Theories of the Information Society, Third Edition - Cryptome
Theories of the Information Society, Third Edition - Cryptome
Theories of the Information Society, Third Edition - Cryptome
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
INFORMATION, REFLEXIVITY AND SURVEILLANCE<br />
1<br />
1<br />
1<br />
2<br />
1<br />
1<br />
war in which <strong>the</strong>ir own civilian population will be unsca<strong>the</strong>d; Shaw, 2005).<br />
Conduct <strong>of</strong> war will rely on relatively small numbers <strong>of</strong> pr<strong>of</strong>essional soldiers,<br />
pilots and support teams. This represents a shift in <strong>the</strong> military towards what<br />
has been called ‘knowledge warriors’ (T<strong>of</strong>fler and T<strong>of</strong>fler, 1993), a term which<br />
underscores <strong>the</strong> centrality <strong>of</strong> personnel adept, not in unarmed combat or even<br />
in riflemanship, but in handling complex and highly computerised tools such<br />
as advanced fighter aircraft, surveillance systems and guidance technologies.<br />
• Great attention is devoted to perception management <strong>of</strong> <strong>the</strong> population at home<br />
and, indeed, round <strong>the</strong> world. This is especially pressing in democratic nations<br />
where public opinion is an important factor in <strong>the</strong> war effort and where a fear<br />
for military leaders is a concerted reaction against <strong>the</strong> war domestically, since<br />
this may impinge on <strong>the</strong> fighting capability <strong>of</strong> <strong>the</strong>ir forces. Fur<strong>the</strong>r, <strong>the</strong>re is<br />
widespread apprehension that <strong>the</strong> public will react to vivid pictures <strong>of</strong> <strong>the</strong><br />
wrong sort (say, bloodied bodies ra<strong>the</strong>r than ‘precision strikes on legitimate<br />
targets’). Inevitably, this impels military leaders into careful planning for and<br />
management <strong>of</strong> information from and about <strong>the</strong> war, though at <strong>the</strong> same time<br />
assiduous efforts must be made to avoid <strong>the</strong> charge <strong>of</strong> censorship, since this<br />
flies in <strong>the</strong> face <strong>of</strong> democratic states having a ‘free media’ and undermines <strong>the</strong><br />
persuasiveness <strong>of</strong> what does get reported. Perception management must<br />
<strong>the</strong>refore combine ways <strong>of</strong> ensuring a continuous stream <strong>of</strong> media coverage<br />
that is positive and yet ostensibly freely ga<strong>the</strong>red by independent news agencies.<br />
Coverage <strong>of</strong> <strong>the</strong> Gulf War in 1991 may be seen as evidence <strong>of</strong> first-rate<br />
‘perception management’, since it achieved massive media attention yet was<br />
antiseptic in substance. However, <strong>the</strong> Second Gulf War <strong>of</strong> 2003 was much<br />
more <strong>of</strong> a problem for <strong>the</strong> perception managers, with recurrent instances <strong>of</strong><br />
non-desirable images – suspects being electrocuted and sexually abused,<br />
hostages begging for <strong>the</strong>ir lives while being filmed by <strong>the</strong> enemy – appearing<br />
on <strong>the</strong> screens <strong>of</strong> televisions back home and a steady stream <strong>of</strong> oppositional<br />
interpretation being aired (Tumber and Webster, 2006).<br />
• <strong>Information</strong> war is conducted using exceptionally sophisticated technologies.<br />
Obviously this is most evident among <strong>the</strong> forces <strong>of</strong> <strong>the</strong> United States that have<br />
massive resources (<strong>the</strong> US defence budget alone accounts for 40 per cent <strong>of</strong><br />
world military expenditure and is bigger than that <strong>of</strong> every prospective enemy<br />
and neutral country combined). Just one indication <strong>of</strong> this is that about onethird<br />
<strong>of</strong> <strong>the</strong> British Ministry <strong>of</strong> Defence’s equipment procurement budget, currently<br />
about $15 billion per year, is accounted for by ‘Command and <strong>Information</strong><br />
Systems’ alone. When added to expenditure on ‘Weapons and Electronic<br />
Systems’ and ‘Aircraft Systems’, over half <strong>the</strong> budget is accounted for.<br />
• The technologies <strong>of</strong> cyberwar are information saturated. We may speak now <strong>of</strong><br />
<strong>the</strong> digitalisation <strong>of</strong> <strong>the</strong> battlefield, though computerisation reaches much<br />
fur<strong>the</strong>r to <strong>the</strong> entire range <strong>of</strong> command and control facilities (Barnaby, 1986;<br />
Munro, 1991; Berkowitz, 2003).<br />
• <strong>Information</strong> war no longer requires <strong>the</strong> mobilisation ei<strong>the</strong>r <strong>of</strong> <strong>the</strong> citizenry or<br />
<strong>of</strong> industry for <strong>the</strong> war effort. It relies instead on capturing only <strong>the</strong> leading<br />
edges <strong>of</strong> industrial innovation for military purposes – for instance, electronic<br />
engineering, computing, telecommunications and aerospace.<br />
215