Suffragette Surveillance

March 12, 2014 § Leave a comment

Suffragettes-UK-04

Suffragettes Evelyn Manesta and Lillian Forrester, Manchester Prison, 1913 (image: BBC, National Archives)

Efforts to extend suffrage to women throughout the 19th century in several English-speaking countries began bearing fruit around the turn of the 20th century. New Zealand granted women the vote in 1893, Australia nine years later; the 19th Amendment passed in both the U.S. House and Senate in 1919, following several individual state initiatives. Numerous societies were formed and conventions held to that end as momentum grew, meeting various successes and defeats, including both the resistance of those, mostly men, determined to maintain the status quo, as well as the support of other prominent men such as John Stuart Mill. Efforts were mostly peaceful. In 1897, British women organized into these advocacy groups, known as ‘suffragists,’ coalesced to form the National Union of Women’s Suffrage Societies (NUWSS). The government’s failure to acknowledge their activities, however, led to radicalization on the part of certain women: the movement arrived at a turning point in 1903, when Emmeline Pankhurst and her daughters Christabel and Sylvia formed the Women’s Social and Political Union (WSPU), vowing to pursue more aggressive measures to force the issue. The Daily Mail first referred to them as ‘suffragettes‘ in 1906, coining the term to differentiate them from their milder and less militant counterparts, the ‘suffragists.’ Their motto, “Deeds not words,” indicated their intention to engage in direct actions of civil disobedience, including vocal protests, disruption of political meetings, women chaining themselves to railings and tax resistance, later evolving into the destruction of property, arson and the occasional smashing of windows (“Phyllis North, whom I identified as Joyce Lock, otherwise Olive Wharry … unlawfully and maliciously did commit damages upon the windows of the Criccieth Post office, the property of H.M. The King, doing damage to the amount of £11-8-0…”)—the ensuing arrests garnering more attention to their cause.

Suffragettes-UK-03

Suffragettes on hunger strike are threatened with force-feeding (image: National Archives)

The relation between Scotland Yard and these women—a game of “cat and mouse” between the police and these political subversives, considered to be a threat to the political order—was significant for several reasons, not the least of which was giving rise to an early instance of state photographic surveillance (covert photography), as reported by the BBC’s Dominic Casciani. Several Suffragettes also engaged in hunger strikes, continuing the civil disobedience while inside prison, adding to an atmosphere of “[i]ndignation and passionate protest,” during which some underwent repeated force-feedings. In 1871, prisons had begun photographing inmates for identification purposes, and this relatively young technology was put to use for surreptitiously monitoring the women. Scotland Yard—which bought its first camera for the occasion—employed a Mr. A. Barrett, who, unknown to them, “sat quietly in a van, snapping away as the women walked around Holloway Prison’s yards.” At the same time, detectives compiled ID lists of suspects to help suppress the more dramatic and militant actions.

Suffragettes Scotland Yard

ID sheets of Suffragettes were prepared for Scotland Yard officers (image: BBC, National Archives)

Suffragettes-UK-01

Manchester Suffragette Evelyn Manesta refuses to pose for the camera—note the arm (image: BBC, National Archives)

Suffragettes refused to cooperate in other ways, including resisting attempts to have them pose for photography sessions, requiring coercion—and trickery—on the part of authorities. In Manchester Prison, a guard was needed to restrain known “window-smasher” Evelyn Manesta from behind for the camera, resulting in the awkward image of a woman standing with a man’s arm draped around her neck. Upon official instructions, the problematic appendage was then artfully erased from the image by the photographer, the sanitized version duly reproduced for circulation.

Suffragettes-UK-02-clip

Scotland Yard memo on two Suffragettes—note the missing arm on Manesta, to the right (image: National Archives)

Are Animals Conscious? I Dunno—Are We?

March 8, 2014 § 2 Comments

A study published by University of Lethbridge Department of Psychology professor Jennifer Mather in 2008 proposed, in summary, that “cephalopod molluscs may have a form of primary consciousness”—that they are “heavily dependent on learning in response to both visual and tactile cues,” “may have domain generality and form simple concepts” and seem “aware of their position, both within themselves and in larger space, including having a working memory of foraging areas in the recent past.” A 2013 study by Mather and Michael J. Kuba summarized that the cephalopod brain “does not just have centralization of the molluscan ganglia but also contains lobes with ‘higher order’ functions such as storage of learned information.” The decentralized nervous system, “particularly in the arms of octopuses, results in decision making at many levels”; the cephalopod “is first and foremost a learning animal, using the display system for deception, having spatial memory, personalities, and motor play. They represent an alternative model to the vertebrates for the evolution of complex brains and high intelligence, which has as yet been only partly explored.”

At first glance, the question of animal consciousness struck me as an odd one; assuming they are not lifeless automatons, or robots programmed to perform a certain limited set of functions, how in fact could they not be conscious in some way, shape or form? This depends, of course, on how we define it, but the idea of “consciousness” as it’s normally understood may be a relic of outdated philosophical thinking, and will have to be revised in light of more rigorous scientific research. Katherine Harmon Courage asks an appropriate question in the Scientific American online blog: “should we humans really be surprised that ‘consciousness’ probably does not only exist in us?” The correct question, it seems to me, is not whether other animals are conscious, but rather what types of consciousness they exhibit—and what are the factors that limit the “consciousness” of both humans and other animals, genetic or otherwise. To pretend that humans (Homo sapiens—”wise man”) are the unique repository of this quality, this “privileged state of subjective awareness,” seems more revelatory of the need to set ourselves apart from the rest of nature rather than an objective inquiry into the matter. The Cambridge Declaration on Consciousness, signed in July 2012 [PDF], states that the research on consciousness is “rapidly evolving,” the accumulation of new data requiring “a periodic reevaluation of previously held preconceptions in this field.” It states further that “neural circuits supporting behavioral/electrophysiological states of attentiveness, sleep and decision making appear to have arisen in evolution as early as the invertebrate radiation, being evident in insects and cephalopod mollusks (e.g., octopus),” citing evidence that “human and non-human animal emotional feelings arise from homologous subcortical brain networks”:

The absence of a neocortex does not appear to preclude an organism from experiencing affective states. Convergent evidence indicates that non-human animals have the neuroanatomical, neurochemical, and neurophysiological substrates of conscious states along with the capacity to exhibit intentional behaviors. Consequently, the weight of evidence indicates that humans are not unique in possessing the neurological substrates that generate consciousness. Non-human animals, including all mammals and birds, and many other creatures, including octopuses, also possess these neurological substrates.

Christof Koch, chief scientific officer of the Allen Institute of Brain Science, stated in 2012 that “[e]xactly how organized brain matter gives rise to images and sounds, lust and hate, memories, dreams and plans, remains unclear.” I suppose one could carry out the mental experiment of an extra-terrestrial being visiting our fair planet sometime in the near or distant future (assuming we haven’t ruined it by then), and asking the same question about us: “are they conscious?”


.

Update (March 11): Related to questions of consciousness, a recent article from New Scientist (reprinted in the Washington Post) addresses the question of whether or not certain invertebrates feel pain in some way comparable to humans, and consequently if they are capable of suffering. Researcher and professor Robert Elwood emphasizes that direct comparisons with humans are not always appropriate; denying that crabs, for instance, feel pain because they don’t have the same biology as us “is like denying they can see because they don’t have a visual cortex.” Again, this type of reasoning would depend on narrowly defining these capacities, such as seeing, as seeing like a human—that is, there would be no other possible way of seeing, “seeing” being a uniquely human property or behavior. The article also makes the distinction between learned behaviors—arising as a result of experiencing pain, remembering it and acting in order to avoid it—and simple reflexes, which may be unconscious and automatic responses to stimuli. Experiments with crustaceans revealed “prolonged and complicated behavior, which clearly involves the central nervous system,” as opposed to insects, suggesting that insects have had no evolutionary need or constraints to experience pain in the same way.

Importantly, the article qualifies suffering as a subjective experience, and therefore “private to each individual, leaving us only with educated guesses” as to how it is actually lived—the implications being that there is ultimately no way of fully understanding how another organism suffers, except by way of observation and experimentation. One difficulty arising from this, it seems to me, is that certain results/behaviors can be wrongly interpreted as “learned,” or conscious, when they are in fact reflexive, and vice versa.

The United States condemns, blah, blah…

March 3, 2014 § Leave a comment

Crimea has a complicated history, we are told—a peninsula repeatedly subject to the machinations of outside powers—and those who believed “the forces of Western-style democracy had prevailed over Yanukovych’s Kremlin-led repression” were bound to be frustrated. Russia’s exports of oil and natural gas, on which several countries in the region are partly dependent, surely go some way in providing leverage. Putting aside the fact that “Western-style democracy” is undefined here, we could question whether or not it is actually a good thing—and whether or not we indeed do have something called “democracy” in the West, beyond a “useful rhetorical line,” and if so, what shape it is in (some would say pretty bad). We could consider what Thomas Carothers, State Department legal advisor under Ronald Reagan, wrote regarding the particular conception of democracy among U.S. government planners, who envisage it “as something like an off-on switch in which the holding of elections and the coming to power of an elected government was the crucial transition from off to on,” where formal institutions are privileged over substance (see Carothers, In the Name of Democracy: U.S. Policy Toward Latin America in the Reagan Years, 1991):

The institutions of U.S. democracy are equated with the ideas and principles behind them. Thus, for example, the idea of a representative government has become identified with a three-part government consisting of executive, legislative, and judiciary branches with the former two elective and the third not. The U.S. version of democracy has come to be thought of by Americans not merely as one of many possible versions, but the very essence of democracy itself. As a result, when the United States sets about to try to promote democracy in a foreign country, it tends not to think about how the general ideas and principles of democracy might take form in that society but to assume that the other country should devote itself to establishing the institutional configuration the United States associates with democracy. 

tank Sochi mascots Russia intervention Crimea

Furry friends mean well! (image: globalvoicesonline.org)

As with most conflicts, we have been subjected to a barrage of propaganda from both sides, some announcing a reemergence of the Cold War, some networks cheering the feisty freedom fighters of Euromaidan, slinging their rocks at the Russian Goliath, while Kremlin outlets like RT (Russia Today) would have you believe that President Putin just wants everybody to get along, as he orders his Black Sea fleet at Sevastopol to join in the humanitarian intervention underway in Crimea, thereby protecting defenseless ethnic Russians from the hordes of raving brutes roaming the streets… The usual jingoist loudmouths and foreign policy “intellectuals,” who have a talent for not noticing when their own country commits some awful atrocity, have suddenly discovered the evils of military intervention, this time the wrong flavor; severe, doctrinaire Marxists have uncovered the imperialist, neoliberal plot fomenting revolt to usher in another phony “color revolution.” It is true that the recent uprising has had its share of unsavory characters (as well as pseudo-fascist groups), if we can believe the reports, but it is typically the most aggressive and violent elements who tend to seize opportunities like this—and on whom television cameras and photographers tend to focus their attention—to the detriment of the rest of the population, which may have legitimate grievances. It is also true that anyone who orders troops into an area should have to explain himself.

We were also told that funds from the U.S., funneled through Non-Governmental Organizations (NGOs) such as USAID and the National Endowment for Democracy (NED), may have contributed to the political crisis by supporting various political opposition groups and front organisations, as well as promoting the usual teams of “experts” and businessmen who are “developing a vision” for Ukraine, one slogan at a time. This would be nothing new, of course, as the U.S. has since the 1950s worked to extend its influence abroad by funding and promoting various political and cultural activities, propagating values and ideas which further its interests, both overtly and covertly. Shaping perceptions through propaganda has been another component of that broader effort, Voice of America (VOA) and Radio Free Europe/Radio Liberty (RFE/RL) being obvious examples; RFE/RL is broadcast presently from its headquarters in Prague to 21 countries in 28 languages, including 14 affiliates in Iraq, 17 in Afghanistan, 55 in Serbia, 43 in Kosovo and 16 in Ukraine. It would indeed be surprising if the U.S. weren’t trying to influence the politics of a country like Ukraine, as such has been the norm throughout the post-WWII era. As the U.S. government wished to conduct certain anti-Communist activities covertly, these radios initially operated as projects of ostensibly independent committees—cover organisations—to conceal the extent of government involvement. RFE was initially a project of the National Committee for a Free Europe (NCFE—later the Free Europe Committee), a corporation established in 1949, mostly funded and directed by the Office of Policy Coordination (OPC) within the Central Intelligence Agency (CIA); RL the vehicle of the non-profit organization American Committee for Liberation of the Peoples of Russia, Inc. (AMCOMLIB—later the Radio Liberty Committee), a “front” based in New York City used by the CIA as part of its Project QKACTIVE [PDF].

