Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

Octafish

(55,745 posts)
Wed Jul 17, 2013, 08:41 PM Jul 2013

Surveillance Blowback: The Making of the U.S. Surveillance State, 1898-2020

By Alfred W. McCoy
July 15, 2013 by TomDispatch.com

The American surveillance state is now an omnipresent reality, but its deep history is little known and its future little grasped. Edward Snowden’s leaked documents reveal that, in a post-9/11 state of war, the National Security Agency (NSA) was able to create a surveillance system that could secretly monitor the private communications of almost every American in the name of fighting foreign terrorists. The technology used is state of the art; the impulse, it turns out, is nothing new. For well over a century, what might be called “surveillance blowback” from America’s wars has ensured the creation of an ever more massive and omnipresent internal security and surveillance apparatus. Its future (though not ours) looks bright indeed.

SNIP...

Today, as Washington withdraws troops from the Greater Middle East, a sophisticated intelligence apparatus built for the pacification of Afghanistan and Iraq has come home to help create a twenty-first century surveillance state of unprecedented scope. But the past pattern that once checked the rise of a U.S. surveillance state seems to be breaking down. Despite talk about ending the war on terror one day, President Obama has left the historic pattern of partisan reforms far behind. In what has become a permanent state of “wartime” at home, the Obama administration is building upon the surveillance systems created in the Bush years to maintain U.S. global dominion in peace or war through a strategic, ever-widening edge in information control. The White House shows no sign -- nor does Congress -- of cutting back on construction of a powerful, global Panopticon that can surveil domestic dissidents, track terrorists, manipulate allied nations, monitor rival powers, counter hostile cyber strikes, launch preemptive cyberattacks, and protect domestic communications.

Writing for TomDispatch four years ago during Obama’s first months in office, I suggested that the War on Terror has “proven remarkably effective in building a technological template that could be just a few tweaks away from creating a domestic surveillance state -- with omnipresent cameras, deep data-mining, nano-second biometric identification, and drone aircraft patrolling ‘the homeland.’"

SNIP...

During the U.S. conquest of the Philippines, Mark Twain wrote an imagined history of twentieth-century America. In it, he predicted that a “lust for conquest” had already destroyed “the Great [American] Republic,” because “trampling upon the helpless abroad had taught her, by a natural process, to endure with apathy the like at home.” Indeed, just a decade after Twain wrote those prophetic words, colonial police methods came home to serve as a template for the creation of an American internal security apparatus in wartime.

CONTINUED...

http://www.commondreams.org/view/2013/07/15

PS: Alfred W. McCoy is professor of history at the University of Wisconsin-Madison, a TomDispatch regular, and author most recently of the book, Torture and Impunity: The U.S. Doctrine of Coercive Interrogation (University of Wisconsin, 2012) which explores the American experience of torture during the past decade. Previous books include: A Question of Torture: CIA Interrogation, from the Cold War to the War on Terror (American Empire Project); Policing America’s Empire: The United States, the Philippines, and the Rise of the Surveillance State, and The Politics of Heroin: CIA Complicity in the Global Drug Trade. He has also convened the “Empires in Transition” project, a global working group of 140 historians from universities on four continents. The results of their first meetings were published as Colonial Crucible: Empire in the Making of the Modern American State.

PPS: IMO, this is a must-read, download and pass-around. Please let me know your thoughts or rat me out to Erik Prince and whatever his old Blackwater's called these days. The corporation's name and amounts owed by the U.S. taxpayer are certainly on an invoice that will be paid, sequester or no sequester, and classified above this civilian's need-to-know.

22 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Surveillance Blowback: The Making of the U.S. Surveillance State, 1898-2020 (Original Post) Octafish Jul 2013 OP
K & R !!! WillyT Jul 2013 #1
McCoy kicked CIA in the nuts with his book on the Company's role in the international drug trade. Octafish Jul 2013 #3
K & R cantbeserious Jul 2013 #2
NSA, the Agency That Could Be Big Brother Octafish Jul 2013 #4
Another home run backstory! Keep it up! K&R! Pholus Jul 2013 #5
The Intelligence-Industrial Complex Octafish Jul 2013 #9
"The corporate intelligence collaboration is global" marions ghost Jul 2013 #15
k&R Bookmark think Jul 2013 #6
Interview with NSA expert James Bamford Octafish Jul 2013 #10
It was a reality when they built DARPA. Rex Jul 2013 #7
The info goes to the likes of Erik Prince, not to see what we need... Octafish Jul 2013 #11
It has nothing to do with our needs. Rex Jul 2013 #12
The Brave New World of Big Data Octafish Jul 2013 #18
And absolute power corrupts, absolutely. Rex Jul 2013 #19
Secrets RobertEarl Jul 2013 #8
The Secret War Octafish Jul 2013 #17
K&R Waiting For Everyman Jul 2013 #13
K&R marions ghost Jul 2013 #14
K&R + a 2008 article that needs to be reread today largely based on Professor McCoy's work bobthedrummer Jul 2013 #16
Private contractors do most intelligence gathering, targeting their critics (Americans for Political bobthedrummer Jul 2013 #21
Kick n/t bobthedrummer Jul 2013 #22
kick woo me with science Jul 2013 #20

Octafish

(55,745 posts)
3. McCoy kicked CIA in the nuts with his book on the Company's role in the international drug trade.
Wed Jul 17, 2013, 09:01 PM
Jul 2013




Drug Fallout

by Alfred McCoy
Progressive magazine, August 1997

Throughout the forty years of the Cold War, the CIA joined with urban gangsters and rural warlords, many of them major drug dealers, to mount covert operations against communists around the globe. In one of history's accidents, the Iron Curtain fell along the border of the Asian opium zone, which stretches across 5,000 miles of mountains from Turkey to Thailand. In Burma during the 1950s, in Laos during the 1970s, and in Afghanistan during the 1980s, the CIA allied with highland warlords to mobilize tribal armies against the Soviet Union and China.

In each of these covert wars, Agency assets-local informants-used their alliance with the CIA to become major drug lords, expanding local opium production and shipping heroin to international markets, the United States included. Instead of stopping this drug dealing, the Agency tolerated it and, when necessary, blocked investigations. Since ruthless drug lords made effective anti-communist allies and opium amplified their power, CIA agents mounting delicate operations on their own, half a world from home, had no reason to complain. For the drug lords, it was an ideal arrangement. The CIA's major covert operations-often lasting a decade-provided them with de facto immunity within enforcement-free zones.

In Laos in the 1960s, the CIA battled local communists with a secret army of 30,000 Hmong-a tough highland tribe whose only cash crop was opium. A handful of CIA agents relied on tribal leaders to provide troops and Lao generals to protect their cover. When Hmong officers loaded opium on the ClA's proprietary carrier Air America, the Agency did nothing. And when the Lao army's commander, General Ouane Rattikone, opened what was probably the world's largest heroin laboratory, the Agency again failed to act.

"The past involvement of many of these officers in drugs is well known," the ClA's Inspector General said in a still-classified 1972 report, "yet their goodwill . . . considerably facilitates the military activities of Agency-supported irregulars."

Indeed, the CIA had a detailed know ledge of drug trafficking in the Golden Triangle-that remote, rugged corner of Southeast Asia where Burma, Thailand, and Laos converge. In June 1971, The New York Times published extracts from an other CIA report identifying twenty-one opium refineries in the Golden Triangle and stating that the "most important are located in the areas around Tachilek, Burma; Ban Houei Sai and Nam Keung in Laos; and Mae Salong in Thailand." Three of these areas were controlled by CIA allies: Nam Keung by the chief of CIA mercenaries for northwestern Laos; Ban Houei Sai by the commander of the Royal Lao Army; and Mae Salong by the Nationalist Chinese forces who had fought for the Agency in Burma. The CIA stated that the Ban Houei Sai laboratory, which was owned by General Ouane, was ' believed capable of processing 100 kilos of raw opium per day," or 3.6 tons of heroin a year-a vast output considering the total yearly U.S. consumption of heroin was then less than ten tons.

By 1971, 34 percent of all U.S. soldiers in South Vietnam were heroin addicts, according to a White House survey. There were more American heroin addicts in South Vietnam than in the entire United States-largely supplied from heroin laboratories operated by CIA allies, though the White House failed to acknowledge that unpleasant fact. Since there was no indigenous local market, Asian drug lords started shipping Golden Triangle heroin not consumed by the GIs to the United States, where it soon won a significant share of the illicit market.

CONTINUED...

http://www.thirdworldtraveler.com/CIA/CIAdrug_fallout.html



Odd how know the CIA, NSA and the rest of the secret government are gaining power to protect their secrets while simultaneously authorized to spy on American citizens, the famous We the People who are supposed to be their bosses.

Octafish

(55,745 posts)
4. NSA, the Agency That Could Be Big Brother
Wed Jul 17, 2013, 09:08 PM
Jul 2013




NSA, the Agency That Could Be Big Brother

by James Bamford

New York Times, December 25, 2005
www.truthout.com

Washington - Deep in a remote, fog-layered hollow near Sugar Grove, W.Va., hidden by fortress-like mountains, sits the country's largest eavesdropping bug. Located in a "radio quiet" zone, the station's large parabolic dishes secretly and silently sweep in millions of private telephone calls and e-mail messages an hour.

Run by the ultrasecret National Security Agency, the listening post intercepts all international communications entering the eastern United States. Another NSA listening post, in Yakima,Wash., eavesdrops on the western half of the country.

A hundred miles or so north of Sugar Grove, in Washington, the NSA has suddenly taken center stage in a political firestorm. The controversy over whether the president broke the law when he secretly ordered the NSA to bypass a special court and conduct warrantless eavesdropping on American citizens has even provoked some Democrats to call for his impeachment.

According to John E. McLaughlin, who as the deputy director of the Central Intelligence Agency in the fall of 2001 was among the first briefed on the program, this eavesdropping was the most secret operation in the entire intelligence network, complete with its own code word - which itself is secret.

Jokingly referred to as "No Such Agency," the NSA was created in absolute secrecy in 1952 by President Harry S. Truman. Today, it is the largest intelligence agency. It is also the most important, providing far more insight on foreign countries than the CIA and other spy organizations.

CONTINUED...

http://www.thirdworldtraveler.com/NSA/NSA_Could_Be_Big_Brother.html



Gen. Clapper is the kindest, bravest, warmest, most wonderful human being I've ever known in my life

Octafish

(55,745 posts)
9. The Intelligence-Industrial Complex
Wed Jul 17, 2013, 09:41 PM
Jul 2013




The intelligence-industrial complex

Joseph Kishore
WSWS.org 15 July 2013

An important aspect of the spying operations that have been exposed over the past month by National Security Agency (NSA) whistle-blower Edward Snowden is the collusion of giant telecommunications and technology companies with the Obama administration and US intelligence agencies in the systematic violation of democratic rights.

SNIP...

PRISM itself is only part of an even more expansive program, in which the NSA taps directly into the “Internet backbone”—the system of fiber optic cables through which most telecommunications and Internet communications pass. These cables are run and controlled by large corporations, including the same telecommunications giants that hand over data on phone records, as well as companies such as 3 Communications and CenturyLink. In this way, the NSA can monitor in real time much of the world’s Internet traffic and reroute it for permanent storage.

Bloomberg News reported last month that “thousands of technology, finance and manufacturing companies are working closely with US national security agencies, providing sensitive information and in return receiving benefits that include access to classified information.” In exchange for their secret collaboration with the government, the companies often receive documents guaranteeing immunity for their actions.

The programs cited by Bloomberg are diverse and far-reaching. They include an agreement with Microsoft to inform the NSA of bugs in its operating systems before they are publicly released—giving the agency an opportunity to exploit the information to infiltrate computers in the US and abroad. McAfee, which makes Internet security software and is a subsidiary of Intel, also partners with intelligence agencies on a regular basis.

The corporate-intelligence collaboration is global. Over the weekend, newspapers in Australia reported on a partnership between US spy agencies and Telstra, the largest telecommunications company in Australia, to hand over data to the US government. Telstra controls the bulk of the Internet backbone in Australia and routes much of the communications traffic from Asia.

CONTINUED...

http://www.wsws.org/en/articles/2013/07/15/pers-j15.html



Seeing how these private intel companies probably privatize the best of the take, too, makes clear how the very rich keep getting richer and the rest of us not only poorer, but catalogued.

(Read in Greg Allman singing on "Whipping Post&quot : Sometimes I feel like an attention whore. Then I remember why I do it.

Gen. Clapper is the kindest, bravest, warmest, most wonderful human being I've ever known in my life.

Octafish

(55,745 posts)
10. Interview with NSA expert James Bamford
Thu Jul 18, 2013, 01:19 AM
Jul 2013

SF Gate, July 17, 2013

EXCERPT...

Q: What do you make of Edward Snowden’s actions?

A: With regard to the information he released on domestic surveillance, I consider him a whistleblower. He revealed details of massive violations by the NSA of the privacy rights of all Americans. The NSA has no constitutional right to secretly obtain the telephone records of every American citizen on a daily basis, subject them to sophisticated data mining and store them forever. It’s time government officials are charged with criminal conduct, including lying to Congress, instead of going after those exposing the wrongdoing.

Q: What has changed the most about the NSA since your last book, “The Shadow Factory,” came out in 2008?

A: The agency has expanded enormously, in terms of size, power and invasiveness since “The Shadow Factory” was published. As I wrote in my Wired magazine cover story last year, the agency has been going on a massive building spree, expanding eavesdropping locations around the world, including one for 4,000 intercept operators at its facility near Augusta, Ga. In addition, it is in the process of building a gigantic one million square-foot surveillance center in Utah where it will store billions of records, phone calls, email and Google searches, many of them involving Americans.

The agency has also increased enormously in power. In my current July 2013 cover story in Wired, I write about Gen. Keith Alexander, the director of NSA, and how he has become the most powerful figure in the history of American intelligence. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign or the depth of his secrecy. As a four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the U.S. Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force and the Second Army.

SNIP...

Q: In “The Shadow Factory,” you wrote that the NSA’s watch list — “of people, both American and foreign, thought to pose a danger to the country” — once had only 20 names on it, then rose to “an astonishing half a million.” Do you know what the figure is now?

A: The Terrorist Identities Datamart Environment list, known as TIDE, now contains about 875,000 names.

CONTINUED...

http://blog.sfgate.com/bookmarks/2013/07/01/interview-with-nsa-expert-james-bamford/

PS: Thanks for grokking where and to whom all the intel, power and money went, thanks to secret goverment spying, 21st century style.

 

Rex

(65,616 posts)
7. It was a reality when they built DARPA.
Wed Jul 17, 2013, 09:16 PM
Jul 2013

They just didn't have it completely figured out yet. They did know way ahead of time it would be possible to see if we had corn on a daily basis. Honestly, I don't know why since 99.9% is white noise. To me that is a huge waste of resources, but that seems to be the norm of 30 years of trickle down economics.

I have no doubt this will be reciprocal for the corporations when they need to know exactly what kind of toilet paper you are out of and need more of by next Monday.

This is the world we helped build. Now they want to analyze the entire thing.

Octafish

(55,745 posts)
11. The info goes to the likes of Erik Prince, not to see what we need...
Thu Jul 18, 2013, 01:34 AM
Jul 2013

...but to know where to turn a buck or a screw.

If they discover an inside trader tip, or who's wife is having an affair with what CIA director, who'd ever know?

 

Rex

(65,616 posts)
12. It has nothing to do with our needs.
Thu Jul 18, 2013, 04:32 AM
Jul 2013

Money, it is all about money. When I say they want to know what kind of TP we need, it is so they can make money. The entire system was built to make money and collect information for the government. It was never too much of a secret. People just take it for granted now and call it the Internet.

Octafish

(55,745 posts)
18. The Brave New World of Big Data
Thu Jul 18, 2013, 01:35 PM
Jul 2013
Netflix and Surveillance

by KATE EPSTEIN
CounterPunch, JULY 17, 2013

EXCERPT...

But big data has another side, better predicted by Aldous Huxley’s very different 1932 dystopia Brave New World. In that version of the future, consumer desire, and not thought-policing, keeps the citizens of the World State in line in a year defined not by A.D. but by A.F., or “After Ford.” Sex-hormone chewing gum, the ecstasy-inducing drug soma (“one cubic centimeter cures ten gloomy sentiments,”) and recreational sex are all encouraged, as is attending the popular “feelies,” which combine sight, smell, and touch to create the ultimate entertainment experience.

In many ways we are living out some bizarre combination of 1984’s total surveillance and perception management and Brave New World’s post-Fordist corporatocracy, in which our actions are monitored and our perceptions managed just as much to shape our desires and then fulfill them as to root out dissidents and quash dissent. It is, after all, corporations like Booz Allen that conduct most of the government surveillance in our brave, deregulated, new world. Although one function of all that data is “security,” which is a lucrative enough industry on its own, an even more profitable function is the better understanding of consumer decision-making that can be assembled from the over 2.8 zettabytes of data that exists in the world.

Like the characters in Huxley’s dystopia (most of whom believed they lived in a utopia), we exist in an entertainment-saturated society. Much of that entertainment is delivered to us through one company: Netflix, which caters to approximately 30 million viewers and is more watched than cable television. I thought of feelies, and of Huxley’s broader vision, when I heard about Netflix’s new strategy for creating original content, employed for the first time with “House of Cards” this past February—one that involves using billions of data points to better understand what its viewers want to see.

SNIP...

This information has long dictated what content Netflix decides to license and recommend to different viewers, but “House of Cards” was the first time any company had ever used such data in the creative production process for a T.V. show. It started when Netflix noticed that there was significant overlap between the circles of viewers who watched movies starring Kevin Spacey and movies directed by David Fincher from beginning to end, and viewers who loved the original 1990 BBC miniseries “House of Cards.” Subscribers were shown one of ten different trailers for the series based on their consumer profiles. The producers also knew, from studying viewers’ watching patterns, that releasing all thirteen episodes at once would promote and reward the binge-like behavior demonstrated by their target audience. The new strategy paid off, with ten percent of Netflix subscribers watching the series within two weeks of its debut, and 80% of viewers rating it “good” or “exceptional.”

SNIP...

As technology advances, corporations are developing both more precise ways to monitor our behavior and smarter algorithms to crunch that data. Last year, Verizon applied for a patent for a type of monitoring technology that uses infrared cameras and microphones to track and collect consumer behavior—such as eating, exercising, reading, and sleeping—in the vicinity of a TV or mobile device. Embedded in cable boxes in living rooms across America, this Orwellian tool would presumably help companies get to know us just a little bit better. Marketing firms use eye tracking to measure how elements of advertisements are perceived, retained and recalled, and corporations use facial recognition on billboards’ hidden cameras to detect age and gender brackets to display targeted ads. Surely these developments raise many of the same privacy concerns as the U.S. intelligence community’s blanket spying programs. When did we agree to give all this personal data away for free? And do we even know it’s happening?

