Professional Documents
Culture Documents
Full Chapter Technology Ethics and The Protocols of Modern War 1St Edition Artur Gruszczak Editor PDF
Full Chapter Technology Ethics and The Protocols of Modern War 1St Edition Artur Gruszczak Editor PDF
https://textbookfull.com/product/intelligence-security-in-the-
european-union-building-a-strategic-intelligence-community-1st-
edition-artur-gruszczak/
https://textbookfull.com/product/biota-grow-2c-gather-2c-cook-
loucas/
https://textbookfull.com/product/the-ethics-of-war-essays-1st-
edition-bazargan/
https://textbookfull.com/product/black-secrets-of-the-third-
reich-extended-edition-unique-modern-and-old-world-war-
technology-dick-w-kerry/
The Ethics of Invention Technology and the Human Future
Sheila Jasanoff
https://textbookfull.com/product/the-ethics-of-invention-
technology-and-the-human-future-sheila-jasanoff/
https://textbookfull.com/product/narrative-and-technology-
ethics-1st-edition-wessel-reijers/
https://textbookfull.com/product/ethics-morality-and-business-
the-development-of-modern-economic-systems-volume-ii-modern-
civilizations-dipak-basu/
https://textbookfull.com/product/the-path-to-war-how-the-first-
world-war-created-modern-america-1st-edition-neiberg/
https://textbookfull.com/product/modern-sports-ethics-lumpkin/
Technology, Ethics and the Protocols of
Modern War
Contemporary security has expanded its meaning, content and structure in response to
globalisation and the emergence of greatly improved world-wide communication. The
protocols of modern warfare, including targeted killing, enhanced interrogations, mass
electronic surveillance and the virtualisation of war have changed the moral landscape
and brought diverse new interactions with politics, law, religion, ethics and technology.
This book addresses how and why the nature of security has changed and what
this means for the security actors involved and the wider society. Offering a cross-
disciplinary perspective on concepts, meanings and categories of security, the book
brings together scholars and experts from a range of disciplines including political,
military studies and security studies, political economy and international relations.
Contributors reflect upon new communication methods, postmodern concepts of
warfare, technological determinants and cultural preferences to provide new theoreti-
cal and analytical insights into a changing security environment and the protocols of
war in the 21st century.
A useful text for scholars and students of security studies, international relations,
global governance, international law and ethics, foreign policy, comparative studies
and contemporary world history.
1 Healthcare Robots
Ethics, Design and Implementation
Aimee van Wynsberghe
List of figuresvii
List of tablesviii
Notes on contributorsix
15 Conclusions 208
PAWEŁ FRANKOWSKI AND ARTUR GRUSZCZAK
Index216
List of figures
References
Bialasiewicz, L. et al. 2007, Performing security: The imaginative geographies of
current US strategy, Political Geography, 26(4): 405–422.
Boothby, W.H. 2014, Conflict Law. The Influence of New Weapons Technology, Human
Rights and Emerging Actors. The Hague, the Netherlands: T.M.C. Asser Press.
Butler, J. 2009, Frames of War. When Is Life Grievable? London and New York, NY:
Verso.
Chai, S.-K. and Wildavsky, A. 1994, ‘Culture, Rationality, and Violence’, In D.J. Coyle
and R.J. Ellis (eds), Politics, Policy, and Culture. Boulder, CO: Westview Press,
159–174.
Galloway, A.R. 2004, Protocol: how control exists after decentralization. Cambridge,
MA and London: The MIT Press.
Goffman, E. 1986, Frame Analysis. An Essay on the Organization of Experience.
Boston, MA: Northeastern University Press.
Guralnik, D. B. (ed). 1986, Webster’s New World Dictionary of the American Language.
New York, NY: Prentice Hall Press.
Merriam-Webster Dictionary. 2016, ‘protocol’, viewed 20 September 2016, www.
merriam-webster.com/dictionary/protocol.
Plaw, A. and Augé, A. 2012, ‘Introduction: The Transformations of War’, In A. Plaw
(ed), The Metamorphosis of War. Amsterdam, the Netherlands and New York, NY:
Rodopi, 9–18.
Rose, D.C. 2011, The Moral Foundation of Economic Behavior. New York, NY: Oxford
University Press.
