Marijuana Regulation vs. Cannabis Legalization

Marijuana Regulation vs. Cannabis Legalization

By: Jason Thompson

I was quick to jump on the marijuana regulation bandwagon when I moved from Minnesota to Las Vegas. For example my wife and I were featured in the local news since we had a grow system in our home and I was looking for free advertising and a chance to market this new miracle cure that helped my family. For less selfish reasons I figured we could use the tax dollars to help pay less taxes and any step toward the de-escalation of the war on drugs was a smart move. First of all we need to abandon this fight against the people because society is losing especially considering the poor and non-whites. The “enemy” is increasing in numbers more thanks to methamphetamine, heroin, Spike, prescription drugs, and alcohol abuse than cannabis consumption if my informal interviews with street Las Vegas drug victims can provide an indicator. Furthermore the leaves of this tree can help heal the nations from the ravages of hard drugs just mentioned. Secondly, according to the Drug Policy Alliance this war has cost us in the U.S. around $51 billion annually. While arresting 1.5 million citizens in 2013 for drug charges and of those 609,423 were captured because of cannabis possession. More than half of these people were non-white although whites sell just as much if not more according to its website. The sobering numbers continue with more than 100,000 casualties in Mexico since it started its drug war due to our artificial demand and encouragement.

The history of the drug war is racist and has more to do with social control than medical or scientific evidence according to many news and academic accounts. This is highlighted by the fact that cannabis was used by major drug companies and talked about in medical and scientific journals before the turn of the twentieth century when it became known as murder weed, pot, and marijuana. Harry Anslinger the Federal official who helped start this whole mess said, “Reefer makes darkies think they are as good as white men”. Also border-states and places with minorities were the first to criminalize

cannabis after its being in use for clothes, medicine, and spiritual enlightenment ever since humans walked the Earth. Regulation might solve problems for a few but it is not the perfect solution to many of society’s ills. If social justice, freedom, and relying on scientific findings rather than emotional or even deeply embedded racial bigotry is the goal then legalization is the only humane answer.

Some say look at all the tax dollars that can be generated from regulating cannabis. I answer: Does society really want to tax the crap out of its sickest members? The average cannabis treatment costs the patient about $10,000-20,000/year. This does not include the hundreds of dollars and hassle of getting a card.  If cannabis was legal and un-taxed the cost would probably be around $100-500/year. This money would go straight to the growers instead of leaches.

Earth Control: Power, Resistance and Deviance Within a Resource Empire Panopticon

UPDATE…Here is what NASA says about Why we study earth?

EARTH CONTROL:

POWER, RESISTANCE, AND DEVIANCE

WITHIN A RESOURCE EMPIRE PANOPTICON

By

Jason Thompson

Bachelor of Arts

Winona State University

2005

A paper submitted in partial fulfillment

of the requirements for the

Master of Arts Degree in Journalism and Media Studies

Hank Greenspun School of Journalism and Media Studies

Greenspun College of Urban Affairs

Graduate College

University of Nevada, Las Vegas

May 8, 2015

Paper Submission for: Information Access and Control in an Age of Big Data

Topic: Insights regarding government and corporate surveillance.

http://www.aejmc.org/home/2014/11/jmcq-special-issue/

ABSTRACT

This research examined historical accounts regarding the origins and substance of electronic surveillance. A broad definition of surveillance was adapted since having control of resources both human and other was the impetus of the surveillance state according to some science and technology historians. The results indicated historical creation stories were diverse. In light of this new framework media articles were selected and analyzed that covered some aspect of the “Resource Empire Panopticon” i.e., Earth– for better or worse. Areas of conflict within this panopticon context include those groups either in the developed or developing countries. More specifically how one group controls what is to be remembered (prospect of future environmental catastrophe) and what is to be forgotten (responsibility for historic emissions). Another area of longstanding contention is between international versus isolationist ideals as described by social historians and was also mentioned in Joseph Aldy’s policy paper. The major goal of this work is to describe how the international community (led by the developed nations) used surveillance and monitoring in order to exert its power on the sovereign (developing) countries as well as subverting the best interest of its own people in favor of the will of a technological elite.

THE ORIGINS & INTENTIONS OF ELECTRONIC SURVEILLANCE

The main goal of this paper is to further explore and build upon historical narratives regarding the origins and the metaphysics of “electronic surveillance” (Turchetti and Roberts, 2014, p. 147). This was accomplished by asking but probably not fully addressing the questions: What is it? How does it work? What is it made of? What did it cost? Who paid for it? Who and where are the watchers that control it? Where, when, why, and how was it created? What is its reason for being? What does it want? How can those under the gaze resist or dismantle it or part of it? This was done by re-framing the topic of surveillance using a broad multi-disciplinary approach. The border containing this subject was expanded with a broad yet in-depth historical analysis as a main method. The secondary sources provided multiple narratives that described the creation of the surveillance state. These stories or historical lenses were overlaid on top of primary historical artefacts such as official records and speeches that were utilized during this research. Resource Empire Panopticon examples from the media were categorized within this modified framework of surveillance that resulted from the historical analysis. Articles from the media were sampled via a convenience sample since this research is largely exploratory. They were analyzed because they highlighted some facet of the panopticon effect theory which percolated up from the news coverage of the transnational resource monitoring in action.

Some examples represented positive aspects for society while others were negative (according to one’s perspective). These examples from the media were categorized as describing those in power, those resisting the power but still abiding by the rules, and deviants working directly against the system and its core rules and values. The justification for this work was captured by another researcher when

he said, “Critical and historically aware analyses of the origins of modern environmental monitoring technologies are essential to understanding why as well as how such technologies have been adopted, and to ground informed decisions on their usage: as Melvin Kranzberg famously put it, technology is neither good nor bad, but neither is it neutral” (Turchetti and Roberts, 2014, p. 11).

Foucault would have agreed as well “where modern theories tend to see knowledge and truth to be neutral, objective, universal, or vehicles of progress and emancipation, Foucault analyzes them as integral components of power and domination” (Best, 1991, Chapter 2). Foucault expounded the belief that “individuals are controlled by institutions. Contemporary society is characterized by the lack of free will on the part of individuals because institutions of knowledge, norms, and values, are in place to categorize and control humans” (Boundless). This way of thinking i.e. technology can’t be neutral resists some of the ideas put forth in Joseph Aldy’s paper sponsored by the Resources for the Future organization that has ties to John Podesta who is one of President Obama’s chief advisors. For example under the section entitled “Credibility of Information” it says “national governments have effectively delegated such surveillance responsibilities to international organizations, and these entities can play important roles by generating “neutral” information” (Aldy, 2014, p. 4). It also stated,

International climate negotiations occur within a system of international relations in which sovereigns maintain significant discretion of action and enjoy substantial deference in their policy decisions. This poses a challenge to designing multilateral agreements and institutions, especially in contexts characterized by strong free-riding incentives such as global climate change. An extensive literature on international agreements shows that information-creating mechanisms enhance the transparency of and can support participation and compliance in such agreements (Aldy, 2014, p. 1).

Finding a way to make surveillance as neutral as possible while instilling resource control compliance will be a future challenge considering well documented past imperialistic imbalances (Pat

rick, 2008).

BACKGROUND AND HISTORY

According to Turchetti and Roberts, “surveillance is too often regarded as a discrete activity linked to concrete state aims rather than a more general imperative to understand and control both the earth and its inhabitants

(Turchetti and Roberts, 2014, p. 2). If one added private aims to this indictment Gary T. Marx and many other researchers in the media studies, sociology, and psychology fields are all guilty of framing the topic of surveillance and privacy too narrowly and thereby give themselves the opportunity to miss the big picture. For example Marx defined “new surveillance” (Marx, 2004, p. 20), listed instances of “rulings” favorable to civil liberties and concepts of privacy (p. 32), then highlighted societies “resources to fight back” (p. 33) against intrusions on only one’s “personal data” (p. 33). Consider, “Human communications were—and still are—a miniscule part in this traffic, which includes data from the oceans, the surface and interior of the earth, and the sky” (Turchetti & Roberts, 2014, p. 1). According to some historians “the bifurcation between surveillance as the stereotypical Orwellian challenge to free society and as a set of seemingly innocent scientific practices that have to do with gathering of environmental knowledge draws a moral distinction that obscures common origins” (Turchetti and Roberts, 2014, p. 2). Though worse than that the topic of gathering non-human environmental signals is excluded from most academic discussions (this author is aware) at least in the surveillance and privacy context. This is a problem because it negates discussing the origins and original reasons for being considering electronic surveillance. Historians are now focusing on this topic and how “surveillance networks owe their existence, or at least sophistication and extent, to the dramatic expansion of funding to the geosciences after 1945” (Turchetti and Roberts, 2014, p. 2).

If the world ever decided to curtail surveillance it could re-examine the United Nations General Assembly’s “Treaty on Principles Governing the Activities of States in the Exploration and Use of Outer Space

.” This treaty drafted by a few superpowers took away rights countries traditionally had regarding the space above its country. This information could be helpful for those trying to switch the surveillance and drone attacks off (or a certain part of it) or somehow control the information going out from above or missiles coming in–instead of just giving the program a name change as a result of political pressure and public opinion (Clymer, 2003).

Marx said, “There are no permanent victories in the liberties business” (Marx, 2004, p. 34). This may be true but there are ways individuals can level the playing field namely by becoming more proficient in surveillance literacy. As he concluded “vigilance, knowledge, and wisdom are likely to help” (p. 34) in this area–so this paper is an effort to further these ideals. Although in order for society to win more permanent “rights” (Marx, 2004, p. 34) it must dismantle or defund the sections of surveillance it deems undesirable at the root source. Otherwise it will continue to receive paper promises that melt when the storm clouds of strife unleash fear. To do this one must first know thy enemy and then decide if it is an enemy, friend or something in between.

METHOD

Historical analysis from science and social historians was used to construct a framework that assessed the pros and cons of surveillance on society by looking at environmental monitoring anecdotes from the media. For example what is the nature of surveillance? Where did it come from? Why is it here? Why are Universities here

? Who created it, when, and for what purpose? This is an area of study which is important because without knowing what something is one won’t be able to read it properly. This process of understanding from an elemental level is an essential step in order for a citizen to decipher the black box of surveillance (although resistance at this point is getting to be almost futile).

In order to achieve this objective areas of study include surveillance history and its reason for being. The first step is describing the power of surveillance and where it originates from. This paper calls this source the “Resource Empire Panopitcon” based on the book by Turchetti and Roberts. Surveillance was then judged in this paper as either good or bad for society with help from a book by Stewart Patrick called “The Best Laid Plans: The Origins of American Multilateralism and the Dawn of the Cold War” whose history also set the hegemonic framework theme. This process was done by citing specific instances of resource surveillance discussed in the media which highlighted the impact, potential, and relationships associated with the power, resistance, and deviance of surveillance.

THEORY

Katrin Kaschadt’s article entitled Jeremy Bentham__The Penitentiary Panopticon or Inspection House in the book [CTRL] Space: Rhetorics of Surveillance from Bentham to Big Brother describes surveillance architecture designs and theories that came to Jeremy Bentham who was from the upper class of British society around 1787. This was during enlightenment times when society thought it could solve all of its problems with reason (Kaschadt, 2002, p. 116). The panopticon

was a way of obtaining power, power of mind over mind, in a quantity hitherto without example” (p. 114). This gaze came from a God-like” (p. 115) “single, superior authority” (p. 114) in the center who could keep tabs on everyone yet no one watched him. This situation describes the Resource Empire Panopticon since the superpowers or developed nations have traditionally kept some of its knowledge obtained from electronic surveillance top secret. This theory was applied to many other areas for example Bentham’s blueprint with a “central viewing position” was transferred to other prison systems, theaters, and zoos around the world (Kaschadt, 2002, p. 117).

The present research argues the entire planet has incrementally become a type of prison or panopticon–for better or worse. This inclination is present visually in the Information Awareness Office (IAO) logo that consists of an “all-seeing ‘eye” (p. 119) surveilling an image of the planet Earth with the description “SCIENTIA EST POTENTIA” or knowledge is power. The method and mechanisms for how this takes place is discussed in the science journals as “technology will soon allow the world to be mapped in near-real time and at high resolution…the potential for operational monitoring of the planet” (Butler, 2007, p. 778). This type of interdisciplinary sharing of information is essential for strengthening surveillance literacy.

The mechanisms for monitoring emissions shares a panoptic trait in that once it is created the system is automatic in that not many people are needed to carry out the measurements or collect the signals. Also the watchers contact with the watched is minimal to none. Also no one watches the watchers. Roger Launius

described this aspect in a section entitled Defining and Dealing with the “Watchers (Turchetti and Roberts, 2014, p. 159). He said “Total Information Awareness,’ and its success in Poindexter’s mind ensured that traditional rights of personal privacy ensconced in law in the United States had to be curtailed” (p. 159). At the same time “the answer to ensuring US hegemony in space rests in no small part with the protection of the nation’s satellites and other space-based capabilities while denying the same capability to potential adversaries” (Turchetti and Roberts, 2014, p. 161). This leaves the question “who’s watching the watchers” (p. 165).

POWER

This section casts a gaze back to the center of the “Resource Empire Panopticon” starting with its history. The following quote speaks of the continuity regarding surveillance, “Watching over enemies (political and otherwise) has been an essential feature in the exercise of power since time immemorial” (Turchetti & Roberts, 2014, p. 1). This is true regarding recent history for example,

Both superpowers, especially the US administration, conceived the capacity to monitor the earth within a framework of control through strategic influence, without the need for explicit sovereignty over colonial spaces. This led to the establishment of infrastructures that routed signals from overseas outposts to central homeland units devoted to their analysis. (Turchetti & Roberts, 2014, p. 1).

The discontinuity that ushered in a new age had to do with the hegemonic balance of electronic surveillance power considering developed (colonial) and undeveloped (colonized) countries. For example science historians used “surveillance as the central analytic concept” to “explain how a constellation of disciplines, namely the geosciences, benefited from this research for novel means to

monitor the enemy instigated by the confrontation between superpowers. Disciplines that eventually became imbued with ‘greens’ values—especially through environmental monitoring—flourished within a geopolitical context in which watching over enemy states and alliances was at least as important as the ‘assault on the unknown” (Turchetti and Roberts, 2014, p. 2&3). So whereas Turchetti and Roberts framed the enemies of surveillance as being colonial subjects of the superpowers Gary T. Marx said “personal information” in general was under attack (Marx, 2004, p. 19). This is also the way Edward Snowden frames the fight for example he is protecting the entire internet community not the superpowers against the colonies (traditional or economic).

This next very recent historical source by Joseph Aldy called The Crucial Role of Policy Surveillance in International Climate Policy represents the leading edge of this surveillance system decades in the making. This source represents the main “who” associated with surveillance. The Non-government organization (NGO) who published this report is called Resources for the Future. They have ties to President Obama’s administration. Joseph Aldy is a professor at Harvard Kennedy School the same place where the chief negotiator for climate change teaches. The one main thing these democrats have in common with the Bush dynasty and Henry Kissinger is they all belong to the Council on Foreign Relations (CFR). The CFR has been for international causes pitting it against isolationists as far back as World War I (Patrick, 2008, p. 25). Another source of the power is elite scientists which Eisenhower warned against in his “Farewell Speech” which was also mentioned by Turchetti & Roberts in the conclusion of their book. The next step after identifying the power or source of the Panopticon gaze is to find out what kind of behavior it wants to impart upon those being watched.

According to an article in The New York Times the Obama administration cannot pass a binding carbon or climate treaty (Broder, 2009, p. A10). Since this is the case an agreement that is non-

binding is the next best thing. This is because the power of the panopticon will be able to change resistant and deviant behaviors– Josheph Aldy explains how:

Schelling (1956) suggests that transparency and publicity of a party’s ex ante pledge and ex post outcome can enhance the credibility of commitments. The “publicity” called for by Schelling can be established by the “information structures” created by the rules of international institutions (Keohane 1998). Transparency mechanisms can facilitate “naming and shaming” and the prospect of adverse reputational consequences for deviating from an agreement may promote compliance (Simmons 1998; Chayes and Chayes 1991). Even without an enforcement mechanism, information-generating institutions may “contain deviance within acceptable levels. (Klabbers 2007, p. 1004)” (Aldy, 2014, p. 3).