CONTINUED...

http://www.counterpunch.org/2013/07/17/the-brave-new-world-of-big-data/

PS: Karl Rove and the rest of the Gangster State understand the ancient system. Machiavelli distilled: Use money to gain power. Use power to protect and gain money. Repeat for as long as possible.
 

Rex

(65,616 posts)
19. And absolute power corrupts, absolutely.
Thu Jul 18, 2013, 01:40 PM
Jul 2013

I think with all that power through knowledge, they will just keep on the path of decadence and deceit. Until the power corrupts them to the core and we are left with a festering sore of a nation, built on lies and surveillance.

 

RobertEarl

(13,685 posts)
8. Secrets
Wed Jul 17, 2013, 09:24 PM
Jul 2013

The corrupt depend on keeping secrets. The government is the best secret keeper next to organized criminals, so it is no wonder the two have merged.

If it wasn't for those working to expose the secrets, we wouldn't stand a chance and all our efforts and those of our ancestors to make a "More perfect Union" would be for naught.

We stand a chance, yet, at a better Union, and people like you and others mentioned in your threads, Octafish, give us that chance. Thanks you, Sir.

Octafish

(55,745 posts)
17. The Secret War
Thu Jul 18, 2013, 01:27 PM
Jul 2013

INFILTRATION. SABOTAGE. MAYHEM. FOR YEARS, FOUR-STAR GENERAL KEITH ALEXANDER HAS BEEN BUILDING A SECRET ARMY CAPABLE OF LAUNCHING DEVASTATING CYBERATTACKS. NOW IT’S READY TO UNLEASH HELL.

by James Bamford
Wired, June 12, 2013

EXCERPT...

This is the undisputed domain of General Keith Alexander, a man few even in Washington would likely recognize. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the US Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.

SNIP...

What’s good for Alexander is good for the fortunes of the cyber-industrial complex, a burgeoning sector made up of many of the same defense contractors who grew rich supplying the wars in Iraq and Afghanistan. With those conflicts now mostly in the rearview mirror, they are looking to Alexander as a kind of savior. After all, the US spends about $30 billion annually on cybersecurity goods and services.

In the past few years, the contractors have embarked on their own cyber building binge parallel to the construction boom at Fort Meade: General Dynamics opened a 28,000-square-foot facility near the NSA; SAIC cut the ribbon on its new seven-story Cyber Innovation Center; the giant CSC unveiled its Virtual Cyber Security Center. And at consulting firm Booz Allen Hamilton, where former NSA director Mike McConnell was hired to lead the cyber effort, the company announced a “cyber-solutions network” that linked together nine cyber-focused facilities. Not to be outdone, Boeing built a new Cyber Engagement Center. Leaving nothing to chance, it also hired retired Army major general Barbara Fast, an old friend of Alexander’s, to run the operation. (She has since moved on.)

Defense contractors have been eager to prove that they understand Alexander’s worldview. “Our Raytheon cyberwarriors play offense and defense,” says one help-wanted site. Consulting and engineering firms such as Invertix and Parsons are among dozens posting online want ads for “computer network exploitation specialists.” And many other companies, some unidentified, are seeking computer and network attackers. “Firm is seeking computer network attack specialists for long-term government contract in King George County, VA,” one recent ad read. Another, from Sunera, a Tampa, Florida, company, said it was hunting for “attack and penetration consultants.”

One of the most secretive of these contractors is Endgame Systems, a startup backed by VCs including Kleiner Perkins Caufield & Byers, Bessemer Venture Partners, and Paladin Capital Group. Established in Atlanta in 2008, Endgame is transparently antitransparent. “We’ve been very careful not to have a public face on our company,” former vice president John M. Farrell wrote to a business associate in an email that appeared in a WikiLeaks dump. “We don’t ever want to see our name in a press release,” added founder Christopher Rouland. True to form, the company declined Wired’s interview requests.

