aboutsummaryrefslogtreecommitdiff
path: root/books/sociology
diff options
context:
space:
mode:
Diffstat (limited to 'books/sociology')
-rw-r--r--books/sociology/anarchist-cybernetics.md301
-rw-r--r--books/sociology/counterrevolution.md1875
-rw-r--r--books/sociology/jogos-homens.md6
-rw-r--r--books/sociology/ruptura.md91
-rw-r--r--books/sociology/secrecy.md768
5 files changed, 3039 insertions, 2 deletions
diff --git a/books/sociology/anarchist-cybernetics.md b/books/sociology/anarchist-cybernetics.md
new file mode 100644
index 0000000..cdc9f0c
--- /dev/null
+++ b/books/sociology/anarchist-cybernetics.md
@@ -0,0 +1,301 @@
+[[!meta title="Anarchist Cybernetics"]]
+
+* https://lra.le.ac.uk/bitstream/2381/37597/1/2016swanntrphd.pdf
+* https://www.lboro.ac.uk/departments/phir/staff/thomas-swann/
+* https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.686573
+* https://lra.le.ac.uk/handle/2381/37597
+* https://www.dailykos.com/stories/2017/3/12/1642612/-Anti-Capitalist-Meetup-Swann-s-Way-anarchist-cybernetics-amp-organizational-dynamics-in-politics
+
+## Excerpts
+
+ goals. The metaphor of a dance with complexity echoes the way Ashby describes the
+ process of control as being similar to a fencer facing an opponent. ‘(I)f a fencer faces an
+ opponent who has various modes of attack available,’ he writes, ‘the fencer must be
+ provided with at least an equal number of modes of defence’ ([1958] 2003, p. 356; see
+ also Ashby, 1962)). Control and regulation are processes of responding to the
+ unpredictable moves of another dancer (again, the complexity can be threatening or, in
+ the case of a dance or in fencing, it can be more of a friendly game or a negotiation). 11
+ Control is not something enacted by an entity, be it an individual or a group, over an
+
+ [...]
+
+ Self-organisation is a sticky concept for cybernetics. Ashby, for example, argues that it
+ cannot exist. He bases his argument on the second-order cybernetic position that
+ viability or effectiveness is always determined as such by an observer of a system. Self-
+ organisation suggests that a system responds effectively by itself to complexity. Along
+ these lines, self-organisation is not a property of the system itself but of the observation
+ (1962; see also von Foerster, [1960] 2003; Duda, 2012, p. 89). While this may apply to
+ mathematical, biological and engineering applications of cybernetics, it is
+ fundamentally at odds with organisational cybernetics and the cybernetics of social and
+ political organisation more generally. A more fitting account of self-organisation, one
+ that is applicable to both the cybernetic need for control and the specific nature of social
+ and political organisations, is the more common one of a group of people deciding
+ amongst themselves, to achieve some goal(s). Stewart Umpleby (1987) highlights this
+ simple definition by contrasting two situations:
+ A teacher can organize a class into groups by assigning each child to a specific group and
+
+ [...]
+
+ One of the core ideas in cybernetic thought when it comes to communication is that of
+ feedback. Beer in fact highlights feedback as ‘the most important concept of all’ ([1981]
+ 1994, p. 32). Feedback explains how information, 12 from the environment but also the
+ internal workings of the organisation itself, plays a role in how the various parts of the
+ organisation operate autonomously. Beer is keen to stress that feedback does not mean
+ what it is commonly thought to mean, i.e. a response to something. Instead, feedback
+ refers to the way in which information about the changes a part of an organisation or
+ system faces are used to help that part maintain an agreed level of operation or to work
+ towards an agreed goal. Information coming into an operating unit of an organisation or
+ system about what is happening, both internally and externally, allows it to direct its
+
+ [...]
+
+ account of the free market as a tool for allowing order to emerge from chaos (Cooper,
+ 2011; see also Gilbert, 2005). Hayek was of course one of the key architects of the
+ theories that supported neoliberalism and, in a sad irony, was involved in advising the
+ dictatorship of Augusto Pinochet that had toppled the government of Salvador Allende
+ in Chile that Beer had become so invested in (Harvey, 2005). While complexity has
+ been discussed thus far in relation to the potential for self-organisation in a way that
+ may well run parallel to radically political accounts (see also Maeckelbergh, 2009, pp.
+ 203-210; Purkis, 2004, pp. 51-52), it is important to note that there is a competing
+ narrative around complexity theory, one that takes it in a dramatically different
+ direction.
+ Autonomy and ideas of self-organisation and horizontality, too, have been subject to
+
+ [...]
+
+ This initial affinity between anarchism and organisational cybernetics comes through in
+ how Kropotkin characterises centralised, top-down forms of government as being not
+ only politically and morally objectionable but at the same time ineffectual. Kropotkin
+ writes (1927, pp. 76-7) that ‘in all production there arise daily thousands of difficulties
+ which no government can solve or foresee.’ Against the plans of those socialists who
+ wish to use the state to manage this complexity, ‘the governmentalists’ to use
+ McEwan’s term, he argues that ‘production and exchange represented an undertaking so
+ complicated that the plans of the state socialists, which lead inevitably to a party
+ directorship, would prove to be absolutely ineffective as soon as they were applied to
+ life.’ 21 As an alternative to centralised attempts at attenuating variety in society (which
+ would lead to an oppression of individuals’ right to live their lives as they see fit) and
+ amplifying variety in the state as an organising body (resulting in a massive
+ bureaucracy), Kropotkin proposes that the workers themselves and their unions
+ administer production in an autonomous manner. 22 As political science scholar Marius
+
+ [...]
+
+ 22
+ An alternative approach to anarchism and cybernetics that focuses on feedback loops can be found in
+ Roel van Duijn’s Message of a Wise Kabouter (1972). In a conversation I had with van Duijn in 2013 he
+ suggested that he had come to cybernetics as a result of discussions between himself and Murray
+ Bookchin in the 1960s. Bookchin does use the term ‘cybernetics’ but does so to refer to high-technology
+ and links it to a centralised, authoritarian corporate state (e.g. 1985), so it seems that he had not engaged
+ with the cybernetics of Wiener and Beer. Van Duijn may have been put onto cybernetics through reading
+
+ [...]
+
+ John Duda (2013, p. 64) describes the approach to anarchism of McEwan as ‘a shift
+ away from a moral vision of anarchism, outraged at the scandal of domination’ towards
+ a paradigm focussed on the ‘superior productivity of anarchist organisational
+ methodology’, but I would suggest that it in fact tries to show that anarchism trumps
+ top-down government on both counts, without prioritising one over the other. Indeed,
+ the fact that it is present in Kropotkin’s work supports the view that it is not a shift that
+ took place in light of anarchist engagements with cybernetics but is a dual-perspective
+ that is present in at least some forms of anarchism from relatively early in the canon.
+ This could be thought of as ‘the two sides of the anarchist coin’. On the one hand there
+ is the ethical and political concern for autonomy, while on the other there is the
+ functional concern for effective organisation.
+ The connections between anarchism and cybernetics were also picked up on by one of
+
+ [...]
+
+ While this is framed within a typically-hierarchical organisational structure with an
+ executive and a receptionist, the point Pask is getting at is that the hierarchy is also one
+ of levels of language. The highest level in the hierarchy involves a metalanguage that is
+ used to talk about lower levels, which too have a metalanguage to talk about levels
+ lower than them. Although this is clearly a hierarchy such that a level thrice removed
+ from the top, for example, would have difficulty communicating directly with the top
+ and vice versa given the difference in languages, Pask is very clear that this describes a
+
+ [...]
+
+ She goes so far as to point out that System Five in the VSM, the part of the organisation
+ involved in defining the identity and overall goals of the organisation, can be ‘just a
+ routine or an activity’ and ‘does not necessarily need to be an extra set of people’ (2013,
+ p. 12; see also 1999).
+ McEwan follows Pask’s account by making explicit the distinction between the two
+
+ [...]
+
+ command such that each level is subordinate to the levels above it and where the top
+ level has overall control over decision making in the organisation. Functional
+ hierarchy, however, applies to an organisation where ‘there are two or more levels of
+ information structure operating in the system’ (McEwan, [1963] 1987, p. 44).
+
+ [...]
+
+ the working groups consider their activities and adjust them if necessary in line with the
+ decided-upon goals of the organisation. Crucially, for an anarchist cybernetics and
+ VSM, everyone involved in the working groups can, potentially, be involved in the
+ General Assemblies and so in these System Three discussions. The same individuals
+ step out of their functional role as working group members and into that of reflecting on
+ their practice within working groups. System Four involves the same individuals again,
+ and also in the General Assemblies, reflecting on the activities of the working groups
+ and the organisation as a whole as well as its overall strategy in relation to events in the
+ outside world. Adjustments to both tactics and strategy can be made in light of changes
+
+ [...]
+
+ Elsewhere, Bakunin similarly argues that ‘all organizations must proceed by way of
+ federation from the base to the summit, from the commune to the coordinating
+ association of the country or nation’ (1971b: 82-83, italics in original). Here we have a
+ picture of a federated form of organisation in which smaller local organisations, free
+ associations or cooperatives, link up with one another at the level of the commune.
+ Communes then link up in a regional council and so on to the level of an international
+ council. This too is reflective of the recursivity that is essential to the VSM: any viable
+ system is itself a part of another viable system and has within it multiple viable systems.
+ Not only does the decision-making structure of an anarchist federation relate favourably
+ to that of organisational cybernetics, but so too does the very principle of federated
+ organisation, something Wiener in fact hints at (1961, p. 155) and of which Beer is
+ sometimes quite explicit in his support (see Medina, 2011, pp. 159-160).
+ McEwan, in his Anarchy article, makes this link between this syndicalist model of
+
+ [...]
+
+ Importantly, this is not enough for an anarchist version of cybernetics. A more explicitly
+ ethical and political autonomy, which values autonomy as an individual and collective
+ good over-and-above its role within organisational structure, needs to be introduced.
+ This brings into play a crucial distinction between the firm, as Beer conceives of it, and
+ radical left and anarchist organisation. While the firm may be viable on cybernetic
+ terms by including a functional autonomy, whereby individual operating units have
+ some scope for self-organisation and independent decision making, it will be shown that
+ radical left and anarchist organisation must combine this cybernetic demand with the
+ ethical and political demand that values individual and collective autonomy in and of
+ itself. The two sides of the anarchist coin, as I have described them above, must be
+ brought together. For now it is enough to note that while Beer’s work focusses on the
+ firm and, one can argue, takes that as a model of social organisation in general, an
+ anarchist cybernetics highlights a distinction that must be made between the firm, which
+ takes as a necessary condition autonomy as a function, and radical left and anarchist
+
+ [...]
+
+ Thinking about cybernetics and organisation along these lines, the work of science and
+ technology studies scholar Andrew Pickering (2010) becomes extremely important.
+ Rather than being focussed on representing an external reality with accuracy,
+ Pickering’s cybernetics is instead involved in performance. Performance is understood
+ as the actions we undertake in the world that demand a pragmatic and constructed
+ knowledge as opposed to a detailed representation of reality. 24 He describes this as a
+ ‘performative epistemology’: ‘a vision of knowledge as part of performance rather than
+ 24
+ This owes something of a debt to the American Pragmatism of Pierce, Dewey and others, although this
+
+ [...]
+
+ as an external control of it’ (ibid., p. 25, italics in original). The cybernetician, therefore,
+ is not engaged in unpacking and describing a reality (be it a machine, an animal, a
+ human being or a social phenomenon) but in facilitating performances or practices that
+ he or she is a part of. Cybernetics, in this regard, is committed to action and not simply
+ theorising about the nature of knowledge. This is evident in the work of Beer who, as I
+ have shown in the second chapter, was throughout his life heavily involved in practicing
+ cybernetics. Pickering highlights the fact that the very definition of cybernetics as
+ steering shows this connection with performance and practice (ibid., p. 30). It is a
+ science not of representing the objective mechanisms of control and communication but
+ of doing control and communication.
+ Interestingly, this turn towards science as performance in fact brings to the fore another
+
+
+ [...]
+
+ He also speaks of the importance of ‘radical transformation and listening’ (2010, pp. 42-
+ 43). While many more could be added, these seven goals (mutual respect, cooperation,
+ egalitarian decision-making, promotion of radical democratic vision, deconstruction of
+ borders, radical transformation and listening) will serve to demonstrate how a virtuous
+ anarchist mode of research can be conceived. In order to act virtuously as an anarchist, a
+ researcher must act so as to embody these goals. The researcher should aim to: (1) be
+ respectful of participants in research; (2) encourage cooperation in the research on the
+ part of the participants; (3) engage in egalitarian relationships with the participants; (4)
+ promote the radical democratic ideal of anarchism; (5) conduct the research in a
+ borderless fashion; (6) be radically transformative (i.e. live as radically transformed);
+ and (7) listen to participants. It should be noted that according to the prefigurative virtue
+ ethics outlined by Franks, these virtues and goals are negotiable and specific to
+
+ [...]
+
+ While it is not the focus of cybernetics, such an ethical approach can also be seen in the
+ work of von Foerster. In line with the second-order cybernetic concern for the
+ researcher as ‘a person who considers oneself to be a participant actor in the drama of
+ mutual interaction of the give and take in the circularity of human relations’ ([1991]
+ 2003, p. 289), von Foerster frames ethics as an understanding of the norms that govern
+ the practices we engage in. Rather than seeing scientific research as a practice involving
+ truth, von Foerster recasts it as involving trust, understanding, responsibility, reaching
+ out for the other and ‘a conspiracy, whose customs, rules, and regulations we are now
+ inventing’ (ibid., p. 294). 27 On this understanding, an ethics of research is
+ fundamentally an ethics of co-producing knowledge and von Foerster’s account of
+ second-order cybernetics links up well with the anarchist research ethics defined by
+
+ [...]
+
+ who wish to hinder and frustrate the movement with invaluable information about how
+ practices are organised. Franks (1992) warns that ‘the social sciences are the third
+ section of the intelligence gathering services. […] The state's liberal surveillance wing,
+ sociology, informs on what working class people are thinking and doing.’ He goes on to
+ say that sociologists aim to show ‘when working class people's actions and attitudes are
+ showing signs of becoming a threat to the stability of [the ruling] class’s dominant
+ position.’ This is a rather dramatic and perhaps unfair characterisation, but in general
+ concerns related to research as surveillance are warranted. There is a serious risk
+
+ [...]
+
+ associated with anarchist research that detailed information about successful anarchist
+ organising would be at the same time a guide to countering such organising. This is
+ perhaps especially true in the case of the research carried out here as this could provide
+ detailed information on the organisational dynamics of radical left groups and their
+ communication practices, and would allow security services to disrupt organisation and
+ communications at key points. In writing this thesis, care has therefore been taken to
+ reduce the risk of it being useful to those wishing to disrupt the movement. I have
+ allowed activists to review the transcripts of their interviews and highlight any details
+ that they would prefer to not be included or that they would prefer not attributed to
+ them.
+ This anarchist, prefigurative research ethics has much in common with ethics of care in
+
+ [...]
+
+ levels of an organisation is through the notions of tactics and strategy. Beer does just
+ this when he suggests that Systems One and Two are involved in tactics while System
+ Three is involved in strategy (ibid., p. 360; see also, e.g. Pickering, 2010, p. 245). This
+ is, I would argue, misleading as for Beer Systems Three and Four operate along similar
+ lines but with System Three focused on the internal environment and what happens at
+ Systems One and Two while System Four is focused on the external environment and
+ the potential future of the organisation. I want to think, therefore, of Systems Three and
+
+ [...]
+
+ important tactically to what radical left groups and activists do. In a social centre I used
+ to frequent there was a small model of a kitchen sink with written on it: ‘First the
+ washing up, then the revolution’. 41 The tactical repertoire of radical left groups includes
+ all this and more.
+ How does this distinction between tactics and strategy operate in anarchist organisation,
+
+ [...]
+
+ As an extension of the tactics-strategy dichotomy presented above, this suggests the role
+ of a third element of the politics of radical left groups and movements, what I want here
+ to refer to as ‘grand strategy’. The term ‘grand strategy’ was coined by American
+ military theorist John Boyd during the Cold War. 45 Boyd defines grand strategy as
+ pursuing ‘the national goal’ and amplifying ‘our spirit and strength (while undermining
+ and isolating our adversaries)’ (2005, slide 140). The notion of a ‘national goal’ is of
+ course very specific to a state-centred geo-political project such as a war and is certainly
+ at extreme odds with anarchism’s anti-militarism and anti-nationalism. Indeed, even the
+ idea of competition contained in Boyd’s definition of grand strategy is antithetical to the
+ relationships of mutual aid and cooperation. While ideas such as these are common in
+ some business and management accounts of strategy (see, e.g. Carter, Clegg and
+
+ [...]
+
+ Hopefully, I have shown that the answer to both of these has to be negative. For Beer,
+ organisational cybernetics is about defining the necessary and sufficient conditions,
+ based on the need to handle complexity, for viable organisation. This does not need to
+ result in a centralised, bureaucratic and authoritarian structure but can be grounded in
+ one that relies on autonomy. By formulating an anarchist cybernetics, I want to show
+ that while Beer maintains the basic structure of capitalist enterprise, with a middle
+ management layer and a senior executive level at the top, these are not necessary for
+ viability. This is the core difference between Beer’s cybernetics and the anarchist
+ cybernetics I am arguing for here. To give Beer the credit he is due, his account of how
+ organisations should determine goals does touch on non-hierarchical processes, as
+ Pickering argues (2010: 272). Anarchist cybernetics shows how tactics, strategy and
diff --git a/books/sociology/counterrevolution.md b/books/sociology/counterrevolution.md
new file mode 100644
index 0000000..86934fa
--- /dev/null
+++ b/books/sociology/counterrevolution.md
@@ -0,0 +1,1875 @@
+[[!meta title="The Counterrevolution"]]
+
+* [The Counterrevolution](http://bernardharcourt.com/the-counterrevolution/).
+* By Bernard E. Harcourt.
+
+## Index
+
+[[!toc startlevel=2 levels=4]]
+
+## Genealogy
+
+### Mass-scale warfare
+
+* MAD
+* Massive retaliation
+* Game theory
+* Systems analisys
+* Nuclear war
+
+### Counterinsurgency
+
+* Modern warfare
+* Unconventional, counter-guerrila
+* Special Ops
+* Surgical operations
+
+### Mao's “Eight Points of Attention” plus two principles
+
+1. Talk to people politely.
+2. Observe fair dealing in all business transactions.
+3. Return everything borrowed from the people.
+4. Pay for anything damaged.
+5. Do not beat or scold the people.
+6. Do not damage crops.
+7. Do not molest women.
+8. Do not ill-treat prisoners-of-war.
