Richard Thieme is interviewed by Matt Nie on WBSD Radio, Burlington Wisconsin, on June 23, 2013, about the recently published book “UFOs and Government: A Historical Inquiry” to which Richard contributed. Nie’s questions in the half hour interview are excellent – concise, sharp, right on the money. The file below is in MP3 format for easy listening and easy downloading.
By Peter Prickett (Thu, 14 Apr 2005 10:57:40 +0100)
As perhaps the first information philosopher, Richard Thieme has become a figurehead among both the cloak and dagger intelligence community and the highly secretive hacker underground. Richard is an institution in the hacker/security conference circuit and his column ‘Islands in the Clickstream’ is syndicated to over 60 countries.
WD> CNN have called you ‘a member of the Cyber avant-garde’, Digital Delirium named you ‘one of the most creative minds of the digital generation’. How do you handle such praise?
You drop a zero.
When I joined the national speakers association, I was overwhelmed by a gale force wind of other speakers telling me how much they worked, how great they were, how highly paid they were. A friend told me, when they tell you their fee, just drop a zero.
Same thing. I take kind or generous statements like that to mean, “your work was meaningful for me” or “I like that” or “you made me think.”
You never believe your own press – good or bad.
WD> How did you initially get involved in technical commentary?
When I left the ordained (Episcopal/Anglican) ministry in 1993 it was to explore the transformational energies swirling around us then as a result of the information revolution. I was asked to write a column about the human side of technology for the Wisconsin Professional Engineers’ monthly magazine. After half a dozen had received a good response I offered them by email which was new then. As E.B. White said, it’s no wonder how complicated things get what with one thing leading to another. The columns became Islands in the Clickstream which are now a book (Syngress Publishing 2004) and I used the nascent world wide web to locate magazines and see if they wanted social or cultural commentary on the phenomenon. Within a few months I was writing for magazines in America, Canada, England, Australia, and South Africa. I wrote every month for South Africa Computer Magazine for three years. Islands now goes to at least sixty countries.
As I said, one thing leading to another.
WD> What has been your sons influence upon your work and your approach to it?
My dialogue with my son, who was 12 when I bought him an Apple 2 and who has never looked back – has been invaluable. It’s the dialogue. I learned to bring to him what I later brought to some of the young technophiles in hacker cons – absolute respect. He was so much brighter than I was about technical matters and saw things so clearly that our dialogue became an important learning space for me. That continues today, and he’ll be 35 this year.
Of course that’s true of ALL of our seven children and step-children! But Aaron, the first born son, is the one with the most geeky gifts in relationship to all this.
WD> How have your ministerial experiences affected your approach to information technology?
Absolutely. And my immersion in, teaching of, and writing literature the decade before that. I learned to relate the context of our encounters and conversations to ultimate values. They may be implicit rather than stated, but that was always the deeper context. Information technology like print text before it is a transformational engine for human identity and activity. We think and behave differently as a result of the ways new technologies of information and communication frame our possibilities. I learned to do that in a world of writing and text. I saw that electronic communication was changing us and in fact already had changed us (the telegraph started all this in 1820, after all) in significant ways.
Ministry was ultimately about using symbols, particularly powerful archetypal symbols, as transformational leverage on behalf of people who were searching for solutions, resolutions, higher states, different spiritual and emotional goal states. Preaching was like doing a Tarot reading, if you think about it, using symbols of deliverance, healing, and transformation. It stands to reason that new kinds of symbol manipulating machines would create a different kind of psychic or spiritual space into which to grow.
WD> You have been described as an information philosopher. What does that phrase mean to you?
Marshall McLuhan said “Nothing is inevitable so long as we are willing to contemplate what is happening.” The phrase, to me, means, thinking about what is happening.
WD> How did you get in touch with intelligence agencies officials? How did you get them to openly speak to you?
You meet lots of people at different conferences and inevitably security conferences have everybody at them, people from all of the many sides of this game. Like any friendship, you find interests in common and go from there. We generally share an interest in the deeper implications of how intelligence is practiced, what technology enables, how it eliminates walls. Naturally no one ever shares anything classified nor do I probe inappropriately. It’s a lot like being a priest, being in intelligence, in some ways, with similar burdens. There’s a lot of shared understanding among my real friends from that domain of the deeper burdens of the commitments of a life lived with secrets. And a live lived with the burden of knowing.
