aboutsummaryrefslogtreecommitdiff
path: root/books/sociology/counterrevolution.md
blob: 0ac573141b0c8574bcdf92e9c693359908030c39 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
1852
1853
1854
1855
1856
1857
1858
1859
1860
1861
1862
1863
1864
1865
1866
1867
1868
[[!meta title="The Counterrevolution"]]

* [The Counterrevolution](http://bernardharcourt.com/the-counterrevolution/).
* By Bernard E. Harcourt.

## Index

[[!toc startlevel=2 levels=4]]

## Genealogy

* Mass-scale warfare
  * MAD
  * Massive retaliation
  * Game theory
  * Systems analisys
  * Nuclear war

* Counterinsurgency
  * Modern warfare
  * Unconventional, counter-guerrila
  * Special Ops
  * Surgical operations

* Mao's “Eight Points of Attention” plus two principles:
  1. Talk to people politely.
  2. Observe fair dealing in all business transactions.
  3. Return everything borrowed from the people.
  4. Pay for anything damaged.
  5. Do not beat or scold the people.
  6. Do not damage crops.
  7. Do not molest women.
  8. Do not ill-treat prisoners-of-war. 6

      Two other principles were central to Mao’s revolutionary doctrine: first, the
      importance of having a unified political and military power structure that
      consolidated, in the same hands, political and military considerations; and
      second, the importance of psychological warfare. More specifically, as Paret
      explained, “proper psychological measures could create and maintain ideological
      cohesion among fighters and their civilian supporters.” 7

* Paret's (1960) tasks of “counterguerrilla action”:
  1. The military defeat of the guerrilla forces.
  2. The separation of the guerrilla from the population.
  3. The reestablishment of governmental authority and the development of a viable social order.

* Petraeus: 3 key pillars:
  1. "The first is that the most important struggle is over the population."
  2. "Allegiance of the masses can only be secured
     by separating the small revolutionary minority from the passive majority, and by
     isolating, containing, and ultimately eliminating the active minority. In his
     accompanying guidelines,"
  3. "Success turns on collecting information on
     everyone in the population. Total information is essential to properly distinguish
     friend from foe and then extract the revolutionary minority. It is intelligence—
     total information awareness—that renders the counterinsurgency possible."

## Excerpts

### Torture

    In Modern Warfare, Trinquier quietly but resolutely condoned torture. The
    interrogations and related tasks were considered police work, as opposed to
    military operations, but they had the exact same mission: the complete
    destruction of the insurgent group. Discussing the typical interrogation of a
    detainee, captured and suspected of belonging to a terrorist organization,
    Trinquier wrote: “No lawyer is present for such an interrogation. If the prisoner
    gives the information requested, the examination is quickly terminated; if not,
    specialists must force his secret from him. Then, as a soldier, he must face the
    suffering, and perhaps the death, he has heretofore managed to avoid.” Trinquier
    described specialists forcing secrets out of suspects using scientific methods that
    did not injure the “integrity of individuals,” but it was clear what those
    “scientific” methods entailed. 4 As the war correspondent Bernard Fall suggests,
    the political situation in Algeria offered Trinquier the opportunity to develop “a
    Cartesian rationale” to justify the use of torture in modern warfare. 5
    Similarly minded commanders championed the use of torture, indefinite
    detention, and summary executions. They made no bones about it.

    [...]

    In his autobiographical account published in 2001, Services Spéciaux. Algérie
    1955–1957, General Paul Aussaresses admits to the brutal methods that were the
    cornerstone of his military strategy. 6 He makes clear that his approach to
    counterinsurgency rested on a three-pronged strategy, which included first,
    intelligence work; second, torture; and third, summary executions. The
    intelligence function was primordial because the insurgents’ strategy in Algeria
    was to infiltrate and integrate the population, to blend in perfectly, and then
    gradually to involve the population in the struggle. To combat this insurgent
    strategy required intelligence—the only way to sort the dangerous
    revolutionaries from the passive masses—and then, violent repression. “The first
    step was to dispatch the clean-up teams, of which I was a part,” Aussaresses
    writes. “Rebel leaders had to be identified, neutralized, and eliminated discreetly.
    By seeking information on FLN leaders I would automatically be able to capture
    the rebels and make them talk.” 7
    The rebels were made to talk by means of torture. Aussaresses firmly
    believed that torture was the best way to extract information. It also served to
    terrorize the radical minority and, in the process, to reduce it. The practice of
    torture was “widely used in Algeria,” Aussaresses acknowledges. Not on every
    prisoner, though; many spoke freely. “It was only when a prisoner refused to talk
    or denied the obvious that torture was used.” 8
    Aussaresses claims he was introduced to torture in Algeria by the policemen
    there, who used it regularly. But it quickly became routine to him. “Without any
    hesitation,” he writes, “the policemen showed me the technique used for
    ‘extreme’ interrogations: first, a beating, which in most cases was enough; then
    other means, such as electric shocks, known as the famous ‘gégène’; and finally
    water.” Aussaresses explains: “Torture by electric shock was made possible by
    generators used to power field radio transmitters, which were extremely
    common in Algeria. Electrodes were attached to the prisoner’s ears or testicles,
    then electric charges of varying intensity were turned on. This was apparently a
    well-known procedure and I assumed that the policemen at Philippeville [in
    Algeria] had not invented it.” 9 (Similar methods had, in fact, been used earlier in
    Indochina.)

    Aussaresses could not have been more clear:

        The methods I used were always the same: beatings, electric shocks, and, in particular, water
        torture, which was the most dangerous technique for the prisoner. It never lasted for more than one
        hour and the suspects would speak in the hope of saving their own lives. They would therefore
        either talk quickly or never.

    The French historian Benjamin Stora confirms the generalized use of torture.
    He reports that in the Battle of Algiers, under the commanding officer, General
    Jacques Massu, the paratroopers conducted massive arrests and “practiced
    torture” using “electrodes […] dunking in bathtubs, beatings.” General Massu
    himself would later acknowledge the use of torture. In a rebuttal he wrote in
    1971 to the film The Battle of Algiers, Massu described torture as “a cruel
    necessity.” 10 According to Aussaresses, torture was condoned at the highest
    levels of the French government. “Regarding the use of torture,” Aussaresses

    [...]

    For Aussaresses, as for Roger Trinquier, torture and disappearances were
    simply an inevitable byproduct of an insurgency—inevitable on both sides of the
    struggle. Because terrorism was inscribed in revolutionary strategy, it had to be
    used in its repression as well. In a fascinating televised debate in 1970 with the
    FLN leader and producer of The Battle of Algiers, Saadi Yacef, Trinquier
    confidently asserted that torture was simply a necessary and inevitable part of
    modern warfare. Torture will take place. Insurgents know it. In fact, they
    anticipate it. The passage is striking:

        I have to tell you. Whether you’re for or against torture, it makes no difference. Torture is a
        weapon that will be used in every insurgent war. One has to know that… One has to know that in
        an insurgency, you are going to be tortured.
        And you have to mount a subversive organization in light of that and in function of torture. It is
        not a question of being for or against torture. You have to know that all arrested prisoners in an
        insurgency will speak—unless they commit suicide. Their confession will always be obtained. So a
        subversive organization must be mounted in function of that, so that a prisoner who speaks does
        not give away the whole organization.16

    “Torture?” asks the lieutenant aide de camp in Henri Alleg’s 1958 exposé
    The Question. “You don’t make war with choirboys.” 18 Alleg, a French
    journalist and director of the Alger républicain newspaper, was himself detained
    and tortured by French paratroopers in Algiers. His book describes the
    experience in detail, and in his account, torture was the inevitable product of
    colonization and the anticolonial struggle. As Jean-Paul Sartre writes in his

    [...]

    In an arresting part of The Battle of Algiers it becomes clear that many of the
    French officers who tortured suspected FLN members had themselves, as
    members of the French Resistance, been victims of torture at the hands of the
    Gestapo. It is a shocking moment. We know, of course, that abuse often begets
    abuse; but nevertheless, one would have hoped that a victim of torture would
    recoil from administering it to others. Instead, as Trinquier suggests, torture
    became normalized in Algeria. This is, as Sartre describes it, the “terrible truth”:
    “If fifteen years are enough to transform victims into executioners, then this
    behavior is not more than a matter of opportunity and occasion. Anybody, at any
    time, may equally find himself victim or executioner.” 20

### Misc

    The central tenet of counterinsurgency theory is that populations—originally
    colonial populations, but now all populations, including our own—are made up
    of a small active minority of insurgents, a small group of those opposed to the
    insurgency, and a large passive majority that can be swayed one way or the other.
    The principal objective of counterinsurgency is to gain the allegiance of that
    passive majority. And its defining feature is that counterinsurgency is not just a
    military strategy, but more importantly a political technique. Warfare, it turns
    out, is political.

    On the basis of these tenets, counterinsurgency theorists developed and
    refined over several decades three core strategies. First, obtain total information:
    every communication, all personal data, all metadata of everyone in the
    population must be collected and analyzed. Not just the active minority, but
    everyone in the population. Total information awareness is necessary to
    distinguish between friend and foe, and then to cull the dangerous minority from
    the docile majority. Second, eradicate the active minority: once the dangerous
    minority has been identified, it must be separated from the general population

    [...]

    and eliminated by any means possible—it must be isolated, contained, and
    ultimately eradicated. Third, gain the allegiance of the general population:
    everything must be done to win the hearts and minds of the passive majority. It is
    their allegiance and loyalty, and passivity in the end, that matter most.
    Counterinsurgency warfare has become our new governing paradigm in the

    [...]

    imagination. It drives our foreign affairs and now our domestic policy as well.
    But it was not always that way. For most of the twentieth century, we
    governed ourselves differently in the United States: our political imagination
    was dominated by the massive battlefields of the Marne, of Verdun, by the
    Blitzkrieg and the fire-bombing of Dresden—and by the use of the atomic bomb.

    [...]

    warfare.
    Yet the transition from large-scale battlefield warfare to anticolonial struggles
    and the Cold War in the 1950s, and to the war against terrorism since 9/11, has
    brought about a historic transformation in our political imagination and in the
    way that we govern ourselves. In contrast to the earlier sweeping military
    paradigm, we now engage in surgical microstrategies of counterinsurgency
    abroad and at home. This style of warfare—the very opposite of large-scale
    battlefield wars like World War I or II—involves total surveillance, surgical
    operations, targeted strikes to eliminate small enclaves, psychological tactics,
    and political techniques to gain the trust of the people. The primary target is no
    longer a regular army, so much as it is the entire population. It involves a new

    [...]

