{"id":16007,"date":"2011-11-28T12:00:59","date_gmt":"2011-11-28T12:00:59","guid":{"rendered":"http:\/\/www.transcend.org\/tms\/?p=16007"},"modified":"2011-11-27T14:59:24","modified_gmt":"2011-11-27T14:59:24","slug":"capitalism-and-the-spy-market","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2011\/11\/capitalism-and-the-spy-market\/","title":{"rendered":"Capitalism and the Spy Market"},"content":{"rendered":"<p>I. The Merchandise<\/p>\n<p>It was certainly appropriate that the Wall Street Journal (WSJ), the mouthpiece of capitalist ideology, should publish an expose on \u201ca new global market for off-the-shelf surveillance technology\u2026\u201d Entitled \u201c<a target=\"_blank\" href=\"http:\/\/projects.wsj.com\/surveillance-catalog\/\" >The Surveillance Catalog<\/a>\u201d and referencing some \u201c200 plus marketing documents\u201d from companies worldwide, the WSJ story lays out an array of tools designed to rob every person on planet of their privacy. Here are just a few examples of the kinds of capacities that are being offered for sale:<\/p>\n<p>1. Hacking: hardware and software that take advantage of \u201cblack-hat hacking\u201d and \u201cmalware\u201d methodologies to acquire other people\u2019s financial and other data. This can now be done to large numbers (\u201chundreds of thousands\u201d) of people simultaneously.<\/p>\n<p>2. Intercept (1): \u201cinfect computers by falsifying web sites or updates of popular software\u201d and then \u201cremote monitor\u2026what the user is doing on the internet.\u201d<\/p>\n<p>3. Intercept (2): \u201cman in the middle\u201d software that allows the monitoring of two sites that are communicating with each other. This software not only monitors communications but also can \u201calter the communications, possibly inserting malicious software into the data transmission or tricking the parties into believing they are communicating over a safe channel.\u201d<\/p>\n<p>4. Web Scraping: the gathering of \u201cmassive amounts of information\u201dalong with the ability to \u201cstore it and sort it so it can be used by analysts. Among the most important targets are \u201csocial networking sites.\u201d<\/p>\n<p>II. The Buyers<\/p>\n<p>The industry magazine, PC World, called the Surveillance Catalog a<a target=\"_blank\" href=\"http:\/\/www.pcworld.com\/article\/244355\/surveillance_catalog_is_creepy_read.html\" > \u201ccreepy read.\u201d\u2026at best disturbing and at worst unnerving.\u201d<\/a> PC also notes that most of the buyers of these tools will be police departments, intelligence agencies and other government departments that now constitute a large part of an \u201cannual retail market for surveillance tools [that] has mushroomed from nearly nonexistent in 2001 to $5 billion today.\u201d<\/p>\n<p>Actually, \u201cunnerving\u201d is something of an understatement. According to the website <a target=\"_blank\" href=\"http:\/\/itmgr.org\/the-surveillance-catalog-where-governments-get-their-tools\/\" >The IT Manager<\/a>, \u201cone vendor executive acknowledged their products could be misused by dictatorships and oppressive regimes. \u2018This is a dilemma. It\u2019s like a knife. You can cut vegetables [with it] but you can also kill your neighbor.\u2019\u201d The executive goes unnamed but the shallow nature of his or her insight does not bode well. Thus,<\/p>\n<p>1. Clearly, \u201cdictatorships and oppressive regimes\u201d have no monopoly on \u201cmisusing\u201d this sort of \u201cproduct.\u201d With the USA Patriot Act and the power trips of the George W. Bush administration, sadly carried forward by his successor, abuse has become the U.S. Justice Department\u2019s middle name. A <a target=\"_blank\" href=\"http:\/\/en.wikipedia.org\/wiki\/Controversial_invocations_of_the_USA_PATRIOT_Act\" >2007 audit <\/a>of the FBI revealed that the agency had abused its power under the Act \u201ca minimum of one thousand times to secretly obtain personal information\u201d of U.S. citizens. There is absolutely no reason to believe the abuse has ceased.<\/p>\n<p>2. A knife is for cutting and that entails a array of different uses. The products peddled in the Surveillance Catalog are not made for multiple uses. They are made for a very narrow range of applications, all of which are inherently intrusive. Indeed, they are made to invade other\u2019s privacy and that is it.<\/p>\n<p>It is important to keep in mind in whose hands these tools are to be placed: officials with power who really don\u2019t feel bound by the law even as they see themselves enforcing it. People like:<\/p>\n<p>a. the Oakland Police who have no problem playing at being Storm Troopers against peaceful demonstrators.<\/p>\n<p>b. the University of California at Davis police who have no problem causally dousing passive protesters with pepper spray.<\/p>\n<p>b. the New York City Police who have no problem spying on innocent Muslim citizens.<\/p>\n<p>c.. the FBI\u2019s Anti-Terrorist Unit whose unique approach to making us \u201csafe\u201d entails designing their own terrorist crimes and then luring individuals into attempting to commit them.<\/p>\n<p>And on it goes. \u201cLaw enforcement\u201d institutions are always at high risk of corruption by virtue of their position and power. Given this fact one might argue that the tools being slickly marketed to them in the Surveillance Catalog are actually made to be abused.<\/p>\n<p>III. The Market Environment<\/p>\n<p>Here are some other observations engendered by the Surveillance Catalog.<\/p>\n<p>Give some thought to the ideological precepts of capitalism. A major precept is that the capitalist should make profit by producing things that other people want to buy. Yet there is nothing in this prescription that precludes specific products. Indeed, in theory, it can be anything that commands a market.<\/p>\n<p>That means capitalists will deal in anything that sells: sex, guns, drugs, slaves, you name it and capitalists will bring it to market. Unless, of course, our capitalists are working within the law and the product is outside of it. In other words, unless the product is illegal. And what are such laws that make some products illegal if not the application of direct and necessary regulation of the marketplace?<\/p>\n<p>Why are some products deemed illegal? One reason is that they are destructive of community bonds and values. Some illicit drugs have that potential, some forms of deviant sex may also have that potential, <em>and so do the offerings of the Surveillance Catalog have that same potential<\/em>. They can, and no doubt will, make minced meat of IV Amendment of the Constitution which is supposed to guarantee all of us the right to be \u201csecure in [our] persons, houses, papers, and effects, against unreasonable searches and seizures\u2026..\u201d<\/p>\n<p>Therefore, it follows that these products should be relegated to the illegal side of the capitalist ledger before they erode what little is left of our community bonds and values \u2013 particularly privacy. But who is to enforce this hypothetical regulation if the police and the Justice System, including the Supreme Court, have already been led to abuse their powers by the trauma of 9\/11? That is very good question and I am not sure of the answer. Perhaps we need some variation on the Roman Tribune of the people. An ombudsman standing apart but also able to protect.<\/p>\n<p>The trend toward an ever greater abuse of power through the act of spying has apparently created its own capitalist market. And the products designed to meet the demand of that market are now there for all to see. But many citizens will not look because they feel that the government is only interested in \u201csubversives\u201d and not them. This is a naive assumption. The Surveillance Catalog is a danger to us all. But then, perhaps as the writer Larry Niven asserts, \u201cprivacy is just a passing fad.\u201d<\/p>\n<p>__________________<\/p>\n<p><em>Lawrence Davidson is professor of history at West Chester University in West Chester PA. His academic work is focused on the history of American foreign relations with the Middle East. He also teaches courses in the history of science and modern European intellectual history.<\/em><\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.tothepointanalyses.com\/\" >Go to Original \u2013 tothepointanalyses.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It was certainly appropriate that the Wall Street Journal (WSJ), the mouthpiece of capitalist ideology, should publish an expose on \u201ca new global market for off-the-shelf surveillance technology\u2026\u201d Entitled \u201cThe Surveillance Catalog\u201d and referencing some \u201c200 plus marketing documents\u201d from companies worldwide, the WSJ story lays out an array of tools designed to rob every person on planet of their privacy.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[48],"tags":[],"class_list":["post-16007","post","type-post","status-publish","format-standard","hentry","category-in-focus"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/16007","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=16007"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/16007\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=16007"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=16007"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=16007"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}