Fichtner, Laura

Total Page:16

File Type:pdf, Size:1020Kb

Fichtner, Laura Credits for cover images: The Opte project: http://www.opte.org/ Free under creative commons license for non-commercial use Picture of NSA headquarters in Fort Meade, Maryland Under creative commons license: http://commons.wikimedia.org/wiki/File:National_Security_Agency_headquarters,_Fort_Meade,_M aryland.jpg For her support for the cover: many thanks to Eva Müller! Scientia est Potentia: Techno-Politics as Network(ed) Struggles Laura Fichtner Master thesis: Laura Fichtner, s1346946 Philosophy of Science, Technology and Society (MSc) University of Twente Dr. Michael Nagenborg (1st supervisor), Prof. Peter-Paul Verbeek (2nd supervisor) Date: 09.10.2014 TECHNO - POLITICS AS NETWORK(ED) STRUGGLES | 1 Abstract Following 2013’ summer of surveillance I investigate the technological operation of the NSA’s internet surveillance programs Upstream, PRISM and Quantumtheory, which intercept strategically from within the United States. Moreover, I analyze corresponding counter-surveillance technologies. The research results show how internet techno-politics shape the contemporary political landscape. In the techno-politics of surveillance we see how particular technological structures become intrinsic to political forms, because they come with certain social structures. Acting through technological structures, political groups can govern and structure interactions in the way legislation traditionally would. I develop my framework out of the philosophy of pragmatist John Dewey, for whom technological networks and infrastructures played a significant role in politics. However, he still saw technological structures as extrinsic to political forms. I suggest expanding his framework and explore, based on the work of Susan Leigh Star and Geoffrey C. Bowker, how technological infrastructures can become intrinsic to politics. Because they give rise to flows which (re)organize spatial relations in what Manuel Castells has titled the new ‘space of flows’, different networks embed different socio-political structures. As Alexander Galloway has demonstrated, such structures can be characterized by (different) network diagrams. My empirical research on the operation of surveillance and counter-surveillance technologies shows how the two organize flows on the network differently. The NSA aspires a centralized structure whose hierarchy allows it to control the network; counter-surveillance movements aim at a distributed network with flat hierarchies. The two antagonists are hence opposed in a network struggle. This struggle is possible because the internet consists of different layers with different structures. The NSA operates through the physical layer, where it has a privileged position in a decentralized geography of data flows, while counter- surveillance operates through the distributed protocological layer. It is directed at strengthening protocols which protect from surveillance. Both network types are not inherently democratic, but would need democratic governance from outside. But since they operate through technological activity instead of public discourse, techno-politics happen outside the public’s experience and pose a challenge to (Dewian) democracy. The NSA surveillance programs analyzed in this master thesis are particularly problematic, because they govern a global public in the interest of a nation state. They can do so because they have a privileged position in the internet’s global geography. TECHNO - POLITICS AS NETWORK(ED) STRUGGLES | 2 Table of Contents Chapter 1: Introduction ........................................................................................................................... 5 Chapter 2: Pragmatism .......................................................................................................................... 13 The Pragmatist Framework ............................................................................................................... 14 The human condition. ................................................................................................................... 15 Technology. ................................................................................................................................... 16 Concepts & experiences. ............................................................................................................... 18 Values. ........................................................................................................................................... 19 ICTs. ............................................................................................................................................... 20 Dewey’s The Public and its Problems ................................................................................................ 21 The public. ..................................................................................................................................... 21 Infrastructures. .............................................................................................................................. 23 The state. ....................................................................................................................................... 26 Democracy. .................................................................................................................................... 27 Eclipse of the public. ...................................................................................................................... 30 Power Structures ............................................................................................................................... 32 Chapter 3: Infrastructures ..................................................................................................................... 36 Infrastructure .................................................................................................................................... 37 The underneath. ............................................................................................................................ 37 Contingency. .................................................................................................................................. 39 Standardization. ............................................................................................................................ 40 Network Diagrams ............................................................................................................................. 41 Diagrams & flows. .......................................................................................................................... 41 Centralized & distributed networks. ............................................................................................. 43 Internet layers. .............................................................................................................................. 44 Security. ......................................................................................................................................... 47 Space of Flows ................................................................................................................................... 49 The notion of space. ...................................................................................................................... 49 Network diagrams as abstract spaces. .......................................................................................... 51 Space & place. ............................................................................................................................... 51 The space of flows. ........................................................................................................................ 53 Surveillant Assemblage ..................................................................................................................... 55 Chapter 4: Internet Surveillance ........................................................................................................... 58 TECHNO - POLITICS AS NETWORK(ED) STRUGGLES | 3 The Internet’s Physical Layer ............................................................................................................. 59 Internet geography. ....................................................................................................................... 61 Internet exchange points. ............................................................................................................. 64 NSA’s Surveillance Technologies ....................................................................................................... 66 Room 641A. ................................................................................................................................... 66 Narus STA 6400. ............................................................................................................................ 68 Splitter function. ............................................................................................................................ 69 The Surveillance Network ................................................................................................................. 70 Centralized surveillance. ............................................................................................................... 70 NSA’s surveillant assemblage. ......................................................................................................
Recommended publications
  • Listener Feedback #171
    Security Now! Transcript of Episode #411 Page 1 of 40 Transcript of Episode #411 Listener Feedback #171 Description: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. They tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-411.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-411-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here. We've got questions from our audience. We're going to answer those, talk a little bit about the math around NSA's 5ZB, also some more revelations on SSL security. It's all coming up next on Security Now!. Leo Laporte: This is Security Now! with Steve Gibson, Episode 411, recorded July 3rd, 2013: Your questions, Steve's answers, #171. It's time for Security Now!, the show that protects you and your loved ones online, your privacy, and also gives you deep insight into how computers work, how technology works, how the Internet works, with this guy here. Yeah, he's the Explainer in Chief, Mr. Steve Gibson. Hello, Steven. Steve Gibson: You know, Leo, I wondered whether maybe we'd gone a little, you know, there's the expression "jump the shark," or off, over the top or something last week.
    [Show full text]
  • REPORTER "Eluding Electronic Servicing
    MAY, 1963 35 CENTS REPORTER "eluding Electronic Servicing Special Equipment Speeds Servicing A...,-`" _.. .., . _ . --:._ Molecular Electronics Explained Resistors With More Than One Job } www.americanradiohistory.com BIG -SYSTEM MUSCLE... _ . u . , . ... : .: : . .- . : . a .,...: .. e : : . ... a . + _.. a ! a . e s s . ! . 1 . ! . e i . 1 . s e e . / . a ' / 11 . / . / s f ! . e . ! ! e s . > . te...... cc..... / a e a a . 1 w . a f i . : / ! . / / . .. - / / . ! ! ! / . .. ....... ................... 18Í . e . .. t a a e + e1V . 7J / Ma/ i Qç } ; , ! a- ir '+4 . +. & ! ,. e ! ' "' ac. 4 .:.a a . SMALL -SYSTEM PRICE! NEW JERROLD TV DISTRIBUTION SYSTEM ENGINEERED FOR THE NEW COLOR -TV ERA Designed for TV shops, dealers' showrooms, The JERROLD "Challenger" Amplifier, small apartments and motels Model ACL-200, delivers 20db minimum gain Feeds up to 32 TV and FM sets over the low band, 19db No controls or adjustments over the high band. New "Quick -Disconnect" plug-in outlets Flat response-unique in a low-price amplifier, but necessary for good color TV. Easy to install, Here's the distribution system to sell to TV and no controls to adjust. Famous JERROLD qual- FM dealers for their color -TV showrooms .. ity is built in to stay. perfect too for the small apartment building or Model ACL-200, $38.97 net motel that's been needing an antenna system See your JERROLD distributor or write but couldn't afford one before. It's also ideal for Jerrold Electronics, Distributor Sales Division, your own service shop. Philadelphia 32, Pa. icz:=;`1 JER RO LO New crown -washer screw Exclusive "Gamma" ELECTRONICS New 4- and 8 -way nigh - terminals for stripped or chassis fittings for quick isolation networks.
    [Show full text]
  • Exhibit a Case 3:16-Cr-00051-BR Document 545-2 Filed 05/11/16 Page 2 of 86
    Case 3:16-cr-00051-BR Document 545-2 Filed 05/11/16 Page 1 of 86 Exhibit A Case 3:16-cr-00051-BR Document 545-2 Filed 05/11/16 Page 2 of 86 Executive Order 12333 United States Intelligence Activities (As amended by Executive Orders 13284 (2003), 13355 (2004) and 134 70 (2008)) PREAMBLE Timely, accurate, and insightful information about the activities, capabilities, plans, and intentions of foreign powers , organizations, and persons, and their agents, is essential to the national security of the United States. All reasonable and lawful means must be used to ensure that the United States will receive the best intelligence possible. For that purpose, by virtue of the authority vested in me by the Constitution and the laws of the United States of America, including the National Security Act of 1947, as amended, (Act) and as President of the United States of America, in order to provide for the effective conduct of United States intelligence activities and the protection of constitutional rights, it is hereby ordered as follows: PART 1 Goals, Directions, Duties, and Responsibilities with Respect to United States Intelligence Efforts 1.1 Goals. The United States intelligence effort shall provide the President, the National Security Council, and the Homeland Security Council with the necessary information on which to base decisions concerning the development and conduct of foreign, defense, and economic policies, and the protection of United States national interests from foreign security threats. All departments and agencies shall cooperate fully to fulfill this goal. (a} All means, consistent with applicable Federal law and this order, and with full consideration of the rights of United States persons, shall be used to obtain reliable intelligence information to protect the United States and its interests.
    [Show full text]
  • What Is Xkeyscore, and Can It 'Eavesdrop on Everyone, Everywhere'? (+Video) - Csmonitor.Com
    8/3/13 What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) - CSMonitor.com The Christian Science Monitor ­ CSMonitor.com What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) XKeyscore is apparently a tool the NSA uses to sift through massive amounts of data. Critics say it allows the NSA to dip into people's 'most private thoughts' – a claim key lawmakers reject. This photo shows an aerial view of the NSA's Utah Data Center in Bluffdale, Utah. The long, squat buildings span 1.5 million square feet, and are filled with super­ powered computers designed to store massive amounts of information gathered secretly from phone calls and e­mails. (Rick Bowmer/AP/File) By Mark Clayton, Staff writer / August 1, 2013 at 9:38 pm EDT Top­secret documents leaked to The Guardian newspaper have set off a new round of debate over National Security Agency surveillance of electronic communications, with some cyber experts saying the trove reveals new and more dangerous means of digital snooping, while some members of Congress suggested that interpretation was incorrect. The NSA's collection of "metadata" – basic call logs of phone numbers, time of the call, and duration of calls – is now well­known, with the Senate holding a hearing on the subject this week. But the tools discussed in the new Guardian documents apparently go beyond mere collection, allowing the agency to sift through the www.csmonitor.com/layout/set/print/USA/2013/0801/What-is-XKeyscore-and-can-it-eavesdrop-on-everyone-everywhere-video 1/4 8/3/13 What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) - CSMonitor.com haystack of digital global communications to find the needle of terrorist activity.
    [Show full text]
  • 342.721 Preventing Terrorism Or Eliminating Privacy?
    235 Ivana Stepanović MA1 Scientific review paper UDK: 342.721 PREVENTING TERRORISM OR ELIMINATING PRIVACY? RETHINKING MASS SURVEILLANCE AFTER SNOWDEN REVELATIONS Abstract After Edward Snowden’s leaks revealed to the public in June 2013, mass surveillance programs still exist. Considering that these practises restrain the right to privacy, there is a need to rethink the very concept of mass surveillance. The aim of this paper is to analyse this concept, sum up the problems related to its logic and methods, and question its legitimacy. Critical approach to the concept of mass surveillance is necessary on order to create the basis for resolving current issues related to it. My research shows that there are reasons to question legitimacy of mass surveillance as it not only breaches the right to privacy but also ignores the presumption of innocence and there is possibly a substantial lack of oversight by the independent bodies which is necessary to make these practices democratic. Moreover, given that mass surveillance programs were introduced to fight terrorism and crime, it should be assessed how efficient they really are and whether they are worth having considering their drawbacks and potential dangers for the society. Key words: mass surveillance, terrorism, Snowden, privacy. 1. Introduction Information revealed by the former US National Security Agency employee Edward Snowden and published by The Guardian, The New York Times and other media in June 2013 confirmed the existence of surveillance programs conducted by intelligence services such as the US National Security Agency (NSA) and British Government Communications Headqarters (GCHQ). Even though the news about the existence of systems which are monitoring private communications isn’t completely new, and the general public was aware of a global system for the interception of 1 Assistant Researcher, Institute of criminological and sociological research, Belgrade; mail: ivana.
    [Show full text]
  • The Right to Privacy and the Future of Mass Surveillance’
    ‘The Right to Privacy and the Future of Mass Surveillance’ ABSTRACT This article considers the feasibility of the adoption by the Council of Europe Member States of a multilateral binding treaty, called the Intelligence Codex (the Codex), aimed at regulating the working methods of state intelligence agencies. The Codex is the result of deep concerns about mass surveillance practices conducted by the United States’ National Security Agency (NSA) and the United Kingdom Government Communications Headquarters (GCHQ). The article explores the reasons for such a treaty. To that end, it identifies the discriminatory nature of the United States’ and the United Kingdom’s domestic legislation, pursuant to which foreign cyber surveillance programmes are operated, which reinforces the need to broaden the scope of extraterritorial application of the human rights treaties. Furthermore, it demonstrates that the US and UK foreign mass surveillance se practices interferes with the right to privacy of communications and cannot be justified under Article 17 ICCPR and Article 8 ECHR. As mass surveillance seems set to continue unabated, the article supports the calls from the Council of Europe to ban cyber espionage and mass untargeted cyber surveillance. The response to the proposal of a legally binding Intelligence Codexhard law solution to mass surveillance problem from the 47 Council of Europe governments has been so far muted, however a soft law option may be a viable way forward. Key Words: privacy, cyber surveillance, non-discrimination, Intelligence Codex, soft law. Introduction Peacetime espionage is by no means a new phenomenon in international relations.1 It has always been a prevalent method of gathering intelligence from afar, including through electronic means.2 However, foreign cyber surveillance on the scale revealed by Edward Snowden performed by the United States National Security Agency (NSA), the United Kingdom Government Communications Headquarters (GCHQ) and their Five Eyes partners3 1 Geoffrey B.
    [Show full text]
  • Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities
    University of Central Florida STARS HIM 1990-2015 2013 Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities Mark Berrios-Ayala University of Central Florida Part of the Legal Studies Commons Find similar works at: https://stars.library.ucf.edu/honorstheses1990-2015 University of Central Florida Libraries http://library.ucf.edu This Open Access is brought to you for free and open access by STARS. It has been accepted for inclusion in HIM 1990-2015 by an authorized administrator of STARS. For more information, please contact [email protected]. Recommended Citation Berrios-Ayala, Mark, "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities" (2013). HIM 1990-2015. 1519. https://stars.library.ucf.edu/honorstheses1990-2015/1519 BRAVE NEW WORLD RELOADED: ADVOCATING FOR BASIC CONSTITUTIONAL SEARCH PROTECTIONS TO APPLY TO CELL PHONES FROM EAVESDROPPING AND TRACKING BY THE GOVERNMENT AND CORPORATE ENTITIES by MARK KENNETH BERRIOS-AYALA A thesis submitted in partial fulfillment of the requirements for the Honors in the Major Program in Legal Studies in the College of Health and Public Affairs and in The Burnett Honors College at the University of Central Florida Orlando, Florida Fall Term 2013 Thesis Chair: Dr. Abby Milon ABSTRACT Imagine a world where someone’s personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter.
