Professional Documents
Culture Documents
1NC Shell
China threat discourse constitutes a political myth- it has
permeated policy making, media, and daily conversations the
plan is perceived as authoritative knowledge but it is nothing
more than an extension of the yellow peril narrative that
perpetuates orientalism
Song, 15 (Securitization of the China Threat Discourse: A Poststructuralist Account, The China Review, Vol. 15, No.
1 (Spring 2015), 145169, Weiqing SONG, associate professor of political science at the University of Macau, received his Ph.D. in
political science from the University of Siena, Italy. His research interests include European politics, Chinese foreign policy, and
Chinas post-socialist regime. His research has appeared in a number of international peer-reviewed journals.)
travelling from the Atlantic to the Indian Ocean to meet the pioneers of this extraordinary migration. Ill be finding out from Africans what
they think about the influx of Chinese. And Ill be hearing some tall tales. Youre telling me the Chinese are selling inflatable chickens? Ill
be investigating allegations of human right abuses in one of the worlds most dangerous countries. And asking just how the rise of China
is changing Africa. What will it mean for the rest of the world. Ill visit the worlds biggest mine, shipping millions of tons of iron ore to
China, and see how Chinas incredible hunger for resources threatens the worlds largest rainforest. And Ill be travelling across the Americas
to see how Chinas expansion is devastating Americas industrial heartlands. So how is the relentless rise of China upsetting the balance of
67
world power? And what it will mean for us all? A consummate storyteller, the BBC news reporter and
of language is being used to enact (i.e., to persuade an audience to recognize an identity or identities as opera- tive). What identity or
identities does a particular use of language attribute to others, and how does this help the speaker or writer to enact his or her own
68
identity? It matters little whether the content communicated is factual. The real purpose is to convince an audience of its urgency and
consequently persuade them to take action. The mode of securitization here is based on political myth. One cannot falsify political myths
69
because they are not a matter of scientific hypothesis but rather the expression of a determination to act. This mode uses
rhetoric, visual spectacle and other kinds of art, rituals, and social practices, among
other forms of communication. It relies to a large extent on ascriptive factors such
as ethnicity, race, culture, and civilization. In contrast to the scientific and
analogical modes, the mythical mode of securitization pursues a logic that is
psychologically intuitive rather than logically deductive or inductive. In extreme
cases, it can be bluntly discriminatory. In the mode of political myth, the China
threat issue is structurally incorporated by a group of securitizers into the basic
discourses of culture and civilization. The issue does not appear to be a question of security because it is assigned to
a broader context wherein a country as different as China is expanding its reach throughout the world. However, the real purpose
discourses, such as interviews, nonverbal communication, written text, and signs. The documentary provides a clear visual illustration
of the allegation that a growing China is encroaching on the globe. In attemp- ting to arouse an emotional response from the general public,
the docu- mentary includes stories told by ordinary people, accompanied by vivid pictures and signs. The securitizers hope that raising
consciousness of and inspiring an emotional response to the so-called China threat will elicit action to prevent it. The success of a political
76
myth lies not only in its production, but rather, and foremost, [in] its reception. Indeed, the work of myth can be characterized as
77
a system of productionreceptionreproduc- tion.
In other words, this process of securitization coagulates and reproduces
78
79
significance; it should then be able to address the specifically political conditions in which the intended subjects live, and the
meanings they share as a community. This process is fully implemented in The Chinese Are Coming. In terms of substantial modality,
agents working in the political- myth mode aim to securitize the sheer comprehensiveness of the threat posed by China, which is represented
as covering a wide range of social spheres. In addition to its military, strategic, and political threats, China is imagined to endanger
economic, environmental, social, and cultural development worldwide. Rowlatt concludes at the end of the BBC docu- mentary that Chinas
expansion into the world is transforming not just the global economy but also the balance of world power. The price that is being
paid is made clear, including the environmental damage this rush for resources is wreaking and the undermining of local busi- nesses
almost everywhere. He concludes that the 21st century will certainly be Chinas century, and that the rise of China will profoundly affect
people all over the world. In economic terms, the world economy as a supranational referent object is perceived to be existentially
threatened by China, whose own economy undermines the rules, norms and institutions that constitute a liberal market, based on free
competition and rule compliance.80
referent objects, from concrete outcomes like the survival of individual species or types of habitat to broader issues such as the
81
maintenance of the global climate system and biosphere. In the BBC documentary, these referent objects are well documented: the killing
of elephants for ivory products in the national park of Zambia, the incredible hunger for resources that threatens the Amazon, the
worlds largest rainforest, and so on. Faced with a panoramic view of an enormous mine carved out of the previously tree-covered rainforest,
audiences are inevitably struck by the devastation caused by Chinese companies. It does not matter whether this devastation is truly attribut-
In the mode of
political myth, the China threat is also represented as affecting the social sector,
where the referent objects under threat are large-scale collective identities.82
These identities may extend beyond the state to nations, religions, cultures, and
civilizations. In The Chinese Are Coming, the identity of China is clearly differentiated from that of the West: it has unfamiliar food,
able to China. The manner of the presentation is much more important than the veracity of the content.
