Anonymous on Fri, 16 Nov 2001 15:46:01 +0100 (CET)


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Nettime-bold] (no subject)


 note: if the remailer mangles it, formatted version is at: 
http://www.indymedia.org/print.php3?article_id=90576 

Welcome to The Identity State 



Convergence and Encirclement (Endocolonization) 

The department of justice strategy mirrors the global strategy. The 
strategy involves the decentralization of executive enforcement and 
information gathering while simultaneously providing a centralization of 
identity: a singular identity constructed from each apparatus 
contributing using a similar communication protocols. The 
territorialization of all spaces is accomplished through pervasive 
decentralized mechanisms which delimit the individual as an identity 
already within the territorialized space. If possible, existing networks 
of subjection are utilized: local territory based governments, 
currencies, banks, licenses, etc. are converted to identity based 
systems. This allows subversion and conversion without alarm, under the 
guise of bureaucratic efficiency and security. Identity is the exchange 
currency of the global network of subjection. 

The military/police (and all other apparatus) can share information and 
construct the identity profile. By utilizing all apparatuses, the 
identity-based system becomes omnipresent. All spaces, all services, all 
communication, all travel, all weapons, all computers, can be 
territorialized through the connection of the various identities which 
already exist to a singular identity. All identity-based platforms 
converge to a singular identity-based platform. Whether or not a national 
ID is issued. Control is achieved through: the 
objectification/delimitation of an identity, the access and power allowed 
to that identity, and the subjectification of the individual to the 
constructed identity. (Even and especially if the identity exists in the 
future, as a plan / delimited possibility / coded desire.) Local and 
national governments provide the legal structure of economic colonization 
and its enforcement. But more importantly, each local and national 
government provides enrollment without choice. The expansion of the 
global identity state is accomplished by utilizing existing state 
apparatus of spatial control. No country is to harbor a terrorist 
expands the global reach of the identity apparatus with the threat of 
military/economic retaliation. There is to be no space, no territory, 
no piece of earth exempted from subjection to the identity apparatus. 

The government is the enforcement arm, a military/police apparatus 
removed of social service (except those services that remain as apparatus 
of subjection). The judicial and enforcement arms are corrupted through 
the subversion of the legislative branch. The definition is subverted, 
and therefore the distribution, through judgment and execution, follows. 
A meta-structure of world domination at all levels is accomplished 
through a global economic regulation. The subversion of legislature is 
muscled in under the benefits to the economy, implemented by local 
executive branches. Perhaps even a subversion of the judicial system can 
be accomplished through the implementation of global tribunals for 
terrorists. The civil and criminal court become corporate and terrorist, 
court and tribunal. Perhaps the civil judicial system is needed to 
resolve dispute between corporations. The governments main function, 
however, is to execute and enforce the laws subverted. In other words, 
local executive branches, from the dwindling social service agencies to 
the expanding gargantuan military/police apparatus, do the dirty work 
(under the meta-threat of economic reprisal) while the corporations sit 
in an ethereal air, as if bloodless. Besides, native policing is always 
most effective, not to mention cost-effective. 

But this military/police convergence exposes and precipitates a greater 
convergence: that of the state and economy, government and capitalism, 
peace and war. All aspects of social life everywhere converge under the 
uniting principle of identity. This is not to say that facets do not 
remain. In fact, the illusion of separation expands. 

Identity is the consummation of the economic and military and police and 
all apparatus. It is BOTH the basis of exchange and control. Economy and 
state are revealed as one through their singular currency, the 
rationalized and delimited representation through which access and 
equivalence are constructed, and the individual subjected: the identity. 

The walls are falling. A massive convergence is happening right before 
our eyes. This is the establishment of international law, international 
reach, international enforcement of a (not-so-)international economic 
colonization. This expansion occurs not only internationally, but across 
all spectrums and mechanisms of social life. Nothing is exempted from the 
saturated omnipresent capitalist security state. Endocolonization to the 
nth. The military, without a stable enemy, turns to the police function. 
The convergence of military and police apparatus is only the symptom 
indicating that the enemy is no longer the other. The enemy is no longer 
beyond the borders. The enemy is omnipresent. The enemy is us. 



