Aspects of the Snowden Leaks

January 7, 2014 § Leave a comment

Deioces then built these fortifications for himself, and round his own palace; and he commanded the rest of the people to fix their habitations round the fortification; and when all the buildings were completed, he, for the first time, established the following regulations: that no man should be admitted to the king’s presence, but every one should consult him by means of messengers, and that none should be permitted to see him; and, moreover, that it should be accounted indecency for any to laugh or spit before him. He established such ceremony about his own person, for this reason, that those who were his equals, and who were brought up with him, and of no meaner family, nor inferior to him in manly qualities, might not, when they saw him, grieve and conspire against him; but that he might appear to be of a different nature to them who did not see him. When he had established these regulations, and settled himself in the tyranny, he was very severe in the distribution of justice. And the parties contending were obliged to send him their case in writing; and he, having come to a decision on the cases so laid before him, sent them back again. This, then, was his plan in reference to matters of litigation; and all other things were regulated by him; so that, if he received information that any man had injured another, he would presently send for him, and punish him in proportion to his offense; and for this purpose he had spies and eaves-droppers in every part of his dominions.

— Herodotus (fifth century B.C.)

The only rule of which everybody in a totalitarian state may be sure is that the more visible government agencies are, the less power they carry, and the less is known of the existence of an institution, the more powerful it will ultimately turn out to be. According to this rule, the Soviets, recognized by a written constitution as the highest authority of the state, have less power than the Bolshevik party; the Bolshevik party, which recruits its members openly and is recognized as the ruling class, has less power than the secret police. Real power begins where secrecy begins.

— Hannah Arendt, “The Origins of Totalitarianism”

I desire what is good. Therefore, everyone who does not agree with me is a traitor.

— attributed to King George III

One reason it is difficult to approach the global surveillance disclosures and documents resulting from Edward Snowden’s security breach (see one collection here from the National Security Archive) is that the implications are multiple: questions of surveillance, secrecy, technology and national security (however ill-defined that phrase may be), but also the nature of the relation between journalist and source. Critics have predictably assailed the protagonists from several points of view, ranging from the vociferous armchair warriors, curmudgeons and disciplinarians who march in lockstep with the national security state, who would never miss an opportunity to scold a miscreant, to a relatively small number who advocate a more radical strategy of releasing the documents either in their entirety, or at least more widely and rapidly, accusing the journalists of hoarding the information for personal gain. As always, talk is cheap, but it is worth considering some thoughts. It’s impossible to evaluate the success of any strategy without first determining what the goal is, but we can be reasonably sure of two things: Snowden never wished the abolition of the National Security Agency (NSA), or some form of national security surveillance, nor does he seem to doubt the fundamental legitimacy of the U.S. government, or more broadly, the state as an institution. The motivations were clear, and stated at the Sheremetyevo airport on 12 July 2013: “The immoral cannot be made moral through the use of secret law.” Recognizing that laws are not axioms, and that a secret court is not the appropriate venue for evaluating the activities of a global surveillance apparatus which ignores national boundaries, he quoted the 1946 judgement at Nuremberg, that “individuals have international duties which transcend the national obligations of obedience imposed by the individual State”—although the provenance of the second half of the quote is mysterious, the message was that his was an act of civil disobedience.

We can presume one reason why Snowden initially came to Laura Poitras, Barton Gellman and Glenn Greenwald (after fruitless attempts to alert colleagues to his concerns) was that he deemed them trustworthy, and would treat the subject in a manner more or less conforming to his wishes. There are conflicting interests: journalists must ethically weigh their obligations to the public—that is, if they presume to have any—against their obligations to their sources, and although unlikely, it is hypothetically possible that information exists of such importance that exposing it overrides all other other considerations; such is the case in highly repressive states, where the surveillance apparatus exists not only to ostensibly protect citizens, but also to target them. One could argue that the documents should have been immediately dumped, letting the chips fall where they may regardless of the consequences, in order to provide the wider public, and those with the capability to invent privacy and countersurveillance tools, with the knowledge necessary to judge the phenomenon, as well as confront it (something I’ve addressed briefly already); if that is what Snowden had desired, however, he clearly would have done so himself, and furthermore likely done it anonymously—an improbable scenario, as he reportedly refused to “simply dump huge amounts of documents without regard to their content.” This strategy presents other problems as well. A broader question is deciding on who is uniquely qualified to determine what is in the public interest and who is not, what is dangerous to reveal, and to whom—difficult or nearly impossible to answer definitively, but the fact remains that there is a significant amount of trust involved. One version of the dilemma was stated succinctly by Barton Gellman in 2003:

No individual, and no institution, can be trusted to draw the line for us when these two interests collide. That includes the people with the classified stamps. Newspapers cannot appoint themselves as arbiters of national security. Political leaders, on the other hand, cannot be allowed to decide for us what we need to know about their performance. 

Because Greenwald—and possibly other recipients of the documents—must have entered into an agreement with Snowden, in the understanding that the information would be handled and discussed more or less in the way he intended within certain guidelines, criticisms that the documents have not been released fast enough, or en masse and unredacted, should more appropriately be directed at Snowden himself. In other words, the desire to see a document dump is tantamount to wishing someone other than Snowden had leaked them; he clearly did not wish to tear the entire house down, but merely to spark a public debate in order to roll back some of the abuses, bringing certain aspects of the system under control—as did Chelsea Manning in her own way when she sent her files to Wikileaks in 2010. Furthermore, if he hypothetically had wanted to severely undermine the surveillance apparatus, it is not so obvious that an unredacted document dump would have helped accomplish that: as long as there is sufficient funding, secrecy and enforced discipline within the military and intelligence communities, the capacity and talents will likely remain to innovate and rebuild whatever was damaged, the national security state marching on, undeterred. If the past is any guide, the disclosures will prompt a reevaluation of present methods, heavier reliance on private contractors, more compartmentalization and a tightening of control to restrict access to certain classification levels, all bringing aspects of surveillance deeper underground. This may exact a price, paradoxically, on the intelligence apparatus itself, which, as it moves to adjust to these developments by countering suspicious behavior and restricting the internal flow of information, will impede its own ability to operate efficiently. Julian Assange, whose short paper [PDF] on conspiracies bears reading, explains:

The more secretive or unjust an organization is, the more leaks induce fear and paranoia in its leadership and planning coterie. This must result in minimization of efficient internal communications mechanisms (an increase in cognitive “secrecy tax”) and consequent system-wide cognitive decline resulting in decreased ability to hold onto power as the environment demands adaption.

Lest there be any confusion, Snowden declared to Gellman, and there is no reason to doubt his sincerity, that he is “not trying to bring down the NSA,” but rather “working to improve the NSA”; his goal was not “to change society,” but rather to offer it “a chance to determine if it should change itself”—quite a transformation from the person who reportedly declared in 2009 that those leaking sensitive information to the New York Times on supposed covert activities “should be shot.” In any case, these are hardly the words of a reckless subversive, regardless of whatever threatsepithets or scolding commentators may vomit onto the page—”smug, self-righteous, egotistical, disingenuous, megalomaniacal, overwrought”—in order to vilify, smear and pathologize him, a standard technique for marginalizing dissidents and other insufficiently obedient individuals who have left the flock. Conforming to tradition, such calls for the perpetrator to “face the music” are of course largely reserved for the lower echelons, a rule which must be rigorously observed by anyone who wishes to serve the halls of power in Washington, D.C., following the sacred principle, well established, that only the powerless must be held to account for their crimes—for the rest, we must simply ensure “that these mistakes are not repeated,” turning the page being “more important than punishing” those who perpetrated criminal acts “in pursuit of what they thought was right.” Regardless of the morality or the consequences of his decision, the anger directed at him from certain quarters is understandable in light of revelations that he reportedly persuaded colleagues to relinquish their login data to gain access to information, evoking images of the “insider threat” and its accompanying betrayal: the interpretation that imposes itself, then, is that Snowden had in fact decided at some point to spy on the NSA on our behalf.

The motives of public figures such as Snowden and Manning are often subject to misunderstanding. Rather than creating an imaginary persona who champions our pet issues, or a martyr to be sacrificed for our pleasure, it is preferable to approach the issues clear eyed, devoid of comforting illusions. Disappointment in the scope and pace of the spying revelations (although it would be highly dishonest to claim that much of significance has not already been disclosed) betrays a desire to project one’s own wishes onto the protagonist, attributing to him intentions which may not exist; the profound implications of Snowden’s act means that it has been subject to differing interpretations by those who would see what they wanted to see in it. Similarly, instead of imposing a ready-made personality onto her, it is wiser to let Manning define herself in her own words—both in terms of gender and her significant act of conscience: as was made clear by her October 7 letter from Fort Leavenworth, she in no way considered herself a resolute “pacifist,” but rather defined herself as a “transparency activist,” who believes “the public cannot decide what actions and policies are or are not justified if they don’t even know the most rudimentary details about them and their effects.“—appropriately echoing Assange’s claim that “[o]nly revealed injustice can be answered; for man to do anything intelligent he has to know what’s actually going on.” In both cases, the unvarnished reality in no way detracts from the enormous courage and moral clarity required to take such initiatives, sacrificing their comfort and liberty by bringing themselves under the full force and weight of what is certainly one of the most powerful institutions on the planet, particularly vindictive when it aims to set an example. Ultimately, underlying these concerns are two different conceptions of how society should function: whether a meaningful debate should take place enabling the public to consider the legitimacy of policies which affect them—thereby bringing them under some kind of democratic control—or whether decisions should rest solely in the hands of a specialized class of individuals designing policy behind closed doors.