different ways of doing business, human rights abuses, no respect for local culture, and so on. This is most vividly reflected in the report of a
protest made by a number of U.S. citizens outside a Confucius Institute sponsored by the Chinese government, which teaches Chinese
language and culture to the children of U.S. citizens. The narrator reports that people believe Beijing to be using these classes to smuggle proChina propaganda into U.S. classrooms; they are opposed to the Chinese governments trying to brainwash U.S. youth by insidious methods
Pan 2004, Thesis submitted for the degree of Doctor of Philosophy of the
Australian National University, Discourses of China in International Relations: A
Study in Western Theory as (IR) Practice, August 2004
At first sight, and given its emphasis on order and cooperation rather than
confrontation, this policy might well have a positive impact on Sino-Western
relations and hold a better chance of bringing about the long cherished goal of
convergence.118 But, as I will argue in the pages that follow, it is almost as likely to
promote instability and conflict in Sino-Western relations as is the more
confrontational human rights/democracy policy. The problem, again, is that at the
core of this policy is an asymmetrical or hierarchical relationship of power enacted
by the self/Other discourse of China as opportunity. The crucial conduit of this
engagement policy has been free trade facilitated through a variety of multilateral
economic institutions and international regimes. These institutions and regimes, as
Robert Gilpin notes, are undergirded often by rules that represent the desires of
Western Europe and the United States to reassert the positions they have lost over
China is nothing more or less than to undertake a geopolitical analysis of it, often by
asking only a few questions such as how China will "behave" in a strategic sense
and how it may affect the regional or global balance of power, with a particular
emphasis on China's military power or capabilities. As Thomas J. Christensen notes,
"Although many have focused on intentions as well as capabilities, the most
prevalent component of the [China threat] debate is the assessment of China's
overall future military power compared with that of the United States and other East
Asian regional powers." (49) Consequently, almost by default, China emerges as an
absolute other and a threat thanks to this (neo)realist prism. The (neo)realist
emphasis on survival and security in international relations dovetails perfectly with
the U.S. self-imagination, because for the United States to define itself as the
indispensable nation in a world of anarchy is often to demand absolute security. As
James Chace and Caleb Carr note, "for over two centuries the aspiration toward an
eventual condition of absolute security has been viewed as central to an effective
American foreign policy." (50) And this self-identification in turn leads to the
definition of not only "tangible" foreign powers but global contingency and
uncertainty per se as threats. For example, former U.S. President George H. W. Bush
repeatedly said that "the enemy [of America] is unpredictability. The enemy is
instability." (51) Similarly, arguing for the continuation of U.S. Cold War alliances, a
high-ranking Pentagon official asked, "if we pull out, who knows what nervousness
will result?" (52) Thus understood, by its very uncertain character, China would now
automatically constitute a threat to the United States. For example, Bernstein and
Munro believe that "China's political unpredictability, the always-present possibility
that it will fall into a state of domestic disunion and factional fighting," constitutes a
source of danger. (53) In like manner, Richard Betts and Thomas Christensen write:
If the PLA [People's Liberation Army] remains second-rate, should the world breathe
a sigh of relief? Not entirely.... Drawing China into the web of global
interdependence may do more to encourage peace than war, but it cannot
guarantee that the pursuit of heartfelt political interests will be blocked by a fear of
economic consequences.... U.S. efforts to create a stable balance across the Taiwan
Strait might deter the use of force under certain circumstances, but certainly not all.
The upshot, therefore, is that since China displays no absolute certainty for peace, it
must be, by definition, an uncertainty, and hence, a threat. In the same way, a
multitude of other unpredictable factors (such as ethnic rivalry, local insurgencies,
overpopulation, drug trafficking, environmental degradation, rogue states, the
spread of weapons of mass destruction, and international terrorism) have also been
labeled as "threats" to U.S. security. Yet, it seems that in the post-Cold War
environment, China represents a kind of uncertainty par excellence. "Whatever the
prospects for a more peaceful, more democratic, and more just world order, nothing
seems more uncertain today than the future of post-Deng China," (55) argues
Samuel Kim. And such an archetypical uncertainty is crucial to the enterprise of U.S.
