[governance] More perspectives on US Digital Panopticon

Riaz K Tayob riaz.tayob at gmail.com
Tue Jun 11 08:45:27 EDT 2013


Two interesting articles below...

**Spy vs Spy in the cyber age*
By Brendan O'Reilly

Despite very public pressure, US President Barack Obama and his Chinese 
counterpart, Xi Jinping, failed to reach an agreement on combating 
cyber-espionage at their weekend meeting in California. Beijing and 
Washington are trading increasingly harsh accusations of launching 
state-sanctioned cyber attacks. Meanwhile, a covert program of Internet 
data mining by US intelligence agencies has been revealed by a young 
whistleblower, who has taken refuge in China's Special Administrative 
Region of Hong Kong.

China and the United States are contesting a vast and uncharted arena of 
superpower rivalry. The cyber war has already begun.

Obama and Xi left their summit in Palm Springs with a series of*


important agreements, covering such pressing issues as the North Korean 
nuclear weapons program and global warming. However, Obama's efforts to 
persuade Xi to work out an agreement on cyber-espionage were entirely 
unsuccessful.

To avoid electronic eavesdropping, Xi and his delegation decided at the 
last minute to stay in a downtown hotel away from the summit's grounds. 
If he wants to prevent American intelligence from accessing his personal 
communications, Xi would be wise to avoid Facebook and Gmail.

In recent weeks, Washington and Beijing have very publicly exchanged 
allegations of cyber malfeasance. Before the Palm Springs summit, a 
White House official stressed, "Governments are responsible for cyber 
attacks that take place from within their borders. As a part of our 
interests in protecting US businesses, we will raise with China any 
concerns we have about intrusions we believe emanate from China." [1]

The Chinese government responded with counter-accusations of American 
cyber attacks directed against China. A report in People's Daily claimed 
that in the first five months of 2013, more than 4,000 US-based control 
servers "hijacked" 2.91 million mainframes in China. Huang Chengqing, 
the director of the Chinese National Computer Network Emergency Response 
Technical Team, declared "We have mountains of data, if we wanted to 
accuse the US, but it's not helpful in solving the problem. The 
importance of handling Internet security cases keeps rising, but the 
issue can only be settled through communication, not confrontation." [2]

Meanwhile, reports of a vast operation by American intelligence to 
collect information from the world's leading Internet firms have 
overshadowed the extensive cyber-espionage and raids carried out between 
the US and China.

The PRISM program is a mechanism for direct US government access to the 
data of Google, Microsoft, Yahoo, Facebook, AOL, Apple, and Paltalk. It 
allows US intelligence to view emails, search queries, online chats, 
photos, and video calls hosted by the major platforms for online 
communications - everything from Gmail and Hotmail to YouTube, and 
Skype. According to classified documents, the NSA collected nearly 3 
billion pieces of electronic information from US computer servers in the 
period of just one month. [3]

According to the source of the intelligence leak, "The NSA has built an 
infrastructure that allows it to intercept almost everything. With this 
capability, the vast majority of human communications are automatically 
ingested without targeting." [4]

Director of National Intelligence James Clapper released a fact sheet 
meant to justify the once-secret program, claiming PRISM "facilitates 
the targeted acquisition of foreign intelligence information concerning 
foreign targets located outside the United States under court 
oversight". For the program to collect data, it must have "an 
appropriate, and documented, foreign intelligence purpose" and target a 
person "reasonably believed to be outside the United States". [5]

In other words, any potentially useful electronic communications of any 
human being outside the United States are fair game. According to the 
Foreign Intelligence Surveillance Act, the president of the United 
States has the authority to target foreign communications without a 
court order for the period of one year. No wonder the NSA can collect 
three billion pieces of data in a month.

China's blocking of major social networking, news, and political 
websites - the so-called "Great Firewall of China" - has long been the 
target of Western, and particularly American, condemnation. In a 2010 
speech, then secretary of state Hillary Clinton warned that a "new 
information curtain is descending across much of the world... In the 
last year, we've seen a spike in threats to the free flow of 
information. China, Tunisia and Uzbekistan have stepped up their 
censorship of the Internet." [6]

The most popular US-based websites blocked by the Chinese government are 
Facebook and YouTube. Google search and Gmail, while not entirely 
jammed, are frequently disrupted by China's Great Firewall.

It seems that Clinton's much-championed "free flow of information" 
includes an unquenchable flood of personal data into the NSA's massive 
information farms. By blocking Facebook and YouTube, Beijing has 
inadvertently protected the private information of Chinese citizens (at 
least from Washington), and denied the US government billions of pieces 
of potentially useful data about the Chinese economy, military, and 
government.

Roughly 700 million Chinese people are active on the Internet, out of a 
worldwide total of 2.4 billion Internet users. In other words, fully 29% 
of all Internet users live in China. Savvy Chinese netizens can easily 
find means to get beyond the Great Firewall. However, the inconvenience 
of these methods, and the availability of domestic Chinese alternatives, 
has greatly restricted the penetration of Facebook and YouTube into the 
Chinese market.

The PRISM program has provided Beijing with a golden justification for 
continuing to restrict access to certain websites. Washington's calls 
for freedom of information are more likely to be viewed in a 
hypocritical light in the wake of the PRISM program's public outing.

*A refuge in the Middle Kingdom?*
The electronic rivalry between Washington and Beijing is becoming yet 
more intense, as the whistleblower who exposed the PRISM program takes 
refuge in Hong Kong.

Edward Snowden, a former CIA-employee, chose Hong Kong as his port of 
call before leaking the classified documents. When coming public about 
his own identity, he cited the city's "reputation for freedom", while in 
the same breath saying this distinction comes "in spite of the People's 
Republic of China". [7] Snowden has cited Iceland as a possible 
long-term destination for asylum.

However, a former CIA employee, no matter how ideologically committed to 
the cause of freedom, is unlikely to be naive. The recent history of 
"extraordinary rendition" of terror suspects from America's democratic 
Western allies probably factored into Snowden's decision to decision to 
go East.

Choosing Hong Kong may serve a dual purpose - Snowden hopes to take 
advantage of both the autonomous city's open judicial process and the 
implied protection of China's clandestine security forces.

In the light of intelligence officials joking about "disappearing" 
Snowden and a reporter covering the PRISM story [8], Snowden might 
reasonably chose to trust Beijing over Reykjavik for his personal 
protection. While it may seem ironic for an American champion of open 
information to take refugee in China, politics makes for strange 
bedfellows.

Former CIA official Robert Baer has even gone so far as to say the 
entire leak of PRISM was orchestrated by Beijing: "On the face of it, it 
looks like it's under some sort of Chinese control. ... You have to ask 
what's going on? I mean, China is not a friendly country, and every 
aspect of that country is controlled." [9] Baer cited both Snowden's 
port of call and the timing of the leak - coming at the same days as the 
Obama-Xi summit - as being particularly suspicious.

If indeed Snowden has defected to Beijing, this would represent a huge 
coup for China in the emerging realm of cyber rivalry. Already the PRISM 
program has helped to justify China's Internet censorship and expose a 
large degree of official hypocrisy on the part of the American government.

The most dangerous aspect of cyber espionage remains its unpredictable 
nature. There are no clear rules of engagement differentiating between 
routine intelligence gathering and outright aggression. Both Beijing and 
Washington have a clear interest in defining red lines to prevent 
uncontrollable escalation.

However, this very necessary discussion is probably best conducted in 
secret. Washington's vocal denunciations of Beijing's aggressive cyber 
activities have served little purpose other than angering Beijing, 
exposing American hypocrisy abroad, and justifying increased domestic 
control and surveillance over the Internet by the American government.

The cyber war is already here. America's PRISM and China's Great 
Firewall may be signs of what is to come in a developing electronic arms 
race.

/*Notes:*/
1. Obama to press China's Xi to act against cyber spying 
<http://www.reuters.com/article/2013/06/04/us-usa-china-idUSBRE9531E220130604>, 
Reuters, June 4, 2013.
2. China is a victim of hacking attacks 
<http://english.peopledaily.com.cn/90883/8271052.html>, People's Daily, 
June 5, 2013.
3. Parts of NSA's PRISM program declassified 
<http://www.usatoday.com/story/news/nation/2013/06/08/dni-declassifies-prism-data-collection-nsa-secret-program-obama/2403999/>, 
USA Today, June 8, 2013.
4. Edward Snowden, NSA files source: 'If they want to get to you, in 
time they will' 
<http://www.guardian.co.uk/world/2013/jun/09/nsa-whistleblower-edward-snowden-why>, 
The Guardian, June 9, 2013.
5. Parts of NSA's PRISM program declassified 
<http://www.usatoday.com/story/news/nation/2013/06/08/dni-declassifies-prism-data-collection-nsa-secret-program-obama/2403999/>, 
USA Today, June 8, 2013.
6. Clinton: Internet 'information curtain' is dropping 
<http://edition.cnn.com/2010/TECH/01/21/clinton.internet/index.html>, 
CNN, January 21, 2010.
7. Edward Snowden, NSA files source: 'If they want to get to you, in 
time they will' 
<http://www.guardian.co.uk/world/2013/jun/09/nsa-whistleblower-edward-snowden-why>, 
The Guardian, June 9, 2013.
8. Report: Intel officials allegedly 'joke' about making NSA leaker 
'disappear' 
<http://www.examiner.com/article/report-intel-officials-allegedly-joke-about-making-nsa-leaker-disappear>, 
Examiner, June 10, 2013.
9. Ex-CIA Official Baer: China Could be Behind NSA Leaks 
<http://www.newsmax.com/Newsfront/snowden-guardian-nsa-leak/2013/06/09/id/508874>, 
Newsmax, June 9, 2013.

/*Brendan P O'Reilly* is a China-based writer and educator from Seattle. 
He is author of /The Transcendent Harmony. /He may be reached at 
oreillyasia at gmail.com. /

(Copyright 2013 Asia Times Online (Holdings) Ltd. All rights reserved. 
Please contact us about sales, syndication and republishing.)

*
THE ROVING EYE*
*Digital Blackwater rules*
By Pepe Escobar

The judgment of Daniel "Pentagon Papers" Ellsberg is definitive; "There 
has not been in American history a more important leak than Edward 
Snowden's release of NSA material". And that includes the release of the 
Pentagon Papers themselves. Here is the 12-minute video 
<http://www.guardian.co.uk/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-video> 
by The Guardian where Snowden details his motives.

By now, everything swirling around the US National Security Agency (NSA) 
points to a black box in a black hole. The black box is the NSA 
headquarters itself in Fort Meade, Maryland. The

black hole is an area that would include the suburbs of Virginia's 
Fairfax County near the CIA but mostly the intersection of the Baltimore 
Parkway and Maryland Route 32.
There one finds a business park a mile away from the NSA which Michael 
Hayden, a former NSA director (1999-2005) told Salon's Tim Shorrock is 
"the largest concentration of cyber power on the planet". [1] Hayden 
coined it "Digital Blackwater".

Here is a decent round up of key questions 
<http://www.propublica.org/article/nsa-black-hole-5-basic-things-we-still-dont-know-the-governments-snoop>still 
not answered about the black hole. But when it comes to how a 29-year 
old IT wizard with little formal education has been able to access a 
batch of ultra-sensitive secrets of the US intelligence-national 
security complex, that's a no-brainer; it's all about the gung-ho 
privatization of spying - referred to by a mountain of euphemisms of the 
"contractor reliance" kind. In fact the bulk of the hardware and 
software used by the dizzying network of 16 US intelligence agencies is 
privatized.

A Washington Post investigation found out that US homeland security, 
counter-terror and spy agencies do business with over 1,900 companies. 
[2] An obvious consequence of this contractor tsunami - hordes of 
"knowledge" high-tech proletarians in taupe cubicles - is their 
indiscriminate access to ultra-sensitive security. A systems 
administrator like Snowden can have access to practically everything.

"Revolving door" does not even begin to explain the system. Snowden was 
one of 25,000 employees of Booz Allen Hamilton ("We are visionaries") 
for the past three months. [3] Over 70% of these employees, according to 
the company, have a government security clearance; 49% are top secret 
(as in Snowden's case), or higher. The former director of national 
intelligence Mike McConnell is now a Booz Allen vice president. The new 
director of national intelligence, the sinister-looking retired general 
James Clapper, is a former Booz Allen executive.

At least US - and world - public opinion may now have a clearer idea of 
how a Pashtun girl in Waziristan is obliterated by a "targeted strike". 
It's all a matter of this privatized NSA-collected meta-data and matrix 
multiplication leading to a "signature". The "terrorist" Pashtun girl of 
course may eventually morph in the near future into a dangerous 
tree-hugger or a vocal political protester.

*It's all China's fault*
True to form, as soon as Snowden revealed his identity US corporate 
media privileged shooting the messenger instead of poring over the 
message. That included everything from cheap character assassination 
<http://www.politico.com/story/2013/06/10-things-to-know-about-edward-snowden-92491.html?hp=r2> 
to the usual former CIA asset spinning that in Washington many were 
looking at Snowden as an agent in a potential Chinese espionage plot 
<http://www.breitbart.com/InstaBlog/2013/06/10/Former-CIA-Officer-Intel-Considering-NSA-Whistleblower-Potential-Chinese-Espionage>. 


Much has also been made of the John Le Carre-esque plot twist of Snowden 
leaving his tranquil life in Hawaii and flying to Hong Kong on May 20, 
because "they have a spirited commitment to free speech and the right of 
political dissent". Hong Kong-based blogger Wen Yunchao memorably 
described it as Snowden having "left the tiger's den and entered the 
wolf's lair". Yet Snowden's visa stamp at Chek Lap Kok airport lasts for 
90 days - plenty of time to ponder the next move.

Since 1996, before the British handover to China, an extradition treaty 
applies between the tiger and the wolf. [4] The US Department of Justice 
is already surveying its options. It's important to remember that the 
Hong Kong judicial system is independent from China's - according to the 
Deng Xiaoping-conceptualized "one country, two systems". As much as 
Washington may go for extraditing Snowden, he may also apply for 
political asylum. In both cases he may stay in Hong Kong for months, in 
fact years.

The Hong Kong government cannot extradite anyone claiming he will be 
persecuted in his country of origin. And crucially, article 6 of the 
treaty stipulates, "a fugitive offender shall not be surrendered if the 
offence of which that person is accused or was convicted is an offence 
of a political character." Another clause stipulates that a fugitive 
shall not be surrendered if that implicates "the defense, foreign 
affairs or essential public interest or policy" of - guess who - the 
People's Republic of China.

So then we may have a case of Hong Kong and Beijing having to reach an 
agreement. Yet even if they decided to extradite Snowden, he could argue 
in court this was "an offence of a political character". The bottom line 
- this could drag on for years. And it's too early to tell how Beijing 
would play it for maximum leverage. A "win-win" situation from a Chinese 
point of view would be to balance its commitment to absolute 
non-interference in foreign domestic affairs, its desire not to rock the 
fragile bilateral relation boat, but also what non-pivoting move the US 
government would offer in return.

*The ultimate Panopticon*
The usual rabid right-wingers in the US predictably skip the fact of how 
Snowden does not see intelligence analysts - and even the US government, 
per se - as inherent "bad guys". [5] What he stressed is how they all 
work under a false premise; "If a surveillance program produces 
information of value, it legitimizes it ... In one step, we've managed 
to justify the operation of the Panopticon".

Oh yes, make no mistake; Snowden has carefully read his Michel Foucault 
(he also stressed his revulsion facing "the capabilities of this 
architecture of oppression").

Foucault's deconstruction of the Panopticon's architecture is now a 
classic (see it here <http://cryptome.org/cartome/panopticon1.htm> in an 
excerpt of his 1975 masterpiece /Discipline and Punish/). The Panopticon 
was the ultimate surveillance system, designed by utilitarian 
philosopher Jeremy Bentham in the 18th century. The Panopticon - a tower 
surrounded by cells, a pre-Orwellian example of "architecture of 
oppression" - was not originally conceived for the surveillance of a 
prison, but of a factory crammed with landless peasants on forced labor.

Oh, but those were rudimentary proto-capitalist days. Welcome to the 
(savagely privatized) future, where the NSA black hole, "Digital 
Blackwater", lords over all as the ultimate Panopticon.

/*Notes*/:
1. Digital Blackwater: Meet the Contractors Who Analyze Your Personal 
Data 
<http://www.alternet.org/digital-blackwater-meet-contractors-who-analyze-your-personal-data?paging=off>, 
Alternet, June 10, 2013.
2. Top Secret America 
<http://projects.washingtonpost.com/top-secret-america/>, Washington 
Post, June, 2010.
3. See here <http://www.boozallen.com> for company website.
4. See here <https://bulk.resource.org/gpo.gov/documents/105/td003.pdf> 
for extradition treaty.
5. Code name 'Verax': Snowden, in exchanges with Post reporter, made 
clear he knew risks 
<http://www.washingtonpost.com/world/national-security/code-name-verax-snowden-in-exchanges-with-post-reporter-made-clear-he-knew-risks/2013/06/09/c9a25b54-d14c-11e2-9f1a-1a7cdee20287_story_1.html>, 
Washington Post, June 10, 2013.

/*Pepe Escobar* is the author of/ Globalistan: How the Globalized World 
is Dissolving into Liquid War 
<http://www.amazon.com/exec/obidos/ASIN/0978813820/simpleproduction/ref=nosim> 
(Nimble Books, 2007) and Red Zone Blues: a snapshot of Baghdad during 
the surge 
<http://www.amazon.com/Red-Zone-Blues-snapshot-Baghdad/dp/0978813898>. 
His new book, just out, is Obama does Globalistan 
<http://www.amazon.com/Obama-Does-Globalistan-Pepe-Escobar/dp/1934840831/ref=sr_1_1?ie=UTF8&s=books&qid=1233698286&sr=8-1> 
(Nimble Books, 2009).

/He may be reached at/ pepeasia at yahoo.com.

(Copyright 2013 Asia Times Online (Holdings) Ltd. All rights reserved. 
Please contact us about sales, syndication and republishing.)
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.igcaucus.org/pipermail/governance/attachments/20130611/d42cac1b/attachment.htm>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.igcaucus.org/pipermail/governance/attachments/20130611/d42cac1b/attachment-0001.htm>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: ad_choices_i_UR.png
Type: image/png
Size: 513 bytes
Desc: not available
URL: <http://lists.igcaucus.org/pipermail/governance/attachments/20130611/d42cac1b/attachment.png>
-------------- next part --------------
____________________________________________________________
You received this message as a subscriber on the list:
     governance at lists.igcaucus.org
To be removed from the list, visit:
     http://www.igcaucus.org/unsubscribing

For all other list information and functions, see:
     http://lists.igcaucus.org/info/governance
To edit your profile and to find the IGC's charter, see:
     http://www.igcaucus.org/

Translate this email: http://translate.google.com/translate_t


More information about the Governance mailing list