State Department Policy Planning Staff Director George Kennan drafted a 30 April 1948 memo [PDF] to the National Security Council outlining his ideas for establishing a policy for what he called “organized political warfare.” Political warfare took two possible forms—overt and covert. Viewing it as “the logical application of Clausewitz’s doctrine in time of peace,” he broadly defined it as “the employment of all the means at a nation’s command, short of war, to achieve its national objectives,” entailing “such overt actions as political alliances, economic measures (as ERP), and ‘white’ propaganda to such covert operations as clandestine support of ‘friendly’ foreign elements, ‘black’ psychological warfare and even encouragement of underground resistance in hostile states.” Kennan claimed that U.S. planners had been “handicapped” by the notion of “a basic difference between peace and war,” a conception of war as “a sort of sporting context outside of all political context,” rather than recognizing a broader struggle which continued both “in and out of war.” Several projects were proposed to support the activities of Soviet émigrés, among which: the creation of a public organization to sponsor selected refugee committees and “outstanding political refugees,” particularly “enabling selected refugee leaders to keep alive as public figures with access to printing presses and microphones”—these leaders would “act as foci of national hope and revive a sense of purpose among political refugees from the Soviet World,” provide inspiration for “continuing popular resistance,” and “serve as a potential nucleus for all-out liberation movements in the event of war”; sustaining underground movements behind the “Iron Curtain” through “remote and deeply concealed official control of clandestine operations,” with funds channeled through private organizations acting as intermediaries; support for indigenous anti-Communist elements within Soviet countries, again though private intermediaries; and preventive “direct action” in non-Soviet countries, such as anti-sabotage activities. Similarly, Soviet expert Robert F. Kelley recognized that Russian political refugees represented “a tremendous weapon of political warfare” against the Soviet Union in a May 1949 memo [PDF]. He recommended the formation of a central organization to coordinate anti-Communist activities, provided with clandestine radio facilities to broadcast programs into Soviet countries. An October 1949 memo [PDF] outlines the relationship between the CIA/OPC and the NCFE—the purpose of the NCFE being to offer support to the “political and intellectual leaders” who have come to the U.S. “seeking the freedom denied them in their own lands,” with the OPC providing direct policy guidance and funding. These leaders were to be aided in their efforts “to keep alive among their fellow citizens in Europe the ideals of individual and national freedom,” notably through radio, press and other media, as well as establishing a network with other “like-minded European leaders” in the U.S. and abroad.

By 1951, a “political center” of Russian émigrés based in West Germany was being established in view of organizing radio programs and publications to be directed at the Soviet Union, as well as political activities and a research institute, outlined in a memo [PDF] from OPC Deputy Director (Plans) Frank Wisner. The overall objective of the Radio Liberty broadcasts, according to a March 1952 OPC policy paper [PDF], was “to deepen and widen the gulf between the peoples of the Soviet Union and their Communist rulers”; the broadcasts “should seek to increase … the tensions which exist in the Soviet Union and sow the seeds of dissaffection where it does not now exist,” while encouraging non-cooperation and obstructionism among the population. Of paramount importance was that the broadcasts, emanating from Russian émigrés “who enjoy freedom abroad,” not appear to be the machinations of a foreign power, but the genuine appeals of “fellow countrymen.” Major objectives were the “destruction of the Soviet government’s monopoly of information” and its “monopoly of intellectual education and guidance”; the “destruction of the myth of the inevitable victory of Communism”; touting the superior aspects of Western culture, as well as encouraging defection. Another 1953 memo [PDF] gives similar but more specific guidance and themes. As of 1953, RFE was broadcasting from Munich and Portugal to Soviet satellite countries, while RL also broadcast from Munich. Both RFE and RL were funded and overseen by the CIA until 1971, when they became overt operations; they were merged into RFE/RL, Inc. in 1976. (see document collection at the Wilson Center pertaining to Radio Free Europe and Radio Liberty in the Cold War International History Project)

A June 1953 report to President Eisenhower from the Committee on International Information Activities judged “psychological activities” not separate from the “main body of diplomatic, economic, and military measures by which the United States seeks to achieve its national objectives,” but rather “an ingredient of such measures.” Propaganda was considered “most effective when used as an auxiliary to create a climate of opinion in which national policy objectives can be most readily accomplished,” its objective “seeking to arouse in [foreign peoples] an understanding and a sympathy for the kind of world order which the United States and other free nations seek to achieve.” These examples illustrate some principles still active today; “exporting democracy” is but one tool in a large palette of measures at the state’s disposal, which complement and reinforce each other. Washington, however, as the leading global military interventionist since World War II—with ample wreckage to prove it—has very few lessons to give on the virtues of restraint and moderation. Over time, though, one lesson has been fairly clear: Only we—and our clients—get to act like hoodlums; everyone else plays by the rules. In that spirit, this March 1 statement from Secretary of State John Kerry expressing his disapproval of the Russian incursion into Crimea—to be considered in light of not-so-distant past events—will impress you with its brazenness, if you don’t die laughing:

The United States condemns the Russian Federation’s invasion and occupation of Ukrainian territory, and its violation of Ukrainian sovereignty and territorial integrity in full contravention of Russia’s obligations under the UN Charter, the Helsinki Final Act, its 1997 military basing agreement with Ukraine, and the 1994 Budapest Memorandum. This action is a threat to the peace and security of Ukraine, and the wider region.


.

Update (March 5): To substantiate claims of U.S. intervention in Ukraine since WWII, as but a small sampling, a 2011 study by professors Richard Breitman and Norman J. W. Goda, Hitler’s Shadow, contains some information on CIA and British MI6 operations involving Ukraine during the post-war era. Under the direction of the National Archives, the Nazi War Crimes and Japanese Imperial Government Records Interagency Working Group (IWG), established by the 1998 Nazi War Crimes Disclosure Act [P.L. 105-246], has declassified around 8 million pages of documents since 1999; these records, particularly from the CIA and the Army Intelligence Command, provided source material for Breitman and Goda’s excellent study [PDF]. Chapter five concentrates on the Allied cooperation with the Organization of Ukrainian Nationalists (OUN) under Stephen Bandera, founded in 1929, and exiled proponents of the underground government, Foreign Representation of the Supreme Ukrainian Liberation Council (ZP/UHVR).

Initially throwing in their lot with the Germans, OUN leaders were housed in occupied Krakow in 1939. Bandera’s deputy Jaroslav Stetsko trained with the Gestapo; Ukrainian battalions under German command moved into East Galacia (western Ukraine)—where 12,000 Jews were murdered in pogroms at the start of the war—and auxiliary police units engaged in “anti-partisan” operations, often targeting Jews. Ukrainians from the auxiliary units and members of the OUN/B joined the ranks of the Ukrainian Insurgent Army (UPA), a guerrilla organization engaging in terror operations, formed to engage “all political and ethnic enemies including Germans and Soviets.” Although its leaders were imprisoned in 1941 by the Germans and eventually held in the Sachsenhausen concentration camp because of their militant nationalist tendencies—threatening the Nazis, who wished to consolidate their control over Ukraine—the OUN/B (Bandera) wing of the OUN was an openly fascist organization whose ideology merged with that of the Nazis: the territory was to be ethnically cleansed of “impure” (non-Ukrainian) elements in the drive for national independence. Stetsko lamented from Lwów in 1941 the “undeniably harmful and hostile role of the Jews, who are helping Moscow to enslave Ukraine,” supporting “the destruction of the Jews and the expedience of bringing German methods of exterminating Jewry to Ukraine…”; historian Yehuda Bauer wrote that Bandera loyalists “killed all the Jews they could find”; OUN/B leader Mykola Lebed proposed in 1943 to “cleanse the entire revolutionary territory of the Polish population,” which they did, killing as many as 10,000 Poles in a single day in 1943; according to Moshe Maltz, Bandera loyalists were “literally hacking Poles to pieces,” whose bodies could be seen “with wires around their necks, floating down the river Bug.” Asserting his authority over the Ukrainian émigré community after his release from Sachsenhausen, Bandera formed the Foreign Section OUN (ZCh/OUN) in 1946, a group which routinely engaged in terror and intimidation against its political opponents; plans envisaged a dictatorship formed in exile which would establish control over Ukraine, once liberated.

Bandera loyalists quickly developed an effective network of recruiting agents among the postwar displaced person camps of the American, British and French zones. Owing to their generally anti-Communist stance, U.S. Army Counterintelligence Corps (CIC) agents used them to identify Soviet spies, who had penetrated UPA refugee groups. The UPA foresaw “an end to communism within the very near future,” hoping to eventually “fight either as front shock troops or gain in their old capacity, as guerilla fighters behind the Russian lines”; Bandersts similarly portrayed themselves as the “heroic Ukrainian resistance against the Nazis and the Communists,” a struggle “misrepresented and maligned” by “Moscow propaganda.” Although the CIA discouraged collaboration with Bandera and his organization, considering him “a political intransigent of great personal ambition” and “politically unacceptable to the US Government,” MI6 saw them as potentially useful for “engaging in clandestine operations in the Soviet Union other than those of a purely intelligence-gathering character,” and assisted in inserting them into western Ukraine to gather intelligence. He was seen as “a professional underground worker with a terrorist background and ruthless notions about the rules of the game. … No better and no worse than others of his kind…” West German intelligence (BND) similarly reported that it was receiving “good [foreign intelligence] reports on the Soviet Ukraine” through its collaboration with him, until his assassination by a Soviet agent in 1959.

The U.S. collaboration with Lebed—considered by the CIC a “well-known sadist and collaborator of the Germans” and a “ruthless operator” by the CIA—was more fruitful; he was personally protected from Soviet extradition requests and resettled in New York, where he was eventually granted U.S. citizenship. Lebed’s group was seen as more “moderate” and stable, of utility for intelligence and resistance activities behind Soviet lines. The CIA—whose authorities were expanded under NSC 10/2 in June 1948 to include covert operations such as “subversion against hostile states, including assistance to underground resistance movements, guerrillas and refugee liberation groups, and support of indigenous anti-communist elements in threatened countries of the free world”—began providing funds, supplies, training and facilities, as well as parachute drops into Ukraine under the codename CARTEL, later AERODYNAMIC:

AERODYNAMIC’s first phase involved infiltration into Ukraine and then exfiltration of CIA-trained Ukrainian agents. By January 1950 the CIA’s arm for the collection of secret intelligence (Office of Special Operations, OSO) and its arm for covert operations (Office of Policy Coordination, OPC) participated. Operations in that year revealed “a well established and secure underground movement” in the Ukraine that was even “larger and more fully developed than previous reports had indicated.” Washington was especially pleased with the high level of UPA training in the Ukraine and its potential for further guerrilla actions, and with “the extraordinary news that … active resistance to the Soviet regime was spreading steadily eastward, out of the former Polish, Greek Catholic provinces. …

Beginning in 1953 AERODYNAMIC began to operate through a Ukrainian study group under Lebed’s leadership in New York under CIA auspices, which collected Ukrainian literature and history and produced Ukrainian nationalist newspapers, bulletins, radio programming, and books for distribution in the Ukraine. In 1956 this group was formally incorporated as the non-profit Prolog Research and Publishing Association. It allowed the CIA to funnel funds as ostensible private donations without taxable footprints. To avoid nosey New York State authorities, the CIA turned Prolog into a for-profit enterprise called Prolog Research Corporation, which ostensibly received private contracts. Under Hrinioch, Prolog maintained a Munich office named the Ukrainische-Gesellschaft für Auslandsstudien, EV. Most publications were created here. The Hrinioch-Lebed organization still existed, but its activities ran entirely through Prolog.

Prolog recruited and paid Ukrainian émigré writers who were generally unaware that they worked in a CIA-controlled operation. Only the six top members of the ZP/UHVR were witting agents. Beginning in 1955, leaflets were dropped over the Ukraine by air and radio broadcasts titled Nova Ukraina were aired in Athens for Ukrainian consumption. These activities gave way to systematic mailing campaigns to Ukraine through Ukrainian contacts in Poland and émigré contacts in Argentina, Australia, Canada, Spain, Sweden, and elsewhere. The newspaper Suchasna Ukrainia (Ukraine Today), information bulletins, a Ukrainian language journal for intellectuals called Suchasnist (The Present), and other publications were sent to libraries, cultural institutions, administrative offices and private individuals in Ukraine. These activities encouraged Ukrainian nationalism, strengthened Ukrainian resistance, and provided an alternative to Soviet media.

