Posts Tagged ‘Security’

Off the Books

Writing about Pakistan, as a ‘dark site’ host, but also about a more general syndrome, Fernandez remarks:

… just because the administration hides the risk from conflict using cutouts and proxies doesn’t actually mean the risk goes away. It only means the risk is hidden “off the books”. It only means you can’t easily measure it.

There’s a conservation law at work here, which is always a positive sign of realist seriousness. To publicly promote a political profile of peculiarly self-congratulating moral earnestness it is simultaneously necessary to feed the shadows. What happens unseen is essential to the purification of the image. The Obama Administration is only significant here insofar as it grasps the deep political logic of democracy — and its subordination to sovereign PR — with such exceptional practical clarity. Better by far to indiscriminately drone potential enemies to death on the unmonitored periphery than to rough up a demonstrated terrorist in front of a TV camera. It’s the future you wanted (Xenosystems readers excepted). To imagine anything fundamentally different working under democratic conditions is sheer delusion.

Continue Reading

December 18, 2014admin 13 Comments »
FILED UNDER :Political economy
TAGGED WITH : , , , ,

Deep State

This surely counts as a (Friday) fright night topic. Appropriately, it’s an undertow NRx theme already, although typically only casually invoked — almost allusively — as the necessary complement of the public state’s naked superficiality. Rod Dreher focuses upon it more determinedly than any NRx source I was able to rapidly pull up. (This would be an easy point for people to educate me upon.)

Dreher’s post is seriously interesting. One immediate hook:

Steve Sailer says that the Shallow State is a complement to the Deep State. The Shallow State is, I think, another name for what the Neoreactionaries call “The Cathedral”

As a State Church, the Cathedral is essentially bound to publicity. Its principal organs — media and education — are directed towards the promulgation of faith. It tends towards an identification with its own propaganda, and therefore — in Mike Lofgren’s words — to the full manifestation of visible government. Perfect coincidence of government with the transparent public sphere approaches a definition of the progressive telos. Since Neoreaction is particularly inclined to emphasize the radical dysfunctionality of this ideal, it naturally presupposes that real government lies elsewhere. In this respect, NRx is inherently destined to formulate a model of hidden or occult government — that which the Cathedral runs upon — which inevitably coincides, in all fundamentals, with the deep state.

Continue Reading

December 12, 2014admin 44 Comments »
FILED UNDER :Political economy
TAGGED WITH : , , , , ,

Into the Dark

As the Occident subsides into an ocean of shadow, the FBI is noticing:

“We’re seeing more and more cases where we believe significant evidence resides on a phone or a laptop, but we can’t crack the password,” FBI Director Jim Comey said during a speech in Washington. “If this becomes the norm … justice may be denied.” […] Specifically, Comey said he is “deeply concerned” about what’s known as “going dark” — operating systems being developed by companies such as Apple and Google that automatically encrypt information on their devices. And that means even the companies themselves won’t be able to unlock phones, laptops and other devices so law enforcement can access emails, photos or other evidence that could be crucial to a case …

Comey, however, didn’t place full blame with companies like Apple and Google for creating devices with such encryption. They were “responding to what they perceive is a market demand” from the general public, which has grown “mistrustful of government” in the wake of Edward Snowden’s disclosures of secret government surveillance. […] Encryption “is a marketing pitch,” Comey said. “But it will have very serious consequences for law enforcement and national security agencies at all levels. Sophisticated criminals will come to count on these means of evading detection. It’s the equivalent of a closet that can’t be opened. A safe that can’t be cracked. And my question is, at what cost?”

A process of Exit-in-place is underway, automatically, and it’s not easy to imagine how it could be stopped. With message management disintegrating on one side, and the public sphere eroding into dark nets on the other, it must seem to the State in the age of Internet runaway that the walls are closing in.

October 24, 2014admin 21 Comments »
FILED UNDER :Horror
TAGGED WITH : , , ,