outside the law depends upon the context under consideration. For example, in societies such as ancient Greece and the antebellum United States, where slavery was legal, people who were constructed as ‘slaves’ could legitimately be treated very differently from ‘citizens’: free people who benefit from a range of human rights (Northup). The discernment of what is legitimate from that which is illegitimate is thus implicated within the law but extends into the wider experience of community life and is evident within the civil structures through which society is organised and regulated.The division between the legitimate and illegitimate is an arbitrary one, susceptible to changing circumstances. Within recent memory a romantic/sexual relationship between two people of the same sex was constructed as illegitimate and actively persecuted. This was particularly the case for same-sex attracted men, since the societies regulating these relationships generally permitted women a wider repertoire of emotional response than men were allowed. Even when lesbian and gay relationships were legalised, they were constructed as less legitimate in the sense that they often had different rules around the age of consent for homosexual and heterosexual couples. In Australia, the refusal to allow same sex couples to marry perpetuates ways in which these relationships are constructed as illegitimate – beyond the remit of the legislation concerning marriage.The archetypal incidence of illegitimacy has historically referred to people born out of wedlock. The circumstances of birth, for example whether a person was born as a result of a legally-sanctioned marital relationship or not, could have ramifications throughout an individual’s life. Stories abound (for example, Cookson) of the implications of being illegitimate. In some social stings, such as Catherine Cookson’s north-eastern England at the turn of the twentieth century, illegitimate children were often shunned. Parents frequently refused permission for their (legitimate) children to play with illegitimate classmates, as if these children born out of wedlock embodied a contaminating variety of evil. Illegitimate children were treated differently in the law in matters of inheritance, for example, and may still be. They frequently lived in fear of needing to show a birth certificate to gain a passport, for example, or to marry. Sometimes, it was at this point in adult life, that a person first discovered their illegitimacy, changing their entire understanding of their family and their place in the world. It might be possible to argue that the emphasis upon the legitimacy of a birth has lessened in proportion to an acceptance of genetic markers as an indicator of biological paternity, but that is not the endeavour here.Given the arbitrariness and mutability of the division between legitimacy and illegitimacy as a constructed boundary, it is policed by social and legal sanctions. Boundaries, such as the differentiation between the raw and the cooked (Lévi-Strauss), or S/Z (Barthes), or purity and danger (Douglas), serve important cultural functions and also convey critical information about the societies that enforce them. Categories of person, place or thing which are closest to boundaries between the legitimate and the illegitimate can prompt existential anxiety since the capacity to discern between these categories is most challenged at the margins. The legal shenanigans which can result speak volumes for which aspects of life have the potential to unsettle a culture. One example of this which is writ large in the recent history of Australia is our treatment of refugees and asylum seekers and the impact of this upon Australia’s multicultural project.Foreshadowing the sexual connotations of the illegitimate, one of us has written elsewhere (Green, ‘Bordering on the Inconceivable’) about the inconceivability of the Howard administration’s ‘Pacific solution’. This used legal devices to rewrite Australia’s borders to limit access to the rights accruing to refugees upon landing in a safe haven entitling them to seek asylum. Internationally condemned as an illegitimate construction of an artificial ‘migration zone’, this policy has been revisited and made more brutal under the Abbot regime with at least two people – Reza Barati and Hamid Khazaei – dying in the past year in what is supposed to be a place of safety provided by Australian authorities under their legal obligations to those fleeing from persecution. Crock points out, echoing the discourse of illegitimacy, that it is and always has been inappropriate to label “undocumented asylum seekers” as “‘illegal’” because: “until such people cross the border onto Australian territory, the language of illegality is nonsense. People who have no visas to enter Australia can hardly be ‘illegals’ until they enter Australia” (77). For Australians who identify in some ways – religion, culture, fellow feeling – with the detainees incarcerated on Nauru and Manus Island, it is hard to ignore the disparity between the government’s treatment of visa overstayers and “illegals” who arrive by boat (Wilson). It is a comparatively short step to construct this disparity as reflecting upon the legitimacy within Australia of communities who share salient characteristics with detained asylum seekers: “The overwhelmingly negative discourse which links asylum seekers, Islam and terrorism” (McKay, Thomas & Kneebone, 129). Some communities feel themselves constructed in the public and political spheres as less legitimately Australian than others. This is particularly true of communities where members can be identified via markers of visible difference, including indicators of ethnic, cultural and religious identities: “a group who [some 585 respondent Australians …] perceived would maintain their own languages, customs and traditions […] this cultural diversity posed an extreme threat to Australian national identity” (McKay, Thomas & Kneebone, 129). Where a community shares salient characteristics such as ethnicity or religion with many detained asylum seekers they can become fearful of the discourses around keeping borders strong and protecting Australia from illegitimate entrants. MethodologyThe qualitative fieldwork upon which this paper is based took place some 6-8 years ago (2006-2008), but the project remains one of the most recent and extensive studies of its kind. There are no grounds for believing that any of the findings are less valid than previously. On the contrary, if political actions are constructed as a proxy for mainstream public consent, opinions have become more polarised and have hardened. Ten focus groups were held involving 86 participants with a variety of backgrounds including differences in age, gender, religious observance, religious identification and ethnicity. Four focus groups involved solely Muslim participants; six drew from the wider Australian community. The aim was to examine the response of different communities to mainstream Australian media representations of Islam, Muslims, and terrorism. Research questions included: “Are there differences in the ways in which Australian Muslims respond to messages about ‘fear’ and ‘terror’ compared with broader community Australians’ responses to the same messages?” and “How do Australian Muslims construct the perceptions and attitudes of the broader Australian community based on the messages that circulate in the media?” Recent examples of kinds of messages investigated include media coverage of Islamic State’s (ISIS’s) activities (Karam & Salama), and the fear-provoking coverage around the possible recruitment of Australians to join the fighting in Syria and Iraq (Cox). The ten focus groups were augmented by 60 interviews, 30 with respondents who identified as Muslim (15 males, 15 female) and 30 respondents from the broader community (same gender divisions). Finally, a market research company was commissioned to conduct a ‘fear survey’, based on an established ‘fear of rape’ inventory (Aly and Balnaves), delivered by telephone to a random sample of 750 over-18 y.o. Australians in which Muslims formed a deliberative sub-group, to ensure they were over-sampled and constituted at least 150 respondents. The face-to-face surveys and focus groups were conducted by co-author, Dr Anne Aly. General FindingsMuslim respondents indicate a heightened intensity of reaction to media messages around fear and terror. In addition to a generalised fear of the potential impact of terrorism upon Australian society and culture, Muslim respondents experienced a specific fear that any terrorist-related media coverage might trigger hostility towards Muslim Australian communities and their own family members. According to the ‘fear survey’ scale, Muslim Australians at the time of the research experienced approximately twice the fear level of mainstream Australian respondents. Broader Australian community Australian Muslim communityFear of a terrorist attackFear of a terrorist attack combines with the fear of a community backlashSpecific victims: dead, injured, bereavedCommunity is full of general victims in addition to any specific victimsShort-term; intense impactsProtracted, diffuse impactsSociety-wide sympathy and support for specific victims and all those involved in dealing with the trauma and aftermathSociety-wide suspicion and a marginalisation of those affected by the backlashVictims of a terrorist attack are embraced by broader communityVictims of backlash experience hostility from the broader communityFour main fears were identified by Australian Muslims as a component of the fear of terrorism:Fear of physical harm. In addition to the fear of actual terrorist acts, Australian Muslims fear backlash reprisals such as those experienced after such events as 9/11, the Bali bombings, and attacks upon public transport passengers in Spain and the UK. These and similar events were constructed as precipitating increased aggression against identifiable Australian Muslims, along with shunning of Muslims and avoidance of their company.The construction of politically-motivated fear. Although fear is an understandable response to concerns around terrorism, many respondents perceived fears as being deliberately exacerbated for political motives. Such strategies as “Be alert, not alarmed” (Bassio), labelling asylum seekers as potential terrorists, and talk about home-grown terrorists, are among the kinds of fears which were identified as politically motivated. The political motivation behind such actions might include presenting a particular party as strong, resolute and effective. Some Muslim Australians construct such approaches as indicating that their government is more interested in political advantage than social harmony.Fear of losing civil liberties. As well as sharing the alarm of the broader Australian community at the dozens of legislative changes banning people, organisations and materials, and increasing surveillance and security checks, Muslim Australians fear for the human rights implications across their community, up to and including the lives of their young people. This fear is heightened when community members may look visibly different from the mainstream. Examples of the events fuelling such fears include the London police killing of Jean Charles de Menezes, a Brazilian Catholic working as an electrician in the UK and shot in the month following the 7/7 attacks on the London Underground system (Pugliese). In Australia, the case of Mohamed Hannef indicated that innocent people could easily be unjustly accused and wrongly targeted, and even when this was evident the political agenda made it almost impossible for authorities to admit their error (Rix).Feeling insecure. Australian Muslims argue that personal insecurity has become “the new normal” (Massumi), disproportionately affecting Muslim communities in both physical and psychological ways. Physical insecurity is triggered by the routine avoidance, shunning and animosity experienced by many community members in public places. Psychological insecurity includes fear for the safety of younger members of the community compounded by concern