The List Serves: the Apparatuses of Security and Governmentality

Total Page:16

File Type:pdf, Size:1020Kb

The List Serves: the Apparatuses of Security and Governmentality The list serves: the apparatuses of security and governmentality Kenneth C. Werbin A Thesis in The Department of Communication Studies Presented in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Concordia University Montreal, Quebec, Canada April 2008 © Kenneth C. Werbin, 2008 Library and Bibliotheque et 1*1 Archives Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington Ottawa ON K1A0N4 Ottawa ON K1A 0N4 Canada Canada Your file Votre reference ISBN: 978-0-494-37727-7 Our file Notre reference ISBN: 978-0-494-37727-7 NOTICE: AVIS: The author has granted a non­ L'auteur a accorde une licence non exclusive exclusive license allowing Library permettant a la Bibliotheque et Archives and Archives Canada to reproduce, Canada de reproduire, publier, archiver, publish, archive, preserve, conserve, sauvegarder, conserver, transmettre au public communicate to the public by par telecommunication ou par I'lnternet, preter, telecommunication or on the Internet, distribuer et vendre des theses partout dans loan, distribute and sell theses le monde, a des fins commerciales ou autres, worldwide, for commercial or non­ sur support microforme, papier, electronique commercial purposes, in microform, et/ou autres formats. paper, electronic and/or any other formats. The author retains copyright L'auteur conserve la propriete du droit d'auteur ownership and moral rights in et des droits moraux qui protege cette these. this thesis. Neither the thesis Ni la these ni des extraits substantiels de nor substantial extracts from it celle-ci ne doivent etre imprimes ou autrement may be printed or otherwise reproduits sans son autorisation. reproduced without the author's permission. In compliance with the Canadian Conformement a la loi canadienne Privacy Act some supporting sur la protection de la vie privee, forms may have been removed quelques formulaires secondaires from this thesis. ont ete enleves de cette these. While these forms may be included Bien que ces formulaires in the document page count, aient inclus dans la pagination, their removal does not represent il n'y aura aucun contenu manquant. any loss of content from the thesis. Canada SIGNATURE PAGE [Insert university's approval sheet here] ABSTRACT The list serves: the apparatuses of security and governmentality Kenneth C. Werbin, Ph.D. Concordia University, 2008 Inspired by taxonomist Jack Goody's theorizing of 'ancient lists' as 'intellectual technologies,' this research analyzes listing practices in modern and contemporary formations of power, and how they operate in the installation and securing of the uncertain political economic milieus of circulation that characterize Michel Foucault's conception of governmentality. Propelling the list's critical operations in the delimitation and policing of 'threatening' movements from out of modern history, and into a contemporary analysis of power, this research demonstrates how the correlation of computer, statistical, and list technologies and techniques first installed under the Nazi regime, continues to factor significantly in the segmenting and constitution of a most critical classification of contemporary homo sapiens: the terrorist class, or homo sacer. Indeed, in this analysis of how lists serve formations of power, Foucault's populations and milieus of circulation installed through the apparatuses of security are reconciled with Giorgio Agamben's theorizing of 'bare life' as the fundamental political unit of modern and contemporary sovereignty. Investigating how lists served the emergence of modern computers, and continue to correlate power/knowledge in contemporary assemblages like no-fly lists; as well as in a series of increasingly pervasive and ubiquitous watch-list conjunctures, this research characterizes the technoscientific cultural construction of the contemporary terrorist as a critical function of no-blank list culture. In this way, it is argued here that the list is not simply an innocuous tool of everyday life for administering the minutiae of mundane existence, but rather, operates as a security technology of contemporary governmentality—a critical support of juridical- disciplinary mechanisms and assemblages of police—with the dual role and double integration effect of self-elaborating and securing the classes of 'factual' knowledge it itself calls into 'truthful' reality. in ACKNOWLEDGEMENTS I wish to acknowledge the following people for their contributions, help, support, and encouragement throughout my Ph.D. Studies: Dr. Kim Sawchuk, my advisor and academic hero! My committee; Dr. Leslie Regan Shade and Dr. Martin Allor of the Department of Communication Studies at Concordia University, Dr. Steven Shaw of the Department of Educational Technology at Concordia, and Bell Globemedia Research Chair, Dr. Greg Elmer of the Infoscape Research Lab at Ryerson University. I would also like to thank the Fonds Quebecois de la recherche sur la societe et la culture for their support. Additionally I would like to thank the following people whose thought provoking feedback and discussions also greatly contributed to this work: Dr. Geert Lovink, Dr. Monika Kin-Gagnon, Dr. Gaetan Tremblay, Dr. Charles Perraton, Professor Rae Staseson, Inderbir Riar, and Eric Abitbol. I would also like to thank my brother Robert, his wife Heidi, and my 3 'rock out' nephews Ryan, Evan and Brendan Werbin. Finally, I would like to thank the love of my life, Alix-Jeanne Loewenguth, my confidante and shelter from the storm. IV DEDICATION This work is dedicated to my late-mother Eleanor Moss-Werbin (1942-2000), MBA, CA, and highly regarded Professor in the Faculty of Commerce and Administration at Concordia University for 18 years. Thanks Mum! Your love, spirit, and sense of social justice are always with me. v TABLE OF CONTENTS THE LIST SERVES: THE APPARATUSES OF SECURITY AND GOVERNMENTALITY 1 Introduction: In lists we are 1 Research terrain 5 The list served: ancient times 5 The list served: the classification of the human species 10 The list serves: disciplinary and juridical-legal mechanisms 14 The list serves: the apparatuses of security 18 The list serves: risk assessment 25 The list serves: freedom of circulation 28 The list serves: governmentality 30 Questions of methodology and corpus 32 Chapter 1 - The list served: Nazi governmentality 43 Introduction 43 The list, early information technology, and Nazi governmentality 46 Statistics and the Volk: constituting Aryan natural history, or the normal in Nazi governmentality 50 Risk Assessment in the Third Reich 55 Statistics and the policing of dangerous elements 65 Juridical-legal and disciplinary mechanisms in Nazi governmentality.... 69 The biopolitical milieu of circulation: managing the Volk's cultural organs 80 The list served: 'seeing everything' through Nazi apparatuses of security 86 The list serves: governmentality or bare life? 92 Conclusion 99 vi Chapter 2 - The list serves: entropy and governmentality 101 Introduction 101 Computers, statistics, and lists serve: entropic milieus of circulation.... 109 What is entropy, and why are we sailing in a sea of it? 110 Von Neumann's 'winners' and'losers' 119 Open-human discourse: islands in a sea of entropy 125 Closed-world discourse: game theory a la von Neumann 131 Culled from the vast seas of entropy: enter the cyborg class 141 Global classification infrastructures serve: governmentality 146 The list serves: Who, Says What, In Which Channel, To Whom, With What Effect? 147 The list serves: an example of entropy and contemporary governmentality 154 Conclusion 156 Chapter 3 - Fear and no-fly listing in Canada (Mar. 2006-Nov. 2007) 160 Introduction 160 Legal, technoscientific, and popular conceptions of no-fly lists 166 Intelligent interventions into no-fly listing 182 The case of Christopher Soghoian 190 Reconstructing no-fly lists 195 Conclusion 202 Chapter 4 -No-blank list culture, or how technoscience 'truthfully' constructs the 'terrorist' 205 Introduction 205 No-blank list culture emerges 208 No-blank lists as technoscientific cultural constructions 212 vii Double integration, or Good Guys 0, Bad Guys 1 220 No-blank lists serve: the naturalization of terrorist' knowledge 228 No-blank lists serve: the reemergence of bare life 233 No-blank list culture as a critical site of struggle 244 No-blank lists serve: new formations of security, territory and population 248 Conclusion 251 Conclusion - In lists we trust? 