Sudden Justice: America's Secret Drone Wars, by investigative journalist Chris Woods.
Publisher Oxford University Press writes: In Sudden Justice, award-winning investigative journalist Chris Woods explores the secretive history of the United States' use of armed drones and their key role not only on today's battlefields, but also in a covert targeted killing project that has led to the deaths of thousands. The CIA nurtured and developed drones before the War on Terror ever began, seeking a platform from which it could monitor its targets and act lethally and instantly on the intelligence it gathered. Since then, remotely piloted aircraft have played a critical role in America's global counter-terrorism operations and have been deployed to devastating effect in conventional wars in Afghanistan, Iraq, and Libya. Drone crews, analysts, intelligence officials and military commanders all speak frankly to the author about how armed drones revolutionized warfare--and the unexpected costs to some of those involved.
Sudden Justice is probably the most talked about drone book of the year. It is also the most detailed, the most thorough study of the evolution of weaponised drone warfare you can find. The author, Chris Woods, is an investigative journalist who specializes in conflict and national security issues. He was awarded the Martha Gellhorn Journalism Prize for his investigations into covert U.S. drone strikes with the Bureau of Investigative Journalism. He also contributes to The Guardian.
In preparation to this book and as part of his work as a journalist, Woods has interviewed former drone operators and mission controllers, retired intelligence commanders, senior Air Force officials and psychologists, US Navy veterans, diplomats, parents of young people killed during the strikes, survivors of attacks, etc. In short, anyone who had any (voluntary or not) role to play in this new form of asymmetrical warfare is bringing their own view about the issue.
The use of weaponized drones outside of the battlefields is one of the most worrying characteristics of our times. At the time Woods was writing the book, drones had already killed 3000 people. Some of them civilians, not militants. The author reminds us, for example, that when Obama's presidency was just 72h old, he had already authorized a secret action that accidentally killed 14 civilians.
By acting as judge, jury and executioner, the U.S. is not only setting a worrying template for the future of warfare, its is also antagonizing the populations targeted (drone strikes have apparently become a recruiting tool and a motivator for jihadists), creating a new generation of operators so stressed that psychologists still have to invent a word that would describe their condition, and alienating allied countries that believe (rightly) that the targeted killing practice is illegal.
There's no sign of a slowdown. Since 2010, the US Air Force has been training more drone pilots than fighter and bomber pilots combined. And the Obama administration intends to keep on eschewing any request for transparency and accountability.
Previously: Politics and Practices of Secrecy (part 1).
And this is part 2 of the notes i took during the Politics and Practices of Secrecy symposium which took place at King's College in London last month. My reports do not follow the schedule of the panels, nor do they cover all the talks. I'm just cherry picking the more interesting moments of the day. Part 1 focused on the art projects. This post is less uniform in its theme. Two of the presentations i enjoyed covered the representation of intelligence agencies in films and tv fiction. Another was about the influence that new forms of surveillance are having on the rise of home-grown ('home' being the U.S.A., the symposium was organised by the Institute of North American Studies) white extremist groups. And a fourth talk wondered if transparency could fix our democracy.
Let's start with Timothy Melley, Professor Affiliate of American Studies at Miami University and author of The Covert Sphere. Secrecy, Fiction, and the National Security State and of Empire of Conspiracy. The Culture of Paranoia in Postwar America.
In his talk, 'The Democratic Security State: Operating Between Secrecy and Publicity', Melley listed up a few numbers:
This secret world costs 8 billion dollars per year.
50,000 intelligence reports are written each year. Their volume is so large that most are never read.
The intelligence hides out in the open:
The complexity of this system defies description Lt Gen. (Ret.) John R. Vines
The U.S. covert state is a growing industry. It handles a huge number of secrets all over the country. It relies on democratic structures but acts like a shadow state that has its own territory and laws. It also support some film makers by lending helicopters needed for films that publicize the covert world. The reason for that is that the secret programme needs public approval.
What we know about the CIA comes from leaks but also from fiction. Our screens are awash with what Melley calls 'terror melodrama." One of his presentations slides even listed those films. Covert CIA operations are celebrated in books, films, games, tv series, etc. Earlier this year, the CIA, pleased with the way it is portrayed in "Homeland", invited the show's cast and producers to visit its headquarters in Virginia and have a discussion. Another example is when Michelle Obama presented the 2013 Best Picture award to Ben Affleck's Argo, a film adapted from CIA operative Tony Mendez's book The Master of Disguise and the 2007 Wired article The Great Escape: How the CIA Used a Fake Sci-Fi Flick to Rescue Americans from Tehran.
Keeping with the spy in entertainment theme, Matt Potolsky, Professor of English at University of Utah, looked at the representation of the NSA on tv and in cinema.
Fiction and films are often the only way the public can picture and judge for themselves the activities of intelligence agencies. FBI, KGB, CIA have often been presented in films. How about the NSA? According to Potolsky, the NSA never turned into real fictional tropes.
There have been more recent attempts to depict the activity of the massive NSA:
Mark Fenster, Professor at the Levin College of Law (University of Florida) and author of the book Conspiracy Theories: Secrecy and Power in American Culture. His talk was titled 'Secrecy and the Hypothetical State Archive.'
Fenster started by reminding us of a whistleblower of the early 1970s. Daniel Ellsberg was employed by the RAND Corporation when he not only read classified documents he wasn't supposed to open but also photocopied and released them to The New York Times and other newspapers. The Pentagon Papers, officially titled United States - Vietnam Relations, 1945-1967: A Study Prepared by the Department of Defense, were top-secret documents that charted the US' political-military involvement in Vietnam from 1945 to 1967.
There is now a trust in 'transparency' but, Fenster asks, Can transparency fix our democracy? Obama was elected to end Bush's secrecy. But the secrecy is now as deep as ever. If not deeper.
But Fenster says, information leaks. Sometimes from the top, sometimes from the bottom. Sometimes drop by drop, sometimes it flows.
It is particularly tricky to control State information. If you think about the model of communication Sender-Message-Receiver, the Sender would be the State, the Message is state information and the Receiver is the public.
The state is organizationally complex, it is spatially deployed, it is enclosed in buildings, offices. In truth, it is a mess that is difficult to keep shut.
State information is difficult to perceive clearly, it is a vast amount of information, it is hard to archive and to control its release. Sometimes state information can leak by mistake.
The public is made of individuals and they will have their own interpretation of any information released.
In brief, information cannot be controlled, on any level.
According to Fenster, the revelation of a secret often offers marginal gains. It certainly doesn't lead necessarily to a reformed democracy.
Another talk i found very informative was the one by Hugh Urban, professor of religious studies at Ohio State University and author of The Church of Scientology: A History of a New Religion
His talk, 'The Silent Brotherhood: Secrecy, Violence, and Surveillance from the Brüder Schweigen to the War on Terror' looked at the white males' belief that they are the victims of racial oppression. In their view, white males are persecuted by women, Black people, Muslims, Jews, etc. That's what Urban calls the "white man falling" syndrome.
Brüder Schweigen or Silent Brotherhood, was a white nationalist revolutionary organization active in the United States between September 1983 and December 1984. Its founder Robert Jay Mathews wanted to create an elite vanguard of Aryan warriors to save the white race. The Silent Brotherhood group was responsible for a number of violent crimes: robberies, bombings, murders, counterfeiting operations, etc.
Nowadays, much of the anti-terrorist attention focuses on radical Islam, neglecting home-grown white extremist groups. Figures show that the number of patriot groups in the U.S. is growing very rapidly. The reasons for that are many: bad economic conditions, black president but also the rise of surveillance which augments these people's distrust of the FBI, NSA and other governmental agents.
Urban's conclusions were that:
1. Secrecy is both the explanation and the radical solution for the 'white man falling' syndrome.
2. New forms of surveillance play into, feed and reinforce the narratives of such radical groups.
Politics and Practices of Secrecy was organized by the Institute of North American Studies at King's College London, on 14-15 May, 2015.
I've been strangely busy ('strangely' because believe me it's not my style at all to be a busy person) over the past couple of weeks and i never got a chance to sit down and write a small report of the Politics and Practices of Secrecy symposium which took place at King's College in London last month. Here's the blurb that lured me into spending a whole day in a lecture hall:
In the wake of the Snowden revelations about the surveillance capabilities of intelligence agencies, this interdisciplinary symposium gathers experts to discuss the place and implications of secrecy in contemporary culture and politics.
The event started with a keynote by Jamie Bartlett about the Secrets of the Dark Net. It was entertaining and more about the dark sides of the internet in general than strictly speaking about the Silk Road. The journalist talked us through his adventures online and offline with sex cam ladies, neo-nazis, drug sellers and anorexic girls. If you're curious about the content of the talk, then i advise you to check out his book The Dark Net.
The symposium itself looked at how the relationships between citizens and government have changed since the Snowden revelation, the impact of secrecy on society and the place of the subject in a world that keeps us under close surveillance and doesn't regard us as fully-formed political agents. The angle was very much American. Not because the USA is the only nation that uses and abuses of secrecy (although they are making a name for themselves in that field) but because the symposium was organized by the Institute of North American Studies at King's College.
I won't cover all the symposium presentations. I'm just going to do a pick and mix of what i heard there. This first post about the event might still be fairly coherent though because it will focus on the arty Roundtable 2: Aesthetics of the Secret. And since he is an artist and an artist who has some valuable ideas to share about secrecy, discrimination and control, i'm also adding to this post Zach Blas' talk (which was part of another series of talks that zoomed in on Opacity and Openness.)
Let's start with Zach Blas. He is an artist, writer and Assistant Professor in the Department of Art at the University at Buffalo. The title of his talk 'Informatic Opacity' is also the one of his upcoming book.
The idea of informatic opacity is explored in two of Blas' artworks. The first one, Facial Weaponization Suite, is a series of workshops in U.S. and Mexico that looked at biometric facial recognition. The artist worked with members of specific minority communities (queers, black people, etc.) to create masks that are modeled from the aggregated facial data of participants. The amorphous and slightly sinister masks are then worn in public performances. The masks represent each individual but cannot be detected as human faces by biometric facial recognition technologies. The work is a dark critique of the silent and gradual rise of the use of biometric facial recognition software by governments to monitor citizens. The symbol of the mask is also important. Pussy Riot, members of the Black Bloc and the Zapatistas wear masks to hide their face but also because masks make them visible.
For Blas, the main motivation behind the work wasn't so much privacy and transparency. His first interest laid in highlighting a technology that standardizes identity globally in order to create templates that can calculate identity and can be applied around the world.
The standards of face recognition technology are rigid and they can break down. As the two examples below demonstrates, these technologies are routinely accused of not recognizing non-Caucasian faces:
Not being recognized by biometric machines makes some people more vulnerable to discrimination and criminalization.
Édouard Glissant called for the right to opacity. For him opacity was protecting anyone who is 'diverse'. Blas book takes Glissant's idea of opacity and puts it into the context of informatics. Information opacity, he says, resists forms of globalization and standardization.
The second work Blas mentioned is his Face Cages series which focuses on biometrics as a form of capture.
Face Cages is a dramatization of the abstract violence of the biometric diagram. Diagrams are fabricated as three-dimensional metal objects, evoking a material resonance with handcuffs, prison bars, and torture devices used during slavery in the US and the Medieval period. The virtual biometric diagram, a supposedly perfect measuring and accounting of the face, once materialized as a physical object, transforms into a cage that does not easily fit the human head, that is extremely painful to wear. These cages exaggerate and perform the irreconcilability of the standardized, neoliberal biometric diagram with the materiality of the human face itself-and the violence that occurs when the two are forced to coincide.
Now to Roundtable 2, Aesthetics of the Secret which was, unsurprisingly, the one i was most looking forward to listen to.
John Beck, Director of the Institute for Modern and Contemporary Culture at the University of Westminster, kicked of the session with 'Photography's Open Secret.'
The talk explored the desert landscape in the South West of the U.S., one of the most photographed regions in the world, but also one that hosts a vast amount of secrecy.
The desert is a space where there is nothing and where therefore anything can be done and left: military bases, weapon testing facilities, nuclear waste, etc. It can be used as a dump space where unnecessary leftovers of power can be placed. It is a space where secrets are literally left into the open.
The medium of photography echoes the ambiguous characteristic of the desert. Photography is an instrument for revealing, unveiling, documenting and exposing. But it can also be used to hide, by leaving things out of the frame, by staging or doctoring evidence. Photography is at once a medium of transparency and a medium of opacity. And that makes it difficult to regard photography as a source of reliable evidence.
Richard Misrach photographed places that are now less restricted than they were during the Cold War but that were used to conduct secret programs and operations.
After 9/11, Trevor Paglen has taken up the role of photographer/investigator of sites of secrecy. Using limit telephotography, he documents black sites and other secret spaces and programs of the USA. Some of his photos, however, move toward abstractions and as such, embody the skepticism that photography can provide us with straightforward representations of the world.
Laura Kurgan bought hi-res satellite images showing four vulnerable landscapes: a desert in Iraq, the rain forest in Cameroon, the tundra in Alaska, and the Atlantic Ocean. Seen from afar, the images evoke monochromatic Minimalism, but a closer investigation reveal traces of geopolitical issues such as illegal logging or helicopters flying over the desert during "Operation Iraqi Freedom."
When Google launched its satellite imagery service in 2005, some governments attempted to censor sites deemed vital to national security. The Netherlands, for example, hid hundreds of significant sites including royal palaces, fuel depots and army barracks behind stylist multi-coloured polygons. Ironically, it made the censored sites even more conspicuous. The country has since adopted a less distinctive method of visual censorship.
The second speaker of the roundtable was Neal White, artist, Associate Professor in Art and Media Practice at Bournemouth University, he is also Director of Emerge - Experimental Media Research Group.
His talk, Secrecy and Art in Practice, looked at the various methods art employs to reflect on the practice of secrecy.
He mentioned the Critical Art Ensemble's tactical biopolitic works, Taryn Simon's photo series An American Index of the Hidden and Unfamiliar, Trevor Paglen (but then almost every single speaker spoke about Paglen's work), Charles Stankievech's Counterintelligence, etc.
White also talked briefly about the works he is involved in with the Office of Experiments. I've blogged in the past about The Overt Research Projects which combine field observation, alternative knowledge gathering and experimental geography techniques with other research methods to archive and geo-map spaces related to techno-scientific and industrial /military research in the UK.
I was also surprised to learn about The Mike Kenner Archive which was donated to the Office of Experiments in 2009 so that they can show the archived material to the public. Mike Kenner's collection of thousands of documents were obtained following over thirty years of research and FOI (Freedom of Information) requests into the activities at the Biochemical Research Centre at Porton Down, Wiltshire (referred to as MRE) and other sensitive research establishments. The documentation contains photographs, de-classified but restricted secret and top-secret documents, cabinet office and official correspondence, experimental data, images, diagrams , analysis, video, photographs, newspaper cuttings etc. Many of these highlight experiments that had a significant impact in the region of Weymouth in the UK, with experiment conducted on the public using live pathogens, largely through around Lyme Bay. Far from being historic research alone, Kenner's work points to controversy generated by what may well be ongoing scientific trials and experiments, continuing to this day often concealed from the public in plain sight.
The last speaker of the roundtable wasn't an artist but a Senior Lecturer at King's College and the curator of the whole event. Clare Birchall explored how artists are using the materiality of secrecy in their practice. Unsurprisingly, she discussed Paglen and mentioned his keynote at last year's edition of Transmediale. Which i'm copy/pasting below:
Birchall also spoke in details about Jill Magid's work at the AIVD, the Dutch secret service.
In 2005, AIVD asked her to create a work for its new headquarters. They were hoping that the commission would help improve its public persona by providing "'the AIVD with a human face."
Magid spent the following three years meeting with eighteen employees of AIVD in "non-descript public places." AIVD restricted the artist from using recording equipment, so she had to write down her notes. She never disclosed the identity of her contact but compiled the information she had collected during the interviews into a collective persona that she referred to as "The Organization."
When AIVD agents visited the first exhibition of the project in 2008, they confiscated several works and censored the draft of Magid's report.
The artist "protested against the censorship of her own memories," prompting AIVD to suggest that she "'present the manuscript as a visual work of art in a one-time-only exhibition, after which it would become the property of the Dutch government and not be published.'" Magid's 2009/10 exhibition at Tate Modern, Authority to Remove, marked the fulfillment of this request: the uncensored report sat securely behind glass. In its penultimate state, the project thus expressed "what it means to have a secret but not the autonomy to share it." (via)
Over the past few months, artist Paolo Cirio has been quietly collecting pictures of high-ranking U.S. intelligence officials on social media. He then blew the photos up using High Definition Stencils (an OS graffiti technique he invented), spray-painted the reproductions of the misappropriated photos and plastered the copies onto the streets of cities like New York, Paris or London.
The individuals targeted in the Overexposed series are some of the officials responsible for programs of mass surveillance or for misleading the public about them. Their names are: Keith Alexander (NSA), John Brennan (CIA), Michael Hayden (NSA), Michael Rogers (NSA), James Comey (FBI), James Clapper (NSA), David Petraeus (CIA), Caitlin Hayden (NSC), and Avril Haines (NSA).
Cirio tracked down these portraits through open-source intelligence (OSINT), an information-gathering method that uses the internet, including social media, as an investigative tool. OSINT is used by government agencies, law enforcement, corporations and people involved in marketing. But activists and journalists are also routinely relying on it for their research. The portraits brought to light by Cirio are photographs and selfies of government officials taken in informal situations by civilians or lower ranking officers.
By making private portraits of members of the CIA and NSA part of the public domain, both through his street interventions and the detailed documentation of the research he published on his website, the artist invaded the private life of these government officials (though not as much as they might invade ours) and literally gave a face to U.S. intelligence services. The work holds a satirizing mirror to the people participating to operations of mass surveillance, commenting on the need for public accountability and pushing to its most uncomfortable limits the trends for 'overly mediated political personas.'
Cirio's political satire reverses the contemporary means of propaganda, exposing the extent to which a public image can be captured on camera and exploited by the very same systems that intelligence officials seek to control. Overexposed derides the watchers with embarrassing pictures over which they have lost control, effectively turning the tables on them and their advocacy of mass surveillance and lax privacy practices.
An exhibition of Overexposed is opening tomorrow at the NOME gallery in Berlin (keep your eyes peeled for their programme in the future because they work with some of the most thought-provoking artists engaging with digital technologies) so i contacted the artist to get more details about the series:
Hi Paolo! To be honest, when i first read the description of the project, i was expecting some blurry portraits and no name at all. But in the series you go full on: the individuals are very recognizable and their identity is given. Do you expect to get into trouble with this work?
The legal question is not really about the officials because they are public figure, so the use of their photos fall under parody laws and free expression. The controversy is actually about the ownership of those photos and from where they were obtained, in most of the cases the selfies were taken by civilians, random people or acquaintances of the intelligence officials. On my website you can find the original photos where you have the individuals together with officials in the snapshot taken with smartphones and uploaded directly on the social media. I think so far they still don't know that their pictures ended up on public walls around the world. I don't know how they will react yet, the project was published just a few weeks ago.
And since you actually have a history of getting into trouble with your work, could you explain us which part these (mis)adventures, legal threats, cease & desist play into your work?
It's not just about getting in troubles, instead it's about generating legal reactions that reveal contradictions on the inadequacy or abuse of the laws that I want to criticize. In same cases, confronting the subjects of my performances on the legal terrain lets everyone understand which are the actual power structures that generate particular social conditions.
According to the press release, you used your HD Stencils graffiti technique and spray-painted hi-re reproductions of the photos onto public walls. How do you select the locations for these street interventions?
I paste these reproduction of photos mainly in popular street art locations, where people often take pictures that end up on the social media again. This exposes these officials even more through having their pictures in recirculation on the social network with the glamour of the street art.
And how do you go from street graffiti to art gallery? Do you feel that your work, and these stencils in particular, gets another meaning or has to be framed in another way when you change the exhibition context from public space to white wall space?
Beyond the public art interventions made for a wider public, I'm interested in formalizing the pieces as pop art and appropriation art, bringing them in the realm of the art world, which for me it is also a distribution system. Eventually they became historical portraits of figures that mark our time of expansion of cyber-warfare and astonishing programs of mass surveillance, which hopefully we will only remember as an awful war against civil society of the past. Also my technique HD Stencils offers very particular aesthetic qualities that can be fully appreciated with maximum perfection of the works made for the art gallery.
The exhibition Overexposed opens at the NOME gallery in Berlin on 22 May and remains on view until 20 July.
A detailed catalogue of the show is available for download (PDF.)
Previous mentions of Paolo Cirio's work on the blog: Unstable Territory. Borders and identity in contemporary art, Cultural Hijack, Notes from WJ-Spots Brussels, History and future of artistic creation on the Internet and The Digital Now - 'Drones / Birds: Princes of Ubiquity'.
Last week, i was in Berlin for the talks and screenings organized by the Disruption Network Lab, a platform of events and research focused on art, hacktivism and disruption. DNL opened its program with Eyes from a Distance. On Drone-Systems and their Strategies, a conference that explored the politics and the regime of power beyond drone-systems. A couple of the talks have already been uploaded online. They will all be there eventually and in the meantime i'm going to dutifully post my notes from the conference.
Starting with the brilliant panel of the first evening. The Grey Zone. On the (il)legitimacy of targeted killing by drones, moderated by journalist Laura Lucchini, explored drone strikes under the perspectives of an investigative journalist, a criminal law researcher, an activist and a blogger/journalist who lives in Gaza under the constant surveillance of the Israeli drones (more about her in a later post but go ahead if you're curious...)
The grey zone is of course the dangerous, blurry area where drone attacks operate. The practice of targeted killing by drones raises many questions: "How many civilians have been killed as collateral damage during these strikes?" "And even if we're talking about militants, how can the killings be justified when there has been judicial supervision? "If these drones can reach their targets anywhere, then how is the battlefield defined?" "87 countries (and counting) are now equipped with military drones, which they use mostly for surveillance. Only 3 countries use drones for targeted killings: the U.S., Israel and the UK. Where will this stop?" "And if these targeted killings are illegal, why does Europe keep silent?"
The first panelist was John Goetz, an American investigative journalist and author based in Berlin. He wrote, together with Christian Fuchs, the book Geheimer Krieg (Secret War) which reveals how the war on terror is secretly conducted from covert U.S. bases in Germany.
Goetz's presentation attempted to reconstruct one day of a drone attack in Somalia and as the narrative unfolded, we got to hear about Germany's involvement into these military operations, the way the U.S. gather intelligence in foreign territories and how innocents end up being caught in the line, if not directly targeted due to inaccurate information.
As he explained at the conference (and as an article in The Intercept further confirmed), drone strikes wouldn't be possible without the support of Germany. The Germans might not launch the attacks themselves but they provide intelligence and they coordinate the strikes that target suspected terrorists in Africa and the Middle East, but that also kill civilians.
The U.S. drone war in Africa is controlled from U.S. bases in Germany, namely Ramstein and Stuttgart. Germany is also responsible for gathering human intelligence. There are many Somali immigrants and asylum seekers in Germany and as they arrive, they are asked about streets, shops, location of members of Al-Shabaab, etc. Any information that could be used by the "War on Terror" is immediately relayed to U.S. intelligence officers.
The second speaker was Chantal Meloni, a criminal lawyer and the author of Is there a Court for Gaza? A Test Bench for International Justice, a book about the crimes perpetrated during the Operation Cast Lead against the Gaza Strip.
Meloni put the issue of targeted killing by drones into a legal framework.
Since 2004, up to 5,500 people have been killed by drone strikes in Somalia, Yemen and Pakistan. These are countries the U.S. is not officially at war with.
Killing has supplanted capture as the centerpiece of the U.S. counter terrorism strategy. Opposition to drone killing is growing but it is not as effective as the opposition to torture was. A reason for that might be that the legal framework for drone strikes is more complex.
Drone strikes have escalated under the Obama administration and they are characterized by a lack of transparency: states don't disclose who has been killed, why and who are the collateral casualties. Obama doesn't disclose the identity of the people on the kill list. There is no public presentation of evidence, nor any judicial oversight. The level of opacity is actually ridiculous. The little information we have is provided by media reports, leaks or testimonies.
An analysis by the human rights organization Reprieve found that US operators targeting 41 men have killed an estimated 1,147 people. So who are the 1,106 individuals? We don't know, most of them remain unnamed. What is sure is that the collateral damage shows that drones are not as 'surgically precise' as the U.S. claims.
Rosa Brooks, a Georgetown professor and former Pentagon official under President Obama, sums up the situation: "Right now we have the executive branch making a claim that it has the right to kill anyone, anywhere on Earth, at any time, for secret reasons based on secret evidence, in a secret process undertaken by unidentified officials."
We associate the start of the drone attacks with the U.S. and their post-9/11 counter-terrorist strategy but the military use of drones started long before that, in Israel, a country that has the longest track record for targeted killing (aka "targeted prevention") of Palestinians. Targeted killings can be defined as the state-sponsored practice of eliminating enemies outside the territory.
Nowadays, most of the drones sold around the world are used for surveillance purposes but it has been forecast that in 10 years every country will have armed drones.
60% of the world export of drones come from Israel. Israeli manufacturer Elbit is producing the best selling model: the Hermes drone which was used in the latest attacks on Gaza. 37% of the killings that occurred during the attacks on Gaza can be attributed to drones.
One can see the appeal of drones for governments and policy makers: they are relatively cheap, they are claimed to be 'surgically precise', they make it easy to kill without any risk and they allow the army to reach their target in areas that would otherwise be difficult to reach. But do their use comply with the martial law?
Targeted killings are generally unlawful under international laws.
The laws under war time are more permissible regarding the use of lethal forces. However, the right to use armed force is not unlimited. Civilians, for example, need to be protected from direct attacks.
States have thus expanded the concept of war on the battlefield as to include situations that should in fact be regulated by law enforcement agencies. The 'war on terror' is a total war for which no end nor boundaries is conceived. The number of enemies is infinite too. Governments justify the use of lethal forces by claiming that this is 'anticipatory self-defense' but, under the laws applicable under war time, the self-defense argument allows killing only when all other solutions, such as capture, have been exhausted. Most targeted killings outside the battlefield constitute thus premeditated deprivations of life, violations of the right to life.
When killings cannot be justified they constitute war crimes and other states have the duty to investigate and not leave dormant this huge accountability vacuum.
Tactical Technology Collective, Unseen War (Exposing the Invisible)
The final speaker was Marek Tuszynski, the co-founder of Tactical Tech, an organization 'dedicated to the use of information in activism.'
Tuszynski's talk focused on a series of short documentaries called Exposing the Invisible. The films look at the investigative work of journalists, artists, reporters, activists and technologists who explore publicly accessible data in order counter mainstream reports and go further than traditional journalistic investigations. One of the documentaries, Unseen War examines the physical, moral and political invisibility of US drone strikes in Pakistan.
He argued that counter powers should build their own intelligence practice.
The operations in Pakistan might be located far away but they concern us because
But there's no reason to be passive, we need to protect ourselves because surveillance doesn't require machines flying above our heads, we are already providing a vast quantity of valuable indormation when we use social media and that data can be used to analyse our digital behaviour. To protect yourself from intrusion to privacy, check out Tactical Tech's Security in-a-Box website.
Image on the homepage via BBC.
Berlin-based artists Christoph Wachter & Mathias Jud have installed WLAN / WiFi mesh network with can antennas on the roofs of the Academy of Arts and the Swiss Embassy, both located in the heart of "NSA's Secret Spy Hub" in the city. The network is at the disposal of passersby who would like to communicate anonymously and even send messages to operatives of the NSA and GCHQ intelligence who might lurk inside the nearby British Embassy and Embassy of the United States.
The installation is a direct reference to Edward Snowden's revelations that the U.S.' NSA, the UK's GCHQ and other key partners were operating a network of electronic spy posts hidden within the fabric of diplomatic buildings around the world.
Wachter and Jud's DIY can antennas don't hide themselves. They stand in plain sight between the camouflaged US and British listening posts and their network stretches over the administrative district of Berlin.
At the point at which the interception of Angela Merkel's cell phone occurred, the open network of anonymous communication options now unfolds as a legal and legitimate response to rigid restrictions on our freedoms and hidden, secret surveillance.
Messages can be sent to the intelligence agencies on the frequencies that are intercepted by the NSA and GCHQ. These personal messages include activist and political contributions, ironic disclosure of embarrassing intimacy, and calls for resistance. Many appeals are aimed directly at the surveillance operatives asking them to switch sides and become whistleblowers.
Mathias Jud was kind enough to answer my questions about the installation:
Hi Mathias! How did you get the authorizations to install the antennas? By the way, did you ask for authorisations?
The whole region is under special protection as it is next to the Parliament and the German Federal Chancellery. Surveillance, Police and Security are omnipresent. During our build up of the antenna tower a special Police helicopter with a pivoting surveillance cam was circling above us.
We also asked the Academy of Arts that is located next to the US embassy at the Brandenburg Gate. (The Academy of Arts is not an university, but an international 'master' academy of artists that was funded by a former Prussian king, and an art museum and collection.) Klaus Staeck, the President of the Academy and himself an active political graphic designer was very fond of the idea and promoted it together with Birgit Hein, the chief of the section Visual Arts.
In the last year we spent a lot of time discussing this project to be able to realise it. It is completely legal, and has the approval of the Swiss ambassador, the Swiss foreign office. The members of the Academy of the Arts discussed this project in their annual meeting and voted in favour of it. The German Federal Chancellery has been informed by the Swiss embassy.
Although our constitutional rights are restricted in the non-protest zone in the government district, there is no restriction of digital communication. With our qaul.net network that is the technological basis of the "Can you hear me?" installation we can experience a completely user-based network without any service provider as gate keeper and regulatory force in the network.
You organize guided tours. What do you show people exactly?
Guided tours are a possibility to discuss the project with us and to experience the special rules in the government district and the restricted zones in front of the embassies. We experience together the mesh network, and the area. We show how we built the antennas, discuss the network, the artwork and the philosophy behind it.
You also encourage people to send messages to operatives of the NSA and GCHQ intelligence, is that correct? how do you know how to reach them?
There is a special veneered wall at the US embassy, clearly discovered by infrared cameras where, according to the Snowden files, the listening post of the NSA is located. The GCHQ has a white radome where, according to the Snowden files, the listening post of the British is located.
Our antenna-tower on the roof of the Academy of the Arts is right in the middle of these listening posts and has a clear connection to them.
All messages in the WIFI mesh network are sent unencrypted to all participants in the network.
See also: Julian Oliver and Daniil Vasiliev's PRISM: The Beacon Frame. Speculative NSA Network Surveillance Equipment which was swiftly censored.)