that young people may become ‘radicalised’ as a result of the discrimination they experience. Australian Muslims fear the backlash following any possible terrorist attack on Australian soil and describe the possible impact as ‘unimaginable’ (Aly and Green, ‘Moderate Islam’).In addition to this range of fears expressed by Australian Muslims and constructed in response to wider societal reactions to increased concerns over radical Islam and the threat of terrorist activity, an analysis of respondents’ statements indicate that Muslim Australians construct the broader community as exhibiting:Fear of religious conviction (without recognising the role of their own secular/religious convictions underpinning this fear);Fear of extremism (expressed in various extreme ways);Fear of powerlessness (responded to by disempowering others); andFear of political action overseas having political effects at home (without acknowledging that it is the broader community’s response to such overseas events, such as 9/11 [Green ‘Did the world really change?’], which has also had impacts at home).These constructions, extrapolations and understandings by Australian Muslims of the fears of the broader community underpinning the responses to the threat of terror have been addressed elsewhere (Green and Aly). Legitimate Australian MuslimsOne frustration identified by many Muslim respondents centres upon a perceived ‘acceptable’ way to be an Australian Muslim. Arguing that the broader community construct Muslims as a homogenous group defined by their religious affiliation, these interviewees felt that the many differences within and between the twenty-plus national, linguistic, ethnic, cultural and faith-based groupings that constitute WA’s Muslim population were being ignored. Being treated as a homogenised group on a basis of faith appears to have the effect of putting that religious identity under pressure, paradoxically strengthening and reinforcing it (Aly, ‘Australian Muslim Responses to the Discourse on Terrorism’). The appeal to Australian Muslims to embrace membership in a secular society and treat religion as a private matter also led some respondents to suggest they were expected to deny their own view of their faith, in which they express their religious identity across their social spheres and in public and private contexts. Such expression is common in observant Judaism, Hinduism and some forms of Christianity, as well as in some expressions of Islam (Aly and Green, ‘Less than equal’). Massumi argues that even the ways in which some Muslims dress, indicating faith-based behaviour, can lead to what he terms as ‘affective modulation’ (Massumi), repeating and amplifying the fear affect as a result of experiencing the wider community’s fear response to such triggers as water bottles (from airport travel) and backpacks, on the basis of perceived physical difference and a supposed identification with Muslim communities, regardless of the situation. Such respondents constructed this (implied) injunction to suppress their religious and cultural affiliation as akin to constructing the expression of their identity as illegitimate and somehow shameful. Parallels can be drawn with previous social responses to a person born out of wedlock, and to people in same-sex relationships: a ‘don’t ask, don’t tell’ kind of denial.Australian Muslims who see their faith as denied or marginalised may respond by identifying more strongly with other Muslims in their community, since the community-based context is one in which they feel welcomed and understood. The faith-based community also allows and encourages a wider repertoire of acceptable beliefs and actions entailed in the performance of ‘being Muslim’. Hand in hand with a perception of being required to express their religious identity in ways that were acceptable to the majority community, these respondents provided a range of examples of self-protective behaviours to defend themselves and others from the impacts of perceived marginalisation. Such behaviours included: changing their surnames to deflect discrimination based solely on a name (Aly and Green, ‘Fear, Anxiety and the State of Terror’); keeping their opinions private, even when they were in line with those being expressed by the majority community (Aly and Green, ‘Moderate Islam’); the identification of ‘less safe’ and ‘safe’ activities and areas; concerns about visibly different young men in the Muslim community and discussions with them about their public behaviour and demeanour; and women who chose not to leave their homes for fear of being targeted in public places (all discussed in Aly, ‘Australian Muslim Responses to the Discourse on Terrorism’). Many of these behaviours, including changing surnames, restricting socialisation to people who know a person well, and the identification of safe and less safe activities in relation to the risk of self-revelation, were common strategies used by people who were stigmatised in previous times as a result of their illegitimacy.ConclusionConstructions of the legitimate and illegitimate provide one means through which we can investigate complex negotiations around Australianness and citizenship, thrown into sharp relief by the Australian government’s treatment of asylum seekers, also deemed “illegals”. Because they arrive in Australia (or, as the government would prefer, on Australia’s doorstep) by illegitimate channels these would-be citizens are treated very differently from people who arrive at an airport and overstay their visa. The impetus to exclude aspects of geographical Australia from the migration zone, and to house asylum seekers offshore, reveals an anxiety about borders which physically reflects the anxiety of western nations in the post-9/11 world. Asylum seekers who arrive by boat have rarely had safe opportunity to secure passports or visas, or to purchase tickets from commercial airlines or shipping companies. They represent those ethnicities and cultures which are currently in turmoil: a turmoil frequently exacerbated by western intervention, variously constructed as an il/legitimate expression of western power and interests.What this paper has demonstrated is that the boundary between Australia and the rest, the legitimate and the illegitimate, is failing in its aim of creating a stronger Australia. The means through which this project is pursued is making visible a range of motivations and concerns which are variously interpreted depending upon the position of the interpreter. The United Nations, for example, has expressed strong concern over Australia’s reneging upon its treaty obligations to refugees (Gordon). Less vocal, and more fearful, are those communities within Australia which identify as community members with the excluded illegals. The Australian government’s treatment of detainees on Manus Island and Nauru, who generally exhibit markers of visible difference as a result of ethnicity or culture, is one aspect of a raft of government policies which serve to make some people feel that their Australianness is somehow less legitimate than that of the broader community. AcknowledgementsThis paper is based on the findings of an Australian Research Council Discovery Project (DP0559707), 2005-7, “Australian responses to the images and discourses of terrorism and the other: establishing a metric of fear”, awarded to Professors Lelia Green and Mark Balnaves. The research involved 10 focus groups and 60 individual in-depth interviews and a telephone ‘fear of terrorism’ survey. The authors wish to acknowledge the participation and contributions of WA community members and wider Australian respondents to the telephone survey. ReferencesAly, Anne. “Australian Muslim Responses to the Discourse on Terrorism in the Australian Popular Media.” Australian Journal of Social Issues 42.1 (2007): 27-40.Aly, Anne, and Lelia Green. “Fear, Anxiety and the State of Terror.” Studies in Conflict and Terrorism 33.3 (Feb 2010): 268-81.Aly, Anne, and Lelia Green. “Less than Equal: Secularism, Religious Pluralism and Privilege.” M/C Journal 11.2 (2008). 15 Oct. 2009 ‹http://journal.media-culture.org.au/index.php/mcjournal/article/view/32›.Aly, Anne, and Lelia Green. “‘Moderate Islam’: Defining the Good Citizen”. M/C Journal 10.6/11.1 (2008). 13 April 2008 ‹http://journal.media-culture.org.au/0804/08-aly-green.php›.Aly, Anne, and Mark Balnaves. “‘They Want Us to Be Afraid’: Developing a Metric for the Fear of Terrorism. International Journal of Diversity in Organisations, Communities & Nations 6.6 (2008): 113-122.Barthes, Roland. S/Z. Oxford: Blackwell, 1990.Bassio, Diana. “‘Be Alert, Not Alarmed’: Governmental Communication of Risk in an Era of Insecurity.” Annual Conference Australian and New Zealand Communication Association, Christchurch, New Zealand, 2005. ‹http://www.anzca.net/documents/anzca-05-1/refereed-proceedings-9/247-be-alert-not-alarmed-governmental-communication-of-risk-in-an-era-of-insecurity-1/file.html›.Bateson, Gregory, and Mary Catherine Bateson. “Innocence and Experience”. Angels Fear: Towards an Epistemology of the Sacred. New York: Hampton Press, 1987. 167-182. 11 Sep. 2014 ‹http://www.oikos.org/baten.htm›.Cookson, Catherine. Our Kate. London: Corgi, 1969.Cox, Nicole. “Police Probe ‘Die for Syria’ Car Stickers”. WA Today 11 Sep. 2014. 11 Sep. 2014 ‹http://www.watoday.com.au/wa-news/police-probe-die-for-syria-car-stickers-20140911-10fmo7.html›.Crock, Mary. “That Sinking Feeling: Correspondence”. Quarterly Essay 54 (June 2014): 75-79.Douglas, Mary. Purity and Danger. London: Routledge and Keagan Paul, 1978 [1966].Gordon, Michael. “New UN Human Rights Chief Attacks Australia over Asylum Seeker Rights ‘Violations’.” Sydney Morning Herald 7 Sep. 2014. 11 Sep. 2014 ‹http://www.smh.com.au/federal-politics/political-news/new-un-human-rights-chief-attacks-australia-over-asylum-seeker-rights-violations-20140907-10dlkx.html›.Green, Lelia. “Bordering on the Inconceivable: The Pacific Solution, the Migration Zone and ‘Australia’s 9/11’”. Australian Journal of Communication 31.1 (2004): 19-36.Green, Lelia. “Did the World Really Change on 9/11?” Australian Journal of Communication 29.2 (2002): 1-14.Green, Lelia, and Anne Aly. “How Australian Muslims Construct Western Fear of the Muslim Other”. Negotiating Identities: Constructed Selves and Others. Ed. Helen Vella Bonavita. Amsterdam: Rodopi, 2011. 65-90. Karam, Zeina, and Vivian Salama. “US President Barack Obama Powers Up to Shut Down Islamic State”. The Australian 11 Sep. 2014. 11 Sep. 2014 ‹http://www.theaustralian/world/%20us-president-barak-obama-powers-up-to-shut-down-islamic-state-20140911-10f9dh.html›.Lévi-Strauss, Claude. The Raw and the Cooked: Mythologiques, Volume 1. Chicago: University of Chicago, 1969.Massumi, Brian. “Fear (the Spectrum Said).” Positions 13.1 (2005): 31-48.McKay, Fiona H., Samantha, L. Thomas, and Susan Kneebone. “‘It Would Be Okay If They Came through the Proper Channels’: Community Perceptions and Attitudes toward Asylum Seekers in Australia”. Journal of Refugee Studies 25.1 (2011): 113-133.Northup, Solomon. Twelve Years a Slave. New York: Derby & Miller, 1853.Pugliese, Joseph. “Asymmetries of Terror: Visual Regimes of Racial Profiling and the Shooting of John Charles de Menezes in the Context of the War in Iraq.” Borderlands 5.1 (2006). 11 Sep. 2014 ‹http://www.borderlands.net.au/vol5no1_2006/pugliese.htm›.Rix, M. “With Reckless Abandon: Haneef and Ul-Haque in Australia’s ‘War on Terror’.” In K. Michael and M.G. Micheal (eds.), The Third Workshop on the Social Implications of National Security Australia. Canberra, July 2008. 107-122. 11 Sep. 2014 ‹http://ro.uow.edu.au/cgi/viewcontent.cgi?article=1011&context=gsbpapers›.Said, Edward. Orientalism. London: Penguin, 1977.Wilson, Lauren. “More Visa Over-Stayers than Asylum-Seekers”. The Australian 11 Oct. 2012. 11 Sep. 2014 ‹http://www.theaustralian.com.au/national-affairs/immigration/more-visa-over-stayers-than-asylum-seekers/story-fn9hm1gu-1226493178289›.
APA, Harvard, Vancouver, ISO, and other styles
48

Kabir, Nahid. "Depiction of Muslims in Selected Australian Media." M/C Journal 9, no. 4 (September 1, 2006). http://dx.doi.org/10.5204/mcj.2642.

