Decoding the new information war

By Heiko Khoo
0 Comment(s)Print E-mail China.org.cn, June 18, 2013
Adjust font size:
 [By Jiao Haiyang/China.org.cn]

 [By Jiao Haiyang/China.org.cn]



The U.S. security and military apparatus is a system rooted in the restless struggle to quench American capitalism's thirst for resources and markets. It subordinates other nations by means of "trick or treat" – in the form of trade, fear and force – to secure profits for its leading companies. The ultimate objective of this machinery of security and warfare is not the containment or oppression of other nations or peoples, but the oppression of the majority inside the United States. The unity of the United States of America is a carefully crafted myth designed to conceal the exploitation of the workers who produce the profits of giant capitalist corporations. America's richest 400 people own more wealth than half of all Americans combined, which amounts to 150 million. The country belongs to those 400 and their hangers-on. They are the United States.

After the collapse of the Soviet Union, U.S. intelligence agencies carved out new operational spheres for themselves based on technical solutions which came to be known as Information Warfare. With the ubiquitous extension of computers and the Internet, the name changed to Command, Control, Communications, Computing and Intelligence, or C4i. More recently, cyber war and network-centric warfare have become the in-vogue terms in the U.S. intelligence community.

War requires the defeat of antiwar. It was hoped that the automation of information gathering technologies would reduce human costs and exposure in espionage activities. Unmanned drones and remote targeting to guide missile strikes were designed to result in fewer U.S. casualties, which would also reduce the danger of an anti-war backlash hampering military operations or leading to demoralization. Thus, the specter of America's defeat in Vietnam would be exorcised.

The dazzling display of laser-guided airstrikes in the 1991 Gulf War, the first computer war, signaled a vast shift towards information warfare. The "War on Terror" provided powerful justification for this new type of engagement and produced an atmosphere of paranoia, which secured a huge boost for the budget of the military-security complex and eradicated the "peace dividend" which the end of the Cold War was supposed to herald. The rising influence of the cyber war lobby corresponded to ongoing revolutions in storage, processing and communications capacity and the fantasies of their innovators were fed with vast resources.

Edward Snowden revealed that the U.S. National Security Agency (NSA) taps into the resources of the world's most widely used Internet companies, supposedly to monitor "foreign threats," using a program they code-named PRISM. But U.S. citizens become "legitimate targets" as soon as they communicate with foreigners. When Snowden revealed this in Hong Kong, Facebook's Mark Zuckerberg and Google's Larry Page both issued carefully worded legalistic denials. Both claimed never to have "heard" of PRISM before, and said they don't provide the NSA with "direct" access to their servers. It is natural that the NSA would not have told either of them that the program is called PRISM and not having "direct access" is irrelevant to the substance of the issue.

Privacy and Big Brother issues are serious problems for Google and Facebook, both of whom cultivated their "cool face of capitalism" image. They appear to provide services that help mankind – on the communist principle "to each according to their needs" – by giving everyone free access to information, social networks and email. This conceals the fact that they acquire individuals' personal information without consent and feel free to share this with the military-security state! The truth is that the data held by these companies should belong to the provider of the data, i.e. the user. These companies should pay us for our data and only use it with our explicit consent.

The ubiquitous and universal spying by Internet giants and the U.S. security services recalls British philosopher Jeremy Bentham's concept of the perfect prison, Panopticon. There, from a central point, a single guard could observe all prisoners in their cells, and by such supervision, reform and remold behavior at minimum cost. But what are Bentham's dreams of an ideal prison compared to the elegance of Facebook, Google and Microsoft's dancing with the U.S. state security apparatus? They unite the whole world with their universal surveillance engines.

1   2   Next  


Print E-mail Bookmark and Share

Go to Forum >>0 Comment(s)

No comments.

Add your comments...

  • User Name Required
  • Your Comment
  • Enter the words you see:   
    Racist, abusive and off-topic comments may be removed by the moderator.
Send your storiesGet more from China.org.cnMobileRSSNewsletter
主站蜘蛛池模板: 欧美又黄又嫩大片a级| 精品无码国产自产拍在线观看| 国内自拍视频一区二区三区| 七次郎在线视频永久地址| 日本高清免费aaaaa大片视频| 亚洲一卡2卡4卡5卡6卡残暴在线 | 国产鲁鲁视频在线观看| xxxxx做受大片在线观看免费| 成人在线手机视频| 国产一二三视频| 黄色毛片一级片| 国产激爽大片高清在线观看| 一级美国乱色毛片| 日本不卡一区二区三区四区| 亚洲日韩乱码中文字幕| 特级毛片a级毛片免费播放| 国产亚洲精品bt天堂精选| 精品香蕉在线观看免费| 国产精品免费电影| 69SEX久久精品国产麻豆| 在电影院嗯啊挺进去了啊视频| jizz国产在线播放| 好紧好爽好大好深在快点视频 | а√天堂中文最新版地址| 日韩色视频一区二区三区亚洲| 亚洲国产欧美另类| 欧美日韩在线免费观看| 十九岁日本电影免费完整版观看| 黄页网址大全免费观看22| 国产精品亚洲专区在线播放| 91精品久久国产青草| 在线免费观看亚洲| 99精品一区二区免费视频| 女人l8毛片a一级毛片| 一级艳片加勒比女海盗1| 成人av在线一区二区三区| 中文字幕一区二区三区精彩视频| 护士的小嫩嫩好紧好爽在线播放| 亚洲av永久无码精品水牛影视| 欧美喷潮久久久XXXXx| 亚洲小说区图片区另类春色|