Prevention 

Prevention and disruption is set as the goal, and simultaneously (and by 
no coincidence) exempted from due process. A whole prevention system is 
legitimized and operated pre-judicially. Bypassing constitutional and 
human rights under the guise of war. The judicial system was based on 
crimes committed, not crimes (supposedly) about to be committed. Where is 
the burden of proof, the beyond the shadow of a reasonable doubt of 
probability profiles? Prevention is a whole new arena. The department 
of justice is put on a war footing. The judicial process is 
short-circuited. Invisible search, seizure and surveillance, detainment 
and indefinite imprisonment, total information sharing and identity 
profiling, and now... war tribunals? 

Deterrence turns to prevention. Deterrence was a peace that occurred 
through the infliction of the viral arms race on a government. Prevention 
is the infliction of the virus of identity onto a population. The 
population is told it has a virus, and that the cure ( or vaccine?) is 
within the delimitation of individual identity. But it is identity that 
is the virus inflicted. A trojan horse, a virus of impotence sold as 
cure. Before, prior, disrupt, deter, prevent... The individual is no 
longer judged on what one has done, but what one is capable of doing, is 
probable of doing. (A sort of speculative stock of identities, 
probabilities being based on world and market events and the particular 
identity profile, or groups or classes to which a profile belongs.) All 
possibilities are delimited. Individuals are limited to rationalized 
identities and their agglomeration. 

Identity is the basis of equivalence, and therefore of economics. The 
identity is always the political body, relative to, constructed within 
the space of politics. 

Socio-political identity becomes technological identity. Technological 
identity becomes physical identity. The final stage of endocolonization, 
after the apparatus has captured and constructed the physical space 
infrastructure of identity, is the capture of the body, the subjection of 
the individual to their representation. The forced participation of the 
body within a constant global mapping. 

The individual is seduced to limit the self in order to see the limits of 
the self, to construct a body in order to see his own body. Identity is 
always the consumer identity, constructed within the consumer 
environment. Identity is the inhabitation of the secured utopic space. 
Identity is always the loss of freedom, of production, of creation. 
Identity is the inhabitation of a pre-determined self, the body whose 
possibilities and choices are structurally pre-defined, always towards 
production/consumption. All choices of the identity involve 
commodification. The identity further determines its own limits through 
the consumption of limit-creation devices. The identity operates as the 
ideal pancapitalist organism. Furthering its own limits, its own 
efficiency, its own consumption. Further channeling the actions of the 
individual in line with predictable scripted routes. Further enabling the 
individual by further colonizing him. Further subjecting the individual 
to a manipulated and constructed representation. Multiple bodies, 
multiple vehicles, multiple identities, multiple belief systems, multiple 
devices are all allowed and encouraged with the stipulation that all 
extensions must link back to a centralized identity, a centralized point 
of control, namely the singular physical body and its participation and 
acceptance of the equivalence (economic) system. 



The prison inverts 

The anonymous are the excluded. The identified body lives within the 
utopic space. Predictable, surveilled, secure, safe. The defined body, 
identity, is projected back in a cannibalistic self-consumption. 

The body is only included, only admitted to this utopic prison, through 
its construction, through the definition of its limits. A system of 
belief whereby identity = truth = self. The identity, the body, the 
vehicle is defined by its limits: position, extents, access, action are 
all explicitly defined possibility scripts. With the promise that strict 
adhesion to the body, the mastering of its piloting within its confines, 
will result in its extension. 

The strategy of prison inversion up to this point had been that it is not 
necessarily mandatory to colonize the physical body per se, but that the 
individual be seduced to extend the physical body, revealing the position 
and limits of both the bodily extension and the linkage to and 
implication of the position of the physical body. For example, relatively 
low-tech assemblages of body to bodily extensions forced an exposure AND 
definition of the physical body = identity through licensure. 



Identity 

Identity = Visibility = Security = Access = Exchange = Economy 

Identity = Visibility 

Consumers have been suckered into buying platforms for consumption, why 
not platforms for subjectification to identity representations and 
security access mechanisms also? The user is seduced to personalize the 
commodity by commodifying the self. 

Identity = Security 

Both sides of the equation are sold. Each and every individual is a 
threat. All extensions, all representations of identity are combined to 
(re)make, (re)present the self in the profile, the singular identity. 
This singular identity IS the self. The singular identity is used in all 
aspects of social life. All aspects are recorded, profiled, added, and 
Predicted. This is the colonization of space and the body is forced to 
follow identity, the plan. 

Identity is the plan, masquerading as the map. 

Identity = Access 

Access is all that is needed for exchange. The identity is the basis of 
exchange, via access. The definition of limits, identity, is the mode of 
exchange. All elements of social space can be controlled via 
identity-based access. The personal check, the credit card, are 
preliminary steps away from the monetary unit to identity-based exchange. 
And we line up for it. On the one hand, (re)presentations are soldback to 
us as commodities, as extensions, as enablers, as personalization. On the 
other, they are forced on us as responsibilities, rights, privileges. 

Identity theft will become a prime target of enforcement 
(deterrence/disruption/punishment). As the identity-based system becomes 
more omnipresent, identity theft will be less tolerated, and all the more 
necessary for those unwilling to accept the identity received (earned). 

Identity = Exchange 

Credit card bills, phone records, internet logs, building security logs, 
criminal records, driving records, school records, medical records, 
psychiatric records, work records, organizational records, photographs, 
gps tracking, cell phone tracking, shoe size, fingerprint, and dna are 
all now (or soon to be)available to construct the singular identity. (The 
fuhrer has called for the construction of a common communication 
platform.) The rise of the security state is synonymous with the identity 
economy. The identity IS the exchange. Identity is no mere abstraction or 
representation. Identity is the very construction on which economy is 
based. 

Identity = Economy 

The constructed identity is our greatest subjection. It is the invisible 
line with which we delimit self and other, ours and theirs. It is the 
basis of all economies, from currency to authorship. It is the means by 
which we tie strings to our gifts of writing, programming, etc. in 
order to extend the identity through visibility. (Read the GPL for a good 
example of a non-currency identity based system that creates an economy 
of exchange of identity visibility.) There are numerous forms of 
exchange, be it visibility of the constructed self through mapping, or 
access to a utopic space, or protection of an interior. Identity is the 
form of exchange and serves as the basis of all economy. 



Privacy 

Privacy will not be negated. It will be manipulated. Privacy has two 
important functions to play in the identity economy. 

One, privacy allows the further delimitation of the identity and the 
individuals subjection to the constructed identity. Privacy is used to 
legitimize the specific definition identity access to protect private 
data, commodities, etc. through the creation of a delimited identity that 
is in fact the revealment of these data through their definition, and 
through backdoor access. Usually look for rhetoric explaining how the 
further tying of the self to representation through authentication will 
provide greater privacy. Look for key escrows, for digital certificates 
and signatures, for hardware identification devices, for commerce 
encryption (since gov. already has access to banks and credit cards 
anyway). All in all, expect to hear a lot more in the media about the 
dangers of identity theft. One is told they have an identity to steal 
which must be protected. Never mind that one did not create the 
identity, nor does one have any real control the representation. Thus, 
one signs up for further subjectification to and extension of identity 
services under a belief that one is protecting the self. The 
representation of the self is substituted for the self, and the self is 
subjected to it, for fear of losing the (represented) self. 

Two, privacy allows an opacity of identity-based functions and power 
structures. This is most important, as a true transparency would imply a 
right to know and a second guessing of the identity-based power 
structure. Instead, through the construction of massive privacy 
discrepancies, power structures are shielded from the gaze reflected 
back. This occurs through various specific devices, but for instance, 
members of a corporation hide behind a filter that funnels certain 
aspects back to their identity, while hiding the visibility of their 
identity to public eyes. Military/police rely on a more direct method of 
constructing identity profiles, while disallowing the viewing of 
(relevant parts of) the profiles, and disallowing visibility or profiling 
of either members of the military/police apparatus, or the apparatus 
itself. The power structures endeavor to conceal the structure of their 
mechanisms. 



