Under The Radar Media

America’s Enemy Within

Posted in Uncategorized by maasanova on April 25, 2008

Note: If you are reading this post through Facebook, please click on the ‘view original post’ link


On April 22, 2008, an 84 year old former US Army electrical engineer named Ben-Ami Kadish, was arrested and charged with four counts of conspiracy for serving as a foreign agent and lying to the FBI. source: Washington Post

Israel of course has a different view on the subject of Israel spying within the US.

Israel has assured the US that it has not spied on its key ally since 1985, after the arrest in New York of a US Army veteran charged with passing defense secrets to the Jewish state nearly 30 years ago.

“The events go back to the early 1980s. Since 1985 there have been clear orders from (Israel’s) prime ministers not to conduct these kind of activities,” foreign ministry spokesman Arye Mekel said.

“Relations between the United States and Israel have always been based on true friendship and mutual values and interests (except for the USS Liberty incident) ,” he said. source: Australian Herald Sun

Oh really? Well, let’s put this issue of Israel spying on the United States into perspective. In 2004, two former members of the American Israel Public Affairs Committee (AIPAC) , Steve Rosen and Keith Weissman, were indicted by a federal grand jury for allegedly receiving classified defense information from Pentagon analyst Larry Franklin and passing it on to Israeli diplomats in Washington, as well as to members of the press and other individuals. source: Jerusalem Post


1992
The Wall Street Journal reports that Israeli agents apparently tried to steal Recon Optical Inc’s top-secret airborne spy-camera system.

1992 Stephen Bryen, caught offering confidential documents to Israel in 1978, is serving on board of the pro-Israeli Jewish Institute for National Security Affairs while continuing as a paid consultant — with security clearance — on exports of sensitive US technology.

1992 “The Samson Option,” by Seymour M. Hersh reports, “Illicitly obtained intelligence was flying so voluminously from LAKAM into Israeli intelligence that a special code name, JUMBO, was added to the security markings already on the documents. There were strict orders, Ari Ben-Menashe recalled: “Anything marked JUMBO was not supposed to be discussed with your American counterparts.”

1993. The ADL is caught operating a massive spying operation on critics of Israel, Arab-Americans, the San Francisco Labor Council, ILWU Local 10, Oakland Educational Association, NAACP, Irish Northern Aid, International Indian Treaty Council, the Asian Law Caucus and the San Francisco police. Data collected was sent to Israel and in some cases to South Africa. Pressure from Jewish organizations forces the city to drop the criminal case, but the ADL settles a civil lawsuit for an undisclosed sum of cash.

1995 The Defense Investigative Service circulates a memo warning US military contractors that “Israel aggressively collects [US] military and industrial technology.” The report stated that Israel obtains information using “ethnic targeting, financial aggrandizement, and identification and exploitation of individual frailties” of US citizens.

1996 A General Accounting Office report “Defense Industrial Security: Weaknesses in US Security Arrangements With Foreign-Owned Defense Contractors” found that according to intelligence sources “Country A” (identified by intelligence sources as Israel, Washington Times, 2/22/96) “conducts the most aggressive espionage operation against the United States of any US ally.” The Jerusalem Post (8/30/96) quoted the report, “Classified military information and sensitive military technologies are high-priority targets for the intelligence agencies of this country.” The report described “An espionage operation run by the intelligence organization responsible for collecting scientific and technologic information for [Israel] paid a US government employee to obtain US classified military intelligence documents.” The Washington Report on Middle East Affairs (Shawn L. Twing, April 1996) noted that this was “a reference to the 1985 arrest of Jonathan Pollard, a civilian US naval intelligence analyst who provided Israel’s LAKAM [Office of Special Tasks] espionage agency an estimated 800,000 pages of classified US intelligence information.”

The GAO report also noted that “Several citizens of [Israel] were caught in the United States stealing sensitive technology used in manufacturing artillery gun tubes.”

1996 An Office of Naval Intelligence document, “Worldwide Challenges to Naval Strike Warfare” reported that “US technology has been acquired [by China] through Israel in the form of the Lavi fighter and possibly SAM [surface-to-air] missile technology.” Jane’s Defense Weekly (2/28/96) noted that “until now, the intelligence community has not openly confirmed the transfer of US technology [via Israel] to China.” The report noted that this “represents a dramatic step forward for Chinese military aviation.” (Flight International, 3/13/96)

1997 An Army mechanical engineer, David A. Tenenbaum, “inadvertently” gives classified military information on missile systems and armored vehicles to Israeli officials (New York Times, 2/20/97).

1997 The Washington Post reports US intelligence has intercepted a conversation in which two Israeli officials had discussed the possibility of getting a confidential letter that then-Secretary of State Warren Christopher had written to Palestinian leader Yasir Arafat. One of the Israelis, identified only as “Dov”, had commented that they may get the letter from “Mega”, the code name for Israel’s top agent inside the United States.

1997 US ambassador to Israel, Martin Indyk, complains privately to the Israeli government about heavy-handed surveillance by Israeli intelligence agents.

