09+Security+and+Politics

09+Security+and+Politics - SOSC111 Science, Technology...

Info iconThis preview shows pages 1–14. Sign up to view the full content.

View Full Document Right Arrow Icon
SOSC111 Science, Technology & Society Lecture 9 Security and Politics
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Today we are considering: How we use technology to protect ourselves and our property. How we use technology to stabilize and destabilize relationships. How industrialization has led to exponential rise in destructive power – and thus threat to the security of society
Background image of page 2
Securing Ourselves and Our Property Keeping some people OUT, and our goods IN. Walls, doors, moats/bridges, creaking floors, dogs, locks, chains, peep holes, door codes, window bars, cameras, motion detectors, magnetic strips…
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Living together; trading together Need to protect your property Rise of urban crime. Specialization in security: Police (or sheriffs) Security firms (Dragon Guard) Soldiers Triads (?)
Background image of page 4
Armies and Walls States and empires supported the rise of professional soldiers . States and empires funded the development of advanced technologies for new weapons . Empires built walls for protection and security
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Creating Balance and Imbalance States use military technology to establish strategic balance and imbalance. States also use institutional arrangements - international agreements - for keeping arms races in check. For example: Strategic Arms Limitation Treaty of 1972 Obama’s recent summit of 47 countries to keep nuclear material out of terrorist hands The problem is that some countries possess nuclear weapons, but do not participate
Background image of page 6
Industrialization The industrial revolution gave inspiration to military technologists. One early development was the machine gun . Another was the application of factory principles to the slaughter of people, such as flow control, efficiency, ordered disassembly. Shooting and burying people was too inefficient.
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Concentration camps in Germany during World War II: Industrialized extermination Auschwich: Victims entered what was labeled a “shower-room”. Once inside, they were gassed with hydrogen cyanide or carbon monoxide.
Background image of page 8
Birkenau map.
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Auschwitz-Birkenau had a capacity of killing over 1,400 people per day.
Background image of page 10
Modernization Rise of individual power to kill or destroy. Technologies expand our range of violence September 11: Jumbo Jet as a weapon of mass destruction The shift towards non-physical or remote controlled violence . Cruise Missiles for long-distance destruction Computer viruses
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Cruise Missiles Tomahawk cruise missiles frequently appear in the news because they are the U.S. weapon of choice Can deliver a 1,000- pound high-explosive bomb to a precise location Cost between US$500,000 and US$1,000,000 each
Background image of page 12
Warfare by Robots And Drones PW Singer describes the increased use of robots in warfare Singer is director of the 21st Century Defense Initiative at the Brookings Institution The wars in Irak and Afghanistan have involved large- scale use of robots and drones Killing of terrorists by Unmanned Aerial Vehicle (UAV)
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 14
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 07/30/2011 for the course SOS 111 taught by Professor Bark during the Summer '08 term at HKU.

Page1 / 58

09+Security+and+Politics - SOSC111 Science, Technology...

This preview shows document pages 1 - 14. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online