By the way, lots of the people at “hacker cons” are of course from various intelligence agencies or police organizations. That’s been true from the beginning. I mean, why do lions go to the water hole? Because that’s where the antelope go.
WD> How long have you been lecturing at universities? During your last tour what where the burning issues?
I taught English literature and writing in my twenties at the University of Illinois. Next week I will visit the senior seminar at Alverno College in Milwaukee, an all-star liberal arts university that pioneers new educational experiences, because they’ve used my book, Islands in the Clickstream, as a text this year. Then I’ll do a speech at the University of Wisconsin in Waukesha on the future for students. The issues are the ones you’d expect – privacy, intellectual property, war, management of perception, hackers, security.
WD> How has the internet climate changed since you first began commentating?
There is often a movement from myth to metaphor to engineering or science and we’re in the last stage. At first we believed a lot of the myths of cyberspace. Then we saw they were metaphors and began reflecting on them which signifies a major change. When you believe a myth, you don’t know it’s a myth. Now we analyse it and it is part of the known universe. It’s ubiquitous now. Like radio. Television. Automobiles.
That was fast, wasn’t it?
WD> Why did you feel the need to release ‘Islands In The Clickstream?’ Do you feel your writings gain credibility as a physically bound volume as opposed to being free floating selections in cyber space?
Good question. I like books! I loved seeing my prose poems or secular sermons or whatever they are bound by a publisher in a well-designed book. Some people take books more seriously. Now I’m an author. Before I was a guy who put stuff up on the web. Of course the intrinsic value of the columns or whatever you want to call them is the same. But the form seems to matter to people. Some people love to listen to them in audio streams from my web site. Same words, different media. They will always be available free on the internet. The publisher agreed to that.
But of course, people do actually pay for the book. As Hemingway said, there is the problem of sustenance, you know. My writing generally serves as a platform for my professional speaking and sometime consulting which pays the bills.
WD> If you had to put a definition into Webster’s for the word ‘hacker’, what would it be?
That effort is all through my writings. Hackers pursue unconventional structures which they create out of what’s at hand whereas non-hackers see only what they’re told something is. They take it at face value and mistake its one function for its essence. Hackers ask what something can be made to do. Non-hackers or “nackers” ask, what is it? as if the answer exhausts the possibilities of the thing. Hackers like all good scientists are characterized by passion, obsessiveness, and daring. They see the skull beneath the grin except its a machine skull and the grin is the explicit function of an appliance or object. They refuse to be taken in by the smile.
WD> In your opinion is true hacking about systems knowledge or, knowledge of the wet-wear that is using the system?
WD> Do you think it is true to say that if it is possible to breach security without getting caught, someone will always try simply because they can?
WD> You describe hacking as one of the means in which free people can retain freedom. What other, less controversial methodologies would you also consider as effective?
In a world of managed perception and sophisticated subtle propaganda that makes Brave New World look like a child’s book, which it is, freedom requires a refusal to accept stated realities at face value. It’s necessary to track back to the sources of statements and ask who profits from the way the statement has been framed. That applies to big and small statements, media events and macro events as well as simple utterances. Maybe journalism can do that too – who else has the time and expertise? – but not journalism as it usually practiced today. Most journalism today is part of the problem, not the solution. It would have to be journalism squared or “Jedi journalism.”
WD> What effect does hacking have on personal morality?
Properly understood and executed, hacking takes one into the heart of darkness where boundaries dissolve and simple verities and bumper-sticker kinds of morality go liquid. One discovers – well, pick your metaphor – “the horror, the horror” as Conrad put it in The Heart of Darkness. Or “Forget it, Jake—it’s Chinatown” as Jake Gittes learned in the magnificent movie of the same name. Hacking properly understood, not just mucking about with wires and chips, but applied to structures of information at all levels and fundamental questions of identity (individual, organizational, global) takes you “beyond good and evil” in the Niezschean sense of the term. It takes you into a domain of supra-morality. It compels you to ask questions in the face of a deeper knowledge of things.
