A wonder of the modern age, it can deliver its weaponry anywhere on the planet with staggering speed, knock out an enemy’s satellite communications system, or follow individuals biometrically for great distances.
Along with the country’s advanced cyberwar capacity, it’s also the most sophisticated militarized information system ever created and an insurance policy for U.S. global dominion deep into the twenty-first century.
It’s the future as the Pentagon imagines it; it’s
under development; and Americans know nothing about it.
With words of withering mockery, President Obama shot back:
Obama later offered just a hint of what those capabilities might be:
Amid all the post-debate media chatter, however, not a single commentator seemed to have a clue when it came to the profound strategic changes encoded in the president’s sparse words.
Yet for the past four years, working in silence and secrecy, the Obama administration has presided over a technological revolution in defense planning, moving the nation far beyond bayonets and battleships to cyberwarfare and the full-scale weaponization of space.
In the face of waning economic influence, this
bold new breakthrough in what’s called “information warfare” may prove
significantly responsible should U.S. global dominion somehow continue far
into the twenty-first century.
Over the span of a century, plunged into three
Asian crucibles of counterinsurgency - in the Philippines, Vietnam, and
Afghanistan - the U.S. military has repeatedly been pushed to the breaking
point. It has repeatedly responded by fusing the nation’s most advanced
technologies into new information infrastructures of unprecedented power.
Finally, during its decade-plus in Afghanistan
(and its years in Iraq), the Pentagon has begun to fuse biometrics,
cyberwarfare, and a potential future triple canopy aerospace shield into a
robotic information regime that could produce a platform of unprecedented
power for the exercise of global dominion - or for future military disaster.
Their sum was nothing less than a new
information infrastructure with an unprecedented capacity for mass
surveillance.
...created synergies that led to the militarized application of America’s first information revolution.
To pacify a determined guerrilla resistance that persisted in the Philippines for a decade after 1898, the U.S. colonial regime - unlike European empires with their cultural studies of “Oriental civilizations” - used these advanced information technologies to amass detailed empirical data on Philippine society. In this way, they forged an Argus-eyed security apparatus that played a major role in crushing the Filipino nationalist movement.
The resulting colonial policing and surveillance
system would also leave a lasting institutional imprint on the emerging
American state.
Among its nine branches, Research & Analysis
recruited a staff of nearly 2,000 academics who amassed 300,000 photographs,
a million maps, and three million file cards, which they deployed in an
information system via “indexing, cross-indexing, and counter-indexing” to
answer countless tactical questions.
Many of the materials it had so carefully collected were left to molder in storage, unread and unprocessed.
Despite its ambitious global reach, this first
U.S. information regime, absent technological change, might well have
collapsed under its own weight, slowing the flow of foreign intelligence
that would prove so crucial for America’s exercise of global dominion after
World War II.
Powered by the most advanced IBM mainframe computers, the U.S. military compiled monthly tabulations of security in all of South Vietnam’s 12,000 villages and filed the three million enemy documents its soldiers captured annually on giant reels of bar-coded film.
At the same time, the CIA collated and computerized diverse data on the communist civilian infrastructure as part of its infamous Phoenix Program.
This, in turn, became the basis for its
systematic tortures and 41,000 “extra-judicial executions” (which, based on
disinformation from petty local grudges and communist counterintelligence,
killed many but failed to capture more than a handful of top communist
cadres).
The information these provided was then gathered on computerized systems for the targeting of incessant bombing runs.
After 100,000 North Vietnamese troops passed
right through this electronic grid undetected with trucks, tanks, and heavy
artillery to launch the Nguyen Hue Offensive in 1972, the U.S. Pacific Air
Force pronounced this bold attempt to build an “electronic battlefield” an
unqualified failure.
By 1972, the SC/TV drone, with a camera in its
nose, was capable of flying 2,400 miles while navigating via a
low-resolution television image.
Despite a dismal succession of short-term
failures that helped deliver a soul-searing blow to American power, all this
computerized data-gathering proved a seminal experiment, even if its
advances would not become evident for another 30 years until the U.S. began
creating a third - robotic - information regime.
It then built a biometric database with more
than a million Iraqi fingerprints and iris scans that U.S. patrols on the
streets of Baghdad could access instantaneously by satellite link to a
computer center in West Virginia.
This meant accelerating technological
developments in drone warfare that had largely been suspended for two
decades after the Vietnam War.
By 2011, the advanced
MQ-9 Reaper drone, with
“persistent hunter killer” capabilities, was heavily armed with missiles and
bombs as well as sensors that could read disturbed dirt at 5,000 feet and
track footprints back to enemy installations. Indicating the torrid pace of
drone development, between 2004 and 2010 total flying time for all unmanned
vehicles rose from just 71 hours to 250,000 hours.
These collected and transmitted 16,000 hours of video daily, and from 2006-2012 fired hundreds of Hellfire missiles that killed an estimated 2,600 supposed insurgents inside Pakistan’s tribal areas. Though the second-generation Reaper drones might seem stunningly sophisticated, one defense analyst has called them “very much Model T Fords.”
Beyond the battlefield, there are now some 7,000 drones in the U.S. armada of unmanned aircraft, including 800 larger missile-firing drones.
By funding its own fleet of 35 drones and
borrowing others from the Air Force,
the CIA has moved beyond passive
intelligence collection to build a permanent robotic paramilitary capacity.
