ricardo dominguez on Wed, 4 Feb 1998 22:48:34 +0100 (MET) |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
<nettime> Thing Memo 3 |
Thing Memo: Beyond Infowars. "What are we going to do, nuke them for turning off our TV's? --DOD official "Make your enemy your spy. If you can't do that-- just kill them, quietly." --Ian Flemming Command and control systems (CCS) within the informatic state have been re-shifting their definition of war for sometime. That surveillance would become a priority is no surprise. The NSA (National Sercurity Agency) and the (NRO) National Reconnaissance Office have been working on implementing new functions for themselves since the end of the post-Cold War. They had to re-invent themselves into hyper-surveillance networks that can accomplish defensive intelligence gathering and rapid containment missions for the lowest possible cost. Since then IW (Information War) has become the dominant concern. It is now more important to attack an oppenent's information infrastructure, than it is to destroy its armies. Gulf War type actions are now only useful for limited screenal political gambits. The new functions of dematerialized power fine that it is now more effective to command ,control communication, computers, and intelligence systems (C4I) of an oppenent's civilian information infrastructure. The enemy is now hosted by global public commercial networks. IW systems now maintain a constant analysis of all information flows and a contiunous tracking of all the backbone routes in search of the most effective way to bring down specific zones of resistence within an enemies network infrastructures: 1. Commercial communication systems. 2. Broadcasting networks. 3. Financial data systems. 4. Transportation systems 5. Internet Server networks. Of course one of the problems faced by IW tactics is that both miltitary and intelligence systems are also routed within the public commercial lines. Jamming by cells of highly trained ideologically driven netwarriors could systematically disrupt wide areas of sensitive networks. These micro-squads could slip basic disturbances into the chips bought by the U.S military-entertainment complex from foreign countries. Many of these elements are part of a wide range of defensive and offensive weapon systems--that could induce general disfunction in performance at a pre-set time. The scenarios of possible implosions faced by the decentralization of command and control are increasing at a co-equal rate with the speed of accesss to hardware, software, and trainning. Late-capital demands that this equation grow even faster and to the farthest reaches of the globe. The necessity of the rule of association and strategic coalitions between military and intelligence networks with mega-corperation webs, universities, independent ISP's, electronic political cells, individual research and analysis creates a general state of pananarchy. Thus IWW (Information World War) has already started and it is haunted by its own shadow. Electronic command ,control, communication, computers, and intelligence systems (C4I) must face the task of dealing with what it must become. "The only way to counter networks, is to become networks.": 1. Bottom-up architecture. 2. Multiple distribition points. 3. Memetic networks (MMN): independent networks which coordinate without the unification of a central command. 4. Nonliearity and complexity effects: where simple interactions lead to unpredictable outcomes. 5. Constant states of emergency: all systems are always already not enough and must be constantly upgraded. 6. Soft Power Systems (SPS): these structures are caught in the speed-economies of late-capital demassification makes SPS volaitle, vulnerable and open. This is why reasearch and intelligence (RI) is rapidly moving toward more direct methods of information tactics--specifically "neo-cortical warfare." Why try to define and control unstable electronic systems, why not just go directly to the root of the problem. RI is now investigating and developing methods of direct action against individuals and groups that fail to follow the bottom-line of Late Capital. Human capital as agency (or agent) is much more open to C4I tactics than networks are or have been. The gamble that the War Machine is now takening will have little to do with the electronic community. They have already lost that battle and must now mimic it in order to survive within it--now it is seeking the rapid development of meme based weapons and micro-genetic weapons. If one can stop individuals and groups, a priori, with pre-programmed meme-engines the necessity of any sort of battle will never emerge. Adversary information warriors are now being defined and treated as "memoids--people who are so possessed by a meme that they can justify any deed, while feeling that neither their own nor their oppenent's survival matters as long as the meme goes foward." Strong "neo-cortical" meme tactics are now being developed with the aggressive focus that the Nuclear Bomb was in the Fifties. Better yet kill the root of the problem by stopping the reproduction of specific individual human captial or problematic collections of bodies. A final solution for a new century. Gene Based Wepon Research (MBWR) moves beyond Infowar (IW) to the next level beyond surveillance and meme control as it goal: the development of command, contagion, containment, and control virus systems (C4VS). C4VS will seek out specific genetic registers for erasure. As Sun Tzu states, "if the root is cut, the tree will not grow and bear fruit." Thus command and control issues will move beyond infowar in the next decade and over come the problematics of electronic (C4I) related conflicts. http://www.thing.net --- # distributed via nettime-l : no commercial use without permission # <nettime> is a closed moderated mailinglist for net criticism, # collaborative text filtering and cultural politics of the nets # more info: majordomo@icf.de and "info nettime" in the msg body # URL: http://www.desk.nl/~nettime/ contact: nettime-owner@icf.de