In 1957 alone, with CIA support, Prolog broadcast 1,200 radio programs totaling 70 hours per month and distributed 200,000 newspapers and 5,000 pamphlets. In the years following, Prolog distributed books by nationalist Ukrainian writers and poets. One CIA analyst judged that, “some form of nationalist feeling continues to exist [in the Ukraine] and … there is an obligation to support it as a cold war weapon.” The distribution of literature in the Soviet Ukraine continued to the end of the Cold War. …

Prolog’s leaders and agents debriefed travelers on their return and shared information with the CIA. In 1966 alone Prolog personnel had contacts with 227 Soviet citizens. Beginning in 1960 Prolog also employed a CIA-trained Ukrainian spotter named Anatol Kaminsky. He created a net of informants in Europe and the United States made up of Ukrainian émigrés and other Europeans travelling to Ukraine who spoke with Soviet Ukrainians in the USSR or with Soviet Ukrainians travelling in the West. By 1966 Kaminsiky was Prolog’s chief operations officer, while Lebed provided overall management.

In this guise, AERODYNAMIC was one of the most effective CIA operations in approaching disaffected Soviet citizens. In the 1960s Prolog’s leaders provided reports on Ukrainian politics, dissident Ukrainian poets, individuals connected with the KGB as well as identities of KGB officers, Soviet missiles and aircraft in western Ukraine, and a host of other topics. Official Soviet attacks on the ZP/UHVR as Banderists, German collaborators, American agents, and the like were evidence of Prolog’s effectiveness, as were Soviet crackdowns on Ukrainian writers and other dissidents in the mid to late 1960s. By that time Prolog influenced a new Ukrainian generation. By 1969 Ukrainians traveling from the USSR were instructed by dissidents there to take informational materials on Soviet repression in Ukraine only to ZP/UHVR personnel. Travelers to Ukraine even reported seeing ZP/UHVR literature in private homes. Prolog had become in the words of one senior CIA official, the sole “vehicle for CIA’s operations directed at the Ukrainian Soviet Socialist Republic and [its] forty million Ukrainian citizens.” …

Lebed retired in 1975 but remained an adviser and consultant to Prolog and the ZP/UHVR. Roman Kupchinsky, a Ukrainian journalist who was a one-year-old when the war ended, became Prolog’s chief in 1978. In the 1980s AERODYNAMIC’s name was changed to QRDYNAMIC and in the 1980s PDDYNAMIC and then QRPLUMB. In 1977 President Carter’s National Security Adviser Zbigniew Brzezinski helped to expand the program owing to what he called its “impressive dividends” and the “impact on specific audiences in the target area.” In the 1980s Prolog expanded its operations to reach other Soviet nationalities, and in a supreme irony, these included dissident Soviet Jews. With the USSR teetering on the brink of collapse in 1990, QRPLUMB was terminated with a final payout of $1.75 million. Prolog could continue its activities, but it was on its own financially.

—h/t @jeffkaye

Camouflage, Concealment and Deception

March 3, 2014 § Leave a comment

In the late 1950s under the Eisenhower administration, amid the distrust of the Soviet Union, space age competition sparked by the 1957 orbiting of the Sputnik-1 satellite and U.S. military/intelligence bureaucratic rivalries, was born Project CORONA, an aerial reconnaissance program. The program involved the launching into orbit a reconnaissance satellite to acquire imagery intelligence on the Soviet Union—for instance, any evidence of ongoing construction tied to an intercontinental ballistic missile program (ICBM). In other words, after being launched it would take photographs while in orbit and send the images back to Earth, giving Washington access to imagery of large swathes of territory, including remote regions otherwise difficult to access. Efforts originally resided within the Air Force: in 1946, General Curtis E. LeMay envisioned the uses of an orbital satellite; a decade later the Air Force issued General Operational Requirement No. 80 in 1956, establishing guidelines for an advanced reconnaissance satellite, resulting in the Weapon System 117L (WS-117L) program. As part of this program, contractor Lockheed was to develop a “video read-out” satellite, intended to produce scans of photographs which would then be transmitted to Earth (SENTRY/SAMOS); a sub-project developed a film recovery system involving capsules sent to Earth. In 1958, President Eisenhower, particularly fond of clandestine and covert activities, transferred the sub-project, film recovery system, to a team led by CIA Deputy Director (Plans) Richard M. Bissell, Jr., where it could be pursued and funded in secret. CORONA, a joint effort pursued by the Advance Research Projects Agency (ARPA), the Central Intelligence Agency (CIA), the U.S. Air Force, and assisted by private firms, thus continued covertly a program begun by the Air Force, as the true intentions could not be made public [PDF]. This, and subsequent programs, known under the code names LANYARD, ARGON, GRAB, POPPY, GAMBIT, HEXAGON and QUILL, placed several satellites into orbit throughout the 1960s with a series of cameras with varying capabilities, designated KH-1, KH-2, etc. (KH = keyhole)

The activities surrounding the program could not be totally concealed from the public, however, as the firing of launch vehicles into orbit tends to attract attention; its existence therefore not only needed to be kept from adversaries, but also from the domestic population, necessitating the creation of cover stories. Credible explanations were necessary to assuage the curiosity of both the press and the public in order to maintain the “security” of Project CORONA. A 1958 memo [PDF] from Bissell summarizing a plausible cover story explained that the “desired concealment” could only be achieved by “first developing and then giving appropriate circulation to a logical account of the nature and purpose of the series differing from the true purpose.” Such a strategy required that a “minimum amount of information be released,” as denying the press any details “will not only invite a penetration effort on the part of the opposition but create an air of mystery and encourage damaging speculation.” CORONA could be portrayed as an activity serving “a number of legitimate scientific and technical purposes,” which, though possibly “contributing to the development of military technologies,” were not “military in character”; false, or decoy, payloads were to be carried on certain launches “so as to ‘live out’ the cover story.” Any involvement on the part of the intelligence community (IC) was to be concealed.

CORONA satellite imagery CIA Bissel

From a November 5, 1958 memo from CIA Deputy Director (Plans) Richard M. Bissell, Jr. detailing outlines of a cover story for the CORONA project. (image: eisenhower.archives.gov)

Dissociated from the military WS-117L program, CORONA was to be known publicly as “DISCOVERY,” a project devoted to “the development of hardware ultimately usable for either military or peaceful scientific purposes,” investigating technical problems which would “advance the state of the art in pilotless space operation.” Several launches in the DISCOVERY series were to carry “biomedical payloads to test environmental conditions in the upper atmosphere,” contributing to the NASA/ARPA “Man-In-Space” program. A March 1959 memo [PDF] from Bissel summarizing the development of the project restated the need for “security” and secrecy surrounding CORONA: “Specific ostensible missions are being defined for each flight and data will be accumulated ostensibly resulting from the DISCOVERY flights to be furnished on an unclassified basis or with low classification to interested persons.” In 1961, projects CORONA, SAMOS and others were brought under the newly-created National Reconnaissance Program (NRP), consisting of “all satellite and oversight reconnaissance projects,” including “all photographic projects for intelligence, geodesy and mapping purposes, and electronic signal collection projects for electronic signal intelligence and communications intelligence.” These were consolidated under a covert (unacknowledged) organization, the National Reconnaissance Office (NRO)—whose existence was admitted only in 1992—with staff drawn from both the CIA and the Department of Defense (DoD), responsible to the U.S. Intelligence Board. The need for alternative explanations remained: NRO was to develop “suitable cover plans and public information plans, in conjunction with the Assistant Secretary of Defense, Public Affairs, to reduce potential political vulnerability of these programs.” [PDF]

NRO satellite LACROSSE ONYX

“We own the night”: Mission emblem reportedly for August 2000 LACROSSE/ONYX 4 satellite launch (image: collectspace.com)

What’s more natural than to conceal these activities, the disclosure of which would jeopardize vital national security interests? Moreover, they understood that in order to keep a secret from one’s adversaries, the domestic population also had to be kept in the dark, as revealing the truth to the U.S. population would be tantamount to revealing it to the Russians as well—unacceptable. Moving to 1983, President Reagan signed National Security Decision Directive (NSDD) 108 [PDF] on October 12, pronouncing the need to respond to the Soviet doctrine of maskirovka, which called for “camouflage, concealment and deception” surrounding defense-related programs; measures designed to mislead or deceive included “concealment, simulation, diversionary actions and disinformation.” U.S. planners were concerned that the Soviet Union “may be attempting to deceive the West regarding the intent and purpose of basic policies, e.g., arms control.” Clearly, outwitting such perfidy required a more “aggressive and focused” intelligence program, devoting training and resources to countering Soviet attempts at obfuscation. The document was to be handled through TALENT-KEYHOLE control channels—a compartmented security designation to protect material/intelligence obtained from manned aircraft overflights and reconnaissance satellites—meaning the implementation likely included the development of new techniques of satellite surveillance.

These concerns, along with Soviet anti-satellite capabilities, impelled the development of alternative projects, among which LACROSSE (later ONYX), a series of radar imaging reconnaissance satellites, first launched in 1988, and Misty, a series of stealth (difficult to detect) electro-optical reconnaissance satellites, possibly derived from KH-11 Block 3 satellites (codenamed CRYSTAL), first launched in 1990. Misty, guarded under a highly secret and compartmented designation, was designed to be less vulnerable to various types of detection, possibly through the use of an inflatable, “signature suppression” shield (although its existence could not be kept secret from certain amateur satellite enthusiasts). The successor to ONYX—which, according to the leaked FY2013 National Intelligence Program budget [PDF] has been de-orbited—is another radar imaging satellite known under the name TOPAZ, for which five satellites were apparently planned before transitioning to Block 2. Although these systems were developed in response to Cold War necessities, it should not be surprising that they, or their derivatives, can still be of use—after all, the world is still a dangerous place. Among the various other satellite systems within the National Reconnaissance Program budget, we find the expenditures for an Evolved Enhanced CRYSTAL System (costing $1.55 billion for FY2013), and the TOPAZ (1-5) and TOPAZ Block 2 (collectively costing $192.5 million for FY2013):

NRO_GEOINT-budget-satellites-clip

Adieu, Maestro

March 1, 2014 § Leave a comment

Over the years, I’ve grown to love and appreciate flamenco. I had the pleasure of working the sound during a concert by Juan Carmona in Aix-en-Provence years ago, and was impressed by the levels of musicianship, technique, rigor, emotion and physicality which could all coincide in one music, as something rare. Paco helped develop what is known as the “New Flamenco,” incorporating sophisticated harmonic colors from jazz and other musics, while maintaining structures resulting from a long-established tradition—as well as popularizing the cajón from South America, an instrument whose timbre marries perfectly with the acoustic guitar, as if it had always been a part of flamenco. But then, that’s normal; the work of a master, like Paco, or J.S. Bach or Miles Davis, has an inevitable quality to it, a tendency to present itself as the most natural—or the only—way of going about it, so that doing it any other way seems almost inconceivable. There are people who find flamenco too harmonically uniform, or dislike aspects of a certain stereotypical or clichéd idea of it, but these types of complaints often come from those who are simply not listening well enough. Although it has a life of its own, as an oral tradition, flamenco can be more broadly situated among the different styles of music—fusions with local cultures, really—created by communities (in Spain, gitanos) resulting from the voyages of the various Roma, or Romani (still colloquially known by the inaccurate label [or exonym] “Gypsies”) throughout Europe and North Africa—popularized in recent decades by filmmakers such as Tony Gatlif. Like most orally transmitted music, what it may lack in some qualities it compensates for elsewhere, and the various complexities and subtleties can only be noticed when one becomes familiar with it. But this is not something to discuss as much as it is to be heard.

