GEEKS VERSUS CYBER MAGICIANS
Transkrypt
GEEKS VERSUS CYBER MAGICIANS
Joanna Walewska GEEKS VERSUS CYBER MAGICIANS *22*/,1*7+(%,*%527+(5 Psychology: a New Kind of SIGDEV (PNKS) and The Art of Deception. Training for a New Generation of Online Covert Operations (AOD)1, two presentations among the documents leaked by Edward Snowden, motivated me to google the Big Brother, although the investigative report by journalists Glenn Greenwald and Laura Poitras revealed a lot about these materials already. They were developed by the American National Security Agency (NSA) and the British intelligence bureau, the Government Communications Headquarters (GCHQ), in connection with a wide-ranging campaign developed by the two agencies, aimed at influencing not only Julian Assange but also all those supporting WikiLeaks, The 1 See: G. Greenwald, How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations, https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/ (accessed on 5 August 2014). Pirate Bay portal and hacktivist groups such as Anonymous. The goal of the campaign was to point to Anonymous and WikiLeaks as “malicious foreign actors,” which would facilitate placing them under a broad electronic surveillance, better still, without the need to exclude American citizens. Both documents are in the format of PowerPoint presentations; GCHQ presented the first of the two at the “SIGDEV Conference,” or the meeting of the so-called “Five Eyes Agreement, ”whose signatories – USA, Great Britain, Canada, Australia and New Zealand – meet annually to share their successes and challenges pertaining to electronic surveillance. One of the components of the presentation, which generated the most interest on the part of the journalists, was the information of how the ANTICRISIS GIRL system opera- tes (adjusted to the needs of Piwik2 program used for Internet monitoring). It reads IP addresses of thousands of Internet users accessing WikiLeaks daily, which made it possible to match them to actual persons seeking information on the Iraq war, as well as (potentially) trying to pass secret information to the organisation Assange had founded. Squeaky Dolphin is another system, the operation of which the said presentation demonstrates: it facilitates monitoring of users’ activity in social media such as YouTube, Facebook, and Blogger. Obviously these reports caused rightful concern among the experts on Internet privacy issues, who pointed out that, should intelligence operation target not a particular person suspected of practices threatening public safety, but the whole websites, then surely among the users of the latter there will be innocent people who will be 2 autoportret 3 [46] 2014 | 96 See: http://pl.piwik.org/ (accessed on 5 August 2014). We want to build Cyber Magicans. targeted by the agencies purely because of their reading habits. When I found out about the existence of the two programs, initially I felt the wave of righteous indignation sweeping through me, and even a certain anxiety whispering in my ear, that I am probably among those people targeted by the great intelligence agencies. It wasn’t the awareness of the existence of software such as ANTICRISIS GIRL and Squeaky Dolphin that inclined me to go on googling for hours. Above all, I was struck by the extremely conventional format of the presentation. On one hand, it contained secret information, quite a bit of newspeak and acronyms, so breaking through it all required some effort. On the other hand, it was bewildering, with its run-of-the-mill formula, resembling a recipe for “death by PowerPoint”: graphics of questionable quality, seemingly sophisticated, but in fact rather banal diagrams, a collection of random images and cartoons, several slogans and two dry “jokes” to sweeten the pill. My attention was drawn to one of the first slides, featuring an illusionist with playing cards, and underneath, the caption: We want to build Cyber Magicians! To me, magicians were the least likely association with the army of geeks employed by contemporary intelligence agencies to fight their wars in cyberspace; however, in this context, the term “art of deception” introduced in one of the presentations seemed logical. Both presentations begin with slides containing a series of diagrams, which map the field of social studies. After two centuries of a rather tempestuous relationship of anthropology and ethnography with the military, now, in the beginning of 21st century – on the frontlines of battle against terrorism, in contact with cultures of Iraq and Afghanistan, alien and exotic as they autoportret 3 [46] 2014 | 97 are from the point of view of American or British soldiers – the need became plain to seek advice and assistance of ethnographers, bringing about what is described as “a cultural turn.” Ironically enough, the introduction of software called the Human Terrain System happened at the time when the anthropological milieu rejected this type of cooperation as a non-ethical and undesirable breach of independence in the area of knowledge they are pursuing. During World War I there were instances of ethnographers working as spies. This was unconditionally condemned by Franz Boas, who called this kind of activity “prostituting science” in his publication in “The Nation.” However, already during World War II, the two most famous students of Boas’s, Margaret Mead and Ruth Benedict, considered it their duty as citizens to work for the United States government which, incidentally, was the occasion for one of the most widely read books in the history of anthropology to come about, the Chrysanthemum and the Sword. Although Benedict’s methods were criticised – mostly because she used prisoners of war and Americans of Japanese origin detained in camps as her informants – she still improved the image of an anthropologist working for the army. During the Vietnam War, Gerald Hickey tried to persuade his superiors that knowledge of Vietnamese culture would be the key to ending the war, and although his recommendations for the US Army, included in the report commissioned by ARPA, remained unheard, in 1967 it was decided that the Civil Operations and Revolutionary Development Supports (CORDS) program should be launched in order to gain the hearts and minds of South Vietnamese people. The program was deemed relatively successful, although it has been stressed that its introduction came far too late. In the end, two incidents of 1970s were decisive for the image of anthropology: the exposure of the “Camelot” program, aimed at identifying the factors which could lead to a civil war in Chile, and the so-called “Thai scandal” pertaining to the involvement of social scientists in the program of anti-partisan activities in Thailand. Despite the reservations, small teams consisting of anthropologists, linguists, sociologists, historians, political scientists, and psychologists, have been pursuing their field research for over a decade now within the framework of the Human Terrain System, and therefore they were included in both presentations. What caught my attention is the fact that the AOD document focuses in particular on the field of social science in which anthropology and psychology converge, dealing with such issues as deception and influence. This worried me – the more so as one of the following slides mentions such persons as: Jean-Robert Houdin, who helped quench the Algerian uprising of 1856 on behalf of Napoleon III, heir to an illustrious family of magicians Jasper Maskelyne, known for his occupation with camouflage during World War II, and John Mullholand, who was developing a clandestine MKULTRA program for the CIA in 1950s, aimed at combating Soviet techniques of mind control and counteracting brainwash interrogation techniques. Now I was really beginning to get into the seemingly boring training session for IT geeks. Truly you cannot use a .ppt presentation if you have not prepared it yourself. I managed to recognize several photos rather quickly, for example the one featuring four American soldiers of 23rd Headquarters Special Troops (Ghost Army) carrying a tank (more about that in a moment); others were taken out of context, which made it impossible for me to read their meaning quickly. The Big Brother, backed by the Squeaky Dolphin and ANTICRISIS GIRL, knows everything about me. Now I am beginning to google the Big Brother, albeit without much hope of success. To my surprise, google image search proves very effective; perhaps the content of the training program is top secret, but the presentation prepared for its purposes turns out to be the product of the remix culture. I upload the images one by one, and the browser reveals a variety of contexts – all I have to do is choose the correct one. HOW TO WIN WORLD WAR II? The scene we see in the picture took place in June 1944, shortly after the transfer of the so-called Ghost Army with all its equipment to the shores of Normandy, where – as predicted – one of the last, decisive battles of World War II was about to take place. The soldiers belonging to the Ghost Army origi- autoportret 3 [46] 2014 | 98 nated mostly from the Engineer Camouflage Battalion, famous for, among other things, effectively hiding the whole big factory of B-26 Marauder bombers in Baltimore. Others were recruited mostly from the art schools of New York and Philadelphia. An invisible army, versed in the art of illusion, deceit and misinformation, comprised three units. The first, specialising in the art of camouflage, consisted of soldiers who, after the war, went on to have successful careers in the arts; its task was to create rubber models (dummies) of tanks, armoured cars, guns, planes, and even soldiers, which from the perspective of aerial intelligence looked like a military grouping. During the breaks between military operations, lasting for days or for weeks at a time, their task was also to target and misinform foreign agents, therefore they often stitched uniforms, falsified the colours of other units, and thus disguised, sat in cafés on corners, where they sang songs, wooed English or French girls, and disseminated false information on the plans of the Allied Forces. Another unit consisted of sound engineers who, together with the engineers of Bell laboratories, experimented for several weeks at Fort Knox, testing multichannel recordings, wire recorders, and mobile recording studios, in order to record the sounds of military operations in battlefield conditions. That set of sounds was then mixed and later transmitted using massive speakers, which reinforced the illusion of the show, staged ever so often for the benefit of the enemy. While they were performing the tasks, which the command assigned to them, they felt as if they were building theatre or movie sets – with only one difference: the decorations had to be removed before the guests, tempted by the posters, have arrived. Already during World War I, the air force intelligence played a very important part in obtaining information about enemy movements, and special units were developed to create camouflage that would prevent, or at least impede destroying strategic objects from the air. Still, the Allies were aware that Germany obtained 70% of their information from radio intelligence; in fact, they rather admired German skills in this matter. This is why, as a part of the Ghost Army, a unit was created composed of the best radio engineers, whose task was to follow the patterns of radio practices typical for the Allied Forces, and thereby transmit false information. When at the end of March 1945, German Army sent reconnaissance planes in order to assess the concentration of Allied Forces along the Rhine river, the last natural barrier which separated them from Berlin, what the pilots saw confirmed their belief in that the information they had obtained through radio intelligence was correct. It seemed that the Allies sent two divisions to the area – 30 thousand soldiers and convoys of tanks, artillery, and armoured trucks. Additionally, numerous traces of tracked vehicles were seen (made using bulldozers), most of which, they were led to believe, must have been hiding behind the trees, along with the trucks and landing strips. Ghost Army tactics was based on reversing the logics of the camouflage art: it was about making something visible, but not too visible – so that it would not appear suspicious, and reveal something, only in order to divert attention from the things that really mattered. It should be noted that the battles of that invisible army were above all psychological warfare, and therefore the theatre of military operations was transported into the ether. Despite the fact that their area of operations was to some extent intangible, they needed to rely on the same strategies to gain advantage as in the actual battlefield: mimicry, camouflage and purposeful leading the enemy by the nose. GEEKS’ WEAPON Conducting cyber warfare requires redefining the concept of the theatre of war, because we no longer deal with operations contained within a geographically determined space. As a result, governments of most countries, which engage in this type of activity, employ experts who are able to adapt to this broader reality. At the turn of 2008 and 2009, American and Israeli governments developed malware called Stuxnet, aimed at bombing the operation of the information system of an Iranian nuclear power plant. The key aspect of the whole operation was installing the software on computers without an Internet connection, which was possible via infecting portable memory discs used by the power plant’s employees. Then, the computer worm took over control of the machines, destroying the centrifuge for enriching uranium, and therefore paralysing the uranium enrichment program conducted at Natanz, as the engineers were unable to detect the malware. At the beginning of 2011, the Anonymous group shared the source code of the computer virus on the Internet, which gave rise to suspicions that its creators were among the organisation’s members. These rumours were soon proven false, as one year later, representatives of President Obama’s administration confirmed that the US government was responsible for the creation of the virus. Actually, already when the rumour of the alleged responsibility of Anonymous was first circulated, security experts were openly sceptical. They argued that the organisation lacked both the human and the financial capital, which autoportret 3 [46] 2014 | 99 would allow it to engage in this sort of longterm, strategic operations, requiring in fact military-grade resources. In order to describe the Anonymous’ mode of operation, we might recall the distinction drawn by Eric Raymond, who likened a decentralised, collective, and pseudo-anarchistic model of developing software such as Linux, and many other projects based on the open source philosophy, to a bazaar: I believed that the most important software (operating systems and really large tools like the Emacs programming editor) needed to be built like cathedrals, carefully crafted by individual wizards or small bands of mages working in splendid isolation, with no beta to be released before its time. Linus Torvalds’s style of