Feeds

9/11: The day we lost our privacy and power

Every day, we have to prove we have 'nothing to hide'

Boost IT visibility and business value

In 1999, the European Parliament commissioned reports on Echelon, and then asked for further checks and legal recommendations for controlling spying from EP vice president Gerhard Schmid. Schmid's detailed recommendations were passed without exception by the full parliament on 5 September 2001. They would have been an important new step to protect the privacy of global communications. But in less than a week, the project to control Echelon and its like lost moral authority. The proposals soon sank into the dustbin of history.

In their wake, quite apart from the now well-publicised episodes of kidnapping (rendition) and torture, a new archipelago of monitoring and control and extrajudicial punishment has come into being. The US has according to a major new study published this week, created a vast and almost unseen archipelago of secret operations and control centres.

Top Secret America is the product of two years' of research by former military intelligence analyst Bill Arkin and a team from the Washington Post. They found that since 9/11, more than 1,200 government agencies and 2,000 private corporations at over 10,000 locations within the United States alone have created an unstoppable and barely controllable top secret network to support the GWOT.

Like Arkin and his team, I have tramped around recondite suburbs and industrial parks in Maryland, Virginia, Washington, Colorado and elsewhere to view the architecture of this new world. In Washington alone, the new homeland security, intelligence and counterterrorism real estate includes 33 new building complexes erected since 2001, with a net floorspace 22 times greater than the Congress.

Constellations of these centres have grown everywhere: in the UK at Menwith Hill in the Yorkshire dales; in the US in Texas, Georgia, Colorado. The monolithic and windowless nature of the buildings is dictated by an extreme electronic security requirement that they be SCIFs (Secure Compartmented Information Facilities). Apart from physical security and personnel control systems, the signature physical aspect of a SCIF is that no electronic emanations reflecting what happens inside should be carried out by cable, fibre or through a window. Not a photon shall escape.

Some are merely windowless and featureless blockhouses. Others sport multiple satellite connections that supplement the buried and unseen fibre global networks.

bollingairforcebaseonthepotmomac

Bolling Airforce Base on the Potmomac.

DENVERANDBUCKLEYBUILDINGS

Denver and Buckley buildings

Arkin and co–author Dana Priest conclude that "hardly anyone truly comprehends the enormous expansion of the military, intelligence and homeland security bureaucracy that has occurred over the past decade, and the often irrational transformation of American life that has accompanied it."

Some centres manage satellites. Others collate and assess information harvested from the internet. Modern warfare bases in Nevada and California and on the east coast house control centres for the growing fleets of UACVs which can remotely administer final punishment on those considered to be threats. No courts or judges are required, or indeed allowed in.

A large part of the new technical apparatus since 9/11 is devoted to filtering international communications passing through the United States, including the communications of American citizens. Thanks to courageous whistleblowers and the persistence of campaigners such as EFF, details of NSA's surveillance network have been coming to light since 2006. Wiring plans and fibre schematics provided by a former technician for the communications company AT&T showed how optical fibres running through their San Francisco hub had been spliced and tapped to take much of the United States' west coast internet traffic into a secret monitoring room, and on into analysis centres.

fibrepoptictappingarrangementsfromatandt

Wiring plans and fibre schematics provided by a former technician for the communications company AT&T

Further and later investigations showed that the plans for the San Francisco and other taps into the global internet had been developed in the late 1990s, but that the full–scale go ahead was only given late in 2001. EFF assessed that there might be hundreds of similar access points spread through communications centres.

Pivotal to sanctioning breaches of law and the setting aside of historic protections that the United States had gained after the War of Independence and in its Bill of Rights, was a lie about terrorists and computers. The lie remains on the internet to this day.

On 6 December 2001, US Attorney General John Ashcroft – desperate to leverage support from the US Senate for the radical post 9/11 PATRIOT act that would hand the government powers unprecedented in peacetime – announced the publication of an "Al Qaeda manual" found by the US government. The manual he said, was "a "how– to" guide for terrorists – that instructs enemy operatives in the art of killing in a free society … in this manual, al Qaeda terrorists are told how to use America's freedom as a weapon against us. … Imprisoned terrorists are instructed to concoct stories of torture and mistreatment at the hands of our officials." (sic)

The manual was allegedly "found in a computer file" described as "the military series" related to the "Declaration of Jihad".

Among the many problems with these assertions is that the document Aschroft described was not on a computer and could not have been. It was a limited edition paper book prepared in the 1980s, at a time when Al Qaeda did not exist and when Mr Bin Laden was helping run a guesthouse for fighters supporting the US-backed attacks on the Soviet occupiers of Afghanistan. It was souvenir from that first war kept by a fighter who had moved to Manchester, England.

When the police called on him in 2001, there were no computers in his house. He handed it to them and told them what it was. The rest of the story was made up in Washington after 9/11.

The book is not called the al Qaeda manual, and does not mention al Qaeda or Osama Bin Laden. Its target was not the West but rather corrupt Arab states. It was written at a time when the Soviet Union was ruled by the communist party. The manual is still online, and still dishonestly described, here.

Can the zeitgeist change back? Part of the problem lies in the construction of journalism in approaching privacy issues. No newspaper or magazine wants to talk about theory or abstract principles. Anecdotes rule the day. Editors want victims of the putative harms of excessive surveillance. And not just any victims: they want fresh new and charismatic victims whose stories are exclusive to their outlet, whose allegations and fears are sufficiently well documented and clear to satisfy lawyers, yet simple enough to slim to a soundbyte.

This is not a new structural problem in journalism or politics. It can make it hard for many to argue against the jibe that they have "nothing to hide". This is never true, of course, but it leads an informed audience away from the central harm, which is that it is the existence of uncontrolled surveillance and (critically) the power to act on its results, that causes harm to society. This is the "chilling effect". Fear, no more and no less.

Enhanced fear has now been common currency for a decade. It could be why – following Winston Smith, the central character of 1984 – that since 9/11 we may all be headed to a time why we don't understand anymore why privacy matters.

Perhaps part of this may have been inevitable, driven by Moore's Law and the related effects of decades of exponential growth in IT capabilities. What 9/11 has done to take away the idea that we should have the power to control what happens next. ®

Boost IT visibility and business value

Whitepapers

Best practices for enterprise data
Discussing how technology providers have innovated in order to solve new challenges, creating a new framework for enterprise data.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?