Full text
Abstract:
Give me the liberty to know, to utter, and to argue freely according to conscience, above all liberties. —John Milton (1608-1674) Introduction The publication of 12 cartoons depicting images of Prophet Mohammed [Peace Be Upon Him] first in Denmark’s Jyllands-Posten on 30 September 2005, and later reprinted in European media and two New Zealand newspapers, sparked protests around the Muslim world. The Australian newspapers – with the exception of The Courier-Mail, which published one cartoon – refrained from reprinting the cartoons, acknowledging that depictions of the Prophet are regarded as “blasphemous by Muslims”. How is this apparent act of restraint to be assessed? Edward Said, in his book Covering Islam has acknowledged that there have been many Muslim provocations and troubling incidents by Islamic countries such as Iran, Libya, Sudan, and others in the 1980s. However, he contends that the use of the label “Islam” by non-Muslim commentators, either to explain or indiscriminately condemn “Islam”, ends up becoming a form of attack, which in turn provokes more hostility (xv-xvi). This article examines how two Australian newspapers – The Australian and The West Australian – handled the debate on the Prophet Muhammad cartoons and considers whether in the name of “free speech” it ended in “a form of attack” on Australian Muslims. It also considers the media’s treatment of Muslim Australians’ “free speech” on previous occasions. This article is drawn from the oral testimonies of Muslims of diverse ethnic background. Since 1998, as part of PhD and post-doctoral research on Muslims in Australia, the author conducted 130 face-to-face, in-depth, taped interviews of Muslims, aged 18-90, both male and female. While speaking about their settlement experience, several interviewees made unsolicited remarks about Western/Australian media, all of them making the point that Muslims were being demonised. Australian Muslims Many of Australia’s 281,578 Muslims — 1.5 per cent of the total population (Australian Bureau of Statistics) — believe that as a result of media bias, they are vilified in society as “terrorists”, and discriminated in the workplace (Human Rights and Equal Opportunity Commission; Dreher 13; Kabir 266-277). The ABS figures support their claim of discrimination in the workplace; in 1996 the unemployment rate for Muslim Australians was 25 per cent, compared to 9 per cent for the national total. In 2001, it was reduced to 18.5 per cent, compared to 6.8 per cent for the national total, but the ratio of underprivileged positions in the labour market remained almost three times higher than for the wider community. Instead of reflecting on Muslims’ labour market issues or highlighting the social issues confronting Muslims since 9/11, some Australian media, in the name of “free speech”, reinforce negative perceptions of Muslims through images, cartoons and headlines. In 2004, one Muslim informant offered their perceptions of Australian media: I think the Australian media are quite prejudiced, and they only do show one side of the story, which is quite pro-Bush, pro-Howard, pro-war. Probably the least prejudiced media would be ABC or SBS, but the most pro-Jewish, pro-America, would be Channel Seven, Channel Nine, Channel Ten. They only ever show things from one side of the story. This article considers the validity of the Muslim interviewee’s perception that Australian media representation is one-sided. On 26 October 2005, under the headline: “Draw a Cartoon about Mohammed and You Must Die”, The Australian warned its readers: ISLAM is no laughing matter. Danish newspaper, Jyllands-Posten, is being protected by security guards and several cartoonists have gone into hiding after the newspaper published a series of 12 cartoons about the prophet Mohammed. According to Islam, it is blasphemous to make images of the prophet. Muslim fundamentalists have threatened to bomb the paper’s offices and kill the cartoonists (17). Militant Muslims The most provocative cartoons appearing in the Danish media are probably those showing a Muhammad-like figure wearing a turban shaped as a bomb with a burning fuse coming out of it, or a queue of smoking suicide bombers on a cloud with an Islamic cleric saying, “Stop stop we have run out of virgins”. Another showed a blindfolded Muslim man with two veiled Muslim women standing behind him. These messages appeared to be concerned with Islam’s repression of women (Jyllands-Posten), and possibly with the American channel CBS airing an interview in August 2001 of a Palestinian Hamas activist, Muhammad Abu Wardeh, who recruited terrorists for suicide bombings in Israel. Abu Wardeh was quoted as saying: “I described to him [the suicide bomber] how God would compensate the martyr for sacrificing his life for his land. If you become a martyr, God will give you 70 virgins, 70 wives and everlasting happiness” (The Guardian). Perhaps to serve their goals, the militants have re-interpreted the verses of the Holy Quran (Sura 44:51-54; 55:56) where it is said that Muslims who perform good deeds will be blessed by the huris or “pure being” (Ali 1290-1291; 1404). However, since 9/11, it is also clear that the Muslim militant groups such as the Al-Qaeda have become the “new enemy” of the West. They have used religion to justify the terrorist acts and suicide bombings that have impacted on Western interests in New York, Washington, Bali, Madrid amongst other places. But it should be noted that there are Muslim critics, such as Pakistani-born writer, Irshad Manji, Bangladeshi-born writer Taslima Nasreen and Somalian-born Dutch parliamentarian Ayaan Hirsi Ali, who have been constant critics of Muslim men’s oppression of women and have urged reformation. However, their extremist fellow believers threatened them with a death sentence for their “free speech” (Chadwick). The non-Muslim Dutch film director, Theo van Gogh, also a critic of Islam and a supporter of Ayaan Hirsi Ali, advocated a reduction in immigration into Holland, especially by Muslims. Both van Gogh and Hirsi Ali – who co-scripted and co-produced the film Submission – received death threats from Muslim extremists because the film exhibited the verses of the Quran across the chest, stomach and thighs of an almost naked girl, and featured four women in see-through robes showing their breasts, with texts from the Quran daubed on their bodies, talking about the abuse they had suffered under Islam (Anon 25). Whereas there may be some justification for the claim made in the film, that some Muslim men interpret the Quran to oppress women (Doogue and Kirkwood 220), the writing of the Quranic verses on almost-naked women is surely offensive to all Muslims because the Quran teaches Muslim women to dress modestly (Sura 24: 30-31; Ali 873). On 4 November 2004, The West Australian reported that the Dutch director Theo van Gogh was murdered by a 26-year-old Dutch-Moroccan Muslim on 2 November 2004 (27). Hirsi Ali, the co-producer of the film was forced to go into hiding after van Gogh’s murder. In the face of a growing clamour from both the Dutch Muslims and the secular communities to silence her, Ayaan Hirsi Ali resigned from the Dutch Parliament in May 2006 and decided to re-settle in Washington (Jardine 2006). It should be noted that militant Muslims form a tiny but forceful minority of the 1.4 billion Muslims worldwide. The Muslim majority are moderate and peaceful (Doogue and Kirkwood 79-80). Some Muslim scholars argue that there is specific instruction in the Quran for people to apply their knowledge and arrive at whatever interpretation is of greatest benefit to the community. It may be that stricter practitioners would not agree with the moderate interpretation of the Quran and vice versa (Doogue and Kirkwood 232). Therefore, when the Western media makes a mockery of the Muslim religion or their Prophet in the name of “free speech”, or generalises all Muslims for the acts of a few through headlines or cartoons, it impacts on the Muslims residing in the West. Prophet Muhammad’s Cartoons With the above-mentioned publication of Prophet Muhammad’s cartoons in Denmark, Islamic critics charged that the cartoons were a deliberate provocation and insult to their religion, designed to incite hatred and polarise people of different faiths. In February 2006, regrettably, violent reactions took place in the Middle East, Europe and in Asia. Danish embassies were attacked and, in some instances, were set on fire. The demonstrators chanted, “With our blood and souls we defend you, O Prophet of God!”. Some replaced the Danish flag with a green one printed with the first pillar of Islam (Kalima): “There is no god but God and Mohammed is the messenger of God”. Some considered the cartoons “an unforgivable insult” that merited punishment by death (The Age). A debate on “free speech” soon emerged in newspapers throughout the world. On 7 February 2006 the editorial in The West Australian, “World Has Had Enough of Muslim Fanatics”, stated that the newspaper would not publish cartoons of Mohammad that have drawn protests from Muslims around the world. The newspaper acknowledged that depictions of the prophet are regarded as “blasphemous by Muslims” (18). However, the editorial was juxtaposed with another article “Can Liberty Survive a Clash of Cultures?”, with an image of bearded men wearing Muslim head coverings, holding Arabic placards and chanting slogans, implying the violent nature of Islam. And in the letters page of this newspaper, published on the same day, appeared the following headlines (20): Another Excuse for Muslims to Threaten Us Islam Attacked Cartoon Rage: Greatest Threat to World Peace We’re Living in Dangerous Times Why Treat Embassies with Contempt? Muslim Religion Is Not So Soft Civilised World Is Threatened The West Australian is a state-based newspaper that tends to side with the conservative Liberal party, and is designed to appeal to the “man in the street”. The West Australian did not republish the Prophet Muhammad cartoon, but for 8 days from 7 to 15 February 2006 the letters to the editor and opinion columns consistently criticised Islam and upheld “superior” Western secular values. During this period, the newspaper did publish a few letters that condemned the Danish cartoonist, including the author’s letter, which also condemned the Muslims’ attack on the embassies. But the overall message was that Western secular values were superior to Islamic values. In other words, the newspaper adopted a jingoistic posture and asserted the cultural superiority of mainstream Australians. The Danish cartoons also sparked a debate on “free speech” in Australia’s leading newspaper, The Australian, which is a national newspaper that also tends to reflect the values of the ruling national government – also the conservative Liberal party. And it followed a similar pattern of debate as The West Australian. On 14 February 2006, The Australian (13) published a reader’s criticism of The Australian for not republishing the cartoons. The author questioned whether the Muslims deserved any tolerance because their Holy Book teaches intolerance. The Koran [Quran] (22:19) says: Garments of fire have been prepared for the unbelievers. Scalding water shall be poured upon their heads, melting their skins and that which is in their bellies. Perhaps this reader did not find the three cartoons published in The Australian a few days earlier to be ‘offensive’ to the Australian Muslims. In the first, on 6 February 2006, the cartoonist Bill Leak showed that his head was chopped off by some masked people (8), implying that Muslim militants, such