Anonymity and the non-differentiated, non-delimited group (mass) 

Privacy, in the above manipulated form, is desirable to the 
identity-based apparatus. Anonymity will be portrayed as a separate 
issue. This first round has focussed mainly on the foreigner as 
terrorist, yet the machine is being set up to surveill all. Many of the 
civil liberties that have fallen for the non-citizen will soon fall for 
the citizen, as interior terrorism will become a greater threat, as the 
vice clampens. How long till the protesters = terrorists? In the media, 
they have already been cast as a loose network of anarchists. The 
network suits the security/identity state well, as network really 
implies nothing more than communication while preserving the idea of 
identity. Actual group-work, actual (hidden) structure and unilateral 
action, as occurs in sectors of government or corporations, are negated. 
The invisibility shields are denied to the network. Anonymous actions 
and works are declared cowardly despite the fact that such action/work 
eliminates the possibility of economic gain to the individuals who 
created the work. In fact, anonymous works refuse participation in the 
economy of works by negating the basis of economy: the linkage to the 
singular identity. It is precisely for this reason that anonymous action 
is called cowardly. Non-conformity to the economic basis is seen as a 
threat, as the purpose of the anonymous action does not (directly, at 
least) translate into any economical gain, and worse, cannot be 
translated into an equivalence to base an economy, as the definition of 
the singular is lost. Is it one or many? Is there an original? How can 
one quantify and build equivalence without the basic unit of identity? Is 
economy and distribution possible without identity? How can one assure 
quality, make a particular pre-judgment, without the authors name / 
brand name? Is hierarchy and division possible without identity? 
Anonymous action and/or group action threaten the identity economy and 
the security state. 

Once we have lost anonymity, we have lost the war. 

Anonymous systems are being destroyed. Capitalism results in the 
privatization of all appropriated systems. Privatization has, as the base 
of its economy, the singular individual to whom privileges are or are not 
dispensed (access). In the endocolonized world, access replaces exchange. 
The destruction of anonymous systems is legitimized as the destruction of 
local space-based distribution. This is not to say that such systems do 
not still exist. They do and they prosper. (The gated community is only 
in its infantile stages.) But space or area-based distribution has its 
inherent limits, namely geo-political limits and relative stasis 
(non-dynamic, non-fluid). Identity-based distribution systems have no 
such limits. The technological identity-based distribution system can 
distribute to any point on the globe. Identity-based distribution systems 
allows the apparent transversal of the limitations of the state, 
simultaneously inhabiting and extending the global capitalist economy. 
Identity-based technological freedom implies and necessitates complete 
and total territorialization of all aspects, of all spaces. Empowerment 
= extension of the power structure. The individual sets up virtual agents 
for collection/distribution. The individual remotely accesses and 
controls the flow of capital. The subjectification of the individual to 
the economy through machinic enslavement is consummated with the 
construction of the global identity-based distribution system. The 
controlling mechanism of identity-based distribution is access. All 
systems everywhere link back to a centralized identity. There is no 
escape. 





Excerpts 

------------------ 

http://www.politechbot.com/p-02792.html 

Ashcrofts speech on opening NSA, CIA databases to police Attorney General 

John Ashcroft spoke today to an "Anti-Terrorism Coordinators Conference" 
organized by the Executive Office for United States Attorneys 
(http://www.usdoj.gov/usao/eousa/). An excerpt from Ashcrofts prepared 
remarks: 

..The attacks of September 11 have redefined the mission of the 
Department of Justice. Defending our nation and its citizens against 
terrorist attacks is now our first and overriding priority. ... We are 
engaged in an aggressive arrest and detention campaign of law breakers 
with a single objective: to get terrorists off the street before they 
can harm more Americans. ... Last week I announced a sweeping wartime 
reorganization of the Department of Justice that places a high priority 
on cooperation and coordination between Washington and state and local 
prosecutors and law enforcement. ... We will re-focus our resources on 
front-line positions. The war on terrorism will be fought not in 
Washington but in the field, by agents, prosecutors, investigators and 
analysts. ...Our new mission requires not just a new structure but a new 
approach to our jobs. In evaluating the merits of a prosecution, 
Assistant United States Attorneys must consider more than the scale of 
the case but the likelihood that the prosecution may disrupt and 
dismantle terrorist networks. In the changed world in which we now live, 
a seemingly routine prosecution of an immigration violation may be much 
more important than a million-dollar fraud case, because the immigration 
prosecution or minor_ identity_ theft_ case_ may_ remove_ a_ terrorist_ 
operative_ from_ our_ community. This is not a randomly chosen example, 
but a new subjectification to identity. 

It is critical that we begin to view our responsibilities as justice 
officials in the fight against terrorism from the standpoint of the 
culture_ as_ a_ whole_, not_ just_ the_ individual_ case the cultural 
whole is evoked to legitimize the loss of individual liberties 

at hand Anti-Terrorism Task Force Coordinators will be responsible for 
ensuring that federal, state, and local law enforcement are communicating 
regularly regarding potential terrorist activity. You will be 
responsible, as well, for insuring that the information highway is not a 
one-way street. Just as federal officials must have access to information 
collected at the state and local level, Task Force members from state and 
local police must have access to appropriate information available to 
federal agencies. The battle against terrorism will require an 
unprecedented level of cooperation among all members of the law 
enforcement community and beyond. ... Prevention_ of_ terrorist_ 
attacks_ - even_ at_ the_ expense_ of_ prosecution - must be our 
priority. Note that prevention and disruption is being set up as the 
goal, and simultaneously being exempted frome due process. A whole 
prevention system is being legitimized and operated pre-judicially. The 
judicial system was based on crimes committed, not crimes (supposedly) 
about to be committed. Where is the burden of proof, the beyond the 
shadow of a reasonable doubt of probability profiles? Prevention is a 
whole new arena. 

.. To facilitate this communication, today I am issuing a directive to 
all United States Attorneys mandating that they begin immediately to 
develop communications protocols for sharing information with state and 
local leaders. ... As you know, I have just directed the Task Forces to 
coordinate the interviews_ of_ individuals who we believe may have 
information helpful to our investigative or prevention efforts. By 
necessity, many, if not most, of these interviews will be conducted by 
members of state and local law enforcement. Task Force Coordinators will 
be responsible for collecting interview reports so that the information 
they contain may be thoroughly_ analyzed. i.e. profile 

We recognize that this will be a time-consuming and complicated task, but 
it is critical that we expand our knowledge of terrorist networks 
operating within the United States. ... The recently passed 
anti-terrorism legislation-the USA Patriot Act of 2001-- accomplished 
much to improve the effectiveness of law enforcements efforts to 
intercept and stop terrorists. In particular, the new law gives us an 
expanded ability to share information between and within the law 
enforcement and intelligence communities. Our ability to share 
information is only as good as our capacity_ to_ identify useful 
intelligence. Therefore, today I am issuing a second directive to provide 
training to federal, state and local law enforcement in the use of all 
available resources in the war on terrorism, including training on 
foreign intelligence, how to identify it and with whom to share it. 
..Due to the high priority the Department places on disrupting 
terrorist activity, I am requesting that this report be submitted... 



--- 

http://www.whitehouse.gov/news/releases/2001/11/20011113-27.html1 

Military Order 

Detention, Treatment, and Trial of Certain Non-Citizens in the War 
Against Terrorism 

..Given the danger to the safety of the United States and the nature of 
international terrorism, and to the extent provided by and under this 
order, I find consistent with section 836 of title 10, United States 
Code, that it is not practicable to apply in military commissions under 
this order the principles of law and the rules of evidence generally 
recognized in the trial of criminal cases in the United States district 
courts. 

