post structuralism security as discourse
play

Post-Structuralism: Security as Discourse Week 12 - 13 December - PowerPoint PPT Presentation

PSI 330 International Security Post-Structuralism: Security as Discourse Week 12 - 13 December 2017 Core Tenets Poststructuralism encourages a way of looking at the world that challenges what comes to be accepted as truth and


  1. PSI 330 International Security Post-Structuralism: Security as Discourse Week 12 - 13 December 2017

  2. Core Tenets • Poststructuralism encourages a way of looking at the world that challenges what comes to be accepted as ‘truth’ and ‘knowledge’. • Poststructuralist argue that ‘knowledge’ comes to be accepted as such due to the power and prominence of certain actors in society known as ‘elites’, who then impose it upon others. • Discourses facilitate the process by which certain information comes to be accepted as unquestionable truth • Language is one of the most crucial elements for the creation and perpetuation of a dominant discourse. • The concepts of elites, discourses and the power of language and binary oppositions all tie together to create what he labels a ‘regime of truth’. • The importance of poststructuralism is to highlight existing regimes of truth and point our silenced alternatives.

  3. Core Tenets • The poststructuralist challenge is directed at the theoretical and philosophical foundations of IR as well as the traditional perspectives’ ability to account for a transformation from a modern to a postmodern or post-sovereign world. • But security is not ‘just’ a discursive practice, it is also at the same time a political practice.

  4. Methodology • Poststructuralism advocated the ‘anti-methods’ of deconstruction, genealogy, and intertextuality. • Derrida and Deconstruction: https://www.youtube.com/watch? v=3Zw04hraCVo&index=32&list=PLghL9V9QTN0gCZia2u- YnLxhetxnC_ONF • Philosophy of Derrida: https://www.youtube.com/watch? v=H0tnHr2dqTs&list=PLwxNMb28XmpeypJMHfNbJ4RAFkRtmAN3P&index= 30 • Deconstruction shows how dichotomies are crucial to the construction of meaning by first identifying the hierarchical relationship between the two concepts of the dichotomy, secondly, reversing the hierarchy, and thirdly, by this procedure, undo the pairing.

  5. Methodology • A genealogy is a history of the present, which follows three methodological principles: • it does not look for a continuous history, but for discontinuity and forgotten meanings; • it does not look for an origin, indeed it is assumed that one cannot be found; • it does not, finally, focus on the ‘object of genealogy’ itself but on the conditions, discourses and interpretations surrounding it.

  6. Binary Oppositions • Through language, certain actors, concepts and events are placed in hierarchical pairs, named binary oppositions, whereby one element of the set is favoured over the other in order to create or perpetuate meaning. • One of the most common binary oppositions is to establish different groups or countries in terms of ‘them’ versus ‘us’. • The national and the international realm. • Security and Insecurity • the ‘West’ and the ‘East’

  7. Security • National identity’ tells ‘who we are and how we came here’, but the content of that story is not fixed once and for all and the re-creation of identity has to be ‘be secured by the effective and continual ideological demarcation of those who are “false” to the defining ideals’. • Turning the traditional that the identity of the state depends on threats, • The identity of the state depends on threats, that it needs a sense of insecurity. • The shift in the Contemporary Wars • Whereas sovereign nations once marched to mutually recognized wars on discrete battlefields, contemporary conflicts … not only stretch across a global battle space, but now exceed the normal confines of time, place and meaning (Der Derian 2013)

  8. Virtual Security and Popular Culture • “In spite and perhaps because of efforts to spread a democratic peace through globalization and humanitarian intervention, was is ascending to an even “higher” plane, from virtual to virtuous” (Der Derian, J. (2009) Virtuous War: Mapping the Military-Industrial-Media-Entertainment Network, 2nd ed. New York & London: Routledge, p. xxxi) • “At the heart of the virtuous war is the technical capability and ethical imperative to threaten and, if necessary, actualize violence from a distance - with no or minimal casualities” (Der Derian, p. xxxi)

  9. Virtual Security and Popular Culture • Rogue elements are represented as threats to: • international peace and security by association to terrorism • their own people through repression of people’s democratic demands • Military intervention for regime change (democracy) which would restore people’s will and spread peace. • Main Premises: • During a military campaign, people and the rogue elements can be distinguished, only rogue elements would be hurt. • Military campaign would entail no or minimum casualties (both on part of civilians and intervening party military) • Both premises heavily depend on the precision of weapons and target selection.

