Click amount to donate direct to CounterPunch
  • $25
  • $50
  • $100
  • $500
  • $other
  • use PayPal
Please Support CounterPunch’s Annual Fund Drive
We don’t run corporate ads. We don’t shake our readers down for money every month or every quarter like some other sites out there. We only ask you once a year, but when we ask we mean it. So, please, help as much as you can. We provide our site for free to all, but the bandwidth we pay to do so doesn’t come cheap. All contributions are tax-deductible.
FacebookTwitterGoogle+RedditEmail

The NSA and the Infrastructure of the Surveillance State

It has long been known that cyberspace is one of the main battlegrounds in the 21st century. However, last week’s shocking revelations about the NSA’s surveillance and data-gathering activities illustrate the extent to which US intelligence seeks “full-spectrum dominance” in cyberspace.

Although there have been myriad articles in recent days about the various aspects of the NSA surveillance story, none seem to focus on the fact that US intelligence effectively has access to all data transmitted, not just that on Verizon or Google servers. Essentially, the intelligence community – a convenient euphemism for that complex that includes private contractors and government agencies – acts much like a filter, sifting and straining all information through its various systems. However, it is important to realize that the system that the government has established is an all-encompassing one, including access to data in company servers in addition to access to the cable and fiber-optic infrastructure that actually transmits the data.

On the one hand, there is the PRISM system which, as the Washington Post reported, allows “The National Security Agency and the FBI [to tap] directly into the central servers of nine leading U.S. internet companies, extracting audio and video chats, photographs, emails, documents, and connection logs.” Aside from being a blatant violation of the 4th Amendment of the US Constitution, Article 8 of the European Convention on Human Rights, and countless other international standards, the program has been vigorously defended by Obama Administration officials who, like their predecessors in the Bush Administration, invoke the always convenient “National Security” trump card to justify their illegal actions.

The PRISM system should be understood as a collusion between the NSA and major internet companies against the interests of ordinary Americans. Because the PRISM system is justified as being used solely to “target and track foreign targets,” somehow American citizens are supposed to feel at ease. It is important to note that PRISM makes use of obviously illegal tactics which “circumvent formal legal processes…to seek personal material such as emails, photos and videos.” This is the crux of the PRISM aspect of this scandal: it is blatantly illegal.

If PRISM were the only system being used by the government agencies, then the story would not be nearly as frightening as it is. Instead, we must also examine the so-called BLARNEY system which “Gathers up metadata from choke points along the backbone of the internet as part of an ongoing collection program the leverages IC (intelligence community) and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.” This system allows the NSA (and likely other government agencies) to control the flow of all information transmitted via fiber-optic cables.

As the Electronic Frontier Foundation wrote in its summary of the testimonies of former AT&T technician Mark Klein and former Senior Advisor for Internet Technology at the FCC Scott Marcus, “Using a device called a ‘splitter’ a complete copy of the internet traffic that AT&T receives…is diverted onto a separate fiber-optic cable which is connected to a room which is controlled by the NSA.” Therefore, unlike PRISM, which the government and its apologists attempt to justify as being used to target key individuals, BLARNEY has no such capacity. Rather, it is designed solely to collect data, all internet data, to be used and likely stored.

Naturally, the revelations about the BLARNEY system shed light on the possible motivations of the NSA for the construction of enormous data storage facilities such as the Utah Data Center in Bluffdale, Utah. As reported in Wired magazine:

But “this is more than just a data center,” says one senior intelligence official who until recently was involved with the program. The mammoth Bluffdale center will have another important and far more secret role that until now has gone unrevealed… According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US. The upshot, according to this official: “Everybody’s a target; everybody with communication is a target.”

This facility, along with others that likely exist but remain secret, is an integral part of the surveillance state system. It is not enough to simply capture all the communications data, it must be stored and readily available. What the NSA primarily, and other agencies secondarily, are doing is developing a cyber-infrastructure that both incorporates, and is independent of, internet companies and service providers. While relying on corporations’ for access to data and networks, the NSA simultaneously has developed a parallel structure for information gathering and storage that is not only outside the control of private companies, it is outside the law.

Of course, there are many political and economic factors that play into this issue. The legal framework developed in the post-9/11 era including draconian legislation such as the PATRIOT Act, the National Defense Authorization Act (NDAA), and many others, laid the foundation for the systemic and systematic stripping away of civil liberties and human rights. The technical infrastructure has been steadily evolving since 9/11 as technology continues to improve, providing the intelligence agencies with ever more tools for surveillance and intelligence gathering. The continued, unrestrained neoliberal policy of privatization has created a complex network of companies, contractors, and subcontractors, usually working independently of each other, all in the service of the security state. Finally, the political landscape in the United States has so thoroughly devolved that elected officials are more concerned about stopping the whistleblowers and leakers, than about addressing America’s continued descent into a fascist police state.

Despite all of this, Americans continue to be told that this is the “sweet land of liberty”. We may be able to buy Nike sneakers and flat screen TVs, but that’s not liberty. We may be able to tweet with our iPhones and download our favorite movies, but that’s not liberty either. Rather, as George Orwell famously wrote, “If liberty means anything at all, it means the right to tell people what they do not want to hear.” So yes, tell the people what they don’t want to hear. Just know this…someone will be listening.

Eric Draitser is the founder of StopImperialism.com. He is an independent geopolitical analyst based in New York City. You can reach him at ericdraitser@gmail.com.

More articles by:

Eric Draitser is the founder of StopImperialism.org and host of CounterPunch Radio. He is an independent geopolitical analyst based in New York City. You can reach him at ericdraitser@gmail.com.

October 15, 2018
Rob Urie
Climate Crisis is Upon Us
Conn Hallinan
Syria’s Chessboard
Patrick Cockburn
The Saudi Atrocities in Yemen are a Worse Story Than the Disappearance of Jamal Khashoggi
Sheldon Richman
Trump’s Middle East Delusions Persist
Justin T. McPhee
Uberrima Fides? Witness K, East Timor and the Economy of Espionage
Tom Gill
Spain’s Left Turn?
Jeff Cohen
Few Democrats Offer Alternatives to War-Weary Voters
Dean Baker
Corporate Debt Scares
Gary Leupp
The Khashoggi Affair and and the Anti-Iran Axis
Russell Mokhiber
Sarah Chayes Calls on West Virginians to Write In No More Manchins
Clark T. Scott
Acclimated Behaviorisms
Kary Love
Evolution of Religion
Colin Todhunter
From GM Potatoes to Glyphosate: Regulatory Delinquency and Toxic Agriculture
Binoy Kampmark
Evacuating Nauru: Médecins Sans Frontières and Australia’s Refugee Dilemma
Marvin Kitman
The Kitman Plan for Peace in the Middle East: Two Proposals
Weekend Edition
October 12, 2018
Friday - Sunday
Becky Grant
My History with Alexander Cockburn and The Financial Future of CounterPunch
Paul Street
For Popular Sovereignty, Beyond Absurdity
Nick Pemberton
The Colonial Pantsuit: What We Didn’t Want to Know About Africa
Jeffrey St. Clair
The Summer of No Return
Jeff Halper
Choices Made: From Zionist Settler Colonialism to Decolonization
Gary Leupp
The Khashoggi Incident: Trump’s Special Relationship With the Saudi Monarchy
Andrew Levine
Democrats: Boost, Knock, Enthuse
Barbara Kantz
The Deportation Crisis: Report From Long Island
Doug Johnson
Nate Silver and 538’s Measurable 3.5% Democratic Bias and the 2018 House Race
Gwen Carr
This Stops Today: Seeking Justice for My Son Eric Garner
Robert Hunziker
Peak Carbon Emissions By 2020, or Else!
Arshad Khan
Is There Hope on a World Warming at 1.5 Degrees Celsius?
David Rosen
Packing the Supreme Court in the 21stCentury
Brian Cloughley
Trump’s Threats of Death and Destruction
Joel A. Harrison
The Case for a Non-Profit Single-Payer Healthcare System
Ramzy Baroud
That Single Line of Blood: Nassir al-Mosabeh and Mohammed al-Durrah
Zhivko Illeieff
Addiction and Microtargeting: How “Social” Networks Expose us to Manipulation
ADRIAN KUZMINSKI
What is Truth?
Michael Doliner
Were the Constitution and the Bill of Rights a Mistake?
Victor Grossman
Cassandra Calls
Ralph E. Shaffer
Could Kavanaugh’s Confirmation Hearing Ended Differently?
Vanessa Cid
Our Everyday Family Separations
Walaa Al Ghussein
The Risks of Being a Journalist in Gaza
Ron Jacobs
Betrayal and Treachery—The Extremism of Moderates
James Munson
Identity Politics and the Ruling Class
P. Sainath
The Floods of Kerala: the Bank That Went Under…Almost
Ariel Dorfman
How We Roasted Donald Duck, Disney’s Agent of Imperialism
Joe Emersberger
Ecuadorian President Lenin Moreno’s Assault on Human Rights and Judicial Independence
Ed Meek
White Victimhood: Brett Kavanaugh and the New GOP Brand
Andrew McLean, MD
A Call for “Open Space”
FacebookTwitterGoogle+RedditEmail