254 The list serves: future research directions 262 REFERENCES 267 vin 1 THE LIST SERVES: THE APPARATUSES OF SECURITY AND GOVERNMENTALITY Introduction: In lists we are... In short, the point of view adopted in all these studies involved the attempt to free relations of power from the institution, in order to analyze them from the point of view of technologies; to distinguish them also from the function, so as to take them up within a strategic analysis; and to detach them from the privilege of the object, so as to resituate them within the perspective of the constitution of fields, domains, and objects of knowledge (Foucault 2007c, p.l 18). 'The list' serves. Indeed, the list serves the all-encompassing work of classifying and developing all fields, domains, and objects of knowledge as related to all living beings, things, and events. Equally, since ancient times, the list has served an instrumental role in managing security, territory, and population, albeit in a series of radically different political power/knowledge formations, and in
Recommended publications
  • Holocaust Orphans Take on Big Business Air Force Academy Sets
    A PUBLICATION OF THE NEW JERSEY STATE BAR FOUNDATION SPRING 2006 • VOL. 5, NO. 3 A NEWSLETTER ABOUT LAW AND DIVERSITY Holocaust Orphans Take on Big Business by Dale Frost Stillman It is estimated that six million Jewish Fiction Award, that IBM’s motivation during the war people and millions of non-Jewish people were was not hate, but greed. killed during the horrors of the Holocaust. A “Watson didn’t hate the Jews. He didn’t hate staggering number that begs the question: how the Poles. He didn’t hate the British, nor did he hate was Hitler able to identify those he wanted to the Americans,” Black writes. “It was always about target and eliminate? the money.” According to best-selling author Edwin Black’s award-winning book, IBM and the Holocaust, Hitler How did the punch card system work? relied heavily on IBM’s Hollerith punch card technology. The next best thing to a computer at the time, Black has stated in newspaper reports that a trip to the Black contends that IBM’s punch card technology U.S. Holocaust Museum in Washington D.C. inspired allowed Hitler to automate >continued on page 2 him to research IBM’s business activities with Nazi Germany during the war. In the museum, an IBM Hollerith D-11 sorting Air Force Academy machine was displayed with the explanation that the Nazi regime used the Sets Course for Tolerance by Barbara Sheehan machine in 1933 to conduct a national census, thereby identifying Germany’s Last year, stories of religious intolerance in the U.S.
    [Show full text]
  • Holocaust Restitution, the United States Government, and American Industry Michael J
    Brooklyn Journal of International Law Volume 28 | Issue 3 Article 2 2002 Trading With The neE my: Holocaust Restitution, the United States Government, and American Industry Michael J. Bazyler Amber L. Fitzgerald Follow this and additional works at: https://brooklynworks.brooklaw.edu/bjil Recommended Citation Michael J. Bazyler & Amber L. Fitzgerald, Trading With The Enemy: Holocaust Restitution, the United States Government, and American Industry, 28 Brook. J. Int'l L. (2003). Available at: https://brooklynworks.brooklaw.edu/bjil/vol28/iss3/2 This Article is brought to you for free and open access by the Law Journals at BrooklynWorks. It has been accepted for inclusion in Brooklyn Journal of International Law by an authorized editor of BrooklynWorks. File: BAZYLER Base Macro Final_2.doc Created on: 6/24/2003 12:17 PM Last Printed: 1/13/2004 2:22 PM TRADING WITH THE ENEMY: HOLOCAUST RESTITUTION, THE UNITED STATES GOVERNMENT, AND AMERICAN INDUSTRY Michael J. Bazyler∗ & Amber L. Fitzgerald∗∗ I. INTRODUCTION……………………………………………………685 II. THE ROLE OF THE UNITED STATES IN RESTITUTION EFFORTS ABROAD…………………………………………………………...686 A. Switzerland………...……………………………………….689 B. Germany..…………………………………………………...690 C. France......…………………………………………………...697 D. Austria………………..……………………………………..699 E. Israel……………………………...………………………….700 F. Insurance Claims…………………………………………..702 G. Art……………………………………………………………709 H. Role of Historical Commissions..………………………..712 1. Switzerland…………………………………………….712 a. Volcker Report……………………………………713 b. Bergier Final Report…………………………….715 2. Germany………………………………………………..719 3. Austria………………………………………………….720 4. France…………………………………………………..721 5. Other Countries……………………………………….723 ∗ Professor of Law, Whittier Law School, Costa Mesa, California; Fellow, Center for Advanced Holocaust Studies, U.S. Holocaust Memorial Museum (“USHMM”), Washington, D.C.; Research Fellow, Holocaust Educational Trust, London, England; J.D., University of Southern California, 1978; A.B., University of California, Los Angeles, 1974.
