Decoding the new information war

By Heiko Khoo
0 Comment(s)Print E-mail China.org.cn, June 18, 2013
Adjust font size:
 [By Jiao Haiyang/China.org.cn]

 [By Jiao Haiyang/China.org.cn]



The U.S. security and military apparatus is a system rooted in the restless struggle to quench American capitalism's thirst for resources and markets. It subordinates other nations by means of "trick or treat" – in the form of trade, fear and force – to secure profits for its leading companies. The ultimate objective of this machinery of security and warfare is not the containment or oppression of other nations or peoples, but the oppression of the majority inside the United States. The unity of the United States of America is a carefully crafted myth designed to conceal the exploitation of the workers who produce the profits of giant capitalist corporations. America's richest 400 people own more wealth than half of all Americans combined, which amounts to 150 million. The country belongs to those 400 and their hangers-on. They are the United States.

After the collapse of the Soviet Union, U.S. intelligence agencies carved out new operational spheres for themselves based on technical solutions which came to be known as Information Warfare. With the ubiquitous extension of computers and the Internet, the name changed to Command, Control, Communications, Computing and Intelligence, or C4i. More recently, cyber war and network-centric warfare have become the in-vogue terms in the U.S. intelligence community.

War requires the defeat of antiwar. It was hoped that the automation of information gathering technologies would reduce human costs and exposure in espionage activities. Unmanned drones and remote targeting to guide missile strikes were designed to result in fewer U.S. casualties, which would also reduce the danger of an anti-war backlash hampering military operations or leading to demoralization. Thus, the specter of America's defeat in Vietnam would be exorcised.

The dazzling display of laser-guided airstrikes in the 1991 Gulf War, the first computer war, signaled a vast shift towards information warfare. The "War on Terror" provided powerful justification for this new type of engagement and produced an atmosphere of paranoia, which secured a huge boost for the budget of the military-security complex and eradicated the "peace dividend" which the end of the Cold War was supposed to herald. The rising influence of the cyber war lobby corresponded to ongoing revolutions in storage, processing and communications capacity and the fantasies of their innovators were fed with vast resources.

Edward Snowden revealed that the U.S. National Security Agency (NSA) taps into the resources of the world's most widely used Internet companies, supposedly to monitor "foreign threats," using a program they code-named PRISM. But U.S. citizens become "legitimate targets" as soon as they communicate with foreigners. When Snowden revealed this in Hong Kong, Facebook's Mark Zuckerberg and Google's Larry Page both issued carefully worded legalistic denials. Both claimed never to have "heard" of PRISM before, and said they don't provide the NSA with "direct" access to their servers. It is natural that the NSA would not have told either of them that the program is called PRISM and not having "direct access" is irrelevant to the substance of the issue.

Privacy and Big Brother issues are serious problems for Google and Facebook, both of whom cultivated their "cool face of capitalism" image. They appear to provide services that help mankind – on the communist principle "to each according to their needs" – by giving everyone free access to information, social networks and email. This conceals the fact that they acquire individuals' personal information without consent and feel free to share this with the military-security state! The truth is that the data held by these companies should belong to the provider of the data, i.e. the user. These companies should pay us for our data and only use it with our explicit consent.

The ubiquitous and universal spying by Internet giants and the U.S. security services recalls British philosopher Jeremy Bentham's concept of the perfect prison, Panopticon. There, from a central point, a single guard could observe all prisoners in their cells, and by such supervision, reform and remold behavior at minimum cost. But what are Bentham's dreams of an ideal prison compared to the elegance of Facebook, Google and Microsoft's dancing with the U.S. state security apparatus? They unite the whole world with their universal surveillance engines.

1   2   Next  


Print E-mail Bookmark and Share

Go to Forum >>0 Comment(s)

No comments.

Add your comments...

  • User Name Required
  • Your Comment
  • Enter the words you see:   
    Racist, abusive and off-topic comments may be removed by the moderator.
Send your storiesGet more from China.org.cnMobileRSSNewsletter
主站蜘蛛池模板: 四虎影视永久免费观看| 国产精品毛片一区二区三区| 久久久国产精品无码免费专区| 欧美国产日韩在线| 亚洲色无码一区二区三区| 精品国产欧美一区二区| 国产三级久久精品三级| 黑森林av福利网站| 国产精品久久久久久无毒不卡| 97超级碰碰碰碰久久久久| 宅男噜噜噜66网站| 中文字幕avdvd| 日本免费人成黄页网观看视频| 亚洲av无码片一区二区三区| 欧美日韩国产精品| 亚洲综合小视频| 男女性色大片免费网站| 北条麻妃一区二区三区av高清 | 亚洲国产精品一区二区第四页 | 毛片a级毛片免费观看品善网| 免费国产美女爽到喷出水来视频| 美女把尿口扒开让男人桶| 国产三级在线观看专区| 适合男士深夜看的小说软件 | 精品久久久无码人妻中文字幕豆芽 | av区无码字幕中文色| 好男人视频网站| 一级做α爱**毛片| 成人在线免费观看| 中文字幕第2页| 无码专区国产精品视频| 久久aa毛片免费播放嗯啊 | 青楼18春一级毛片| 国产在线视频福利| 黄色小说网站在线观看| 国产成人无码区免费内射一片色欲| 亚洲精品伊人久久久久| 国产精品久久久久无码av| 131美女爱做视频| 国产精品对白交换视频| 2023悦平台今天最近新闻|