Skip to content
November 15, 2012 / compassioninpolitics

Answering threat construction and securitization: Strategy and ideas for 2ac Frontlines

I’m going to address this as if its the threat construction/securitization/realism bad type argument:

I think most teams use historical evidence in their aff to help ground the threat–or document the other types of proof you might have.

Also historical examples in which securitization was a good idea or where de-securitization–underestimating threats was a bad idea.

You might also think of intuitive scenarios in which securitization or security issues might be relevant.

Examples that come to mind: World War I, World War II, the Cold War, etc…
(many critiques of this genre use Vietnam…..or the War on Terror as the counter example)

Use cross-ex to make their position look absurd. So threats and risks don’t exist? Should we not consider them at all in any case? How about…..?

You could also do a sophisticated no link argument…..their authors are talking about X…..we are Y.

You might talk about how you decrease threat construction overall (this can be an uphill battle…..but not necessarily)

The performative contradiction involved in running this argument….and running disads seems a little troubling. Make this a semi-sophisticated argument–about how it coopts their alternative or something along those lines.

The majority of time is often spent on:
1. Realism good, realism inevitable.
2. Critical IR bad. PoMo IR = bad, bad, bad
3. Framework (Roleplaying good, scenario planning good, Reps focus bad–the later assuming they push it in that direction)
4. Proving threat/security issues of aff. Historical examples.
5. Modernity good. Progressively gets better & saves lives.

Often these arguments talk about “value to life”–which you should have answers for in your K file.

Another way to approach this argument:
1. Nuclear images good (increase awareness against nuclear war)
2. Fear good (helps prevent threats–this answers their argument at its core)
3. Enemies good. this is Schmitt (which I believe has been cut at camp the last 3 to 4 years)

There are also some literatures which specifically engage the “securitization” debate or the need to have “securitization” in the language.

Does nuclear deterrence work? Does military deterrence work?

All of the numbered 8 arguments above have evidence. It may be possible to make some grounded on intuition or history. Also, you would probably need to do work on my analytics–to provide a little depth or reason–and in some cases implications.

If this is argument is “environmental securitization”….its kind of a different argument……
The core of that argument is…..Dealing with environmental issues from a national security or militarized fashion = bad.



Leave a Comment
  1. Nathan Ketsdever / Nov 16 2012 2:52 am
  2. Nathan Ketsdever / May 8 2013 6:40 pm

    Threats exist in the real world, Focault & critical security studies doesn’t fully take that into account.
    Its fundamentally not suited to deal with life and death decisions in the real world.

    Second, the self-fulfilling prophesy argument is empirically denied. We have tons of magazines talking about threats–but they don’t become self-fulfilling propheies. (kind of a dangerous argument).

    And the K itself is dealing in the language or metaphors of threat and good/evil. It links to itself. And the idea that we can transcend the self/other dicotomy without suicide or paralysis is a joke.

    The alternative doensn’t move us forward. The DA = .

    It brushes threats under the rug. Its a stick your head in the mud strategy.

    Realism & hegemony empirically works.

    * need some cards for some of the above, but not all.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: