Theories of the Information Society, Third Edition - Cryptome
Theories of the Information Society, Third Edition - Cryptome
Theories of the Information Society, Third Edition - Cryptome
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
INFORMATION, REFLEXIVITY AND SURVEILLANCE<br />
1<br />
1<br />
1<br />
2<br />
September <strong>of</strong> that year. The invasion quickly came to a close when <strong>the</strong> US<br />
brought down <strong>the</strong> Taliban regime after little soldier-to-soldier combat and<br />
unmatchable air attacks from <strong>the</strong> Americans. In 2003 <strong>the</strong> US bombing campaign<br />
<strong>of</strong> Iraq, appositely titled ‘Shock and Awe’, and <strong>the</strong> lack <strong>of</strong> an Iraqi air force<br />
capable <strong>of</strong> <strong>of</strong>fering resistance, led to US victory within four weeks. There were<br />
but a few score allied casualties (most from ‘friendly fire’); Iraqi deaths were not<br />
counted, not least since many soldiers were pulverised before <strong>the</strong>y could mount<br />
any response, though estimates put Iraqi military deaths in excess <strong>of</strong> 30,000. 1<br />
Media coverage was assiduously controlled during <strong>the</strong>se campaigns by<br />
tactics ranging from special briefings to accredited ‘embeds’, though it should be<br />
emphasised that, while efforts to manage <strong>the</strong> media were extensive, such was <strong>the</strong><br />
complexity and variation within <strong>the</strong> information environment enveloping <strong>the</strong> Iraq<br />
War – thousands <strong>of</strong> journalists from around <strong>the</strong> world, diverse world opinion<br />
on <strong>the</strong> legitimacy <strong>of</strong> <strong>the</strong> invasion, versatile technologies, notably video phones<br />
with satellite transmission that allowed reportage direct from journalists from<br />
pretty well any location, pr<strong>of</strong>essional ethics <strong>of</strong> especially <strong>the</strong> more experienced<br />
reporters, <strong>the</strong> Al Jazeera news network, e-mail and <strong>the</strong> Internet, etc. – that all<br />
endeavours to channel media in a straightforward manner were <strong>of</strong>ten undermined.<br />
Nothing more vividly illustrates <strong>the</strong> frustrations <strong>of</strong> attempts at media<br />
management by <strong>the</strong> military forces than <strong>the</strong> images that emerged in April 2004<br />
from digital cameras <strong>of</strong> prisoners being abused and even tortured by American<br />
guards at Abu Ghraib in Baghdad. These images undermined efforts to present<br />
<strong>the</strong> invasion as a liberation and did incalculable damage to <strong>the</strong> allied forces<br />
as <strong>the</strong> images were reproduced, amplified and commented upon around <strong>the</strong><br />
world (Tumber and Webster, 2006).<br />
Surveillance and national defence<br />
1<br />
1<br />
There may be some who, pointing to <strong>the</strong> end <strong>of</strong> <strong>the</strong> Cold War that cast such a<br />
pall across <strong>the</strong> post-1945 world, believe that <strong>the</strong> imperatives that drive defence<br />
institutions have been removed. Against this, it is crucial to realise that, while <strong>the</strong><br />
Cold War did provide a powerful raison d’être for surveillance, <strong>the</strong> ‘preconditions<br />
for intelligence as a permanent government function lie in <strong>the</strong> modern state<br />
system’ (Whitaker, 1992, p. 121). Because it is <strong>the</strong> first duty <strong>of</strong> any government<br />
to protect its frontiers, <strong>the</strong>re is an insatiable hunger for information about<br />
anything affecting national interests, and sight <strong>of</strong> <strong>the</strong> communist monster is not<br />
essential to stimulate this appetite. ‘Rogue’ states and terrorists especially, but<br />
even anti-capitalist protest, legitimise continued surveillance. The consequence<br />
has been <strong>the</strong> construction <strong>of</strong> a massive system <strong>of</strong> interlinked technologies to<br />
monitor routinely and continuously and inspect events and activities – military<br />
and civilian – around <strong>the</strong> globe (Richelson and Ball, 1986). For instance, Echelon,<br />
a US-led electronic spying network, has capacity to store 5 trillion pages <strong>of</strong> text<br />
gleaned from monitored e-mail and fax messages (Bamford, 2001).<br />
Alongside computers, satellites are a linchpin <strong>of</strong> surveillance activities.<br />
Necessarily, <strong>the</strong>se systems are hidden from public view, secrecy being essential<br />
217