Over two administrations, there has been continuity in the development of a cyberwarfare capability at home and abroad. Starting in 2002, President George W. Bush illegally authorized the National Security Agency to scan countless millions of electronic messages with its top-secret “Pinwale” database.
Similarly, the FBI started an Investigative Data
Warehouse that, by 2009, held a billion individual records.
In 2009, the Pentagon formed U.S. Cyber Command (CYBERCOM), with headquarters at Ft. Meade, Maryland, and a cyberwarfare center at Lackland Air Base in Texas, staffed by 7,000 Air Force employees.
Two years later, it declared cyberspace an
“operational domain” like air, land, or sea, and began putting its energy
into developing a cadre of cyber-warriors capable of launching offensive
operations, such as a variety of attacks on the computerized centrifuges in
Iran’s nuclear facilities and Middle Eastern banks handling Iranian money.
In 2012, after years of ground warfare in both countries and the continuous expansion of the Pentagon budget, the Obama administration announced a leaner future defense strategy.
It included a 14%
cut in future infantry strength to be compensated for by an increased
emphasis on investments in the dominions of outer space and cyberspace,
particularly in what the administration calls “critical space-based
capabilities.”
Significantly, both space and cyberspace are new, unregulated domains of military conflict, largely beyond international law.
And Washington hopes to use both, without
limitation, as Archimedean levers to exercise new forms of global dominion
far into the twenty-first century, just as the British Empire once ruled
from the seas and the Cold War
American imperium exercised its global
reach via airpower.
And Washington has filled this legal void with a
secret executive matrix - operated by the CIA and the clandestine Special
Operations Command - that assigns names arbitrarily, without any judicial
oversight, to a classified “kill list” that means silent, sudden death from
the sky for terror suspects across the Muslim world.
As early as 2020, the Pentagon hopes to patrol
the entire globe ceaselessly, relentlessly via a triple canopy space shield
reaching from stratosphere to exosphere, driven by drones armed with agile
missiles, linked by a resilient modular satellite system, monitored through
a telescopic panopticon, and operated by robotic controls.
By late 2011, the Air Force and the CIA had
already ringed the Eurasian land mass with a network of 60 bases for drones
armed with Hellfire missiles and GBU-30 bombs, allowing air strikes against
targets just about anywhere in Europe, Africa, or Asia.
Establishing the viability of this new
technology, NASA’s solar-powered aircraft Pathfinder, with a 100-foot
wingspan, reached an altitude of 71,500 feet altitude in 1997, and its
fourth-generation successor the “Helios” flew at 97,000 feet with a 247-foot
wingspan in 2001, two miles higher than any previous aircraft.
Flying at an altitude of 20 miles, it is expected to,
Although the first test launches in April 2010
and August 2011 crashed midflight, they did reach an amazing 13,000 miles
per hour, 22 times the speed of sound, and sent back “unique data” that
should help resolve remaining aerodynamic problems.
By the time its second prototype landed at
Vandenberg Air Force Base in June 2012 after a 15-month flight, this
classified mission represented a successful test of “robotically controlled
reusable spacecraft” and established the viability of unmanned space drones
in the exosphere.
In response, the Pentagon is now developing the F-6 satellite system that will,
And keep in mind that the X-37B has a capacious cargo bay to
carry missiles or future laser weaponry to knock out enemy satellites - in
other words, the potential capability to cripple the communications of a
future military rival like China, which will have its own global satellite
system operational by 2020.
To manage the surging torrent of information within this
delicately balanced triple canopy, the system would, in the end, have to
become self-maintaining through “robotic manipulator technologies,” such as
the Pentagon’s FREND system that someday could potentially deliver fuel,
provide repairs, or reposition satellites.
The system would allow future space warriors to
see the whole sky wrapped around the entire planet while seated before a
single screen, making it possible to track every object in Earth orbit.
Thus, by 2010, the National Geospatial-Intelligence Agency had 16,000 employees, a $5 billion budget, and a massive $2 billion headquarters at Fort Belvoir, Virginia, with 8,500 staffers wrapped in electronic security - all aimed at coordinating the flood of surveillance data pouring in from Predators, Reapers, U-2 spy planes, Global Hawks, X-37B space drones, Google Earth, Space Surveillance Telescopes, and orbiting satellites.
By 2020 or thereafter - such a complex
techno-system is unlikely to respect schedules - this triple canopy should
be able to atomize a single “terrorist” with a missile strike after tracking
his eyeball, facial image, or heat signature for hundreds of miles through
field and favela, or blind an entire army by knocking out all ground
communications, avionics, and naval navigation.
If all or much goes according to plan, sometime in the third decade of this century the Pentagon will complete a comprehensive global surveillance system for Earth, sky, and space using robotics to coordinate a veritable flood of data from biometric street-level monitoring, cyber-data mining, a worldwide network of Space Surveillance Telescopes, and triple canopy aeronautic patrols.
Through agile data management of exceptional
power, this system might allow the United States a veto of global lethality,
an equalizer for any further loss of economic strength.
Even if this robotic information regime could somehow check China’s growing military power, the U.S. might still have the same chance of controlling wider geopolitical forces with aerospace technology as the Third Reich had of winning World War II with its “super weapons” - V-2 rockets that rained death on London and Messerschmitt Me-262 jets that blasted allied bombers from Europe’s skies.
Complicating the future further, the illusion of
information omniscience might incline Washington to more military
misadventures akin to Vietnam or Iraq, creating the possibility of yet more
expensive, draining conflicts, from Iran to the South China Sea.
|