FAIR USE NOTICE

FAIR USE NOTICE

A BEAR MARKET ECONOMICS BLOG


This site may contain copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in an effort to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. we believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law.

In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml

If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.

FAIR USE NOTICE FAIR USE NOTICE: This page may contain copyrighted material the use of which has not been specifically authorized by the copyright owner. This website distributes this material without profit to those who have expressed a prior interest in receiving the included information for scientific, research and educational purposes. We believe this constitutes a fair use of any such copyrighted material as provided for in 17 U.S.C § 107.

Read more at: http://www.etupdates.com/fair-use-notice/#.UpzWQRL3l5M | ET. Updates
FAIR USE NOTICE FAIR USE NOTICE: This page may contain copyrighted material the use of which has not been specifically authorized by the copyright owner. This website distributes this material without profit to those who have expressed a prior interest in receiving the included information for scientific, research and educational purposes. We believe this constitutes a fair use of any such copyrighted material as provided for in 17 U.S.C § 107.

Read more at: http://www.etupdates.com/fair-use-notice/#.UpzWQRL3l5M | ET. Updates

All Blogs licensed under Creative Commons Attribution 3.0

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 Unported License.

Sunday, August 18, 2013

Snowden and the Stupidity of the Security State: A Doomed System



August 12, 2013



A Doomed System

Snowden and the Stupidity of the Security State

by KEVIN CARSON
 
 
Back in 2006 Ori Brafman and Rod Beckstrom, in The Starfish and the Spider, contrasted the way networks and hierarchies respond to outside attacks. Networks, when attacked, become even more decentralized and resilient. A good example is Napster and its successors, each of which has more closely approached an ideal peer-to-peer model, and further freed itself from reliance on infrastructure that can be shut down by central authority, than its predecessors. Hierarchies, on the other hand, respond to attack by becoming even more ossified, brittle and closed. Hierarchies respond to leaks by becoming internally opaque and closed even to themselves, so that their information is compartmentalized and they are less able to make effective use of the knowledge dispersed among their members.

We can see this in the way the national security state has responded to leaks, first by US Army PFC Bradley Manning and now by former NSA contractor Edward Snowden. Hugh Gusterton, in Bulletin of the Atomic Scientists (“Not All Secrets are Alike,” July 23), notes that the government is taking measures to avoid future such leaks by “segmenting access to information so that individual analysts cannot avail themselves of so much, and by giving fewer security clearances, especially to employees of contractors.”

This approach is doomed. “Segmentation of access runs counter to the whole point of the latest intelligence strategy, which is fusion of data from disparate sources. The more Balkanized the data, the less effective the intelligence. And … intelligence agencies are collecting so much information that they have to hire vast numbers of new employees, many of whom cannot be adequately vetted.”

Meanwhile, the internal witch hunt atmosphere in the U.S. security apparatus is alienating the very contract-work hackers whose skills it is increasingly dependent on. The Electronic Frontier Foundation (EFF) sticker on Snowden’s laptop wasn’t a deviation the NSA’s leadership failed to catch. It’s typical of the cultural pool from which the NSA, of necessity, recruits its contractors. Such people read the news, and they aren’t impressed with the government’s draconian treatment of people like Aaron Swartz, Bradley Manning and Edward Snowden. Recruiters are running up against increased skepticism among those with the skills it needs; the chilly reception NSA chief Keith Alexander met with at DefCon is symbolic of this new atmosphere.

Further, as an anonymous former EFF intern notes, even idealistic young people who believe in the NSA’s mission find themselves paralyzed by the increasingly adversarial atmosphere, afraid even to type code into a terminal for fear of learning after the fact that they violated one of the CFAA’s vague, Kafkaesque provisions.

All this is happening even as surveillance agencies are deluged with ever-increasing, unmanageable amounts of raw data. The ratio of hay to needles is growing exponentially. The larger the volume of raw data to be analyzed algorithmically, the larger the number of false positives the system generates. The sheer volume of false positives, and the ratio of false positives to genuine leads, is enough to paralyze government. Back in 2009, Homeland Security couldn’t react in time to stop the Underwear Bomber when his own father directly notified them he was planning to blow up a plane.

The very people the security state is most interested in monitoring — ranging from genuine terrorists to domestic dissidents like Snowden and the occupy movement — respond to every increase in surveillance by making themselves more opaque to the government. The Snowden scandal resulted in a spike in adoption of measures like PGP encryption and TOR browsing. Even as the NSA is hoovering up more and more hay, more and more needles quietly remove themselves from the haystack.

The U.S. security state and its agencies, in the long run, are doomed for the same reason that all authoritarian hierarchies are doomed: They’re stupid. And the people they’re trying to control are smart.

Kevin Carson is a senior fellow of the Center for a Stateless Society (c4ss.org) and holds the Center’s Karl Hess Chair in Social Theory.

No comments:

Post a Comment