+
+ Two other principles were central to Mao’s revolutionary doctrine: first, the
+ importance of having a unified political and military power structure that
+ consolidated, in the same hands, political and military considerations; and
+ second, the importance of psychological warfare. More specifically, as Paret
+ explained, “proper psychological measures could create and maintain ideological
+ cohesion among fighters and their civilian supporters.” 7
+
+### Paret's (1960) tasks of “counterguerrilla action”
+
+1. The military defeat of the guerrilla forces.
+2. The separation of the guerrilla from the population.
+3. The reestablishment of governmental authority and the development of a viable social order.
+
+### Petraeus: 3 key pillars
+
+1. "The first is that the most important struggle is over the population."
+
+2. "Allegiance of the masses can only be secured
+ by separating the small revolutionary minority from the passive majority, and by
+ isolating, containing, and ultimately eliminating the active minority. In his
+ accompanying guidelines,"
+
+3. "Success turns on collecting information on
+ everyone in the population. Total information is essential to properly distinguish
+ friend from foe and then extract the revolutionary minority. It is intelligence—
+ total information awareness—that renders the counterinsurgency possible."
+
+## Excerpts
+
+### Torture
+
+ In Modern Warfare, Trinquier quietly but resolutely condoned torture. The
+ interrogations and related tasks were considered police work, as opposed to
+ military operations, but they had the exact same mission: the complete
+ destruction of the insurgent group. Discussing the typical interrogation of a
+ detainee, captured and suspected of belonging to a terrorist organization,
+ Trinquier wrote: “No lawyer is present for such an interrogation. If the prisoner
+ gives the information requested, the examination is quickly terminated; if not,
+ specialists must force his secret from him. Then, as a soldier, he must face the
+ suffering, and perhaps the death, he has heretofore managed to avoid.” Trinquier
+ described specialists forcing secrets out of suspects using scientific methods that
+ did not injure the “integrity of individuals,” but it was clear what those
+ “scientific” methods entailed. 4 As the war correspondent Bernard Fall suggests,
+ the political situation in Algeria offered Trinquier the opportunity to develop “a
+ Cartesian rationale” to justify the use of torture in modern warfare. 5
+ Similarly minded commanders championed the use of torture, indefinite
+ detention, and summary executions. They made no bones about it.
+
+ [...]
+
+ In his autobiographical account published in 2001, Services Spéciaux. Algérie
+ 1955–1957, General Paul Aussaresses admits to the brutal methods that were the
+ cornerstone of his military strategy. 6 He makes clear that his approach to
+ counterinsurgency rested on a three-pronged strategy, which included first,
+ intelligence work; second, torture; and third, summary executions. The
+ intelligence function was primordial because the insurgents’ strategy in Algeria
+ was to infiltrate and integrate the population, to blend in perfectly, and then
+ gradually to involve the population in the struggle. To combat this insurgent
+ strategy required intelligence—the only way to sort the dangerous
+ revolutionaries from the passive masses—and then, violent repression. “The first
+ step was to dispatch the clean-up teams, of which I was a part,” Aussaresses
+ writes. “Rebel leaders had to be identified, neutralized, and eliminated discreetly.
+ By seeking information on FLN leaders I would automatically be able to capture
+ the rebels and make them talk.” 7
+ The rebels were made to talk by means of torture. Aussaresses firmly
+ believed that torture was the best way to extract information. It also served to
+ terrorize the radical minority and, in the process, to reduce it. The practice of
+ torture was “widely used in Algeria,” Aussaresses acknowledges. Not on every
+ prisoner, though; many spoke freely. “It was only when a prisoner refused to talk
+ or denied the obvious that torture was used.” 8
+ Aussaresses claims he was introduced to torture in Algeria by the policemen
+ there, who used it regularly. But it quickly became routine to him. “Without any
+ hesitation,” he writes, “the policemen showed me the technique used for
+ ‘extreme’ interrogations: first, a beating, which in most cases was enough; then
+ other means, such as electric shocks, known as the famous ‘gégène’; and finally
+ water.” Aussaresses explains: “Torture by electric shock was made possible by
+ generators used to power field radio transmitters, which were extremely
+ common in Algeria. Electrodes were attached to the prisoner’s ears or testicles,
+ then electric charges of varying intensity were turned on. This was apparently a
+ well-known procedure and I assumed that the policemen at Philippeville [in
+ Algeria] had not invented it.” 9 (Similar methods had, in fact, been used earlier in
+ Indochina.)
+
+ Aussaresses could not have been more clear:
+
+ The methods I used were always the same: beatings, electric shocks, and, in particular, water
+ torture, which was the most dangerous technique for the prisoner. It never lasted for more than one
+ hour and the suspects would speak in the hope of saving their own lives. They would therefore
+ either talk quickly or never.
+
+ The French historian Benjamin Stora confirms the generalized use of torture.
+ He reports that in the Battle of Algiers, under the commanding officer, General
+ Jacques Massu, the paratroopers conducted massive arrests and “practiced
+ torture” using “electrodes […] dunking in bathtubs, beatings.” General Massu
+ himself would later acknowledge the use of torture. In a rebuttal he wrote in
+ 1971 to the film The Battle of Algiers, Massu described torture as “a cruel
+ necessity.” 10 According to Aussaresses, torture was condoned at the highest
+ levels of the French government. “Regarding the use of torture,” Aussaresses
+
+ [...]
+
+ For Aussaresses, as for Roger Trinquier, torture and disappearances were
+ simply an inevitable byproduct of an insurgency—inevitable on both sides of the
+ struggle. Because terrorism was inscribed in revolutionary strategy, it had to be
+ used in its repression as well. In a fascinating televised debate in 1970 with the
+ FLN leader and producer of The Battle of Algiers, Saadi Yacef, Trinquier
+ confidently asserted that torture was simply a necessary and inevitable part of
+ modern warfare. Torture will take place. Insurgents know it. In fact, they
+ anticipate it. The passage is striking:
+
+ I have to tell you. Whether you’re for or against torture, it makes no difference. Torture is a
+ weapon that will be used in every insurgent war. One has to know that… One has to know that in
+ an insurgency, you are going to be tortured.
+ And you have to mount a subversive organization in light of that and in function of torture. It is
+ not a question of being for or against torture. You have to know that all arrested prisoners in an
+ insurgency will speak—unless they commit suicide. Their confession will always be obtained. So a
+ subversive organization must be mounted in function of that, so that a prisoner who speaks does
+ not give away the whole organization.16
+
+ “Torture?” asks the lieutenant aide de camp in Henri Alleg’s 1958 exposé
+ The Question. “You don’t make war with choirboys.” 18 Alleg, a French
+ journalist and director of the Alger républicain newspaper, was himself detained
+ and tortured by French paratroopers in Algiers. His book describes the
+ experience in detail, and in his account, torture was the inevitable product of
+ colonization and the anticolonial struggle. As Jean-Paul Sartre writes in his
+
+ [...]
+
+ In an arresting part of The Battle of Algiers it becomes clear that many of the
+ French officers who tortured suspected FLN members had themselves, as
+ members of the French Resistance, been victims of torture at the hands of the
+ Gestapo. It is a shocking moment. We know, of course, that abuse often begets
+ abuse; but nevertheless, one would have hoped that a victim of torture would
+ recoil from administering it to others. Instead, as Trinquier suggests, torture
+ became normalized in Algeria. This is, as Sartre describes it, the “terrible truth”:
+ “If fifteen years are enough to transform victims into executioners, then this
+ behavior is not more than a matter of opportunity and occasion. Anybody, at any
+ time, may equally find himself victim or executioner.” 20
+
+### Misc
+
+ The central tenet of counterinsurgency theory is that populations—originally
+ colonial populations, but now all populations, including our own—are made up
+ of a small active minority of insurgents, a small group of those opposed to the
+ insurgency, and a large passive majority that can be swayed one way or the other.
+ The principal objective of counterinsurgency is to gain the allegiance of that
+ passive majority. And its defining feature is that counterinsurgency is not just a
+ military strategy, but more importantly a political technique. Warfare, it turns
+ out, is political.
+
+ On the basis of these tenets, counterinsurgency theorists developed and
+ refined over several decades three core strategies. First, obtain total information:
+ every communication, all personal data, all metadata of everyone in the
+ population must be collected and analyzed. Not just the active minority, but
+ everyone in the population. Total information awareness is necessary to
+ distinguish between friend and foe, and then to cull the dangerous minority from
+ the docile majority. Second, eradicate the active minority: once the dangerous
+ minority has been identified, it must be separated from the general population
+
+ [...]
+
+ and eliminated by any means possible—it must be isolated, contained, and
+ ultimately eradicated. Third, gain the allegiance of the general population:
+ everything must be done to win the hearts and minds of the passive majority. It is
+ their allegiance and loyalty, and passivity in the end, that matter most.
+ Counterinsurgency warfare has become our new governing paradigm in the
+
+ [...]
+
+ imagination. It drives our foreign affairs and now our domestic policy as well.
+ But it was not always that way. For most of the twentieth century, we
+ governed ourselves differently in the United States: our political imagination
+ was dominated by the massive battlefields of the Marne, of Verdun, by the
+ Blitzkrieg and the fire-bombing of Dresden—and by the use of the atomic bomb.
+
+ [...]
+
+ warfare.
+ Yet the transition from large-scale battlefield warfare to anticolonial struggles
+ and the Cold War in the 1950s, and to the war against terrorism since 9/11, has
+ brought about a historic transformation in our political imagination and in the
+ way that we govern ourselves. In contrast to the earlier sweeping military
+ paradigm, we now engage in surgical microstrategies of counterinsurgency
+ abroad and at home. This style of warfare—the very opposite of large-scale
+ battlefield wars like World War I or II—involves total surveillance, surgical
+ operations, targeted strikes to eliminate small enclaves, psychological tactics,
+ and political techniques to gain the trust of the people. The primary target is no
+ longer a regular army, so much as it is the entire population. It involves a new
+
+ [...]
+
+ The result is radical. We are now witnessing the triumph of a counterinsurgency
+ model of government on American soil in the absence of an insurgency, or
+ uprising, or revolution. The perfected logic of counterinsurgency now applies
+ regardless of whether there is a domestic insurrection. We now face a
+ counterinsurgency without insurgency. A counterrevolution without revolution.
+ The pure form of counterrevolution, without a revolution, as a simple modality
+ of governing at home—what could be called “The Counterrevolution.”
+ Counterinsurgency practices were already being deployed domestically in the
+
+ [...]
+
+ new internal enemies. It is vital that we come to grips with this new mode of
+ governing and recognize its unique dangers, that we see the increasingly
+ widespread domestication of counterinsurgency strategies and the new
+ technologies of digital surveillance, drones, and hypermilitarized police for what
+ they are: a counterrevolution without a revolution. We are facing something
+ radical, new, and dangerous. It has been long in the making, historically. It is
+ time to identify and expose it.
+
+
+ [...]
+
+ so on. I argued that we have become an “expository society” where we
+ increasingly exhibit ourselves online, and in the process, freely give away our
+ most personal and private data. No longer an Orwellian or a panoptic society
+ characterized by a powerful central government forcibly surveilling its citizens
+ from on high, ours is fueled by our own pleasures, proclivities, joys, and
+ narcissism. And even when we try to resist these temptations, we have
+ practically no choice but to use the Internet and shed our digital traces.
+ I had not fully grasped, though, the relation of our new expository society to
+
+ [...]
+
+ strikes, indefinite detention, or our new hypermilitarized police force at home.
+ But as the fog lifts from 9/11, the full picture becomes clear. The expository
+ society is merely the first prong of The Counterrevolution. And only by tying
+ together our digital exposure with our new mode of counterinsurgency
+ governance can we begin to grasp the whole architecture of our contemporary
+ political condition. And only by grasping the full implications of this new mode
+ of governing—The Counterrevolution—will we be able to effectively resist it
+ and overcome.
+
+ [...]
+
+ approach targeting small revolutionary insurgencies and what were mostly
+ Communist uprisings. Variously called “unconventional,” “antiguerrilla” or
+ “counterguerrilla,” “irregular,” “sublimited,” “counterrevolutionary,” or simply
+ “modern” warfare, this burgeoning domain of military strategy flourished during
+ France’s wars in Indochina and Algeria, Britain’s wars in Malaya and Palestine,
+ and America’s war in Vietnam. It too was nourished by the RAND Corporation,
+ which was one of the first to see the potential of what the French commander
+ Roger Trinquier called “modern warfare” or the “French view of
+ counterinsurgency.” It offered, in the words of one of its leading students, the
+ historian Peter Paret, a vital counterweight “at the opposite end of the spectrum
+ from rockets and the hydrogen bomb.” 2
+ Like nuclear-weapon strategy, the counterinsurgency model grew out of a
+
+
+ [...]
+
+ from rockets and the hydrogen bomb.” 2
+ Like nuclear-weapon strategy, the counterinsurgency model grew out of a
+ combination of strategic game theory and systems theorizing; but unlike nuclear
+ strategy, which was primarily a response to the Soviet Union, it developed more
+ in response to another formidable game theorist, Mao Zedong. The formative
+ moment for counterinsurgency theory was not the nuclear confrontation that
+ characterized the Cuban Missile Crisis, but the earlier Chinese Civil War that led
+ to Mao’s victory in 1949—essentially, when Mao turned guerrilla tactics into a
+ revolutionary war that overthrew a political regime. The central methods and
+ practices of counterinsurgency warfare were honed in response to Mao’s
+ strategies and the ensuing anticolonial struggles in Southeast Asia, the Middle
+ East, and North Africa that imitated Mao’s approach. 3 Those struggles for
+ independence were the breeding soil for the development and perfection of
+ unconventional warfare.
+ By the turn of the twentieth century, when President George W. Bush would
+
+ [...]
+
+ T HE COUNTERINSURGENCY MODEL CAN BE TRACED BACK through several different
+ genealogies. One leads to British colonial rule in India and Southeast Asia, to the
+ insurgencies there, and to the eventual British redeployment and modernization
+ of counterinsurgency strategies in Northern Ireland and Britain at the height of
+ the Irish Republican Army’s independence struggles. This first genealogy draws
+ heavily on the writings of the British counterinsurgency theorist Sir Robert
+ Thompson, the chief architect of Great Britain’s antiguerrilla strategies in
+ Malaya from 1948 to 1959. Another genealogy traces back to the American
+ colonial experience in the Philippines at the beginning of the twentieth century.
+ Others lead back to Trotsky and Lenin in Russia, to Lawrence of Arabia during
+ the Arab Revolt, or even to the Spanish uprising against Napoleon—all
+ mentioned, at least briefly, in General Petraeus’s counterinsurgency field
+ manual. Alternative genealogies reach back to the political theories of
+ Montesquieu or John Stuart Mill, while some go even further to antiquity and to
+ the works of Polybius, Herodotus, and Tacitus. 1
+ But the most direct antecedent of counterinsurgency warfare as embraced by
+ the United States after 9/11 was the French military response in the late 1950s
+ and 1960s to the anticolonial wars in Indochina and Algeria. This genealogy
+ passes through three important figures—the historian Peter Paret and the French
+ commanders David Galula and Roger Trinquier—and, through them, it traces
+ back to Mao Zedong. It is Mao’s idea of the political nature of
+ counterinsurgency that would prove so influential in the United States. Mao
+ politicized warfare in a manner that would come back to haunt us today. The
+ French connection also laid the seeds of a tension between brutality and legality
+ that would plague counterinsurgency practices to the present—at least, until the
+ United States discovered, or rediscovered, a way to resolve the tension by
+ legalizing the brutality.
+
+
+ [...]
+
+ A founding principle of revolutionary insurgency—what Paret referred to as
+ “the principal lesson” that Mao taught—was that “an inferior force could
+ outpoint a modern army so long as it succeeded in gaining at least the tacit
+ support of the population in the contested area.” 4 The core idea was that the
+ military battle was less decisive than the political struggle over the loyalty and
+ allegiance of the masses: the war is fought over the population or, in Mao’s
+ words, “The army cannot exist without the people.” 5
+ As a result of this interdependence, the insurgents had to treat the general
+ population well to gain its support. On this basis Mao formulated early on, in
+ 1928, his “Eight Points of Attention” for army personnel:
+
+ 1. Talk to people politely.
+ 2. Observe fair dealing in all business transactions.
+ 3. Return everything borrowed from the people.
+ 4. Pay for anything damaged.
+ 5. Do not beat or scold the people.
+ 6. Do not damage crops.
+ 7. Do not molest women.
+ 8. Do not ill-treat prisoners-of-war. 6
+
+ Two other principles were central to Mao’s revolutionary doctrine: first, the
+ importance of having a unified political and military power structure that
+ consolidated, in the same hands, political and military considerations; and
+ second, the importance of psychological warfare. More specifically, as Paret
+ explained, “proper psychological measures could create and maintain ideological
+ cohesion among fighters and their civilian supporters.” 7
+ Revolutionary warfare, in Paret’s view, boiled down to a simple equation:
+
+ [...]
+
+ the population.” 10
+ Of course, neither Paret nor other strategists were so naïve as to think that
+ Mao invented guerrilla warfare. Paret spent much of his research tracing the
+ antecedents and earlier experiments with insurgent and counterinsurgency
+ warfare. “Civilians taking up arms and fighting as irregulars are as old as war,”
+ Paret emphasized. Caesar had to deal with them in Gaul and Germania, the
+ British in the American colonies or in South Africa with the Boers, Napoleon in
+ Spain, and on and on. In fact, as Paret stressed, the very term “guerrilla”
+ originated in the Spanish peasant resistance to Napoleon after the Spanish
+ monarchy had fallen between 1808 and 1813. Paret developed case studies of the
+
+ [...]
+
+ But for purposes of describing the “guerre révolutionnaire” of the 1960s, the
+ most pertinent and timely objects of study were Mao Zedong and the Chinese
+ revolution. And on the basis of that particular conception of revolutionary war,
+ Paret set forth a model of counterrevolutionary warfare. Drawing principally on
+ French military practitioners and theorists, Paret delineated a three-pronged
+ strategy focused on a mixture of intelligence gathering, psychological warfare on
+ both the population and the subversives, and severe treatment of the rebels. In
+ Guerrillas in the 1960’s, Paret reduced the tasks of “counterguerrilla action” to
+ the following:
+ 1. The military defeat of the guerrilla forces.
+ 2. The separation of the guerrilla from the population.
+ 3. The reestablishment of governmental authority and the development of a
+ viable social order. 12
+
+ [...]
+
+ interact.” 13
+ So the central task, according to Paret, was to attack the rebel’s popular
+ support so that he would “lose his hold over the people, and be isolated from
+ them.” There were different ways to accomplish this, from widely publicized
+ military defeats and sophisticated psychological warfare to the resettlement of
+ populations—in addition to other more coercive measures. But one rose above
+ the others for Paret: to encourage the people to form progovernment militias and
+ fight against the guerrillas. This approach had the most potential, Paret observes:
+ “Once a substantial number of members of a community commit violence on
+
+
+ [...]