  10. Virtual Security and Popular Culture • Examples: • “Military power was used to end a regime by breaking a nation. Today , we have greater power to free a nation by breaking a dangerous and aggressive regime. With new tactics and precision weapons, we can achieve military objectives without directing violence against civilians. No device of man can remove the tragedy of war. Yet it is a great advance when the guilty have far more fear from war than the innocent” George W. Bush (02.05.2003) • “The fact, however, is that there was not an attack on Baghdad. There was an attack on the Iraqi regime, and it was as precise as ever before in the history of warfare. The care that went into the targeting is just breathtaking. And the battle damage assessments and the people from the ground that we talked to are telling us that, to a great extent in Baghdad, people are going about their business, because they are so impressed with the precision of those targeting and those bombs and those attacks, that they feel that the coalition forces are doing it in the best possible way.” Donald Rumsfeld (23.04.2003) • It looks like it's a bombing of a city, but it isn't. It is a bombing of military targets, very precisely, and regime targets, and the television image is belied by what's seen on the ground.

  11. Virtual Security and Popular Culture • Cooperation between military and cultural industries in representation of war and military technology • Clean War • Technofetishism • War as Spectacle / War as Art

  12. Virtual Security and Popular Culture • Clean War: • The disappearance of the dead American soldier, who topped the list of public concern (Stahl, R. (2010) Militainment, Inc.: War, Media and Popular Culture, New York & London: Routledge, p. 26) • “Fought in the same manner as they are represented, by real-time survelliance and TV “live-feed” virtuous war promote a vision of bloodless, humanitarian, hygienic war” (Der Derian, p. xxxi) • Elimination of body from the language of warfare through the mobilization of euphemism (Stahl, p. 26) • “The disappearance of death represents the primary method of neutralizing the citizen’s moral culpability in the decision to unleash state violence” (Stahl, p. 27)

  13. Virtual Security and Popular Culture • Technofetishism: • “ The fetishism of technology goes beyond ascribing weapons an inherent virtue or beauty to positioning military hardware at the center of the television drama” (Stahl, p. 28) • “Technofetishism organizes the world according to the divine right of high-tech “civilization” to conquer and defeat low-tech “barbarism”... In this manifestation the specific difference is cast not in terms of culture but rather hardware. Weapons not only take center stage but also become the primary symbolic currency through which war negotiates legitimacy, righteousness, and a host of other related values” (Stahl, p. 28) • “The bomb-mounted camera footage, H Bruce Franklin argues, captured the “virtual reality” ethos of the techno-war: perfect visual identification with the weapon, perfect precision, and a perfectly clean and invisible result” (Stahl, p. 44)

  14. Virtual Security and Popular Culture • War as Spectacle / War as Art: • “War was becoming the deadliest exhibition of l’art pour l’art, in which self- alienated humans become ‘their own showpiece, enjoying their own self- destruction as an aesthetic pleasure of highest order’” (Der Derian, p. 40) • “Political, economic and cultural forces reconditioned the civic experience of war into one governed by the logic of spectacle” (Stahl, p. 22) • Citizens have been purged of political connection to military. (Stahl, p. 22) • A civic experience of war throughly choreographed for private consumption. (Stahl, p. 22) • Networked, proliferated and accelerated by multi-platform transmedia, the images of war are instantaneously Googled, Wikied and Twittered into branded identities and virtual realities (Der Derian 2013)

  15. Virtual Security and Popular Culture • NATO bombs Libya 'warships', RAF cockpit combat camera (https:// www.youtube.com/watch?v=jRZT624kQjs) • Apache pilot (https://www.youtube.com/watch?v=8z1Mh_qkhTQ) • Apache Gunship (https://www.youtube.com/watch?v=ILehSwlN_DU) • AHaber (https://www.youtube.com/watch?v=T312uXNha7U) • WikiLeaks raw US Apache footage (https://www.youtube.com/watch? v=25EWUUBjPMo)

  16. Discusion • How could we defend against the “regimes of truth” and militarism in the popular culture?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend