“By all means, doubt me”: Continuing the criticism of Snowden

A scene from the third Treehouse of Horror of the Simpsons (s3e7).

Originally published on the Leftist Critic blog on May 20, 2017.

This post was analyzed for mistakes and other content in January 2019, as part of an effort to engage in self-criticism. Some changes have been made.

In the past I’ve criticized Snowden’s ridiculous claims and his celebrity-like status. I first mentioned him in an article criticizing The Intercept, Pierre Omidyar’s plaything, the CIA and corporate surveillance, noting how a letter by Tim Cook, the Apple CEO, got Snowden and “celebrity left personality Deray to back Apple,” which collects reams of data itself. A few months after that, I wrote an article saying that “celebrity whistleblower Edward Snowden…has wide influence it is best to look at his words and their symbolic meaning” and that Snowden, in his “privileged position,” can be critical of the media even has he ignores the “role of the bourgeois media” in capitalist society, gives the New York Times a pass despite the fact that its audience is broadly male college-educated bourgeois individuals, never mentions “the role of advertisers in determining media content,” and puts out, just like BuzzFeed and Celebrity Left personalities, “content…engineered to be more attention getting, even though they have no public value…[or] no news value at all,” with his often “self-congratulatory and…egoist remarks” with a “pseudo-change sentiment” at times, even as much of the content he found while working at the NSA and CIA as a contractor has STILL not been released. The following month, in response to frothing-at-the-mouth conspiracist individuals who are worthless twitter scum and give reason for why people hate “the Left,” I wrote another piece about Snowden. I went through a number of conspiracies revolving around Snowden’s ties to the CIA, saying that: (1) “Ellsburg, Assange, and Snowden should be criticized, but to call them intelligence operations seems far-fetched and just putting oneself down a rabbit hole with no escape”; (2) “…Assange and Snowden are likely not in as much danger as supporters claim, to claim they are intelligence assets…[or] created by certain U.S. covert elements is…so ridiculous that it isn’t worth taking [it]…seriously,” among other elements.

Today, I aim to return to Snowden once again with some information I scoured from old storifies I deleted. Perhaps we can start use what Snowden said to show his “adversarial” nature which includes “challenging” the U$ government (not really), staying uber-nationalist, and promoting encryption software as a solution (“By all means, doubt me. Be suspicious and test my every claim. That’s rational. Then, do the same for those in power. That’s American”) to criticize him and his pathetic narrative.

Enter Douglas Valentine

I’ve read Mr. Valentine’s Strength of the Wolf, even using it to talk about the drug trade within Iran in the 1940s through the 1960s. Here, I aim to look at some of his posts on Snowden. To my knowledge, he has only written two posts on Snowden apart from a post criticizing journalist, and celebrity left personality, Glenn Greenwald on income inequality, another criticizing the movie of Greenwald’s friend in company, Jeremy Scahill, Dirty Wars, for being self-indulgent, or a small mention in an article poking at those “criticizing” the NSA.

In his 2013 article, the first substantively on Snowden, Mr. Valentine argues that Greenwald is trying to prove he is “a different sort of liberal capitalist” by launching his “media empire with a sensational “exposé” on the National Security Agency (NSA)” based on the documents Snowden gave him. He goes on to say that Snowden’s material “undoubtedly reveals NSA-supported CIA operations at the strategic level around the world” but that he could also “sift through Snowden’s material, edit out the good stuff, and focus on tactical matters like assassinations,” which would be good for those that favor such assassinations. He ends by saying that Greenwald could do “what Snowden did and risk it all. The choice is his.” At this point and time, clearly, Mr. Valentine was more favorable to Snowden. By 2015 that would change.

That year, Mr. Valentine wrote an article which criticized Citizen Four, way before that horrid Oliver Stone “Snowden” movie had come on the scene. He notes how the documentary begins with Greenwald sitting in a hotel room in Hong Kong with Snowden and Ewen MacAskill, a Guardian reporter, with Snowden “earnestly explaining his selfless motive,” saying that he wants the store to be about “the mechanisms of the thought police” not about himself. However, Greenwald has different ideas, thinking, as Mr. Valentine argues, that he can turn Snowden into a big celebrity and “Hollywood star,” showing Greenwald as maneuvering the “naive, trusting, vulnerable” Snowden into being a celebrity, with Snowden submitting himself to such manipulation. The article goes on to say that Greenwald’s money-making scheme from the Snowden files, which calls “GG Industries Inc” (now including all of those at The Intercept) sees Snowden as “a celebrity and perpetual money-making myth for the faux gauche, in the mold of Dan Ellsberg” or Bob Dylan, who he argues “creates its special kind of neurasthenia, a complex of neuroses that render the celebrity incapable of honest self-awareness or genuine human interaction,” a form of the “celebrity virus.” Mr. Valentine goes on. He says that such celebrities direct “all of America’s latent revolutionary impulses into America’s unique brand of post-modern fascism,” that the Citizen Four documentary deceives the audience as a classist “propaganda film” that protects the CIA while exploiting Snowden to be a celebrity, serving the bourgeois, and being “the biggest fluff piece ever contrived.” His criticism goes beyond this by saying that the producers of the documentary cannot be critical of Snowden, which manipulates its audience,who is a “dedicated counter-revolutionary,” who doesn’t want to reveal CIA “methods…names and locations” which he calls, probably accurately, a “fascistic streak” and adds thatin the end, Citizen Four is “a propaganda film espousing the virtues of the faux gauche and its self-induced delusion, and self-perpetuating illusion, that the capitalist system is capable of correcting itself.” The rest of the article writes itself.

Mr. Valentine’s criticism is on par with what Tarzie says, who goes farther by saying that “there can be no intelligent, leftist consideration of Snowden, or any other figure of similar stature for that matter, without recognizing that we know him entirely through instruments specially designed to prevent and suppress any dissent that’s likely to disquiet members of the ruling class and their state security apparatus,” that the few “genuinely entertaining aspects of The Snowden Show at its peak was the struggle of his hand-picked media proxies [such as Greenwald] to look like enemies of the state as they flew from place to place, entirely without incident,” and that Snowden was “running what’s known in intelligence as a limited hangout.” He added that Snowden “encourages us to focus entirely on signals intelligence, and…on only one of the federal agencies that collect signals intelligence,” such as the CIA, leading to a “trivial conversation about surveillance, that…chillingly reminds people they’re always being watched” and that Snowden & Co. have fostered a “swamp of pseudo-dissidence.”

While I tend to be more critical of Tarzie, who defines himself as an anarchist living in Seattle for all I know, after he blocked me on his now-suspended account (@TheRancidSector), even though I still follow his other account without interruption. He blocked me then when I criticized him for calling for another Twitter user to kill themselves since they said something that made him angry, and didn’t respond for some time afterwards to his “steaming” tweets, showing that he didn’t give me a chance to explain myself. Still, I think that he has a good point here when it comes to Snowden. He does tend, as does do the rest of the sycophants, to focus on the NSA and not other intelligence agencies, with a few exceptions. However, I wouldn’t say he was running a “limited hangout” only because I don’t know enough about the subject admittedly and it risks getting pulled into the conspiracist realm of the never-ending theorizing about the JFK assassination or 9/11 attacks, which is a waste of everyone’s time. Instead of worrying yourself with trying to “investigate” these topics on your own and get stuck in the conspiracist loop, perhaps it is better to organize against capitalism, revealing actual conspiracies about the capitalist class oppressing the proletariat rather than theories you get from magical authors/commentators (like Alex Jones or Webster Tarpley to name a few) who claim to “know the truth” and are part of an industry to promote these theories to the populace for a buck.

Problem with the “Deep State” term

In terms of conspiracists, there is one term that has made its stamp in the public discourse recently: “deep state.” I first heard of it when I went to the LeftForum years ago, on some handouts given out by 9/11 conspiracists if I remember correctly and dismissed it back then, but now it has come to the forefront more than before, even taking the form of an “announcement” on the Descent Into Tyranny subreddit. [1]

Some advocates of the term even admit that it is “hard to define precisely” while others have just mentioned it in passing (see here and here)or mentioned it in reference to the spying on Martin Luther King, Jr. and Thurgood Marshall, is on an international scale. There have been some recent criticisms. One individual criticized by the term by saying that the “real deep state” is the administrative state or federal bureaucracy that the orange menace’s administration seems they are fighting.

The other was a more direct criticism striking at the heart of the term itself by Mr. Anthony DiMaggio. He says that the rise of the “deep state” critique basically started by Mr. Lofgren, which meant to “spotlight the U.S. corporate-national security-intelligence apparatus, has quickly devolved into a cartoonish absurdity” and no longer useful. He goes on to say that even as he agrees that focusing on the dangers of the National Security State, use of the “panopticon as a symbol of the modern-day surveillance state is apt,” emphasizing “other threats to American democracy,” and concern about “rise of Wall Street power,” is justified, that the concept is not nuanced or clear, meaning that Lofgren’s analysis is tame, pedestrian, and conservative, not incorporating any Marxian concepts within elite theory. Mr. DiMaggio adds that the idea of a “secret shadow government, impervious to any controls or regulation by elected officials” which is so effective that the U$ populace has “zero political influence over American politics” and pushes away any promotion of political change is absurd since “the last century of U.S. political activism demonstrates that large numbers of social movements were able to fundamentally transform American culture and politics.” He adds to this that saying that so-called “deep state” bureaucrats hold all of the power in Washington instead of elected officials is also not true, even though there is an “institutionalized military-intelligence state…[and] a militarized police system,” since politicians are not “puppets of the bureaucracy,” the intelligence (or military) community is not uniformed or unified “about U.S. militarism and empire.” He ends by saying he isn’t sure why “additional analytical value” comes from referring to the military apparatus and intelligence agencies as a “deep state” and that the term’s value is dwindling, meaning “whatever people want it to mean,” suggesting that “it’s time to start looking for a more coherent, informed analyses than what is being offered by various conspiracy theorists on the left and right.”

Mr. DiMaggio is no radical, just like Mr. Lofgren, who condemned Marxism, the idea of the dictatorship of the proletariat, and claimed that we have “to reflect upon defunct glacial despotisms such as the USSR or East Germany to realize that nothing is forever,” despite the fact that both, even if they arguably were revisionist states in their later years, were by no means “despotisms.” Also, we don’t need to “reflect” upon those states. Mr. DiMaggio condemns what he calls dictatorships (“Mubarak in Egypt, Assad in Syria, or Erdogan in Turkey”) even though Assad’s government doesn’t fit that description, and he engages in uber nationalist, pro-imperialist rhetoric in saying that there are “obvious differences” between the U$ and those countries, implying that the U$ is somehow “better” than other parts of the world, an Orientalist viewpoint. Still, his criticism of the “deep state” is completely justified. Karen (kazahann), has argued that the term blocks criticism of the capitalist class, is a worthless buzzword, and claims that the state is neutral or benign.

Karen and Mr. DiMaggio’s criticisms should be taken to heart. The term, as I see it, is highly inaccurate and leads to political apathy. This is bolstered by the fact that those who advocate for the idea of a “deep state,” such as John W. Whitehead, Paul Street, John Stanton (quoting Peggy Noonan), and Mr. Lofgren, cannot agree on one definition but include the following groups within their respective use of the term: militarized police, fusion centers, courthouses, prisons, private mercenaries, the hundreds of thousands who have Top Secret clearance, the Pentagon, the State Department, the Department of Homeland Security (DHS), CIA, Department of Justice (DOJ), Department of Treasury, National Security Council, FISA court, certain federal trial courts, defense and intelligence communities at-large, other spy agencies, Wall Street, the military-industrial-complex, Silicon Valley (also called Sexist Valley or Surveillance Valley more accurately), the Joint Chiefs of Staff, and Federal Reserve.

Just this list shows that the theory is all over the place and totally disorganized, with no rhyme or reason. Instead, of using such a misplaced idea, it is better to talk about the capitalist bureaucracy that most of these organizations, apart from the social control organs manifested in courthouses, prisons, and fusion centers, and capitalist industry represented by Silicon Valley or Wall Street, inhibit. There is undoubtedly a surveillance apparatus within the capitalist bureaucracy of the U$, which fulfills a purpose to keep the populace in line, watching for any challenges to the capitalist class, looking to disrupt and shut it down. Such groups are much more vast than what the “Deep State” theorists imagine, but includes a constellation of agencies brought together by the White House Situation Room, but also independent, working in the areas of “intelligence,” “homeland security,” military affairs, and civilian affairs. A chart from a book by bourgeois liberal journalists, Dana Priest and William Arkin, titled Top Secret America, written in 2011, lays this out clearly for all to see:

This is used under the fair use section of copyright law as a way of educating people about these institutions in the US government, if any of you damn corporate lawyers read this

Such a chart doesn’t include the private military contractors (mercenaries), the hundreds of thousands who have Top Secret clearance, the foreign policy establishment in the State Department, the National Security Council, the Joint Chiefs of Staff, or Federal Reserve, which also have a role in the capitalist state. I don’t need anyone to say that “the whole government” is the “thought police,” with the state defending an “entrenched economic elite and philosophic orthodoxy,” or that the US’s “representative democracy has broken down,” serving the big capitalists, I can figure that out myself. [2] You could even call it the National Security State if you wanted, like Gore Vidal, but that may be too limited of a term for what exists currently.

Bashar Al-Assad and the “deep state”

On April 27th, the duly elected president of the socially democratic and secular Arab Republic of Syria, Bashar Al-Assad, had an interview with Telesur where he sort of used the term “deep state.” Here’s what he said in response to a question about the orange menace’s foreign policies, with the “deep state” section bolded:

The American President has no policies. There are policies drawn by the American institutions which control the American regime which are the intelligence agencies, the Pentagon, the big arms and oil companies, and financial institutions, in addition to some other lobbies which influence American decision-making. The American President merely implements these policies, and the evidence is that when Trump tried to move on a different track, during and after his election campaign, he couldn’t. He came under a ferocious attack. As we have seen in the past few week, he changed his rhetoric completely and subjected himself to the terms of the deep American state, or the deep American regime. That’s why it is unrealistic and a complete waste of time to make an assessment of the American President’s foreign policy, for he might say something; but he ultimately does what these institutions dictate to him. This is not new. This has been ongoing American policy for decades.

Revisionist Gowans describes this as Assad recognizing that “the US government is…a committee for managing the common affairs of the country’s business owners” with US foreign policy serving their interests. In this case, Assad is NOT using the term “deep state” in the same way as conspiracists use it, but rather is using it to describe, the state being a manager of the affairs of the bourgeoisie as Marx and Engels described the actions of a capitalist state. Assad is undoubtedly right in this regard and is right to point out that US foreign policy is imperialist and serves the capitalist class…but why would such a policy not serve their interests? It always has in some way or another.

The surveillance apparatus strikes again!

Recently Greenwald wrote a heavily promoted story disproving, on his terms, that Snowden was not a “spy for either [capitalist] Russia and/or [revisionist] China at the time he took and then leaked documents from the National Security Agency.” I personally don’t think it is even worth anyone’s effort to read this article which is clearly self-congratulatory and egoist, saying that they “were right” all along. I do think it is evident that Snowden was not a Russian or Chinese spy, but that isn’t the point. Neither are claims by people like bourgeois liberal Fareed Zakaria in the Washington Post. [3] Instead, the discussion should be about the U$’s worldwide surveillance apparatus.

There are a number of facts that are evident. [4] For one, there are the NSA misdeeds including wiretapping a member of Congress, collecting the telephone records of millions of US Verizon customers, gathering information from tech giants (Google, Facebook, Microsoft, Yahoo, Skype, YouTube, and Apple) in the PRISM program, trying to access the data of private companies from 1999-2007 with only Qwest refusing access, monitoring all credit card transactions, and running the country’s biggest spy center If that isn’t enough, the NSA has: been getting an “electronic copy” of detail records of all Verizon phone calls within the U$ and between the U$ and abroad; has “strategic partnerships” with varied companies (At&T, Verizon, Motorola, Qwest, Intel, Microsoft, Cisco, HP, EDS, Oracle, and Qualcomm); shares signal Intelligence with exchanged with Israel, including private data of Americans; spying on foreign leaders (former President of Brazil Dilma Rousseff, Mexico’s Peno Nieto, Germany’s Angela Merkel); spying on UN Security Council members; partnering with Saudi Arabia’s brutal state police; infects millions of computers with malware; and may have caused the Syrian internet blackout in 2012. And there are many more programs. However, the NSA is obviously not the only one in this game. Apart from the DOJ once wiretapping the cloakroom of the House of Representatives, the FBI worked with the NSA on spying on Muslim leaders, worked with the CIA to select information from the PRISM system, and gave the NSA access to a broad range of data on Facebook. The FBI also has used drones to monitor citizens on U$ soil, is monitoring “First Amendment activities…in the name of safety and security in a post-9/11 age,” is conducting its “own signals intelligence as part of the Data Intercept Technology Unit (DITU),” having the Magic Lantern program which logs keystrokes, the surveillance program called the Computer and Internet Protocol Address Verifier, and DCSNet which is a “sophisticated, point-and-click surveillance system that performs instant wiretaps on almost any communications device.” Apart from that, there is evidence that the CIA searched U$ senate computers, that all U$ mail is being scanned and put into the “Mail Isolation Control and Tracking” database, and that there is a “terrorist screening database” of 680,000 people, almost half of whom are not classified as “terrorists,” with the CIA, DIA, NSA and FBI among those who can nominate people to the list. Then, of course there is the surveillance blimps program launched by the U$ Army, called aerostats, which have a “surveillance range of over 300 miles,” with this program still on schedule and in operation despite the loss of one of the huge surveillance blimps from Aberdeen in October 2015.

With this data, all of those government entities engaging in surveillance (CIA, DIA, NSA, FBI, DOJ, DHS, and others) are committing crimes, eviscerating privacy, but so are big capitalist firms, especially in the tech industry, like Google, Apple, and Verizon to name a few. Some have said that there is so much data that the NSA has “invented new units of measurement just to describe it” with the NSA’s electric bill reaching in the millions of dollars each year, while some facial recognition and RFID software becomes more common, as billions are spent to keep “secrets secret” making it easier to crack down on dissent to the capitalist class in this surveillance (and capitalist) society. [5] I know conspiracists will be giddy about me mentioning the word RFID chips, as many think it is part of some government conspiracy, but they can just wipe the grins right off their faces. The corporate and government surveillance systems are one complex and should not be separated or compartmentalized as some, like Snowden & co., have done. This system, which some have called “Top Secret America,” others the “surveillance state,” or the “national security state,” is a partnership between big capitalists and the US capitalist government. We have a state of total surveillance with no gender, class, religious or other boundaries, but it falls hardest on the proletariat whether they are people of color, dedicated activists, or Muslims, to name a few.

The government, has for years, been afraid of leaked information, even more so with the orange menace in charge. In the 1980s, the CIA’s Director of Security was angry that information had been released to establishment journalist Bob Woodward (some think that he working with the CIA as planted journalist but this has not been proven and is still a speculation) about the MIG-25, echoing other concerns by the NSA. [6] This was not a surprise since the Church and Pike Committees in 1970s, with the former committee more moderate than the latter, which included revelations about the CIA MK/ULTRA experiments, with the intelligence agencies feeling “secure behind the cloak.” [7] Other concerns were abound. The CIA’s Director of Public Affairs, their propaganda officer, chastised Woodward for violating supposed “ground rules” for interviews, and later claimed that “damage” from leaks about U$ policy toward Libya is “money and lives,” with some of this damage as “invisible.” [8] Lest us forget that the U$ engaged in anti-terrorism” actions, by firing 48 missiles and dropping 232 bombs on two airfields, two “air defense” networks, two barracks, and one camp within the Great Socialist People’s Arab Jamahiriya, then run by Muammar Gaddafi, killing over thirty Libyans as Todd R. Phinney even admitted in a pro-U$, pro-military thesis on the subject. [9] If this wasn’t enough, the CIA even created a special team to investigate leaks, with “500 such incidents” in 1986 alone, with claims it hurt “presidential credibility,” with proposals of limited paperflow and calls for “surprise police raids on newsrooms” by CIA Director Bill Casey, lining up with the Reagan administration’s limits on the Freedom of Patriot Act’s scope. [10] By 1988, then-Ambassador Richard Helms was lamenting that U$ “friends and collaborators abroad” have been convinced “that our Intelligence Community can keep no secrets,” which could “hurt” the empire. [11]

It is worth pointing this out because Obama’s war against leakers/whistleblowers has and will continue under the orange menace who is egotistical and more about his self-image than many others who have held the presidency, making it “not an aberration, but the norm.” [12] Hence, while they try to stop the leaks, they will keep coming, which isn’t necessarily a bad thing except that such leakers are often moderate in their beliefs and only one reform, meaning that the capitalist system is able to deal with such disruptions. Expanding on that is a subject for another day, maybe.

The “surveillance reform” BS

In order to determine what should be done, it is worth considering what shouldn’t be done first. Snowden himself has issued calls for surveillance reform, which Tarzie criticized for the former having a “bizarre notion of human rights.” In the post, Snowden is quoted as saying that “self-government is about…[not] making these decisions behind closed doors, without public debate, without public consent” and that the decision about surveillance belongs to the people not politicians.

For one, this is ignorant of the reality because as it stands now, people don’t have such a voice in US government. In the famed April 2014 study by Martin Gilens of Princeton University and Benjamin L. Page of Northwestern University, they argued that “economic elites and organized groups representing business interests have substantial independent impacts on U.S. government policy, while mass-based interest groups and average citizens have little or no independent influence…Our analyses suggest that majorities of the American public actually have little influence over the policies our government adopts.” This was even echoed by fake “radical” and class collaborator Noam Chomsky in August 2013, when he said that “roughly 70% of the population…have no influence on policy whatsoever. They’re effectively disenfranchised….maybe a tenth of one percent…determine the policy…the proper term for that is not democracy; it’s plutocracy.” Even Chris Hedges, who embraces “democratic socialism,” openly quotes rabid anti-communist George Orwell, and determined the characteristics for being “a socialist,” while waving the word around, admitted this much. Remember he is also a person who says he opposestotalitarian capitalism” (can’t you just call it capitalism?), was confused if the U$ had capitalism or not, hates Black Bloc with a passion (see here, here, and here), is pro-Green Party (a social democratic party), and declared seven paragraphs into an article criticizing climate change liberals that:

“This is not a battle [against “corporate capitalism] I would have picked. I prefer incremental and piecemeal reform. I prefer a system in which we can elect politicians to represent the governed and thwart corporate abuse. I prefer a United Nations that serves the interests of people around the globe rather than corporate profit. I prefer a vigorous and free debate in the public arena. I prefer a judiciary that is not a wholly owned subsidiary of the corporate state. I prefer the freedom to express dissent without government monitoring of my communications and control of my movements. I prefer to have my basic civil liberties protected. But we do not live in such a system.”

This shows that Hedges is a wannabe radical who is really an inner liberal. Still, he said in his book, Empire of Illusion (p. 142-143), that the idea of consent of the governed is an empty one: “The words consent of the governed have become an empty phrase…Our nation has been hijacked by oligarchs, corporations, and a narrow, selfish, political, and economic elite…The government…provides little more than technical expertise for elites and corporations…It has become the greatest illusion in a culture of illusions.” Beyond this, there is the controversial but well-sourced study titled ‘Human and Nature Dynamics (HANDY): Modeling Inequality and Use of Resources in the Collapse or Sustainability of Societies’ which argued that the collapse of human civilization can be avoided if “the rate of depletion of nature is reduced to a sustainable level and if resources are distributed equitably” and said that most common in society today are elite-commoner societies: “the economic stratification of society into Elites and Masses (or “Commoners”)…accumulated surplus [or wealth] is not evenly distributed throughout society, but rather has been controlled by an elite. The mass of the population, while producing the wealth, is only allocated a small portion of it by elites, usually at or just above subsistence levels…Elites “prey” on the production of wealth by Commoners.” Even more, as a leaked Citigroup memo (if it isn’t a hoax) noted, there is a plutonomy referring to the habits of rich consumers, rather than “the rest, the “non-rich”, the multitudinous many” which is driven by “ongoing technology/biotechnology revolution…capitalist-friendly governments and tax regimes…greater financial complexity and innovation…[and] patent protection.”

This invalidates Snowden’s philosophy, if you could call it that, which is that: as “long as there’s broad support amongst a people, it can be argued there’s a level of legitimacy even to the most invasive and morally wrong program, as it was an informed and willing decision…the public needs to decide whether these policies are right or wrong.” [13]  Ultimately, the people, as it currently stands, don’t have an ability to decide if policies are right or wrong because they aren’t part of the policy-making apparatus, and their views are easily brushed aside by capitalist class in the U$ and in other capitalist states. Additionally, Snowden’s trust in the thoughts of the public also forgets the fact that public opinion polls can be manipulated, deceptive, or limit “people’s sense of wider possibilities.” Still, I would like to point out I am not saying that people do have the ability to influence or push government to make certain decisions. However, I am saying that in general, the government, I’m mainly talking about the U$ government but this could be applied to other governments, doesn’t really care what ordinary people think. They care what the people with the deep pockets say and think. That’s who they, in general, listen to. That is the current state of affairs.

Then there is the whole “Reset the Net” campaign, making it clear that working with the corporate sector in order to counter surveillance is wholly counterproductive and makes you a simple pawn of big business, along with recognizing reforming the NSA in any way, shape or form is a waste of energy. This “anti-surveillance” campaign was created after  Snowden’s “revelations of government surveillance” with Snowden making it seem that it would be opposing all types of surveillance, saying that “today, we can begin the work of effectively shutting down the collection of our online communications, even if the US Congress fails to do the same…[encryption is] the first effective step that everyone can take to end mass surveillance…don’t ask for your privacy. Take it back.” [14] However, Tiffiniy Cheng, spokesperson for Fight for the Future, which coordinated Reset the Net basically undermined this idea. She told its real focus, saying that “now, they’ve [the US government] got a rebellion on their hands as tech companies and internet users work together to directly intervene in mass surveillance and block the NSA and its kind from the web.”

I’m not sure how something is a “rebellion” if corporations and internet users are working together! That sounds more like a way for the companies to reassure customers and their users that they “care” about privacy. As Microsoft’s General Counsel Brad Smith said, “it’s of course important for companies to do the things under our own control, and what we have under our own control is our own technology practices. I don’t know that anyone believes that will be sufficient to allay everyone’s concerns. There is a need for reform of government practices, but those will take longer.” This makes me concerned about this campaign.Another problem is that the campaign’s main goal is to push for “mass adoption of encryption is a tool to fight mass surveillance” strong encryption doesn’t always translate into cyber security in reality. Despite this, the EFF, the Tor Project, ACLU of Massachusetts (and likely the whole organization), Yves Smith of Naked Capitalism, Natasha Leonard of Vice and New Inquiry, Glenn Greenwald (I would believe so) [15] and many others support this campaign.

Using their website, I found who supports Reset the Net, which are the usual suspects. According to their list of supporters, which compromises of fifty-six non-profit, public and private organizations, thirteen are for-profit companies (approx. 23%), twenty are non profits (including the three organizations that back Democrats) (approx. 36 %), three are political parties, and four are mostly alternative media. The rest, sixteen organizations, are considered other, as I could not figure how to categorize them. Think what you want about these supporters, but this doesn’t look good to me. Ashlin Lee and Peta Cook of the University of Tasmania added that while the campaign could be praised,

“encryption makes any collected data more difficult (but not impossible) for authorities to interpret and act upon…The Reset the Net project acts to reinforce the idea that surveillance is primarily conducted by state authorities…But the reality is that the NSA is only one actor in the surveillance drama…Google is just one of many private companies conducting surveillance today…Surveillance today is not just about seeing into the lives of the present – it’s about cataloguing and using the past (and present) to understand the future…The Reset the Net project paradoxically represents a small positive step in resisting and counteracting warrantless and illegal surveillance, while ignoring the bigger picture.”

Yasha Levine had a similar critique on PandoDaily, which often shills for the tech industry (but didn’t in this article), writing that Reset the Net avoids Google’s snooping, saying that “the campaign is not against online surveillance, just government surveillance….these companies — which themselves stay in business by spying on us online — help to defeat surveillance? By offering encryption apps…Reset the Net is outraged by our government’s capability to wantonly vacuum up our personal info, and yet it unconditionally trusts powerful Surveillance Valley megacorps when they do the same thing on an even greater scale as a normal part of doing business.” Bill Blunden argues something similar saying that “in contrast to the inflated fanfare about disrupting terrorist plots…the global surveillance apparatus is essentially being driven by powerful corporate interests….Roughly 70 percent of the intelligence budget…goes to the private sector…Google has extensive long-standing connections with the defense industry.” Then there are quotes of individuals in the PBS Frontline documentary, United States of Secrets, talking about how corporations were integral to the surveillance apparatus, connected to the government-issued National Security Letters (NSL) which can compel certain private companies and individuals to give them information, quoting Tim Wu, Chris Hoofnagle, Julia Angwin, Askan Soltani, Barton Gellman, Lorenzo Franceschi-Bicchierai, and Martin Smith, to name a few.

To end this off, the Reset the Net supporters who know the underlying truth that corporations are integral to surveillance system, and still support the campaign are being foolish. There is no doubt that the interests of those against government surveillance will overlap with the companies that want to act like they care about privacy (they don’t). I understand why ordinary people are participating in this campaign as many are pissed off and for good reason, but I will not be signing any petitions, or participating in any actions by Reset the Net or others following their example. Some seem to think that working with the companies is a good idea and I disagree. Even though these companies have a good amount of clout, that doesn’t mean that people should be working with them. This effort, Reset the Net, is no rebellion, rather it is an anti-NSA surveillance effort serving as a front for corporations that participate (and profit from) government mass surveillance. As Eli Pariser wrote, powerful cloud giants, like Google and Amazon, have “a vested interest in keeping the government entities happy.” [16] This effort is in a sense a way of keeping the government entities happy, as it distracts from the corporate-state nexis on surveillance, but in another sense it is also about defending their bottom line, their profit margins, protecting their consumer base. Some may think that Reset the Net is even a social movement, but clearly is not by any reasonable standards. It does not deploy symbolic resources, it does not shift construction of identity and it does not product popular and scholarly knowledge.

What should be done?

The total surveillance that exists today is nothing new.The “rollback” of NSA surveillance hasn’t changed much broadly as the FBI still pushes to keep its existing surveillance powers. At minimum, those who care about state surveillance should push for the NSA, CIA and FBI to be abolished for starters, with those who committed crimes, perhaps top NSA officials, going on trial. However, this in and of itself is still reformism, only the first step, while liberals would see it as the only step. Neither encryption or bowing before tech giants to “save us” from government surveillance will solve anything. In the end, what happens now, in regards of the massive U$ surveillance apparatus, is up to us.


[1] As the Wikipedia page on the subject notes, it has been increasingly used by the orange menace’s supporters. Beyond this, see these articles as testament to how this term has seeped into the “mainstream”: Amanda Taub and Max Fisher, “As Leaks Multiply, Fears of a ‘Deep State’ in America,” New York Times, Feb. 16, 2017; Ed Rogers, “The ‘deep state’ is real. The ‘alt right’ is fake,” Washington Post opinions, Feb. 21, 2017; Moyers & Company, “The Deep State Hiding in Plain Sight,” Feb. 21, 2014; Tim Naftali, “”Deep State” myth won’t fix wiretapping mess,” CNN opinions, Mar. 17, 2017; Glenn Greenwald, “The Deep State Goes to War With President-Elect, Using Unverified Claims, as Democrats Cheer,” The Intercept, Jan. 11, 2017; Greg Grandin, “What Is the Deep State?,” The Nation, Feb. 17, 2017; Daniel Benjamin and Steven Simon, “Why Steve Bannon Wants You to Believe in the Deep State,” Politico, Mar. 21, 2017; Anne O’Donnell, “The Bolsheviks Versus the Deep State,” New York Times opinion, Mar. 27, 2017; NPR, “With Intelligence Leaks, The ‘Deep State’ Resurfaces,” Feb. 19, 2017; Doyle McManus, “Op-Ed: Is the ‘deep state’ out to get Trump? We’re not there yet,” Los Angeles Times, Feb. 19, 2017; Neil Munro, “Bill Kristol Backs ‘Deep State’ over President Trump, Republican Government,” Breitbart, Feb. 15, 2017; Philip Giraldi, “Deep State America,” The American Conservative, July 30, 2015; Rod Drehler, “The Deep State,” The American Conservative, Feb. 28, 2014; Marc Anbinder, “Trump Is Showing How the Deep State Really Works,” Foreign Policy, Feb. 15, 2017; Joel P. Pollak, “Deep State #Resistance: Spies Withhold Intel from Trump, Says WSJ,” Breitbart, Feb. 15, 2017; Steven A. Cook, “The Deep State Comes to America,” Foreign Policy, Feb. 24, 2017; Finian Cunningham, “‘Deep State’ wins… Trump is being tamed to toe the line,” Russia Today, Jan. 12, 2017; Ishaan Tharoor, “Is Trump fighting the ‘deep state’ or creating his own?,” Washington Post opinions, Feb. 1, 2017; Andrew Napolitano, “Revenge of the Deep State,” Reason, Feb. 23, 2017; Hunter Schwartz, “What’s a ‘Deep State’ and why is it a new buzzword for the online right?,” CNN opinions, Mar. 11, 2017; Democracy Now!, “Greenwald: Empowering the “Deep State” to Undermine Trump is Prescription for Destroying Democracy,” Feb. 16, 2017; Matt Wilstein, “Stephen Colbert Mocks Trump Administration’s ‘Deep State’ Paranoia,” The Daily Beast, Mar. 21, 2017; Chris Stirewalt, “Trump knocks down ‘Deep State’ claims,” Fox News, Feb. 16, 2017; Alastair Cooke, “‘Deep State’ Has Trump on the Menu,” Consortium News, Feb. 17, 2017; John R. Schindler, “Rebellion Brews in Washington—But American ‘Deep State’ Is Only a Myth,” Observer, Feb. 22, 2017; Alana Abramson, “President Trump’s Allies Keep Talking About the ‘Deep State.’ What’s That?,” Time, Mar. 8, 2017; Patrick Buchanan, “The Deep State Targets Trump,” Real Clear Politics, Feb. 17, 2017; Joe Blistein, “Watch Samantha Bee Skewer Trump’s ‘Deep State’ Fears,” Rolling Stone, Mar. 16, 2017; David Remnick, “There Is No Deep State,” New Yorker, Mar. 20, 2017; Danielle Ryan, “Is Michael Flynn the first casualty of a “deep state” coup? It’s not unthinkable,” Salon, Feb. 16, 2017; Elias Isquith, “Controlled by shadow government: Mike Lofgren reveals how top U.S. officials are at the mercy of the “deep state”,” Salon, Jan. 5, 2016; Washington’s Blog, “The Deep State,” Mar. 3, 2014; David A. Graham, “There Is No American ‘Deep State’,” The Atlantic, Feb. 20, 2017; Loren DeJonge Schulman, “The Deep State Is a Figment of Steve Bannon’s Imagination,” Politico, Mar. 9, 2017; Shadi Hamid, “The American ‘Deep State,’ as a Trump Voter Might See It,” The Atlantic, Mar. 7, 2017; Justin Raimondo, “A Win for the Deep State,” Antiwar.com, Feb. 15, 2017; Emily Jane Fox, “Trump’s Soviet-Style Plan to Create His Own Deep State,” Vanity Fair, Mar. 20, 2017; Patrick J. Buchanan, “The deep state targets Trump,” World Net Daily (WND), Feb. 16, 2017; Jeet Heer, “Donald Trump Can Do a Lot With the “Deep State”,” The New Republic, Feb. 22, 2017; Sarah Childress, “The Deep State: How Egypt’s Shadow State Won Out,” PBS, Sept. 27, 2013; Mike Lofgren, “The Deep State 2.0,” Common Dreams, Mar. 4, 2017; F.H. Buckley, “Trump’s threat to the liberal ‘deep state’,” New York Post, Jan. 17, 2017; Kevin D. Williamson, “The Right discovers the ‘Deep State,'” National Review, Mar. 12, 2017; Peter Dale Scott, “The “Deep State” behind U.S. democracy,” Voltaire Network, Apr. 6, 2011.

[2] I’m referring to David “Dave” Foreman, a former Earth First! founder, here, quoted in Defending the Earth: A Dialogue Between Murray Bookchin & Dave Foreman (ed. Steve Chase, Boston: South End Press, 1991), 44, 67. He had (and still has) some strong anti-immigrant views, there is no doubt about it. Also quoted in that book is problematic former anarchist Murray Bookchin.

[3] Fareed Zakaria, “Fareed Zakaria: Why Edward Snowden should agree to stand trial in the U.S.,” Washington Post, October 23, 2014.

[4] For information used here, see documents used in Glenn Greenwald’s new book shown in a 108 page PDF, and numerous other sources: Russ Tice, “NSA Recording All International Calls From U.S.,” March 17, 2014; TRNN, “U.S. Army to Test Blimps With Capacity to Surveil East Coast,” January 28, 2014; Michael Rattner, “Where’s the Outrage Over Spying on Muslim Civil Rights Leaders?,” July 10, 2014; Glenn Greenwald, “The U.S. Government’s Secret Plans to Spy for American Corporations,” The Intercept, Sept. 15, 2014; Ryan Gallagher, “The Surveillance Engine: How the NSA Built Its Own Secret Google,” The Intercept, Aug. 25, 2014; Glenn Greenwald and Murtaza Hussain, “The NSA’s New Partner in Spying: Saudi Arabia’s Brutal State Police,” The Intercept, July 25, 2014; Glenn Greenwald, “Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack,” The Intercept, Aug. 4, 2014; Jeremy Scahill and Ryan Devereaux, “Watch Commander: Barack Obama’s Secret Terrorist-Tracking System, by the Numbers,” The Intercept, Aug. 5, 2014; Glenn Greenwald and Ryan Gallagher, “How the NSA Plans to Infect ‘Millions’ of Computers with Malware,” The Intercept, March 12, 2014; Dam Froomkin, “Calls for Brennan’s Ouster Emerge Along With Details of CIA Search of Senate Computers,” The Intercept, March 12, 2014; Dan Novack, “DOJ Still Ducking Scrutiny After Misleading Supreme Court on Surveillance,” The Intercept, February 26, 2014; Ryan Gallagher, “How Secret Partners Expand NSA’s Surveillance Dragnet,” The Intercept, June 18, 2014; Ryan Gallagher, “Der Spiegel: NSA Put Merkel on List of 122 Targeted Leaders,” The Intercept, March 29, 2014; Dam Froomkin, “Reports of the Death of a National License-Plate Tracking Database Have Been Greatly Exaggerated,” The Intercept, March 17, 2014; Glenn Greenwald and Spencer Ackerman, “NSA collected US email records in bulk for more than two years under Obama,” The Guardian, June 27, 2013; Glenn Greenwald and Spencer Ackerman, “How the NSA is still harvesting your online data,” The Guardian, June 27, 2013; Ewan MacAskill and Julian Borger, “New NSA leaks show how US is bugging its European allies,” The Guardian, June 30, 2013; Glenn Greenwald, Ewan MacAskill, Laura Poitras, Spencer Ackerman, and Dominic Rushe, “Microsoft handed the NSA access to encrypted messages,” The Guardian, July 12, 2013; Nick Hopkins and Julian Borger, “Exclusive: NSA pays £100m in secret funding for GCHQ,” The Guardian, Aug. 1, 2013; James Ball and Spencer Ackerman, “NSA loophole allows warrantless search for US citizens’ emails and phone calls,” The Guardian, Aug. 9, 2013; Ewan MacAskill, “NSA paid millions to cover Prism compliance costs for tech companies,” The Guardian, Aug. 23, 2013; Spencer Ackerman, “US tech giants knew of NSA data collection, agency’s top lawyer insists,” The Guardian, March 19, 2014; James Ball, Julian Borger, and Glenn Greenwald, “Revealed: how US and UK spy agencies defeat internet privacy and security,” The Guardian, Sept. 6, 2013; James Ball, Bruce Schneier, and Glenn Greenwald, “NSA and GCHQ target Tor network that protects anonymity of web users,” The Guardian, Oct. 4, 2013; Glenn Greenwald and James Ball, “The top secret rules that allow NSA to use US data without a warrant,” The Guardian, June 20, 2013; Jason Burke, “NSA spied on Indian embassy and UN mission, Edward Snowden files reveal,” The Guardian, Sept. 25, 2013; Wikipedia, “Spying on United Nations leaders by United States diplomats”; Ian Trayor, Philip Oltermann, and Paul Lewis, “Angela Merkel’s call to Obama: are you bugging my mobile phone?,” The Guardian, Oct. 24, 2013; James Ball, “NSA monitored calls of 35 world leaders after US official handed over contacts,” The Guardian, Oct. 25, 2013; Alex Hern, “US government increases funding for Tor, giving $1.8m in 2013,” The Guardian, July 29, 2014; Glenn Greenwald, Laura Poitras, and Ewen MacAskill, “NSA shares raw intelligence including Americans’ data with Israel,” The Guardian, Sept. 11, 2013; Associated Press, “NSA intercepts: ordinary internet users ‘far outnumbered’ legal targets,” The Guardian, July 6, 2014; Spencer Ackerman, “NSA searched data troves for 198 ‘identifiers’ of Americans’ information,” The Guardian, June 30, 2014; Spencer Ackerman, “NSA queried phone records of just 248 people despite massive data sweep,” The Guardian, June 27, 2014; Juliette Garside, “Vodafone reveals existence of secret wires that allow state surveillance,” The Guardian, June 5, 2014; Jason Leopold, “Top NSA officials struggled over surge in Foia requests, emails reveal,” The Guardian, May 29, 2014; Matthew Weaver, “US intercepts Moscow’s calls to spies in Ukraine, report says,” The Guardian, April 30, 2014; Luke Harding, “Edward Snowden: US government spied on human rights workers,” The Guardian, April 8, 2014; Martin Pangelly, “NSA targeted Chinese telecoms giant Huawei – report,” The Guardian, March 22, 2014; Spencer Ackerman and James Ball, “Optic Nerve: millions of Yahoo webcam images intercepted by GCHQ,” The Guardian, February 28, 2014; John Vidal and Suzanne Goldenberg, “Snowden revelations of NSA spying on Copenhagen climate talks spark anger,” The Guardian, January 30, 2014; James Ball, “Angry Birds and ‘leaky’ phone apps targeted by NSA and GCHQ for user data,” The Guardian, January 28, 2014; Nafeez Ahmed, “Are you opposed to fracking? Then you might just be a terrorist,” The Guardian, January 21, 2014; Dominic Rushe, “Apple insists it did not work with NSA to create iPhone backdoor program,” The Guardian, December 31, 2013; Paul Lewis and Philip Oltermann, “Angela Merkel denied access to her NSA file,” The Guardian, April 10, 2014; Spencer Ackermann, “NSA keeps low profile at hacker conventions despite past appearances,” The Guardian, July 31, 2014; Lisa Graves, “How the Government Targeted Occupy,” In These Times, May 21, 2013; David Kravets, “FBI Admits It Surveils U.S. With Drones,” Wired magazine, June 6, 2013; Brian Zick, “”Illegal Use of Space-Based Satellites and Systems to Spy On U.S. Citizens,”” In These Times, May 12, 2006; Cole Stangler, “Tar Sands Drones Are On Their Way,” In These Times, Aug. 22, 2013; Kristie Reilly, “Warning! You Are Being Watched,” In These Times, Sept. 19, 2003; Ron Nixon, “U.S. Postal Service Logging All Mail for Law Enforcement,” New York Times, July 3, 2013; Wikipedia, “Mail Isolation Control and Tracking“; Jesus Diaz, “Imagine the US Postal Service Opened, Scanned, and Emailed All Your Letters,” Gizmodo, April 2, 2010; Bruce Schneider, “The FBI Might Do More Domestic Surveillance than the NSA,” 2013; Ryan Singel, “Point, Click … Eavesdrop: How the FBI Wiretap Net Operates,” Wired magazine, July 28, 2007; Brian Beutler, “Inside the Shadow Factory,” In These Times, Dec. 18, 2008; Susan J. Douglas, “Information Highway Robbery,” In These Times, May 28, 2014; Wikipedia, “Magic Lantern (software)“; Wikipedia, “Computer and Internet Protocol Address Verifier“; Sam Adler-Bell and David Segal, “Why NSA Surveillance Should Alarm Labor,” In These Times, July 24, 2013; Van Badham, “Governments are spying on our sexual lives. Will we tolerate it?,” The Guardian, Mar. 5, 2014; Alex Hern, “Phone call metadata does betray sensitive details about your life – study,” The Guardian, Mar. 13, 2014; Trevor Timm, “The US government doesn’t want you to know how the cops are tracking you,” The Guardian, June 14, 2014; Anthony Loewenstein, “The ultimate goal of the NSA is total population control,” The Guardian, July 10, 2014; Josh Levy, “For Communities Of Color, Mass Surveillance Is All Too Familiar,” Talking Points Memo, Nov. 5, 2013; Kirk Wiebe, “NSA Whistleblower: USA Freedom Act Will Not Go Far Enough To Protect Civil Liberties,” The Real News, Feb. 10, 2014; Ana Marie Cox, “Who should we fear more with our data: the government or companies?,” The Guardian, Jan. 20, 2014; Charles Arthur, “Google’s Eric Schmidt denies knowledge of NSA data tapping of firm,” The Guardian, Jan. 31, 2014; Arun Kundnani, “No NSA reform can fix the American Islamophobic surveillance complex,” The Guardian, Mar. 28, 2014; Nafeez Ahmed, “Pentagon preparing for mass civil breakdown,” The Guardian, June 12, 2014; Ray McGovern, “McGovern: Unconstitutionality of NSA Phone Call Collection is Indisputable,” The Real News, Dec. 16, 2013; Virginia Eubanks, “Want to Predict the Future of Surveillance? Ask Poor Communities,” The American Prospect, Jan. 15, 2014.

[5] These sources are bourgeois liberal individuals, but their analysis is half-decent so it is included here. Eli Pariser, The Filter Bubble: What the Internet is Hiding from You (New York: Penguin Press, 2007), 11; Maureen Webb, Illusions of Security: Global Surveillance and Democracy in the Post-9/11 World (San Francisco: City Lights, 2007), 48, 71-72, 84-85, 101, 194-5, 196, 201, 209, 235, 239-240, 243; Dana Priest and William M. Arkin, Top Secret America: The Rise of the New American Security State (New York: Little Brown & Company, 2011), 24, 51, 77, 156, 133, 182, 277; Mark Monmonier, Spying With Maps: Surveillance Technologies and the Future of Privacy (Chicago: University of Chicago Press, 2002), 2, 151-152, 170, 172.

[6] Director of Security to Deputy Director For Central Intelligence, May 11, 1982: “Latin American Pilots Training on Soviet Mig-25 from an article in the Washington Post entitled ‘U.S. Approves Covert Plan In Nicaragua’ by Patrick E. Tyler and Bob Woodward on 10 March 1982”; Electronic Reading Room; CREST: 25-Year Program Archive; CREST; National Archives at College Park, MD; Sissela Bok, Secrets: On the Ethics of Concealment and Revelation (Vintage Books Edition; New York: Vintage Books, 1989), 167.

[7] CIA, April, 17, 1985: Reprint of “All Things Considered” transcript on “CIA Secrecy”; Electronic Reading Room; CREST: 25-Year Program Archive; CREST; National Archives at College Park, MD.

[8] George V. Lauder, CIA Director of Public Affairs, to Bob Woodward, Washington Post, Feb. 20, 1986; Electronic Reading Room; CREST: 25-Year Program Archive; CREST; National Archives at College Park, MD; CIA, Dec. 11. 1986: “Annex: Unauthorized disclosures of Classified Intelligence”; Electronic Reading Room; CREST: 25-Year Program Archive; CREST; National Archives at College Park, MD. Bok, Secrets, 134, 169; Stephen Hess, “The Greatest Generation.” Whatever Happened to the Washington Reporters, 1978-2012 (Paperback Edition; Washington, D.C.: Brookings Instiution Press, 2013), 11.

[9] See pp. 10, 12, 16-7, 20-1 of Phinney’s thesis.

[10] William J. Casey, Director of the CIA, to Frank Carlucci, Assistant to the President for National Security, Dec. 17, 1986; Electronic Reading Room; CREST: 25-Year Program Archive; CREST; National Archives at College Park, MD. Note at the end of the letter implies that the letter is not by Casey, but someone who works for Casey, as it says “Bill might not sign these exact words but the problem and specific measures suggested are things he feels very strongly about”; Executive Director of the CIA to Frank Carlucci, Assistant to the President for National Security Affairs, Dec. 18. 1986; Electronic Reading Room; CREST: 25-Year Program Archive; CREST; National Archives at College Park, MD; Matthew B Kerbel, “The President and the News Media,” CQ Press Guide To The Presidency and the Executive Branch (Fifth Edition, ed. Michael Nelson; Thousand Oaks, CA: CQ Press, 2013), 1045; Arthur L. Liman, “Implausible Deniability: Why Reagan Was Not Impeached,” Lawyer: A Life of Counsel and Controversy (New York: PublicAffairs, 1998), 345; Hedrick Smith, “The Image Game: Scripting the Video Presidency,” The Power Game: How Washington Works (New York: Ballantine Books, 1988), 437-9, 446.

[11] William M. Baker, CIA Director of Public Affairs, to Judge Webster, Jan. 28, 1988; Electronic Reading Room; CREST: 25-Year Program Archive; CREST; National Archives at College Park, MD. The part of this document cited here is an annex titled the letter from Ambassador Richard Helms on January 22, 1988. While the document says 1987, I think it’s a mistake and they mean 1988.

[12] Wendell Bell, “Some Practical Strategies for Judging Preferable Futures,” Foundations of Futures Studies: Human Science for a New Era: Values, Objectivity, and the Good Society (Volume 2, updated edition; London: Transaction Publishers, 2004), 164; Smith, “The Image Game: Scripting the Video Presidency,” 439.

[13] This was expressed in articles in the New York Times and The Guardian. Obviously, Snowden has more thoughts than this, but these are some of his major reformist views.

[14] In a post on the Reset the Net tumblr blog, he showed that this was not the case, with the full quote which was partially used in The Guardian article:

“Today, we can begin the work of effectively shutting down the collection of our online communications, even if the US Congress fails to do the same. That’s why I’m asking you to join me on June 5th for Reset the Net, when people and companies all over the world will come together to implement the technological solutions that can put an end to the mass surveillance programs of any government. …We have the technology, and adopting encryption is the first effective step that everyone can take to end mass surveillance. That’s why I am excited for Reset the Net — it will mark the moment when we turn political expression into practical action, and protect ourselves on a large scale.”

[15] According to an article in Firedoglake by Kevin Gosztola summarizing Glenn Greenwald’s speech to the Socialism 2013 Conference, he “…expanded the discussion into how private companies are working in concert with the federal government. He characterized this coopeation as “a full-scale merger between the federal government and industry” where the two are “equally important parts” of the surveillance state,” however from this account it seems he focused a lot on government surveillance and very little on corporate surveillance which is tied into government surveillance. What was his solution? Subverting the “radical transparency” of the surveillance state, groups like Anonymous, organizations like WikiLeaks, wanting “holes to be blown in the wall of secrecy” and endorsing “the use of technology that protects the identity of users.” The last endorsement sounds a lot like Reset the Net.

[16] Pariser, The Filter Bubble, 146. One of the best examples of keeping these entities them happy is Google and the CIA both investing in a company called Recorded Future, “which focuses on using data collection to predict future real world events.”


The Intercept, the CIA, and corporate surveillance

Originally published on Leftist Critic on Feb 26, 2016.

This post was analyzed for mistakes and other content in January 2019, as part of an effort to engage in self-criticism.

As avid followers may know I had some interesting conversations with members of Omidyar’s play thing, The Intercept, which is part of a broader effort known as “First Look Media” that funds certain projects such as the recent movie, Spotlight. Anyway, this conversation begins with Jon Schwartz (@tinyrevolution) of The Intercept and ends with head honcho/celebrity left personality Glenn Greenwald (@ggreenwald). In this article I tie together both of these conversations not only to a broader critique of the CIA but of surveillance, corporate and governmental.

The reality of Jon Schwartz’s “pro-reality” article 

Jon Schwartz recently published an article in The Intercept which justifies Bernie Sanders’s position in 1974 to abolish the CIA when he ran as part of the still-existing-democratic socialist party called the Liberty Union Party. While some have convincingly argued that since he doesn’t have the position now that he shouldn’t be taken seriously and that “pragmatic” progressives won’t recognize why the CIA should be abolished today, Schwartz makes a stranger argument. In an article that could have called for the CIA’s abolishment but actually took a pro-Sanders bent, in my view, he says that Sanders’s position is NOT radical by claiming (and implying at times) that John F. Kennedy (JFK), Harry S. Truman, Dean Acheson, the final report of the Church Committee, and Daniel Moynihan wanted to abolish the CIA. Then he claims that the original article in POLITICO, that revealed this information, is part of a smear campaign against Sanders, implying that the Clinton campaign gave him the information about Sanders’s position to begin with. However, it is not worth wasting time with such silly speculation. It is better to look at Schwartz’s article to see if what he is saying is accurate.

Schwartz starts off with a quote from JFK to “prove” he wanted the CIA’s abolishment. The quote, for context was after the failed debacle, to unseat the newly communist Cuban government, known as the Bay of Pigs invasion in 1961. Kennedy said and I quote: “I wanted to splinter the CIA into a thousand pieces, and scatter it into the winds.” Now, that sounds like he would want to abolish it, and numerous people come have claimed this as well. There is no record that he pushed for the abolishment of the CIA in his other two years in office. Secondly, JFK did NOT want to blame the entire agency for the Bay of Pigs invasion. Thirdly, JFK turned to Operation Mongoose not long after. As a reminder, Operation Mongoose was, like the Bay of Pigs Invasion, an imperialist destabilization effort aimed at Cuba. Hence it easy to conclude that JFK was just angry about the Bay of Pigs invasion failing so miserably and hence was not serious about abolishing the CIA. After all, JFK was ok with CIA operations for the rest of his time in office until his assassination, so to say he would want to eliminate them is laughable.

We then move onto an article by Truman which Schwartz cites in which he apparently calls for the CIA’s abolishment. The quote from the article from Truman’s article, which cannot be accessed unless you have a subscription, which Schwartz uses as follows

“I never had any thought that when I set up the CIA that it would be injected into peacetime cloak and dagger operations. … I, therefore, would like to see the CIA be restored to its original assignment as the intelligence arm of the president … and that its operational duties be terminated or properly used elsewhere.”

As helpful comrade @nancyhoffner pointed out, Truman is lying just by looking at the Truman Doctrine (also see here) itself since there were “cloak and dagger operations” and the purpose of the CIA. While, as I noted above, the article cannot be accessed without a subscription, I could find most of it transcribed in the book Shadow Warfare: The History of America’s Undeclared Wars, but it is fully transcribed and posted here.

In the article itself, Truman acts disappointed that the CIA isn’t acting enough like “an arm of the President” who, in his view, needs “immense task and requires a special kind of an intelligence facility.” After talking about information the president receives, he claims that he set up the CIA to as an organization “charged with the collection of all intelligence reports from every available source, and to have those reports reach me as President without department “treatment” or interpretations” not with destabilization. This seems suspicious enough. He then goes on to say that the CIA apparently would would “guard against the chance of intelligence being used to influence or to lead the President into unwise decisions” and that no information should be kept from the CIA. Then he goes on to be “disturbed” by recent CIA actions, saying: “for some time I have been disturbed by the way CIA has been diverted from its original assignment. It has become an operational and at times a policy-making arm of the Government.” Before going on, I don’t understand the logic that the CIA was never a policy-making arm, as it has been policy-making since the beginning. Anyway, Truman continues and says this “new” assignment has “has led to trouble and may have compounded our difficulties” because of “peacetime cloak and dagger operations” and that it is is “being interpreted as a symbol of sinister and mysterious foreign intrigue—and a subject for cold war enemy propaganda.” Hence he is saying that the CIA must change because it is serving as a form of Communist propaganda, a strong anti-communist view. He then says that Adm. Souers, Gen. Hoyt Vandenberg and Allen Dulles were “men of the highest character, patriotism and integrity” in leading the CIA. He concludes by saying that he would “like to see the CIA be restored to its original assignment as the intelligence arm of the President” and that “there is something about the way the CIA has been functioning that is casting a shadow over our historic position and I feel that we need to correct it.”

Some people may cheer at Truman’s words and say that he is completely right. However, the reality is different. The CIA is described by the State Department’s Office of the Historian in a similar way to Truman: “The CIA served as the primary civilian intelligence-gathering organization in the government.” The National Security Act of 1947 that established the CIA declared that it would have the purpose

“of coordinating the intelligence activities of the several Government departments and agencies in the interest of national security… advise the National Security Council…to make recommendations to the National Security Council…to correlate and evaluate intelligence relating to the national security, and provide for the appropriate dissemination of such intelligence within the Government…to perform, for the benefit of the existing intelligence agencies, such additional services of common concern… to perform such other functions and duties related to intelligence affecting the national security”

Within this, I can see the actions such as CIA coups and other forms of destabilization as being justified. I don’t think that is much of a stretch ans I don’t even have to go through official diplomatic history to prove this.

Schwartz goes on to cite the memoirs of Truman’s Secretary of State, Dean Acheson who had a similar “warning” about the CIA. He specifically wrote “I had the greatest forebodings about this organization [CIA] and warned the President that as set up neither he, the National Security Council, nor anyone else would be in a position to know what it was doing or to control it.” While he said this, Acheson had a problematic history. While he apparently sympathized with Third World nationalism, he was staunchly anti-communist, blamed Mossadegh for not cooperating with the British, and kept in place U$ imperialist foreign policy manifested in the Truman Doctrine as noted in Kinzer’s All the Shah’s Men and Robert Beisner’s Dean Acheson: A Life in the Cold War. It is important to note that Acheson also supported the creation of NATO and perpetrated the U$/Soviet divide as noted in his biography by the Office of the Historian. So, lets not praise him at all.

Moving on, Schwartz cites two more sources, among others, including this, to argue that the Church Committee and Daniel P. Moynihan supported the abolishment of the CIA. As it turns out both arguments are very reserved. The Church Committee final report (sections can be read here and here), declares that

“The Committee concludes that the policy and procedural barriers are presently inadequate to insure that any covert operation is absolutely essential to the national security. These barriers must be tightened and raised or covert action should be abandoned as an instrument of foreign policy…Covert operations must be based on a careful and systematic analysis of a given situation, possible alternative outcome, the threat to American interests of these possible outcomes, and above all, the likely consequences of an attempt to intervene…With respect to congressional oversight of covert action, the Committee believes that the appropriate oversight committee should be informed of all significant covert operations prior to their initiation and that all covert action projects should be reviewed by the committee on a semi-annual basis. Further, the oversight committee should require that the annual budget submission for covert action programs be specific and detailed as to the activity recommended. Unforeseen covert action projects should be funded only from the Contingency Reserve Fund which could be replenished only after the concurrence of the oversight and any other appropriate congressional committees. The legislative intelligence oversight committee should be notified prior to any withdrawal from the Contingency Reserve Fund.”

While some could say that this is calling for the abolishment of the CIA, I don’t really see that. I basically see more restrictions on the CIA’s activities, ending covert ops if certain requirements can’t be met. I can tell you that the agents of 24 (ex: Jack Bauer), Mission Impossible, and other spy thrillers, would be pissed off at something like this. All those forms of mass media entertainment treat even minimal oversight by Congress as the worst thing ever, restricting their action to kill/torture/maim the “bad guys,” a theme which is more common than not in our current post-2001, “anti-terror” era.

Finally, Schwartz cites a section of the Congressional Record in 1995 in which he claims that Daniel P. Moynihan is calling for the abolishment of the CIA. Unlike the Church Committee’s final report, it turns out this was a reality. Not only does Moynihan take a predictably anti-communist bent, he says that “secrecy is a disease. It causes hardening of the arteries of the mind” and that US foreign policy institutions should be reformed. But his act abolishing the CIA is problematic because “all of the functions, powers and duties of the Director of Central Intelligence, the Director of the Central Intelligence Agency and any officer or component of the Central Intelligence Agency” would be transferred to the US Secretary of State. Some may think this is great, except when you realize all the implied powers the CIA had gained from 1947 to 1995 including assassination, despite it sorta being banned by executive order, concocting forms of destabilization such as coup d’etats. So basically the Secretary of State would have these powers. How does this solve anything? Why not just abolish the CIA and all of its powers?

For the record, I think the CIA should be abolished. After all, lets just look at the things the CIA has done over the years:

  1. Involvement in 1963 Baghdad Coup with funding of the Baath Party which just happens to be the same party as Saddam Hussein. [1] What a coincidence, not.
  2. A campaign to destabilize Cuba codenamed Operation Mongoose or the Cuban Project, which is related to Operation Northwoods where the U$ agents would commit acts of terrorism within the U$ and then blame them on Cuba in order to justify a war
  3. Involvement in Operation Gladio
  4. The failed Bay of Pigs invasion
  5. Operation 40, which was a group of Cuban exiles who worked to destabilize Cuba, a group which apparently disbanded in 1970 after ten years in existence
  6. A mind-control program named MKUltra (discovered in 1977) which consisted of illegal tests on numerous people to test certain psychedelic drugs like LSD and heroin. Related to this is a former mind control project called Operation ARTICHOKE, and a connected sub-project called Operation Midnight Climax in which there were CIA safehouses in San Fransciso and “prostitutes paid by the government to lure clients to the apartment served up acid-laced cocktails to unsuspecting john.” [2] Also see this and information about Project MKOften
  7. A domestic intelligence operation called Operation CHAOS [3]
  8. Giving money and assistance to pro-Tibet forces such as the Dalai Lama for years and years as part of a plan to destabilize China. [4]
  9. A secret program named Operation Mockingbird to influence media with recruiting of “leading American journalists into a network to help present the CIA’s views, and funded some student and cultural organizations, and magazines as fronts”
  10. An operation called Project COLDFEET to extract intelligence from an abandoned Soviet Arctic drilling station
  11. A program called the Civilian Irregular Defense Group (CIDG) program developed in 1961 to train the South Vietnamese military
  12. The famed program called Operation Cyclone to arm and finance the Afghan mujahideen which ultimately became Al Qaeda. Later the CIA apparently tried to buy the weapons back in Operation MIAS but this failed.
  13. Project FUBELT, a code name for CIA operations to destabilize and topple Salvador Allende’s government in Chile.
  14. A program, assisted by the British, called Operation Gold, to tap into communication lines of Soviet Army headquarters in Berlin
  15. Battalion 3-16 was a murderous Honduran military unit that received training and support from the CIA
  16. CIA involvement in drug trafficking like the information revealed in Gary Webb’s Dark Alliance series
  17. All sorts of medical experiments, which made the US citizenry a laboratory for testing, as noted in this article. These experiments aren’t a surprise considering they funded one such program called Project 112 run by the military from 1962 to 1973.
  18. A project called Project Azorian to obtain a sunken Soviet sub. Related is an operation called Operation Matador.
  19. A secret covert OPs and intelligence fathering station called JMWAVE which was operated by the CIA in Florida from 1961 until 1968.
  20. A secret operation named Operation IA Freedom where the U$ government UNITA and FNLA militants in Angola’s Civil War.
  21. A guerrilla training program during the Laotian Civil War which was called Operation Momentum. Related is Operation Pincushion.
  22. Of course, I can’t forget about the Phoenix Program.
  23. Operation Washtub, a program to plant a phony Soviet arms cache in Nicaragua in an attempt to overthrow the Guatemalan president
  24.  A recon program called Project Dark Gene of the CIA and Iranian airforce to engage in recon of the Soviet Union
  25. According to William Blum, between 1949 and 1999, the CIA was involved in the assassination of thirty-three “prominent foreign individuals” not including the 200 political figures on a CIA/Neo-Nazi hit list, nine Sandinista commandantes. [5]
  26. As noted in the chapter of William Blum’s Rogue State about torture, the CIA taught torture techniques in Greece, Iran, Germany, Vietnam, Bolivia, Brazil, Guatemala, El Salvador, Honduras, and Panama
  27. As noted in  the chapter of William Blum’s Rogue State titled “A Concise History of the United States Global Interventions, 1945 to the Present,” it is noted that the CIA meddled in the internal affairs of China, France, Italy, Greece, Philippines, Eastern Europe, Germany, Iran, Guatemala, Indonesia, Western Europe, Guyana, Iraq, Soviet Union, Vietnam, Laos, Ecuador, Congo, Algeria, Cuba, Ghana, Chile, South Africa, Bolivia, Australia, Portugal, South Yemen, Chad, Fiji, Afghanistan, Haiti, and Peru.
  28. As also noted in William Blum’s Rogue State, the CIA perverted elections in Lebanon, Indonesia, Philippines, Japan, Nepal, Laos, Brazil, Bolivia, Chile, Portugal, Jamaica, Panama, Nicaragua, and Haiti.
  29. The documents revealed in the Family Jewels report showing the that CIA: (1) confined a KGB defector, (2) wiretapped two syndicated columnists, (3) engaged in surveillance of investigative journalist Jack Anderson and associates, (4) engaged in surveillance of reporter Michael Getler, (5) broke into the homes of three people, two of whom were two former CIA employees, (6) opening of mail to and from the USSR from 1953 to 1973, (7) opening of mail to and from communist China from 1969 to 1972, (8) unsuccessful assassination plots against foreign leaders (Fidel Castro, Patrice Lumumba, Rafael Trujillo, and Rene Schneider), (9) surveillance of dissident groups between 1967 and 1971, (10) surveillance of particular individuals (including Victor Marchetti), and US citizens in Detroit, (11) amassing files on citizens involved in the antiwar movement, (12) polygraph experiment in California, (13) fake CIA ID documents that could violate state laws, and (14) testing electronic equipment on US telephone circuits

In recent years, the CIA has done some horrid things as any observer would recognize. These include the torture program in the 21st century, horribly called “enhanced interrogation” but still allowing “extraordinary rendition” to occur. Related to this are the “CIA manuals” for torture. Then there’s the CIA drone assassination program of course and the funding of supposed Syrian rebels.

But there is a story relating to the CIA that is worth noting that is ignored as I noted in a recent thread. That is the CIA’s involvement in the Benghazi attacks, attacks which the Republicans went totally out-of-their-minds over, and use as a partisan bludgeon. Still, there is something to be said on the CIA’s role. One report said that their only role was drafting talking points on the attacks for the House Intelligence Committee, generating “the initial drafts of the unclassified talking points and provided them to other officials within the Executive Branch for clearance,” and later a high-ranking CIA official editing, when working with State Department officials, “the talking points to their final form,” supposedly changed to protect a FBI investigation. Others told more about what the CIA’s role was in Libya and Benghazi.

These reports don’t say everything, but they say something. One report talked about CIA personnel were were killed on the day of the attack, mentioned that 20 minutes after the attack started on the main diplomatic facility, “CIA security personnel from a nearby CIA facility” which was informally called the “annex” raced to the facility, then exchanged “fire with the attackers and then…fought their way back to the annex.” Other parts of the report say that a individual “associated with” the CIA repeatedly asked for “assistance from existing “combat aircraft” but a “CIA superior “ignored” the demand because “he knew that no combat aircraft were available for such a mission” and that the response “of the CIA personnel at the annex has also been critiqued.” Other than this, the report says no more. Another heavily redacted report says that the chief of the CIA base in Benghazi was at the “annex” on the night of the attacks on September 11, 2012, that there was apparently no order by the CIA base chief to “stand down,” that the “annex” was “known by some in Benghazi as an American facility.” This report also says there were concerns to how “safe” it was for a U.S. “Temporary Mission Facility” (TMF) mission, CIA implementing “security upgrades” to protect the “annex” which had an unknown number of people, a six-man security team from the annex went to the mission after the attack, the CIA, along with the State Department, depended on the security to local militias who didn’t come through during the attack. An additional comment at the end said that the “CIA should be equally criticized for its own security at the Annex,” as equally as the State Department did not defend the TMF.

Finally there is the investigative report published in November of 2014 which is unclassified. This report, unlike the others, mentions the CIA quite a bit. It notes that there were “CIA facilities in Benghazi,” claims that there was no evidence the CIA was doing anything illegal in Libya (including arms smuggling), that there was a “Benghazi Base” with a CIA chief, and that there were 28 personnel at the TMF and annex combined. The report also says that the CIA team made arrangements with Libya’s new special forces team, that there was a CIA base in Tripoli, the CIA had a “low profile” in Benghazi, the CIA was collecting intelligence on those moving weapons from Libya but apparently not holding weapons, and the CIA Office of Public Affairs made changes to the talking points. There are some other points where the CIA is mentioned, but mostly these are just defending the CIA from accusations.

There are a number of aspects that these reports didn’t enter into. The conspiracy theory-leaning Washington’s Blog (see here and here), and some others, like this one, claimed that there were connections to the Syrian war. Journalist Seymour Hersh, linked Turkey, Benghazi, Syria and Sarin gas in an article. In the article, Hersh wrote that “the rat line, authorised in early 2012, was used to funnel weapons and ammunition from Libya via southern Turkey and across the Syrian border to the opposition” and that a secret annex to the report, according to an unnamed “former senior Defense Department official,” described a

“secret agreement reached in early 2012 between the Obama and Erdoğan administrations…funding came from Turkey, as well as Saudi Arabia and Qatar; the CIA, with the support of MI6, was responsible for getting arms from Gaddafi’s arsenals into Syria…Washington abruptly ended the CIA’s role in the transfer of arms from Libya after the attack on the consulate, but the rat line kept going…The American decision to end CIA support of the weapons shipments into Syria left Erdoğan exposed politically and militarily.”

However, one could say this is just speculation, shaky as it is only based on what one unnamed official said. [6] After all this doesn’t go as far as those who said the TMF was a CIA front and/or a CIA operation (see here and here). An article on September 5, 2014 in the New York Times by David Kirkpatrick titled “New Book Says C.I.A. Official in Benghazi Held Up Rescue” claimed that CIA “commandaos” left their base “in defiance of the chief’s continuing order to “stand down”” which was questioned later by that same CIA chief named “Bob” (see here and here), and that the base chief “hoped to enlist local Libyan militiamen, and the commandos speculate that he hoped the Libyans could carry out the rescue alone to avoid exposing the C.I.A. base. No meaningful Libyan help ever materialized.” The article also quoted CIA “commandos” as joking with diplomatic security agents “What’s the difference between how Libyans look when they’re coming to help you versus when they’re coming to kill you? Not much.” Then there’s a “concerned” article from neocon Max Boot whose concern that “how the attackers knew about what was supposed to be a secret CIA facility is important” but forgets, as a report cited earlier in this section noted, that some in Benghazi knew it “as an American facility.” Additionally there’s an opinion piece by the former deputy director of the CIA, Michael Morell, in which he admits the CIA base, which some had weakly called an “annex” in the past, “remained a key outpost used by the United States to understand developments during the revolution and to influence key players in eastern Libya after Qadhafi. CIA had established a presence in Benghazi with the mission of collecting intelligence” and claims that the CIA “did not play any role in moving weapons from Libya to the opposition in Syria and neither did any other CIA officer or facility in Libya.” He even admits, while spitting out the normal imperial response that Gaddafi’s departure “from the scene in Libya in 2011 was a good thing in that it prevented the slaughter of thousands of his own citizens,” that what “followed was a failed state that provided room for extremist groups to flourish,” along with a slew of other claims.

A number of commentators argued in publications such as CounterPunch that the TMF and the installation as a whole [7] was more than a diplomatic mission. Norman Pollack argued that “Benghazi is but a pawn not only in US domestic politics, but also in spreading America’s  emphasis on paramilitary operations worldwide…Benghazi was primarily a CIA installation, its “annex” given the cloak of diplomatic immunity…these facilities are often fronts for a range of covert activities…[it was] a CIA outpost.” He added that “the locals know the score and deeply resent the armed fortresses spread globally, the claims of diplomatic immunity when personnel or the protectors…violate the laws of the country when committing crimes.” Philip Giraldi, a former CIA officer and executive director of the Council for National Interest wrote in the slightly neocon American Conservative that “…Benghazi has been described as a U.S. consulate…The much larger CIA base was located in a separate building a mile away. It was protected by a not completely reliable local militia.” Giraladi argues that “on Benghazi, the CIA’s operating directive would have been focused on two objectives: monitoring the local al-Qaeda affiliate group, Ansar al-Sharia, and tracking down weapons liberated from Colonel Gaddafi’s arsenal.” Horace Campbell added to this. In an article in CounterPunch he raised a number of good points saying the attacks were the outcome of “Libyan society is in chaos” two years after NATO intervention, that Benghazi was “the largest CIA station in North Africa, where they ran militias into Syria,” said there were numerous unanswered questions like how the CIA station was used to train “Jihadists” and that “the debates in the USA can be viewed as another diversion to cover up the CIA operations in North Africa.” Melvin Goodman, a former CIA analyst and national security expert argued that “the U.S. presence in Benghazi was an intelligence platform and only nominally a consulate…[and] the was primarily diplomatic cover for an intelligence operation that was known to Libyan militia groups.” In an earlier article he expanded on this saying the why was obvious if you considered the role of the U.S. “consulate” in Benghazi:

“The consulate’s primary mission was to provide an intelligence platform that would allow the CIA to maintain an operational and analytical role in eastern Libya…[it] was the diplomatic cover for an intelligence platform and whatever diplomatic functions took place in Benghazi also served as cover for an important CIA base…Any CIA component in the Middle East or North Africa is a likely target of the wrath of militant and terrorist organizations because of the Agency’s key role in the global war on terror waged by the Bush administration and the increasingly widespread covert campaign of drone aircraft of the Obama administration…The CIA contributed to the problem with its reliance on Libyan militias and a new Libyan intelligence organization to maintain security for its personnel in Benghazi.”

These views are reinforced in a number of articles on the subject in popular, but still bourgeois, publications. An article on pro-Democrat and pro-Obama site, America Blog, complained that a GOPers outed a secret operation by saying that “Utah Republican Jason Chaffetz, and his House Republican colleagues on the House Oversight and Government Reform Committee, outed a classified CIA operation, on C-SPAN no less, endangering American national security” and that apparently they didn’t extra security “because it might have signaled that there was actually a CIA operation underway.” That propagandist approach was mirrored, as Reuters noted later, by the Center for American Progress, a think tank which easily allies with the Obama administration. Liberal columnist Dana Milbank whined about this as well, saying in an opinion piece for the Washington Post, that House Republicans “…accidentally blew the CIA’s cover…[they] left little doubt that one of the two compounds at which the Americans were killed, described by the administration as a “consulate” and a nearby “annex,” was a CIA base,” live on C-SPAN.” Milbank claimed that “”other government agency,” or “OGA,” is a common euphemism in Washington for the CIA” and that it was absurd to have “a televised probe of the matter,” again implying that the CIA should NOT be criticized in public. Ugh. Then there was an article in The Telegraph which cited a CNN article, arguing that “up to 35 CIA operatives were working in the city during the attack last September on the US consulate that resulted in the death of Ambassador Chris Stevens and three other Americans” and just summarizing the article in general. The CNN article itself cited a number of unnamed sources, making claims about CIA actions, saying that “the agency is going to great lengths to make sure whatever it was doing, remains a secret…an unprecedented attempt to keep the spy agency’s Benghazi secrets from ever leaking out.” that 21 Americans “were working in the building known as the annex [CIA base], believed to be run by the agency,” and possible State Department involvement in the gun-running, if you read between the lines or a certain way.

Other articles make it clear that the CIA might be hiding something. A Reuters article on October 12, 2012 by Mark Hosenball titled “U.S. intelligence hurt when Libya base was abandoned” claims, according to unnamed government sources, “U.S. intelligence efforts in Libya have suffered a significant setback due to the abandonment and exposure of a facility in Benghazi, Libya” by Dana Milbank and Congressional Republicans. The article also calls the CIA Base an “intelligence post,” says that “publication of satellite photos showing the site’s location and layout have made it difficult, if not impossible, for intelligence agencies to reoccupy the site.” The article claims, according to unnamed sources that the CIA base had been “collecting information on the proliferation of weaponry looted from Libyan government arsenals, including surface-to-air missiles” and that “intelligence officials are not happy at being drawn into the political battle.” What makes the CIA’s role even more suspicious is an ABC News article on November 13, 2012 by Jonathan Karl titled “Petraeus Personally Investigated Benghazi Attack.” The article notes that “in late October [2012], [David] Petraeus [former CIA director] traveled to Libya to conduct his own review of the Benghazi attack that killed four Americans, including U.S. Ambassador Christopher Stevens” and while in Tripoli “he personally questioned the CIA station chief and other CIA personnel who were in Benghazi on Sept. 11 when the attack occurred.” While the article claims this was supposed to be “a way to prepare for his upcoming testimony before Congress on Benghazi,” he said he wanted to avoid testifying because “acting CIA Director Morell is in possession of all the information Petraeus gathered in conducting his review and he has more current information gathered since Petraeus’ departure; and it would be a media circus.” To me, this just seems like a cop-out. Still, some publications like Wired magazine, which engage in snide attacks on Gaddafi, claim that Petraeus’s reputation was “an unexpected casualty of the September assault on the U.S. consulate in Benghazi, Libya…a bureaucratic effort to throw Petraeus under the bus is showing through in the press…The CIA, operating out of an “annex” near the 13-acre consular compound, dwarfed the regular diplomatic presence in Benghazi, with the mission of hunting down ex-dictator Moammar Gadhafi’s unsecured rockets and missiles…Petraeus kept the CIA’s Benghazi role in the shadows.” The article also claims that the “State Department relied on a previously obscure British firm, Blue Mountain, to guard the entire compound. Blue Mountain paid its Libyan guards $4 an hour.” [8]

The final article worth sharing on this is Adam Entous, Siohhan Gorman, and Margaret Coker’s November 1, 2012 article in the Wall Street Journal titled “CIA Takes Heat for Role in Libya.” The article notes that Petraeus stayed away from discussing the attacks “in an effort to conceal the agency’s role in collecting intelligence and providing security in Benghazi” and that, according to anonymous officials, “the U.S. effort in Benghazi was at its heart a CIA operation” with the operation “under diplomatic cover, which was a principal purpose of the consulate, these officials said.” The article claims that “the CIA’s secret role helps explain why security appeared inadequate at the U.S. diplomatic facility,” that it explains why “the consulate was abandoned to looters for weeks afterward while U.S. efforts focused on securing the more important CIA quarters,” and that in Libya “the consulate provided diplomatic cover for the classified CIA operations.” The article also said that “the spy agency was the first to set up shop” during the “Libyan revolution” starting in February 2011, focusing on “countering proliferation and terrorist threats…[and] the spread of weapons and militant influences throughout the region” and that “in mid-2011, the State Department established its consulate in Benghazi, to have a diplomatic presence in the birthplace of the Libyan revolution.” Almost confirming with that congressional report, this article claims that “outside of Tripoli and Benghazi, the nature of the security relationship between the consulate and the annex wasn’t widely known,” that there was a CIA team in Tripoli,” that local Libyan agents were sent to the annex “to destroy any sensitive documents and equipment there, even as the consulate compound remained unguarded and exposed to looters and curiosity seekers for weeks” and some documents, “including the ambassador’s journal, were taken from the consulate site.” The article then goes further by saying that “…many more people worked there [in the CIA base] and they were doing sensitive work, while the consulate, by design, had no classified documents” and that according to unnamed U.S and Libyan officials, “the CIA abandoned the annex after it had been scrubbed clean of any sensitive materials, according to U.S. and Libyan officials.” [9]

Before moving on, I think a few things are clear from the information: the CIA had multiple bases in Libya (Tripoli and Benghazi), with the one in Benghazi apparently not engaged in gun-running to the Syrian rebels (how we are supposed to trust what the CIA says on this?) and suspiciously arriving on the scene during the “Libyan revolution.” So clearly, the CIA did some suspicious stuff, but all of what did is not exactly clear. I’m not sure if Schwartz recognizes all this, but his article that is NOT “pro-reality,” as he claims. This shouldn’t be a surprise for someone who defended Sarah Palin, Ahmad Chalabi, is anti-communist, and claims that too little is being spent in the political process. Still, he seemed to call for the CIA’s abolishment:

There is a point to be made that even abolishing the CIA would not do much over all since the imperial foreign establishment of the United States would still be largely in place. Still, it would be a positive step. At one point,  I asked him if the corporate world shouldn’t be held to the same standard and he never responded. This leads us to Greenwald. In retrospect, I could have challenged him more, but now I know that he responds tepidly, so I can challenge him more effectively in the future.

Glenn Greenwald and corporate surveillance

The horrid libertarian and celebrity left personality, Glenn Greenwald, had a brash response to my comment challenging him. Let me step back. He tweeted, citing a Pew Research Center poll, saying that there was “strong evidence” that Apple’s move to deny FBI access to an iPhone to assist in an investigation was not PR. In response, I argued the following: “Lol strong evidence? Apple cares about its shareholders not the general populace. Come on.” His response was to call me dumb and acting like I was brainless, basically saying I didn’t know what I was talking about:

After I called this response brash and said I didn’t trust Apple’s response, he asked the same question again, basically acting like I didn’t know what I was talking about. I responded by saying that he was falsely assuming that all of those who said yes in to FBI access in the poll were Apple customers. He then responded by acting like I wasn’t making sense at all

In response to this, I fired back by saying that Apple was right to deny the request but that it is PR to cover their own surveillance, adding later that “I also don’t trust that they aren’t giving data to the NSA, FBI, or whatever govt. agency. I think it is indirectly given.” In further conversation I said that (1) Apple harvests all sorta of data, (2) it wants monetization, (3) isn’t taking a stand against corporate surveillance and only government surveillance, (4) provides false security, (5) gives data to a third party,  and so on (see here and here). I also found, in responses to Greenwald and yours truly comments that invalidated Greenwald’s concern (see here and here), BS in favor of Apple (see here), and the convincing argument that not much is really private anymore (see here) and so on (see here and here. I could mention and get into an article (titled “How Tim Cook, in iPhone Battle, Became a Bulwark for Digital Privacy”) in the New York Times that elevates Apple CEO Tim Cook’s supposedly noble privacy crusade, proving that no one should question Cook’s motive apparently.

I think it is worth mentioning, before going on, that Greenwald is NOT the only one advocating on behalf of Apple. The shifty CIA whistleblower John Kirakou, who will be mentioned more in detail in a future article, shilled for Apple, with a goofy cartoon in Truthdig to go along with it. Even Chelsea Manning, the Wikileaks whistleblower, fell in line in an opinion piece about privacy online, saying

“…I support Apple in its fight against the FBI…I disagree with Apple on many things – such as its exclusive use of proprietary software and arbitrary restrictions on users seeking to copy, share, edit and create software on their devices. However, I strongly feel that defending its users’ and customers’ right to strong encryption in court is incredibly important.”

If there couldn’t be anything more twisted, here it is. The Electronic Frontier Foundation (EFF), which claims it cares about digital rights, and celebrated a legal victory against the NSA had protests outside Apple stores in San Francisco to PROMOTE Tim Cook’s position (see here, here, here) and broader support (see here and here). The EFF’s protests were part of a bigger event, in conjunction with “Fight for the Future” (see here and here) which was famous for pushing back against internet-restrictive/censorship bills, SOPA and PIPA, years ago, in an event that sounds eerily pro-Apple. This shouldn’t be a surprise considering Fight for the Future’s supporters connected to the Democratic Party and important foundations, among others.

Before going on, I think it is important to reprint the letter of Tim Cook that has got people such as Snowden (as implied and noted here, here, here, here, here, and here) and celebrity left personality Deray to back Apple. Cook is projecting obvious government-blaming and I don’t trust him.  In the “consumer letter” with the preface saying that Apple opposes a US government order to access to an iPhone and that “this moment calls for public discussion, and we want our customers and people around the country to understand what is at stake.” The letter is as follows [subtitles removed and bolded sections with comments in brackets]:

Smartphones, led by iPhone, have become an essential part of our lives. People use them to store an incredible amount of personal information, from our private conversations to our photos, our music, our notes, our calendars and contacts, our financial information and health data, even where we have been and where we are going. [Oh, I wonder who collects that info]

All that information needs to be protected from hackers and criminals who want to access it, steal it, and use it without our knowledge or permission. Customers expect Apple and other technology companies to do everything in our power to protect their personal information, and at Apple we are deeply committed to safeguarding their data [yeah that’s a lie, you monetize information all the time].

Compromising the security of our personal information can ultimately put our personal safety at risk. That is why encryption has become so important to all of us.

For many years, we have used encryption to protect our customers’ personal data because we believe it’s the only way to keep their information safe. We have even put that data out of our own reach, because we believe the contents of your iPhone are none of our business [but information is monetized so it kinda is their business, but ok].

We were shocked and outraged by the deadly act of terrorism in San Bernardino last December. We mourn the loss of life and want justice for all those whose lives were affected. The FBI asked us for help in the days following the attack, and we have worked hard to support the government’s efforts to solve this horrible crime. We have no sympathy for terrorists.

When the FBI has requested data that’s in our possession, we have provided it. Apple complies with valid subpoenas and search warrants, as we have in the San Bernardino case. We have also made Apple engineers available to advise the FBI, and we’ve offered our best ideas on a number of investigative options at their disposal.

We have great respect for the professionals at the FBI, and we believe their intentions are good. [why the heck would you ever think that?] Up to this point, we have done everything that is both within our power and within the law to help them. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.

Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession. [ok, that’s true, but they’ll find a way in somehow. But what are the “right hands” in this case?]

The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.

Some would argue that building a backdoor for just one iPhone is a simple, clean-cut solution. But it ignores both the basics of digital security and the significance of what the government is demanding in this case.

In today’s digital world, the “key” to an encrypted system is a piece of information that unlocks the data, and it is only as secure as the protections around it. Once the information is known, or a way to bypass the code is revealed, the encryption can be defeated by anyone with that knowledge. [they can already crack encryption anyhow and you you know that]

The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.

The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers — including tens of millions of American citizens — from sophisticated hackers and cybercriminals. [see it is about serving their customers, I knew this was coming] The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe.

We can find no precedent for an American company being forced to expose its customers to a greater risk of attack. For years, cryptologists and national security experts have been warning against weakening encryption. Doing so would hurt only the well-meaning and law-abiding citizens who rely on companies like Apple to protect their data. [here we go again, defending your consumer base.] Criminals and bad actors will still encrypt, using tools that are readily available to them.

Rather than asking for legislative action through Congress, the FBI is proposing an unprecedented use of the All Writs Act of 1789 to justify an expansion of its authority.

The government would have us remove security features and add new capabilities to the operating system, allowing a passcode to be input electronically. This would make it easier to unlock an iPhone by “brute force,” trying thousands or millions of combinations with the speed of a modern computer.

The implications of the government’s demands are chilling. If the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach into anyone’s device to capture their data. [can’t they already do that to an extent?] The government could extend this breach of privacy and demand that Apple build surveillance software to intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge. [um they can get a lot of that stuff from monetization already]

Opposing this order is not something we take lightly. We feel we must speak up in the face of what we see as an overreach by the U.S. government. [Ok, not a surprise there]

We are challenging the FBI’s demands with the deepest respect for American democracy and a love of our country. [this is total bull you corporate tax dodgers and wealthy capitalists.] We believe it would be in the best interest of everyone to step back and consider the implications.

While we believe the FBI’s intentions are good, it would be wrong for the government to force us to build a backdoor into our products. [why would you think the FBI’s intentions are good. That is just ridiculous] And ultimately, we fear that this demand would undermine the very freedoms and liberty our government is meant to protect.

So it is clear from this that Apple is doing this because of their consumer base and to maintain their current customer and theoretically get new ones as well. Lest us not forget Apple’s role in terms of monetization. As one article noted in 2013, as also noted here, “…iOS app downloads will help Apple stay ahead of its competitors in terms of revenues from app monetization” an though many of their apps “are free, they feature advertisements, which generate revenue for both Apple and its developers,” money which rakes in the billions. Then there’s other services such as Apple Pay, and opportunities, as a Goldman Sachs analyst thought, “to increase its monetization potential given its 500 million iPhone user base.” But there’s more when it comes to data.

In a recent set of tweets I noted Apple’s role when it comes to collecting information. I noted Apple’s response to the PRISM program and saying they didn’t have DIRECT access to Apple servers, implying that there was indirect access, possibly through something like Plantir, likely so, while the publicly denied it. Even Micah Lee in The Intercept argued in an article back in 2014 in response to a similar letter the following:

“[Apple] seriously oversold…[its]…commitment to privacy…despite these nods to privacy-conscious consumers, Apple still strongly encourages all its users to sign up for and use iCloud, the internet syncing and storage service where Apple has the capability to unlock key data like backups, documents, contacts, and calendar information in response to a government demand…While Apple’s harder line on privacy is a welcome change, it’s important to put it in context…Since the iPhone 3GS, all iOS devices have supported encrypting personal data such as text messages, photos, emails, contacts, and call history. If you set a passcode it would be used to encrypt some, but not all, of the data on your device. Apple was still able to decrypt some of the data without knowing your passcode. The improved encryption in iOS 8 is a great move towards protecting consumer privacy and security. But users should be aware that in most cases it doesn’t protect your iOS device from government snoops…This isn’t the first time that Apple has oversold the security of its products.”

They’ve now conveniently changed their “legal process guidelines” to a page about “government requests.” Some may argue that this is from 2014 and much has changed since then. Other articles said that the surveillance scandal is a great way to market products, that Apple and Google aren’t on your side as much as you think, that Apple is among one of the corporate collaborators with the NSA, and numerous crimes of Apple across the world, just in 2013. Then there’s the reality that Apple is, like Google, essentally a corporate intelligence operation which profits by “monetizing user data…gleefully sell[ing] your data to the highest bidder on one hand while simultaneously working to dilute privacy laws with the other.” While Cook denied this (and here), despite it being partially true with an “internet master” like Apple, among others, collecting safari searches, private location information (also see here), and so on (also see here). One article put it best: “Apple gathers up about as much personal information on users as any other big tech company. The main difference is, it says it doesn’t connect the dots. It may know everything about you, but it doesn’t know you’re you.” Cook claims that “Our commitment to protecting your privacy comes from a deep respect for our customers,” but their responses to what data they give is a bit problematic:

“We carefully review any request to ensure that there’s a valid legal basis for it. And we limit our response to only the data law enforcement is legally entitled to for the specific investigation…We encourage any customer who suspects their device is stolen to contact their respective law enforcement agency.”- government information request page

“[For Apple Pay] We may receive anonymous transaction information such as the approximate time and location of the transaction, which helps us improve Apple Pay and other Apple products and services…Apple Pay retains anonymous transaction information such as approximate purchase amount…If we use third-party vendors to store your information, we encrypt it and never give them the keys…We use only the necessary data to help create the best experience for you, whether you’re using Maps to locate a restaurant or Apple Music to discover a new artist. And we never sell your data…The longer you use Siri and Dictation, the better they understand you and the better they work. To help them recognize your pronunciation and provide better responses, certain information such as your name, contacts, and songs in your music library is sent to Apple servers using encrypted protocols…Album names are only sent to Siri to help provide you with better results. If you have Location Services turned on, the location of your device at the time you make a request will also be sent to Apple to help Siri improve the accuracy of its response to your requests. You may choose to turn off Location Services…For example, event addresses and a user’s location are sent to Apple so that we can provide accurate Time to Leave predictions that take into consideration traffic and local transit schedules. Information like a user’s location may be sent to Apple to provide localized suggestions as well as relevant news and search results. When we do send information to a server, we protect your privacy…In order for features like Radio, For You, and Connect to reflect your musical tastes, we collect some information about your activity in the app…The more you read, the more personalized the News app becomes. We don’t link your reading activity to other Apple services. Information we collect about articles you read is used to improve News…You don’t have to sign in to use Maps, and it only knows you by a random identifier that resets itself frequently as you use the app…Searching with Spotlight goes beyond your device to give you suggestions from sources like Wikipedia, the iTunes Store, and local News and Maps results. Before it answers, Spotlight considers things like context and location…You can also opt out of having Spotlight use Location Services anytime you want. If you opt out, Spotlight will still use your IP address to determine a general location to make your searches more relevant…Apps can share data for the purpose of improving your health or health research, but only with your permission…By default, developers don’t have access to your Apple ID, just a unique identifier. If you give your permission, developers can use your email to let others find you in their app… Only essential information that enhances the CarPlay experience will be used from your car. For example, iPhone can combine its own GPS data with your car’s to make Maps as accurate as possible…And through Apple’s Volume Purchase Program (VPP), schools can purchase apps and deliver them to a student’s iPad without having to use an iTunes login”- Approach to privacy page

“It’s important to note that Frequent Locations remain on your device and are not sent to Apple, or even backed up in iTunes or iCloud. The one exception is if you opt in to improve Maps for yourself and other users, in which case we will occasionally collect your Frequent Locations but only retain this data in a purely anonymous form. Frequent Locations are encrypted with keys protected by your passcode on your device, and you always have the option to turn this feature off. And you’ll notice that your iOS device asks for your permission before giving any app, even built-in Apple apps, access to your location information…On iOS, advertising does support some apps, so to help protect your privacy we have developed the nonpersistent Advertising Identifier. Apple’s advertising service, iAd, uses this identifier to deliver ads to you via things like third-party apps and iTunes Radio…You can choose to send Apple anonymous technical data that we can use to make our products and services better. If you would like to help improve our products and services, you can opt in to our Diagnostic & Usage program and send nonidentifiable information about your device and applications”- Manage your privacy page

“If you opt in to diagnostic and usage collection, you agree that Apple and its subsidiaries and agents may collect, maintain, process and use diagnostic, technical, usage and related information, including but not limited to information about your iOS Device, computer, system and application software, and peripherals, that is gathered periodically to facilitate the provision of software updates, product support and other services to you (if any) related to the iOS Software, and to verify compliance with the terms of this License. Apple may use this information, as long as it is collected in a form that does not personally identify you, to provide and improve Apple’s products and services. ..Apple may also provide any such partner or third party developer with a subset of diagnostic information that is relevant to that partner’s or developer’s software, hardware and/or services, as long as the diagnostic information is in a form that does not personally identify you… By using any location-based services on your iOS Device, you agree and consent to Apple’s and its partners’ and licensees’ transmission, collection, maintenance, processing and use of your location data and queries to provide and improve location-based and road traffic-based products and services. You may withdraw this consent at any time… By using Siri or Dictation, you agree and consent to Apple’s and its subsidiaries’ and agents’ transmission, collection, maintenance, processing, and use of this information, including your voice input and User Data, to provide and improve Siri, Dictation, and other Apple products and services…By using the iOS Software, you agree that Apple may transmit, collect, maintain, process and use these identifiers for the purpose of providing and improving the FaceTime feature…By using the iOS Software, you agree that Apple may transmit, collect, maintain, process and use these identifiers for the purpose of providing and improving the iMessage service. The iMessage service requires a Wi-Fi or cellular data connection…By using the Photo Stream feature of iCloud, you agree that Apple may store photos taken on your iOS Device or uploaded from your computer for a limited period of time and automatically send the photos to your other Apple iOS Devices or computers that are Photo Stream-enabled…Apple may provide mobile, interest-based advertising to you. If you do not want to receive relevant ads on your iOS Device, you can opt out…This opt-out applies only to Apple advertising services and does not affect interest-based advertising from other advertising networks…You agree that the Services contain proprietary content, information and material that is owned by Apple and/or its licensors, and is protected by applicable intellectual property and other laws, including but not limited to copyright… Apple and its licensors reserve the right to change, suspend, remove, or disable access to any Services at any time without notice. In no event will Apple be liable for the removal of or disabling of access to any such Services. Apple may also impose limits on the use of or access to certain Services, in any case and without notice or liability.”- iOS SOFTWARE LICENSE AGREEMENT

So basically this is saying that Apple still collects a lot of data but doesn’t monetize as heavily as Google and others. Already, the security of its devices has come under scrutiny (also see here), and they collect all sorts of information (also see here and here) since they are part of Surveillance Valley.

Even the animated sitcom, that I like so much, The Simpsons, had a number of episodes criticizing Apple. These iPods uniting and “overthrowing the very humans they entertained,” basically turning them into slaves. But more pointedly is not this, this, thisthis,  or addiction to online games, but the use of “Mapple” as stand-in for Apple. These include addiction to the MyPad (basically the iPad) and “Steve Mobbs” instead of Steve Jobs. In one clip, Steve Mobbs declares to Homer “now press the submit icon an agree to buy all our future products. And we’re going to be making a lot of stuff.” When Homer grimaces at this, Mobbs declares incessantly “submit,” with a closer focus on his face, to which Homer says “I don’t know. I don’t want to” and Mobbs threatens “or you could buy something from Hewlett-Packard.” In response, of course, Homer presses “I submit” and Mobs declares in an evil voice “YES! YES!” making him look like a villain. Other clips show Lisa mad about her “MyBill” which charges her over $1,000 for songs she bought, the goofiness of Siri, and so on. The best clip is one in which Bart acts like Steve Mobbs is speaking at a Mapple store, after the Mapple supporters call him a “genius” and a “god who knows what we want” being laughable but making a point about Apple (Bolding is when Bart comes in):

“Greetings, it is I, your great leader, Steve Mobbs. I’m speaking to you from Mapple headquarters, deep below the sea, with an announcement that will completely change the way you look at everything. [expressions of awe]. And that announcement is [Bart comes in with a plugged in microphone] You’re all losers. You think you’re cool because you buy a $500 phone with a picture of fruit on it? Well, guess what, they cost $8 bucks to make and I pee on every one. I have made a fortune off you chumps and I’ve invested it all in Microsoft. Now, my boyfriend, Bill Gates and I kiss each other on a pile of your money.”

While Bart is a bit over the top, he makes a point about how Mapple (Apple) is exploiting people. The later part of the clip shows that Mobbs is self-absorbed and isn’t willing to renegotiate a ridiculous bill, saying their real slogan is “no refunds” while their posters say “think differently.” Hence, these clips are saying Apple is powerful, with Jobs/Mobbs like a god, and by extension shouldn’t be trusted. Moving back to the practices of Apple, they engage in a good amount of information gathering. Still, despite this, they are somehow qualified, in the minds of some, to lead the charge against government surveillance with previous efforts like this. Lest us not forget the criminal acts Apple has done in the past, like “…failing to inform parents that, by entering a password, they were permitting a charge for virtual goods or currency to be used by their child in playing a children’s app” for example, possibly conspiring to raise prices of e-books (also see here), and much more likely listed in the Federal Register.

A conclusion

While this article jumped from the CIA to corporate surveillance both topics are interconnected (after all the CIA has been trying to poke through Apple’s security for years). This is because there is corporate espionage as well, and there is too much blaming of government entities without recognizing how the government and corporate sector work together. To put it more plainly, the government is protecting the interests of the capitalists, who are in this case the heads of the big tech giants. Hence, to oppose government surveillance without recognizing how it interlinks with corporate surveillance is not only naive but it is counterproductive. The best approach is to recognize how both forces connect.


[1] See a Komer memo of February 12th [document 18 in this collection]: “A number of signs suggest the Soviets may be trying a counter-coup in Iraq…some in the CIA share my suspicions, though we all feel that Moscow would probably fail, and in the process blot its copybook still further. [written in pen:] Nothing we can usefully do yet anyway…You don’t see most of the cables but State and I are trying every trick.” Also see this document sent on February 7, 1963 by the US Department of State: “We concur situation in Iraq disturbing but as yet by no means clear Iraq actually becoming Soviet base…Through our posture, US has sought maintenance American presence in Iraq, and, concomitantly, avoidance of open controversy with Qasim regime; readiness to respond to any Iraqi desire improve official relations; and continuance official and unofficial American contacts with view not only of influencing Iraqi attitudes but also of acquiring valuable intelligence…US statements cannot be disseminated without distortion within Iraq, and shortwave broadcasts would not have impact on wide group. Qasim would have freedom within Iraq to twist US representations to provide basis for increasing tempo of anti-US campaign and intensifying harassment of Embassy and Consulate Basra…our position and prestige in other Arab countries determined by factors other than our relations with Iraq or Iraqi propaganda.” Also see this document which says: “a coup d’etat reportedly led by Colonel Abdul Karim Mustafa was mounted in Baghdad in the early morning of February 8, 1963. Former Prime Minister Qasim is reported dead. Affirmations of support for the new regime have come from military and civil leaders in all parts of Iraq…the United States would welcome public affirmation that the new Iraqi regime intends to carry out Iraq’s international obligations. He will also ask for assurance that the new regime will safeguard American citizens and interests in Iraq…Following our recognition of the new Iraqi regime, assignment of a new Ambassador will be required.” This document kinda confirms the coup as well: “Sometime after midnight, local time, elements of the armed forces staged a coup in Iraq. Information presently available has not confirmed that Qasim is actually dead…It is believed by members of CIA that the coup was triggered by Qasim’s recent arrest of a large number of Bath Party members…The consensus of members of State and CIA is that if the coup is successful, relations between the U.S. and Iraq will be considerably improved and the internal situation in Iraq should gradually improve.” Oh and the memo from Komer to Kennedy [also see here] which says “[the] Iraqi revolution seems to have succeeded. It is almost certainly a net gain for our side…We will make informal friendly noises as soon as we can find out whom to talk with, and ought to recognize as soon as we’re sure these guys are firmly in the saddle” is yet another indication this was a CIA action.” Many more documents and such are noted in this article, which include this, this, thisthis, this, and this. For more official documents, see here.

[2] For more on Midnight Climax see here, here, here, here, here, and here.

[3] Also see what the Pike Committee said about the CIA

[4] For more information on this, see official documents here and here. Also see articles in popular publications such as New York Review of BooksIn These Times, The Daily Beast, Chicago Tribune, The Age, and the LA Times.

[5] As notes on pages 38-40 of Rogue State: Kim Koo (1949), Zhou Enlai (1950s), Sukarno (1950s, 1963), Kim Il Sung (1951), Claro M. Recto (1950s), Jawaharlal Nehru (1955), Gamal Abdul Nasser (1957), Norodom Sihanouk (1959), Abdul Karim Kassem (1960), Jose Figueres (1950s-70s), Francois Duvailer (1961), Patrica Lumumba (1961), Rafael Trujilo (1961), Ngo Dinh Diem (1963) which is noted in this document, Fidel Castro (1960s), Raul Castro (1960s), Francisco Caamano (1965), Charles de Gaulle (1965-6), Che Guevara (1967), Salvador Allende (1970), Rene Schneider (1970), Omar Torrijos (1970s, 1981), Manuel Noreiga (1972), Mobutu Sese Seko (1975), Michael Manley (1976), Moammar Qaddafi (1980-6), Ayatollah Khomeini (1982), Ahmed Dlimi (1983), Miguel d’Escoto (1983), Mohammed Hussein Fadlallah (1985), Saddam Hussein (1991), Osama Bin Laden (1998), and Slobodan Milosevic (1999).

[6] An article by Gadi Adelman, a right-winger for sure, quotes a former CIA operative of 20 years, Clare Lopez, who claims that the CIA was helping facilitate weapons transfers: the short answer is yes. They were working with the very same Al-Qaeda linked relationships in Libya to gather up and buy back and collect weapons from Gaddafi’s stock pile that were missing from the revolution in Libya last year and what it looks like is that they were shipping them onwards to Syria…[the weapons have] gone to the Sinai and they’ve also gone to Mali and to other places in western Africa and they’ve also gone to Syria. That was the operation, that’s what they were doing.” Yet again, this really isn’t concrete evidence of anything such as gun-running.

[7] In a US State Department briefing a senior State Department Official  said the following about the “consulate”:

 “The compound is roughly 300 yards long – that’s three football fields long – and a hundred yards wide. We need that much room to provide the best possible setback against car bombs…The compound has four buildings on it, and you guys are going to have to get used to this, because I refer them to – as Building C, Building B, Tactical Operations Center, and a barracks. So Building C is a building that is essentially a large residence. It has numerous bedrooms and it is – it has a safe haven installed in it, and I’ll talk more about that in a minute. Building C ultimately is the building that the Ambassador was in, so keep that in your heads. Building B is another residence on the compound. It has bedrooms and it has a cantina. That’s where the folks dine. The Tactical Operations Center, which is just across the way from Building B, has offices and a bedroom. That’s where the security officers had their main setup, that’s where the security cameras are, a lot of the phones – it’s basically their operations center…A safe haven is a fortified area within a building. This particular safe haven has a very heavy metal grill on it with several locks on it. It essentially divides the one – the single floor of that building in half, and half the floor is the safe haven, the bedroom half. Also in the safe haven is a central sort of closet area where people can take refuge where there are no windows around…I have my timeline wrong…At that point, a decision is made at the annex that they are going to have to evacuate the whole enterprise.”

[8] A number of articles in official media expand on this including James Risen’s October 12, 2012 article titled “After Benghazi Attack, Private Security Hovers An Issue” in the New York Times, an October 17th article in Reuters titled “For Benghazi diplomatic security, U.S. relied on small British firm,” articles in Wired (see here and here), The Guardian, Salon, and others.

[9] This statement of classified documents is interesting because during a State Department briefing a senior state department official claimed that “this was a post and…[it] held no classified documents. They had computer communications with Washington, but the material would arrive on the screen and you would read it on the screen, and then that was it. There was no classified paper, so there was no paper to burn. So maybe there are some documents or files out there at least. We’ll see.


Recent tweets have showed that more are jumping on the “side with Apple” train like BORDC (Bill of Rights Defense Committee) people. BORDC recently merged with another foundation (Defending Dissent foundation) and honors who it considers “patriots,” is connected to the usual folks which include celebrity left personalities like Daniel Ellsburg. However, beyond this, the Apple solidarity rally was overwhelmed by mad and confrontational #ResignRahm protesters as this thread (starting here) shows. The Chicago Tribune article notes the following:

“The Apple Store on North Michigan Avenue was among nearly 50 locations worldwide where Fight for the Future, an organization that advocates for privacy for Internet users and opposes Web censorship, planned rallies Tuesday. A small group assembled for that rally late Tuesday afternoon proved unequal to a more vocal group of protesters, who had marched from the Thompson Center in the Loop to North Michigan Avenue. That group saw the media assembled to cover the Apple rally and quickly commandeered the spotlight. The protesters started chants against Emanuel and Alvarez, then several in the crowd got into a shoving match with police officers. Some of the demonstrators were knocked into the planter boxes that line Michigan Avenue. A small cluster of protesters huddled at Michigan Avenue and Huron Street, where they burned a small American flag and shouted profanities before continuing to march north. After the skirmish, only two or three Fight for Future protesters remained, including Jon Monroe, who said he drove downtown from Libertyville to participate in the rally. He said the others were “scared off.”…Organizers had encouraged protesters to turn their phones and tablets into protest signs and carry 10-foot iPhone-shaped banners reading “Don’t Break Our Phones” to show opposition against the court order compelling Apple to help the FBI hack into Syed Rizwan Farook’s work-issued iPhone.”

To be honest, this story kinda cracks me up. That’s all I have to add.