28.12.2013 Views

Theories of the Information Society, Third Edition - Cryptome

Theories of the Information Society, Third Edition - Cryptome

Theories of the Information Society, Third Edition - Cryptome

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

INFORMATION, REFLEXIVITY AND SURVEILLANCE<br />

1<br />

1<br />

1<br />

2<br />

September <strong>of</strong> that year. The invasion quickly came to a close when <strong>the</strong> US<br />

brought down <strong>the</strong> Taliban regime after little soldier-to-soldier combat and<br />

unmatchable air attacks from <strong>the</strong> Americans. In 2003 <strong>the</strong> US bombing campaign<br />

<strong>of</strong> Iraq, appositely titled ‘Shock and Awe’, and <strong>the</strong> lack <strong>of</strong> an Iraqi air force<br />

capable <strong>of</strong> <strong>of</strong>fering resistance, led to US victory within four weeks. There were<br />

but a few score allied casualties (most from ‘friendly fire’); Iraqi deaths were not<br />

counted, not least since many soldiers were pulverised before <strong>the</strong>y could mount<br />

any response, though estimates put Iraqi military deaths in excess <strong>of</strong> 30,000. 1<br />

Media coverage was assiduously controlled during <strong>the</strong>se campaigns by<br />

tactics ranging from special briefings to accredited ‘embeds’, though it should be<br />

emphasised that, while efforts to manage <strong>the</strong> media were extensive, such was <strong>the</strong><br />

complexity and variation within <strong>the</strong> information environment enveloping <strong>the</strong> Iraq<br />

War – thousands <strong>of</strong> journalists from around <strong>the</strong> world, diverse world opinion<br />

on <strong>the</strong> legitimacy <strong>of</strong> <strong>the</strong> invasion, versatile technologies, notably video phones<br />

with satellite transmission that allowed reportage direct from journalists from<br />

pretty well any location, pr<strong>of</strong>essional ethics <strong>of</strong> especially <strong>the</strong> more experienced<br />

reporters, <strong>the</strong> Al Jazeera news network, e-mail and <strong>the</strong> Internet, etc. – that all<br />

endeavours to channel media in a straightforward manner were <strong>of</strong>ten undermined.<br />

Nothing more vividly illustrates <strong>the</strong> frustrations <strong>of</strong> attempts at media<br />

management by <strong>the</strong> military forces than <strong>the</strong> images that emerged in April 2004<br />

from digital cameras <strong>of</strong> prisoners being abused and even tortured by American<br />

guards at Abu Ghraib in Baghdad. These images undermined efforts to present<br />

<strong>the</strong> invasion as a liberation and did incalculable damage to <strong>the</strong> allied forces<br />

as <strong>the</strong> images were reproduced, amplified and commented upon around <strong>the</strong><br />

world (Tumber and Webster, 2006).<br />

Surveillance and national defence<br />

1<br />

1<br />

There may be some who, pointing to <strong>the</strong> end <strong>of</strong> <strong>the</strong> Cold War that cast such a<br />

pall across <strong>the</strong> post-1945 world, believe that <strong>the</strong> imperatives that drive defence<br />

institutions have been removed. Against this, it is crucial to realise that, while <strong>the</strong><br />

Cold War did provide a powerful raison d’être for surveillance, <strong>the</strong> ‘preconditions<br />

for intelligence as a permanent government function lie in <strong>the</strong> modern state<br />

system’ (Whitaker, 1992, p. 121). Because it is <strong>the</strong> first duty <strong>of</strong> any government<br />

to protect its frontiers, <strong>the</strong>re is an insatiable hunger for information about<br />

anything affecting national interests, and sight <strong>of</strong> <strong>the</strong> communist monster is not<br />

essential to stimulate this appetite. ‘Rogue’ states and terrorists especially, but<br />

even anti-capitalist protest, legitimise continued surveillance. The consequence<br />

has been <strong>the</strong> construction <strong>of</strong> a massive system <strong>of</strong> interlinked technologies to<br />

monitor routinely and continuously and inspect events and activities – military<br />

and civilian – around <strong>the</strong> globe (Richelson and Ball, 1986). For instance, Echelon,<br />

a US-led electronic spying network, has capacity to store 5 trillion pages <strong>of</strong> text<br />

gleaned from monitored e-mail and fax messages (Bamford, 2001).<br />

Alongside computers, satellites are a linchpin <strong>of</strong> surveillance activities.<br />

Necessarily, <strong>the</strong>se systems are hidden from public view, secrecy being essential<br />

217

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!