aboutsummaryrefslogtreecommitdiff
path: root/books/sociology/counterrevolution.md
diff options
context:
space:
mode:
Diffstat (limited to 'books/sociology/counterrevolution.md')
-rw-r--r--books/sociology/counterrevolution.md1875
1 files changed, 1875 insertions, 0 deletions
diff --git a/books/sociology/counterrevolution.md b/books/sociology/counterrevolution.md
new file mode 100644
index 0000000..86934fa
--- /dev/null
+++ b/books/sociology/counterrevolution.md
@@ -0,0 +1,1875 @@
+[[!meta title="The Counterrevolution"]]
+
+* [The Counterrevolution](http://bernardharcourt.com/the-counterrevolution/).
+* By Bernard E. Harcourt.
+
+## Index
+
+[[!toc startlevel=2 levels=4]]
+
+## Genealogy
+
+### Mass-scale warfare
+
+* MAD
+* Massive retaliation
+* Game theory
+* Systems analisys
+* Nuclear war
+
+### Counterinsurgency
+
+* Modern warfare
+* Unconventional, counter-guerrila
+* Special Ops
+* Surgical operations
+
+### Mao's “Eight Points of Attention” plus two principles
+
+1. Talk to people politely.
+2. Observe fair dealing in all business transactions.
+3. Return everything borrowed from the people.
+4. Pay for anything damaged.
+5. Do not beat or scold the people.
+6. Do not damage crops.
+7. Do not molest women.
+8. Do not ill-treat prisoners-of-war.
+
+ Two other principles were central to Mao’s revolutionary doctrine: first, the
+ importance of having a unified political and military power structure that
+ consolidated, in the same hands, political and military considerations; and
+ second, the importance of psychological warfare. More specifically, as Paret
+ explained, “proper psychological measures could create and maintain ideological
+ cohesion among fighters and their civilian supporters.” 7
+
+### Paret's (1960) tasks of “counterguerrilla action”
+
+1. The military defeat of the guerrilla forces.
+2. The separation of the guerrilla from the population.
+3. The reestablishment of governmental authority and the development of a viable social order.
+
+### Petraeus: 3 key pillars
+
+1. "The first is that the most important struggle is over the population."
+
+2. "Allegiance of the masses can only be secured
+ by separating the small revolutionary minority from the passive majority, and by
+ isolating, containing, and ultimately eliminating the active minority. In his
+ accompanying guidelines,"
+
+3. "Success turns on collecting information on
+ everyone in the population. Total information is essential to properly distinguish
+ friend from foe and then extract the revolutionary minority. It is intelligence—
+ total information awareness—that renders the counterinsurgency possible."
+
+## Excerpts
+
+### Torture
+
+ In Modern Warfare, Trinquier quietly but resolutely condoned torture. The
+ interrogations and related tasks were considered police work, as opposed to
+ military operations, but they had the exact same mission: the complete
+ destruction of the insurgent group. Discussing the typical interrogation of a
+ detainee, captured and suspected of belonging to a terrorist organization,
+ Trinquier wrote: “No lawyer is present for such an interrogation. If the prisoner
+ gives the information requested, the examination is quickly terminated; if not,
+ specialists must force his secret from him. Then, as a soldier, he must face the
+ suffering, and perhaps the death, he has heretofore managed to avoid.” Trinquier
+ described specialists forcing secrets out of suspects using scientific methods that
+ did not injure the “integrity of individuals,” but it was clear what those
+ “scientific” methods entailed. 4 As the war correspondent Bernard Fall suggests,
+ the political situation in Algeria offered Trinquier the opportunity to develop “a
+ Cartesian rationale” to justify the use of torture in modern warfare. 5
+ Similarly minded commanders championed the use of torture, indefinite
+ detention, and summary executions. They made no bones about it.
+
+ [...]
+
+ In his autobiographical account published in 2001, Services Spéciaux. Algérie
+ 1955–1957, General Paul Aussaresses admits to the brutal methods that were the
+ cornerstone of his military strategy. 6 He makes clear that his approach to
+ counterinsurgency rested on a three-pronged strategy, which included first,
+ intelligence work; second, torture; and third, summary executions. The
+ intelligence function was primordial because the insurgents’ strategy in Algeria
+ was to infiltrate and integrate the population, to blend in perfectly, and then
+ gradually to involve the population in the struggle. To combat this insurgent
+ strategy required intelligence—the only way to sort the dangerous
+ revolutionaries from the passive masses—and then, violent repression. “The first
+ step was to dispatch the clean-up teams, of which I was a part,” Aussaresses
+ writes. “Rebel leaders had to be identified, neutralized, and eliminated discreetly.
+ By seeking information on FLN leaders I would automatically be able to capture
+ the rebels and make them talk.” 7
+ The rebels were made to talk by means of torture. Aussaresses firmly
+ believed that torture was the best way to extract information. It also served to
+ terrorize the radical minority and, in the process, to reduce it. The practice of
+ torture was “widely used in Algeria,” Aussaresses acknowledges. Not on every
+ prisoner, though; many spoke freely. “It was only when a prisoner refused to talk
+ or denied the obvious that torture was used.” 8
+ Aussaresses claims he was introduced to torture in Algeria by the policemen
+ there, who used it regularly. But it quickly became routine to him. “Without any
+ hesitation,” he writes, “the policemen showed me the technique used for
+ ‘extreme’ interrogations: first, a beating, which in most cases was enough; then
+ other means, such as electric shocks, known as the famous ‘gégène’; and finally
+ water.” Aussaresses explains: “Torture by electric shock was made possible by
+ generators used to power field radio transmitters, which were extremely
+ common in Algeria. Electrodes were attached to the prisoner’s ears or testicles,
+ then electric charges of varying intensity were turned on. This was apparently a
+ well-known procedure and I assumed that the policemen at Philippeville [in
+ Algeria] had not invented it.” 9 (Similar methods had, in fact, been used earlier in
+ Indochina.)
+
+ Aussaresses could not have been more clear:
+
+ The methods I used were always the same: beatings, electric shocks, and, in particular, water
+ torture, which was the most dangerous technique for the prisoner. It never lasted for more than one
+ hour and the suspects would speak in the hope of saving their own lives. They would therefore
+ either talk quickly or never.
+
+ The French historian Benjamin Stora confirms the generalized use of torture.
+ He reports that in the Battle of Algiers, under the commanding officer, General
+ Jacques Massu, the paratroopers conducted massive arrests and “practiced
+ torture” using “electrodes […] dunking in bathtubs, beatings.” General Massu
+ himself would later acknowledge the use of torture. In a rebuttal he wrote in
+ 1971 to the film The Battle of Algiers, Massu described torture as “a cruel
+ necessity.” 10 According to Aussaresses, torture was condoned at the highest
+ levels of the French government. “Regarding the use of torture,” Aussaresses
+
+ [...]
+
+ For Aussaresses, as for Roger Trinquier, torture and disappearances were
+ simply an inevitable byproduct of an insurgency—inevitable on both sides of the
+ struggle. Because terrorism was inscribed in revolutionary strategy, it had to be
+ used in its repression as well. In a fascinating televised debate in 1970 with the
+ FLN leader and producer of The Battle of Algiers, Saadi Yacef, Trinquier
+ confidently asserted that torture was simply a necessary and inevitable part of
+ modern warfare. Torture will take place. Insurgents know it. In fact, they
+ anticipate it. The passage is striking:
+
+ I have to tell you. Whether you’re for or against torture, it makes no difference. Torture is a
+ weapon that will be used in every insurgent war. One has to know that… One has to know that in
+ an insurgency, you are going to be tortured.
+ And you have to mount a subversive organization in light of that and in function of torture. It is
+ not a question of being for or against torture. You have to know that all arrested prisoners in an
+ insurgency will speak—unless they commit suicide. Their confession will always be obtained. So a
+ subversive organization must be mounted in function of that, so that a prisoner who speaks does
+ not give away the whole organization.16
+
+ “Torture?” asks the lieutenant aide de camp in Henri Alleg’s 1958 exposé
+ The Question. “You don’t make war with choirboys.” 18 Alleg, a French
+ journalist and director of the Alger républicain newspaper, was himself detained
+ and tortured by French paratroopers in Algiers. His book describes the
+ experience in detail, and in his account, torture was the inevitable product of
+ colonization and the anticolonial struggle. As Jean-Paul Sartre writes in his
+
+ [...]
+
+ In an arresting part of The Battle of Algiers it becomes clear that many of the
+ French officers who tortured suspected FLN members had themselves, as
+ members of the French Resistance, been victims of torture at the hands of the
+ Gestapo. It is a shocking moment. We know, of course, that abuse often begets
+ abuse; but nevertheless, one would have hoped that a victim of torture would
+ recoil from administering it to others. Instead, as Trinquier suggests, torture
+ became normalized in Algeria. This is, as Sartre describes it, the “terrible truth”:
+ “If fifteen years are enough to transform victims into executioners, then this
+ behavior is not more than a matter of opportunity and occasion. Anybody, at any
+ time, may equally find himself victim or executioner.” 20
+
+### Misc
+
+ The central tenet of counterinsurgency theory is that populations—originally
+ colonial populations, but now all populations, including our own—are made up
+ of a small active minority of insurgents, a small group of those opposed to the
+ insurgency, and a large passive majority that can be swayed one way or the other.
+ The principal objective of counterinsurgency is to gain the allegiance of that
+ passive majority. And its defining feature is that counterinsurgency is not just a
+ military strategy, but more importantly a political technique. Warfare, it turns
+ out, is political.
+
+ On the basis of these tenets, counterinsurgency theorists developed and
+ refined over several decades three core strategies. First, obtain total information:
+ every communication, all personal data, all metadata of everyone in the
+ population must be collected and analyzed. Not just the active minority, but
+ everyone in the population. Total information awareness is necessary to
+ distinguish between friend and foe, and then to cull the dangerous minority from
+ the docile majority. Second, eradicate the active minority: once the dangerous
+ minority has been identified, it must be separated from the general population
+
+ [...]
+
+ and eliminated by any means possible—it must be isolated, contained, and
+ ultimately eradicated. Third, gain the allegiance of the general population:
+ everything must be done to win the hearts and minds of the passive majority. It is
+ their allegiance and loyalty, and passivity in the end, that matter most.
+ Counterinsurgency warfare has become our new governing paradigm in the
+
+ [...]
+
+ imagination. It drives our foreign affairs and now our domestic policy as well.
+ But it was not always that way. For most of the twentieth century, we
+ governed ourselves differently in the United States: our political imagination
+ was dominated by the massive battlefields of the Marne, of Verdun, by the
+ Blitzkrieg and the fire-bombing of Dresden—and by the use of the atomic bomb.
+
+ [...]
+
+ warfare.
+ Yet the transition from large-scale battlefield warfare to anticolonial struggles
+ and the Cold War in the 1950s, and to the war against terrorism since 9/11, has
+ brought about a historic transformation in our political imagination and in the
+ way that we govern ourselves. In contrast to the earlier sweeping military
+ paradigm, we now engage in surgical microstrategies of counterinsurgency
+ abroad and at home. This style of warfare—the very opposite of large-scale
+ battlefield wars like World War I or II—involves total surveillance, surgical
+ operations, targeted strikes to eliminate small enclaves, psychological tactics,
+ and political techniques to gain the trust of the people. The primary target is no
+ longer a regular army, so much as it is the entire population. It involves a new
+
+ [...]
+
+ The result is radical. We are now witnessing the triumph of a counterinsurgency
+ model of government on American soil in the absence of an insurgency, or
+ uprising, or revolution. The perfected logic of counterinsurgency now applies
+ regardless of whether there is a domestic insurrection. We now face a
+ counterinsurgency without insurgency. A counterrevolution without revolution.