self-construction, because it seems that only an uncertainty with potentially global
consequences such as China could justify U.S. indispensability or its continued world
dominance. In this sense, Bruce Cumings aptly suggested in 1996 that China (as a
threat) was basically "a metaphor for an enormously expensive Pentagon that has
lost its bearings and that requires a formidable 'renegade state' to define its mission
(Islam is rather vague, and Iran lacks necessary weights)." (56)
The alt is to vote neg and reject the 1ACs framing of Chinese
threats. Rejecting the 1ACs reality of China is critical to
open an alternate interpretation of geopolitics- its empirically
proven we can change how we know China
Pan 2004 Chengxin Pan, Lecturer in International Relations at Deakin University,
PhD in Political Science and International Relations from the Australian National
University, 2004 (Discourses of China in International Relations, Doctoral Thesis
for the Australian National Unviersity)
But as I have indicated throughout this study, it is largely this kind of achievement that has acted as a profound
impediment to the understanding of their object of study in terms of a social construct in which they have played a
mainstream China scholars continue to be trapped in a cycle of selffulfilling, dangerous, and paradoxical theory and practice, with their scientific
realism allowing no way out of its own logic. While having recognised the selffulfilling consequences of the China threat thesis, neoconservative commentator
Robert Kagan, for example, continues to fall back on an objectivist approach to
China in terms of what it is. Consumed by the question of what if the prophecy has already been
vital part. As such,
fulfilled? Kagan advises Americans to take the emerging confrontations with China seriously.15 As noted already,
by concentrating on the pitfalls of Western theory and practice, I have not advocated ignoring problems in Chinese
unimaginably costly and disastrous for both sides (and increasingly for the world at large), as China scholars we are
indeed obliged to do something about the so-called already fulfilled threat, if there is one, beginning above all with
modifying the very ways we give meaning to China. This of course would require reciprocal and sustained meaning-
in the post-Cold War era, while Beijings missile exercises in the Taiwan Strait might well be seen as threatening and
unwise, one commentator has astutely suggested that Had Bill Clinton projected a constancy of purpose and vision
in China policy in 1993-1994 he might not have been challenged in the Taiwan Strait in 1995-1996 with missile
This is why alternative ways of understanding and dealing with China are
needed. And it is in this context that I have set out to write this thesis, in the belief that China as a global
actor does not have to be the way it is. For this reason, this thesis has made no pretension to be
exercises.16
a politically neutral, value-free endeavour. Like the orthodox literature, it is itself a kind of discourse with practical
such alternatives, it has nevertheless indicated in various ways that alternatives are not only necessary and
possible, but also existent. As stated at the outset of this thesis, scholars such as Tani E. Barlow, Bruce Cumings,
could further serve as possible examples in this regard. And in addition, although this thesis is largely critical in
tone, it has not been entirely negative.
2NC Overview
2NC Blocks
victory in 2000, Bush acknowledged that his administration borrowed twenty of the best people from the American
Enterprise Institute (AEI) for state service in Americas hour of need.53 In all, the neoconservative Center for
Security Policy (CSP) supplied twenty-two former advisers or board members to the same administration.54 It is
unnecessary to add that the AEI and the CSP are both home to some of the most outspoken commentators in the
international affairs from Princeton Universitys Woodrow Wilson School (WWS) whose graduate programmes
In his other
life, Friedberg served as Dick Cheneys National Security Advisor on China
Affairs from 2003 to 2005 and was appointed to the Department of Defenses (DoD) Defense Policy Board in
proudly boast the rather accurate and fitting ambition of preparing future public service leaders.
was the dean of the Paul H. Nitze School of Advanced International Studies (SAIS) at Johns Hopkins University, a
School originally founded by Paul Nitze, a senior government official who was instrumental in shaping US defence
policy on the basis of the Soviet threat during the Cold War. During the George W. Bush presidency, the Chinathreat knowledge community led by some prominent neocons became immensely influential. But the
knowledge/power nexus is by no means unique to the Bush administration. As exemplified by the so-called Blue
Team, the China-threat knowledge community was politically active throughout the Clinton years in the 1990s.
Named after the side that represents the US in the Pentagons war games (the unnamed foe is called the Red
Team), the Blue Team was a loose community of members of Congress, top congressional staff, Republican political
operatives, former intelligence officers, journalists, think-tank analysts, historians and scholars, some of whom were
tenured professors at the countrys most prestigious universities.55 Through this informal yet powerful network,
China
threat experts from top universities and leading think tanks were able to
collectively exert steady influence on Americas national security establishment .