The following are all examples from the media that display positive or helpful aspects of the “Resource Empire Panopticon”. First of all, “More than 80 percent of the world’s major oil and gas-producing and mining countries fail to meet ‘satisfactory standards’ for managing their natural resources, according to a report tracking global resource mismanagement and corruption” (Volcovici, 2013). The reporter cited a, “New York-based Revenue Watch Institute” which released its first Resource Governance Index…, which scores and ranks 58 countries according to the level of transparency and accountability in their oil, gas and mining sectors (Volcovici, 2013). One could see how this type of information could empower the public at large.

Monitoring the air for pollution protects the public and the power of the panopticon is to thank in this situation. For example, “The Air Quality System (AQS) is EPA’s repository of ambient air quality data. AQS stores data from over 10,000 monitors, 5000 of which are currently active. As discussed in more detail elsewhere, State, Local and Tribal agencies collect the data and submit it to AQS on a periodic basis (EPA, 2015). The electronic surveillance system can also monitor for climate change for

example, NASA’s uncrewed Global Hawk research aircraft is in the western Pacific region on a mission to track changes in the upper atmosphere and help researchers understand how these changes affect Earth’s climate(www.reportingclimatescience.com, 2014). Also this technology has been promoted by the media “in the international fight against poaching, eyes in the sky could make all the difference (Qiu, 2014). Since “drones already act as wildlife police, scoping out poachers in Kenya and Nepal. With a $5 million grant from Google, the World Wildlife Fund (WWF) has launched aerial surveillance in remote areas in Africa and Asia, where endangered species like elephants and rhinoceroses are most vulnerable to illegal trafficking (Qiu, 2014).

RESISTANCE

Michel Foucault said “where there is power, there is resistance” and “these points of resistance are present everywhere in the power network” (Foucault, 1990, p. 95). This part of the paper focuses on these resistance points pertaining to resource and emissions monitoring. The Foucaultian approach puts practices of remembering and forgetting in the context of power relations, focusing not only on what is remembered and forgotten, but how, by whom, and with what effects” (Medina, 2011, page 9).One source of resistance which is making the signing of a binding international carbon treaty so far impossible is those low lying island nations and developed countries that want the developed nations to remember its past sins and make larger carbon cuts (Gillis & Davenport, 2014, p. 10). The mechanism for appeasing this barrier whose members said, “Don’t tell us you can’t cut emissions, you can’t give money, while you bask in the rich way of life you enjoy now” (p. 10) is to give them money.

Around 2009 another source of resistance for the internationalists who wanted to control carbon emissions surfaced when “countries such as China publically state[d] that concessions for an

internationally verifiable monitoring system are a direct infringement on their national sovereignty…[therefore it was decided] an agreement that focuses on emissions monitoring might be easier to implement than an arrangement based on binding emissions reductions.”

This idea surfaced in another media report when “Mr. Obama gave a veiled warning that satellite technology could be used for what is likely to be termed “eco-spying” to ensure countries honoured their commitments. ‘We can actually monitor what takes place through satellite imagery and so forth, so I think we are going to have a pretty good idea of what people are doing,’ he said. He added that the deal could be successful if ‘there is a sense of moral obligation and information sharing so that people can see who’s serious and who’s not”. (Gray, 2009).

According to some media reports, “The prospect of political resistance to greenhouse gas tracking prompted an elite government advisory panel known as “JASON” to recommend developing a new CO2-monitoring satellite to determine whether countries comply with international climate pacts. While current technology can track yearly emissions directly from ‘cooperative countries’ with a 20 percent margin of error, only a satellite can keep tabs on nations that resist such monitoring, JASON scientists warned (Morello & ClimateWire, 2012).

