Making the Internet Safe for Anarchy…


From DMITRY ORLOV
cluborlov

As the electric grid goes down people will cease to be docile and become seriously angry.

Suppose you wanted to achieve some significant political effect; say, prevent or stop an unjust war. You could organize gigantic demonstrations, with hundreds of thousands of people marching in the streets, shouting slogans and waving anti-war banners. You could write angry editorials in newspapers and on blogs denouncing the falseness of the casus belli. You could write and phone and email your elected and unelected representatives, asking them to put a stop to it, and they would respond that they will of course try, and by the way could you please make a campaign contribution? You could also seethe and steam and lose sleep and appetite over the disgusting thing your country is about to do or is already doing. Would that stop the war? Alas, no. How many people protested the war in Iraq? And what did that achieve? Precisely nothing.

You see, the slogan “speak truth to power” has certain limitations. The trouble with this slogan is that it ignores the fact that power will not listen and the fact that the people already know the truth and even make jokes about it. Those in power may appear to be persuaded or dissuaded, but only if it is to their advantage to do so. They will also sometimes choose to co-opt, and then quietly subvert, popular movements, in order to legitimize themselves in the eyes of those who would otherwise oppose them. But, in general, they cannot be shifted from pursuing a course they see as advantageous by mere rhetoric from those outside their ranks. Some weaker regimes may be sensitive to embarrassment, provided the criticisms are voiced by high-profile individuals in internationally recognized positions of authority, but these same criticisms backfire when aimed at the stronger regimes, because they make those who voice them themselves appear ridiculous, engaged in something futile.

Using rhetoric to shift those in power from their positions is like trying to win at chess by persuading your opponent to sacrifice his pieces because it is a reasonable, just and fair thing for him to do. As with chess, victory is achieved by moving in a way that restricts your opponent’s choices. And, as with chess, the winning strategy is neutralized if your opponent is aware of your strategy ahead of time. Thus, attempting to enter into a dialogue with your opponent is a sure way to weaken your position by giving away your game plan.

In confronting the powerful, the need for secrecy is strengthened by the fact that, unlike chess, which is an overt game, the game of shifting those in power from their positions is best played covertly: it is advantageous to make game-changing events appear as accidents or coincidences, spontaneous rather than organized, and difficult to pin on anyone. Since a scapegoat is always found anyway, it is advantageous if there isn’t any identifiable organization with which he can be associated. Where an organization is required, it’s best for it to be transitory, fluid and anarchic in nature, and to appear to be ineffectually engaged in some trivial, innocuous pursuit. In CIA parlance, it should at all times maintain plausible deniability.

Such a strategy just might be conceivable, provided the whole thing stays off the Internet. In previous, less networked eras, the work of the secret police was challenging and labor intensive, but the Internet has changed all that. Anything you say on the Internet, whether in a private email, an unpublished document, or posted to a blog, can now be used in evidence against you, or anyone else.

Back in the USSR, to spy on your conversations, the KGB had to come and install a bug in your apartment. That was quite a job in itself. One agent was assigned to track each of your family members, to find a time when there was nobody home. Another agent had to then stand watch, while a couple more would pick the lock, move a piece of furniture, neatly cut out a piece of wallpaper, drill a hole, install the bug, glue and retouch the wallpaper so that it looks undisturbed, and put the furniture back in place. Then the conversations overheard by this bug had to be recorded, and someone had to stand by to swap the bulky reel-to-reel magnetic tapes. Finally, somebody had to go through all the tapes, listening for seditious-sounding snippets of conversation. Often the entire eavesdropping mission failed because of some trivial oversight, such as a deadbolt locked one turn too many or a cigarette butt of the wrong brand left in an ashtray, because it would cause the quarry to suddenly become careful, turning up the radio or the television when discussing anything important. Even if something vaguely seditious could be discerned, it sometimes happened that the person charged with listening turned sympathetic toward his quarry, in a sort of reverse Stockholm syndrome, because the dissidents he was spying on turned out to be forthright, honorable, likeable people—unlike his own detestable superiors. If found, the seditious content had to be laboriously transcribed.

If it became necessary to map out the quarry’s social connections, the process was, again, laborious. Transcripts of phone conversations and surveillance tapes had to be correlated against photographs of persons walking in and out of the apartment or seen talking to the quarry. Sometimes letters had to be steamed open and read to determine the nature of the relationships. If seditious documents were found, which were normally typed, then an attempt was made to determine their origin based on the ownership of the typewriter, which could be matched by comparing minor imperfections in characters and small deviations in their alignment against a library of typed samples maintained on file, except that the documents were often typed through five layers of carbon paper, making the characters too blurry to make such identification possible.

Compare that to the situation in the US today, where CIA/FBI/NSA/Homeland Security is quite far along in forming one giant security apparatus that dwarfs the quaint old KGB in both intrusiveness and scope, though probably not in effectiveness, even though modern technology makes their job trivial to the point where much of it can be automated. There used to exist privacy protections written into US law, but they are in the process of disappearing as a result of new legislation, such as the CISPA bill making its way through Congress now. But whether or not a sweeping abolition of privacy rights makes it into law, your online privacy is gone. Since the government can now detain you indefinitely without ever charging, trying or sentencing you, and has full access to your digital data, legal niceties make little difference. Nor does it matter any longer whether or not you are a US citizen: the firewall between CIA (which was supposed to only spy on foreigners) and FBI has disappeared following 9/11, and although this practice violates several acts of Congress, you would be foolish to wait for anyone to do anything about it.

People now tend to communicate via cell phone voice calls, text messages, emails, posts to Facebook and tweets, all of which are digital data, and all of which are saved. Relationships between people can be determined by looking at their Facebook profile, their email contacts, and their cell phone contacts. If your phone is GPS-enabled, your position can be tracked very precisely; if it isn’t, your position can still be determined fairly accurately and tracked once your phone connects to a few different cell phone towers. All of this information can be continually monitored and analyzed without human intervention, raising red flags whenever some ominous pattern begins to emerge. We are not quite there yet, but at some point somebody might accidentally get blasted to bits by a drone strike while texting when a wrong T9 predictive text autocompletion triggers a particularly deadly keyword match.

A lot of commerce now happens online, while most retail point of sale systems are now computerized, and most people use credit/debit cards rather than cash and often use “rewards cards” even when paying cash. Thus, everything you buy can be traced to you, and your purchasing patterns can be analyzed to determine such things whether or not you are pregnant. In a recent scandal, the Target chain committed the faux pas of offering discounts on baby products to women who did not yet know they were pregnant, based on their recent purchases of such things as unscented face cream, larger-size bras and various soft, plush items.

Thanks to vastly increased computational power, the emphasis is now shifting from enforcing the law to flagging as aberrant any sort of behavior that the system does not quite understand. That is, it is not looking for violations of specific laws, but for unusual patterns. One such pattern might be an attempt by you and others to go electronically dark for a time. Suppose you are walking to a park, and, before getting there, you switch off your cell phone. And suppose several other people walk to that same park at the same time, and also switch off their cell phones before getting there. And suppose none of you called or texted each other beforehand. Well, that’s an obvious red flag for conspiracy! Video from surveillance cameras installed in that park will be downloaded, fed through facial recognition software, and the faces matched up with the cell phones that were switched off. Now you are all connected and flagged as attempting to evade surveillance. If this aberrant behavior is observed during some future time of national emergency (as opposed to the usual permanent war on terror) drone aircraft might be dispatched to take you out. All of this might happen without any human intervention, under the control of a fully automated security threat neutralization system. It’s a bit of a Catch22: stay off the Internet, and you are sure to be too socially isolated to organize anything; get on the Internet and you are immediately exposed; do a little of each, and you suddenly start looking very suspicious and invite additional scrutiny.

If you are a bit more savvy, you might be able to come up with ways to use the Internet anonymously. You buy a laptop with cash and don’t register it, so that the MAC address can’t be traced to you. You use Internet cafés that have open Internet access or pirate open wifi connections from somewhere. You connect to web sites outside of the US jurisdiction via SSL (HTTPS protocol) or use encrypted services such as Skype. You further attempt to anonymize your access using Tor. You think you are safe. But wait! Are you running a commercial operating system, like Windows or Mac OS? If so, it has a back door, added by the manufacturer based on a secret request from the US government. The back door allows someone (not necessarily the government, but anybody who knows about it) to install a keystroke logger that captures all your keystrokes and periodically uploads them to some server for analysis. Now all of your communications, and username/password combinations, are known to a third party.

Suppose you know about back doors in commercial operating systems, and so you compile your own OS (some flavor of Linux or BSD) from source code. You run it in ultra-secure mode, and nervously monitor all incoming and outgoing network connections for anything that shouldn’t be there. You encrypt your hard drive. You do not store any contact information, passwords or, for that matter, anything else on your laptop. You run the browser in “private” mode so that it doesn’t maintain a browsing history. You look quite fetching in your tin foil hat. You are not just a member of Anonymous, you are Anonymous! But do you realize how suspicious this makes you look? The haggard look from having to memorize all those URLs and passwords, the darting eye movements… Somebody is going to haul you in for questioning just for the hell of it. At that point, you represent a challenge to the surveillance team: a hard target, somebody they can use to hone their skills. This is not a good position to be in.

Internet anonymity doesn’t have much of a future. It is already all but nonexistent in China. You land in Beijing, and need a cell phone. To purchase a SIM card for your cell phone, you need to show your passport. Now you SIM card is tied to your passport number. You go to an Internet café. There, Internet access is free, but to connect you need a password which is sent to your cell phone via SMS. Now your passport number is tied to everything you do while on the Internet. Can you remain anonymous? Not too much, I would think.

But even if you could remain anonymous, are you still rebellious enough to challenge the status quo through risky but effective covert action? My guess is that you are by now quite docile, thanks, again, to the Internet. You don’t want to do anything that might jeopardize your access to it. You have your favorite music and books in the cloud, your online games, your Facebook friends, and you can’t imagine life without them. For many people, Internet is also the way they get sex, either voyeuristically, through porn, or by finding people to have sex with. And I have observed that men, even if normally rebellious, become quite docile if they think that they might get to have sex. (Women tend to be more docile than men in any case.) Overall, there seems to be a taming effect associated with Internet access. People might still feel rage, but they rage by posting nasty comments on blogs or engaging in flame wars on newsgroups.

There is supposed to be such a thing as Internet activism, but a better term for it is “Slacktivism,” a term used by Evgeny Morozov in his book The Net Delusion, which is worth a look. He is a Belarussian activist whose work is funded by George Soros’s Open Society Foundation, which I find creepy, plus he spends a lot of time trying to give policy advice to the US government on ways to promote democracy abroad—a funny-smelling subject as far as I am concerned, pots calling kettles black and so on. He does list a lot of amusing SNAFUs, such as the State Department spending money to train Iranian bloggers to use software that’s been embargoed by the Treasury Department. But the point he makes about Internet activism is important: it is too easy, too low-risk (unless you happen to be in Iran or Syria or Belarus) and, in general, futile. Should it ever rise to the point of posing a threat to the status quo, it is easily neutralized by authoritarian governments, Western corporations, or a combination of both. The world’s biggest censors are not China and Russia, says Morozov, they are Apple Computer and Facebook. In all, Internet activism is a powerful time-waster, a boon for repressive, authoritarian regimes, a tar pit for foreign Internet neophytes, and a delusion for Western politicians and activists.

Does the idea of achieving some significant political effect still seem interesting? What if I told you that you could achieve that same effect with just a bit of patience, sitting like a Buddha with your arms folded, a beatific smile on your face? The idea is not too far-fetched.

You see, the Internet is a very resilient system, designed to let packets flow around any obstruction. It is, to some extent, self-regulating and self-healing. But it depends on another system, which is not resilient at all: the electric grid. In the US, the grid is a creaking, aging system, which now exhibits an exponentially increasing rate of failure. It is susceptible to the phenomenon of cascaded failure, where small faults are magnified throughout the system. Since the money needed to upgrade the system no longer exists, blackouts will continue to proliferate. As the grid goes down, Internet access will be lost. Cell phone access is more likely to remain, but without the grid most people will lose the ability to recharge their mobile devices. Information technology may look shiny and new, but the fact remains that the Internet is around 40% coal-fired and around 20% nuclear-powered.

Beyond the purely technical issues with the electric grid, there is also a problem with finding enough energy to power it. About half the electricity comes from coal, which is of increasingly poor quality. The volumes of coal are staying more or less constant, but the energy density of the coal is decreasing over time. The anthracite that made the age of steam possible is all but gone. The lignite and brown coal that have replaced it are sometimes closer to dirt than to coal. At some point it will become a net waste of energy to mine them and transport them to a power plant. Already the inferior quality of coal is causing giant balls of clinker to accumulate in the power plant furnaces, causing extensive downtime and millions in damage. As for other sources of electricity, the aging nuclear power plants, many on their last legs and already unsafe, is a story for a separate article; likewise with the mirage of energy independence, to be achieved by “fracking” for shale gas and other equally ineffective dirty tricks. Moving forward, the amount of time the electric grid is available in any given place will dwindle, and with it the amount of Internet access.

As the electric grid goes down, there will be a great deal of economic disruption, which is enough material for yet another article. But in terms of the surveillance system, two effects are virtually guaranteed. First, people will once again become very expensive to track and monitor, as in the olden days of the KGB. Second, people will cease to be docile. What keeps people docile is access to the magic shiny world of television and the Internet. Their own lives might be dull, grey, hopeless, and filled with drudgery, but as long as they can periodically catch a glimpse of heaven inhabited by smooth-skinned celebrities with toned muscles sporting the latest fashions, listen to their favorite noise, watch a football game, and distract themselves with video games, blogs, or cute animals on Reddit’s /r/aww, they can at least dream. Once they wake up from that dream, they look around, and then look around some more, and then they become seriously angry. This is why the many countries and regions that at one time or another ran short on energy, be it former Soviet Georgia or Bulgaria or the Russian far east, always tried to provide at least a few hours of electricity every day, usually in the evenings, during “prime time,” so that the populace could get its daily dose of fiction, because this was cheaper than containing a seriously angry populace by imposing curfews and maintaining around-the-clock military patrols and checkpoints.

And so, if you want to achieve a serious political effect, my suggestion is that you sit back Buddha-like, fold your arms, and do some deep breathing exercises. Then you should work on developing some interpersonal skills that don’t need to be mediated by electronics. Chances are, you will get plenty of opportunities to practice them when the time comes, giving seriously angry people something useful to do. By then nobody will be watching you, because the watchers will have grown tired of looking at their persistently blank monitor screens and gone home. Then they too will become seriously angry—but not at you.
~
See also Fundraising In Extremis: The invisible hand of the free market, it turns out, is attached to an invisible idiot.
~~

One Comment

A fascinating aspect: How could we possibly harm them with more than pin pricks? Paranoia? Guilt complexes? Bizarre. Shades of 1984.

Follow

Get every new post delivered to your Inbox.

Join 4,559 other followers