Manifested in the service of power by the priesthood of China-threat experts, the
power/knowledge nexus is not a one-way street . In essence, it is a symbiotic relationship, for the
production of such knowledge cannot be detached from the power arrangement it serves. Therefore, any
understanding of this connection would be incomplete without looking at how this particular China knowledge is
studies in the US were shaped by power, ideology and geopolitics, so too is this powerful China paradigm in
contemporary China watching. Indeed, the discursive production of the China threat makes for a sizeable
Journal, The Washington Times, and Encounter Books, a San Francisco-based publishing house. A self-promotion
material produced by the Weekly Standard offers a rare insight into part of the operation of this industry. Thanks to
a unique VIP distribution system, a select list of the most powerful men and women in government, politics, and the
media receive the publication via hand-delivery on Sunday morningjust in time for the nationally televised talk
military servicemen, and defence industrialists (re)join the ranks of professors and research fellows at universities
and think tanks, thereby bringing the influence of power directly to the process of knowledge production. A quick
glance at the signatures on the PNACs 1997 founding statement reveals a rogues gallery of intransigent
hardliners who are mainly exgovernment and ex-Pentagon officials in the Reagan era. Dick Cheney, Donald
Rumsfeld, Paul Wolfowitz, William Bennett, I. Lewis Libby and Eliot Cohen are only some of the most recognisable
luminaries. And there is no prize for guessing what kind of knowledge those officials-turned-nationalsecurity gurus
would bring to the understanding of China. The 2000 PNAC report, entitled Rebuilding Americas Defenses:
Strategy, Forces, and Resources for a New Century, insists that China is the potential enemy. The reports author,
Thomas Donnelly, once worked as a professional staff member at the US House of Representatives Committee on
National Security. Later, he became a Director at Lockheed Martin before his move through the revolving door again
to a post at the AEI.57 The AEI, the CSP, and the Heritage Foundation, all key sources of the China-threat knowledge
in the forms of policy briefs, research reports and opinion pieces, tell a similar story. One China specialist at the AEI,
Dan Blumenthal, was previously senior director for China, Taiwan and Mongolia in the Secretary of Defenses Office
of International Security Affairs. Another AEI China expert, the late James Lilley, was formerly a CIA station chief in
Beijing, Director of the American Institute in Taiwan, and Ambassador to China. Harvey Feldman, Distinguished
Fellow in China Policy at the Heritage Foundation, was once Director of the Office of the Republic of China Affairs
and one of the architects of the 1979 Taiwan Relations Act. The ubiquitous China commentator John J. Tkacik, Jr.,
also at the Heritage Foundation, previously served with the US Foreign Service in Taiwan, Hong Kong, and mainland
China. At the CSP, which is directed by former Pentagon official Frank Gaffney, on its Board of Directors was once
Charles M. Kupperman, former vice president of Strategic Integration & Operations, Missile Defense Systems, at
Boeing. Its Advisory Council, meanwhile, is regarded by some commentators as a virtual Star Wars hall of fame,
almost entirely made up of former Star Warriors from the Reagan administration.58 To highlight the symbiotic link
between power and knowledge in a significant section of China watching is not to suggest that practitioners cannot
make a worthy contribution to the scholarly field of China studies, or that all research on the China threat is
necessarily tainted by the influence of the power apparatus. Harold Isaacs, the author of the classic study Scratches
on Our Minds, was affiliated with the CIA-assisted Center for International Studies at MIT, but his proximity to the
government, as Ido Oren notes, did not stop him producing a rigorous and high-quality study of American views of
China and India.59 In some cases, close encounters with power may even make one a sharp critic of it, as in the
case of Chalmers Johnson, author of Blowback and The Sorrows of Empire, who once worked as a consultant for the
Office of National Estimates of the CIA.60 However, more often than not, even with the best intention of distancing
oneself from the political establishment, it is difficult for people with previous experience in the government and
especially the military-industrial complex to divest themselves completely of the influence of power and its
prevailing ideology, normative concerns and cognitive habits. On the China-threat front, the views of many
practitioners turned scholars, closely aligned with the vested interests of their former employers, testify to this
power/knowledge entanglement. One aspect of such entanglement concerns research grants and donations.
According to a 2002 report by the Association of American Universities (AAU), the DoD is the
third largest funder (after the National Institutes of Health and the National Science Foundation) of
university research, which accounts for more than 60 per cent of defence basic
research.61 Similarly, a significant share of the funding received by lobbying think
tanks comes from hardline foundations and defence companies . In its 1998 annual report,
where the CSP acknowledged the financial support it had received since its founding, virtually every weaponsmaker made it to the list, ranging from Lockheed Martin (and before their merge, Lockheed and Martin), Boeing and
TRW to General Dynamics, Rockwell International and Northrop Grumman (and in its pre-merge incarnations,
Northrop and Grumman). As indicated in the reports charts, about one quarter of the Centers annual incomes
The military-industrialacademic nexus is evident also in many university based research projects on
China. For example, after the end of the Cold War, studies on the strategic implications
of Chinas rise have benefited from sizeable grants from the largely conservative,
anti-Communist foundations such as the Smith Richardson, Bradley, Scaife, and Olin Foundations.63 The
flowed from corporations, of which half came from defence contractors.62
John M. Olin Foundation, which funded the John M. Olin Institute for Strategic Studies at Harvard University (Samuel
Huntington was its Founding Director), was set up by a chemical and munitions manufacturer. Some more reputable
social sciences foundations, which maintain a keen interest in sponsoring China-related studies, have been revealed
as once cover organisations for the CIA. Their influence on the direction of disciplines is as important as that of
government funding on research during the Cold War.64 The DoDs Minerva Initiative provides another potential
financial boon to the China-threat knowledge community. This initiative is modelled on the US National Defense