development – release early and often, delegate everything you can, be open to the point of promiscuity – came as a surprise. No quiet, reverent cathedral-building here – rather, the Linux community seemed to resemble a great babbling bazaar of differing agendas and approaches […], out of which a coherent and stable system could seemingly emerge only by a succession of miracles. The fact that this bazaar style seemed to work, and work well, came as a distinct shock.3 Anonymous derive from 4chan.org, an Internet platform of the imageboard type, which guarantees anonymity of its users (in order to access it, logging in is not necessary), where the posts appear in threads on the wall, yet afterwards they are not recorded in the archive but they disappear, pushed out by the entries of other users. 4chan has many sections, but the /b/ rules, which by itself is not subject to 3 Eric S. Raymond, The Cathedral and the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary, Beijing– Cambridge–Farnham: O’Reilly, 2001, p. 21–22. any rules: you can upload anything there (barring child pornography), the opportunity, which the users happily and busily take. The main occupation of the Anonymous members in the early days was trolling for “lulz”; only since 2008 have they become social activists for the freedom of speech on the Internet (free speech is non-negotiable). Their first target was the Churchof Scientology, which waged a real battle against Internet users who shared, on their websites, the famous Tom Cruise video, which the church believed illegal. Despite attempted intervention on the part of the church, the film in which the actor explained the principles of scientology soon went viral. The issues of the freedom of speech and of access to information were themes of such actions as the “Operation Titstorm,” aimed at blocking access to the website of Australian government (via DDoS4), who wanted to censor pornography, or for instance the protests against the introduction of ACTA. In December 2010, AnonOps was founded, an organisation whose members used botnets5 and Low Orbit Ion Canon (LOIC)6 software in order to 4 I quote the Wikipedia definition: DDoS (Distributed Denial of Service) attack is an attempt to make a machine or network resource unavailable to its intended users, by consuming all its available resources, while the attack itself originates from many computers at the same time. For those interested to learn more, I recommend Distributed Denial of Service Attacks Against Independent Media and Human Rights Sites, Berkman Center for Internet and Society, Harvard University, http://cyber.law.harvard. edu/publications/2010/DDoS_Independent_Media_and_ Human_Rights (Accessed on 5 August 2014). 5 I quote the Wikipedia definition: Botnet – a group of computers infected with malicious software (malware) unbeknownst to the user, allowing the botnet’s operator to remotely control all computers within it. The control allows for sending spam messages and other attacks using the infected computers. http://pl.wikipedia. org/wiki/Botnet_%28bezpiecze%C5%84stwo_komputerowe%29 (Accessed on 5 August 2014) 6 See the definition and the links to materials collected by the Wikipedia: http://en.wikipedia.org/wiki/Low_ Orbit_Ion_Cannon. (Accessed on 5 August 2014). paralyse websites of such companies as PayPal, MasterCard and Visa, as a “punishment” for blocking payments to WikiLeaks account. The operation ended with arrests of fourteen persons in June 2011, however, within several weeks, a few thousands new members have joined the movement. Also making available the Stuxnet code was a repercussion of an action aimed at supporting Julian Assange, as Anonymous accessed the code by attacking the HBGary company. The attack on the servers took place after the company’s president, Aaron Barr stated that his firm managed to verify the identities of major Anonymous activists, and that they were inclined to make the list available to the FBI. The main victim of the action was Barr himself (his private correspondence was published online; wholesale amounts of pizza were ordered for home delivery on his behalf, for which he had to pay; his mailbox was attacked with spam, etc.), however, it has also been proven that the company he represented, the firm which operated in the sector of public safety, was moreover involved in the action of passing false documents to Wikileaks in order to discredit that organisation. Furthermore, malware was found on the servers, which, shared online, undermined the company’s reputation. At the next stage of the movement’s development, some of its members aided and supported the protesters during the Arab Spring, as well as 15-M movement in Spain, or Occupy in USA. However, despite the fact that Anonymous came to be regarded as politically involved cyber activists, obviously not all its members became “activists” overnight. In response to the AnonOps activity, for instance, the LulzSec fraction was established, whose members agued for returning to the roots of the movement, that is trolling and joking in