TWiki > LawNetSoc > TheSirenTriangle (r15 vs. r14) TWiki webs:
Main | TWiki | Sandbox?
LawNetSoc . { Changes | Index | Search | Go } Log In or Register

The Siren Triangle

The government, the media, and the defense industry

By Elliott Ash

Table of Contents

Abstract

The Pentagon's military analyst program is just the latest and most barefaced example of the poorly understood iron triangle comprising government agencies, defense contractors, and media conglomerates. This note traces the mutualistic coevolution of the defense industry and the mass media. Statutes and decisions on propaganda, fraud, false advertising, defense spending, and state secrets are explicated and applied to the industries; conduct. The reciprocal relationships between defense and media laws and the behavior of the defense and media industries are examined. Possible avenues for breaking the triangle are discussed, including greater transparency in defense matters and preservation of competition in media markets.

Body

First shalt thou reach the Sirens; they the hearts
Enchant of all who on their coast arrive.
The wretch, who unforewarn'd approaching, hears
The Sirens' voice, his wife and little- ones
Ne'er fly to gratulate his glad return,
But him the Sirens sitting in the meads
Charm with mellifluous song, while all around
The bones accumulated lie of men
Now putrid, and the skins mould'ring away.

-The Odyssey of Homer

Introduction

Decide whether to organize these sections by line, by point, or by time

The Siren Triangle

Media and Government

Government and Defense Contractors

Defense Contractors and Media

Nexus: The Pentagon's Military Analyst Program

Results

The horrible side effects and counterproductivity of weapons technology. (Kolko 2007 at 18-23) Crimes against humanity: mai lai, abu graib, guantanamo.

Discussion

From a legal perspective, the Siren Triangle is a complicated problem. The tangle of corrupt laws that enable and feed the triangle are numerous, and they aren't all in the most obvious places. From a sociological perspective, the problem is infinitely more complicated: Not only do you have to promulgate the regulatory changes just discussed; you have to make fundamental structural changes in how the government and society function in order to get them passed into law and followed correctly.

But perhaps the so-called "sociological" perspective is not meaningful distinct from the "legal" perspective. Instead, figuring out realistic measures that could help cure the Siren Triangle is just taking a broader legal perspective; the difference being that you recognize that all functions of government and society are fair game for reform. In dealing with monstrous, inertial problems like the Siren Triangle, it might serve to contemplate what the endogenous or exogenous variables are. On a short time frame, one might say that "law" is just an exogenous variable. So the problem-solver works around the law. On a longer time frame, law becomes an endogenous variable to the problem because the actor can take deliberate measures to repeal and revise the law. As the problem's time horizon increases, more variables become endogenous and thus instruments toward solving the problem, things like wealth, technology, prejudice, corporate incumbency, etc. In the very long run, even such apparent monoliths as constitutional provisions and even the human genetic code become endogenous.

The lesson of this discussion, I think, is that dealing with the Siren Triangle requires both short-term and long-term strategies. The short-term should deal with more realistic regulations such as closing the revolving door, prosecuting violations of existing propaganda laws.

More long-term solutions would be increasing transparency.

Very long-term solutions might involve reversing supreme court holdings on executive privilege, the commander-in-chief power, government transparency, freedom of the press, and restoring the requirement that Congress declare war before the executive engages in armed conflict against enemy states. Even more long term, we can relieve pedagogical limitations and even genetic limitations on human cognition and morality that curse human democracies to problems like the Siren Triangle.

Information Transmission

Lieberson (2002) demonstrates that transmission of aesthetic preferences has its own internal logic. The transmission of knowledge has its own internal logic. Some of that is based on human psychology: Some messages are more salient than others as a result of our brain structure (Boyer 2001). Humans appear to prefer truth to falsity, and also the appearance of truth over the appearance of falsity. What other neural mechanisms guide capture and transfer of information? Whatever they are, these evolved mechanisms for information processing are manipulable. Individuals can manipulate others to do their bidding (Dawkins 1982). This process will inevitably result if an entity 1) would benefit from such manipulation, and 2) it has the communicative tools to successfully undertake the manipulation. Humans do this to each other on a daily basis, with varying results. But the entity in this model doesn't have to be a human being. Collective organizations have their own emergent self-interest, and if they have the tools to manipulate humans to their benefit, they will do so. Governments and corporations are prime examples of this phenomenon. Congress will benefit if Americans think that there are no agency costs between citizen and representative--thus, "We are the party of the people." Media corporations will benefit via higher ratings if viewers think they are in danger and that that corporation's media product will give good information about avoiding that danger. This analysis puts the lie to the standard establishmentarian refrain that advertisements provide "information" about products. That is self-evidently false. Advertisements are disinformation--they are manipulation of the brains of the viewer. The upshot is that the actors in the Siren Triangle--the government, the media, and defense contractors--are actively and deliberately manipulating the public sphere to facilitate the production and reproduction of messages that strengthen the Siren Triangle.

The other problem is that while the benefits of the Siren Triangle are fully internalized by the three entities, the costs are distributed over the whole American electorate and, more crucially, citizens the world over. As far as the American citizenry goes, the coordination costs required to organize an effective populist campaign against the components of the Siren Triangle are preventative. But while Americans at least can vote with their ballots and their eyeballs, the rest of the world is out of luck. The costs that are imposed upon other countries are irremediable; neither the US government, the media, nor the defense contractors have to answer to the complaints of foreign citizens.

Scholars who complain of quid pro quo between politicians and defense contractors frame the relationship as that between buyer and seller: The defense contractor buys the vote. Empirical evidence shows that this is the wrong explanation. Instead, defense contractors support those candidates with preexisting ideological predispositions in favor of defense spending. The funding and support helps those candidates ascend to political power, and primaries and elections are just the final processes. Once defense-contractor-friendly individuals are in office, those predispositions are reproduced through path-dependent processes--specifically, those politicians hire and support new politicians with similar views on the defense industry. This process might explain why defense contractors donate to both democrats and republicans in electoral races. A better empirical test would involve examination of defense-contractor donations during primary season; the hypothesis being that the primary candidate that most supports defense spending will be more likely to gain the nomination.

An analogue is the broken promotion process in the intelligence community elucidated by Kolko (2007). Blindly optimistic interpreters of intelligence were promoted by politicians who refused to see failure in Vietnam.

Military Technology and Intellectual Property

Military technology is a peculiar category of intellectual property. When embodied in a weapon, it does not create produce net utility. Military technology schemes:

SourceQuotes?

