Showing posts with label War and Peace. Show all posts
Showing posts with label War and Peace. Show all posts

Thursday, October 15, 2020

Dangerous Words: A Political Memoir

MUCKRAKING MEDIA CONSPIRACY CIA TERRORISM RIGHTS FBI UN-AMERICAN REPRESSION DOOMSDAY NARCISSISM COLD WAR SURVEILLANCE LITERACY ANTI-NUCLEAR ANARCHISM FATALISM FREEDOM LIBERATION REACTIONARY MERGER DISINFORMATION PEACE MISSILES ALTERNATIVE CONTRAS DOUBLESPEAK FASCISM DRUGS SECRET IMPERIAL SUPERPOWER MULTIPOLAR RELIGION ECOLOGY CRIME NON-ALIGNED DISSENT DEMOCRACY...   (Links Below)

  Dangerous Words: A Political Memoir
   By Greg Guma

Contents

Audio Prologue ON THE AIR: Burlington Reflections (May 2016)
(One month later Burlington College was closed)


Independent Politics (1989), Vermont Solidarity Conference discussion, moderated by Greg Guma, with Terry Bouricius, Sandy Baird, Ted Glick, Howie Hawkins, Eric Chester, Brian Tokar, and Barbara Nolfi

Part One: Education of an Outsider (1960-1968)

Part Two: Fragile Paradise  (1968-1978)


Part Three: Prelude to a Revolution (1974-1978)

Sunday, December 30, 2018

1968: When the World Was Watching

Opening a Senate investigation of the Tonkin Gulf Resolution in early March 1968, Senator J. William Fulbright described what was taking place across the country as a "spiritual rebellion" of the young against a betrayal of national values. The Resolution, passed in 1964, had given President Johnson a blank check to wage war against Vietnam, based on a trumped-up military incident. Subsequently, over half a million troops were mobilized to prevent a North Vietnamese victory, using fears of communism and falling dominoes to rationalize what soon became a major invasion. 

By 1968, the operative logic was that it might be necessary to destroy the divided Asian nation in order to save it.

Back in the US, anti-war and "stop the draft" protests were on the rise. Even members of the Johnson administration and media establishment were having second thoughts. On returning from Vietnam, Walter Cronkite, the nation's TV "uncle," announced that the only "rational way out" was to negotiate a settlement. Meanwhile, the president's "wise men" advised that a change of policy was unavoidable.

But other forces were also at work. Responding to campus and New Left activism, the FBI concluded that a counter-intelligence program was needed to "expose, disrupt, and otherwise neutralize" the growing anti-war movement. Suggested tactics included instigating personal conflicts and animosities, spreading rumors that movement leaders were Bureau informants, arresting activists on marijuana charges, using "misinformation" to "confuse and disrupt," sending damaging anonymous letters to parents and officials, and exploiting "cooperative press contacts." If anyone was bringing the war back home, it was the FBI.

In mid-March, Eugene McCarthy, an ardent opponent of the war, won an astonishing 42 percent of the Democratic primary vote for president in New Hampshire. Four days later, Robert Kennedy entered the race, and by the end of the month Johnson announced he wouldn't seek re-election. But on the same day that Kennedy made his move, US soldiers lined up hundreds of old men, women, and children in the South Vietnamese village of Mai Lai and shot them dead, one of several massacres that remained secret until the end of the decade.

Just as the US was looking for a way out, it was losing its soul.

"Everywhere we talk liberty and social reform," wrote the prescient muckraker I.F. Stone in the midst of growing chaos, "but we end up by allying ourselves with native oligarchies and military cliques – just as we have done in Vietnam. In the showdown, we reach for the gun."

On April 4, a shot rang out in Memphis, ending the life of Martin Luther King, Jr. Afterward, riots erupted in 125 cities, resulting in over 20,000 arrests and the mobilization of federal troops and the National Guard. Two months later, Kennedy was assassinated in Los Angeles, just after winning the California primary race. By July, there had been over 220 major demonstrations on campuses across the country. Despite clear signs of deepening social conflict, however, the war overseas continued to escalate. In the first five months of the year, almost 10,000 soldiers died in Vietnam, more than in all of 1967. At home, the violence and repression were just beginning.

"Keep clean for Gene" buttons were a familiar sight at the 1968 Democratic National Convention that August. But the protesters maced and beaten outside the meeting hall knew that McCarthy, the peace candidate, and his supporters inside were symbolically undergoing the same ritual. Barbed-wire fences around the amphitheater had led to the grim joke that the delegates were all prisoners in "Stalag 68." Keeping clean obviously wouldn't be enough.

Many who went to Chicago that summer and witnessed what became a police riot emerged either broken or radicalized. For them, the power structure had crossed a basic boundary, moving dangerously close to fascism. Even after McCarthy's headquarters was raided, the Democratic candidate for president, Hubert Humphrey, couldn't bring himself to criticize Mayor Daley's Gestapo tactics. Meanwhile, the party's plank on the war offered little solace, supporting the logic of its most hawkish elements. In short, the war was destroying the country, just as the US military was destroying Vietnam.

In the months that followed the 1968 Democratic Convention, activists preached liberation with even greater zeal. But the obstacles also increased, including a crescendo of busts aimed at leaders of the expanding movement. The FBI's counter-intelligence program was starting to take hold. Several pretexts were used for the arrests, among them dope, assault, obstruction of justice, and an “anti-riot” law. There were also lesser charges, such as "Failure to fasten the seat belt on a Rochester-Buffalo flight" – filed against the Yippie leader Abbie Hoffman, vandalizing a representation of Smokey the Bear, and disrespect for the flag by hanging it as a curtain – even though advertisers were using the same design to sell canned tomatoes and deodorant. Apparently, it was all a matter of "intent." Using the flag to sell products was patriotic, but hanging it across a window was disrespectful, an un-American act.

In November, Richard Nixon profited from the polarization and disillusionment, winning the presidential election in one of the closest votes in US history. During his campaign, he promised to end the war "and win the peace." Once in office, he quickly reversed himself, expanding it into Cambodia with over a year of secret bombings. Meanwhile, his attorney general, Richard Kleindienst, called anti-war activists "ideological criminals."

Before the end of the decade, the list of martyrs included Che Guevara, executed in Bolivia after a misguided attempt to export the Cuban revolution; Andreas Papandreou, the Greek reformer overthrown in a military coup that put CIA agent George Papadopoulos in power; Kwame Nkrumah, the brilliant anti-imperialist president of Ghana whose socialist leanings sparked another CIA-backed military takeover; and Fred Hampton, the Chicago Black Panther leader who was shot in his bed on December 4, 1969 as part of the FBI's obsessive crusade to destroy militant black groups.

Historian Eric Hobshawm wrote, "If there was a single moment in the golden years after 1945 which corresponds to the simultaneous upheaval of which the revolutionaries had dreamed after 1917, it was surely 1968, when students rebelled from the USA and Mexico in the West to socialist Poland, Czechoslovakia and Yugoslavia, largely stimulated by the extraordinary outbreak of May 1968 in Paris, epicentre of a Continent-wide student uprising."

In France, student strikes sparked a nationwide revolt that demolished the liberal myths of permanent stability in advanced societies. In Czechoslovakia, reformers defied Soviet power during the revolt known as Prague Spring. In Brazil, Chile, and Mexico, student uprisings challenged authoritarian rule. But the backlash was fierce and deadly. As Soviet tanks canceled reform in the East Bloc, soldiers opened fire on hundreds of students in Mexico City, and legalized repression came to the United States. 

Half a century on, the wounds still haven't healed and the betrayals and lies continue.

From Dangerous Words: Part eight of “In the 60s: Education of an Outsider.” 

Tuesday, December 11, 2018

Maverick News (12/5/08): Strategy Shifts

Ten Years ago.... This week: War Zones – Afghanistan at the brink, the geopolitics of Mumbai, and the problem with pirates; Prospects for Single Payer, food stamps soar, and an obesity update. Music: Vinyl Resurgence and celebrating Odetta. Vermont: Gearing up for Gay Marriage, and Burlington’s Mayoral race. Plus, Drug News: Meth moves south and ending drug prohibition. Live Broadcast Friday, December 5, 2008, Noon EST, on The Howie Rose Show (WOMM), written and presented by Greg Guma, streamed on The Radiator.

AFGHANISTAN AT THE BRINK. The collapse of Afghanistan is closer than you think. Kandahar is in Taliban hands - all but a square mile at the center of the city - and the first Taliban checkpoints are scarcely 15 miles from Kabul. Hamid Karzai's corrupt government is almost as powerless as the Iraqi cabinet in Baghdad's "Green Zone." Lorry drivers carry business permits issued by the Taliban, which runs the courts in remote areas.

The Red Cross warns that humanitarian operations are being drastically curtailed. More than 4,000 people, at least a third of them civilians, have been killed in the past 11 months, along with NATO troops and about 30 aid workers. Both the Taliban and Karzai's government are executing their prisoners in greater numbers.

According to one Kabul business executive, nobody wants to see the Taliban back in power, but people hate the government and there's mass unemployment.

Afghans working for charitable groups and the UN are being pressured to give information to the Taliban and provide them with safe houses. In the countryside, farmers live in fear of both sides in the war. In short, seven years after 9/11 and the US overthrow of the Taliban we’re almost back to square one.

MUMBAI: WHAT’S AT STAKE. A virtually unknown group called "the Deccan Mujahideen" has claimed responsibility for the recent attacks in India. The Deccan Plateau refers to a region of central-Southern India. According to police sources, attackers who survived say they belong to Lashkar-e-Tayyiba, a Pakistani Kasmiri separatist organization covertly supported by Pakistani military intelligence, known as the ISI. Both Western and Indian media point at Pakistan and its alleged support of Islamic terrorist groups.

Here’s where it gets complicated. The ISI is a proxy of the CIA. Since the early 1980s, Pakistani intelligences has worked closely with its US and British intelligence counterparts. Thus, if the ISI was involved in a major covert operation directed against India, the CIA should have had prior knowledge about the nature and timing of the operation. The ISI isn’t known to act without the consent of its US intelligence counterpart.

Due to this connection, some analysts say that, whether or not US intelligence knew in advance, the US will use the Mumbai attacks to stir up divisions between Pakistan and India, justify US military actions inside Pakistan, and extend the "war on terrorism."

If you don’t buy that, there’s at least one other possibility. As a result of the attacks, Pakistan may relocate 100,000 troops currently at the Afghan border to the Indian border. If that happens, US operations on the border with Afghanistan will become more difficult, since it relies on Pakistani troops to assist with its border operations, and especially to protect the supply route for US operations. Who gains in this scenario: Al Qaeda.

Whoever knew or did what, what are the options? Bomb suspected terrorist cells in India? Send the Marines to Kashmir? Regime change in Pakistan? None or these would be very helpful. Yet the Bush administration pursued similar tactics against the Taliban in Afghanistan, Saddam Hussein in Iraq, and suspected terrorist hideouts in Pakistan. Heck of a job.

The Taliban is back in Afghanistan. Al-Qaeda, which didn't exist in Iraq before the invasion, has a foothold there now. And Pakistan, thanks to former dictator Pervez Musharraf and his intelligence agency, remains Terrorism Central.

Unfortunately, India may now go down the same road, staging its own war on terror. According to the Times of London, "The Indian government is now considering a range of responses, including suspending its five-year peace process with Pakistan, closing their border, stopping direct flights and sending troops to the frontier." It's one thing when the US squares off against the Taliban. But both India and Pakistan have nuclear weapons, so any "war on terror" between those two can go global at a moment's notice.

There is an alternative. Instead of using the military, for example, the British have largely relied on police work to track down and neutralize terrorists. Both the UN and Interpol focus on sharing information among police forces and shutting down the financing of terrorist networks. In other words, instead of fighting fire with fire, the flames could be doused with water. And the most effective fire extinguisher is still the rule of law.

PIRATE POLITICS. In the 18th century, Britain hung pirates in public. The idea was to make it look like not a very good career option. Now, three centuries later, pirates sail the high seas with near impunity – stealing, blackmailing and intimidating commercial ships. And it's not clear who can or should be the pirate police.

An international fleet of warships, including US, British, Danish, Italian, Greek, French and Canadian ships, is operating in the waters off Somalia. The International Maritime Bureau estimates 100 pirate attacks have occurred there this year.

Last week, for example, pirates tried to attack a US cruise ship, the MS Nautica, with over 1,000 people on board. The ship outran the pirates, but other ships haven’t been as lucky – like the Saudi oil tanker seized late last month with its crew and $100 million worth of oil.

Anyone can step up to battle the pirates. But bringing weapons on board ships is "strongly discouraged" by the UN International Maritime Organization, and experts say that arming commercial crews is a bad idea since it can lead to an international incident.

Since most crews don't carry weapons, ships resort to non-violent methods to ward off the pirates, including long-range acoustic devices that blast loud, irritating noises. Sounds wimpy, but it’s apparently the most annoying sound you've ever heard. It can actually make you nauseous. Other non-lethal methods include electric fences and hoses that spray pirates with water and knock them off their ladders before they can climb on board.

But non-violence isn't always effective. Last week, when pirates struck a chemical tanker in the Gulf of Aden, three guards from a British anti-lethal security company, Anti-Piracy Maritime Security Solutions, couldn’t fend off the pirates and eventually threw themselves overboard to avoid capture.

The UN Security Council has extended its authorization for countries to enter Somalia's territorial waters with advanced notice and to use "all necessary force" when combating piracy. The US security firm Blackwater, which operates in Iraq, announced in October that it was making its 183-foot ship, the McArthur, available to companies looking to hire security. Great movie concept. But as a foreign policy, not so much.

And still, even when the pirates can be defeated, there’s a problem. Nobody wants responsibility for the pirates, especially when they come from war-torn places like Somalia. Plus, if they hand the pirates over to the wrong country, they sometimes claim asylum. So far, the new pirates are apparently beating the system.

NATIONAL SCENE

WHAT ABOUT SINGLE PAYER? You might not know it, but in each of the last several sessions of Congress, Rep. John Conyers has introduced single payer health care legislation. The current bill is HR 676, the Conyers-Kucinich National Health Care Act, endorsed by dozens of city councils, state legislatures, county governments, and 90 members of Congress, including more than 30 members of the Congressional Black Caucus. Organizations like the Citizens Alliance for National Health Care are raising money to buy ads for a national media campaign. Yet, the bill has been virtually invisible in mainstream media.

While Barack Obama has promised "universal health care," he and his advisors have explicitly rejected single payer health care. During the campaign, he managed to avoid mention of it except for a few unscripted moments when asked in public. Instead, he and his team want to make government money available to buy private health care, and subsidize a new risk pool, most likely through private insurers, for people who can't find any affordable private coverage.

So, if single payer legislation doesn’t make it to the floor this time, the blame can clearly be laid at the feet of the new president and his party.

FOOD STAMPS SET A NEW RECORD. The US poised to set a new record in food stamp use, more than 30 million people. The previous record was set in 2005, after Hurricane Katrina displaced a million refugees from one of the poorest cities in the country. If all the eligible people were enrolled, another 10 million families might be getting them.

A dollar spent on food stamp benefits generates $1.73 of economic activity, according to economists. This multiplier affect beats even the impact of unemployment insurance. But the purchasing power of food stamps hasn’t kept pace with the inflation in food prices, currently 6.5 percent and expected to hit 8 percent by the end of the year.
TO LOSE WEIGHT, HOLD THE ADVERTISING. Want to cut national obesity? We could cut at least 18 percent of America’s fat just by banning fast-food advertising to children. That’s according to a new study by the National Bureau of Economic Research and National Institutes of Health. Not unexpectedly, the Center for Consumer Freedom, a front group for the restaurant and fast-food industry, calls the study "erroneous" because one of the authors admits that "a lot of people consume fast food in moderate amounts and it doesn't harm their health." But this doesn’t contradict the study's basic findings. Previous studies have reached similar conclusions.

MUSIC

VINYL RESURGENCE. Shipments of LPs jumped more than 36 percent from 2006 to 2007 to more than 1.3 million, according to the Recording Industry Association of America. During the same period shipments of CDs dropped more than 17 percent to 511 million, losing ground to digital formats. Based on the first three months of this year, Nielsen Sound Scan says vinyl album sales could reach 1.6 million in 2008.

The resurgence of vinyl centers on a long-standing debate over analog versus digital sound. Digital recordings capture samples of sound and place them very close together as a complete package that sounds nearly identical to continuous sound to most people. Analog recordings on most LPs are continuous, which supposedly produces a truer sound – though some new LP releases are being recorded and mixed digitally, then delivered analog.

But it's not just about the sound. Audiophiles say they also want the overall experience – the sensory experience of putting the needle on the record and lingering over the liner notes or large format extras.

"I don't think vinyl is for everyone; it's for the die-hard music consumer," said Jay Millar, director of marketing at United Record Pressing, a Nashville based company that is the nation's largest record pressing plant.

Independent music stores, the primary source of LPs in recent years, say many fans never left the medium. "People have been buying vinyl all along," says Cathy Hagen, manager at 2nd Avenue Records in Portland. "There was a fairly good supply from independent labels on vinyl all these years. As far as a resurgence, the major labels are just pressing more now."

Some of the new fans are baby boomers nostalgic for their youth. But to the surprise and delight of music executives, increasing numbers of the iPod generation are also purchasing turntables and vinyl records. Contemporary artists have begun issuing their new releases on vinyl in addition to CD and MP3 formats. As an extra lure, labels are including coupons for free audio downloads with their vinyl albums so that Generation Y music fans can get the best of both worlds: high-quality sound at home and iPod portability for the road.
While new records sell for about $14, used LPs go for as little as a penny or as much as $2,400 for a collectible, autographed copy. In October, Amazon.com introduced a vinyl-only store and increased its selection to 150,000 titles Its biggest sellers? Alternative rock, followed by classic rock.

VOICE OF A MOVEMENT. Odetta, the folk singer with the powerful voice who moved audiences and influenced fellow musicians for a half-century, died last week at 77 of kidney failure. In spite of failing health that restricted her to a wheelchair, Odetta performed 60 concerts in the last two years, singing for 90 minutes at a time.

With a booming, classically trained voice and spare guitar style, Odetta gave life to the songs by workingmen and slaves, farmers and miners, housewives and washerwomen, blacks and whites. First coming to prominence in the 1950s, she influenced Harry Belafonte, Bob Dylan, Joan Baez and other singers who had roots in the folk music boom. When she sang at the March on Washington in August 1963, "Odetta's great, full-throated voice carried almost to Capitol Hill," The New York Times wrote.

Among her notable early works were her 1956 album "Odetta Sings Ballads and Blues," with songs like "Muleskinner Blues" and "Jack O' Diamonds"; and her 1957 "At the Gate of Horn," featuring the popular spiritual "He's Got the Whole World in His Hands."

In a 1983 Washington Post interview, Odetta theorized that humans developed music and dance because of fear, "fear of God, fear that the sun would not come back, many things. I think it developed as a way of worship or to appease something. ... The world hasn't improved, and so there's always something to sing about."

"I'm not a real folksinger," she told The Post. "I don't mind people calling me that, but I'm a musical historian.”

VERMONT

GEARING UP FOR GAY MARRIAGE. Last week Windsor Senator John Campbell promised to reintroduce and push a gay marriage bill in 2009. Governor Douglas has reiterated his opposition, arguing that the debate will distract Vermont from other important issues. He declines to say whether he would veto a bill. Senate leaders have indicated that they aren’t sure whether this will be a priority, and some have questioned whether the Legislature can address our civil rights and deal with the economic challenges in the same session.

Here’s what Senator Campbell wrote in defense of the bill:

“Please rest assured, the civil rights of all Vermonters will be a central issue for me in the upcoming session, alongside the economy, the State's financial challenges, and other critical matters. Although I had hoped that the Governor would step up and share leadership on this important issue, I am not waiting for his advance approval on this. It's too important, and our job is to lead. There's no tension between eliminating discrimination in our laws and meeting the economic challenges we face. Our legislature works through committees, and always tackles dozens of important matters at once. With the foundation laid by the Vermont Commission on Family Recognition and Protection, on which I served, the Legislature should be able to address a marriage bill thoughtfully and efficiently. Plus, making Vermont a discrimination-free zone will help our economy by supporting our tourism industry and giving our businesses a competitive advantage.

“I realize that Vermont is ready to move forward. In my work on the Vermont Commission on Family Recognition and Protection I heard from hundreds of Vermonters whose lives are impacted in a real and significant way by our marriage law's exclusion of same-sex couples. It's time to take the next step. Together, I'm confident we can."

MAYORAL SWEEPSTAKES. The race for Burlington mayor got a little more crowded last week as Dan Smith, attorney for the Greater Burlington Industrial Corp. announced his candidacy as an indepedent. Smith is the son of former US Rep. Peter Smith and great grandson of a founder of Burlington Savings Bank. The other candidates are current Mayor Bob Kiss, a Progressive, and City Council member Andy Montroll, a Democrat. Republican Council President Kurt Wright is also likely to run.

DRUG NEWS

METH MOVES SOUTH. Drug violence, including decapitations and grenade attacks, has killed some 4,500 people in Mexico this year, but thousands of others are falling victim to a quieter crisis: addiction to methamphetamine. Mexico is now the largest producer of meth for the US market and traffickers are finding a growing number of users at home, many of them minors.

Meth use in Mexico has quadrupled in the last six years, according to a survey by their health ministry. As US authorities cracked down in recent years on the sale of the drug's ingredients, busting "mom and pop" labs in blue collar garages and bathrooms, Mexican gangs that already smuggled huge quantities of cocaine and marijuana into the US moved in to meet the demand for meth. They’re now churning out tons of meth in "super labs."

ENDING THE NEW PROHIBITION. Albert Einstein defined insanity as doing the same thing repeatedly and expecting different results. His definition perfectly fits the US war on drugs, a multi-billion dollar, four-decade exercise in futility.

This war has helped turn the US into the country with the world’s largest prison population. The US has 5 percent of the world’s population but around 25 percent of the world’s prisoners. Under the headline “The Failed War on Drugs,” Washington’s middle-of-the-road Brookings Institution said in a November report that drug use hasn’t declined significantly over the years and that “falling retail drug prices reflect the failure of efforts to reduce the supply of drugs.”

This brings us to Law Enforcement Against Prohibition (LEAP), an organization started in 2002 by police officers, judges, narcotics agents, prison wardens and others with first-hand experience of implementing policies that echo the prohibition of alcohol. Prohibition, widely regarded a dismal and costly failure of social engineering, came to an end 75 years ago this month.

As LEAP sees it, the best way to fight drug crime and violence is to legalize drugs and regulate them the same way alcohol and tobacco is now regulated. “We repealed prohibition once and we can do it again,” one of the group’s co-founders, Terry Nelson, told a Washington news conference on December 2. “We cannot arrest our way out of this problem.”

These advocates of drug legalization hope that the similarities between today’s economic crisis and the Great Depression will result in a more receptive audience for their pro-legalization arguments.

The budget impact of legalizing drugs would be enormous, according to a study prepared to coincide with the 75th anniversary of prohibition’s end. Harvard economist Jeffrey Miron estimates that legalizing drugs would inject $76.8 billion a year into the US economy — $44.1 billion through savings on law enforcement and at least $32.7 billion in tax revenues from regulated sales.

Miron published a similar study in 2005 looking only at the budgetary effect of legalizing marijuana. That study was endorsed by more than 500 economists, including Nobel laureates Milton Friedman of Stanford University, George Akerlof of the University of California and Vernon Smith of George Mason University.

“We urge…the country to commence an open and honest debate about marijuana prohibition,” the economists said in an open letter to President Bush, congress, governors and state legislators. “At a minimum, this debate will force advocates of current policy to show that prohibition has benefits sufficient to justify the cost to taxpayers, foregone tax revenues and numerous ancillary consequences that result from marijuana prohibition.”

ORIGINALLY POSTED ON DECEMBER 5, 2008 

Tuesday, September 25, 2018

Media, Democracy & the Post-Modern Age

The Truth Deficit

In the Watergate era, journalists were often seen as heroes. Even commercial TV and radio news outlets, although on the way to becoming showcases for infotainment, were considered by many to be potential parts of the solution. By the end of the 20th Century, however, most people didn't trust reporters any more than politicians, and a Roper poll found that 88 percent of those surveyed felt corporate owners and advertisers improperly influenced the press.

Most journalists who work for mainstream media outlets deny such influence, a lack of self-awareness (or candor) that tends to make matters worse. The fact that getting ahead means at times going along with the prevailing consensus remains one of the profession's debilitating secrets. But the issue isn't just that, or that a few media giants control the origination of most content, distribution, and transmission into our homes and computers, or that we're heading toward a pay-for-access Internet world that could make notions about its democratic potential sound like utopian fiction. The underlying problem is how public discussion of vital matters is shaped by gatekeepers.

Here’s an example that remains relevant in the age of Trump: In August 2005, a cover story in Newsweek on Supreme Court nominee John G. Roberts aggressively dismissed reports that he was a conservative partisan. Two primary examples cited were the nominee's role on Bush's legal team in the court fight after the 2000 election, described by Newsweek as "minimal," and his membership in the conservative Federalist Society, which was pronounced an irrelevant distortion. Roberts "is not the hard-line ideologue that true believers on both sides had hoped for," the publication concluded.

The facts suggested a different appraisal. Roberts was a significant legal consultant, lawsuit editor and prep coach for Bush's arguments before the U.S. Supreme Court in December 2000, and wasn’t just a Federalist Society member but on the Washington chapter's steering committee in the late 1990s. More to the point, his roots in the conservative vanguard date back to his days with the Reagan administration, when he provided legal justifications for recasting the way government and the courts approached civil rights, defended attempts to narrow the reach of the 1965 Voting Rights Act, challenged arguments in favor of busing and affirmative action, and even argued that Congress should strip the Supreme Court of its ability to hear broad classes of civil-rights cases.

Nevertheless, most press reports echoed Newsweek's excitement about his "intellectual rigor and honesty."

Given the Supreme Court’s decisions since Roberts became Chief Justice, whether the narrative framing of his confirmation qualifies as disinformation is worth considering. In any case it shows how journalists may assist political leaders, albeit sometimes unwittingly, in shaping public awareness. As a practice, this is known in both government and public relations circles as "perception management," and it’s been happening for years.

That's why I was eager to attend the second Media and Democracy Congress in 1998. Journalists and media activists from across the country had gathered in New York to talk about the problems – things like concentration of ownership, the relentless slide into infotainment, an avalanche of gossip, disinformation, and "news" people don't need – and trade ideas about what to do. It was encouraging to be among colleagues and friends who weren't afraid of the A-word – advocacy.

During one panel journalistic iconoclast Christopher Hitchens noted wryly that the word partisan is almost always used in a negative context, while bipartisan is presented as a positive solution. It made me think: If that isn't an endorsement for the one-party state, what is?

Similarly, most journalists assiduously avoided saying, in print or on the air, that George W. Bush, Bill Clinton or Ronald Reagan lied while president, although these were verifiable facts. But they did often note that Clinton and Reagan were great communicators, which is merely an opinion. The issue, Hitchens suggested, wasn't a lack of information – it's all out there somewhere – but how most reporters think and how the news is constructed.

Which brings us to the “free market” and competition, two basic tenets of the corporate faith. Unfortunately, most journalists are loyal missionaries of the Capitalist Church, the kind of true believers who described utility deregulation in the late 1990s as a "movement to bring competition to the electric industry." That was a classic corporate sermon, not a fact. The same kind of thing was said – when anything was mentioned – about the Telecommunications Act of 1996, although the actual result of that legislation was to reduce competition and sweep away consumer protections.

In 2009, when Sen. John McCain introduced The Internet Freedom Act, designed to “free” giant telecom companies from restrictions on their ability to block or slow down access to the content of their competitors, the sermon hadn’t changed. For example, The Wall Street Journal announced that he was just trying to stop regulators from “micromanaging the Web.”

The mainstream media also had little to say about the giveaway of the digital TV spectrum, a prime example of corporate welfare. Making the giants pay for this enormous new public resource could have dramatically reduced the federal deficit and adequately funded public broadcasting and children's TV. Instead spectrum rights were handed out for free. The only "string" was a vague contribution to be determined at a later date.

The Media and Democracy Congress did propose some alternatives: anti-trust laws to deal with the new world of global media, a tax on advertising – including the millions in political contributions that mainly end up in the coffers of media corporations – to adequately fund public broadcasting and public access, corporate divestment of news divisions, and a ban on children's advertising, to name a few. Unfortunately, none of this came to pass.

A year Later Democracy Now! host Amy Goodman and reporter Jeremy Scahill, who went on to write a groundbreaking book about the private military contractor Blackwater, provided a dramatic illustration of just how limited mainstream media’s commitment to truth-seeking and keeping watch over the government can be. The dust up occurred at the 1999 awards ceremony organized by the Overseas Press Club. Goodman and Scahill were on hand to receive honors for their documentary, “Drilling and Killing: Chevron and Nigeria’s Oil Dictatorship.”

Realizing that the event’s keynote speaker was UN Ambassador Richard Holbrooke, an architect of NATO’s recently declared intervention in Yugoslavia, the urge to ask him some questions was irresistible. But they were prevented from talking to him prior to the speech, and Scahill subsequently learned that a condition of Holbrooke’s appearance was no interviews. Undaunted, he waited until the ambassador finished speaking, then approached the podium and tried again.

At that point Master of Ceremonies Tom Brokaw intervened. But not to defend Scahill’s right to inquire. No, instead the anchorman told him to sit down. When Scahill declined he was dragged away by security guards.

None of the noted journalists in the room uttered a word of protest. At a time when bombs were falling in Europe they apparently felt that “decorum” was more vital than finding out why a war had started. The official story was that the government of Slobodan Milosevic had refused to negotiate on Kosovo and was engaged in a brutal campaign of "ethnic cleansing" that bordered on genocide. NATO was intervening to prevent a "humanitarian catastrophe," claimed official sources, and sought only to alleviate human suffering and defend the rights of Kosovo's Muslim Albanians. But a series of stubborn facts, largely ignored by the mainstream media, contradicted those comforting assertions.

In February 1999, when so-called peace talks began in France, Yugoslavia was given an ultimatum: Grant Kosovo autonomy and let NATO station 30,000 troops there for the next three years – or else. If anyone was refusing to negotiate, it was the US and NATO. But the relentless use of buzzwords like ethnic cleansing and genocide, plus the redefinition of Milosevic as the world's latest “Hitler," gave this unyielding stance the veneer of humanitarian concern. Entirely omitted was the inconvenient reality that the violence in Kosovo was a part of an ongoing struggle between the government and separatists, who had been waging civil war for years.

So, why intervene, and why against the Serbs? The likely hidden agenda was to break Yugoslavia into smaller pieces. The Balkans is a strategic region, a crossroads between Western Europe and the oil-rich Middle East and Caspian Basin. In the 1990s, the Western powers had gained effective control over the former Yugoslav republics of Croatia, Bosnia, and Macedonia, as well as Hungary and Albania. The main hold out was the Federal Republic of Yugoslavia. In short, it stood in the path of the New World Order.

Another year passed, and in 2000, Goodman and Scahill recounted their Press Club experience to enthusiastic applause at the annual Project Censored awards ceremony. Now they were being recognized for covering the story the Press Club had suppressed: NATO’s deliberate push for war with Yugoslavia. Despite the self-imposed ignorance of corporate media’s gatekeepers, at least some of the truth had been revealed. (Originally posted in 2010)

Part Two: Navigating uncertainty in post-modern times

Wednesday, March 21, 2018

Cyber Threats: System Failures & Living in Denial

By Greg Guma

In August 2010, when Foreign Policy posted an article citing credible research and directly warned oil companies worldwide that their offshore oil rigs were highly vulnerable to hacking, few people took notice.
     “Computer commands can derail a train or cause a gas pipeline to burst,” warned former Bush administration counter-terrorism chief Richard Clarke a few years later in Cyber War, his book on the topic. The reaction: mainly silence. Until recently, such scenarios seemed more like movie plots than foreign policy concerns, and the threat looked more domestic than foreign. 
     In early 2009, for instance, a 28-year-old contractor in California was charged in federal court with almost disabling an offshore rig. Prosecutors said the contractor, who was allegedly angry about not being hired full time, had hacked into the computerized network of an oil-rig off the coast, specifically the controls that detect leaks. He caused damage, but fortunately not a leak.
     After the Deepwater Horizon oil drilling disaster in the Gulf of Mexico the Christian Science Monitor reported that at least three US oil companies had been targets in a series of cyber attacks. The culprit was most likely someone or some group in China, and the incidents, largely un-reported for several years, had involved Marathon Oil, ExxonMobil and ConocoPhillips. But the companies apparently didn’t realize how serious their problem was until the FBI alerted them.
     At the time, federal officials said that proprietary information – email passwords, messages, and information linked to executives – had been flowing out to computers overseas. Chinese government involvement could not be confirmed, but some data did end up on a computer in China. One oil company security staffer privately coined the term “China virus.”
     Still, the companies generally preferred not to comment, or even admit that the attacks had happened. But the Monitor persisted, interviewing insiders, officials and cyber attack experts, and ultimately confirmed the details. Their overall conclusion was that cyber-burglars, using spyware that is almost undetectable, pose a serious and potentially dangerous threat to private industry.
     According to Clarke, many nations conduct Internet espionage and sometimes even cyber attacks. China has been aggressive at times, but so have Russia and North Korea. Spying on defense agencies and diplomats has been one major focus; strategically important businesses and even national governments have also been targeted.
     In 2011, when I first published an article on the problem, Google claimed that it had evidence of at least 20 companies that had been infiltrated by Chinese hackers. According to a report in the Wall Street Journal, logic bombs were being infiltrated into the US electric power grid. If so, they could operate like time bombs. Now it looks likely that Russia was the actual culprit, or had the same idea.
     On oil rigs, the advent of robot-controlled platforms has made a cyber attack possible with a computer anywhere in the world. Control of a rig could be accomplished by hacking into the "integrated operations" that link onshore computer networks to offshore ones. Until 2018 few experts would speculate publicly that this may already have happened. But there has been confirmation of computer viruses causing personnel injuries and production losses on North Sea platforms for several years.
     One problem is that even though newer rigs have cutting-edge robotics technology, the software that controls their basic functions can still be old school. Many rely on supervisory control and data acquisition (SCADA) software, which was created in an era when "open source" was more important than security.
     "It's underappreciated how vulnerable some of these systems are," warned Jeff Vail, a former counterterrorism and intelligence analyst with the US Interior Department who talked with Greg Grant, author of the Foreign Policy article. "It is possible, if you really understood them, to cause catastrophic damage by causing safety systems to fail."
     The name of the article, by the way, was “The New Threat to Oil Supplies – Hackers.” It sounds a lot like “Bin Laden Determined to Strike Inside the US.”
     To be fair, the US government’s failure to address private-sector vulnerability to cyber attacks goes back decades. Until recently, however, Congress and various administrations hesitated to challenge the status quo. Given the vulnerability of crucial infrastructure and much of the private sector, surprisingly little was done to prepare for what sounds inevitable.
     The US Cyber Command has attempted to protect federal infrastructure, while various branches of the military have developed their own offensive capabilities. But not even the Department of Homeland Security is officially responsible for protecting the private sector.  Legal and privacy issues get in the way of having the government directly monitor the Internet or business operations for evidence of potential cyber attacks. As you might expect, many businesses are wary of the regulations that might accompany government help.
     Though cyber attacks have clearly happened, many leave no obvious trace. As Clarke explained, corporations tend to believe that the “millions of dollars they have spent on computer security systems means they have successfully protected their company’s secrets.” Unfortunately, they are wrong. Intrusion detection and prevention systems sometimes fail.
     As it stands, no single federal agency is responsible for defending the banking system, power grids and oil rigs from attacks. The prevailing logic is that businesses should handle their own security. Yet their experts readily admit that they wouldn’t know what to do if an attack came from another nation, and assume that defense in such a case would be the government’s job.That’s capitalist thinking for you, private interests but socialized costs.
     In 2011, a US Senate bill sponsored by Democrat Jay Rockefeller and Republican Olympia Snowe sought to change that, but became another victim of DC gridlock. It would have required the president to work with the private sector on a comprehensive national cybersecurity strategy, created a joint public-private advisory board, and led to a Senate-confirmed national security adviser position. Rockefeller said the goal was “unprecedented information sharing between government and the private sector.”
     James Fallows has argued that the US suffers from “a conspiracy of secrecy about the scale of cyber risk.” His point was that many companies simply won’t admit how easily they can be infiltrated. As a result, changes in the law, the regulatory environment, or personal habits that could increase safety are not seriously discussed.  

      But sooner or later, Fallows concluded, “the cyber equivalent of 9/11 will occur.” That prediction is bad enough. But then he adds, “if the real 9/11 is a model, we will understandably, but destructively, overreact.” 
      So we’ve also got that to look forward to.

Monday, March 20, 2017

Secrets R US: The NSA and Outsourcing Defense

This essay is an excerpt from  Big Lies: How Our Corporate Overlords, Politicians and Media Establishment Warp Reality and Undermine Democracy. Guma's latest book, Dons of Time, is a sci-fi look at the control of history as power.

By Greg Guma

Despite 24-hour news and talk about transparency, there's a lot we don't know about our past, much less current events. What’s worse, some of what we think we know isn't true. 
     The point is that it's no accident.
  
    Consider, for example, the circumstances that led to open war in Vietnam. According to official history, two US destroyers patrolling in the Gulf of Tonkin off North Vietnam were victims of unprovoked attacks in August 1964, leading to a congressional resolution giving President Johnson the power "to take all necessary measures."
     In fact, the destroyers were spy ships, part of a National Security Agency (NSA) eavesdropping program operating near the coast as a way to provoke the North Vietnamese into turning on their radar and other communications channels. The more provocative the maneuvers, the more signals that could be captured. Meanwhile, US raiding parties were shelling mainland targets. 
     Documents revealed later indicated that the August 4 attack on the USS Maddox – the pretext for passing the Gulf of Tonkin Resolution – may not even have taken place.
     But even if it did, the incident was still stage managed to build up congressional and public support for the war. Evidence suggests that the plan was based on Operation Northwoods, a scheme developed in 1962 to justify an invasion of Cuba. Among the tactics the Joint Chiefs of Staff considered then were blowing up a ship in Guantanamo Bay, a phony "communist Cuba terror campaign" in Florida and Washington, DC, and an elaborate plan to convince people that Cuba had shot down a civilian airliner filled with students. 
     That operation wasn't implemented, but two years later, to justify escalating the war, the administration's military brass found a way to create the necessary conditions in Vietnam.

Privatizing Defense (2004 Interview)

NSA and Echelon

For more than half a century, the eyes and ears of US power to monitor and manipulate information (and with it, mass perceptions) has been the NSA, initially designed to assist the CIA. Its original task was to collect raw information about threats to US security, cracking codes and using the latest technology to provide accurate intelligence on the intentions and activities of enemies. Emerging after World War II, its early focus was the Soviet Union. But it never did crack a high-level Soviet cipher system. On the other hand, it used every available means to eavesdrop on not only enemies but also allies and, sometimes, US citizens.
     In Body of Secrets, James Bamford described a bureaucratic and secretive behemoth, based in an Orwellian Maryland complex known as Crypto City. From there, supercomputers linked it to spy satellites, subs, aircraft, and equally covert, strategically placed listening posts worldwide. As of 2000, it had a $7 billion annual budget and directly employed at least 38,000 people, more than the CIA and FBI. It was also the leader of an international intelligence club, UKUSA, which includes Britain, Canada, Australia, and New Zealand. Together, they monitored and recorded billions of encrypted communications, telephone calls, radio messages, faxes, and e-mails around the world.
     Over the years, however, the line between enemies and friends blurred, and the intelligence gatherers often converted their control of information into unilateral power, influencing the course of history in ways that may never be known. No doubt the agency has had a hand in countless covert operations; yet, attempts to pull away the veil of secrecy have been largely unsuccessful.
     In the mid-1970s, for example, just as Congress was attempting to reign in the CIA, the NSA was quietly creating a virtual state, a massive international computer network named Platform. Doing away with formal borders, it developed a software package that turned worldwide Sigint (short for "signal intelligence": communication intelligence, eavesdropping, and electronic intelligence) into a unified whole. The software package was code named Echelon, a name that has since become a synonym for eavesdropping on commercial communication.
     Of course, the NSA and its British sister, the Government Communications Headquarters (GCHQ), refused to admit Echelon existed, even though declassified documents appeared on the Internet and Congress conducted an initial investigation. But a European Parliament report also confirmed Echelon's activities, and encouraged Internet users and governments to adopt stronger privacy measures in response.
     In March 2001, several ranking British politicians discussed Echelon's potential impacts on civil liberties, and a European Parliament committee considered its legal, human rights, and privacy implications. The Dutch held similar hearings, and a French National Assembly inquiry urged the European Union to embrace new privacy enhancing technologies to protect against Echelon's eavesdropping. France launched a formal investigation into possible abuses for industrial espionage.

When Allies Compete

A prime reason for Europe's discontent was the growing suspicion that the NSA had used intercepted conversations to help US companies win contracts heading for European firms. The alleged losers included Airbus, a consortium including interests in France, Germany, Spain, and Britain, and Thomson CSF, a French electronics company. The French claimed they had lost a $1.4 billion deal to supply Brazil with a radar system because the NSA shared details of the negotiations with Raytheon. Airbus may have lost a contract worth $2 billion to Boeing and McDonnell Douglas because of information intercepted and passed on by the agency.
     According to former NSA agent Wayne Madsen, the US used information gathered from its bases in Australia to win a half share in a significant Indonesian trade contract for AT&T. Communication intercepts showed the contract was initially going to a Japanese firm. A bit later a lawsuit against the US and Britain was launched in France, judicial and parliamentary investigations began in Italy, and German parliamentarians demanded an inquiry.
     The rationale for turning the NSA loose on commercial activities, even those involving allies, was provided in the mid-90s by Sen. Frank DeConcini, then chairman of the Senate Intelligence Committee. "I don't think we should have a policy where we're going to invade the Airbus inner sanctum and find out their secrets for the purpose of turning it over to Boeing or McDonnell Douglas," he opined. "But if we find something, not to share it with our people seems to me to be not smart."
      President Bill Clinton and other US officials buttressed this view by charging that European countries were unfairly subsidizing Airbus. In other words, competition with significant US interests can be a matter of national security, and private capitalism must be protected from state-run enterprises.
      The US-Europe row about Airbus subsidies was also used as a "test case" for scientists developing new intelligence tools. At US Defense Department conferences on "text retrieval," competitions were staged to find the best methods. A standard test featured extracting protected data about "Airbus subsidies."

Manipulating Democracy

In the end, influencing the outcome of commercial transactions is but the tip of this iceberg. The NSA's ability to intercept to virtually any transmitted communication has enhanced the power of unelected officials and private interests to set covert foreign policy in motion. In some cases, the objective is clear and arguably defensible: taking effective action against terrorism, for example. But in others, the grand plans of the intelligence community have led it to undermine democracies.
     The 1975 removal of Australian Prime Minister Edward Whitlam is an instructive case. At the time of Whitlam's election in 1972, Australian intelligence was working with the CIA against the Allende government in Chile. The new PM didn’t simply order a halt to Australia's involvement, explained William Blum in Killing Hope, a masterful study of US interventions since World War II. Whitlam seized intelligence information withheld from him by the Australian Security and Intelligence Organization (ASIO), and disclosed the existence of a joint CIA-ASIO directorate that monitored radio traffic in Asia. He also openly disapproved of US plans to build up the Indian Ocean Island of Diego Garcia as a military-intelligence-nuclear outpost.
     Both the CIA and NSA became concerned about the security and future of crucial intelligence facilities in and near Australia. The country was already key member of UKUSA. After launching its first space-based listening post-a microwave receiver with an antenna pointed at earth-NSA had picked an isolated desert area in central Australia as a ground station. Once completed, the base at Alice Springs was named Pine Gap, the first of many listening posts to be installed around the world. For the NSA and CIA, Whitlam posed a threat to the secrecy and security of such operations.
     An early step was covert funding for the political opposition, in hopes of defeating Whitlam's Labor Party in 1974. When that failed, meetings were held with the Governor-General, Sir John Kerr, a figurehead representing the Queen of England who had worked for CIA front organizations since the 50s. Defense officials warned that intelligence links would be cut off unless someone stopped Whitlam. On November 11, 1975, Kerr responded, dismissing the prime minister, dissolving both houses of Parliament, and appointing an interim government until new elections were held.
     According to Christopher Boyce (subject of The Falcon and the Snowman, a fictionalized account), who watched the process while working for TRW in a CIA-linked cryptographic communications center, the spooks also infiltrated Australian labor unions and contrived to suppress transportation strikes that were holding up deliveries to US intelligence installations. Not coincidentally, some unions were leading the opposition to development of those same facilities.
     How often, and to what effect, such covert ops have succeeded is another of the mysteries that comprise an unwritten history of the last half century. Beyond that, systems like Echelon violate the human right to individual privacy, and give those who control the information the ability to act with impunity, sometimes destroying lives and negating the popular will in the process.

Hiding the Agenda in Peru

In May 1960, when a U-2 spy plane was shot down over Soviet territory, President Dwight Eisenhower took great pains to deny direct knowledge or authorization of the provocative mission. In reality, he personally oversaw every U-2 mission, and had even riskier and more provocative bomber overflights in mind.
     It's a basic rule of thumb for covert ops: When exposed, keep denying and deflect the blame. More important, never, never let on that the mission itself may be a pretext, or a diversion from some other, larger agenda.
     Considering that, the April 20, 2001, shoot down of a plane carrying missionaries across the Brazilian border into Peru becomes highly suspicious. At first, the official story fed to the press was that Peruvian authorities ordered the attack on their own, over the pleas of the CIA "contract pilots" who initially spotted the plane. But Peruvian pilots involved in that program, supposedly designed to intercept drug flights, insist that nothing was shot down without US approval.
     Innocent planes were sometimes attacked, but most were small, low flying aircraft that didn't file flight plans and had no radios. This plane maintained regular contact and did file a plan. Still, even after it crash-landed, the Peruvians continued to strafe it, perhaps in an attempt to ignite the plane's fuel and eliminate the evidence.
     "I think it has to do with Plan Colombia and the coming war," said Celerino Castillo, who had previously worked in Peru for Drug Enforcement Agency. "The CIA was sending a clear message to all non-combatants to clear out of the area, and to get favorable press." The flight was heading to Iquitos, which "is at the heart of everything the CIA is doing right now," he added. "They don't want any witnesses."
     Timing also may have played a part. The shoot down occurred on the opening day of the Summit of the Americas in Quebec City. Uruguay's President Jorge Ibanez, who had proposed the worldwide legalization of drugs just weeks before, was expected to make a high-profile speech on his proposal at the gathering. The downing of a drug smuggling plane at this moment, near territory held by Colombia's FARC rebels, would help to defuse Uruguay's message and reinforce the image of the insurgents as drug smugglers.
     If you doubt that the US would condone such an operation or cover it up, consider this: In 1967, Israel torpedoed the USS Liberty, a large floating listening post, as it was eavesdropping on the Arab-Israeli war off the Sinai Peninsula. Hundreds of US sailors were wounded and killed, probably because Israel feared that its massacre of Egyptian prisoners at El Arish might be overheard. How did the Pentagon respond? By imposing a total news ban, and covering up the facts for decades.
     Will we ever find out what really happened in Peru, specifically why a missionary and her daughter were killed? Not likely, since it involves a private military contractor that is basically beyond the reach of congressional accountability.
     In 2009, when the Peru shoot down became one of five cases of intelligence operation cover up being investigated by the US House Intelligence Committee, the CIA inspector general concluded that the CIA had improperly concealed information about the incident. Intelligence Oversight and Investigations Subcommittee Chairwoman Jan Schakowsky, who led the investigation, didn’t rule out referrals to the Justice Department for criminal prosecutions if evidence surfaced that intelligence officials broke the law. But she couldn’t guarantee that the facts would ever come to light, since the Committee’s report of its investigation would be classified.
     The most crucial wrinkle in the Peruvian incident is the involvement of DynCorp, which was active in Colombia and Bolivia under large contracts with various US agencies. The day after the incident, ABC news reported that, according to “senior administration officials,” the crew of the surveillance plane that first identified the doomed aircraft "was hired by the CIA from DynCorp." Within two days, however, all references to DynCorp were scrubbed from ABC's Website. A week later, the New York Post claimed the crew actually worked for Aviation Development Corp., allegedly a CIA proprietary company.
     Whatever the truth, State Department officials refused to talk on the record about DynCorp's activities in South America. Yet, according to DynCorp's State Department contract, the firm had received at least $600 million over the previous few years for training, drug interdiction, search and rescue (which included combat), air transport of equipment and people, and reconnaissance in the region. And that was only what they put on paper. It also operated government aircraft and provided all manner of personnel, particularly for Plan Colombia.

Outsourcing Defense

DynCorp began in 1946 as the employee-owned air cargo business California Eastern Airways, flying in supplies for the Korean War. This and later government work led to charges that it was a CIA front company. Whatever the truth, it ultimately became a leading PMC, hiring former soldiers and police officers to implement US foreign policy without having to report to Congress.
     The push to privatize war gained traction during the first Bush administration. After the first Gulf War, the Pentagon, then headed by Defense Secretary Dick Cheney, paid a Halliburton subsidiary nearly $9 million to study how PMCs could support US soldiers in combat zones, according to a Mother Jones investigation. Cheney subsequently became CEO of Halliburton, and Brown & Root, later known as Halliburton KBR, won billions to construct and run military bases, some in secret locations.
     One of DynCorp’s earliest “police” contracts involved the protection of Haitian President Jean-Bertrand Aristide, and, after he was ousted, providing the “technical advice” that brought military officers involved in that coup into Haiti’s National Police. Despite this dodgy record, in 2002 it won the contract to protect another new president, Afghanistan’s Hamid Karzai. By then, it was a top IT federal contractor specializing in computer systems development, and also providing the government with aviation services, general military management, and security expertise.
     Like other private military outfits, the main danger it has faced is the risk of public exposure. Under one contract, for example, DynCorp sprayed vast quantities of herbicides over Colombia to kill the cocaine crop. In September 2001, Ecuadorian Indians filed a class action lawsuit, charging that DynCorp recklessly sprayed their homes and farms, causing illnesses and deaths and destroying crops. In Bosnia, private police provided by DynCorp for the UN were accused of buying and selling prostitutes, including a 12-year-old girl. Others were charged with videotaping a rape.
     In the first years of the 21st century, DynCorp's day-to-day operations in South America were overseen by State Department officials, including the Narcotic Affairs Section and the Air Wing, the latter a clique of unreformed cold warriors and leftovers from 80s operations in Central America. It was essentially the State Department's private air force in the Andes, with access to satellite-based recording and mapping systems.
     In the 1960s, a similar role was played by the Vinnell Corp., which the CIA called "our own private mercenary army in Vietnam." Vinnell later became a subsidiary of TRW, a major NSA contractor, and employed US Special Forces vets to train Saudi Arabia's National Guard. In the late 1990s, TRW hired former NSA director William Studeman to help with its intelligence program.
     DynCorp avoided the kind of public scandal that surrounded the activities of Blackwater. In Ecuador, where it developed military logistics centers and coordinated “anti-terror” police training, the exposure of a secret covenant signed with the Aeronautics Industries Directorate of the Ecuadorian Air Force briefly threatened to make waves. According to a November 2003 exposé in Quito’s El Comercio, the arrangement, hidden from the National Defense Council, made DynCorp’s people part of the US diplomatic mission.
     In Colombia, DynCorp’s coca eradication and search-and-rescue missions led to controversial pitched battles with rebels. US contract pilots flew Black Hawk helicopters carrying Colombian police officers who raked the countryside with machine gun fire to protect the missions against attacks. According to investigative reporter Jason Vest, DynCorp employees were also implicated in narcotics trafficking. But such stories didn’t get far, and, in any case, DynCorp’s “trainers” simply ignored congressional rules, including those that restrict the US from aiding military units linked to human rights abuses.
     In 2003, DynCorp won a multimillion-dollar contract to build a private police force in post-Saddam Iraq, with some of the funding diverted from an anti-drug program for Afghanistan. In 2004, the State Department further expanded DynCorp’s role as a global US surrogate with a $1.75 billion, five year contract to provide law enforcement personnel for civilian policing operations in “post-conflict areas” around the world. That March, the company also got an Army contract to support helicopters sold to foreign countries. The work, described as “turnkey” services, includes program management, logistics support, maintenance and aircrew training, aircraft maintenance and refurbishment, repair and overhaul of aircraft components and engines, airframe and engine upgrades, and the production of technical publications.
     In short, DynCorp was a trusted partner in the military-intelligence-industrial complex. "Are we outsourcing order to avoid public scrutiny, controversy or embarrassment?" asked Rep. Schakowsky upon submitting legislation to prohibit US funding for private military firms in the Andean region. "If there is a potential for a privatized Gulf of Tonkin incident, then the American people deserve to have a full and open debate before this policy goes any further."
     If and when that ever happens, the discussion will have to cover a lot of ground. Private firms, working in concert with various intelligence agencies, constitute a vast foreign policy apparatus that is largely invisible, rarely covered by the corporate press, and not currently subject to congressional oversight. The Freedom of Information Act simply doesn't apply. Any information on whom they arm or how they operate is private, proprietary information.
     The US government downplays its use of mercenaries, a state of affairs that could undermine any efforts to find out about CIA activities that are concealed from Congress. Yet private contractors perform almost every function essential to military operations, a situation that has been called the “creeping privatization of the business of war.” By 2004, the Pentagon was employing more than 700,000 private contractors.
     The companies are staffed by former generals, admirals, and highly trained officers. Name a hot spot and some PMC has people there. DynCorp has worked on the Defense Message System Transition Hub and done long-range planning for the Air Force. MPRI had a similar contract with the Army, and for a time coordinated the Pentagon's military and leadership training in at least seven African nations.
     How did this outsourcing of defense evolve? In 1969, the US Army had about 1.5 million active duty soldiers. By 1992, the figure had been cut by half. Since the mid-1990s, however, the US has mobilized militarily to intervene in several significant conflicts, and a corporate “foreign legion” has filled the gap between foreign policy imperatives and what a downsized, increasingly over-stretched military can provide.
     Use of high technology equipment feeds the process. Private companies have technical capabilities that the military needs, but doesn’t always possess. Contractors have maintained stealth bombers and Predator unmanned drones used in Afghanistan and Iraq. Some military equipment is specifically designed to be operated and maintained by private companies.
     In Britain, the debate over military privatization has been public, since the activities of the UK company Sandline in Sierra Leone and Papua New Guinea embarrassed the government in the late 1990s. But no country has clear policies to regulate PMCs, and the limited oversight that does exist rarely works. In the US, they have largely escaped notice, except when US contract workers in conflict zones are killed or go way over the line, as in the case of Blackwater.
     According to Guy Copeland, who began developing public-private IT policy in the Reagan years, “The private sector must play an integral role in improving our national cybersecurity.” After all, he has noted, private interests own and operate 85 percent of the nation’s critical IT infrastructure. He should know. After all, Copeland drafted much of the language in the Bush Administration’s 2002 National Strategy to Secure Cyberspace as co-chair of the Information Security Committee of the Information Technology Association of America.
     Nevertheless, when the federal government becomes dependent on unaccountable, private companies like DynCorp and Blackwater (later renamed Xe Services) for so many key security services, as well as for military logistics, management, strategy, expertise and “training,” fundamental elements of US defense have been outsourced. And the details of that relationship are matters that the intelligence community will fight long and hard to keep out of public view.

Corporate Connections and "Soft Landings"

Although the various departments and private contractors within the military-intelligence-industrial complex occasionally have turf battles and don't always share information or coordinate strategy as effectively as they might, close and ongoing contact has long been considered essential. And it has expanded as a result of the information revolution. The entire intelligence community has its own secret Intranet, which pulls together FBI reports, NSA intercepts, analysis from the DIA and CIA, and other deeply covert sources.
     Private firms are connected to this information web through staff, location, shared technology, and assorted contracts. Working primarily for the Pentagon, for example, L-3 Communications, a spinoff from major defense contractor Lockheed Martin, has manufactured hardware like control systems for satellites and flight recorders. MPRI, which was bought by L-3, provided services like its operations in Macedonia. L-3 also built the NSA's Secure Terminal Equipment, which instantly encrypts phone conversations.
     Another private contractor active in the Balkans was Science Applications, staffed by former NSA and CIA personnel, and specializing in police training. When Janice Stromsem, a Justice Department employee, complained that its program gave the CIA unfettered access to recruiting agents in foreign police forces, she was relieved of her duties. Her concern was that the sovereignty of nations receiving aid from the US was being compromised.
     In 1999, faced with personnel cuts, the NSA offered over 4000 employees "soft landing" buy outs to help them secure jobs with defense firms that have major NSA contracts. NSA offered to pay the first year's salary, in hopes the contractor would then pick up the tab. Sometimes the employee didn't even have to move away from Crypto City. Companies taking part in the program included TRW and MPRI's parent company, Lockheed Martin.
     Lockheed was also a winner in the long-term effort to privatize government services. In 2000, it won a $43.8 million contract to run the Defense Civilian Personnel Data System, one of the largest human resources systems in the world. As a result, a major defense contractor took charge of consolidating all Department of Defense personnel systems, covering hiring and firing for about 750,000 civilian employees. This put the contractor at the cutting edge of Defense Department planning, and made it a key gatekeeper at the revolving door between the US military and private interests.

Invisible Threats

Shortly after his appointment as NSA director in 1999, Michael Hayden went to see the film Enemy of the State, in which Will Smith is pursued by an all-seeing, all hearing NSA and former operative Gene Hackman decries the agency's dangerous power. In Body of Secrets, author Bamford says Hayden found the film entertaining, yet offensive and highly inaccurate. Still, the NSA chief was comforted by "a society that makes its bogeymen secrecy and power. That's really what the movie's about.''
     Unlike Hayden, most people don't know where the fiction ends and NSA reality begins. Supposedly, the agency rarely "spies" on US citizens at home. On the other hand, the Foreign Intelligence Surveillance Act allows a secret federal court to waive that limitation. The rest of the world doesn't have that protection. Designating thousands of keywords, names, phrases, and phone numbers, NSA computers can pick them out of millions of messages, passing anything of interest on to analysts. One can only speculate about what happens next.
     After 9/11 the plan was to go further with a project code named Tempest. The goal was to capture computer signals such as keystrokes or monitor images through walls or from other buildings, even if the computers weren't linked to a network. One NSA document, "Compromising Emanations Laboratory Test Requirements, Electromagnetics," described procedures for capturing the radiation emitted from a computer-through radio waves and the telephone, serial, network, or power cables attached to it.
     Other NSA programs have included Oasis, designed to reduce audiovisual images into machine-readable text for easier filtering, and Fluent, which expanded Echelon's multilingual capabilities. And let's not forget the government's Carnivore Internet surveillance program, which can collect all communications over any segment of the network being watched.
     Put such elements together, combine them with business imperatives and covert foreign policy objectives, then throw PMCS into the mix, and you get a glimpse of the extent to which information can be translated into raw power and secretly used to shape events. Although most pieces of the puzzle remain obscure, enough is visible to justify suspicion, outrage, and a campaign to pull away the curtain on this Wizard of Oz. But fighting a force that is largely invisible and unaccountable – and able to eavesdrop on the most private exchanges, that is a daunting task, perhaps even more difficult than confronting the mechanisms of corporate globalization that it protects and promotes.