as the Hamas, would commit such a brutal act. The Palestinian Hamas group often appear in masks before the media. In this context, it is important to note that Israel is an ally of Australia and the United States, whereas the Hamas is Israel’s enemy whose political ideology goes against Israel’s national interest. On 25 January 2006, the Hamas won a landslide victory in the Palestine elections but Israel refused to recognise this government because Hamas has not abandoned its militant ideology (Page 13). The cartoon, therefore, probably means that the cartoonist or perhaps The Australian has taken sides on behalf of Australia’s ally Israel. In the second cartoon, on 7 February 2006, Bill Leak sketched an Arab raising his sword over a school boy who was drawing in a classroom. The caption read, “One more line and I’ll chop your hand off!” (12). And in the third, on 10 February 2006, Bill Leak sketched Mr Mohammed’s shadow holding a sword with the caption: “The unacceptable face of fanaticism”. A reporter asked: “And so, Mr Mohammed, what do you have to say about the current crisis?” to which Mr Mohammed replied, “I refuse to be drawn on the subject” (16). The cartoonist also thought that the Danish cartoons should have been republished in the Australian newspapers (Insight). Cartoons are supposed to reflect the theme of the day. Therefore, Bill Leak’s cartoons were certainly topical. But his cartoons reveal that his or The Australian’s “freedom of expression” has been one-sided, all depicting Islam as representing violence. For example, after the Bali bombing on 21 November 2002, Leak sketched two fully veiled women, one carrying explosives under her veil and asking the other, “Does my bomb look big in this”? The cartoonist’s immediate response to criticism of the cartoon in a television programme was, “inevitably, when you look at a cartoon such as that one, the first thing you’ve got to do is remember that as a daily editorial cartoonist, you’re commenting first and foremost on the events of the day. They’re very ephemeral things”. He added, “It was…drawn about three years ago after a spate of suicide bombing attacks in Israel” (Insight). Earlier events also suggested that that The Australian resolutely supports Australia’s ally, Israel. On 13-14 November 2004 Bill Leak caricatured the recently deceased Palestinian leader Yasser Arafat in The Weekend Australian (18). In the cartoon, God appeared to be displeased with him and would not allow him to enter paradise. Arafat was shown with explosives strapped to his body and threatening God by saying, “A cloud to myself or the whole place goes up….”. On the other hand, on 6 January 2006 the same cartoonist sympathetically portrayed ailing Israeli leader Ariel Sharon as a decent man wearing a black suit, with God willing to accept him (10); and the next day Sharon was portrayed as “a Man of Peace” (12). Politics and Religion Thus, the anecdotal evidence so far reveals that in the name of “freedom of expression”, or “free speech” The West Australian and The Australian newspapers have taken sides – either glorifying their “superior” Western culture or taking sides on behalf of its allies. On the other hand, these print media would not tolerate the “free speech” of a Muslim leader who spoke against their ally or another religious group. From the 1980s until recently, some print media, particularly The Australian, have been critical of the Egyptian-born Muslim spiritual leader Imam Taj el din al-Hilali for his “free speech”. In 1988 the Australian Federation of Islamic Councils bestowed the title of Mufti to Imam al- Hilali, and al-Hilali was elevated to a position of national religious leadership. Al-Hilali became a controversial figure after 1988 when he gave a speech to the Muslim students at Sydney University and accused Jews of trying to control the world through “sex, then sexual perversion, then the promotion of espionage, treason and economic hoarding” (Hewett 7). The Imam started being identified as a “Muslim chief” in the news headlines once he directly criticised American foreign policy during the 1990-91 Gulf crisis. The Imam interpreted US intervention in Kuwait as a “political dictatorship” that was exploiting the Gulf crisis because it was seen as a threat to its oil supply (Hewett 7). After the Bali bombings in 2002, the Howard government distributed information on terrorism through the “Alert and Alarmed” kit as part of its campaign of public awareness. The first casualty of the “Be alert, but not alarmed” campaign was the Imam al-Hilali. On 6 January 2003, police saw a tube of plastic protruding from a passenger door window and suspected that al-Hilali might have been carrying a gun when they pulled him over for traffic infringements. Sheikh al-Hilali was charged with resisting arrest and assaulting police (Morris 1, 4). On 8 January 2003 The Australian reminded its readers “Arrest Adds to Mufti’s Mystery” (9). The same issue of The Australian portrayed the Sheikh being stripped of his clothes by two policemen. The letter page also contained some unsympathetic opinions under the headline: “Mufti Deserved No Special Treatment” (10). In January 2004, al-Hilali was again brought under the spotlight. The Australian media alleged that al-Hilali praised the suicide bombers at a Mosque in Lebanon and said that the destruction of the World Trade Center was “God’s work against oppressors” (Guillatt 24). Without further investigation, The Australian again reported his alleged inflammatory comments. Under the headline, “Muslim Leader’s Jihad Call”, it condemned al-Hilali and accused him of strongly endorsing “terrorist groups Hezbollah and Hamas, during his visit to Lebanon”. Federal Labor Member of Parliament Michael Danby said, “Hilali’s presence in Australia is a mistake. He and his associates must give authorities an assurance he will not assist future homicide attacks” (Chulov 1, 5). Later investigations by Sydney’s Good Weekend Magazine and SBS Television found that al-Hilali’s speech had been mistranslated (Guillatt 24). However, the selected print media that had been very critical of the Sheikh did not highlight the mistranslation. On the other hand, the Archbishop of Sydney, Cardinal George Pell has been critical of Islam and is also opposed to Australia’s involvement in the Iraq war in 2003, but the print media appeared to ignore his “free speech” (Dateline). In November 2004, Dr Pell said that secular liberal democracy was empty and selfish, and Islam was emerging as an alternative world view that attracted the alienated (Zwartz 3). In May 2006, Dr Pell said that he tried to reconcile claims that Islam was a faith of peace with those that suggested the Quran legitimised the killings of non-Muslims but: In my own reading of the Koran [Quran], I began to note down invocations to violence. There are so many of them, however, that I abandoned this exercise after 50 or 60 or 70 pages (Morris). Muslim leaders regarded Dr Pell’s anti-Islam statement as “inflammatory” (Morris). However, both the newspapers, The Australian and The West Australian remained uncritical of Dr Pell’s “free speech” against Islam. Conclusion Edward Said believed that media images are informed by official definitions of Islam that serve the interests of government and business. The success of the images is not in their accuracy but in the power of the people who produce them, the triumph of which is hardly challenged. “Labels have survived many experiences and have been capable of adapting to new events, information and realities” (9). In this paper the author accepts that, in the Australian context, militant Muslims are the “enemy of the West”. However, they are also the enemy of most moderate Australian Muslims. When some selected media take sides on behalf of the hegemony, or Australia’s “allies”, and offend moderate Australian Muslims, the media’s claim of “free speech” or “freedom of expression” remains highly questionable. Muslim interviewees in this study have noted a systemic bias in some Australian media, but they are not alone in detecting this bias (see the “Abu Who?” segment of Media Watch on ABC TV, 31 July 2006). To address this concern, Australian Muslim leaders need to play an active role in monitoring the media. This might take the form of a watchdog body within the Australian Federation of Islamic Councils. If the media bias is found to be persistent, the AFIC might then recommend legislative intervention or application of existing anti-discrimination policies; alternatively, AFIC could seek sanctions from within the Australian journalistic community. One way or another this practice should be stopped. References Ali, Abdullah Yusuf. The Holy Quran: Text, Translation and Commentary. New Revised Ed. Maryland, USA: Amana Corporation, 1989. Anonymous. “Dutch Courage in Aftermath of Film-Maker’s Slaying.” The Weekend Australian 6-7 Nov. 2004. Chadwick, Alex. “The Caged Virgin: A Call for Change in Islam.” 4 June 2006 http://www.npr.org/templates/story/story.php?storyId=5382547>. Chulov, Martin. “Muslim Leader’s Jihad Call.” The Australian 19 Feb. 2004. Dateline. “Cardinal George Pell Interview.” SBS TV 6 April 2005. 7 June 2006 http://news.sbs.com.au/dateline/>. Dreher, Tanya. “Targeted”, Experiences of Racism in NSW after September 11, 2001. Sydney: University of Technology, 2005. Doogue, Geraldine, and Peter Kirkwood. Tomorrow’s Islam: Understanding Age-Old Beliefs and a Modern World. Sydney: ABC Books, 2005. Insight. “Culture Clash.” SBS TV 7 March 2006. 11 June 2006 http://news.sbs.com.au/insight/archive.php>. Guillatt, Richard. “Moderate or Menace.” Sydney Morning Herald Good Weekend 21 Aug. 2004. Hewett, Tony. “Australia Exploiting Crisis: Muslim Chief.” Sydney Morning Herald 27 Nov. 1990. Human Rights and Equal Opportunity Commission. Ismaa – Listen: National Consultations on Eliminating Prejudice against Arab and Muslim Australians. Sydney: Human Rights and Equal Opportunity Commission, 2004. Jyllands-Posten. 24 Jan. 2006. http://www.di2.nu/files/Muhammad_Cartoons_Jyllands_Posten.html>. Jardine, Lisa. “Liberalism under Pressure.” BBC News 5 June 2006. 12 June 2006 http://news.bbc.co.uk/1/hi/magazine/5042418.stm>. Kabir, Nahid. Muslims in Australia: Immigration, Race Relations and Cultural History. London: Kegan Paul, 2005. Media Watch. “Abu Who?” ABC Television 31 July 2006. http://abc.net.au/mediawatch/>. Morris, Linda. “Imam Facing Charges after Row with Police.” Sydney Morning Herald 7 Jan. 2003. Morris, Linda. “Pell Challenges Islam – O Ye, of Little Tolerant Faith.” Sydney Morning Herald 5 May 2006. Page, Jeremy. “Russia May Sell Arms to Hamas.” The Australian 18 Feb. 2006. Said, Edward. Covering Islam: How the Media and the Experts Determine How We See the Rest of the World. London: Vintage, 1981, 1997. Submission. “Film Clip from Short Submission.” Submission. 11 June 2006. http://www.ifilm.com/ifilmdetail/2655656?htv=12> The Age. “Embassies Torched over Cartoons.” 5 Feb. 2006. http://www.theage.com.au>. The Guardian. “Virgins? What Virgins?” 12 Jan. 2002. 4 June 2006 http://www.guardian.co.uk/>. Zwartz, Barney. “Islam Could Be New Communism, Pell Tells US Audience.” Sydney Morning Herald 12 Nov. 2004. Citation reference for this article MLA Style Kabir, Nahid. "Depiction of Muslims in Selected Australian Media: Free Speech or Taking Sides." M/C Journal 9.4 (2006). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0609/1-kabir.php>. APA Style Kabir, N. (Sep. 2006) "Depiction of Muslims in Selected Australian Media: Free Speech or Taking Sides," M/C Journal, 9(4). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0609/1-kabir.php>.