Bibliography

AuthorTitleupYearSubjectSummaryLink
Barstow, David   NYTimes article on Military Analyst Program DOD 2008 and GAO investigate MAP 2008 MAP MAP     http://www.nytimes.com/2008/04/20/washington/20generals.html?adxnnl=1&adxnnlx=1221408048-NbbOOtV/zAdLhqxAlnmTlw&pagewanted=printhttp://www.nytimes.com/2008/05/24/washington/24generals.html
NYTimes Cypher, James 2009 Military Budget The Iron Triangle Bill Passes in Senate 2008 2002 g     http://www.nytimes.com/2008/04/01/science/01patc.html?8dpc http://www.thirdworldtraveler.com/Militarization_America/Iron_Triangle.html
CBSA Cypher, James Defense Budget Data From Military Keynesianism to Neoliberal Militarism   2007 MC   Military   spending data and tables http://www.csbaonline.org/2006-1/2.DefenseBudget/Topline.shtml http://www.monthlyreview.org/0607jmc.htm
  Sessions, David Defense Industry Daily Onward, TV Soldiers Web Site   2008 C MAP   Follows up on Barstow's MAP scoop http://www.defenseindustrydaily.com http://www.slate.com/id/2189545/
Cypher, James Barstow, David From   Military Keynesianism to Neoliberal Militarism 2007 DOD and GAO investigate MAP   2008   MAP http://www.monthlyreview.org/0607jmc.htm   http://www.nytimes.com/2008/05/24/washington/24generals.html
  NYTimes Germany reduces defense spending 2009 Military Budget Bill Passes in Senate 2004 2008 G g   http://query.nytimes.com/gst/fullpage.html?res=9B00EFDC1330F937A25752C0A9629C8B63&sec=&spon=&partner=permalink&exprod=permalink http://www.nytimes.com/2008/04/01/science/01patc.html?8dpc
Laveele,   Tara Globalizing the iron triangle Germany reduces defense spending 2003 2004 GC G Describes   iron triangle, bureaucracy models; shows how globalization changes these models   http://query.nytimes.com/gst/fullpage.html?res=9B00EFDC1330F937A25752C0A9629C8B63&sec=&spon=&partner=permalink&exprod=permalink
  Inside the Black Budget (NYTimes) Defense Industry Daily Web Site 2008   G C Information   about secret military programs http://www.nytimes.com/2008/04/01/science/01patc.html?8dpc http://www.defenseindustrydaily.com
Kellner,   David Military Correspondents and propaganda Inside the Black Budget (NYTimes) 2008 GM G Comparing media coverage of the Information about secret military programs gulf wars, mentions MAP in footnote http://www.ijoc.org/ojs/index.php/ijoc/article/viewFile/266/150 http://www.nytimes.com/2008/04/01/science/01patc.html?8dpc
Barstow,   David NYTimes Secret article on Military Analyst Program Programs Symbols 2008 MAP G   Information about secret military programs http://www.nytimes.com/2008/04/20/washington/20generals.html?adxnnl=1&adxnnlx=1221408048-NbbOOtV/zAdLhqxAlnmTlw&pagewanted=print http://www.thespacereview.com/article/1033/1
Sessions, CBSA David Onward, TV Soldiers Defense Budget Data 2008   MAP MC Follows up on Barstow's MAP Military spending data and tables scoop http://www.slate.com/id/2189545/ http://www.csbaonline.org/2006-1/2.DefenseBudget/Topline.shtml
Wayne, Leslie Merle, Renae Pentagon Brass and Recruiting Uncler Sam Defense Contractor Gold 2004 MC more News piece on the revolving door between Pentagon and defense contractors http://query.nytimes.com/gst/fullpage.html?res=9F07E2DC1538F93AA15755C0A9629C8B63&sec=&spon=&pagewanted=print  
Merle, Renae Wayne, Leslie Recruiting Uncler Sam Pentagon Brass and Defense Contractor Gold 2004 MC News more piece on the revolving door between Pentagon and defense contractors   http://query.nytimes.com/gst/fullpage.html?res=9F07E2DC1538F93AA15755C0A9629C8B63&sec=&spon=&pagewanted=print
  Kellner, David Secret Military Programs Symbols Correspondents and propaganda 2008 G GM Information about secret military programs Comparing media coverage of the gulf wars, mentions MAP in footnote http://www.thespacereview.com/article/1033/1 http://www.ijoc.org/ojs/index.php/ijoc/article/viewFile/266/150
Cypher, James Laveele, Tara The Iron Triangle Globalizing the iron triangle 2002 2003   GC   Describes iron triangle, bureaucracy models; shows how globalization changes these models http://www.thirdworldtraveler.com/Militarization_America/Iron_Triangle.html  
Homer Kellner, David The Odyssey Persian Gulf TV War ? 1992   GMC Sirens poem, Bk. 12 Describes media coverage of gulf war I; discussion of defense/media conglomerates http://www.bibliomania.com/0/2/223/1101/frameset.html  
Kellner, Homer David The Persian Odyssey Gulf TV War 1992   GMC   Describes media coverage of Sirens poem, Bk. 12 gulf war I; discussion of defense/media conglomerates   http://www.bibliomania.com/0/2/223/1101/frameset.html
Wikipedia "Ada"     C Article on "Ada" programming language, used in defense industry computers http://en.wikipedia.org/wiki/Ada_programming_language

Subject Legend:

 
Attachment sortActionSizeDateWhoComment
else BaseThin.cssmanage 0.2 K 30 Sep 2008 - 23:29 ElliottAsh  
else BaseThin.tmplmanage 0.2 K 30 Sep 2008 - 23:43 ElliottAsh  



Topic TheSirenTriangle . { View | History | Side-by-side | r41 < r40 < r39 < r38 < r37 | More }

Revision r15 - 03 Oct 2008 - 00:19 - ElliottAsh
Revision r14 - 02 Oct 2008 - 19:22 - ElliottAsh

This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.