+
+ In sum, the French model of
+ counterrevolutionary warfare, in Paret’s view, had to be understood as the
+ inverse of revolutionary warfare.
+
+
+ [...]
+
+ The main sources for Paret’s synthesis were the writings and practices of French
+ commanders on the ground, especially Roger Trinquier and David Galula,
+ though there were others as well. 15 Trinquier, one of the first French
+ commanders to theorize modern warfare based on his firsthand experience, had a
+
+
+ [...]
+
+ persisting in repeating its efforts.” Trinquier argues that this new form of modern
+ warfare called for “an interlocking system of actions—political, economic,
+ psychological, military,” grounded on “Countrywide Intelligence.” As Trinquier
+ emphasizes, “since modern warfare asserts its presence on the totality of the
+ population, we have to be everywhere informed.” Informed, in order to know and
+ target the population and wipe out the insurgency. 17
+ The other leading counterinsurgency theorist, also with deep firsthand
+
+
+ [...]
+
+ time.’” 19
+ From Mao, Galula drew the central lesson that societies were divided into
+ three groups and that the key to victory was to isolate and eradicate the active
+ minority in order to gain the allegiance of the masses. Galula emphasizes in
+ Counterinsurgency Warfare that the central strategy of counterinsurgency theory
+ “simply expresses the basic tenet of the exercise of political power”:
+ In any situation, whatever the cause, there will be an active minority for the cause, a neutral
+ majority, and an active minority against the cause.
+
+ [...]
+
+ time.’” 19
+ From Mao, Galula drew the central lesson that societies were divided into
+ three groups and that the key to victory was to isolate and eradicate the active
+ minority in order to gain the allegiance of the masses. Galula emphasizes in
+ Counterinsurgency Warfare that the central strategy of counterinsurgency theory
+ “simply expresses the basic tenet of the exercise of political power”:
+ In any situation, whatever the cause, there will be an active minority for the cause, a neutral
+ majority, and an active minority against the cause.
+
+ The technique of power consists in relying on the favorable minority in order to rally the neutral
+ majority and to neutralize or eliminate the hostile minority.20
+ The battle was over the general population, Galula emphasized in his
+ Counterinsurgency Warfare, and this tenet represented the key political
+ dimension of a new warfare strategy.
+
+ [...]
+
+ US general David Petraeus picked up right where David Galula and Peter Paret
+ left off. Widely recognized as the leading American thinker and practitioner of
+ counterinsurgency theory—eventually responsible for all coalition troops in Iraq
+ and the architect of the troop surge of 2007—General Petraeus would refine
+
+ [...]
+
+ On this political foundation, General Petraeus’s manual establishes three key
+ pillars—what might be called counterinsurgency’s core principles.
+ The first is that the most important struggle is over the population. In a short
+ set of guidelines that accompanies his field manual, General Petraeus
+ emphasizes: “The decisive terrain is the human terrain. The people are the center
+
+ [...]
+
+ The main battle, then, is over the populace.
+ The second principle is that the allegiance of the masses can only be secured
+ by separating the small revolutionary minority from the passive majority, and by
+ isolating, containing, and ultimately eliminating the active minority. In his
+ accompanying guidelines, General Petraeus emphasizes: “Seek out and eliminate
+ those who threaten the population. Don’t let them intimidate the innocent. Target
+ the whole network, not just individuals.” 25
+ The third core principle is that success turns on collecting information on
+ everyone in the population. Total information is essential to properly distinguish
+ friend from foe and then extract the revolutionary minority. It is intelligence—
+ total information awareness—that renders the counterinsurgency possible. It is
+
+ [...]
+
+ paraphrasing the French commander, underscores the primacy of political factors
+ in counterinsurgency. “General Chang Ting-chen of Mao Zedong’s central
+ committee once stated that revolutionary war was 80 percent political action and
+ only 20 percent military,” the manual reads. Then it warns: “At the beginning of
+ a COIN operation, military actions may appear predominant as security forces
+ conduct operations to secure the populace and kill or capture insurgents;
+ however, political objectives must guide the military’s approach.” 27
+ Chapter Two opens with an epigraph from David Galula’s book: “Essential
+
+ [...]
+
+ General David Petraeus learned, but more importantly popularized, Mao
+ Zedong’s central lesson: counterinsurgency warfare is political. It is a strategy
+ for winning over the people. It is a strategy for governing. And it is quite telling
+ that a work so indebted to Mao and midcentury French colonial thinkers would
+ become so influential post-9/11. Petraeus’s manual contained a roadmap for a
+ new paradigm of governing. As the fog lifts from 9/11, it is becoming
+ increasingly clear what lasting impact Mao had on our government of self and
+ others today.
+
+ [...]
+
+ D eveloped by military commanders and strategists over decades of anticolonial
+ wars, counterinsurgency warfare was refined, deployed, and tested in the years
+ following 9/11. Since then, the modern warfare paradigm has been distilled into
+ a concise three-pronged strategy:
+ 1. Bulk-collect all intelligence about everyone in the population—every
+ piece of data and metadata available. (total information awareness)
+
+ [...]
+
+ 2. Identify and eradicate the revolutionary minority. Total information about
+ everyone makes it possible to discriminate between friend and foe. Once
+ suspicion attaches, individuals must be treated severely to extract all
+ possible information, with enhanced interrogation techniques if
+ necessary; and if they are revealed to belong to the active minority, they
+ must be disposed of through detention, rendition, deportation, or drone
+ strike—in other words, targeted assassination. Unlike conventional
+ soldiers from the past, these insurgents are dangerous because of their
+
+ [...]
+
+ 3. Pacify the masses. The population must be distracted, entertained,
+ satisfied, occupied, and most importantly, neutralized, or deradicalized if
+ necessary, in order to ensure that the vast preponderance of ordinary
+ individuals remain just that—ordinary. This third prong reflects the
+ “population-centric” dimension of counterinsurgency theory. Remember,
+ in this new way of seeing, the population is the battlefield. Its hearts and
+ minds must be assured. In the digital age, this can be achieved, first, by
+ targeting enhanced content (such as sermons by moderate imams) to
+ deradicalize susceptible persons—in other words, by deploying new
+ digital techniques of psychological warfare and propaganda. Second, by
+ providing just the bare minimum in terms of welfare and humanitarian
+ assistance—like rebuilding schools, distributing some cash, and
+ bolstering certain government institutions. As General Petraeus’s field
+
+### Torture and surveilance
+
+ T HE ATTACK ON THE W ORLD T RADE C ENTER SHOWED THE weakness of American
+ intelligence gathering. Top secret information obtained by one agency was
+ silo’ed from others, making it impossible to aggregate intelligence and obtain a
+ full picture of the security threats. The CIA knew that two of the 9/11 hijackers
+ were on American soil in San Diego, but didn’t share the information with the
+ FBI, who were actively trying to track them down. 1 September 11 was a
+ crippling intelligence failure, and in the immediacy of that failure many in
+ President George W. Bush’s administration felt the need to do something radical.
+ Greater sharing of intelligence, naturally. But much more as well. Two main
+ solutions were devised, or revived: total surveillance and tortured interrogations.
+ They represent the first prong of the counterinsurgency approach.
+ In effect, 9/11 set the stage both for total NSA surveillance and torture as
+ forms of total information awareness. The former functioned at the most virtual
+ or ethereal, or “digital” level, by creating the material for data-mining and
+ analysis. The latter operated at the most bodily or physical, or “analog” level,
+ obtaining information directly from suspects and detainees in Iraq, Pakistan,
+ Afghanistan, and elsewhere. But both satisfied the same goal: total information
+ awareness, the first tactic of counterinsurgency warfare.
+
+Census
+
+ What is clear, though—as I document in Exposed—is that the myriad NSA,
+ FBI, CIA, and allied intelligence agencies produce total information, the first
+ and most important prong of the counterinsurgency paradigm. Most important,
+ because both of the other prongs depend on it. As the RAND Corporation notes
+ in its lengthy 519-page report on the current state of counterinsurgency theory
+ and practice, “Effective governance depends on knowing the population,
+ demographically and individually.” The RAND report reminds us that this
+ insight is not novel or new. The report then returns, pointedly for us, to Algeria
+ and the French commander, David Galula: “Galula, in Counterinsurgency
+ Warfare, argued that ‘control of the population begins with a thorough census.
+ Every inhabitant must be registered and given a foolproof identity card.’” 5
+
+ [...]
+
+ Today, that identity card is an IP address, a mobile phone, a digital device, facial
+ recognition, and all our digital stamps. These new digital technologies have
+ made everyone virtually transparent. And with our new ethos of selfies, tweets,
+ Facebook, and Internet surfing, everyone is now exposed.
+
+Enhanced interrogation:
+
+ Second, tortured interrogation. The dual personality of counterinsurgency
+ warfare is nowhere more evident than in the intensive use of torture for
+ information gathering by the United States immediately after 9/11. Fulfilling the
+ first task of counterinsurgency theory—total surveillance—this practice married
+ the most extreme form of brutality associated with modern warfare to the
+ formality of legal process and the rule of law. The combination of inhumanity
+ and legality was spectacular.
+ In the days following 9/11, many in the Bush administration felt there was
+ only one immediate way to address the information shortfall, namely, to engage
+ in “enhanced interrogation” of captured suspected terrorists—another
+ euphemism for torture. Of course, torture of captured suspects would not fix the
+ problem of silo’ed information, but they thought it would at least provide
+ immediate information of any pending attacks. One could say that the United
+ States turned to torture because many in the administration believed the country
+ did not have adequate intelligence capabilities, lacking the spy network or even
+ the language abilities to infiltrate and conduct regular espionage on
+ organizations like Al Qaeda. 6
+ The tortured interrogations combined the extremes of brutality with the
+
+Getting information or "truth" was not the only, perhaps not the main point
+of torture sessions, and maybe not as well the main point for mass surveillance:
+
+ Even the more ordinary instances of “enhanced interrogation” were
+ harrowing—and so often administered, according to the Senate report, after the
+ interrogators believed there was no more information to be had, sometimes even
+ before the detainee had the opportunity to speak.
+
+Torture template:
+
+ Ramzi bin al-Shibh was subjected to this type of treatment immediately upon
+ arrival in detention, even before being interrogated or given an opportunity to
+ cooperate—in what would become a “template” for other detainees. Bin al-
+ Shibh was subjected first to “sensory dislocation” including “shaving bin al-
+ Shibh’s head and face, exposing him to loud noise in a white room with white
+ lights, keeping him ‘unclothed and subjected to uncomfortably cool
+ temperatures,’ and shackling him ‘hand and foot with arms outstretched over his
+ head (with his feet firmly on the floor and not allowed to support his weight with
+ his arms).’” Following that, the interrogation would include “attention grasp,
+ walling, the facial hold, the facial slap… the abdominal slap, cramped
+ confinement, wall standing, stress positions, sleep deprivation beyond 72 hours,
+ and the waterboard, as appropriate to [bin al-Shibh’s] level of resistance.” 8 This
+ template would be used on others—and served as a warning to all.
+ The more extreme forms of torture were also accompanied by the promise of
+
+"Bigeard shrimp":
+
+ The more extreme forms of torture were also accompanied by the promise of
+ life-long solitary confinement or, in the case of death, cremation.
+ Counterinsurgency torture in the past had often been linked to summary
+ disappearances and executions. Under the Bush administration, it was tied to
+ what one might call virtual disappearances.
+ During the Algerian war, as noted already, the widespread use of brutal
+ interrogation techniques meant that those who had been victimized—both the
+ guilty and innocent—became dangerous in the eyes of the French military
+ leadership. FLN members needed to be silenced, forever; but so did others who
+ might be radicalized by the waterboarding or gégène. In Algeria, a simple
+ solution was devised: the tortured would be thrown out from helicopters into the
+ Mediterranean. They became les crevettes de Bigeard, after the notorious French
+ general in Algeria, Marcel Bigeard: “Bigeard’s shrimp,” dumped into the sea,
+ their feet in poured concrete—a technique the French military had apparently
+ experimented with earlier in Indochina.
+
+ [...]
+
+ The CIA would devise a different solution in 2002: either torture the suspect
+ accidentally to death and then cremate his body to avoid detection, or torture the
+ suspect to the extreme and then ensure that he would never again talk to another
+ human being. Abu Zubaydah received the latter treatment. Zubaydah had first
+ been seized and interrogated at length by the FBI, had provided useful
+ information, and was placed in isolation for forty-seven days, the FBI believing
+ that he had no more valuable information. Then the CIA took over, believing he
+ might still be a source. 10 The CIA turned to its more extreme forms of torture—
+ utilizing all ten of its most brutal techniques—but, as a CIA cable from the
+ interrogation team, dated July 15, 2002, records, they realized beforehand that it
+ would either have to cover up the torture if death ensued or ensure that
+ Zubaydah would never talk to another human being again in his lifetime.
+ According to the Senate report, “the cable stated that if Abu Zubaydah were to
+ die during the interrogation, he would be cremated. The interrogation team
+ closed the cable by stating: ‘regardless which [disposition] option we follow
+ however, and especially in light of the planned psychological pressure
+ techniques to be implemented, we need to get reasonable assurances that [Abu
+ Zubaydah] will remain in isolation and incommunicado for the remainder of his
+ life.’” 11 In response to this request for assurance, a cable from the CIA station
+ gave the interrogation team those assurances, noting that “it was correct in its
+ ‘understanding that the interrogation process takes precedence over preventative
+ medical procedures,’” and then adding in the cable:
+
+KUBARK
+
+ routines were approved at the uppermost level of the US government, by the
+ president of the United States and his closest advisers. These practices were put
+ in place, designed carefully and legally—very legalistically, in fact—to be used
+ on suspected enemies. They were not an aberration. There are, to be sure, long
+ histories written of rogue intelligence services using unauthorized techniques;
+ there is a lengthy record, as well, of CIA ingenuity and creativity in this domain,
+ including, among other examples, the 1963 KUBARK Counterintelligence
+ Interrogation manual. 13 But after 9/11, the blueprint was drawn at the White
+ House and the Pentagon, and it became official US policy—deliberate, debated,
+ well-thought-out, and adopted as legal measures.
+
+
+ [...]
+
+ The Janus face of torture was its formal legality amidst its shocking brutality.
+ Many of the country’s best lawyers and legal scholars, professors at top-ranked
+ law schools, top government attorneys, and later federal judges would pore over
+ statutes and case law to find legal maneuvers to permit torture. The felt need to
+ legitimate and legalize the brutality—and of course, to protect the officials and
+ operatives from later litigation—was remarkable.
+ The documents known collectively as the “torture memos” fell into two
+ categories: first, those legal memos regarding whether the Guantánamo detainees
+ were entitled to POW status under the Geneva Conventions (GPW), written
+ between September 25, 2001, and August 1, 2002; and second, starting in
+ August 2002, the legal memos regarding whether the “enhanced interrogation
+ techniques” envisaged by the CIA amounted to torture prohibited under
+ international law.
+
+How torture was defined to allow torture to happen:
+
+ As Jay Bybee, then at the Office of Legal Counsel and now a
+ federal judge, wrote in his August 1, 2002, memo:
+
+ We conclude that torture as defined in and proscribed by [18 US Code] Sections 2340-2340A,
+ covers only extreme acts. Severe pain is generally of the kind difficult for the victim to endure.
+ Where the pain is physical, it must be of an intensity akin to that which accompanies serious
+ physical injury such as death or organ failure. Severe mental pain requires suffering not just at the
+ moment of infliction but also requires lasting psychological harm, such as seen in mental disorders
+ like post-traumatic stress disorder. […] Because the acts inflicting torture are extreme, there is
+ significant range of acts that though they might constitute cruel, inhuman, or degrading treatment
+ or punishment fail to rise to the level of torture.22
+
+ This definition of torture was so demanding that it excluded the brutal
+ practices that the United States was using. It set the federal legal standard,
+ essentially, at death or organ failure.
+
+ [...]
+
+ them 26 —and then, effectively, judicial opinions. The executive branch became a
+ minijudiciary, with no effective oversight or judicial review. And in the end, it
+ worked. The men who wrote these memos have never been prosecuted nor
+ seriously taken to task, as a legal matter, for their actions. The American people
+ allowed a quasi-judiciary to function autonomously, during and after. These self-
+ appointed judges wrote the legal briefs, rendered judgment, and wrote the
+ judicial opinions that legitimized these brutal counterinsurgency practices. In the
+ process, they rendered the counterinsurgency fully legal. They inscribed torture
+ within the fabric of law.
+
+ One could go further. The torture memos accomplished a new resolution of
+ the tension between brutality and legality, one that we had not witnessed
+ previously in history. It was an audacious quasi-judicial legality that had rarely
+ been seen before. And by legalizing torture in that way, the Bush administration
+ provided a legal infrastructure for counterinsurgency-as-governance more
+ broadly.
+
+ [...]
+
+ And through this process of legalization, these broader torturous practices
+ spilled over into the second prong of counterinsurgency: the eradication of an
+ active minority. Torture began to function as a way to isolate, punish, and
+ eliminate those suspected of being insurgents.
+
+Bare existence, indefinite detention, incommunication:
+
+ The indefinite detention and brutal ordinary measures served as a way to
+ eliminate these men—captured in the field or traded for reward monies, almost
+ like slaves from yonder. The incommunicado confinement itself satisfied the
+ second prong of counterinsurgency theory. 5 But somehow it also reached further
+ than mere detention, approximating a form of disappearance or virtual death.
+ The conditions these men found themselves in were so extreme, it is almost as if
+ they were as good as dead.
+ Reading Slahi’s numbing descriptions, one cannot help but agree with the
+ philosopher Giorgio Agamben that these men at Guantánamo were, in his words,
+ no more than “bare life.” 6 Agamben’s concept of bare existence captures well
+ the dimensions of dehumanization and degradation that characterized their lives:
+ the camp inmates were reduced to nothing more than bare animal existence.
+ They were no longer human, but things that lived. The indefinite detention and
+ torture at Guantánamo achieved an utter denial of their humanity.
+ Every aspect of their treatment at black sites and detention facilities
+
+### Drone strikes
+
+ This debate between more population-centric proponents and more enemy-
+ centric advocates of counterinsurgency should sound familiar. It replays the
+ controversy over the use of torture or other contested methods within the
+ counterinsurgency paradigm. It replicates the strategic debates between the
+ ruthless and the more decent. It rehearses the tensions between Roger Trinquier
+ and David Galula.
+
+ Yet just as torture is central to certain versions of modern warfare, the drone
+ strike too is just as important to certain variations of the counterinsurgency
+ approach. Drone strikes, in effect, can serve practically all the functions of the
+ second prong of counterinsurgency warfare. Drone strikes eliminate the
+ identified active minority. They instill terror among everyone living near the
+ active minority, dissuading them and anyone else who might contemplate joining
+ the revolutionaries. They project power and infinite capability. They show who
+ has technological superiority. As one Air Force officer says, “The real advantage
+ of unmanned aerial systems is that they allow you to project power without
+ projecting vulnerability.” 18 By terrifying and projecting power, drones dissuade
+ the population from joining the insurgents.
+
+ [...]
+
+ Covered extensively by the news media,
+ drone attacks are popularly believed to have caused even more civilian casualties
+ than is actually the case. The persistence of these attacks on Pakistani territory
+ offends people’s deepest sensibilities, alienates them from their government, and
+ contributes to Pakistan’s instability.” 19
+ In July 2016, the Obama administration released a report estimating the
+
+
+ [...]
+
+ Those in the affected countries typically receive far higher casualty reports.
+ The Pakistan press, for instance, reported that there are about 50 civilians killed
+ for every militant assassinated, resulting in a hit rate of about 2 percent. As
+ Kilcullen and Exum argue, regardless of the exact number, “every one of these
+ dead noncombatants represents an alienated family, a new desire for revenge,
+ and more recruits for a militant movement that has grown exponentially even as
+ drone strikes have increased.” 25
+ To those living in Afghanistan, Iraq, Pakistan, Somalia, Yemen, and
+ neighboring countries, the Predator drones are terrifying. But again—and this is
+ precisely the central tension at the heart of counterinsurgency theory—the terror
+ may be a productive tool for modern warfare. It may dissuade people from
+ joining the active minority. It may convince some insurgents to abandon their
+ efforts. Terror, as we have seen, is by no means antithetical to the
+ counterinsurgency paradigm. Some would argue it is a necessary means.
+ Drones are by no means a flawless weapons system even for their proponents.
+
+ [...]
+
+ Regarding the first question, a drone should be understood as a blended
+ weapons system, one that ultimately functions at several levels. It shares
+ characteristics of the German V-2 missile, to be sure, but also the French
+ guillotine and American lethal injection. It combines safety for the attacker, with
+ relatively precise but rapid death, and a certain anesthetizing effect—as well as,
+ of course, utter terror. For the country administering the drone attack, it is
+ perfectly secure. There is no risk of domestic casualties. In its rapid and
+ apparently surgical death, it can be portrayed, like the guillotine, as almost
+ humane. And drones have had a numbing effect on popular opinion precisely
+ because of their purported precision and hygiene—like lethal injection has done,
+ for the most part, in the death-penalty context. Plus, drones are practically
+ invisible and out of sight—again, for the country using them—though, again,
+ terrifying for the targeted communities.
+
+ [...]
+
+ Chamayou’s second question is, perhaps, the most important. This new
+ weapons system has changed the US government’s relationship to its own
+ citizens. There is no better evidence of this than the deliberate, targeted drone
+ killing of US and allied nation citizens abroad—as we will see. 32
+
+ [...]
+
+ An analogy from the death penalty may be helpful. There too, the means
+ employed affect the ethical dimensions of the practice itself. The gas chamber
+ and the electric chair—both used in the United States even after the Holocaust—
+ became fraught with meaning. Their symbolism soured public opinion on the
+ death penalty. By contrast, the clinical or medical nature of lethal injection at
+ first reduced the political controversy surrounding executions. Only over time,
+ with botched lethal injections and questions surrounding the drug cocktails and
+ their true effects, have there been more questions raised. But it has taken time for
+ the negative publicity to catch up with lethal injection. Drones, at this point,
+ remain far less fraught than conventional targeted assassinations.
+
+### Winning hearts and minds
+
+ THE THIRD PRONG OF COUNTERINSURGENCY THEORY CONSISTS in winning the
+ hearts and minds of the general population to stem the flow of new recruits to
+ the active minority and to seize the upper hand in the struggle. This goal can be
+ achieved by actively winning the allegiance of the population, or by pacifying an
+ already passive population, or even simply by distracting the masses. The bar,
+ ultimately, is low since, on the counterinsurgency view, the people are mostly
+ passive. As Roger Trinquier noted in 1961, “Experience has demonstrated that it
+ is by no means necessary to enjoy the sympathy of the majority of the people to
+ obtain their backing; most are amorphous, indifferent.” Or, as General Petraeus’s
+ manual states, the vast majority is “neutral” and “passive”; it represents an
+ “uncommitted middle” with “passive supporters of both sides.” 1 The third prong,
+ then, is aimed mostly at assuaging, pacifying perhaps, or merely distracting the
+ indifferent masses.
+
+ [...] the third prong has translated, principally, into three tactics: investments in
+ infrastructure, new forms of digital propaganda, and generalized terror. [...]
+ Undergirding them both, though, is the third tactic, the threat of
+ generalized terror, that serves as a foundational method and looming constant.
+
+ [...]
+
+ In How Everything Became War and the Military Became Everything, Rosa
+ Brooks writes that since 9/11 we have witnessed the expansion of the military
+ and its encroachment on civilian affairs. “We’ve seen,” in her words, “the steady
+ militarization of US foreign policy as our military has been assigned many of the
+ tasks once given to civilian institutions.” Brooks warns us of a new world where
+ “the boundaries between war and nonwar, military and nonmilitary have
+ eroded.”
+
+ [...]
+
+ We are indeed facing, as Brooks powerfully demonstrates, a new world of an
+ ever-encroaching military. But what this reveals, more than anything, is the rise
+ of the counterinsurgency paradigm of government. It is the model of
+ counterinsurgency warfare—of Galula’s early turn to building schools and health
+ facilities, to focusing on the hearts and minds of the general population—that
+ has pushed the military into these traditionally civilian domains, including total
+ surveillance, rule-of-law projects, artificial intelligence, entertainment, etc. In
+ effect, it is the counterinsurgency paradigm of government that has become
+ everything, and everything that has become counterinsurgency. The blurring of
+ boundaries between war and peaceful governance is not merely the contingent
+ result of 9/11, it is instead the culmination of a long and deliberate process of
+ modernizing warfare.
+
+Providing the basic needs:
+
+ Providing basic necessities, labeled “essential services” in the field manual, is
+ a key counterinsurgency practice. It consists primarily of ensuring that there is
+ “food, water, clothing, shelter, and medical treatment” for the general
+ population. General Petraeus’s manual explains the rationale in very simple
+ terms: “People pursue essential needs until they are met, at any cost and from
+ any source. People support the source that meets their needs. If it is an insurgent
+ source, the population is likely to support the insurgency. If the [host nation]
+ government provides reliable essential services, the population is more likely to
+ support it. Commanders therefore identify who provides essential services to
+ each group within the population.” 5
+
+That, in most cases, involve funneling american taxpayer's money to enrich corporations
+with "insane profit margins" for rebuilding countries along with US guidelines. See
+Naomi Klein's Shock Doctrine for more details.
+
+ A second approach to securing the neutrality of the majority is more
+ psychological. In the early days of modern warfare, examples of this approach
+ included measures such as the resettlement of populations, in the words of
+ counterinsurgency experts, “to control them better and to block the insurgents’
+ support.” This is what the British did in Malaya, and the French in Algeria.
+ Other examples included basic propaganda campaigns. 16
+
+ As time has gone by, new digital technologies have enabled new forms of
+ psychological counterinsurgency warfare. One of the newest involves digital
+ propaganda, reflected most recently in the Center for Global Engagement set up
+ under the Obama administration in early 2016. Created with the objective to
+ prevent the radicalization of vulnerable youth, the center adopted strategies
+ pioneered by the giants of Silicon Valley—Google, Amazon, Netflix—and was
+ originally funded at the level of about $20 million. It targeted susceptible
+ persons suspected of easier radicalization and sent them enhanced and improved
+ third-party content in order to try to dissuade them, subliminally, from
+ radicalizing or joining ISIS. In the words of an investigative journalist, “The
+ Obama administration is launching a stealth anti-Islamic State messaging
+ campaign, delivered by proxies and targeted to individual would-be extremists,
+ the same way Amazon or Google sends you shopping suggestions based on your
+ online browsing history.” 17
+
+Terror e tortura:
+
+ The third set of measures was even more basic: terror. The most formidable way
+ to win hearts and minds is to terrorize the local population to make sure they do
+ not sympathize with or aid the active minority.
+
+ [...]
+
+ The brutality of counterinsurgency serves, of course, to gather information
+ and eradicate the revolutionary minority. But it also aims higher and reaches
+ further: its ambition, as General Aussaresses recognized well, is to terrorize the
+ insurgents, to scare them to death, and to frighten the local population in order to
+ prevent them from joining the insurgent faction. Today, the use of unusually
+ brutal torture, the targeted drone assassination of high-value suspects, and the
+ indefinite detention under solitary conditions aim not only to eviscerate the
+ enemy, but also to warn others, strike fear, and win their submission and
+ obedience. Drones and indefinite detention crush those they touch, and strike
+ [...] Terror, in the end, is a key component of the third core strategy of
+ counterinsurgency.
+
+Torture and civilization:
+
+ Since antiquity, terror has served to demarcate the civilized from the
+ barbarian, to distinguish the free citizen from the enslaved. The free male in
+ ancient Greece had the privilege of swearing an oath to the gods, of testifying on
+ his word. The slave, by contrast, could only give testimony under torture.
+ Torture, in this sense, defined freedom and citizenship by demeaning and
+ marking—by imposing stigmata—on those who could be tortured. It served to
+ demarcate the weak. It marked the vulnerable. And it also, paradoxically, served
+ to delineate the “more civilized.” This is perhaps the greatest paradox of the
+ brutality of counterinsurgency: to be civilized is to torture judiciously. This
+ paradox was born in antiquity, but it journeys on.
+
+ [...]
+
+ The judicious administration of terror is the hallmark of civilization. To be
+ civilized is to terrorize properly, judiciously, with restraint, according to the
+ rules. Only the barbarians tortured savagely, viciously, unrestrainedly. The
+ civilized, by contrast, knew how and when to tame torture, how to rein it terror,
+ to apply it with judgment and discretion. Compared to the barbarians—the
+ beheadings of ISIS is a modern case on point—we are tame and judicious, even
+ when we torture, not like those barbarians. And since 9/11, the judicious use of
+ terror has been a key US strategy. In the end, terror functions in myriad ways to
+ win the hearts and minds of the masses under the counterinsurgency paradigm of
+ governing.
+
+Terror in many levels of governing:
+
+ Now, terror is not an unprecedented component of governing, even if its role
+ in the counterinsurgency model may be uniquely constitutive. It has been with us
+ since slavery in antiquity, through the many inquisitions, to the internment and
+ concentration camps of modern history. And there too, in each of its
+ manifestations, it functioned at multiple levels to bolster different modes of
+ governing. Looking back through history, terror has done a lot of work. Today as
+ well. And to see all that terror achieves today—above and beyond the three
+ prongs of counterinsurgency theory—it is useful to look back through history
+ and recall its different functions and the work it has done. The reflections today
+ are stunning.
+
+Torture and truth:
+
+ The first episode reaches back to antiquity, but represents a recurring theme
+ throughout history: terror has often served to manufacture its own truth—
+ especially in terms of its efficacy. “They all talk.” [...]
+
+ [...]
+
+ Trying to convince a suspect that he will talk, telling him that he will—this is,
+ of course, a psychological technique, but it is more than that. It is also a firm
+ belief of counterinsurgency theorists outside the interrogation room. Roger
+
+ [...]
+
+ Manufacturing truth: that is, perhaps, the first major function of terror. It is
+ the power of terror, especially in the face of ordinary men and women, of
+ humans, all too human. It has been that way since the inquisitions of the Middle
+ Ages, and before, since antiquity. On this score, little has changed.
+ In her book on slavery in Greek antiquity, Torture and Truth, Page duBois
+ argues that the idea of truth dominant today in Western thought is indissolubly
+ tied to the practice of torture, while torture itself is deeply connected to the will
+ to discover something that is always beyond our grasp. As a result, society after
+ society returns to torture, in almost an eternal recurrence, to seek out the truth
+ that is always beyond our reach. In ancient times, duBois shows, torture
+ functioned as the metaphorical touchstone of truth and as a means to establish a
+ social hierarchy. In duBois’s words, “the desire to create an other and the desire
+ to extract truth are inseparable, in that the other, because she or he is an other, is
+ constituted as a source of truth.” Truth, in sum, is always “inextricably linked
+ with the practice of torture.” 4
+
+ [...]
+
+ Truth, duBois argues, “resides in the slave body.” 5
+
+ [...]
+
+ Even more, terror produced social difference and hierarchy. The limits on
+ torture in ancient societies served to define what it meant to be among those who
+ could be tortured—what it meant to be a slave or to be free. In ancient times, the
+ testimony of a slave could only be elicited, and only became admissible in
+ litigation, under torture. Only free male citizens could take an oath or resolve a
+ controversy by sermon. The rules about who could be tortured in ancient times
+ did not just regulate the victims of torture, the rules themselves were constitutive
+ of what it meant to be a slave. The laws demarcated and defined freedom itself
+ —what it looked like, what it entailed.
+ Sophocles’s tragedy Oedipus Rex has captured our imagination for centuries
+ on questions of fate and power. But it is perhaps on the question of terror and
+ truth that the play turns. At the climax of Sophocles’s tragedy—at the pivotal
+ moment when truth finally emerges for all to see and to recognize—there is a
+ scene of terror. The shepherd slave who held the knowledge of Oedipus’s
+ ancestry is threatened with torture. And that threat of torture alone—at the
+ culmination of a whole series of unsuccessful inquiries—produces the truth:
+ torture provokes the shepherd’s confession and that allows Oedipus to recognize
+ his fate. But more than that, torture reaffirms the social order in Thebes—a
+ social order where gods rule, oracles tell truth, prophets divine, fateful kings
+ govern, and slaves serve. It is, ultimately, the right to terrorize that reveals
+ Oedipus’s power and the shepherd’s place in society.
+
+ [...]
+
+ In a similar way, terror today produces its own truth—about the effectiveness
+ of torture in eliciting truth, about its effectiveness in subjugating the insurgents,
+ about the justness of counterinsurgency.
+
+ [...]
+
+ Second, terror—or more specifically the regulatory framework that surrounds
+ terror—legitimizes the practices of terror itself. This may sound paradoxical or
+ circular—but it has often been true in history. The structures that frame and
+ regulate the administration of terrorizing practices have the effect, unexpectedly,
+ [...] The extreme nature of torture, once brought within the fabric of the law,
+ concentrated power in the hands of those
+ who had the knowledge and skill, the techne, to master the brutality. The
+ Justinian codification served as a model to later codifications during the early
+ Middle Ages and to the practices of the Inquisition.
+ Extreme practices call for expert oversight and enable a concentration of
+
+ [...]
+
+ Torture was brought into the fabric of the law and rarified at the
+ same time. The rarefication in the Medieval Period served a political end: to
+ make torture even more foreboding. Had torture become too generalized or too
+ frequent, it might have lost its exceptionality and terrorizing effect.
+ Torture was rarely applied, and, as one historian notes, inflicted with “the
+
+ [...]
+
+ The rarity achieved by the limited use and legal regulation of torture in the
+ Medieval Period served to ensure its persistence and role as a social
+ epistemological device—as a producer of truths, especially truth about itself.
+ Centuries later, the Bush administration and its top lawyers re-created a legal
+ architecture surrounding the use of torture.
+
+ [...]
+
+ Third, the legal regulation of terror also legitimizes the larger political regime.
+
+ [...]
+
+ It may seem surprising or paradoxical that the antebellum courts would
+ protect a slave accused of poisoning her master. But there is an explanation: the
+ intricate legal framework surrounding the criminalization and punishment of
+ errant slaves during the antebellum period served to maintain and stabilize
+ chattel slavery in the South—it served to equilibrate the political economy of
+ slavery. It served to balance interests in such a way that neither the slave owners
+ nor the slaves would push the whole system of slavery into disarray. And the
+ courts and politicians carefully handled this delicate balance.
+
+ [...]
+
+ In fact, the financial loss associated with the execution of a slave was viewed
+ as the only way to guarantee that owners made sure their slaves received a fair
+ trial. During the 1842–1843 legislative session, the general assembly passed a
+
+ [...]
+
+ These complex negotiations over the criminal rules accompanied the
+ practices of slavery in Alabama—a form of terror—and served to legitimize the
+ larger political economy of chattel slavery. They offered stability to the slave
+ economy by making the different participants in the criminal process and in
+ slavery—the slave owners, the foremen, the magistrates, and the public at large
+ —more confident in the whole enterprise. The extensive legal regulation of the
+ torture of slaves was not about justifying torture, nor about resolving
+ philosophical or ethical questions. Instead, it served to strike a balance and
+ stabilize the institution of slavery.
+
+ [...]
+
+ Fourth, the ability to terrorize—and to get away with it—has a powerful effect
+ on others. The audacity and the mastery impress the general masses. Something
+ about winning or beating others seduces the population. People like winners, and
+ winning is inscribed in terrorizing others.
+
+Masculinity:
+
+ Fifth, and relatedly, terror is gendered, which also tends to reinforce the power
+ and appeal of the more brutal counterinsurgency practices. Brutality is most
+ often associated with the dominant half of the couple, the one who controls, and
+ however much we might protest, this tends to strengthen the attraction.
+
+Horrorism:
+
+ Terror works in other ways as well, and many other historical episodes could
+ shed light on the complex functioning of terror today—of what Adriana
+ Cavarero refers to as “horrorism.” 45 Terror, for instance, operates to control and
+ manage one’s comrades. It can serve to keep the counterrevolutionary minority
+ in check. The willingness to engage in extreme forms of brutality, in senseless
+ violence, in irrational excess signals one’s own ruthlessness to one’s peers or
+ inferiors. It can frighten and discipline both inferiors and superiors. It
+ demonstrates one’s willingness to be cruel—which can be productive, in fact
+ necessary, to a counterinsurgency.
+
+Counterinsurgency goes domestic:
+
+ The operations of COINTELPRO—the Counter Intelligence Program
+ developed by the FBI in the 1950s to disrupt the American Communist Party,
+ and extended into the 1960s to eradicate the Black Panthers—took precisely the
+ form of counterinsurgency warfare. The notorious August 1967 directive of FBI
+ director J. Edgar Hoover to “expose, disrupt, misdirect, discredit, or otherwise
+ neutralize the activities of black nationalist, hate-type organizations and
+ groupings, their leadership, spokesmen, membership, and supporters”; 16 the
+ police raids on Black Panther headquarters in 1968 and 1969; the summary
+ execution of the charismatic chairman of the Chicago Black Panther Party, Fred
+ Hampton; the first SWAT operations carried out against the Panthers in Los
+ Angeles—these all had the trappings of modern warfare.
+
+ Hoover’s FBI targeted the Panthers in a manner that drew on the foundational
+ principles of counterinsurgency: first, to collect as much intelligence on the
+ Black Panther Party as possible through the use of FBI informants and total
+ surveillance; second, to isolate the Panthers from their communities by making
+ their lives individually so burdened with surveillance and so difficult that they
+ were forced to separate themselves from their friends and family members; third,
+ to turn the Panther movement into one that was perceived, by the general
+ population, as a radicalized extremist organization, as a way to delegitimize the
+ Panthers and reduce their appeal and influence; and ultimately, to eliminate and
+ eradicate them, initially through police arrests, then through criminal
+ prosecutions (for instance, of the New York 21) and justified homicides [...]
+ and ultimately by fomenting conflict and divisiveness within the party
+
+ [...]
+
+ The linchpin of a domesticated counterinsurgency is to bring total
+ information awareness home. Just as it was developed abroad, it is total
+ surveillance alone that makes it possible to distinguish the active minority on
+ domestic soil from the passive masses of Americans. A fully transparent
+ population is the first requisite of the counterinsurgency method. In General
+ Petraeus’s field manual, it received a full chapter early on, “Intelligence in
+ Counterinsurgency,” with a pithy and poignant epigraph: “Everything good that
+ happens seems to come from good intelligence.” And as the manual began, so it
+ ended, with the following simple mantra: “The ultimate success or failure of the
+ [counterinsurgency] mission depends on the effectiveness of the intelligence effort."
+
+ [...]
+
+ American is a potential insurgent.
+ Constant vigilance of the American population is necessary—hand in hand
+ with the appearance of trust. Appearances are vital. A domesticated
+ counterinsurgency must suspect everyone in the population, but not let it be
+ known. This posture, developed in counterinsurgency theory decades ago, was at
+ the core of the paradigm. David Galula had refined it to a witty statement he
+ would tell his soldiers in Algeria: “One cannot catch a fly with vinegar. My rules
+ are: outwardly you must treat every civilian as a friend; inwardly you must
+ consider him as a rebel ally until you have positive proof to the contrary.” 2 This
+ mantra has become the rule today—at home.
+
+ [...]
+
+ In Exposed, I proposed a new way to understand how power circulates in the
+ digital age and, especially, a new way to comprehend our willingness to expose
+ ourselves to private corporations and the government alike. The metaphors
+ commonly used to describe our digital condition, such as the “surveillance
+ state,” Michel Foucault’s panopticon prison, or even George Orwell’s Big
+ Brother, are inadequate, I argued there. In the new digital age we are not forcibly
+ imprisoned in panoptic cells. There is no “telescreen” anchored to the wall of our
+ apartments by the state. No one is trying to crush our passions, or wear us down
+ into submission with the smell of boiled cabbage and old rag mats, coarse soap,
+ and blunt razors. The goal is not to displace our pleasures with hatred—with
+ “hate” sessions, “hate songs,” “hate weeks.” Today, instead, we interact by
+ means of “likes,” “shares,” “favorites,” “friending,” and “following.” We
+ gleefully hang smart TVs on the wall that record everything we say and all our
+ preferences. The drab uniforms and grim grayness of Orwell’s 1984 have been
+ replaced by the iPhone 5c in its radiant pink, yellow, blue, and green. “Colorful
+ through and through,” its marketing slogan promises, and the desire for color-
+ filled objects—for the sensual swoosh of a sent e-mail, the seductive click of the
+ iPhone camera “shutter,” and the “likes,” clicks, and hearts that can be earned by
+ sharing—seduce us into delivering ourselves to the surveillance technologies.
+ And as the monitoring and marketing of our private lives changes who we
+ sharing—seduce us into delivering ourselves to the surveillance technologies.
+
+ And as the monitoring and marketing of our private lives changes who we
+ are, power circulates in a new way. Orwell depicted the perfect totalitarian
+ society. Guy Debord described ours rather as a society of the spectacle, in which
+ the image makers shape how we understand the world and ourselves. Michel
+ Foucault spoke instead of “the punitive society” or what he called
+ “panopticism,” drawing on Jeremy Bentham’s design of the panoptic prison.
+ Gilles Deleuze went somewhat further and described what he called “societies of
+ control.” But in our digital age, total surveillance has become inextricably linked
+ with pleasure. We live in a society of exposure and exhibition, an expository
+ society.
+
+ [...]
+
+ And that’s what happened: taxpayers would pay the telecoms to hold the data
+ for the government. So, before, AT&T surreptitiously provided our private
+ personal digital data to the intelligence services free of charge. Now, American
+ taxpayers will pay them to collect and hold on to the data for when the
+ intelligence services need them. A neoliberal win-win solution for everyone—
+ except, of course, the ordinary, tax-paying citizen who wants a modicum of
+ privacy or protection from the counterinsurgency.
+
+ [...]
+
+ In my previous book, however, I failed to fully grasp how our expository
+ society fits with the other features of our contemporary political condition—
+ from torture, to Guantánamo, to drone strikes, to digital propaganda. In part, I
+ could not get past the sharp contrast between the fluidity of our digital surfing
+ and surveillance on the one hand, and the physicality of our military
+ interventions and use of torture on the other. To be sure, I recognized the deadly
+ reach of metadata and reiterated those ominous words of General Michael
+ Hayden, former director of both the NSA and the CIA: “We kill people based on
+ metadata.” 20 And I traced the haunting convergence of our digital existence and
+ of correctional supervision: the way in which the Apple Watch begins to
+ function like an electronic bracelet, seamlessly caging us into a steel mesh of
+ digital traces. But I was incapable then of fully understanding the bond between
+ digital exposure and analog torture.
+
+ It is now clear, though, that the expository society fits seamlessly within our
+ new paradigm of governing. The expository society is precisely what allows the
+ counterinsurgency strategies to be applied so impeccably “at home” to the very
+ people who invented modern warfare. The advent of the expository society, as
+ well as the specific NSA surveillance programs, makes domestic total
+ information awareness possible, and in turn lays the groundwork for the other
+ two prongs of counterinsurgency in the domestic context.
+
+ [...]
+
+ This idea of an occupied territory, of a colony within a nation, resonates
+ perfectly with what we have witnessed in terms of the domestication of the
+ counterinsurgency. I would just push the logic further: we have not simply
+ created an internal colony, we have turned the nation itself into a colony. We
+ govern ourselves through modern counterinsurgency warfare as if the entire
+ United States was now a colonial dominion like Algeria, Malaya, or Vietnam.
+
+ [...]
+
+ These incidents—large and small, but all devastating for those targeted—also
+ serve another objective of the domesticated counterinsurgency: to make the rest
+ of us feel safe and secure, to allow us to continue our lives unaffected, to avoid
+ disrupting our consumption and enjoyment. They serve to reassure, and also, in
+ demonizing a phantom minority, to bring us all together against the specter of
+ the frightening and dangerous other. It makes us believe that there would be,
+ lurking in the quiet suburbs of Dallas or Miami, dangerous insurgents—were it
+ not for our government. And these effects feed into the third prong of a
+
+ [...]
+
+ We had seen earlier, within counterinsurgency theory, similar debates
+ between population-centric and enemy-centric theorists. The enemy-centric
+ approach tended to be the more brutal, but more focused. The population-centric
+ favored the more legal and social-investment approaches. I argued then that they
+ were just two facets of the same paradigm.
+
+ Here the debate is between population-and/or-enemy-centric theories versus
+ individual-centric theory. But here too, I would argue, this is a false dichotomy.
+ Again, these are just two facets of the same thing: a counterinsurgency paradigm
+ of warfare with three core strategies. Like the population-and/or-enemy-centric
+ theories, individual-centric theory naturally entails both incapacitating the
+ individual terrorist or insurgent—eliminating him and all of the active minority
+ —and preventing or deterring his substitution or replacement.
+
+ [...]
+
+ But rather than buy into this dichotomy of counterinsurgency and leaner
+ antiterrorism, what history shows instead is a growing convergence of the two
+ models in the United States since the 1960s. Counterinsurgency and domestic
+ antiterrorism efforts, entwined from the start, have converged over time. The
+ individual incapacitation strategy meshes perfectly into the counterinsurgency
+ approach. And it leads seamlessly from the domestication of the second prong of
+ counterinsurgency to the domestication of the third.
+
+### Distraction and diversion
+
+ MANY OF US WILL NOT RECOGNIZE OURSELVES, OR A MERICA for that matter, in
+ these dreadful episodes—in the waterboarding and targeted assassinations
+ abroad or in the militarization of our police forces, in the infiltration of Muslim
+ mosques and student groups or in the constant collection of our personal data at
+ home. Many of us have no firsthand experience of these terrifying practices. Few
+ of us actually read the full Senate torture report, and even fewer track drone
+ strikes. Some of us do not even want to know of their existence. Most of us are
+ blissfully ignorant—at least most of the time—of these counterinsurgency
+ practices at home or abroad, and are consumed instead by the seductive
+ distractions of our digital age.
+
+ And that’s the way it is supposed to be. As counterinsurgency is
+ domesticated, it is our hearts and minds that are daily being assuaged, numbed,
+ pacified—and blissfully satisfied. We, the vast majority of us, are reassured
+ daily: there are threats everywhere and color-coded terror alerts, but
+ counterinsurgency strategies are protecting us. We are made to feel that
+ everything’s under control, that the threat is exterior, that we can continue with
+ our daily existence. Even more, that these counterinsurgency strategies will
+ prevail. That our government is stronger and better equipped, prepared to do
+ everything necessary to win, and will win. That the guardians are protecting us.
+ The effort to win the hearts and minds of the passive American majority is
+ the third aspect of the domestication of counterinsurgency practices—perhaps
+ the most crucial component of all. And it is accomplished through a remarkable
+ mixture of distraction, entertainment, pleasure, propaganda, and advertising—
+ now rendered all so much more effective thanks to our rich digital world. In
+ Rome, after the Republic, this was known as “bread and circus” for the masses.
+ Today, it’s more like Facebook and Pokémon GO.
+
+ We saw earlier how the expository society entices us to share all our personal
+ data and how this feeds into the first prong of counterinsurgency—total
+ information awareness. There is a flip side to this phenomenon: keeping us
+ distracted. The exposure is so pleasurable and engaging that we are mostly kept
+ content, with little need for a coordinated top-down effort to do so. We are
+ entranced—absorbed in a fantastic world of digitally enhanced reality that is
+ totally consuming, engrossing, and captivating. We are no longer being rendered
+ docile in a disciplinarian way, as Michel Foucault argued in Discipline and
+ Punish. We are past notions of docility. We are actively entranced—not
+ passively, not in a docile way. We are actively clicking and swiping, jumping
+ from one screen to another, checking one platform then another to find the next
+ fix—Facebook, Instagram, Twitter, Google, YouTube, and on and on.
+ Winning over and assuaging the passive majority might be accomplished—
+ indeed, has been accomplished in the past—through traditional propaganda, such
+ as broadcast misinformation about the insurgent minority, and through the top-
+ down provision of entertainment to keep us from thinking about politics. The
+ new digital world we live in has rendered these older strategies obsolete. As the
+ counterinsurgency’s mandate to pacify the masses has been turned on the
+ American people, the third prong of modern warfare looks and works differently
+ than it did in previous times and in other places.
+ Things have changed. Just a few years ago, our politicians still had to tell us
+
+ [...]
+
+ Pokémon GO has already run its course, but that is to be expected. Another
+ digital obsession will follow. These platforms are supposed to capture all of our
+ attention for a while, to captivate us, to distract us—and simultaneously to make
+ us expose ourselves and everything around us. This is the symbiosis between the
+ third and first prongs of the domesticated counterinsurgency: while it pacifies us,
+ a game like Pokémon GO taps into all our personal information and captures all
+ our data. At first, the game required that players share all their personal contacts.
+ Although that was eventually dropped, the game collects all our GPS locations,
+ captures all the video of our surroundings in perfectly GPS-coded data, and
+ tracks us wherever we are. Plus, even though it is free, many players are buying
+ add-ons and in the process sharing their consumption and financial data. The
+ more we play, the more we are distracted and pacified, and the more we reveal
+ about ourselves.
+
+ [...]
+
+ The distractions are everywhere: e-mail notifications, texts, bings and pings,
+ new snapchats and instagrams. The entertainment is everywhere as well: free
+ Wi-Fi at Starbucks and McDonald’s, and now on New York City streets, that
+ allow us to stream music videos and watch YouTube videos. And of course, the
+ advertising is everywhere, trying to make us consume more, buy online,
+ subscribe, and believe. Believe not only that we need to buy the recommended
+ book or watch the suggested Netflix, but also believe that we are secure and safe,
+ protected by the most powerful intelligence agencies and most tenacious military
+ force. Believe that we can continue to mind our own business—and remain
+ distracted and absorbed in the digital world—because our government is
+ watching out for us.
+
+ The fact is, the domestication of counterinsurgency has coincided with the
+ explosion of this digital world and its distractions. There is a real qualitative
+ difference between the immediate post–9/11 period and today. One that is
+ feeding directly into the third strategy of modern warfare.
+ Meanwhile, for the more vulnerable—those who are more likely to veer
+ astray and perhaps sympathize with the purported internal enemy—the same
+ digital technologies target them for enhanced propaganda. The Global
+ Engagement Center, or its equivalents, will profile them and send improved
+ content from more moderate voices. The very same methods developed by the
+ most tech-savvy retailers and digital advertisers—by Google and Amazon—are
+ deployed to predict, identify, enhance, and target our own citizens.
+ were before or that we are experiencing a waning of civil and political
+ engagement. While I agree that the growing capacity of the state and
+ corporations to monitor citizens may well threaten the private sphere, I am not
+ convinced that this is producing new apathy or passivity or docility among
+ citizens, so much as a new form of entrancement. The point is, we were once
+ kept apathetic through other means, but are now kept apathetic through digital
+ distractions.
+
+Voting turnout and Trump election:
+
+ The voting patterns of American registered voters has remained constant—
+ and apathetic—for at least fifty years. Even in the most important presidential
+ elections, voter turnout in this country over the past fifty years or more has
+ pretty much fluctuated between 50 percent and 63 percent. By any measure,
+ American democracy has been pretty docile for a long time. In fact, if you look
+ over the longer term, turnout has been essentially constant since the 1920s and
+ the extension of the suffrage to women. Of course, turnout to vote is not the only
+ measure of democratic participation, but it is one quantifiable measure. And
+ electoral voting is one of the more reliable longitudinal measures of civic
+ participation. But our record, in the United States, is not impressive.
+
+ [...]
+
+ Despite all this, over 62 million people voted for Donald Trump, resulting in
+ his Electoral College victory. And it was by no means an unusual election. Voter
+ turnout in 2016 was typical for this country. About 60.2 percent of the
+ approximately 231 million eligible voters turned out to vote, representing about
+ 139 million votes case. That number is consonant with historical turnout in this
+ country, almost squarely between voter turnout in 2012 (58.6 percent) and in
+ 2008 (61.6 percent), but still above most presidential election year turnouts since
+ 1972. 16 In all categories of white voters, Trump prevailed.
+
+ [...]
+
+ The cable news network CNN captured this best in a pithy lead to a story titled
+ “Trump: The Social Media President?”: “FDR was the first ‘radio’ president.
+ JFK emerged as the first ‘television’ president. Barack Obama broke through as
+ the first ‘Internet’ president. Next up? Prepare to meet Donald Trump, possibly
+ the first ‘social media’ and ‘reality TV’ president.” 10
+
+ [...]
+
+ This new mode of existence and digital consumption pleases and distracts the
+ majority of Americans. The old-fashioned TV has now been enhanced and
+ augmented, displaced by social media on digital devices of all sorts and sizes—
+ from the Apple Watch and tablet, through the MacBook Air and Mac Pro, to the
+ giant screen TV and even the Jumbotron. And all of it serves to pacify the
+ masses and ensure that they do not have the time or attention span to question
+ the domestication of the counterinsurgency.
+
+ And, then, it all feeds back into total information awareness. Hand in hand,
+ government agencies, social media, Silicon Valley, and large retailers and
+ corporations have created a mesmerizing new digital age that simultaneously
+ makes us expose ourselves and everything we do to government surveillance and
+ that serves to distract and entertain us. All kinds of social media and reality TV
+ consume and divert our attention, making us give our data away for free. A
+ profusion of addictive digital platforms—from Gmail, Facebook, and Twitter, to
+ YouTube and Netflix, Amazon Prime, Instagram, and Snapchat, and now
+ Pokémon GO—distract us into exposing all our most private information, in
+ order to feed the new algorithms of commerce and intelligence services: to
+ profile us for both watch lists and commercial advertising.
+
+This is compatible with Shoshana Zuboff's Dispossession Cycle:
+
+ This third aspect of counterinsurgency’s domestication is perhaps the most
+ important, because it targets the most prized military and political objective: the
+ general masses. And today, in the expository society, the new algorithms and
+ digital-advertising methods have propelled the manipulation and propaganda to
+ new heights. We are being encouraged by government and enticed by
+ multination corporations and social media to expose and express ourselves as
+ much as possible, leaving digital traces that permit both government and
+ corporations to profile us and then try to shape us accordingly. To make model
+ citizens out of us all—which means docile, entranced consumers. The governing
+ paradigm here is to frenetically encourage digital activity—which in one sense is
+ the opposite of docility—in order to then channel that activity in the right
+ direction: consumption, political passivity, and avoiding the radical extremes.
+
+ What we are witnessing is a new form of digital entrancement that shapes us
+ as subjects, blunts our criticality, distracts us, and pacifies us. We spend so much
+ time on our phones and devices, we barely have any time left for school or work,
+ let alone political activism. In the end, the proper way to think about this all is
+ not through the lens of docility, but through the framework of entrancement. It is
+ crucial to understand this in the proper way, because breaking this very
+ entrancement is key to seeing how counterinsurgency governance operates more
+ broadly. Also, because the focus on docility—along an older register of
+ discipline—is likely to lead us into an outdated focus on top-down propaganda.
+
+### Counterrevolution
+
+ The paradigm was refined
+ and systematized, and has now reached a new stage: the complete and systematic
+ domestication of counterinsurgency against a home population where there is no
+ real insurgency or active minority. This new stage is what I call “The
+ Counterrevolution.”
+
+ The Counterrevolution is a new paradigm of governing our own citizens at
+ home, modeled on colonial counterinsurgency warfare, despite the absence of
+ any domestic uprising. It is aimed not against a rebel minority—since none
+ really exists in the United States—but instead it creates the illusion of an active
+ minority which it can then deploy to target particular groups and communities,
+ and govern the entire American population on the basis of a counterinsurgency
+ warfare model. It operates through the three main strategies at the heart of
+ modern warfare, which, as applied to the American people, can be recapitulated
+ as follows:
+
+ 1. Total information awareness of the entire American population…: [by the]
+ [...] “counterrevolutionary minority.”
+
+ [...]
+
+ 2. … in order to extract an active minority at home…
+
+Shock and Awe:
+
+ 3. … and win the hearts and minds of Americans: Meanwhile, the
+ counterrevolutionary minority works to pacify and assuage the general
+ population in order to ensure that the vast majority of Americans remain
+ just that: ordinary consuming Americans. They encourage and promote a
+ rich new digital environment filled with YouTube, Netflix, Amazon
+ Prime, tweets, Facebook posts, instagrams, snapchats, and reality TV that
+ consume attention while digitally gathering personal data—and at times,
+ pushing enhanced content. They direct digital propaganda to susceptible
+ users. And they shock and awe the masses with their willingness to
+ torture suspected terrorists or kill their own citizens abroad. In the end,
+ entertaining, distracting, entrancing, and assuaging the general population
+ is the key to success—our new form of bread and circus.
+
+The "new shape" of the State (and it's partners), as a "loose network":
+
+ These three key strategies now guide governance at home, as they do military
+ and foreign affairs abroad. What has emerged today is a new and different art of
+ governing. It forms a coherent whole with, at its center, a security apparatus
+ composed of White House, Pentagon, and intelligence officials, high-ranking
+ congressional members, FISC judges, security and Internet leaders, police
+ intelligence divisions, social-media companies, Silicon Valley executives, and
+ multinational corporations. This loose network, which collaborates at times and
+ competes at others, exerts control by collecting and mining our digital data. Data
+ control has become the primary battlefield, and data, the primary resource—
+ perhaps the most important primary resource in the United States today.
+
+ [...]
+
+ This new mode of governing has no time horizon. It has no sunset provision. And it is
+ marked by a tyrannous logic of violence. [...] It is part and parcel of the new
+ paradigm of governing that reconciles brutality with legality.
+
+The unprecedented, self-fulfilling profecy:
+
+ We govern ourselves
+ differently in the United States now: no longer through sweeping social
+ programs like the New Deal or the War on Poverty, but through surgical
+ counterinsurgency strategies against a phantom opponent. The intensity of the
+ domestication now is unprecedented.
+
+ [...]
+
+ Counterinsurgency, with its tripartite scheme (active minority, passive masses,
+ counterrevolutionary minority) and its tripartite strategy (total awareness,
+ eliminate the active minority, pacify the masses) is a deeply counterproductive
+ self-fulfilling prophecy that radicalizes individuals against the United States.
+
+ [...]
+
+ “The Islamic State has called it ‘the blessed ban’ because it
+ supports the Islamic State’s position that America hates Islam. The clause in the
+ order that gives Christians preferential treatment will be seen as confirming the
+ Islamic State’s apocalyptic narrative that Islam is in a fight to the death against
+ the Christian crusaders. The images of Muslim visitors being turned away at
+ American airports will only inflame those who seek to do us harm.” 6
+
+ [...]
+
+ We are headed not, as Kant would have it, toward perpetual peace, but
+ instead, sounding the refrain of Nietzsche’s eternal return, toward an endless
+ state of counterinsurgency warfare.
+
+### Not exactly a state of exception, but of legality
+
+ MANY COMMENTATORS ARGUE THAT WE NOW LIVE, IN THE United States and in the
+ West more broadly, in a “state of exception” characterized by suspended legality.
+ In this view, our political leaders have placed a temporary hold on the rule of
+ law, with the tacit understanding that they will resume their adherence to liberal
+ legal values when the political situation stabilizes. Some commentators go
+ further, arguing that we have now entered a “permanent state of exception.”
+
+ This view, however, misperceives one particular tactic of counterinsurgency
+ —namely, the state of emergency—for the broader rationality of our new
+ political regime. It fails to capture the larger ambition of our new mode of
+ governing. The fact is, our government does everything possible to legalize its
+ counterinsurgency measures and to place them solidly within the rule of law—
+ through endless consultations with government lawyers, hypertechnical legal
+ arguments, and lengthy legal memos. The idea is not to put law on hold, not
+ even temporarily. It is not to create an exception, literally or figuratively. On the
+ contrary, the central animating idea is to turn the counterinsurgency model into a
+ fully legal strategy. So, the governing paradigm is not one of exceptionality, but
+ of counterinsurgency and legality.
+
+ [...]
+
+ The logic today is based on a model of
+ counterinsurgency warfare with, at its heart, the resolution of that central tension
+ between brutality and legality. The counterrevolutionary model has resolved the
+ inherited tension and legalized the brutality.
+
+ [...]
+
+ Agamben’s idea of a permanent state of exception pushes this
+ further, but simultaneously undermines the defining element of the exception,
+ since it becomes the rule. For the most part, though, the state of exception is
+ presented as aberrational but temporary.
+
+ [...]
+
+ The problem with the state-of-exception view is that it mistakes tactics for
+ the overarching logic of our new paradigm of governing and, in the process, fails
+ to see the broader framework of The Counterrevolution. The state-of-exception
+ framework rests on an illusory dichotomy between rule and exception, a myth
+ that idealizes and reifies the rule of law. The point is, the use of torture at CIA
+ black sites and the bulk collection of American telephony metadata were not
+ exceptions to the rule of law, but were rendered fully legalized and regulated
+ practices—firmly embedded in a web of legal memos, preauthorized formalities,
+ and judicial or quasi-judicial oversight. In this sense, hardly anything that
+ occurred was outside or exceptional to the law, or could not be brought back in.
+
+ The Counterrevolution, unlike the state of exception, does not function on a
+ binary logic of rule and exception, but on a fully coherent systematic logic of
+ counterinsurgency that is pervasive, expansive, and permanent. It does not have
+ limits or boundaries. It does not exist in a space outside the rule of law. It is all
+ encompassing, systematic, and legalized.
+
+ Of course, the rhetoric of “exception” is extremely useful to The
+ Counterrevolution. “States of emergency” are often deployed to seize control
+ over a crisis and to accelerate the three prongs of counterinsurgency.
+
+ [...]
+
+ The ultimate exercise of power, Foucault argued, is precisely to transform
+ ambiguities about illegalisms into conduct that is “illegal.”
+
+ [...]
+
+ During the ancien régime, Foucault argues, the popular and the privileged
+ classes worked together to evade royal regulations, fees, and impositions.
+ Illegalisms were widespread throughout the eighteenth century and well
+ distributed across the different strata of society
+
+ [...]
+
+ As wealth became increasingly mobile after the French Revolution, new
+ forms of wealth accumulation—of moveable goods, stocks, and supplies as
+ opposed to landed wealth—exposed massive amounts of chattel property to the
+ workers who came in direct contact with this new commercial wealth. The
+ accumulation of wealth began to make popular illegalisms less useful—even
+ dangerous—to the interests of the privileged. The commercial class seized the
+ mechanisms of criminal justice to put an end to these popular illegalisms
+ [...] The privileged seized the administrative and
+ police apparatus of the late eighteenth century to crack down on popular
+ illegalisms.
+
+ [...]
+
+ They effectively turned popular illegalisms into
+ illegalities, and, in the process, created the notion of the criminal as social
+ enemy—Foucault even talks here of creating an “internal enemy.”
+
+ [...]
+
+ In The Counterrevolution—by contrast to the bourgeois revolutions of the
+ early nineteenth century—the process is turned on its head. Illegalisms and
+ illegalities are inverted. Rather than the privileged turning popular illegalisms
+ into illegalities, the guardians are turning their own illegalisms into legalities.
+ [...] The strategy here is to paper one’s way into the legal realm through elaborate
+ memorandums and advice letters that justify the use of enhanced interrogation or the
+ assassination of American citizens abroad.
+
+ [...]
+
+ On the one hand, there is a strict division of responsibilities: the intelligence
+ agencies and the military determine all the facts outside the scope of the legal
+ memorandum. [...] Everything is compartmentalized.
+
+ [...]
+
+ On the other hand, the memo authorizes: it allows the political authority to
+ function within the bounds of the law. It sanitizes the political decision. It cleans
+ the hands of the military and political leaders. It produces legalities.
+
+A circular, feedback loop:
+
+ None of this violates the rule of law or transgresses the boundaries of legal
+ liberalism. Instead, the change was rendered “legal.” If this feels circular, it is
+ because it is: there is a constant feedback effect in play here. The
+ counterinsurgency practices were rendered legal, and simultaneously justice was
+ made to conform to the counterinsurgency paradigm. The result of the feedback
+ loop was constantly new and evolving meanings of due process. And however
+ rogue they may feel, they had gone through the correct procedural steps of due
+ process to render them fully lawful and fully compliant with the rule of law.
+
+ [...]
+
+ “Abnormal,” in 1975, Foucault explored how the clash between the juridical
+ power to punish and the psychiatric thirst for knowledge produced new medical
+ diagnoses that then did work.
+
+ [...]
+
+ In his 1978 lecture on the invention of the notion of dangerousness in French
+ psychiatry, Foucault showed how the idea of future dangerousness emerged from
+ the gaps and tensions in nineteenth-century law. 37
+
+ [...]
+
+ There are surely gaps here too in The Counterrevolution—tensions between
+ rule-boundedness on the one hand and a violent warfare model on the other.
+ Those tensions give momentum to the pendulum swings of brutality that are then
+ resolved by bureaucratic legal memos.
+
+### System analysis and Operations Research
+
+ The RAND Corporation played a seminal role in the development of
+ counterinsurgency practices in the United States and championed for decades—
+ and still does—a systems-analytic approach that has come to dominate military
+ strategy. Under its influence, The Counterrevolution has evolved into a logical
+ and coherent system that regulates and adjusts itself, a fully reasoned and
+ comprehensive approach.
+
+ [...]
+
+ Systems analysis was often confused with OR, but it was distinct in several
+ regards. OR tended to have more elaborate mathematical models and solved
+ lower-level problems; in systems analysis, by contrast, the pure mathematical
+ computation was generally applied only to subparts of the overall problem.
+ Moreover, SA took on larger strategic questions that implicated choices between
+ major policy options. In this sense, SA was, from its inception, in the words of
+ one study, “less quantitative in method and more oriented toward the analysis of
+ broad strategic and policy questions, […] particularly […] seeking to clarify
+ choice under conditions of great uncertainty.” 5
+
+ [...]
+
+ As this definition made clear, there were two meanings of the term system in
+ systems analysis: first, there was the idea that the world is made up of systems,
+ with internal objectives, that need to be analyzed separately from each other in
+ order to maximize their efficiency. Along this first meaning, the analysis would
+ focus on a particular figurative or metaphorical system—such as a weapons
+ system, a social system, or, in the case of early counterinsurgency, a colonial
+ system. Second, there was the notion of systematicity that involved a particular
+ type of method—one that began by collecting a set of promising alternatives,
+ constructing a model, and using a defined criterion.
+
+ [...]
+
+ This method of systems analysis became influential in government and
+ eventually began to dominate governmental logics starting in 1961 when Robert
+ McNamara acceded to the Pentagon under President John F. Kennedy.
+
+ [...]
+
+ According to its proponents, systems analysis
+ would allow policy makers to put aside partisan politics, personal preferences,
+ and subjective values. It would pave the way to objectivity and truth. As RAND
+ expert and future secretary of defense James R. Schlesinger explained:
+ “[Systems analysis] eliminates the purely subjective approach on the part of
+ devotees of a program and forces them to change their lines of argument. They
+ must talk about reality rather than morality.” 13 With systems analysis,
+ Schlesinger argued, there was no longer any need for politics or value
+ judgments. The right answer would emerge from the machine-model that
+ independently evaluated cost and effectiveness. All that was needed was a
+ narrow and precise objective and good criteria. The model would then spit out
+ the most effective strategy.
+
+ [...]
+
+ Counterinsurgency theory blossomed at precisely the moment that systems
+ analysis was, with RAND’s backing, gaining influence in the Pentagon and at
+ the White House. The historian Peter Paret pinpoints this moment, in fact, to the
+ very first year of the Kennedy administration: “In 1961, the Cuban revolution
+ combined with the deteriorating Western position in Southeast Asia
+
+ [...]
+
+ It convened, as mentioned earlier, the seminal
+ counterinsurgency symposium in April 1962, where RAND analysts discovered
+ David Galula and commissioned him to write his memoirs. RAND would
+ publish his memoirs as a confidential classified report in 1963 under the title
+
+ [...]
+
+ Counterinsurgency theory blossomed at precisely the moment that systems
+ analysis was, with RAND’s backing, gaining influence in the Pentagon and at
+ the White House. The historian Peter Paret pinpoints this moment, in fact, to the
+ very first year of the Kennedy administration: “In 1961, the Cuban revolution
+ combined with the deteriorating Western position in Southeast Asia to shift
+
+ [...]
+
+ One recent episode regarding interrogation
+ methods is telling. It involved the evaluation of different tactics to obtain
+ information from informants, ranging from truth serums to sensory overload to
+ torture. These alternatives were apparently compared and evaluated using a SA
+ approach at a workshop convened by RAND, the CIA, and the American
+ Psychological Association (APA). Again, the details are difficult to ascertain
+ fully, but the approach seemed highly systems-analytic.
+
+ [...] a series of workshops on “The Science of Deception”
+
+ [...]
+
+ More specifically, according to this source, the workshops probed and
+ compared different strategies to elicit information. The systems-analytic
+ approach is reflected by the set of questions that the participants addressed: How
+ important are differential power and status between witness and officer? What
+ pharmacological agents are known to affect apparent truth-telling behavior?
+ What are sensory overloads on the maintenance of deceptive behaviors? How
+ might we overload the system or overwhelm the senses and see how it affects
+ deceptive behaviors? These questions were approached from a range of
+ disciplines. The workshops were attended by “research psychologists,
+ psychiatrists, neurologists who study various aspects of deception and
+ representatives from the CIA, FBI and Department of Defense with interests in
+ intelligence operations. In addition, representatives from the White House Office
+ of Science and Technology Policy and the Science and Technology Directorate
+ of the Department of Homeland Security were present.” 31
+
+ [...]
+
+ And in effect, from a counterinsurgency perspective, these various tactics—
+ truth serums, sensory overloads, torture—are simply promising alternatives that
+ need to be studied, modeled, and compared to determine which ones are superior
+ at achieving the objective of the security system. Nothing is off limits.
+ Everything is fungible. The only question is systematic effectiveness. This is the
+ systems-analytic approach: not piecemeal, but systematic.
+ Incidentally, a few years later, Gerwehr apparently went to Guantánamo, but
+ refused to participate in any interrogation because the CIA was not using video
+ cameras to record the interrogations. Following that, in the fall of 2006 and in
+ 2007, Gerwehr made several calls to human-rights advocacy groups and
+ reporters to discuss what he knew. A few months later, in 2008, Gerwehr died of
+ a motorcycle accident on Sunset Boulevard. 32 He was forty years old.
+
+ [...]
+
+ Sometimes, depending on the practitioner, the analysis favored torture or summary
+ execution; at other times, it leaned toward more “decent” tactics. But these
+ variations must now be understood as internal to the system. Under President
+ Bush’s administration, the emphasis was on torture, indefinite detention, and
+ illicit eavesdropping; under President Obama’s, it was on drone strikes and total
+ surveillance; in the first months of the Trump presidency, on special operations,
+ drones, the Muslim ban, and building the wall. What unites these different
+ strategies is counterinsurgency’s coherence as a system—a system in which
+ brutal violence is heart and center. That violence is not aberrational or rogue. It
+ is to be expected. It is internal to the system. Even torture and assassination are
+ merely variations of the counterinsurgency logic.
+
+ Counterinsurgency abroad and at home has been legalized and systematized. It
+ has become our governing paradigm “in any situation,” and today “simply
+ expresses the basic tenet of the exercise of political power.” It has no sunset
+ provision. It is ruthless, game theoretic, systematic—and legal. And with all of
+ the possible tactics at the government’s disposal—from total surveillance to
+ indefinite detention and solitary confinement, to drones and robot-bombs, even
+ to states of exception and emergency powers—this new mode of governing has
+ never been more dangerous.
+
+ In sum, The Counterrevolution is our new form of tyranny.
diff --git a/books/sociology/jogos-homens.md b/books/sociology/jogos-homens.md
index 105b13c..dee1c44 100644
--- a/books/sociology/jogos-homens.md
+++ b/books/sociology/jogos-homens.md
@@ -22,6 +22,8 @@ Original:
## Índice
+* Jogo, noção de totalidade fechada, preciosa inovação num mundo incerto, 10; noção complexa, 11.
+
* Regras versus sem regras (jogos de imitação por exemplo), 28.
* Regras das regras: jogos como atividades: 1. livres; 2; delimitadas; 3.
@@ -125,7 +127,7 @@ Original:
## Azar e a matemática
Os jogos de competição conduzem ao desporto, os jogos de imitação e de ilusão
- prefiguram as religiões do espectáculo. Os jogos de azar e de cominação
+ prefiguram as religiões do espectáculo. Os jogos de azar e de combinação
estiveram na origem de vários desenvolvimentos das matemáticas, do cálculo de
probabilidades à topologia.
@@ -195,7 +197,7 @@ Foi lendo mais ou menos o seguinte trecho que me veio a ideia de que pode haver
alguma articulação -- que aliás é um dos sentidos da palavra jogo, "o mecanismo
ter jogo" -- entre os conceitos de máquina, sistema e jogo:
- Qualquer instituição funciona, em parte, como um jogo, de al forma que se
+ Qualquer instituição funciona, em parte, como um jogo, de tal forma que se
apresenta também como um jogo que foi necessário instaurar, baseado em novos
princípios e que ocupou o lugar reservado a um jogo antigo. Esse jogo singular
responde a outras necessidades, favorece certas normas e legislações, exige
diff --git a/books/sociology/ruptura.md b/books/sociology/ruptura.md
new file mode 100644
index 0000000..3c1c5ac
--- /dev/null
+++ b/books/sociology/ruptura.md
@@ -0,0 +1,91 @@
+[[!meta title="Ruptura"]]
+
+## Trechos
+
+ Os únicos que se sustentam são aqueles que não fingem mais governar nada, mas
+ que usam o poder simplesmente para fornecer a parcelas da população o gosto
+ drogado da autorização da violência contra os vulneráveis.
+
+ -- 11
+
+ Só governos fracos são violentos. Eles têm de vigiar todos os poros, pois
+ sabem que seu fim pode vir de qualquer lugar. Governos fortes são magnânimos,
+ porque vislumbram tranquila- mente sua perpetuação. O que se contrapõe a nós é
+ fraco e desesperado. Ele cairá. É hora de fazê-lo cair.
+
+ -- 13
+
+ Generais e almirantes tomam o poder. Eles exterminam seus predecessores de
+ esquerda, exilam os opositores, aprisionam os intelectuais dissidentes, sufocam
+ os sindicatos, controlam a imprensa e paralisam toda atividade política. Mas,
+ nesta variante do fascismo de mercado, os che- fes militares tomam distância
+ das decisões eco- nômicas. Eles não planificam a economia nem aceitam suborno.