Sil, R. and Katzenstein, P.J. 2010, Beyond Paradigms: Analytic Eclecticism in the Study
of World Politics. Basingstoke: Palgrave Macmillan.
Singer, P.W. 2010, The ethics of killer applications: Why is it so hard to talk about
morality when it comes to new military technology? Journal of Military Ethics,
9(4): 299–312.
Sylvia, P. 2013, Cultural Messaging in the U.S. War on Terrorism. A Performative
Approach to Security. El Paso, TX: LFB Scholarly Publishing.
Thacker, E. 2004, ‘Foreword: Protocol Is as Protocol Does’, In A.R. Galloway (ed),
Protocol: How Control Exists After Decentralization. Cambridge, MA and London:
The MIT Press, xi–xxii.
Tilly, Ch. 2003, The Politics of Collective Violence. Cambridge and New York, NY:
Cambridge University Press.
Vaccari, A. 2015, ‘Abjecting Humanity: Dehumanising and Post-humanising the
Military’, In J. Galliott and M. Lotz (eds), Super Soldiers. The Ethical, Legal and
Social Implications. Farnham and Burlington, VT: Ashgate, 9–24.
Whitehead, N.L. 2007, Violence and the cultural order, Daedalus, 136(1): 40–50.
2 Strategic communication and
contemporary European security
Michael O. Holenweger and Alexandre C. Hochuli
Introduction
We live in mediated times. While billions are reached more or less indirectly
through mass media channels which still rest on the advent of print innova-
tions from the 18th century, more and more are reached directly online over
social media and through self-made broadcasting systems. The sender and
receiver of media content have grown closer like never before. In this increas-
ingly interconnected system, even rebels and insurgents use public diplomacy
and social media to reach out to adversaries and allies alike (Huang 2016).
It is such an environment in which states find themselves as they try to pur-
sue their strategic interests. Communication, therefore, has been playing an
increasingly important role in state security.
It is no longer possible for state governments to ignore reactions to their
policy agenda. As the cases of Wikileaks and Panama Papers have shown,
inaction to global news revelations can be devastating to the political estab-
lishment. This became particularly true in the case of military contingency
operations of the West in the past decade, with operations in Afghanistan
from 2001 and in Iraq from 2003 onwards as a case in point. Increasingly,
states found themselves locked in a vexing challenge of reacting to the media
activity of foreign and domestic actors, including public activity of insurgent
networks. Aspects such as selling efforts and achievements on the ground to
local and home audiences became crucial to the overall effort. The projection
of power, i.e., sending military forces to remote places from the home base in
an age of an increasingly skeptical home audience have created big challenges
to governments in convincing the home public of the effort undertaken. But
communication also evolved on the battle field with armed forces increasingly
relying on psychological operations, information campaigns and military
diplomacy. Recently, North Atlantic Treaty Organisation (NATO) member
states tried to combine all official communication activity of the operational
realm under one roof, Strategic Communications (StratCom).
This chapter seeks to underpin the logic of this action, the anatomy of
StratCom and the challenges ahead. It points to the fact that armed forces
mistakenly relied on StratCom as a weapon. Instead, communicative efforts
Communication and European security 11
in complex military operations underwent different processes and influence
behaviour than what armed forces expected (Jackson 2016). We apply a
neoclassical realist framework of civil-military relations to the two cases
of Germany and France, both of which are NATO member countries and
have officially adopted NATO StratCom principles, but with different out-
comes. While Germany’s civil-military relations hampered the development
of StratCom, France’s more balanced civil-military relations have favoured
a StratCom effort that closely resembles US efforts. The approach taken here
points to the importance of the shaping power of internal processes of civil-
military relations.
Few time periods have seen so many changes in military policies like the
ones witnessed in the past decade. Dating back to the thinking about the incor-
poration of new technological improvements into battle space superiority in
the 1980s, the US introduced a concept labeled Transformation of the Armed
Forces in 1999. In order to build on the improvements of the information and
digital revolution, so the story went, revolutionary organisational and pro-
cedural innovations were necessary. Old procedures in military development
were regarded as useless given the ever-changing security environment after
the end of the Cold War. In 2002, at the NATO summit in Prague, the heads
of member states agreed to follow this transformation track.