    The result is radical. We are now witnessing the triumph of a counterinsurgency
    model of government on American soil in the absence of an insurgency, or
    uprising, or revolution. The perfected logic of counterinsurgency now applies
    regardless of whether there is a domestic insurrection. We now face a
    counterinsurgency without insurgency. A counterrevolution without revolution.
    The pure form of counterrevolution, without a revolution, as a simple modality
    of governing at home—what could be called “The Counterrevolution.”
    Counterinsurgency practices were already being deployed domestically in the

    [...]

    new internal enemies. It is vital that we come to grips with this new mode of
    governing and recognize its unique dangers, that we see the increasingly
    widespread domestication of counterinsurgency strategies and the new
    technologies of digital surveillance, drones, and hypermilitarized police for what
    they are: a counterrevolution without a revolution. We are facing something
    radical, new, and dangerous. It has been long in the making, historically. It is
    time to identify and expose it.


    [...]

    so on. I argued that we have become an “expository society” where we
    increasingly exhibit ourselves online, and in the process, freely give away our
    most personal and private data. No longer an Orwellian or a panoptic society
    characterized by a powerful central government forcibly surveilling its citizens
    from on high, ours is fueled by our own pleasures, proclivities, joys, and
    narcissism. And even when we try to resist these temptations, we have
    practically no choice but to use the Internet and shed our digital traces.
    I had not fully grasped, though, the relation of our new expository society to

    [...]

    strikes, indefinite detention, or our new hypermilitarized police force at home.
    But as the fog lifts from 9/11, the full picture becomes clear. The expository
    society is merely the first prong of The Counterrevolution. And only by tying
    together our digital exposure with our new mode of counterinsurgency
    governance can we begin to grasp the whole architecture of our contemporary
    political condition. And only by grasping the full implications of this new mode
    of governing—The Counterrevolution—will we be able to effectively resist it
    and overcome.

    [...]

    approach targeting small revolutionary insurgencies and what were mostly
    Communist uprisings. Variously called “unconventional,” “antiguerrilla” or
    “counterguerrilla,” “irregular,” “sublimited,” “counterrevolutionary,” or simply
    “modern” warfare, this burgeoning domain of military strategy flourished during
    France’s wars in Indochina and Algeria, Britain’s wars in Malaya and Palestine,
    and America’s war in Vietnam. It too was nourished by the RAND Corporation,
    which was one of the first to see the potential of what the French commander
    Roger Trinquier called “modern warfare” or the “French view of
    counterinsurgency.” It offered, in the words of one of its leading students, the
    historian Peter Paret, a vital counterweight “at the opposite end of the spectrum
    from rockets and the hydrogen bomb.” 2
    Like nuclear-weapon strategy, the counterinsurgency model grew out of a


    [...]

    from rockets and the hydrogen bomb.” 2
    Like nuclear-weapon strategy, the counterinsurgency model grew out of a
    combination of strategic game theory and systems theorizing; but unlike nuclear
    strategy, which was primarily a response to the Soviet Union, it developed more
    in response to another formidable game theorist, Mao Zedong. The formative
    moment for counterinsurgency theory was not the nuclear confrontation that
    characterized the Cuban Missile Crisis, but the earlier Chinese Civil War that led
    to Mao’s victory in 1949—essentially, when Mao turned guerrilla tactics into a
    revolutionary war that overthrew a political regime. The central methods and
    practices of counterinsurgency warfare were honed in response to Mao’s
    strategies and the ensuing anticolonial struggles in Southeast Asia, the Middle
    East, and North Africa that imitated Mao’s approach. 3 Those struggles for
    independence were the breeding soil for the development and perfection of
    unconventional warfare.
    By the turn of the twentieth century, when President George W. Bush would

    [...]

    T HE COUNTERINSURGENCY MODEL CAN BE TRACED BACK through several different
    genealogies. One leads to British colonial rule in India and Southeast Asia, to the
    insurgencies there, and to the eventual British redeployment and modernization
    of counterinsurgency strategies in Northern Ireland and Britain at the height of
    the Irish Republican Army’s independence struggles. This first genealogy draws
    heavily on the writings of the British counterinsurgency theorist Sir Robert
    Thompson, the chief architect of Great Britain’s antiguerrilla strategies in
    Malaya from 1948 to 1959. Another genealogy traces back to the American
    colonial experience in the Philippines at the beginning of the twentieth century.
    Others lead back to Trotsky and Lenin in Russia, to Lawrence of Arabia during
    the Arab Revolt, or even to the Spanish uprising against Napoleon—all
    mentioned, at least briefly, in General Petraeus’s counterinsurgency field
    manual. Alternative genealogies reach back to the political theories of
    Montesquieu or John Stuart Mill, while some go even further to antiquity and to
    the works of Polybius, Herodotus, and Tacitus. 1
    But the most direct antecedent of counterinsurgency warfare as embraced by
    the United States after 9/11 was the French military response in the late 1950s
    and 1960s to the anticolonial wars in Indochina and Algeria. This genealogy
    passes through three important figures—the historian Peter Paret and the French
    commanders David Galula and Roger Trinquier—and, through them, it traces
    back to Mao Zedong. It is Mao’s idea of the political nature of
    counterinsurgency that would prove so influential in the United States. Mao
    politicized warfare in a manner that would come back to haunt us today. The
    French connection also laid the seeds of a tension between brutality and legality
    that would plague counterinsurgency practices to the present—at least, until the
    United States discovered, or rediscovered, a way to resolve the tension by
    legalizing the brutality.


    [...]

    A founding principle of revolutionary insurgency—what Paret referred to as
    “the principal lesson” that Mao taught—was that “an inferior force could
    outpoint a modern army so long as it succeeded in gaining at least the tacit
    support of the population in the contested area.” 4 The core idea was that the
    military battle was less decisive than the political struggle over the loyalty and
    allegiance of the masses: the war is fought over the population or, in Mao’s
    words, “The army cannot exist without the people.” 5
    As a result of this interdependence, the insurgents had to treat the general
    population well to gain its support. On this basis Mao formulated early on, in
    1928, his “Eight Points of Attention” for army personnel:

    1. Talk to people politely.
    2. Observe fair dealing in all business transactions.
    3. Return everything borrowed from the people.
    4. Pay for anything damaged.
    5. Do not beat or scold the people.
    6. Do not damage crops.
    7. Do not molest women.
    8. Do not ill-treat prisoners-of-war. 6

    Two other principles were central to Mao’s revolutionary doctrine: first, the
    importance of having a unified political and military power structure that
    consolidated, in the same hands, political and military considerations; and
    second, the importance of psychological warfare. More specifically, as Paret
    explained, “proper psychological measures could create and maintain ideological
    cohesion among fighters and their civilian supporters.” 7
    Revolutionary warfare, in Paret’s view, boiled down to a simple equation:

    [...]

    the population.” 10
    Of course, neither Paret nor other strategists were so naïve as to think that
    Mao invented guerrilla warfare. Paret spent much of his research tracing the
    antecedents and earlier experiments with insurgent and counterinsurgency
    warfare. “Civilians taking up arms and fighting as irregulars are as old as war,”
    Paret emphasized. Caesar had to deal with them in Gaul and Germania, the
    British in the American colonies or in South Africa with the Boers, Napoleon in
    Spain, and on and on. In fact, as Paret stressed, the very term “guerrilla”
    originated in the Spanish peasant resistance to Napoleon after the Spanish
    monarchy had fallen between 1808 and 1813. Paret developed case studies of the

    [...]

    But for purposes of describing the “guerre révolutionnaire” of the 1960s, the
    most pertinent and timely objects of study were Mao Zedong and the Chinese
    revolution. And on the basis of that particular conception of revolutionary war,
    Paret set forth a model of counterrevolutionary warfare. Drawing principally on
    French military practitioners and theorists, Paret delineated a three-pronged
    strategy focused on a mixture of intelligence gathering, psychological warfare on
    both the population and the subversives, and severe treatment of the rebels. In
    Guerrillas in the 1960’s, Paret reduced the tasks of “counterguerrilla action” to
    the following:
    1. The military defeat of the guerrilla forces.
    2. The separation of the guerrilla from the population.
    3. The reestablishment of governmental authority and the development of a
    viable social order. 12

    [...]

    interact.” 13
    So the central task, according to Paret, was to attack the rebel’s popular
    support so that he would “lose his hold over the people, and be isolated from
    them.” There were different ways to accomplish this, from widely publicized
    military defeats and sophisticated psychological warfare to the resettlement of
    populations—in addition to other more coercive measures. But one rose above
    the others for Paret: to encourage the people to form progovernment militias and
    fight against the guerrillas. This approach had the most potential, Paret observes:
    “Once a substantial number of members of a community commit violence on


    [...]

    In sum, the French model of
    counterrevolutionary warfare, in Paret’s view, had to be understood as the
    inverse of revolutionary warfare.


    [...]

    The main sources for Paret’s synthesis were the writings and practices of French
    commanders on the ground, especially Roger Trinquier and David Galula,
    though there were others as well. 15 Trinquier, one of the first French
    commanders to theorize modern warfare based on his firsthand experience, had a


    [...]

    persisting in repeating its efforts.” Trinquier argues that this new form of modern
    warfare called for “an interlocking system of actions—political, economic,
    psychological, military,” grounded on “Countrywide Intelligence.” As Trinquier
    emphasizes, “since modern warfare asserts its presence on the totality of the
    population, we have to be everywhere informed.” Informed, in order to know and
    target the population and wipe out the insurgency. 17
    The other leading counterinsurgency theorist, also with deep firsthand


    [...]

    time.’” 19
    From Mao, Galula drew the central lesson that societies were divided into
    three groups and that the key to victory was to isolate and eradicate the active
    minority in order to gain the allegiance of the masses. Galula emphasizes in
    Counterinsurgency Warfare that the central strategy of counterinsurgency theory
    “simply expresses the basic tenet of the exercise of political power”:
    In any situation, whatever the cause, there will be an active minority for the cause, a neutral
    majority, and an active minority against the cause.

    [...]

    time.’” 19
    From Mao, Galula drew the central lesson that societies were divided into
    three groups and that the key to victory was to isolate and eradicate the active
    minority in order to gain the allegiance of the masses. Galula emphasizes in
    Counterinsurgency Warfare that the central strategy of counterinsurgency theory
    “simply expresses the basic tenet of the exercise of political power”:
    In any situation, whatever the cause, there will be an active minority for the cause, a neutral
    majority, and an active minority against the cause.

    The technique of power consists in relying on the favorable minority in order to rally the neutral
    majority and to neutralize or eliminate the hostile minority.20
    The battle was over the general population, Galula emphasized in his
    Counterinsurgency Warfare, and this tenet represented the key political
    dimension of a new warfare strategy.

    [...]

    US general David Petraeus picked up right where David Galula and Peter Paret
    left off. Widely recognized as the leading American thinker and practitioner of
    counterinsurgency theory—eventually responsible for all coalition troops in Iraq
    and the architect of the troop surge of 2007—General Petraeus would refine

    [...]

    On this political foundation, General Petraeus’s manual establishes three key
    pillars—what might be called counterinsurgency’s core principles.
    The first is that the most important struggle is over the population. In a short
    set of guidelines that accompanies his field manual, General Petraeus
    emphasizes: “The decisive terrain is the human terrain. The people are the center

    [...]