APA, Harvard, Vancouver, ISO, and other styles
49

Lambert, Anthony. "Rainbow Blindness: Same-Sex Partnerships in Post-Coalitional Australia." M/C Journal 13, no. 6 (November 17, 2010). http://dx.doi.org/10.5204/mcj.318.

Full text
Abstract:
In Australia the “intimacy” of citizenship (Berlant 2), is often used to reinforce subscription to heteronormative romantic and familial structures. Because this framing promotes discourses of moral failure, recent political attention to sexuality and same-sex couples can be filtered through insights into coalitional affiliations. This paper uses contemporary shifts in Australian politics and culture to think through the concept of coalition, and in particular to analyse connections between sexuality and governmentality (or more specifically normative bias and same-sex relationships) in what I’m calling post-coalitional Australia. Against the unpredictability of changing parties and governments, allegiances and alliances, this paper suggests the continuing adherence to a heteronormatively arranged public sphere. After the current Australian Prime Minister Julia Gillard deposed the previous leader, Kevin Rudd, she clung to power with the help of independents and the Greens, and clichés of a “rainbow coalition” and a “new paradigm” were invoked to describe the confused electorate and governmental configuration. Yet in 2007, a less confused Australia decisively threw out the Howard–led Liberal and National Party coalition government after eleven years, in favour of Rudd’s own rainbow coalition: a seemingly invigorated party focussed on gender equity, Indigenous Australians, multi-cultural visibility, workplace relations, Austral-Asian relations, humane refugee processing, the environment, and the rights and obligations of same-sex couples. A post-coalitional Australia invokes something akin to “aftermath culture” (Lambert and Simpson), referring not just to Rudd’s fall or Howard’s election loss, but to the broader shifting contexts within which most Australian citizens live, and within which they make sense of the terms “Australia” and “Australian”. Contemporary Australia is marked everywhere by cracks in coalitions and shifts in allegiances and belief systems – the Coalition of the Willing falling apart, the coalition government crushed by defeat, deposed leaders, and unlikely political shifts and (re)alignments in the face of a hung parliament and renewed pushes toward moral and cultural change. These breakdowns in allegiances are followed by swift symbolically charged manoeuvres. Gillard moved quickly to repair relations with mining companies damaged by Rudd’s plans for a mining tax and to water down frustration with the lack of a sustainable Emissions Trading Scheme. And one of the first things Kevin Rudd did as Prime Minister was to change the fittings and furnishings in the Prime Ministerial office, of which Wright observed that “Mr Howard is gone and Prime Minister Kevin Rudd has moved in, the Parliament House bureaucracy has ensured all signs of the old-style gentlemen's club… have been banished” (The Age, 5 Dec. 2007). Some of these signs were soon replaced by Ms. Gillard herself, who filled the office in turn with memorabilia from her beloved Footscray, an Australian Rules football team. In post-coalitional Australia the exile of the old Menzies’ desk and a pair of Chesterfield sofas works alongside the withdrawal of troops from Iraq and renewed pledges for military presence in Afghanistan, apologising to stolen generations of Indigenous Australians, the first female Governor General, deputy Prime Minister and then Prime Minister (the last two both Gillard), the repealing of disadvantageous workplace reform, a focus on climate change and global warming (with limited success as stated), a public, mandatory paid maternity leave scheme, changes to the processing and visas of refugees, and the amendments to more than one hundred laws that discriminate against same sex couples by the pre-Gillard, Rudd-led Labor government. The context for these changes was encapsulated in an announcement from Rudd, made in March 2008: Our core organising principle as a Government is equality of opportunity. And advancing people and their opportunities in life, we are a Government which prides itself on being blind to gender, blind to economic background, blind to social background, blind to race, blind to sexuality. (Rudd, “International”) Noting the political possibilities and the political convenience of blindness, this paper navigates the confusing context of post-coalitional Australia, whilst proffering an understanding of some of the cultural forces at work in this age of shifting and unstable alliances. I begin by interrogating the coalitional impulse post 9/11. I do this by connecting public coalitional shifts to the steady withdrawal of support for John Howard’s coalition, and movement away from George Bush’s Coalition of the Willing and the War on Terror. I then draw out a relationship between the rise and fall of such affiliations and recent shifts within government policy affecting same-sex couples, from former Prime Minister Howard’s amendments to The Marriage Act 1961 to the Rudd-Gillard administration’s attention to the discrimination in many Australian laws. Sexual Citizenship and Coalitions Rights and entitlements have always been constructed and managed in ways that live out understandings of biopower and social death (Foucault History; Discipline). The disciplining of bodies, identities and pleasures is so deeply entrenched in government and law that any non-normative claim to rights requires the negotiation of existing structures. Sexual citizenship destabilises the post-coalitional paradigm of Australian politics (one of “equal opportunity” and consensus) by foregrounding the normative biases that similarly transcend partisan politics. Sexual citizenship has been well excavated in critical work from Evans, Berlant, Weeks, Richardson, and Bell and Binnie’s The Sexual Citizen which argues that “many of the current modes of the political articulation of sexual citizenship are marked by compromise; this is inherent in the very notion itself… the twinning of rights with responsibilities in the logic of citizenship is another way of expressing compromise… Every entitlement is freighted with a duty” (2-3). This logic extends to political and economic contexts, where “natural” coalition refers primarily to parties, and in particular those “who have powerful shared interests… make highly valuable trades, or who, as a unit, can extract significant value from others without much risk of being split” (Lax and Sebinius 158). Though the term is always in some way politicised, it need not refer only to partisan, multiparty or multilateral configurations. The subscription to the norms (or normativity) of a certain familial, social, religious, ethnic, or leisure groups is clearly coalitional (as in a home or a front, a club or a team, a committee or a congregation). Although coalition is interrogated in political and social sciences, it is examined frequently in mathematical game theory and behavioural psychology. In the former, as in Axelrod’s The Evolution of Cooperation, it refers to people (or players) who collaborate to successfully pursue their own self-interests, often in the absence of central authority. In behavioural psychology the focus is on group formations and their attendant strategies, biases and discriminations. Experimental psychologists have found “categorizing individuals into two social groups predisposes humans to discriminate… against the outgroup in both allocation of resources and evaluation of conduct” (Kurzban, Tooby and Cosmides 15387). The actions of social organisation (and not unseen individual, supposedly innate impulses) reflect the cultural norms in coalitional attachments – evidenced by the relationship between resources and conduct that unquestioningly grants and protects the rights and entitlements of the larger, heteronormatively aligned “ingroup”. Terror Management Particular attention has been paid to coalitional formations and discriminatory practices in America and the West since September 11, 2001. Terror Management Theory or TMT (Greenberg, Pyszczynski and Solomon) has been the main framework used to explain the post-9/11 reassertion of large group identities along ideological, religious, ethnic and violently nationalistic lines. Psychologists have used “death-related stimuli” to explain coalitional mentalities within the recent contexts of globalised terror. The fear of death that results in discriminatory excesses is referred to as “mortality salience”, with respect to the highly visible aspects of terror that expose people to the possibility of their own death or suffering. Naverette and Fessler find “participants… asked to contemplate their own deaths exhibit increases in positive evaluations of people whose attitudes and values are similar to their own, and derogation of those holding dissimilar views” (299). It was within the climate of post 9/11 “mortality salience” that then Prime Minister John Howard set out to change The Marriage Act 1961 and the Family Law Act 1975. In 2004, the Government modified the Marriage Act to eliminate flexibility with respect to the definition of marriage. Agitation for gay marriage was not as noticeable in Australia as it was in the U.S where Bush publicly rejected it, and the UK where the Civil Union Act 2004 had just been passed. Following Bush, Howard’s “queer moral panic” seemed the perfect decoy for the increased scrutiny of Australia’s involvement in the Iraq war. Howard’s changes included outlawing adoption for same-sex couples, and no recognition for legal same-sex marriages performed in other countries. The centrepiece was the wording of The Marriage Amendment Act 2004, with marriage now defined as a union “between a man and a woman to the exclusion of all others”. The legislation was referred to by the Australian Greens Senator Bob Brown as “hateful”, “the marriage discrimination act” and the “straight Australia policy” (Commonwealth 26556). The Labor Party, in opposition, allowed the changes to pass (in spite of vocal protests from one member) by concluding the legal status of same-sex relations was in no way affected, seemingly missing (in addition to the obvious symbolic and physical discrimination) the equation of same-sex recognition with terror, terrorism and death. Non-normative sexual citizenship was deployed as yet another form of “mortality salience”, made explicit in Howard’s description of the changes as necessary in protecting the sanctity of the “bedrock institution” of marriage and, wait for it, “providing for the survival of the species” (Knight, 5 Aug. 2003). So two things seem to be happening here: the first is that when confronted with the possibility of their own death (either through terrorism or gay marriage) people value those who are most like them, joining to devalue those who aren’t; the second is that the worldview (the larger religious, political, social perspectives to which people subscribe) becomes protection from the potential death that terror/queerness represents. Coalition of the (Un)willing Yet, if contemporary coalitions are formed through fear of death or species survival, how, for example, might these explain the various forms of risk-taking behaviours exhibited within Western democracies targeted by such terrors? Navarette and Fessler (309) argue that “affiliation defences are triggered by a wider variety of threats” than “existential anxiety” and that worldviews are “in turn are reliant on ‘normative conformity’” (308) or “normative bias” for social benefits and social inclusions, because “a normative orientation” demonstrates allegiance to the ingroup (308-9). Coalitions are founded in conformity to particular sets of norms, values, codes or belief systems. They are responses to adaptive challenges, particularly since September 11, not simply to death but more broadly to change. In troubled times, coalitions restore a shared sense of predictability. In Howard’s case, he seemed to say, “the War in Iraq is tricky but we have a bigger (same-sex) threat to deal with right now. So trust me on both fronts”. Coalitional change as reflective of adaptive responses thus serves the critical location of subsequent shifts in public support. Before and since September 11 Australians were beginning to distinguish between moderation and extremism, between Christian fundamentalism and productive forms of nationalism. Howard’s unwavering commitment to the American-led war in Iraq saw Australia become a member of another coalition: the Coalition of the Willing, a post 1990s term used to describe militaristic or humanitarian interventions in certain parts of the world by groups of countries. Howard (in Pauly and Lansford 70) committed Australia to America’s fight but also to “civilization's fight… of all who believe in progress and pluralism, tolerance and freedom”. Although Bush claimed an international balance of power and influence within the coalition (94), some countries refused to participate, many quickly withdrew, and many who signed did not even have troops. In Australia, the war was never particularly popular. In 2003, forty-two legal experts found the war contravened International Law as well as United Nations and Geneva conventions (Sydney Morning Herald 26 Feb. 2003). After the immeasurable loss of Iraqi life, and as the bodies of young American soldiers (and the occasional non-American) began to pile up, the official