Monday, October 9, 2017

Enemy of the State: A Dons of Time Excerpt

"Well-constructed, action-flooded sci-fi set in a realistic historical world." - Kirkus Reviews

This is an excerpt from Greg Guma's novel, Dons of Time, available from Fomite Press, Amazon, and Barnes & Noble. To read the conclusion, Enemy 2

Emerging from the airport baggage claim late the following afternoon he crossed to the taxi stand for a lift into town. It would be only minutes to the Hilton and a comfortable room with a commanding view of the waterfront and Lake Champlain. But then he heard his last name being called and noticed a wiry-haired kid holding a cardboard sign with the word “Wolf” on it.

“I’m Wolfe,” he said, “Tonio, or T. You here for me?”

“I guess so,” the kid shrugged, “this way.” He grabbed Tonio’s bag without asking and led him into the parking garage, boarding the elevator for the top. When they emerged and Tonio saw the vehicle, a faded blue cargo van more than two decades old, he began to suspect he’d made a mistake. Before he could do anything, the side door slid open and three more young guys with scarves over their faces invited him inside.

“I hope you’re with Harry.”        

Rather than answer they handed him a scarf and asked him to blindfold himself. “Just for now,” one of them apologized. These definitely weren’t Shelley’s people; their greeting would not have been so civil. The government was also out. It didn’t use rusty vans or operatives who dressed like hippie Zapatistas. This had to be Harry. Still, why the drama? Despite his explanation over the phone it didn’t compute.

The ride took two hours, at first on paved streets and the Interstate, then on local roads, and several minutes at the end over rough gravel and dirt. When the van finally rolled to a stop and it was time to remove the blindfold, he could have been anywhere from the Canadian border to New Hampshire.

Harry was waiting at the cabin door. He had always enjoyed costumes and preferred facial hair. This day he looked like a cross between a pirate and a panda. “You have questions, I know,” he announced. “Thanks for coming.”

“It better be good.” Tonio shook his hand and followed.

The cabin was larger and more functional than it looked from the driveway, part tech center, part mountain retreat. Computer terminals covered one wall, screens running data, charts, and video streams. Three college-age hackers monitored them. The rest of the main room was taken up by a large oak table, several couches and thrift shop chairs, a hard-working woodstove, all facing several unmarked doorways and an archway that opened onto the communal kitchen. 

Harry flopped down in a ratty lounge chair, and said, “It was necessary, believe me. Not on my end, in this case. We have good reasons to play it safe with you, my friend. You may already be a person of interest.”

“That’s extreme,” Tonio objected, “but I do believe Shelley had a tail on me.”

“That’s not what worries me.” He pointed up with a finger, as far as Tonio knew meaning either God or spy satellites.

“What does worry you? More to the point, what’s happened to you, man? Last I knew you were a radio personality.”

“A personality, right, I remember when I had one of those,” Harry mused. “Last time I saw you we were about to take over Seattle, right? Blocking the WTO, now that was a demo. Things looked promising in ‘99, didn’t they?  Even after the coup – that’s what I call W’s first term – we totally derailed that FTAA deal in Quebec. But they were already starting the crackdown. After the attacks…well, you know that story, Patriot Act, wiretapping, secret searches, the whole deal. Plus, for the first time the CIA gets a direct role in deciding who gets rounded up or hit. It was the first stages of drone justice.”

That still didn’t explain why he was hiding in the woods, and Harry knew it.

“I was operating above ground then,” he reminisced. “But things were changing. It was an eavesdropping bonanza. The intelligence budget hit $60 billion after 9/11 and thousands of new private contractors got into the game. It was a very lucrative club in a very growing industry. And Fort Meade, that was the Gold Rush zone for masters of the data stream.

“I still had the show then. But instead of the usual stuff I started talking about the surveillance state, what the government was really up to. Big mistake as it turns out. In 2007 I tried to board a flight to DC and found out I was on a no-fly list.” After more than an hour of interrogation Harry was released. But not his laptop, cell phone, camera and USB drive. 

As Harry outlined the rest of his path from radio host to underground man Tonio heard more than he wanted about Crystal City and the Wiretappers’s Ball, a secret annual gathering where experts shared their latest toys and competed to create the ultimate bugging device. Harry had managed to infiltrate it and bring out pictures. He also talked on the air about Verint Systems and Narus, major private eavesdropping operations that reached most of the planet. They made it easier to block websites considered politically or culturally threatening to those in power.

The next flashpoint for Harry came after the Democrats capitulated on amendments to the Foreign Intelligence Surveillance Act. He explained that the changes gave the telecoms legal immunity while providing a go-ahead for the NSA to target almost anyone classified as a terrorist. Obama, who was running for President at the time, opted to support the amendments. Once he was in office, the move toward mass surveillance launched almost a decade earlier continued to escalate. Obama’s Justice Department invoked “state secrets” to stop citizens from suing the government for spying on them. In fact, it argued that the feds had immunity from litigation for any surveillance that violated the law.

“You thought I was being ridiculous about emails, right?” Harry reminded him. “There’s a reason, Sherlock, the CIA. They’ve invested heavily in Visible Technologies, which analyzes social media. It can look into half a million websites a day. But the biggest reason we’re here, instead of enjoying room service on your tab, is because in 2010 they demanded all the visitor information from Truthsquad. I mean everything, and we weren’t supposed to tell anyone about it under penalty of prosecution for impeding a federal investigation.