1997 Israeli agents place a tap on Monica Lewinsky’s phone at the Watergate and record phone sex sessions between her and President Bill Clinton. The Ken Starr report confirms that Clinton warned Lewinsky their conversations were being taped and ended the affair. At the same time, the FBI’s hunt for “Mega” is called off.

2001 It is discovered that US drug agents’ communications have been penetrated. Suspicion falls on two companies, AMDOCS and Comverse Infosys, both owned by Israelis. AMDOCS generates billing data for most US phone companies and is able to provide detailed logs of who is talking to whom. Comverse Infosys builds the tapping equipment used by law enforcement to eavesdrop on all American telephone calls, but suspicion forms that Comverse, which gets half of its research and development budget from the Israeli government, has built a back door into the system that is being exploited by Israeli intelligence and that the information gleaned on US drug interdiction efforts is finding its way to drug smugglers.

The investigation by the FBI leads to the exposure of the largest foreign spy ring ever uncovered inside the United States, operated by Israel. Half of the suspected spies have been arrested when 9-11 happens. On 9-11, 5 Israelis are arrested for dancing and cheering while the World Trade Towers collapse. Supposedly employed by Urban Moving Systems, the Israelis are caught with multiple passports and a lot of cash. Two of them are later revealed to be Mossad. As witness reports track the activity of the Israelis, it emerges that they were seen at Liberty Park at the time of the first impact, suggesting a foreknowledge of what was to come.

The Israelis are interrogated, and then eventually sent back to Israel. The owner of the moving company used as a cover by the Mossad agents abandons his business and flees to Israel. The United States Government then classifies all of the evidence related to the Israeli agents and their connections to 9-11. All of this is reported to the public via a four part story on Fox News by Carl Cameron. Pressure from Jewish groups, primarily AIPAC, forces Fox News to remove the story from their website. Two hours prior to the 9-11 attacks, Odigo, an Israeli company with offices just a few blocks from the World Trade Towers, receives an advance warning via the internet. The manager of the New York Office provides the FBI with the IP address of the sender of the message, but the FBI does not follow up.

2001 The FBI is investigating 5 Israeli moving companies as possible fronts for Israeli intelligence.

2001 JDL’s Irv Rubin arrested for planning to bomb a US Congressman. He dies before he can be brought to trial.

2002 The DEA issues a report that Israeli spies, posing as art students, have been trying to penetrate US Government offices.

2002 police near the Whidbey Island Naval Air Station in southern Washington State stop a suspicious truck and detain two Israelis, one of whom is illegally in the United States. The two men were driving at high speed in a Ryder rental truck, which they claimed had been used to “deliver furniture.” The next day, police discovered traces of TNT and RDX military-grade plastic explosives inside the passenger cabin and on the steering wheel of the vehicle. The FBI then announces that the tests that showed explosives were “false positived” by cigarette smoke, a claim test experts say is ridiculous. Based on an alibi provided by a woman, the case is closed and the Israelis are handed over to INS to be sent back to Israel. One week later, the woman who provided the alibi vanishes.

2003 The Police Chief of Cloudcroft stops a truck speeding through a school zone. The drivers turn out to be Israelis with expired passports. Claiming to be movers, the truck contains junk furniture and several boxes. The Israelis are handed over to immigration. The contents of the boxers are not revealed to the public.

2003 Israel deploys assassination squads into other countries, including the United States. The US Government does not protest.

2004 Police near the Nuclear Fuel Services plant in Tennessee stop a truck after a three mile chase, during which the driver throws a bottle containing a strange liquid from the cab. The drivers turn out to be Israelis using fake Ids. The FBI refuses to investigate and the Israelis are released.

2004 Two Israelis try to enter Kings Bay Naval Submarine Base, home to eight Trident submarines. The truck tests positive for explosives.

2004 The AIPAC spy scandal. For the first time, the conduit from Israel through AIPAC into the Pentagon Office of Special Projects, from which most of the lies that led to the war in Iraq emerged, is revealed to the general public. Although the investigation into AIPAC spyring was known inside the government going back to 2002, US Congressmen and Presidential candidates continue to accept money from AIPAC in exchange for supporting Israel.

source: What Really Happened

Former Israeli Prime Minister: September 11 terror attacks good for Israel

Posted in Uncategorized by maasanova on April 17, 2008

Note: If you are reading this post through Facebook, please click on the ‘view original post’ link

On April 16, 2008, former Israeli Prime Minister Benjamin Netanyahu told a Bar Ilan University something that some, but not many already know: the horrible attacks on September 11, 2001 have been beneficial for Israel.

Here is the quote as reported by the Israeli newspaper Ma’ariv:

“We are benefiting from one thing, and that is the attack on the Twin Towers and Pentagon, and the American struggle in Iraq,” Ma’ariv quoted the former prime minister as saying. He reportedly added that these events “swung American public opinion in our favor.”

The day after the September 11 attacks, Netanyahu issued a similar statement in a NY Times article entitled A Day of Terror: The Israelis; Spilled Blood Is Seen as Bond That Draws 2 Nations Together:

“It’s very good. Well, not very good, but it will generate immediate sympathy.”

