Transphobia+1AC

**The United States federal government should abolish gendered surveillance in United States airports. **
====And, these surveillance policies are reflective of a broader system of domination and destruction that attempts to root out difference at places like the airport. The “Secure Flight” program relies on matching consumer’s genders to the FBI’s terrorist watch list. This is part of a broader “war on terror” turned “war on difference”—the result is an unending form of discursive and material transphobic violence—rejecting this securitization is a necessary to disrupt the bureaucratic definition of identity ==== Paisley, Professor of Political Science at Brooklyn University, Tara, Ph.D. student at Birbeck University of London, “Securitizing Gender: Identity, Biometrics, and Transgender Bodies at the Airport,” social research Vol. 78 : No. 2 : Summer 2011, http://sites.middlebury.edu/soan191/files/2013/08/currahsecuritizinggender.pdf, pg. 8, AR—AD: 7/13/15 Implemented in 2009,. . . the U.S. airport.
 * Currah and Mulqueen 11 **


 * And, gender norms replicates transphobic violence and promotes essentialist understandings of gender. **
 * Magnet and Rodgers 12 **(Shoshana, assistant professor in the Institute of Women’s Studies at the University of Ottawa, and Tara, assistant professor of Women’s Studies at the University of Maryland, 2012, “Stripping for the State,” p. 111, //Feminist Media Studies, // Volume 12) **JS-D **
 * Backscatter and millimeter . . . bodies as suspect. **

====And, the result is the construction of a dominant security discourse that allows the state to wage wars in the name of isolating clear borders and binaries. ==== Redden and Terry 11  – Stephanie, professor of political science at Carleton University, Jillian, Department of International Relations at London School of Economics and Political Science, “The End of the Line: Feminist Understandings of Resistance to Full Body Scanning Technology,” International Feminist Journal of Politics Jun2013, Vol. 15 Issue 2, p234-253. 20p. http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=88353443&site=ehost-live xx AD – 7/16/15; AV
 * This literature is . . . neutrality of technologies. **

====<span style="font-family: Arial,sans-serif;">And, our security discourse is more than bankrupt, it is broken. The Secure Flight Program exists not as a policy of safety for the homeland, rather, a failed policy from the war on gender. You should prefer a politics of affective assemblage building that refuses to make gender a form of static ontological being that which epitomizes the self/other divide that relies on a constitutive other to securitize against. ==== <span style="font-family: Arial,sans-serif; font-size: 14pt;">Currah and Mulqueen 11 <span style="font-family: Arial,sans-serif; font-size: 10pt;">—Paisley, Professor of Political Science at Brooklyn University, Tara, Ph.D. student at Birbeck University of London, “Securitizing Gender: Identity, Biometrics, and Transgender Bodies at the Airport,” social research Vol. 78 : No. 2 : Summer 2011, http://sites.middlebury.edu/soan191/files/2013/08/currahsecuritizinggender.pdf, pg. 17-21, AR—AD: 7/16/15
 * <span style="font-family: Arial,sans-serif; font-size: 10pt;">What complicates the . . . says or does. **

<span style="font-family: Arial,sans-serif; font-size: 8pt;">NTAC is certainly not the only organization to advocate for the rights of legitimate transgender citizens by distinguishing those citizens from the figure of the threatening terrorist. The Transgender Law Center in San Francisco has also released security alerts and recommendations aimed at transgender-identified communities, including one statement jointly issued with NCTE, in which the two organizations criticize new security measures like the DHS Advisory and Real ID Act. They note that although these measures were originally conceived in response to “legitimate security concerns” regarding false documentation used by terrorists, they ultimately create undue burdens for transgender individuals who seek to “legitimately acquire or change identification documents” (Transgender Law Center 2005: 1).
 * <span style="font-family: Arial,sans-serif; font-size: 14pt;">And another policy won’t save us—rather we must reject dominant policy constructions that enshrine binary genders as the condition for securitized violence. **
 * <span style="font-family: Arial,sans-serif; font-size: 14pt;">Beauchamp 09 **<span style="font-family: Arial,sans-serif; font-size: 8pt;">—Toby Beauchamp, Ph.D. assistant professor of gender and women’s studies at the University of Illinois, Urbana Champaign, “Artful Concealment and Strategic Visibility: Transgender Bodies and U.S. State Surveillance After 9/11,” 2009, Surveillance & Society 6(4): 356-366, http://www.surveillance-and-society.org, ISSN: 1477-7487, pg. 363-364, AR—AD: 7/17/15
 * <span style="font-family: Arial,sans-serif; font-size: 8pt;">Like NTAC's concern . . . of other bodies. **

