28.12.2013 Views

Theories of the Information Society, Third Edition - Cryptome

Theories of the Information Society, Third Edition - Cryptome

Theories of the Information Society, Third Edition - Cryptome

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

INFORMATION, REFLEXIVITY AND SURVEILLANCE<br />

1<br />

1<br />

1<br />

2<br />

1<br />

1<br />

war in which <strong>the</strong>ir own civilian population will be unsca<strong>the</strong>d; Shaw, 2005).<br />

Conduct <strong>of</strong> war will rely on relatively small numbers <strong>of</strong> pr<strong>of</strong>essional soldiers,<br />

pilots and support teams. This represents a shift in <strong>the</strong> military towards what<br />

has been called ‘knowledge warriors’ (T<strong>of</strong>fler and T<strong>of</strong>fler, 1993), a term which<br />

underscores <strong>the</strong> centrality <strong>of</strong> personnel adept, not in unarmed combat or even<br />

in riflemanship, but in handling complex and highly computerised tools such<br />

as advanced fighter aircraft, surveillance systems and guidance technologies.<br />

• Great attention is devoted to perception management <strong>of</strong> <strong>the</strong> population at home<br />

and, indeed, round <strong>the</strong> world. This is especially pressing in democratic nations<br />

where public opinion is an important factor in <strong>the</strong> war effort and where a fear<br />

for military leaders is a concerted reaction against <strong>the</strong> war domestically, since<br />

this may impinge on <strong>the</strong> fighting capability <strong>of</strong> <strong>the</strong>ir forces. Fur<strong>the</strong>r, <strong>the</strong>re is<br />

widespread apprehension that <strong>the</strong> public will react to vivid pictures <strong>of</strong> <strong>the</strong><br />

wrong sort (say, bloodied bodies ra<strong>the</strong>r than ‘precision strikes on legitimate<br />

targets’). Inevitably, this impels military leaders into careful planning for and<br />

management <strong>of</strong> information from and about <strong>the</strong> war, though at <strong>the</strong> same time<br />

assiduous efforts must be made to avoid <strong>the</strong> charge <strong>of</strong> censorship, since this<br />

flies in <strong>the</strong> face <strong>of</strong> democratic states having a ‘free media’ and undermines <strong>the</strong><br />

persuasiveness <strong>of</strong> what does get reported. Perception management must<br />

<strong>the</strong>refore combine ways <strong>of</strong> ensuring a continuous stream <strong>of</strong> media coverage<br />

that is positive and yet ostensibly freely ga<strong>the</strong>red by independent news agencies.<br />

Coverage <strong>of</strong> <strong>the</strong> Gulf War in 1991 may be seen as evidence <strong>of</strong> first-rate<br />

‘perception management’, since it achieved massive media attention yet was<br />

antiseptic in substance. However, <strong>the</strong> Second Gulf War <strong>of</strong> 2003 was much<br />

more <strong>of</strong> a problem for <strong>the</strong> perception managers, with recurrent instances <strong>of</strong><br />

non-desirable images – suspects being electrocuted and sexually abused,<br />

hostages begging for <strong>the</strong>ir lives while being filmed by <strong>the</strong> enemy – appearing<br />

on <strong>the</strong> screens <strong>of</strong> televisions back home and a steady stream <strong>of</strong> oppositional<br />

interpretation being aired (Tumber and Webster, 2006).<br />

• <strong>Information</strong> war is conducted using exceptionally sophisticated technologies.<br />

Obviously this is most evident among <strong>the</strong> forces <strong>of</strong> <strong>the</strong> United States that have<br />

massive resources (<strong>the</strong> US defence budget alone accounts for 40 per cent <strong>of</strong><br />

world military expenditure and is bigger than that <strong>of</strong> every prospective enemy<br />

and neutral country combined). Just one indication <strong>of</strong> this is that about onethird<br />

<strong>of</strong> <strong>the</strong> British Ministry <strong>of</strong> Defence’s equipment procurement budget, currently<br />

about $15 billion per year, is accounted for by ‘Command and <strong>Information</strong><br />

Systems’ alone. When added to expenditure on ‘Weapons and Electronic<br />

Systems’ and ‘Aircraft Systems’, over half <strong>the</strong> budget is accounted for.<br />

• The technologies <strong>of</strong> cyberwar are information saturated. We may speak now <strong>of</strong><br />

<strong>the</strong> digitalisation <strong>of</strong> <strong>the</strong> battlefield, though computerisation reaches much<br />

fur<strong>the</strong>r to <strong>the</strong> entire range <strong>of</strong> command and control facilities (Barnaby, 1986;<br />

Munro, 1991; Berkowitz, 2003).<br />

• <strong>Information</strong> war no longer requires <strong>the</strong> mobilisation ei<strong>the</strong>r <strong>of</strong> <strong>the</strong> citizenry or<br />

<strong>of</strong> industry for <strong>the</strong> war effort. It relies instead on capturing only <strong>the</strong> leading<br />

edges <strong>of</strong> industrial innovation for military purposes – for instance, electronic<br />

engineering, computing, telecommunications and aerospace.<br />

215

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!