Obviously I’m not talking about breaking into things as if that’s the end of hacking. I’m talking about taking things apart and seeing the different and often arbitrary ways they can be put back together.
If you have not gone there, then what I am saying sounds like nonsense or it sounds threatening or immoral or iconoclastic. If you have gone there, you know what I mean.
WD> What do you think of the currant climate of world internet security?
Too big a question. There are fences and gates. Which ones? What’s behind them? How important is it to get through or in? Once you get there, what’s the point? What can you do now? What is the value of what you know or have?
Those questions contextualize your question and require a sharper focus.
WD> In previous interviews and articles you have talked about ‘unconventional thinkers working across boundaries of fixed discipline’. Your past as a minister suggests a realm dominated by conventional thinking and fixed disciplines. How do those two worlds interact?
Some ministerial realms are fixed and rigid but as you might guess, mine wasn’t. That’s not how I understood the transformative process and the great deep spiritual adventures of my life. The institutional life, yes, became suffocating for me, and if I had accepted the jobs on the table at the end, I would have died, I think, I would have shrivelled up. Many bishops do, after all, they gain fifty pounds or hit the bottle the first year, when the reality of it hits them. But I am the same person as the one who led parishes pretty fearlessly in Utah, Hawaii, and Milwaukee, Wisconsin. I created a 12-hour intensive event called New Life, for example, they took people through the six segments of the church year in a powerful existential way and showed them that those symbols are real, they point toward a powerful transformation, the most we can ask of ourselves in our most authentic moments. Teaching, preaching, counselling, to me those activities took you to the liminal domains of people’s lives. It was very much, to me, as I describe hacking, an adventure on the edges of boundaries where everyday reality is constantly called into question and the bumper-sticker answers to profound questions dissolved. That’s the demand of ministry – in the middle of the night at the side of parents whose child died suddenly or in the midst of a wedding celebration. You’re in a batting cage, existentially speaking, and better learn to hit every kind of pitch, including ones that come out of nowhere. Authentic ministry was a constant challenge.
So don’t confuse the most rigid, least life-giving, most life-denying structures of a creaking hidebound institutional Christendom with the power of the spirit when it leaps into flame. In the same way, most security practitioners are not real hackers, real experts, are they? They want to check the boxes marked compliance or risk management. That’s true of all domains, isn’t it? The bell curve distribution? The best CEOs are like astronauts and the worst are like corrupt dictators.
WD> If you could impart one piece of advice to everyone, what would it be?
Accept nothing at face value, live boldly, passionately, spend the gift of life as if this is it. Churn through your life like an earthworm devouring all the dirt in the garden. Most of it may be dirt but only by eating it all will you get the goodies. In other words … live, live, live, live, live.
Broadcast on Wisconsin Public Radio (WPR) – January 24, 2005
Mary Jo Wagner, Host of “The West Side” talks with Richard Thieme and Thomas Hilton, Chairman, MIS Department, UW – Eau Claire
Interview with Richard Thieme
By Mick Bauer on Mon, 2004-12-27
Discussing technology, the human experience, homeland security and the future with the author of Islands in the Clickstream.
In the field of information security, there are many useful occupations: firewall engineer, policy analyst, auditor and security architect all are popular choices. But what about information technology philosopher? There’s plenty of value in describing the intersections between technology and the human experience, but I know of only one person who makes a living doing so–Richard Thieme.
Richard is an institution on the hacker convention circuit, and he is much in demand as a public speaker, business consultant and writer. He and I recently had a wide-ranging conversation about hacker culture, computer security, competitive intelligence, homeland security and Richard’s singular career.
If you find this chat as fascinating as I did, and I think you will, be sure to check out Thieme’s new book, Islands in the Clickstream, which I review in the February 2005 issue of Linux Journal.
Linux Journal: Your theological and ministerial background has made an obvious impact on your speaking and writing, but how technology entered into it is less obvious. When and how did you start moving in geek circles?
Richard Thieme: I began writing about the impact of technology on religious organizations and institutions, images and ideas and, inevitably, human identity in the 1980s. I intuitively realized the scope and scale of the transformational engine we now call the digital world while playing interactive fiction games from Infocom with my oldest son. Because my previous work–teaching literature and writing at the University of Illinois-Chicago, as well as sixteen years of ministry–had taught me how printed text works, hermeneutics (how meaning is derived from text) and how we are framed by the experience of reading text, I could see by contrast that interacting with text on computers created a different experience, shifted how we thought about our possibilities, our work, meaning, ourselves–everything.
I literally followed my 12-year-old son into the world of bulletin boards, on-line life (an Apple 2, Ascii Express and a 300 baud modem) and continued to explore both the technological machinery as it came on-line through the 1980s and 90s. I offered to do a keynote for Def Con 4 and have been at Def Con and Black Hat every year since.
I also had started speaking about different things–change, leadership, diversity–when I left the ministry and it became clear that all of it derived from technological change. It was natural to follow that up. Literally, I followed the dots into new learning. I joke that I made sure I always was the dumbest one on the room so I always could be learning from the conferences I attended and usually spoke at, but it was true. Hacker cons led to intel people and security professionals, and I learned from every conference and conversation, integrating what I was learning on the cutting edge with ferocious amounts of reading–two-three non-fiction books a week, plus constant on-line learning and attending many seminars and workshops at conferences at which I spoke. My focus always was to translate the implications of what I was hearing about the technologies and what they enabled into human terms. My background and propensities gave me a unique opportunity to do that.
Eleven years later, what with immersion in all that, it began to sound as if I had a clue. Of course, I know better. I am still the dumbest one in the room, and all that wisdom comes to me downhill.
LJ: I was really struck, in your book, by your assertion that computer technology defines our reality in the same ways that language itself does. It led me to the realization that computer security is all about preserving a desired reality–”my system behaves the way I want it to”–against attackers wishing to impose different realities–”j00 ar3 0wn3d!”. Is that the sort of train of thought that got you involved with the intelligence and security communities? Or was it the other way around?
RT: As you perceive, it was give and take. Every interaction with these smart, experienced people taught me more. I became a friend to many, and our quiet conversations (never, of course, betraying anything classified) helped me to see exactly what you’re describing. I am delighted that you see the implications for security of my ways of thinking. I think I’ll quote you!
LJ: You refer to some pretty amazing but credible anecdotes and revelations made by intelligence agency insiders. How do you get those guys to open up to you? Do you ever worry about being used as a conduit of misinformation?
RT: To the last question, I am aware of it but don’t worry about it. The implications are the same for all sources of information these days; that is, how much of any of our consensus realities is designed? How much is intentional? How much is off the cuff, and how much simply aligned with the habitual sowing of seeds of malignant design?
I don’t think I am that important or a sufficient conduit for anyone to worry about influencing me that way.
To my deep satisfaction, I can’t stop being a priest. Leaving the ordained ministry did not change how I learned to relate to people. Of course, I brought that with me into the ministry, but training and practice made it much more likely that I can cultivate relationships I value with the people I love. I have been careful if I ever thought something slipped over the line into confidentiality not to share it or to distort or disguise it. I function as a friend and confidant, in other words, much as I functioned as a priest. I was told by an intelligence-community friend that the evidence was in, after some years, that I handled confidentiality with integrity and could be trusted. My proudest moment came when I was asked to moderate a panel of feds, including the Assistant Secretary of Defense, at Def Con 2000 as they literally feared for their safety when they faced thousands of hackers. I was asked, I was told, because “you’re the only one in the room trusted and respected by both hackers and feds.”
So my vocation, commitments and deeper intentions–although outside the lines of how conventional people color–have remained intact.
That same guy said last year that after nine years of hearing me, he realized what it was I did when I spoke: “You articulate things we all know in our bones are true but don’t know how to say.” That thrilled me, of course. Because that, as you know, is the essence of ministry–to see the subtext and give it voice so people can become more powerful.