    The main battle, then, is over the populace.
    The second principle is that the allegiance of the masses can only be secured
    by separating the small revolutionary minority from the passive majority, and by
    isolating, containing, and ultimately eliminating the active minority. In his
    accompanying guidelines, General Petraeus emphasizes: “Seek out and eliminate
    those who threaten the population. Don’t let them intimidate the innocent. Target
    the whole network, not just individuals.” 25
    The third core principle is that success turns on collecting information on
    everyone in the population. Total information is essential to properly distinguish
    friend from foe and then extract the revolutionary minority. It is intelligence—
    total information awareness—that renders the counterinsurgency possible. It is

    [...]

    paraphrasing the French commander, underscores the primacy of political factors
    in counterinsurgency. “General Chang Ting-chen of Mao Zedong’s central
    committee once stated that revolutionary war was 80 percent political action and
    only 20 percent military,” the manual reads. Then it warns: “At the beginning of
    a COIN operation, military actions may appear predominant as security forces
    conduct operations to secure the populace and kill or capture insurgents;
    however, political objectives must guide the military’s approach.” 27
    Chapter Two opens with an epigraph from David Galula’s book: “Essential

    [...]

    General David Petraeus learned, but more importantly popularized, Mao
    Zedong’s central lesson: counterinsurgency warfare is political. It is a strategy
    for winning over the people. It is a strategy for governing. And it is quite telling
    that a work so indebted to Mao and midcentury French colonial thinkers would
    become so influential post-9/11. Petraeus’s manual contained a roadmap for a
    new paradigm of governing. As the fog lifts from 9/11, it is becoming
    increasingly clear what lasting impact Mao had on our government of self and
    others today.

    [...]

    D eveloped by military commanders and strategists over decades of anticolonial
    wars, counterinsurgency warfare was refined, deployed, and tested in the years
    following 9/11. Since then, the modern warfare paradigm has been distilled into
    a concise three-pronged strategy:
    1. Bulk-collect all intelligence about everyone in the population—every
    piece of data and metadata available. (total information awareness)

    [...]

    2. Identify and eradicate the revolutionary minority. Total information about
    everyone makes it possible to discriminate between friend and foe. Once
    suspicion attaches, individuals must be treated severely to extract all
    possible information, with enhanced interrogation techniques if
    necessary; and if they are revealed to belong to the active minority, they
    must be disposed of through detention, rendition, deportation, or drone
    strike—in other words, targeted assassination. Unlike conventional
    soldiers from the past, these insurgents are dangerous because of their

    [...]

    3. Pacify the masses. The population must be distracted, entertained,
    satisfied, occupied, and most importantly, neutralized, or deradicalized if
    necessary, in order to ensure that the vast preponderance of ordinary
    individuals remain just that—ordinary. This third prong reflects the
    “population-centric” dimension of counterinsurgency theory. Remember,
    in this new way of seeing, the population is the battlefield. Its hearts and
    minds must be assured. In the digital age, this can be achieved, first, by
    targeting enhanced content (such as sermons by moderate imams) to
    deradicalize susceptible persons—in other words, by deploying new
    digital techniques of psychological warfare and propaganda. Second, by
    providing just the bare minimum in terms of welfare and humanitarian
    assistance—like rebuilding schools, distributing some cash, and
    bolstering certain government institutions. As General Petraeus’s field

### Torture and surveilance

    T HE ATTACK ON THE W ORLD T RADE C ENTER SHOWED THE weakness of American
    intelligence gathering. Top secret information obtained by one agency was
    silo’ed from others, making it impossible to aggregate intelligence and obtain a
    full picture of the security threats. The CIA knew that two of the 9/11 hijackers
    were on American soil in San Diego, but didn’t share the information with the
    FBI, who were actively trying to track them down. 1 September 11 was a
    crippling intelligence failure, and in the immediacy of that failure many in
    President George W. Bush’s administration felt the need to do something radical.
    Greater sharing of intelligence, naturally. But much more as well. Two main
    solutions were devised, or revived: total surveillance and tortured interrogations.
    They represent the first prong of the counterinsurgency approach.
    In effect, 9/11 set the stage both for total NSA surveillance and torture as
    forms of total information awareness. The former functioned at the most virtual
    or ethereal, or “digital” level, by creating the material for data-mining and
    analysis. The latter operated at the most bodily or physical, or “analog” level,
    obtaining information directly from suspects and detainees in Iraq, Pakistan,
    Afghanistan, and elsewhere. But both satisfied the same goal: total information
    awareness, the first tactic of counterinsurgency warfare.

Census

    What is clear, though—as I document in Exposed—is that the myriad NSA,
    FBI, CIA, and allied intelligence agencies produce total information, the first
    and most important prong of the counterinsurgency paradigm. Most important,
    because both of the other prongs depend on it. As the RAND Corporation notes
    in its lengthy 519-page report on the current state of counterinsurgency theory
    and practice, “Effective governance depends on knowing the population,
    demographically and individually.” The RAND report reminds us that this
    insight is not novel or new. The report then returns, pointedly for us, to Algeria
    and the French commander, David Galula: “Galula, in Counterinsurgency
    Warfare, argued that ‘control of the population begins with a thorough census.
    Every inhabitant must be registered and given a foolproof identity card.’” 5

    [...]

    Today, that identity card is an IP address, a mobile phone, a digital device, facial
    recognition, and all our digital stamps. These new digital technologies have
    made everyone virtually transparent. And with our new ethos of selfies, tweets,
    Facebook, and Internet surfing, everyone is now exposed.

Enhanced interrogation:

    Second, tortured interrogation. The dual personality of counterinsurgency
    warfare is nowhere more evident than in the intensive use of torture for
    information gathering by the United States immediately after 9/11. Fulfilling the
    first task of counterinsurgency theory—total surveillance—this practice married
    the most extreme form of brutality associated with modern warfare to the
    formality of legal process and the rule of law. The combination of inhumanity
    and legality was spectacular.
    In the days following 9/11, many in the Bush administration felt there was
    only one immediate way to address the information shortfall, namely, to engage
    in “enhanced interrogation” of captured suspected terrorists—another
    euphemism for torture. Of course, torture of captured suspects would not fix the
    problem of silo’ed information, but they thought it would at least provide
    immediate information of any pending attacks. One could say that the United
    States turned to torture because many in the administration believed the country
    did not have adequate intelligence capabilities, lacking the spy network or even
    the language abilities to infiltrate and conduct regular espionage on
    organizations like Al Qaeda. 6
    The tortured interrogations combined the extremes of brutality with the

Getting information or "truth" was not the only, perhaps not the main point
of torture sessions, and maybe not as well the main point for mass surveillance:

    Even the more ordinary instances of “enhanced interrogation” were
    harrowing—and so often administered, according to the Senate report, after the
    interrogators believed there was no more information to be had, sometimes even
    before the detainee had the opportunity to speak.

Torture template:

    Ramzi bin al-Shibh was subjected to this type of treatment immediately upon
    arrival in detention, even before being interrogated or given an opportunity to
    cooperate—in what would become a “template” for other detainees. Bin al-
    Shibh was subjected first to “sensory dislocation” including “shaving bin al-
    Shibh’s head and face, exposing him to loud noise in a white room with white
    lights, keeping him ‘unclothed and subjected to uncomfortably cool
    temperatures,’ and shackling him ‘hand and foot with arms outstretched over his
    head (with his feet firmly on the floor and not allowed to support his weight with
    his arms).’” Following that, the interrogation would include “attention grasp,
    walling, the facial hold, the facial slap… the abdominal slap, cramped
    confinement, wall standing, stress positions, sleep deprivation beyond 72 hours,
    and the waterboard, as appropriate to [bin al-Shibh’s] level of resistance.” 8 This
    template would be used on others—and served as a warning to all.
    The more extreme forms of torture were also accompanied by the promise of

"Bigeard shrimp":

    The more extreme forms of torture were also accompanied by the promise of
    life-long solitary confinement or, in the case of death, cremation.
    Counterinsurgency torture in the past had often been linked to summary
    disappearances and executions. Under the Bush administration, it was tied to
    what one might call virtual disappearances.
    During the Algerian war, as noted already, the widespread use of brutal
    interrogation techniques meant that those who had been victimized—both the
    guilty and innocent—became dangerous in the eyes of the French military
    leadership. FLN members needed to be silenced, forever; but so did others who
    might be radicalized by the waterboarding or gégène. In Algeria, a simple
    solution was devised: the tortured would be thrown out from helicopters into the
    Mediterranean. They became les crevettes de Bigeard, after the notorious French
    general in Algeria, Marcel Bigeard: “Bigeard’s shrimp,” dumped into the sea,
    their feet in poured concrete—a technique the French military had apparently
    experimented with earlier in Indochina.

    [...]

    The CIA would devise a different solution in 2002: either torture the suspect
    accidentally to death and then cremate his body to avoid detection, or torture the
    suspect to the extreme and then ensure that he would never again talk to another
    human being. Abu Zubaydah received the latter treatment. Zubaydah had first
    been seized and interrogated at length by the FBI, had provided useful
    information, and was placed in isolation for forty-seven days, the FBI believing
    that he had no more valuable information. Then the CIA took over, believing he
    might still be a source. 10 The CIA turned to its more extreme forms of torture—
    utilizing all ten of its most brutal techniques—but, as a CIA cable from the
    interrogation team, dated July 15, 2002, records, they realized beforehand that it
    would either have to cover up the torture if death ensued or ensure that
    Zubaydah would never talk to another human being again in his lifetime.
    According to the Senate report, “the cable stated that if Abu Zubaydah were to
    die during the interrogation, he would be cremated. The interrogation team
    closed the cable by stating: ‘regardless which [disposition] option we follow
    however, and especially in light of the planned psychological pressure
    techniques to be implemented, we need to get reasonable assurances that [Abu
    Zubaydah] will remain in isolation and incommunicado for the remainder of his
    life.’” 11 In response to this request for assurance, a cable from the CIA station
    gave the interrogation team those assurances, noting that “it was correct in its
    ‘understanding that the interrogation process takes precedence over preventative
    medical procedures,’” and then adding in the cable:

KUBARK

    routines were approved at the uppermost level of the US government, by the
    president of the United States and his closest advisers. These practices were put
    in place, designed carefully and legally—very legalistically, in fact—to be used
    on suspected enemies. They were not an aberration. There are, to be sure, long
    histories written of rogue intelligence services using unauthorized techniques;
    there is a lengthy record, as well, of CIA ingenuity and creativity in this domain,
    including, among other examples, the 1963 KUBARK Counterintelligence
    Interrogation manual. 13 But after 9/11, the blueprint was drawn at the White
    House and the Pentagon, and it became official US policy—deliberate, debated,
    well-thought-out, and adopted as legal measures.


    [...]

