You are on page 1of 1

TECH TECH

drone strike. As Washington withdrew from


Iraq, this tech migrated to Afghanistan, where

CYBER-SURVEILLANCE
US patrols regularly scanned Afghani eyes
into an upgraded biometric automated toolset.
By the time Obama took office in 2009, the
NSA had assembled the requisite technological
toolkit of supercomputers and data farms to

RAMPS UP
sweep up billions of communications worldwide
while targeting specific individuals. In 2013,
the New York Times reported that there were
“more than 1,000 targets of American and
British surveillance in recent years”, including
After ongoing allegations of Russian interference in leaders of dozens of nations including France
and Germany. Seeking diplomatic advantage
America’s presidential elections, it’s worth remembering over its allies, the US conducted “widespread
surveillance” of world leaders during the G20
that the US has long acquired, used and misused summit in Toronto in 2010. Three years later,
information on enemies and allies. Indeed, many NSA whistleblower Edward Snowden charged
that “they even keep track of who is having
countries dabble in a bit of cyber-surveillance – and
Iranian
rival for the California seat, launching his an affair or looking at pornography, in
case they need to damage their target’s
it looks set to continue in 2019 path to the presidency.

intelligence
During the early years of the Cold War reputation”.
WORDS: ALFRED W MCCOY in the 1950s, Washington carried out 170 In the marketplace of military ideas,

hacked into a
clandestine operations in 48 nations. Over even a crushing technological advantage

S
ince President Trump’s inauguration in data on the appearance, finances and loyalties the next 50 years, the CIA would covertly is quickly lost. Washington was fast

CIA drone and


January 2017, there has been a steady of every influential Filipino. Simultaneously, manipulate 80 elections worldwide and, to weaponise the internet, forming its
stream of media coverage highlighting t he America n colonial regime created a when such efforts failed, promote many Cyber Command in 2009 and deploying

forced it to
Russia’s use of disinformation and scandal constabulary that ruled through a total control of the military coups that roiled more computer viruses against Iran’s nuclear
in influencing the US presidential elections over information, releasing scurrilous titbits to than 30 nations between 1958 and 1975. facilities. Russia was not far behind,

land in public
and the Brexit referendum in the UK. Yet, discredit dissidents and suppressing scandal Under a secret treaty signed in 1946, the using cyberstrikes to cripple Georgia’s
for well over a century, Washington used to protect collaborators. National Security Agency (NSA) and computers in 2008 and later to disable
surprisingly similar clandestine tactics in its When the US entered the First World War its British counterpart GCHQ built a Ukraine’s electrical grid, leading NATO’s
exercise of global power, from pacification in 1917 it had no intelligence service, so Van worldwide signals surveillance through 2016 summit to make t he web a new
of the Philippines in 1898 to recent cyber- Deman was assigned to establish one. With a the Five Eyes coalition of the US, the UK, domain for military operations.
surveillance of European allies. staff of 1,700 and 350,000 citizen operatives, Australia, New Zealand and Canada, with its Not only did a St Petersburg “troll factory”
The Philippines was just one of the sprawling his Military Intelligence Division launched Echelon surveillance programme, established try to influence the 2016 US elections, but
empire of tropical islands that Washington intensive surveillance of domestic subversives – in the 1960s. Russian hackers also stole some of the NSA’s
took f rom Spain in 1898 – but it was t he arguably the world’s most extensive programme top-secret cyber tools. Showing the accessibility
only one to challenge t he US a rmy, wit h of the kind up to that time. WAR ON TERROR of cyberwar even to secondary powers, in 2011
guerrilla resistance and messianic revolts. Using After retiring in 1929, Van Deman made With the launch of the so-called ‘Global War Iranian intelligence hacked into the navigation
America’s advanced information systems of his San Diego bungalow the epicentre of an on Terror’ in 2001, Washington merged new of a super-secret CIA drone and forced it to land
telephone, telegraph and automated tabulating intelligence exchange among military, police tech such as electronic surveillance, biometric for public display in northern Iran.
(using a kind of proto-super- and private security, compiling ID and aerospace innovation into a digital The digital surveillance and cyberwarfare
computer), the army formed dossiers on 250,000 dissidents information regime. By 2008, the US army that seemed, just a few years ago, to provide
the first field intelligence a nd cha nnelling classified had collected more than one million Iraqi wonder weapons for extending US global
unit in its 100-year history. information to citizen groups fingerprints and iris scans that its combat dominion have quickly become just another
Under Captain Ralph Van for public blacklisting. During patrols accessed by satellite link to the US. dangerous arena for military conflict, accessible
GETTY, US ARMY

Deman, dubbed the ‘father the 1950 race for the US senate, Captain Ralph Van At the same time, the Joint Special Operations to powers large and small. It’s inevitable that
Deman, known as
of US military intelligence’, Richard Nixon reportedly used the ‘father of US
Command’s integrated database identified in 2019, and years to come, cyber-surveillance
the unit compiled detailed Van Deman’s files to smear his military intelligence’ alleged Al-Qaeda operatives for elimination by will continue to be commonplace.

74 FOCUS MAGAZINE COLLECTION FOCUS MAGAZINE COLLECTION 75

You might also like