06.04.2013 Views

convergence

convergence

convergence

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Lawlessness and Disorder<br />

termed “the revenge of the periphery,” a trend that is evident in illegal migration, transnational<br />

crime, terrorism, piracy, and even insurgency. 8<br />

The authors of the third argument regarding a clear and present safety do not actually<br />

deny the existence of complex security threats and challenges; rather, they argue that current<br />

threats are inflated and the responses are overly militarized while emerging threats are largely<br />

ignored, especially in terms of resource allocation. 9 Their argument is far more compelling than<br />

the title of their article suggests, not least because the authors see clear and present safety as<br />

transitory. In their view, “the main global challenges facing the United States today are poorly<br />

resourced and given far less attention than ‘sexier’ problems, such as war and terrorism. These<br />

include climate change, pandemic diseases, global economic instability, and transnational<br />

criminal networks—all of which could serve as catalysts to severe and direct challenges to<br />

U.S. security interests.” 10 This assessment is, in many respects, very compelling. The difficulty<br />

is that the more traditional security threats have not simply gone away to be replaced by a new<br />

set: new and old challenges coexist as part of a more crowded agenda in which traditional,<br />

resurgent, nascent, and truly novel and unfamiliar security threats demand attention in a climate<br />

dominated by economic austerity. Great power conflict, for example, has not disappeared<br />

and, as discussed below, against a backdrop of climate change and intensifying competition<br />

for diminishing natural resources could well come to the forefront again. Adversaries with the<br />

desire or capacity to do harm to the United States cannot be ignored now or in the future. The<br />

danger is that they will present new challenges more difficult to delineate, define, deter, and<br />

defend against. The inherent opportunity cost of managing one set of challenges inevitably<br />

results in attention and resource deficits in relation to other problems. In this connection, one<br />

of the most serious problems is the bias toward the familiar, which accentuates the inherent<br />

difficulties of “managing the unexpected.” 11 Most of the emerging and nontraditional security<br />

challenges are novel or unfamiliar, extending well beyond the comfort zones of policymakers<br />

and officials. As such, they will likely prove impervious to the usual range of policy options<br />

embedded in standard operational procedures. Bureaucracy and budget managers are good at<br />

responding to routine and familiar challenges, but when the challenges are new and different,<br />

the level of competency tends to decline and resources are constrained at the very time they<br />

are most needed.<br />

Adversaries cannot be ignored. Nevertheless, one of the key assumptions of this chapter<br />

is that security challenges emanate not only from hostile actors and pernicious interactions<br />

such as security dilemmas and arms races, but also from certain conditions that promote<br />

violence and instability—and in turn are worsened by them. The United States, in particular,<br />

tends to be overtly focused on adversaries or enemies who are then typically characterized as<br />

embodiments of evil. A paradigm shift is needed to create at least an accompanying focus on<br />

the kinds of conditions and the confluence of trends that create instability, disorder, and chaos.<br />

Some of these conditions and trends might not be susceptible to preventive measures; even so,<br />

acknowledgment of their debilitating consequences might make it possible, under some circumstances,<br />

to develop mitigation strategies. Yet successful mitigation might be the exception<br />

rather than the rule, especially as more security challenges will likely fall into the category of<br />

wicked problems that are not amenable to easy or readily available solutions.<br />

17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!