Transit through terror

The architecture of international mobility after 9/11

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

This chapter first reflects upon the relationship between mobility and modernity and then notes terrorism's objectives in general. It then briefly revisits September 11's cognitive and policy impacts on the organizational architecture of cross-border individual mobility, primarily in relation to commercial air travel. The post-9/11 security environment has lent unwarranted legitimacy to periodically 'too strong states' that have been indifferent to the individual and societal costs of clumsy border enforcement. Secure and just states will increasingly rely on non-state sources of information in their screening of cross-border individual mobility. Well-designed ICT applications may simultaneously facilitate legitimate individual mobility, and more precise and effective border screening and security. One vision is sketched of how a personal e-portfolio, containing mostly verifying information from non-state sources but in a common format acceptable to state authorities, might work to facilitate mobility. Finally, the problems presented by weak states are noted, and the attendant need for development aid to prioritize the strengthening of private mechanisms of certification and verification.

Original languageEnglish
Title of host publicationAn Anthology of Contending Views on International Security
PublisherNova Science Publishers, Inc.
Pages17-35
Number of pages19
ISBN (Print)9781619428089
Publication statusPublished - 2012 Feb

Fingerprint

terrorism
state authority
development aid
source of information
certification
modernity
legitimacy
travel
air
costs

ASJC Scopus subject areas

  • Social Sciences(all)

Cite this

Pokarier, C. J. (2012). Transit through terror: The architecture of international mobility after 9/11. In An Anthology of Contending Views on International Security (pp. 17-35). Nova Science Publishers, Inc..

Transit through terror : The architecture of international mobility after 9/11. / Pokarier, Christopher J.

An Anthology of Contending Views on International Security. Nova Science Publishers, Inc., 2012. p. 17-35.

Research output: Chapter in Book/Report/Conference proceedingChapter

Pokarier, CJ 2012, Transit through terror: The architecture of international mobility after 9/11. in An Anthology of Contending Views on International Security. Nova Science Publishers, Inc., pp. 17-35.
Pokarier CJ. Transit through terror: The architecture of international mobility after 9/11. In An Anthology of Contending Views on International Security. Nova Science Publishers, Inc. 2012. p. 17-35
Pokarier, Christopher J. / Transit through terror : The architecture of international mobility after 9/11. An Anthology of Contending Views on International Security. Nova Science Publishers, Inc., 2012. pp. 17-35
@inbook{14d78c10f8b74fd88f996a3b1ca0dbf7,
title = "Transit through terror: The architecture of international mobility after 9/11",
abstract = "This chapter first reflects upon the relationship between mobility and modernity and then notes terrorism's objectives in general. It then briefly revisits September 11's cognitive and policy impacts on the organizational architecture of cross-border individual mobility, primarily in relation to commercial air travel. The post-9/11 security environment has lent unwarranted legitimacy to periodically 'too strong states' that have been indifferent to the individual and societal costs of clumsy border enforcement. Secure and just states will increasingly rely on non-state sources of information in their screening of cross-border individual mobility. Well-designed ICT applications may simultaneously facilitate legitimate individual mobility, and more precise and effective border screening and security. One vision is sketched of how a personal e-portfolio, containing mostly verifying information from non-state sources but in a common format acceptable to state authorities, might work to facilitate mobility. Finally, the problems presented by weak states are noted, and the attendant need for development aid to prioritize the strengthening of private mechanisms of certification and verification.",
author = "Pokarier, {Christopher J}",
year = "2012",
month = "2",
language = "English",
isbn = "9781619428089",
pages = "17--35",
booktitle = "An Anthology of Contending Views on International Security",
publisher = "Nova Science Publishers, Inc.",

}

TY - CHAP

T1 - Transit through terror

T2 - The architecture of international mobility after 9/11

AU - Pokarier, Christopher J

PY - 2012/2

Y1 - 2012/2

N2 - This chapter first reflects upon the relationship between mobility and modernity and then notes terrorism's objectives in general. It then briefly revisits September 11's cognitive and policy impacts on the organizational architecture of cross-border individual mobility, primarily in relation to commercial air travel. The post-9/11 security environment has lent unwarranted legitimacy to periodically 'too strong states' that have been indifferent to the individual and societal costs of clumsy border enforcement. Secure and just states will increasingly rely on non-state sources of information in their screening of cross-border individual mobility. Well-designed ICT applications may simultaneously facilitate legitimate individual mobility, and more precise and effective border screening and security. One vision is sketched of how a personal e-portfolio, containing mostly verifying information from non-state sources but in a common format acceptable to state authorities, might work to facilitate mobility. Finally, the problems presented by weak states are noted, and the attendant need for development aid to prioritize the strengthening of private mechanisms of certification and verification.

AB - This chapter first reflects upon the relationship between mobility and modernity and then notes terrorism's objectives in general. It then briefly revisits September 11's cognitive and policy impacts on the organizational architecture of cross-border individual mobility, primarily in relation to commercial air travel. The post-9/11 security environment has lent unwarranted legitimacy to periodically 'too strong states' that have been indifferent to the individual and societal costs of clumsy border enforcement. Secure and just states will increasingly rely on non-state sources of information in their screening of cross-border individual mobility. Well-designed ICT applications may simultaneously facilitate legitimate individual mobility, and more precise and effective border screening and security. One vision is sketched of how a personal e-portfolio, containing mostly verifying information from non-state sources but in a common format acceptable to state authorities, might work to facilitate mobility. Finally, the problems presented by weak states are noted, and the attendant need for development aid to prioritize the strengthening of private mechanisms of certification and verification.

UR - http://www.scopus.com/inward/record.url?scp=84896416201&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84896416201&partnerID=8YFLogxK

M3 - Chapter

SN - 9781619428089

SP - 17

EP - 35

BT - An Anthology of Contending Views on International Security

PB - Nova Science Publishers, Inc.

ER -