    [Show full text]
  • Paper for B(&N
    International Journal of Humanities and Social Science Vol. 8 • No. 11 • November 2018 doi:10.30845/ijhss.v8n11p1 The Planning and Architecture of Deportation, Imprisonment and Death - Reflections on the Ethical Implications of the Holocaust for Built and Natural Environment Disciplines Richard Kötter Senior Lecturer in Economic /Political Geography Department of Geography and Environmental Sciences School of the Built and Natural Environment Faculty of Engineering and Environment Northumbria University Lewis Preston Formerly Senior Lecturer in Architecture School of the Built and Natural Environment Northumbria University Newcastle upon Tyne, NE1 8ST. Abstract This paper is based on an exchange and dialogue between two academics on how the legacy of the Nazi period is relevant for built environment, planning and human geography disciplines.We argue that we should be reflecting on the conduct and utility of spatial and urban planning and design in the Nazi period from the perspective of professional ethics, not just as a historical reflection and remembrance but also to inform current and future generations of professionals. Keywords: National Socialist (NS / Nazi) spatial planning and urban design; professional conduct and ethics, Holocaust / Shoah / Porajnos 1, „tabula rasa“; Oswiecim / Auschwitz; German occupation of Poland from 1939. 2 1.0 Architecture and Planning‚ Post-Auschwitz‘? Taking their cue from Adorno„s text on „education after Auschwitz“ in the 1960s 3, a whole series of professions have asked this question for their respective field: what do the events of Auschwitz (as the central symbolic reference space) and the genocide in Europe more broadly perpetrated by Nazi Germany and her collaborateurs mean for the actors of the following generations ? 4 We shall restrict ourself to a consideration (informed by historiographies) of the disciplines of architecture and urban construction (Rose, 1993, Gutschow, 2001; Willems, 2000), spatial planning and urban design (Rössler, 1989 and 2001, in Szöllösi-Janze, M.
    [Show full text]
  • The Triumph and Tragedy of IBM's Business with the Third Reich
    Dealing with The Devil: The Triumph and Tragedy of IBM’s Business with the Third Reich Harry Murphy Junior Division Paper Length: 2500 Innovation and invention drive the world forward and thrive off a free market that rewards individuals and companies that can tap into supply and demand. During tragedy, especially wartime, this can take a dark turn when the triumph of invention and profit is gained from human tragedy. International Business Machines Corporation (IBM) saw warfare as an opportunity to capitalize off of both sides. As the Nazis rose to power, they needed the machinery to identify, organize, and number the Jewish population. IBM sought this as a favorable position for corporate gain and began leasing tabulating machinery to the Nazi regime. IBM’s endorsement of the Third Reich yielded capital gain at the cost of millions of lives. This advanced technology, which enabled IBM’s profit from the Holocaust, set the scene for the company’s dominance throughout the 20th-century while ultimately enabling a calculated genocide. Background In January 1933, Adolf Hitler was elected chancellor of Germany.1 Hitler implemented many racial laws that prohibited Jews from public living. Jewish businesses were plundered, and many were driven from their jobs and homes.2 Jewish companies were consumed by the German government and ran by German officials. As Hitler’s regime progressed, he looked to institutionalize a core virtue of Nazism into German society: the identification, ostracization, and extermination of the Jewish community. In his attempt to expunge Jews from Germany, in 1935, 1 Enderis, Guido. “Group Formed by Papen.” The New York Times, January 31, 1933.
    [Show full text]
  • House for the History of IBM Data Processing
    House for the History of IBM Data Processing Hollerith Electric Tabulating System / 1890 (Replica made by Club Members in 1997) Herman Hollerith (1860-1929) House for the History of IBM Data Processing Purpose • Demonstrating the history of IBM‘s data processing efforts, ranging from Hollerith (1890) through the Deutsche Hollerith Maschinen Gesellschaft (DEHOMAG, 1910 -1949) up to 1995. • Presenting information about the achievements IBM accomplished as Data Processing Pioneer and 71063 Sindelfingen (Germany) Establisher of a German Technology Center Bahnhofstr. 43 (at corner Neckarstr.) (Production and Research) E-Mail: [email protected] Activities of the Club Members Tel.: 049-(0)7031 - 41 51 08 • Conducting guided tours • Maintaining the installed machines • Completing the Collection of Historical IBM Equipment Parking behind the building (approach from Neckarstr.) The exhibited Systems, Machines and Devices are restored and workable. DEHOMAG Tabulator D 11/ 1935 IBM 1401 Data Processing System / 1959 with Summary Punch (from 1950s) with Magnetic Tapes, IBM 1403 Printer, IBM 1311 Disks Data processing started with the Punched Card System invented Electronic data processing started in the USA in the early 1950s, and developed by Herman Hollerith to a working product during with Germany following not much later. At first, the large enter- the years 1882 to 1890. The first successful application of the prises took advantage of the new possibilities offered by electronic Hollerith Electric Tabulating System occurred during the US data processing. Census of 1890. (processing 62.5 Million cards) Towards the end of the 1950s the transistor technology The first large-scale commercial application was began in 1895 provided an increase in processing speed.