Military operations in Afghanistan and Iraq, however, proved that the
subsequent concepts introduced in NATO’s armed forces were mismatched
with operational reality (Strachan 2010). In particular, the communication
efforts of NATO in Afghanistan and the multinational military alliance in
Iraq, vis-à-vis the growing insurgency but also the local population, often
ended in deadlock or even to the disadvantage of the sender. Therefore, in
2007, the US introduced a concept of StratCom which aimed at streamlining
communicative efforts. The concept was subsequently introduced into NATO
and all member states agreed on following the conceptual precepts. However,
until today, no NATO country has lived up to the task in reaching full imple-
mentation of StratCom. While some have made substantial changes to the
initial concept, others have failed completely in incorporating it. The reason
for this lies in the peculiarities of today’s civil-military relations of each mem-
ber state of the transatlantic alliance. In order to understand the challenges in
a communicative unity of effort, we need to understand the complexities of
civil-military relations of NATO’s member states.
Sphere
Just before daybreak next morning three stealthy figures crept out
and made their way toward Ford’s Creek. One skulked behind the
other two, dogging their steps and taking advantage of the darkness
to keep very near to them. At the grim trysting-place they halted and
were soon joined by other stealthy figures, and together they sat
down to wait for the daylight. The seconds conferred for a few
minutes. The ground was paced off, and a few, low-pitched orders
prepared the young men for business.
“I will count three, gentlemen,” said Lieutenant Custis. “At three,
you are to fire.”
At last daylight came, gray and timid at first, and then red and bold
as the sun came clearly up. The pistols were examined and the men
placed face to face.
“Are you ready, gentlemen?”
But evidently Harrison Randolph was not. He was paying no
attention to the seconds. His eyes were fixed on an object behind his
opponent’s back. His attitude relaxed and his mouth began to twitch.
Then he burst into a peal of laughter.
“Pete,” he roared, “drop that and come out from there!” and away
he went into another convulsion of mirth. The others turned just in
time to see Pete cease his frantic grimaces of secrecy at his master,
and sheepishly lower an ancient fowling-piece which he had had
leveled at Bob Lee.
“What were you going to do with that gun leveled at me?” asked
Lee, his own face twitching.
“I was gwine to fiah jes’ befo’ dey said free. I wa’n’t gwine to kill
you, Mas’ Bob. I was on’y gwine to lame you.”
Another peal of laughter from the whole crowd followed this
condescending statement.
“You unconscionable scoundrel, you! If I was your master, I’d give
you a hundred lashes.”
“Pete,” said his master, “don’t you know that it is dishonorable to
shoot a man from behind? You see you haven’t in you the making of
a gentleman.”
“I do’ know nuffin’ ’bout mekin’ a gent’man, but I does know how to
save one dat’s already made.”
The prime object of the meeting had been entirely forgotten. They
gathered around Pete and examined the weapon.
“Gentlemen,” said Randolph, “we have been saved by a miracle.
This old gun, as well as I can remember and count, has been loaded
for the past twenty-five years, and if Pete had tried to fire it, it would
have torn up all this part of the country.”
Then the eyes of the two combatants met. There was something
irresistibly funny in the whole situation, and they found themselves
roaring again. Then, with one impulse, they shook hands without a
word.
And Pete led the way home, the willing butt of a volume of good-
natured abuse.—From “Folks from Dixie,” copyright by Dodd, Mead
& Company, New York, and used by arrangement.
PART THREE
Melodious Reading
Conversational elements: Pitch, Inflection, Color, Stress, Pause,
Movement, Time. Separate discussions and illustrations with number
of exercises for the pupil to practice. Melody in verse and in prose.
EXPRESSIVE SPEECH[9]
By Robert Lloyd
Exercises in Inflection
By inflection is meant the glide of the voice within a word to a
higher or a lower pitch. This glide may be quick and short, or long
and slow. It may be a rising or a falling glide, or both. The value of
inflection rests in its power to make what is said more emphatic, to
aid in clear enunciation, to aid in overcoming monotony. On all
emphasized words we have an intensified inflection. This is
illustrated in Portia’s speech in “The Merchant of Venice.” In studying
this excerpt we discover that all the emphasized words have a
pronounced inflection. In the first group of words, “If to do were as
easy as to know what were good to do,” we find the most intensified
inflection is upon the word “know” because this is the most emphatic
word of the group. This reveals that inflection is one of the most vital
means of emphasis.
