The God's Eye View
Page 35
“Guardian Angel, then?” Remar said.
Senator McQueen nodded. “And I can’t think of a better man to run it than you, General. You know you will have my full support. Thank you for your service, and for your lifelong dedication to keeping the American people safe.”
Remar offered a single, crisp nod. “Thank you, Senator. I’ll continue to do what I can. In fact, I know we all will.”
AUTHOR’S NOTE . . . . . . . .
I couldn’t have written this book without the benefit of what the public has learned from whistleblower Edward Snowden. Though if I had written it before Snowden’s revelations, I’m confident substantial portions would have sounded like tinfoil-hatted crazy talk.
What we know instead is that most of what I’ve described in these pages is real. And while God’s Eye itself is speculative, anyone familiar with the record of J. Edgar Hoover, the history of COINTELPRO, the allegations of NSA analyst Russell Tice, or the workings of human nature generally will know that even God’s Eye is unlikely to be entirely imaginary.
That said, I know here and there I’ve taken some minor institutional and technical liberties, mostly in the service of moving the plot along more crisply. Apologies for this to the experts (thanked below) who were kind enough to read and correct the manuscript before publication. As for the unintentional errors I’m sure I’ve made despite a fair amount of research and fact-checking, I’ll look forward to hearing from readers, and to posting corrections on my website at http://www.barryeisler.com/mistakes.php.
For more on the facts behind my fiction, I recommend the following:
PROLOGUE
Timeline of NSA revelations
http://america.aljazeera.com/articles/multimedia/timeline-edward-snowden-revelations.html
“13 Ways the NSA Has Spied on Us”
http://www.vox.com/2014/7/9/5880403/13-ways-the-nsa-spies-on-us
One of the NSA’s least known and most potent surveillance tools: EO 12333
http://www.washingtonpost.com/opinions/meet-executive-order-12333-the-reagan-rule-that-lets-the-nsa-spy-on-americans/2014/07/18/93d2ac22-0b93-11e4-b8e5-d0de80767fc2_story.html
The false and propagandistic notion of an American “oath” of secrecy
http://barryeisler.blogspot.com/2013/06/memo-to-authoritarians-oath-is-to.html
Not so many burning Humvees in Desert Storm, true, but see Day 15 and Day 41
http://armylive.dodlive.mil/index.php/2013/02/operation-desert-storm/
How an undersea oil eruption became a “leak”
http://barryeisler.blogspot.com/2010/07/its-just-leak.html
“Enhanced Interrogation” sounds better in the original German
http://www.theatlantic.com/daily-dish/archive/2007/05/-versch-auml-rfte-vernehmung/228158/
It’s almost as though all these “narcissist” hacks were working off the same set of talking points
https://www.google.com/search?client=safari&rls=en&q=snowden+a+narcissist&ie=UTF-8&oe=UTF-8
Speaking of the “narcissism” talking points/projection, don’t miss Jay Rosen on the “Toobin Principle”
http://pressthink.org/2013/08/the-toobin-principle/
“They are using the exact same deny, degrade, distract, disrupt, destroy playbook against [Snowden] that his own revelations show are being used against every other activist.”
https://occupysavvy.wordpress.com/2015/07/07/occupy-independence-forever/
Our august lawmakers solicit the Defense Intelligence Agency for dirt they can use to undermine Snowden’s credibility
https://news.vice.com/article/exclusive-inside-washingtons-quest-to-bring-down-edward-snowden
1.2 million people on US government watch list
http://www.theguardian.com/us-news/2014/oct/11/second-leaker-in-us-intelligence-says-glenn-greenwald
CHAPTER 1
US/Turkish intelligence cooperation
https://firstlook.org/theintercept/2014/08/31/nsaturkeyspiegel/
More on NSA Special Liaison Advisors
https://firstlook.org/theintercept/document/2014/08/31/foreign-relations-mission-titles/
Webcam hacking
http://arstechnica.com/tech-policy/2013/08/webcam-spying-goes-mainstream-as-miss-teen-usa-describes-hack/
Mesh network CCTV surveillance systems are trivial to hack
http://www.forbes.com/sites/kashmirhill/2014/08/11/surveillance-cameras-for-all/
Harvard secretly installs cameras in its classrooms
http://www.nytimes.com/2014/11/07/us/secret-cameras-rekindle-privacy-debate-at-harvard.html
Gunshot-detecting microphones
http://www.economist.com/news/united-states/21617018-how-gunshot-detecting-microphones-help-police-curb-crime-calling-shots?fsrc=scn/tw/te/pe/callingtheshots
Identifying people via biometric data like height, stride length, and walking speed
http://arstechnica.com/tech-policy/2014/12/4-seconds-of-body-cam-video-can-reveal-a-biometric-fingerprint-study-says/
“New Surveillance Technology Can Track Everyone in an Area for Several Hours at a Time”
http://www.washingtonpost.com/business/technology/new-surveillance-technology-can-track-everyone-in-an-area-for-several-hours-at-a-time/2014/02/05/82f1556e-876f-11e3-a5bd-844629433ba3_story.html
Facial recognition technology is everywhere, even in churches
http://fusion.net/story/154199/facial-recognition-no-rules/
Who is this Marcy Wheeler?!