term “coalition of the willing” was quietly abandoned by the White House in January of 2005, replaced by a “smaller roster of 28 countries with troops in Iraq” (ABC News Online 22 Jan. 2005). The coalition and its larger war on terror placed John Howard within the context of coalitional confusion, that when combined with the domestic effects of economic and social policy, proved politically fatal. The problem was the unclear constitution of available coalitional configurations. Howard’s continued support of Bush and the war in Iraq compounded with rising interest rates, industrial relations reform and a seriously uncool approach to the environment and social inclusion, to shift perceptions of him from father of the nation to dangerous, dithery and disconnected old man. Post-Coalitional Change In contrast, before being elected Kevin Rudd sought to reframe Australian coalitional relationships. In 2006, he positions the Australian-United States alliance outside of the notion of military action and Western territorial integrity. In Rudd-speak the Howard-Bush-Blair “coalition of the willing” becomes F. Scott Fitzgerald’s “willingness of the heart”. The term coalition was replaced by terms such as dialogue and affiliation (Rudd, “Friends”). Since the 2007 election, Rudd moved quickly to distance himself from the agenda of the coalition government that preceded him, proposing changes in the spirit of “blindness” toward marginality and sexuality. “Fix-it-all” Rudd as he was christened (Sydney Morning Herald 29 Sep. 2008) and his Labor government began to confront the legacies of colonial history, industrial relations, refugee detention and climate change – by apologising to Aboriginal people, timetabling the withdrawal from Iraq, abolishing the employee bargaining system Workchoices, giving instant visas and lessening detention time for refugees, and signing the Kyoto Protocol agreeing (at least in principle) to reduce green house gas emissions. As stated earlier, post-coalitional Australia is not simply talking about sudden change but an extension and a confusion of what has gone on before (so that the term resembles postcolonial, poststructural and postmodern because it carries the practices and effects of the original term within it). The post-coalitional is still coalitional to the extent that we must ask: what remains the same in the midst of such visible changes? An American focus in international affairs, a Christian platform for social policy, an absence of financial compensation for the Aboriginal Australians who received such an eloquent apology, the lack of coherent and productive outcomes in the areas of asylum and climate change, and an impenetrable resistance to the idea of same-sex marriage are just some of the ways in which these new governments continue on from the previous one. The Rudd-Gillard government’s dealings with gay law reform and gay marriage exemplify the post-coalitional condition. Emulating Christ’s relationship to “the marginalised and the oppressed”, and with Gillard at his side, Rudd understandings of the Christian Gospel as a “social gospel” (Rudd, “Faith”; see also Randell-Moon) to table changes to laws discriminating against gay couples – guaranteeing hospital visits, social security benefits and access to superannuation, resembling de-facto hetero relationships but modelled on the administering and registration of relationships, or on tax laws that speak primarily to relations of financial dependence – with particular reference to children. The changes are based on the report, Same Sex, Same Entitlements (HREOC) that argues for the social competence of queer folk, with respect to money, property and reproduction. They speak the language of an equitable economics; one that still leaves healthy and childless couples with limited recognition and advantage but increased financial obligation. Unable to marry in Australia, same-sex couples are no longer single for taxation purposes, but are now simultaneously subject to forms of tax/income auditing and governmental revenue collection should either same-sex partner require assistance from social security as if they were married. Heteronormative Coalition Queer citizens can quietly stake their economic claims and in most states discreetly sign their names on a register before becoming invisible again. Mardi Gras happens but once a year after all. On the topic of gay marriage Rudd and Gillard have deferred to past policy and to the immoveable nature of the law (and to Howard’s particular changes to marriage law). That same respect is not extended to laws passed by Howard on industrial relations or border control. In spite of finding no gospel references to Jesus the Nazarene “expressly preaching against homosexuality” (Rudd, “Faith”), and pre-election promises that territories could govern themselves with respect to same sex partnerships, the Rudd-Gillard government in 2008 pressured the ACT to reduce its proposed partnership legislation to that of a relationship register like the ones in Tasmania and Victoria, and explicitly demanded that there be absolutely no ceremony – no mimicking of the real deal, of the larger, heterosexual citizens’ “ingroup”. Likewise, with respect to the reintroduction of same-sex marriage legislation by Greens senator Sarah Hanson Young in September 2010, Gillard has so far refused a conscience vote on the issue and restated the “marriage is between a man and a woman” rhetoric of her predecessors (Topsfield, 30 Sep. 2010). At the same time, she has agreed to conscience votes on euthanasia and openly declared bi-partisan (with the federal opposition) support for the war in Afghanistan. We see now, from Howard to Rudd and now Gillard, that there are some coalitions that override political differences. As psychologists have noted, “if the social benefits of norm adherence are the ultimate cause of the individual’s subscription to worldviews, then the focus and salience of a given individual’s ideology can be expected to vary as a function of their need to ally themselves with relevant others” (Navarette and Fessler 307). Where Howard invoked the “Judaeo-Christian tradition”, Rudd chose to cite a “Christian ethical framework” (Rudd, “Faith”), that saw him and Gillard end up in exactly the same place: same sex relationships should be reduced to that of medical care or financial dependence; that a public ceremony marking relationship recognition somehow equates to “mimicking” the already performative and symbolic heterosexual institution of marriage and the associated romantic and familial arrangements. Conclusion Post-coalitional Australia refers to the state of confusion borne of a new politics of equality and change. The shift in Australia from conservative to mildly socialist government(s) is not as sudden as Howard’s 2007 federal loss or as short-lived as Gillard’s hung parliament might respectively suggest. Whilst allegiance shifts, political parties find support is reliant on persistence as much as it is on change – they decide how to buffer and bolster the same coalitions (ones that continue to privilege white settlement, Christian belief systems, heteronormative familial and symbolic practices), but also how to practice policy and social responsibility in a different way. Rudd’s and Gillard’s arguments against the mimicry of heterosexual symbolism and the ceremonial validation of same-sex partnerships imply there is one originary form of conduct and an associated sacred set of symbols reserved for that larger ingroup. Like Howard before them, these post-coalitional leaders fail to recognise, as Butler eloquently argues, “gay is to straight not as copy is to original, but as copy is to copy” (31). To make claims to status and entitlements that invoke the messiness of non-normative sex acts and romantic attachments necessarily requires the negotiation of heteronormative coalitional bias (and in some ways a reinforcement of this social power). As Bell and Binnie have rightly observed, “that’s what the hard choices facing the sexual citizen are: the push towards rights claims that make dissident sexualities fit into heterosexual culture, by demanding equality and recognition, versus the demand to reject settling for heteronormativity” (141). The new Australian political “blindness” toward discrimination produces positive outcomes whilst it explicitly reanimates the histories of oppression it seeks to redress. The New South Wales parliament recently voted to allow same-sex adoption with the proviso that concerned parties could choose not to adopt to gay couples. The Tasmanian government voted to recognise same-sex marriages and unions from outside Australia, in the absence of same-sex marriage beyond the current registration arrangements in its own state. In post-coalitional Australia the issue of same-sex partnership recognition pits parties and allegiances against each other and against themselves from within (inside Gillard’s “rainbow coalition” the Rainbow ALP group now unites gay people within the government’s own party). Gillard has hinted any new proposed legislation regarding same-sex marriage may not even come before parliament for debate, as it deals with real business. Perhaps the answer lies over the rainbow (coalition). As the saying goes, “there are none so blind as those that will not see”. References ABC News Online. “Whitehouse Scraps Coalition of the Willing List.” 22 Jan. 2005. 1 July 2007 ‹http://www.abc.net.au/news/newsitems/200501/s1286872.htm›. Axelrod, Robert. The Evolution of Cooperation. New York: Basic Books, 1984. Berlant, Lauren. The Queen of America Goes to Washington City: Essays on Sex and Citizenship. Durham: Duke University Press, 1997. Bell, David, and John Binnie. The Sexual Citizen: Queer Politics and Beyond. Cambridge, England: Polity, 2000. Butler, Judith. Gender Trouble: Feminism and the Subversion of Identity. New York: Routledge, 1990. Commonwealth of Australia. Parliamentary Debates. House of Representatives 12 Aug. 2004: 26556. (Bob Brown, Senator, Tasmania.) Evans, David T. Sexual Citizenship: The Material Construction of Sexualities. London: Routledge, 1993. Foucault, Michel. Discipline and Punish: The Birth of the Prison. Trans. A. Sheridan. London: Penguin, 1991. ———. The Will to Knowledge: The History of Sexuality. Vol. 1. Trans. Robert Hurley. London: Penguin, 1998. Greenberg, Jeff, Tom Pyszczynski, and Sheldon Solomon. “The Causes and Consequences of the Need for Self-Esteem: A Terror Management Theory.” Public Self, Private Self. Ed. Roy F. Baumeister. New York: Springer-Verlag, 1986. 189-212. Human Rights and Equal Opportunity Commission. Same-Sex: Same Entitlements Report. 2007. 21 Aug. 2007 ‹http://www.hreoc.gov.au/human_rights/samesex/report/index.html›. Kaplan, Morris. Sexual Justice: Democratic Citizenship and the Politics of Desire. New York: Routledge, 1997. Knight, Ben. “Howard and Costello Reject Gay Marriage.” ABC Online 5 Aug. 2003. Kurzban, Robert, John Tooby, and Leda Cosmides. "Can Race Be Erased? Coalitional Computation and Social Categorization." Proceedings of the National Academy of Sciences 98.26 (2001): 15387–15392. Lambert, Anthony, and Catherine Simpson. "Jindabyne’s Haunted Alpine Country: Producing (an) Australian Badland." M/C Journal 11.5 (2008). 20 Oct. 2010 ‹http://journal.media-culture.org.au/index.php/mcjournal/article/view/81›. Lax, David A., and James K. Lebinius. “Thinking Coalitionally: Party Arithmetic Process Opportunism, and Strategic Sequencing.” Negotiation Analysis. Ed. H. Peyton Young. Michigan: University of Michigan Press, 1991. 153-194. Naverette, Carlos, and Daniel Fessler. “Normative Bias and Adaptive Challenges: A Relational Approach to Coalitional Psychology and a Critique of Terror Management Theory.” Evolutionary Psychology 3 (2005): 297-325. Pauly, Robert J., and Tom Lansford. Strategic Preemption: US Foreign Policy and Second Iraq War. Aldershot: Ashgate, 2005. Randall-Moon, Holly. "Neoliberal Governmentality with a Christian Twist: Religion and Social Security under the Howard-Led Australian Government." Eds. Michael Bailey and Guy Redden. Mediating Faiths: Religion and Socio- Cultural Change in the Twenty-First Century. Farnham: Ashgate, in press. Richardson, Diane. Rethinking Sexuality. London: Sage, 2000. Rudd, Kevin. “Faith in Politics.” The Monthly 17 (2006). 31 July 2007 ‹http://www.themonthly.com.au/monthly-essays-kevin-rudd-faith-politics--300›. Rudd, Kevin. “Friends of Australia, Friends of America, and Friends of the Alliance That Unites Us All.” Address to the 15th Australian-American Leadership Dialogue. The Australian, 24 Aug. 2007. 13 Mar. 2008 ‹http://www.theaustralian.com.au/national-affairs/climate/kevin-rudds-address/story-e6frg6xf-1111114253042›. Rudd, Kevin. “Address to International Women’s Day Morning Tea.” Old Parliament House, Canberra, 11 Mar. 2008. 1 Oct. 2010 ‹http://pmrudd.archive.dpmc.gov.au/node/5900›. Sydney Morning Herald. “Coalition of the Willing? Make That War Criminals.” 26 Feb. 2003. 1 July 2007 ‹http://www.smh.com.au/articles/2003/02/25/1046064028608.html›. Topsfield, Jewel. “Gillard Rules Out Conscience Vote on Gay Marriage.” The Age 30 Sep. 2010. 1 Oct. 2010 ‹http://www.theage.com.au/national/gillard-rules-out-conscience-vote-on-gay-marriage-20100929-15xgj.html›. Weeks, Jeffrey. "The Sexual Citizen." Theory, Culture and Society 15.3-4 (1998): 35-52. Wright, Tony. “Suite Revenge on Chesterfield.” The Age 5 Dec. 2007. 4 April 2008 ‹http://www.theage.com.au/news/national/suite-revenge-on-chesterfield/2007/12/04/1196530678384.html›.