+ The pure form of counterrevolution, without a revolution, as a simple modality
+ of governing at home—what could be called “The Counterrevolution.”
+ Counterinsurgency practices were already being deployed domestically in the
+
+ [...]
+
+ new internal enemies. It is vital that we come to grips with this new mode of
+ governing and recognize its unique dangers, that we see the increasingly
+ widespread domestication of counterinsurgency strategies and the new
+ technologies of digital surveillance, drones, and hypermilitarized police for what
+ they are: a counterrevolution without a revolution. We are facing something
+ radical, new, and dangerous. It has been long in the making, historically. It is
+ time to identify and expose it.
+
+
+ [...]
+
+ so on. I argued that we have become an “expository society” where we
+ increasingly exhibit ourselves online, and in the process, freely give away our
+ most personal and private data. No longer an Orwellian or a panoptic society
+ characterized by a powerful central government forcibly surveilling its citizens
+ from on high, ours is fueled by our own pleasures, proclivities, joys, and
+ narcissism. And even when we try to resist these temptations, we have
+ practically no choice but to use the Internet and shed our digital traces.
+ I had not fully grasped, though, the relation of our new expository society to
+
+ [...]
+
+ strikes, indefinite detention, or our new hypermilitarized police force at home.
+ But as the fog lifts from 9/11, the full picture becomes clear. The expository
+ society is merely the first prong of The Counterrevolution. And only by tying
+ together our digital exposure with our new mode of counterinsurgency
+ governance can we begin to grasp the whole architecture of our contemporary
+ political condition. And only by grasping the full implications of this new mode
+ of governing—The Counterrevolution—will we be able to effectively resist it
+ and overcome.
+
+ [...]
+
+ approach targeting small revolutionary insurgencies and what were mostly
+ Communist uprisings. Variously called “unconventional,” “antiguerrilla” or
+ “counterguerrilla,” “irregular,” “sublimited,” “counterrevolutionary,” or simply
+ “modern” warfare, this burgeoning domain of military strategy flourished during
+ France’s wars in Indochina and Algeria, Britain’s wars in Malaya and Palestine,
+ and America’s war in Vietnam. It too was nourished by the RAND Corporation,
+ which was one of the first to see the potential of what the French commander
+ Roger Trinquier called “modern warfare” or the “French view of
+ counterinsurgency.” It offered, in the words of one of its leading students, the
+ historian Peter Paret, a vital counterweight “at the opposite end of the spectrum
+ from rockets and the hydrogen bomb.” 2
+ Like nuclear-weapon strategy, the counterinsurgency model grew out of a
+
+
+ [...]
+
+ from rockets and the hydrogen bomb.” 2
+ Like nuclear-weapon strategy, the counterinsurgency model grew out of a
+ combination of strategic game theory and systems theorizing; but unlike nuclear
+ strategy, which was primarily a response to the Soviet Union, it developed more
+ in response to another formidable game theorist, Mao Zedong. The formative
+ moment for counterinsurgency theory was not the nuclear confrontation that
+ characterized the Cuban Missile Crisis, but the earlier Chinese Civil War that led
+ to Mao’s victory in 1949—essentially, when Mao turned guerrilla tactics into a
+ revolutionary war that overthrew a political regime. The central methods and
+ practices of counterinsurgency warfare were honed in response to Mao’s
+ strategies and the ensuing anticolonial struggles in Southeast Asia, the Middle
+ East, and North Africa that imitated Mao’s approach. 3 Those struggles for
+ independence were the breeding soil for the development and perfection of
+ unconventional warfare.
+ By the turn of the twentieth century, when President George W. Bush would
+
+ [...]
+
+ T HE COUNTERINSURGENCY MODEL CAN BE TRACED BACK through several different
+ genealogies. One leads to British colonial rule in India and Southeast Asia, to the
+ insurgencies there, and to the eventual British redeployment and modernization
+ of counterinsurgency strategies in Northern Ireland and Britain at the height of
+ the Irish Republican Army’s independence struggles. This first genealogy draws
+ heavily on the writings of the British counterinsurgency theorist Sir Robert
+ Thompson, the chief architect of Great Britain’s antiguerrilla strategies in
+ Malaya from 1948 to 1959. Another genealogy traces back to the American
+ colonial experience in the Philippines at the beginning of the twentieth century.
+ Others lead back to Trotsky and Lenin in Russia, to Lawrence of Arabia during
+ the Arab Revolt, or even to the Spanish uprising against Napoleon—all
+ mentioned, at least briefly, in General Petraeus’s counterinsurgency field
+ manual. Alternative genealogies reach back to the political theories of
+ Montesquieu or John Stuart Mill, while some go even further to antiquity and to
+ the works of Polybius, Herodotus, and Tacitus. 1
+ But the most direct antecedent of counterinsurgency warfare as embraced by
+ the United States after 9/11 was the French military response in the late 1950s
+ and 1960s to the anticolonial wars in Indochina and Algeria. This genealogy
+ passes through three important figures—the historian Peter Paret and the French
+ commanders David Galula and Roger Trinquier—and, through them, it traces
+ back to Mao Zedong. It is Mao’s idea of the political nature of
+ counterinsurgency that would prove so influential in the United States. Mao
+ politicized warfare in a manner that would come back to haunt us today. The
+ French connection also laid the seeds of a tension between brutality and legality
+ that would plague counterinsurgency practices to the present—at least, until the
+ United States discovered, or rediscovered, a way to resolve the tension by
+ legalizing the brutality.
+
+
+ [...]
+
+ A founding principle of revolutionary insurgency—what Paret referred to as
+ “the principal lesson” that Mao taught—was that “an inferior force could
+ outpoint a modern army so long as it succeeded in gaining at least the tacit
+ support of the population in the contested area.” 4 The core idea was that the
+ military battle was less decisive than the political struggle over the loyalty and
+ allegiance of the masses: the war is fought over the population or, in Mao’s
+ words, “The army cannot exist without the people.” 5
+ As a result of this interdependence, the insurgents had to treat the general
+ population well to gain its support. On this basis Mao formulated early on, in
+ 1928, his “Eight Points of Attention” for army personnel:
+
+ 1. Talk to people politely.
+ 2. Observe fair dealing in all business transactions.
+ 3. Return everything borrowed from the people.
+ 4. Pay for anything damaged.
+ 5. Do not beat or scold the people.
+ 6. Do not damage crops.
+ 7. Do not molest women.
+ 8. Do not ill-treat prisoners-of-war. 6
+
+ Two other principles were central to Mao’s revolutionary doctrine: first, the
+ importance of having a unified political and military power structure that
+ consolidated, in the same hands, political and military considerations; and
+ second, the importance of psychological warfare. More specifically, as Paret
+ explained, “proper psychological measures could create and maintain ideological
+ cohesion among fighters and their civilian supporters.” 7
+ Revolutionary warfare, in Paret’s view, boiled down to a simple equation:
+
+ [...]
+
+ the population.” 10
+ Of course, neither Paret nor other strategists were so naïve as to think that
+ Mao invented guerrilla warfare. Paret spent much of his research tracing the
+ antecedents and earlier experiments with insurgent and counterinsurgency
+ warfare. “Civilians taking up arms and fighting as irregulars are as old as war,”
+ Paret emphasized. Caesar had to deal with them in Gaul and Germania, the
+ British in the American colonies or in South Africa with the Boers, Napoleon in
+ Spain, and on and on. In fact, as Paret stressed, the very term “guerrilla”
+ originated in the Spanish peasant resistance to Napoleon after the Spanish
+ monarchy had fallen between 1808 and 1813. Paret developed case studies of the
+
+ [...]
+
+ But for purposes of describing the “guerre révolutionnaire” of the 1960s, the
+ most pertinent and timely objects of study were Mao Zedong and the Chinese
+ revolution. And on the basis of that particular conception of revolutionary war,
+ Paret set forth a model of counterrevolutionary warfare. Drawing principally on
+ French military practitioners and theorists, Paret delineated a three-pronged
+ strategy focused on a mixture of intelligence gathering, psychological warfare on
+ both the population and the subversives, and severe treatment of the rebels. In
+ Guerrillas in the 1960’s, Paret reduced the tasks of “counterguerrilla action” to
+ the following:
+ 1. The military defeat of the guerrilla forces.
+ 2. The separation of the guerrilla from the population.
+ 3. The reestablishment of governmental authority and the development of a
+ viable social order. 12
+
+ [...]
+
+ interact.” 13
+ So the central task, according to Paret, was to attack the rebel’s popular
+ support so that he would “lose his hold over the people, and be isolated from
+ them.” There were different ways to accomplish this, from widely publicized
+ military defeats and sophisticated psychological warfare to the resettlement of
+ populations—in addition to other more coercive measures. But one rose above
+ the others for Paret: to encourage the people to form progovernment militias and
+ fight against the guerrillas. This approach had the most potential, Paret observes:
+ “Once a substantial number of members of a community commit violence on
+
+
+ [...]
+
+ In sum, the French model of
+ counterrevolutionary warfare, in Paret’s view, had to be understood as the
+ inverse of revolutionary warfare.
+
+
+ [...]
+
+ The main sources for Paret’s synthesis were the writings and practices of French
+ commanders on the ground, especially Roger Trinquier and David Galula,
+ though there were others as well. 15 Trinquier, one of the first French
+ commanders to theorize modern warfare based on his firsthand experience, had a
+
+
+ [...]
+
+ persisting in repeating its efforts.” Trinquier argues that this new form of modern
+ warfare called for “an interlocking system of actions—political, economic,
+ psychological, military,” grounded on “Countrywide Intelligence.” As Trinquier
+ emphasizes, “since modern warfare asserts its presence on the totality of the
+ population, we have to be everywhere informed.” Informed, in order to know and
+ target the population and wipe out the insurgency. 17
+ The other leading counterinsurgency theorist, also with deep firsthand
+
+
+ [...]
+
+ time.’” 19
+ From Mao, Galula drew the central lesson that societies were divided into
+ three groups and that the key to victory was to isolate and eradicate the active
+ minority in order to gain the allegiance of the masses. Galula emphasizes in
+ Counterinsurgency Warfare that the central strategy of counterinsurgency theory
+ “simply expresses the basic tenet of the exercise of political power”:
+ In any situation, whatever the cause, there will be an active minority for the cause, a neutral
+ majority, and an active minority against the cause.
+
+ [...]
+
+ time.’” 19
+ From Mao, Galula drew the central lesson that societies were divided into
+ three groups and that the key to victory was to isolate and eradicate the active
+ minority in order to gain the allegiance of the masses. Galula emphasizes in
+ Counterinsurgency Warfare that the central strategy of counterinsurgency theory
+ “simply expresses the basic tenet of the exercise of political power”:
+ In any situation, whatever the cause, there will be an active minority for the cause, a neutral
+ majority, and an active minority against the cause.
+
+ The technique of power consists in relying on the favorable minority in order to rally the neutral
+ majority and to neutralize or eliminate the hostile minority.20
+ The battle was over the general population, Galula emphasized in his
+ Counterinsurgency Warfare, and this tenet represented the key political
+ dimension of a new warfare strategy.
+
+ [...]
+
+ US general David Petraeus picked up right where David Galula and Peter Paret
+ left off. Widely recognized as the leading American thinker and practitioner of
+ counterinsurgency theory—eventually responsible for all coalition troops in Iraq
+ and the architect of the troop surge of 2007—General Petraeus would refine
+
+ [...]
+
+ On this political foundation, General Petraeus’s manual establishes three key
+ pillars—what might be called counterinsurgency’s core principles.
