5 December 2013
Snowden Civil War
The Director of NSA claims Snowden stole 200,000 documents. Allegations in
Australian press claim he stole "up to 20,000." British authorities accuse
Snowden of stealing 58,000. Claims are bruited in the 5 Eyes that this is
the "greatest intelligence failure since World War 2." High officials and
ex-spies accuse Snowden and related media of engaging in terrorism.
This suggests a counter-espionage campaign to exaggerate Snowden's damage,
of betrayal to his country, of aiding the enemy, of threatening national
security. It is successfully restricting release of the Snowden material
and will likely become more forceful as releases continue to the extent of
legislation (open or secret) to criminalize release as a national security
threat.
This counter-espionage shares features of the Red Scare, of the Cold War,
of 9/11, of the Global War on Terrorism.
It duplicates these precedents to enhance the powers of intelligence and
increase its funding for protecting national security. This is the post-WW2
deeply-seated and deeply-mined heritage of governmental and public policy.
The "public debate" Snowden is said will justify his action is underway with
competing programs to garner public support, for curtailing covert surveillance
on the one side, for sustaining and increasing it on the other. A legacy
of practices in such debates is driving the dialogue, the propaganda, the
accusations, the standard means and methods, the competing interests, for
public endorsement.
There will be demons and angels on both sides, there will be casualties,
there will be treacheries and betrayals, there will be lies and dissimulations,
there will be open and secret meetings, bribes, thefts, confessions and
punishments.
There will be incidents and revelations proving the case of both sides. Some
will be authentic, some false, some a hybrid of credibility. Some of these
will occur in courts, some will occur in public relations, some in contract
negotiations, some through "insider leakage" genuine and confected.
From the Rosenbergs to Osama bin Laden to Edward Snowden, the "enemy of the
state," most often invoked by nations ruled by national security secrecy,
generates undercover investigations, provocateurs, informants, covert agents,
black lists, turn coats, confessions, plea bargains; leading to trials,
convictions, imprisonment, public executions, covert assassinations.
As the debate moves from Roberts Rules of Order to national security unlimited
rules of engagement, there will be divisions among the public separating
those favoring civilized discourse from those favoring official violence.
As extremism takes hold -- inevitably the outcome of great differences of
privilege, wealth, belief and policy -- remaining neutral, or indifferent,
will be called aiding the enemy. And with precedents a guide, most of the
public will support whatever it takes to "defeat the enemy," in particular
the "enemy inside." As threats of official violence increase there will be
rapid conversions to the winning side of those most privileged, wealthy and
honored by official policy.
Based on precedents there will be today's ex-Communists, Saudi benefactors,
and First Amendment advocates jumping the ship of dissent when coming under
the fire of official withdrawng privilege of speech and profitability looms.
So it was after WW2, after 9/11, as it appears looming for the Snowden campaign
by the kick in of official exaggeration.
This is the arc of civil wars from high-toned, lawful debate to cruel
and vicious laws of war.
__________
Selected References on Cyber Criminalization and Militarization:
Timeline of Computer Security
History
http://en.wikipedia.org/wiki/Timeline_of_computer_security_hacker_history
List of Computer
Criminals
http://en.wikipedia.org/wiki/List_of_computer_criminals
25% of U.S. Criminal Hackers are Police
Informants
https://www.schneier.com/blog/archives/2011/06/25_of_us_crimin.html
How an Informant Sold Out
Anonymous
http://www.motherjones.com/politics/2012/03/sabu-fbi-anonymous-hacker-informant
Total Information
Awareness
http://en.wikipedia.org/wiki/Information_Awareness_Office
United States Cyber
Command
http://en.wikipedia.org/wiki/United_States_Cyber_Command
Global Surveillance
Disclosure
http://en.wikipedia.org/wiki/2013_global_surveillance_disclosures
Timeline of U.S. Policy Concerning Covert Operations Involving
Assassination
http://www.globalresearch.ca/targeted-killings-timeline-of-u-s-policy-concerning
-covert-operations-involving-assassination/5326095
What the Spanish Civil War Tells Us About Syria and Cyber-Attacks
http://www.usnews.com/opinion/blogs/world-report/2013/09/13/what-the-spanish-
civil-war-tells-us-about-syria-and-cyber-attacks
|