Digital breaches

In my latest posts on the wars in Syria – Cities under Siege here and here – I tried to open a space for the voices of those inside the siege lines.  To supplement those discussions, I want to notice two other digital breaches of siege lines, one in Mosul in Iraq and the other in East Ghouta in Damascus.

Although the Syrian regime has been either unwilling or unable to prevent digital access to the world outside its barricades (no doubt for a variety of reasons), Islamic State has persistently sought to isolate the communities it controls from within.  For example:

In Mosul, Omar Mohammed – a 31 year-old ‘stealth historian‘ – risked his life to chronicle life under IS in a remarkable series of posts: Mosul Eye.  When he lost his job teaching ancient history at the university in June 2014 he started an anonymous blog and became the eponymous ‘Mosul Eye’.

Lori Hinnant and Maggi Michael reported for AP:

Anonymous for more than three years, Mohammed wandered the streets of occupied Mosul by day, chatting with shopkeepers and Islamic State fighters, visiting friends who worked at the hospital, swapping scraps of information. He grew out his hair and his beard and wore the shortened trousers required by the extremists. He forced himself to witness the beheadings and deaths by stoning, so he could hear killers call out the names of the condemned and their supposed crimes.

By night, he was Mosul Eye, and from his darkened room he told the world what was happening. If caught, he knew he would be killed.

Writing in the New Yorker in October 2016,  Robin Wright explained that Mosul Eye

provided details about life under the caliphate—initially offering hourly reports regarding roads around Mosul that were safe to travel, and then, in the following weeks, reporting on the dawning anxiety about the heavily armed ISIS fighters, the power blackouts, the rising prices, the chaos in local markets, the panic over food shortages, and the occupiers’ utter brutality. Over the next year, Mosul Eye expanded into a Facebook page and a Twitter account. The posts were determinedly stoic—melancholic and inspiring at once.

For the past two weeks, as Mosul has become the epicenter of a new U.S.-backed offensive to defeat ISIS—also known as ISIL—Mosul Eye has been posting dozens of times a day on its social-media outlets. On Monday, it tweeted, “Today, Mosul has entered the atmosphere of the war. The bombardment is continuous on many areas of the city, specifically the southern and northeastern outskirts of the city.”

Mohammed paid smugglers to arrange his escape, and once outside of Mosul he eventually revealed his identity; it was not an easy decision but once he had made it, he said, he finally felt free.

Most of the published interviews with Mohammed took place once he was outside Mosul and his identity was known, but Wright managed to reach him over social media inside the besieged city and her report addressed the key questions of provenance and credibility:

Iraqis and Mideast scholars believe that the site is for real. Rasha al Aqeedi, a scholar from Mosul who now writes from Dubai, told me that “the information is reliable,” and added, “The perspective and ideology, however, reflect Mosul’s young intelligentsia: the will to review Islam and question religious texts and the fault lines along historic narratives.”

But the same questions dogged the two AP journalists en arrière, once they had met with him and he revealed his identity.  Here is their detailed response:

Omar gave us databases from his hard drive tracking the dead, noting daily events in Mosul. Each one was a separate file — totaling hundreds of files. The origin dates on each matched the date of the file, or at most was one or two days away from it. For his account of the day on the Tigris, he gave us multiple photos and a video from the day, each with an origin date in March 2015, which was when he said the events had happened. On Google Maps, he showed us the curve in the river where he picnicked, and zoomed on the marshy areas to show how it matched up with his account. As for himself blogging inside a dark room in his house in Mosul, he provided a video that AP used. He used maps to show his escape route. He showed on Google a list of the top students from his high school in Mosul, and his name was among the top five.

On the third day, just before we filmed over the course of about 90 minutes, he stepped away to make a phone call, in English, to announce that in a few minutes he would be shedding his anonymity as he didn’t want to be anonymous anymore. He showed us footage from his thesis defense, in which one of the professors accused him of secularism.

After the meetings, we asked Omar for contact information for his thesis advisor, who was among the few to figure out his identity during the early days of Mosul Eye; his younger brother, who he had told over the summer; activists and volunteers he worked with in Mosul; an American history professor he was in touch with via Skype since 2012, who knew his real identity. He provided all of this, and we spoke with all of them, including one person who, as it turns out, also figured out who he was and discovered that they have mutual friends. Omar provided us with links to his own scholarly work on Mosul. He sent over screen grabs of exchanges with a reporter from another news organization who he had worked with during the airstrikes to try and extract trapped civilians. He explained that, by that point, people were just messaging Mosul Eye in hopes he could help them. He acknowledged one other person had administrator access to the account: a Mosul woman now living in the U.S. who helped him with some of the interviews in English.

Omar explained to us how he cross-checked his information, and we put some of that into the story, but Mosul Eye isn’t an infallible source any more than anyone else, especially in a chaotic war environment. His death toll numbers, especially during the final months of the battle, are unconfirmed but in line with other estimates.That said, some of his unpublished notes read by Lori and Maggie, with origin dates from 2014 and 2015 and early 2016 especially, showed knowledge of IS that would only be published later. The leaflets he was collecting and publishing, the photos he was using to offer biographies and diagrams of their leadership showed a historian’s desire for documentation.

Several activists whom AP interviewed said that Mosul Eye was the only window to the outside world and that they have been closely following but fearing to even “like” or “share,” knowing that IS keeps an eye on social media.

I have cited this passage in its entirety because in the deformed world of “fake news” (which plainly did not start with Donald Trump, even if he embodies its digital metastasis: see also here and here), where today the alt.left is as pernicious as the alt.right in disparaging stories they don’t like, questions of veracity – and, to be sure, of positionality – have assumed a new and profoundly political importance  The vomit-inducing denial of systematic Russian and Syrian air strikes on hospitals and medical facilities across Syria is a case in point; the disingenuous disparagement of the work of MSF, the Syrian Civil Defence (the White Helmets) and a host of other non-government agencies is another.

It’s a complicated terrain, of course, and my second example illustrates something of what is at stake.  It comes from East Ghouta.  I’m preparing a major post on recent events there – it should be ready next week – and, as in my previous work, here too I’ve drawn on voices from inside the siege.  Many newsrooms and digital platforms have reported the extraordinary videos posted on Twitter and YouTube by 15 year-old Muhammad Najem: see here and here.

CNN reported:

Najem’s videos have a common theme: an appeal to the world to bear witness to what is happening in Syria.
“People should know about everything happening in Syria,” he told CNN. “I want to follow my studies. I want to become a reporter when I grow up. “Our blood begs every day. You watch it daily without any reaction from you,” Najem says in one video, wearing a Syrian flag draped around his neck like a scarf. “Our hunger, cold, and displacement have become a common sight. Save our people in Ghouta.”
In one of his most powerful videos, Najem stands on a rooftop as explosions echo in the distance. “We are killed by your silence,” he says.”

 

(If you read some of the comments below his videos on YouTube, you will discover the killing is not only accomplished by silence.)

The CNN report added the by now standard disclaimer – ‘CNN cannot independently verify the authenticity of these videos – but the tone and texture of their coverage makes it plain that CNN doubts neither their authenticity nor their accuracy.  There is no single, plenary Truth – Donna Haraway debunked the ‘God Trick’ ages ago – but passion and partiality do not automatically disqualify someone’s voice: still less so, when their position is so precarious.

But listen to this exchange from the state-owned France 24.

 

In one of the videos, Najem says he wants to become a reporter “when I am grown up”. But for Franco-American [photo]journalist Jonathan Alpeyrie, who covered the Syrian conflict (in 2013, he was held captive by an Islamist group for 81 days), “a journalist shouldn’t be seen… Otherwise he becomes the subject,” he told FRANCE 24. To Alpeyrie, the teenager is more activist than journalist. “He is hostile to Bashar al-Assad but the role of the press isn’t to take a stance….”

Although several news outlets have relayed the teenager’s testimony, Alpeyrie thinks it’s dangerous to do so: “We can’t confirm the provenance of these videos. He says that he’s filming in Eastern Ghouta, but we don’t know anything.”

 

Describing Najem’s videos as a series of ‘selfies’, France 24’s reporter asked philosopher-psychoanalyst Elsa Godart for her take on them:

If a teenager is behind the account, his reliance on the selfie can have different motivations, said Godart. In the worst situation, aside from manipulation: “We can envision an extreme narcissism, where one plays on a tragic event under the sympathetic guise of defending humanity.”

And if we assume that the gesture is real and sincere on the part of an adolescent on the ground? “Then this could be just as it appears: a selfie as an act of resistance. The Chinese artist Ai Weiwei documented his 2009 arrest with a selfie that he later exhibited as a work of art,” said Godart.

To her, the selfie taken at war is similar: “It denounces something extraordinary. It is a testimony of something that one feels a duty to report. ‘I am attacked, and here is the photographic evidence.’”

I hope it’s obvious what I think too.

The nuclear wastelands and cyberwar

I’m in Toronto, enjoying ‘Through Post-Atomic Eyes‘ enormously: wide-ranging yet focused, creative and critical, and above all wonderfully welcoming.  I’m also relieved – I’ve only been wandering in the nuclear wastelands for a matter of months, and being surrounded by scholars and artists who know so much more about these vexed issues has been truly invigorating.  I’ll post the slides from my presentation shortly – in the meantime, see here and here – but while I was searching for images I re-discovered this cover from The Economist:

economist_cyberwar

Since my own presentation tried to sort out the entangled geographies of nuclear weapons and drones, I would be the very last person to object to the continuity conjured up by The Economist‘s apocalyptic vision: in fact yesterday both Joseph Masco and James Bridle in two sparkling presentations emphasised the intimacy of  the connections between computing, nuclear testing and the security state.

So it seems appropriate that my  e-flânerie should also have led me to a special issue of CyberOrient, edited by Helga Tawil-Souri, is appropriately online now (and open access), devoted to cyberwarfare:

This special issue of CyberOrient engages with the relationships between “cyber” and “real” battlespaces, the mediatization of war, the need to expand our definition of warzones, and the importance of asking who participates in wars, to what ends, using what kinds of technologies, and for what purposes. Taken together, the five essays demonstrate the expansion and blurring of the spaces of war. As importantly, they highlight that even warfare that is “only” fought in the virtual realm is laced with violent intents and real-life repercussions. Not only can we not separate the cyber from the real so neatly, but we must not overlook that no matter how we wish to classify “new” or cyber wars, it is citizens, along with their ways of life and their cultural records, that continue to be by far the largest losers.

fp

Contents:

Helga Tawil-Souri, Problematizing Cyberwarfare

Donatella Della Ratta, Violence and visibility in contemporary Syria: an ethnography of the “expanded places

Ruth Tsuria, Islamophobia in online Arab media

Emily Fekete, The shifting nature of cyberwarfare in Middle Eastern states

Attila Kovacs, Visual representation, propaganda and cyberspace: the case of the Palestinian Islamist movements

Christoph Günter, Presenting the glossy look of warfare in cyberspace – the Islamic State’s magazine Dabiq

Visualising the invisible

The latest issue of Wired has a simply schematic map of ‘an invisible but vast war zone’ created by cyberattacks:

Cyberattacks mapped

Every month, it seems, a mammoth cyberattack sponsored by a nation state comes to light. In recent years, more than 20 countries have announced their intent to launch or beef up their offensive cyber capabilities. The result is a burgeoning digital arms race that presents a major threat to the security of our data.

But they are very late to the game (and there are also many internal threats to ‘the security of our data’: think NSA or GCHQ).  In October 2013 Google Ideas in collaboration with Arbor Networks launched an interactive map of daily Distributed Denial of Service (DDoS) attacks that attempt to make an online service unavailable by overwhelming it with traffic from multiple sources :

Digital attacks 29 September 2015

According to Arbor Networks,

Attackers build networks of infected computers, known as ‘botnets’, by spreading malicious software through emails, websites and social media. Once infected, these machines can be controlled remotely, without their owners’ knowledge, and used like an army to launch an attack against any target. Some botnets are millions of machines strong.  Botnets can generate huge floods of traffic to overwhelm a target. These floods can be generated in multiple ways, such as sending more connection requests than a server can handle, or having computers send the victim huge amounts of random data to use up the target’s bandwidth. Some attacks are so big they can max out a country’s international cable capacity.  Specialized online marketplaces exist to buy and sell botnets or individual DDoS attacks. Using these underground markets, anyone can pay a nominal fee to silence websites they disagree with or disrupt an organization’s online operations. A week-long DDoS attack, capable of taking a small organization offline can cost as little as $150.

I discussed these, and connected them to militarised cyberattacks in ‘The everywhere war’ [DOWNLOADS tab].

The site provides an illuminating typology of attacks – TCP connection attacks that attempt to use up all available connections; Volumetric attacks that use up bandwidth; Fragmentation attacks that send a flood of TCP or UDP fragments to a victim, overwhelming their ability to re-assemble the streams and severely reducing performance; and Application attacks that target applications.

There is also an instructive gallery of major attacks:

Gallery of major attacks

And in 2014 another internet security company, Norse, released a live stream of origins and targets of attack; I’ve pasted a screenshot below but there is also a YouTube video here.

NORSE Digital attacks

The image above — which looks like Missile Command on steroids — shows just a snippet of hacking attempts around the world, the countries from which they originate, and the countries that they are attacking.

In reality, the attackers are hitting what Norse calls honey pots — special traps designed to detect unwanted network intrusions by hackers. It’s important to note that the location an attack comes from isn’t necessarily its true origin, as hackers can make an attack look like it’s coming from one place when it’s really coming from another.

You can find a list of other cyber attack maps at CTF365 here.

Future imperfect and tense

A clutch of forthcoming books on war that seek, in different ways, to illuminate dimensions of what I’ve been calling ‘later modern war’:

Antonia ChayesBorderless Wars (due in August at an eye-popping price from Cambridge University Press):

9781107109346In 2011, Nasser Al-Awlaki, a terrorist on the US ‘kill list’ in Yemen, was targeted by the CIA. A week later, a military strike killed his son. The following year, the US Ambassador to Pakistan resigned, undermined by CIA-conducted drone strikes of which he had no knowledge or control. The demands of the new, borderless ‘gray area’ conflict have cast civilians and military into unaccustomed roles with inadequate legal underpinning. As the Department of Homeland Security defends against cyber threats and civilian contractors work in paramilitary roles abroad, the legal boundaries of war demand to be outlined. In this book, former Under Secretary of the Air Force Antonia Chayes examines these new ‘gray areas’ in counterinsurgency, counter-terrorism and cyber warfare. Her innovative solutions for role definition and transparency will establish new guidelines in a rapidly evolving military-legal environment.

Christopher Coker‘s Future War (due in September from Polity):

COKER Future WarWill tomorrow’s wars be dominated by autonomous drones, land robots and warriors wired into a cybernetic network which can read their thoughts? Will war be fought with greater or lesser humanity? Will it be played out in cyberspace and further afield in Low Earth Orbit? Or will it be fought more intensely still in the sprawling cities of the developing world, the grim black holes of social exclusion on our increasingly unequal planet? Will the Great Powers reinvent conflict between themselves or is war destined to become much ‘smaller’ both in terms of its actors and the beliefs for which they will be willing to kill?

In this illuminating new book Christopher Coker takes us on an incredible journey into the future of warfare. Focusing on contemporary trends that are changing the nature and dynamics of armed conflict, he shows how conflict will continue to evolve in ways that are unlikely to render our century any less bloody than the last. With insights from philosophy, cutting-edge scientific research and popular culture, Future War is a compelling and thought-provoking meditation on the shape of war to come.

Brian Massumi‘s Ontopower: War, Powers, and the State of Perception (due in September from Duke University Press):

MASSUMI OntopowerColor coded terror alerts, invasion, drone war, rampant surveillance: all manifestations of the type of new power Brian Massumi theorizes in Ontopower. Through an in-depth examination of the War on Terror and the culture of crisis, Massumi identifies the emergence of preemption, which he characterizes as the operative logic of our time. Security threats, regardless of the existence of credible intelligence, are now felt into reality. Whereas nations once waited for a clear and present danger to emerge before using force, a threat’s felt reality now demands launching a preemptive strike. Power refocuses on what may emerge, as that potential presents itself to feeling. This affective logic of potential washes back from the war front to become the dominant mode of power on the home front as well. This is ontopower—the mode of power embodying the logic of preemption across the full spectrum of force, from the “hard” (military intervention) to the “soft” (surveillance). With Ontopower, Massumi provides an original theory of power that explains not only current practices of war but the culture of insecurity permeating our contemporary neoliberal condition.

War at a distance

Porter-The-Global-Village-Myth-webNews from Patrick Porter of a new book due out in March, The global village myth: distance, war and the limits of power (from Hurst in the UK/Georgetown University Press in the US):

According to security elites, revolutions in information, transport, and weapons technologies have shrunk the world, leaving the United States and its allies more vulnerable than ever to violent threats like terrorism or cyberwar. As a result, they practice responses driven by fear: theories of falling dominoes, hysteria in place of sober debate, and an embrace of preemptive war to tame a chaotic world.

Patrick Porter challenges these ideas. In The Global Village Myth, he disputes globalism’s claims and the outcomes that so often waste blood and treasure in the pursuit of an unattainable “total” security. Porter reexamines the notion of the endangered global village by examining Al-Qaeda’s global guerilla movement, military tensions in the Taiwan Strait, and drones and cyberwar, two technologies often used by globalists to support their views. His critique exposes the folly of disastrous wars and the loss of civil liberties resulting from the globalist enterprise. Showing that technology expands rather than shrinks strategic space, Porter offers an alternative outlook to lead policymakers toward more sensible responses—and a wiser, more sustainable grand strategy.

You can get a preliminary preview of Patrick’s basic argument at War on the Rocks here.