“The IFC – that’s the Internet Freedom Center – challenged the subpoena.” He was winding down. “But it was obvious where this was heading. They’d already jailed Bradley Manning for the Wikileaks cables and Julian was under house arrest. The handwriting was on the wall. It was only a matter of time ‘til that knock on the door and I’m a suspected cyber-terrorist. That was two years ago, shortly before we set up here. Just in time it turns out, since now I’m on the terrorist screening database. Drone bait -- if they ever find me outside the country.”

“But we’re safe and secure?”

“Like a frog’s ass, baby. Acoustic dampening, the latest in encryption. We just added self-destructing e-mails and encrypted cell phone calls, anything you send digitally. By next year there will be a commercial self-destruct app on the market, but ours is better. My rule of thumb is either that the message is destroyed after it’s read, or else no more than an hour or two after sending it goes poof, like Mission Impossible. But your current security, not so great.”

Considering what he had just heard Tonio wasn’t surprised Harry felt that way.

Stay in touch for the conclusion of this chapter. Like Dons of Time on Facebook.

Friday, September 8, 2017

Prisoners of the Real: An Odyssey

An intellectual journey from Pythagoras to planetary consciousness -- and a new vision of freedom & cooperation. 
  
Prisoners of the Real makes the connection between solar and lunar knowledge, illuminating the cost of our preoccupation with certainty and order. 
  
Exploring insights from linguistics, psychology, physics, literature, philosophy and management science, it opens the door to a new vision of freedom and cooperation – Dionysian leadership.

Video Preview: Dionysus Rising


"Dionysian leaders use artistic methods to invent structures of reality. Although they acknowledge that scientific and artistic processes have equal worth, they de-emphasize logical reasoning and deduction and focus on metaphorical thinking. Their interest is not definition but discovery.”

Section One: The Rational Trap
The Creative Also Destroys * Deconstructing Leadership * Anatomy of Insecurity * Managers and Their Tools * The Corporate Way of Life * The Dictatorship of Time * Rules for Rationals * The Age of Adaptability * Living with Rational Management

Section Two: Philosophy of the Real 

Section Three: New World Disorders

Section Four: 
Restructuring Reality – The Dionysian Way

Monday, June 26, 2017

The People's Republic: Vermont & Bernie Sanders

A revealing look at the rise of Bernie Sanders and the progressive movement that changed Vermont

Available from Maverick Media

Mentioned during the 2016 Presidential campaign in...

Mother Jones: How Bernie Sanders Became a Real Politician
New York Times: Bernie Sanders' Revolutionary Roots
CNN: Can Bernie Sanders Win Black Voters?
Politico: 14 Things Bernie Has Said about Socialism
Politico: Bernie Sanders Has a Secret
Washington Post: Sanders is in with the enemy, so old allies say
CNN: How Bernie Sanders Turned Himself into a Serious Contender
Mother Jones: Here's How Bernie May Be Changing Politics for Good
Washington Post: Sanders Prepares for His National Debate Debut
New York Times: Setting Bernie Sanders Apart from the Debate Field
Mother Jones: Here's What Bernie Sanders is like as a Debater
CNN Video: What is Bernie Sanders' Debate Style?
ABC: What to Expect from Bernie Sanders in Tuesday's Debate
International Business Times: Bernie Sanders' Debate Plan
Washington Post: A Somewhat Reluctant Socialist

Bernie Sanders' election as mayor of Burlington, Vermont, in 1981 caught the attention of the entire nation and inspired progressives throughout the world. Originally published in 1989, just before Sanders won his first race for the US House of Representatives in 1990, The People's Republic: Vermont and the Sanders Revolution was the first comprehensive analysis of Sanders' mayoral years and the progressive movement in Vermont. It remains the most intimate and revealing. 

Greg Guma's exploration of the "revolution" goes far beyond Sanders and his impact on Burlington. The factors behind the initial surprise victory, the tension between leftist ideals and pragmatic politics, the evolution of an effective political coaliton outside the two-party system -- all these topics and more Guma investigates, with an eye on global political implications as well as the immediate local impact. The People's Republic is for all those interested in progressive politics and political history, not to mention those in places where a similar "revolution" is possible.

A fast-moving description that illustrates one of the great efforts at innovative government of the past fifty years…
--Pierre Clavel, Cornell University

If you were going to create somebody to write about Bernie Sanders’ years as socialist mayor of Burlington, you might make him a fortysomething Vermont journalist and bookstore founder and former government worker who almost ran for mayor of Burlington himself…That’s what you have in Greg Guma.
—Mark Satin, New Options

A treasure house of first-hand information and perceptive, if often controversial analysis of great value to anyone concerned to explore realistically the possibilities for combining third-party electoral politics with other methods of working for justice, peace, environmental sanity and genuine democracy.
– David Dellinger, author/activist

If you are at all interested in Vermont and Burlington, and public policy, get this book.
– Phil Hoff, former Vermont Governor


More Books from Maverick Media HERE 

Uneasy Empire
How an international establishment has used fear of socialism, communism and terrorism to justify repression and a massive military establishment. Pointing past nationalism and corporate empire, Uneasy Empire: Repression, Globalization, and What We Can Do combines a radical critique with hopeful solutions and a vision of democratic globalism through which people can regain control of their futures.

Spirits of Desire
Set during the spirtualist craze of the 1870s, Spirits of Desire follows a group of extraordinary people, including Russian theosophist Helena Blavatsky, paranormal investigator Henry Olcott and Oneida Community leader Theo Noyes, as they search for the truth about ghosts through a notorious family of Vermont mediums. The trail leads them into a world of seances, deadly elementals, astral forces and past lives.

