politics

Media & culture’s emptiness encourages cynicism

From John Twelve Hawks’s “ How We Live Now” (2005):

Instead of resisting the Vast Machine, many of us have given into cynicism and distraction. Our contemporary culture has become a brilliantly colored surface without a deeper spiritual meaning. We care more about celebrities than our own neighbors. Are Nick and Jessica getting divorced? Is that famous actor secretly gay? Staged media events allow us to think that everything is false. Our sense of powerlessness — the belief that an ordinary person does not matter — has twisted our lips into a sneer.

Media & culture’s emptiness encourages cynicism Read More »

Media-induced fear & its effects

From John Twelve Hawks’s “ How We Live Now” (2005):

In his insightful book “The Culture of Fear,” Barry Glassner shows how many of our specific fears are created and sustained by media manipulation. There can be an enormous discrepancy between what we fear and the reality of what could happen to us. Glassner analyzes several “threats” such as airplane disasters, youth homicide, and road rage, and proves that the chance of any of these dangers harming an individual is virtually nonexistent.

Although Glassner accurately describes the falseness of a variety of threats, he refrains from embracing any wide-reaching explanation. It can be argued that the constant message of impending destruction is simply a way for the media to keep us watching television – “Are cyber predators targeting your children?” is a tagline that is going to get the audience’s attention. What interests me is not the reality of these threats, but the effect they have on our view of the world. Fear encourages intolerance, racism and xenophobia. Fear creates the need for a constant series of symbolic actions manufactured by the authorities to show that – yes, they are protecting us from all possible dangers.

Media-induced fear & its effects Read More »

Another answer to “I have nothing to hide”

From John Twelve Hawks’s “ How We Live Now” (2005):

“And so what if they know all about me?” asks the honest citizen. “I’m good person. I’ve got nothing to hide.” This view assumes that the intimate personal information easily found in our computerized system is accurate, secure, and will only be used for your benefit. What if criminals access your information? What if corporations deny you insurance or employment because the wrong data has ended up in your file? What if you simply want to take control over who knows what about you?

Another answer to “I have nothing to hide” Read More »

Government-created viruses for surveillance

From John Twelve Hawks’s “ How We Live Now” (2005):

The Traveler describes for the first time in any book the secret computational immunology programs being developed in Britain. These programs behave like the leucocytes floating through our bloodstream. The programs wander through the Internet, searching, evaluating, and hiding in a person’s home PC, until they detect a “dangerous” statement or unusual information. After gathering our personal information, they return to the central computer. There is no reason why they can’t easily be programmed to destroy a target computer … such as the one on which you’re reading this essay.

Government-created viruses for surveillance Read More »

What RFID passports really mean

From John Twelve Hawks’s “ How We Live Now” (2005):

The passports contain a radio frequency identification chip (RFID) so that all our personal information can be instantly read by a machine at the airport. However, the State Department has refused to encrypt the information embedded in the chip, because it requires more complicated technology that is difficult to coordinate with other countries. This means that our personal information could be read by a machine called a “skimmer” that can be placed in a doorway or a bus stop, perhaps as far as 30 feet away.

The U.S. government isn’t concerned by this, but the contents of Paris Hilton’s cell phone, which uses the same kind of RFID chip, were skimmed and made public last year. It may not seem like a problem when a semi-celebrity’s phone numbers and emails are stolen, but it is quite possible that an American tourist walking down a street in a foreign country will be “skimmed” by a machine that reads the passport in his or her pocket. A terrorist group will be able to decide if the name on the passport indicates a possible target before the tourist reaches the end of the street.

The new RFID passports are a clear indication that protection is not as important to the authorities as the need to acquire easily accessible personal information.

What RFID passports really mean Read More »

The US is becoming less democratic

From Tony Judt’s “The New World Order” (The New York Review of Books: 14 July 2005):

For there is a precedent in modern Western history for a country whose leader exploits national humiliation and fear to restrict public freedoms; for a government that makes permanent war as a tool of state policy and arranges for the torture of its political enemies; for a ruling class that pursues divisive social goals under the guise of national “values”; for a culture that asserts its unique destiny and superiority and that worships military prowess; for a political system in which the dominant party manipulates procedural rules and threatens to change the law in order to get its own way; where journalists are intimidated into confessing their errors and made to do public penance. Europeans in particular have experienced such a regime in the recent past and they have a word for it. That word is not “democracy.”

The US is becoming less democratic Read More »

An empire cannot be created by a republic

From Tony Judt’s “The New World Order” (The New York Review of Books: 14 July 2005):

Historians and pundits who leap aboard the bandwagon of American Empire have forgotten a little too quickly that for an empire to be born, a republic has first to die. In the longer run no country can expect to behave imperially – brutally, contemptuously, illegally – abroad while preserving republican values at home. For it is a mistake to suppose that institutions alone will save a republic from the abuses of power to which empire inevitably leads. It is not institutions that make or break republics, it is men. And in the United States today, the men (and women) of the country’s political class have failed. Congress appears helpless to impede the concentration of power in the executive branch; indeed, with few exceptions it has contributed actively and even enthusiastically to the process.

An empire cannot be created by a republic Read More »

Illegality practices by the US in the “War on Terror”

From Tony Judt’s “The New World Order” (The New York Review of Books: 14 July 2005):

The unrepublican veneration of our presidential “leader” has made it uniquely difficult for Americans to see their country’s behavior as others see it. The latest report from Amnesty International – which says nothing that the rest of the world doesn’t already know or believe but which has been denied and ridiculed by President Bush – is a case in point. The United States “renders” (i.e., kidnaps and hands over) targeted suspects to third-party states for interrogation and torture beyond the reach of US law and the press. The countries to whom we outsource this task include Egypt, Saudi Arabia, Jordan, Syria (!), Pakistan – and Uzbekistan. Where outsourcing is impractical, we import qualified interrogators from abroad: in September 2002 a visiting Chinese “delegation” was invited to participate in the “interrogation” of ethnic Uighur detainees held at Guantánamo.

At the US’s own interrogation centers and prisons in Iraq, Afghanistan, and Guantánamo Bay, at least twenty-seven “suspects” have been killed in custody. This number does not include extrajudicial, extraterritorial “targeted assassinations”: a practice inaugurated by Benito Mussolini with the murder of the Rosselli brothers in Normandy in 1937, pursued with vigor by Israel, and now adopted by the Bush administration. The Amnesty report lists sixty alleged incarceration and interrogation practices routinely employed at US detention centers, Guantánamo in particular. These include immersion in cold water to simulate drowning, forced shaving of facial and body hair, electric shocks to body parts, humiliation (e.g., being urinated upon), sex-ual taunting, the mocking of religious belief, suspension from shackles, physical exertion to the point of exhaus-tion (e.g., rock-carrying), and mock execution.

Any and all of these practices will be familiar to students of Eastern Europe in the Fifties or Latin America in the Seventies and Eighties – including the reported presence of “medical personnel.” But American interrogators have also innovated. One technique has been forcibly to wrap suspects – and their Korans – in Israeli flags: a generous gesture to our only unconditional ally, but calculated to ensure that a new generation of Muslims worldwide will identify the two countries as one and hate them equally.

All of these practices – and many, many others routinely employed at Guantánamo, at Kandahar and Bagram in Afghanistan, at al-Qaim, Abu Ghraib, and elsewhere in Iraq – are in breach of the Geneva Conventions and the UN Convention against Torture, to both of which the US is a signatory

Illegality practices by the US in the “War on Terror” Read More »

America, a militarized society

From Tony Judt’s “The New World Order” (The New York Review of Books: 14 July 2005):

[Andrew] Bacevich is a graduate of West Point, a Vietnam veteran, and a conservative Catholic who now directs the study of international relations at Boston University. He has thus earned the right to a hearing even in circles typically immune to criticism. What he writes should give them pause. His argument is complex, resting on a close account of changes in the US military since Vietnam, on the militarization of strategic political thinking, and on the role of the military in American culture. But his conclusion is clear. The United States, he writes, is becoming not just a militarized state but a military society: a country where armed power is the measure of national greatness, and war, or planning for war, is the exemplary (and only) common project.

Why does the US Department of Defense currently maintain 725 official US military bases outside the country and 969 at home (not to mention numerous secret bases)? Why does the US spend more on “defense” than all the rest of the world put together? After all, it has no present or likely enemies of the kind who could be intimidated or defeated by “star wars” missile defense or bunker-busting “nukes.” And yet this country is obsessed with war: rumors of war, images of war, “preemptive” war, “preventive” war, “surgical” war, “prophylactic” war, “permanent” war. As President Bush explained at a news conference on April 13, 2004, “This country must go on the offense and stay on the offense.”

Among democracies, only in America do soldiers and other uniformed servicemen figure ubiquitously in political photo ops and popular movies. Only in America do civilians eagerly buy expensive military service vehicles for suburban shopping runs. In a country no longer supreme in most other fields of human endeavor, war and warriors have become the last, enduring symbols of American dominance and the American way of life. “In war, it seemed,” writes Bacevich, “lay America’s true comparative advantage.” …

For Bacevich’s deepest concern lies closer to home. In a militarized society the range of acceptable opinion inevitably shrinks. Opposition to the “commander in chief” is swiftly characterized as lèse-majesté; criticism becomes betrayal. No nation, as Madison wrote in 1795 and Bacevich recalls approvingly, can “preserve its freedom in the midst of continual warfare.”[12] “Full-spectrum dominance” begins as a Pentagon cliché and ends as an executive project.

America, a militarized society Read More »

International Law in the modern world

From Tony Judt’s “The New World Order” (The New York Review of Books: 14 July 2005):

Things go wrong, and not just in Iraq. International law – like the UN itself – was conceived in a world of sovereign states, a world where wars broke out between countries, peace was duly brokered among states, and a major concern of the post–World War II settlement was to guarantee the inviolability of borders and sovereignty. Today’s wars typically happen within states. The distinctions between peace-making and peacekeeping – between intervention, assistance, and coercion – are unclear, as are the rights of the conflicting parties and the circumstances under which foreign agencies may resort to force. In this confusing new world, well-meaning Western diplomats and observers have sometimes proven unable to distinguish between warring states – operating under conventional diplomatic norms – and locally powerful criminal tyrants, such as the leaders of Sudan. Negotiation with the latter all too often amounts to collaboration and even complicity.

International Law in the modern world Read More »

Wikipedia defines fascism

From Wikipedia’s “Fascism” (5 July 2006):

Fascism is a radical totalitarian political philosophy that combines elements of corporatism, authoritarianism, extreme nationalism, militarism, anti-rationalism, anti-anarchism, anti-communism and anti-liberalism. …

A recent definition that has attracted much favorable comment is that by Robert O. Paxton:

“Fascism may be defined as a form of political behavior marked by obsessive preoccupation with community decline, humiliation, or victim-hood and by compensatory cults of unity, energy, and purity, in which a mass-based party of committed nationalist militants, working in uneasy but effective collaboration with traditional elites, abandons democratic liberties and pursues with redemptive violence and without ethical or legal restraints goals of internal cleansing and external expansion.” (Anatomy of Fascism, p 218)

Fascism is associated by many scholars with one or more of the following characteristics: a very high degree of nationalism, economic corporatism, a powerful, dictatorial leader who portrays the nation, state or collective as superior to the individuals or groups composing it.

Wikipedia defines fascism Read More »

Fouche’s blackmail of Napoleon

From Napoleonic Literature’s “The Court and Camp of Buonaparte: The Ministers: Fouche“:

[Fouche,] who was so profoundly versed in the state of parties, — who was obeyed by one, courted by another, and feared by all; who, by means of his countless agents, could at any time congregate the scattered elements of resistance to the authority of government, was too formidable to be allowed to continue for ever in so dangerous a post. To this we may add that Buonaparte well knew the channel through which the knowledge of his amours passed to Josephine. Of the extent to which the head of the state was subjected to this galling system of espionage, Fouché furnishes us with an amusing proof:–

One day Buonaparte observed that, considering my acknowledged ability, he was astonished I did not perform my functions better, — that there were several things of which I was ignorant. ‘Yes,’ replied I, ‘there certainly are things of which I was ignorant, but which I now know well enough. For instance, a little man muffled up in a grey cloak, and accompanied by a single servant, often steals out on a dark evening from a secret door of the Tuileries, enters a closed carriage, and drives off to Signora G—-. This little man is yourself; and yet this fanciful songstress jilts you continually out of love for Rode the fiddler.’ The Consul answered not a word: he turned his back, rung, and I immediately withdrew.”Memoires, tom. i. p. 233.

Fouche’s blackmail of Napoleon Read More »

Fouche proud of terror, expanded

From Napoleonic Literature’s “The Court and Camp of Buonaparte: The Ministers: Fouche“:

But whatever might be the merit of his services at Nantes, it was far eclipsed by those he had soon afterwards the happiness to perform at Lyons. On his arrival there with Collot d’Herbois, he announced to the terrified citizens the reward they were to expect for having dared to resist the majesty of the people, and especially for having put to death some revolutionary agents. “The representatives of the people will be impassive in the execution of their mission. They have been intrusted with the thunderbolt of public vengeance, which they will not cease to hurl until the public enemies are crushed. They will have the courage to march over countless tombs of the conspirators, to traverse boundless ruins, that they may arrive at the happiness of nations,–at the regeneration of the world!” He wrote in like terms to his employers at Paris: “Nothing can disarm our severity: indulgence, we must say, is a dangerous weakness. We never cease to strike the enemies of the people; we annihilate them in a manner at once signal, terrible, and prompt. Their bloody corses, thrown into the Rhone, must appear both on the banks and at the mouth of that river, a spectacle of fear, and of the omnipotence of the people! Terror, salutary terror, is here in truth the order of the day; it represses all the efforts of the wicked; it divests crime of all covering and tinsel!

Fouche proud of terror, expanded Read More »

Fouche’s daily list for Napoleon

From Central Missouri State University’s “Joseph Fouche“:

Fouché established an organization of policing and intelligence gathering that was decades ahead of its time. Napoleon, frequently on military campaigns, depended on Fouché’s information to maintain control over France and his military effectiveness. Six days a week, every week, Fouché sent secret reports to Napoleon. The information represented an incredible array of topics:

1. Palace gossip.

2. Audience reaction to a new play.

3. Stock market prices.

4. Desertions from the army.

5. Arrests of foreign agents.

6. Results of interrogations.

7. News of crime.

8. Offenses by soldiers.

9. Fires.

10. Rebellion against the Gendarmarie.

11. Intercepted correspondence.

12. Visiting personages.

13. Public reception of news of victories.

14. Shipping news.

15. Indiscretions of Fouché’s enemies.

16. Contractor’s tenders.

17. Agitation against the draft.

18. Suicides.

19. Prison epidemics.

20. Progress of construction.

21. Unemployment figures.

22. Extracts from inter-ministerial correspondence.

23. Persons detained or under special surveillance (Stead, 1983, pp. 41-48).

Fouche’s daily list for Napoleon Read More »

Japanese nuclear secrets revealed on P2P network

From Mike’s “That’s Not A New Hit Song You Just Downloaded — It’s Japan’s Nuclear Secrets” (techdirt: 23 June 2005):

While IT managers may not see the importance of security software for themselves, you would think they would be a little more careful with things like interns and contractors. Not so, apparently. Over in Japan, a lot of people are not happy after discovering that a lot of classified technical data on nuclear power plants was leaked onto the internet by a contractor using a computer with a file sharing app that was apparently left open to sharing everything on the machine. First off, what kind of nuclear plant contractor is putting a file sharing app on his work laptop? Also, the article notes that the laptop was infested with viruses, but later seems to blame the file sharing app rather than the viruses — so it’s not entirely clear what the viruses have to do with this story. Update: Another article on this story notes that it was the virus that made the material available via the file sharing app. It also notes that the guy was using his personal computer — and somehow this was allowed. It also details the information leaked, including inspection data, photographs and names of inspectors, as well as where they stayed when they did the inspections. No matter what, you have to wonder why the guy was allowed to use his personal computer or to use any computer for this data that hadn’t been checked first for viruses or other vulnerabilities.

From Mike’s “Security Through Begging” (techdirt: 16 March 2006):

Last summer, the surprising news came out that Japanese nuclear secrets leaked out, after a contractor was allowed to connect his personal virus-infested computer to the network at a nuclear power plant. The contractor had a file sharing app on his laptop as well, and suddenly nuclear secrets were available to plenty of kids just trying to download the latest hit single. It’s only taken about nine months for the government to come up with its suggestion on how to prevent future leaks of this nature: begging all Japanese citizens not to use file sharing systems — so that the next time this happens, there won’t be anyone on the network to download such documents.

Japanese nuclear secrets revealed on P2P network Read More »

Why no terrorist attacks since 9/11?

From Bruce Schneier’s “Movie Plot Threat Contest: Status Report” (Crypto-Gram Newsletter: 15 May 2006):

… you have to wonder why there have been no terrorist attacks in the U.S. since 9/11. I don’t believe the “flypaper theory” that the terrorists are all in Iraq instead of in the U.S. And despite all the ineffectual security we’ve put in place since 9/11, I’m sure we have had some successes in intelligence and investigation — and have made it harder for terrorists to operate both in the U.S. and abroad.

But mostly, I think terrorist attacks are much harder than most of us think. It’s harder to find willing recruits than we think. It’s harder to coordinate plans. It’s harder to execute those plans. Terrorism is rare, and for all we’ve heard about 9/11 changing the world, it’s still rare.

Why no terrorist attacks since 9/11? Read More »

L.A. police using drones to spy on citizens

From Zachary Slobig’s “Police launch eye-in-the-sky technology above Los Angeles” (AFP: 17 June 2006):

Police launched the future of law enforcement into the smoggy Los Angeles sky in the form of a drone aircraft, bringing technology most commonly associated with combat zones to urban policing.

The unmanned aerial vehicle, which looks like a child’s remote control toy and weighs about five pounds (2.3 kilograms), is a prototype being tested by the Los Angeles County Sheriff’s Department. …

“This technology could be used to find missing children, search for lost hikers, or survey a fire zone,” said Commander Sid Heal, head of the Technology Exploration Project of the Los Angeles County Sheriff’s Department. “The ideal outcome for us is when this technology becomes instrumental in saving lives.”

The SkySeer would also be a helpful tool to nab burglary suspects on rooftops and to chase down suspects fleeing on foot. The drone comes equipped with low-light and infrared capabilities and can fly at speeds up to 30 miles (48 kilometers) per hour for 70 minutes. …

A small camera capable of tilt and pan operations is fixed to the underside of the drone which sends the video directly to a laptop command station. Once launched, the craft is set to fly autonomously with global positioning system (GPS) coordinates and a fixed flight pattern.

As technology improves, the drone will be outfitted with zoom capabilities. For now, the craft simply flies lower to hone in on its target. …

“The plane is virtually silent and invisible,” said Heal. “It will give us a vertical perspective that we have never had.”

The Los Angeles Sheriff’s Department operates a fleet of 18 helicopters, priced between three and five million dollars each. The SkySeer will cost between 25,000 and 30,000 dollars.

L.A. police using drones to spy on citizens Read More »

4 ways to eavesdrop on telephone calls

From Bruce Schneier’s “VOIP Encryption” (Crypto-Gram Newsletter: 15 April 2006):

There are basically four ways to eavesdrop on a telephone call.

One, you can listen in on another phone extension. This is the method preferred by siblings everywhere. If you have the right access, it’s the easiest. While it doesn’t work for cell phones, cordless phones are vulnerable to a variant of this attack: A radio receiver set to the right frequency can act as another extension.

Two, you can attach some eavesdropping equipment to the wire with a pair of alligator clips. It takes some expertise, but you can do it anywhere along the phone line’s path — even outside the home. This used to be the way the police eavesdropped on your phone line. These days it’s probably most often used by criminals. This method doesn’t work for cell phones, either.

Three, you can eavesdrop at the telephone switch. Modern phone equipment includes the ability for someone to listen in this way. Currently, this is the preferred police method. It works for both land lines and cell phones. You need the right access, but if you can get it, this is probably the most comfortable way to eavesdrop on a particular person.

Four, you can tap the main trunk lines, eavesdrop on the microwave or satellite phone links, etc. It’s hard to eavesdrop on one particular person this way, but it’s easy to listen in on a large chunk of telephone calls. This is the sort of big-budget surveillance that organizations like the National Security Agency do best. They’ve even been known to use submarines to tap undersea phone cables.

4 ways to eavesdrop on telephone calls Read More »

Providing an opening for criminals without realizing it

From Bush, Kerry cross paths in Iowa (BBC News: 4 August 2004):

US President George W Bush and his Democratic rival John Kerry have spent the day hunting votes within blocks of each other in the state of Iowa.

Mr Bush met supporters at a rally in the town of Davenport, while Mr Kerry held an economic roundtable discussion with business leaders nearby. …

Political pundits were not the only ones taking advantage of the day’s events.

Three local banks were robbed as the campaigns hit Davenport.

The first robbery occurred just as Mr Bush stepped off his plane, local police say.

The second and third robberies – at different banks – took place while the two candidates were addressing their respective Iowa crowds.

Providing an opening for criminals without realizing it Read More »

Joan Didion on life in Los Angeles

From Marc Weingarten’s “The White Album“:

Among the many piercing flashes of insight to be found in [Joan Didion’s] The White Album’s essays, many of which were written between 1968 and 1979 for publications like Esquire, The Saturday Evening Post, and The Los Angeles Times Book Review, is one overarching fact of L.A. life – that it exists on a very slippery foundation. Here was an arid desert landscape adjacent to the Pacific that received its water over 200 miles away from the Central Valley, that built its houses on an active seismic fault, that was prone to brush fires, flooding and earthquakes. It was a city in denial of its own instability. …

But it was more than just the events of that darkest year of the sixties that gave Didion intimations of impending doom. She understood what so many failed to grasp about Los Angeles, especially all of those outsiders who migrate here seeking eternal good health, good weather and untold riches: That life here tends to be about as stable as mercury on glass, and therefore not prone to snug feelings of security and safety. …

Joan Didion on life in Los Angeles Read More »