Virtual Gaza

idffacebook

I had originally thought The everywhere war would include a reworked and extended version of my discussion of cyberwarfare and Stuxnet which appeared in the Geographical Journal (DOWNLOADS tab), but the chapter is now about ‘virtual’ battlespaces more generally – which are far from being purely ‘virtual’, of course – and includes some of the jottings I’ve made on the role of digital media in later modern war (see here and here).  With that in mind – but rather more than that in mind – I should update the part they are playing in Israel’s latest war on Gaza where, as the Wall Street Journal‘s headline on 23 July had it, ‘Israel and Hamas take fight to social media’.

The IDF is no stranger to information warfare and to the power of social media.  John Timpane explains the back-story succinctly:

In November 2012, Israel launched Operation Pillar of Defense – on Twitter. It thereby became the first nation to initiate hostilities by social media. Starting with a YouTube video of the aerial assassination of Hamas leader Ahmed al-Jabari, Pillar of Defense escalated the social-media war. The Israeli Defense Force (Twitter following: 292,000) tweeted times and places of rocket strikes against Israel. A rag-tag bunch of pro-Hamas Twitter feeds (such as the oft-shut-down @alqassam, with 11,000-plus followers), Facebook pages, and YouTube videos published images of torn bodies and bombed schools.

As of 2014, “both sides,” says [Lawrence] Husick, “have become remarkably more sophisticated in how they use social media to engage with the rest of the world.”

To provide some idea of the scale of operations, al-Jazeera has produced this remarkable representation of the unfolding of a global Twitterstorm about the war; what appears below are screenshots and you really need to watch the whole thing:

#Israelunderfire

#Gaza under attack

The resources each side has at its disposable are far from equal.  According to Harriet Sherwood:

The propaganda war between Israel and the Palestinians is not new, but this battle-round is being fought with unprecedented ferocity. And like the asymmetry in the military conflict, the strength and resources of the Israel social media troops outweigh those of Hamas and other Palestinian organisations.

And those asymmetries have increased. Max Schindler reports,

With dueling Twitter hashtags, Facebook posts and YouTube channels, the Israeli Defense Forces and Hamas, the Palestinian militant group, are trading not just fire but also barbs over social media, in an attempt to win hearts and minds around the world. But Hamas, barred from certain platforms, faces additional challenges in the Internet war.

In this round of violence, the social media battle has become increasingly important. Israel’s ability to wage its campaign in Gaza depends on the level of international criticism it sustains.

On Wednesday, Twitter suspended several accounts used by Hamas…. Twitter’s terms of service block use of the website to “a person barred from receiving services under the laws of the United States or other applicable jurisdiction.” Hamas is classified as a terrorist organization by the State Department, denying it access to American commercial products…. Facebook maintains a similar policy, and has deleted dozens of Hamas accounts due to American government restrictions.

All of this has still wider implications because many of the tweets and the cell-phone videos uploaded to YouTube(see below) re-circulate through mainstream media too – though my strong suspicion is that the cautionary ‘cannot be verified‘ tag is used more often to diminish the suffering of people in Gaza than to call into question the IDF’s hasbara (public diplomacy/propaganda, take your pick).

These are more than military (or paramilitary) media operations, but the remainder is not only the work of individual ‘citizen-journalists’.  Ali Abunimah reports on a social media ‘war room’, set up on the first day of the current offensive by students at the Interdisciplinary Center Herzliya, a private university, to ‘explain’ Israel’s actions to overseas audiences: ‘israelunderfire’ originated here.  Some 400 volunteers from around the world are now involved in targeting online forums and producing their own (dis)infographics (more – and affirmative – reporting from the the Jerusalem Post here).

IDC Herzliya %22War Room%22

But most of the running is being made by the  IDF’s own concerted media campaign, and as I noted earlier Rebecca Stein has provided a timely analysis of ‘How Israel militarized social media’ that debunks some of the myths that have grown up around its ‘success’ (see also the link to her previous work here):

‘What’s been lost in this coverage – in this story of surprise — is the history of the Israel’s army presence on social media. For in fact, the military’s move to social media as a public relations platform has been rife with improvisation and failure, a process that runs counter to IDF narratives about its innovative work in this regard (the IDF lauding itself as a military early adopter). The army’s interest in the wartime potential of social media can be traced to the first few days of the 2008-2009 Gaza incursion….

In the years that followed, the IDF investment in social media would grow exponentially both in budgetary and manpower allocations, building on this ostensible wartime triumph.

But the process was rife with challenges and missteps…

Today, Israelis are also concerned about losing the media war. But they tell the story differently. In their rendering, the Israeli media problem is a by-product of damning or doctored images (this was the spirit of Netanyahu’s infamous “telegenically dead” remarks), of Palestinian media manipulation, of global anti-Israeli cum anti-Semitic bias. The Israeli media manages these problems by removing most traces of Palestinian dead and wounded from national news broadcasts.’

This feeds in to a deeper narrative in which both Palestinian casualties and Israeli culpability disappear from view, deftly characterised by Yonatan Mendel:

‘”We can forgive the Arabs for killing our children,” Golda Meir said in 1969, ‘but we cannot forgive them for forcing us to kill their children.’ Forty-five years on, in the third week of the Israeli attack on Gaza, with more than 800 Palestinians killed, about a quarter of them children, Israel’s government, its media and Israeli society have turned Meir’s idea of Israel being ‘forced’ to do unacceptable things into a vast and dangerous superstition. It refuses to take responsibility for the killing, just as it refused to take responsibility for the military occupation and the blockade: these, it tells itself, are what it has been forced into. Killing in Gaza in 2014, killing in 2012, and in 2008. But Israel has convinced itself, despite the rising numbers of dead, that isn’t killing anyone in Gaza. Hamas are the people doing the killing; they are responsible for the siege, the destruction, the underdevelopment, the poverty, the absence of peace talks, the postponement of a ceasefire and the use of UNRWA schools for military purposes.’

One final, crucial qualification. Even as he explains how the IDF and Hamas are fighting a media war, a battle to control the story on social media, John Tirmane insists that ‘the real war is of steel and fire, flesh and blood.’  What the countervailing voices of the ‘Twitterstorm’ seek to enable and to disable is an all too material firestorm.

Problematizing Cyber-Wars

Cyber OrientI’ve just received a Call For Papers on Problematizing Cyber-Wars for a special issue of CyberOrient: Online Journal of the Virtual Middle East.  The Guest Editor for the issue is the amazing Helga Tawil-Souri, whose work has done so much to illuminate these issues already and who starts in January as the new Director of NYU’s Hagop Kevorkian Center for Near Eastern Studies [more on Helga’s work, with links to her writing and other projects, here].

According to military analysts, since the 1991 Gulf War and even more so since the Hezbollah-Israel 2006 war, we have entered a new phase of warfare, in which kinetic and traditional military power are losing importance to symbolic and media power. Perhaps unsurprisingly given a still-widely held Orientalist view in military circles, many such perspectives revolve around wars and conflicts in the ‘Middle East’ or against ‘Islam’ more broadly – taking place in Iraq, Iran, Afghanistan, Israel/Palestine, Syria, but also on cyber networks and mobile phones. 



While these claims are of course hyperbole, this special issue of CyberOrient invites articles on questions of how we might define wars in a (new) media-age in the region; whether, why, and how (new) media are increasingly sites of warfare; the relationships between ‘virtual’ and ‘real’ battlespaces. Topics could include the significance of targeting (and bombing) telecommunications and media infrastructures; the use of (new) media as outlets for propaganda during wartime; the mediatization of war and the militarization of media; the role of participatory or social media and mobile communications during and in wars; relationships or differences between official, military, alternative, citizen, and grass-roots (new) media uses during war and conflict; the expanding definition of warzones; commemoration and memorialization of war in a digital age; among others. We welcome submissions from across disciplines and methodological approaches that are empirically and critically grounded.

IDF tweet re Hamas Twitter account

[In relation to the IDF tweet (above), from earlier this year, Twitter hasn’t suspended the all too obviously fake ‘Hamas Global PR’ here…]

CyberOrient is a peer-reviewed journal published by the American Anthropological Association, in collaboration with the Faculty of Arts of Charles University in Prague. The aim of the journal is to provide research and theoretical considerations on the representation of Islam and the Middle East, the very areas that used to be styled as an “Orient”, in cyberspace, as well as the impact of the internet and new media in Muslim and Middle Eastern contexts.

Submission

Articles should be submitted directly to Helga Tawil-Souri (helga@nyu.edu) and Vit Sisler (vit.sisler@ff.cuni.cz) by 30 September 2014 (Full Papers). Articles should
be between 6,000 and 8,000 words (including references), and follow the AAA style in referencing and citations. Upon acceptance, articles will be published online with free access in spring 2015.

More information can be found here.

UPDATE:  With exquisite timing, Mondoweiss has just published Rebecca Stein‘s analysis of ‘How Israel militarized social media’:

‘What’s been lost in this coverage – in this story of surprise — is the history of the Israel’s army presence on social media. For in fact, the military’s move to social media as a public relations platform has been rife with improvisation and failure, a process that runs counter to IDF narratives about its innovative work in this regard (the IDF lauding itself as a military early adopter). The army’s interest in the wartime potential of social media can be traced to the first few days of the 2008-2009 Gaza incursion….

In the years that followed, the IDF investment in social media would grow exponentially both in budgetary and manpower allocations, building on this ostensible wartime triumph.

But the process was rife with challenges and missteps.’

You can also find more detail in my previous posts here and here.

The other side of NSA

I’ve emphasised the networks in which drone operations take place several times on this blog, and I’ll have more to say about it (and, crucially, the satellite links involved) very shortly.  But this applies to all domains in which advanced militaries now operate.  In 2012 Army magazine (62: 6) put it like this:

The world in which U.S. forces operate is increasingly wireless and computer network-based. Rapidly evolving information technologies are expanding the speed, capacity, agility, efficiency and usefulness of modern networks. The prolif- eration of these systems is changing the way humans interact with each other and their environment, including military operations. This creates conditions that will make U.S. forces increasingly dependent on these technologies and require soldiers to counter technology-empowered and so- phisticated adversaries who can utilize commercial indus- try and the network as their primary combat developers. This broad and rapidly changing [Operational Environment] will present a plethora of potential threats and opportunities that are primarily limited by our own—and our opponents’—imagination, causing the Army to operate within a cyberspace domain and EMS [Electromagnetic Spectrum] that are increasingly congested and contested.

The authors went on to emphasise the convergence of ‘cyber and EMS capabilities’ (and, not coincidentally to my interest in satellite communications, the intersections between commercial and military systems):

Commercial and military systems are increasingly reliant on both as networks and telecommunication infrastructures expand their use of wireless means. This is particularly important for collaborative systems that require connectivity to operate effectively. The synergistic effect of these networks is a significant reason why EW [electronic warfare], EMSO [EMS operations] and cyber operations must be viewed as interrelated and interdependent.

The Pentagon has now published its first Field Manual on Cyber Electromagnetic Activities (FM 3-38).  If you are still wondering what these are, and why I’ve described them as the ‘other side’ of NSA (and by extension, GCHQ and the other ‘Five Eyes’) global surveillance operations, this is what the manual says:

Cyber electromagnetic activities are activities leveraged to seize, retain, and exploit an advantage over adversaries and enemies in both cyberspace and the electromagnetic spectrum, while simultaneously denying and degrading adversary and enemy use of the same and protecting the mission command system (ADRP 3-0). CEMA consist of cyberspace operations (CO), electronic warfare (EW), and spectrum management operations (SMO).

Cyber Electromagnetic Activities

The FM – and remember this is doctrine: we have a long way to go before we are able to probe into practice – diagrams the relation between the ‘five domains’ of US military operations (air, land, sea, space and cyberspace) and the electromagnetic spectrum like this:

Five domains and the Electromagnetic Spectrum

Operationally, for ‘unified land operations’ (this is a US Army manual, remember) this translates into undertaking Cyber Electromagnetic Activities (CEMA) thus:

Cyber electromagnetic activities Operational View

You can find a short discussion of the pre-history behind the Field Manual here.

I’m going to work my way through the manual in detail, and think through its implications for what I already know about cyberwar (even if Thomas Rid thinks it will never take place).  I sketched out some of my early ideas in ‘The everywhere war’ (DOWNLOADS tab), largely in relation to Stuxnet and cyber-attacks on Iran’s nuclear programme, but there have been many more developments and revelations since then, so watch this space.

Theory of the drone 8: From invisibility to vulnerability

This is the eighth in a series of posts on Grégoire Chamayou‘s Théorie du drone and covers the third chapter in Part II, Ethos and psyche.

3: Crisis in military ethos

The track that Chamayou beats in this chapter is (perhaps appropriately) a tortured one: it twists from the invulnerability of the hunter through his defencelessness to his vulnerability to psychic harm.  And, as you’ll see, those gendered pronouns are a critical part of his argument.

Gyges (left) from Der König Kandaules

He begins with the story of Gyges.  In classical mythology Gyges was a shepherd who discovered a magical ring that could make him invisible.  Armed with his new power, Gyges eventually killed the king, married the queen and seized the throne.  ‘Invisibility’, Chamayou notes, ‘conferred upon him a kind of invulnerability.’  In Plato’s Republic the story is used to ask searching questions about virtue and justice: what happens to morality, to virtue, if it becomes possible to evade responsibility for one’s actions?

The dilemma is no longer confined to the realm of story-telling or philosophical speculation, Chamayou argues, because the thought-experiment has been realised through the political technology of the drone.  The modern answer to Plato’s question is now all too clear: invisibility produces not only invulnerability but also impunity.  In fact, in an Op-Ed last year on ‘The moral hazard of drones’ two American academics, John Kaag and Sarah Kreps, suggested that the myth of Gyges does indeed find its most telling contemporary application in the use of drones for remote killing:

One might argue that the myth of Gyges is a suitable allegory to describe the combatants who have attacked and killed American civilians and troops in the last 10 years. A shepherd from the Middle East discovers that he has the power of invisibility, the power to strike a fatal blow against a more powerful adversary, the power to do so without getting caught, the power to benefit from his deception. These, after all, are the tactics of terrorism.

But the myth of Gyges is really a story about modern counterterrorism, not terrorism.

We believe a stronger comparison can be made between the myth and the moral dangers of employing precision guided munitions and drone technologies to target suspected terrorists. What is distinctive about the tale of Gyges is the ease with which he can commit murder and get away scot-free. The technological advantage provided by the ring ends up serving as the justification of its use.

Terrorists, whatever the moral value of their deeds, may be found and punished; as humans they are subject to retribution, whether it be corporal or legal. They may lose or sacrifice their lives. They may, in fact, be killed in the middle of the night by a drone. Because remote controlled machines cannot suffer these consequences, and the humans who operate them do so at a great distance, the myth of Gyges is more a parable of modern counterterrorism than it is about terrorism.

[You can find a different version of their critique of drone warfare, which mercifully leans on materiality rather than mythology, in ‘The use of unmanned aerial vehicles in contemporary conflict: a legal and ethical analysis’, Polity  44 (2012) 260-85, available on open access here; as I’ll show in a later post, that essay intersects more directly and substantially with Chamayou’s own critique].

Chamayou accepts the force of Plato’s original question, and evidently applauds the way in which Kaag and Kreps bring it to bear on the present,  but he thinks there is another way of putting it.  Not ‘can the invisible person be virtuous?’ but ‘what sort of “virtue” is invoked by the modern Gyges?’

He develops his answer through a thumb-nail sketch of what he sees as both a crisis in and a transformation of military ethos.  Traditional military ethos privileged courage, sacrifice and heroism, qualities that worked to make killing (Chamayou actually says ‘butchery’) acceptable, even glorious.  These virtues gave war what Clausewitz saw as its presumptive moral force, which depended on a fundamental reciprocity (sometimes called the combatant’s privilege): in order to kill with honour, the soldier must be prepared to die.  War then becomes the supreme ethical experience: ‘To wage war is to learn to die.’

But what happens, Chamayou wants to know, when all of this (apart from the killing) becomes unnecessary? When it becomes possible to kill without the risk of dying?  If the combatant’s privilege is annulled, doesn’t killing become the height of cowardice and dishonour? In the contemporary age of what Edward Luttwak called ‘post-heroic war’ – what former Air Chief Marshall Brian Burridge famously and more bluntly described as ‘virtue-less war’ – those traditional military virtues are threatened.  In short, it’s not only those living under drones who see these new weapons as cowardly, and Chamayou believes that the contradiction between the new technical means of waging war and the traditional ideology that is supposed to inform its prosecution has provoked a profound crisis in the military ethos.

In fact, he says, some of the fiercest critics of remote killing are pilots of conventional strike aircraft. Chamayou cites this song written by two F-16 pilots, Chris Kurek and Rob Raymond, who perform as Dos Gringos (more here – really):

They shot down a Predator, that’s one less slot for me
They shot down a Predator and it filled my heart with glee
I had a smile when I logged on to AFPC
They shot down a Predator, that’s one less slot for me

They shot down a Predator and I say let’s send some more
Let’s fly ‘em over Baghdad and then see what’s in store
‘Cause I heard that the Air Force wants another 24
They shot down a Predator and I say let’s send some more

They shot down a Predator and I wonder how that feels
For that operator who lost his set of wheels
It must feel so defenseless; it’s like clubbing baby seals
They shot down a Predator and I wonder how that feels

As this clip makes clear, the hostility is about more than military values: the USAF now trains more crews for remote operations than for flying conventional aircraft.  But the values in question are given a particular inflection.  It would be a mistake to read ‘clubbing baby seals’ in the last verse as a reference to striking a target that can’t strike back.  After all, the song is about a Predator being shot down, and so it homes in on their inability to fight back: on their inability to engage in combat.

What is at stake here, Chamayou suggests, is a series of ‘manly’ and masculinist virtues and even virilities.  The complaint is that Unmanned Aerial Vehicles are literally ‘un-manned’ – their ‘pilots’ are not real pilots and not even real men. (You can find much more on this martial emasculation in Mary Manjikian, ‘Becoming Unmanned’ [International Feminist Journal of Politics (2013) doi: 10.1080/14616742.2012.746429]).

