convergence
convergence
convergence
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Lawlessness and Disorder<br />
termed “the revenge of the periphery,” a trend that is evident in illegal migration, transnational<br />
crime, terrorism, piracy, and even insurgency. 8<br />
The authors of the third argument regarding a clear and present safety do not actually<br />
deny the existence of complex security threats and challenges; rather, they argue that current<br />
threats are inflated and the responses are overly militarized while emerging threats are largely<br />
ignored, especially in terms of resource allocation. 9 Their argument is far more compelling than<br />
the title of their article suggests, not least because the authors see clear and present safety as<br />
transitory. In their view, “the main global challenges facing the United States today are poorly<br />
resourced and given far less attention than ‘sexier’ problems, such as war and terrorism. These<br />
include climate change, pandemic diseases, global economic instability, and transnational<br />
criminal networks—all of which could serve as catalysts to severe and direct challenges to<br />
U.S. security interests.” 10 This assessment is, in many respects, very compelling. The difficulty<br />
is that the more traditional security threats have not simply gone away to be replaced by a new<br />
set: new and old challenges coexist as part of a more crowded agenda in which traditional,<br />
resurgent, nascent, and truly novel and unfamiliar security threats demand attention in a climate<br />
dominated by economic austerity. Great power conflict, for example, has not disappeared<br />
and, as discussed below, against a backdrop of climate change and intensifying competition<br />
for diminishing natural resources could well come to the forefront again. Adversaries with the<br />
desire or capacity to do harm to the United States cannot be ignored now or in the future. The<br />
danger is that they will present new challenges more difficult to delineate, define, deter, and<br />
defend against. The inherent opportunity cost of managing one set of challenges inevitably<br />
results in attention and resource deficits in relation to other problems. In this connection, one<br />
of the most serious problems is the bias toward the familiar, which accentuates the inherent<br />
difficulties of “managing the unexpected.” 11 Most of the emerging and nontraditional security<br />
challenges are novel or unfamiliar, extending well beyond the comfort zones of policymakers<br />
and officials. As such, they will likely prove impervious to the usual range of policy options<br />
embedded in standard operational procedures. Bureaucracy and budget managers are good at<br />
responding to routine and familiar challenges, but when the challenges are new and different,<br />
the level of competency tends to decline and resources are constrained at the very time they<br />
are most needed.<br />
Adversaries cannot be ignored. Nevertheless, one of the key assumptions of this chapter<br />
is that security challenges emanate not only from hostile actors and pernicious interactions<br />
such as security dilemmas and arms races, but also from certain conditions that promote<br />
violence and instability—and in turn are worsened by them. The United States, in particular,<br />
tends to be overtly focused on adversaries or enemies who are then typically characterized as<br />
embodiments of evil. A paradigm shift is needed to create at least an accompanying focus on<br />
the kinds of conditions and the confluence of trends that create instability, disorder, and chaos.<br />
Some of these conditions and trends might not be susceptible to preventive measures; even so,<br />
acknowledgment of their debilitating consequences might make it possible, under some circumstances,<br />
to develop mitigation strategies. Yet successful mitigation might be the exception<br />
rather than the rule, especially as more security challenges will likely fall into the category of<br />
wicked problems that are not amenable to easy or readily available solutions.<br />
17