Education Act introduced at the early stage of the Cold War. Initially coming with a $50 million research fund up for
grabs, it calls upon university academics to offer their expertise on several Pentagon nominated security challenges
such as religious and cultural changes in the Islamic world and the development of the Chinese military and
technology.65 Co-administered by the National Science Foundation, the project states that it seeks a diverse range
of views, but its aim is to foster a new generation of engaged scholarship in the social sciences that seeks to meet
the challenges of the 21st century.66 It is too soon to tell how this Initiative, first launched in 2008, may come to
shape the outcomes of its funded studies on China. Thus far, there is only one China-related project funded by this
Initiative. However, if Project Camelot in the 1960s established by the US Army is anything to go by, it does not
inspire much confidence in either its neutrality or promised intellectual diversity.67 Consider, for example, the
administrative setup of the Minerva Initiative. With the condition that Pentagon officials sit on each peer-review
panel, this almost certainly guarantees that the funded proposals are as diverse as the worldview and strategic
agenda of the military-industrial complex would allow, even though the Pentagon often keeps a low-profile in
running those research projects. Where foreign sources share similar political interests in the politics of fear vis--vis
China, the production of the China threat knowledge in the US often become a transnational joint venture. As
membership issues.69 It is often said that those who pay the piper call the tune. Where a research project fails to
meet the funding bodys expectation, not only does the prospect of securing further funding diminish dramatically,
but existing funding can also be withdrawn as a punishment. In June 2001, US National Intelligence Council (NIC)
fired the RAND Corporation from a classified project ordered by Congress to assess Chinas future military
Tenets hardline
view on China, as evidenced in his annual presentations on current and projected
national security threats to Congress, had been well known . But RANDs findings,
though depicting China as a growing military power, stopped short of calling it a
clear and present danger, thereby failing to offer the kind of conclusion the NIC had
desired. One analyst familiar with the project later complained that people at the NIC, themselves under pressure
capabilities. The NIC reports directly to the CIA Director, who at the time was George Tenet.
from Republican Hawks in Congress, want China to be 10 feet tall.70 This little episode provides an interesting
glimpse into the sometimes decisive role of power in the constitution of China knowledge in the US as well as the
role of desire in that power/knowledge nexus. Heavily dependent on government (especially Pentagon) funding and
for fear of missing out on future contracts, RAND and other think tanks might have learned a lesson or two. The
RAND-type incident in China watching does not happen very often, but its rarity seems to be a sign of the already
tacit cooperation between knowledge and power, rather than a clear indication of the independence of China
the broad political consensus of the military-industrialacademic complex, having circulated in the mainstream imagination for generations
and obtained a degree of cultural and institutional hegemony, has rendered overt
political control largely unnecessary. IR, as Peter Monaghan notes, is one of a number of
fields that are so interwoven with the federal government, particularly with military
and intelligence agencies, that they cannot avoid aping the political ideology
of those agencies. 71 Consequently, for all the claims of the China threat paradigm
to be scientific knowledge and objective truth, it has its roots in power and is wellsuited to the service of power. By taking note of the power/knowledge nexus in the construction and
knowledge from power. In any case,
function of the China threat knowledge, I do not suggest that every single piece of work in the China threat genre
is written under the decree of the Pentagon in exchange for funding and/or political patronage. As noted above, the
nexus often takes multiple forms, some of which are subtler, less visible and less direct than others. Indeed, it is in
the interest of both knowledge and power that their liaison be kept as covert as possible. This is what Foucault
means by the subtle mechanisms in the production of knowledge where the exercise of power becomes
capillary.72 In his account of the relationship between the state, the foundations, and international and area
studies during the Cold War, Cumings used the term going capillary to describe how, through small, everyday and
local avenues, such as decisions on who gets tenure, who edits prestigious journals, which research project gets
funded, and which textbooks are adopted, power was able to maintain its presence so that people do things
without being told, and often without knowing the influences on their behavior.73 Also, once taking on a life of its
own, knowledge can span an intertextual, disciplinary and institutional web within which it can self-generate,
ostensibly removing itself a step further from power. Thus far, I have critically examined the
power/knowledge/desire nexus in the case of the China threat paradigm. In doing so, I do not imply that the
solution lies in the pursuit of pure knowledge and neutral scholarship on the part of those China watchers, who
should shun government agencies, which in turn should stop funding social science research altogether. In the fields
of social sciences at least, there is no such thing as pure knowledge, disconnected totally from desire and power.
Indeed, as examined at the beginning of this book, pure social knowledge is neither possible nor even desirable. I
am not against the power/knowledge/desire nexus per se; rather, my point is that we, as producers of knowledge,
should guard against the possibility of being misused and abused by power which often serves special interests. We
should be self-conscious and sensitive to the consequenceshowever unintended or even well-intendedof our
problematizations they seek to "sell" these, or otherwise have them officially adopted. In principle, there is no limit
to the ways in which the management of population may be problematized. All aspects of human conduct, any
global
liberal governance is not a linear problem-solving process committed to the
resolution of objective policy problems simply by bringing better information and
knowledge to bear upon them. A nonlinear economy of power/knowledge, it
deliberately installs socially specific and radically inequitable distributions of wealth,
opportunity, and mortal danger both locally and globally through the very detailed
ways in which life is variously (policy) problematized by it.
changes and unintended outcomes that it then serially reproblematizes in terms of policy failure. Thus,
Epistemology DA
The permutation footnotes our criticism- bracketing it off
allowing assumptions to remain unchallenged
Richard K. ASHLEY, Professor of Political Science at Arizona State University,
AND R.B.J. WALKER, Professor of International Relations at the University of
Victoria, 1990 [Conclusion: Reading Dissidence/ Writing the Discipline: Crisis and
the Question of Sovereignty in International Studies, International Studies
Quarterly, Volume 34, Available Online via JSTOR, p. 370]
These fragments of critical readings provide but a few examples of increasingly
familiar ways in which scholars of international relations and the social sciences in
general often interpret, interrogate, and reply to works of dissidence that speak
from disciplinary margins. No doubt other examples could be offered. We think
these fragments suffice, however, to illustrate a considerable range of likely critical
responses that spans from left to right. Five things about these snippets are notable.
First, such critical commentary is not typically offered or received as the normal,
proper activity of a discipline or tradition, however that discipline or tradition be
defined. Such commentary is typically encountered in a footnote, a review essay, a
contribution to the occasional symposium on the disciplines future, a reading seminar, or the banter and sideplay of professional conferences. Rarely is it encountered
as the main theme of a refereed journal article or a formal research presentation at
a professional meeting. In brief, such commentary is offered as parenthesis. It is put
forth as a pause that is occasioned by the passing encounter with the moment of
dissidence and that is bracketed and set off from the real projects to which the
commentators and their audiences are soon to return. Second, when critical
comments such as these are offered, they are typically pronounced in a cool,
collected, self-assured voice of an I or we that neither stumbles nor quavers
with self-doubt. Sometimes, this posture of self-assurance takes the form of
nonchalance, even indifference, as if the commentary were roughly comparable to a
remark about the shrubbery overgrowing the side of a highway one travels. An air of
nonchalance is difficult to sustain, however, when dissident events disturb a sense
of direction or when marginal works of thought pose questions that are difficult to
ignore. On such occasions, equanimity often gives way to exasperation tinged with
embarrassment, a sense that it would be better if these things did not have to be
said, a regret that voices of dissidence-though sometimes raising interesting
questions-are somehow oblivious to the obvious things that truly refined scholars
should already know. On still other occasions, such as conversations between
teacher and student, when the addressee of these critical readings cannot yet be
presumed to be a mature member of the profession, an air of cool detachment
might be replaced by a tone of sobriety, even solemnity, that reminds the
potentially wayward novice that the reading is a kind of vow that he, like all
members, must earnestly recite. Yet all these reading postures-nonchalance,
exasperation, solemnity during the rite of passage-have something in common. As
gestures in themselves, they at once presuppose and indicate the same location.
These postures indicate that such critical remarks belong not at the center of the
discipline where its serious and productive work is proudly presented and logically
weighed, but at its boundaries, at its edges, at the thresholds or checkpoints of
entry and exit. They indicate, in the same stroke, that the disciplines territorial
boundaries are already marked, that the difference between outside and inside is
already given, and that the discipline, the tradition, the everybody who knows and
agrees with this reading is already assuredly there.
2NC Framework
2NC FW
Counter-Interpretation: The aff must defend the political
implications of the plan as well as the epistemological and
methodological groundings of the 1AC.
The role of the judge is to adopt the role of a critical
intellectual to question the claims of the 1ACthats best
A. Ground The affirmative team must defend the entirety of
the 1AC, not just select parts. Negative ground is only to
prove that the affirmative is not desirable.
B. Best Policy Making The benefit of learning and
incorporating Kiritkal discussions into our politics radically
transforms our understanding of what it means to be political
C. Predictability If we have specific links to the aff, its
predictable, and any arbitrary interpretation that negatives
must defend a policy is the real unpredictability.
D. Perms Check
And, fiat is illusory- no coherent reason why simulating the
case is good. Instead, you default to what you have control
over, which is the discourse of this round. If we win the affs
knowledge production is flawed, you vote neg on presumption.