Not surprisingly, the American mainstream media and press has not bothered to cover this story, but the blogs and forums, now the true indicator of the world’s pulse, have spoken. The overall reaction is shock and utter disgust.

Netanyahu’s statements can actually be interpreted in several ways. From a political perspective, the statement could be interpreted as realism from a pragmatic thinker’s perspective. American sympathy towards Israel certainly increased after 9/11, and Americans finally understood the dangers of radical Islam. With regards to Iraq, Israel has long considered Saddam Hussein as a threat their safety and to the overall stability of the Middle East. Since 1998, there had been consistent lobbying efforts for unilateral action against Iraq. So America going in and taking out Saddam has literally been beneficial to the state state of Israel. Is this insincere to the American citizens and the US military? Yes, but it is still a true statement nonetheless. We went to war for Israel.

However, there is a school of thought that Netanyahu’s controversial statements will give plenty of fodder for the 9/11 conspiracy theorists. Foreign Policy’s blog, Passport had this to say:

“This is sure to provide fodder for conspiracy theorists. It amazes me that despite the fact that Osama bin Laden has admitted multiple times that he ordered the September 11th attacks, there are still plenty of people — especially in Arab countries — who believe otherwise. Netanyahu just gave those folks a huge gift.”

The editors at Foreign Policy are correct in saying this is a tasty morsel for those that think the official government explanation of 9/11 is a complete lie, but they completely miss the point as to why this is so.

The official explanation of 9/11 attacks has been given by elected and unelected officials. You either believe it or you don’t, but rarely has the reason as to why we were attacked, and who benefited ever been asked. To find out ‘the why’, one must ask “who stood to gain,” or, “cui bono.” Did the radical Muslims/Al Qaeda really benefit from 9/11? And if they did, exactly how they benefit?

From Wikipedia:

Cui bono, or “to whose benefit,” literally, “good for whom” is a Latin adage that is used either to suggest a hidden motive or to indicate that the party responsible for a thing may not be who it appears at first to be. With respect to motive, a public works project which is purported to benefit the city may have been initiated rather to benefit a favored campaign contributor with a lucrative contract.

Commonly the phrase is used to suggest that the person or people guilty of committing a crime may be found among those who have something to gain, chiefly with an eye toward financial gain. The party that benefits may not always be obvious or may have successfully diverted attention to a scapegoat, for example.

Iran’s Jewish Community

Posted in Uncategorized by maasanova on April 16, 2008

Note: If you are reading this post through Facebook, please click on the ‘view original post’ link

If you only listen to the three-letter alphabet news networks and their pro-war propaganda, you might think that Iranian President Mahmoud Ahmadinejad wants to kill all the Jews. Since the mainstream media is always looking for a new Hitler, they would have you believe that if Ahmadinejad had his way, all the Jews in the Middle East would be identified by yellow armbands and lined up for execution in the gas chambers. They constantly repeat the erroneous claim that Iranian President Mahmoud Ahmadinejad wants to “wipe Israel off the map,” in order to gain public support for a pending war with Iran.

What the media doesn’t tell you is that Iran is home to a population of 28,000 – 30,000 proud Sephardic Jews, whom, as are Iran’s Christian population, protected by a ‘fatwa’ issued by Iran’s former Supreme Leader, Ayatollah Khomeini. You may be surprised at how they they live and are treated in Iran, considering the media would have us believe that Iran is the epicenter of hatred towards the Jews.

Here are some interesting quotes that I dug up on the attitudes of Iranian Jews towards the unique paradox of their situation:

“I am an Iranian first and a Jew second.” – Maurice Motamed , MP of Iranian Parliment

”We are Jews, not Zionists. We are a religious community, not a political one.” – Parvis Yashaya, Film Producer

I posted the video on a few forums today, and decided it would be great material for a post here at Under The Radar Media. I hope you find this educational and enlightening.

Global Gridlock: How the US Military-Industrial Complex Seeks to Contain and Control the Earth and Its Eco-System

Posted in Uncategorized by maasanova on April 12, 2008

Note: If you are reading this post through Facebook, please click on the ‘view original post’ link

Empire: is a state that extends dominion over populations distinct culturally and ethnically from the culture/ethnicity at the center of power

Dr. Kingsley Dennis
Global Research
March 31, 2008

Introduction

The Argentinean writer Jorge Luis Borges once famously wrote of a great Empire that created a map that was so detailed it was as large as the Empire itself. The actual map itself grew and decayed as the Empire itself conquered or lost territory. When the Empire finally crumbled, all that remained was the map.

In some sense we can say that it is the map in which we live; we occupy a location within a simulation of reality. Although semanticists say that ‘the map is not the territory’, within this digitised age the territory is increasingly becoming the map and the separation between the physical and the digitised rendition is blurring. In this context, to ‘know the map’ gives priority to intervene upon the physical. In recent years many of us have been scrambling to get ‘on the Net’ and thus be ‘mapped’; within a few years we may find that living ‘off the Net’ will no longer be an option.