    [Show full text]
  • ASD-Covert-Foreign-Money.Pdf
    overt C Foreign Covert Money Financial loopholes exploited by AUGUST 2020 authoritarians to fund political interference in democracies AUTHORS: Josh Rudolph and Thomas Morley © 2020 The Alliance for Securing Democracy Please direct inquiries to The Alliance for Securing Democracy at The German Marshall Fund of the United States 1700 18th Street, NW Washington, DC 20009 T 1 202 683 2650 E [email protected] This publication can be downloaded for free at https://securingdemocracy.gmfus.org/covert-foreign-money/. The views expressed in GMF publications and commentary are the views of the authors alone. Cover and map design: Kenny Nguyen Formatting design: Rachael Worthington Alliance for Securing Democracy The Alliance for Securing Democracy (ASD), a bipartisan initiative housed at the German Marshall Fund of the United States, develops comprehensive strategies to deter, defend against, and raise the costs on authoritarian efforts to undermine and interfere in democratic institutions. ASD brings together experts on disinformation, malign finance, emerging technologies, elections integrity, economic coercion, and cybersecurity, as well as regional experts, to collaborate across traditional stovepipes and develop cross-cutting frame- works. Authors Josh Rudolph Fellow for Malign Finance Thomas Morley Research Assistant Contents Executive Summary �������������������������������������������������������������������������������������������������������������������� 1 Introduction and Methodology ��������������������������������������������������������������������������������������������������
    [Show full text]
  • Aerospace, Defense, and Government Services Mergers & Acquisitions
    Aerospace, Defense, and Government Services Mergers & Acquisitions (January 1993 - April 2020) Huntington BAE Spirit Booz Allen L3Harris Precision Rolls- Airbus Boeing CACI Perspecta General Dynamics GE Honeywell Leidos SAIC Leonardo Technologies Lockheed Martin Ingalls Northrop Grumman Castparts Safran Textron Thales Raytheon Technologies Systems Aerosystems Hamilton Industries Royce Airborne tactical DHPC Technologies L3Harris airport Kopter Group PFW Aerospace to Aviolinx Raytheon Unisys Federal Airport security Hydroid radio business to Hutchinson airborne tactical security businesses Vector Launch Otis & Carrier businesses BAE Systems Dynetics businesses to Leidos Controls & Data Premiair Aviation radios business Fiber Materials Maintenance to Shareholders Linndustries Services to Valsef United Raytheon MTM Robotics Next Century Leidos Health to Distributed Energy GERAC test lab and Technologies Inventory Locator Service to Shielding Specialities Jet Aviation Vienna PK AirFinance to ettain group Night Vision business Solutions business to TRC Base2 Solutions engineering to Sopemea 2 Alestis Aerospace to CAMP Systems International Hamble aerostructure to Elbit Systems Stormscope product eAircraft to Belcan 2 GDI Simulation to MBDA Deep3 Software Apollo and Athene Collins Psibernetix ElectroMechanical Aciturri Aeronautica business to Aernnova IMX Medical line to TransDigm J&L Fiber Services to 0 Knight Point Aerospace TruTrak Flight Systems ElectroMechanical Systems to Safran 0 Pristmatic Solutions Next Generation 911 to Management
    [Show full text]
  • A Failure of Intelligence: the Echelon Interception System & the Fundamental Right to Privacy in Europe
    Pace International Law Review Volume 14 Issue 2 Fall 2002 Article 7 September 2002 Post-Sept. 11th International Surveillance Activity - A Failure of Intelligence: The Echelon Interception System & the Fundamental Right to Privacy in Europe Kevin J. Lawner Follow this and additional works at: https://digitalcommons.pace.edu/pilr Recommended Citation Kevin J. Lawner, Post-Sept. 11th International Surveillance Activity - A Failure of Intelligence: The Echelon Interception System & the Fundamental Right to Privacy in Europe, 14 Pace Int'l L. Rev. 435 (2002) Available at: https://digitalcommons.pace.edu/pilr/vol14/iss2/7 This Article is brought to you for free and open access by the School of Law at DigitalCommons@Pace. It has been accepted for inclusion in Pace International Law Review by an authorized administrator of DigitalCommons@Pace. For more information, please contact [email protected]. POST-SEPT. 11TH INTERNATIONAL SURVEILLANCE ACTIVITY - A FAILURE OF INTELLIGENCE: THE ECHELON INTERCEPTION SYSTEM & THE FUNDAMENTAL RIGHT TO PRIVACY IN EUROPE Kevin J. Lawner* I. Introduction ....................................... 436 II. Communications Intelligence & the United Kingdom - United States Security Agreement ..... 443 A. September 11th - A Failure of Intelligence .... 446 B. The Three Warning Flags ..................... 449 III. The Echelon Interception System .................. 452 A. The Menwith Hill and Bad Aibling Interception Stations .......................... 452 B. Echelon: The Abuse of Power .................. 454 IV. Anti-Terror Measures in the Wake of September 11th ............................................... 456 V. Surveillance Activity and the Fundamental Right to Privacy in Europe .............................. 460 A. The United Nations International Covenant on Civil and Political Rights and the Charter of Fundamental Rights of the European Union... 464 B.
    [Show full text]
  • Summary of U.S. Foreign Intelligence Surveillance Law, Practice, Remedies, and Oversight
    ___________________________ SUMMARY OF U.S. FOREIGN INTELLIGENCE SURVEILLANCE LAW, PRACTICE, REMEDIES, AND OVERSIGHT ASHLEY GORSKI AMERICAN CIVIL LIBERTIES UNION FOUNDATION AUGUST 30, 2018 _________________________________ TABLE OF CONTENTS QUALIFICATIONS AS AN EXPERT ............................................................................................. iii INTRODUCTION ......................................................................................................................... 1 I. U.S. Surveillance Law and Practice ................................................................................... 2 A. Legal Framework ......................................................................................................... 3 1. Presidential Power to Conduct Foreign Intelligence Surveillance ....................... 3 2. The Expansion of U.S. Government Surveillance .................................................. 4 B. The Foreign Intelligence Surveillance Act of 1978 ..................................................... 5 1. Traditional FISA: Individual Orders ..................................................................... 6 2. Bulk Searches Under Traditional FISA ................................................................. 7 C. Section 702 of the Foreign Intelligence Surveillance Act ........................................... 8 D. How The U.S. Government Uses Section 702 in Practice ......................................... 12 1. Data Collection: PRISM and Upstream Surveillance ........................................
    [Show full text]
  • Disconnecting the Dots: Anonymity in the Digital Age D Sydney Hanover
    Disconnecting the Dots: Anonymity in the Digital Age d Sydney Hanover Governmental and corporate spying are no longer a surprising facet of everyday life in the digital age. In this paper, I expand upon the implications at stake in debates on autonomy, privacy, and anonymity, and I arrive at a definition of anonymity involving the flow between traits and the inability to connect them based on deliberate non- publication on a structurally social level. I argue that cultivating the space to remain anonymous is useful for distanced association with oneself in the purely private internal sphere, furthering a more fully examined inner association not based on a future already predicted or prematurely acted upon. The privilege of anonymity is a precondition for genuine self-relation. Later, I argue doubly against the “nothing to hide” argument, i.e., if one has nothing to hide, one has nothing to fear. Firstly, the actionability and fabrication of data make it such that it is always at risk of being interpreted as unsafe. Secondly, this argument is predicated on hiddenness as negative, which I answer with an analysis of the functionality of anonymity concerning personal growth. I. Introduction What we search and put on personal devices, who owns that data, and what they do with that information, is at the center of an important debate on privacy containing various opinions on what is being protected and why. This debate is not merely about words and concepts, rather, as exemplified by the extent of corporate and governmental spying in this country, all of us are affected, despite how technologically involved one may be.
    [Show full text]