Dons of Time
Unsolved mysteries collide with cutting edge science and altered states of consciousness in a world of corporate gangsters, infamous crimes and top-secret experiments. Based on eyewitness accounts, suppressed documents and the lives of world-changers Nikola Tesla, Annie Besant, Ignatius Donnelly and Jack the Ripper, Dons of Time is a speculative adventure, a glimpse of an alternative future and a quantum leap to Gilded Age London at the tipping point of invention, revolution and murder.

Sunday, June 25, 2017

Dangerous Words: A Political Memoir

MUCKRAKING MEDIA CONSPIRACY CIA TERRORISM RIGHTS FBI UN-AMERICAN REPRESSION DOOMSDAY NARCISSISM COLD WAR SURVEILLANCE LITERACY ANTI-NUCLEAR ANARCHISM FATALISM FREEDOM LIBERATION REACTIONARY MERGER DISINFORMATION PEACE MISSILES ALTERNATIVE CONTRAS DOUBLESPEAK FASCISM DRUGS SECRET IMPERIAL SUPERPOWER MULTIPOLAR RELIGION ECOLOGY CRIME NON-ALIGNED DISSENT DEMOCRACY...   (Links Below)

  Dangerous Words: A Political Memoir
   By Greg Guma

Contents

Audio Prologue ON THE AIR: Burlington Reflections (May 2016)
(One month later Burlington College was closed)

Part One: Education of an Outsider (1960-1968)

Part Two: Fragile Paradise  (1968-1978)


Part Three: Prelude to a Revolution (1974-1978)

Monday, May 22, 2017

MIND GAMES: Cyberspace and Psychiatric Drugs

At least 10 percent of all Americans over six-years-old are on antidepressants. That’s more than 35 million people, double the number from less than two decades ago. Meanwhile, anti-psychotics have eclipsed cholesterol treatments as the country’s fastest selling and most profitable drugs, even though half the prescriptions treat disorders for which they haven’t been proven effective. At least 5 million children and adolescents use them, in part because more kids are being diagnosed with bipolar disorder.

This raises some troubling alternatives: Are a growing number of people experiencing psychological troubles? Have we just become better at recognizing them? Or is some other dynamic at work?

One possibility is that the criteria for what constitutes a mental illness or disability may have expanded to the point that a vast number appear to have clinical problems. But there’s an even more insidious development: the drugs being used to treat many of the new diagnoses could cause long-term effects that persist after the original trouble has been resolved. That’s the case made by Robert Whitaker in his book, Anatomy of an Epidemic: Magic Bullets, Psychiatric Drugs, and the Astonishing Rise of Mental Illness in America.

Speaking of long-term impacts on the brain, we’re also heading toward a world where humans are directly linked with computers that profoundly influence their perceptions and ideas. Despite many potential benefits, there is danger here as well. Rather than simply augmenting our memories by providing neutral information, the brain-computer connection may lead people into separate realities based on their assumptions and politics.

Brain-altering drugs and digital “indoctrination” – a potent combination. Together, they pose a potential threat not only to the stability of many individuals but of society itself. Seduced by the promise that our brains can be managed and enhanced without serious side-effects, we may be creating a future where psychological dysfunction becomes a post-modern plague and powerful forces use cyberspace to reshape “reality” in their private interest.

Do prescription drugs create new mental problems? And if so, how could it be happening? For Whitaker the answer lies in the effects of drugs on neurotransmitters, a process he calls negative feedback. When a drug blocks neurotransmitters or increases the level of serotonin, for instance, neurons initially attempt to counteract the effects. When the drug is used over a long period, however, it can produce “substantial and long-lasting alterations in neural function,” claims Steven Hyman, former director of the National Institutes of Mental Health. The brain begins to function differently. Its ability to compensate starts to fail and side effects created by the drug emerge.

What comes next? More drugs and, along with them, new side effects, an evolving chemical mixture often accompanied by a revised diagnosis. According to Marcia Angell, former editor of The New England Journal of Medicine, it can go this way: use of an antidepressant leads to mania, which leads to a diagnosis of bipolar disorder, which leads to the prescription of mood stabilizers. Through such a process people can end up taking several drugs daily for many years.

What may happen after that is deeply troubling. Researcher Nancy Andreasen claims the brain begins to shrink, an effect she links directly to dosage and duration. “The prefrontal cortex doesn’t get the input it needs and is being shut down by drugs,” she explained in The New York Times. “That reduces the psychotic symptoms.” But the pre-frontal cortex gradually atrophies.

Anyone who has been on the psychiatric drug roller coaster understands some of the ride’s risks and how hard it can be to get off. But the new implication is that we may be experiencing a medically-induced outbreak of brain dysfunction caused by the exploding use of drugs. One big unanswered question at the moment: What does Big Pharma really know, and when did they learn it?

Drug companies are not the only ones experimenting with our brains. Bold research is also being pursued to create brain-computer interfaces that can help people overcome problems like memory loss. According to writer Michael Chorost, author of World Wide Mind and interface enthusiast who benefited from ear implants after going deaf, we may soon be directly connected to the Internet through neural implants. It sounds convenient and liberating. Ask yourself a question and, presto, there’s the answer. Google co-founder Larry Page can imagine a not-too-distant future in which you simply think about something and “your cell phone whispers the answer in your ear.”

Beyond the fact that this could become irritating, there’s an unspoken assumption that the information received is basically unbiased, like consulting an excellent encyclopedia or a great library catalog. This is where the trouble starts. As Sue Halperin noted in a New York Review of Books essay, “Mind Control and the Internet,” Search engines like Google use an algorithm to show us what’s important. But even without the manipulation of marketing companies and consultants who influence some listings, each search is increasingly shaped to fit the profile of the person asking. If you think that we both get the same results from the same inquiry, guess again.

What really happens is that you get results assembled just for you. Information is prioritized in a way that reinforces one’s previous choices, influenced by suggested assumptions and preferences. As Eli Pariser argues in The Filter Bubble: What the Internet Is Hiding from You, environmental activists and energy executives get very different listings when they inquire about climate science. It looks and feels “objective” but they’re being fed data that fits with their existing view – and probably not seeing much that conflicts.

A study discussed in Sociological Quarterly looked at this development by following attitudes about climate science over a decade. Here’s a strange but significant finding: Although a consensus emerged among most scientists over the years, the number of Republicans who accepted their conclusion dropped. Why? Because the Republicans were getting different information than the Democrats and others who embraced the basic premise. In other words, their viewpoint was being reflected back at them.

Does this sound dangerous? Pariser thinks so, and suggests that the type of reinforcement made common by search engines is leading to inadvertent self-indoctrination. For democracy to function effectively, people need exposure to various viewpoints, “but instead we’re more and more enclosed in our own bubbles,” he writes. Rather than agreeing on a set of shared facts we’re being led deeper into our different worlds.

Whether this is a problem depends somewhat on your expectations. For some people it is merely a bump in the road, a faltering step in the inevitable evolution of human consciousness. Techno-shamen and other cosmic optimists see the potential of drug-induced enlightenment and an Internet-assisted “hive mind,” and believe that the long-term outcome will be less violence, more trust, and a better world. But others have doubts, questioning whether we’ll really end up with technological liberation and a psychic leap forward. It could go quite differently, they worry. We could instead see millions of brain-addled casualties and even deeper social polarization.

How will current trends influence democracy and basic human relations? Increased trust and participation don’t immediately come to mind. Rather, the result could be more suspicion, denial and paranoia, as if we don’t have enough. In fact, even the recent upsurge in anger and resentment may be drug and Internet-assisted, creating fertile ground for opportunists and demagogues.

In False Alarm: The truth about the epidemic of fear, New York internist Marc Siegel noted that when the amygdala — the Brain’s central station for processing emotions – detects a threatening situation, it pours out stress hormones. If the stress persists too long, however, it can malfunction, overwhelm the hippocampus (center of the "thinking" brain), and be difficult to turn off. In the long term, this "fear biology" can wear people down, inducing paralysis or making them susceptible to diseases and delusions that they might otherwise resist. Addressing this problem with drugs that change the brain’s neural functioning isn’t apt to help. Either will the Internet’s tendency to provide information that reinforces whatever one already thinks.

More than half a century ago, Aldous Huxley – who knew a bit about drugs – issued a dire prediction. He didn’t see the Internet coming, but other than that his vision remains relevant. “There will be within the next generation or so a pharmacological method of making people love their servitude,” he wrote in Brave New World, “and producing a kind of painless concentration camp for entire societies, so that people will in fact have their liberties taken away from them but will rather enjoy it, because they will be distracted from any desire to rebel by propaganda, brainwashing or brainwashing enhanced by pharmacological methods."

Pretty grim, but there’s no going back. Despite any dangers posed by computer algorithms and anti-psychotic drugs, they are with us for the foreseeable future. Still, what we’ve learned about them in recent years could help us to reduce the negatives. Not every illness listed in the DMS – that constantly growing, Big Pharma-influenced psychiatric bible – requires drug treatment. And the results of your online searches will very likely tell you what you want to know, but that does not mean you’re getting a “balanced” or comprehensive picture.

(Originally published on 6/15/11, based on a radio broadcast)

Monday, March 20, 2017

Secrets R US: The NSA and Outsourcing Defense

This essay is an excerpt from  Big Lies: How Our Corporate Overlords, Politicians and Media Establishment Warp Reality and Undermine Democracy. Guma's latest book, Dons of Time, is a sci-fi look at the control of history as power.

By Greg Guma

Despite 24-hour news and talk about transparency, there's a lot we don't know about our past, much less current events. What’s worse, some of what we think we know isn't true. 
     The point is that it's no accident.
  
    Consider, for example, the circumstances that led to open war in Vietnam. According to official history, two US destroyers patrolling in the Gulf of Tonkin off North Vietnam were victims of unprovoked attacks in August 1964, leading to a congressional resolution giving President Johnson the power "to take all necessary measures."
     In fact, the destroyers were spy ships, part of a National Security Agency (NSA) eavesdropping program operating near the coast as a way to provoke the North Vietnamese into turning on their radar and other communications channels. The more provocative the maneuvers, the more signals that could be captured. Meanwhile, US raiding parties were shelling mainland targets. 
     Documents revealed later indicated that the August 4 attack on the USS Maddox – the pretext for passing the Gulf of Tonkin Resolution – may not even have taken place.
     But even if it did, the incident was still stage managed to build up congressional and public support for the war. Evidence suggests that the plan was based on Operation Northwoods, a scheme developed in 1962 to justify an invasion of Cuba. Among the tactics the Joint Chiefs of Staff considered then were blowing up a ship in Guantanamo Bay, a phony "communist Cuba terror campaign" in Florida and Washington, DC, and an elaborate plan to convince people that Cuba had shot down a civilian airliner filled with students. 
     That operation wasn't implemented, but two years later, to justify escalating the war, the administration's military brass found a way to create the necessary conditions in Vietnam.