intellectual-moral bloc should take place under the auspices of the Communist Party a body he described as the
modern prince. Just as Niccolo Machiavelli hoped to see a prince unite Italy, rid the country of foreign barbarians,
and create a virtu-ous state, Gramsci believed that the modern price could lead the working class on its journey
toward its revolutionary destiny of an emancipated society (Gramsci 1971: 125-205). Gramscis relative optimism
about the possibility of progressive theorists playing a constructive role in emancipatory political practice was
predicated on his belief in the existence of a universal class (a class whose emancipation would inevitably presage
the emancipation of humanity itself) with revolutionary potential. It was a gradual loss of faith in this axiom that led
Horkheimer and Adorno to their extremely pessimistic prognosis about the possibilities of progressive social
change. But does a loss of faith in the revolutionary vocation of the proletariat necessarily lead to the kind of
quietism ultimately embraced by the first generation of the Frankfurt School? The conflict that erupted in the 1960s
between them and their more radical students suggests not. Indeed, contemporary critical theorists claim that the
deprivileging of the role of the proletariat in the struggle for emancipation is actually a positive move. Class remains
a very important axis of domination in society, but it is not the only such axis (Fraser 1995). Nor is it valid to reduce
all other forms of domination for example, in the case of gender to class relations, as orthodox Marxists tend to
do. To recognize these points is not only a first step toward the development of an analysis of forms of exploitation
and exclusion within society that is more attuned to social reality; it is also a realization that there are other forms
of emancipatory politics than those associated with class conflict.1 This in turn suggests new possibilities and
problems for emancipatory theory. Furthermore, the abandonment of faith in revolutionary parties is also a positive
development. The history of the European left during the twentieth century provides myriad examples of the ways
in which the fetishization of party organizations has led to bureaucratic immobility and the confusion of means with
ends (see, for example, Salvadori 1990). The failure of the Bolshevik experiment illustrates how disciplined,
vanguard parties are an ideal vehicle for totalitarian domination (Serge 1984). Faith in the infallible party has
obviously been the source of strength and comfort to many in this period and, as the experience of the southern
Wales coalfield demonstrates, has inspired brave and progressive behavior (see, for example, the account of
support for the Spanish Republic in Francis 1984). But such parties have so often been the enemies of emancipation
that they should be treated with the utmost caution. Parties are necessary, but their fetishization is potentially
Thomas Risse-Kappen points out, the term common security originated in the contribution of peace researchers to
the German security debate of the 1970s (Risse-Kappen 1994: 186ff.); it was subsequently popularized by the
Initially,
mainstream defense intellectuals dismissed the concept as hopelessly idealistic; it
certainly had no place in their allegedly hardheaded and realist view of the world. However, notions of
common security were taken up by a number of different intellectuals communities,
Palme Commission report (Independent Commission on Disarmament and Security Issues 1982).
including the liberal arms control community in the United States, Western European peace researchers, security
specialists in the center-left political parties of Western Europe, and Soviet institutchiks members of the
influential policy institutes in the Soviet Union such as the United States of America and Canada Institute (Landau
1996: 52-54; Risse-Kappen 1994: 196-200; Kaldor 1995; Spencer 1995). These communities were subsequently
had an effect on the Reagan administration. As Risse-Kappen notes: When the Reagan
administration brought hard-liners into power, the US arms control community was removed from policy influence.
It was the American peace movement and what became known as the freeze
campaign that revived the arms control process together with pressure from the European allies.
(Risse-Kappen 1994: 205; also Cortright 1993: 90-110). Although it would be difficult to sustain a claim that the
combination of critical movements and intellectuals persuaded the Reagan government to adopt the rhetoric and
attendant notions as nonoffensive defense (these links are detailed in Evangelista 1995; Kaldor 1995; Checkel
1993; Risse-Kappen 1994; Landau 1996 and Spencer 1995 concentrate on the role of the Pugwash conferences).
This group,
including Palme Commission member Georgii Arbatov, Pugwash attendee Andrei Kokoshin , and
Sergei Karaganov, a senior adviser who was in regular contact with the Western peace researchers Anders Boserup
and Lutz Unterseher (Risse-Kappen 1994: 203), then influenced Soviet leader Mikhail Gorbachev.
Gorbachevs subsequent championing of common security may be attributed to several factors. It is clear, for
new Soviet leadership had a strong interest in alleviating tensions in EastWest relations in order to facilitate much-needed domestic reforms (the interaction of
ideas and material reality). But what is significant is that the Soviets commitment to common
security led to significant changes in force sizes and postures. These in turn aided in
the winding down of the Cold War, the end of Soviet domination over Eastern
Europe, and even the collapse of Russian control over much of the territory of the
former Soviet Union. At the present time, in marked contrast to the situation in the early 1980s, common
example, that
security is part of the common sense of security discourse. As MccGwire points out, the North Atlantic Treaty
Organization (NATO) (a common defense pact) is using the rhetoric of common security in order to justify its
circles provides critics with a useful tool for (immanently) critiquing aspects of security policy (as MccGwire 1997
demonsrates in relation to NATO expansion). The example of common security is highly instructive. First, it indicates
critical intellectuals can be politically engaged and play a role a significant one at that
in making the world a better and safer place . Second, it points to potential future
addressees for critical international theory in general, and critical security studies in
particular. Third, it also underlines the role of ideas in the evolution in society . CRITICAL
that
SECURITY STUDIES AND THE THEORY-PRACTICE NEXUS Although most proponents of critical security studies reject
