Feeds

9/11: The day we lost our privacy and power

Every day, we have to prove we have 'nothing to hide'

High performance access to file storage

In 1999, the European Parliament commissioned reports on Echelon, and then asked for further checks and legal recommendations for controlling spying from EP vice president Gerhard Schmid. Schmid's detailed recommendations were passed without exception by the full parliament on 5 September 2001. They would have been an important new step to protect the privacy of global communications. But in less than a week, the project to control Echelon and its like lost moral authority. The proposals soon sank into the dustbin of history.

In their wake, quite apart from the now well-publicised episodes of kidnapping (rendition) and torture, a new archipelago of monitoring and control and extrajudicial punishment has come into being. The US has according to a major new study published this week, created a vast and almost unseen archipelago of secret operations and control centres.

Top Secret America is the product of two years' of research by former military intelligence analyst Bill Arkin and a team from the Washington Post. They found that since 9/11, more than 1,200 government agencies and 2,000 private corporations at over 10,000 locations within the United States alone have created an unstoppable and barely controllable top secret network to support the GWOT.

Like Arkin and his team, I have tramped around recondite suburbs and industrial parks in Maryland, Virginia, Washington, Colorado and elsewhere to view the architecture of this new world. In Washington alone, the new homeland security, intelligence and counterterrorism real estate includes 33 new building complexes erected since 2001, with a net floorspace 22 times greater than the Congress.

Constellations of these centres have grown everywhere: in the UK at Menwith Hill in the Yorkshire dales; in the US in Texas, Georgia, Colorado. The monolithic and windowless nature of the buildings is dictated by an extreme electronic security requirement that they be SCIFs (Secure Compartmented Information Facilities). Apart from physical security and personnel control systems, the signature physical aspect of a SCIF is that no electronic emanations reflecting what happens inside should be carried out by cable, fibre or through a window. Not a photon shall escape.

Some are merely windowless and featureless blockhouses. Others sport multiple satellite connections that supplement the buried and unseen fibre global networks.

bollingairforcebaseonthepotmomac

Bolling Airforce Base on the Potmomac.

DENVERANDBUCKLEYBUILDINGS

Denver and Buckley buildings

Arkin and co–author Dana Priest conclude that "hardly anyone truly comprehends the enormous expansion of the military, intelligence and homeland security bureaucracy that has occurred over the past decade, and the often irrational transformation of American life that has accompanied it."

Some centres manage satellites. Others collate and assess information harvested from the internet. Modern warfare bases in Nevada and California and on the east coast house control centres for the growing fleets of UACVs which can remotely administer final punishment on those considered to be threats. No courts or judges are required, or indeed allowed in.

A large part of the new technical apparatus since 9/11 is devoted to filtering international communications passing through the United States, including the communications of American citizens. Thanks to courageous whistleblowers and the persistence of campaigners such as EFF, details of NSA's surveillance network have been coming to light since 2006. Wiring plans and fibre schematics provided by a former technician for the communications company AT&T showed how optical fibres running through their San Francisco hub had been spliced and tapped to take much of the United States' west coast internet traffic into a secret monitoring room, and on into analysis centres.

fibrepoptictappingarrangementsfromatandt

Wiring plans and fibre schematics provided by a former technician for the communications company AT&T

Further and later investigations showed that the plans for the San Francisco and other taps into the global internet had been developed in the late 1990s, but that the full–scale go ahead was only given late in 2001. EFF assessed that there might be hundreds of similar access points spread through communications centres.

Pivotal to sanctioning breaches of law and the setting aside of historic protections that the United States had gained after the War of Independence and in its Bill of Rights, was a lie about terrorists and computers. The lie remains on the internet to this day.

On 6 December 2001, US Attorney General John Ashcroft – desperate to leverage support from the US Senate for the radical post 9/11 PATRIOT act that would hand the government powers unprecedented in peacetime – announced the publication of an "Al Qaeda manual" found by the US government. The manual he said, was "a "how– to" guide for terrorists – that instructs enemy operatives in the art of killing in a free society … in this manual, al Qaeda terrorists are told how to use America's freedom as a weapon against us. … Imprisoned terrorists are instructed to concoct stories of torture and mistreatment at the hands of our officials." (sic)

The manual was allegedly "found in a computer file" described as "the military series" related to the "Declaration of Jihad".

Among the many problems with these assertions is that the document Aschroft described was not on a computer and could not have been. It was a limited edition paper book prepared in the 1980s, at a time when Al Qaeda did not exist and when Mr Bin Laden was helping run a guesthouse for fighters supporting the US-backed attacks on the Soviet occupiers of Afghanistan. It was souvenir from that first war kept by a fighter who had moved to Manchester, England.

When the police called on him in 2001, there were no computers in his house. He handed it to them and told them what it was. The rest of the story was made up in Washington after 9/11.

The book is not called the al Qaeda manual, and does not mention al Qaeda or Osama Bin Laden. Its target was not the West but rather corrupt Arab states. It was written at a time when the Soviet Union was ruled by the communist party. The manual is still online, and still dishonestly described, here.

Can the zeitgeist change back? Part of the problem lies in the construction of journalism in approaching privacy issues. No newspaper or magazine wants to talk about theory or abstract principles. Anecdotes rule the day. Editors want victims of the putative harms of excessive surveillance. And not just any victims: they want fresh new and charismatic victims whose stories are exclusive to their outlet, whose allegations and fears are sufficiently well documented and clear to satisfy lawyers, yet simple enough to slim to a soundbyte.

This is not a new structural problem in journalism or politics. It can make it hard for many to argue against the jibe that they have "nothing to hide". This is never true, of course, but it leads an informed audience away from the central harm, which is that it is the existence of uncontrolled surveillance and (critically) the power to act on its results, that causes harm to society. This is the "chilling effect". Fear, no more and no less.

Enhanced fear has now been common currency for a decade. It could be why – following Winston Smith, the central character of 1984 – that since 9/11 we may all be headed to a time why we don't understand anymore why privacy matters.

Perhaps part of this may have been inevitable, driven by Moore's Law and the related effects of decades of exponential growth in IT capabilities. What 9/11 has done to take away the idea that we should have the power to control what happens next. ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Big Content goes after Kim Dotcom
Six studios sling sueballs at dead download destination
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
Jack the RIPA: Blighty cops ignore law, retain innocents' comms data
Prime minister: Nothing to see here, go about your business
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.