Paco de Lucía (1947 – 2014)

Getting a Piece of the Land

March 1, 2014 § Leave a comment

Human Rights organization Al-Haq has posted a Virtual Field Visit into the E1 Area of the West Bank. It shows, as can only be properly shown with a map, the encroachment of Israeli colonies into the West Bank from East Jerusalem, extended into the Ma’ale Adumim settlement, and following a salient directed east which would eventually bisect the West Bank. The project—although these developments date mostly from the 1990s, when settlement construction was accelerated—has been pursued in one way or another since the creation of the state of Israel, whose early Zionist leaders intended for the population to expand to the Jordan River, as well as possibly into the Sinai. Whatever refugees resulted from the 1948 ethnic cleansing (nakba) would assimilate elsewhere, or “would be crushed,” while most of them “would turn into human dust and the waste of society, and join the most impoverished classes in the Arab countries.” The military occupation resulting from the 1967 war made this realizable, if under less than ideal circumstances, by a military presence enabling Israel to control and partially subdue the population, as well as gaining access to precious water resources in the form of aquifers. A separate entity serving as a Palestinian state has always been rejected by most political leaders, demonstrated by the 1989 peace initiative, in which it is stated clearly that “Israel opposes the establishment of an additional Palestinian state in the Gaza district and in the area between Israel and Jordan” (meaning Jordan is already considered a “Palestinian” state). Despite several peace plans, including in 1971 from Egypt (rejected by the U.S. and Israel) and numerous United Nations resolutions condemning the occupation, the basic strategy of establishing “facts on the ground” while time passes has not changed. The narrator of the video states that “[i]f the plans for construction in E1 continue, Palestine would effectively be divided into three cantons of the upper West Bank, lower West Bank, and Gaza”:

The E1 area stretches across 22,000 dunums of confiscated Palestinian land and also provides a vital passage joining the northern and southern sections of the West Bank, as well as Jerusalem. The closure of this passage would effectively cut the West Bank into two. Construction in the E1 area, combined with restrictions imposed by the Annexation Wall and the Oslo Accords, creates a clear obstacle to a self-sufficient economically viable Palestinian State.

In addition to military, intelligence and economic ties between the U.S. and Israel, ideological affinities exist, possibly because of historical parallels. On 7 September 1783, George Washington addressed a letter to James Duane in which he discussed the fate of the indigenous population inhabiting the land to be gradually taken over by European settlement. Always eloquent, Washington explains how the tribes were to be dispossessed, if the use of force was to be avoided:

As the Country, is large enough to contain us all; and as we are disposed to be kind to them and to partake of their Trade, we will from these considerations and from motives of Compn, draw a veil over what is past and establish a boundary line between them and us beyond which we will endeavor to restrain our People from Hunting or Settling, and within which they shall not come, but for the purposes of Trading, Treating, or other business unexceptionable in its nature. 

In establishing this line, in the first instance, care should be taken neither to yield nor to grasp at too much. But to endeavor to impress the Indians with an idea of the generosity of our disposition to accommodate them, and with the necessity we are under, of providing for our Warriors, our Young People who are growing up, and strangers who are coming from other Countries to live among us. …

At first view, it may seem a little extraneous, when I am called upon to give an opinion upon the terms of a Peace proper to be made with the Indians, that I should go into the formation of New States; but the Settlemt of the Western Country and making a Peace with the Indians are so analogous that there can be no definition of the one without involving considerations of the other. for I repeat it, again, and I am clear in my opinion, that policy and oeconomy point very strongly to the expediency of being upon good terms with the Indians, and the propriety of purchasing their Lands in preference to attempting to drive them by force of arms out of their Country; which as we have already experienced is like driving the Wild Beasts of the Forest which will return us soon as the pursuit is at an end and fall perhaps on those that are left there; when the gradual extension of our Settlements will as certainly cause the Savage as the Wolf to retire; both being beasts of prey tho’ they differ in shape. 

Thomas Jefferson, writing to Henry Dearborn on 28 August 1807, on believing that certain tribes on the western frontier were moving towards hostility against settlers, thought that the Americans “should immediately prepare for war in that quarter, & at the same time redouble our efforts for peace”:

That sufficient stores of arms, ammunition & provision be deposited in convenient places for any expedition which it may be necessary to undertake in that quarter, and for the defence of the posts & settlements there; & that the object of these preparations be openly declared, as well to let the Indians understand the danger they are bringing on themselves, as to lull the suspicion of any other object. …

…that, at the same time, as we have learnt that some tribes are already expressing intentions hostile to the US. we think it proper to apprise them of the ground on which they now stand, & that on which they will stand; for which purpose we make to them this solemn declaration of our unalterable determination; that we wish them to live in peace with all nations as well as with us, and we have no intention ever to strike them or to do them an injury of any sort, unless first attacked or threatened; but that learning that some of them meditate war on us, we too are preparing for war against those, & those only who shall seek it: and that if ever we are constrained to lift the hatchet against any tribe, we will never lay it down till that tribe is exterminated, or driven beyond the Missisipi

Writing to John Adams on 11 June 1812, Jefferson compared and contrasted the characters of various tribes in a discussion on anthropological aspects of the indigenous population:

…that nation, consisting now of about 2000. warriors, & the Creeks of about 3000. are far advanced in civilisation. they have good Cabins, inclosed fields, large herds of cattle & hogs, spin & weave their own clothes of cotton, have smiths & other of the most necessary tradesmen, write & read, are on the increase in numbers, & a branch of the Cherokees is now instituting a regular representative government. some other tribes were advancing in the same line. on those who have made any progress, English seductions will have no effect. but the backward will yeild, & be thrown further back. these will relapse into barbarism & misery, lose numbers by war & want, and we shall be obliged to drive them, with the beasts of the forest into the Stony mountains.

Everything Is a Remix, part XXIV

January 7, 2014 § 2 Comments

Although originality is certainly a virtue, I see a problem with the fact that artists are often accused of “ripping off” other artists by copying and incorporating portions of their songs in their own work. Not only does popular music—and music in general—depend largely on choosing between elements of an already existing repertoire of themes, techniques and ideas, it could be argued that part of the artistry is the ability to cleverly incorporate and rearrange these elements in new ways to create something novel and uniquely personal. After all, if one was required to reinvent the wheel with each song, or book, there would be very few songs to listen to, or books to read, and the distinction between being influenced by someone and outright copying them is not necessarily so clear—the point at which an idea is modified so much that it becomes another distinct idea is not so clear either. If ideas can be “stolen,” then most of us are thieves on some level. Furthermore, music, as one human activity among many, like language, is subject to inherent limitations resulting from our inborn capacities (genetic makeup), and so we should expect to see what are basically unlimited variations on a finite set of abilities—we should not expect humans, in other words, to begin producing “non-human” music. Even though we all have certain inherent capacities which are more or less the same, no one creates in a vacuum, and most human activities are a result of a collaboration, whether direct or indirect. In fact, it could even be said that this blog post itself is a remix of an idea which inspired me in the first place to write on the topic (of course, this apparent similarity is merely a coincidence).

R.L. Burnside Delta Blues 1969

Album “Mississippi Delta Blues – Vol. 2” released by Arhoolie in 1969 (thanks to Stefan Wirz [www.wirz.de])

For example, according to the presentation on R.L. Burnside’s 1969 release on Arhoolie (recorded in 1967), his track “Skinny Woman” is based on Yank Rachell’s 1934 recording of “Gravel Road Woman.” In what might be its earliest recorded form, we can locate a version of “Gravel Road Woman” interpreted by Yank Rachell & Dan Smith. Musically, they are similar in the way that many Delta Blues songs are similar, but not recognizably so, and Burnside simply seems to have used the idea and lyrics of the song as an inspiration for his own creation, most notably the repetitive melodic motif in the bass. Burnside’s song was later covered, with different lyrics, by the Black Keys under the title “Busted,” released in 2002. Moving to Scottish musician Bert Jansch, who was himself influenced by American folk and blues singers, “Blackwater Side,” itself based on the traditional folk song “Down by Blackwaterside,” was released in 1966, three years before Burnside’s album—the song incorporates a motif very similar to Burnside’s “Skinny Woman” but was released before it, raising the question of who exactly influenced whom, if at all. Led Zeppelin, whose tendency to lift the songs of bluesmen/women for their own purposes is well-documented, released their—or rather, Jimmy Page’s—version of the song in 1969 under the title “Black Mountain Side,” thereby barely concealing the origins of the piece.

This all brings us to four observations of interest: 1) Although a song may be “based on” another, it can sound rather different, 2) Unoriginal ideas may still result in good music, 3) When copying, it is not the lack of originality which is insulting, as much as it is the failure to acknowledge where one’s ideas come from, and 4) Even though one may not even be aware of the provenance of one’s ideas, they may still be virtual copies of other ideas.

Yank Rachell & Dan Smith: Gravel Road Woman (released 1934)

Bert Jansch: Blackwater Side (released 1966)

R.L. Burnside: Skinny Woman (released 1969)

Led Zeppelin: Black Mountain Side (released 1969)

The Black Keys: Busted (released 2002)

Aspects of the Snowden Leaks

January 7, 2014 § Leave a comment

Deioces then built these fortifications for himself, and round his own palace; and he commanded the rest of the people to fix their habitations round the fortification; and when all the buildings were completed, he, for the first time, established the following regulations: that no man should be admitted to the king’s presence, but every one should consult him by means of messengers, and that none should be permitted to see him; and, moreover, that it should be accounted indecency for any to laugh or spit before him. He established such ceremony about his own person, for this reason, that those who were his equals, and who were brought up with him, and of no meaner family, nor inferior to him in manly qualities, might not, when they saw him, grieve and conspire against him; but that he might appear to be of a different nature to them who did not see him. When he had established these regulations, and settled himself in the tyranny, he was very severe in the distribution of justice. And the parties contending were obliged to send him their case in writing; and he, having come to a decision on the cases so laid before him, sent them back again. This, then, was his plan in reference to matters of litigation; and all other things were regulated by him; so that, if he received information that any man had injured another, he would presently send for him, and punish him in proportion to his offense; and for this purpose he had spies and eaves-droppers in every part of his dominions.

— Herodotus (fifth century B.C.)

The only rule of which everybody in a totalitarian state may be sure is that the more visible government agencies are, the less power they carry, and the less is known of the existence of an institution, the more powerful it will ultimately turn out to be. According to this rule, the Soviets, recognized by a written constitution as the highest authority of the state, have less power than the Bolshevik party; the Bolshevik party, which recruits its members openly and is recognized as the ruling class, has less power than the secret police. Real power begins where secrecy begins.

— Hannah Arendt, “The Origins of Totalitarianism”

I desire what is good. Therefore, everyone who does not agree with me is a traitor.

— attributed to King George III

One reason it is difficult to approach the global surveillance disclosures and documents resulting from Edward Snowden’s security breach (see one collection here from the National Security Archive) is that the implications are multiple: questions of surveillance, secrecy, technology and national security (however ill-defined that phrase may be), but also the nature of the relation between journalist and source. Critics have predictably assailed the protagonists from several points of view, ranging from the vociferous armchair warriors, curmudgeons and disciplinarians who march in lockstep with the national security state, who would never miss an opportunity to scold a miscreant, to a relatively small number who advocate a more radical strategy of releasing the documents either in their entirety, or at least more widely and rapidly, accusing the journalists of hoarding the information for personal gain. As always, talk is cheap, but it is worth considering some thoughts. It’s impossible to evaluate the success of any strategy without first determining what the goal is, but we can be reasonably sure of two things: Snowden never wished the abolition of the National Security Agency (NSA), or some form of national security surveillance, nor does he seem to doubt the fundamental legitimacy of the U.S. government, or more broadly, the state as an institution. The motivations were clear, and stated at the Sheremetyevo airport on 12 July 2013: “The immoral cannot be made moral through the use of secret law.” Recognizing that laws are not axioms, and that a secret court is not the appropriate venue for evaluating the activities of a global surveillance apparatus which ignores national boundaries, he quoted the 1946 judgement at Nuremberg, that “individuals have international duties which transcend the national obligations of obedience imposed by the individual State”—although the provenance of the second half of the quote is mysterious, the message was that his was an act of civil disobedience.