Another story highlights resistance by the Chinese when “Mr. Obama, whose speech included remarks that appeared pointe at China’s resistance to mechanisms for monitoring emissions reductions, met privately with Prime Minister Wen Jiabao afterward. But Mr. Wen did not attend two smaller, impromptu meetings during the day that Mr. Obama and United States officials conducted with the leaders of other world powers, an apparent snub that infuriated administration officials and their European counterparts.” (Broder, 2009, p. A10).

Apparently China no longer harbors concerns regarding its carbon dioxide data. This is probably because it now has its own carbon monitoring satellite. Although when it was a major issue this confrontation was framed visually in an infographic entitled Highlights of the Climate Accord under the section “THE ACCORD ON: Monitoring it said, “Developing countries will monitor emissions and compile data domestically…with provisions for international consultations and analysis.” Next to this under the section entitled “WHO WON OR LOST?” it said “The industrialized world insisted on international monitoring. China, in particular, was resistant.” (Broder, 2009, p. A10).

The source of the resistance is common sense. Chinese Premier Wen Jiabao urged the world to understand the fact that development remained the top priority of developing countries” (www.chinaview.cn, 2009; Lomborg, 2013). He also stated, “Some say that we should not get bogged down by history (that industrialized countries contributed the majority of greenhouse gas emissions in past centuries). But this is a fact that we must face” (www.chinaview.cn, 2009). This fact is not being faced according to some media reports for example, “The top American envoy to climate talks here flatly rejected arguments Wednesday by diplomats from poor lands that the United States owes a debt to developing nations for decades of American emissions that contributed to global warming” (Revkin & Zeller, 2009).

DEVIANCE

It is important to remember that “Michel Foucault believed that torture had been phased out from modern society due to the dispersion of power; there was no need any more for the wrath of the state on a deviant individual” (Boundless). Instead organizations use other means in order to elicit the

type of behavior it wants from individuals. This final section highlights examples of deviance that emerged as a result of increased surveillance i.e., “information-creating mechanisms” (Aldy, 2014, p.1). In conflict theory, deviant behaviors are actions that do not go along with the social institutions” (Boundless). In the “Resource Empire Panopticon” being skeptical of the greenhouse effect theory earns one the title of a deviant. Therefore “the institution’s ability to change norms, wealth, or status comes into conflict with the individual. The legal rights of poor folks might be ignored, while the middle class side with the elites rather than the poor. Conflict theory is based upon the view that the fundamental causes of crime are the social and economic forces operating within society” (Boundless).

CONCLUSION

When it comes to defining surveillance keeping it broad is the best approach for example “In this light we might fruitfully think of environmental surveillance as a means to detect signals, packets of data that could be unpacked to reveal intelligence with value in multiple contexts” (Turchetti & Roberts, 2014, p. 2). From this starting point future research might want to further track surveillance creation narratives in order to predict future electronic surveilance implications. Furthermore the panoptic theory is versatile and can also be applied to future resource situations. For example the State Water Resources Control Board of California is asking its citizens to watch for water wasters.

Although sensors and remote connections are giving organizations more control over the water supply low tech surveillance in the form of a neighborhood watch via visual collections and then reporting through an online form, app, or telephone number coming from citizens is currently being utilized as well. Low tech carbon dioxide monitoring solutions might help developing countries feel more comfortable giving up its data (Kinver, 2013). Also paying the people in the community to monitor its own forest would provide jobs and a possibly a sense of wanting to protect the forest.

According to Foucault, we now live in “[…] a society of surveillance, which locks people into the mechanism of the panoptic machine that they themselves maintain” (Kaschadt, 2002, p. 119). This is what Dwight D. Eisenhower was warning about in his “Farewell Address” of January 17, 1961 (Turchetti and Roberts, 2014, p. 165). This speech is known for its “warning about the potency of the military-industrial complex, which he said had the ‘potential for the disastrous rise of misplaced power” (p. 165). According to Launius “what has mostly been forgotten is Eisenhower’s equally strong warning about the ‘danger that public policy itself become the captive of a scientific-technological elite” (p. 165). The world is now at a turning point and surveillance literacy for the masses is going to be important if they are going to become self-aware and able to influence policy in its best interest.

REFERENCES

Aldy, J. E. (2014). The crucial role of policy surveillance in international climate policy. Climatic Change, 126(3-4), 279-292.