<span style="font-family: Arial,sans-serif;">And, the state uses airport security to divide the population into desirable and undesirable, and turns the human body into information.
<span style="font-family: Arial,sans-serif; font-size: 14pt;">Wilcox, Lecturer in Gender Studies, 15 <span style="font-family: Arial,sans-serif; font-size: 8pt;">[Lauren B. Wilcox, University Lecturer in Gender Studies and phD in Political Science,”Bodies of Violence: Theorizing Embodied Subjects in International Relations”, 105-108, 2015]E.E. <span style="font-family: Arial,sans-serif;">At the same. . . and Mulqueen 2011).

<span style="font-family: Arial,sans-serif;">Applauding objectivity makes institutional violence and personal indifference worse
<span style="font-family: Arial,sans-serif; font-size: 14pt;">Stone-Mediatore ‘7 <span style="font-family: Arial,sans-serif; font-size: 10pt;">(Shari, PhD and professor of philosophy at Ohio Wesleyan University, “Challenging Academic Norms: An Epistemology for Feminist and Multicultural Classrooms,” //<span style="font-family: Arial,sans-serif; font-size: 10pt;">NWSA Journal //<span style="font-family: Arial,sans-serif; font-size: 10pt;">, volume 19, p. 57-58) JS-D
 * <span style="font-family: Arial,sans-serif; font-size: 10pt;">Even if objectivity . . . troubled by violence. **

<span style="font-family: Arial,sans-serif;">And government policies can’t stop transphobia; liberation is better than civil rights at making permanent, positive social change
<span style="font-family: Arial,sans-serif; font-size: 14pt;">Ettinger and Lee ‘6 <span style="font-family: Arial,sans-serif; font-size: 6pt;">( <span style="font-family: Arial,sans-serif; font-size: 10pt;">Mordecai Cohen, MA and adjunct faculty at California Institute of Integral Studies, and Alexander, FTM trans person and founder of Transgender, Gender Variant, and Intersex Alternative Sentence Project, lefturn.com, http://www.leftturn.org/lessons-left-radical-transgender-movement) **<span style="font-family: Arial,sans-serif; font-size: 10pt;">JS-D **
 * <span style="font-family: Arial,sans-serif; font-size: 10pt;">These changes in . . . binary still remains. **

Err on the side of probability to check psychological bias toward long improbable internal link chains – we cite studies
Yudkowsky 8 – cofounder of Machine Intelligence Research Institute [Eliezer, research fellow at MIRI, “Cognitive Biases Potentially Affecting Judgment of Global Risks,” Machine Intelligence Research Institute, pp. 7-8, 2008, [], Accessed 6/29/15] The conjunction fallacy **. . .** unpoetic-sounding prophecy.

<span style="font-family: Arial,sans-serif;">And when the body becomes a ‘password’, it must be true or false – such systems do not account for personal negotiation

 * <span style="font-family: Arial,sans-serif; font-size: 14pt;">Aas, criminology professor, 06 **<span style="font-family: Arial,sans-serif; font-size: 10pt;">[Katja Franko Aas, //<span style="font-family: Arial,sans-serif; font-size: 10pt;">‘The body does not lie’: Identity, risk and trust //<span style="font-family: Arial,sans-serif; font-size: 10pt;">in technoculture, Crime Media Culture, 2006]E.E.
 * <span style="font-family: Arial,sans-serif; font-size: 10pt;">A vital aspect . . . time and space: **

Overwhelming public commitment to consequentialist ethics means you should prioritize deontology
Hurley 11 [Paul, Professor of Philosophy at Claremont McKenna College, “Beyond Consequentialism”, Oxford University Press, 6-10-11, Pg. 1-3] Morality requires agents **. . .** non-consequentialist commitments.

<span style="font-family: Arial,sans-serif;">And, binaries ignore personal truth, defining identity through biological appearance

 * <span style="font-family: Arial,sans-serif; font-size: 14pt;">Aas, criminology professor, 06 **<span style="font-family: Arial,sans-serif; font-size: 8pt;">[Katja Franko Aas, //<span style="font-family: Arial,sans-serif; font-size: 8pt;">‘The body does not lie’: Identity, risk and trust //<span style="font-family: Arial,sans-serif; font-size: 8pt;">in technoculture, Crime Media Culture, 2006]E.E.
 * <span style="font-family: Arial,sans-serif; font-size: 10pt;">Instead of seeing . . . a power relation. **