    The Janus face of torture was its formal legality amidst its shocking brutality.
    Many of the country’s best lawyers and legal scholars, professors at top-ranked
    law schools, top government attorneys, and later federal judges would pore over
    statutes and case law to find legal maneuvers to permit torture. The felt need to
    legitimate and legalize the brutality—and of course, to protect the officials and
    operatives from later litigation—was remarkable.
    The documents known collectively as the “torture memos” fell into two
    categories: first, those legal memos regarding whether the Guantánamo detainees
    were entitled to POW status under the Geneva Conventions (GPW), written
    between September 25, 2001, and August 1, 2002; and second, starting in
    August 2002, the legal memos regarding whether the “enhanced interrogation
    techniques” envisaged by the CIA amounted to torture prohibited under
    international law.

How torture was defined to allow torture to happen:

    As Jay Bybee, then at the Office of Legal Counsel and now a
    federal judge, wrote in his August 1, 2002, memo:

        We conclude that torture as defined in and proscribed by [18 US Code] Sections 2340-2340A,
        covers only extreme acts. Severe pain is generally of the kind difficult for the victim to endure.
        Where the pain is physical, it must be of an intensity akin to that which accompanies serious
        physical injury such as death or organ failure. Severe mental pain requires suffering not just at the
        moment of infliction but also requires lasting psychological harm, such as seen in mental disorders
        like post-traumatic stress disorder. […] Because the acts inflicting torture are extreme, there is
        significant range of acts that though they might constitute cruel, inhuman, or degrading treatment
        or punishment fail to rise to the level of torture.22

    This definition of torture was so demanding that it excluded the brutal
    practices that the United States was using. It set the federal legal standard,
    essentially, at death or organ failure.

    [...]

    them 26 —and then, effectively, judicial opinions. The executive branch became a
    minijudiciary, with no effective oversight or judicial review. And in the end, it
    worked. The men who wrote these memos have never been prosecuted nor
    seriously taken to task, as a legal matter, for their actions. The American people
    allowed a quasi-judiciary to function autonomously, during and after. These self-
    appointed judges wrote the legal briefs, rendered judgment, and wrote the
    judicial opinions that legitimized these brutal counterinsurgency practices. In the
    process, they rendered the counterinsurgency fully legal. They inscribed torture
    within the fabric of law.

    One could go further. The torture memos accomplished a new resolution of
    the tension between brutality and legality, one that we had not witnessed
    previously in history. It was an audacious quasi-judicial legality that had rarely
    been seen before. And by legalizing torture in that way, the Bush administration
    provided a legal infrastructure for counterinsurgency-as-governance more
    broadly.

    [...]

    And through this process of legalization, these broader torturous practices
    spilled over into the second prong of counterinsurgency: the eradication of an
    active minority. Torture began to function as a way to isolate, punish, and
    eliminate those suspected of being insurgents.

Bare existence, indefinite detention, incommunication:

    The indefinite detention and brutal ordinary measures served as a way to
    eliminate these men—captured in the field or traded for reward monies, almost
    like slaves from yonder. The incommunicado confinement itself satisfied the
    second prong of counterinsurgency theory. 5 But somehow it also reached further
    than mere detention, approximating a form of disappearance or virtual death.
    The conditions these men found themselves in were so extreme, it is almost as if
    they were as good as dead.
    Reading Slahi’s numbing descriptions, one cannot help but agree with the
    philosopher Giorgio Agamben that these men at Guantánamo were, in his words,
    no more than “bare life.” 6 Agamben’s concept of bare existence captures well
    the dimensions of dehumanization and degradation that characterized their lives:
    the camp inmates were reduced to nothing more than bare animal existence.
    They were no longer human, but things that lived. The indefinite detention and
    torture at Guantánamo achieved an utter denial of their humanity.
    Every aspect of their treatment at black sites and detention facilities

### Drone strikes

    This debate between more population-centric proponents and more enemy-
    centric advocates of counterinsurgency should sound familiar. It replays the
    controversy over the use of torture or other contested methods within the
    counterinsurgency paradigm. It replicates the strategic debates between the
    ruthless and the more decent. It rehearses the tensions between Roger Trinquier
    and David Galula.

    Yet just as torture is central to certain versions of modern warfare, the drone
    strike too is just as important to certain variations of the counterinsurgency
    approach. Drone strikes, in effect, can serve practically all the functions of the
    second prong of counterinsurgency warfare. Drone strikes eliminate the
    identified active minority. They instill terror among everyone living near the
    active minority, dissuading them and anyone else who might contemplate joining
    the revolutionaries. They project power and infinite capability. They show who
    has technological superiority. As one Air Force officer says, “The real advantage
    of unmanned aerial systems is that they allow you to project power without
    projecting vulnerability.” 18 By terrifying and projecting power, drones dissuade
    the population from joining the insurgents.

    [...]

    Covered extensively by the news media,
    drone attacks are popularly believed to have caused even more civilian casualties
    than is actually the case. The persistence of these attacks on Pakistani territory
    offends people’s deepest sensibilities, alienates them from their government, and
    contributes to Pakistan’s instability.” 19
    In July 2016, the Obama administration released a report estimating the


    [...]

    Those in the affected countries typically receive far higher casualty reports.
    The Pakistan press, for instance, reported that there are about 50 civilians killed
    for every militant assassinated, resulting in a hit rate of about 2 percent. As
    Kilcullen and Exum argue, regardless of the exact number, “every one of these
    dead noncombatants represents an alienated family, a new desire for revenge,
    and more recruits for a militant movement that has grown exponentially even as
    drone strikes have increased.” 25
    To those living in Afghanistan, Iraq, Pakistan, Somalia, Yemen, and
    neighboring countries, the Predator drones are terrifying. But again—and this is
    precisely the central tension at the heart of counterinsurgency theory—the terror
    may be a productive tool for modern warfare. It may dissuade people from
    joining the active minority. It may convince some insurgents to abandon their
    efforts. Terror, as we have seen, is by no means antithetical to the
    counterinsurgency paradigm. Some would argue it is a necessary means.
    Drones are by no means a flawless weapons system even for their proponents.

    [...]

    Regarding the first question, a drone should be understood as a blended
    weapons system, one that ultimately functions at several levels. It shares
    characteristics of the German V-2 missile, to be sure, but also the French
    guillotine and American lethal injection. It combines safety for the attacker, with
    relatively precise but rapid death, and a certain anesthetizing effect—as well as,
    of course, utter terror. For the country administering the drone attack, it is
    perfectly secure. There is no risk of domestic casualties. In its rapid and
    apparently surgical death, it can be portrayed, like the guillotine, as almost
    humane. And drones have had a numbing effect on popular opinion precisely
    because of their purported precision and hygiene—like lethal injection has done,
    for the most part, in the death-penalty context. Plus, drones are practically
    invisible and out of sight—again, for the country using them—though, again,
    terrifying for the targeted communities.

    [...]

    Chamayou’s second question is, perhaps, the most important. This new
    weapons system has changed the US government’s relationship to its own
    citizens. There is no better evidence of this than the deliberate, targeted drone
    killing of US and allied nation citizens abroad—as we will see. 32

    [...]

    An analogy from the death penalty may be helpful. There too, the means
    employed affect the ethical dimensions of the practice itself. The gas chamber
    and the electric chair—both used in the United States even after the Holocaust—
    became fraught with meaning. Their symbolism soured public opinion on the
    death penalty. By contrast, the clinical or medical nature of lethal injection at
    first reduced the political controversy surrounding executions. Only over time,
    with botched lethal injections and questions surrounding the drug cocktails and
    their true effects, have there been more questions raised. But it has taken time for
    the negative publicity to catch up with lethal injection. Drones, at this point,
    remain far less fraught than conventional targeted assassinations.

### Winning hearts and minds

    THE THIRD PRONG OF COUNTERINSURGENCY THEORY CONSISTS in winning the
    hearts and minds of the general population to stem the flow of new recruits to
    the active minority and to seize the upper hand in the struggle. This goal can be
    achieved by actively winning the allegiance of the population, or by pacifying an
    already passive population, or even simply by distracting the masses. The bar,
    ultimately, is low since, on the counterinsurgency view, the people are mostly
    passive. As Roger Trinquier noted in 1961, “Experience has demonstrated that it
    is by no means necessary to enjoy the sympathy of the majority of the people to
    obtain their backing; most are amorphous, indifferent.” Or, as General Petraeus’s
    manual states, the vast majority is “neutral” and “passive”; it represents an
    “uncommitted middle” with “passive supporters of both sides.” 1 The third prong,
    then, is aimed mostly at assuaging, pacifying perhaps, or merely distracting the
    indifferent masses.
    
    [...] the third prong has translated, principally, into three tactics: investments in
    infrastructure, new forms of digital propaganda, and generalized terror. [...]
    Undergirding them both, though, is the third tactic, the threat of
    generalized terror, that serves as a foundational method and looming constant.

    [...]

    In How Everything Became War and the Military Became Everything, Rosa
    Brooks writes that since 9/11 we have witnessed the expansion of the military
    and its encroachment on civilian affairs. “We’ve seen,” in her words, “the steady
    militarization of US foreign policy as our military has been assigned many of the
    tasks once given to civilian institutions.” Brooks warns us of a new world where
    “the boundaries between war and nonwar, military and nonmilitary have
    eroded.”

    [...]

    We are indeed facing, as Brooks powerfully demonstrates, a new world of an
    ever-encroaching military. But what this reveals, more than anything, is the rise
    of the counterinsurgency paradigm of government. It is the model of
    counterinsurgency warfare—of Galula’s early turn to building schools and health
    facilities, to focusing on the hearts and minds of the general population—that
    has pushed the military into these traditionally civilian domains, including total
    surveillance, rule-of-law projects, artificial intelligence, entertainment, etc. In
    effect, it is the counterinsurgency paradigm of government that has become
    everything, and everything that has become counterinsurgency. The blurring of
    boundaries between war and peaceful governance is not merely the contingent
    result of 9/11, it is instead the culmination of a long and deliberate process of
    modernizing warfare.

Providing the basic needs:

    Providing basic necessities, labeled “essential services” in the field manual, is
    a key counterinsurgency practice. It consists primarily of ensuring that there is
    “food, water, clothing, shelter, and medical treatment” for the general
    population. General Petraeus’s manual explains the rationale in very simple
    terms: “People pursue essential needs until they are met, at any cost and from
    any source. People support the source that meets their needs. If it is an insurgent
    source, the population is likely to support the insurgency. If the [host nation]
    government provides reliable essential services, the population is more likely to
    support it. Commanders therefore identify who provides essential services to
    each group within the population.” 5

That, in most cases, involve funneling american taxpayer's money to enrich corporations
with "insane profit margins" for rebuilding countries along with US guidelines. See
Naomi Klein's Shock Doctrine for more details.

