Chalmers Johnson - The Sorrows of Empire - Militarism, Secrecy, and the End of the Republic

Здесь есть возможность читать онлайн «Chalmers Johnson - The Sorrows of Empire - Militarism, Secrecy, and the End of the Republic» весь текст электронной книги совершенно бесплатно (целиком полную версию без сокращений). В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Год выпуска: 2003, ISBN: 2003, Издательство: Macmillan, Жанр: Старинная литература, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

The Sorrows of Empire: Militarism, Secrecy, and the End of the Republic: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «The Sorrows of Empire: Militarism, Secrecy, and the End of the Republic»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

The Sorrows of Empire: Militarism, Secrecy, and the End of the Republic — читать онлайн бесплатно полную книгу (весь текст) целиком

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «The Sorrows of Empire: Militarism, Secrecy, and the End of the Republic», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Much information about the disguised American bases in Britain comes from peace activists like Lindis Percy, coordinator of the United Kingdom’s Campaign for the Accountability of American Bases, who has been arrested many times for breaking into them. One recent escapade occurred at RAF Croughton, twenty-five miles southwest of Stratford-upon-Avon, where Percy was charged with “aggravated trespass.” She then revealed to the press that the RAF designation was phony and that Croughton is actually a U.S. Air Force base. One authoritative but unofficial source says that the base’s active-duty personnel include 400 Americans and 109 employees of the British Ministry of Defense. 14Its function is communications with U.S. Air Force aircraft, including nuclear bombers. The Americans dropped charges against Percy to prevent “embarrassing evidence” from being presented in open court. 15In June 2002, she had five injunctions against her for entering such bases, including Menwith Hill.

Since 1948, a highly classified agreement among the intelligence agencies of the United Kingdom, the United States, Canada, Australia, and New Zealand allows them to exchange information not just about target countries but also about one another. This arrangement permits the United States’s National Security Agency, Britain’s Government Communications Headquarters (GCHQ), Canada’s Communications Security Establishment, Australia’s Defense Signals Directorate, and New Zealand’s General Communications Security Bureau to swap information with one another about their own citizens—including political leaders—without formally violating national laws against domestic spying. Even though the U.S. government, for example, is prohibited by law from spying on its own citizens except under a court-ordered warrant, as are all the other countries in the consortium, the NSA can, and often does, ask one of its partners to do so and pass the information its way. One former employee of the Canadian Communications Security Establishment revealed that, at the request of Prime Minister Margaret Thatcher of Britain, the GCHQ asked the Canadians to monitor certain British political leaders for them. 16

Since at least 1981, what had once been an informal covert intelligence-sharing arrangement among the English-speaking countries has been formalized under the code name “Echelon.” Up until then the consortium exchanged only “finished” intelligence reports. With the advent of Echelon, they started to share raw intercepts. Echelon is, in fact, a specific program for satellites and computers designed to intercept nonmilitary communications of governments, private organizations, businesses, and individuals on behalf of what is known as the “UKUSA signals intelligence alliance.” Each member of the alliance operates its own satellites and creates its own “dictionary” supercomputers that list key words, names, telephone numbers, and anything else that can be made machine-readable. They then search the massive downloads of information the satellites bring in every day. Each country exchanges its daily intake and its analyses with the others. One member may request the addition to another’s dictionary of a word or name it wants to target. Echelon monitors or operates approximately 120 satellites worldwide.

The system, which targets international civil communications channels, is so secret that the NSA has refused even to admit it exists or to discuss it with delegations from the European Parliament who have come to Washington to protest such surveillance. France, Germany, and other European nations accuse the United States and Britain, the two nations that originally set up Echelon, with commercial espionage—what they call “state-sponsored information piracy.” 17There is some evidence that the United States has used information illegally collected from Echelon to advise its negotiators in trade talks with the Japanese and to help Boeing sell airplanes to Saudi Arabia in competition with Europe’s Airbus. In January 1995, the CIA used Echelon to track British moves to win a contract to build a 700-megawatt power station near Bombay, India. As a result, the contract was awarded to Enron, General Electric, and Bechtel. During October 1999, European activists and government officials held a “Jam Echelon Day,” spending twenty-four hours sending as many messages by e-mail as possible with words like terrorism and bomb in them to try to overload the system.

Echelon’s existence has given great impetus to more or less unbreakable systems of encryption, such as what are called random one-time pads. These use keys known only to sender and receiver and are secure against all forms of cryptanalysis. The plaintext message is encrypted using computer-generated random numbers and never used again. The sender and the receiver must use the same key, the weak point being getting the key to the recipient via some tamperproof channel, commonly a CD sent through the mail. 18One-time pads are a development to which the NSA is extremely hostile. However, knowing that the NSA has access to all forms of electronic communications, users seeking privacy have naturally turned to coded messages. The NSA, in turn, is reported to be trying to get Microsoft to include secret decoding keys known only to it in all its software.

The problem with Echelon is not just that nations occasionally use it to promote their commercial activities, or simply that it is a club of English speakers, or even that it can be defeated by fiber-optic cables and encryption. The fatal flaw of Echelon is that it is operated by the intelligence and military establishments of the main English-speaking countries in total secrecy and hence beyond any kind of accountability to representatives of the people it claims to be protecting. Among the resultant travesties was the case of a woman whose name and telephone number went into the Echelon directories as those of a possible terrorist because she told a friend on the phone that her son had “bombed” in a school play. 19According to several knowledgeable sources, the British government has included the word amnesty in all the system’s dictionaries in order to collect information against the human rights organization Amnesty International. Even though the governments of the world now know about Echelon, they can do nothing about it except take defensive measures on their messaging systems, and this is but another sign of the implacable advance of militarism in countries that claim to be democracies.

As I have said, no single purpose can possibly explain the more than 725 American military bases spread around the world. But the government’s addiction to surveillance certainly explains where some of them are and why they are so secret. Another explanation for some of the bases is the staggering level of American dependence on foreign sources of oil, which grows greater by the year. Many garrisons are in foreign countries to defend oil leases from competitors or to provide police protection to oil pipelines, although they invariably claim to be doing something completely unrelated—fighting the “war on terrorism” or the “war on drugs,” or training foreign soldiers, or engaging in some form of “humanitarian” intervention. The search for scarce resources is, of course, a traditional focus of foreign policy. Nonetheless, the United States has made itself particularly dependent on foreign oil because it refuses to conserve or in other ways put limits on fossil fuel consumption and because multinational petroleum companies and the politicians they support profit enormously from Americans’ profligate use. A year after the 9/11 attacks, General Motors’s sales of its 5,000-pound gas-guzzling Chevrolet Suburban SUV, which gets thirteen miles to the gallon, had doubled. 20

Starting with the CIA’s 1953 covert overthrow of the government of Iran for the sake of the British Petroleum Company, American policy in the Middle East—except for its support of Israel—has been dictated by oil. It has been a constant motive behind the vast expansion of bases in the Persian Gulf. America’s wars in the oil lands of the Persian Gulf are the subject of a later chapter; what I want to explore here are some other cases in which oil is the only plausible explanation for acquiring more bases. In these cases, the government has produced elaborate cover stories for what amounts to the use of public resources and the armed forces to advance private capitalist interests. The invasion of Afghanistan and the rapid expansion of bases into Central and Southwestern Asia are among the best examples, although there are several instances from Latin America as well.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «The Sorrows of Empire: Militarism, Secrecy, and the End of the Republic»

Представляем Вашему вниманию похожие книги на «The Sorrows of Empire: Militarism, Secrecy, and the End of the Republic» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «The Sorrows of Empire: Militarism, Secrecy, and the End of the Republic»

Обсуждение, отзывы о книге «The Sorrows of Empire: Militarism, Secrecy, and the End of the Republic» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x