CONTINUED...

http://www.wired.com/threatlevel/2013/06/general-keith-alexander-cyberwar/all/

PS: Thank you for your kind words, RobertEarl. You and all DUers who stand up for the Constitution, including the parts about a free press and freedom of speech, in reality are helping Gen. Alexander in keeping our nation free.

marions ghost

(19,841 posts)
14. K&R
Thu Jul 18, 2013, 08:21 AM
Jul 2013

The National Geospace Intelligence Agency & The Pentagon (from the article):

"From its new $1.8 billion headquarters, the third-biggest building in the Washington area, the National Geospatial-Intelligence Agency deploys 16,000 employees and a $5 billion budget to coordinate a rising torrent of surveillance data from Predators, Reapers, U-2 spy planes, Global Hawks, X-37B space drones, Google Earth, Space Surveillance Telescopes, and orbiting satellites.

To protect those critical orbiting satellites, which transmit most U.S. military communications, the Pentagon is building an aerospace shield of pilotless drones. In the exosphere, the Air Force has since April 2010 been successfully testing the X-37B space drone that can carry missiles to strike rival satellite networks such as the one the Chinese are currently creating.

For more extensive and precise surveillance from space, the Pentagon has been replacing its costly, school-bus-sized spy satellites with a new generation of light, low cost models such as the ATK-A200. Successfully launched in May 2011, this module is orbiting 250 miles above the Earth with remote-controlled, U-2 quality cameras that now provide the “U.S. Central Command an assured ISR (Intelligence, Surveillance, and Reconnaissance) capability.”

In the stratosphere, close enough to Earth for audiovisual surveillance, the Pentagon is planning to launch an armada of 99 Global Hawk drones -- each equipped with high-resolution cameras to surveil all terrain within a 100-mile radius, electronic sensors to intercept communications, and efficient engines for continuous 24-hour flight.

Within a decade, the U.S. will likely deploy this aerospace shield, advanced cyberwarfare capabilities, and even vaster, more omnipresent digital surveillance networks that will envelop the Earth in an electronic grid capable of blinding entire armies on the battlefield, atomizing a single suspected terrorist, or monitoring millions of private lives at home and abroad.

Sadly, Mark Twain was right when he warned us just over 100 years ago that America could not have both empire abroad and democracy at home. To paraphrase his prescient words, by “trampling upon the helpless abroad” with unchecked surveillance, Americans have learned, “by a natural process, to endure with apathy the like at home.”

 

bobthedrummer

(26,083 posts)
16. K&R + a 2008 article that needs to be reread today largely based on Professor McCoy's work
Thu Jul 18, 2013, 01:19 PM
Jul 2013

Last edited Thu Jul 18, 2013, 02:08 PM - Edit history (1)

In Contravention of Conventional Wisdom (by Cheryl Welsh 2008 Mindjustice)
http://mindjustice.org/wisdom.htm

on edit:
here's another thread to reconsider in the LIGHT of what is now known about our "intelligence community"-blowback to the infinite

The Pike Committee (OP from 3-11-08)
http://www.democraticunderground.com/discuss/duboard.php?az=view_all&address=389x2990965

 

bobthedrummer

(26,083 posts)
21. Private contractors do most intelligence gathering, targeting their critics (Americans for Political
Fri Jul 19, 2013, 02:01 PM
Jul 2013

Change/ampoch.org/ post from 6-13-13.)

"70% of intelligence gathering is done by private contractors..."
http://ampoch.org/2013/06/13/private-contractors-do-most-intelligence-gathering-targeting-their-critics

Of course, historically, the Pinkerton's, et al weren't fascist like the new post 9/11 breed. Let's remember what the precursors were about- similar to the statement "Wisconsin is open for business!" (Scott Walker)

History of union busting in the United States (Wikipedia entry)
http://en.wikipedia.org/wiki/History_of_union_busting_in_the_United_States

Keep this thread kicked. Thanks for starting it, Sir.

Latest Discussions»General Discussion»Surveillance Blowback: Th...