    [Show full text]
  • Punching Holes in the International Busa Machine Narrative
    IDEAH • Vol. 1, Iss. 1 (DHSI 2017 & 2018) Punching Holes in the International Busa Machine Narrative Arun Jacob Published on: May 31, 2020 DOI: 10.21428/f1f23564.d7d097c2 License: Creative Commons Attribution 4.0 International License (CC-BY 4.0) IDEAH • Vol. 1, Iss. 1 (DHSI 2017 & 2018) Punching Holes in the International Busa Machine Narrative The fabled origin story of humanities computing takes place in 1946 when Jesuit Priest Father Roberto Busa and Thomas J. Watson Sr. the CEO of International Business Machines (IBM) meet, exchange pleasantries, and lay the groundwork for producing an index of the complete writings of Saint Thomas Aquinas (Winter 4). Busa and Watson’s meeting marks the genesis of the field since the theologian was able to acquire the material, technical, and financial support from the technocrat to engage in his scholarly endeavour, developing a linguistic corpus using computing technologies. This illustrious digitization project of sorting and indexing 11 million words of medieval Latin in the works of St. Thomas Aquinas produced a touchstone for humanities computing, the Index Thomisticus (Hockey 4). Busa, along with IBM technicians, developed machine-readable concordances and in the process, built a bibliography that was searchable through a telephonic coupler. Busa’s pioneering work, “Exploring the Concept of Presence According to Thomas Aquinas” (83), was accomplished by repurposing business machines developed primarily for record-keeping to generate automated concordances that have been widely celebrated as the genesis of the field of humanities computing, later christened digital humanities. In this paper, I will be studying how the cultural memory of Fr.
    [Show full text]
  • IBM and Germany 1922–1941
    Organization Management Journal (2008) 5, 208–213 & 2008 Eastern Academy of Management All rights reserved 1541-6518 IBM and Germany 1922–1941 1 Donald W McCormick and Abstract James C Spee2 In 1941, one of IBM’s most profitable customers was the German government. Germany leased IBM’s punch card tabulation machines (ancestors of the 1Department of Management, College of computer), and used them in its war against France, the United Kingdom Business and Economics, California State and others. They were also used to conduct the census, to keep track of Jews University Northridge, Northridge, CA, USA; and other ‘‘undesirables’’, and to operate the concentration camps. In 1937, 2School of Business, University of Redlands, Hitler awarded Watson a medal. By 1940, however, US public opinion had Redlands, CA, USA turned against Germany and he returned the medal. Outraged, German IBM executives and high-ranking Nazis threatened IBM’s control over its subsidiary. Correspondence: Although its activities were legal under US law, IBM was concerned about Donald W McCormick, Department of maintaining control of its German division, shielding itself from criticism in the Management, College of Business and US, and remaining eligible for more German government contracts. Watson Economics, California State University Northridge, 18111 Nordhoff St., needed to decide whether to maintain IBM’s lucrative relationship with Northridge CA 91330. Germany, make a clean break (and lose all its assets), or perhaps do something E-mail: [email protected] entirely different. Organization Management Journal (2008) 5, 208–213. doi:10.1057/omj.2008.25 Keywords: IBM; Germany; business ethics; Nazi; Dehomag 1922–1935 In 1922, IBM, then known as ‘‘The Computer-Tabulating Recording Company’’, acquired Deutsche Hollerith Maschinen Gesellschaft, herein referred to as Dehomag, a German punch-card company (Avl, November 1972).
    [Show full text]
  • IBM Rebuilds Europe: the Curious Case of the Transnational Typewriter Petri Paju, University of Turku, [email protected] Thomas
    IBM Rebuilds Europe: The Curious Case of the Transnational Typewriter Petri Paju, University of Turku, [email protected] Thomas Haigh, University of Wisconsin—Milwaukee. [email protected] This is a PREPRINT DRAFT. To cite, quote, or distribute please use the final version published in Enterprise and Society in the final issue of 2015 or the first issue of 2016. Length: Approx. 12,500 words (including endnotes but excluding bibliography and abstract). Abstract: In the decade after the Second World War IBM rebuilt its European operations as integrated, wholly owned subsidiaries of its World Trade Corporation, chartered in 1949. Long before the European common market eliminated trade barriers, IBM created its own internal networks of trade, allocating the production of different components and products between its new subsidiaries. Their exchange relationships were managed centrally to ensure that no European subsidiary was a consistent net importer. At the heart of this system were eight national electric typewriter plants, each assembling parts produced by other European countries. IBM promoted these transnational typewriters as symbols of a new and peaceful Europe and its leader, Thomas J. Watson, Sr., was an enthusiastic supporter of early European moves toward economic integration. We argue that IBM’s humble typewriter and its innovative system of distributed manufacturing laid the groundwork for its later domination of the European computer business and provided a model for the development of transnational European institutions. IBM Rebuilds Europe. Preprint draft version 2 An icon of the American century IBM ranked among the world’s largest and most successful companies for decade after decade.
    [Show full text]
  • The Nazi Party: IBM & "Death's Calculator"
    jewishvirtuallibrary.org http://www.jewishvirtuallibrary.org/jsource/Holocaust/gypibm.html The Nazi Party: IBM & "Death's Calculator" by Edwin Black Nazi Party: Table of Contents | Background & Overview | Einsatzgruppen Mankind barely noticed when the concept of massively organized information quietly emerged to become a means of social control, a weapon of war, and a roadmap for group destruction. The unique igniting event was the most fateful day of the last century, January 30, 1933, the day Adolf Hitler came to power. Hitler and his hatred of the Jews was the ironic driving force behind this intellectual turning point. But his quest was greatly enhanced and energized by the ingenuity and craving for profit of a single American company and its legendary, autocratic chairman. That company was International Business Machines, and its chairman was Thomas J. Watson. Der Führer's obsession with Jewish destruction was hardly original. There had been czars and tyrants before him. But for the first time in history, an anti-Semite had automation on his side. Hitler didn't do it alone. He had help. In the upside-down world of the Holocaust, dignified professionals were Hitler's advance troops. Police officials disregarded their duty in favor of protecting villains and persecuting victims. Lawyers perverted concepts of justice to create anti-Jewish laws. Doctors defiled the art of medicine to perpetrate ghastly experiments and even choose who was healthy enough to be worked to death-and who could be cost-effectively sent to the gas chamber. Scientists and engineers debased their higher calling to devise the instruments and rationales of destruction.
    [Show full text]
  • Bureaucracy and the Holocaust
    Power, Discourse and Practices: Bureaucracy and the Holocaust Stewart Clegg Centre for Management and Organization Studies University of Technology Sydney PO Box 123 Broadway NSW 2007 Australia [email protected] 1 Abstract The generational properties of organization theory are an increasing topic for analysis, usually in terms of what is addressed and how it is addressed. Some writers have alerted us to the importance of those social issues that are not addressed. Combining the idea of generational scholarship with the idea of those non-issues that remain unaddressed, this paper highlights how some of the events of the Second World War, which authorities agree was a generational defining and demarcating experience, have been neglected in organization theory. Nowhere is this more clearly demonstrated than in the Holocaust. Strangely, this practical experiment in organizational design and practice seems to have elided almost all interest by organization theorists, whether functionalist or critical. The paper addresses this elision and draws on the work of Goffman, Foucault, Higgins and Bauman to address the very material conditions of organizational power and raise some ethical issues about the commitments of organization scholars. Keywords: power, discourses, practices, total institutions, Holocaust, Goffman, Foucault, Higgins, Bauman 2 Power, Discourse and Practices: Bureaucracy and the Holocaust For organization theorists to focus on their self-centered academic interests while ignoring their environment is wrong. It is wrong because it deprives organization theory of an extrinsic reason to exist, wrong because the issues arising in the environment are both challenging and interesting, and wrong because organization theorists might actually have something to contribute to world affairs.