It is my argument that the future direction of present technological emergence is one that seeks to go beyond networks; rather it is towards ubiquitous technologies that offer a complete immersive (or rather ‘sub-mersive’) experience of a digitised environment. With networks there is always the possibility of moving into the grey and illusive areas in-between. These are the areas where the networks do not, or cannot, cover; neglected zones of poverty and risk, and insecure zones of warlord regions, and smuggling zones.

With immersive technological mapping there may one day be no ‘spaces in-between’; the distinction between ‘in’ and ‘out’ dissolved; boundaries melted away under the digital gaze. In this article I argue that the US military-industrial complex is attempting to gain full dominance over the complete information spectrum, including dominating the electro-magnetic spectrum and the Internet, in order to gain full total coverage for purposes of containment and control.

Moving Towards Full Spectrum Dominance

As is now well-known, in 2002 the US Pentagon’s DARPA (Defense Advanced Research Project Agency) responded to the alleged lack of intelligence data after the September 11th attacks by establishing the ‘Total Information Awareness’ office, commandeered by John Poindexter1. According to Poindexter’s own words,

“We must be able to detect, classify, identify, and track…This is a high level, visionary, functional view of the world-wide system…The mission here is to take the competing hypotheses from the analytical environment and estimate a range of plausible futures. The objective is to identify common nodes, representing situations that could occur, and to explore the probable impact of various actions or interventions that authorities might make in response to these situations.” (Poindexter, 2002)

The latest program in this surveillance project is the Space Based Infrared System (called SBIRS High) that aims to track all global infra-red signatures as well as, what is termed, ‘counterspace situational awareness’ (Dinerman, 2004). The 80s ‘Star Wars’ missile defence project of Reaganite US security policy has been craftily converted into intercepting today’s ‘enemy’: not necessarily rogue missiles, but information and domestic ‘earth-bound’ security. The US military also has in operation the IKONOS remote sensing satellite, which travels at 17, 000 mph 423 miles into space, circumnavigating the globe every 98 minutes, with a 3-foot resolution capacity.

Such satellites belong to the private company Space Imaging Inc, who work for the military due to US law that restricts the US government operating upon their own soil (Brzezinski, 2004). Also, the US military RADARSAT satellite uses radar to see through clouds, smoke and dust. The US National Security Agency (NSA) utilizes top of the range KEYHOLE-11 satellites that have a 10-inch resolution, which means headlines can be read from someone sitting on a bench in Iran, although this resolution remains officially unacknowledged (Brzezinski, 2004).

As an example of more distributed and networked ‘industrial/civil surveillance’, many bridges within North America have acoustic sensors and underwater sonar devices anchored to the base of the bridges to check for the presence of divers, to prevent anyone from placing explosives on the riverbed. These devices are then linked to a central hub for monitoring information feedback.

Such post 9-11 fears have led to the setting up of USHomeGuard, a private company established by Jay Walker (founder of Priceline.com), which utilises over a million webcams to watch over 47,000 pieces of critical infrastructure across the US, eg; pipelines, chemical plants, bridges, dams. These webcams are monitored continuously by observers working from home (Brzezinski, 2004). Crandall sees this as a part of the emerging ‘contemporary regime of spectacle…machine-aided process of disciplinary attentiveness, embodied in practice, that is bound up within the demands of a new production and security regime’ (Crandall, 2005).

This operational practice, as Crandall sees it, confirms a ‘codification of movement’ and ‘manoeuvres of strategic possibility’, and leading to a ‘resurgence in temporal and locational specificity’ (Crandall, 2005). This is directly related with the US military construction towards an agenda of complete coverage: in their terms, ‘full spectrum dominance’2. In 1997 the Chief of Staff of the US Air Force predicted that within three years ‘we shall be capable of finding, tracking, and targeting virtually in real time any significant element moving on the face of the earth’ (cited in Crandall, 2005).

Perhaps a little premature yet it appears that the US military-industrial machine is attempting to enclose the global open system; to transform it and enmesh it within a closed system of total information awareness; to cover, track, and gaze omnisciently over all flows, mobilities, and transactions. It is a move towards a total system, an attempt to gain some degree of mastery over the unpredictability of global flows through the core component of dominating informational flows. As part of this project the US military are currently establishing a linkage of satellites into what has been dubbed the military ‘Internet in the sky’, which will form part of their secure informational network named as the Global Information Grid, or GIG (Weiner, 2004). First conceived in 1998, and now in construction, $200 billion has already been estimated as a cost for both the hardware and software (Weiner, 2004).