Privatizing Defense (2004 Interview)

NSA and Echelon

For more than half a century, the eyes and ears of US power to monitor and manipulate information (and with it, mass perceptions) has been the NSA, initially designed to assist the CIA. Its original task was to collect raw information about threats to US security, cracking codes and using the latest technology to provide accurate intelligence on the intentions and activities of enemies. Emerging after World War II, its early focus was the Soviet Union. But it never did crack a high-level Soviet cipher system. On the other hand, it used every available means to eavesdrop on not only enemies but also allies and, sometimes, US citizens.
     In Body of Secrets, James Bamford described a bureaucratic and secretive behemoth, based in an Orwellian Maryland complex known as Crypto City. From there, supercomputers linked it to spy satellites, subs, aircraft, and equally covert, strategically placed listening posts worldwide. As of 2000, it had a $7 billion annual budget and directly employed at least 38,000 people, more than the CIA and FBI. It was also the leader of an international intelligence club, UKUSA, which includes Britain, Canada, Australia, and New Zealand. Together, they monitored and recorded billions of encrypted communications, telephone calls, radio messages, faxes, and e-mails around the world.
     Over the years, however, the line between enemies and friends blurred, and the intelligence gatherers often converted their control of information into unilateral power, influencing the course of history in ways that may never be known. No doubt the agency has had a hand in countless covert operations; yet, attempts to pull away the veil of secrecy have been largely unsuccessful.
     In the mid-1970s, for example, just as Congress was attempting to reign in the CIA, the NSA was quietly creating a virtual state, a massive international computer network named Platform. Doing away with formal borders, it developed a software package that turned worldwide Sigint (short for "signal intelligence": communication intelligence, eavesdropping, and electronic intelligence) into a unified whole. The software package was code named Echelon, a name that has since become a synonym for eavesdropping on commercial communication.
     Of course, the NSA and its British sister, the Government Communications Headquarters (GCHQ), refused to admit Echelon existed, even though declassified documents appeared on the Internet and Congress conducted an initial investigation. But a European Parliament report also confirmed Echelon's activities, and encouraged Internet users and governments to adopt stronger privacy measures in response.
     In March 2001, several ranking British politicians discussed Echelon's potential impacts on civil liberties, and a European Parliament committee considered its legal, human rights, and privacy implications. The Dutch held similar hearings, and a French National Assembly inquiry urged the European Union to embrace new privacy enhancing technologies to protect against Echelon's eavesdropping. France launched a formal investigation into possible abuses for industrial espionage.

When Allies Compete

A prime reason for Europe's discontent was the growing suspicion that the NSA had used intercepted conversations to help US companies win contracts heading for European firms. The alleged losers included Airbus, a consortium including interests in France, Germany, Spain, and Britain, and Thomson CSF, a French electronics company. The French claimed they had lost a $1.4 billion deal to supply Brazil with a radar system because the NSA shared details of the negotiations with Raytheon. Airbus may have lost a contract worth $2 billion to Boeing and McDonnell Douglas because of information intercepted and passed on by the agency.
     According to former NSA agent Wayne Madsen, the US used information gathered from its bases in Australia to win a half share in a significant Indonesian trade contract for AT&T. Communication intercepts showed the contract was initially going to a Japanese firm. A bit later a lawsuit against the US and Britain was launched in France, judicial and parliamentary investigations began in Italy, and German parliamentarians demanded an inquiry.
     The rationale for turning the NSA loose on commercial activities, even those involving allies, was provided in the mid-90s by Sen. Frank DeConcini, then chairman of the Senate Intelligence Committee. "I don't think we should have a policy where we're going to invade the Airbus inner sanctum and find out their secrets for the purpose of turning it over to Boeing or McDonnell Douglas," he opined. "But if we find something, not to share it with our people seems to me to be not smart."
      President Bill Clinton and other US officials buttressed this view by charging that European countries were unfairly subsidizing Airbus. In other words, competition with significant US interests can be a matter of national security, and private capitalism must be protected from state-run enterprises.
      The US-Europe row about Airbus subsidies was also used as a "test case" for scientists developing new intelligence tools. At US Defense Department conferences on "text retrieval," competitions were staged to find the best methods. A standard test featured extracting protected data about "Airbus subsidies."

Manipulating Democracy

In the end, influencing the outcome of commercial transactions is but the tip of this iceberg. The NSA's ability to intercept to virtually any transmitted communication has enhanced the power of unelected officials and private interests to set covert foreign policy in motion. In some cases, the objective is clear and arguably defensible: taking effective action against terrorism, for example. But in others, the grand plans of the intelligence community have led it to undermine democracies.
     The 1975 removal of Australian Prime Minister Edward Whitlam is an instructive case. At the time of Whitlam's election in 1972, Australian intelligence was working with the CIA against the Allende government in Chile. The new PM didn’t simply order a halt to Australia's involvement, explained William Blum in Killing Hope, a masterful study of US interventions since World War II. Whitlam seized intelligence information withheld from him by the Australian Security and Intelligence Organization (ASIO), and disclosed the existence of a joint CIA-ASIO directorate that monitored radio traffic in Asia. He also openly disapproved of US plans to build up the Indian Ocean Island of Diego Garcia as a military-intelligence-nuclear outpost.
     Both the CIA and NSA became concerned about the security and future of crucial intelligence facilities in and near Australia. The country was already key member of UKUSA. After launching its first space-based listening post-a microwave receiver with an antenna pointed at earth-NSA had picked an isolated desert area in central Australia as a ground station. Once completed, the base at Alice Springs was named Pine Gap, the first of many listening posts to be installed around the world. For the NSA and CIA, Whitlam posed a threat to the secrecy and security of such operations.
     An early step was covert funding for the political opposition, in hopes of defeating Whitlam's Labor Party in 1974. When that failed, meetings were held with the Governor-General, Sir John Kerr, a figurehead representing the Queen of England who had worked for CIA front organizations since the 50s. Defense officials warned that intelligence links would be cut off unless someone stopped Whitlam. On November 11, 1975, Kerr responded, dismissing the prime minister, dissolving both houses of Parliament, and appointing an interim government until new elections were held.
     According to Christopher Boyce (subject of The Falcon and the Snowman, a fictionalized account), who watched the process while working for TRW in a CIA-linked cryptographic communications center, the spooks also infiltrated Australian labor unions and contrived to suppress transportation strikes that were holding up deliveries to US intelligence installations. Not coincidentally, some unions were leading the opposition to development of those same facilities.
     How often, and to what effect, such covert ops have succeeded is another of the mysteries that comprise an unwritten history of the last half century. Beyond that, systems like Echelon violate the human right to individual privacy, and give those who control the information the ability to act with impunity, sometimes destroying lives and negating the popular will in the process.

Hiding the Agenda in Peru

In May 1960, when a U-2 spy plane was shot down over Soviet territory, President Dwight Eisenhower took great pains to deny direct knowledge or authorization of the provocative mission. In reality, he personally oversaw every U-2 mission, and had even riskier and more provocative bomber overflights in mind.
     It's a basic rule of thumb for covert ops: When exposed, keep denying and deflect the blame. More important, never, never let on that the mission itself may be a pretext, or a diversion from some other, larger agenda.
     Considering that, the April 20, 2001, shoot down of a plane carrying missionaries across the Brazilian border into Peru becomes highly suspicious. At first, the official story fed to the press was that Peruvian authorities ordered the attack on their own, over the pleas of the CIA "contract pilots" who initially spotted the plane. But Peruvian pilots involved in that program, supposedly designed to intercept drug flights, insist that nothing was shot down without US approval.
     Innocent planes were sometimes attacked, but most were small, low flying aircraft that didn't file flight plans and had no radios. This plane maintained regular contact and did file a plan. Still, even after it crash-landed, the Peruvians continued to strafe it, perhaps in an attempt to ignite the plane's fuel and eliminate the evidence.
     "I think it has to do with Plan Colombia and the coming war," said Celerino Castillo, who had previously worked in Peru for Drug Enforcement Agency. "The CIA was sending a clear message to all non-combatants to clear out of the area, and to get favorable press." The flight was heading to Iquitos, which "is at the heart of everything the CIA is doing right now," he added. "They don't want any witnesses."
     Timing also may have played a part. The shoot down occurred on the opening day of the Summit of the Americas in Quebec City. Uruguay's President Jorge Ibanez, who had proposed the worldwide legalization of drugs just weeks before, was expected to make a high-profile speech on his proposal at the gathering. The downing of a drug smuggling plane at this moment, near territory held by Colombia's FARC rebels, would help to defuse Uruguay's message and reinforce the image of the insurgents as drug smugglers.
     If you doubt that the US would condone such an operation or cover it up, consider this: In 1967, Israel torpedoed the USS Liberty, a large floating listening post, as it was eavesdropping on the Arab-Israeli war off the Sinai Peninsula. Hundreds of US sailors were wounded and killed, probably because Israel feared that its massacre of Egyptian prisoners at El Arish might be overheard. How did the Pentagon respond? By imposing a total news ban, and covering up the facts for decades.
     Will we ever find out what really happened in Peru, specifically why a missionary and her daughter were killed? Not likely, since it involves a private military contractor that is basically beyond the reach of congressional accountability.
     In 2009, when the Peru shoot down became one of five cases of intelligence operation cover up being investigated by the US House Intelligence Committee, the CIA inspector general concluded that the CIA had improperly concealed information about the incident. Intelligence Oversight and Investigations Subcommittee Chairwoman Jan Schakowsky, who led the investigation, didn’t rule out referrals to the Justice Department for criminal prosecutions if evidence surfaced that intelligence officials broke the law. But she couldn’t guarantee that the facts would ever come to light, since the Committee’s report of its investigation would be classified.
     The most crucial wrinkle in the Peruvian incident is the involvement of DynCorp, which was active in Colombia and Bolivia under large contracts with various US agencies. The day after the incident, ABC news reported that, according to “senior administration officials,” the crew of the surveillance plane that first identified the doomed aircraft "was hired by the CIA from DynCorp." Within two days, however, all references to DynCorp were scrubbed from ABC's Website. A week later, the New York Post claimed the crew actually worked for Aviation Development Corp., allegedly a CIA proprietary company.
     Whatever the truth, State Department officials refused to talk on the record about DynCorp's activities in South America. Yet, according to DynCorp's State Department contract, the firm had received at least $600 million over the previous few years for training, drug interdiction, search and rescue (which included combat), air transport of equipment and people, and reconnaissance in the region. And that was only what they put on paper. It also operated government aircraft and provided all manner of personnel, particularly for Plan Colombia.

