PREDATOR EMPIRE DRONE WARFARE and FULL SPECTRUM DOMINANCE Predator Empire This Page Deliberately Left Blank Predator Empire Drone Warfare and Full Spectrum Dominance

Total Page:16

File Type:pdf, Size:1020Kb

PREDATOR EMPIRE DRONE WARFARE and FULL SPECTRUM DOMINANCE Predator Empire This Page Deliberately Left Blank Predator Empire Drone Warfare and Full Spectrum Dominance IAN G.R. SHAW PREDATOR EMPIRE DRONE WARFARE AND FULL SPECTRUM DOMINANCE Predator Empire This page deliberately left blank Predator Empire Drone Warfare and Full Spectrum Dominance Ian G. R. Shaw University of Minnesota Press Minneapolis • London Copyright 2016 by the Regents of the University of Minnesota All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Published by the University of Minnesota Press 111 Third Avenue South, Suite 290 Minneapolis, MN 55401- 2520 http://www.upress.umn.edu Printed in the United States of America on acid- free paper The University of Minnesota is an equal- opportunity educator and employer. 21 20 19 18 17 16 10 9 8 7 6 5 4 3 2 1 Library of Congress Cataloging-in-Publication Data Shaw, Ian G. R. Predator empire : drone warfare and full spectrum dominance / Ian G. R. Shaw. Minneapolis : University of Minnesota Press, [2016] | Includes bibliographical references and index. Identifiers: LCCN 2015036890| ISBN 978-0-8166-9473-0 (hc) | ISBN 978-0-8166-9474-7 (pb) Subjects: LCSH: United States—Military policy. | Military art and science— Technological innovations—Social aspects. | Drone aircraft—United States— Social aspects. | Targeted killing—United States—Social aspects. | National security—United States. | Terrorism—Government policy—United States. | Hegemony—United States. | Social control. | Police—United States. | Technology and civilization. Classification: LCC UA23 .S464 2016 | DDC 355/.033573—dc23 LC record available at http://lccn.loc.gov/2015036890 Contents Acknowledgments vii Introduction: Understanding Empire 1 1 The Long March to Human Enclosure 29 2 The Rise of the Predator Empire in the Vietnam War 71 3 Full Spectrum Global Dominance 111 4 The Rule by Nobody 155 5 Policing Everything 199 Conclusion: The War of All against All 241 Notes 265 Index 307 This page deliberately left blank Acknowledgments Many people have both directly and indirectly helped with this book. First, I am indebted to the University of Arizona, where I received my master’s and PhD between 2006 and 2011. Under the beating Tucson sun and in the geography department of a strange build- ing called Harvill, I was lucky to learn from John Paul Jones III (my adviser), Sallie Marston, Paul Robbins, and Marv Waterstone. They opened my eyes and provided me with the kind of education and friendship that is rare. To friends and fellow graduate students there— Jessie Clark, Jeff Garmany, Lawrence Hoffman, Jason Jurje­­vich, Tom Keasling, Vanessa Massaro, Jen McCormack, Jamie McEvoy, Jacob Miller, Jared Powell, Anne Ranek, Audra White, and Scott Whitlock—I give a hearty thanks for making my journey so en- joyable, memorable, and all too fleeting. Special thanks go to Majed Akhter and Katie Meehan for inspiring me to write this book as well as being amazing collaborators. Thanks go to the Economic and Social Research Council in the United Kingdom, the University of Glasgow, and the Urban Stud- ies Foundation for partially funding the research for this book. I am fortunate to have made wonderful friends at Glasgow’s School of Geographical and Earth Sciences where I presently work, espe- cially, Cheryl McGeachan, Caleb Johnston, Hester Parr, Jo Sharp, and Olivia Stevenson. They made writing in an office for fifteen months during 2014 and 2015 somewhat bearable. Thanks go to Jason Weidemann at the University of Minnesota Press for guiding me through the publishing process and to Mike Hanson, the copy editor of this book. Paul Dickson kindly donated his archive on the Vietnam War from the late 1960s and early 1970s, which proved invaluable for writing chapter 2. I am grateful for a loving family, especially my mum and dad and my sister Zara, who sparked my interest in philosophy at a crucial mo- ment. My biggest thanks go to my best friend, Lauren Fulton, whose sacrifices and support made this book possible in so many ways. vii This page deliberately left blank Introduction Understanding Empire The Dome In 1979 the United States was rocked by soaring oil prices. The coun- try faced one of the worst energy crises in memory. Nowhere was this