We can presume one reason why Snowden initially came to Laura Poitras, Barton Gellman and Glenn Greenwald (after fruitless attempts to alert colleagues to his concerns) was that he deemed them trustworthy, and would treat the subject in a manner more or less conforming to his wishes. There are conflicting interests: journalists must ethically weigh their obligations to the public—that is, if they presume to have any—against their obligations to their sources, and although unlikely, it is hypothetically possible that information exists of such importance that exposing it overrides all other other considerations; such is the case in highly repressive states, where the surveillance apparatus exists not only to ostensibly protect citizens, but also to target them. One could argue that the documents should have been immediately dumped, letting the chips fall where they may regardless of the consequences, in order to provide the wider public, and those with the capability to invent privacy and countersurveillance tools, with the knowledge necessary to judge the phenomenon, as well as confront it (something I’ve addressed briefly already); if that is what Snowden had desired, however, he clearly would have done so himself, and furthermore likely done it anonymously—an improbable scenario, as he reportedly refused to “simply dump huge amounts of documents without regard to their content.” This strategy presents other problems as well. A broader question is deciding on who is uniquely qualified to determine what is in the public interest and who is not, what is dangerous to reveal, and to whom—difficult or nearly impossible to answer definitively, but the fact remains that there is a significant amount of trust involved. One version of the dilemma was stated succinctly by Barton Gellman in 2003:

No individual, and no institution, can be trusted to draw the line for us when these two interests collide. That includes the people with the classified stamps. Newspapers cannot appoint themselves as arbiters of national security. Political leaders, on the other hand, cannot be allowed to decide for us what we need to know about their performance. 

Because Greenwald—and possibly other recipients of the documents—must have entered into an agreement with Snowden, in the understanding that the information would be handled and discussed more or less in the way he intended within certain guidelines, criticisms that the documents have not been released fast enough, or en masse and unredacted, should more appropriately be directed at Snowden himself. In other words, the desire to see a document dump is tantamount to wishing someone other than Snowden had leaked them; he clearly did not wish to tear the entire house down, but merely to spark a public debate in order to roll back some of the abuses, bringing certain aspects of the system under control—as did Chelsea Manning in her own way when she sent her files to Wikileaks in 2010. Furthermore, if he hypothetically had wanted to severely undermine the surveillance apparatus, it is not so obvious that an unredacted document dump would have helped accomplish that: as long as there is sufficient funding, secrecy and enforced discipline within the military and intelligence communities, the capacity and talents will likely remain to innovate and rebuild whatever was damaged, the national security state marching on, undeterred. If the past is any guide, the disclosures will prompt a reevaluation of present methods, heavier reliance on private contractors, more compartmentalization and a tightening of control to restrict access to certain classification levels, all bringing aspects of surveillance deeper underground. This may exact a price, paradoxically, on the intelligence apparatus itself, which, as it moves to adjust to these developments by countering suspicious behavior and restricting the internal flow of information, will impede its own ability to operate efficiently. Julian Assange, whose short paper [PDF] on conspiracies bears reading, explains:

The more secretive or unjust an organization is, the more leaks induce fear and paranoia in its leadership and planning coterie. This must result in minimization of efficient internal communications mechanisms (an increase in cognitive “secrecy tax”) and consequent system-wide cognitive decline resulting in decreased ability to hold onto power as the environment demands adaption.

Lest there be any confusion, Snowden declared to Gellman, and there is no reason to doubt his sincerity, that he is “not trying to bring down the NSA,” but rather “working to improve the NSA”; his goal was not “to change society,” but rather to offer it “a chance to determine if it should change itself”—quite a transformation from the person who reportedly declared in 2009 that those leaking sensitive information to the New York Times on supposed covert activities “should be shot.” In any case, these are hardly the words of a reckless subversive, regardless of whatever threatsepithets or scolding commentators may vomit onto the page—”smug, self-righteous, egotistical, disingenuous, megalomaniacal, overwrought”—in order to vilify, smear and pathologize him, a standard technique for marginalizing dissidents and other insufficiently obedient individuals who have left the flock. Conforming to tradition, such calls for the perpetrator to “face the music” are of course largely reserved for the lower echelons, a rule which must be rigorously observed by anyone who wishes to serve the halls of power in Washington, D.C., following the sacred principle, well established, that only the powerless must be held to account for their crimes—for the rest, we must simply ensure “that these mistakes are not repeated,” turning the page being “more important than punishing” those who perpetrated criminal acts “in pursuit of what they thought was right.” Regardless of the morality or the consequences of his decision, the anger directed at him from certain quarters is understandable in light of revelations that he reportedly persuaded colleagues to relinquish their login data to gain access to information, evoking images of the “insider threat” and its accompanying betrayal: the interpretation that imposes itself, then, is that Snowden had in fact decided at some point to spy on the NSA on our behalf.

The motives of public figures such as Snowden and Manning are often subject to misunderstanding. Rather than creating an imaginary persona who champions our pet issues, or a martyr to be sacrificed for our pleasure, it is preferable to approach the issues clear eyed, devoid of comforting illusions. Disappointment in the scope and pace of the spying revelations (although it would be highly dishonest to claim that much of significance has not already been disclosed) betrays a desire to project one’s own wishes onto the protagonist, attributing to him intentions which may not exist; the profound implications of Snowden’s act means that it has been subject to differing interpretations by those who would see what they wanted to see in it. Similarly, instead of imposing a ready-made personality onto her, it is wiser to let Manning define herself in her own words—both in terms of gender and her significant act of conscience: as was made clear by her October 7 letter from Fort Leavenworth, she in no way considered herself a resolute “pacifist,” but rather defined herself as a “transparency activist,” who believes “the public cannot decide what actions and policies are or are not justified if they don’t even know the most rudimentary details about them and their effects.“—appropriately echoing Assange’s claim that “[o]nly revealed injustice can be answered; for man to do anything intelligent he has to know what’s actually going on.” In both cases, the unvarnished reality in no way detracts from the enormous courage and moral clarity required to take such initiatives, sacrificing their comfort and liberty by bringing themselves under the full force and weight of what is certainly one of the most powerful institutions on the planet, particularly vindictive when it aims to set an example. Ultimately, underlying these concerns are two different conceptions of how society should function: whether a meaningful debate should take place enabling the public to consider the legitimacy of policies which affect them—thereby bringing them under some kind of democratic control—or whether decisions should rest solely in the hands of a specialized class of individuals designing policy behind closed doors.

Although it is always much easier to find fault than to offer constructive criticism, it is worth considering some of the complaints. Let us examine some claims by a writer I often find quite cogent and perceptive, whose arguments are characteristic of some of the objections voiced to the style of reporting offered by those in possession of the documents: in October 2013, Arthur Silber characterized their behavior as a “strategic retreat,” a form of damage control wherein the ruling class responds to “excesses” by offering “carefully manicured” morsels of information in order to placate the masses. This carefully orchestrated pageant only “serves the interests of the State and the ruling class.” Insomuch as statecraft involves a high degree of manipulation (often bordering on the pathological), and the degree to which there are shared interests between elements of the corporate media and state power, he is correct, in fact obviously so—these are essentially truisms. It is indeed also possible that “one segment of the ruling class wants them [NSA stories] covered, and finds such coverage to be in its interests,” as various factions of state-corporate power are not always in agreement, and conflict and rivalry occasionally ensue. Elements of the technological corporate sector have been continually forced to respond to evidence of cooperation with and penetration of their services by the NSA, as the disclosures damage their reputations and threaten prospects for profits and market share due to public suspicions that their products have been compromised and are simply not safe to use. Considering that the U.S. political structure responds almost uniquely to corporate interests, this encroachment on the power of the private sector holds the greatest promise of reform, as public concerns regarding privacy and surveillance are likely considered secondary or largely irrelevant, unless the outrage becomes impossible to ignore. It is also true that many Americans, and most of the world, have become accustomed to the numerous ways in which states have capitalized on the fear encapsulated in the events of September 11, 2001 in order to introduce various methods of coercion and control, so much so that they may have become largely unaware of them. Unconvincing, however, is the slightly conspiratorial notion that all reporting is state-sanctioned; on the contrary, there was little choice, as the decision was forced upon them by Snowden. If “elites” had wanted to reveal the extent of NSA surveillance, considering they are supposedly all-powerful, they could have easily done so without the urging of the young infrastructure analyst if it suited their purposes; all the available evidence seems to demonstrate that they were quite happy with it. Indeed, collaboration between corporate elements of the telecommunications industry and the state surveillance apparatus have figured prominently in the NSA’s history, some details of which were revealed in 1975; it was not, and is not, in their interests to be exposed. It is, however, in the interests of major press organs, now that documents have been provided which preclude any plausible deniability, to respond to them, as they cannot simply be ignored. While conspiracies do exist, and they are numerous, this vision of the state-corporate structure as an unassailable monolith with nothing beyond its reach, only permitting initiatives which work in its favor, leaves little room for individual agency and invites apathy, reinforcing elite control rather than challenging it. Determining who benefits from an initiative—cui bono?—is not equivalent to assigning guilt, and the reality is usually more complex. Moreover, arguments and strategies aren’t invalidated simply because members of Congress or reactionary, dubious individuals happen to agree with them.

The belief that the form taken by these revelations is an elite-sanctioned process—that things only happen because powerful people want them to—resembles the curious theory espoused by some, including U.S. Naval War College professor and ex-NSA counterintelligence officer John R. Schindler (who also headed a 2002-2003 interagency intelligence task force on Iraqi WMD), charmingly referred to as “OpSnowden,” that Russian intelligence (namely, the Federal Security Service, FSB) is the dark hand behind these machinations aimed at weakening U.S. power. Although not particularly worth dwelling on, assuming the validity of this narrative, two issues must be separated: whether the leaks are the result of deliberate efforts on the part of the FSB operating through Snowden, or simply a fortuitous event working to their benefit. What is important to understand is that, regardless of whether or not there is substance to any of these suspicions, two facts remain:

  1. No one has of yet questioned the authenticity of any of the documents
  2. Whether the reporting is the result of the actions of a genuinely concerned citizen, the hidden hand of elite moneyed interests, a foreign intelligence agency or the Tooth Fairy is utterly irrelevant, as they are demonstrably in the public interest

Nothing indicates that Greenwald or Snowden hold solidly anarchist convictions, and therefore it would be wrong to expect either one to act in such a manner as to directly undermine or destroy prevailing institutions, which they seem to believe can be rendered viable by some manner of legislative constraint or more effective oversight (which has been extremely limited), spurred by public outrage or otherwise. Such a struggle would be played out largely in the courtroom, where instruments such as the NSA’s mass call-tracking program and the interpretation of Executive Order 12,333 would be challenged on the basis of their Constitutionality. Moreover, it seems misleading and intellectually lazy to present a dichotomy of opposing and mutually exclusive philosophies—reform versus radicalism—in which any manner of gradual reform supposedly precludes any possibility of substantial and fundamental change. There is a point at which systems that have undergone a sufficient amount of change become, in fact, qualitatively different systems. Most repressive institutions throughout history have in fact been eroded—or abolished—progressively over time by the work of countless individuals from within or without, and not as a result of isolated blunt force trauma, which, when applied to institutions as powerful as the U.S. government will only result in swift and violent reprisals; regardless of the methods adopted, those taking that risk should be able to make that decision, and not have it dictated to them. Civil disobedience always exacts a price, but only those actively engaging in it should decide what they’re willing to pay. One can’t help but be surprised at the arrogance of those who demand that those confronting authority take greater risks than they are willing to take themselves; as Silber once so eloquently put it: “If you love martyrs so much, then you be one.”

As for the reprisals, Snowden seems to have found a solution for the moment, so that his exemplar of avoiding immediate punishment might provide a template for others to follow—and that is the point. Another advantage of this model of whistleblowing is that it allows for the possibility of other individuals releasing information from different sources under the cover of these disclosures, as if they were part of the same stream of documents. The relevant question, as always, is: what options exist? While analysis and commentary are useful in the abstract, those operating within concrete political realities are faced with situations where their choices are severely restricted—the very definition of violence, I would argue. One could argue that whatever negative fallout occurs from mass, indiscriminate disclosures is the deserved lot of those engaging in dubious behavior anyway, or ultimately the fault of whatever power initially put them in harm’s way—a curious inversion of that favorite of authoritarian mantras: if you’re doing nothing wrong you’ve got nothing to hide. Radical strategies can backfire if one is unaware of the adversary’s capabilities, and although it is tempting to metaphorically take a crowbar to institutions which seem bent on domination and control, refusal to consider the possible consequences of one’s acts, especially when they involve entities as complex as a global surveillance network which penetrates many facets of human society, merely makes one a monster, not a moral actor.


.
Persian Empire Achaemenid

Persian Empire at 500BC, from The Historical Atlas by William R. Shepherd, 1923 (Perry-Castañeda Library Map Collection, University of Texas Libraries)

Though Herodotus’ account of Median king Deioces might not be historically reliable, assembled as it was from a mixture of legends subject to alterations or possible fabrications, it contains various elements of historical truth and illustrates some relevant principles. Of special interest is the notion of secrecy as an instrument of power: by surrounding himself with the opacity of these “fortifications” and formal ceremony establishing barriers between him and his subjects, the illusion was created of a special and unique status that would justify the right to rule over others. Precisely because most people would not tolerate being arbitrarily governed by someone of equal status and with no particular qualities or claims to authority, such qualities had to be artificially created. A similar logic is displayed by monuments such as the Ming Dynasty’s Forbidden City, whose numerous barriers, gates and strict regulations prohibited access to commoners, or various priesthoods and secret societies, who through rites of passage, exclusive meetings and associated arcana endow what might be rather ordinary proceedings with an aura of mystery. After being overthrown by Cyrus, the Median king’s practice of employing “spies and eaves-droppers”—or “watchers and listeners”—throughout his dominion would be, according to certain texts, adopted by the successor Achaemenid dynasty in the form of inspectors or supervisors, otherwise known as the “king’s eyes” and “ears,” sent to various locations to gauge the conduct of local administrators at the behest of the king. The administrative apparatus of the Achaemenid/Persian empire, which at its height around 500 BC stretched over approximately 8 million km² from present-day Iran and central Asia to the west to cover Egypt, Libya and portions of Greece, managed a sophisticated network of transportation, communications and what appears to have been an informal surveillance system in order to help successfully govern these extensive territories and subdue potential rebellions in remote areas. The society was feudal, power flowing directly from the king, and the territory divided into satrapies, or provinces, ruled by satraps, or local governors. Maintaining control over such a large, heterogeneous and multilingual empire meant enforcing Persian laws and collecting tributes, but it also meant collecting information; via Xenophon, Professor Christopher Tuplin of Liverpool University describes in his paper [PDF] on the ancient empire the regular visits of the king’s agents:

… careful reading of Xenophon suggests … although there was a single, very senior King’s Eye, the King’s practice of rewarding information from whatever source means that people behave as though he has many eyes and ears and is always looking and listening, because they have no idea who might betray any seditious utterances.

Both Manning and Snowden—and presumably the majority of those who release information from the bureaucratic and legal constraints of enforced secrecy—clearly enunciated as their motives the desire to simply widen the circle of debate from the groups of which they were a part, where the institutional requirements of authority and discipline ensured that their complaints would receive little attention, to a broader public not subject to the same constraints and thus freer to examine the issues more honestly and objectively. Because clandestinity has always been a requirement and valued perquisite of intelligence agencies—and criminal conspiracies—naturally, there is resistance to divulging secret information, which impairs the ability of such organizations to operate, as well as diminishing their power. This reluctance manifests itself in several ways, including rampant overclassification—recognized to be endemic, even by the CIA, which noted already in 1976 [PDF] the “overclassification, unnecessary classification, vagueness of the classification criteria,” how it had in some offices “become a reflex action to place Secret upon a piece of paper”—as well as deluges of Freedom of Information Act (FOIA) requests, one tool available to the public that agencies often use the usual methods to block. Rather than being a “flaw” of the classification system, however, overclassification may be to some extent an intended feature of bureaucracies which value secrecy above all else, especially when the principal adversary is reasonably deemed to be the domestic population, and not foreign powers, as is commonly believed. Daniel Ellsberg, the liberator of the Pentagon Papers, persuasively described the dynamics at work within such organizations, where loyalty is highly prized and transgressions severely punished (see: “Secrecy and National Security Whistleblowing” [PDF]), worth quoting at length:

The promise to keep “secrets of state,” once demanded and given, becomes virtually part of one’s core identity. In the national security apparatus, one’s pride and self-respect is founded in particular in the fact that one has been trusted to keep secrets in general and trusted with these particular secrets. Second, they reflect one’s confidence that one is “worthy” of this trust. Indeed, the trust (with respect to truly sensitive secrets, requiring utmost reliance on the discretion of the recipient) will have been “earned,” before being conferred, by a long history of secret- keeping, building habits that are hard to break, that form part of one’s character. […]

One could regard secret-keeping in such a group as simply a form of obedience to orders or regulations or directives from authorities. But often, I would say, it is closer to contractual behavior, keeping a promise or agreement. “Keeping one’s promises,” and keeping agreements are recognizably among the highest values we are taught to observe as children and adults. What I am exploring here is how it comes about that people in organizations in some circumstances act as if those values are actually absolute, overriding other considerations that would appear to an observer to be extremely compelling. […]

For the Mafiosi “men of honor” (interestingly, the title of William Colby’s memoir of his life in the CIA is “Honorable Men”) the agreement to keep secrets is so central that the oath of membership includes the explicit acceptance of ultimate sanctions–death or worse, including “burning in hell,” for oneself and even one’s family–if the obligation of silence to outsiders, omertà, is broken. Thus is expressed loyalty to the organization that goes above loyalty to one’s own life and even to the lives of one’s family members.

This represents an extreme, but even for gangsters that overriding physical danger doesn’t entirely eclipse the additional threat that applies as well to other groups throughout society, the fear of psycho-social punishment for “spilling secrets,” “washing dirty linen in public,” “ratting” on one’s team. It is a fear not only of expulsion and ostracism but of one’s own awareness that outsiders as well as team-mates will feel that these consequences are deserved: and fear of one’s own sympathy for such judgments, a sense that the reaction is understandable and appropriate. The “snitch” is an object of intense contempt not only from gang members but even from their adversaries, the police: an uncanny revulsion that the “informer” is painfully inclined to share about himself.

I am suggesting that in the national security bureaucracy in the executive branch (and now, regrettably, the intelligence committees of Congress as well), the secrecy “oaths” (actually, agreements, conditions of employment or access) have the same psycho-social meaning for participants as the Mafia code of omertà, with the difference that the required “silence to outside authorities” forbids truthful disclosure not to the state or police but to other branches of government and the public.

Loose lips sink ships WWII poster

WWII poster created for Seagram Distillers Co. by Seymour R. Goff (the phrase originated with the War Advertising Council)

What this highlights more generally is that institutions with an overriding mission—whether they be intelligence agencies, corporations or other groups—have a way of creating their own modes of self-preservation which generate a set of written and unwritten rules. These rules dictate acceptable behavior, causing individuals either to act in ways which might otherwise conflict with their own values, or simply to modify those values in order to conform with the institutions, as fear of ostracism outweighs all other considerations. That is, institutions can generate two effects: 1) transform individuals, or 2) cause them to accept the legitimacy of what they would otherwise consider illegitimate, through the assigning of specific roles and a diffusion of responsibility, allowing them to ignore the consequences of their actions, even if they happen to be highly destructive. After all, an engineer designing a tool is not immediately concerned with how it might be used, but rather whether or not it functions… Individuals who disobey step out of these assigned roles to disrupt the normal functioning of the organization—in other words, although individual human beings may be moral actors, institutions, which pursue their own objectives, are not. Describing her meeting with NSA director General Keith Alexander, Jennifer Granick, expert on civil liberties and Cyberlaw, suggested that though the “easy answer” to explain the general’s attitude would be to characterize him as an evil man, it is “a simplistic view that masks the truth about systems of power, a truth we must understand and respect if we are to fix this surveillance nightmare we are just beginning to uncover.” This astute observation raises an important point: while it may be comforting to believe that a few overzealous individuals are responsible for perverting an otherwise legitimate process, this avoids considering the more disturbing prospect that what we are seeing are simply the normal workings of a powerful organization which will exploit any possibility to achieve its ends, regardless of who sits at its head. What also needs to be considered is the extent to which state officials can internalize certain values, convincing themselves of their benevolent intentions, whatever the record may show.

As for the divulging of secret information, despite an aggressive campaign to deter whistleblowing, the U.S. government itself “leaks like a sieve,” often from top officials themselves; Columbia Law School associate professor David E. Pozen proposes that the failure to enforce laws against leakers is a result of “key institutional actors shar[ing] overlapping interests in maintaining a permissive culture of classified information disclosures.” As a result of vagueness surrounding the regulatory scheme concerning classified information, an informal “equilibrium” has been established within what Pozen calls an “intricate ecosystem,” where national security leaking can be seen as a calibrated strategy in the effort to engineer public consent for White House policies, as well as send messages to adversaries (see: Pozen, “The Leaky Leviathan: Why the Government Condemns and Condones Unlawful Disclosures of Information”, 2013 [PDF]). It should be clear: there are good leaks, and there are bad leaks, and good leaks are but one component in a broader campaign of public relations or psychological warfare. One standard objection to projects like Wikileaks is that such initiatives are harmful to diplomacy and potentially endanger the lives of sources or U.S. nationals abroad: although it was shown that little harm came of the revelations contained in the unredacted release in 2011 of State Department cables (it is worth repeating that the trove contained nothing above Secret), the standard response followed, labeling the act “irresponsible, reckless and frankly dangerous.” Though rare, it is possible to identify positive initiatives which might be thwarted by unwanted disclosures, such as the recent diplomatic developments between the U.S. and Iran, brokered by the Gulf sultanate of Oman (which stands to benefit from a pipeline agreement with Teheran), or information which would genuinely prove dangerous to divulge, such as nuclear launch codes—the fact remains, however, that the danger presides not so much in the divulging of the codes as it does with the existence itself of the weapons, largely the result of Cold War irrationality and paranoia.

In order to evaluate the authenticity of this supposed commitment to responsible behavior, we might apply it to other events at about the same time involving U.S. foreign policy objectives—examples are not hard to find. As part of the high priority search for Osama bin Laden, the CIA, tasked with finding “new and inventive solutions” to gain access to the compound in Abbottabad, had engineered a covert intelligence gathering operation disguised as a public health service—a mock hepatitis B vaccination drive—as a ruse to obtain DNA from bin Laden, a mission for which it recruited the Pakistani Dr. Shakil Afridi. After the fatal raid, Afridi was arrested, “disappeared,” brought into Inter-Services Intelligence (ISI) custody, interrogated, and subsequently tried on various charges in a judicial process that is still ongoing. Doctors Without Borders/Médecins Sans Frontières (MSF) condemned the operation as “a grave manipulation of the medical act” undermining public trust in public health workers, thereby jeopardizing necessary public health campaigns; later, MSF would deplore the “climate of rumors and suspicion” preventing the organization from carrying out mass vaccination programs in the country; other organizations similarly warned of potential fallout, commenting that U.S. officials “imprudently burned bridges that took years for health workers to build,” warning that the CIA’s “reckless tactics could have catastrophic consequences”; the deans of twelve prominent public health schools addressed President Obama in January 2013, denouncing the precedent set by the “sham” operation, adding that the UN was forced to suspend vaccination efforts in Pakistan at a time when polio was on the verge of being eradicated; health workers have been repeatedly assassinated as the indirect effects reverberate through to the present. Or let us consider the joint U.S./Israeli covert online espionage/sabotage campaign aimed at Iran’s nuclear program (Operation OLYMPIC GAMES), better known by the Stuxnet computer virus (which was really a double program), designed to sabotage the cylinders at the Natanz nuclear enrichment facility, versions of which were apparently being developed as early as 2005: by infecting the programmable logic controllers (PLCs) commanding the enrichment centrifuge speeds, this sophisticated worm transformed abstract computer code into an actual physical weapon—in other words, the joint U.S./Israeli campaign initiated offensive cyberwarfare, but like the fabled sorcerer’s apprentice, the manner in which it would proliferate is beyond their control. The code itself spread beyond its intended target, probably as a result of human hands, to infect other networks, among which reportedly Chevron‘s IT department and a Russian nuclear plant—more ominous, though, is the prospect of inaugurating an era of state-sponsored cyberwarfare the consequences of which are largely unforeseeable and not well understood.

Although we would like to think that these types of mischief, admittedly small in number but significant, would provide an occasion for condemnation or at least calls to exercise caution from our political leaders and their servants in the press, they are likely for the most part to remain silent. This capricious behavior might seem mysterious unless we fully appreciate the politically correct definition of “harm”: that which impedes us from achieving our goals, whatever they happen to be. It logically follows from this definition, then, that these episodes are not considered “harmful,” but simply illustrate the acceptable costs of carrying out our noble mission in the world—acceptable to us, that is. Similarly, it should be understood that the prospect of bodily harm coming to collaborators or sources is of minor concern; far more important is ensuring the crucial cooperation of individuals ready to help further U.S. interests abroad, and therefore “[m]aking people think twice before providing the U.S. with information—or simply refuse ever again to help—hurts the good causes of human rights and democracy that American officials are promoting.” Whatever else happens, we can be reasonably sure that those designing policy will go to extreme lengths to maintain dominance and superiority, overriding questions of public safety, as has often been historically the case—sometimes to a surprising extent.


