Information Monopoly Defines the Deep State

Monopoly_rutty-FlickrThe last decade witnessed the rise of deep state — an entity not clearly delineated that ultimately controls the military-industrial complex, establishing its own operational policy and practice outside the view of the public in order to maintain its control.

Citizens believe that the state is what they see, the evidence of their government at work. It’s the physical presence of their elected representatives, the functions of the executive office, the infrastructure that supports both the electoral process and the resulting machinery serving the public at the other end of the sausage factory of democracy. We the people put fodder in, we get altered fodder out — it looks like a democracy.

But deep state is not readily visible; it’s not elected, it persists beyond any elected official’s term of office. While a case could be made for other origins, it appears to be born of intelligence and security efforts organized under the Eisenhower administration in response to new global conditions after World War II. Its function may originally have been to sustain the United States of America through any threat or catastrophe, to insure the country’s continued existence.

Yet the deep state and its aims may no longer be in sync with the United States as the people believe their country to be — a democratic society. The democratically elected government does not appear to have control over its security apparatus. This machinery answers instead to the unseen deep state and serves its goals.

As citizens we believe the Department of State and the Department of Defense along with all their subset functions exist to conduct peaceful relations with other nation-states while protecting our own nation-state in the process. Activities like espionage for discrete intelligence gathering are as important as diplomatic negotiations to these ends. The legitimate use of military force is in the monopolistic control of both Departments of State and Defense, defining the existence of a state according to philosopher Max Weber.

The existing security apparatus, though, does not appear to function in this fashion. It refuses to answer questions put to it by our elected representatives when it doesn’t lie to them outright. It manages and manipulates the conditions under which it operates through implicit threats. The legitimacy of the military force it yields is questionable because it cannot be restrained by the country’s democratic processes and may subvert control over military functions.

Further, it appears to answer to some other entity altogether. Why does the security apparatus pursue the collection of all information, in spite of such activities disrupting the ability of both State and Defense Departments to operate effectively? Why does it take both individuals’ and businesses’ communications while breaching their systems, in direct contravention to the Constitution’s Fourth Amendment prohibition against illegal search and seizure?

What we have seen instead is a new facet of deep state manifest as a corollary to Weber’s definition of state.

According to Weber, an entity is “a ‘state’ if and insofar as its administrative staff successfully upholds a claim on the ‘monopoly of the legitimate use of physical force’ in the enforcement of its order.”

Deep state as we currently understand it, however, appears to claim a different monopoly. It is not content with tightly focused actionable intelligence. It seeks collection and control of all information. Whether this effort is legitimate or not does not concern it as it is outside the definition of the state; existing outside any state entity and oversight by the Constitution, the Bill of Rights, any subsequent law, the deep state is extralegal, beyond legitimacy.

It is not merely extralegal but illegitimate, though, when it works in contravention to the stated goals of the state. It becomes a parasite sucking away citizens’ resources without adding value in return to the state.

Based on all the documentation we have seen both before Snowden and after Snowden, deep state has systematically planned, developed, and implemented information collection systems. What looked like one-off wiretaps here and there has become a digital hydra. One head is lopped off as it is revealed in court or by leaks, and a multitude of others emerge to take its place, more virulent than the avatar it augments.

Room 641A in San Francisco seems like a minor annoyance compared to the likelihood that entire transoceanic cables have been spliced and mirrored, the communications in the pipeline duplicated and stored.

The information gathering does not serve the direct interests of the state, in order for the state to wield its legitimate force. The Boston bombing is a perfect example of terrorism that should have been identified and revealed to the state in adequate time to protect the public — yet the state could not and did not respond due to its blindness to information which would have revealed the plot’s existence.

Information gathering serves purposes that do not benefit the public but businesses. The materials gathered by spying on Brazilian government officials did not help the American people but a very narrow range of business interests, specifically the petroleum industry. This calls into question not only the legitimacy of the deep state’s information gathering, but the clients or masters to whom deep state answers. Who or what benefits from this kind of information?

The deep state influences the accrual and control of information in other spheres, through coercive fear, gestated uncertainty, and manipulated doubt. Lawmakers and members of the executive office act in ways that are unpredictable, ridiculous, obscure, and ultimately to the benefit of the deep state’s growing grasp and control of information; their efforts are impacted by misleading testimony, incomplete records, and redacted reports when they are not acting out of fear of being compromised by the security apparatus itself.

Former VP Dick Cheney’s fight to protect the information he allegedly gathered for Energy Task Force represents the point at which the deep state intersected with the Executive Office, using the executive office’s powers to build a firewall behind which it could obtain authority and resources, and legal precedent through which it could act with impunity. As long as deep state functions are carried out as a necessary part of the executive’s deliberation, it feels protected and empowered to carry out its aims.

The executive office further assures deep state’s continued information monopoly by appointing to the judiciary those who tend to side with the state on First- and Fourth Amendment-related cases.

In the pursuit and prosecution of Aaron Swartz for tapping into and sharing publicly-funded research inside the pay-walled garden JSTOR, we see the executive acting to protect inadequately defined intellectual property interests. It is unclear to the public who benefited from the prosecution, but Swartz and the public did not gain access to the intellectual properties they had paid for through tax dollars supporting public universities’ research or public grants that directly funded research. Activists who may have considered liberating the publicly-funded research are surely reluctant to pursue this at risk of being hounded to death as Swartz was.

MPAA’s and RIAA’s combined efforts to limit flow of intellectual property through manipulation of lawmakers and the executive office ensures that the entertainment industry is protected, while offering the deep state an excuse to trawl through information moving between and within states. It is in the interest of deep state’s monopolistic aims for MPAA and RIAA to press for even more control of copyrighted materials.

And now without adequate open discussion among elected representatives, the Trans-Pacific Partnership may expand the reach of the American component of deep state — assuming that the entity is no longer united with a single government — intended to assure the free flow of information across the widest stretch of the earth, from the fastest growing economies. This is not merely the manifestation of the knowledge economy or the information superhighway; the control and trade of information is the source of power.

At some point individuals as well as what remains of the state they have elected need to address the rights of information creators. The open source community maxim, Information Wants To Be Free, should be examined and considered more carefully; as deep state continues its march toward monopolistic control of information without the consent of information creators, what does “free” really mean?

image_print
16 replies
  1. P J Evans says:

    I was just reading about a paraplegic woman who was going to fly from Toronto to New York, for a cruise to the Caribbean, but US BP agents barred her from transiting the US, because she has bouts of depression.
    WTF?

  2. bevin says:

    PJ Evans: You are very perceptive (in other words I agree with you).

    This, perhaps,silly little story, a day after the news of the G20 spying cooperation between Canada and the NSA, may mean nothing. On the other hand it may indicate that virtually all data is shared and ‘promoted.’
    That would point beyond the Deep State to a Deep Empire.

    I hope that this story is properly pursued, the fact that the lady in question is rumoured to be connected with Rob Ford might help give it traction.

  3. bloodypitchfork says:

    My hat is off to you sir. Your succinct summation of the current embodiment of the Surveillance State confirms what Senator Church’s, Eisenhower’s, and Orwell’s warnings and predictions tried to tell us, the Bible notwithstanding. While there may be many sources of blame, one stands out more than all others combined, at least to me. The legal use of the power of Corporate money to influence and control our legislative process seems to be the main conduit whereby the Corporatacracy has usurped our government’s “Mandate of Heaven”.

    http://sipseystreetirregulars.blogspot.com/2011/04/losing-mandate-of-heaven-gunwalker.html

    quote:”Whether this effort is legitimate or not does not concern it as it is outside the definition of the state; existing outside any state entity and oversight by the Constitution, the Bill of Rights, any subsequent law, the deep state is extralegal, beyond legitimacy.”unquote

    You are entirely correct. Indeed, we are now governed by that which has lost it’s Mandate of Heaven. Unfortunately, Sen. Church’s et al warnings fell on deaf ears in Congress, the MSM of the time and ultimately, the people, as trust in our willingness to believe the State only acts in our best interests has now confirmed the flaw in human cognition of the depth and purpose of evil. And it won’t stop. EVER. Whether you believe it or not..we are living proof of the truth of Revelations. However.. the current trajectory of events should tell you something.

  4. bloodypitchfork says:

    Holy mother of Information..I learn something here evradiah…ie..your link here:

    http://en.wikipedia.org/wiki/National_security_agency#World_War_II_and_its_aftermath

    quote:”A secret operation code-named “MINARET” was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as major civil rights leaders including Dr. Martin Luther King, and prominent U.S. journalists and athletes who criticized the Vietnam War.[27] However the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was “disreputable if not outright illegal.”[27]”unquote

    Now I understand emptywheel’s linking “MINARET” to her analysis of current NSA disclosures. whudda thunk.

  5. bloodypitchfork says:

    hmmmm, now that I think about it, if the NSA had “code named” programs like “Minaret” to spy on Congress members, journalists and athletes clear back then, imagine what Snowden’s future revelations may tell us, Russ Tice notwithstanding.

  6. Rayne says:

    @P J Evans and @bevin: Sure would be nice to know exactly how this paraplegic was an immediate threat to the physical safety and security of the folks on the plane, NYC, or the U.S.

    And then it would be nice to know how this person posed a threat to the deep state.

    Sometimes I think they just rattle the chains to remind us they’re there.

    @bloodypitchfork: Thank you, though it’s not sir but madam. There’s more than one double-XX on the team here. ;-)

    Isn’t it interesting how Minaret re-emerged? Hmm. What made the NSA change its opinion about spying on domestic targets? Did opinions of enough judges change over time with regard to the technology used, drifting from “wiretap” (illegal) to communications incidentally overheard (possibly legal)?

    @tinao: Yeah, corporations are now the true vampires: resource- and rights-sucking undead that look like humans to the law.

  7. bloodypitchfork says:

    @Rayne:quote:” @bloodypitchfork: Thank you, though it’s not sir but madam. There’s more than one double-XX on the team here. ;-)”unquote

    Madam Rayne, I profusely apologize. Grunts do not recognize gender when muster is called by their superiors. Double-XX is not a badge I easily recognize during the battle of information distribution. SIR..may I be dismissed now?

    :)

  8. Rayne says:

    @bloodypitchfork: As you were. ;-)

    @bevin: Interesting, thanks much. Folks here ought to be thinking about HIPAA enforcement and this kind of excess; could Americans be similarly prevented from entering other countries because something slipped past HIPAA? Metadata on phonecalls would certainly disclose how often one is contacting doctors or pharmacies, and it’s not clear anybody has yet assessed collection of phonecall and email metadata as a potential HIPAA violations.

  9. TarheelDem says:

    The institutional authorization for the deep state go back to the Truman admnistration. The National Security Act of 1947 and the Central Intelligence Act of 1949. The formalization of state secrets in US v. Reynolds in 1953 gave the government the monopoly on determining what was to be secret.

  10. Dredd says:

    Our nation emerged from feudal Europe. Our Constitution was designed to put an end to feudalism. The DNA of that failed feudal epoch was a shadow of experience that not only followed us, but is now once again dominant. There is more to it than politics and statesmanship. Disease is involved. Disease that is a result of cognitive “germs.”

Comments are closed.