APA, Harvard, Vancouver, ISO, and other styles
50

O'Malley, Nicholas. "Telemental Health." Voices in Bioethics 8 (March 2, 2022). http://dx.doi.org/10.52214/vib.v8i.9166.

Full text
Abstract:
Photo by National Cancer Institute on Unsplash ABSTRACT The COVID-19 pandemic has brought about the advent of many new telehealth technologies as providers have been forced to shift their practice from the clinic to the cloud. Perhaps, none of these fields has been as widely advertised and expanded as telemental health. While many have lauded this change, it is important to question whether this method of practice is truly beneficial for patients, and further whether it benefits all patients. This paper critically examines the current structure of telemental health interventions and compares them to more traditional in-person interactions, reflecting on the unique benefits and challenges of each method, and ultimately concluding that telemental health is the wrong modality for certain patients and modalities. INTRODUCTION As the e-health revolution rapidly progresses, scientists, healthcare professionals, and technology experts are attempting to determine which areas of medical practice will best adapt to changing dynamics. Two key professions that are ripe for this kind of disruption are psychiatry and psychology. The American Psychiatric Association, along with its partners in the American Telemedicine Association, states that “telemental health in the form of interactive videoconferencing has become a critical tool in the delivery of mental health care. It has demonstrated its ability to increase access and quality of care, and, in some settings, to do so more effectively than treatment delivered in-person.”[1] This claim, though appearing bombastic, is also reflected, though with more nuance, by the American Psychological Association. For its part, the American Psychological Association states that “the expanding role of technology and the continuous development of new technologies that may be useful in the practice of psychology present unique opportunities, considerations, and challenges to practice.”[2] Thus, the point of this paper will be to examine whether the rapidly expanding system of telemental health is ethical based on its adherence to accepted standards of care, privacy concerns, and concerns about the boundaries of the patient-provider relationship. l. Standard of Care Concerns One of the most considerable objections to the broader implementation of telemental health services is the speculation that it is less effective than in-person treatment. It would follow that a system that is broadly implemented would not only fail to be beneficent, but it would also fail to be non-maleficent. Providers would be knowingly providing an ineffective treatment. Some may argue that such a system would also violate the principle of justice. It would create an unequal system of care in which those patients who could afford to see their therapist in person would benefit more than those who could not. However, data from a wide variety of sources at first glance, would seem to contradict these fears.[3] A review of the literature regarding the implementation of telemental health in geriatric patients, for example, showed that telemental health was as good as in-patient psychiatric care in several areas, including the diagnosis of dementia, nursing home consultations, and in conducting psychotherapy for geriatric patients and their caregivers.[4] On the other end of the age spectrum, a review of nineteen randomized controlled trials and one clinical trial demonstrated high comparative effectiveness between telemental health interventions in children and adolescents.[5] Hailey et al. found that telemental health interventions were effective in over half of the 65 studies reviewed. These studies encompassed a diverse and wide-ranging number of psychiatric disciplines, including child psychiatry, post-traumatic stress disorder, dementia, cognitive decline, smoking cessation, and eating disorders. Methods included phone- and web-based interventions.[6] Indeed, the data is not just limited to outpatient settings. For example, Reinhardt et al. conducted a literature review of studies about telemental health visits for psychiatric emergencies and crises. They found that no studies reported a significant statistical difference in diagnosis or disposition among psychiatric patients who presented to the Emergency Department. In addition, their review demonstrated a reduction in length of stay, reduction in time to care, and decreased costs among these patients. The authors also reviewed literature pertaining to crisis response teams and patients with severe mental illness. Both studies demonstrated that telemental health visits for these patients were similar, if not better, than face-to-face visits. In addition, both patients and practitioners showed high satisfaction with these services.[7] Thus, the implementation of telemental health is limited to out-patient settings and could feasibly be implemented in the in-patient and emergency settings. There is, however, one particularly glaring gap in telemental health services: group therapy. Perhaps the most famous example of group therapy is Alcoholics Anonymous, but group therapy has expanded to include many different modalities. Group therapy is a common intervention for many mental illnesses and can be incredibly effective in treating diseases ranging from PTSD to borderline personality disorder.[8] In a pilot study comparing a video teleconference based Dialectical Behavioral Therapy (DBT) group to an in-person DBT group, Lopez et al. found that while patients had similar levels of cohesion with the facilitator, participants in the video teleconference group saw less group cohesion than their peers in the in-person group. Further, while many patients in the video teleconference group believed that the convenience offset the adverse effects, many also wished for an in-person group. Attendance was also significantly higher in the video teleconference group.[9] Thus, while the video teleconference group did report some positives, some significant differences raise ethical questions. How well does a group do without cohesion? For example, if a person needing to be consoled breaks down and cries in front of the group, the in-person response may be different from the video conference. In the in-person group, other group members may place a gentle hand on the shoulder of the grieving person or maybe even hug them. The group facilitator or group members in the video conference group could say the same words of consolation as those in the in-person group. However, there still seems to be some missing action. The idea of physical touch, in this way, can mean a lot more than just a small action. Van Wynsberghe and Gastmans argue that this kind of deprivation may lead to feelings of depersonalization.[10] And, to an extent, their supposition is supported by the data presented by Lopez et.al. The low level of group cohesion in the video conference group could suggest that other group members seem unimportant to the participants. They are simply things on a screen, not real people. Dr. Thomas Insel, former National Institute of Mental Health Director writes that while technology may hold the key to improving mental health on the population level, there is a human-sized piece of the puzzle missing from these interventions. The solution, he asserts, lies somewhere in the integration of these two types of experiences, one that he terms “high-tech and high-touch.”[11] The lack of touch and physical presence is an obstacle for both patients and providers. At best this may lead to a slightly poorer provider-patient relationship and at worst may result in poorer quality care. ll. Privacy & Confidentiality Concerns Privacy and confidentiality are among the most serious concerns for practitioners and patients, made more complex by the advent of e-health. Major news outlets provide plenty of examples of breaches of confidentiality of people’s electronic records. Even significant systems, often thought to be secure, used to facilitate direct contact between people in the wake of COVID-19, like Zoom, have been breached. Not too long ago, "Zoom Bombing” was a national phenomenon, appearing in online classrooms, often sharing explicit or politically motivated content. Psychiatric patients are susceptible to issues surrounding privacy and confidentiality, and they may even come from communities that ostracize and stigmatize mental illness. These concerns must be taken seriously. Of course, both the American Psychiatric Association and the American Psychological Association address privacy concerns. Both organizations note in their guidelines that relevant HIPAA regulations apply to telehealth and doctors must use apps and videoconferencing tools with the highest levels of security.[12] Interestingly, the American Psychiatric Association takes these instructions one step further. It requires providers to be in a private room during telehealth videoconferences or calls and that people seeking care also have a private space so that any conversations are not overheard. This not only prevents violations of privacy but reassures the therapeutic relationship between provider and patient.[13] While providers can take these steps to ensure their patients’ privacy, an internet connection may not guarantee privacy. Many privacy issues are more easily mitigated in a clinical space. For example, walls and doors can be soundproofed, or white noise can be played in the waiting room to ensure that therapeutic conversations are not overheard. And while the American Psychiatric Association asks providers to mitigate these risks as they would in their respective clinics, there is another layer to online privacy. Providers should be concerned about telecommunications providers, how they collect information, and what types of information they collect.[14] If, for example, the patient must navigate to the practitioner’s webpage to enter into the therapy portal, that information might be tracked and used to generate personalized ads for the patient. If a person suffering from severe paranoia started receiving ads for psychiatric medication, they may react negatively to the invasion of privacy. That type of targeted advertising could even exacerbate a mental health condition. The scandals surrounding the National Security Administration (NSA) in recent years have added another layer of complexity to the issue of privacy. Whistleblowers like Edward Snowden, revealed that the government was collecting metadata from text messages, videos, and social media. Government surveillance is an added risk of mental health videoconferencing.