Bamford, James. (2013). Building America’s secret surveillance state. Reuters. Retrieved http://blogs.reuters.com/great-debate/2013/06/10/building-americas-secret-surveillance-state/

Best, S., & Kellner, D. (1991). Postmodern theory: Critical interrogations. Guilford Press.

Boundless. “The Conflict Perspective on Deviance.” Boundless Sociology. Boundless, 14 Nov. 2014. Retrieved 02 May. 2015 from https://www.boundless.com/sociology/textbooks/boundless-sociology-textbook/deviance-social-control-and-crime-7/the-conflict-perspective-on-deviance-63/the-conflict-perspective-on-deviance-377-8262/

Broder, J. M. (2009, Dec 19). 5 nations forge pact on climate; goals go unmet. New York Times Retrieved from http://ezproxy.library.unlv.edu/login?url=http://search.proquest.com/docview/434242589 ?ac countid=3611

Butler, D. (2007). The Planetary Panopticon. Nature, (450)6, p. 778-780.

Bush, V. (1945). Science: The endless frontier. Transactions of the Kansas Academy of Science (1903), p. 231-264.

Campbell, D. (2002). Inside Echelon: The History, Structure, and Function of the Global Surveillance System Known as Echelon. (LEVIN, pp. 158-169.)

Clymer, A. (2003). Aftereffects: Privacy; new name of pentagon data sweep focuses on terror.

New York Times, http://www.nytimes.com/2003/05/21/world/aftereffects-privacy-new- name-of-pentagon-data-sweep-focuses-on-terror.html?src=pm

EPA. (2015)Technology Transfer Network (TTN) Air Quality System (AQS) retrieved 5/8/2015:

http://www.epa.gov/ttn/airs/airsaqs/

Foucault, M. (1990). The history of sexuality Vol. 1, An Introduction (New York: Vintage, 1990).

Frohne, U., Levin, T. Y., & Weibel, P. (Eds.). (2002). CTRL [SPACE]: Rhetorics of Surveillance from Bentham to Big Brother.

Gillis, J. & Davenport, C. (2014, September, 21). Push for new pact on climate change is plagued by divide of wealth. The New York Times, P. 10.

Harris, S. (2010). The watchers: The rise of America’s surveillance state. Penguin.

Kaschadt, K. (2002). Jeremy Bentham__ the penitentiary panopticon or inspection house. (Levin, p. 114-119).

Kinver, M. (2013). Communities can monitor forests ‘as well as experts’. http://www.bbc.com/news/science-environment-24713215

Lomborg, B. (2013). The poor need cheap fossil fuels. The New York Times, http://www.nytimes.com/2013/12/04/opinion/the-poor-need-cheap-fossil-fuels.html?_r=0

Medina, J. (2011). Toward a Foucaultian epistemology of resistance: counter-memory, epistemic friction, and guerrilla pluralism. Foucault Studies, (12), 9-35.

Morello, L & ClimateWire. (2012) If Salt Lake City’s CO2 emissions can be monitored, can China’s? Scientific American. http://www.scientificamerican.com/article/if-salt-lake- citys-co2-emissions-can-be-monitored-can-chinas/

National Security Study Memorandum, NSSM 200, Implications of Worldwide Population Growth For U.S. Security and Overseas Interests (THE KISSINGER REPORT) December 10, 1974

Patrick, S. (2008). The Best Laid Plans: The Origins of American Multilateralism and the Dawn of the Cold War. Rowman & Littlefield Publishers.

Qiu, L. (2014). Watch: Can drones help save wildlife around the world? http://news.nationalgeographic.com/news/2014/11/141114-drones-wildlife-poaching- animals-conservation/

Revkin, A & Zeller, T. (2009). U.S. negotiator dismisses reparations for climate. The New York

Times, http://www.nytimes.com/2009/12/10/science/earth/10climate.html

Stoler, A. L. (1995). Race and the education of desire: Foucault’s history of sexuality and the colonial order of things. Duke University Press.

Turchetti, S., & Roberts, P. (2014). The Surveillance Imperative: Geosciences During the Cold War and Beyond. Palgrave Macmillan.

Volcovici, V. (2013). Many countries badly mismanage oil, mining resources: study. http://www.reuters.com/article/2013/05/15/us-resources-management- idUSBRE94E05V20130515

www.chinaview.cn. (2009). Premier Wen defends China’s development rights.

http://news.xinhuanet.com/english/2009-12/27/content_12711466.htm

www.reportingclimatescience.com (2014). NASA uses drones to scan for signs of climate change. http://www.reportingclimatescience.com/news-stories/article/nasa-uses-drone- to-scan-for-signs-of-climate-change.htmlScreenshot 2016-05-25 at 5.31.46 PM

Warmer Today or in Viking’s Time?

http://www.sci-news.com/archaeology/science-viking-presence-arctic-canada-02349.html

http://news.nationalgeographic.com/2016/03/160331-viking-discovery-north-america-canada-archaeology/

f Grass and Grapes
In Greenlanders’ Saga Leif Eriksson is said to have named ‘Vinland’ for the rich southern land because of grapes he found growing there. This makes it unlikely that L’Anse aux Meadows could have been the Vinland of the sagas, because grapes have never grown in Newfoundland. Their current northern range is northern Nova Scotia, New Brunswick, and southern Quebec. Even in the warmer climate of one thousand years ago they never grew in Newfoundland or eastern Quebec. However, grapes do grow in the same sort of climate as butternut trees, and one of the most surprising discoveries at L’Anse aux Meadows were butternuts and pieces of carved butternut wood. Ocean currents could not have carried butternuts or driftwood from these areas to northern Newfoundland, and the nuts are too large to have been carried by birds. They must have been brought back to L’Anse aux Meadows by Vikings explorers, and those same explorers would have also encountered wild grapes.

The Iron Mountain Report

Here is an interesting coincidence from the Iron Mountain Report.

http://www.stopthecrime.net/docs/Report_from_Iron_Mountain.pdf

Credibility, in fact, lies at the heart of the problem of developing a political substitute for war. This is where the space-race proposals, in many ways so well suited as economic substitutes for war, fall short. The most ambitious and unrealistic space project cannot of itself generate a believable external menace. It has been hotly argued that such a menace would offer the “last, best hope of peace,” etc., by uniting mankind against the danger of destruction by “creatures” from other planets or from outer space. Experiments have been proposed to test the credibility of an out-of-our-world invasion threat; it is possible that a few of the more difficult-to-explain “flying saucer” incidents of recent years were in fact early experiments of this kind. If so, they could hardly have been judged encouraging. We anticipate no difficulties in making a “need” for a giant super space program credible for economic purposes, even were there not ample precedent; extending it, for political purposes, to include features unfortunately associated with science fiction would obviously be a more dubious undertaking. Nevertheless, an effective political substitute for war would require “alternate enemies,” some of which might seem equally farfetched in the context of the current war system. It may be, for instance, that gross pollution of the environment can eventually replace the possibility of mass destruction by nuclear weapons as the principal apparent threat to the survival of the species. Poisoning of the air, and of the principal sources of food and water supply, is already well advanced, and at first glance would seem promising in this respect; it constitutes a threat that can be dealt with only through social organization and political power. But from present indications it will be a generation to a generation and a half before environmental pollution, however severe, will be sufficiently menacing, on a global scale, to offer a possible basis for a solution. It is true that the rate of pollution could be increased selectively for this purpose; in fact, the mere modifying of existing programs for the deterrence of pollution could speed up the process enough to make the threat credible much sooner. But the pollution problem has been so widely publicized in recent years that it seems highly improbably that a program of deliberate environ- mental poisoning could be implemented in a politically acceptable manner. However unlikely some of the possible alternate enemies we have mentioned may seem, we must emphasize that one must be found, of credible quality and magnitude, if a transition to peace is ever to come about without social disintegration. It is more probably, in our judgement, that such a threat will have to be invented, rather than developed from unknown conditions. For this 52 reason, we believe further speculation about its putative nature ill-advised in this context. Since there is considerable doubt, in our minds, that any viable political surrogate can be devised, we are reluctant to compromise, by premature discussion, any possible option that may eventually lie open to our government