This war-net, as the military also term it, forms the core of the US military’s move towards appropriating network-centric warfare (Arquilla and Ronfeldt, 2001a; Arquilla and Ronfeldt, 2001b; Dickey, 2004; Weiner, 2004). The chief information officer at the US Defense Department was noted for saying that ‘net-centric principles were becoming “the centre of gravity” for war planners’ (Weiner, 2004). Some of the names of the military contractors involved in this project include Boeing; Cisco Systems, Hewlett-Packard; IBM; Lockheed Martin; Microsoft; Raytheon; and Sun Microsystems (Weiner, 2004). As part of this complete coverage – or ‘full spectrum dominance’ – the US military hopes to be able to communicate and control an increasing arsenal of unmanned air vehicles (UAVs) and unmanned ground vehicles (UGVs), integrated into what they are calling the ‘Multimedia Intelligent Network of Unattended Mobile Agents’ (Minuteman). This in turn is part of a larger military project on Intelligent Autonomous Agent Systems (Science-Daily, 2002).

Recently, a document entitled Information Operation Roadmap was declassified by the Pentagon and made public by the National Security Archive on January 26, 2006. According to this document the term ‘information operations’ includes:

The integrated employment of the core capabilities of Electronic Warfare, Computer Network Operations, Psychological Operations, Military Deception and Operations Security, in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decisions-making while protecting our own. (DoD, 2003: 22)

The document continues by outlining how the US military needs to secure a future electromagnetic capability ‘sufficient to provide maximum control of the entire electromagnetic spectrum, denying, degrading, disrupting, or destroying the full spectrum of globally emerging communication systems, sensors, and weapons systems dependant on the electromagnetic spectrum’ (DoD, 2003: 61). Clearly, the recommendation here is for developing, and extending, current capabilities in order to have full and complete dominance over all globally emerging telecommunications and their hardware.

This shift in military affairs involves re-strategizing informational systems toward what the military see as a ‘transformational communications architecture’ to ‘help create a nimbler, more lethal military force to which information is as vital as water and ammunition’ (Dickey, 2004). Brig. Gen. Robert Lennox, deputy chief of the Army Space and Missile Defense Command, describes the military vision as ‘one seamless battlefield, which is linked without the bounds of time or space, to knowledge centres, and deployment bases throughout the world’ (Dickey, 2004). Beginning in 2008 the US Navy plans to replace its Ultra High Frequency Follow-On satellite network with a Mobile User Objective System which will provide voice and data communications through wireless hand-held receivers as part of the Global Information Grid (GIG).

The ‘Internet in the Sky’ that will form part of the GIG will consist of both AEHF and TSAT satellite programs (Dickey, 2004). Each AEHF satellite has the capacity to serve as many as 4,000 networks and 6,000 users at once; and the proposed TSAT satellites are claimed to be ten times more powerful than the AEHF. These proposals are currently underway as part of the US’s ‘revolution in military affairs’ to develop not only a superior battlefield information network but also to ‘extend the information grid to deploy mobile users around the globe, creating a new capability for combat communications on the move’ (Dickey, 2004).

As for the new generation of surveillance satellites launched since 2005, when these systems are fully operational the elite military complex will be able to gain precise information not only upon alleged ‘enemies’ but also upon the movements of almost any individual upon the planet, at almost any time, anywhere. The complexity of security communications and sensitive information is being targeted within military strategy in an effort to enclose all; to survey the full spectrum of an open system in a bid to collect and contain. In short, to transform the unknown into a known closed system: the containment of the complex global system. This also can be seen within the security of complexity, circulation, and contingency.

Dillon considers that this ‘global security problematic’ is concerned with the circulation of everything as in ‘a systemically interdependent world everything is connected or, in principle, is able to be connected, to everything else’ (Dillon, 2005). For Dillon, circulation shifts the new global security problematic ‘from a “geo-strategic” into an “ecological” problem characterised by the escalatory dynamics of complex interdependencies’ (Dillon, 2005). The challenge of global security in this context lies in the contingency between calculability and doubt. Dillon further sees this as being behind the trend in US military affairs towards the complexity sciences: ‘the fascination of military-strategic science in the United States especially with complexity, chaos, nonlinearity and the new science of life introduced by the digital and molecular revolutions has proclaimed as much since the early 1990s’ (Dillon, 2003).

Security and power relations now clearly transcend traditional geo-political boundaries. Security is both socio-technical and biometric, with the security problematic becoming increasingly virtual and codified, ordered with attempted control of disorder (Dillon, 2003). The militarization of complex global open systems has serious implications for issues of civil liberty, and notions of the surveillance state.

Such domains of complex interdependencies are radicalising, in a militaristic sense, information, communication, command, control, and surveillance. The internal/external circulation and flows characteristic of open systems (whether informational or physical) are under interrogation from Western hegemonic, specifically US, military strategies in an attempt to close them down, plug-up the pores of flows and to blanket-coverage all potential contingencies. These are the operations of clandestine strategies that seek to contain the unpredictable and to map all physical-digital movements and traces.

Emerging technologies that ‘locate’ and ‘trace’ present a world where ‘every object and human is tagged with information specifications including history and position – a world of information overlays that is no longer virtual but wedded to objects, places, and positions’ (Crandall, 2005). Such meshing of the physical and the digital through the medium of sentient communicators is what is foreseen here as steering towards a digitally-rendered global system vulnerable to control via a technical-military elite.