Although it is always much easier to find fault than to offer constructive criticism, it is worth considering some of the complaints. Let us examine some claims by a writer I often find quite cogent and perceptive, whose arguments are characteristic of some of the objections voiced to the style of reporting offered by those in possession of the documents: in October 2013, Arthur Silber characterized their behavior as a “strategic retreat,” a form of damage control wherein the ruling class responds to “excesses” by offering “carefully manicured” morsels of information in order to placate the masses. This carefully orchestrated pageant only “serves the interests of the State and the ruling class.” Insomuch as statecraft involves a high degree of manipulation (often bordering on the pathological), and the degree to which there are shared interests between elements of the corporate media and state power, he is correct, in fact obviously so—these are essentially truisms. It is indeed also possible that “one segment of the ruling class wants them [NSA stories] covered, and finds such coverage to be in its interests,” as various factions of state-corporate power are not always in agreement, and conflict and rivalry occasionally ensue. Elements of the technological corporate sector have been continually forced to respond to evidence of cooperation with and penetration of their services by the NSA, as the disclosures damage their reputations and threaten prospects for profits and market share due to public suspicions that their products have been compromised and are simply not safe to use. Considering that the U.S. political structure responds almost uniquely to corporate interests, this encroachment on the power of the private sector holds the greatest promise of reform, as public concerns regarding privacy and surveillance are likely considered secondary or largely irrelevant, unless the outrage becomes impossible to ignore. It is also true that many Americans, and most of the world, have become accustomed to the numerous ways in which states have capitalized on the fear encapsulated in the events of September 11, 2001 in order to introduce various methods of coercion and control, so much so that they may have become largely unaware of them. Unconvincing, however, is the slightly conspiratorial notion that all reporting is state-sanctioned; on the contrary, there was little choice, as the decision was forced upon them by Snowden. If “elites” had wanted to reveal the extent of NSA surveillance, considering they are supposedly all-powerful, they could have easily done so without the urging of the young infrastructure analyst if it suited their purposes; all the available evidence seems to demonstrate that they were quite happy with it. Indeed, collaboration between corporate elements of the telecommunications industry and the state surveillance apparatus have figured prominently in the NSA’s history, some details of which were revealed in 1975; it was not, and is not, in their interests to be exposed. It is, however, in the interests of major press organs, now that documents have been provided which preclude any plausible deniability, to respond to them, as they cannot simply be ignored. While conspiracies do exist, and they are numerous, this vision of the state-corporate structure as an unassailable monolith with nothing beyond its reach, only permitting initiatives which work in its favor, leaves little room for individual agency and invites apathy, reinforcing elite control rather than challenging it. Determining who benefits from an initiative—cui bono?—is not equivalent to assigning guilt, and the reality is usually more complex. Moreover, arguments and strategies aren’t invalidated simply because members of Congress or reactionary, dubious individuals happen to agree with them.

The belief that the form taken by these revelations is an elite-sanctioned process—that things only happen because powerful people want them to—resembles the curious theory espoused by some, including U.S. Naval War College professor and ex-NSA counterintelligence officer John R. Schindler (who also headed a 2002-2003 interagency intelligence task force on Iraqi WMD), charmingly referred to as “OpSnowden,” that Russian intelligence (namely, the Federal Security Service, FSB) is the dark hand behind these machinations aimed at weakening U.S. power. Although not particularly worth dwelling on, assuming the validity of this narrative, two issues must be separated: whether the leaks are the result of deliberate efforts on the part of the FSB operating through Snowden, or simply a fortuitous event working to their benefit. What is important to understand is that, regardless of whether or not there is substance to any of these suspicions, two facts remain:

  1. No one has of yet questioned the authenticity of any of the documents
  2. Whether the reporting is the result of the actions of a genuinely concerned citizen, the hidden hand of elite moneyed interests, a foreign intelligence agency or the Tooth Fairy is utterly irrelevant, as they are demonstrably in the public interest

Nothing indicates that Greenwald or Snowden hold solidly anarchist convictions, and therefore it would be wrong to expect either one to act in such a manner as to directly undermine or destroy prevailing institutions, which they seem to believe can be rendered viable by some manner of legislative constraint or more effective oversight (which has been extremely limited), spurred by public outrage or otherwise. Such a struggle would be played out largely in the courtroom, where instruments such as the NSA’s mass call-tracking program and the interpretation of Executive Order 12,333 would be challenged on the basis of their Constitutionality. Moreover, it seems misleading and intellectually lazy to present a dichotomy of opposing and mutually exclusive philosophies—reform versus radicalism—in which any manner of gradual reform supposedly precludes any possibility of substantial and fundamental change. There is a point at which systems that have undergone a sufficient amount of change become, in fact, qualitatively different systems. Most repressive institutions throughout history have in fact been eroded—or abolished—progressively over time by the work of countless individuals from within or without, and not as a result of isolated blunt force trauma, which, when applied to institutions as powerful as the U.S. government will only result in swift and violent reprisals; regardless of the methods adopted, those taking that risk should be able to make that decision, and not have it dictated to them. Civil disobedience always exacts a price, but only those actively engaging in it should decide what they’re willing to pay. One can’t help but be surprised at the arrogance of those who demand that those confronting authority take greater risks than they are willing to take themselves; as Silber once so eloquently put it: “If you love martyrs so much, then you be one.”

As for the reprisals, Snowden seems to have found a solution for the moment, so that his exemplar of avoiding immediate punishment might provide a template for others to follow—and that is the point. Another advantage of this model of whistleblowing is that it allows for the possibility of other individuals releasing information from different sources under the cover of these disclosures, as if they were part of the same stream of documents. The relevant question, as always, is: what options exist? While analysis and commentary are useful in the abstract, those operating within concrete political realities are faced with situations where their choices are severely restricted—the very definition of violence, I would argue. One could argue that whatever negative fallout occurs from mass, indiscriminate disclosures is the deserved lot of those engaging in dubious behavior anyway, or ultimately the fault of whatever power initially put them in harm’s way—a curious inversion of that favorite of authoritarian mantras: if you’re doing nothing wrong you’ve got nothing to hide. Radical strategies can backfire if one is unaware of the adversary’s capabilities, and although it is tempting to metaphorically take a crowbar to institutions which seem bent on domination and control, refusal to consider the possible consequences of one’s acts, especially when they involve entities as complex as a global surveillance network which penetrates many facets of human society, merely makes one a monster, not a moral actor.

Persian Empire Achaemenid

Persian Empire at 500BC, from The Historical Atlas by William R. Shepherd, 1923 (Perry-Castañeda Library Map Collection, University of Texas Libraries)

Though Herodotus’ account of Median king Deioces might not be historically reliable, assembled as it was from a mixture of legends subject to alterations or possible fabrications, it contains various elements of historical truth and illustrates some relevant principles. Of special interest is the notion of secrecy as an instrument of power: by surrounding himself with the opacity of these “fortifications” and formal ceremony establishing barriers between him and his subjects, the illusion was created of a special and unique status that would justify the right to rule over others. Precisely because most people would not tolerate being arbitrarily governed by someone of equal status and with no particular qualities or claims to authority, such qualities had to be artificially created. A similar logic is displayed by monuments such as the Ming Dynasty’s Forbidden City, whose numerous barriers, gates and strict regulations prohibited access to commoners, or various priesthoods and secret societies, who through rites of passage, exclusive meetings and associated arcana endow what might be rather ordinary proceedings with an aura of mystery. After being overthrown by Cyrus, the Median king’s practice of employing “spies and eaves-droppers”—or “watchers and listeners”—throughout his dominion would be, according to certain texts, adopted by the successor Achaemenid dynasty in the form of inspectors or supervisors, otherwise known as the “king’s eyes” and “ears,” sent to various locations to gauge the conduct of local administrators at the behest of the king. The administrative apparatus of the Achaemenid/Persian empire, which at its height around 500 BC stretched over approximately 8 million km² from present-day Iran and central Asia to the west to cover Egypt, Libya and portions of Greece, managed a sophisticated network of transportation, communications and what appears to have been an informal surveillance system in order to help successfully govern these extensive territories and subdue potential rebellions in remote areas. The society was feudal, power flowing directly from the king, and the territory divided into satrapies, or provinces, ruled by satraps, or local governors. Maintaining control over such a large, heterogeneous and multilingual empire meant enforcing Persian laws and collecting tributes, but it also meant collecting information; via Xenophon, Professor Christopher Tuplin of Liverpool University describes in his paper [PDF] on the ancient empire the regular visits of the king’s agents:

… careful reading of Xenophon suggests … although there was a single, very senior King’s Eye, the King’s practice of rewarding information from whatever source means that people behave as though he has many eyes and ears and is always looking and listening, because they have no idea who might betray any seditious utterances.

Both Manning and Snowden—and presumably the majority of those who release information from the bureaucratic and legal constraints of enforced secrecy—clearly enunciated as their motives the desire to simply widen the circle of debate from the groups of which they were a part, where the institutional requirements of authority and discipline ensured that their complaints would receive little attention, to a broader public not subject to the same constraints and thus freer to examine the issues more honestly and objectively. Because clandestinity has always been a requirement and valued perquisite of intelligence agencies—and criminal conspiracies—naturally, there is resistance to divulging secret information, which impairs the ability of such organizations to operate, as well as diminishing their power. This reluctance manifests itself in several ways, including rampant overclassification—recognized to be endemic, even by the CIA, which noted already in 1976 [PDF] the “overclassification, unnecessary classification, vagueness of the classification criteria,” how it had in some offices “become a reflex action to place Secret upon a piece of paper”—as well as deluges of Freedom of Information Act (FOIA) requests, one tool available to the public that agencies often use the usual methods to block. Rather than being a “flaw” of the classification system, however, overclassification may be to some extent an intended feature of bureaucracies which value secrecy above all else, especially when the principal adversary is reasonably deemed to be the domestic population, and not foreign powers, as is commonly believed. Daniel Ellsberg, the liberator of the Pentagon Papers, persuasively described the dynamics at work within such organizations, where loyalty is highly prized and transgressions severely punished (see: “Secrecy and National Security Whistleblowing” [PDF]), worth quoting at length:

The promise to keep “secrets of state,” once demanded and given, becomes virtually part of one’s core identity. In the national security apparatus, one’s pride and self-respect is founded in particular in the fact that one has been trusted to keep secrets in general and trusted with these particular secrets. Second, they reflect one’s confidence that one is “worthy” of this trust. Indeed, the trust (with respect to truly sensitive secrets, requiring utmost reliance on the discretion of the recipient) will have been “earned,” before being conferred, by a long history of secret- keeping, building habits that are hard to break, that form part of one’s character. […]

One could regard secret-keeping in such a group as simply a form of obedience to orders or regulations or directives from authorities. But often, I would say, it is closer to contractual behavior, keeping a promise or agreement. “Keeping one’s promises,” and keeping agreements are recognizably among the highest values we are taught to observe as children and adults. What I am exploring here is how it comes about that people in organizations in some circumstances act as if those values are actually absolute, overriding other considerations that would appear to an observer to be extremely compelling. […]

For the Mafiosi “men of honor” (interestingly, the title of William Colby’s memoir of his life in the CIA is “Honorable Men”) the agreement to keep secrets is so central that the oath of membership includes the explicit acceptance of ultimate sanctions–death or worse, including “burning in hell,” for oneself and even one’s family–if the obligation of silence to outsiders, omertà, is broken. Thus is expressed loyalty to the organization that goes above loyalty to one’s own life and even to the lives of one’s family members.

This represents an extreme, but even for gangsters that overriding physical danger doesn’t entirely eclipse the additional threat that applies as well to other groups throughout society, the fear of psycho-social punishment for “spilling secrets,” “washing dirty linen in public,” “ratting” on one’s team. It is a fear not only of expulsion and ostracism but of one’s own awareness that outsiders as well as team-mates will feel that these consequences are deserved: and fear of one’s own sympathy for such judgments, a sense that the reaction is understandable and appropriate. The “snitch” is an object of intense contempt not only from gang members but even from their adversaries, the police: an uncanny revulsion that the “informer” is painfully inclined to share about himself.

I am suggesting that in the national security bureaucracy in the executive branch (and now, regrettably, the intelligence committees of Congress as well), the secrecy “oaths” (actually, agreements, conditions of employment or access) have the same psycho-social meaning for participants as the Mafia code of omertà, with the difference that the required “silence to outside authorities” forbids truthful disclosure not to the state or police but to other branches of government and the public.

Loose lips sink ships WWII poster

WWII poster created for Seagram Distillers Co. by Seymour R. Goff (the phrase originated with the War Advertising Council)

What this highlights more generally is that institutions with an overriding mission—whether they be intelligence agencies, corporations or other groups—have a way of creating their own modes of self-preservation which generate a set of written and unwritten rules. These rules dictate acceptable behavior, causing individuals either to act in ways which might otherwise conflict with their own values, or simply to modify those values in order to conform with the institutions, as fear of ostracism outweighs all other considerations. That is, institutions can generate two effects: 1) transform individuals, or 2) cause them to accept the legitimacy of what they would otherwise consider illegitimate, through the assigning of specific roles and a diffusion of responsibility, allowing them to ignore the consequences of their actions, even if they happen to be highly destructive. After all, an engineer designing a tool is not immediately concerned with how it might be used, but rather whether or not it functions… Individuals who disobey step out of these assigned roles to disrupt the normal functioning of the organization—in other words, although individual human beings may be moral actors, institutions, which pursue their own objectives, are not. Describing her meeting with NSA director General Keith Alexander, Jennifer Granick, expert on civil liberties and Cyberlaw, suggested that though the “easy answer” to explain the general’s attitude would be to characterize him as an evil man, it is “a simplistic view that masks the truth about systems of power, a truth we must understand and respect if we are to fix this surveillance nightmare we are just beginning to uncover.” This astute observation raises an important point: while it may be comforting to believe that a few overzealous individuals are responsible for perverting an otherwise legitimate process, this avoids considering the more disturbing prospect that what we are seeing are simply the normal workings of a powerful organization which will exploit any possibility to achieve its ends, regardless of who sits at its head. What also needs to be considered is the extent to which state officials can internalize certain values, convincing themselves of their benevolent intentions, whatever the record may show.

As for the divulging of secret information, despite an aggressive campaign to deter whistleblowing, the U.S. government itself “leaks like a sieve,” often from top officials themselves; Columbia Law School associate professor David E. Pozen proposes that the failure to enforce laws against leakers is a result of “key institutional actors shar[ing] overlapping interests in maintaining a permissive culture of classified information disclosures.” As a result of vagueness surrounding the regulatory scheme concerning classified information, an informal “equilibrium” has been established within what Pozen calls an “intricate ecosystem,” where national security leaking can be seen as a calibrated strategy in the effort to engineer public consent for White House policies, as well as send messages to adversaries (see: Pozen, “The Leaky Leviathan: Why the Government Condemns and Condones Unlawful Disclosures of Information”, 2013 [PDF]). It should be clear: there are good leaks, and there are bad leaks, and good leaks are but one component in a broader campaign of public relations or psychological warfare. One standard objection to projects like Wikileaks is that such initiatives are harmful to diplomacy and potentially endanger the lives of sources or U.S. nationals abroad: although it was shown that little harm came of the revelations contained in the unredacted release in 2011 of State Department cables (it is worth repeating that the trove contained nothing above Secret), the standard response followed, labeling the act “irresponsible, reckless and frankly dangerous.” Though rare, it is possible to identify positive initiatives which might be thwarted by unwanted disclosures, such as the recent diplomatic developments between the U.S. and Iran, brokered by the Gulf sultanate of Oman (which stands to benefit from a pipeline agreement with Teheran), or information which would genuinely prove dangerous to divulge, such as nuclear launch codes—the fact remains, however, that the danger presides not so much in the divulging of the codes as it does with the existence itself of the weapons, largely the result of Cold War irrationality and paranoia.

In order to evaluate the authenticity of this supposed commitment to responsible behavior, we might apply it to other events at about the same time involving U.S. foreign policy objectives—examples are not hard to find. As part of the high priority search for Osama bin Laden, the CIA, tasked with finding “new and inventive solutions” to gain access to the compound in Abbottabad, had engineered a covert intelligence gathering operation disguised as a public health service—a mock hepatitis B vaccination drive—as a ruse to obtain DNA from bin Laden, a mission for which it recruited the Pakistani Dr. Shakil Afridi. After the fatal raid, Afridi was arrested, “disappeared,” brought into Inter-Services Intelligence (ISI) custody, interrogated, and subsequently tried on various charges in a judicial process that is still ongoing. Doctors Without Borders/Médecins Sans Frontières (MSF) condemned the operation as “a grave manipulation of the medical act” undermining public trust in public health workers, thereby jeopardizing necessary public health campaigns; later, MSF would deplore the “climate of rumors and suspicion” preventing the organization from carrying out mass vaccination programs in the country; other organizations similarly warned of potential fallout, commenting that U.S. officials “imprudently burned bridges that took years for health workers to build,” warning that the CIA’s “reckless tactics could have catastrophic consequences”; the deans of twelve prominent public health schools addressed President Obama in January 2013, denouncing the precedent set by the “sham” operation, adding that the UN was forced to suspend vaccination efforts in Pakistan at a time when polio was on the verge of being eradicated; health workers have been repeatedly assassinated as the indirect effects reverberate through to the present. Or let us consider the joint U.S./Israeli covert online espionage/sabotage campaign aimed at Iran’s nuclear program (Operation OLYMPIC GAMES), better known by the Stuxnet computer virus (which was really a double program), designed to sabotage the cylinders at the Natanz nuclear enrichment facility, versions of which were apparently being developed as early as 2005: by infecting the programmable logic controllers (PLCs) commanding the enrichment centrifuge speeds, this sophisticated worm transformed abstract computer code into an actual physical weapon—in other words, the joint U.S./Israeli campaign initiated offensive cyberwarfare, but like the fabled sorcerer’s apprentice, the manner in which it would proliferate is beyond their control. The code itself spread beyond its intended target, probably as a result of human hands, to infect other networks, among which reportedly Chevron‘s IT department and a Russian nuclear plant—more ominous, though, is the prospect of inaugurating an era of state-sponsored cyberwarfare the consequences of which are largely unforeseeable and not well understood.

Although we would like to think that these types of mischief, admittedly small in number but significant, would provide an occasion for condemnation or at least calls to exercise caution from our political leaders and their servants in the press, they are likely for the most part to remain silent. This capricious behavior might seem mysterious unless we fully appreciate the politically correct definition of “harm”: that which impedes us from achieving our goals, whatever they happen to be. It logically follows from this definition, then, that these episodes are not considered “harmful,” but simply illustrate the acceptable costs of carrying out our noble mission in the world—acceptable to us, that is. Similarly, it should be understood that the prospect of bodily harm coming to collaborators or sources is of minor concern; far more important is ensuring the crucial cooperation of individuals ready to help further U.S. interests abroad, and therefore “[m]aking people think twice before providing the U.S. with information—or simply refuse ever again to help—hurts the good causes of human rights and democracy that American officials are promoting.” Whatever else happens, we can be reasonably sure that those designing policy will go to extreme lengths to maintain dominance and superiority, overriding questions of public safety, as has often been historically the case—sometimes to a surprising extent.


Attempts to remedy the present situation are confronted with several barriers. A seemingly intractable problem highlighted by the disclosures is the existence of a divide created by the sophistication of modern communications technologies. This divide manifests itself by a conflict between technical capabilities and the legal restraints intended to circumscribe them, as well as by a form of segregation between a community of specialists and the general population, the great majority of which employs communications technologies it doesn’t need to intimately understand in order to use. This in fact creates a double secrecy, the first level of which is related to national security concerns—classification levels and punishment for the revealing of secrets—and a second level, being an opacity created by the inherent complexity of the phenomenon itself, difficult to approach. Although the leaks were intended to spark a public debate, and most individuals are instinctively resistant to efforts to encroach upon their private spaces, the majority does not possess the necessary vocabulary to evaluate all the technical aspects of digital surveillance, nor the expertise to develop the tools and armor necessary to thwart it, and can only approach the phenomenon in broad, philosophical terms. Although it would seem the desire to not be spied upon should be sufficient to protect oneself from the prying eyes of intelligence agencies, criminal organizations, or other individuals, we know from experience that any existing weakness or possibility will eventually be exploited, and the possibilities limited only by the talent of those developing and using the tools: it is therefore the capacity for surveillance itself which is problematic, and not the intentions, whether they be good or bad, of those wielding this immense power.

As was recognized already in June of 2013, shortly after Snowden revealed himself as the source of the documents, there is a basic conflict between the technical capacities of the NSA and the framework of legal restraints designed to delimit them; this points to a broader problem of whether it is even possible for any judicial oversight to successfully rein in the actions of a surveillance apparatus which by its very nature must work to outstrip any constraints or challenges put upon it (a history of some aspects of judicial oversight of NSA activities can be found here). Although the failure to properly define the limits of the actions of the NSA—and the intelligence community (IC) more broadly—is partly by design and a result of inadequate oversight, it may also be an inevitable result of the intrinsic properties of both activities: legal solutions are limited by the inherent ambiguities of language (which allow for varying interpretations of legal doctrine), the lack of political will to enforce them (secret courts make this even more difficult), and the inertia of a legal establishment which is slow to adapt to—or even unaware of—new realities; the capacity for surveillance, however, rises more or less proportionally with the development of new communications technologies, and is therefore constantly in flux, only limited by the imaginations of those conceiving them. The implications of this are numerous, but it should be clear that increasing or intensifying the means and methods of communicating with others, by virtue of the information associated with such communications, simultaneously increases one’s chances of undergoing surveillance. Underscoring this point, Julian Assange once remarked that the Internet is “the greatest spying machine the world has ever seen,” an observation which is difficult to refute. This implies that for the moment the only sure remedy is of a technical nature, such as securing one’s communications through various methods of encryption or other creative means of obfuscation—thereby shifting the battlefield away from the courtroom towards a terrain where resourcefulness and ingenuity are the only certain defenses.