LJ: Back in the mid 90s, when Linux was beginning to catch on, you already were talking about open-source software and free software fundamentally changing the software market paradigm. You asserted that [the change in the paradigm] and the Internet, which makes it so fast and easy to distribute code, would make the notion of intellectual property obsolete. But the powers-that-be still have a strong vested interest in intellectual property–do you still think IP’s days are numbered?
RT: A good question. In the short term, we always overstate the effects of new technologies. But in the long run, we always understate them. In addition, new info-technologies do not so much eliminate as recontextualize what has come before. I could go on and on about that. An example is MS making available more source code than ever before as a result of the influence of open source. A case could be made that MS would never have done that, absent that influence.
But, there are problems with open source: many eyes make for many exploits as well as few bugs or more secure code, some people have a disproportionate influence on decisions, and there is no customer orientation because programmers work on what they like without regard to customer input. Yet, as Linux migrates into the commercial space, it comes to share many properties of commercial software. The marketplace shapes the forms we can and do bring into it. So maybe right now we can see the dialogue between different models and vectors of energy pointing to possible scenarios for the future. But we can’t say which will win out.
LJ: The open-source software development model, in which sometimes large numbers of coders contribute their efforts with minimal centralized coordination, always has reminded me of Bakuninist anarchy. (Yes, my friends usually tell me to get a life when I say that!) Do you see the same or different precedents, or is the OSS phenomenon fundamentally new?
RT: Ken Coar and I spoke at Los Alamos, and I also keynoted Apache Con, and I paid close attention to what he said were problems, some already mentioned above. Developers work on scratching itches they have, not what the marketplace demands. As the e-mail conversation goes around the world, early contributors have a disproportionate influence on decisions, and by the time it reaches the land of the rising sun, the die is cast. Linux has what, more than 30,000,000 lines of code, and a recent study said Linux was the focus of more discrete attacks than MS server software. The same problems due to complexity, inscrutability and unforeseen interaction with applications and appliances from third parties apply as much as to Linux as they do to Windows.
Linux is not inherently more secure, nor does the process by which it is evolving inherently generate more secure coding practices. The cry for secure coding at the outset of applications and OS applies to all domains, and Microsoft does respond to what customers want. Say what you will, they have an immense efficient machine for soliciting and responding to customer feedback. Bloatware was a response to a demand for more features and indifference to security. Greater security is a response to that demand from government, corporate and individual users. The context does determine the content, as I am fond of saying.
The factors that ultimately determine success or failure of technological processes are complex and ambiguous until hindsight enables us to say what happened. Chains of causality are clear only in retrospect, and then we make the mistake of thinking that [specific] historical trajectory was the only one that could have happened instead of one of many that happened to occur as a result of choices, accidents and unknown factors. That fine study The Closed World, about the mindspace that emerged from cybernetics and AI and DARPA and generated the simulated worlds we inhabit today, does a great job of illuminating that process.
LJ: You’ve talked about video games being mediated realities, with the potential to become the ultimate interactive art medium. But it seems like a huge percentage of the most popular commercial games are mindless and nihilistic. Do you think the game-developing community is living up to its potential?
RT: Absolutely not. Not yet. It will take time, and I don’t know the ultimate form. I used to think it was interactive fiction, then MOOs and MUSHES, and now it’s vast multiplayer global game spaces. What has happened for sure is that those spaces profoundly influence how we think about and formulate responses to everything. The convergence of technologies often is invisible soon after it happens, and the interlocking of television, music, radio, hard-drive platforms for downloading (for example, Tivo) television programs and software programs–and then saying, “wait, they’re all the same”–that becomes the ubiquitous context that people cease to see or understand. It takes a McLuhan to illuminate how the medium is the message and what the medium, now invisible, in fact is.
That said, hey, it’s early yet. Also true is the extraordinary speed with which these things have happened as compared to prior technologies. The demographics determine the content of the marketplace, and one true thing is that more niches are enabled in the digital world than ever before. More exploration takes place, more new art and music and sound and interactive gamespace is generated, and it is seldom what current media spotlights, such as HALO 2, that ultimately are the important determinants of the future.