In regard to inflection as an aid to clear enunciation, we find that
inflection occurs upon the accented syllable of a long word, and if
due attention is given to the syllable upon which the accent falls, the
word will receive a more perfect utterance. For instance, we can
readily see in the following words, which are often mispronounced,
the important part that inflection plays in the proper pronunciation of
them:
abdomen
abject
acclimate
address
admirable
alias
brigand
caricature
chastisement
chauffeur
combatant
contumely
demoniacal
discourse
exquisite
finance
grimace
herculean
horizon
impious
impotent
incomparable
indisputable
industry
inexplicable
interpolate
inquiry
lyceum
mausoleum
mischievous
obligatory
research
resource
superfluous
traverse
vagary
vehement
vehicle
virago
verbose
virtue
virtually
Kinds of Inflection
Falling Glide in the voice indicates a complete and positive
assertion. For example:
“The Prince’s banner wavered, staggered backward,
hemmed by foes!”
I find earth not gray but rosy, heaven not grim but fair of hue.
Do I stoop? I pluck a posy. Do I stand and stare? All’s blue.
—Browning.
I must have left my book on this table last night. (Read two ways.)
There are three pleasures pure and lasting, and all derived from
inanimate things—books, pictures, and the face of nature.
—Hazlitt.
What right have you, O passer by the way, to call any flower a
weed? Do you know its merits? Its virtues? Its healing qualities?
Because a thing is common, shall you despise it? If so, you might
despise the sunshine for the same reason.
Oh, yes, I begin to remember you now. Do you really think it true?
Now clear, pure, hard, bright, and one by one, like the hailstones,
Short words fall from his lips fast as the first of a shower,
Now in two-fold column: Spondæ, Iamb, Trochee,
Unbroken, firm-set, advance, retreat, trampling along,—
Now with a sprightlier springiness, bounding in triplicate syllables,
Dance the elastic Dactylics in musical cadences on;
Now their voluminous coil intertangling like huge anacondas,
Roll overwhelmingly onward the sesquipedalian words.
—Browning.
Resolve!
To keep my health!
To do my work!
To live!
To see to it that I grow and gain and give!
Never to look behind me for an hour!
To wait in weakness and to walk in power;
But always fronting onward to the light.
Always and always facing toward the right.
Robbed, starved, defeated, wide astray—
On, with what strength I have!
Back to the way!
A Study of Pitch
Pitch is simply the modulation of the voice as high or low. In
natural speech we seldom have more than one word on the same
pitch. Note the constant change of pitch in a good conversationalist.
In listening to such, we discover what?
First: If one idea is expressed on one pitch, its antithesis is
instinctively expressed on another pitch. For example: “When our
vices leave us, we flatter ourselves we leave them.” “The prodigal
robs his heir, the miser robs himself.” “Excess of ceremony shows
want of breeding.”
Second: A quick leap of the mind causes a leap in the voice, or, in
other words, it causes a change of pitch. For example: “So you say
you are going to—Well, hello, John! How did you get here?”
There can be no definite rules laid down governing Changes of
Pitch. If we think progressively, giving ourselves completely to each
successive idea, permitting our movement of tone to be the direct
outcome of the action of the mind we shall have no difficulty in
modulating our pitch.
In reading the following selections, note carefully the natural
tendency of the voice to change pitch as the mind leaps from one
thought to another.
O larks, sing out to the thrushes,
And thrushes, sing to the sky!
Sing from your nests in the bushes,
And sing wherever you fly.
Study in Stress
If we read or speak aloud naturally and earnestly, there occurs in
our voice a succession of beats or pulsations. If these pulsations
occur at regular intervals, our speech will be “singsong” and
monotonous. Thus:
a
I wandered lonely cloud
as
and
That floats on high o’er hills,
vales
a
When all at once I crowd
saw
o
A host of golden dills.
daff
—Shakespeare.
Abraham Lincoln used scripture quotations very frequently and
powerfully.