Outsourcing Defense

DynCorp began in 1946 as the employee-owned air cargo business California Eastern Airways, flying in supplies for the Korean War. This and later government work led to charges that it was a CIA front company. Whatever the truth, it ultimately became a leading PMC, hiring former soldiers and police officers to implement US foreign policy without having to report to Congress.
     The push to privatize war gained traction during the first Bush administration. After the first Gulf War, the Pentagon, then headed by Defense Secretary Dick Cheney, paid a Halliburton subsidiary nearly $9 million to study how PMCs could support US soldiers in combat zones, according to a Mother Jones investigation. Cheney subsequently became CEO of Halliburton, and Brown & Root, later known as Halliburton KBR, won billions to construct and run military bases, some in secret locations.
     One of DynCorp’s earliest “police” contracts involved the protection of Haitian President Jean-Bertrand Aristide, and, after he was ousted, providing the “technical advice” that brought military officers involved in that coup into Haiti’s National Police. Despite this dodgy record, in 2002 it won the contract to protect another new president, Afghanistan’s Hamid Karzai. By then, it was a top IT federal contractor specializing in computer systems development, and also providing the government with aviation services, general military management, and security expertise.
     Like other private military outfits, the main danger it has faced is the risk of public exposure. Under one contract, for example, DynCorp sprayed vast quantities of herbicides over Colombia to kill the cocaine crop. In September 2001, Ecuadorian Indians filed a class action lawsuit, charging that DynCorp recklessly sprayed their homes and farms, causing illnesses and deaths and destroying crops. In Bosnia, private police provided by DynCorp for the UN were accused of buying and selling prostitutes, including a 12-year-old girl. Others were charged with videotaping a rape.
     In the first years of the 21st century, DynCorp's day-to-day operations in South America were overseen by State Department officials, including the Narcotic Affairs Section and the Air Wing, the latter a clique of unreformed cold warriors and leftovers from 80s operations in Central America. It was essentially the State Department's private air force in the Andes, with access to satellite-based recording and mapping systems.
     In the 1960s, a similar role was played by the Vinnell Corp., which the CIA called "our own private mercenary army in Vietnam." Vinnell later became a subsidiary of TRW, a major NSA contractor, and employed US Special Forces vets to train Saudi Arabia's National Guard. In the late 1990s, TRW hired former NSA director William Studeman to help with its intelligence program.
     DynCorp avoided the kind of public scandal that surrounded the activities of Blackwater. In Ecuador, where it developed military logistics centers and coordinated “anti-terror” police training, the exposure of a secret covenant signed with the Aeronautics Industries Directorate of the Ecuadorian Air Force briefly threatened to make waves. According to a November 2003 exposé in Quito’s El Comercio, the arrangement, hidden from the National Defense Council, made DynCorp’s people part of the US diplomatic mission.
     In Colombia, DynCorp’s coca eradication and search-and-rescue missions led to controversial pitched battles with rebels. US contract pilots flew Black Hawk helicopters carrying Colombian police officers who raked the countryside with machine gun fire to protect the missions against attacks. According to investigative reporter Jason Vest, DynCorp employees were also implicated in narcotics trafficking. But such stories didn’t get far, and, in any case, DynCorp’s “trainers” simply ignored congressional rules, including those that restrict the US from aiding military units linked to human rights abuses.
     In 2003, DynCorp won a multimillion-dollar contract to build a private police force in post-Saddam Iraq, with some of the funding diverted from an anti-drug program for Afghanistan. In 2004, the State Department further expanded DynCorp’s role as a global US surrogate with a $1.75 billion, five year contract to provide law enforcement personnel for civilian policing operations in “post-conflict areas” around the world. That March, the company also got an Army contract to support helicopters sold to foreign countries. The work, described as “turnkey” services, includes program management, logistics support, maintenance and aircrew training, aircraft maintenance and refurbishment, repair and overhaul of aircraft components and engines, airframe and engine upgrades, and the production of technical publications.
     In short, DynCorp was a trusted partner in the military-intelligence-industrial complex. "Are we outsourcing order to avoid public scrutiny, controversy or embarrassment?" asked Rep. Schakowsky upon submitting legislation to prohibit US funding for private military firms in the Andean region. "If there is a potential for a privatized Gulf of Tonkin incident, then the American people deserve to have a full and open debate before this policy goes any further."
     If and when that ever happens, the discussion will have to cover a lot of ground. Private firms, working in concert with various intelligence agencies, constitute a vast foreign policy apparatus that is largely invisible, rarely covered by the corporate press, and not currently subject to congressional oversight. The Freedom of Information Act simply doesn't apply. Any information on whom they arm or how they operate is private, proprietary information.
     The US government downplays its use of mercenaries, a state of affairs that could undermine any efforts to find out about CIA activities that are concealed from Congress. Yet private contractors perform almost every function essential to military operations, a situation that has been called the “creeping privatization of the business of war.” By 2004, the Pentagon was employing more than 700,000 private contractors.
     The companies are staffed by former generals, admirals, and highly trained officers. Name a hot spot and some PMC has people there. DynCorp has worked on the Defense Message System Transition Hub and done long-range planning for the Air Force. MPRI had a similar contract with the Army, and for a time coordinated the Pentagon's military and leadership training in at least seven African nations.
     How did this outsourcing of defense evolve? In 1969, the US Army had about 1.5 million active duty soldiers. By 1992, the figure had been cut by half. Since the mid-1990s, however, the US has mobilized militarily to intervene in several significant conflicts, and a corporate “foreign legion” has filled the gap between foreign policy imperatives and what a downsized, increasingly over-stretched military can provide.
     Use of high technology equipment feeds the process. Private companies have technical capabilities that the military needs, but doesn’t always possess. Contractors have maintained stealth bombers and Predator unmanned drones used in Afghanistan and Iraq. Some military equipment is specifically designed to be operated and maintained by private companies.
     In Britain, the debate over military privatization has been public, since the activities of the UK company Sandline in Sierra Leone and Papua New Guinea embarrassed the government in the late 1990s. But no country has clear policies to regulate PMCs, and the limited oversight that does exist rarely works. In the US, they have largely escaped notice, except when US contract workers in conflict zones are killed or go way over the line, as in the case of Blackwater.
     According to Guy Copeland, who began developing public-private IT policy in the Reagan years, “The private sector must play an integral role in improving our national cybersecurity.” After all, he has noted, private interests own and operate 85 percent of the nation’s critical IT infrastructure. He should know. After all, Copeland drafted much of the language in the Bush Administration’s 2002 National Strategy to Secure Cyberspace as co-chair of the Information Security Committee of the Information Technology Association of America.
     Nevertheless, when the federal government becomes dependent on unaccountable, private companies like DynCorp and Blackwater (later renamed Xe Services) for so many key security services, as well as for military logistics, management, strategy, expertise and “training,” fundamental elements of US defense have been outsourced. And the details of that relationship are matters that the intelligence community will fight long and hard to keep out of public view.

Corporate Connections and "Soft Landings"

Although the various departments and private contractors within the military-intelligence-industrial complex occasionally have turf battles and don't always share information or coordinate strategy as effectively as they might, close and ongoing contact has long been considered essential. And it has expanded as a result of the information revolution. The entire intelligence community has its own secret Intranet, which pulls together FBI reports, NSA intercepts, analysis from the DIA and CIA, and other deeply covert sources.
     Private firms are connected to this information web through staff, location, shared technology, and assorted contracts. Working primarily for the Pentagon, for example, L-3 Communications, a spinoff from major defense contractor Lockheed Martin, has manufactured hardware like control systems for satellites and flight recorders. MPRI, which was bought by L-3, provided services like its operations in Macedonia. L-3 also built the NSA's Secure Terminal Equipment, which instantly encrypts phone conversations.
     Another private contractor active in the Balkans was Science Applications, staffed by former NSA and CIA personnel, and specializing in police training. When Janice Stromsem, a Justice Department employee, complained that its program gave the CIA unfettered access to recruiting agents in foreign police forces, she was relieved of her duties. Her concern was that the sovereignty of nations receiving aid from the US was being compromised.
     In 1999, faced with personnel cuts, the NSA offered over 4000 employees "soft landing" buy outs to help them secure jobs with defense firms that have major NSA contracts. NSA offered to pay the first year's salary, in hopes the contractor would then pick up the tab. Sometimes the employee didn't even have to move away from Crypto City. Companies taking part in the program included TRW and MPRI's parent company, Lockheed Martin.
     Lockheed was also a winner in the long-term effort to privatize government services. In 2000, it won a $43.8 million contract to run the Defense Civilian Personnel Data System, one of the largest human resources systems in the world. As a result, a major defense contractor took charge of consolidating all Department of Defense personnel systems, covering hiring and firing for about 750,000 civilian employees. This put the contractor at the cutting edge of Defense Department planning, and made it a key gatekeeper at the revolving door between the US military and private interests.

Invisible Threats

Shortly after his appointment as NSA director in 1999, Michael Hayden went to see the film Enemy of the State, in which Will Smith is pursued by an all-seeing, all hearing NSA and former operative Gene Hackman decries the agency's dangerous power. In Body of Secrets, author Bamford says Hayden found the film entertaining, yet offensive and highly inaccurate. Still, the NSA chief was comforted by "a society that makes its bogeymen secrecy and power. That's really what the movie's about.''
     Unlike Hayden, most people don't know where the fiction ends and NSA reality begins. Supposedly, the agency rarely "spies" on US citizens at home. On the other hand, the Foreign Intelligence Surveillance Act allows a secret federal court to waive that limitation. The rest of the world doesn't have that protection. Designating thousands of keywords, names, phrases, and phone numbers, NSA computers can pick them out of millions of messages, passing anything of interest on to analysts. One can only speculate about what happens next.
     After 9/11 the plan was to go further with a project code named Tempest. The goal was to capture computer signals such as keystrokes or monitor images through walls or from other buildings, even if the computers weren't linked to a network. One NSA document, "Compromising Emanations Laboratory Test Requirements, Electromagnetics," described procedures for capturing the radiation emitted from a computer-through radio waves and the telephone, serial, network, or power cables attached to it.
     Other NSA programs have included Oasis, designed to reduce audiovisual images into machine-readable text for easier filtering, and Fluent, which expanded Echelon's multilingual capabilities. And let's not forget the government's Carnivore Internet surveillance program, which can collect all communications over any segment of the network being watched.
     Put such elements together, combine them with business imperatives and covert foreign policy objectives, then throw PMCS into the mix, and you get a glimpse of the extent to which information can be translated into raw power and secretly used to shape events. Although most pieces of the puzzle remain obscure, enough is visible to justify suspicion, outrage, and a campaign to pull away the curtain on this Wizard of Oz. But fighting a force that is largely invisible and unaccountable – and able to eavesdrop on the most private exchanges, that is a daunting task, perhaps even more difficult than confronting the mechanisms of corporate globalization that it protects and promotes.