The fastest growing online segment is seniors. Their games are bridge and hearts and checkers. But the chat rooms that accompany their games fuel the popularity, the social interaction. Sure, young testosterone-driven males dominate the public media coverage, but get the statistics on romance novels versus shoot-em-up games, and I bet you’d be surprised which is higher.
Time, it takes time.
LJ: Are you still a gamer? What games do you confess to having on your hard drive?
RT: I usually cycle through games looking for how new tendencies might affect the kinds of things we have been discussing. I particularly am interested in narratives, poetic images and text, new ways of addressing human complexity. Games I have played with from that point of view include Republic: The Revolution, Syberia, BladeRunner, many of the MYST series, checking out how the SIMs have evolved. I observe the XBox and PlayStation games my kids play, kids of all ages. I played with Everquest but found the time demands to be too great for me to invest. I look at games such as Quake, Doom, HALO and Grand Theft Auto to see how they’re evolving. I still go back frequently to the world of interactive fiction, which is a thriving small niche. I think INFOCOM games, including Trinity, The Hitchhiker’s Guide to the Galaxy and A Mind Forever Voyaging are spectacular works of interactive literature and will last. Creative people still explore that genre and do some fascinating things with it. I continue to follow the work of Michael Joyce, who pioneered Afternoon and other hypertext fiction, a medium that has not figured out yet how to provide boundaries or bounded narrative space to contain possibilities. I also have learned a ton from my son Aaron Ximm (quietamerican.org), who has won awards for his “found sound”, another medium that would not exist absent digital tools.
LJ: You are a fixture at Def Con and have been for most of the last decade. What brought you there, and what keeps you coming back?
RT: You cannot overstate the way Jeff Moss, a.k.a. Dark Tangent, has built that space. Yes, he had a lot of help from willing collaborators, but the vision and ability to execute it with flexibility and canny awareness have made Def Con unique in the world of cons. I went to Def Con 4 to do a keynote because he created that opportunity. For me as for many, he said “Yes” instead of “No”. That’s the most powerful word in the language, as James Joyce said. I perceived that the real hackers in that space would be the thought leaders of the next decade; my first talk was “Hacking as Practice for Trans-planetary Life in the 21st Century”, which stands as validated by what is emerging now. I went there to learn from mentors who were one third my age, and it became clear that only if I provided something of real value to them as well would the reciprocity be genuine. I think the main attendees intuitively get that my respect and admiration for them is absolute. I have learned so much about how they have been socialized by interacting with networks and how that frames the way they hold themselves in the world as possibilities for meaningful action.
Over the years, I developed close friendships with hackers and evolving technocrats and people from the worlds of law enforcement and intelligence. As you know, they’re hard to distinguish now, right? I spoke at the Pentagon recently, and about one third of the people in the room were Def Con friends but with different haircuts and uniforms. They still play Spot the Fed at DC, but someone suggested, only half-kidding, that they ought to play Spot the Hacker. The worlds interpenetrate so much now and hacking, not cracking, has become so mainstream that was inevitable.
Now, the crossing of those streams at Def Con was not an accident. It’s a unique and still-fertile space, because Jeff straddled multiple worlds so well and realized from the beginning that the con would grow only if he continued to include everybody. That pragmatic approach reminds me of how I did ministry, really. Only if you included all the players in the process and minimized doctrines and dogmas that always excluded some and included others could you build a genuinely diverse community. But to do that, you had to have a tolerance of ambiguity and complexity that is irritating to purists on either side, whether hard-core hackers or law enforcement professionals.
I kept coming back because it really did become a kind of psychic home, where a lot of us understood one another’s unconventional and creative approaches to life straight up, whereas out here we often have to explain ourselves or just shut up and walk away a lot. Properly understood, hacking is a mindset that transcends any particular technology. It’s evident at Def Con to a large degree, although it has changed and evolved over the years. Every year a lot of us think, well, maybe this is the last year. And maybe it is. But so far it keeps coming back and so do we.
LJ: In 1996, if not earlier, you already were describing hacking correctly as being about truth and knowledge and not about breaking into other people’s computers. This was way before the mainstream media had begun to get even a clue on that point–they still don’t, really. Do you think hackers are doomed to be misunderstood? Is that an inevitable result of knowing how things really work?