aspects of Gramscis theory of organic intellectuals, in particular his exclusive concentration on class and his
emphasis on the guiding role of the party, the desire for engagement and relevance must remain at the heart of
their project. The example of the peace movement suggests that critical theorists can still play the role of organic
intellectuals and that this organic relationship need not confine itself to a single class; it can involve alignment with
different coalitions of social movements that campaign on an issue or a series of issues pertinent to the struggle for
the voiceless, the unrepresented, the powerless, and its purpose is their
emancipation. The theoretical implications of this orientation have already been discussed in the
previous chapters. They involve a fundamental reconceptualization of security with a shift
in referent object and a broadening of the range of issues considered as a legitimate part
of the discourse. They also involve a reconceptualization of strategy within this expanded notion of security. But
the question remains at the conceptual level of how these alternative types of
theorizing even if they are self-consciously aligned to the practices of critical or new social movements, such
as peace activism, the struggle for human rights, and the survival of minority cultures can become a
force for the direction of action. Again, Gramscis work is insightful. In the Prison Notebooks, Gramsci
advances a sophisticated analysis of how dominant discourses play a vital role in upholding particular political and
economic orders, or, in Gramscis terminology, historic blocs (Gramsci 1971: 323-377). Gramsci adopted
Machiavellis view of power as a centaur, ahlf man, half beast: a mixture of consent and coercion. Consent is
produced and reproduced by a ruling hegemony that holds sway through civil society and takes on the status of
common sense; it becomes subconsciously accepted and even regarded as beyond question. Obviously, for
Gramsci, there is nothing immutable about the values that permeate society; they can and do change. In the social
realm, ideas and institutions that were once seen as natural and beyond question (i.e., commonsensical) in the
West, such as feudalism and slavery, are now seen as anachronistic, unjust, and unacceptable. In Marxs well-worn
phrase, All that is solid melts into the air. Gramscis intention is to harness this potential for change and ensure
that it moves in the direction of emancipation. To do this he suggests a strategy of a war of position (Gramsci
1971: 229-239). Gramsci argues that in states with developed civil societies, such as those in Western liberal
process by helping to undermine the natural, commonsense, internalized nature of the status quo. This in turn
helps create political space within which alternative conceptions of politics can be developed and new historic blocs
created. I contend that Gramscis strategy of a war of position suggests an appropriate model for proponents of
critical security studies to adopt in relating their theorizing to political practice. THE TASKS OF CRITICAL SECURITY
familiar Quaker lines of speaking truth to power (this sentiment is also central to Said 1994) or even along the
eisteddfod lines of speaking truth against the world. Of course, traditional strategists can, and indeed do,
sometimes claim a similar role. Colin S. Gray, for example, states that strategists must be prepared to speak truth
to power (Gray 1982a: 193). But the difference between Gray and proponents of critical security studies is that,
whereas the former seeks to influence policymakers in particular directions without questioning the basis of their
power, the latter aim at a thoroughgoing critique of all that traditional security studies has taken for granted.
(cited in Jameson 1990: 66). The aim of critical security studies in attempting to undermine the prevailing orthodoxy
is ultimately educational. As Gramsci notes, every relationship of hegemony is necessarily a pedagogic
relationship (Gramsci 1971: 350; see also the discussion of critical pedagogy in Neufeld 1995: 116-121). Thus,
by
Adorno, who argues: In the history of civilization there have been not a few instances
when delusions were healed not by focused propaganda, but , in the final analysis,
because scholars, with their unobtrusive yet insistent work habits, studied what lay
at the root of the delusion. (cited in Kellner 1992: vii) Such unobtrusive yet insistent work does not in
itself create the social change to which Adorno alludes. The conceptual and the practical dangers of
collapsing practice into theory must be guarded against. Rather, through their
educational activities, proponent of critical security studies should aim to provide
support for those social movements that promote emancipatory social change. By
providing a critique of the prevailing order and legitimating alternative views,
critical theorists can perform a valuable role in supporting the struggles of social
movements. That said, the role of theorists is not to direct and instruct those movements with which they are
aligned; instead, the relationship is reciprocal. The experience of the European, North American, and Antipodean
peace movements of the 1980s shows how influential social movements can become when their efforts are
harnessed to the intellectual and educational activity of critical thinkers. For example, in his account of New
108; see also COrtright 1993: 5-13). In the 1980s peace movements and critical intellectuals interested in issues of
security and strategy drew strength and succor from each others efforts. If such critical social movements do not
exist, then this creates obvious difficulties for the critical theorist. But even under these circumstances, the theorist
need not abandon all hope of an eventual orientation toward practice. Once again, the peace movement of the
1980s provides evidence of the possibilities. At that time, the movement benefited from the intellectual work
undertaken in the lean years of the peace movement in the late 1970s. Some of the theories and concepts
developed then, such as common security and nonoffensive defense, were eventually taken up even in the Kremlin
and played a significant role in defusing the second Cold War. Those ideas developed in the 1970s can be seen in
Adornian terms of the a message in a bottle, but in this case, contra Adornos expectations, they were picked up
and used to support a program of emancipatory political practice. Obviously, one would be nave to understate the
difficulties facing those attempting to develop alternative critical approaches within academia. Some of these
problems have been alluded to already and involve the structural constraints of academic life itself. Said argues
that many problems are caused by what he describes as the growing professionalisation of academic life (Said