.

Attempts to remedy the present situation are confronted with several barriers. A seemingly intractable problem highlighted by the disclosures is the existence of a divide created by the sophistication of modern communications technologies. This divide manifests itself by a conflict between technical capabilities and the legal restraints intended to circumscribe them, as well as by a form of segregation between a community of specialists and the general population, the great majority of which employs communications technologies it doesn’t need to intimately understand in order to use. This in fact creates a double secrecy, the first level of which is related to national security concerns—classification levels and punishment for the revealing of secrets—and a second level, being an opacity created by the inherent complexity of the phenomenon itself, difficult to approach. Although the leaks were intended to spark a public debate, and most individuals are instinctively resistant to efforts to encroach upon their private spaces, the majority does not possess the necessary vocabulary to evaluate all the technical aspects of digital surveillance, nor the expertise to develop the tools and armor necessary to thwart it, and can only approach the phenomenon in broad, philosophical terms. Although it would seem the desire to not be spied upon should be sufficient to protect oneself from the prying eyes of intelligence agencies, criminal organizations, or other individuals, we know from experience that any existing weakness or possibility will eventually be exploited, and the possibilities limited only by the talent of those developing and using the tools: it is therefore the capacity for surveillance itself which is problematic, and not the intentions, whether they be good or bad, of those wielding this immense power.

As was recognized already in June of 2013, shortly after Snowden revealed himself as the source of the documents, there is a basic conflict between the technical capacities of the NSA and the framework of legal restraints designed to delimit them; this points to a broader problem of whether it is even possible for any judicial oversight to successfully rein in the actions of a surveillance apparatus which by its very nature must work to outstrip any constraints or challenges put upon it (a history of some aspects of judicial oversight of NSA activities can be found here). Although the failure to properly define the limits of the actions of the NSA—and the intelligence community (IC) more broadly—is partly by design and a result of inadequate oversight, it may also be an inevitable result of the intrinsic properties of both activities: legal solutions are limited by the inherent ambiguities of language (which allow for varying interpretations of legal doctrine), the lack of political will to enforce them (secret courts make this even more difficult), and the inertia of a legal establishment which is slow to adapt to—or even unaware of—new realities; the capacity for surveillance, however, rises more or less proportionally with the development of new communications technologies, and is therefore constantly in flux, only limited by the imaginations of those conceiving them. The implications of this are numerous, but it should be clear that increasing or intensifying the means and methods of communicating with others, by virtue of the information associated with such communications, simultaneously increases one’s chances of undergoing surveillance. Underscoring this point, Julian Assange once remarked that the Internet is “the greatest spying machine the world has ever seen,” an observation which is difficult to refute. This implies that for the moment the only sure remedy is of a technical nature, such as securing one’s communications through various methods of encryption or other creative means of obfuscation—thereby shifting the battlefield away from the courtroom towards a terrain where resourcefulness and ingenuity are the only certain defenses.

Although it reports to the Director of National Intelligence, it must be remembered that the NSA/Central Security Service (CSS) operates under the jurisdiction of the Department of Defense. Military dominance is built into the very fabric of the U.S. political economy: the DoD, which accounts for roughly half of Federal discretionary spending ($526.6 billion requested for FY2014, plus $79.4 billion for Overseas Contingency Operations [OCO]), is a major instrument for public subsidizing of high tech industry, which ensures that much research and development will be initially supported in light of potential military applications (before transferring it to the civilian or private sector), guaranteeing virtually unlimited funding for institutions like the NSA to pursue its goals—such as building a quantum computer as part of its $79.7 million “Penetrating Hard Targets” research program, among others. Although the NSA has in fact been publicly sponsoring quantum computing research for years through various institutions, its parallel efforts to “preserve the SIGINT [signals intelligence] potential of quantum computing” and to develop “cryptanalytic QC to attack highgrade public key encryption systems” were being closely guarded under a higher classification level. The Consolidated Cryptological Program (CCP), a joint IC program the bulk of which is operated by the NSA, was allotted $10.8 billion for FY2013, with a projected budget of at least $50,7 billion for FY2013-2017. As part of this program, GENIE, an operation allotted $652 million for FY2013, directs efforts to infiltrate and exploit foreign networks by inserting “covert implants,” or malware, into computer systems, either by covert agents, or more often remotely by what are called Tailored Access Operations (TAO), which sometimes employ elite hackers to “compromise” chosen targets; these operations range from traditional intelligence gathering to more aggressive attacks (see: IC FY2013 budget [PDF]). Over time the perception of cyberspace has undergone a gradual but inevitable shift from being a simple infrastructure for data flow to being another potential terrain for low intensity conflict—one stated ambition was to “support Computer Network Attacks as an integrated part of military operations”—a development which has been accelerated by the Obama administration, in what could be characterized as a militarization of the Internet. The range of existing techniques developed by the NSA to gain control of information is extensive and alarming, demonstrating surprising creativity, briefly outlined by security researcher Jacob Appelbaum at the 2013 Chaos Communications Congress (30c3) in Hamburg, Germany. Recognizing cyberspace as its own “operational domain” (the recognized military domains are: land, air, maritime, space, and cyberspace), U.S. Cyber Command (USCYBERCOM) was established in 2009 subordinate to U.S. Strategic Command (USSTRATCOM) to execute “defensive and offensive missions,” currently directed by NSA director General Alexander, for which a Joint Operations Center is tentatively scheduled to be occupied by 2017 at Fort Meade, Maryland. Likewise, the 2012 Defense Strategic Guidance [PDF] prescribes expanded capabilities for cyber and space-based activities, echoed in the Pentagon’s FY2014 budget request: owing to the “unique attributes” of cyberspace, forces are to collaborate with “Federal, state and local governments, private sector partners, and allies and partners abroad” to “detect, deter, and, if directed, respond to threats in cyberspace”—which of course means anywhere in the world (see: DoD FY2014 budget request overview [PDF]).

Subsequent to a memorandum from President Truman, National Security Council Intelligence Directive (NSCID) No. 9 established the NSA on December 29, 1952 as a member of the United States Communications Intelligence Board (USCIB). The stated mission of the NSA pertaining to communications intelligence (COMINT) was “to provide an effective, unified organization and control of the communications intelligence activities of the United States conducted against foreign governments, and to provide for integrated operational policies and procedures pertaining thereto,” COMINT being “all procedures and methods used in the interception of communications other than foreign press and propaganda broadcasts and the obtaining of information from such communications by other than the intended recipients”—information obtained “by other than the intended recipients,” meaning eavesdropping. Secrecy and disinformation being central components of warfare, it should be unsurprising to find the origins of the NSA within the different branches of the military establishment, engaged in signal interceptions and code breaking. Moving into the past, the numerous predecessors to the NSA and their various ad hoc bureaucratic permutations began within the Army and Navy in 1917 at the outbreak of World War I: a clandestine cryptanalytic unit run by Herbert O. Yardley, appointed by Philippines campaign veteran Ralph Van Deman—Cable and Telegraph Section (MI-8)—was established within the Military Information Section (MIS) of the War Department General Staff, while the Cryptographic (Cipher) Bureau was established within the Office of Naval Intelligence; the Cipher Bureau was soon incorporated into the Army’s MI-8 in 1918 under the newly re-established Military Intelligence Division (MID). MI-8 was abolished in 1929 when Secretary of State Henry Stimson withdrew funding for the activity; he later was known for his admonishment that “Gentlemen do not read each other’s mail.” During WWII, military COMINT was produced by the Signal Intelligence Service (SIS), later renamed the Signal Security Agency (SSA), while the Office of Strategic Services (OSS), the precursor to the postwar Central Intelligence Agency (CIA), worked mostly behind enemy lines. Since its creation in 1952, the agency had managed to remain largely obscure until revealed to the public for the first time by former senior NSA analyst Perry Fellwock (pseudonym “Winslow Peck”) in his August, 1972 interview with Ramparts magazine, in which he introduced, according to the New York Times, “hitherto suspected but obscure details of electronic eavesdropping around the globe,” including the existence of the intelligence cooperation between the so-called “Five Eyes”—the U.S., Great Britain, Canada, Australia and New Zealand—as well as the possibility that the Soviet military threat had been severely inflated, an assessment which had turned out to be largely accurate.

NRO satellite octopus NROL-39

Mission emblem for Dec. 5, 2013 National Reconnaissance Office (NRO) satellite launch

In tandem with its gradual militarization, efforts ensued to weaken the fabric of the Internet in order to render communications more transparent. The NSA sought “unrestricted access” to the use of cyberspace, by leading “an aggressive, multipronged effort to break widely used Internet encryption technologies,” as well as through direct collaboration with telecommunications companies, in the process inserting vulnerabilities into the Internet [PDF]. The proliferation of methods to safeguard privacy during the “crypto revolution” of the 1990s would bring the U.S. government into conflict with those developing encryption technologies which “crippled N.S.A.’s ability to listen in on the world”—when the NSA met with public opposition to its efforts, it ostensibly abandoned its project while surreptitiously pursuing the same goals. All options must be explored to tilt the playing field in one’s favor in the drive for hegemony and superiority over potential adversaries, even at the risk of undermining technologies developed to secure communications—whether it be tampering with random number generators underpinning widely used cryptographic protocols, collaborating with telecommunications giants to introduce key-escrow “back door” systems into communications devices (Clipper chip), or restricting export controls on “[c]ryptographic (including key management) systems, equipment, assemblies, modules, integrated circuits, components or software with the capability of maintaining secrecy or confidentiality of information,” which as late as 1992 were considered a form of military “munitions” subject to arms control export laws (although rules have been relaxed, certain encryption technologies are still subject to export controls). From the point of view of an institution dedicated to “information dominance,” to gaining access to all communications anywhere, the logic behind these schemes is undeniable: the privacy protection offered by robust encryption “shields the law abiding and the lawless equally,” making eavesdropping on potential adversaries more difficult. This quest for “information dominance” is part of the broader quest for the vaunted ideal of “full spectrum dominance” described in U.S. military literature—a concept recently expressed (with a bit more nuance) as “maintain[ing] a broad portfolio of military capabilities that, in the aggregate, offer versatility across the range of missions.”

As with the Cold War confrontation between superpowers, and the possession of weapons of mass destruction, the guiding logic is that the worst must be assumed of the adversary, who is surely developing his own capacities, and therefore we must reciprocate; and if such power is to exist, it might as well be in our hands, where at least it will be exercised responsibly—a dubious assumption, it goes without saying. Broadly speaking, since World War II, and the advent of nuclear weapons raising the specter of ultimate destruction, there was a shift away from open conflict between state actors, recognized to be too dangerous, to what was sometimes labeled “asymmetric conflict,” often waged in Third World theaters in the context of the Cold War. With the collapse of the Soviet Union, U.S. planners and intelligence, absent their principle state adversary, were forced to reorient themselves towards a “multiple threat” environment, exemplified by the supposed “growing technological sophistication” of the Third World (see: 1990 National Security Strategy [PDF]). These conflicts generally manifested themselves as struggles between states and non-state actors, insurgencies, terrorists and guerrillas, informal networks who by their very nature are not bound to any particular geographical territory; this meant that communications had to be susceptible to penetration anywhere around the world—including U.S.-based communications—because, in Columbia University law professor Eben Moglen’s words, military and intelligence strategists “came to regard American rights in communications privacy as the equivalent of sanctuary for guerrillas.” Like encryption, the legal restraints barring the NSA from engaging in domestic surveillance were simply an obstacle to be overcome—duly swept away when the September 11, 2001 attacks provided the impetus to turn programs inward which had been conceived with the possibility of safeguarding some of the civil liberties of U.S. persons. Though certain provisions of the Universal Declaration of Human Rights, adopted by the UN General Assembly on December 10, 1948, may appear quaint today—namely that “everyone has the right to life, liberty and security of person,” and that “no one shall be subjected to arbitrary interference with his privacy, family, home or correspondence”—we might also consider what would happen if we were to take them seriously. Moglen again:

If we are not doing anything wrong, then we have a right to do everything we can to maintain the traditional balance between us and power that is listening. We have a right to be obscure. We have a right to mumble. We have a right to speak languages they do not get. We have a right to meet when and where and how we please so as to evade the paddy rollers.