This scenario is exactly that as envisioned by ex-US National Security Advisor Zbigniew Brzezinski. Brzezinski, in his ‘Between Two Ages : America’s Role in the Technetronic Era’ (1970), put forward the concept of a future ‘technotronic era’ whereby a more controlled society would gradually emerge, dominated by an elite unrestrained by traditional values. Brzezinski wrote that ‘Power will gravitate into the hands of those who control information’ (Brzezinski, 1970: 1), adding that surveillance and data mining will encourage ‘tendencies through the next several decades toward a technocratic era, a dictatorship leaving even less room for political procedures as we know them’ (Brzezinski, 1970: 12). By gaining control over informational technological communications Brzezinski outlined how this could help achieve control and order over the public:

Unhindered by the restraints of traditional liberal values, this elite would not hesitate to achieve its political ends by the latest modern techniques for influencing public behavior and keeping society under close surveillance and control. (Brzezinski, 1970: 252)

Also important to consider is that many military technologies become appropriated and absorbed into civil technologies. For example, by 2003 a quarter of all rental vehicles at US agencies used some form of GPS tracking: not only for driver-location but also for the rental agency to know where the car has travelled, and its speed. Also, cars with speakerphones can be enabled from remote devices in order to listen in and eavesdrop on occupants in a car under surveillance, as has been utilized by police forces in the US (Brzezinski, 2004). This type of digitalised surveillance at-a-distance can have serious implications upon increasingly surveyed, tracked, and mapped social practices. It also suggests that technically-based northern ‘societies’ are being manoeuvred towards a surveyed and sensored, or synchronic society

Sensoring the Ecosphere: The Coming of a Synchronic Society?

The development of increasingly sentient ‘smart’ environments will go some way towards creating a more systemic relationship of interconnections and interdependencies between humans, objects/machines, and locality. This possibility has led some commentators to speak of an emerging cybernomadic landscape (Saveri, 2004). Here, the emphasis is on an embedded sensory world that will influence and fundamentally alter social practices. Such a cybernomadic landscape has been defined, in a recent IFTF report, by three primary forces of physical-digital fusion; the augmented self; and digitally catalysed masses (Saveri, 2004: 2).

Similarly, De Rosnay sees this future as a form of symbiotic humanity: ‘each person functions as a node in this hypernetwork. Symbiotic humanity is both the totality of the network and one of its elements; it exists through the network and the network exists only through it’ (de Rosnay, 2000: 143). In all cases it involves networking with, utilizing, and interacting with objects, something which futurist and author Bruce Sterling refers to as a ‘synchronic society’:

A synchronic society generates trillions of catalogable, searchable, trackable trajectories…Embedded in a monitored space and time and wrapped in a haze of process, no object stands alone; it is not a static thing, but a shaping-thing. (Sterling, 2005: 50)

And a ‘shaped-thing’ may in the future rely upon more efficient and ubiquitous radio frequency identification (RFID) tags, now often euphemistically termed as arphids. These RFID tags can be networked into a global system of positioning and identification:

Your arphid monitors are hooked into the satellite based Global Positioning System. Then your network becomes a mobile system of interlinked objects that are traceable across the planet’s surface, from outer space, with one-meter accuracy, around the clock, from pole to pole. (Sterling, 2005: 92)

A physical-digital augmented environment interlinked with objects is, as Sterling states, based upon identification. Objects, as well as individuals, need to be identified, both in their object-self identity as well as in their positions. And yet this shift is not limited towards individuals or objects; it also extends into Nature and the ecosystem.

The US Defense Advanced Research Projects Agency (DARPA) recently announced that it considered today’s computer maps of the Earth to be inaccurate. Investment has been put into producing better computer generated terrain maps of the Earth using both radar and laser scanning (Piquepaille, 2005), with a future view for placing radio-towers on the moon or Mars3. These updated moves towards securing a military full spectrum dominance incorporate the latest known developments in smart sensors whereby complex computerised devices at the miniature, or even nano level, will be able to 24/7 monitor ecological, social, and/or biological environments and people:

These new computers would take the form of networks of sensors with data-processing and transmission facilities built in. Millions or billions of tiny computers — called ‘motes’, ‘nodes’ or ‘pods’ — would be embedded into the fabric of the real world. They would act in concert, sharing the data that each of them gathers so as to process them into meaningful digital representations of the world. Researchers could tap into these ’sensor webs’ to ask new questions or test hypotheses. Even when the scientists were busy elsewhere, the webs would go on analysing events autonomously, modifying their behaviour to suit their changing experience of the world. (Butler, 2006a)

Such a scenario, if realised, would drastically alter the material and social fabric of the living world. Deborah Estrin, director of the Center for Embedded Networked Sensing in Los Angeles, California, sees ‘the sensor-web revolution as an important thread in a grander tapestry of global monitoring, which involves billions of dollars being poured into projects to monitor the continents and oceans’ (Butler, 2006a). For example, upcoming projects include:

  • The $200 million EarthScope project from the NSF: 3,000 stations are to be erected that will ‘track faint tremors, measure crustal deformation and make three-dimensional maps of the earth’s interior from crust to core. Some 2,000 more instruments are to be mobile – wireless and sun- or wind-powered – and 400 devices are to move east in a wave from California across the nation over the course of a decade’ (Broad, 2005)
  • The National Ecological Observatory Network (NEON) is to be established at an estimated cost of $500 million. The plan is for a coast-to-coast NEON to ‘involve perhaps 15 circular areas 250 miles in diameter, each including urban, suburban, agricultural, managed and wild lands. Each observatory would have radar for tracking birds and weather as well as many layers of motes and robots and sensors, including some on cranes in forest canopies’ (Broad, 2005)
  • The ‘Interagency Working Group on Earth Observations’, backed by the National Science & Technology Council within the Executive Office of the President, US, has recently published their Strategic Plan for the U.S. Integrated Earth Observation System (IWGEO, 2005). Their vision is to discover, access, collect, manage, archive, process, and model earth geological data in order to better forecast such flows as weather, energy resources, natural resources, pre and post-disasters, as well as a host of other integrated processes. In their words: ‘The Earth is an integrated system. Therefore, all the processes that influence conditions on the Earth are linked and impact one another. A subtle change in one process can produce an important effect in another. A full understanding of these processes and the linkages between them require an integrated approach, including observation systems and their data streams’ (IWGEO, 2005: 47)

The report Strategic Plan for the U.S. Integrated Earth Observation System (IWGEO, 2005) discusses a vast range of geological integrated monitoring systems. However, a caveat here is necessary, for the above projects towards environmental mapping contain shades of a western geographical imagination.

Cartography, as a pioneering navigational science and art, has long been used for validating colonial expansion, Imperial incursions, and for designating western territorial trophies. The geographical imagination is continually formed as residues of knowledge build one upon the other as images become re-appropriated for geo-political agendas. The western global imagination has participated in the de-centring of global geographies in past centuries, and may again be party to later digital formations of knowledge gathering and geo-strategies of dominance and power. As with the Plan for the U.S. Integrated Earth Observation System which aims to monitor, track, catalogue, and forecast global processes and movements, geographical spaces will be subjected to a US-centric digital gaze. Denis Cosgrove views such a gaze as ‘implicitly imperial, encompassing a geometric surface to be explored and mapped, inscribed with content, knowledge and authority’ (2001: 15).

Emerging technologies in information-sensoring indicate an authoritarian, predominantly military, strategy for Earth monitoring. Increasingly, relationships between humans/devices/environments are being merged, or steered, towards a new construction of social life – one that embeds the individual, as a digitally-rendered identity, within a global informational ‘grid-lock’.

If such an irreversible shift is made towards digitally-rendered societies this would arguably ‘lock-in’ a form of monitored control society. With such predictions of an increasingly sensored and enmeshed global system it is difficult to see how living ‘off the Net’ will be a choice in the near future.

Conclusion

As this article has argued there are both overt and covert strategies within the US military-industrial complex towards securing full spectrum dominance over global information flows, which include dominating the electro-magnetic spectrum and the Internet. Increasingly western technological societies are moving towards developing sensored environments whereby information is processed on individuals as well as securing geographical data. This suggests a future whereby in order to move legitimately an individual will be subjected to a complex network of informational tracking and verification.

This will undoubtedly see an increased militarisation of the civil sphere. Such a re-configuration of the social, through increased dependency upon physical-digital systems, will inevitably involve various structural relations of power. For example, individuals not deemed ‘worthy’ will be denied the right of movement through digitally-controlled spaces. This is not to imply that all acts of social passage will necessarily be uncomfortably noticed by the general legitimised user. It is likely that in-built strategies of marginalisation will be increasingly ‘normalised’ as part of shifting social practices: a regular state of affairs within a twenty-first century beset by manipulated terror in-securities.

Further, there are indications that these entwined and embedded information flows will seek to incorporate not only the physical and digital, but also the biological. In other words, each unit of information will be sought to be coded and therefore ‘secured’ under a full spectrum dominance agenda. Goonatilake (1999) sees this as moving towards a meta-communications environment that will merge human/genetic, cultural, machine as information codes and which will serve as information carriers:

The future will thus result in intense communications not only between machines and humans, but also with genetic systems so that information in the three realms of genes, culture and machines will result in one interacting whole. The three for all purposes would be interacting as one communicating system. (Goonatilake, 1999: 197)

We may soon be moving towards a momentous shift, perhaps the most important paradigmatic shift our current civilization has ever witnessed: a transformation into a digitally contained and controlled global environment.

This leaves the future vulnerable to extreme possibilities. Already there has been much Internet ‘chatter’ about the potential this offers for ‘exotic’ containment and control practices, including the possibility that a space-based, armed communications network is capable of beaming electromagnetic pulse technology upon virtually any chosen spot on the Earth. The potential here for mass mind control strategies is severely worrying and unnerving.