    A second approach to securing the neutrality of the majority is more
    psychological. In the early days of modern warfare, examples of this approach
    included measures such as the resettlement of populations, in the words of
    counterinsurgency experts, “to control them better and to block the insurgents’
    support.” This is what the British did in Malaya, and the French in Algeria.
    Other examples included basic propaganda campaigns. 16

    As time has gone by, new digital technologies have enabled new forms of
    psychological counterinsurgency warfare. One of the newest involves digital
    propaganda, reflected most recently in the Center for Global Engagement set up
    under the Obama administration in early 2016. Created with the objective to
    prevent the radicalization of vulnerable youth, the center adopted strategies
    pioneered by the giants of Silicon Valley—Google, Amazon, Netflix—and was
    originally funded at the level of about $20 million. It targeted susceptible
    persons suspected of easier radicalization and sent them enhanced and improved
    third-party content in order to try to dissuade them, subliminally, from
    radicalizing or joining ISIS. In the words of an investigative journalist, “The
    Obama administration is launching a stealth anti-Islamic State messaging
    campaign, delivered by proxies and targeted to individual would-be extremists,
    the same way Amazon or Google sends you shopping suggestions based on your
    online browsing history.” 17

Terror e tortura:

    The third set of measures was even more basic: terror. The most formidable way
    to win hearts and minds is to terrorize the local population to make sure they do
    not sympathize with or aid the active minority.

    [...]

    The brutality of counterinsurgency serves, of course, to gather information
    and eradicate the revolutionary minority. But it also aims higher and reaches
    further: its ambition, as General Aussaresses recognized well, is to terrorize the
    insurgents, to scare them to death, and to frighten the local population in order to
    prevent them from joining the insurgent faction. Today, the use of unusually
    brutal torture, the targeted drone assassination of high-value suspects, and the
    indefinite detention under solitary conditions aim not only to eviscerate the
    enemy, but also to warn others, strike fear, and win their submission and
    obedience. Drones and indefinite detention crush those they touch, and strike
    [...] Terror, in the end, is a key component of the third core strategy of
    counterinsurgency.

Torture and civilization:

    Since antiquity, terror has served to demarcate the civilized from the
    barbarian, to distinguish the free citizen from the enslaved. The free male in
    ancient Greece had the privilege of swearing an oath to the gods, of testifying on
    his word. The slave, by contrast, could only give testimony under torture.
    Torture, in this sense, defined freedom and citizenship by demeaning and
    marking—by imposing stigmata—on those who could be tortured. It served to
    demarcate the weak. It marked the vulnerable. And it also, paradoxically, served
    to delineate the “more civilized.” This is perhaps the greatest paradox of the
    brutality of counterinsurgency: to be civilized is to torture judiciously. This
    paradox was born in antiquity, but it journeys on.

    [...]

    The judicious administration of terror is the hallmark of civilization. To be
    civilized is to terrorize properly, judiciously, with restraint, according to the
    rules. Only the barbarians tortured savagely, viciously, unrestrainedly. The
    civilized, by contrast, knew how and when to tame torture, how to rein it terror,
    to apply it with judgment and discretion. Compared to the barbarians—the
    beheadings of ISIS is a modern case on point—we are tame and judicious, even
    when we torture, not like those barbarians. And since 9/11, the judicious use of
    terror has been a key US strategy. In the end, terror functions in myriad ways to
    win the hearts and minds of the masses under the counterinsurgency paradigm of
    governing.

Terror in many levels of governing:

    Now, terror is not an unprecedented component of governing, even if its role
    in the counterinsurgency model may be uniquely constitutive. It has been with us
    since slavery in antiquity, through the many inquisitions, to the internment and
    concentration camps of modern history. And there too, in each of its
    manifestations, it functioned at multiple levels to bolster different modes of
    governing. Looking back through history, terror has done a lot of work. Today as
    well. And to see all that terror achieves today—above and beyond the three
    prongs of counterinsurgency theory—it is useful to look back through history
    and recall its different functions and the work it has done. The reflections today
    are stunning.

Torture and truth:

    The first episode reaches back to antiquity, but represents a recurring theme
    throughout history: terror has often served to manufacture its own truth—
    especially in terms of its efficacy. “They all talk.” [...]

    [...]

    Trying to convince a suspect that he will talk, telling him that he will—this is,
    of course, a psychological technique, but it is more than that. It is also a firm
    belief of counterinsurgency theorists outside the interrogation room. Roger

    [...]

    Manufacturing truth: that is, perhaps, the first major function of terror. It is
    the power of terror, especially in the face of ordinary men and women, of
    humans, all too human. It has been that way since the inquisitions of the Middle
    Ages, and before, since antiquity. On this score, little has changed.
    In her book on slavery in Greek antiquity, Torture and Truth, Page duBois
    argues that the idea of truth dominant today in Western thought is indissolubly
    tied to the practice of torture, while torture itself is deeply connected to the will
    to discover something that is always beyond our grasp. As a result, society after
    society returns to torture, in almost an eternal recurrence, to seek out the truth
    that is always beyond our reach. In ancient times, duBois shows, torture
    functioned as the metaphorical touchstone of truth and as a means to establish a
    social hierarchy. In duBois’s words, “the desire to create an other and the desire
    to extract truth are inseparable, in that the other, because she or he is an other, is
    constituted as a source of truth.” Truth, in sum, is always “inextricably linked
    with the practice of torture.” 4

    [...]

    Truth, duBois argues, “resides in the slave body.” 5

    [...]

    Even more, terror produced social difference and hierarchy. The limits on
    torture in ancient societies served to define what it meant to be among those who
    could be tortured—what it meant to be a slave or to be free. In ancient times, the
    testimony of a slave could only be elicited, and only became admissible in
    litigation, under torture. Only free male citizens could take an oath or resolve a
    controversy by sermon. The rules about who could be tortured in ancient times
    did not just regulate the victims of torture, the rules themselves were constitutive
    of what it meant to be a slave. The laws demarcated and defined freedom itself
    —what it looked like, what it entailed.
    Sophocles’s tragedy Oedipus Rex has captured our imagination for centuries
    on questions of fate and power. But it is perhaps on the question of terror and
    truth that the play turns. At the climax of Sophocles’s tragedy—at the pivotal
    moment when truth finally emerges for all to see and to recognize—there is a
    scene of terror. The shepherd slave who held the knowledge of Oedipus’s
    ancestry is threatened with torture. And that threat of torture alone—at the
    culmination of a whole series of unsuccessful inquiries—produces the truth:
    torture provokes the shepherd’s confession and that allows Oedipus to recognize
    his fate. But more than that, torture reaffirms the social order in Thebes—a
    social order where gods rule, oracles tell truth, prophets divine, fateful kings
    govern, and slaves serve. It is, ultimately, the right to terrorize that reveals
    Oedipus’s power and the shepherd’s place in society.

    [...]

    In a similar way, terror today produces its own truth—about the effectiveness
    of torture in eliciting truth, about its effectiveness in subjugating the insurgents,
    about the justness of counterinsurgency.

    [...]

    Second, terror—or more specifically the regulatory framework that surrounds
    terror—legitimizes the practices of terror itself. This may sound paradoxical or
    circular—but it has often been true in history. The structures that frame and
    regulate the administration of terrorizing practices have the effect, unexpectedly,
    [...] The extreme nature of torture, once brought within the fabric of the law,
    concentrated power in the hands of those
    who had the knowledge and skill, the techne, to master the brutality. The
    Justinian codification served as a model to later codifications during the early
    Middle Ages and to the practices of the Inquisition.
    Extreme practices call for expert oversight and enable a concentration of

    [...]

    Torture was brought into the fabric of the law and rarified at the
    same time. The rarefication in the Medieval Period served a political end: to
    make torture even more foreboding. Had torture become too generalized or too
    frequent, it might have lost its exceptionality and terrorizing effect.
    Torture was rarely applied, and, as one historian notes, inflicted with “the

    [...]

    The rarity achieved by the limited use and legal regulation of torture in the
    Medieval Period served to ensure its persistence and role as a social
    epistemological device—as a producer of truths, especially truth about itself.
    Centuries later, the Bush administration and its top lawyers re-created a legal
    architecture surrounding the use of torture.

    [...]

    Third, the legal regulation of terror also legitimizes the larger political regime.

    [...]

    It may seem surprising or paradoxical that the antebellum courts would
    protect a slave accused of poisoning her master. But there is an explanation: the
    intricate legal framework surrounding the criminalization and punishment of
    errant slaves during the antebellum period served to maintain and stabilize
    chattel slavery in the South—it served to equilibrate the political economy of
    slavery. It served to balance interests in such a way that neither the slave owners
    nor the slaves would push the whole system of slavery into disarray. And the
    courts and politicians carefully handled this delicate balance.

    [...]

    In fact, the financial loss associated with the execution of a slave was viewed
    as the only way to guarantee that owners made sure their slaves received a fair
    trial. During the 1842–1843 legislative session, the general assembly passed a

    [...]

    These complex negotiations over the criminal rules accompanied the
    practices of slavery in Alabama—a form of terror—and served to legitimize the
    larger political economy of chattel slavery. They offered stability to the slave
    economy by making the different participants in the criminal process and in
    slavery—the slave owners, the foremen, the magistrates, and the public at large
    —more confident in the whole enterprise. The extensive legal regulation of the
    torture of slaves was not about justifying torture, nor about resolving
    philosophical or ethical questions. Instead, it served to strike a balance and
    stabilize the institution of slavery.

    [...]

    Fourth, the ability to terrorize—and to get away with it—has a powerful effect
    on others. The audacity and the mastery impress the general masses. Something
    about winning or beating others seduces the population. People like winners, and
    winning is inscribed in terrorizing others.

Masculinity:

    Fifth, and relatedly, terror is gendered, which also tends to reinforce the power
    and appeal of the more brutal counterinsurgency practices. Brutality is most
    often associated with the dominant half of the couple, the one who controls, and
    however much we might protest, this tends to strengthen the attraction.

Horrorism:

    Terror works in other ways as well, and many other historical episodes could
    shed light on the complex functioning of terror today—of what Adriana
    Cavarero refers to as “horrorism.” 45 Terror, for instance, operates to control and
    manage one’s comrades. It can serve to keep the counterrevolutionary minority
    in check. The willingness to engage in extreme forms of brutality, in senseless
    violence, in irrational excess signals one’s own ruthlessness to one’s peers or
    inferiors. It can frighten and discipline both inferiors and superiors. It
    demonstrates one’s willingness to be cruel—which can be productive, in fact
    necessary, to a counterinsurgency.

Counterinsurgency goes domestic:

    The operations of COINTELPRO—the Counter Intelligence Program
    developed by the FBI in the 1950s to disrupt the American Communist Party,
    and extended into the 1960s to eradicate the Black Panthers—took precisely the
    form of counterinsurgency warfare. The notorious August 1967 directive of FBI
    director J. Edgar Hoover to “expose, disrupt, misdirect, discredit, or otherwise
    neutralize the activities of black nationalist, hate-type organizations and
    groupings, their leadership, spokesmen, membership, and supporters”; 16 the
    police raids on Black Panther headquarters in 1968 and 1969; the summary
    execution of the charismatic chairman of the Chicago Black Panther Party, Fred
    Hampton; the first SWAT operations carried out against the Panthers in Los
    Angeles—these all had the trappings of modern warfare.