.

Update (Jan. 8): Daniel Ellsberg highlights the difference between an oath and a non-disclosure agreement, by way of Amy Davidson and Marcy Wheeler responding to Fred Kaplan’s January 3 temper tantrum in Slate. I suppose Kaplan was simply using the word “oath” in a general sense, to mean “agreement” here, in which case he is correct that Snowden—fortunately for us—violated that agreement.


.

Update II (Jan. 9): Information was leaked to the press (who ever would do such a thing?) about a recent classified Pentagon report allegedly determining that Snowden “downloaded” 1.7 million intelligence files, much of it concerning “vital operations of the U.S. Army, Navy, Marine Corps and Air Force,” according to Rep. Mike Rogers (R-Mich.), chairman of the House Intelligence Committee. That the documents contained information relevant to military operations, if true, is not surprising, as the NSA/CSS provide intelligence for and collaborate with various military intelligence services. Predictably, lawmakers claimed that these “real acts of betrayal place America’s military men and women at greater risk,” as the disclosures “have already tipped off our adversaries to the sources and methods of our defense,” actions which “aligned him with our enemy.” As always, skepticism is required of such boilerplate claims smelling of fire and brimstone, and it is not explained how the exact number of 1.7 million documents was determined, nor if the report differentiated between documents that were merely accessed as opposed to downloaded—nor whether Snowden would have indiscriminately given all of these documents to the journalists. At the same time, the Guardian reports that the draft report of a European parliamentary inquiry has come to a very different conclusion, condemning in the “strongest possible terms” the programs revealed by the disclosures, calling on U.S. and European authorities to “prohibit blanket mass surveillance activities and bulk processing of personal data” and on the U.S. to align its policies with international law, recognizing “the privacy and other rights of EU citizens.” Echoing his U.S. counterparts, conservative MEP Timothy Kirkhope claimed that “Snowden has endangered lives.”

Of interest here is the fact that, for some, proof is rarely required when claims of national security are involved—they are simply assumed to be self-evident.


.

Update III (Jan. 10): A new paper by Kevin S. Bankston and Ashkan Soltani has been published in the Yale Law Journal Online (YLJO) on how the increasing sophistication of location tracking technologies has lowered the barriers to surveillance [PDF]. This more systematic and thorough presentation elaborates on the more basic point I made above on the inherent conflict between technological progress and legal constraints, through the lens of 4th Amendment protections, observing that “a new surveillance technique is likely to violate an expectation of privacy when it eliminates or circumvents a preexisting structural right of privacy and disrupts the equilibrium of power between police and suspects by making it much less expensive for the government to collect information.” These observations are of course directly relevant to the present discussion. They propose a more concrete cost-based metric to measure law enforcement infringements on what they call “structural privacy rights”:

The simple idea is that structural constraints—physical and technological barriers—make certain conduct costly, sometimes impossibly costly. These costs act as non-legal regulations, essentially providing a non-legal “right” against the behaviors they prevent. Yet rapid changes in technology can quickly and unexpectedly eliminate these long relied-upon structural rights, especially when it comes to privacy. Surden’s message to policymakers, similar to Kerr’s message to the courts, is that they can recognize and adjust for diminishing structural rights against privacy invasion by adding new legal protections to replace them as they are lost—i.e., that they can impose new legal costs to compensate for the drop in actual costs.

surveillance tracking methods Bankston Soltani

A Visual Comparison of Location Tracking Methods (image: Yale Law Journal Online)


.

Update IV (Jan. 12): The draft report of the European parliamentary inquiry into the “US NSA surveillance programme, surveillance bodies in various Member States and their impact on EU citizens’ fundamental rights and on transatlantic cooperation in Justice and Home Affairs” has been made available (via Glenn Greenwald) [PDF]. Observing, among other things, that an “increasing focus on security combined with developments in technology has enabled States to know more about citizens than ever before,” that “technological developments have led to increased international intelligence cooperation, also involving the exchange of personal data, and often blurring the line between intelligence and law enforcement activities,” and that “most of existing national oversight mechanisms and bodies were set up or revamped in the 1990s and have not necessarily been adapted to the rapid technological developments over the last decade,” it notably states that it is:

… doubtful that data collection of such magnitude is only guided by the fight against terrorism, as it involves the collection of all possible data of all citizens; points therefore to the possible existence of other power motives such as political and economic espionage

Additionally, it proposes a European Digital Habeas Corpus for protecting privacy governing data transfers to the U.S., as well as developing a “European strategy for IT [information technology] independence.” Also of interest is the list of people who declined to participate in the Committee on Civil Liberties, Justice and Home Affairs (LIBE Committee).

Finally, some helpful images from TeleGeography—along with the submarine cable map—will illustrate better than anything the extent to which communications are globalized and interconnected (click to enlarge):

map communications global traffic

Telecommunications: global traffic 2010 (image: http://www.telegeography.com)

map communications global internet

Telecommunications: Internet map 2012 (image: http://www.telegeography.com)

Happy Thanksgiving 2013

November 28, 2013 § 1 Comment

History can be a dangerous thing, for two reasons: 1) because it is often the victors and/or dominant sectors of society who write official history, it is subject to the usual distortions and falsifications, and 2) because once you begin to study it seriously, you might actually learn something. So here is a history lesson to go with your turkey, stuffing and mashed potatoes, all true (except for Burroughs’ fanciful “laboratory-developed AIDS,” which, as far as we know, seems to have originated in present-day Cameroon a century ago, spread partly as a result of European colonial adventurism). Oh, and don’t talk politics at the table, it’s not polite.

Thanksgiving Prayer

For John Dillinger
In hope he is still alive
Thanksgiving Day, November 28, 1986

Thanks for the wild turkey and the Passenger Pigeons, destined to be shit out through wholesome American guts
-thanks for a Continent to despoil and poison
-thanks for Indians to provide a modicum of challenge and danger
-thanks for vast herds of bison to kill and skin, leaving the carcasses to rot
-thanks for bounties on wolves and coyotes
-thanks for the American Dream, to vulgarize and falsify until the bare lies shine through
-thanks for the KKK, for nigger-killing lawmen feeling their notches, for decent church-going women with their mean, pinched, bitter, evil faces
-thanks for “Kill a Queer for Christ” stickers
-thanks for laboratory AIDS
-thanks for Prohibition and the War Against Drugs
-thanks for a country where nobody is allowed to mind his own business
-thanks for a nation of finks — yes,
-thanks for all the memories (all right, lets see your arms, you always were a headache and you always were a bore)
-thanks for the last and greatest betrayal of the last and greatest of human dreams.

— William S. Burroughs

American Holocaust: The Destruction of America’s Native Peoples
David Stannard, professor and chair of the American Studies Department at the University of Hawaii

Decoding Language, part I

September 13, 2013 § Leave a comment

Yesterday it was reported that Ketchum, a public relations firm, had placed a September 11 Op-Ed by president Vladimir Putin into the New York Times, which Buzzfeed editors characterized as “controversial.” The Times‘ public editor promptly issued an explanation, the editorial page editor stating that “[v]ery few Op-Ed articles have received as much immediate attention;” hyperventilating patriots were “horrified” that the journal was “aiding and abetting a long-term foe of the United States” by printing Putin’s dangerous sorcerer’s incantations. Max Fisher declared that it contained “undeniable hypocrisy and even moments of dishonesty” — which begs the question as to why anyone would therefore be surprised to see it in the Times, which employs a scribbler such as Thomas Friedman. Such fact-checking is indeed welcome, no doubt, but there have been episodes where it would have been much more helpful. Justin Elliot writes that Ketchum has a history of placing articles at the behest of the Kremlin, with the goal of, among other things, promoting Russia “as a place favorable for foreign investments.” So, what we have learned here, hardly news, is that governments will do anything they can to further their interests, including influence campaigns in foreign media outlets.

Despite the predictable howling from those still clinging to an outdated, fanatical cold war ideology, in its substance the Op-Ed was banal, the only striking element being that it was — supposedly — penned by a foreign head of state. In its tone rather conservative, called “A Plea For Caution From Russia,” it claimed that “there is every reason to believe it [gas] was used not by the Syrian Army, but by opposition forces, to provoke intervention by their powerful foreign patrons, who would be siding with the fundamentalists.” It should be clear that Putin, as a head of state with clear interests at stake in events unfolding in Syria, and capable of marshaling vast resources for a propaganda campaign, should no more be taken at his word than anyone else. However, while the evidence from the UN has still not been presented, and no chain of custody has apparently been established for whatever weapon(s) was (or were) used, such an explanation should be seen as no less plausible than the claims of the U.S. government (which possesses little credibility itself on this matter) as to the nature of its “proof” incriminating the Assad regime.

Words often have several meanings depending on the context, and here “controversial” simply means “that which does not toe the Party Line” — the Party Line being that the Syrian government unambiguously carried out the recent August 21 attacks on the Damascus suburbs — rather than “that which sparks robust debate,” or “that which is unsupported by evidence.” Such a definition creates the circumstances for some startling leaps in logic, and discipline can be enforced to such a degree that if the Party Line dictates that the Earth is flat, stating that it is in fact spherical will be considered “controversial.”

Other words are often, and have always been, employed, not for their intrinsic meaning, but rather for their utility as ideological cudgels against opponents. John Schindler, former NSA analyst and counterintelligence officer who now teaches national security affairs at the U.S. Naval War College, theorizes that Edward Snowden and Wikileaks are likely fronts for an elaborate Russian intelligence operation (a rather convincing dissection by Tim Cushing of this conspiracy theory may be found here). Notwithstanding that such a scenario is possible, and shouldn’t be completely ruled out, Schindler’s theory is reminiscent of the paranoia to which intelligence agencies themselves can fall prey, while assuming the worst of their adversaries, leading them to erroneous conclusions, due to their own ideological bias. He believes that journalists mediating the slow trickle of revelations gleaned from leaked documents are waging a “propaganda offensive,” and “have masked their radical activism under the (thin) guise of post-modern journalism.”

The operative phrase here is “radical activism,” and it is meant, among other things, to differentiate what people like Poitras, Greenwald and Barton Gellman are doing from the “authentic” and “objective” journalism which would be more to his liking. The phrase is in fact a smear, and as a smear, it carries little content, but is intended to vilify political opponents in order to marginalize and discredit them. The tactic is a staple of ideological warfare with a long tradition, the palette of insults offering such terms as “communist,” “isolationist,” “liberal,” “anarchist,” “traitor,” and countless other epithets, the purpose of which is to render objects of vilification, and the ideas represented, toxic by attaching stigmata, thereby isolating them, and preventing any substantial debate on the issues themselves. What the words actually mean, or whether the objects of scorn actually demonstrate such qualities, is wholly irrelevant.

One could, for example, ask whether it is not the policies themselves that are extreme and not those criticizing them — but that would require a modicum of honesty. A brief overview of some examples of this and past U.S. administrations’ “radical” policies will suffice: John Yoo’s radical executive theories, which authorize the president to act virtually without constraint, the global rendition and torture network initiated after the September 11 attacks, the 2003 invasion of Iraq, now acknowledged by anyone with a pulse to have been illegal and immoral, the highly destructive consequences of which are still resonating in the region, the continued deployment of nearly two thousand nuclear warheads, including the latest nuclear posture review, which retains the doctrine of “counterforce” and a hypothetical first strike capability, the Kennedy administration’s terrorist campaign against Cuba, the near destruction of Indochina, the Reagan administration’s arms transfers supporting a campaign to destroy parts of Latin America, including the more recent expansions of a presidentially authorized UAV assassination program and sprawling surveillance/security state, to name just a few. If these aren’t considered “radical,” then the word indeed has no meaning, and can be used for whatever purposes one wishes.

The National Security Agency’s invasive, global spying network, not to mention U.S. intelligence agencies’ collaboration on more offensive “cyberwarfare” capabilities, exemplified by the Stuxnet virus (along with Israel), appropriately takes its place among such extreme policies. Regarding the ongoing NSA disclosures, I have seen some who are of the opinion that such secret information must be kept “out of the hands” of “radicals” (meaning, the public), the responsible gentlemen like General Keith Alexander presumably being the more appropriate guardians of an aggressive surveillance apparatus — such a person is incapable of even entertaining the possibility that the radicals do indeed already have control of the apparatus, as they seem to be the ones running it.