felt more than the small Vermont town of Winooski, where another ice- cold winter threatened to chill its 7,500 residents to the bone. With temperatures under twenty below zero and snow- fall over seventy- five inches, the cost of heating homes was proving worrisome. But a cunning plan was hatched. A group of city planners approached Mark Tigan, the city’s director of community develop- ment. These entrepreneurs had an idea that could shelter towns- people from the blizzards and slash heating bills. “I didn’t hear one organized voice against it,” said Tigan, “since it meant that they’d never have to shovel snow again. They thought of it as their little piece of Tampa Bay.”1 The idea would be lauded and mocked in equal measure. Why not build a gigantic dome over the town? A bubbled utopia sealed from the frosty outside. The Winooski dome would measure 1.3 square miles, stand at 250 meters high, and be constructed from crystal- clear plastic. Fresh air could be circulated by large intake fans, and the dome would be held aloft by air pressure slightly higher than outdoors. “I like to think of Winooski as a place where new ideas are thought up all the time,” said Ken Meyers, president of the town’s “Dome Club.”2 The town applied for $55,000 of federal money from the Department of Hous- ing and Urban Development (HUD). The sphere attracted consider- able national media attention. One Kentucky paper wrote, “Science fiction writers have predicted a future where people are forced to live underground like moles. Most people think that is pretty depress- ing. But living under a plastic parasol that can shut out bad weather, fallout and other unpleasantness doesn’t sound all that bad, espe- cially in New England.”3 A local teacher even penned an ode to the 1 2 INTRODUCTION artificial bubble: “Dome over Winooski, / Not far from the lake; / Transparent and plastic, / Still real and not fake.”4 In May 1980, after considerable excitement, HUD rejected the re- quest. Despite widespread curiosity, many residents were fearful of the project. Who would clean it? Would life inside feel claustropho- bic? Enthusiasm for the bubble didn’t die immediately, however. The town hosted a dome symposium that attracted one thousand par- ticipants, including renowned inventor R. Buckminster Fuller, who had designed geodesic domes around the world. The next decade, another type of dome stirred the human imagination, only this time it was built for science. In September 1991 a crew of eight men and women stepped into Biosphere 2, a 3.15- acre research facility in Arizona. This enormous greenhouse, resembling a prototype for a space station on another planet, was engineered to create a series of self- sustaining ecosystems. These included rainforest, savannah, and even ocean biomes. The team of biospherians managed to sur- vive in the dome for two years, despite fluctuations in oxygen levels, endemic hunger, social conflict (the group split into two factions), and an explosion in the ant and cockroach population. The enthusiasm, fear, and curiosity for life inside these giant ter- rariums exemplifies a more basic architectural truth about human- ity: we are builders of worlds. Our anthropology, our very human existence, is shaped by the artificial environments, big and small, we carve out from the planet. Hannah Arendt wrote, “Whatever touches or enters into a sustained relationship with human life immediately assumes the character of a condition of human exis- tence.”5 Her point is as simple as it is radical: the human is consti- tuted by the nonhuman. Whether we build gigantic domes or robotic drones, artificial fab- rications condition the spaces of human coexistence. Peter Sloterdijk defines these spaces of shared dwelling as “spheres.” These spheres can be thought of as the biological, cultural, and technological enclo- sures that surround human beings. As he defines them, “The sphere is the interior, disclosed, shared realm inhabited by humans.”6 From the very first biological sphere, the mother’s womb, to the artificial spheres of a mechanized civilization, we never stop passing through spaces that contain us, shape us, and transform who we are. Spheres, in short, enclose human beings inside unique existential shells, constituting the rich kaleidoscope of our being. We are always “with” someone or something, and in this sense we always exist INTRODUCTION 3 “outside” ourselves. As Judith Butler writes, “We are, as it were, so- cial beings from the start, dependent on what is outside ourselves, on others, on institutions, and on sustained and sustainable envi- ronments, and so are, in this sense, precarious.”7 In the modern age human coexistence has been subjected to in- creasingly technical forms of control. Modern living has provided both the conditions and the pathologies for the mass enclosure of life. From maximum- security prisons to CCTV on the streets to drones in the sky, we are constantly watched and surveilled, regardless of guilt or innocence. Millions of us have been herded into the great civiliza- tory inside. Life on planet earth is now time spent passing through en- closures of different sophistication and density. This is our dome- estic life. In 1981 the mayor of Winooski remarked, “I’m not a sociologist. But the idea of people living together in a controlled environment is a much more complex question than any of the technical concerns.”8 This complex question remains key to understanding this book: what does it mean to live on a planet that is enclosing its populations in- side controlled, artificial, and dronified environments? Beyond the Winooski dome, popular culture is full of domes: ar- tificial skins grafted over human populations to form carceral shells.
Recommended publications
  • Table of Contents Acknowledgements
    The Data Privacy/National Security Balancing Paradigm as Applied In The U.S.A. and Europe: Achieving an Acceptable Balance Paul Raphael Murray, B.A. H.Dip in Ed. LL.B. LL.M Ph.D. (NUI) Submitted for the Degree of Doctor in Philosophy at Trinity College, Dublin School of Law August 2017 Declaration and Online Access I declare that this thesis has not been submitted as an exercise for a degree at this or any other university and it is entirely my own work. I agree to deposit this thesis in the University’s open access institutional repository or allow the library to do so on my behalf, subject to Irish Copyright Legislation and Trinity College Library conditions of use and acknowledgement. Paul Raphael Murray Acknowledgements I would like to record my thanks to my Supervisor, Professor Neville Cox, School of Law, and Dean of Graduate Studies, Trinity College, Dublin, for his help and guidance. i ii Abstract The Data Privacy/National Security Balancing Paradigm as Applied In The U.S.A. and Europe: Achieving an Acceptable Balance Paul Raphael Murray The overall research question addressed in this thesis is the data privacy/national security balancing paradigm, and the contrasting ways in which this operates in Europe and the U.S. Within this framework, the influences causing the balance to shift in one direction or another are examined: for example, the terrorist attacks on two U.S. cities in 2001 and in various countries in Europe in the opening decade of the new millennium, and the revelations by Edward Snowden in 2013 of the details of U.S.
    [Show full text]
  • NSA's Efforts to Secure Private-Sector Telecommunications Infrastructure
    Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail ac- counts and stealing intellectual property,1 the company turned to the National Security Agency (NSA) for help in securing its systems. For a company that had faced accusations of violating user privacy, to ask for help from the agency that had been wiretapping Americans without warrants appeared decidedly odd, and Google came under a great deal of criticism. Google had approached a number of federal agencies for help on its problem; press reports focused on the company’s approach to the NSA. Google’s was the sensible approach. Not only was NSA the sole government agency with the necessary expertise to aid the company after its systems had been exploited, it was also the right agency to be doing so. That seems especially ironic in light of the recent revelations by Edward Snowden over the extent of NSA surveillance, including, apparently, Google inter-data-center communications.2 The NSA has always had two functions: the well-known one of signals intelligence, known in the trade as SIGINT, and the lesser known one of communications security or COMSEC. The former became the subject of novels, histories of the agency, and legend. The latter has garnered much less attention. One example of the myriad one could pick is David Kahn’s seminal book on cryptography, The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet.3 It devotes fifty pages to NSA and SIGINT and only ten pages to NSA and COMSEC.
    [Show full text]
  • On Security and Privacy for Networked Information Society
    Antti Hakkala On Security and Privacy for Networked Information Society Observations and Solutions for Security Engineering and Trust Building in Advanced Societal Processes Turku Centre for Computer Science TUCS Dissertations No 225, November 2017 ON SECURITY AND PRIVACY FOR NETWORKED INFORMATIONSOCIETY Observations and Solutions for Security Engineering and Trust Building in Advanced Societal Processes antti hakkala To be presented, with the permission of the Faculty of Mathematics and Natural Sciences of the University of Turku, for public criticism in Auditorium XXII on November 18th, 2017, at 12 noon. University of Turku Department of Future Technologies FI-20014 Turun yliopisto 2017 supervisors Adjunct professor Seppo Virtanen, D. Sc. (Tech.) Department of Future Technologies University of Turku Turku, Finland Professor Jouni Isoaho, D. Sc. (Tech.) Department of Future Technologies University of Turku Turku, Finland reviewers Professor Tuomas Aura Department of Computer Science Aalto University Espoo, Finland Professor Olaf Maennel Department of Computer Science Tallinn University of Technology Tallinn, Estonia opponent Professor Jarno Limnéll Department of Communications and Networking Aalto University Espoo, Finland The originality of this thesis has been checked in accordance with the University of Turku quality assurance system using the Turnitin OriginalityCheck service ISBN 978-952-12-3607-5 (Online) ISSN 1239-1883 To my wife Maria, I am forever grateful for everything. Thank you. ABSTRACT Our society has developed into a networked information soci- ety, in which all aspects of human life are interconnected via the Internet — the backbone through which a significant part of communications traffic is routed. This makes the Internet ar- guably the most important piece of critical infrastructure in the world.
    [Show full text]
  • Juniper Shield (Ojs)
    OFFICE OF THE SECRETARY OF DEFENSE Fiscal Year (FY) 2019 President’s Budget Justification for Component Contingency Operations the Overseas Contingency Operation Transfer Fund (OCOTF) June 2018 The estimated cost of this report or study for the Department of Defense is approximately $35,000 for the 2018 Fiscal Year. This includes $2,550 in expenses and $33,000 in DoD labor. Generated on 2018Jun25 RefID: 6-0315D50 TABLE OF CONTENTS I. DEPARTMENT OF DEFENSE (DOD) SUMMARY .......................................................... 1 DESCRIPTION OF OPERATIONS FINANCED ......................................................... 1 CONTINGENCY OPERATIONS SUMMARY ............................................................. 3 II. OVERSEAS CONTINGENCY OPERATIONS TRANSFER FUND (OCOTF) ......................................... 12 III. CONTINGENCY OPERATIONS PROGRAM ............................................................ 13 CONTINGENCY OPERATIONS SUMMARY BY DOD COMPONENT ............................................. 13 BOSNIA OPERATIONS .............................................................. 14 KOSOVO OPERATIONS .............................................................. 15 JOINT TASK FORCE - BRAVO (HONDURAS) ............................................ 16 OPERATION JUNIPER SHIELD (OJS) ................................................. 17 OPERATION NOBLE EAGLE .......................................................... 18 IV. CONTINGENCY OPERATIONS DOD COMPONENT DETAILS .......................................... 19 ARMY CONTINGENCY OPERATIONS
    [Show full text]
  • The NSA Is on the Line -- All of Them
    The NSA is on the line -- all of them An intelligence expert predicts we'll soon learn that cellphone and Internet companies also cooperated with the National Security Agency to eavesdrop on us. By Kim Zetter, Salon.com May. 15, 2006 | When intelligence historian those safeguards had little effect in preventing Matthew Aid read the USA Today story last at least three telecommunications companies Thursday about how the National Security from repeating history. Agency was collecting millions of phone call records from AT&T, Bell South and Verizon for Aid, who co-edited a book in 2001 on signals a widespread domestic surveillance program intelligence during the Cold War, spent a designed to root out possible terrorist activity in decade conducting more than 300 interviews the United States, he had to wonder whether with former and current NSA employees for his the date on the newspaper wasn't 1976 instead new history of the agency, the first volume of of 2006. which will be published next year. Jeffrey Richelson, a senior fellow at the National Aid, a visiting fellow at George Washington Security Archive, calls Aid the top authority on University's National Security Archive, who has the NSA, alongside author James Bamford. just completed the first book of a three-volume history of the NSA, knew the nation's Aid spoke with Salon about how the NSA has bicentennial marked the year when secrets learned to maneuver around Congress and the surrounding another NSA domestic Department of Justice to get what it wants. He surveillance program, code-named Project compared the agency's current data mining to Shamrock, were exposed.
    [Show full text]
  • As Facebook Raised a Privacy Wall, It Carved an Opening for Tec
    As Facebook Raised a Privacy Wall, It Carved an Opening for Tec... https://www.printfriendly.com/p/g/FEuXeA As Facebook Raised a Privacy Wall, It Carved an Opening for Tech Giants nytimes.com/2018/12/18/technology/facebook-privacy.html By Gabriel J.X. Dance , Michael LaForgia and Nicholas Confessore December 19, 2018 For years, gave some of the world’s largest technology companies more intrusive access to users’ personal data than it has disclosed, effectively exempting those business partners from its usual privacy rules, according to internal records and interviews. The special arrangements are detailed in hundreds of pages of Facebook documents obtained by The New York Times. The records, generated in 2017 by the company’s internal system for tracking partnerships, provide the most complete picture yet of the social network’s data-sharing practices. They also underscore how personal data has become the most prized commodity of the digital age, traded on a vast scale by some of the most powerful companies in Silicon Valley and beyond. The exchange was intended to benefit everyone. Pushing for explosive growth, Facebook got more users, lifting its advertising revenue. Partner companies acquired features to make their products more attractive. Facebook users connected with friends across different devices and websites. But Facebook also assumed extraordinary power over the personal information of its 2.2 billion users — control it has wielded with little transparency or outside oversight. Facebook allowed Microsoft’s Bing search engine to see the names of virtually all Facebook users’ friends without consent, the records show, and gave Netflix and Spotify the ability to read Facebook users’ private messages.
    [Show full text]
  • Acronym Meaning
    Militære forkortelser. Kilide: The Guardian Acronym Meaning (number)IN Infantry group (number)US Number of US personnel (number)V Vehicles (Time)L Local time (Time)Z Zulu time - GMT 42 CDO RM 42 Commando Royal Marines 508 STB 508th special troops battalion 81 81mm mortar round 9-liner 9 Line MEDEVAC Request A/C aircraft AAF anti-afghan forces ABP Afghan Border Police AC-130 Gunship adapted from Hercules ACK Acknowledge ACM Anti-Coalition Militia AFG Afghans AH-1W Attack helicopter 1W - US Marines Super Cobra gunship AIHRC Afghan Independent Human Right Commission AK-47 Assault rifle ANA Afghan National Army ANAP Afghan National Auxiliary Police ANBP Afghan National Border Police ANP Afghan National Police ANSF Afghan National Security Forces AO Area of operation AQ Al Qaida ARSIC Afghan regional security integrated command ASG Area Support Group ASV armoured security vehicle ATT At this time ATTK Attack AUP Afghan uniform police B-HUTS Semi-permanent wooden structures used in place of tents BAF Bagram Air Field BCT Brigade combat team (US) BDA Battle damage assessment BDE Brigade Beaten zone Area where spread of rounds fired BFT Blue Force Tracking: identifying friendly forces in area BG Brigadier General Blue forces Nato/ISAF forces Blue on Blue Friendly fire BN Battalion BP Blood Pressure BPT Be [ing] prepared to BRF Brigade Reconnaissance Force BSN (Camp) Bastion Acronym Meaning BSSM Border Security Subcommittee Meeting BTG Basic target graphic BTIF Bagram theatre internment facility BTL Battalion buzz saw Signalling method by waving
    [Show full text]
  • The Obama/Pentagon War Narrative, the Real War and Where Afghan Civilian Deaths Do Matter Revista De Paz Y Conflictos, Núm
    Revista de Paz y Conflictos E-ISSN: 1988-7221 [email protected] Universidad de Granada España Herold, Marc W. The Obama/Pentagon War Narrative, the Real War and Where Afghan Civilian Deaths Do Matter Revista de Paz y Conflictos, núm. 5, 2012, pp. 44-65 Universidad de Granada Granada, España Available in: http://www.redalyc.org/articulo.oa?id=205024400003 How to cite Complete issue Scientific Information System More information about this article Network of Scientific Journals from Latin America, the Caribbean, Spain and Portugal Journal's homepage in redalyc.org Non-profit academic project, developed under the open access initiative issn: 1988-7221 The Obama/Pentagon War Narrative, the Real War and Where Afghan Civilian Deaths Do Matter El relato bélico de Obama y del Pentágono, la verdadera guerra y dónde importan realmente las número 5 año 2012 número muertes de los civiles afganos Recibido: 01/03/2011 Marc W. Herold Aceptado: 31/10/2011 [email protected] Profesor de Desarrollo Económico Universidad de New Hampshire en Durham (New Hampshire, EE.UU.) Abstract This essay explores upon two inter-related issues: (1) the course of America’s raging Afghan war as actually experienced on the ground as contrasted with the Pentagon and mainstream media narrative and (2) the unrelenting Obama/Pentagon efforts to control the public narrative of that war.1 As the real war on the ground spread geographically and violence intensified, U.S. efforts to construct a positive spin re-doubled. An examination of bodies – of foreign occupa- tion forces and innocent Afghan civilians – reveals a clear trade-off.