the /b/ section of autoportret 3 [46] 2014 | 100 4chan.org. Therefore, although in popular perception Anonymous seems a monolith, we should realise that its members are not only activists. If one identifies with Anonymous, it does not automatically follow that she or he is a hacker, because not all the persons involved in the movement can encode. Some edit video materials, write manifestoes, or translate texts, others remain the masters of trolling and nothing besides. The tactics applied by Anonymous are often called “weapon of the geek” in contrast with “weapons of the weak” – the term coined by James Scott to denote local sabotage operations and actions of civil disobedience, often unnoticed by the media, and undertaken by economically marginalised groups. Such a group is typically decentralised and its operation chaotic, so if the actions it undertakes sometimes bring measurable results, it is probably a case of blind luck. However, it is exactly these borderline-illegal, transgressive practices and unpredictable manner of operation, that constitute the most powerful weapon of the Anonymous and lead to their being perceived as threat. The following saying became the Anonymous motto: “We are not your private army.” TO SPEND A HALF-HOUR IN THE WONDERLAND OF DISCOVERY World War I is considered the first modern war of total character, in the whole history, as it set down a new paradigm of mass-scale, technological, and therefore also depersonalised and democratic killing. As Paul K. Saint-Amour has noted, it was also the most optical of wars in the history of mankind; observation and reconnaissance was not just the issue of a few single units sent on foot behind the enemy lines to scout, but it became an operational sphere of a vast, mil- itary and technological network, in which “semiautomated aerial cameras obtained photographic coverage of the entire front, and the photomosaic maps compiled from this coverage were reproduced through industrialized techniques and widely disseminated; observers in airplanes and balloons reported by Morse lamp and later by wireless telegraph.”7 The use of planes, which unlike balloons made it possible to navigate and provided a stable enough platform for the cameras attached to them, facilitated photographic documentation. Then, out of photographic fragments, photomosaic maps were developed, which were a much more realistic representation of the “theatre of war” than even the most perfect of maps developed using traditional techniques – the photomosaic was real, while maps were seen as interpretations of reality. Therefore, units were formed, composed of first class experts trained to read aerial photographs; their task was to distinguish between camouflage and reality. However, the space seen from a bird’s-eye-view perspective looks quite different, as vertical seeing heavily distorts the image, and in itself constitutes a camouflage of sorts; and so people learned to read and recognize the distortions in photographs, resulting from engine vibrations, changes in altitude and angle, changing weather conditions, imperfections of lenses and shutters, or defects occurring in the process of creating a photomosaic, among other factors. It turned out that the remedy was invented nearly 80 years earlier: an optical instrument, which was not only a rather popular toy in bourgeois homes of the 19th century, 7 P.K. Saint-Amour, “Modernist Reconaissance,” Modernism/modernity, Vol. 10, No. 2, April 2003, p. 349–380, here p. 354. but also a “philosophical instrument” of a kind. The appearance of the stereoscope – as this was the device in question – energised studies of perception and abolished the epistemological paradigm of geometrical optics, prevalent since the beginning of the 19th century; the paradigm, which was replaced by the theory of subjective seeing based on the assumption that perceived images do nor relate to facts, nor do they mirror reality, as they are mediated in the physiologically grounded apparatus of human perception. For those who mastered the skill of using the distorting image of the stereoscope, the latter also became a farmacon, helping to interpret the distorted photographic maps, and very soon, there were troops of experts-cyborgs, their eyes almost permanently glued to their optical toys. Although the stereoscope seemed easy to use, child’s play, in fact to operate it required many hours’ training. Thanks to its application, the time spent studying the photographic maps was de facto a journey inside one’s own childhood; retreating into the times, when this ludic, almost magical instrument allowed the viewer to submerge for a moment into a hallucinatory world, protected with a curtain, which was impenetrable by reality. In his text, Saint-Amour quotes the recollections of Constance Babington-Smith who describes her first experience with stereoscope during Wold War II. She writes that her job required the childish ability to see what’s on the other side, through the looking glass: I stood [the stereoscope] above a pair of prints as I had seen some of the others doing. I could see two images, not one, and there really did not seem much point. It was much simpler to work with an ordinary magnifying glass. I edged the autoportret 3 [46] 2014 | 101 two prints backward and forward a bit—still two images; and then suddenly the thing happened, the images fused, and the buildings in the photograph shot up toward me so that I almost drew back. It was the same sort of feeling of triumph and wonder that I remember long ago when I first stayed up on a bicycle without someone holding on behind. From then on interpretation was much easier. 8 Ursula Powys-Lybbe remembers the training in new modes of perception, exploring space, and searching for people and objects, in a similar way: That childish thrill was felt by everyone who, for the first time, managed to shuffle a stereo pair of aerial photographs into the correct position in the viewer. It might have taken a little time, and you felt convinced that something was wrong with your eyes, and you strained your muscles and tried squinting and then magic! Shapes in plan were transformed into real-life ships or churches or bridges. You begged for more prints, and like the child with its new plaything, you spent a half-hour in a wonderland of discovery.9 The moment of clarity, when the two images suddenly overlap and become one, and previously shapeless blotches change into churches, bridges, and estates, could evoke childhood memories, but when it became the domain of an expert versed in deciphering aerial maps, the reality put a stop to the hallucination. At that very moment, when colourful blotches overlapped and – to the stereoscope’s operator’s surprise – an object emerged, that object became a potential target to be destroyed. This is the end of a fairy tale. 8 9 Quote after P.K. Saint-Amour, op. cit., p. 365. Ibidem, p. 367. GAMING POSSIBLE WORLDS, OR THEATRE OF WAR WITHOUT BORDERS I come from a small town. I was raised by my mother, who worked as a teacher at a state school in Missoula, Montana. We could barely make ends meet, so I did not travel much as a child, to the neighbouring state at the most. Or let me put it another way. I come from Elko, Nevada. When I turned twenty, I decided to go to the university, but soon I realised that would mean paying back the debt for as long as I live. As a child, I used to watch TV and play computer games. You may laugh, but I was moulded not by the Faulkner’s novels, but games, because in games, the bad guys are always killed by the good. In 2005, I began studies at the State University in Montana, but the fees were finishing me off. One day I came across the Air Force Recruitment Office, and I signed the papers. Or let me put it another way. I remember when in 2007 my buddies and I went to a convention, and there was this guy who was encouraging people to join the Army. I thought that maybe this was not such a bad idea. Soon they sent me to Lackland Air Force Base in Texas, for training conducted in the framework of the Warrior Week. They told us we would be like James Bond: it would be our task to deliver information, necessary for the mission to get accomplished. Frankly, to be a drone operator seemed quite an interesting job. It is like playing video games, but unfortunately you always play on one level only. Every morning, we had to show up at the airport; a bus came, which took us to an unmarked plane. That’s how we got to the base. The room I worked in didn’t resemble a regular office; it was a size of a race-car interior, dark, with computer monitors for the only source of light. Usually we stared at the screen for hours, and nothing happened. I saw every detail, colour of his clothes, his hair, and the guy was not aware of this, he did not know that autoportret 3 [46] 2014 | 102 this was happening. I remember our first operation, when we were ordered to attack. That was in Afghanistan, at night. Soldiers on the ground asked for air support. The missile hit a group of men, who all died on the spot but one, his leg ripped off above the knee. He fell to the ground. I saw him move; I don’t know if he was saying anything, but if he did, he must have been cursing at me. After some fifteen minutes he stopped moving, everything went dead, but we were told to wait until the morning in order to estimate the losses. Or let me put it another way. During one operation, we were shooting at an empty building on the hill. Suddenly I saw a small figure on the screen, so I asked the commander if this was not a child. The response was, it was a dog. I am still not certain. I asked the chaplain. He said it was our duty to fight the enemy. After work, we return to the airfield, I get on the plane, and go back home. The same thing every day10. “I AM NOT TRYING TO IMPRESS YOU, BUT I’M BATMAN” (1, PNKS) In February 2012, “Wall Street Journal” published an article about the NSA declaring Anon as posing threat to national security, because – as the Agency experts supposed – over the following year or two they might initiate a series of cyber attacks, which would lead to destabilising the security system of the State. Independent experts as well as the members of the group themselves rejected NSA’s claims, calling them a fear campaign; yet as the documents Snowden revealed tell us, this did not stop the Agency or its British counterpart from unleashing a cyber war. Both presentations testify to the fact that the bureaucratic machine started running at full speed – after all, in order to accomplish the mission of breaking Anonymous, new personnel was needed that had to be trained first. Since the two presentations were made public11, much has been written about technical aspects and results of JTRIG actions against Anonymous and LulzSec, but little consideration was devoted to their theoretical base. The analysis of the latter reveals the identity of “soldiers” recruited to fight in the cyber war. It is no secret that links between the Army and the entertainment industry are now stronger than 10 The text is apocryphal; for more information I recommend studying the recollections of drone pilots, interviewed by Tonja Hessen Schei in her documentary The Drone, as well as Matthew Power for “GQ” Magazine: Confessions of a Drone Warrior, http://www.gq.com/news-politics/big-issues/201311/drone-uav-pilot-assassination (Accessed on 5 August 2014). 11 As well as three others, developed jointly by Greenwald and NBC News, describing them in the series of articles titled Dirty Tricks: http://www.nbcnews.com/feature/ edward-snowden-interview/exclusive-snowden-docs-showbritish-spies-used-sex-dirty-tricks-n23091 (Accessed on 5 August 2014) ever before. Let us take for example the game of America’s Army, which used to serve as a recruitment tool; but there are many more other instances. Military activities using drones, or those conducted on the Internet, require special skills, which cannot be taught. Therefore, the recruiters tend to seek persons who had never known the world without the Internet, the generation raised on computer games and shaped by axiological order embedded therein. No wonder that intelligence agencies often recruit their employees during world’s biggest hacker conferences or gaming conventions. Slide no. 26 of PNKS: “Squeaky Dolphin. Can SigDev (signal development) help us understand and shape the Human Terrain?” Considering that the “Human Terrain System” software was created to provide knowledge on foreign cultures to soldiers taking part in military operations (sometimes called stabilization missions) abroad, it appears that the Anonymous group is perceived in the same category as a foreign culture, while the Internet is an unknown territory, where we must send a new generation of soldiers. It is not enough to be able to encode; after all, the “black hat” hackers are merely a small part of the Anonymous. Anyway, sooner or later we will catch those who break the law, their foot will slip, and we will put them in jail. But, our goal is to game them all. We need cyber magicians. It seems that when they were beginning the action of “figuring out” the organisation, the intelligence services were aware of ideological disputes among its different fractions, and wanted to use these differences as a tool for breaking up the group. The penultimate slide (48, PNKS) titled “Identifying and Exploiting fracture points” exhibits a diagram, on which factors such as shared opposition (common enemy), shared ideology and common beliefs are the categories that push a group together, autoportret 3 [46] 2014 | 103 while personal power (influential individuals), pre-existing cleavages, competition and ideological differences are shown as the things that pull a group apart. In order to break-up the group, two complementary strategies were planned. The first was aimed at destroying the reputations of targeted individuals. This entailed such activities as “false flag operations” which signifies placing materials in the Internet falsely attributed to the victim of the attack, or such materials as might compromise him or her. There were cases where agents set up blogs of alleged victims of the persons whom they wished to discredit; they contacted their relatives and friends, informing them of sexual affairs in which their targets were allegedly involved. They also used provocation, aimed at eliciting behaviour within the law’s grey area – this was linked, among other things, to accessing the list of contacts, which made DDoS attacks possible. These attacks probably targeted the key persons, or these members of the Anonymous, who enjoyed opinion-forming status among their peers. The other strategy entailed the application of all possible theories of deception and influence, in order to manipulate the discourse and activism on the Internet to such extent that targeted persons would start destroying one another. It seems that the goal was to provoke those members of the Anonymous, who did not break the law, but whose actions were deemed threatening. We find theoretical background for such actions described in slide (24, PNKS) titled “Gambits of deception,” which contains an exhaustive list of techniques such as: control attention (mask/mimic), sense-making12, as well as techniques for steering affect 12 Sensemaking is a term coined by Karl Weick to describe the proces in which social actors, trying to understand re- and behaviour. Another noteworthy slide featured in the presentation is slide number (27, PNKS) titled “10 principles of Influence.” It seems to combine the six principles of influence laid out in Robert Cialdini’s book, a many years’ bestseller in the field of marketing, with the seven principles of influence proposed by Frank Stajano and Paul Wilson in their article on online fraud, in which the authors revised Cialdini’s principles. It is terrifying to think that NSA and GCHQ agents acquired such knowledge! But this is not the end, as roughly in the middle of the presentation we find slide (21, PNKS), with a reproduction of Hieronymus Bosch’s The Conjurer (also known as The Magician). I type the title of the painting in a search engine and here is what I get: a Wikipedia entry, an article at a website dedicated to Bosch, a fragment of a book on Bosch from Google Books, and a link to the article in The Guardian titled Sleights of hand, sleights of mind.13 It is probably a coincidence, because as we well know, Uncle Google does not choose the best content for us, but such content, which could potentially interest us. What is more, every now and then, Google change their search algorithm, so I cannot be absolutely sure what the author of the presentation had it mind; but even if it were a coincidence, it would have been too beautiful for me to deny myself the pleasure of writing about it. The article in The Guardian concerns the research by a ality, create shared, abstract models, built on earlier, even fragmentary beliefs on reality, and then, they identify with these models, accepting them as reality. Given as an example is the strategy used by general Sir Edmund Allenby at the turn of winter and early spring of 1917, against the army commanded by general von Kressenstein. It went down in history under the name of Haversack Ruse. Compare Andrew W. Eddowes, The Haversack Ruse, and British Deception Operations in Palestine During World War I, Newport: RI: The Naval War College, 1994. 13 http://www.theguardian.com/science/neurophilosophy/2011/oct/14/1 (Accessed on 5 August 2014). couple of neurologists, Susan Martinez-Conde and Stephen Macknik of Visual Neuroscience Laboratory at Barrow Neurological Institute in Phoenix, Arizona, who decided to study the ways by which magicians trick our brain. To that end, they invented a new discipline of science – the neuromagic. Martinez-Conde claims that magicians have long known how to “hack” our mental processes, which allows them to manipulate the attention and awareness of their audience. The key is covering one illusion with another layer of illusion (“change blindness”), as a result of which the senses are bombarded with an amount of stimuli too large for our brain to process simultaneously. I think that JTRIG specialists might have availed themselves of the conclusions drawn by neuromagic experts, because one of the following slides (23, PNKS) proclaims that people are inclined to direct their attention to wherever they expect something interesting to happen: “We are biased to see/ hear/feel/smell/taste what we strongly expect to see/hear/feel/smell/taste.” Is this not the reason why we are inclined to believe the coin to disappear from the magician’s hand, although our common sense tells us that this is impossible? The key word, which in my opinion binds all these strategies and methods together, is the mimicry, quoted in the presentation leaked by Snowden. On slide 42, mimicry has been defined as adoption of specific social traits by the communicator from the other participant(s). Following the definition is the fundamental question: Can I game this? It seems that the agents tasked with figuring out Anonymous were ordered to adopt the main strategies of their target’s operation, which they eagerly did. It remains an open question, whether the JTRIG cyber magicians succeeded in hacking the minds of the people of Anonymous? Arguably, the answer should be negative, as you cannot simulate something, which is pure chaos, consisting of many different beliefs, personality traits, and attitudes. However, as Jacques Lacan has written: Mimicry reveals something in so far as it is distinct from what might be called an itself that is behind. The effect of mimicry is camouflage. It is not a question of harmonizing with the background, but against a mottled background, of becoming mottled - exactly like the technique of camouflage practiced in human warfare.14 Theatre of cyber war. Trolls trolling the trolls. Yet what is paradoxical, the latter are an international group of anarchist Internet activists, while the first are the employees of national security agencies, who call this procedure “magic.” 14 J. Lacan, „The Line and Light”, Of the Gaze, quote after: H. Bhabha, “Of Mimicry and Man: The Ambivalence of Colonial Discourse”, October, Vol. 28, No. 1, 1984, p. 125.