Share on Google Plus Share on Twitter Share on Facebook Share on LinkedIn Share on PInterest Share on Fark! Share on Reddit Share on StumbleUpon Tell A Friend 5 (5 Shares)  

Printer Friendly Page Save As Favorite View Favorites (# of views)   No comments
OpEdNews Op Eds

Network-centric Warfare Dominating Entire Societies Worldwide Through Ubiquitous Surveillance

By       Message Tom Burghardt     Permalink
      (Page 1 of 4 pages)
Related Topic(s): ; ; ; ; ; ; ; ; ; , Add Tags Add to My Group(s)

View Ratings | Rate It

opednews.com Headlined to H3 6/25/09

- Advertisement -

Global Research, June 11, 2009

Antifascist Calling...

- Advertisement -

What Pentagon theorists describe as a "Revolution in Military Affairs" (RMA) leverages information technology to facilitate (so they allege) command decision-making processes and mission effectiveness, i.e. the waging of aggressive wars of conquest.

It is assumed that U.S. technological preeminence, referred to euphemistically by Airforce Magazine as "compressing the kill chain," will assure American military hegemony well into the 21st century. Indeed a 2001 study, Understanding Information Age Warfare, brought together analysts from a host of Pentagon agencies as well as defense contractors Boeing, Booz Allen Hamilton and the MITRE Corporation and consultants from ThoughtLink, Toffler Associates and the RAND Corporation who proposed to do just that.

As a result of this and other Pentagon-sponsored research, military operations from Afghanistan to Iraq and beyond aim for "defined effects" through "kinetic" and "non-kinetic" means: leadership decapitation through preemptive strikes combined with psychological operations designed to pacify (terrorize) insurgent populations. This deadly combination of high- and low tech tactics is the dark heart of the Pentagon's Unconventional Warfare doctrine.

In this respect, "network-centric warfare" advocates believe U.S. forces can now dominate entire societies through ubiquitous surveillance, an always-on "situational awareness" maintained by cutting edge sensor arrays as well as by devastating aerial attacks by armed drones, warplanes and Special Forces robosoldiers.

- Advertisement -

Meanwhile on the home front, urbanized RMA in the form of ubiquitous CCTV systems deployed on city streets, driftnet electronic surveillance of private communications and radio-frequency identification (RFID) chips embedded in commodities are all aspects of a control system within securitized societies such as ours.

As Antifascist Calling has written on more than one occasion, contemporary U.S. military operations are conceived as a branch of capitalist management theory, one that shares more than a passing resemblance to the organization of corporate entities such as Wal-Mart.

Similar to RMA, commodity flows are mediated by an ubiquitous surveillance of products--and consumers--electronically. Indeed, Pentagon theorists conceive of "postmodern" warfare as just another manageable network enterprise.

The RFID (Counter) Revolution

Radio-frequency identification tags are small computer chips connected to miniature antennae that can be fixed to or implanted within physical objects, including human beings. The chip itself contains an Electronic Product Code that can be read each time a reader emits a radio signal.

The chips are subdivided into two distinct categories, passive or active. A passive tag doesn't contain a battery and its read range is variable, from less than an inch to twenty or thirty feet. An active tag on the other hand, is self-powered and has a much longer range. The data from an active tag can be sent directly to a computer system involved in inventory control--or weapons targeting.

It is hardly surprising then, that the Pentagon and the CIA have spent "hundreds of millions of dollars researching, developing, and purchasing a slew of 'Tagging tracking and locating' (TTL) gear," Wired reports.

- Advertisement -

Long regarded as an urban myth, the military's deployment of juiced-up RFID technology along the AfPak border in the form of "tiny homing beacons to guide their drone strikes in Pakistan," has apparently moved out of the laboratory. "Most of these technologies are highly classified" Wired reveals,

But there's enough information in the open literature to get a sense of what the government is pursuing: laser-based reflectors, super-strength RFID tags, and homing beacons so tiny, they can be woven into fabric or into paper.

Some of the gadgets are already commercially available; if you're carrying around a phone or some other mobile gadget, you can be tracked--either through the GPS chip embedded in the gizmo, or by triangulating the cell signal. Defense contractor EWA Government Systems, Inc. makes a radio frequency-based "Bigfoot Remote Tagging System" that's the size of a couple of AA batteries. But the government has been working to make these terrorist tracking tags even smaller. (David Hambling and Noah Shachtman, "Inside the Military's Secret Terror-Tagging Tech," Wired, June 3, 2009)

Next Page  1  |  2  |  3  |  4

 

- Advertisement -

View Ratings | Rate It

Tom Burghardt is a researcher and activist based in the San Francisco Bay Area. In addition to publishing in Covert Action Quarterly and Global Research,, his articles can be read on Dissident Voice, The Intelligence Daily, Pacific Free Press and (more...)
 

Share on Google Plus Submit to Twitter Add this Page to Facebook! Share on LinkedIn Pin It! Add this Page to Fark! Submit to Reddit Submit to Stumble Upon



Go To Commenting
/* The Petition Site */
The views expressed in this article are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.

Writers Guidelines

Contact AuthorContact Author Contact EditorContact Editor Author PageView Authors' Articles
- Advertisement -

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

"The WikiLeaks Threat" and Other Tales from the Dark Side

FBI Raids Activists' Homes in Sinister COINTELPRO Replay

The Obama Administration's Cover-up of the Flight 253 Affair: "New Smoking Gun" Disclosures

As Defense Budget Soars Security Firms Reap Huge Profits, Go Offshore to Avoid Taxes

White House Plans to Launch Internet ID System, Further Eroding Civil and Political Rights

Network-centric Warfare Dominating Entire Societies Worldwide Through Ubiquitous Surveillance