(a) Nothing in this order shall be construed to -- 

(1) authorize the disclosure of state secrets to any person not 
otherwise authorized to have access to them 

(2) limit the authority of the President as Commander in Chief of the 
Armed Forces or the power of the President to grant reprieves and 
pardons or 

(3) limit the lawful authority of the Secretary of Defense, any military 
commander, or any other officer or agent of the United States or of any 
State to detain or try any person who is not an individual subject to 
this order. 

(b) With respect to any individual subject to this order -- 

(1) military tribunals shall have exclusive jurisdiction with respect to 
offenses by the individual and 

(2) the individual shall not be privileged to seek any remedy or maintain 
any proceeding, directly or indirectly, or to have any such remedy or 
proceeding sought on the individuals behalf, in (i) any court of the 
United States, or any State thereof, (ii) any court of any foreign 
nation, or (iii) any international tribunal. 



---- 

http://www.access.gpo.gov/su_docs/aces/fr-cont.html 

Executive Order 13234 of November 9, 2001 

Presidential Task Force on Citizen Preparedness in the War on Terrorism 



Sec. 3. Mission. The Task Force shall identify, review, and recommend 
appropriate means by which the American public can: 

(a) prepare in their homes, neighborhoods, schools, places of worship, 
workplaces, and public places for the potential consequences of any 
possible terrorist attacks within the United States and 

(b) volunteer to assist or otherwise support State and local public 
health and safety officials and others engaged in the effort to prevent, 
prepare for, and respond to any possible terrorist attacks within the 
United States. 

legitimizing and extending identity state to pervade all aspects of 
social life, and encourage as many eyes as possible to assure compliance 
to identity 



---- 

http://www.house.gov/ways_means/socsec/107cong/ss-10wit.htm 

LIST OF WITNESSES TO APPEAR BEFORE 
COMMITTEE ON WAYS AND MEANS 
SUBCOMMITTEE ON SOCIAL SECURITY AND 
COMMITTEE ON FINANCIAL SERVICES 
SUBCOMMITTEE ON OVERSIGHT AND INVESTIGATIONS 
ON PREVENTING IDENTITY THEFT BY TERRORISTS AND CRIMINALS 


THURSDAY, NOVEMBER 8, 2001 - BEGINNING AT 10:00 A.M. 
2128 RAYBURN HOUSE OFFICE BUILDING 



----- 

http://www.epic.org/privacy/terrorism/bop_rule.html 

National Security Prevention of Acts of Violence and Terrorism Final 
Rule Department of Justice Bureau of Prisons 

...Monitoring of Communications With Attorneys To Deter Acts of 
Terrorism... 



------ 

And finally, lest we forget that anonymity is, at least currently, still 
a constitutional right. 

http://www.epic.org/free_speech/mcintyre.html 

McIntyre v. Ohio Elections Commission 

The freedom to publish anonymously extends beyond the literary realm. In 
Talley, the Court held that the First Amendment protects the distribution 
of unsigned handbills urging readers to boycott certain Los Angeles 
merchants who were allegedly engaging in discrimina- tory employment 
practices. 362 U. S. 60. Writing for the Court, Justice Black noted 
that -persecuted groups and sects from time to time throughout history 
have been able to criticize oppressive practices and laws either 
anonymously or not at all.- Id., at 64. Justice Black recalled Englands 
abusive press licensing laws and seditious libel prosecutions, and he 
reminded us that even the arguments favoring the ratification of the 
Constitution advanced in the Federalist Papers were published under 
fictitious names..... Under our Constitution, anonymous pamphleteering is 
not a pernicious, fraudulent practice, but an honorable tradition of 
advocacy and of dissent. Anonymity is a shield from the tyranny of the 
majority.



_______________________________________________
Nettime-bold mailing list
Nettime-bold@nettime.org
http://amsterdam.nettime.org/cgi-bin/mailman/listinfo/nettime-bold