https://www.emptywheel.net
CHAPTER 2
Intelligence agencies achieve greater openness by prohibiting officials from talking to media
http://www.wsj.com/articles/SB10001424052702304049904579516103606857772
Those damn subversives the director is so upset about
Barrett Brown—http://frontburner.dmagazine.com/author/barrettbrown/
Sarah Harrison—https://wikileaks.org/Profile-Sarah-Harrison.html
Murtaza Hussain—https://firstlook.org/theintercept/staff/murtaza-hussain/
Angela Keaton—https://twitter.com/antiwar2
Jason Leopold—https://news.vice.com/contributor/jason-leopold
Janet Reitman—http://www.rollingstone.com/contributor/janet-reitman
Trevor Timm—https://freedom.press/about/board-staff/trevor-timm
Marcy Wheeler—https://www.emptywheel.net
How the NSA tracks cell phone locations
https://www.eff.org/deeplinks/2013/10/nsa-tracked-americans-cell-locations-two-years-senator-hints-theres-more
A lost dog identified three thousand miles from home via a microchip implant. Coming soon to babies everywhere, no doubt
http://www.aol.com/article/2014/09/18/lost-dog-found-3-000-miles-away/20964319/
Amazingly, about a day after I wrote the scene where the director ruminates about using a kidnapping to persuade Americans to have microchips implanted in their children, this was published (and quickly debunked)
http://www.washingtonpost.com/posteverything/wp/2014/09/23/i-helped-save-a-kidnapped-man-from-murder-with-apples-new-encryption-rules-we-never-wouldve-found-him/
Another place the government used the all-seeing eye of providence was as part of the design for the Total Information Awareness program. The Latin means “knowledge is power”
https://en.wikipedia.org/wiki/Scientia_potentia_est#/media/File:IAO-logo.png
The brilliant cartoonist Tom Tomorrow summed up Total Information Awareness perfectly . . . all the way back in 2002
https://twitter.com/tomtomorrow/status/613187965737660416/photo/1
Inventing ever scarier-sounding terrorist groups to justify more bombings. Heard of the Khorasan group lately?
https://firstlook.org/theintercept/2014/09/28/u-s-officials-invented-terror-group-justify-bombing-syria/
https://firstlook.org/theintercept/2015/05/28/called-khorasan-group-doesnt-exist/
CHAPTER 6
United Nations Special Rapporteur on Torture finds Chelsea Manning’s treatment cruel
and inhuman
http://www.theguardian.com/world/2012/mar/12/bradley-manning-cruel-inhuman-treatment-un
Yemenis seek justice in wedding drone strike
http://www.aljazeera.com/indepth/features/2014/01/yemenis-seek-justice-wedding-drone-strike-201418135352298935.html
The best coverage of America’s drone wars ever is courtesy of comedian John Oliver
http://www.motherjones.com/mixed-media/2014/09/john-oliver-drones-obama-harvey-keitel
Detaining someone assisting in journalism under the pretext of antiterrorism
http://barryeisler.blogspot.com/2013/08/david-miranda-and-preclusion-of-privacy.html
Hacking a car and turning it into a drone
http://www.youtube.com/watch?v=3D6jxBDy8k8&feature=youtu.be
http://www.nytimes.com/2011/03/10/business/10hack.html?_r=1&
http://www.huffingtonpost.com/2013/06/24/michael-hastings-car-hacked_n_3492339.html
http://www.forbes.com/sites/andygreenberg/2013/07/24/hackers-reveal-nasty-new-car-attacks-with-me-behind-the-wheel-video/
http://www.economist.com/news/science-and-technology/21654954-computer-networks-cars-are-now-targets-hackers-deus-ex-vehiculum
https://www.techdirt.com/articles/20150721/08391831712/newsflash-car-network-security-is-still-horrible-very-dangerous-joke.shtml
Airplanes are vulnerable to cyberhacking, too
http://www.foxnews.com/us/2015/04/17/security-expert-pulled-off-flight-by-fbi-after-exposing-airline-tech/
Everything in a high-end car is microprocessor-controlled—even the steering
http://auto.howstuffworks.com/car-driving-safety/safety-regulatory-devices/self-parking-car1.htm
Hertz puts cameras inside some of its rental cars
http://arstechnica.com/cars/2015/03/hertz-puts-cameras-in-some-of-its-rental-cars-but-it-never-meant-to-be-creepy/
CHAPTER 7
It’s possible Manus has seen this video on concealing a handgun inside a vehicle
https://www.youtube.com/watch?v=odT-CfS7lQs
CHAPTER 8
How Western media is manipulated by ISIS into spreading jihadist propaganda
http://www.juancole.com/2014/09/media-politicians-should-stop-letting-isil-manipulated-them.html
The real starship Enterprise-like “Information Dominance Center,” used by former NSA chief Keith Alexander, is at Fort Belvoir, not Fort Meade. But I couldn’t resist moving it
http://www.theguardian.com/commentisfree/2013/sep/15/nsa-mind-keith-alexander-star-trek
See how excited Brian Williams gets when the government permits him a peek inside the (gasp) Situation Room!
http://rockcenter.nbcnews.com/_news/2012/05/04/11539949-inside-the-situation-room-a-guided-tour
CHAPTER 9
If you think Brian’s interview of the director was deferential to the point of parody, you probably haven’t seen Wolf Blitzer’s version, with FBI director James Comey
https://twitter.com/ggreenwald/status/624612963064807428/photo/1
https://www.youtube.com/watch?t=204&v=7RyVXLKO0DM
Pakistani government forces cell phone users to turn over fingerprints or lose their service
http://www.washingtonpost.com/world/asia_pacific/pakistanis-face-a-deadline-surrender-fingerprints-or-give-up-cellphone/2015/02/23/de995a88-b932-11e4-bc30-a4e75503948a_story.html
CHAPTER 10
ACLU rendition of just how powerful a tool location data can be
https://www.aclu.org/meet-jack-or-what-government-could-do-all-location-data
Leaving your cell phone at home when you go out? Using encryption? The NSA might think you’re a terrorist
http://www.theguardian.com/world/2014/nov/09/berlins-digital-exiles-tech-activists-escape-nsa
NSA spied on US senators
http://foreignpolicy.com/2013/09/25/secret-cold-war-documents-reveal-nsa-spied-on-senators/
“We Kill People Based on Metadata”
http://www.nybooks.com/blogs/nyrblog/2014/may/10/we-kill-people-based-metadata/
CHAPTER 11
ISIS waterboarded journalist James Foley
http://www.ibtimes.com/james-foley-waterboarding-us-journalist-was-tortured-isis-using-same-techniques-cia-used-1673268
CHAPTER 12
Obama prosecutes whistleblowers under the 1917 Espionage Act more than twice as many times as all administrations in history combined
http://theweek.com/article/index/246029/is-obama-abusing-the-espionage-act
Here’s what the Constitutional law professor and Nobel Peace laureate did to whistleblower Jeffrey Sterling
https://firstlook.org/theintercept/2015/01/27/torture-must-circumstances-call-new-york-times/
https://firstlook.org/theintercept/2015/06/18/jeffrey-sterling-took-on-the-cia-and-lost-everything/
Secret FISA “court” is nothing but an administrative rubber stamp
http://www.thedailybeast.com/articles/2013/07/24/the-secret-fisa-court-must-go.html
FISA “court” approves 99.97 percent of government surveillance requests
http://www.motherjones.com/mojo/2013/06/fisa-court-nsa-spying-opinion-reject-request
CHAPTER 13
Journalists relying on face-to-face meetings and human couriers
http://barryeisler.blogspot.com/2013/08/david-miranda-and-preclusion-of-privacy.html
NSA spends billions to weaken international standards, install backdoors, and otherwise subvert encryption
http://www.nytimes.com/2013/09/07/us/politics/legislation-seeks-to-bar-nsa-tactic-in-encryption.html?smid=tw-share&_r=0
NSA intercepts shipments of Internet-ordered computers; infects them with malware
http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html
“Secret Documents Reveal NSA Campaign Against Encryption”
http://www.nytimes.com/interactive/2013/09/05/us/documents-reveal-nsa-campaign-against-encryption.html?_r=0
“A Few Thoughts on Cryptographic Engineering”
http://blog.cryptographyengineering.com/2013/09/on-nsa.html