    Hoover’s FBI targeted the Panthers in a manner that drew on the foundational
    principles of counterinsurgency: first, to collect as much intelligence on the
    Black Panther Party as possible through the use of FBI informants and total
    surveillance; second, to isolate the Panthers from their communities by making
    their lives individually so burdened with surveillance and so difficult that they
    were forced to separate themselves from their friends and family members; third,
    to turn the Panther movement into one that was perceived, by the general
    population, as a radicalized extremist organization, as a way to delegitimize the
    Panthers and reduce their appeal and influence; and ultimately, to eliminate and
    eradicate them, initially through police arrests, then through criminal
    prosecutions (for instance, of the New York 21) and justified homicides [...]
    and ultimately by fomenting conflict and divisiveness within the party

    [...]

    The linchpin of a domesticated counterinsurgency is to bring total
    information awareness home. Just as it was developed abroad, it is total
    surveillance alone that makes it possible to distinguish the active minority on
    domestic soil from the passive masses of Americans. A fully transparent
    population is the first requisite of the counterinsurgency method. In General
    Petraeus’s field manual, it received a full chapter early on, “Intelligence in
    Counterinsurgency,” with a pithy and poignant epigraph: “Everything good that
    happens seems to come from good intelligence.” And as the manual began, so it
    ended, with the following simple mantra: “The ultimate success or failure of the
    [counterinsurgency] mission depends on the effectiveness of the intelligence effort."

    [...]

    American is a potential insurgent.
    Constant vigilance of the American population is necessary—hand in hand
    with the appearance of trust. Appearances are vital. A domesticated
    counterinsurgency must suspect everyone in the population, but not let it be
    known. This posture, developed in counterinsurgency theory decades ago, was at
    the core of the paradigm. David Galula had refined it to a witty statement he
    would tell his soldiers in Algeria: “One cannot catch a fly with vinegar. My rules
    are: outwardly you must treat every civilian as a friend; inwardly you must
    consider him as a rebel ally until you have positive proof to the contrary.” 2 This
    mantra has become the rule today—at home.

    [...]

    In Exposed, I proposed a new way to understand how power circulates in the
    digital age and, especially, a new way to comprehend our willingness to expose
    ourselves to private corporations and the government alike. The metaphors
    commonly used to describe our digital condition, such as the “surveillance
    state,” Michel Foucault’s panopticon prison, or even George Orwell’s Big
    Brother, are inadequate, I argued there. In the new digital age we are not forcibly
    imprisoned in panoptic cells. There is no “telescreen” anchored to the wall of our
    apartments by the state. No one is trying to crush our passions, or wear us down
    into submission with the smell of boiled cabbage and old rag mats, coarse soap,
    and blunt razors. The goal is not to displace our pleasures with hatred—with
    “hate” sessions, “hate songs,” “hate weeks.” Today, instead, we interact by
    means of “likes,” “shares,” “favorites,” “friending,” and “following.” We
    gleefully hang smart TVs on the wall that record everything we say and all our
    preferences. The drab uniforms and grim grayness of Orwell’s 1984 have been
    replaced by the iPhone 5c in its radiant pink, yellow, blue, and green. “Colorful
    through and through,” its marketing slogan promises, and the desire for color-
    filled objects—for the sensual swoosh of a sent e-mail, the seductive click of the
    iPhone camera “shutter,” and the “likes,” clicks, and hearts that can be earned by
    sharing—seduce us into delivering ourselves to the surveillance technologies.
    And as the monitoring and marketing of our private lives changes who we
    sharing—seduce us into delivering ourselves to the surveillance technologies.

    And as the monitoring and marketing of our private lives changes who we
    are, power circulates in a new way. Orwell depicted the perfect totalitarian
    society. Guy Debord described ours rather as a society of the spectacle, in which
    the image makers shape how we understand the world and ourselves. Michel
    Foucault spoke instead of “the punitive society” or what he called
    “panopticism,” drawing on Jeremy Bentham’s design of the panoptic prison.
    Gilles Deleuze went somewhat further and described what he called “societies of
    control.” But in our digital age, total surveillance has become inextricably linked
    with pleasure. We live in a society of exposure and exhibition, an expository
    society.

    [...]

    And that’s what happened: taxpayers would pay the telecoms to hold the data
    for the government. So, before, AT&T surreptitiously provided our private
    personal digital data to the intelligence services free of charge. Now, American
    taxpayers will pay them to collect and hold on to the data for when the
    intelligence services need them. A neoliberal win-win solution for everyone—
    except, of course, the ordinary, tax-paying citizen who wants a modicum of
    privacy or protection from the counterinsurgency.

    [...]

    In my previous book, however, I failed to fully grasp how our expository
    society fits with the other features of our contemporary political condition—
    from torture, to Guantánamo, to drone strikes, to digital propaganda. In part, I
    could not get past the sharp contrast between the fluidity of our digital surfing
    and surveillance on the one hand, and the physicality of our military
    interventions and use of torture on the other. To be sure, I recognized the deadly
    reach of metadata and reiterated those ominous words of General Michael
    Hayden, former director of both the NSA and the CIA: “We kill people based on
    metadata.” 20 And I traced the haunting convergence of our digital existence and
    of correctional supervision: the way in which the Apple Watch begins to
    function like an electronic bracelet, seamlessly caging us into a steel mesh of
    digital traces. But I was incapable then of fully understanding the bond between
    digital exposure and analog torture.

    It is now clear, though, that the expository society fits seamlessly within our
    new paradigm of governing. The expository society is precisely what allows the
    counterinsurgency strategies to be applied so impeccably “at home” to the very
    people who invented modern warfare. The advent of the expository society, as
    well as the specific NSA surveillance programs, makes domestic total
    information awareness possible, and in turn lays the groundwork for the other
    two prongs of counterinsurgency in the domestic context.

    [...]

    This idea of an occupied territory, of a colony within a nation, resonates
    perfectly with what we have witnessed in terms of the domestication of the
    counterinsurgency. I would just push the logic further: we have not simply
    created an internal colony, we have turned the nation itself into a colony. We
    govern ourselves through modern counterinsurgency warfare as if the entire
    United States was now a colonial dominion like Algeria, Malaya, or Vietnam.

    [...]

    These incidents—large and small, but all devastating for those targeted—also
    serve another objective of the domesticated counterinsurgency: to make the rest
    of us feel safe and secure, to allow us to continue our lives unaffected, to avoid
    disrupting our consumption and enjoyment. They serve to reassure, and also, in
    demonizing a phantom minority, to bring us all together against the specter of
    the frightening and dangerous other. It makes us believe that there would be,
    lurking in the quiet suburbs of Dallas or Miami, dangerous insurgents—were it
    not for our government. And these effects feed into the third prong of a

    [...]

    We had seen earlier, within counterinsurgency theory, similar debates
    between population-centric and enemy-centric theorists. The enemy-centric
    approach tended to be the more brutal, but more focused. The population-centric
    favored the more legal and social-investment approaches. I argued then that they
    were just two facets of the same paradigm.

    Here the debate is between population-and/or-enemy-centric theories versus
    individual-centric theory. But here too, I would argue, this is a false dichotomy.
    Again, these are just two facets of the same thing: a counterinsurgency paradigm
    of warfare with three core strategies. Like the population-and/or-enemy-centric
    theories, individual-centric theory naturally entails both incapacitating the
    individual terrorist or insurgent—eliminating him and all of the active minority
    —and preventing or deterring his substitution or replacement.

    [...]

    But rather than buy into this dichotomy of counterinsurgency and leaner
    antiterrorism, what history shows instead is a growing convergence of the two
    models in the United States since the 1960s. Counterinsurgency and domestic
    antiterrorism efforts, entwined from the start, have converged over time. The
    individual incapacitation strategy meshes perfectly into the counterinsurgency
    approach. And it leads seamlessly from the domestication of the second prong of
    counterinsurgency to the domestication of the third.

### Distraction and diversion

    MANY OF US WILL NOT RECOGNIZE OURSELVES, OR A MERICA for that matter, in
    these dreadful episodes—in the waterboarding and targeted assassinations
    abroad or in the militarization of our police forces, in the infiltration of Muslim
    mosques and student groups or in the constant collection of our personal data at
    home. Many of us have no firsthand experience of these terrifying practices. Few
    of us actually read the full Senate torture report, and even fewer track drone
    strikes. Some of us do not even want to know of their existence. Most of us are
    blissfully ignorant—at least most of the time—of these counterinsurgency
    practices at home or abroad, and are consumed instead by the seductive
    distractions of our digital age.

    And that’s the way it is supposed to be. As counterinsurgency is
    domesticated, it is our hearts and minds that are daily being assuaged, numbed,
    pacified—and blissfully satisfied. We, the vast majority of us, are reassured
    daily: there are threats everywhere and color-coded terror alerts, but
    counterinsurgency strategies are protecting us. We are made to feel that
    everything’s under control, that the threat is exterior, that we can continue with
    our daily existence. Even more, that these counterinsurgency strategies will
    prevail. That our government is stronger and better equipped, prepared to do
    everything necessary to win, and will win. That the guardians are protecting us.
    The effort to win the hearts and minds of the passive American majority is
    the third aspect of the domestication of counterinsurgency practices—perhaps
    the most crucial component of all. And it is accomplished through a remarkable
    mixture of distraction, entertainment, pleasure, propaganda, and advertising—
    now rendered all so much more effective thanks to our rich digital world. In
    Rome, after the Republic, this was known as “bread and circus” for the masses.
    Today, it’s more like Facebook and Pokémon GO.

    We saw earlier how the expository society entices us to share all our personal
    data and how this feeds into the first prong of counterinsurgency—total
    information awareness. There is a flip side to this phenomenon: keeping us
    distracted. The exposure is so pleasurable and engaging that we are mostly kept
    content, with little need for a coordinated top-down effort to do so. We are
    entranced—absorbed in a fantastic world of digitally enhanced reality that is
    totally consuming, engrossing, and captivating. We are no longer being rendered
    docile in a disciplinarian way, as Michel Foucault argued in Discipline and
    Punish. We are past notions of docility. We are actively entranced—not
    passively, not in a docile way. We are actively clicking and swiping, jumping
    from one screen to another, checking one platform then another to find the next
    fix—Facebook, Instagram, Twitter, Google, YouTube, and on and on.
    Winning over and assuaging the passive majority might be accomplished—
    indeed, has been accomplished in the past—through traditional propaganda, such
    as broadcast misinformation about the insurgent minority, and through the top-
    down provision of entertainment to keep us from thinking about politics. The
    new digital world we live in has rendered these older strategies obsolete. As the
    counterinsurgency’s mandate to pacify the masses has been turned on the
    American people, the third prong of modern warfare looks and works differently
    than it did in previous times and in other places.
    Things have changed. Just a few years ago, our politicians still had to tell us

    [...]