+ Eles confiam toda a economia a fanáticos religiosos – fanáticos cuja religião é
+ o laissez-faire do mercado (...) Então o relógio da história anda para trás. O
+ mercado é liberado e a massa monetária estritamente controlada. Os créditos de
+ ajuda social são cortados, os trabalha- dores devem aceitar qualquer coisa ou
+ morrer de fome (...) A inflação baixa reduz-se a quase nada (...) A liberdade
+ política estando fora de circula- ção, as desigualdades de rendimentos, consumo
+ e riqueza tendem a crescer.
+
+ É evidente que as elucubrações de Samuelson a respeito do “fascismo de mercado”
+ se inspiravam no Chile da ditadura de Augusto Pinochet (1973- 1990). Esse
+ regime sucedeu um governo que ten- tava construir o socialismo pela via
+ eleitoral e foi derrubado por uma articulação envolvendo a social- -democracia
+ cristã, grupos terroristas neofascistas, entidades patronais e Washington, num
+ processo que culminou no bombardeio do Palácio de La Moneda em 11 de setembro
+ de 1973. A partir daí, Pinochet aniquilou a oposição com uma brutali- dade
+ poucas vezes vista. O Estado chileno torturou cerca de 30 mil opositores, em
+ centros espalhados por todo o território nacional, e assassinou milhares
+ de pessoas. Apenas assim foi possível impor à população as políticas dos
+ fanáticos do laissez-faire. Iniciava-se o experimento neoliberal imposto pelos
+ Chicago boys. Após o golpe, esse grupo de econo- mistas, ligados ao teórico e
+ guru Milton Friedman, ocuparia todos os espaços do Estado ditatorial, dos
+ ministérios à presidência do Banco Central.
+
+ No mesmo momento em que o neoliberalismo aparecia como modelo de gestão social
+ nas democracias liberais do Reino Unido de Margaret Thatcher e dos EUA de
+ Ronald Reagan, a ditadura chilena explicitava a linha de fuga para a qual o
+ capitalismo mundial se encaminhava. Essa junção de brutalidade política e
+ neoliberalismo econômico, aplicada inicialmente no Chile, agora se mostra como
+ a tendência generalizada do capitalismo atual e tem no Brasil seu mais recente
+ laboratório. Tal processo ocorre precisamente no momento em que a farsa da
+ livre concorrência foi definitivamente rasgada pelo retorno a práticas de
+ acumulação primitiva, fazendo com que até mesmo a democracia
+ liberal-parlamentar tenda a ser descartada – especialmente aqui, na periferia
+ do capitalismo.
+
+ [...]
+
+ Por isso, segundo Hayek, o único regime totalitário que a América do Sul
+ conheceu até os anos 1980 não teria sido o Brasil dos militares, a Argentina de
+ Videla ou o Chile de Pinochet, mas o governo da Unidade Popular de Allende. A
+ tese implícita era de que um modo de vida e de produção não baseado na
+ propriedade privada dos meios de produção seria a definição mesma de
+ totalitarismo. Mas esse conceito liberal de liberdade só poderia se impor à
+ base de choques. Afinal, as sociedades não aceitam sem resistência limitar seus
+ desejos e sua inquietude à liberdade de empreender (reservada para alguns). A
+ experiência histórica das lutas por liberdade revela justamente a insistência
+ em livrar a atividade da submissão à forma do trabalho, da ânsia pela igualdade
+ radical e pelo fim da naturalização da exploração, da vontade de liberação do
+ mundo das coisas dos contratos de propriedade. Sendo assim, apenas uma fina
+ engenharia social, que envolveria todas as instâncias do governo e do capital e
+ que mobilizaria tanto o soldado de baixa patente como o burocrata do primeiro
+ escalão, seria capaz de neutralizar esses desejos, criando uma homofonia
+ social. Embora paradoxal, a liberdade de empreender exige “mais” e não “menos”
+ Estado, que se impõe na forma de repressão sanguinária e vigilância constante.
+
+ [...]
+
+ A aproximação entre Hayek e o principal jurista do Terceiro Reich, Carl
+ Schmitt, não deixa dúvida sobre sua concepção de democracia.
+
+ [...]
+
+ O autoritarismo, portanto, não é um acidente do capitalismo e não é a antítese
+ da democracia burguesa. Ele é parte constitutiva desse modo de gestão de
+ populações. Afinal, foi no esteio da belle époque das grandes potências
+ ocidentais que se consumou o holocausto dos povos coloniais, primeiro
+ laboratório do caos.
+
+ -- 17-25
diff --git a/books/sociology/secrecy.md b/books/sociology/secrecy.md
new file mode 100644
index 0000000..6d10430
--- /dev/null
+++ b/books/sociology/secrecy.md
@@ -0,0 +1,768 @@
+[[!meta title="The Sociology of Secrecy and of Secret Societies"]]
+
+By Georg Simmel:
+
+* [Original article](http://doi.org/10.1086/211418).
+* [Full text](https://brocku.ca/MeadProject/Simmel/Simmel_1906.html).
+* [Comments and references](https://en.wikipedia.org/wiki/Sociological_aspects_of_secrecy).
+
+## Excerpts
+
+ [...]
+
+ All relationships of people to each other rest, as a matter of
+ course, upon the precondition that they know something about
+ each other. The merchant knows that his correspondent wants
+
+ [...]
+
+ rough and ready way, to the degree necessary in order that the
+ needed kinds of intercourse may proceed. That we shall know
+ with whom we have to do, is the first precondition of having
+ anything to do with another. The customary reciprocal ptresenta-
+
+ [...]
+
+ reciprocally recognized. Their necessity is usually observed only
+ when they happen to be wanted. It would be a profitable
+ scientific labor to investigate the sort and degree of reciprocal
+ apprehension which is needed for the various relationships
+ between human beings. It would be worth while to know
+ how the general psychological presumptions with which each
+ approaches each are interwoven with the special experiences
+ with reference to the individual who is in juxtaposition with us;
+ how in many ranges of association the reciprocal apprehension
+ does or does not need to be equal, or may or may not be permitted
+ to be equal; how conventional relationships are determined in
+ their development only through that reciprocal or unilateral
+ knowledge developing with reference to the other party. The
+ investigation should finally proceed in the opposite direction;
+
+ [...]
+
+ given by the total relationship of the knower to the known.
+ Since one never can absolutely know another, as this would mean
+ knowledge of every particular thought and feeling; since we
+ must rather form a conception of a personal unity out of the
+ fragments of another person in which alone he is accessible to
+ us, the unity so formed necessarily depends upon that portion of
+ the other which our standpoint toward him permits us to see.
+
+ [...]
+
+ on the other hand the actual reciprocity of the individuals is based
+ tupon the picture which they derive of each other. Here we have
+ one of the deep circuits of the intellectual life, inasmuch as one
+ element presupposes a second, but the second presupposes the
+ first. While this is a fallacy within narrow ranges, and thus
+
+ [...]
+
+ or by dissimulation he may deceive us as to the truth. No other
+ object of knowledge can thus of its own initiative, either
+ enlighten us with reference to itself or conceal itself, as a human
+ being can. No other knowable object modifies its conduct from
+ consideration of its being understood or misunderstood. 'Tlhis
+
+ [...]
+
+ in misconception about the true intention of the person who
+ tells the lie. Veracity and mendacity are thus of the most far-
+ reaching significance for the relations of persons with each
+ other. Sociological structures are most characteristically dif-
+ ferentiated by the measure of mendacity that is operative in
+ them. To begin with, in very simple relationships a lie is
+ much more harmless foir the persistence of the group than
+ in complex associations. Primitive man, living in communities
+ of restricted extent, providing for his needs by his own produc-
+ tion or by direct co-operation, limiting his spiritual interests to
+ personal experience or to simple tradition, surveys and controls
+ the material of his existence more easily and completely than the
+ man of higher culture. In the latter case life rests upon a thou-
+ sand presuppositions which the individual can never trace back
+ to their origins, and verify; but which he must accept upon faith
+ and belief. In a much wider degree than people are accustomed
+ the economic system
+ to realize, modern civilized life -from
+ which is constantly becoming more and more a credit-economy,
+
+ [...]
+
+ to the pursuit of science, in which the majority of investigators
+ must use countless results obtained by others, and not directly
+ subject to verification- depends upon faith in the honor of
+ others. We rest our most serious decisions upon a complicated
+ system of conceptions, the majority of which presuppose con-
+ fidence that we have nlot been deceived. Hence prevarication in
+ modern circumstances becomes something much more devasta-
+ ting, something placing the foundations of life much more in
+ jeopardy, than was earlier the case. If lying appeared today
+ among us as a sin as permissible as among the Greek divinities,
+ the Hebrew patriarchs, or the South Sea Islanders; if the
+ extremne severity of the moral law did not veto it, the progressive
+ upbuilding of modern life would be simply impossible, since
+ modern life is, in a much wider than the economic sense, a
+ "credit-economy." This relationship of the times recurs in the
+ case of differences of other dimensions. The farther third per-
+ sons are located from the center of our personality, the easier can
+ we adjust ourselves practically, but also subjectively, to their lack
+ of integrity. On the other hand, if the few persons in our imme-
+ dia<te environment lie to us, life becomes intolerable. This
+
+
+ [...]
+
+ in the majority as compared with the liar who gets his advantage
+ from the lie. Consequently that enlightenment which aims at
+ elimination of the element of deception from social life is always
+ of a democratic character.
+ Human intercourse rests normally upon the condition that
+
+ [...]
+
+ development may gain vitality by alternate concession and resist-
+ ance. Relationships of an intimate character, the formal vehicle
+ of which is psycho-physical proximity, lose the charm, and even
+ the content, of their intimacy, unless the proximity includes, at
+ the same time and alternately, distance and intermission. Finally
+ -and
+ this is the matter with which we are now concerned -the
+ reciprocal knowledge, which is the positive condition of social
+ relationships, is not the sole condition. On the contrary, such as
+ those relationships are, they actually presuppose also a certain
+
+ [...]
+
+ By virtue of the situation just noticed, that antecedent or
+ consequent form of knowledge with reference to an individual-
+ viz., confidence in him, evidently one of the most important syn-
+ thetic forces within society -gains
+ a peculiar evolution. Confi-
+ dence, as the hypothesis of future conduct, which is sure enough
+ to become the basis of practical action, is, as hypothesis, a mediate
+ condition between knowing and not knowing another person.
+ The possession of full knowledge does away with the need o,f
+ trusting, while complete absence of knowledge makes trust evi-
+ dentlv impossible.' Whatever quantities of knowing and not
+ knowing must comnimingle, in order to make possible the detailed
+ practical decision based upon confidence, will be determined by
+ the historic epoch, the ranges of interests, and the individuals.
+
+ [...]
+
+ what is not forbidden is permitted, and, what is not permitted is
+ forbidden. Accordingly, the relationships of men are differen-
+ tiated by the question of knowledge with reference to each other:
+ what is not concealed may be known, and what is not revealed
+ may yet not be known. The last determination corresponds to the
+ otherwise effective consciousness that an ideal sphere surrounds
+ every human being, different in various directionsi and toward
+ different persons; a sphere varying in extent, into which one may
+ not venture to penetrate without disturbing the personal value of
+ the individual. Honor locates such an area. Language indi-
+ cates very nicely an invasion of this sort by such phrases as
+ "coming too near" (zu nahe treten). The radius of that sphere,
+ so to speak, marks the distance which a stranger may not cross
+ without infringing up,on another's honor. Another sphere of
+ like form corresponds to that which we designate as the "signifi-
+ cance" (Bedeutung) of another personality. Towards the
+ "significant" man there exists an inner compulsion to keep one's
+
+ [...]
+
+ signifies violation of the ego, at its center. Discretion is nothing
+ other than the sense of justice with respect to the sphere of the
+ intimate contents of life. Of co-urse, this sense is various in its
+
+
+ [...]
+
+ voluntarily reveal to us-must
+ necessity. But in finer and less simple form, in fragmentary
+ passages of association and in unuttered revelations, all commerce
+ of men with each other rests upon the condition that each knows
+ something more of the other than the latter voluntarily reveals
+ to him; and in many respects this is of a sort the knowledge of
+ which, if possible, would have been prevented by the party so
+ revealed. While this, judged as an individual affair, may count
+ as indiscretion, although in the social sense it is necessary as a
+
+ [...]
+
+ voluntarily reveal to us-must
+ necessity. But in finer and less simple form, in fragmentary
+ passages of association and in unuttered revelations, all commerce
+ of men with each other rests upon the condition that each knows
+ something more of the other than the latter voluntarily reveals
+ to him; and in many respects this is of a sort the knowledge of
+ which, if possible, would have been prevented by the party so
+ revealed. While this, judged as an individual affair, may count
+ as indiscretion, although in the social sense it is necessary as a
+ condition for the existing closeness and vitality of the inter-
+ change, yet the legal boundary of this invasion upon the spiritual
+ private property of another is extremely difficult to draw. In
+ general, men credit themselves with the right to know everything
+ which, without application of external illegal means, through
+ purely psychological observation and reflection, it is possible to
+ ascertain. In point of fact, however, indiscretion exercised in
+ this way may be quite as violent, and morally quite as unjusti-
+ fiable, as listening at keyholes and prying into the letters of
+
+ [...]
+
+ strangers. To anyone with fine psychological perceptions, men
+ betray themselves and their inmost thoughts and characteristics
+ in countless fashions, not only in spite of efforts not to' do so, but
+ often for the very reason that they anxiously attempt to guard
+ themselves. The greedy spying upon every unguarded word;
+ the boring persistence of inquiry as to the meaning of every slight
+ action, or tone of voice; what may be inferred from. such and
+ such expressions; what the blush at the mention of a given name
+ may betray-all this does, not overstep the boundary o'f external
+ discretion; it is entirely the labor of one's own mind, and there-
+ fore apparently within the unquestionable rights of the agent.
+ This is all the more the case, since such misuse of psychological
+ superiority oiften occurs as a purely involuntary procedure. Very
+ often it is impossible for us to, restrain our interpretation of
+ another, our theory of his subjective characteristics and inten-
+ tions. However positively an honorable person may forbid him-
+
+ [...]
+
+ so unavoidable, the division line between the permitted and the
+ non-permitted is the more indefinite. To what extent discretion
+ must restrain itself from mental handling " of all that which is its
+ own," to what extent the interests of intercourse, the reciprocal
+ interdependence of the members of the same group, limits this
+ duty of discretion - this is a question for the answer to, which
+ neither moral tact, nor survey of the o'bj ective relationships and
+ their demands, can alone be sufficient, since both factors must
+ rather always work together. The nicety and complexity of this
+ question throw it back in a much higher degree upon the respon-
+ sibility of the individual for decision, without final recourse to
+ any authoritative general norm, than is the case in connection
+ with a question of private property in the material sense.
+ In contrast with this preliminary form, or this attachment of
+
+ [...]
+
+ quently friendship, in which this intensity, but also this
+ inequality of devotion, is lacking, may more easily attach the
+ whole person to the whole person, may more easily break up
+ the reserves of the soul, not indeed by so impulsive a process,
+ but throoughout a wider area and during a longer succession.
+ This complete intimacy of confidence probably becomes, with
+ the changing differentiation of men, more and more difficult.
+ Perhaps the modern man has too much to conceal to make a
+ friendship in the ancient sense possible; perhaps personalities
+ also, except in very early years, are too peculiarly individualized
+ for the complete reciprocality of understanding, to which
+ always so much divination and productive phantasy are essen-
+ tial. It appears that, for this reason, the mo,dern type of
+ feeling inclines more to differentiated friendships; that is, to
+ those which have their territory only upon one side of the person-
+ ality at a time, and in which the rest of the personality plays no
+ part. Thus a quite special type of friendship emerges. For our
+ problem, namely, the degree of intrusion or of reserve within the
+ friendly relationship, this type is of the highest significance.
+
+ [...]
+
+ must come sooner or later.
+ In marriage, as in free relationships of analogous types, the
+ temptation is very natural to open oneself to the other at the
+ outset without limit; to abandon the last reserve of the soul
+ equally with those of the body, and thus to. lose oneself completely
+ in another. This, however, usually threatens the future of the
+ relationship. Only those people can without danger give them-
+ selves entirely to each other who canntot possibly give themselves
+ entirely, because the wealth of their soul rests in constant pro-
+ gressive development, which follows every devotion immediately
+ with the growth of new treasures. Complete devotion is safe
+ only in the case of those people who, have an inexhaustible fund
+ of latent spiritual riches, and therefore can no more alienate them
+ in a single confidence than a tree can give up the fruits of next
+ year by letting go what it produces at the present moment. The
+ case is quite different, however, with those people who, so to
+ speak, draw from their capital all their betrayals of feeling and
+
+ [...]
+
+ intensity so soon as it is confronted by a purpose of discovery.
+ Thereupon follows that purposeful concealment, that aggressive
+ defense, so to speak, against the other party, which we call
+ secrecy in the most real sense. Secrecy in this sense- i. e., whichi
+ is effective through negative or positive means of concealment
+ is one of the greatest accomplishments of humanity. In contrast
+ with the juvenile condition in which every mental picture is at
+
+ [...]
+
+ by the fact that what was formerly putblic passes under the pro-
+ tection of secrecy, and that, on the contrary, what was formerly
+ secret ceases to require such protection and proclaims itself. This
+ is analogous with that other evolution o,f mind in which move-
+ ments at first executed consciously become unconsciously me-
+ chanical, and, on the other hand, what was unconscious and
+ instinctive rises into the light of consciousness.
+ How this
+ development is distributed over the various formations of private
+
+ [...]
+
+ essential and significant. The natural impulse to idealization, and
+ the natural timidity of men, operate to one and the samne end in
+ the presence of secrecy; viz., to heighten it by phantasy, and to
+ distinguish it by a degree of attention that published reality could
+ not command.
+ Singularly enough, these attractions of secrecy enter into
+
+ [...]
+
+ not command.
+ Singularly enough, these attractions of secrecy enter into
+ combination with those of its logical opposite; viz., treason or
+ betrayal of secrets, which are evidently no less sociological in
+ their nature. Secrecy involves a tension which, at the moment of
+ revelation, finds its release. This constitutes the climax in the
+ development of the secret; in it the whole charm of secrecy con-
+ centrates and rises to its highest pitch - just as the moment of the
+ disappearance of an object brings out the feeling of its value in
+ the most intense degree. The sense of power connected with
+ possession of money is most comnpletely and greedily concentrated
+ for the soul of the spendthrift at the moment at which this power
+ slips from his hands. Secrecy also is sustained by the conscious-
+
+ [...]