The menace of “insider threats”
http://www.mcclatchydc.com/2013/06/20/194513/obamas-crackdown-views-leaks-as.html
Over 700,000,000 people changing their online behavior to evade NSA surveillance
https://www.schneier.com/blog/archives/2014/12/over_700_millio.html
US Postal Service logs all mail for law enforcement
http://www.nytimes.com/2013/07/04/us/monitoring-of-snail-mail.html?_r=0
CHAPTER 14
Over 1.5 million people with top-secret clearances (more than the population of Norway)
http://www.washingtonpost.com/blogs/the-switch/wp/2014/03/24/5-1-million-americans-have-security-clearances-thats-more-than-the-entire-population-of-norway/
CHAPTER 16
“New Hi-Tech Police Surveillance: The ‘StingRay’ Cell Phone Spying Device”
http://www.globalresearch.ca/new-hi-tech-police-surveillance-the-stingray-cell-phone-spying-device/5331165
CHAPTER 17
In case you’re wondering how the director can come up with spare grenade launchers to trade like playing cards
http://www.washingtonpost.com/world/national-security/pentagon-loses-sight-of-500-million-in-counterterrorism-aid-given-to-yemen/2015/03/17/f4ca25ce-cbf9-11e4-8a46-b1dc9be5a8ff_story.html
NSA’s AURORAGOLD cell phone eavesdropping and encryption subversion program
https://firstlook.org/theintercept/2014/12/04/nsa-auroragold-hack-cellphones/
CHAPTER 18
NASA’s SHARAD technology
http://mars.nasa.gov/mer/technology/si_remote_instrumentation.html
And other existing and coming means of peering through brick and concrete
https://www.documentcloud.org/documents/1505138-00-wallsensorreport-508.html#document/p20/a198024
CHAPTER 20
Mobile IMSI-catcher cell phone trackers
http://arstechnica.
com/tech-policy/2013/09/meet-the-machines-that-steal-your-phones-data/
CHAPTER 22
Pakistani government forces cell phone users to turn over fingerprints or lose their service
http://www.washingtonpost.com/world/asia_pacific/pakistanis-face-a-deadline-surrender-fingerprints-or-give-up-cellphone/2015/02/23/de995a88-b932-11e4-bc30-a4e75503948a_story.html
“We don’t know if it was terrorism” means “We don’t know if it was Muslims,” and other aspects of the “terrorism expert” industry
http://www.democracynow.org/2015/1/13/glenn_greenwald_on_how_to_be
If you think Barbara Stirr’s exchange with the director was deferential to the point of parody, you probably haven’t seen Wolf Blitzer’s version, with FBI director James Comey
https://twitter.com/ggreenwald/status/624612963064807428/photo/1
https://www.youtube.com/watch?t=204&v=7RyVXLKO0DM
CHAPTER 23
No one uses words like “homeland” accidentally
http://intercepts.defensenews.com/2013/08/auvsi-dont-say-drone-no-really-dont-say-drone/
http://www.huffingtonpost.com/barry-eisler/its-just-a-leak_b_635570.html
“US Military Drone Network in the Middle East and Africa”
http://apps.washingtonpost.com/g/page/world/us-military-drone-network-in-the-middle-east-and-africa/325/
US automatically counts all military-age males killed as terrorists
http://www.nytimes.com/2012/05/29/world/obamas-leadership-in-war-on-al-qaeda.html?_r=0
ISIS claims US hostage killed in coalition air strike in Syria
http://www.theguardian.com/world/2015/feb/06/us-hostage-isis-coalition-air-strike-killed-syria
On the CIA choosing its own pet reporters, by two great journalists for whom I’ve named characters in other books—Dan Froomkin and Scott Horton
https://firstlook.org/theintercept/2015/01/09/democracy-people-dont-know-government/
Wolf Blitzer is a particularly compliant tool
https://firstlook.org/theintercept/2015/07/23/nbc-news-releases-long-awaited-trailer-summer-horror-film-isis/
The New York Times helpfully publishes the government’s side of the story: Sure, American hostages were killed, but counterterrorism officials and analysts say the drone program overall is effective . . .
http://www.nytimes.com/2015/04/25/world/asia/cia-qaeda-drone-strikes-warren-weinstein-giovanni-lo-porto-deaths.html