As we move towards the second decade of the twenty-first century we come increasingly close to a crossroads. One path indicates a move towards a deep and entrenched militarisation of the civil sphere where control and containment are the order of the day; the other path leads towards increased civil participation, engagement, and empowerment. It is perhaps a choice between global emancipation or complete global grid-lock.

Dr. Kingsley Dennis is a Research Associate in the Centre for Mobilities Research (CeMoRe) based at the Sociology Department at Lancaster University, U.K. His research involves examining physical–digital convergences and how these might impact upon social processes. He is concerned with the digital rendition of identity and the implications of surveillance technologies.

Web: http://www.kingsleydennis.com

Blog: http://www.new-mobilities.co.uk

E–mail: Kingsley@kingsleydennis.co.uk

References

Arquilla, J. and Ronfeldt, D. (2001a) ‘Networks, Netwars, and the Fight for the Future’.

Arquilla, J. and Ronfeldt, D. F. (2001b) Networks and Netwars : The Future of Terror, Crime, and Militancy. Santa Monica, CA:Rand.

Broad, W. (2005) A Web of Sensors, Taking Earth’s Pulse. New York Times: May 10th 2005

Brzezinski, M. (2004) Fortress America: On the front lines of Homeland Security – an inside look at the coming surveillance state. New York:Bantam.

Brzezinski, Z. (1970) Between Two Ages: America’s Role in the Technetronic Era. New York: Viking

Butler, D. (2006) ‘Everything, Everywhere’. Nature, 440 402-405.

Cosgrove, D. (2001) Apollo’s Eye: A cartographic Genealogy of the Earth in the Western Imagination. Baltimore:The John Hopkins University Press.

Crandall, J. (2005) ‘Operational Media’

Dept. of Defense (2003) Information Operations Roadmap, (accessed 12/07/2006)

de Rosnay, J. (2000) The Symbiotic Man: A New Understanding of the Organization of Life and a Vision of the Future. New York:McGraw Hill.

Dickey, B. (2004) ‘Internet in the Sky’

Dillon, M. (2003) ‘ Virtual Security: A Life Science of (Dis)order’. Millennium: Journal of International Studies, Volume 32 (3), 531-558.

Dillon, M. (2005) Global Security in the 21st Century: Circulation, Complexity and Contingency. Chatham House: The Royal Institute of International Affairs: (pp. 2-3)

Dinerman, T. (2004) ‘Can the US really build a global persistent surveillance system?’

Goonatilake, S. (1999) Merged Evolution: Long-Term Implications of Biotechnology and Information Technology. Amsterdam:Gordon and Breach.

IWGEO (2005) Strategic Plan for the U.S. Integrated Earth Observation System. National Science & Technology Council (Executive Office of the President): (pp. 1-166)

Piquepaille, R. (2005) ‘Better terrain maps of Earth… and beyond’

Poindexter, J. (2002) ‘Overview of the Information Awareness Office’

Saveri, A. (2004) The Cybernomadic Framework. Institute for the Future: March 2004

Science-Daily (2002) ‘”Internet In The Sky” Will Guide Unmanned Vehicles Into Battle, Aid In Emergencies’

Sterling, B. (2005) Shaping Things. Cambridge, MA:The MIT Press.

Weiner, T. (2004) ‘Pentagon Envisioning a Costly Internet for War’

NOTES

1 Poindexter is an ex-retired Navy Admiral, and one-time National Security Advisor to President Reagan

2 ‘Full Spectrum Dominance’ is a key term used in the Joint Vision 2020 report – a document outlining future visions for the US Department of Defense.

3 Even Google has attempted to get a slice of the action by releasing Google Mars.

Why was the US Government checking out my blog?

Posted in Uncategorized by maasanova on April 3, 2008

Note: If you are reading this post through Facebook, please click on the ‘view original post’ link

So I was checking my blog stats the other day when I noticed that the someone from the US Department of Health and Human Services stopped by and read one of my posts. I found this curious mostly because they read my page, “History Channel: Anthrax Attack Was An Inside Job.” This is interesting also because last week the three letter news networks ran stories about how the FBI was now focusing on four suspects in the 2001 anthrax attacks.

Click image to enlarge

Notice the reader performed a Google blog search for ‘anthrax detrick’. Notice that the server for the National Institutes of Health is located in Bethesda, MD, the same city where the high-grade anthrax was manufactured.

Now why would someone from the Department of Health and Human Services be reading my blog post about the conspiracy that was the 2001 anthrax attack on America? I could only come up with two explanations why; one positive explanation and one negative explanation.

Perhaps the reader wanted to verify a rumor that they heard: that the blogosphere had done what the FBI could not accomplish in seven years: the blogosphere had solved the anthrax attacks years ago.

The other reason is a bit more ominous: the reader was simply tracking bloggers who are speaking out about government crimes and corruption for…future reference.

Then, just this morning I found out the the US Department of Justice had read a post that I wrote on the Violent Radicalisation and Homegrown Terrorism Prevention Act. Hmm…

Click image to enlarge

Follow

Get every new post delivered to your Inbox.

%d bloggers like this: