[ANSOL-geral] Encrypted resistance: from digital security to dual
power
André Isidoro Fernandes Esteves
aife netvisao.pt
Sexta-Feira, 30 de Outubro de 2015 - 10:37:51 WET
Quando os estados querem portas de cavalo na nossa criptografia e nas
nossas comunicações, só significa uma coisa: querem prescindir de nos
perguntar o que dissemos e eliminar o nosso direito a não responder e a
não nos auto-incriminarmos.
É uma questão de direitos civis, não de terrorismo. Se querem lutar o
terrorismo que treinem mais cães para cheirar explosivos que é o que tem
sido mais eficaz...
http://roarmag.org/2015/10/dual-power-cyber-resistance/
Encrypted resistance: from digital security to dual power
By Ben Case On October 25, 2015
Cyber-resistance is often viewed as a hacker thing — but if embraced by
mass movements it has great potential as a prefigurative liberation
strategy.
By J. Armstrong and Ben Case. Photomontage by yumikrum, via Flickr.
“It was a time when the unthinkable became the thinkable and the
impossible really happened…”
– Arundhati Roy
Digital technology is often seen as a curiosity in revolutionary
politics, perhaps as a specialized skill set that is peripheral to the
hard work of organizing. But the growing trend of “cyber-resistance”
might hold more potential than we have given it credit for.
Specifically, the popularized use of encryption gives us the ability to
form a type of liberated space within the shifting maze of cables and
servers that make up the Internet. The “web” is bound by the laws of
math and physics before the laws of states, and in that cyberspace we
may be able to birth a new revolutionary consciousness.
The use of open source encryption allows for the oppressed to take
control of the means of communication, encoding a worldwide liberated
zone within the fiber of the Internet. Cyber-resistancei has been viewed
(or ignored, or derided) as a hacker thing, something undertaken by
those with science fiction equipment in their basement. But if it is
embraced by mass movements, it has great potential as a prefigurative
strategy for liberation.
Prefiguration is vital for radical and progressive forces in the current
moment. The building of prefigurative spaces — spaces that model
revolutionary values and resist state violence — is crucial for
successful movements from both the anarchist and Marxist traditions. As
the old saying goes, revolutionary movements use prefiguration to plant
the “seed of the future society in the shell of the old.”
Internet interactions are often juxtaposed with interpersonal
interactions, so the idea that cyber-resistance could be prefigurative
might seem counter-intuitive for a humanistic revolution. However,
cyber-resistance might well hold the key to vibrant prefigurative
struggle in the 21st century.
Popularized in the 1970s and 80s, prefigurative political struggle has
experienced an upsurge in the 21st century. It has been experimented
with in the “Arab Spring,” in the squares of Spain with the indignados,
and in the Occupy movement, as activists seized public space and held it
in common while building political consciousness and fighting for
structural changes in the system at large (differences between and
problems with these models notwithstanding).
Prefigurative methods are also deployed by many left-wing armed forces.
From the Zapatistas in Mexico to the Naxalites in India and the Kurdish
militias in Syria and Turkey, building prefiguration into armed struggle
has been effective for many groups facing intense repression. In fact,
an argument for building cyber-resistance as a form of prefiguration for
socio-political struggle can be found in an unlikely source: Maoist
guerrilla warfare strategy.
A Prefigurative Lesson from Guerrilla Warfare
Many militant leftists have criticized certain attempts at
prefiguration, often for good reasons. But the logic behind it — that in
order to build a revolutionary future we must practice a revolutionary
present — is essential for all liberation movements. And although it is
less often emphasized, that logic has worked very well in modern
guerrilla warfare.
Many rebel forces have developed strategies of protracted popular armed
struggle, but since the early 20th century this method has been
primarily linked to the military strategy of Mao Zedong. The strategy of
a “protracted people’s war” was laid out in Mao’s famous guerrilla war
manual, written in the context of Chinese resistance to Japanese occupation.
While Mao himself certainly has a dubious legacy, the protracted
people’s war strategy has been embraced by millions of people in the
past century and has been used effectively to build revolutionary
movements all over the world.
When it is dissected into its strategic components, people’s war has a
lot to teach us in our 21st-century moment. The strategy is composed of
three overlapping phases. The first is “strategic defensive,” where
rebels establish base areas in remote regions. The second is “strategic
stalemate,” where the base areas are developed into a liberated zone.
Finally, there is a “strategic counter-offensive,” where insurgents
engage and defeat the state in conventional warfare.
For the first phase to begin at all, it is crucial that the base area be
established in a secluded region with rugged terrain that is difficult
for the state to access, since the rebel fighting force is not yet
equipped to confront the enemy head on.
Building has to begin in the state’s blind spots. Once an area is
identified, insurgents focus on political education and grassroots
organizing, providing medical care and other services to grow
consciousness and mutual trust in order to develop the proverbial
“water” in which the revolutionary “fish” will swim.
In the second phase, as the insurgents become more entrenched, they
gradually establish their own institutions and form a revolutionary
government based on a combination of community traditions and communist
ideology. As they gain legitimacy, rebel institutions such as schools,
clinics and courts expand and interconnect to replace the state in
rebel-controlled areas.
This creates a “counter-state” (or, arguably in more libertarian
versions, an anti-state), called a liberated zone. The liberated zone is
a contested, semi-sovereign area organized into associations that are
characterized by radical values — for example equity, minority ethnic
rights, and feminism — where people live the revolution and where the
rebels can rest, organize, train and develop resources.
In this way, people’s war can be seen as the construction of dual power,
where the institutions of the state and the liberated zone coexist and
compete for legitimacy. Today, many dual power strategists advocate the
building of alternative institutions in the global “center,” within the
cracks and fissures of the existing state, as we simultaneously attack
oppressive systems with social movement mobilization.
However, this has proven difficult in many cases, as alternatives are
vulnerable to state repression. What makes the prefiguration of people’s
war so powerful is that it creates an area that the state cannot reach
and in which alternatives can be safely constructed.
Most Maoist insurgencies never succeeded in (or even entered) the third
phase, but historically the people’s war strategy has been very
successful in creating stalemates — that is, in creating vibrant,
stable, liberated zones. Politically, this has resulted either in a
negotiated settlement with the government, as in El Salvador and Nepal,
or intractable conflicts, as in India and the Philippines.
The fact that Maoist guerrilla strategy thrives in the second phase is
instructive. The brilliance of this strategy might be not in the
war-making, but in the prefiguration-building. The strategy is effective
in large part because it forcefully opens up social and psychological
space to experiment with radical systems and to embody the revolution in
practice. It opens up space not only to see a revolutionary world, but
to touch it, to be it. It wins people with practice as much as with
ideas. This element of Mao’s strategy demonstrated the power of
prefiguration long before that term was coined or popularized.
The Strategic Importance of Shadow
The single most important environmental condition required for people’s
war is the existence of remote areas where connections to the central
state are weak. At early stages of struggle, these are the only areas
that are eligible to build autonomous systems, since the presence of the
state forecloses on many possibilities for alternative practices.
Areas of operation must be out of the state’s sight in order for the
revolutionaries to make alternatives visible to themselves and to the
people. In other words, the state must be blind in order for the people
to see one another as revolutionaries.
There are few unseen regions left in the 21st century world, and fewer
still in the Global North. In the US, there is hardly a nook or cranny
that is not mapped by satellite or categorized by title law, instantly
accessible by drone and wiretap.
Proponents of dual power increasingly focus on creating prefigurative
spaces, but they also tend to draw inspiration from armed struggles such
as the Zapatistas in Chiapas or the Kurdish rebels in Rojava, which are
taking place in areas that conform more closely to the formal liberated
zone model.
Of course, this is not to say we cannot learn a great deal from those
fronts, nor is it to say allies should not support these crucial
struggles in any way we can. But most organizing in the Global North
takes place in cities, and the conditions in western Kurdistan and the
mountains of southeast Mexico bear little resemblance to those in the
urban United States or Europe.
Not only is there a lack of secluded physical space in which to build a
liberated zone, there is decreasing psychological space in which to
build liberated minds. In the industrialized countries, modern state
control has gone far beyond mapping physical space to mapping our very
individualities. Today, their visibility extends beyond the physical.
Mass Surveillance and Panoptical Control
In order to assert their control, less developed state-forms used to
publicly execute dissidents via torture or lock them in a dungeon and
throw away the key (some still do). These practices obviously have
devastating effects on the target individuals and their families, but
the possibility of constant surveillance with the threat of punishment
has a greater effect on a society’s behavior at large. Michel Foucault
famously recognized Bentham’s “perfect” prison, the panopticon, for its
political implications in this regard.
In contrast to dark, linear dungeons, Bentham conceived of a bright,
open, circular prison, with a watchtower in the center and inward-facing
cells around the periphery. Each cell would have a window to the outside
that would back-light it, making the prisoner’s body visible to the
tower. The tower, shaded by design angles, would be dark to all prisoners.
The effect is simple: at all times a prisoner is aware they could be
watched by the guards, but they will never be able to know for sure
when. This hierarchical arrangement of bodies in space — a few in the
tower watching, many in the cells being watched — carries with it a
power dynamic that effectively modifies the behavior of everyone subject
to it.
In this arrangement, Foucault says, the prisoners, who are isolated and
unable to communicate or act without being seen, begin to police
themselves. The more the prisoners internalize this dynamic, the less
actual force needs to be used to maintain order. In its extreme, the
theory goes, an entire population of docile prisoners can be
self-policed with no coercion whatsoever. Prisons around the world have
since adopted aspects of this principle into their architectures.
