In media res

Two short essays that address the public circulation of supposedly secret information.  The first, “Collateral Murder and the After-Life of Activist Imagery”, is by Christian Christensen, and concerns the video clip released by Wikileaks as Collateral Murder in April 2010.  I’ve discussed this edited video of a US Apache helicopter attack in New Baghdad in 2007 before, together with the two documentary films that it provoked, and it forms part of my ‘Militarized Vision’ project (you can find links to the clip and to subsequent commentary in that original post).

CHRISTENSEN Collateral Murder

Christian doesn’t explore the content of the video so much as its inscription and re-inscription within public debates, part of the mediatization of later modern war.  He does make a sharp point about the status of the imagery:

One could argue that the repeated use of this imagery (and corresponding audio) has created an entirely new genre of military reporting. It is a genre with specific, often disturbing conventions: the grainy images of those on the ground, the flat, bland coloring, the “narration” of the aircraft operators which swings between the clinical and the cynical, the silence of those under surveillance or attack, the sound of the weaponry as it is discharged, and, importantly, the “overtness” of the technology, by which I mean the way in which the screen is filled with evidence of the technology being used in the form of the cross-hairs in the middle and data visible at the top and the bottom of the screen…

The Collateral Murder video not only shatters the mythology of humane warfare and benevolent US power, but also causes us to question the notion of neutral technology at the service of human development: a theme which has regained a central space in public debate in recent years.

But he also thinks there is another, no less sharp point to be made about the very act of reporting:

Within this context, the killing of two Reuters employees by the US military was particularly poignant. At the most basic level, this was the symbolic killing of Journalism (with a capital “J”) by a military unaccustomed to critical coverage or investigation at home. The killings, of course, then went unreported until Manning leaked the material and WikiLeaks published it: itself an act of journalism. With Collateral Murder, there is a layering and re-layering of meaning, and, for me, journalism lies at the heart of the clip. These are humans first, of course, and most of those killed or wounded in the attack were not journalists. But, in addition to the tragedy of human death, there is also the tragedy of what is symbolically destroyed: Transparency. Democracy. Knowledge. Critical thinking. And it took an act of journalism to bring these tragedies to light, an act of which has now itself been subjected to the full force of the state via the imprisonment of Manning, and the threat of criminal charges being brought against Assange in the US.

Incidentally, the essay is the text of Christian’s presentation to the ‘Image Operationsconference held at the Institute of Cultural Inquiry (ICI) in Berlin earlier this month; the program is here.

Image Operations

The second essay is Adam Morris‘s wide-ranging review of ‘The geopolitics of the Snowden Files‘ at the Los Angeles Review of Books.  Its immediate provocation is the publication of the Obama administration’s self-serving ‘NSA Report’:

The-NSA-Report-243x366The NSA Report — commissioned by the White House in August, published on its website in December, and now available in print via Princeton University Press— was authored by the President’s Review Group on Intelligence and Communications Technologies. As suggested by its official title, “Liberty and Security in a Changing World,” the Report was intended to advise President Obama on how to reform the data collection practices of the Intelligence Community (IC), in particular the NSA. Its authors include such veterans of the US security sector as Richard A. Clarke, Michael J. Morrell, and Peter Swire. This insiders’ perspective, in theory, is balanced by the addition to the group of constitutional lawyers Geoffrey R. Stone and Cass Sunstein. The unofficial purpose of the Report, however, was the Obama administration’s attempt to put a lid on the NSA scandal by pretending to be interested in reform. As Luke Harding points out in The Snowden Files, the Review Group was working out of the offices of the Director of National Intelligence, currently occupied by the felonious General James Clapper, w _ho knowingly lied in Congressional testimony about the bulk collection of Americans’ communication data.

The essay provides a fine, critical reading of the Report –

‘The anodyne language of these and other recommendations signals the imperial agenda out of which they are born: The NSA Report is obsessed with framing the debate over surveillance around the neopositivist vocabulary of “risk management,” but we know from history that political liberty will always suffer when a dominant regime deems a nation, its leadership or its population a “national security threat”…’

– but it also spirals off into a vigorous mapping of the context in which the NSA set about its covert operations and Edward Snowden‘s principled decision to go public (Adam also provides a commentary on Luke Harding‘s The Snowden Files: for another review, see Daniel Soar at the London Review of Books here).  And here too, of course, investigative journalism is a vital, enabling and even empowering practice.

Boundless Informant and the everyware war

As part of my presentation on “Drones and the everywhere war” at York, I decided to unpack this extraordinary claim made by John Nagl, one of the architects of the US military’s revised counterinsurgency doctrine:

We’re getting so good at various electronic means of identifying, tracking, locating members of the insurgency that we’re able to employ this extraordinary machine, an almost industrial-scale counterterrorism killing machine that has been able to pick out and take off the battlefield not just the top level al Qaeda-level insurgents, but also increasingly is being used to target mid-level insurgents.

It’s a remark I’ve discussed several times before.  Nagl’s ‘killing machine’ is not limited to drone strikes, of course, but subsumes the ‘night raids’  and other Special Forces operations detailed in Jeremy Scahill‘s Dirty Wars.  But at York I wanted to explore how those ‘electronic means of identifying, tracking and locating’ fed into drone strikes in Pakistan: and, thanks to Edward Snowden and Glenn Greenwald, I was able to get much closer to the belly of the beast.

Drones+ app

I’d started the presentation with a riff on Josh Begley‘s attempt to persuade Apple to include his Drones+ app in the App store.  Apple decided, for several contradictory and spurious reasons, to reject the app, and at his thesis defence Josh asked:

 ‘Do we really want to be as connected to our foreign policy as we are to our smart phones… Do we really want these things to be the site of how we experience remote war?’

Apple’s answer was ‘no’, clearly, but it turns out that others are intimately connected to drone strikes through their phones and e-mails, and it was this that I fastened on.

Josh, undeterred by Apple, went on to launch the Dronestream platform, from which he tweeted details of every known US drone strike.  I combined one of Josh’s tweets for 1 October 2012 with a version of James Bridle‘s Dronestagram, which uses Instagram to post images of the location of drone strikes (I say ‘a version’ because Dronestagram was launched too late for this particular strike, so this is a mock-up; in any case, it’s difficult to pinpoint the locations from available reports with much precision, but the details for this strike are available via the Bureau of Investigative Journalism, as the second slide below shows):

1 October 2012 Dronestream and Dronestagram

Bureau of Investigative Journalism 1 October 2012 strike

We now know that this strike was made possible as a result of interceptions made by the National Security Agency’s Counter-Terrorism Mission-Aligned Cell (CT-MAC).  Writing in the Washington Post on 16 October 2013 Greg Miller, Julie Tait and Barton Gellman explained how this strike had targeted Hassan Ghul:

Hassan Ghul NSA intercepts

Not quite ‘any doubt’; as they went on to note, ‘Although the attack was aimed at “an individual believed to be” the correct target, the outcome wasn’t certain until later, when “through SIGINT [signals intelligence] it was confirmed that Hassan Ghul was killed.”‘

So how did the intercept work?  Not surprisingly, we don’t know for sure; but the map below of NSA’s ‘Boundless Informant‘ – another dimension of what I’ve been calling ‘the everywhere war’ – offers some clues.  I’ve taken it from a report in the Guardian by Glenn Greenwald and Ewen MacAskill:

Boundless Informant March 2013 heat map

This is six months later, but it shows that Pakistan was, after Iran, the major focus of NSA’s surveillance and data mining operations (Miller and his colleagues had noted that “NSA threw the kitchen sink at FATA’, the Federally Administered Tribal Areas).  It would be wrong to assume that the targeted killing of Ghul was the result of a simple hack into hotmail, and the Post report details the multiple methods used by NSA.

Still, the geography of covert surveillance shown on the map is revealing.  Yesterday Greenwald returned to Boundless Informant and rebutted the charge that he had misinterpreted the meaning of this and other slides, and in doing so quoted from NSA’s own explanation of the system:

BOUNDLESSINFORMANT is a GAO [Global Access Operations, a branch of the NSA] prototype tool for a self-documenting SIGINT system. . . BOUNDLESSINFORMANT provides the ability to dynamically describe GAO’s collection capabilities (through metadata record counts) with no human intervention and graphically display the information in a map view, bar chart, or simple table. . . .
By extracting information from every DNI and DNR metadata record, the tool is able to create a near real-time snapshot of GAO’s collection capability at any given moment. The tool allows users to select a country on a map and view the metadata volume and select details about the collection against that country. The tool also allows users to view high level metrics by organization and then drill down to a more actionable level – down to the program and cover term.

It’s not too difficult to connect the dots and draw two more general conclusions.  The first is that this is another, darker dimension to the ‘code/space’ and ‘everyware’ discussed in such impressive detail by Rob Kitchen and Martin Dodge:

Everyware war

My slide is just short-hand, of course, but you can see where I’m going, I hope – and, as we know from this week’s harrowing testimony on Capitol Hill about the murder of Mamana Bibi in Waziristan and Amnesty International’s report, Will I Be Next?, these operations and their algorithms work to turn ‘everyday life’ into everyday death.  So I’ll be thinking more carefully about code/space and its implication in the individuation of later modern war, paying closer attention to the technical production of ‘individuals’ as artefacts and algorithms as well as the production of the space of the target: more to come.

The second general conclusion I leave to Peter Scheer, who provides a more refined (and critical) gloss on John Nagl’s comment with which I began:

SCHEER Connecting the dots

I’m incorporating these and other developments into the revised and extended version of “Moving targets and violent geographies” which will appear in The everywhere war, but I hope this bare-bones account (and that first draft, available under the DOWNLOADS tab) shows that my posts are more connected than they must sometimes appear…  The slides were pulled together on the day I gave the presentation, so forgive any rough edges.