
{"id":523,"date":"2010-11-18T12:31:56","date_gmt":"2010-11-18T11:31:56","guid":{"rendered":"http:\/\/viewsdesk.com\/?p=523"},"modified":"2010-11-26T14:44:04","modified_gmt":"2010-11-26T13:44:04","slug":"next-up-the-war-on-journalism","status":"publish","type":"post","link":"https:\/\/viewsdesk.com\/?p=523","title":{"rendered":"Next Up: The &#8220;War on Journalism&#8221;?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-524\" title=\"cyber_warfare\" src=\"https:\/\/viewsdesk.com\/wp-content\/uploads\/2010\/11\/cyber_warfare.jpg\" alt=\"\" width=\"463\" height=\"302\" srcset=\"https:\/\/viewsdesk.com\/wp-content\/uploads\/2010\/11\/cyber_warfare.jpg 463w, https:\/\/viewsdesk.com\/wp-content\/uploads\/2010\/11\/cyber_warfare-300x195.jpg 300w\" sizes=\"auto, (max-width: 463px) 100vw, 463px\" \/><\/p>\n<p>Pentagon, with its newly founded <a href=\"http:\/\/en.wikipedia.org\/wiki\/United_States_Cyber_Command\">US Cyber Command<\/a>, is going all-in against an undefined enemy, with <a href=\"http:\/\/abcnews.go.com\/GMA\/Books\/cyber-war-richard-clarke\/story?id=10414617\">fear-mongers<\/a> on the sidelines crying for blood. The state of the world being as it is, the question is if Wikileaks is going to be the first victim of this new offensive force.<\/p>\n<p><a href=\"http:\/\/wikileaks.org\">Wikileaks<\/a>, maybe more than anything else in the last decades, has changed the rules of the game. Whilst using the Internet to anonymously disseminate material is nothing new, the systematic release of classified information is. Quite understandably this is a major concern for the American military might.<\/p>\n<p>Our system, based around the existence of sovereign nation-states has been relatively stable since 1648, when the Peace of Westphalia was signed into effect. It might not be a perfect fit, due to its territorial focus, but it\u2019s the best thing we have to define and manage our world.<strong><\/strong><\/p>\n<p><strong>War on a Changing Arena<\/strong><br \/>\nThe concept of international security has evolved greatly in the twentieth century, changing from issues around the immediate military needs to a much wider and all-encompassing definition. The older definition is a narrow concept of security, where state actors dealing with military issues \u2013 for example the Cold War-era military tension between the west and the east.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-539\" title=\"cyberwar_quote-cyberword\" src=\"https:\/\/viewsdesk.com\/wp-content\/uploads\/2010\/11\/cyberwar_quote-cyberword.gif\" alt=\"\" width=\"483\" height=\"115\" srcset=\"https:\/\/viewsdesk.com\/wp-content\/uploads\/2010\/11\/cyberwar_quote-cyberword.gif 483w, https:\/\/viewsdesk.com\/wp-content\/uploads\/2010\/11\/cyberwar_quote-cyberword-300x71.gif 300w\" sizes=\"auto, (max-width: 483px) 100vw, 483px\" \/><\/p>\n<p>A wider use of the term, however, also includes other issue as well as other actors, thus making it possible to, as an example, consider the spread of AIDS, or a coming bird-flu pandemic, to be an integral part of international security. However, the use of a wider definition also found critics among the more traditionalist researchers over a fear that the meaning of the term would be diluted.<\/p>\n<p>While the rest of the world abandoned using the word \u201ccyber\u201d sometime back when Clinton was president \u2013 at least when not referring something out of a <a href=\"http:\/\/www.imdb.com\/name\/nm0000988\/\">Bruckheimer<\/a> movie \u2013 this is not true for some <a href=\"http:\/\/upload.wikimedia.org\/wikipedia\/commons\/thumb\/7\/73\/Joint_Chiefs_of_Staff_2001.jpg\/748px-Joint_Chiefs_of_Staff_2001.jpg\">military theorists<\/a>. The idea is that there\u2019s a cyberwar on the just beyond the horizon. Some very loud voices are claiming we\u2019re already knee-deep in it.<\/p>\n<p>Without much <a href=\"http:\/\/online.wsj.com\/article\/SB10001424052748704875604575280881128276448.html\">public debate<\/a>, the US Cyber Command began its operations in May of 2010, following a sense of urgency in defense circles of a very real and imminent threat. (Or maybe, as some would put it, there is a lot of money in pushing that agenda.)<\/p>\n<p>The USCYBERCOM shoulder the responsibilities from several other branches of the US forces to \u201cconduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US\/Allied freedom of action in cyberspace and deny the same to our adversaries\u201d.<\/p>\n<p><strong>The Press as a Pillar of a Free Society<\/strong><br \/>\nWikileaks crushed, with a few swift blows, the information monopoly of the military. \u201cTruth\u201d, says Julian Assange, the site\u2019s founder and iconic spokesperson, \u201cis the first casualty of war\u201d, repeating a truism that is rarely backed up with hard evidence. Going through the material, the clich\u00e9 was proven. Not only did he documents show many things that were never reported, but it also showed <a href=\"http:\/\/articles.sfgate.com\/2003-05-03\/news\/17492593_1_iraqi-casualties-gulf-war-civilian\">outright lies<\/a> and distortions.<\/p>\n<p>With a very broad definition of security, the free press will be at stake. It goes without saying that exposing certain truths about how we wage wars; on the justifications or actions of troops, is a security problem for the military \u2013 and the long run, also for society. But, wait, why if so, do democracies have a free press?<\/p>\n<p>The free press was created, in the liberal western world, as a vent. When the reformists set out to create a new egalitarian society, they deemed it necessary to protect the people from the state. One way to achieve this was by giving the people a way to scrutinize those in power.<\/p>\n<p>Historically, one could blame the press for many wrongs, but at the same time they must be commended for being pivotal in many of the biggest shifts we\u2019ve had every since: from the abolition; universal suffrage; the civil rights movement, to; Watergate. Without overstating the importance of a free press, it\u2019s quite clear that corruption is much more common where the press cannot oversee, comment and criticize people in power. The vent is needed to protect the society from itself.<\/p>\n<p>For the people being scrutinized however, the press can be a real pain in the ass. Consider for a moment the Vietnam War, where journalists had quite good access to the battlefield \u2013 and to the soldiers. The <a href=\"http:\/\/en.wikipedia.org\/wiki\/Nguy%E1%BB%85n_Ng%E1%BB%8Dc_Loan\">stories<\/a>, <a href=\"http:\/\/lanternreview.com\/blog\/wp-content\/uploads\/2010\/05\/MyLai.jpg\">images<\/a> and films are to numerous to mention. It pretty much blew up in the face of the military. It was impossible to keep the general public at home in favor of a war that didn\u2019t portray the solders like heroes, but <a href=\"http:\/\/www.psywarrior.com\/DeathCardsAce.html\">rather the opposite<\/a>.<\/p>\n<p>Looking back it\u2019s tempting to say that it seems like it\u2019s impossible to win a war if you are not allowed to commit atrocities. But, the problem is that the people don\u2019t like atrocities. They especially don\u2019t like to see dead children when they\u2019re having breakfast. So, the military came up with a new plan. Starting with the second Gulf War they <a href=\"http:\/\/news.bbc.co.uk\/2\/hi\/uk_news\/2885179.stm\">embedded<\/a> the journalists systematically.<\/p>\n<p>By doing so, they could control what happened, the journalists were spoon fed information and given selective access. As an added bonus it experiences showed that the embedded journalists became <a href=\"http:\/\/ro.uow.edu.au\/cgi\/viewcontent.cgi?article=1307&amp;context=apme\">surprisingly favorable<\/a> to their embedders.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-540\" title=\"cyberwar_quote-deadchildren\" src=\"https:\/\/viewsdesk.com\/wp-content\/uploads\/2010\/11\/cyberwar_quote-deadchildren.gif\" alt=\"\" width=\"483\" height=\"115\" srcset=\"https:\/\/viewsdesk.com\/wp-content\/uploads\/2010\/11\/cyberwar_quote-deadchildren.gif 483w, https:\/\/viewsdesk.com\/wp-content\/uploads\/2010\/11\/cyberwar_quote-deadchildren-300x71.gif 300w\" sizes=\"auto, (max-width: 483px) 100vw, 483px\" \/><\/p>\n<p>Controlling information and spinning events became paramount to keep be able to maintain support at home. And support at home is a prerequisite to keep fighting. So, the part of the mission is to always make sure the military is in control of the setting, because the context will decide how people perceive events. The war must be justified \u2013 and justification can be spun. At least, it could.