[15] The government would not be bound by the rules that require privacy with few exceptions like the Tarasoff law, which could require disclosure to stop a violent act as a clinical care provider. The government might judge someone a risk-based on ill-gotten surveillance data, wrongly add a person to a watch list, or engage in further surveillance of a patient whom non-clinicians working in government assess to be a potential danger. Protection from government surveillance is a fundamental ethical endeavor. Yet government as a collector of data without a warrant or with easily attained FISA and other warrants is problematic. Scenarios may seem far-fetched but are within the realm of possibility. Secondly, the provider must envision how this might hinder care. For example, patients aware of the possibility of government surveillance may be reluctant to show up to online meetings if they show up at all. Perhaps they are so sensitive to these issues that they stop checking with their therapist altogether. It is easy to see how a person who has schizophrenia and shows signs of paranoia may avoid telehealth for fear of being tracked. Of course, one could also have privacy concerns about a therapist’s office. Perhaps patients are nervous about being seen in the office or parking lot. They might worry about being overheard. These concerns, however, can be mitigated fairly simply, for example, patients could find anonymous means of transportation and practitioners can soundproof their offices. Thus, in both the office and the videoconference, concerns can be mitigated easily and tangibly, but not eliminated entirely. Mental health providers should use the highest quality communication services with end-to-end encryption to bolster online privacy. lll. Boundary Issues and Professionalism The boundaries here are philosophical, not physical. Both the American Psychiatric Association and the American Psychological Association work to ensure that the patient-professional boundaries are kept as close to normal as possible. Both organizations expect practitioners to maintain the highest levels of professionalism when dealing with patients using telemental health services.[16] Practitioners are responsible for enforcing boundaries through informing their patients about appropriate behavior so that patients are discouraged from calling at inappropriate times absent an emergency. Videoconferencing systems and multi-layered protections like passwords and gatekeeping would prevent patients from logging into another patient’s appointment. These boundaries exist for a good reason. A 2017 report demonstrated that there is an escalating shortage of psychiatrists.[17] Nearly 1 in 5 people in the US has a mental health condition.[18] Mental health providers are nearly overwhelmed, therefore inappropriate, frequent, and unnecessary contact adds another level of complexity to treating patients. Mental health providers need to be stewards of the resource they provide. They must concentrate on the patient they are with. They also must guard themselves against burnout, because dealing with patients too often, even though technology allows for it, will lead to them being less effective for the rest of their patients. While these professional boundaries must be policed carefully, practitioners should also be careful of having boundaries that are too high. Thus, providers must balance between too much intimacy and too little.[19] Presence and physical touch have symbolic meaning. Being with a person reaffirms their personhood, and both provider and patient can feel that. Humans are relational beings, and a physical relationship often comforts people. It may also legitimize and reinforce the patient through sensation and perception. There may be something inherently missing from the practice of telemental health, as exemplified by the group members’ inability to console others in group therapy sessions over teleconference.[20] The screen may also be an agent of depersonalization. It may make the patient’s complaints seem less real. Or perhaps the patient may feel as though they are not being heard. Although the evidence of telemedicine’s successes above may seem to contradict this, none of the studies that extoll the benefits of telemental health have follow-up periods greater than one year. And while many studies show that patients are highly satisfied with telemental health, measurements of satisfaction are not standardized. It remains unclear whether patients benefit enough from their telemental sessions or whether they require more regular sessions to stay as satisfied as they were with in-person mental health care. Perhaps as time goes on, patients become more frustrated with telemental health. The research must answer these questions, but currently, it does not sufficiently address metaphysical arguments against telemental health. CONCLUSION Privacy is a key practical issue that remains. Although providers try to combat issues of privacy by using high-level conferencing software, which has end-to-end encryption,[21] surveillance and breaches may occur. While not suitable for all kinds of patients, telemental health services prove to be effective for groups of people that otherwise may not have been able to receive care over the past two years. There are some settings, such as group therapies, that are best suited for in-person meetings. Although online sessions encourage individuals to show up regularly, their downsides are not yet known. There is incredible power in the idea of presence, and humans are inherently relational beings. For some, a lack of contact is unwelcomed and makes therapy less satisfying. Opportunities to use in-person clinical care remain a priority for some patients, and healthcare providers should further investigate prioritizing in-person care for those who want it. Telemental health could be beneficial for emergencies, natural disasters, vulnerable groups, or when patients cannot get to their provider's office. However, for now, telemental health should not take a leading role in providing mental health treatment. - [1] Chiauzzi E, Clayton A, Huh-Yoo J. Videoconferencing-Based Telemental Health: Important Questions for the COVID-19 Era from Clinical and Patient-Centered Perspectives. JMIR Ment Health, 2020. doi:10.2196/24021 [2] Joint Task Force for the Development of Telepsychology Guidelines for Psychologists. Guidelines for the practice of telepsychology. American Psychologist, 2020. 791–800. doi.org/10.1037/a0035001 [3] Gentry MT, Lapid MI, Rummans TA. Geriatric Telepsychiatry: Systematic Review and Policy Considerations. Am J Geriatr Psychiatry. 2019 doi: 10.1016/j.jagp.2018.10.009; Campbell R, O'Gorman J, Cernovsky ZZ. Reactions of Psychiatric Patients to Telepsychiatry. Ment Illn. 2015;7(2):6101, 2015. doi:10.4081/mi.2015.6101; Malhotra S, Chakrabarti S, Shah R. Telepsychiatry: Promise, potential, and challenges. Indian J Psychiatry, 2013. doi: 10.4103/0019-5545.105499; Reinhardt I, Gouzoulis-Mayfrank E, Zielasek J. Use of Telepsychiatry in Emergency and Crisis Intervention: Current Evidence. Curr Psychiatry Rep, 2019. doi: 10.1007/s11920-019-1054-8 [4] Gentry, Lapid, and Rummans, Geriatric Telepsychiatry [5] Abuwalla, Zach & Clark, Maureen & Burke, Brendan & Tannenbaum, Viktorya & Patel, Sarvanand & Mitacek, Ryan & Gladstone, Tracy & Voorhees, Benjamin. Long-term Telemental health prevention interventions for youth: A rapid review, 2017. Internet Interventions. Doi.11. 10.1016/j.invent.2017.11.006. [6]Hailey D, Roine R, Ohinmaa A. The effectiveness of telemental health applications: a review, 2008. Can J Psychiatry. doi:10.1177/070674370805301109. [7] Reinhardt, Gouzoulis-Mayfrank, and Zielasek, Use of Telepsychiatry in Emergency and Crisis Intervention [8] Kealy, David & Piper, William & Ogrodniczuk, John & Joyce, Anthony & Weideman, Rene. Individual goal achievement in group psychotherapy: The roles of psychological mindedness and group process in interpretive and supportive therapy for complicated grief, 2018. Clinical Psychology & Psychotherapy. doi:10.1002/cpp.2346. Schwartze D, Barkowski S, Strauss B, Knaevelsrud C, Rosendahl J. Efficacy of group psychotherapy for posttraumatic stress disorder: Systematic review and meta-analysis of randomized controlled trials. Psychother Res, 2019. doi: 10.1080/10503307.2017.1405168; Wetzelaer P, Farrell J, Evers SM, Jacob GA, Lee CW, Brand O, van Breukelen G, Fassbinder E, Fretwell H, Harper RP, Lavender A, Lockwood G, Malogiannis IA, Schweiger U, Startup H, Stevenson T, Zarbock G, Arntz A. Design of an international multicentre RCT on group schema therapy for borderline personality disorder. BMC Psychiatry, 2014. doi: 10.1186/s12888-014-0319-3 [9] Lopez, Amy et al. “Therapeutic groups via video teleconferencing and the impact on group cohesion.” mHealth, 2020. doi:10.21037/mhealth.2019.11.04 [10] Van Wynsberghe A, Gastmans C. Telepsychiatry and the meaning of in-person contact: a preliminary ethical appraisal. Med Health Care Philos, 2009. doi: 10.1007/s11019-009-9214-y. [11]Thomas Insel, “Tech Can Help Solve Our Mental Health Crisis. But We Can’t Forget The Human Element.,” Substack newsletter, Big Technology (blog), January 27, 2022, https://bigtechnology.substack.com/p/tech-can-help-solve-our-mental-health. [12] Armstrong, C. M., Ciulla, R. P., Edwards-Stewart, A., Hoyt, T., & Bush, N. Best practices of mobile health in clinical care: The development and evaluation of a competency-based provider training program, 2018. Professional Psychology: Research and Practice. doi.org/10.1037/pro0000194 [13] Armstrong, C. M., Ciulla, R. P., Edwards-Stewart, A., Hoyt, T., & Bush, N. Best practices of mobile health in clinical care: The development and evaluation of a competency-based provider training program [14] Sabin JE, Skimming K. A framework of ethics for telepsychiatry practice. Int Rev Psychiatry, 2015. doi:10.3109/09540261.2015.1094034 [15] Lustgarten, S. D., & Colbow, A. J. Ethical concerns for telemental health therapy amidst governmental surveillance, 2017. American Psychologist. doi.org/10.1037/a0040321 [16] Armstrong, C. M., Ciulla, R. P., Edwards-Stewart, A., Hoyt, T., & Bush, N. Best practices of mobile health in clinical care: The development and evaluation of a competency-based provider training program [17] Merritt Hawkins. An Overview of the Salaries, Bonuses, and Other Incentives Customarily Used to Recruit Physicians, Physician Assistants and Nurse Practitioners, 2018. http://physicianresourcecenter.com/wp-content/uploads/2018/09/Merritt-Hawkins-2018-Review-of-Physician-and-Advanced-Practitioner-Incentives.pdf [18] Bose, J., Hedden, S., Lipari, R., Park-Lee, E. Key Substance Use and Mental Health Indicators in the United States: Results from the 2015 National Survey on Drug Use and Health, 2015. https://www.samhsa.gov/data/sites/default/files/NSDUH-FFR1-2015/NSDUH-FFR1-2015/NSDUH-FFR1-2015.pdf [19] Sabin and Skimming. A Framework of Ethics for Telepsychiatry Practice [20] Van Wynsberghe and Gastmans, Telepsychiatry and the Meaning of In-Person Contact [21] Lustgarten and Colbow, Ethical Concerns for Telemental Health Therapy amidst Governmental Surveillance
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography