Skip to main content Accessibility help
×
Hostname: page-component-586b7cd67f-2plfb Total loading time: 0 Render date: 2024-11-25T14:26:52.551Z Has data issue: false hasContentIssue false

10 - No fences make good neighbors: the development of the US-Canadian security community, 1871–1940

Published online by Cambridge University Press:  30 October 2009

Emanuel Adler
Affiliation:
Hebrew University of Jerusalem
Michael Barnett
Affiliation:
University of Wisconsin, Madison
Get access

Summary

The durable peace between the United States and Canada has nowadays become an afterthought. It is simply unimaginable to most observers, except perhaps in satire, that the two North American countries could fight a war over any issue that is likely to arise. As 5,000 miles (and 125 years) of undefended border attest, neither side regards the other as even a potential military threat, despite the fact that interstate anarchy supposedly makes war an ever-present possibility. Conflicts materialize and are resolved without the expectation that they might lead to violence. The United States and Canada thus constitute a striking example of a pluralistic security community (PSC).

How and why did this PSC arise? I will argue that it was produced by two enduring and causally related processes which together promoted a sense of community and the assurance that the US and Canada would settle their disputes through pacific means. First and foremost, after the Civil War, the United States and Canada demilitarized their border. Initially, this process was based on domestic political incentives, not warm sentiment. Prior to the Cold War, Americans were generally unenthusiastic about military spending and large peacetime armies because they feared domestic repression and adventurism. American policymakers also believed that force was unnecessary and unsuitable for effecting their desired annexation of Canada. For its part, Canada disarmed after 1867, when it achieved quasiautonomy and could pass the defense buck to Britain and spend its money more effectively elsewhere.

Type
Chapter
Information
Security Communities , pp. 333 - 367
Publisher: Cambridge University Press
Print publication year: 1998

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×