+
+ 466
+ THE AMERICAN JOURNAL OF SOCIOLOGY
+ ness that it might be exploited, and therefore confers power to
+ modify fo,rtunes, to produce surprises, joys, and calamities, even
+ if the latter be only misfortunes to ourselves. Hence the possi-
+ bility and the temptation of treachery plays around the secret, and
+ the external danger off being discovered is interwoven with the
+ internal danger of self-discovery, which has the fascination of the
+ brink o,f a precipice. Secrecy sets barriers between men, but at
+ the same time offers the seductive temptation to break through the
+ barriers by gossip or confession. This temptation accompanies
+ the psychical life of the secret like an overtone. Hence the socio-
+ logical significance of the secret, its practical measure, and the
+ mode o,f its workings must be found in the capacity or the inclina-
+ tion of the initiated to, keep the secret to' himself, or in his resist-
+ ance or weakness relative to the temptation to, betrayal. From the
+ play of these two interests, in concealment and in revelation,
+ spring shadings and fortunes of human reciprocities throughout
+ their whole range. If, according to our previous analysis, every
+ human relationship has, as one of its traits, the degree of secrecy
+ within or around it, it follows that the further development of the
+ relationship in this respect depends on the combining proportions
+ of the retentive and the communicative energies -the
+ former
+ sustained by the practical interest and the formal attractiveness
+ of secrecy as such, the latter by inability to, endture longer the
+ tension of reticence, and by the superiority which is latent, so to
+ speak, in secrecy, but which is actualized for the feelings only at
+ the moment o'f revelation, and o'ften also, on the other hand, by
+ the joy of confession, which may contain that s,ense o,f power in
+ negative and perverted form, as self-abasement and contrition.
+ All these factors, which determine the sociological role of
+
+
+ [...]
+
+ too great temptation to disclose what might otherwise be hidden.
+ But in this case there is no need of secrecy in a high degree,
+ because this social formation usually tends to level its members,
+ and every peculiarity of being, acting, or possessing the persist-
+ ence of which requires secrecy is abhorrent to it. That all this
+ changes to its opposite in case of large widening of the circle is
+ a matter-of-course. In this connection, as in so many other par-
+ ticulars, the facts of monetary relationships reveal most distinctly
+ the specific traits of the large circle. Since transfers of economic
+ values have occurred principally by means of money, an otherwise
+ unattainable secrecy is possible in such transactions. Three pecu-
+ liarities of the money form of values are here important: first,
+ its compressibility, by virtue of which it is possible to, make a man
+ rich by slipping into his hand a check without attracting attention;
+ second, its abstractness and absence of qualitative character, in
+ consequence of which numberless sorts of acquisitions and trans-
+ fers of possessions may be covered up and guarded from publicity
+ in a fashion impossible so long as values could be possessed only
+ as extended, tangible objects; third, its long-distance effective-
+ ness, by virtue of which we may invest it in the most widely
+ removed and constantly changing values, and thus withdraw it
+ utterly from the view of our nearest neighbors. These facilities
+ of dissimulation which inhere in the degree of extension in the
+ use of money, and which disclose their dangers particularly in
+ dealings with foreign money, have called forth, as protective pro-
+ visions, publicity of the financial operations of corporations.
+ This points to a closer definition of the formula of evolution dis-
+ cussed above; viz., that throughout the form of secrecy there
+ occurs a permanent in- and out-flow of content, in which what is
+ originally open becomes secret, and what was originally concealed
+ throws off its mystery. Thus we might arrive at the paradoxical
+ idea that, under otherwise like circumstances, human associations
+ require a definite ratio of secrecy which merely changes its
+
+
+ [...]
+
+ this exchange it keeps its quantum unvaried. We may even fill
+ out this general scheme somewhat more exactly. It appears that
+ with increasing telic characteristics of culture the affairs of
+ people at large become more and more public, those of individuals
+ more and more secret. In less developed conditions, as observed
+ above, the circumstances of individual persons cannot protect
+ themselves in the same degree from reciprocal prying and inter-
+ fering as within modern types of life, particularly those that have
+ developed in large cities, where we find a quite new degree of
+ reserve and discretion. On the other hand, the public function-
+ aries in undeveloped states envelop themselves in a mystical
+ authority, while in maturer and wider relations, through exten-
+ sion of the range of their prerogatives, through the objectivity of
+ their technique, through the distance that separates them from
+ most of the individuals, a security and a dignity accrue to them
+ which are compatible with publicity of their behavior. That
+ earlier secrecy of public functions, however, betrayed its essential
+
+ [...]
+
+ Footnote 2 This counter-movement occurs also in the reverse direction.
+ It has been
+ observed, in connection with the history of the English court, that the actual
+ court cabals, the secret whisperings, the organized intrigues, do not spring up
+ under despotism, but only after the king has constitutional advisers, when the
+ government is to that extent a system open to view. After that time-
+ and this
+ applies especially since Edward II-the
+ king begins to form an unofficial, and
+ at the same time subterranean, circle of advisers, in contrast with the ministers
+ somehow forced upon him. This body brings into existence, within itself, and
+ through endeavors to join it, a chain of concealments and conspiracies.
+
+
+ [...]
+
+ have thought possible. Accordingly, politics, administration,
+ justice, have lost their secrecy and inaccessibility in precisely the
+ degree in which the individual has gained possibility of more com-
+ plete privacy, since modern- life has elaborated a technique for
+ isolation of the affairs of individuals, within the crowded condi-
+ tions of great cities, possible in former times only by means of
+ spatial separation.
+
+ To what extent this development is to be regarded as advan-
+ tageous depends upon social standards of value. Democracies are
+ bound to regard publicity as the condition desirable in itself.
+ This follows from the fundamental idea that each should be
+ informed about all the relationships and occurrences with which
+ he is concerned, since this is a condition of his doing his part with
+ reference to them, and every community of knowledge contains
+ also the psychological stimulation to community of action. It is
+ immaterial whether this conclusion is entirely binding. If an
+ objective controlling structure has been built up, beyond the
+ individual interests, but nevertheless to their advantage, such
+ a structure may very well, by virtue of its formal inde-
+ pendence, have a rightful claim to carry on a certain amount
+ of secret functioning without prejudice to its public char-
+ acter, so far as real consideration of the interests of all is con-
+ cerned. A logical connection, therefore, which would necessitate
+ the judgment of superior worth in favor of the condition of pub-
+ licity, does not exist. On the other hand, the universal scheme of
+ cultural differentiation puts in an appearance here: that which
+ pertains to the public becomes more public, that which belongs to
+ the individual becomes more private. Moreover, this historical
+ development brings o-ut the deeper real significance: that which
+ in its nature is public, wvhich in its content concerns all, becomes
+ also externally, in its sociological form, more and more public;
+ while that which in its inmost nature refers to the self alone-
+ also, gain
+ that is, the centripetal affairs of the individual -must
+ in so-ciological position a more and more private character, a
+ more decisive possibility of remaining secret.
+ While secrecy, therefore, is a sociological ordination which
+
+ [...]
+
+ As a general proposition, the secret society
+ emerges everywhere as correlate of despotism and of police con-
+ trol. It acts as protection alike of defense and of offense against
+ the violent pressure of central powers. This is true, not alone in
+ political relations, but in the same way within the church, the
+ school, and the family.
+
+ [...]
+
+ Thus the secret society
+ cotinterbalances the separatistic factor which is peculiar to, every
+ secret by the very fact that it is society.
+
+ [...]
+
+ lating will; for growth from within, constructive purposefulness.
+ This rationalistic factor in their upbuilding cannot express itself
+ more distinctly than in their carefully considered and clear-cut
+ architecture. I cite as example the structure of the Czechic secret
+ order, Omlaidina, which was organized on the model of a group
+ of the Carbonari, and became known in consequence of a judicial
+ process in I893. The leaders of the Omladina are divided into
+ "thumbs" and "fingers." In secret session a "thumb" is chosen
+ by the members. He selects four "fingers." The latter then
+ choose another " thumb," and this second " thumb " presents himn-
+ self to the first "thumb." The second "thumb" proceeds to
+ choose four more "fingers"; these, another "thumb;" and so
+ the articulation continues. The first " thumb " knows all the
+ other " thumbs," but the remaining " thumbs " do not know each
+ other. Of the "fingers" only those four know each other who
+ are subordinate to one and the same "thumb." All transactions
+
+ [...]
+
+ of the Omladina are conducted by the first "thumb," the " dicta-
+ tor." He informs the other "thumbs" of all proposed under-
+ takings. The "thumbs" then issue orders to their respective
+ subordinates, the "fingers." The latter in turn instruct the mem-
+ bers of the Omnladina assigned to each. The circumstance that
+ the secret society must be built up, from its base by calculation and
+ conscious volition evidently affords free play for the peculiar
+ passion which is the natural accompaniment of such arbitrary
+ processes of construction, such foreordaining programs. All
+ schematology - of science, of conduct, of society - contains a
+ reserved power of compulsion. It subjects a material which is
+ outside of thought to a form which thought has cast. If this is
+ true of all attempts to organize groups according to a priori prin-
+ ciples, it is true in the highest degree of the secret society, which
+ does not grow, which is built by design, which has to reckon with
+ a smaller quantum of ready-made building material than any
+ despotic or socialistic scheme. Joined to the interest in making
+
+ [...]
+
+ The secret society must seek to create among the cate-
+ gories peculiar to itself, a species of life-totality. Around the
+ nucleus of purposes which the society strongly emphasizes, it
+ therefore builds a structure of formulas, like a body around a
+ soul, and places both alike under the protection of secrecy, because
+ only so can a harmonious whole come into, being, in which one
+ part supports the other. That in this scheme secrecy of the
+ external is strongly accentuated, is necessary, because secrecy is
+ not so much a matter of course with reference to these super-
+ ficialities, and not so directly demanded as in the case of the real
+ interests of the society. This is not greatly different from the
+ situation in military organizations and religious communities.
+ The reason why, in both, schematism, the body of forms, the fixa-
+ tion of behavior, occupies so large space, is that, 'as a general pro-
+ position, both the military and the religious career demand the
+ wvhole man; that is, each of them projects the whole life upon a
+ special plane; each composes a variety of energies and interests,
+ from a particular point of view, into a correlated unity. The
+ secret society usually tries to do the same.
+
+
+ [...]
+
+ The secret society must seek to create among the cate-
+ gories peculiar to itself, a species of life-totality. Around the
+ nucleus of purposes which the society strongly emphasizes, it
+ therefore builds a structure of formulas, like a body around a
+ soul, and places both alike under the protection of secrecy, because
+ only so can a harmonious whole come into, being, in which one
+ part supports the other. That in this scheme secrecy of the
+ external is strongly accentuated, is necessary, because secrecy is
+ not so much a matter of course with reference to these super-
+ ficialities, and not so directly demanded as in the case of the real
+ interests of the society. This is not greatly different from the
+ situation in military organizations and religious communities.
+ The reason why, in both, schematism, the body of forms, the fixa-
+ tion of behavior, occupies so large space, is that, 'as a general pro-
+ position, both the military and the religious career demand the
+ wvhole man; that is, each of them projects the whole life upon a
+ special plane; each composes a variety of energies and interests,
+ from a particular point of view, into a correlated unity. The
+ secret society usually tries to do the same. One of its essential
+ characteristics is that, even when it takes hold of individuals only
+
+ [...]
+
+Counterpart of the official world, detachment from larger structures in
+which it's contained (the next level of recursion):
+
+ Moreover, through such formalism,
+ just as through the hierarchical structure above discussed, the
+ secret society constitutes itself a sort of counterpart of the official
+ world with which it places itself in antithesis. Here we have a
+ case of the universally emerging sociological norm; viz., struc-
+ tures, which place themselves in opposition to and detachment
+ from larger structures in which they are actually contained,
+ nevertheless repeat in themselves the forms of the greater struc-
+ tures. Only a structure that in some way can count as a whole
+ is in a situation to hold its elements firmly together. It borrows
+ the sort of organic completeness, by virtue of which its members
+ are actually the channels of a unifying life-stream, from that
+ greater whole to which its individual members were already
+ adapted, and to which it can most easily offer a parallel by means
+ of this very imitation.
+
+ -- 482
+
+Freedom and law from the inside:
+
+ In exercise of this freedom a territory is occupied to which the norms of the
+ surrounding society do not apply. The nature of the secret
+ society as such is autonomy. It is, however, of a sort which
+ approaches anarchy. Withdrawal from the bonds of unity which
+ procure general coh,erence very easily has as consequences for the
+ secret society a condition of being without roots, an absence of
+ firm touch with life (Lebensgefiihl), and of restraining reserva-
+ tions. The fixedness and detail of the ritual serve in part to
+ counterbalance this deficit. Here also is manifest how much men
+ need a settled proportion between freedom and law; and, further-
+ more, in case the relative quantities of the two are not prescribed
+ for him from a single source, how he attempts to reinforce the
+ given quantum of the one by a quantum of the other derived from
+ any source whatsoever, until such settled proportion is reached.
+
+ -- 482
+
+Existem a partir de sociedes públicas e de forma exclusiva::
+
+ The secret society, on the other hand, is a secondary structure;
+ i. e., it arises always only within an already complete society.
+
+ [...]
+
+ That they can build them selves up with such characteristics is possible, however, only
+ under the presupposition of an already existing society. The
+ secret society sets itself as a special society in antithesis with the
+ wider association included within the greater society. This anti-
+ thesis, whatever its purpose, is at all events intended in the spirit
+ of exclusion. Even the secret society which proposes only to
+ render the whole community a definite service in a completely
+ unselfish spirit, and to dissolve itself after performing the service,
+ obviously regards its temporary detachment from that totality as
+ the unavoidable technique for its purpose. Accordingly, none of
+ the narrower groups which are circumscribed by larger groiups
+ are compelled by their sociological constellation to insist so
+ strongly as the secret society upon their formal self-sufficiency.
+ Their secret encircles them like a boundary, beyond which there is
+ nothing but the materially, o,r at least formally, antithetic, which
+ therefore shuts up the society within itself as a complete unity.
+ In the groupings of every other sort, the content of the group-
+
+Aristocracy:
+
+ This significance of secret associations, as intensification of
+ sociological exclusiveness in general, appears in a very striking
+ way in political aristocracies. Among the requisites of aristo-
+ cratic control secrecy has always had a place. It makes use of
+ the psychological fact that the unknown as such appears terrible,
+ powerful, and threatening. In the first place, it employs this fact
+ in seeking to conceal the numerical insignificance of the govern-
+ ing class. In Sparta the number of warriors was kept so, far as
+
+ [...]
+
+ On the other hand, the democratic principle is
+ bound up with the principle of publicity, and, to the same end, the
+ tendency toward general and fundamental laws. The latter relate
+ to an unlimited number of subjects, and are thus in their nature
+ public. Conversely, the employment of secrecy within the aristo-
+ cratic regime is only the extreme exaggeration of that social
+ exclusion and exemption for the sake of which aristocracies are
+ wont to oppose general, fundamentally sanctioned laws.
+ In case the notion of the aristocratic passes over from the
+
+Freedom, obedience and centralization:
+
+ To this result not merely the correlation of demand
+ from freedom and for union contributes, as we have observed it
+ in case of the severity of the ritual, and in the present instance it
+ binds together the extremes of the two tendencies. The excess of
+ freedom, which such societies possessed with reference to all
+ otherwise valid norms, had to be offset, for the sake of the
+ equilibrium of interests, by a similar excess olf submissiveness
+ and resigning of the individual will. More essential, however.
+ was probably the necessity of centralization, which is the con-
+ dition of existence for the secret society, and especially when,
+ like the criminal band, it lives off the surrounding society,
+ when it mingles with this society in many radiations and
+ actions, and when it is seriously threatened with treachery
+ and diversion of interests the moment the most invariable
+ attachment to one center ceases to prevail. It is conseqeuntly
+ typical that the secret society is exposed to peculiar dangers,
+ especially when, for any reasons whatever, it does not develop
+ a powerfully unifying authority. The Waldenses were in
+ nature not a secret society. They became a secret society in
+ the thirteenth century only, in consequence of the external pres-
+ sure, which made it necessary to keep themselves from view. It
+ became impossible, for that reason, to hold regular assemblages,
+ and this in turn caused loss of unity in doctrine. There arose a
+ number of branches, with isolated life and development, fre-
+ quently in a hostile attitude toward each other. They went into
+ decline because they lacked the necessary and reinforcing attri-
+ bute of the secret society, viz., constantly efficient centralization.
+
+Responsibility:
+
+ Nevertheless, responsibility
+ is quite as immediately joined with the ego - philosophically, too,
+ the whole responsibility problem is merely a detail of the problem
+ of the ego - in the fact that removing the marks of identity of
+ the person has, for the naive understanding in question, the effect
+ of abolishing responsibility. Political finesse makes no less use of
+ this correlation. In the American House of Representatives the
+ real conclusions are reached in the standing,committees, and they
+ are almost always ratified by the House. The transactions of
+ these committies, however, are secret, and the most important
+ portion of legislative activity is thus concealed from public view.
+ This being the case, the political responsibility of the repre-
+ sentatives seems to be largely wiped out, since no one can be
+ made responsible for proceedings that cannot be observed. Since
+ the shares of the individual persons in the transactions remain
+ hidden, the acts of committees and of the House seem to be those
+ of a super-individual authority. The irresponsibility is here also
+ the consequence or the symbol of the same intensified sociological
+ de-individualization which goes with the secrecy of group-action.
+ In all directorates, faculties, committees, boards of trustees, etc.,
+ whose transactions are secret, the same thing holds. The indi-
+ vidual disappears as a person in the anonymous member of the
+ ring, so to speak, and with him the responsibility, which has no
+ hold upon him. in his intangible special character.
+ Finally, this one-sided intensification of universal sociological
+
+ -- 496-497
+
+ [...]
+
+Danger for the rest of society and the existing oficial and central power:
+
+ Wherever there is an attempt to realize
+ strong centralization, especially of a political type, special organi-
+ zations of the elements are abhorred, purely as such, entirely apart
+ from their content and purposes. As mere unities, so to speak,
+ they engage in competition with the central principle.
+
+ [...]
+
+ Accordingly, the secret society seems to be dangerous simply
+ because it is secret. Since it cannot be surely known that any
+ special organization whatever may not some day turn its legally
+ accumulated powers to some undesired end, and since on that
+ account there is suspicion in principle on the part of central
+ powers toward organizations of subjects, it follows that, in the
+ case of organizations which are secret in principle, the suspicion
+ that their secrecy conceals dangers is all the more natural.
+
+ [...]
+
+ Thus the secret society, purely on the ground of its secrecy, appears
+ dangerously related to conspiracy against existing powers.
+
+ [...]
+
+ The secret association is in such bad repute as enemy of central powers that,
+ conversely, every politically disapproved association must be
+ accused of such hostility!
+
+ -- 497-498