    [Show full text]
  • Why Google Dominates Advertising Markets Competition Policy Should Lean on the Principles of Financial Market Regulation
    Why Google Dominates Advertising Markets Competition Policy Should Lean on the Principles of Financial Market Regulation Dina Srinivasan* * Since leaving the industry, and authoring The Antitrust Case Against Face- book, I continue to research and write about the high-tech industry and competition, now as a fellow with Yale University’s antitrust initiative, the Thurman Arnold Pro- ject. Separately, I have advised and consulted on antitrust matters, including for news publishers whose interests are in conflict with Google’s. This Article is not squarely about antitrust, though it is about Google’s conduct in advertising markets, and the idea for writing a piece like this first germinated in 2014. At that time, Wall Street was up in arms about a book called FLASH BOYS by Wall Street chronicler Michael Lewis about speed, data, and alleged manipulation in financial markets. The controversy put high speed trading in the news, giving many of us in advertising pause to appre- ciate the parallels between our market and trading in financial markets. Since then, I have noted how problems related to speed and data can distort competition in other electronic trading markets, how lawmakers have monitored these markets for con- duct they frown upon in equities trading, but how advertising has largely remained off the same radar. This Article elaborates on these observations and curiosities. I am indebted to and thank the many journalists that painstakingly reported on industry conduct, the researchers and scholars whose work I cite, Fiona Scott Morton and Aus- tin Frerick at the Thurman Arnold Project for academic support, as well as Tom Fer- guson and the Institute for New Economic Thinking for helping to fund the research this project entailed.
    [Show full text]
  • The Trans Sahara Counter Terrorism Partnership Building Partner Capacity to Counter Terrorism and Violent Extremism
    The Trans Sahara Counter Terrorism Partnership Building Partner Capacity to Counter Terrorism and Violent Extremism Lesley Anne Warner Cleared for public release CRM-2014-U-007203-Final March 2014 Strategic Studies is a division of CNA. This directorate conducts analyses of security policy, regional analyses, studies of political-military issues, and strategy and force assessments. CNA Strategic Studies is part of the global community of strategic studies institutes and in fact collaborates with many of them. On the ground experience is a hallmark of our regional work. Our specialists combine in-country experience, language skills, and the use of local primary-source data to produce empirically based work. All of our analysts have advanced degrees, and virtually all have lived and worked abroad. Similarly, our strategists and military/naval operations experts have either active duty experience or have served as field analysts with operating Navy and Marine Corps commands. They are skilled at anticipating the “problem after next” as well as determining measures of effectiveness to assess ongoing initiatives. A particular strength is bringing empirical methods to the evaluation of peace-time engagement and shaping activities. The Strategic Studies Division’s charter is global. In particular, our analysts have proven expertise in the following areas: The full range of Asian security issues The full range of Middle East related security issues, especially Iran and the Arabian Gulf Maritime strategy Insurgency and stabilization Future national security environment and forces European security issues, especially the Mediterranean littoral West Africa, especially the Gulf of Guinea Latin America The world’s most important navies Deterrence, arms control, missile defense and WMD proliferation The Strategic Studies Division is led by Dr.
    [Show full text]
  • International Intervention and the Use of Force: Military and Police Roles
    004SSRpaperFRONT_16pt.ai4SSRpaperFRONT_16pt.ai 1 331.05.20121.05.2012 117:27:167:27:16 SSR PAPER 4 C M Y CM MY CY CMY K International Intervention and the Use of Force: Military and Police Roles Cornelius Friesendorf DCAF DCAF a centre for security, development and the rule of law SSR PAPER 4 International Intervention and the Use of Force Military and Police Roles Cornelius Friesendorf DCAF The Geneva Centre for the Democratic Control of Armed Forces (DCAF) is an international foundation whose mission is to assist the international community in pursuing good governance and reform of the security sector. The Centre develops and promotes norms and standards, conducts tailored policy research, identifies good practices and recommendations to promote democratic security sector governance, and provides in‐country advisory support and practical assistance programmes. SSR Papers is a flagship DCAF publication series intended to contribute innovative thinking on important themes and approaches relating to Security Sector Reform (SSR) in the broader context of Security Sector Governance (SSG). Papers provide original and provocative analysis on topics that are directly linked to the challenges of a governance‐driven security sector reform agenda. SSR Papers are intended for researchers, policy‐makers and practitioners involved in this field. ISBN 978‐92‐9222‐202‐4 © 2012 The Geneva Centre for the Democratic Control of Armed Forces EDITORS Alan Bryden & Heiner Hänggi PRODUCTION Yury Korobovsky COPY EDITOR Cherry Ekins COVER IMAGE © isafmedia The views expressed are those of the author(s) alone and do not in any way reflect the views of the institutions referred to or represented within this paper.
    [Show full text]
  • Two Years After Snowden
    TWO YEARS AFTER SNOWDEN PROTECTING HUMAN RIGHTS IN AN AGE OF MASS SURVEILLANCE (COVER IMAGE) A student works on a computer that is projecting former U.S. National Security Agency contractor Edward Snowden as he appears live via video during a world affairs conference in Toronto © REUTERS/Mark Blinch 2 TWO YEARS AFTER SNOWDEN JUNE 2015 © REUTERS/Zoran Milich © REUTERS/Zoran “The hard truth is that the use of mass surveillance technology effectively does away with the right to privacy of communications on the Internet altogether.” Ben Emmerson QC, UN Special Rapporteur on counter-terrorism and human rights EXECUTIVE SUMMARY On 5 June 2013, a British newspaper, The exposed by the media based on files leaked by Guardian, published the first in a series Edward Snowden have included evidence that: of revelations about indiscriminate mass surveillance by the USA’s National Security Companies – including Facebook, Google Agency (NSA) and the UK’s Government and Microsoft – were forced to handover Communications Headquarters (GCHQ). their customers’ data under secret orders Edward Snowden, a whistleblower who had through the NSA’s Prism programme; worked with the NSA, provided concrete evidence of global communications the NSA recorded, stored and analysed surveillance programmes that monitor the metadata related to every single telephone internet and phone activity of hundreds call and text message transmitted in of millions of people across the world. Mexico, Kenya, and the Philippines; Governments can have legitimate reasons GCHQ and the NSA have co- for using communications surveillance, for opted some of the world’s largest example to combat crime or protect national telecommunications companies to tap security.
    [Show full text]