    Pokémon GO has already run its course, but that is to be expected. Another
    digital obsession will follow. These platforms are supposed to capture all of our
    attention for a while, to captivate us, to distract us—and simultaneously to make
    us expose ourselves and everything around us. This is the symbiosis between the
    third and first prongs of the domesticated counterinsurgency: while it pacifies us,
    a game like Pokémon GO taps into all our personal information and captures all
    our data. At first, the game required that players share all their personal contacts.
    Although that was eventually dropped, the game collects all our GPS locations,
    captures all the video of our surroundings in perfectly GPS-coded data, and
    tracks us wherever we are. Plus, even though it is free, many players are buying
    add-ons and in the process sharing their consumption and financial data. The
    more we play, the more we are distracted and pacified, and the more we reveal
    about ourselves.

    [...]

    The distractions are everywhere: e-mail notifications, texts, bings and pings,
    new snapchats and instagrams. The entertainment is everywhere as well: free
    Wi-Fi at Starbucks and McDonald’s, and now on New York City streets, that
    allow us to stream music videos and watch YouTube videos. And of course, the
    advertising is everywhere, trying to make us consume more, buy online,
    subscribe, and believe. Believe not only that we need to buy the recommended
    book or watch the suggested Netflix, but also believe that we are secure and safe,
    protected by the most powerful intelligence agencies and most tenacious military
    force. Believe that we can continue to mind our own business—and remain
    distracted and absorbed in the digital world—because our government is
    watching out for us.

    The fact is, the domestication of counterinsurgency has coincided with the
    explosion of this digital world and its distractions. There is a real qualitative
    difference between the immediate post–9/11 period and today. One that is
    feeding directly into the third strategy of modern warfare.
    Meanwhile, for the more vulnerable—those who are more likely to veer
    astray and perhaps sympathize with the purported internal enemy—the same
    digital technologies target them for enhanced propaganda. The Global
    Engagement Center, or its equivalents, will profile them and send improved
    content from more moderate voices. The very same methods developed by the
    most tech-savvy retailers and digital advertisers—by Google and Amazon—are
    deployed to predict, identify, enhance, and target our own citizens.
    were before or that we are experiencing a waning of civil and political
    engagement. While I agree that the growing capacity of the state and
    corporations to monitor citizens may well threaten the private sphere, I am not
    convinced that this is producing new apathy or passivity or docility among
    citizens, so much as a new form of entrancement. The point is, we were once
    kept apathetic through other means, but are now kept apathetic through digital
    distractions.

Voting turnout and Trump election:

    The voting patterns of American registered voters has remained constant—
    and apathetic—for at least fifty years. Even in the most important presidential
    elections, voter turnout in this country over the past fifty years or more has
    pretty much fluctuated between 50 percent and 63 percent. By any measure,
    American democracy has been pretty docile for a long time. In fact, if you look
    over the longer term, turnout has been essentially constant since the 1920s and
    the extension of the suffrage to women. Of course, turnout to vote is not the only
    measure of democratic participation, but it is one quantifiable measure. And
    electoral voting is one of the more reliable longitudinal measures of civic
    participation. But our record, in the United States, is not impressive.

    [...]

    Despite all this, over 62 million people voted for Donald Trump, resulting in
    his Electoral College victory. And it was by no means an unusual election. Voter
    turnout in 2016 was typical for this country. About 60.2 percent of the
    approximately 231 million eligible voters turned out to vote, representing about
    139 million votes case. That number is consonant with historical turnout in this
    country, almost squarely between voter turnout in 2012 (58.6 percent) and in
    2008 (61.6 percent), but still above most presidential election year turnouts since
    1972. 16 In all categories of white voters, Trump prevailed.

    [...]

    The cable news network CNN captured this best in a pithy lead to a story titled
    “Trump: The Social Media President?”: “FDR was the first ‘radio’ president.
    JFK emerged as the first ‘television’ president. Barack Obama broke through as
    the first ‘Internet’ president. Next up? Prepare to meet Donald Trump, possibly
    the first ‘social media’ and ‘reality TV’ president.” 10

    [...]

    This new mode of existence and digital consumption pleases and distracts the
    majority of Americans. The old-fashioned TV has now been enhanced and
    augmented, displaced by social media on digital devices of all sorts and sizes—
    from the Apple Watch and tablet, through the MacBook Air and Mac Pro, to the
    giant screen TV and even the Jumbotron. And all of it serves to pacify the
    masses and ensure that they do not have the time or attention span to question
    the domestication of the counterinsurgency.

    And, then, it all feeds back into total information awareness. Hand in hand,
    government agencies, social media, Silicon Valley, and large retailers and
    corporations have created a mesmerizing new digital age that simultaneously
    makes us expose ourselves and everything we do to government surveillance and
    that serves to distract and entertain us. All kinds of social media and reality TV
    consume and divert our attention, making us give our data away for free. A
    profusion of addictive digital platforms—from Gmail, Facebook, and Twitter, to
    YouTube and Netflix, Amazon Prime, Instagram, and Snapchat, and now
    Pokémon GO—distract us into exposing all our most private information, in
    order to feed the new algorithms of commerce and intelligence services: to
    profile us for both watch lists and commercial advertising.

This is compatible with Shoshana Zuboff's Dispossession Cycle:

    This third aspect of counterinsurgency’s domestication is perhaps the most
    important, because it targets the most prized military and political objective: the
    general masses. And today, in the expository society, the new algorithms and
    digital-advertising methods have propelled the manipulation and propaganda to
    new heights. We are being encouraged by government and enticed by
    multination corporations and social media to expose and express ourselves as
    much as possible, leaving digital traces that permit both government and
    corporations to profile us and then try to shape us accordingly. To make model
    citizens out of us all—which means docile, entranced consumers. The governing
    paradigm here is to frenetically encourage digital activity—which in one sense is
    the opposite of docility—in order to then channel that activity in the right
    direction: consumption, political passivity, and avoiding the radical extremes.

    What we are witnessing is a new form of digital entrancement that shapes us
    as subjects, blunts our criticality, distracts us, and pacifies us. We spend so much
    time on our phones and devices, we barely have any time left for school or work,
    let alone political activism. In the end, the proper way to think about this all is
    not through the lens of docility, but through the framework of entrancement. It is
    crucial to understand this in the proper way, because breaking this very
    entrancement is key to seeing how counterinsurgency governance operates more
    broadly. Also, because the focus on docility—along an older register of
    discipline—is likely to lead us into an outdated focus on top-down propaganda.

### Counterrevolution

    The paradigm was refined
    and systematized, and has now reached a new stage: the complete and systematic
    domestication of counterinsurgency against a home population where there is no
    real insurgency or active minority. This new stage is what I call “The
    Counterrevolution.”

    The Counterrevolution is a new paradigm of governing our own citizens at
    home, modeled on colonial counterinsurgency warfare, despite the absence of
    any domestic uprising. It is aimed not against a rebel minority—since none
    really exists in the United States—but instead it creates the illusion of an active
    minority which it can then deploy to target particular groups and communities,
    and govern the entire American population on the basis of a counterinsurgency
    warfare model. It operates through the three main strategies at the heart of
    modern warfare, which, as applied to the American people, can be recapitulated
    as follows:

    1. Total information awareness of the entire American population…: [by the]
    [...] “counterrevolutionary minority.”

    [...]

    2. … in order to extract an active minority at home…

Shock and Awe:

    3. … and win the hearts and minds of Americans: Meanwhile, the
    counterrevolutionary minority works to pacify and assuage the general
    population in order to ensure that the vast majority of Americans remain
    just that: ordinary consuming Americans. They encourage and promote a
    rich new digital environment filled with YouTube, Netflix, Amazon
    Prime, tweets, Facebook posts, instagrams, snapchats, and reality TV that
    consume attention while digitally gathering personal data—and at times,
    pushing enhanced content. They direct digital propaganda to susceptible
    users. And they shock and awe the masses with their willingness to
    torture suspected terrorists or kill their own citizens abroad. In the end,
    entertaining, distracting, entrancing, and assuaging the general population
    is the key to success—our new form of bread and circus.

The "new shape" of the State (and it's partners), as a "loose network":

    These three key strategies now guide governance at home, as they do military
    and foreign affairs abroad. What has emerged today is a new and different art of
    governing. It forms a coherent whole with, at its center, a security apparatus
    composed of White House, Pentagon, and intelligence officials, high-ranking
    congressional members, FISC judges, security and Internet leaders, police
    intelligence divisions, social-media companies, Silicon Valley executives, and
    multinational corporations. This loose network, which collaborates at times and
    competes at others, exerts control by collecting and mining our digital data. Data
    control has become the primary battlefield, and data, the primary resource—
    perhaps the most important primary resource in the United States today.

    [...]

    This new mode of governing has no time horizon. It has no sunset provision. And it is
    marked by a tyrannous logic of violence. [...] It is part and parcel of the new
    paradigm of governing that reconciles brutality with legality.

The unprecedented, self-fulfilling profecy:

    We govern ourselves
    differently in the United States now: no longer through sweeping social
    programs like the New Deal or the War on Poverty, but through surgical
    counterinsurgency strategies against a phantom opponent. The intensity of the
    domestication now is unprecedented.

    [...]

    Counterinsurgency, with its tripartite scheme (active minority, passive masses,
    counterrevolutionary minority) and its tripartite strategy (total awareness,
    eliminate the active minority, pacify the masses) is a deeply counterproductive
    self-fulfilling prophecy that radicalizes individuals against the United States.

    [...]

    “The Islamic State has called it ‘the blessed ban’ because it
    supports the Islamic State’s position that America hates Islam. The clause in the
    order that gives Christians preferential treatment will be seen as confirming the
    Islamic State’s apocalyptic narrative that Islam is in a fight to the death against
    the Christian crusaders. The images of Muslim visitors being turned away at
    American airports will only inflame those who seek to do us harm.” 6

    [...]

    We are headed not, as Kant would have it, toward perpetual peace, but
    instead, sounding the refrain of Nietzsche’s eternal return, toward an endless
    state of counterinsurgency warfare.

### Not exactly a state of exception, but of legality

    MANY COMMENTATORS ARGUE THAT WE NOW LIVE, IN THE United States and in the
    West more broadly, in a “state of exception” characterized by suspended legality.
    In this view, our political leaders have placed a temporary hold on the rule of
    law, with the tacit understanding that they will resume their adherence to liberal
    legal values when the political situation stabilizes. Some commentators go
    further, arguing that we have now entered a “permanent state of exception.”

    This view, however, misperceives one particular tactic of counterinsurgency
    —namely, the state of emergency—for the broader rationality of our new
    political regime. It fails to capture the larger ambition of our new mode of
    governing. The fact is, our government does everything possible to legalize its
    counterinsurgency measures and to place them solidly within the rule of law—
    through endless consultations with government lawyers, hypertechnical legal
    arguments, and lengthy legal memos. The idea is not to put law on hold, not
    even temporarily. It is not to create an exception, literally or figuratively. On the
    contrary, the central animating idea is to turn the counterinsurgency model into a
    fully legal strategy. So, the governing paradigm is not one of exceptionality, but
    of counterinsurgency and legality.

    [...]

    The logic today is based on a model of
    counterinsurgency warfare with, at its heart, the resolution of that central tension
    between brutality and legality. The counterrevolutionary model has resolved the
    inherited tension and legalized the brutality.

