{"id":3874,"date":"2011-08-03T11:24:20","date_gmt":"2011-08-03T15:24:20","guid":{"rendered":"http:\/\/thesocietypages.org\/cyborgology\/?p=3874"},"modified":"2011-08-06T16:15:04","modified_gmt":"2011-08-06T20:15:04","slug":"online-superiority-developing-the-capacity-for-augmented-war","status":"publish","type":"post","link":"https:\/\/thesocietypages.org\/cyborgology\/2011\/08\/03\/online-superiority-developing-the-capacity-for-augmented-war\/","title":{"rendered":"Online Superiority: Developing the Capacity for Augmented War"},"content":{"rendered":"<p style=\"text-align: left\"><a href=\"http:\/\/www.flickr.com\/photos\/23912576@N05\/2962194797\/\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-3883 aligncenter\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2011\/08\/2962194797_70082c1b93_o-1024x681.jpg\" alt=\"\" width=\"502\" height=\"334\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2011\/08\/2962194797_70082c1b93_o-1024x681.jpg 1024w, https:\/\/thesocietypages.org\/cyborgology\/files\/2011\/08\/2962194797_70082c1b93_o-300x199.jpg 300w\" sizes=\"auto, (max-width: 502px) 100vw, 502px\" \/><\/a>Most of us here at Cyborgology have written at least one post about augmented warfare and revolution. I suggested that the\u00a0<a title=\"Surveillance &amp; Entertainment: A Panopticon in the Clouds\" href=\"https:\/\/thesocietypages.org\/cyborgology\/2011\/01\/05\/surveillance-entertainment-a-panopticon-in-the-clouds\/\">panopticon has moved to the clouds<\/a>, and PJ warns that we may soon see it <a title=\"Surveillance: From the Cloud(s) to the Fog\" href=\"https:\/\/thesocietypages.org\/cyborgology\/2011\/06\/20\/surveillance-from-the-clouds-to-the-fog\/\">descend into a fog<\/a>. In the wake of the Arab Spring, we have all commented on what it means to have an <a href=\"https:\/\/thesocietypages.org\/cyborgology\/2011\/03\/02\/augmented-revolution\/\">augmented revolution<\/a> (also <a title=\"Global Voices and the Rise of Curatorial Media\" href=\"https:\/\/thesocietypages.org\/cyborgology\/2011\/06\/15\/global-voices-and-the-rise-of-curatorial-media\/\">here<\/a>, <a href=\"https:\/\/thesocietypages.org\/cyborgology\/2011\/03\/24\/social-media-and-social-movements\/\">here<\/a>, and <a href=\"https:\/\/thesocietypages.org\/cyborgology\/2011\/03\/21\/cyborgology-editors-discuss-cyber-support-on-the-radio\/\">here<\/a>). The Department of Defense is well aware of this global trend, and is dumping lots of money into understanding how to maintain what I will call <strong>online superiority. <\/strong>Just as nations fight for ground, air, and sea superiority in a given conflict, they must now maintain a presence in online meeting spaces. Surveillance and intelligence efforts have always been a part of warfare, and monitoring and disrupting information flows has always been a tactical advantage. <strong>While previous engagements in informational warfare have been about information exchange, what we see now are efforts to gain online superiority in order to directly disrupt physical, financial, or tactical resources.<\/strong><\/p>\n<p><strong><!--more--><\/strong><\/p>\n<p>A good example is <a href=\"http:\/\/www.wired.com\/threatlevel\/2011\/07\/how-digital-detectives-deciphered-stuxnet\/all\/1\">Stuxnet<\/a>, the malware jointly developed by Israeli and American forces to disrupt the Iranian nuclear program. By sabotaging a relatively mundane piece of hardware, they were able to severely damage Iran&#8217;s uranium-refining capacity. But the United States is aware that other entities are working on similar weapons. They recognize the increasing importance of online meeting spaces as the originators of this sort of action. Outside threats might include <a href=\"http:\/\/www.telegraph.co.uk\/news\/worldnews\/asia\/china\/5126584\/China-and-Russia-hack-into-US-power-grid.html\">China\u00a0and\u00a0Russia<\/a> hacking into infrastructure control networks. Perceived domestic threats include the various Anonymous hacker collectivities such as <a href=\"https:\/\/twitter.com\/#!\/lulzsec\">Lulzsec<\/a> or <a href=\"https:\/\/twitter.com\/#!\/AntiSec_\">AnitSec<\/a>. And of course, there&#8217;s always <a title=\"A New Paradigm of Leaking: Anonymous\u2019 \u201cDelicious Data\u201d\" href=\"https:\/\/thesocietypages.org\/cyborgology\/2011\/07\/23\/a-new-paradigm-of-leaking-anonymous-delicious-data\/\">Wikileaks<\/a>.<\/p>\n<p>DARPA has <a href=\"https:\/\/www.fbo.gov\/index?s=opportunity&amp;mode=form&amp;id=6ef12558b44258382452fcf02942396a&amp;tab=core&amp;_cview=0\">released a solicitation<\/a> to companies that can help the government with the&#8221; four basic goals&#8221; in the area of Social Media in Strategic Communication:<\/p>\n<div>\n<ol>\n<li>Linguistic cues, patterns of information flow, topic trend analysis, narrative structure analysis, sentiment detection and opinion mining;<\/li>\n<li>Meme tracking across communities, graph analytics\/probabilistic reasoning, pattern detection, cultural narratives;<\/li>\n<li>Inducing identities, modeling emergent communities, trust analytics, network dynamics modeling;<\/li>\n<li>Automated content generation, bots in social media, crowd sourcing.<\/li>\n<\/ol>\n<\/div>\n<p><a href=\"http:\/\/www.flickr.com\/photos\/attila2006\/333158079\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-3890\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2011\/08\/333158079_7f9e2c3eba_o-300x198.jpg\" alt=\"\" width=\"300\" height=\"198\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2011\/08\/333158079_7f9e2c3eba_o-300x198.jpg 300w, https:\/\/thesocietypages.org\/cyborgology\/files\/2011\/08\/333158079_7f9e2c3eba_o.jpg 600w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>Just as automated drones are providing <a title=\"Surveillance &amp; Entertainment: A Panopticon in the Clouds\" href=\"https:\/\/thesocietypages.org\/cyborgology\/2011\/01\/05\/surveillance-entertainment-a-panopticon-in-the-clouds\/\">total battlefield awareness<\/a>, this solicitation belies a desire for high-level surveillance of large groups of people. The curation of information is, once again, extremely important. As David Streitfeld \u00a0noted in the <a href=\"http:\/\/bits.blogs.nytimes.com\/2011\/08\/02\/pentagon-seeks-social-networking-experts\/\">New York Times&#8217; Bits Blog<\/a>, this technology &#8220;would be, at its most basic level, an Internet meme tracker.&#8221; In the civilian world, we have sites like <a href=\"www.klout.com\">Klout<\/a> and <a href=\"www.hunch.com\">Hunch<\/a> that crawl your various social media profiles and determine your network influence or what kind of wallet you prefer. DARPA is much more interested in what kind of political movement you influence, and what sorts of foreign governments you prefer.<\/p>\n<p>Online superiority means the panopticon extends into our online lives as well.\u00a0The Foucaldian panopticon works in three stages: 1) an individual knows they are subject to surveillance but, 2) the act of surveillance is not observable by the surveilled, thus 3) one internalizes the surveillance, acting as if they are constantly being watched. We are already encouraged to act this way as a reaction to the <a href=\"http:\/\/www.danah.org\/papers\/MySpaceDOPA.html\">moral panic<\/a> of <a title=\"Rethinking Privacy and Publicity on Social Media: Part I\" href=\"https:\/\/thesocietypages.org\/cyborgology\/2011\/06\/30\/rethinking-privacy-and-publicity-on-social-media-part-i\/\">online privacy<\/a>. We are \u00a0told to worry about <a href=\"http:\/\/www.huffingtonpost.com\/2011\/07\/07\/chris-hansen-sexts-cheating_n_892597.html\">online predators<\/a> and <a href=\"http:\/\/consumerist.com\/2011\/06\/new-services-adds-your-drunken-facebook-photos-to-employer-background-checks-for-up-to-seven-years.html\">potential employers<\/a>, but\u00a0after 2015 whenDARPA hopes to complete this project, we&#8217;ll have to worry about our government&#8217;s opinions of what constitutes appropriate online behavior.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most of us here at Cyborgology have written at least one post about augmented warfare and revolution. I suggested that the\u00a0panopticon has moved to the clouds, and PJ warns that we may soon see it descend into a fog. In the wake of the Arab Spring, we have all commented on what it means to [&hellip;]<\/p>\n","protected":false},"author":1512,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[9967],"tags":[10489,12140,10470,950,12137,10770,9972,12136,1399,355,880,8497,12138,12139,259,140,129,12105,3162,1902,120,732,3507,91,12125,8511],"class_list":["post-3874","post","type-post","status-publish","format-standard","hentry","category-commentary","tag-anonymous","tag-anonymous-hacker","tag-augmented-revolution","tag-communication","tag-control-networks","tag-curation","tag-cyber","tag-darpa","tag-global","tag-government","tag-hacking","tag-information","tag-information-exchange","tag-informational-warfare","tag-intelligence","tag-internet","tag-media","tag-nato","tag-new-york-times","tag-panopticon","tag-sex","tag-social-media","tag-society","tag-united-states","tag-warfare","tag-wikileaks"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/3874","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/users\/1512"}],"replies":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/comments?post=3874"}],"version-history":[{"count":17,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/3874\/revisions"}],"predecessor-version":[{"id":3897,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/3874\/revisions\/3897"}],"wp:attachment":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/media?parent=3874"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/categories?post=3874"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/tags?post=3874"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}