The unverifiable but assured possibility of surveillance represents the
epitome of state control. In its most advanced form, those in power not
only have a monopoly on the legitimate use of force; they come to never
need to use it to maintain their legitimacy. Foucault acknowledged that
panopticism was directly applicable only to populations small enough to
be arranged within the prison architecture, but he believed its logic
could be applied to society at large.
Technology has evolved so that mass surveillance can psychologically
take the place of the physical arrangement of bodies. Today the average
American citizen spends over 11 hours a day engaging with electronic
media. The public is increasingly reliant on the Internet, smartphones
and social media for daily life, and we have become accustomed to
omnipresent cameras, satellite photographs and wiretaps.
In 2013, the NSA completed a facility in Bluffsdale, Utah where the
agency can store 1,000 times the data of the entire Internet, a
“Yottabyte” of data. In order to fill this facility with information,
the NSA is currently tapping most of the key fiber optic cables that
make up the worldwide web and accessing the servers of all major
Internet companies. Thanks to Edward Snowden, we now know just how
comprehensively state security forces collect this data.
This content and meta-data collection involves the capture and storage
of all messages, with the goal being complete visibility of digital
communications. Ultimately, the attempt is to tie all those
communications to geo-location, physical data and relational meta-data;
in other words, where you are, what you’re doing, and who you’re doing
it with.
Of course the NSA does not necessarily examine all of our digital
conversations. But they could. And you have no idea if they are. You
probably don’t really understand how they can, but you are vaguely aware
that they can. It is a paralyzing feeling, and that is the essence of
panoptical control.
In an era of increasing global control, pushing back against oppressive
systems and liberating physical territory to prefigure our own
alternative institutions is increasingly necessary, but it is difficult
in full sight of the state’s forces. Knowing we are being watched, we
aren’t even aware of the degree to which we police ourselves into
docility. In the context of the surveillance state, creating the space
to discuss and plan and grow the struggle is a prerequisite. When state
control is a spotlight, revolutionaries need to create shadows.
Wikileaks, Encryption and Cypher-Shadows
To date, Wikileaks has been the most effective group in casting an
electronic shadow. The NSA documents leaked by Snowden show that as
early as 2010, Julian Assange and the human network that supports
Wikileaks were on the NSA “manhunting” target list for extreme
no-holds-barred surveillance. Even through this level of surveillance,
Wikileaks has maintained their nine-year track record of never giving up
a source.
In 2015 alone, Wikileaks have published NSA intercepts, drafts of the
Trans-Pacific Partnership, 600,000 cables from the Saudi embassy, and
judicial gag orders — without ever having been implicated in outing a
source. Wikileaks accomplishes this by effectively creating a shadow
that even the most sophisticated government eyes cannot see into, and
they do this through the use of open source encryption technology.
Most people already use encryption every day, and just not in their
personal communications. Encryption is used in many common applications,
from garage door openers to online money transfer sites, but the
technology has been tightly controlled by the state, first through arms
regulations and later through proprietary standards and funding
restrictions.
Encryption sounds fancy, but it really just means writing in code.
Current encryption programs apply advanced mathematics to the basic
process that all people engage in when creating languages or dialects.
Most importantly, the best programs are free and anyone can do it.
Current applications of this technology allow for any person with access
to a computer to create encryption so advanced that it cannot be broken
by all the computer power in the world. To quote Snowden: “Encryption
works. Properly implemented strong crypto-systems are one of the few
things that you can rely on.”
Due to its strategic importance, states have historically declared
cryptographic skill and science to be theirs alone. But in 1991, as an
act of resistance in support of anti-nuclear protesters, a coder named
Phil Zimmerman released an open-source encryption program called PGP
onto the Internet for free. When Snowden released the NSA’s own
documents from 2012, they show that the agency is unable to break PGP
(and other) open-source encryption even after more than 20 years.
Proprietary software like Microsoft and Apple operating systems impose
legal and technical prohibitions on users and engineers that prevent
them from viewing the codes that make the computer programs run.
Open-source software like Linux or Debian allows for software engineers
and users to fully control all aspects of a computer system.
Among other things, open-source programs mean transparent and verifiable
software improvements. These improvements are not dependent on a closed
group, which could be collaborating with, for example, the FBI or NSA.
They are also free to use and distribute. Many countries, including the
governments of Uruguay, Ecuador, and Brazil, are now running most of
their information technology on open-source platforms.
Open-source encryption programs allow for free access to “end-to-end”
encryption. These, as well as encrypted texting and talking phone apps
like Signal and Redphone, are becoming more accessible and popular by
the year. Free open-source programs — like PGP, OTR, Tor, and Tails OS —
offer encrypted document creation, sharing and web research on any
modern computer, and their use is increasing rapidly.
The journalists working with Snowden have reconfirmed the security of
these tools through action, as open-source encryption has allowed them
to effectively hide the documents Snowden leaked to them from
governments that desperately wanted to destroy them.
Beyond the primary benefit of keeping organizing information hidden from
authorities, using open-source encryption to “shadow” our connections,
our work and our transactions from the state may enable us to create a
digital liberated zone on the Internet, a form that transcends physical
geography.
We can begin to create this by expanding our capacity and moving to make
the use of these tools our default, first for radicals and progressive
allies, then for communities and nations.
A Call to Cryptographic Arms
Discussion of encryption feels alienating to many folks. A lot of people
think it is over their heads or they find the techno-babble obnoxious
(the self-described hacktivist who once mansplained all this to you
probably doesn’t help). Nevertheless, because the US and other
governments are engaging in global mass surveillance, we find ourselves
in a situation where encryption is necessary for the security of even
basic organizing — it is usually unwise to invite the police to action
planning meetings.
Beyond the security aspect, it holds massive potential.
Global South activists in Afghanistan, Syria, Palestine, and elsewhere
are now facing the full repressive capacity of imperial violence — but
some of those areas remain at least somewhat shrouded from mass
surveillance technology. The US and other neo-imperialist governments
are currently interested in popularizing use of the Internet and social
media to areas of the Global South who have yet to “go digital” to
enable corporate profit in those untapped markets.
In addition to the capitalist motive, the techno-colonial project would
bring the entirety of the planet within view of imperial centers of
control. This provides us with a window of opportunity where Global
North governments are more engaged in expanding their digital empire and
encouraging the Global South’s adoption of their technology than they
are in unleashing the full arsenal of mass surveillance on their own
populations.
It is critical that we exponentially increase the use of encryption in
both the Global North and Global South during this period. Growing the
use of open source encryption could be the most powerful instrument in
securing revolutionary potential for generations to come, as they can
enable us to safely communicate across blocks and borders. The tools are
already there; all it takes is our foresight, will and passion for
freedom to make their use into a reality for all.
Guerrilla liberated zones are highly effective in opening physical
prefigurative space in an isolated area. At the same time, they are also
limited by that isolation and by barriers to participation in guerrilla war.
Cyber-resistance does not offer the physical space that liberated zones
do, but digital liberated zones are not constrained by geography or
borders, and the barriers to use of encryption are surprisingly low. The
combination of encryption basics with open-source hardware (and perhaps
cryptographic currency, like Bitcoin-based Freicoin) has the potential
to grow into a network of direct working-class control of the means of
communication, production and exchange on a global scale.
This network can be used as a weapon to create a sort of liberated
e-zone that is beyond state control despite being physically located
within oppressive states. The more resistance is hidden from the state,
the more imperialism must rely on its most base method of control:
coercive force. Though it is the state’s foundational tool, the naked
use of violence erodes the state’s legitimacy.
As the state must increasingly rely on its most violent capacity for
control, online liberated zones could facilitate both the desire and
capacity for resistance. Human surveillance and infiltration such as the
use of informants and agent saboteurs can be highly destructive for
individuals and movement groups, but nowadays even these rely heavily on
digital information gathering.
As the state becomes blinder, it increasingly becomes more desperate.
And when it gets desperate, its moves tend to backfire. Meanwhile, as
our vision brightens, so does our spirit. Through cyber-resistance we
can strengthen existing liberated zones and prefigure new ones, growing
revolutionary values and practice even inside the cities of the
attempted panopticon.
Our secure communications, leaks and skill-shares could eventually
create a chain reaction of interconnected revolutionary upsurges on the
scale of the “Arab Spring” of 2011. But instead of being based in
popular control of public space alone, they will now also be prefigured
in the collective control of a truly liberated space, from the means of
communication to the totality of society.
::::::::::::::::::::::::::::::
i A note on terminology: While we say cyber-resistance here, more
accurately we are talking about cypher-resistance. Cyber refers to
anything digital, while cypher is a process that can encode any
language, encryption is a general term for that process, and
cryptography is the scientific study of the two. Sometimes the root
crypto is used to modify other words as well, such as “crypto-currency.”
Ben Case is an organizer and activist from New Jersey and is a PhD
student in sociology at the University of Pittsburgh. He is co-founder
of the University of Pittsburgh’s Student Anarchist Graduate Association
and is a member of the Organization for a Free Society.
J. Armstrong is a secure communication specialist and movement trainer.
He has run encryption trainings for radical organizers and professionals
from five continents, working with direct action movements, formerly
incarcerated people, sex workers, veterans and revolutionary
organizations. He is a member of the Organization for a Free Society.
Mais informações acerca da lista Ansol-geral