+ The first is that the most important struggle is over the population. In a short
+ set of guidelines that accompanies his field manual, General Petraeus
+ emphasizes: “The decisive terrain is the human terrain. The people are the center
+
+ [...]
+
+ The main battle, then, is over the populace.
+ The second principle is that the allegiance of the masses can only be secured
+ by separating the small revolutionary minority from the passive majority, and by
+ isolating, containing, and ultimately eliminating the active minority. In his
+ accompanying guidelines, General Petraeus emphasizes: “Seek out and eliminate
+ those who threaten the population. Don’t let them intimidate the innocent. Target
+ the whole network, not just individuals.” 25
+ The third core principle is that success turns on collecting information on
+ everyone in the population. Total information is essential to properly distinguish
+ friend from foe and then extract the revolutionary minority. It is intelligence—
+ total information awareness—that renders the counterinsurgency possible. It is
+
+ [...]
+
+ paraphrasing the French commander, underscores the primacy of political factors
+ in counterinsurgency. “General Chang Ting-chen of Mao Zedong’s central
+ committee once stated that revolutionary war was 80 percent political action and
+ only 20 percent military,” the manual reads. Then it warns: “At the beginning of
+ a COIN operation, military actions may appear predominant as security forces
+ conduct operations to secure the populace and kill or capture insurgents;
+ however, political objectives must guide the military’s approach.” 27
+ Chapter Two opens with an epigraph from David Galula’s book: “Essential
+
+ [...]
+
+ General David Petraeus learned, but more importantly popularized, Mao
+ Zedong’s central lesson: counterinsurgency warfare is political. It is a strategy
+ for winning over the people. It is a strategy for governing. And it is quite telling
+ that a work so indebted to Mao and midcentury French colonial thinkers would
+ become so influential post-9/11. Petraeus’s manual contained a roadmap for a
+ new paradigm of governing. As the fog lifts from 9/11, it is becoming
+ increasingly clear what lasting impact Mao had on our government of self and
+ others today.
+
+ [...]
+
+ D eveloped by military commanders and strategists over decades of anticolonial
+ wars, counterinsurgency warfare was refined, deployed, and tested in the years
+ following 9/11. Since then, the modern warfare paradigm has been distilled into
+ a concise three-pronged strategy:
+ 1. Bulk-collect all intelligence about everyone in the population—every
+ piece of data and metadata available. (total information awareness)
+
+ [...]
+
+ 2. Identify and eradicate the revolutionary minority. Total information about
+ everyone makes it possible to discriminate between friend and foe. Once
+ suspicion attaches, individuals must be treated severely to extract all
+ possible information, with enhanced interrogation techniques if
+ necessary; and if they are revealed to belong to the active minority, they
+ must be disposed of through detention, rendition, deportation, or drone
+ strike—in other words, targeted assassination. Unlike conventional
+ soldiers from the past, these insurgents are dangerous because of their
+
+ [...]
+
+ 3. Pacify the masses. The population must be distracted, entertained,
+ satisfied, occupied, and most importantly, neutralized, or deradicalized if
+ necessary, in order to ensure that the vast preponderance of ordinary
+ individuals remain just that—ordinary. This third prong reflects the
+ “population-centric” dimension of counterinsurgency theory. Remember,
+ in this new way of seeing, the population is the battlefield. Its hearts and
+ minds must be assured. In the digital age, this can be achieved, first, by
+ targeting enhanced content (such as sermons by moderate imams) to
+ deradicalize susceptible persons—in other words, by deploying new
+ digital techniques of psychological warfare and propaganda. Second, by
+ providing just the bare minimum in terms of welfare and humanitarian
+ assistance—like rebuilding schools, distributing some cash, and
+ bolstering certain government institutions. As General Petraeus’s field
+
+### Torture and surveilance
+
+ T HE ATTACK ON THE W ORLD T RADE C ENTER SHOWED THE weakness of American
+ intelligence gathering. Top secret information obtained by one agency was
+ silo’ed from others, making it impossible to aggregate intelligence and obtain a
+ full picture of the security threats. The CIA knew that two of the 9/11 hijackers
+ were on American soil in San Diego, but didn’t share the information with the
+ FBI, who were actively trying to track them down. 1 September 11 was a
+ crippling intelligence failure, and in the immediacy of that failure many in
+ President George W. Bush’s administration felt the need to do something radical.
+ Greater sharing of intelligence, naturally. But much more as well. Two main
+ solutions were devised, or revived: total surveillance and tortured interrogations.
+ They represent the first prong of the counterinsurgency approach.
+ In effect, 9/11 set the stage both for total NSA surveillance and torture as
+ forms of total information awareness. The former functioned at the most virtual
+ or ethereal, or “digital” level, by creating the material for data-mining and
+ analysis. The latter operated at the most bodily or physical, or “analog” level,
+ obtaining information directly from suspects and detainees in Iraq, Pakistan,
+ Afghanistan, and elsewhere. But both satisfied the same goal: total information
+ awareness, the first tactic of counterinsurgency warfare.
+
+Census
+
+ What is clear, though—as I document in Exposed—is that the myriad NSA,
+ FBI, CIA, and allied intelligence agencies produce total information, the first
+ and most important prong of the counterinsurgency paradigm. Most important,
+ because both of the other prongs depend on it. As the RAND Corporation notes
+ in its lengthy 519-page report on the current state of counterinsurgency theory
+ and practice, “Effective governance depends on knowing the population,
+ demographically and individually.” The RAND report reminds us that this
+ insight is not novel or new. The report then returns, pointedly for us, to Algeria
+ and the French commander, David Galula: “Galula, in Counterinsurgency
+ Warfare, argued that ‘control of the population begins with a thorough census.
+ Every inhabitant must be registered and given a foolproof identity card.’” 5
+
+ [...]
+
+ Today, that identity card is an IP address, a mobile phone, a digital device, facial
+ recognition, and all our digital stamps. These new digital technologies have
+ made everyone virtually transparent. And with our new ethos of selfies, tweets,
+ Facebook, and Internet surfing, everyone is now exposed.
+
+Enhanced interrogation:
+
+ Second, tortured interrogation. The dual personality of counterinsurgency
+ warfare is nowhere more evident than in the intensive use of torture for
+ information gathering by the United States immediately after 9/11. Fulfilling the
+ first task of counterinsurgency theory—total surveillance—this practice married
+ the most extreme form of brutality associated with modern warfare to the
+ formality of legal process and the rule of law. The combination of inhumanity
+ and legality was spectacular.
+ In the days following 9/11, many in the Bush administration felt there was
+ only one immediate way to address the information shortfall, namely, to engage
+ in “enhanced interrogation” of captured suspected terrorists—another
+ euphemism for torture. Of course, torture of captured suspects would not fix the
+ problem of silo’ed information, but they thought it would at least provide
+ immediate information of any pending attacks. One could say that the United
+ States turned to torture because many in the administration believed the country
+ did not have adequate intelligence capabilities, lacking the spy network or even
+ the language abilities to infiltrate and conduct regular espionage on
+ organizations like Al Qaeda. 6
+ The tortured interrogations combined the extremes of brutality with the
+
+Getting information or "truth" was not the only, perhaps not the main point
+of torture sessions, and maybe not as well the main point for mass surveillance:
+
+ Even the more ordinary instances of “enhanced interrogation” were
+ harrowing—and so often administered, according to the Senate report, after the
+ interrogators believed there was no more information to be had, sometimes even
+ before the detainee had the opportunity to speak.
+
+Torture template:
+
+ Ramzi bin al-Shibh was subjected to this type of treatment immediately upon
+ arrival in detention, even before being interrogated or given an opportunity to
+ cooperate—in what would become a “template” for other detainees. Bin al-
+ Shibh was subjected first to “sensory dislocation” including “shaving bin al-
+ Shibh’s head and face, exposing him to loud noise in a white room with white
+ lights, keeping him ‘unclothed and subjected to uncomfortably cool
+ temperatures,’ and shackling him ‘hand and foot with arms outstretched over his
+ head (with his feet firmly on the floor and not allowed to support his weight with
+ his arms).’” Following that, the interrogation would include “attention grasp,
+ walling, the facial hold, the facial slap… the abdominal slap, cramped
+ confinement, wall standing, stress positions, sleep deprivation beyond 72 hours,
+ and the waterboard, as appropriate to [bin al-Shibh’s] level of resistance.” 8 This
+ template would be used on others—and served as a warning to all.
+ The more extreme forms of torture were also accompanied by the promise of
+
+"Bigeard shrimp":
+
+ The more extreme forms of torture were also accompanied by the promise of
+ life-long solitary confinement or, in the case of death, cremation.
+ Counterinsurgency torture in the past had often been linked to summary
+ disappearances and executions. Under the Bush administration, it was tied to
+ what one might call virtual disappearances.
+ During the Algerian war, as noted already, the widespread use of brutal
+ interrogation techniques meant that those who had been victimized—both the
+ guilty and innocent—became dangerous in the eyes of the French military
+ leadership. FLN members needed to be silenced, forever; but so did others who
+ might be radicalized by the waterboarding or gégène. In Algeria, a simple
+ solution was devised: the tortured would be thrown out from helicopters into the
+ Mediterranean. They became les crevettes de Bigeard, after the notorious French
+ general in Algeria, Marcel Bigeard: “Bigeard’s shrimp,” dumped into the sea,
+ their feet in poured concrete—a technique the French military had apparently
+ experimented with earlier in Indochina.
+
+ [...]
+
+ The CIA would devise a different solution in 2002: either torture the suspect
+ accidentally to death and then cremate his body to avoid detection, or torture the
+ suspect to the extreme and then ensure that he would never again talk to another
+ human being. Abu Zubaydah received the latter treatment. Zubaydah had first
+ been seized and interrogated at length by the FBI, had provided useful
+ information, and was placed in isolation for forty-seven days, the FBI believing
+ that he had no more valuable information. Then the CIA took over, believing he
+ might still be a source. 10 The CIA turned to its more extreme forms of torture—
+ utilizing all ten of its most brutal techniques—but, as a CIA cable from the
+ interrogation team, dated July 15, 2002, records, they realized beforehand that it
+ would either have to cover up the torture if death ensued or ensure that
+ Zubaydah would never talk to another human being again in his lifetime.
+ According to the Senate report, “the cable stated that if Abu Zubaydah were to
+ die during the interrogation, he would be cremated. The interrogation team
+ closed the cable by stating: ‘regardless which [disposition] option we follow
+ however, and especially in light of the planned psychological pressure
+ techniques to be implemented, we need to get reasonable assurances that [Abu
+ Zubaydah] will remain in isolation and incommunicado for the remainder of his
+ life.’” 11 In response to this request for assurance, a cable from the CIA station
+ gave the interrogation team those assurances, noting that “it was correct in its
+ ‘understanding that the interrogation process takes precedence over preventative
+ medical procedures,’” and then adding in the cable:
+
+KUBARK
+
+ routines were approved at the uppermost level of the US government, by the
+ president of the United States and his closest advisers. These practices were put
+ in place, designed carefully and legally—very legalistically, in fact—to be used
+ on suspected enemies. They were not an aberration. There are, to be sure, long
+ histories written of rogue intelligence services using unauthorized techniques;
+ there is a lengthy record, as well, of CIA ingenuity and creativity in this domain,
+ including, among other examples, the 1963 KUBARK Counterintelligence
+ Interrogation manual. 13 But after 9/11, the blueprint was drawn at the White
+ House and the Pentagon, and it became official US policy—deliberate, debated,
+ well-thought-out, and adopted as legal measures.
+
+
+ [...]
+
+ The Janus face of torture was its formal legality amidst its shocking brutality.
+ Many of the country’s best lawyers and legal scholars, professors at top-ranked
+ law schools, top government attorneys, and later federal judges would pore over
+ statutes and case law to find legal maneuvers to permit torture. The felt need to
+ legitimate and legalize the brutality—and of course, to protect the officials and
+ operatives from later litigation—was remarkable.
+ The documents known collectively as the “torture memos” fell into two
+ categories: first, those legal memos regarding whether the Guantánamo detainees
+ were entitled to POW status under the Geneva Conventions (GPW), written
+ between September 25, 2001, and August 1, 2002; and second, starting in
+ August 2002, the legal memos regarding whether the “enhanced interrogation
+ techniques” envisaged by the CIA amounted to torture prohibited under
+ international law.
+
+How torture was defined to allow torture to happen:
+
+ As Jay Bybee, then at the Office of Legal Counsel and now a
+ federal judge, wrote in his August 1, 2002, memo:
+
+ We conclude that torture as defined in and proscribed by [18 US Code] Sections 2340-2340A,
+ covers only extreme acts. Severe pain is generally of the kind difficult for the victim to endure.
+ Where the pain is physical, it must be of an intensity akin to that which accompanies serious
+ physical injury such as death or organ failure. Severe mental pain requires suffering not just at the
+ moment of infliction but also requires lasting psychological harm, such as seen in mental disorders
+ like post-traumatic stress disorder. […] Because the acts inflicting torture are extreme, there is
+ significant range of acts that though they might constitute cruel, inhuman, or degrading treatment
+ or punishment fail to rise to the level of torture.22
+
+ This definition of torture was so demanding that it excluded the brutal
+ practices that the United States was using. It set the federal legal standard,
+ essentially, at death or organ failure.
+
+ [...]
+
+ them 26 —and then, effectively, judicial opinions. The executive branch became a
+ minijudiciary, with no effective oversight or judicial review. And in the end, it
+ worked. The men who wrote these memos have never been prosecuted nor
+ seriously taken to task, as a legal matter, for their actions. The American people
+ allowed a quasi-judiciary to function autonomously, during and after. These self-
+ appointed judges wrote the legal briefs, rendered judgment, and wrote the
+ judicial opinions that legitimized these brutal counterinsurgency practices. In the
+ process, they rendered the counterinsurgency fully legal. They inscribed torture
+ within the fabric of law.
+
+ One could go further. The torture memos accomplished a new resolution of
+ the tension between brutality and legality, one that we had not witnessed
+ previously in history. It was an audacious quasi-judicial legality that had rarely
+ been seen before. And by legalizing torture in that way, the Bush administration
+ provided a legal infrastructure for counterinsurgency-as-governance more
+ broadly.
+
+ [...]
+
+ And through this process of legalization, these broader torturous practices
+ spilled over into the second prong of counterinsurgency: the eradication of an
+ active minority. Torture began to function as a way to isolate, punish, and
+ eliminate those suspected of being insurgents.
+
+Bare existence, indefinite detention, incommunication:
+
+ The indefinite detention and brutal ordinary measures served as a way to
+ eliminate these men—captured in the field or traded for reward monies, almost
+ like slaves from yonder. The incommunicado confinement itself satisfied the
+ second prong of counterinsurgency theory. 5 But somehow it also reached further
+ than mere detention, approximating a form of disappearance or virtual death.
+ The conditions these men found themselves in were so extreme, it is almost as if
+ they were as good as dead.
+ Reading Slahi’s numbing descriptions, one cannot help but agree with the
+ philosopher Giorgio Agamben that these men at Guantánamo were, in his words,
+ no more than “bare life.” 6 Agamben’s concept of bare existence captures well
+ the dimensions of dehumanization and degradation that characterized their lives:
+ the camp inmates were reduced to nothing more than bare animal existence.
+ They were no longer human, but things that lived. The indefinite detention and
+ torture at Guantánamo achieved an utter denial of their humanity.
+ Every aspect of their treatment at black sites and detention facilities
+
+### Drone strikes
+
+ This debate between more population-centric proponents and more enemy-
+ centric advocates of counterinsurgency should sound familiar. It replays the
+ controversy over the use of torture or other contested methods within the
+ counterinsurgency paradigm. It replicates the strategic debates between the
+ ruthless and the more decent. It rehearses the tensions between Roger Trinquier
+ and David Galula.
+
+ Yet just as torture is central to certain versions of modern warfare, the drone
+ strike too is just as important to certain variations of the counterinsurgency
+ approach. Drone strikes, in effect, can serve practically all the functions of the
+ second prong of counterinsurgency warfare. Drone strikes eliminate the
+ identified active minority. They instill terror among everyone living near the
+ active minority, dissuading them and anyone else who might contemplate joining
+ the revolutionaries. They project power and infinite capability. They show who
+ has technological superiority. As one Air Force officer says, “The real advantage
+ of unmanned aerial systems is that they allow you to project power without
+ projecting vulnerability.” 18 By terrifying and projecting power, drones dissuade
+ the population from joining the insurgents.
+
+ [...]
+
+ Covered extensively by the news media,
+ drone attacks are popularly believed to have caused even more civilian casualties
+ than is actually the case. The persistence of these attacks on Pakistani territory
+ offends people’s deepest sensibilities, alienates them from their government, and
+ contributes to Pakistan’s instability.” 19
+ In July 2016, the Obama administration released a report estimating the
+
+
+ [...]
+
+ Those in the affected countries typically receive far higher casualty reports.
+ The Pakistan press, for instance, reported that there are about 50 civilians killed
+ for every militant assassinated, resulting in a hit rate of about 2 percent. As
+ Kilcullen and Exum argue, regardless of the exact number, “every one of these
+ dead noncombatants represents an alienated family, a new desire for revenge,
+ and more recruits for a militant movement that has grown exponentially even as
+ drone strikes have increased.” 25
+ To those living in Afghanistan, Iraq, Pakistan, Somalia, Yemen, and
+ neighboring countries, the Predator drones are terrifying. But again—and this is
+ precisely the central tension at the heart of counterinsurgency theory—the terror
+ may be a productive tool for modern warfare. It may dissuade people from
+ joining the active minority. It may convince some insurgents to abandon their
+ efforts. Terror, as we have seen, is by no means antithetical to the
+ counterinsurgency paradigm. Some would argue it is a necessary means.
+ Drones are by no means a flawless weapons system even for their proponents.
+
+ [...]
+
+ Regarding the first question, a drone should be understood as a blended
+ weapons system, one that ultimately functions at several levels. It shares
+ characteristics of the German V-2 missile, to be sure, but also the French
+ guillotine and American lethal injection. It combines safety for the attacker, with
+ relatively precise but rapid death, and a certain anesthetizing effect—as well as,
+ of course, utter terror. For the country administering the drone attack, it is
+ perfectly secure. There is no risk of domestic casualties. In its rapid and
+ apparently surgical death, it can be portrayed, like the guillotine, as almost
+ humane. And drones have had a numbing effect on popular opinion precisely
+ because of their purported precision and hygiene—like lethal injection has done,
+ for the most part, in the death-penalty context. Plus, drones are practically
+ invisible and out of sight—again, for the country using them—though, again,
+ terrifying for the targeted communities.
+
+ [...]
+
+ Chamayou’s second question is, perhaps, the most important. This new
+ weapons system has changed the US government’s relationship to its own
+ citizens. There is no better evidence of this than the deliberate, targeted drone
+ killing of US and allied nation citizens abroad—as we will see. 32
+
+ [...]
+
+ An analogy from the death penalty may be helpful. There too, the means
+ employed affect the ethical dimensions of the practice itself. The gas chamber
+ and the electric chair—both used in the United States even after the Holocaust—
+ became fraught with meaning. Their symbolism soured public opinion on the
+ death penalty. By contrast, the clinical or medical nature of lethal injection at
+ first reduced the political controversy surrounding executions. Only over time,
+ with botched lethal injections and questions surrounding the drug cocktails and
+ their true effects, have there been more questions raised. But it has taken time for
+ the negative publicity to catch up with lethal injection. Drones, at this point,
+ remain far less fraught than conventional targeted assassinations.
+
+### Winning hearts and minds
+
+ THE THIRD PRONG OF COUNTERINSURGENCY THEORY CONSISTS in winning the
+ hearts and minds of the general population to stem the flow of new recruits to
+ the active minority and to seize the upper hand in the struggle. This goal can be
+ achieved by actively winning the allegiance of the population, or by pacifying an
+ already passive population, or even simply by distracting the masses. The bar,
+ ultimately, is low since, on the counterinsurgency view, the people are mostly
+ passive. As Roger Trinquier noted in 1961, “Experience has demonstrated that it
+ is by no means necessary to enjoy the sympathy of the majority of the people to
+ obtain their backing; most are amorphous, indifferent.” Or, as General Petraeus’s
+ manual states, the vast majority is “neutral” and “passive”; it represents an
+ “uncommitted middle” with “passive supporters of both sides.” 1 The third prong,
+ then, is aimed mostly at assuaging, pacifying perhaps, or merely distracting the
+ indifferent masses.
+
+ [...] the third prong has translated, principally, into three tactics: investments in
+ infrastructure, new forms of digital propaganda, and generalized terror. [...]
+ Undergirding them both, though, is the third tactic, the threat of
+ generalized terror, that serves as a foundational method and looming constant.
+
+ [...]
+
+ In How Everything Became War and the Military Became Everything, Rosa
+ Brooks writes that since 9/11 we have witnessed the expansion of the military
+ and its encroachment on civilian affairs. “We’ve seen,” in her words, “the steady
+ militarization of US foreign policy as our military has been assigned many of the
+ tasks once given to civilian institutions.” Brooks warns us of a new world where
+ “the boundaries between war and nonwar, military and nonmilitary have
+ eroded.”
+
+ [...]
+
+ We are indeed facing, as Brooks powerfully demonstrates, a new world of an
+ ever-encroaching military. But what this reveals, more than anything, is the rise
+ of the counterinsurgency paradigm of government. It is the model of
+ counterinsurgency warfare—of Galula’s early turn to building schools and health
+ facilities, to focusing on the hearts and minds of the general population—that
+ has pushed the military into these traditionally civilian domains, including total
+ surveillance, rule-of-law projects, artificial intelligence, entertainment, etc. In
+ effect, it is the counterinsurgency paradigm of government that has become
+ everything, and everything that has become counterinsurgency. The blurring of
+ boundaries between war and peaceful governance is not merely the contingent
+ result of 9/11, it is instead the culmination of a long and deliberate process of
+ modernizing warfare.
+
+Providing the basic needs:
+
+ Providing basic necessities, labeled “essential services” in the field manual, is
+ a key counterinsurgency practice. It consists primarily of ensuring that there is
+ “food, water, clothing, shelter, and medical treatment” for the general
+ population. General Petraeus’s manual explains the rationale in very simple
+ terms: “People pursue essential needs until they are met, at any cost and from
+ any source. People support the source that meets their needs. If it is an insurgent
+ source, the population is likely to support the insurgency. If the [host nation]
+ government provides reliable essential services, the population is more likely to
+ support it. Commanders therefore identify who provides essential services to
+ each group within the population.” 5
+
+That, in most cases, involve funneling american taxpayer's money to enrich corporations
+with "insane profit margins" for rebuilding countries along with US guidelines. See
+Naomi Klein's Shock Doctrine for more details.
+
+ A second approach to securing the neutrality of the majority is more
+ psychological. In the early days of modern warfare, examples of this approach
+ included measures such as the resettlement of populations, in the words of
+ counterinsurgency experts, “to control them better and to block the insurgents’
+ support.” This is what the British did in Malaya, and the French in Algeria.
+ Other examples included basic propaganda campaigns. 16
+
+ As time has gone by, new digital technologies have enabled new forms of
+ psychological counterinsurgency warfare. One of the newest involves digital
+ propaganda, reflected most recently in the Center for Global Engagement set up
+ under the Obama administration in early 2016. Created with the objective to
+ prevent the radicalization of vulnerable youth, the center adopted strategies
+ pioneered by the giants of Silicon Valley—Google, Amazon, Netflix—and was
+ originally funded at the level of about $20 million. It targeted susceptible
+ persons suspected of easier radicalization and sent them enhanced and improved
+ third-party content in order to try to dissuade them, subliminally, from
+ radicalizing or joining ISIS. In the words of an investigative journalist, “The
+ Obama administration is launching a stealth anti-Islamic State messaging
+ campaign, delivered by proxies and targeted to individual would-be extremists,
+ the same way Amazon or Google sends you shopping suggestions based on your
+ online browsing history.” 17
+
+Terror e tortura:
+
+ The third set of measures was even more basic: terror. The most formidable way
+ to win hearts and minds is to terrorize the local population to make sure they do
+ not sympathize with or aid the active minority.
+
+ [...]
+
+ The brutality of counterinsurgency serves, of course, to gather information
+ and eradicate the revolutionary minority. But it also aims higher and reaches
+ further: its ambition, as General Aussaresses recognized well, is to terrorize the
+ insurgents, to scare them to death, and to frighten the local population in order to
+ prevent them from joining the insurgent faction. Today, the use of unusually
+ brutal torture, the targeted drone assassination of high-value suspects, and the
+ indefinite detention under solitary conditions aim not only to eviscerate the
+ enemy, but also to warn others, strike fear, and win their submission and
+ obedience. Drones and indefinite detention crush those they touch, and strike
+ [...] Terror, in the end, is a key component of the third core strategy of
+ counterinsurgency.
+
+Torture and civilization:
+
+ Since antiquity, terror has served to demarcate the civilized from the
+ barbarian, to distinguish the free citizen from the enslaved. The free male in
+ ancient Greece had the privilege of swearing an oath to the gods, of testifying on
+ his word. The slave, by contrast, could only give testimony under torture.
+ Torture, in this sense, defined freedom and citizenship by demeaning and
+ marking—by imposing stigmata—on those who could be tortured. It served to
+ demarcate the weak. It marked the vulnerable. And it also, paradoxically, served
+ to delineate the “more civilized.” This is perhaps the greatest paradox of the
+ brutality of counterinsurgency: to be civilized is to torture judiciously. This
+ paradox was born in antiquity, but it journeys on.
+
+ [...]
+
+ The judicious administration of terror is the hallmark of civilization. To be
+ civilized is to terrorize properly, judiciously, with restraint, according to the
+ rules. Only the barbarians tortured savagely, viciously, unrestrainedly. The
+ civilized, by contrast, knew how and when to tame torture, how to rein it terror,
+ to apply it with judgment and discretion. Compared to the barbarians—the
+ beheadings of ISIS is a modern case on point—we are tame and judicious, even
+ when we torture, not like those barbarians. And since 9/11, the judicious use of
+ terror has been a key US strategy. In the end, terror functions in myriad ways to
+ win the hearts and minds of the masses under the counterinsurgency paradigm of
+ governing.
+
+Terror in many levels of governing:
+
+ Now, terror is not an unprecedented component of governing, even if its role
+ in the counterinsurgency model may be uniquely constitutive. It has been with us
+ since slavery in antiquity, through the many inquisitions, to the internment and
+ concentration camps of modern history. And there too, in each of its
+ manifestations, it functioned at multiple levels to bolster different modes of
+ governing. Looking back through history, terror has done a lot of work. Today as
+ well. And to see all that terror achieves today—above and beyond the three
+ prongs of counterinsurgency theory—it is useful to look back through history
+ and recall its different functions and the work it has done. The reflections today
+ are stunning.
+
+Torture and truth:
+
+ The first episode reaches back to antiquity, but represents a recurring theme
+ throughout history: terror has often served to manufacture its own truth—
+ especially in terms of its efficacy. “They all talk.” [...]
+
+ [...]
+
+ Trying to convince a suspect that he will talk, telling him that he will—this is,
+ of course, a psychological technique, but it is more than that. It is also a firm
+ belief of counterinsurgency theorists outside the interrogation room. Roger
+
+ [...]
+
+ Manufacturing truth: that is, perhaps, the first major function of terror. It is
+ the power of terror, especially in the face of ordinary men and women, of
+ humans, all too human. It has been that way since the inquisitions of the Middle
+ Ages, and before, since antiquity. On this score, little has changed.
+ In her book on slavery in Greek antiquity, Torture and Truth, Page duBois
+ argues that the idea of truth dominant today in Western thought is indissolubly
+ tied to the practice of torture, while torture itself is deeply connected to the will
+ to discover something that is always beyond our grasp. As a result, society after
+ society returns to torture, in almost an eternal recurrence, to seek out the truth
+ that is always beyond our reach. In ancient times, duBois shows, torture
+ functioned as the metaphorical touchstone of truth and as a means to establish a
+ social hierarchy. In duBois’s words, “the desire to create an other and the desire
+ to extract truth are inseparable, in that the other, because she or he is an other, is
+ constituted as a source of truth.” Truth, in sum, is always “inextricably linked
+ with the practice of torture.” 4
+
+ [...]
+
+ Truth, duBois argues, “resides in the slave body.” 5
+
+ [...]
+
+ Even more, terror produced social difference and hierarchy. The limits on
+ torture in ancient societies served to define what it meant to be among those who
+ could be tortured—what it meant to be a slave or to be free. In ancient times, the
+ testimony of a slave could only be elicited, and only became admissible in
+ litigation, under torture. Only free male citizens could take an oath or resolve a
+ controversy by sermon. The rules about who could be tortured in ancient times
+ did not just regulate the victims of torture, the rules themselves were constitutive
+ of what it meant to be a slave. The laws demarcated and defined freedom itself
+ —what it looked like, what it entailed.
+ Sophocles’s tragedy Oedipus Rex has captured our imagination for centuries
+ on questions of fate and power. But it is perhaps on the question of terror and
+ truth that the play turns. At the climax of Sophocles’s tragedy—at the pivotal
+ moment when truth finally emerges for all to see and to recognize—there is a
+ scene of terror. The shepherd slave who held the knowledge of Oedipus’s
+ ancestry is threatened with torture. And that threat of torture alone—at the
+ culmination of a whole series of unsuccessful inquiries—produces the truth:
+ torture provokes the shepherd’s confession and that allows Oedipus to recognize
+ his fate. But more than that, torture reaffirms the social order in Thebes—a
+ social order where gods rule, oracles tell truth, prophets divine, fateful kings
+ govern, and slaves serve. It is, ultimately, the right to terrorize that reveals
+ Oedipus’s power and the shepherd’s place in society.
+
+ [...]
+
+ In a similar way, terror today produces its own truth—about the effectiveness
+ of torture in eliciting truth, about its effectiveness in subjugating the insurgents,
+ about the justness of counterinsurgency.
+
+ [...]
+
+ Second, terror—or more specifically the regulatory framework that surrounds
+ terror—legitimizes the practices of terror itself. This may sound paradoxical or
+ circular—but it has often been true in history. The structures that frame and
+ regulate the administration of terrorizing practices have the effect, unexpectedly,
+ [...] The extreme nature of torture, once brought within the fabric of the law,
+ concentrated power in the hands of those
+ who had the knowledge and skill, the techne, to master the brutality. The
+ Justinian codification served as a model to later codifications during the early
+ Middle Ages and to the practices of the Inquisition.
+ Extreme practices call for expert oversight and enable a concentration of
+
+ [...]
+
+ Torture was brought into the fabric of the law and rarified at the
+ same time. The rarefication in the Medieval Period served a political end: to
+ make torture even more foreboding. Had torture become too generalized or too
+ frequent, it might have lost its exceptionality and terrorizing effect.
+ Torture was rarely applied, and, as one historian notes, inflicted with “the
+
+ [...]
+
+ The rarity achieved by the limited use and legal regulation of torture in the
+ Medieval Period served to ensure its persistence and role as a social
+ epistemological device—as a producer of truths, especially truth about itself.
+ Centuries later, the Bush administration and its top lawyers re-created a legal
+ architecture surrounding the use of torture.
+
+ [...]
+
+ Third, the legal regulation of terror also legitimizes the larger political regime.
+
+ [...]
+
+ It may seem surprising or paradoxical that the antebellum courts would
+ protect a slave accused of poisoning her master. But there is an explanation: the
+ intricate legal framework surrounding the criminalization and punishment of
+ errant slaves during the antebellum period served to maintain and stabilize
+ chattel slavery in the South—it served to equilibrate the political economy of
+ slavery. It served to balance interests in such a way that neither the slave owners
+ nor the slaves would push the whole system of slavery into disarray. And the
+ courts and politicians carefully handled this delicate balance.
+
+ [...]
+
+ In fact, the financial loss associated with the execution of a slave was viewed
+ as the only way to guarantee that owners made sure their slaves received a fair
+ trial. During the 1842–1843 legislative session, the general assembly passed a
+
+ [...]
+
+ These complex negotiations over the criminal rules accompanied the
+ practices of slavery in Alabama—a form of terror—and served to legitimize the
+ larger political economy of chattel slavery. They offered stability to the slave
+ economy by making the different participants in the criminal process and in
+ slavery—the slave owners, the foremen, the magistrates, and the public at large
+ —more confident in the whole enterprise. The extensive legal regulation of the
+ torture of slaves was not about justifying torture, nor about resolving
+ philosophical or ethical questions. Instead, it served to strike a balance and
+ stabilize the institution of slavery.
+
+ [...]
+
+ Fourth, the ability to terrorize—and to get away with it—has a powerful effect
+ on others. The audacity and the mastery impress the general masses. Something
+ about winning or beating others seduces the population. People like winners, and
+ winning is inscribed in terrorizing others.
+
+Masculinity:
+
+ Fifth, and relatedly, terror is gendered, which also tends to reinforce the power
+ and appeal of the more brutal counterinsurgency practices. Brutality is most
+ often associated with the dominant half of the couple, the one who controls, and
+ however much we might protest, this tends to strengthen the attraction.
+
+Horrorism:
+
+ Terror works in other ways as well, and many other historical episodes could
+ shed light on the complex functioning of terror today—of what Adriana
+ Cavarero refers to as “horrorism.” 45 Terror, for instance, operates to control and
+ manage one’s comrades. It can serve to keep the counterrevolutionary minority
+ in check. The willingness to engage in extreme forms of brutality, in senseless
+ violence, in irrational excess signals one’s own ruthlessness to one’s peers or
+ inferiors. It can frighten and discipline both inferiors and superiors. It
+ demonstrates one’s willingness to be cruel—which can be productive, in fact
+ necessary, to a counterinsurgency.
+
+Counterinsurgency goes domestic:
+
+ The operations of COINTELPRO—the Counter Intelligence Program
+ developed by the FBI in the 1950s to disrupt the American Communist Party,
+ and extended into the 1960s to eradicate the Black Panthers—took precisely the
+ form of counterinsurgency warfare. The notorious August 1967 directive of FBI
+ director J. Edgar Hoover to “expose, disrupt, misdirect, discredit, or otherwise
+ neutralize the activities of black nationalist, hate-type organizations and
+ groupings, their leadership, spokesmen, membership, and supporters”; 16 the
+ police raids on Black Panther headquarters in 1968 and 1969; the summary
+ execution of the charismatic chairman of the Chicago Black Panther Party, Fred
+ Hampton; the first SWAT operations carried out against the Panthers in Los
+ Angeles—these all had the trappings of modern warfare.
+
+ Hoover’s FBI targeted the Panthers in a manner that drew on the foundational
+ principles of counterinsurgency: first, to collect as much intelligence on the
+ Black Panther Party as possible through the use of FBI informants and total
+ surveillance; second, to isolate the Panthers from their communities by making
+ their lives individually so burdened with surveillance and so difficult that they
+ were forced to separate themselves from their friends and family members; third,
+ to turn the Panther movement into one that was perceived, by the general
+ population, as a radicalized extremist organization, as a way to delegitimize the
+ Panthers and reduce their appeal and influence; and ultimately, to eliminate and
+ eradicate them, initially through police arrests, then through criminal
+ prosecutions (for instance, of the New York 21) and justified homicides [...]
+ and ultimately by fomenting conflict and divisiveness within the party
+
+ [...]
+
+ The linchpin of a domesticated counterinsurgency is to bring total
+ information awareness home. Just as it was developed abroad, it is total
+ surveillance alone that makes it possible to distinguish the active minority on
+ domestic soil from the passive masses of Americans. A fully transparent
+ population is the first requisite of the counterinsurgency method. In General
+ Petraeus’s field manual, it received a full chapter early on, “Intelligence in
+ Counterinsurgency,” with a pithy and poignant epigraph: “Everything good that
+ happens seems to come from good intelligence.” And as the manual began, so it
+ ended, with the following simple mantra: “The ultimate success or failure of the
+ [counterinsurgency] mission depends on the effectiveness of the intelligence effort."
+
+ [...]
+
+ American is a potential insurgent.
+ Constant vigilance of the American population is necessary—hand in hand
+ with the appearance of trust. Appearances are vital. A domesticated
+ counterinsurgency must suspect everyone in the population, but not let it be
+ known. This posture, developed in counterinsurgency theory decades ago, was at
+ the core of the paradigm. David Galula had refined it to a witty statement he
+ would tell his soldiers in Algeria: “One cannot catch a fly with vinegar. My rules
+ are: outwardly you must treat every civilian as a friend; inwardly you must
+ consider him as a rebel ally until you have positive proof to the contrary.” 2 This
+ mantra has become the rule today—at home.
+
+ [...]
+
+ In Exposed, I proposed a new way to understand how power circulates in the
+ digital age and, especially, a new way to comprehend our willingness to expose
+ ourselves to private corporations and the government alike. The metaphors
+ commonly used to describe our digital condition, such as the “surveillance
+ state,” Michel Foucault’s panopticon prison, or even George Orwell’s Big
+ Brother, are inadequate, I argued there. In the new digital age we are not forcibly
+ imprisoned in panoptic cells. There is no “telescreen” anchored to the wall of our
+ apartments by the state. No one is trying to crush our passions, or wear us down
+ into submission with the smell of boiled cabbage and old rag mats, coarse soap,
+ and blunt razors. The goal is not to displace our pleasures with hatred—with
+ “hate” sessions, “hate songs,” “hate weeks.” Today, instead, we interact by
+ means of “likes,” “shares,” “favorites,” “friending,” and “following.” We
+ gleefully hang smart TVs on the wall that record everything we say and all our
+ preferences. The drab uniforms and grim grayness of Orwell’s 1984 have been
+ replaced by the iPhone 5c in its radiant pink, yellow, blue, and green. “Colorful
+ through and through,” its marketing slogan promises, and the desire for color-
+ filled objects—for the sensual swoosh of a sent e-mail, the seductive click of the
+ iPhone camera “shutter,” and the “likes,” clicks, and hearts that can be earned by
+ sharing—seduce us into delivering ourselves to the surveillance technologies.
+ And as the monitoring and marketing of our private lives changes who we
+ sharing—seduce us into delivering ourselves to the surveillance technologies.
+
+ And as the monitoring and marketing of our private lives changes who we
+ are, power circulates in a new way. Orwell depicted the perfect totalitarian
+ society. Guy Debord described ours rather as a society of the spectacle, in which
+ the image makers shape how we understand the world and ourselves. Michel
+ Foucault spoke instead of “the punitive society” or what he called
+ “panopticism,” drawing on Jeremy Bentham’s design of the panoptic prison.
+ Gilles Deleuze went somewhat further and described what he called “societies of
+ control.” But in our digital age, total surveillance has become inextricably linked
+ with pleasure. We live in a society of exposure and exhibition, an expository
+ society.
+
+ [...]
+
+ And that’s what happened: taxpayers would pay the telecoms to hold the data
+ for the government. So, before, AT&T surreptitiously provided our private
+ personal digital data to the intelligence services free of charge. Now, American
+ taxpayers will pay them to collect and hold on to the data for when the
+ intelligence services need them. A neoliberal win-win solution for everyone—
+ except, of course, the ordinary, tax-paying citizen who wants a modicum of
+ privacy or protection from the counterinsurgency.
+
+ [...]
+
+ In my previous book, however, I failed to fully grasp how our expository
+ society fits with the other features of our contemporary political condition—
+ from torture, to Guantánamo, to drone strikes, to digital propaganda. In part, I
+ could not get past the sharp contrast between the fluidity of our digital surfing
+ and surveillance on the one hand, and the physicality of our military
+ interventions and use of torture on the other. To be sure, I recognized the deadly
+ reach of metadata and reiterated those ominous words of General Michael
+ Hayden, former director of both the NSA and the CIA: “We kill people based on
+ metadata.” 20 And I traced the haunting convergence of our digital existence and
+ of correctional supervision: the way in which the Apple Watch begins to
+ function like an electronic bracelet, seamlessly caging us into a steel mesh of
+ digital traces. But I was incapable then of fully understanding the bond between
+ digital exposure and analog torture.
+
+ It is now clear, though, that the expository society fits seamlessly within our
+ new paradigm of governing. The expository society is precisely what allows the
+ counterinsurgency strategies to be applied so impeccably “at home” to the very
+ people who invented modern warfare. The advent of the expository society, as
+ well as the specific NSA surveillance programs, makes domestic total
+ information awareness possible, and in turn lays the groundwork for the other
+ two prongs of counterinsurgency in the domestic context.
+
+ [...]
+
+ This idea of an occupied territory, of a colony within a nation, resonates
+ perfectly with what we have witnessed in terms of the domestication of the
+ counterinsurgency. I would just push the logic further: we have not simply
+ created an internal colony, we have turned the nation itself into a colony. We
+ govern ourselves through modern counterinsurgency warfare as if the entire
+ United States was now a colonial dominion like Algeria, Malaya, or Vietnam.
+
+ [...]
+
+ These incidents—large and small, but all devastating for those targeted—also
+ serve another objective of the domesticated counterinsurgency: to make the rest
+ of us feel safe and secure, to allow us to continue our lives unaffected, to avoid
+ disrupting our consumption and enjoyment. They serve to reassure, and also, in
+ demonizing a phantom minority, to bring us all together against the specter of
+ the frightening and dangerous other. It makes us believe that there would be,
+ lurking in the quiet suburbs of Dallas or Miami, dangerous insurgents—were it
+ not for our government. And these effects feed into the third prong of a
+
+ [...]
+
+ We had seen earlier, within counterinsurgency theory, similar debates
+ between population-centric and enemy-centric theorists. The enemy-centric
+ approach tended to be the more brutal, but more focused. The population-centric
+ favored the more legal and social-investment approaches. I argued then that they
+ were just two facets of the same paradigm.
+
+ Here the debate is between population-and/or-enemy-centric theories versus
+ individual-centric theory. But here too, I would argue, this is a false dichotomy.
+ Again, these are just two facets of the same thing: a counterinsurgency paradigm
+ of warfare with three core strategies. Like the population-and/or-enemy-centric
+ theories, individual-centric theory naturally entails both incapacitating the
+ individual terrorist or insurgent—eliminating him and all of the active minority
+ —and preventing or deterring his substitution or replacement.
+
+ [...]
+
+ But rather than buy into this dichotomy of counterinsurgency and leaner
+ antiterrorism, what history shows instead is a growing convergence of the two
+ models in the United States since the 1960s. Counterinsurgency and domestic
+ antiterrorism efforts, entwined from the start, have converged over time. The
+ individual incapacitation strategy meshes perfectly into the counterinsurgency
+ approach. And it leads seamlessly from the domestication of the second prong of
+ counterinsurgency to the domestication of the third.
+
+### Distraction and diversion
+
+ MANY OF US WILL NOT RECOGNIZE OURSELVES, OR A MERICA for that matter, in
+ these dreadful episodes—in the waterboarding and targeted assassinations
+ abroad or in the militarization of our police forces, in the infiltration of Muslim
+ mosques and student groups or in the constant collection of our personal data at
+ home. Many of us have no firsthand experience of these terrifying practices. Few
+ of us actually read the full Senate torture report, and even fewer track drone
+ strikes. Some of us do not even want to know of their existence. Most of us are
+ blissfully ignorant—at least most of the time—of these counterinsurgency
+ practices at home or abroad, and are consumed instead by the seductive
+ distractions of our digital age.
+
+ And that’s the way it is supposed to be. As counterinsurgency is
+ domesticated, it is our hearts and minds that are daily being assuaged, numbed,
+ pacified—and blissfully satisfied. We, the vast majority of us, are reassured
+ daily: there are threats everywhere and color-coded terror alerts, but
+ counterinsurgency strategies are protecting us. We are made to feel that
+ everything’s under control, that the threat is exterior, that we can continue with
+ our daily existence. Even more, that these counterinsurgency strategies will
+ prevail. That our government is stronger and better equipped, prepared to do
+ everything necessary to win, and will win. That the guardians are protecting us.
+ The effort to win the hearts and minds of the passive American majority is
+ the third aspect of the domestication of counterinsurgency practices—perhaps
+ the most crucial component of all. And it is accomplished through a remarkable
+ mixture of distraction, entertainment, pleasure, propaganda, and advertising—
+ now rendered all so much more effective thanks to our rich digital world. In
+ Rome, after the Republic, this was known as “bread and circus” for the masses.
+ Today, it’s more like Facebook and Pokémon GO.
+
+ We saw earlier how the expository society entices us to share all our personal
+ data and how this feeds into the first prong of counterinsurgency—total
+ information awareness. There is a flip side to this phenomenon: keeping us
+ distracted. The exposure is so pleasurable and engaging that we are mostly kept
+ content, with little need for a coordinated top-down effort to do so. We are
+ entranced—absorbed in a fantastic world of digitally enhanced reality that is
+ totally consuming, engrossing, and captivating. We are no longer being rendered
+ docile in a disciplinarian way, as Michel Foucault argued in Discipline and
+ Punish. We are past notions of docility. We are actively entranced—not
+ passively, not in a docile way. We are actively clicking and swiping, jumping
+ from one screen to another, checking one platform then another to find the next
+ fix—Facebook, Instagram, Twitter, Google, YouTube, and on and on.
+ Winning over and assuaging the passive majority might be accomplished—
+ indeed, has been accomplished in the past—through traditional propaganda, such
+ as broadcast misinformation about the insurgent minority, and through the top-
+ down provision of entertainment to keep us from thinking about politics. The
+ new digital world we live in has rendered these older strategies obsolete. As the
+ counterinsurgency’s mandate to pacify the masses has been turned on the
+ American people, the third prong of modern warfare looks and works differently
+ than it did in previous times and in other places.
+ Things have changed. Just a few years ago, our politicians still had to tell us
+
+ [...]
+
+ Pokémon GO has already run its course, but that is to be expected. Another
+ digital obsession will follow. These platforms are supposed to capture all of our
+ attention for a while, to captivate us, to distract us—and simultaneously to make
+ us expose ourselves and everything around us. This is the symbiosis between the
+ third and first prongs of the domesticated counterinsurgency: while it pacifies us,
+ a game like Pokémon GO taps into all our personal information and captures all
+ our data. At first, the game required that players share all their personal contacts.
+ Although that was eventually dropped, the game collects all our GPS locations,
+ captures all the video of our surroundings in perfectly GPS-coded data, and
+ tracks us wherever we are. Plus, even though it is free, many players are buying
+ add-ons and in the process sharing their consumption and financial data. The
+ more we play, the more we are distracted and pacified, and the more we reveal
+ about ourselves.
+
+ [...]
+
+ The distractions are everywhere: e-mail notifications, texts, bings and pings,
+ new snapchats and instagrams. The entertainment is everywhere as well: free
+ Wi-Fi at Starbucks and McDonald’s, and now on New York City streets, that
+ allow us to stream music videos and watch YouTube videos. And of course, the
+ advertising is everywhere, trying to make us consume more, buy online,
+ subscribe, and believe. Believe not only that we need to buy the recommended
+ book or watch the suggested Netflix, but also believe that we are secure and safe,
+ protected by the most powerful intelligence agencies and most tenacious military
+ force. Believe that we can continue to mind our own business—and remain
+ distracted and absorbed in the digital world—because our government is
+ watching out for us.
+
+ The fact is, the domestication of counterinsurgency has coincided with the
+ explosion of this digital world and its distractions. There is a real qualitative
+ difference between the immediate post–9/11 period and today. One that is
+ feeding directly into the third strategy of modern warfare.
+ Meanwhile, for the more vulnerable—those who are more likely to veer
+ astray and perhaps sympathize with the purported internal enemy—the same
+ digital technologies target them for enhanced propaganda. The Global
+ Engagement Center, or its equivalents, will profile them and send improved
+ content from more moderate voices. The very same methods developed by the
+ most tech-savvy retailers and digital advertisers—by Google and Amazon—are
+ deployed to predict, identify, enhance, and target our own citizens.
+ were before or that we are experiencing a waning of civil and political
+ engagement. While I agree that the growing capacity of the state and
+ corporations to monitor citizens may well threaten the private sphere, I am not
+ convinced that this is producing new apathy or passivity or docility among
+ citizens, so much as a new form of entrancement. The point is, we were once
+ kept apathetic through other means, but are now kept apathetic through digital
+ distractions.
+
+Voting turnout and Trump election:
+
+ The voting patterns of American registered voters has remained constant—
+ and apathetic—for at least fifty years. Even in the most important presidential
+ elections, voter turnout in this country over the past fifty years or more has
+ pretty much fluctuated between 50 percent and 63 percent. By any measure,
+ American democracy has been pretty docile for a long time. In fact, if you look
+ over the longer term, turnout has been essentially constant since the 1920s and
+ the extension of the suffrage to women. Of course, turnout to vote is not the only
+ measure of democratic participation, but it is one quantifiable measure. And
+ electoral voting is one of the more reliable longitudinal measures of civic
+ participation. But our record, in the United States, is not impressive.
+
+ [...]
+
+ Despite all this, over 62 million people voted for Donald Trump, resulting in
+ his Electoral College victory. And it was by no means an unusual election. Voter
+ turnout in 2016 was typical for this country. About 60.2 percent of the
+ approximately 231 million eligible voters turned out to vote, representing about
+ 139 million votes case. That number is consonant with historical turnout in this
+ country, almost squarely between voter turnout in 2012 (58.6 percent) and in
+ 2008 (61.6 percent), but still above most presidential election year turnouts since
+ 1972. 16 In all categories of white voters, Trump prevailed.
+
+ [...]
+
+ The cable news network CNN captured this best in a pithy lead to a story titled
+ “Trump: The Social Media President?”: “FDR was the first ‘radio’ president.
+ JFK emerged as the first ‘television’ president. Barack Obama broke through as
+ the first ‘Internet’ president. Next up? Prepare to meet Donald Trump, possibly
+ the first ‘social media’ and ‘reality TV’ president.” 10
+
+ [...]
+
+ This new mode of existence and digital consumption pleases and distracts the
+ majority of Americans. The old-fashioned TV has now been enhanced and
+ augmented, displaced by social media on digital devices of all sorts and sizes—
+ from the Apple Watch and tablet, through the MacBook Air and Mac Pro, to the
+ giant screen TV and even the Jumbotron. And all of it serves to pacify the
+ masses and ensure that they do not have the time or attention span to question
+ the domestication of the counterinsurgency.
+
+ And, then, it all feeds back into total information awareness. Hand in hand,
+ government agencies, social media, Silicon Valley, and large retailers and
+ corporations have created a mesmerizing new digital age that simultaneously
+ makes us expose ourselves and everything we do to government surveillance and
+ that serves to distract and entertain us. All kinds of social media and reality TV
+ consume and divert our attention, making us give our data away for free. A
+ profusion of addictive digital platforms—from Gmail, Facebook, and Twitter, to
+ YouTube and Netflix, Amazon Prime, Instagram, and Snapchat, and now
+ Pokémon GO—distract us into exposing all our most private information, in
+ order to feed the new algorithms of commerce and intelligence services: to
+ profile us for both watch lists and commercial advertising.
+
+This is compatible with Shoshana Zuboff's Dispossession Cycle:
+
+ This third aspect of counterinsurgency’s domestication is perhaps the most
+ important, because it targets the most prized military and political objective: the
+ general masses. And today, in the expository society, the new algorithms and
+ digital-advertising methods have propelled the manipulation and propaganda to
+ new heights. We are being encouraged by government and enticed by
+ multination corporations and social media to expose and express ourselves as
+ much as possible, leaving digital traces that permit both government and
+ corporations to profile us and then try to shape us accordingly. To make model
+ citizens out of us all—which means docile, entranced consumers. The governing
+ paradigm here is to frenetically encourage digital activity—which in one sense is
+ the opposite of docility—in order to then channel that activity in the right
+ direction: consumption, political passivity, and avoiding the radical extremes.
+
+ What we are witnessing is a new form of digital entrancement that shapes us
+ as subjects, blunts our criticality, distracts us, and pacifies us. We spend so much
+ time on our phones and devices, we barely have any time left for school or work,
+ let alone political activism. In the end, the proper way to think about this all is
+ not through the lens of docility, but through the framework of entrancement. It is
+ crucial to understand this in the proper way, because breaking this very
+ entrancement is key to seeing how counterinsurgency governance operates more
+ broadly. Also, because the focus on docility—along an older register of
+ discipline—is likely to lead us into an outdated focus on top-down propaganda.
+
+### Counterrevolution
+
+ The paradigm was refined
+ and systematized, and has now reached a new stage: the complete and systematic
+ domestication of counterinsurgency against a home population where there is no
+ real insurgency or active minority. This new stage is what I call “The
+ Counterrevolution.”
+
+ The Counterrevolution is a new paradigm of governing our own citizens at
+ home, modeled on colonial counterinsurgency warfare, despite the absence of
+ any domestic uprising. It is aimed not against a rebel minority—since none
+ really exists in the United States—but instead it creates the illusion of an active
+ minority which it can then deploy to target particular groups and communities,
+ and govern the entire American population on the basis of a counterinsurgency
+ warfare model. It operates through the three main strategies at the heart of
+ modern warfare, which, as applied to the American people, can be recapitulated
+ as follows:
+
+ 1. Total information awareness of the entire American population…: [by the]
+ [...] “counterrevolutionary minority.”
+
+ [...]
+
+ 2. … in order to extract an active minority at home…
+
+Shock and Awe:
+
+ 3. … and win the hearts and minds of Americans: Meanwhile, the
+ counterrevolutionary minority works to pacify and assuage the general
+ population in order to ensure that the vast majority of Americans remain
+ just that: ordinary consuming Americans. They encourage and promote a
+ rich new digital environment filled with YouTube, Netflix, Amazon
+ Prime, tweets, Facebook posts, instagrams, snapchats, and reality TV that
+ consume attention while digitally gathering personal data—and at times,
+ pushing enhanced content. They direct digital propaganda to susceptible
+ users. And they shock and awe the masses with their willingness to
+ torture suspected terrorists or kill their own citizens abroad. In the end,
+ entertaining, distracting, entrancing, and assuaging the general population
+ is the key to success—our new form of bread and circus.
+
+The "new shape" of the State (and it's partners), as a "loose network":
+
+ These three key strategies now guide governance at home, as they do military
+ and foreign affairs abroad. What has emerged today is a new and different art of
+ governing. It forms a coherent whole with, at its center, a security apparatus
+ composed of White House, Pentagon, and intelligence officials, high-ranking
+ congressional members, FISC judges, security and Internet leaders, police
+ intelligence divisions, social-media companies, Silicon Valley executives, and
+ multinational corporations. This loose network, which collaborates at times and
+ competes at others, exerts control by collecting and mining our digital data. Data
+ control has become the primary battlefield, and data, the primary resource—
+ perhaps the most important primary resource in the United States today.
+
+ [...]
+
+ This new mode of governing has no time horizon. It has no sunset provision. And it is
+ marked by a tyrannous logic of violence. [...] It is part and parcel of the new
+ paradigm of governing that reconciles brutality with legality.
+
+The unprecedented, self-fulfilling profecy:
+
+ We govern ourselves
+ differently in the United States now: no longer through sweeping social
+ programs like the New Deal or the War on Poverty, but through surgical
+ counterinsurgency strategies against a phantom opponent. The intensity of the
+ domestication now is unprecedented.
+
+ [...]
+
+ Counterinsurgency, with its tripartite scheme (active minority, passive masses,
+ counterrevolutionary minority) and its tripartite strategy (total awareness,
+ eliminate the active minority, pacify the masses) is a deeply counterproductive
+ self-fulfilling prophecy that radicalizes individuals against the United States.
+
+ [...]
+
+ “The Islamic State has called it ‘the blessed ban’ because it
+ supports the Islamic State’s position that America hates Islam. The clause in the
+ order that gives Christians preferential treatment will be seen as confirming the
+ Islamic State’s apocalyptic narrative that Islam is in a fight to the death against
+ the Christian crusaders. The images of Muslim visitors being turned away at
+ American airports will only inflame those who seek to do us harm.” 6
+
+ [...]
+
+ We are headed not, as Kant would have it, toward perpetual peace, but
+ instead, sounding the refrain of Nietzsche’s eternal return, toward an endless
+ state of counterinsurgency warfare.
+
+### Not exactly a state of exception, but of legality
+
+ MANY COMMENTATORS ARGUE THAT WE NOW LIVE, IN THE United States and in the
+ West more broadly, in a “state of exception” characterized by suspended legality.
+ In this view, our political leaders have placed a temporary hold on the rule of
+ law, with the tacit understanding that they will resume their adherence to liberal
+ legal values when the political situation stabilizes. Some commentators go
+ further, arguing that we have now entered a “permanent state of exception.”
+
+ This view, however, misperceives one particular tactic of counterinsurgency
+ —namely, the state of emergency—for the broader rationality of our new
+ political regime. It fails to capture the larger ambition of our new mode of
+ governing. The fact is, our government does everything possible to legalize its
+ counterinsurgency measures and to place them solidly within the rule of law—
+ through endless consultations with government lawyers, hypertechnical legal
+ arguments, and lengthy legal memos. The idea is not to put law on hold, not
+ even temporarily. It is not to create an exception, literally or figuratively. On the
+ contrary, the central animating idea is to turn the counterinsurgency model into a
+ fully legal strategy. So, the governing paradigm is not one of exceptionality, but
+ of counterinsurgency and legality.
+
+ [...]
+
+ The logic today is based on a model of
+ counterinsurgency warfare with, at its heart, the resolution of that central tension
+ between brutality and legality. The counterrevolutionary model has resolved the
+ inherited tension and legalized the brutality.
+
+ [...]
+
+ Agamben’s idea of a permanent state of exception pushes this
+ further, but simultaneously undermines the defining element of the exception,
+ since it becomes the rule. For the most part, though, the state of exception is
+ presented as aberrational but temporary.
+
+ [...]
+
+ The problem with the state-of-exception view is that it mistakes tactics for
+ the overarching logic of our new paradigm of governing and, in the process, fails
+ to see the broader framework of The Counterrevolution. The state-of-exception
+ framework rests on an illusory dichotomy between rule and exception, a myth
+ that idealizes and reifies the rule of law. The point is, the use of torture at CIA
+ black sites and the bulk collection of American telephony metadata were not
+ exceptions to the rule of law, but were rendered fully legalized and regulated
+ practices—firmly embedded in a web of legal memos, preauthorized formalities,
+ and judicial or quasi-judicial oversight. In this sense, hardly anything that
+ occurred was outside or exceptional to the law, or could not be brought back in.
+
+ The Counterrevolution, unlike the state of exception, does not function on a
+ binary logic of rule and exception, but on a fully coherent systematic logic of
+ counterinsurgency that is pervasive, expansive, and permanent. It does not have
+ limits or boundaries. It does not exist in a space outside the rule of law. It is all
+ encompassing, systematic, and legalized.
+
+ Of course, the rhetoric of “exception” is extremely useful to The
+ Counterrevolution. “States of emergency” are often deployed to seize control
+ over a crisis and to accelerate the three prongs of counterinsurgency.
+
+ [...]
+
+ The ultimate exercise of power, Foucault argued, is precisely to transform
+ ambiguities about illegalisms into conduct that is “illegal.”
+
+ [...]
+
+ During the ancien régime, Foucault argues, the popular and the privileged
+ classes worked together to evade royal regulations, fees, and impositions.
+ Illegalisms were widespread throughout the eighteenth century and well
+ distributed across the different strata of society
+
+ [...]
+
+ As wealth became increasingly mobile after the French Revolution, new
+ forms of wealth accumulation—of moveable goods, stocks, and supplies as
+ opposed to landed wealth—exposed massive amounts of chattel property to the
+ workers who came in direct contact with this new commercial wealth. The
+ accumulation of wealth began to make popular illegalisms less useful—even
+ dangerous—to the interests of the privileged. The commercial class seized the
+ mechanisms of criminal justice to put an end to these popular illegalisms
+ [...] The privileged seized the administrative and
+ police apparatus of the late eighteenth century to crack down on popular
+ illegalisms.
+
+ [...]
+
+ They effectively turned popular illegalisms into
+ illegalities, and, in the process, created the notion of the criminal as social
+ enemy—Foucault even talks here of creating an “internal enemy.”
+
+ [...]
+
+ In The Counterrevolution—by contrast to the bourgeois revolutions of the
+ early nineteenth century—the process is turned on its head. Illegalisms and
+ illegalities are inverted. Rather than the privileged turning popular illegalisms
+ into illegalities, the guardians are turning their own illegalisms into legalities.
+ [...] The strategy here is to paper one’s way into the legal realm through elaborate
+ memorandums and advice letters that justify the use of enhanced interrogation or the
+ assassination of American citizens abroad.
+
+ [...]
+
+ On the one hand, there is a strict division of responsibilities: the intelligence
+ agencies and the military determine all the facts outside the scope of the legal
+ memorandum. [...] Everything is compartmentalized.
+
+ [...]
+
+ On the other hand, the memo authorizes: it allows the political authority to
+ function within the bounds of the law. It sanitizes the political decision. It cleans
+ the hands of the military and political leaders. It produces legalities.
+
+A circular, feedback loop:
+
+ None of this violates the rule of law or transgresses the boundaries of legal
+ liberalism. Instead, the change was rendered “legal.” If this feels circular, it is
+ because it is: there is a constant feedback effect in play here. The
+ counterinsurgency practices were rendered legal, and simultaneously justice was
+ made to conform to the counterinsurgency paradigm. The result of the feedback
+ loop was constantly new and evolving meanings of due process. And however
+ rogue they may feel, they had gone through the correct procedural steps of due
+ process to render them fully lawful and fully compliant with the rule of law.
+
+ [...]
+
+ “Abnormal,” in 1975, Foucault explored how the clash between the juridical
+ power to punish and the psychiatric thirst for knowledge produced new medical
+ diagnoses that then did work.
+
+ [...]
+
+ In his 1978 lecture on the invention of the notion of dangerousness in French
+ psychiatry, Foucault showed how the idea of future dangerousness emerged from
+ the gaps and tensions in nineteenth-century law. 37
+
+ [...]
+
+ There are surely gaps here too in The Counterrevolution—tensions between
+ rule-boundedness on the one hand and a violent warfare model on the other.
+ Those tensions give momentum to the pendulum swings of brutality that are then
+ resolved by bureaucratic legal memos.
+
+### System analysis and Operations Research
+
+ The RAND Corporation played a seminal role in the development of
+ counterinsurgency practices in the United States and championed for decades—
+ and still does—a systems-analytic approach that has come to dominate military
+ strategy. Under its influence, The Counterrevolution has evolved into a logical
+ and coherent system that regulates and adjusts itself, a fully reasoned and
+ comprehensive approach.
+
+ [...]
+
+ Systems analysis was often confused with OR, but it was distinct in several
+ regards. OR tended to have more elaborate mathematical models and solved
+ lower-level problems; in systems analysis, by contrast, the pure mathematical
+ computation was generally applied only to subparts of the overall problem.
+ Moreover, SA took on larger strategic questions that implicated choices between
+ major policy options. In this sense, SA was, from its inception, in the words of
+ one study, “less quantitative in method and more oriented toward the analysis of
+ broad strategic and policy questions, […] particularly […] seeking to clarify
+ choice under conditions of great uncertainty.” 5
+
+ [...]
+
+ As this definition made clear, there were two meanings of the term system in
+ systems analysis: first, there was the idea that the world is made up of systems,
+ with internal objectives, that need to be analyzed separately from each other in
+ order to maximize their efficiency. Along this first meaning, the analysis would
+ focus on a particular figurative or metaphorical system—such as a weapons
+ system, a social system, or, in the case of early counterinsurgency, a colonial
+ system. Second, there was the notion of systematicity that involved a particular
+ type of method—one that began by collecting a set of promising alternatives,
+ constructing a model, and using a defined criterion.
+
+ [...]
+
+ This method of systems analysis became influential in government and
+ eventually began to dominate governmental logics starting in 1961 when Robert
+ McNamara acceded to the Pentagon under President John F. Kennedy.
+
+ [...]
+
+ According to its proponents, systems analysis
+ would allow policy makers to put aside partisan politics, personal preferences,
+ and subjective values. It would pave the way to objectivity and truth. As RAND
+ expert and future secretary of defense James R. Schlesinger explained:
+ “[Systems analysis] eliminates the purely subjective approach on the part of
+ devotees of a program and forces them to change their lines of argument. They
+ must talk about reality rather than morality.” 13 With systems analysis,
+ Schlesinger argued, there was no longer any need for politics or value
+ judgments. The right answer would emerge from the machine-model that
+ independently evaluated cost and effectiveness. All that was needed was a
+ narrow and precise objective and good criteria. The model would then spit out
+ the most effective strategy.
+
+ [...]
+
+ Counterinsurgency theory blossomed at precisely the moment that systems
+ analysis was, with RAND’s backing, gaining influence in the Pentagon and at
+ the White House. The historian Peter Paret pinpoints this moment, in fact, to the
+ very first year of the Kennedy administration: “In 1961, the Cuban revolution
+ combined with the deteriorating Western position in Southeast Asia
+
+ [...]
+
+ It convened, as mentioned earlier, the seminal
+ counterinsurgency symposium in April 1962, where RAND analysts discovered
+ David Galula and commissioned him to write his memoirs. RAND would
+ publish his memoirs as a confidential classified report in 1963 under the title
+
+ [...]
+
+ Counterinsurgency theory blossomed at precisely the moment that systems
+ analysis was, with RAND’s backing, gaining influence in the Pentagon and at
+ the White House. The historian Peter Paret pinpoints this moment, in fact, to the
+ very first year of the Kennedy administration: “In 1961, the Cuban revolution
+ combined with the deteriorating Western position in Southeast Asia to shift
+
+ [...]
+
+ One recent episode regarding interrogation
+ methods is telling. It involved the evaluation of different tactics to obtain
+ information from informants, ranging from truth serums to sensory overload to
+ torture. These alternatives were apparently compared and evaluated using a SA
+ approach at a workshop convened by RAND, the CIA, and the American
+ Psychological Association (APA). Again, the details are difficult to ascertain
+ fully, but the approach seemed highly systems-analytic.
+
+ [...] a series of workshops on “The Science of Deception”
+
+ [...]
+
+ More specifically, according to this source, the workshops probed and
+ compared different strategies to elicit information. The systems-analytic
+ approach is reflected by the set of questions that the participants addressed: How
+ important are differential power and status between witness and officer? What
+ pharmacological agents are known to affect apparent truth-telling behavior?
+ What are sensory overloads on the maintenance of deceptive behaviors? How
+ might we overload the system or overwhelm the senses and see how it affects
+ deceptive behaviors? These questions were approached from a range of
+ disciplines. The workshops were attended by “research psychologists,
+ psychiatrists, neurologists who study various aspects of deception and
+ representatives from the CIA, FBI and Department of Defense with interests in
+ intelligence operations. In addition, representatives from the White House Office
+ of Science and Technology Policy and the Science and Technology Directorate
+ of the Department of Homeland Security were present.” 31
+
+ [...]
+
+ And in effect, from a counterinsurgency perspective, these various tactics—
+ truth serums, sensory overloads, torture—are simply promising alternatives that
+ need to be studied, modeled, and compared to determine which ones are superior
+ at achieving the objective of the security system. Nothing is off limits.
+ Everything is fungible. The only question is systematic effectiveness. This is the
+ systems-analytic approach: not piecemeal, but systematic.
+ Incidentally, a few years later, Gerwehr apparently went to Guantánamo, but
+ refused to participate in any interrogation because the CIA was not using video
+ cameras to record the interrogations. Following that, in the fall of 2006 and in
+ 2007, Gerwehr made several calls to human-rights advocacy groups and
+ reporters to discuss what he knew. A few months later, in 2008, Gerwehr died of
+ a motorcycle accident on Sunset Boulevard. 32 He was forty years old.
+
+ [...]
+
+ Sometimes, depending on the practitioner, the analysis favored torture or summary
+ execution; at other times, it leaned toward more “decent” tactics. But these
+ variations must now be understood as internal to the system. Under President
+ Bush’s administration, the emphasis was on torture, indefinite detention, and
+ illicit eavesdropping; under President Obama’s, it was on drone strikes and total
+ surveillance; in the first months of the Trump presidency, on special operations,
+ drones, the Muslim ban, and building the wall. What unites these different
+ strategies is counterinsurgency’s coherence as a system—a system in which
+ brutal violence is heart and center. That violence is not aberrational or rogue. It
+ is to be expected. It is internal to the system. Even torture and assassination are
+ merely variations of the counterinsurgency logic.
+
+ Counterinsurgency abroad and at home has been legalized and systematized. It
+ has become our governing paradigm “in any situation,” and today “simply
+ expresses the basic tenet of the exercise of political power.” It has no sunset
+ provision. It is ruthless, game theoretic, systematic—and legal. And with all of
+ the possible tactics at the government’s disposal—from total surveillance to
+ indefinite detention and solitary confinement, to drones and robot-bombs, even
+ to states of exception and emergency powers—this new mode of governing has
+ never been more dangerous.
+
+ In sum, The Counterrevolution is our new form of tyranny.