<\/p>\n<p><strong>War is Peace<\/strong><br \/>\n<a href=\"http:\/\/en.wikipedia.org\/wiki\/Richard_A._Clarke\">Richard Clarke<\/a>, former advisor to the White House and author of the book <a href=\"http:\/\/www.amazon.com\/Cyber-War-Threat-National-Security\/dp\/0061962236\">Cyberwar<\/a>, proves my point already in the title of his book. \u201cWar\u201d is diluted to the extreme. His book has been <a href=\"http:\/\/www.wired.com\/threatlevel\/2010\/04\/cyberwar-richard-clarke\/\">widely criticized<\/a> for being dishonest in many of its descriptions of supposed examples of cyberwar.<\/p>\n<p>Clarke tells a story about a dystrophic future where Chinese hackers take down the Pentagon\u2019s networks, trigger explosions at oil refineries, release chlorine gas from chemical plants, disable air traffic control, cause trains to crash into each other, delete all data held by the federal reserve and major banks, then plunge the country into darkness by taking down the power grid from coast-to-coast. Thousands die immediately. Cities run out of food, ATMs shut down, looters take to the streets. Sound familiar? You\u2019ve probably seen the plot in some bad movie.<\/p>\n<p>Even Clarke descriptions of historic events are flawed. Just five minutes on the <a href=\"http:\/\/en.wikipedia.org\/wiki\/Series_of_tubes\">Intertubes<\/a> would have given Clarke better explanations: He claims the <a href=\"http:\/\/www.spamlaws.com\/slammer-worm.html\">Slammer worm<\/a> was responsible for the blackout in northeast of US of 2003. The\u00a0Energy Department concluded otherwise. A power outage in Brazil is\u00a0also attributed to a hacker when, in reality, it was <a href=\"http:\/\/www.wired.com\/threatlevel\/2009\/11\/brazil_blackout\/\">sooty insulators<\/a> that was to blame.<\/p>\n<p>The danger is to attribute everything from <a href=\"https:\/\/viewsdesk.com\/2010\/hacking-the-planet-at-300-baud\/\">teenage hacking<\/a> to industrial espionage to \u201cwar\u201d. War, at least as most of us perceive it, is a premeditated act from a state-actor, not acts of autonomous people or groups.<\/p>\n<p>Just like the War on Terror before it, the term <a href=\"http:\/\/en.wikipedia.org\/wiki\/Cyberwarfare\">Cyberwar<\/a> is not coherent. The objectives are unclear \u2013 so the war can never be won. There is no last battle.<\/p>\n<p>There\u2019s a dark side to this new rhetoric. It makes us think of war as a natural state: we\u2019re <a href=\"http:\/\/gutenberg.net.au\/ebooks01\/0100021h.html\">always at war<\/a>; war is all around us. It makes us think of peace as an anomaly. It implies a low-intensity war that becomes part of the fabric of our society \u2013 and makes us accept fear and suspicion as a part of every day life.<\/p>\n<p><strong>Wikileaks in the Crossfire<\/strong><br \/>\nThe introduction of a new domain for warfare is a premeditated aggressive move. The big question is how it is going to be used, and what doctrine will limit its application. And, how will other countries will react to network attacks by conducted by a nation-state.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-541\" title=\"cyberwar_quote-eternalwar\" src=\"https:\/\/viewsdesk.com\/wp-content\/uploads\/2010\/11\/cyberwar_quote-eternalwar.gif\" alt=\"\" width=\"483\" height=\"92\" srcset=\"https:\/\/viewsdesk.com\/wp-content\/uploads\/2010\/11\/cyberwar_quote-eternalwar.gif 483w, https:\/\/viewsdesk.com\/wp-content\/uploads\/2010\/11\/cyberwar_quote-eternalwar-300x57.gif 300w\" sizes=\"auto, (max-width: 483px) 100vw, 483px\" \/><\/p>\n<p>Wikileaks is clearly a threat to the military, in their view. Remember the vague scenarios described by Clarke. Wikileaks, even though it is only the messenger \u2013 in the same way that newspapers were when <a href=\"http:\/\/www.topsecretplay.org\/index.php\/content\/newspapers\">it published<\/a> the <a href=\"http:\/\/www.mtholyoke.edu\/acad\/intrel\/pentagon\/pent1.html\">Pentagon Papers<\/a> \u2013 has attracted attention from the power structures, and they\u2019re not happy.<\/p>\n<p>Julian Assange has been <a href=\"http:\/\/www.foxnews.com\/opinion\/2010\/10\/25\/christian-whiton-wiki-leaks-ignore-threat-obama-democrats-congress-iraq-war\/\">portrayed as an enemy of the state<\/a>, responsible for jeopardizing the security of thousands of US servicemen. Of course, the fact that he caught the military with <a href=\"www.youtube.com\/watch?v=5rXPrfnU3G0\">its pants down<\/a> isn\u2019t helping him. The action could, from the American perspective to be a defensive move, to protect national secrets to be blown out of the water.<\/p>\n<p>One possible scenario is that Wikileaks gets attacked, in order to take it down. Beside it being a <a href=\"http:\/\/en.wikipedia.org\/wiki\/BitTorrent_%28protocol%29\">practical impossibility<\/a> to take all the copies of the material down (simply due to the nature of the Internet), what would be the implications if USCYBERCOM attempted to bring the main site offline? At least parts of the site is <a href=\"http:\/\/bits.blogs.nytimes.com\/2008\/02\/20\/wikileaks-site-has-a-friend-in-sweden\/\">hosted in Sweden<\/a>, and to make things even more complex, Wikileaks are possibly even hosted under the <a href=\"http:\/\/christianengstrom.wordpress.com\/2010\/08\/17\/swedish-pirate-party-to-host-new-wikileaks-servers\/\">protection of a political party<\/a> with representation in the European parliament.<\/p>\n<p>An attempt to bring the site down would be a clear breach of international law, and of Sweden\u2019s sovereignty. It would also be a <em>carte blanche<\/em> for a whole new doctrine in international affairs, and essentially undermine the <a href=\"http:\/\/en.wikipedia.org\/wiki\/Westphalian_sovereignty\">Westphalian system<\/a>.<\/p>\n<p>The principle of freedom of information is very important to <a href=\"http:\/\/sowhyiswikileaksagoodthingagain.com\/\">treasure<\/a>. It dictates that while we can punish the <a href=\"http:\/\/en.wikipedia.org\/wiki\/Daniel_Ellsberg\">Daniel Ellsbergs<\/a> and the <a href=\"http:\/\/www.bradleymanning.org\/\">Bradley Mannings<\/a> of the world for leaking classified information, we cannot prosecute those who simply distribute, print or discuss the leaked material.<\/p>\n<p>It would also be an all-out War on Journalism. And then we have to ask ourselves: how may people have died in wars defending that very freedom we now wage a war to destroy?<\/p>\n<p><em>(Thanks to: <a href=\"http:\/\/copyriot.se\/2010\/11\/13\/om-cyberkriget\/\">Copyriot<\/a>, <a href=\"http:\/\/www.dn.se\/nyheter\/varlden\/wikileaks-har-brutit-militarens-informationsmonopol-1.1207896\">DN<\/a>)<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pentagon, with its newly founded US Cyber Command, is going all-in against an undefined enemy, with fear-mongers on the sidelines crying for blood. The state of the world being as it is, the question is if Wikileaks is going to be the first victim of this new offensive force. Wikileaks, maybe more than anything else [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[3,11],"tags":[],"class_list":["post-523","post","type-post","status-publish","format-standard","hentry","category-digital-culture","category-free-speech"],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/viewsdesk.com\/index.php?rest_route=\/wp\/v2\/posts\/523","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/viewsdesk.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/viewsdesk.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/viewsdesk.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/viewsdesk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=523"}],"version-history":[{"count":26,"href":"https:\/\/viewsdesk.com\/index.php?rest_route=\/wp\/v2\/posts\/523\/revisions"}],"predecessor-version":[{"id":562,"href":"https:\/\/viewsdesk.com\/index.php?rest_route=\/wp\/v2\/posts\/523\/revisions\/562"}],"wp:attachment":[{"href":"https:\/\/viewsdesk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=523"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/viewsdesk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=523"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/viewsdesk.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}