    [Show full text]
  • A Tool for Freedom Or Suppression?
    THE INTERNET IN CHINA: A TOOL FOR FREEDOM OR SUPPRESSION? JOINT HEARING BEFORE THE SUBCOMMITTEE ON AFRICA, GLOBAL HUMAN RIGHTS AND INTERNATIONAL OPERATIONS AND THE SUBCOMMITTEE ON ASIA AND THE PACIFIC OF THE COMMITTEE ON INTERNATIONAL RELATIONS HOUSE OF REPRESENTATIVES ONE HUNDRED NINTH CONGRESS SECOND SESSION FEBRUARY 15, 2006 Serial No. 109–157 Printed for the use of the Committee on International Relations ( Available via the World Wide Web: http://www.house.gov/international—relations U.S. GOVERNMENT PRINTING OFFICE 26–075PDF WASHINGTON : 2006 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 VerDate Mar 21 2002 15:43 Jun 20, 2006 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 F:\WORK\AGI\021506\26075.000 HINTREL1 PsN: SHIRL COMMITTEE ON INTERNATIONAL RELATIONS HENRY J. HYDE, Illinois, Chairman JAMES A. LEACH, Iowa TOM LANTOS, California CHRISTOPHER H. SMITH, New Jersey, HOWARD L. BERMAN, California Vice Chairman GARY L. ACKERMAN, New York DAN BURTON, Indiana ENI F.H. FALEOMAVAEGA, American ELTON GALLEGLY, California Samoa ILEANA ROS-LEHTINEN, Florida DONALD M. PAYNE, New Jersey DANA ROHRABACHER, California SHERROD BROWN, Ohio EDWARD R. ROYCE, California BRAD SHERMAN, California PETER T. KING, New York ROBERT WEXLER, Florida STEVE CHABOT, Ohio ELIOT L. ENGEL, New York THOMAS G. TANCREDO, Colorado WILLIAM D. DELAHUNT, Massachusetts RON PAUL, Texas GREGORY W. MEEKS, New York DARRELL ISSA, California BARBARA LEE, California JEFF FLAKE, Arizona JOSEPH CROWLEY, New York JO ANN DAVIS, Virginia EARL BLUMENAUER, Oregon MARK GREEN, Wisconsin SHELLEY BERKLEY, Nevada JERRY WELLER, Illinois GRACE F.
    [Show full text]
  • Surveillance Under Dispute: Conceptualising Narrative Legitimation Politics
    European Journal of International Security (2021), 6, 210–232 doi:10.1017/eis.2020.23 RESEARCH ARTICLE https://doi.org/10.1017/eis.2020.23 . Surveillance under dispute: Conceptualising narrative legitimation politics Christopher Smith Ochoa1* , Frank Gadinger2 and Taylan Yildiz3 1NRW School of Governance, Institute of Political Science, University of Duisburg-Essen, Germany, 2Käte Hamburger Kolleg / Centre for Global Cooperation Research University of Duisburg-Essen and 3NRW School of Governance, Institute of Political Science, University of Duisburg-Essen *Corresponding author. Email: [email protected] (Received 22 November 2019; revised 17 November 2020; accepted 20 November 2020; https://www.cambridge.org/core/terms first published online 22 December 2020) Abstract Current debates about surveillance demonstrate the complexity of political controversies whose uncer- tainty and moral ambiguities render normative consensus difficult to achieve. The question of how to study political controversies remains a challenge for IR scholars. Critical security studies scholars have begun to examine political controversies around surveillance by exploring changing security practices in the everyday. Yet, (de)legitimation practices have hitherto not been the focus of analysis. Following recent practice-oriented research, we develop a conceptual framework based on the notion of ‘narrative legitimation politics’. We first introduce the concept of ‘tests’ from Boltanski’s pragmatic sociology to cat- egorise the discursive context and different moral reference points (truth, reality, existence). Second, we combine pragmatic sociology with narrative analysis to enable the study of dominant justificatory prac- tices. Third, we develop the framework through a practice-oriented exploration of the Snowden contro- versy with a focus on the US and Germany.
    [Show full text]