Although it reports to the Director of National Intelligence, it must be remembered that the NSA/Central Security Service (CSS) operates under the jurisdiction of the Department of Defense. Military dominance is built into the very fabric of the U.S. political economy: the DoD, which accounts for roughly half of Federal discretionary spending ($526.6 billion requested for FY2014, plus $79.4 billion for Overseas Contingency Operations [OCO]), is a major instrument for public subsidizing of high tech industry, which ensures that much research and development will be initially supported in light of potential military applications (before transferring it to the civilian or private sector), guaranteeing virtually unlimited funding for institutions like the NSA to pursue its goals—such as building a quantum computer as part of its $79.7 million “Penetrating Hard Targets” research program, among others. Although the NSA has in fact been publicly sponsoring quantum computing research for years through various institutions, its parallel efforts to “preserve the SIGINT [signals intelligence] potential of quantum computing” and to develop “cryptanalytic QC to attack highgrade public key encryption systems” were being closely guarded under a higher classification level. The Consolidated Cryptological Program (CCP), a joint IC program the bulk of which is operated by the NSA, was allotted $10.8 billion for FY2013, with a projected budget of at least $50,7 billion for FY2013-2017. As part of this program, GENIE, an operation allotted $652 million for FY2013, directs efforts to infiltrate and exploit foreign networks by inserting “covert implants,” or malware, into computer systems, either by covert agents, or more often remotely by what are called Tailored Access Operations (TAO), which sometimes employ elite hackers to “compromise” chosen targets; these operations range from traditional intelligence gathering to more aggressive attacks (see: IC FY2013 budget [PDF]). Over time the perception of cyberspace has undergone a gradual but inevitable shift from being a simple infrastructure for data flow to being another potential terrain for low intensity conflict—one stated ambition was to “support Computer Network Attacks as an integrated part of military operations”—a development which has been accelerated by the Obama administration, in what could be characterized as a militarization of the Internet. The range of existing techniques developed by the NSA to gain control of information is extensive and alarming, demonstrating surprising creativity, briefly outlined by security researcher Jacob Appelbaum at the 2013 Chaos Communications Congress (30c3) in Hamburg, Germany. Recognizing cyberspace as its own “operational domain” (the recognized military domains are: land, air, maritime, space, and cyberspace), U.S. Cyber Command (USCYBERCOM) was established in 2009 subordinate to U.S. Strategic Command (USSTRATCOM) to execute “defensive and offensive missions,” currently directed by NSA director General Alexander, for which a Joint Operations Center is tentatively scheduled to be occupied by 2017 at Fort Meade, Maryland. Likewise, the 2012 Defense Strategic Guidance [PDF] prescribes expanded capabilities for cyber and space-based activities, echoed in the Pentagon’s FY2014 budget request: owing to the “unique attributes” of cyberspace, forces are to collaborate with “Federal, state and local governments, private sector partners, and allies and partners abroad” to “detect, deter, and, if directed, respond to threats in cyberspace”—which of course means anywhere in the world (see: DoD FY2014 budget request overview [PDF]).

Subsequent to a memorandum from President Truman, National Security Council Intelligence Directive (NSCID) No. 9 established the NSA on December 29, 1952 as a member of the United States Communications Intelligence Board (USCIB). The stated mission of the NSA pertaining to communications intelligence (COMINT) was “to provide an effective, unified organization and control of the communications intelligence activities of the United States conducted against foreign governments, and to provide for integrated operational policies and procedures pertaining thereto,” COMINT being “all procedures and methods used in the interception of communications other than foreign press and propaganda broadcasts and the obtaining of information from such communications by other than the intended recipients”—information obtained “by other than the intended recipients,” meaning eavesdropping. Secrecy and disinformation being central components of warfare, it should be unsurprising to find the origins of the NSA within the different branches of the military establishment, engaged in signal interceptions and code breaking. Moving into the past, the numerous predecessors to the NSA and their various ad hoc bureaucratic permutations began within the Army and Navy in 1917 at the outbreak of World War I: a clandestine cryptanalytic unit run by Herbert O. Yardley, appointed by Philippines campaign veteran Ralph Van Deman—Cable and Telegraph Section (MI-8)—was established within the Military Information Section (MIS) of the War Department General Staff, while the Cryptographic (Cipher) Bureau was established within the Office of Naval Intelligence; the Cipher Bureau was soon incorporated into the Army’s MI-8 in 1918 under the newly re-established Military Intelligence Division (MID). MI-8 was abolished in 1929 when Secretary of State Henry Stimson withdrew funding for the activity; he later was known for his admonishment that “Gentlemen do not read each other’s mail.” During WWII, military COMINT was produced by the Signal Intelligence Service (SIS), later renamed the Signal Security Agency (SSA), while the Office of Strategic Services (OSS), the precursor to the postwar Central Intelligence Agency (CIA), worked mostly behind enemy lines. Since its creation in 1952, the agency had managed to remain largely obscure until revealed to the public for the first time by former senior NSA analyst Perry Fellwock (pseudonym “Winslow Peck”) in his August, 1972 interview with Ramparts magazine, in which he introduced, according to the New York Times, “hitherto suspected but obscure details of electronic eavesdropping around the globe,” including the existence of the intelligence cooperation between the so-called “Five Eyes”—the U.S., Great Britain, Canada, Australia and New Zealand—as well as the possibility that the Soviet military threat had been severely inflated, an assessment which had turned out to be largely accurate.

NRO satellite octopus NROL-39

Mission emblem for Dec. 5, 2013 National Reconnaissance Office (NRO) satellite launch

In tandem with its gradual militarization, efforts ensued to weaken the fabric of the Internet in order to render communications more transparent. The NSA sought “unrestricted access” to the use of cyberspace, by leading “an aggressive, multipronged effort to break widely used Internet encryption technologies,” as well as through direct collaboration with telecommunications companies, in the process inserting vulnerabilities into the Internet [PDF]. The proliferation of methods to safeguard privacy during the “crypto revolution” of the 1990s would bring the U.S. government into conflict with those developing encryption technologies which “crippled N.S.A.’s ability to listen in on the world”—when the NSA met with public opposition to its efforts, it ostensibly abandoned its project while surreptitiously pursuing the same goals. All options must be explored to tilt the playing field in one’s favor in the drive for hegemony and superiority over potential adversaries, even at the risk of undermining technologies developed to secure communications—whether it be tampering with random number generators underpinning widely used cryptographic protocols, collaborating with telecommunications giants to introduce key-escrow “back door” systems into communications devices (Clipper chip), or restricting export controls on “[c]ryptographic (including key management) systems, equipment, assemblies, modules, integrated circuits, components or software with the capability of maintaining secrecy or confidentiality of information,” which as late as 1992 were considered a form of military “munitions” subject to arms control export laws (although rules have been relaxed, certain encryption technologies are still subject to export controls). From the point of view of an institution dedicated to “information dominance,” to gaining access to all communications anywhere, the logic behind these schemes is undeniable: the privacy protection offered by robust encryption “shields the law abiding and the lawless equally,” making eavesdropping on potential adversaries more difficult. This quest for “information dominance” is part of the broader quest for the vaunted ideal of “full spectrum dominance” described in U.S. military literature—a concept recently expressed (with a bit more nuance) as “maintain[ing] a broad portfolio of military capabilities that, in the aggregate, offer versatility across the range of missions.”

As with the Cold War confrontation between superpowers, and the possession of weapons of mass destruction, the guiding logic is that the worst must be assumed of the adversary, who is surely developing his own capacities, and therefore we must reciprocate; and if such power is to exist, it might as well be in our hands, where at least it will be exercised responsibly—a dubious assumption, it goes without saying. Broadly speaking, since World War II, and the advent of nuclear weapons raising the specter of ultimate destruction, there was a shift away from open conflict between state actors, recognized to be too dangerous, to what was sometimes labeled “asymmetric conflict,” often waged in Third World theaters in the context of the Cold War. With the collapse of the Soviet Union, U.S. planners and intelligence, absent their principle state adversary, were forced to reorient themselves towards a “multiple threat” environment, exemplified by the supposed “growing technological sophistication” of the Third World (see: 1990 National Security Strategy [PDF]). These conflicts generally manifested themselves as struggles between states and non-state actors, insurgencies, terrorists and guerrillas, informal networks who by their very nature are not bound to any particular geographical territory; this meant that communications had to be susceptible to penetration anywhere around the world—including U.S.-based communications—because, in Columbia University law professor Eben Moglen’s words, military and intelligence strategists “came to regard American rights in communications privacy as the equivalent of sanctuary for guerrillas.” Like encryption, the legal restraints barring the NSA from engaging in domestic surveillance were simply an obstacle to be overcome—duly swept away when the September 11, 2001 attacks provided the impetus to turn programs inward which had been conceived with the possibility of safeguarding some of the civil liberties of U.S. persons. Though certain provisions of the Universal Declaration of Human Rights, adopted by the UN General Assembly on December 10, 1948, may appear quaint today—namely that “everyone has the right to life, liberty and security of person,” and that “no one shall be subjected to arbitrary interference with his privacy, family, home or correspondence”—we might also consider what would happen if we were to take them seriously. Moglen again:

If we are not doing anything wrong, then we have a right to do everything we can to maintain the traditional balance between us and power that is listening. We have a right to be obscure. We have a right to mumble. We have a right to speak languages they do not get. We have a right to meet when and where and how we please so as to evade the paddy rollers.


Update (Jan. 8): Daniel Ellsberg highlights the difference between an oath and a non-disclosure agreement, by way of Amy Davidson and Marcy Wheeler responding to Fred Kaplan’s January 3 temper tantrum in Slate. I suppose Kaplan was simply using the word “oath” in a general sense, to mean “agreement” here, in which case he is correct that Snowden—fortunately for us—violated that agreement.


Update II (Jan. 9): Information was leaked to the press (who ever would do such a thing?) about a recent classified Pentagon report allegedly determining that Snowden “downloaded” 1.7 million intelligence files, much of it concerning “vital operations of the U.S. Army, Navy, Marine Corps and Air Force,” according to Rep. Mike Rogers (R-Mich.), chairman of the House Intelligence Committee. That the documents contained information relevant to military operations, if true, is not surprising, as the NSA/CSS provide intelligence for and collaborate with various military intelligence services. Predictably, lawmakers claimed that these “real acts of betrayal place America’s military men and women at greater risk,” as the disclosures “have already tipped off our adversaries to the sources and methods of our defense,” actions which “aligned him with our enemy.” As always, skepticism is required of such boilerplate claims smelling of fire and brimstone, and it is not explained how the exact number of 1.7 million documents was determined, nor if the report differentiated between documents that were merely accessed as opposed to downloaded—nor whether Snowden would have indiscriminately given all of these documents to the journalists. At the same time, the Guardian reports that the draft report of a European parliamentary inquiry has come to a very different conclusion, condemning in the “strongest possible terms” the programs revealed by the disclosures, calling on U.S. and European authorities to “prohibit blanket mass surveillance activities and bulk processing of personal data” and on the U.S. to align its policies with international law, recognizing “the privacy and other rights of EU citizens.” Echoing his U.S. counterparts, conservative MEP Timothy Kirkhope claimed that “Snowden has endangered lives.”

Of interest here is the fact that, for some, proof is rarely required when claims of national security are involved—they are simply assumed to be self-evident.


Update III (Jan. 10): A new paper by Kevin S. Bankston and Ashkan Soltani has been published in the Yale Law Journal Online (YLJO) on how the increasing sophistication of location tracking technologies has lowered the barriers to surveillance [PDF]. This more systematic and thorough presentation elaborates on the more basic point I made above on the inherent conflict between technological progress and legal constraints, through the lens of 4th Amendment protections, observing that “a new surveillance technique is likely to violate an expectation of privacy when it eliminates or circumvents a preexisting structural right of privacy and disrupts the equilibrium of power between police and suspects by making it much less expensive for the government to collect information.” These observations are of course directly relevant to the present discussion. They propose a more concrete cost-based metric to measure law enforcement infringements on what they call “structural privacy rights”:

The simple idea is that structural constraints—physical and technological barriers—make certain conduct costly, sometimes impossibly costly. These costs act as non-legal regulations, essentially providing a non-legal “right” against the behaviors they prevent. Yet rapid changes in technology can quickly and unexpectedly eliminate these long relied-upon structural rights, especially when it comes to privacy. Surden’s message to policymakers, similar to Kerr’s message to the courts, is that they can recognize and adjust for diminishing structural rights against privacy invasion by adding new legal protections to replace them as they are lost—i.e., that they can impose new legal costs to compensate for the drop in actual costs.

surveillance tracking methods Bankston Soltani

A Visual Comparison of Location Tracking Methods (image: Yale Law Journal Online)


Update IV (Jan. 12): The draft report of the European parliamentary inquiry into the “US NSA surveillance programme, surveillance bodies in various Member States and their impact on EU citizens’ fundamental rights and on transatlantic cooperation in Justice and Home Affairs” has been made available (via Glenn Greenwald) [PDF]. Observing, among other things, that an “increasing focus on security combined with developments in technology has enabled States to know more about citizens than ever before,” that “technological developments have led to increased international intelligence cooperation, also involving the exchange of personal data, and often blurring the line between intelligence and law enforcement activities,” and that “most of existing national oversight mechanisms and bodies were set up or revamped in the 1990s and have not necessarily been adapted to the rapid technological developments over the last decade,” it notably states that it is:

… doubtful that data collection of such magnitude is only guided by the fight against terrorism, as it involves the collection of all possible data of all citizens; points therefore to the possible existence of other power motives such as political and economic espionage

Additionally, it proposes a European Digital Habeas Corpus for protecting privacy governing data transfers to the U.S., as well as developing a “European strategy for IT [information technology] independence.” Also of interest is the list of people who declined to participate in the Committee on Civil Liberties, Justice and Home Affairs (LIBE Committee).

Finally, some helpful images from TeleGeography—along with the submarine cable map—will illustrate better than anything the extent to which communications are globalized and interconnected (click to enlarge):

map communications global traffic

Telecommunications: global traffic 2010 (image:

map communications global internet

Telecommunications: Internet map 2012 (image:


Happy Thanksgiving 2013

November 28, 2013 § 1 Comment

History can be a dangerous thing, for two reasons: 1) because it is often the victors and/or dominant sectors of society who write official history, it is subject to the usual distortions and falsifications, and 2) because once you begin to study it seriously, you might actually learn something. So here is a history lesson to go with your turkey, stuffing and mashed potatoes, all true (except for Burroughs’ fanciful “laboratory-developed AIDS,” which, as far as we know, seems to have originated in present-day Cameroon a century ago, spread partly as a result of European colonial adventurism). Oh, and don’t talk politics at the table, it’s not polite.

Thanksgiving Prayer

For John Dillinger
In hope he is still alive
Thanksgiving Day, November 28, 1986

Thanks for the wild turkey and the Passenger Pigeons, destined to be shit out through wholesome American guts
-thanks for a Continent to despoil and poison
-thanks for Indians to provide a modicum of challenge and danger
-thanks for vast herds of bison to kill and skin, leaving the carcasses to rot
-thanks for bounties on wolves and coyotes
-thanks for the American Dream, to vulgarize and falsify until the bare lies shine through
-thanks for the KKK, for nigger-killing lawmen feeling their notches, for decent church-going women with their mean, pinched, bitter, evil faces
-thanks for “Kill a Queer for Christ” stickers
-thanks for laboratory AIDS
-thanks for Prohibition and the War Against Drugs
-thanks for a country where nobody is allowed to mind his own business
-thanks for a nation of finks — yes,
-thanks for all the memories (all right, lets see your arms, you always were a headache and you always were a bore)
-thanks for the last and greatest betrayal of the last and greatest of human dreams.

— William S. Burroughs

American Holocaust: The Destruction of America’s Native Peoples
David Stannard, professor and chair of the American Studies Department at the University of Hawaii

Decoding Language, part I

September 13, 2013 § Leave a comment

Yesterday it was reported that Ketchum, a public relations firm, had placed a September 11 Op-Ed by president Vladimir Putin into the New York Times, which Buzzfeed editors characterized as “controversial.” The Times‘ public editor promptly issued an explanation, the editorial page editor stating that “[v]ery few Op-Ed articles have received as much immediate attention;” hyperventilating patriots were “horrified” that the journal was “aiding and abetting a long-term foe of the United States” by printing Putin’s dangerous sorcerer’s incantations. Max Fisher declared that it contained “undeniable hypocrisy and even moments of dishonesty” — which begs the question as to why anyone would therefore be surprised to see it in the Times, which employs a scribbler such as Thomas Friedman. Such fact-checking is indeed welcome, no doubt, but there have been episodes where it would have been much more helpful. Justin Elliot writes that Ketchum has a history of placing articles at the behest of the Kremlin, with the goal of, among other things, promoting Russia “as a place favorable for foreign investments.” So, what we have learned here, hardly news, is that governments will do anything they can to further their interests, including influence campaigns in foreign media outlets.

Despite the predictable howling from those still clinging to an outdated, fanatical cold war ideology, in its substance the Op-Ed was banal, the only striking element being that it was — supposedly — penned by a foreign head of state. In its tone rather conservative, called “A Plea For Caution From Russia,” it claimed that “there is every reason to believe it [gas] was used not by the Syrian Army, but by opposition forces, to provoke intervention by their powerful foreign patrons, who would be siding with the fundamentalists.” It should be clear that Putin, as a head of state with clear interests at stake in events unfolding in Syria, and capable of marshaling vast resources for a propaganda campaign, should no more be taken at his word than anyone else. However, while the evidence from the UN has still not been presented, and no chain of custody has apparently been established for whatever weapon(s) was (or were) used, such an explanation should be seen as no less plausible than the claims of the U.S. government (which possesses little credibility itself on this matter) as to the nature of its “proof” incriminating the Assad regime.

Words often have several meanings depending on the context, and here “controversial” simply means “that which does not toe the Party Line” — the Party Line being that the Syrian government unambiguously carried out the recent August 21 attacks on the Damascus suburbs — rather than “that which sparks robust debate,” or “that which is unsupported by evidence.” Such a definition creates the circumstances for some startling leaps in logic, and discipline can be enforced to such a degree that if the Party Line dictates that the Earth is flat, stating that it is in fact spherical will be considered “controversial.”

Other words are often, and have always been, employed, not for their intrinsic meaning, but rather for their utility as ideological cudgels against opponents. John Schindler, former NSA analyst and counterintelligence officer who now teaches national security affairs at the U.S. Naval War College, theorizes that Edward Snowden and Wikileaks are likely fronts for an elaborate Russian intelligence operation (a rather convincing dissection by Tim Cushing of this conspiracy theory may be found here). Notwithstanding that such a scenario is possible, and shouldn’t be completely ruled out, Schindler’s theory is reminiscent of the paranoia to which intelligence agencies themselves can fall prey, while assuming the worst of their adversaries, leading them to erroneous conclusions, due to their own ideological bias. He believes that journalists mediating the slow trickle of revelations gleaned from leaked documents are waging a “propaganda offensive,” and “have masked their radical activism under the (thin) guise of post-modern journalism.”

The operative phrase here is “radical activism,” and it is meant, among other things, to differentiate what people like Poitras, Greenwald and Barton Gellman are doing from the “authentic” and “objective” journalism which would be more to his liking. The phrase is in fact a smear, and as a smear, it carries little content, but is intended to vilify political opponents in order to marginalize and discredit them. The tactic is a staple of ideological warfare with a long tradition, the palette of insults offering such terms as “communist,” “isolationist,” “liberal,” “anarchist,” “traitor,” and countless other epithets, the purpose of which is to render objects of vilification, and the ideas represented, toxic by attaching stigmata, thereby isolating them, and preventing any substantial debate on the issues themselves. What the words actually mean, or whether the objects of scorn actually demonstrate such qualities, is wholly irrelevant.

One could, for example, ask whether it is not the policies themselves that are extreme and not those criticizing them — but that would require a modicum of honesty. A brief overview of some examples of this and past U.S. administrations’ “radical” policies will suffice: John Yoo’s radical executive theories, which authorize the president to act virtually without constraint, the global rendition and torture network initiated after the September 11 attacks, the 2003 invasion of Iraq, now acknowledged by anyone with a pulse to have been illegal and immoral, the highly destructive consequences of which are still resonating in the region, the continued deployment of nearly two thousand nuclear warheads, including the latest nuclear posture review, which retains the doctrine of “counterforce” and a hypothetical first strike capability, the Kennedy administration’s terrorist campaign against Cuba, the near destruction of Indochina, the Reagan administration’s arms transfers supporting a campaign to destroy parts of Latin America, including the more recent expansions of a presidentially authorized UAV assassination program and sprawling surveillance/security state, to name just a few. If these aren’t considered “radical,” then the word indeed has no meaning, and can be used for whatever purposes one wishes.

The National Security Agency’s invasive, global spying network, not to mention U.S. intelligence agencies’ collaboration on more offensive “cyberwarfare” capabilities, exemplified by the Stuxnet virus (along with Israel), appropriately takes its place among such extreme policies. Regarding the ongoing NSA disclosures, I have seen some who are of the opinion that such secret information must be kept “out of the hands” of “radicals” (meaning, the public), the responsible gentlemen like General Keith Alexander presumably being the more appropriate guardians of an aggressive surveillance apparatus — such a person is incapable of even entertaining the possibility that the radicals do indeed already have control of the apparatus, as they seem to be the ones running it.

Spectators to Slaughter

September 8, 2013 § Leave a comment

U.S. Secretary of State John Kerry, while in Paris on a European tour among other things to garner support for overt military action against Syria, in addition to the usual bromides and rhetoric one would expect from a travelling salesman, sternly warned that “this is not the time to allow a dictator unfettered use of some of the most heinous weapons on earth.” Strong words coming from the world’s largest arms dealer. Alluding to the 1938 Munich agreement, in which several European nations agreed to let Nazi Germany annex the Sudetenland, Kerry stated that this was “our chance to join together and pursue accountability over appeasement.” The reference, besides being inappropriate, is interesting; at the time those designing policy in the U.S. and Britain saw fascism as a more palatable alternative to communism, and therefore believed that it should be encouraged, especially in Germany and Italy, in order to “stay the advance of Soviet Bolshevism in Europe.” Believing he represented “the more moderate section of the [Nazi] party,” the State Department observed in 1933 that “it is perhaps well that Hitler is now in a position to wield unprecedented power.” In 1937, a year before the famous agreement — which it has become fashionable for hawks to cite whenever advocating military action over diplomacy — the U.S. State Department issued a thorough report on German fascism. David Schmitz writes, in The Triumph of Internationalism:

Contrary to the prevailing wisdom on bolshevism and the Soviet Union, the department found fascism as a system compatible with free trade and liberal governments. Means, therefore, could be developed to convince Germany to reject territorial expansion and economic self-sufficiency for international cooperation. The report explained that the rise of fascism stemmed from a threat from the Left brought about by the Great Depression. “When there is suffering, the dissatisfied masses, with the example of the Russian revolution before them, swing to the Left. The rich and middle classes, in self-defense turn to Fascism.” Defining fascism as the natural movement by the respectable classes to defend order and property from communism, the department believed that where fascism was in power, “it must succeed or the masses, this time reinforced by the disillusioned middle classes, will again turn to the Left.” […]

As the State Department concluded, “economic appeasement should prove to be the surest route to world peace.” Appeasement was essential if war was to be avoided. “If Fascism cannot succeed by persuasion” to solve Germany’s problems, “it must succeed by force.”

Putting aside the fact that those in Washington have been more than happy to be “spectators to slaughter” in the past, depending upon who the victims were, there is one sense in which Kerry’s statement rings true: they indeed don’t wish to be “silent spectators to slaughter” here — rather, they wish to participate in it directly.

Democratizing Information and Privacy

September 6, 2013 § 1 Comment

No laws define the limits of the N.S.A.’s power. No Congressional committee subjects the agency’s budget to a systematic, informed and skeptical review. With unknown billions of Federal dollars, the agency purchases the most sophisticated communications and computer equipment in the world. But truly to comprehend the growing reach of this formidable organization, it is necessary to recall once again how the computers that power the N.S.A. are also gradually changing lives of Americans – the way they bank, obtain benefits from the Government and communicate with family and friends. Every day, in almost every area of culture and commerce, systems and procedures are being adopted by private companies and organizations as well as by the nation’s security leaders that make it easier for the N.S.A. to dominate American society should it ever decide such action is necessary.

— “The Silent Power of the N.S.A.,” The New York Times, March, 1983

The Guardian, ProPublica and the New York Times published yesterday what seems to be the most important story to date on the NSA/GCHQ global surveillance system, the Times remarking that the NSA is “winning its long-running secret war on encryption.” I wrote earlier that the central purpose of such surveillance, and I still believe this is true, is to create a world with no blind spots, in which those in power have total access to any communications at all times, an information environment in which no one is hidden or beyond their gaze, to “maintain unrestricted access to and use of cyberspace” — and it’s about control. To maintain such a worldview, everyone must be seen as a potential enemy. And it’s about you: The major deciphering projects — Bullrun (successor to Manassas), and Edgehill — are named after famous civil war battles fought in the U.S. and Britain; any target of surveillance, whether it be foreign or domestic, friend or foe, is deemed an “adversary” in the parlance. In June, the legal procedures followed to determine whether communications emanate from U.S. persons, and the procedures to minimize data collection of such persons, were revealed. Communications emanating from an unknown physical location “will not be treated as a United States person, unless such person can be positively identified as such, or the nature or circumstances of the person’s communications give rise to a reasonable belief that such person is a United States person.” Communications determined to emanate from U.S. persons must be promptly destroyed, with the exception of “communications that are enciphered or reasonably believed to contain secret meaning, and sufficient duration may consist of any period of time during which encrypted material is subject to, or of use in, cryptanalysis.” In other words, according to these documents, the use of anonymisation techniques and cryptology will heighten your chances of being caught up in the NSA dragnet.

Part of the intelligence community’s “black budget” (a more complete version [PDF] was leaked to Cryptome), The Consolidated Cryptologic Program, employing 35,000 people, has received more than $10 billion annually over the last four years — 21% of the total funding. Although the intelligence agencies appear to be concentrating most of their efforts at code breaking and SIGINT (signals intelligence), they also engage in HUMINT (human intelligence) collection; it was reported that the British GCHQ also created a Humint Operations Team (HOT), responsible for “identifying, recruiting and running covert agents in the global telecommunications industry.”

The most pernicious and far-reaching aspect of the NSA’s drive to destroy privacy is the vast public/private partnership, a collaboration with industry in which the government has succeeded through force of law in introducing weaknesses into security standards, and introducing backdoors into commercial encryption products, rendering them accessible to government eavesdropping. Though the C.I.A. receives the bulk of the intelligence “black budget,” we now know thanks to Edward Snowden, with $254.9 million allotted to it this year, it is clear that this collaboration is a priority. In such a tandem agreement, private enterprise provides the tools and access necessary, while the government provides the legal authority — that is, together they accomplish what one or the other could not separately. The particular companies are not named, such information being “guarded by still higher levels of classification.” That is, while such companies offer supposedly secure methods of encryption to the public, they are simultaneously granting access to the government to their communications. Such a partnership is not new: the NSA’s project SHAMROCK, which took over the massive telegraph-reading program begun during World War II, exposed in 1975, was also built upon a cooperation with private industry leaders: RCA Global, ITT World Communications, and Western Union International. Concerns were the same as they are now: “Tordella insisted that the companies not be named in any Church Committee report, since that might subject them to ’embarrassment’ and to lawsuits. It might also make it difficult for the NSA to convince other private companies to help out on future schemes.” The desire to introduce compromised communications devices onto the market for easy access is not new either; such a scheme had already been attempted, in the form of the “Clipper Chip”:

Anticipating such a boom, the N.S.A. devised a strategy for the 90’s. It would concede the need for strong encryption but encourage a system with a key-escrow “back door” that provides access to communications for itself and law enforcement. The security agency had already developed a strong cryptosystem based on an algorithm called Skipjack, supposedly 16 million times stronger than the previous standard, D.E.S. (Data Encryption Standard). Now the agency’s designers integrated Skipjack into a new system that uses a Law Enforcement Access Field (LEAF) that adds a signal to the message that directs a potential wiretapper to the approriate key to decipher the message. These features were included in a chip called Capstone, which could handle not only telephone communications but computer data transfers and digital signatures.

Supposedly, this technology was designed for Government use, but in 1993 the National Security Agency had a sudden opportunity to thrust it into the marketplace. AT&T had come to the agency with a new, relatively low-cost secure-phone device called the Surity 3600 that was designed to use the nonexportable DES encryption algorithm. The N.S.A. suggested that perhaps AT&T could try something else: a stripped-down version of Capstone for telephone communications. This was the Clipper chip. As a result, AT&T got two things: an agreement that Uncle Sam would buy thousands of phones for its own use (the initial commitment was 9,000, from the F.B.I.) and the prospect that the phone would not suffer the unhappy fate of some other secure devices when considered for export. There was also the expectation that AT&T would sell a lot more phones, since private companies would need to buy Clipper-equipped devices to communicate with the Governmment’s Clipper phones.

It was an ingenious plan for several reasons. By agreeing to buy thousands of phones, and holding out the promise that thousands, or even millions more might be sold, AT&T phones gained a price advantage that comes with volume. (The original price of the Surity 3600 was $1,195, considerably less than the previous generation of secure phones; Mykotronx, the company making the Clipper chip, says that each chip now costs $30, but in large orders could quickly go as low as $10.) That would give the phones a big push in the marketplace. But by saturating the market, Clipper had a chance to become the standard for encryption, depending on whether businesses and individuals would be willing to accept a device that had the compromise of a government-controlled back door.

This compromise, of course, is the essence of Clipper. The Government recognizes the importance of keeping business secrets, intimate information and personal data hidden from most eyes and ears. But it also preserves a means of getting hold of that information after obtaining “legal authorization, normally a court order,” according to a White House description.

Regarding the publishing of leaked documents, a dilemma exists. There is a debate as to whether such Top Secret (and beyond) documents should be filtered, vetted and released gradually, so as to give the public time to absorb the information, or released in toto to the public regardless of any unintended consequences for NSA employees or backlash against Snowden and the recipients of the liberated data. The irony is that Snowden and the small coterie of journalists and analysts — Glenn Greenwald, Laura Poitras, Barton Gellman, Bruce Schneier and those at ProPublica and the New York Times — to whom he has entrusted the documents detailing the surveillance programs find themselves now in a position similar to the very governments they are confronting for the abuse of their powers. That is, they are now in possession of secret information to which they alone have access, and presume to be uniquely qualified to determine what is in the public interest and what is not. We have no choice but to trust them. So, those journalists must choose between honoring any agreement with Snowden to publish the documents in the way that he intended, which is not trivial — after all, it was he who took such risks upon himself and will pay the highest price — and a more radical strategy, which would make all of it immediately available by betraying Snowden’s trust. It is true that one bears responsibility for the predictable consequences of one’s acts, and if the public perceives that releasing all the documents were to cause damage to a significant number of people, such a move could prove counterproductive, as the government could mobilize that opinion to further demonize leakers as “troublemakers” and “vigilantes” — such a consequence would have negative effects on whistleblowing and press freedoms in general, enabling the government to prosecute such behavior even more aggressively than it already is, unless a mass movement became powerful enough to confront it. It is also probable that releasing the documents in their entirety, or enlarging the circle of those reading and interpreting them, would bring that much more scrutiny to bear on the NSA’s activities, and above all speed the process of finding remedies and building the tools necessary to confront such power. The risks must be weighed against the benefits, but I see no easy answers.

In a similar way, freedom of expression must eventually be dissociated from a strict adherence to any definition of “journalism,” to be enjoyed by all, even if it entails some risks. Joel Simon provides a convincing argument in the Columbia Journalism Review:

But any effort by governments to grant privilege and protection to one class of journalists while excluding others is, in fact, a form of licensing, which is anathema to journalism. Moreover, the global information environment has become so complex that the traditional media—including the international media—is now just one source of news and information, and in some cases not the most objective one. […] Rather than erect barriers in the form of special laws, journalists should be breaking barriers down, recognizing that their ability to do their job depends less on defining a separate realm in which they operate and more on finding ways to ensure that freedom of expression is broadly defended and preserved—for journalists and non-journalists alike.

The mathematics of encryption are complicated, and Edward Snowden has stated that it is the best available protection: “Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on.” There is a learning curve involved in implementing such a solution, however, and even some experts such as Schneier admit that they don’t use all encryption methods consistently, due to the inconvenience of time and effort involved. It is possible that effective encryption or anonymity, due to inherent complexities, will never be effortless to implement. Several self-defense guides have been published, including at the Freedom of the Press Foundation (here), the Electronic Frontier Foundation (here), as well as other independent organizations. This is not enough, however. The liberating power of cryptography needs to be democratized, and made accessible to everyone using an electronic device, because — and this is vital — everyone is concerned by this, whether they are aware of it or not. It is unacceptable that the right to privacy be made to be solely dependent upon one’s proficiency at concealing one’s activity. Surveillance is a global phenomenon which transcends national borders and cultures, and just as NSA surveillance extends beyond its original mandate to spill over onto the domestic U.S. population (whatever lies officials may voice), the need for strong privacy protection extends beyond just those who think they might have “something to hide.” As long as strong encryption and speech protection remain the domain of the select group of experts — the hacker, the engineer, the accredited journalist — and not for the rest of us, I believe that the fight for privacy, the free flow of information and against surveillance will be lost.


Update: Ken White at Popehat emphasizes what I’ve been saying about surveillance targeting the “other,” and how anyone who seeks to hide his/her activity must be viewed as an “enemy;” the quote is from an official statement from the Office of the Director of National Intelligence’s recently created tumblr:

It should hardly be surprising that our intelligence agencies seek ways to counteract our adversaries’ use of encryption.  Throughout history, nations have used encryption to protect their secrets, and today, terrorists, cybercriminals, human traffickers and others also use code to hide their activities.  Our intelligence community would not be doing its job if we did not try to counter that.

Establishing Credibility on Syria

August 31, 2013 § 1 Comment

LUCY: This time you can trust me. See? Here’s a signed document testifying that I promise not to pull it away.

CHARLIE: It IS signed. It’s a signed document! I guess if you have a signed document in your possession, you can’t go wrong.

Secretary of State John Kerry announced yesterday before the world that the U.S. possessed intelligence — presented with “high confidence” in the latest unclassified intelligence report — which undeniably linked the Syrian government to the alleged gas attacks in the suburbs of Damascus. Since it is not specified, such intelligence most likely emanates from, among other sources, signal interceptions by Unit 8200 of the Israeli Military Intelligence Corps, as it was reported in the German online magazine Focus. It is known that there is a tight relationship between Israeli and U.S. intelligence services, but it is also known that Israel is the probable source of the fraudulent “smoking laptop” documents on the alleged Iranian nuclear weapons program, which seemed to have been laundered through the Mujahedin-e-Khalq (MeK) — consequently, the credibility of such statements should be questioned by any rational person. The logic operating here is simple, expressed in my opinion clearly by Barbara Tuchman in her book The March of Folly: From Troy to Vietnam, by way of Arthur Silber:

Acquiescence in Executive war, he wrote, comes from the belief that the government possesses secret information that gives it special insight in determining policy. Not only was this questionable, but major policy decisions turn “not upon available facts but upon judgment,” with which policy-makers are no better endowed than the intelligent citizen. […] The belief that government knows best was voiced just at this time by Governor Nelson Rockefeller, who said on resumption of the bombing, “We ought to all support the President. He is the man who has all the information and knowledge of what we are up against.” This is a comforting assumption that relieves people from taking a stand. It is usually invalid, especially in foreign affairs.

It behooves us to recall how the politicized intelligence surrounding Iraqi Weapons of Mass Destruction (WMD) was intended to provide a pretext for invasion rather than an objective appraisal of Saddam’s capabilities. The September Dossier from Downing Street is but one example among many. Stating the case bluntly, Major General Michael Laurie reportedly admitted during the Chilcot Inquiry that he had understood the “purpose of the dossier was precisely to make a case for war, rather than setting out the available intelligence.” Repeating the events preceding the 2003 invasion of Iraq, U.S. officials recently privately urged UN experts to leave Syria, confident that such inspections were “pointless because the chemical weapons evidence already was conclusive.” Such a signal was a clear message that the U.S. is impatient, and has the firm intention to launch strikes, before an independent investigation could determine with precision what happened — which is, of course, the point.

Leaving aside any determination of guilt, despite the propaganda from all sides, it will take some time to run the tests on samples to even determine what substance was used. A recent UN inquiry [PDF] into the Syrian civil war states that, although both sides in the conflict are alleged to have used chemical weapons, conclusive findings “may be reached only after testing samples taken directly from victims or the site.” Days after an initial Medecins Sans Frontieres press release, in which MSF director Bart Janssens is quoted saying that “MSF can neither scientifically confirm the cause of these symptoms nor establish who is responsible for the attack,” an August 28 press release expressed concern that their earlier statements were being used for political purposes, and that with the investigation underway, it was too early to determine with any certainty responsibility for the attacks. It’s a reasonable concern, and will therefore probably be ignored. No matter, when the righteous mission of punishing an enemy comes into view, there is little time for investigating facts. Trust us!

Although a timid but unexpected outbreak of democratic ideals in the British parliament has somewhat frustrated U.S. plans to immediately launch attacks against the Syrian government, the UK’s legal justification for triggering military action was already laid out: humanitarian intervention: “the aim is to relieve humanitarian suffering by deterring or disrupting the further use of chemical weapons.” The paper asserts that there is “no practicable alternative to the use of force” — a dubious assertion, given that one alternative might be to stop fueling the conflict by giving aid, intelligence and training to opposition groups with the goal of removing Assad from power, a project lavishly supported by the Saudi monarchy, among others. Humanitarian intervention (or “R2P”, Responsibility to Protect), however, is not currently an accepted doctrine of international law, and the UK attempt to bypass the UN Security Council is described by lecturer in international law Dapo Akande as nothing short of “fanciful.”

What cannot be claimed with any credibility is that Washington opposes the use of chemical weapons on principle. Putting aside its own abuses in the past, allies are also immune from such public condemnation: adding to an already rich record of declassified documents relating U.S. support for Saddam Hussein throughout his worst crimes, including the regular use of gas against Iranian forces and Kurdish civilians, recently declassified C.I.A. documents further emphasize that the use of gas — when serious interests are at stake — is surely, in the words of Col. Walter P. Lang, “not a matter of deep strategic concern.” During his statement Kerry did accurately express the primary concern, though: that “it matters here if nothing is done. It matters if the world speaks out in condemnation and then nothing happens.” Echoing Kerry’s statement, Washington Post columnist David Ignatius warned that U.S. “credibility” is at stake if the world begins to “doubt the credibility of U.S. power.” Former Ambassador to Morocco Marc Ginsberg similarly scolded the Obama administration for “putting ‘the United States’ credibility’ on the line.” The particular credibility mentioned here, however, has little to do with demonstrating to the world that statements emanating from Washington can be reasonably assumed to be accurate, and more to do with demonstrating that threats of punishment will indeed be carried out. In other words, failing to occasionally act on his promises will undermine the master’s authority, which is indeed a very real problem.


Update: The Daily Record has revealed that Britain issued export licenses for potassium fluoride and sodium fluoride, both chemical precursors which can be used to synthesize nerve agents such as sarin gas, as late as January 2013, well into the Syrian civil war. Although such chemicals also have other industrial uses, fluoride is the “key to making these munitions,” according to an environmental toxicology expert at Leeds University. It seems they would be characterized as “dual-use” items, and the licenses were revoked only after the European Union imposed sanctions on the Syrian government. Although the irony of the UK government’s military intervention being ostensibly triggered by events (chemical warfare) to which it may well have itself directly or indirectly contributed is not lost on observers, it should not be so surprising. The events fit into a general pattern of Western hypocrisy, whereby leaders publicly denounce repressive actions in one place while indirectly contributing to them elsewhere — such as David Cameron’s acting as a “travelling salesman for the arms industry” to several Gulf states, as he did in 2012, to cite but one example.

Such events might also recall the sale of dual-use items and technologies to Saddam Hussein’s Iraq during the Iran-Iraq war, sales rising to a figure of $1.5 billion during the period between 1985 and 1990, as documented in a February 1994 GAO report. In 2002, it was reported that U.S. and German companies were among the major suppliers of Saddam Hussein’s regime, including Hewlett Packard, Honeywell, Rockwell, Bechtel, ICS and Unisys, as well as Daimler-Benz, MAN and Siemens, according to the German daily Die tageszeitung. U.S. export controls “suffered a massive breakdown” preceding the first Gulf War, according to Gary Milhollin of the Wisconsin Project, and much of the equipment subsequently destroyed during the strikes was in fact made in the U.S.A. We also know that, although the U.S. had an official policy of neutrality during the Iran-Iraq war, the C.I.A. was in fact tasked with ensuring that Iraq continued to be supplied with the necessary components to maintain its military weaponry.

An added irony is that the Obama administration is seeking vague Congressional authorization to use military force — the powers of which, as Jack Goldsmith states, are dangerously broad (where ever have we seen that before?) — in order to “prevent or deter the use or proliferation (including the transfer to terrorist groups or other state or non-state actors), within, to or from Syria, of any weapon of mass destruction, including chemical or biological weapons or components of or materials used in such weapons” [emphasis mine] — such an authorization, though, as b at Moon of Alabama points out, would not guarantee that such military action complies with international law.

— h/t Marcy Wheeler (@emptywheel)


Update II: Disinformation and misinformation assume such a large role in the discussion around armed conflict because propaganda is always an integral part of the war effort, but also partly because there are always individuals who are more than eager to accept information which fits their preconceived notions, even if there is little evidence to support it. The gruesome photograph published by the BBC in 2012, mistakenly linked to the Houla massacre, recently recycled and spread on Facebook, is but one striking example of the pitfalls awaiting those impatient to have their beliefs vindicated. One should never underestimate the imagination and capacity of either side in a conflict to fabricate and spread propaganda, and the Syrian civil war has shown all sides using it skilfully to their advantage.

Those who would like to discourage any foreign military intervention, aware that the U.S. and the UK have aligned themselves with the various rebel groups (which comprise jihadist elements close to al-Qa’ida), will readily accept as accurate reports attributing the recent gas attacks to opposition groups, even if evidence is minimal or nonexistent. Such thinking is understandable, as any portrayal painting the various Syrian opposition movements in a negative light will discourage the public, and politicians, from supporting policies which only appear to strengthen a band of extremists and fanatics. Such concerns aren’t without merit — the simple fact of the matter is that, the U.S. government, in its overriding objective to curb Iranian (and therefore Shiite, and by extension, Hezbollah) influence, seems to have inserted itself into a complex regional sectarian conflict, in which it has, in the words of Patrick Cockburn, entered into a “de facto alliance with al-Qa’ida.”

An article penned by Seymour Hersh in 2007 for the New Yorker magazine paints a picture which anyone following events in the Middle East even casually might recognize:

To undermine Iran, which is predominantly Shiite, the Bush Administration has decided, in effect, to reconfigure its priorities in the Middle East. In Lebanon, the Administration has coöperated with Saudi Arabia’s government, which is Sunni, in clandestine operations that are intended to weaken Hezbollah, the Shiite organization that is backed by Iran. The U.S. has also taken part in clandestine operations aimed at Iran and its ally Syria. A by-product of these activities has been the bolstering of Sunni extremist groups that espouse a militant vision of Islam and are hostile to America and sympathetic to Al Qaeda. […]

Nasr went on, “The Saudis have considerable financial means, and have deep relations with the Muslim Brotherhood and the Salafis”—Sunni extremists who view Shiites as apostates. “The last time Iran was a threat, the Saudis were able to mobilize the worst kinds of Islamic radicals. Once you get them out of the box, you can’t put them back.”