    [...]

    Agamben’s idea of a permanent state of exception pushes this
    further, but simultaneously undermines the defining element of the exception,
    since it becomes the rule. For the most part, though, the state of exception is
    presented as aberrational but temporary.

    [...]

    The problem with the state-of-exception view is that it mistakes tactics for
    the overarching logic of our new paradigm of governing and, in the process, fails
    to see the broader framework of The Counterrevolution. The state-of-exception
    framework rests on an illusory dichotomy between rule and exception, a myth
    that idealizes and reifies the rule of law. The point is, the use of torture at CIA
    black sites and the bulk collection of American telephony metadata were not
    exceptions to the rule of law, but were rendered fully legalized and regulated
    practices—firmly embedded in a web of legal memos, preauthorized formalities,
    and judicial or quasi-judicial oversight. In this sense, hardly anything that
    occurred was outside or exceptional to the law, or could not be brought back in.

    The Counterrevolution, unlike the state of exception, does not function on a
    binary logic of rule and exception, but on a fully coherent systematic logic of
    counterinsurgency that is pervasive, expansive, and permanent. It does not have
    limits or boundaries. It does not exist in a space outside the rule of law. It is all
    encompassing, systematic, and legalized.

    Of course, the rhetoric of “exception” is extremely useful to The
    Counterrevolution. “States of emergency” are often deployed to seize control
    over a crisis and to accelerate the three prongs of counterinsurgency.

    [...]

    The ultimate exercise of power, Foucault argued, is precisely to transform
    ambiguities about illegalisms into conduct that is “illegal.”

    [...]

    During the ancien régime, Foucault argues, the popular and the privileged
    classes worked together to evade royal regulations, fees, and impositions.
    Illegalisms were widespread throughout the eighteenth century and well
    distributed across the different strata of society

    [...]

    As wealth became increasingly mobile after the French Revolution, new
    forms of wealth accumulation—of moveable goods, stocks, and supplies as
    opposed to landed wealth—exposed massive amounts of chattel property to the
    workers who came in direct contact with this new commercial wealth. The
    accumulation of wealth began to make popular illegalisms less useful—even
    dangerous—to the interests of the privileged. The commercial class seized the
    mechanisms of criminal justice to put an end to these popular illegalisms
    [...] The privileged seized the administrative and
    police apparatus of the late eighteenth century to crack down on popular
    illegalisms.

    [...]

    They effectively turned popular illegalisms into
    illegalities, and, in the process, created the notion of the criminal as social
    enemy—Foucault even talks here of creating an “internal enemy.”

    [...]

    In The Counterrevolution—by contrast to the bourgeois revolutions of the
    early nineteenth century—the process is turned on its head. Illegalisms and
    illegalities are inverted. Rather than the privileged turning popular illegalisms
    into illegalities, the guardians are turning their own illegalisms into legalities.
    [...] The strategy here is to paper one’s way into the legal realm through elaborate
    memorandums and advice letters that justify the use of enhanced interrogation or the
    assassination of American citizens abroad.

    [...]

    On the one hand, there is a strict division of responsibilities: the intelligence
    agencies and the military determine all the facts outside the scope of the legal
    memorandum. [...] Everything is compartmentalized.

    [...]

    On the other hand, the memo authorizes: it allows the political authority to
    function within the bounds of the law. It sanitizes the political decision. It cleans
    the hands of the military and political leaders. It produces legalities.

A circular, feedback loop:

    None of this violates the rule of law or transgresses the boundaries of legal
    liberalism. Instead, the change was rendered “legal.” If this feels circular, it is
    because it is: there is a constant feedback effect in play here. The
    counterinsurgency practices were rendered legal, and simultaneously justice was
    made to conform to the counterinsurgency paradigm. The result of the feedback
    loop was constantly new and evolving meanings of due process. And however
    rogue they may feel, they had gone through the correct procedural steps of due
    process to render them fully lawful and fully compliant with the rule of law.

    [...]

    “Abnormal,” in 1975, Foucault explored how the clash between the juridical
    power to punish and the psychiatric thirst for knowledge produced new medical
    diagnoses that then did work.

    [...]

    In his 1978 lecture on the invention of the notion of dangerousness in French
    psychiatry, Foucault showed how the idea of future dangerousness emerged from
    the gaps and tensions in nineteenth-century law. 37

    [...]

    There are surely gaps here too in The Counterrevolution—tensions between
    rule-boundedness on the one hand and a violent warfare model on the other.
    Those tensions give momentum to the pendulum swings of brutality that are then
    resolved by bureaucratic legal memos.

### System analysis and Operations Research

    The RAND Corporation played a seminal role in the development of
    counterinsurgency practices in the United States and championed for decades—
    and still does—a systems-analytic approach that has come to dominate military
    strategy. Under its influence, The Counterrevolution has evolved into a logical
    and coherent system that regulates and adjusts itself, a fully reasoned and
    comprehensive approach.

    [...]

    Systems analysis was often confused with OR, but it was distinct in several
    regards. OR tended to have more elaborate mathematical models and solved
    lower-level problems; in systems analysis, by contrast, the pure mathematical
    computation was generally applied only to subparts of the overall problem.
    Moreover, SA took on larger strategic questions that implicated choices between
    major policy options. In this sense, SA was, from its inception, in the words of
    one study, “less quantitative in method and more oriented toward the analysis of
    broad strategic and policy questions, […] particularly […] seeking to clarify
    choice under conditions of great uncertainty.” 5

    [...]

    As this definition made clear, there were two meanings of the term system in
    systems analysis: first, there was the idea that the world is made up of systems,
    with internal objectives, that need to be analyzed separately from each other in
    order to maximize their efficiency. Along this first meaning, the analysis would
    focus on a particular figurative or metaphorical system—such as a weapons
    system, a social system, or, in the case of early counterinsurgency, a colonial
    system. Second, there was the notion of systematicity that involved a particular
    type of method—one that began by collecting a set of promising alternatives,
    constructing a model, and using a defined criterion.

    [...]

    This method of systems analysis became influential in government and
    eventually began to dominate governmental logics starting in 1961 when Robert
    McNamara acceded to the Pentagon under President John F. Kennedy.

    [...]

    According to its proponents, systems analysis
    would allow policy makers to put aside partisan politics, personal preferences,
    and subjective values. It would pave the way to objectivity and truth. As RAND
    expert and future secretary of defense James R. Schlesinger explained:
    “[Systems analysis] eliminates the purely subjective approach on the part of
    devotees of a program and forces them to change their lines of argument. They
    must talk about reality rather than morality.” 13 With systems analysis,
    Schlesinger argued, there was no longer any need for politics or value
    judgments. The right answer would emerge from the machine-model that
    independently evaluated cost and effectiveness. All that was needed was a
    narrow and precise objective and good criteria. The model would then spit out
    the most effective strategy.

    [...]

    Counterinsurgency theory blossomed at precisely the moment that systems
    analysis was, with RAND’s backing, gaining influence in the Pentagon and at
    the White House. The historian Peter Paret pinpoints this moment, in fact, to the
    very first year of the Kennedy administration: “In 1961, the Cuban revolution
    combined with the deteriorating Western position in Southeast Asia

    [...]

    It convened, as mentioned earlier, the seminal
    counterinsurgency symposium in April 1962, where RAND analysts discovered
    David Galula and commissioned him to write his memoirs. RAND would
    publish his memoirs as a confidential classified report in 1963 under the title

    [...]

    Counterinsurgency theory blossomed at precisely the moment that systems
    analysis was, with RAND’s backing, gaining influence in the Pentagon and at
    the White House. The historian Peter Paret pinpoints this moment, in fact, to the
    very first year of the Kennedy administration: “In 1961, the Cuban revolution
    combined with the deteriorating Western position in Southeast Asia to shift

    [...]

    One recent episode regarding interrogation
    methods is telling. It involved the evaluation of different tactics to obtain
    information from informants, ranging from truth serums to sensory overload to
    torture. These alternatives were apparently compared and evaluated using a SA
    approach at a workshop convened by RAND, the CIA, and the American
    Psychological Association (APA). Again, the details are difficult to ascertain
    fully, but the approach seemed highly systems-analytic.

    [...] a series of workshops on “The Science of Deception”

    [...]

    More specifically, according to this source, the workshops probed and
    compared different strategies to elicit information. The systems-analytic
    approach is reflected by the set of questions that the participants addressed: How
    important are differential power and status between witness and officer? What
    pharmacological agents are known to affect apparent truth-telling behavior?
    What are sensory overloads on the maintenance of deceptive behaviors? How
    might we overload the system or overwhelm the senses and see how it affects
    deceptive behaviors? These questions were approached from a range of
    disciplines. The workshops were attended by “research psychologists,
    psychiatrists, neurologists who study various aspects of deception and
    representatives from the CIA, FBI and Department of Defense with interests in
    intelligence operations. In addition, representatives from the White House Office
    of Science and Technology Policy and the Science and Technology Directorate
    of the Department of Homeland Security were present.” 31

    [...]

    And in effect, from a counterinsurgency perspective, these various tactics—
    truth serums, sensory overloads, torture—are simply promising alternatives that
    need to be studied, modeled, and compared to determine which ones are superior
    at achieving the objective of the security system. Nothing is off limits.
    Everything is fungible. The only question is systematic effectiveness. This is the
    systems-analytic approach: not piecemeal, but systematic.
    Incidentally, a few years later, Gerwehr apparently went to Guantánamo, but
    refused to participate in any interrogation because the CIA was not using video
    cameras to record the interrogations. Following that, in the fall of 2006 and in
    2007, Gerwehr made several calls to human-rights advocacy groups and
    reporters to discuss what he knew. A few months later, in 2008, Gerwehr died of
    a motorcycle accident on Sunset Boulevard. 32 He was forty years old.

    [...]

    Sometimes, depending on the practitioner, the analysis favored torture or summary
    execution; at other times, it leaned toward more “decent” tactics. But these
    variations must now be understood as internal to the system. Under President
    Bush’s administration, the emphasis was on torture, indefinite detention, and
    illicit eavesdropping; under President Obama’s, it was on drone strikes and total
    surveillance; in the first months of the Trump presidency, on special operations,
    drones, the Muslim ban, and building the wall. What unites these different
    strategies is counterinsurgency’s coherence as a system—a system in which
    brutal violence is heart and center. That violence is not aberrational or rogue. It
    is to be expected. It is internal to the system. Even torture and assassination are
    merely variations of the counterinsurgency logic.

    Counterinsurgency abroad and at home has been legalized and systematized. It
    has become our governing paradigm “in any situation,” and today “simply
    expresses the basic tenet of the exercise of political power.” It has no sunset
    provision. It is ruthless, game theoretic, systematic—and legal. And with all of
    the possible tactics at the government’s disposal—from total surveillance to
    indefinite detention and solitary confinement, to drones and robot-bombs, even
    to states of exception and emergency powers—this new mode of governing has
    never been more dangerous.

    In sum, The Counterrevolution is our new form of tyranny.