TY - CHAP
T1 - Transit through terror
T2 - The architecture of international mobility after 9/11
AU - Pokarier, Christopher
PY - 2012/2/1
Y1 - 2012/2/1
N2 - This chapter first reflects upon the relationship between mobility and modernity and then notes terrorism's objectives in general. It then briefly revisits September 11's cognitive and policy impacts on the organizational architecture of cross-border individual mobility, primarily in relation to commercial air travel. The post-9/11 security environment has lent unwarranted legitimacy to periodically 'too strong states' that have been indifferent to the individual and societal costs of clumsy border enforcement. Secure and just states will increasingly rely on non-state sources of information in their screening of cross-border individual mobility. Well-designed ICT applications may simultaneously facilitate legitimate individual mobility, and more precise and effective border screening and security. One vision is sketched of how a personal e-portfolio, containing mostly verifying information from non-state sources but in a common format acceptable to state authorities, might work to facilitate mobility. Finally, the problems presented by weak states are noted, and the attendant need for development aid to prioritize the strengthening of private mechanisms of certification and verification.
AB - This chapter first reflects upon the relationship between mobility and modernity and then notes terrorism's objectives in general. It then briefly revisits September 11's cognitive and policy impacts on the organizational architecture of cross-border individual mobility, primarily in relation to commercial air travel. The post-9/11 security environment has lent unwarranted legitimacy to periodically 'too strong states' that have been indifferent to the individual and societal costs of clumsy border enforcement. Secure and just states will increasingly rely on non-state sources of information in their screening of cross-border individual mobility. Well-designed ICT applications may simultaneously facilitate legitimate individual mobility, and more precise and effective border screening and security. One vision is sketched of how a personal e-portfolio, containing mostly verifying information from non-state sources but in a common format acceptable to state authorities, might work to facilitate mobility. Finally, the problems presented by weak states are noted, and the attendant need for development aid to prioritize the strengthening of private mechanisms of certification and verification.
UR - http://www.scopus.com/inward/record.url?scp=84896416201&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84896416201&partnerID=8YFLogxK
M3 - Chapter
AN - SCOPUS:84896416201
SN - 9781619428089
SP - 17
EP - 35
BT - An Anthology of Contending Views on International Security
PB - Nova Science Publishers, Inc.
ER -