None of this, however, is proof of anything, much less a substitute for actual scientific evidence relevant to the 21 August attack in the suburbs of Damascus, on which Eliot Higgins (Brown Moses blog) has provided useful discussion from several chemical weapons specialists, responding to allegations in a recent article. Also of interest is the recent claim by Secretary of State Kerry that “first responders” have provided “samples of hair and blood” which “have been tested and they have reported positive for signatures of sarin” — which seems to contradict recent statements by chemical weapons expert Rolf Trapp, who states that the operation is much more delicate than Kerry’s statement implies: “The analysis itself cannot be done in two or three days. The quality requirements are considerable. Small mistakes can render the whole report useless. Somewhere around two to three weeks is probably realistic.” Kerry might be telling the truth, but we’ve seen the Secretary of State lie before.

What I would like to emphasize more generally is that military intervention is not necessarily justified, regardless of who the perpetrator is — and therefore asserting that opposition groups may have been responsible is in my opinion no argument against intervention, which would remain immoral, unwise and illegal, no matter how many elaborate theories are concocted by subservient legal advisers or congressional authorizations rubber stamp the aggression.

Controlling Enemy Territory

August 26, 2013 § 1 Comment



Yesterday an excerpt from the forthcoming book Enemies Within by Associated Press journalists Matt Apuzzo and Adam Goldman appeared in the New York magazine website. The book concerns the extensive and intrusive surveillance apparatus erected by the New York Police Department (NYPD), in liaison with the C.I.A., directed at New York’s Muslim population. Highlights of the investigation, which was awarded a Pulitzer Prize, can be found here. The whole article is worth reading, but I’d just like to focus on one aspect here, and that is the way in which a colonial logic underpins the program. According to C.I.A. analyst Larry Sanchez, who was borrowed from the agency to assist the NYPD — along with former C.I.A. officer David Cohen — the idea of restructuring the NYPD’s Intelligence Division to monitor elements of the Muslim population was “borrowed” from “Israeli methods of controlling the military-occupied West Bank.” Cohen compared the concept to “raking an extinguished fire pit,” in which one might uncover “an ember—a hot spot waiting to catch.” That is, certain communities were honeycombed with spies and informants, effectively penetrated in much the same way enemy or colonized territory would be during conflict. We’ll return to this.

Similarities to the National Security Agency’s approach to information collection — summarized by General Keith Alexander’s wish to “collect the whole haystack” of information available in order to supposedly raise the odds of locating a needle — can’t be ignored. In both cases, the lack of terrorist attacks actually detected and thwarted by the respective programs highlights the problematic relationship between the total amount of information collected versus the amount of useful information collected, where after a certain point on the curve an inverse correlation is probably observed, an area of diminishing returns. To conclude, therefore, that the programs have failed at their ostensible missions, to protect against terrorist attacks, would be logical — if that is indeed the primary goal. Such programs also recall Admiral John Poindexter’s and Brian Hicks’ brainchild, the Information Awareness Office, established at the Defense Advanced Research Projects Agency (DARPA) and the prototype Total Information Awareness system (TIA), eventually discontinued subsequent to Congressional legislation concerning privacy rights of U.S. citizens. The seal emblazoned on the program stated “Scientia Est Potentia” — Knowledge is Power. Such programs continued, though splintered like different shards of what was previously one mosaic, in the form of collecting biometric data from facial recognition technologies and iris scans — a technology tested by NATO forces in Afghanistan as part of a wider counterinsurgency program, as but one example.

Poindexter stated his concerns in an August, 2002 speech:

The intelligence collection targets are thousands of people whose identities and whereabouts we do not always know. It is somewhat analogous to the anti-submarine warfare problem of finding submarines in an ocean of noise – we must find the terrorists in a world of noise, understand what they are planning, and develop options for preventing their attacks. […] We must become much more efficient and more clever in the ways we find new sources of data, mine information from the new and old, generate information, make it available for analysis, convert it to knowledge, and create actionable options. We must also break down the stovepipes – at least punch holes in them. By this, I mean we must share and collaborate between agencies, and create and support high-performance teams operating on the edges of existing organizations.

Similar concerns had already been addressed a century earlier, during the U.S. colonial counterinsurgency campaign in the Philippines, from which emerged the tools and methods necessary to pacify and control a civilian population. After his tour in the Philippines, Colonel Ralph Van Deman, the “father of Military Intelligence,” would later compile a large database of U.S. citizens targeted for surveillance, effectively employing at home the techniques which had been developed abroad. In his voluminous study on U.S. colonial pacification in the Philippines, worth quoting at length, Alfred McCoy writes:

During the social ferment that surrounded World War I, a mix of emergency legislation and extralegal enforcement removed the restraints of courts and Constitution that had protected Americans from surveillance and secret police for over a century. With the fear of spies and subversion everywhere, police methods that had been tested and perfected in the colonial Philippines migrated homeward to provide both precedents and personnel for the establishment of a U.S. internal security apparatus. Transformed by colonial warfare from a conventional army careerist into “the father of U.S. military intelligence,” Van Deman applied his experience of empire to establish the army’s Military Intelligence Division (MID) in 1917 as a comprehensive espionage and counterespionage agency. After years of pacifying an overseas empire where race was the frame for perception and action, colonial veterans came home to turn the same lens on America, seeing its ethnic communities not as fellow citizens but as internal colonies requiring coercive controls. […]

In building a U.S. intelligence capacity, empire’s stamp on the nascent national security apparatus was both broad and deep, from data management to larger design. In both colonial Manila and wartime Washington, counterintelligence was characterized by similarities large and small. […] Covert operational procedures for surveillance and infiltration. An ethnic or racial template for perception of threat. Mass relocation of suspect populations. The systemic use of scandal as political disinformation. And, above all, a sense of omnipotence over peoples deemed alien and therefore lesser. […] In this process of imperial mimesis, a state such as the United States that creates a colony with circumscribed civil liberties and pervasive policing soon shows many of those coercive features in its own society. As the metropole’s internal security apparatus starts to resemble the imperial, so its domestic politics begin to exhibit many attributes of the colonial. [Policing America’s Empire, pp. 294-295]

As well as the gaze of the surveillance apparatus, though, there is also the microphone. Indeed, sometimes the entire population becomes the target, this “other” onto which the propaganda apparatus turns. Miami Herald journalist Alphonso Chardy was told in 1987, refering to State Department activies during the Iran-Contra scandal, that “[i]f you look at it as a whole, the Office of Public Diplomacy was carrying out a huge psychological operation of the kind the military conducts to influence a population in denied or enemy territory” (“N.S.C. supervised office to influence opinion,” Miami Herald, July 19, 1987). Referring to the same OPD, Robert Parry and Peter Kornbluh stated in the Washington Post that “the campaign came to resemble the sort of covert political operation the C.I.A. runs against hostile forces overseas but is outlawed from conducting at home” (“Reagan’s Pro-Contra Propaganda Machine,” Washington Post, September 4, 1988).

What is important to realize, in my opinion, is that both surveillance and propaganda are ultimately about control, not information. Propaganda itself usually carries very little useful information, and blanket surveillance, we have seen, no matter how comprehensive, provides no absolute guarantee against every possible threat. As the revelations about NSA surveillance continue (here [PDF] is a good discussion by Susan Landau), my overall impression is that the concern is, and has always been, to prevent the existence of any private space inaccessible to the gaze of those in power, to create a world without shadows and blind spots, in which absolutely no one is exempt from scrutiny — in order to accomplish this, it is necessary to effectively have the option to treat the bulk of the world’s population as if it were the enemy. In other words, similar to a one-way mirror, a world in which certain institutions insist on a certain level of opacity through secrecy and classification, but endeavor to render the world around them as transparent as possible. Anyone even remotely concerned about living in a free society should vigorously resist this with all the tools at their disposal.


Update: Another important aspect of surveillance, closely linked to the central theme of control highlighted here, is the psychological effects it has on those subjected to it. It has been shown in numerous studies that the simple awareness of being monitored can alter one’s behavior, attitudes and mental performance. In order to engage in creative, innovative activities, allowing for people to reach their full potentials, it is essential to have recourse to private spaces where one is free from external influence and uninhibited. We need room to experiment, without fear of retribution caused by performing “before the eyes of others,” resulting in people “tailoring their behavior to fit what they believe the observer wants.” A researcher at the Cardiff University School of Psychology reminded readers, in an article penned for the Guardian yesterday, that “a future of universal surveillance will be a world bereft of anything sufficiently interesting to spy on – a beige authoritarian landscape in which we lose the ability to relax, innovate, or take risks.” I propose that this effect can be an intended consequence of surveillance, and not simply an unwanted artifact — that is, one purpose of the surveillance state is to transform a society into one where conformity of thought is encouraged, in which indeed no one really does have “something to hide.” Unfortunately, most people will accept a modest level of surveillance when “their security is being bought with someone else’s liberty” — a reminder that it is often the more denigrated and outcast members of society, or dissidents, who are subjected to repressive measures, which, once accepted in theory by the broader public, can then be applied more generally. In other words, much like the imperial gaze, totalitarian thinking always begins by targeting the “other” before turning on the rest of us, at which point we may realize that it’s too late.

For the effect to function, however, the population under surveillance must be aware that it is under surveillance, which may seem contradictory, as we tend to think of surveillance as being a mostly covert activity. Power centers must balance their need to continue operating by remaining in the shadows with the need to make their chilling presence felt to the wider public. In the interests of shaping and controlling a society, it may be desirable for a certain amount of surveillance to be openly acknowledged. One need only think of Britain’s ubiquitous CCTV cameras, whose simple existence, whether functioning or not, can have a deterrent effect, thus transforming their environment. In this way, surveillance can be considered an active presence as well as a passive one. Episodes from highly repressive societies, such as the former Soviet bloc countries, further illustrate the debilitating effects of surveillance on individuals, where the simple knowledge is “enough to prompt them to take extensive measures to guard against such spying, and cast a pall of suspicion over their lives.” We can find such illustrations closer to home as well: documentary filmmaker Laura Poitras, the second person contacted by the NSA whistleblower Edward Snowden, has recently relocated to Berlin while editing her next film “because I do not feel I can keep source material safe in my own country.”


Update II (Sept. 3): An interactive map with original documents from the NYPD’s Intelligence Division are now on the website promoting Apuzzo and Goldman’s book Enemies Within. It includes slides with information detailing the Demographics Unit’s surveillance of “ethnic hotspots,” monitoring of web activity, and the mapping out of “ancestries” and “communities of interest,” among other things.