As Sasha Levine reveals in his ground-breaking book, Surveillance Valley, at the height of the Cold War, US military commanders were pursuing a decentralised computer communications system without a base of operations or headquarters, that could withstand a Soviet strike, without blacking-out or destroying the entire network.
The project was coordinated by the Defence Advanced Research Projects Agency (DARPA), created by President Eisenhower in 1958, for the development of technologies that would expand the frontiers of science and technology and help the US close the missile gap with the Soviets.
DARPA has since been at the vanguard of every major advancement in the development of personal computers ever since the cold war, culminating in 1969 with the first computers being in universities across the US.
A few years later DARPA would develop the protocols to enable connected computers to communicate transparently across multiple networks. Known as The Internetting Project, DARPA’s prototypical communications network, the ARPANET, was born in 1973.
Fast forward to 1990 and the ARPANET was officially decommissioned, and the Internet privatised to a consortium of corporations including IBM and MCI. Eventually the federal government created a dozen or so network providers and spun them off to the private sector, building companies that would become the backbone of today’s internet, including Verizon Time-Warner, AT&T and Comcast. That’s the same six corporations who not only own 90% of US media outlets, they control the flow of global communications, through a process of absolute vertical-horizontal alignment of legacy media with digital media, and the infrastructures and technologies that enable their mass communication.
J.C.R. Licklider
A central player in the development of the ARPANET, who many consider the founding father of computing, was American psychologist, J. C. R. Licklider.
Lick, as he was known, was the first Director of the agency tasked with executing DARPA’s information technology programs, The Information Processing Techniques Office (IPTO), that has been responsible for just about major advancement in computer communications since the sixties.
As Stephen J. Lukasik, a contributor to the ARPANET project reflected in his paper ‘ ‘Why the Arpanet Was Built’ ‘Lick saw information technology and behavioural and cognitive science issues as connected.’
Lick was essentially predicting how the internet would go on to evoke real world social processes that have radically transformed how we communicate, organise and process information. It is no coincidence that a psychologist of ‘Licks calibre was at the vanguard of a new technology designed to exploit basic vulnerabilities in the human psyche.
In the 1960’s Lick oversaw DARPA’s strategic interest in a new frontier of information technology, called Brain Computer Interfaces (BCI’s). In his famous paper, considered one of the most important in the history of computing, Lick put forward the then radical idea that the human mind would one day merge seamlessly with computers. He was anticipating the evolution of AI and the role that DARPA would go on to play in funding just about every major advancement in BCI technology over eight decades, including Elon Musk’s brain-machine interface company, Neuralink.
The Vietnam War
The ARPANET brought together the Pentagon’s war machine with university research departments and the Bay area’s counterculture scene. Inspiring much of the anecdotal idealism that would define the early years of cyberspace as a liberating new frontier for humanity.
But war hawks and intelligence analysts had other ideas. If the lessons of the Vietnam war were anything to go by, the future of US warfare would not be with nation states, it would be with ideologies, or more specifically, grassroots movements, such as the Viet Cong, who had the power to stoke the flames of civil unrest, that could lead to uprisings, or worse, revolution. Alternative approaches were, therefore, needed to infiltrate and disrupt this new threat to the free world.
As the war raged in Southeast Asia, another psychology PHD, Robert Taylor, joined DARPA as the agency’s third director. Taylor transferred to Vietnam in 1967, to establish the first computer centre at the Military Assistance Command base in Saigon, a central pillar in the DoD’s psychological warfare operations.
The move was endemic of the changing rules of military engagement that saw DARPA, and indeed, this new technology, playing a major role in the war effort, both in Southeast Asia, and at home on US soil, against the growing anti-war movement.
In 1968, Taylor and ‘Lick published their seminal paper “The Computer as a Communication Device.” Laying out the future of what the Internet would eventually become. The paper began with the visionary statement: “In a few years, men will be able to communicate more effectively through a machine than face to face.” Anticipating the meteoric rise of social media, particularly Facebook, in the decades to come.
Bringing the PSYOP Back Home
The origins of Facebook coincide with a controversial military program that was mysteriously shut down the same year Facebook launched.
The military program in question, LifeLog, was developed by DARPA’s Information Processing Techniques Office, with the stated aim of creating a permanent and searchable electronic diary of a person’s entire life. A dataset of their most personal information.
But would people willingly give up a record of their private lives to a military intelligence social media platform?
Probably not. Enter Facebook.
LifeLog, meanwhile, was ostensibly shut down. But this was not the first nor the last time that a project of this magnitude would be proposed.
In a 1945 article for The Atlantic, Vannevar Bush who directed the US Army’s psychological operations during World War II, discussed his hypothetical project, The Memex, as a device “in which an individual stores all his books, records and communications, and which is mechanised so that it may be consulted with exceeding speed and flexibility.”
In immortalising people’s lives, it was hoped that LifeLog would eventually contribute to the emerging field of artificial intelligence (AI), that could one day think just like a human, intersecting with another DARPA backed project - the Personal Assistant That Learns (PAL) - a cognitive computing system designed to make military decision-making more efficient, which was eventually spun-off as Siri, the virtual assistant on Apple’s operating system.
But LifeLog is just one part of the story. There was another DARPA program that also ‘disappeared’ one year before Facebook made its debut. Often cited as the precursor to Facebook. The Information Awareness Office (IAO) brought together several DARPA surveillance and information technology projects.
The stated aim of the IAO was to gather and store the personal information of every US citizen, including their personal emails, social networks, lifestyles, credit card records, phone calls, medical records, without, of course, the need for a search warrant. This information would funnel back to intelligence agencies, under the guise of predicting and preventing terrorist incidents before they happened. Reminiscent of Project Camelot’s early warning radar system for left wing revolutionaries.
Despite the government, apparently, abandoning their gambit for total information awareness over ordinary Americans, the core of the project survived.
I draw your attention to Palantir, the spooky data analytics firm founded by Facebook’s board member, Peter Thiel.
Despite being portrayed as science fiction in the firm Minority Report, Palantir’s predictive policing analytics have been deployed extensively against insurgents in Iraq and by police departments in the US.
This is, of course, nothing new for the Chinese. The convergence of big tech data analytics with social credits has been deployed for many years by the CCP to weed out and punish dissidents, who can find themselves held indefinitely in political re-education camps for holding the wrong set of political beliefs.
But it must also be accepted, these Orwellian methods of repression did not originate in China. The encroachment of the CIA onto the public sphere has been happening since the 1960’s, when the US imported decades of counterinsurgency from the soviet satellites to tackle the anti-war and civil rights movements. This was ramped up in the wake of 9/11. Now through the backdoor of COVID-19 total information awareness is coming home to roost, as China’s social credits system has been implemented on the back of the Green Pass.
Before anti-vaxxers and conspiracy theorists, you had civil rights and anti-war activists. The ideology guiding dissent may have changed, but the military tactics used to counter it remain the same.
Counterinsurgency
If insurgency is defined as an organised political struggle by a hostile minority, attempting to seize power through revolutionary means, then counterinsurgency is the military doctrine historically used against non-state actors, that sets out to infiltrate and eradicate those movements.
As David Galula, a French commander who was an expert in counterinsurgency warfare during the Algerian War, emphasised:
“In any situation, whatever the cause, there will be an active minority for the cause, a neutral majority, and an active minority against the cause. The technique of power consists in relying on the favourable minority in order to rally the neutral majority and to neutralise or eliminate the hostile minority.”
Overtime, however, the intelligence state lost touch with reality, as the focus of its counterinsurgency programs shifted from foreign to domestic populations, from national security risks to ordinary citizens. Particularly in the wake of 9/11, when the NSA and its British counterpart, GCHQ, began mapping out the Internet.
Thanks to Edward Snowden’s revelations in 2013, we now know that the NSA were collecting 200 billion pieces of data every month, including the cell phone records, emails, web searches and live chats of more than 200 million ordinary Americans. This was extracted from the world’s largest internet companies via a lesser-known, data mining program called Prism.
There’s another name for this, and its Total Information Awareness. What ceases to be worth the candle is that people’s right to privacy is enshrined under the US Constitution’s fourth amendment.
Few understand how lockdowns are ripples on these troubled waters. Decades of counterinsurgency waged against one subset of society, branded insurgents for their Marxist ideals have, overtime, shifted to anyone holding anti-establishment views. The predictive policing of track and trace and the theory of asymptomatic transmission are the unwelcome repercussions of the intelligence state seeking total information awareness over its citizens.
Throughout COVID-19 anyone audacious enough to want to think for themselves or do their own research has had a target painted on their back. But according to the EU, one third of Europe is unvaccinated. This correlates precisely with David Galula’s theory of counterinsurgency, that suggests one third of society is the active minority ‘against the cause,’ who must be neutralised or eliminated.
When Domestic Populations Become the Battlefield
The use of counterinsurgency in the UK goes back to colonial India in the 1800s. According to historians, this is the first time the British government used methods of repression and social control against indigenous communities, audacious enough to want to liberate their homeland from Imperialist rule.
These tactics was deployed extensively during The Troubles in Northern Ireland against another anti-imperialist faction, also looking to liberate their homeland from The Crown.
Much of the lessons learned in Northern Ireland were later transferred into the everyday policing and criminal justice policies across mainland Britain. And it wasn’t just dissenters who were targeted by these operations, it was anyone with left wing ideals, particularly trade unionists who, it could be argued, were conspiring with the Kremlin to overthrow parliamentary democracy.
I draw your attention to the spying and dirty tricks operations against the 1980s miners’ strike. This continued right up until 2012, when the police and intelligence communities were implicated in a plot to blacklist construction industry workers deemed troublesome for their union views. The existence of a secret blacklist was first exposed in 2009, when investigators from the Information Commissioner’s Office (ICO) raided an unassuming office in Droitwich, Worcestershire, and discovered an extensive database used by construction firms to vet and ultimately blacklist workers belonging to trade unions.
If you want to know what happened to the left, look no further than Project Camelot’s early warning radar system for left wing revolutionaries. Decades of infiltration has recalibrated the left into genuflections of establishment interests. It was the unions who scuppered the easing of lockdowns in the UK and consistently called on the Department of Education to postpone the reopening of schools.
From the infiltration of unions to the co-option of activism, a judge-led public enquiry in 2016 revealed 144 undercover police operations had infiltrated and spied on more than 1,000 political groups in long term deployments since 1968. With covert spymasters rising in the ranks to hold influential leadership positions, guiding policy and strategy, and in some cases, radicalising those movements from within to damage their reputation and weaken public support.