Even so, Chamayou is sceptical about the history being (re)written through these and similar objections.  Before announcing the end of the era of ‘manly’, heroic warfare, he suggests (in an obvious echo of Bruno Latour), we ought to ask whether ‘we’ moderns have ever fought heroic wars.  He draws attention to Walter Benjamin‘s scathing critique of a collection of essays edited by Ernst Jünger under the title War and Warrior in 1930:

‘These authors nowhere observe that the new warfare of technology and material [Materialschlacht] which appears to some of them as the highest revelation of existence,dispenses with all the wretched emblems of heroism that here and there have survived the [First] WorldWar.’

UK Approach to Unmanned Aircraft SystemsFaced with this storm of criticism, Chamayou suggests, military ethicists have found it necessary to erect an altogether different version of virtuous war.  If the drone is to be considered ‘virtuous’, several writers have argued, it is first and foremost because it rules out the possibility of casualties on ‘our’ side. Chamayou will have more to say about this in a later chapter on combatant immunity, but for now he finds confirmation in a Ministry of Defence report on The UK Approach to Unmanned Aircraft Systems in 2011 that, even as it acknowledged the ethical issues involved in abandoning the combatant’s privilege, nevertheless concluded that ‘use of unmanned aircraft prevents the potential loss of aircrew lives and is thus in itself morally justified.’

Statements like this bring into view an ongoing transformation from an ethic of sacrifice and courage to an ethic of auto-preservation (and, Chamayou adds, of cowardice): a sort of Revolution in Moral-Military Affairs.  The scale of traditional values is reversed, and in an Orwellian inversion words come to mean their opposite.  What used to be called cowardice is now called bravery, assassination becomes combat, and the spirit of sacrifice is turned into an object of opprobrium.  In Chamayou’s view we are witnessing not so much ‘virtue-less war’ as a vast operation to re-define the ‘virtues’ of war.

Dist_Warfare_Medal_800_t700

Chamayou fastens on the the Pentagon proposal late last year to award combat medals to drone operators.  Finally announcing the Distinguished Warfare Medal in February 2013, the Pentagon issued this statement:

Modern technology enables service members with special training and capabilities to more directly and precisely impact military operations at times far from the battlefield.  The Distinguished Warfare Medal will be awarded in the name of the secretary of defense to service members whose extraordinary achievements, regardless of their distance to the traditional combat theater, deserve distinct department-wide recognition.  

 “I have seen first-hand how modern tools like remotely piloted platforms and cyber systems have changed the way wars can be fought,” said Secretary of Defense Leon E. Panetta.  “We should also have the ability to honor extraordinary actions that make a true difference in combat operations, even if those actions are physically removed from the fight.”

The proposal set off a firestorm of protest in Congress and within the Air Force and online military forums.   It was withdrawn for review in less than a month and rescinded by Panetta’s successor in April.

The saga doesn’t quite do the work Chamayou wants it to do.  He uses it to reflect on the meaning of ‘bravery in combat’ – after all, he asks, what can bravery mean in circumstances ‘physically removed from the fight’? – but the Pentagon statement made it clear that the medal was to be awarded ‘for actions in any domain but not involving acts of valor.’

Still, this does not diminish the force of Chamayou’s main line of inquiry.  From the testimony of drone operators, he concludes that bravery consists not in them putting their lives on the line but in seeing the consequences of their actions online.  Drone crews are supposed to be so deeply affected by the high-resolution full-motion video feeds from their Predators and Reapers, which show in intimate detail the corporeal results of the strikes for which they are responsible, that they become highly vulnerable to Post-Traumatic Sress Disorder.  Traditionally bravery involved putting your physical body in danger; Chamayou says that it now it seems to involve putting your psychic being at risk.

This amounts to the elevation of what he calls a ‘purely psychic heroism’.  In previous wars the soldier was both the vector of violence and its potential victim, because the reciprocity of combat called on warriors to be at once executioner and potential victim.  Today the remote warrior is still required to be the executioner, but he can also become the psychological victim of his duty as executioner.

Jane Addams and delegates to the Hague conference in 1915

Chamayou is troubled by this for two reasons.

First, the idea of psychic vulnerability – of the damage inflicted on soldiers by the trauma of killing – was given form and substance in the First World War. In 1915  Jane Addams (above) – who will, I suspect, be known to most human geographers for her other achievements, particularly her work at Hull House in Chicago – returned from the International Congress of Women at the Hague to deliver a stunning address at Carnegie Hall on “The Revolt against War”.  In it, Chamayou tells us, she spoke of nurses treating ‘delirious soldiers [who] are again and again possessed by the same hallucination – that they are in the act of pulling their bayonets out of the bodies of men they have killed’, and of five young soldiers who committed suicide ‘not because they were afraid of being killed but because they were afraid they might be put into a position where they would have to kill someone else.’  To overcome these inhibitions, she noted, soldiers were routinely given a shot of rum before they went over the top.  Addams used these testimonies to develop a courageous and principled critique of military violence, and in 1931 she was awarded the Nobel Peace Prize.  (Read her Peace and Bread in time of war here). To Chamayou’s evident disgust, the trauma of war that Addams and others exposed is now being recycled into a legitimation of targeted killing.  Like a snake eating its tail, trauma is being mobilised to restore to war the ethico-heroic temper Addams insisted it had lost through trauma.

But, second, as I’ll show in the next post in this series, Chamayou is deeply sceptical of what he calls ‘the psychopathologies of the drone’.

One last comment before I go.  I don’t think the deployment of armed drones is provoking a wholesale transformation of military ethics, because that would be to absolutise their use.  The Air Force still flies conventional strike aircraft, troops are still deployed on the ground (including Special Forces) and – as the controversy over the medal confirms – the Pentagon still insists on a difference between distinguished service and bravery.  I don’t mean that drones do not raise serious ethical questions; of course they do, and I am dismayed at how often these are trumped by arguments about the legality of military violence.  But military violence takes many different forms, and it’s important not to lose sight of the larger killing fields in which drones are embedded.

Black spots and blank spots

Over at Guernica, Trevor Paglen has a short essay on the rise of what he calls ‘the terror state’ that connects the dots between several recent posts:

For more than a decade, we’ve seen the rise of what we might call a “Terror State,” of which the NSA’s surveillance capabilities represent just one part. Its rise occurs at a historical moment when state agencies and programs designed to enable social mobility, provide economic security and enhance civic life have been targeted for significant cuts. The last three decades, in fact, have seen serious and consistent attacks on social security, food assistance programs, unemployment benefits and education and health programs. As the social safety net has shrunk, the prison system has grown. The United States now imprisons its own citizens at a higher rate than any other country in the world.

While civic parts of the state have been in retreat, institutions of the Terror State have grown dramatically. In the name of an amorphous and never-ending “war on terror,” the Department of Homeland Security was created, while institutions such as the CIA, FBI and NSA, and darker parts of the military like the Joint Special Operations Command (JSOC) have expanded considerably in size and political influence. The world has become a battlefield—a stage for extralegal renditions, indefinite detentions without trial, drone assassination programs and cyberwarfare. We have entered an era of secret laws, classified interpretations of laws and the retroactive “legalization” of classified programs that were clearly illegal when they began. Funding for the secret parts of the state comes from a “black budget” hidden from Congress—not to mention the people—that now tops $100 billion annually. Finally, to ensure that only government-approved “leaks” appear in the media, the Terror State has waged an unprecedented war on whistleblowers, leakers and journalists. All of these state programs and capacities would have been considered aberrant only a short time ago. Now, they are the norm.

This ought to be depressingly familiar stuff, though it is important to connect those dots.  I highlight Trevor’s argument here (which radiates far beyond the paragraphs I’ve extracted above) for two reasons.

PAGLEN BLank Spots on the MapFirst, the practices that Trevor disentangles work through distinctively different geographies, at once material and virtual. Trevor’s own work addresses different dimensions of what he’s also called the Blank Spots on the Map – here definitely be dragons! though there’s a delicious irony in the US finding Edward Snowden’s whereabouts (at least this morning) to be one of them. There’s some small comfort to be had in the raging impotence of the state apparatus, which is evidently neither all-seeing nor all-knowing.  As part of his project, Trevor has done much to bring into (sometimes long-distance) focus the prying eyes of the ‘terror state’ – see for example here – but I’m particularly interested in the differential modalities of ‘watching’ and ‘acting’.  The US Air Force has become preoccupied with the predicament of ‘swimming in sensors, drowning in data‘, for example, which makes it exceptionally difficult to convert its enhanced capacity for intelligence, surveillance and reconnaissance into focused strikes and, as I noted earlier, this is only one version of a wider divergence outlined by Peter Scheer:

The logic of warfare and intelligence have flipped, each becoming the mirror image of the other. Warfare has shifted from the scaling of military operations to the selective targeting of individual enemies. Intelligence gathering has shifted from the selective targeting of known threats to wholesale data mining for the purpose of finding hidden threats.

The resulting paradigms, in turn, go a long way to account for our collective discomfort with the government’s activities in these areas. Americans are understandably distressed over the targeted killing of suspected terrorists because the very individualized nature of the drone attacks converts acts of war into de facto executions — and that in turn gives rise to demands for high standards of proof and adjudicative due process.

Similarly, intelligence activities that gather data widely, without fact-based suspicions about specific individuals to whom the data pertain, are seen as intrusive and subject to abuse.

TREVOR PAGLEN Keyhole 12-3 Optical reconnaissance satelliteThis is an interesting suggestion, a simple schematic to think with, and at present I’m working through its implications (and complications) for other dimensions of later modern war – specifically the geographies of cyberwarfare that I briefly outlined in my early essay on ‘The everywhere war’ (DOWNLOADS tab).  So for the book I’m splicing  cyberwarfare into the now explosive debate over surveillance in cyberspace, and the transformation of James Gibson‘s Fordist version of ‘Technowar’ into its post-Fordist incarnation.  In a report for Vanity Fair Michael Joseph Gross calls cyberwarfare ‘silent war’ and ‘war you cannot see’, and yet it too (as Trevor’s work implies) is material as well as virtual, not only in its consequences but also in its very architecture: see, for example, here and here (and the wonderful graphic that accompanies the report).  So, with patience, skill and effort, it can indeed be seen.  And, contrary to Thomas Rid‘s Cyber war will not take place (2013), there is a crucial sense – one which my dear friend Allan Pred constantly emphasised – in which these capacities and activities do indeed take place… More soon.

There’s a second reason for noting Trevor’s essay (he was, not incidentally, a student of Allan’s): it originates from Creative Time Reports edited by Marisa Mazria Katz:

Creative Time Reports strives to be a global leader in publishing the unflinching and provocative perspectives of artists on the most challenging issues of our times. We distribute this content to the public and media free of charge.

Asserting that culture and the free exchange of ideas are at the core of a vibrant democracy, Creative Time Reports aims to publish dispatches that speak truth to power and upend traditional takes on current issues. We believe that artists play a crucial role as thought leaders in society, and are uniquely capable of inspiring and encouraging a more engaged and informed public, whether they are addressing elections or climate change, censorship or immigration, protest movements or politically motivated violence.

In an era of unprecedented interconnectedness, Creative Time Reports provides artists with a space to voice analysis and commentary on issues too often overlooked by mainstream media. We believe in the importance of highlighting cultural producers’ distinctive viewpoints on world events and urgent issues of social justice to ensure a livelier, more nuanced and more imaginative public debate.

Given everything I’ve said about the importance of the arts to creative critical research the relevance of this will, I hope, be obvious: art not simply as a means to represent the results of research but rather as a medium through which to conduct research.  Good to think with, as Lévi-Strauss might have said, but also good to act with.  (More on Creative Time here; they are holding a ‘summit’ on Art, Place and Dislocation in the 21st Century City in New York, 25-26 October 2013).