RT: Yes. Unconventional thinkers who work across the boundaries of fixed disciplines do not fit in the molds or models of prior ways of thinking. First, they sound crazy. Then, they sound funny. Then, people attack them. Then, everybody believes that they always agreed with them all along. That’s when you know their way of seeing things has become the core of a new consensus reality, and already new truths that contradict that are arriving on the edges. That’s why I say that the truth, once everybody believes it, has become a lie, and new truths are out there on the edges. It’s also a way of saying that thought leaders who see the implications of the present describe the present as they experience it, not the future. But for those living in the past, it sounds like the future, and we sound like futurists. We’re not. We’re simply seeing the inevitable implications of what’s already there but which most people, because of habitual thinking or work that does not require them to make these connections, don’t see yet. Nietzsche said originality is merely seeing a little ahead of others what’s coming over the horizon and giving it a name. Same idea.
LJ: Based on your contact with the intelligence community, what do you think about the current state of homeland security in the US?
RT: Honestly, that’s like a blind man describing an elephant; the subject has come to mean so many different things. Has a lot been done to prevent or disrupt attacks? Yes. Can any single attack succeed? Yes. Do I believe the gloves are off, and we have stopped some very serious events? Yes. Are we still vulnerable? Of course.
LJ: What I actually had in mind was this: I recently met a federal agent who rolled his eyes when someone mentioned the Department of Homeland Security. I get the impression that many professionals consider the DHS to be window dressing.
RT: Oh, the Department. I agree with that. It required a person who could do little and be content with that. But in all of the many areas where people take it seriously, a lot of things have been done. You can’t confuse political rhetoric meant for perception management and public consumption for the real policies and actions taking place. Anyway, we all know there’s a big difference between making people feel safer so society does not implode and actually generating more security.
LJ: Exactly, just because DHS is window dressing doesn’t mean it can’t be useful window dressing.
RT: Perception management is absolutely necessary, right? It’s easy to snipe from the sidelines, but when you have responsibilities that impact society–we all read from the same script.
LJ: Your speech at Def Con 10, in which you basically chucked your speaker’s notes and riffed on the importance of hackers carrying on in the face of 9/11, the Patriot Act, John Ashcroft and so on, really was moving–it was the only standing ovation I’ve ever seen at Def Con. Do you see any improvement in the US’s prospects for civil liberties now, especially given the most recent election?
RT: The convergence of enabling technologies of intrusion, interception, and panoptic reach, combined with a sense of urgency about doing counter-terror and a clear mandate from the White House to do everything possible and seek forgiveness afterward rather than permission in advance has created a dire but often invisible set of threatening conditions. I asked an intelligence veteran recently if he thought we would ever get back the Bill of Rights. He said probably not; only if there is some explosive revelation, a la Watergate, that overwhelms the denial of the population, because they see what’s at stake and the consequences of what already has been done. It has been built into the framework of our bureaucracies that will relinquish those new ground rules reluctantly and only under great duress.
LJ: What’s really scary to me about that statement is the feeling that Watergate could happen again, but the American public still might not reassert its rights. We seem to have lost our ability to become outraged by much of anything that happens in Washington. Nobody’s suffered any consequences, for example, for the politically motivated blowing of CIA operative Valerie Plame’s cover. What does that say about us? Is that defeatism, naivete, cynicism or what?
RT: I agree. I spoke recently with a veteran journalist about a serious thing I was told. I asked him how we could get it into the public domain, and he said it would not do any good even if we did. We discussed, for example, Gary Webb and the CIA, Contras and crack. Gary lost his career and told me that could be expected, because when things are made public they are quickly managed, eclipsed, distorted and so on. As a friend who does cover and deception [work] said, “illusion, misdirection and ridicule are the methods, and they are done expertly at all levels of the game”. But, and this is a big but, there is a conscience in this country still, and a hopeful or idealistic heart would respond to something sufficiently egregious, I think. Watergate took a long time to ripen, and only when Nixon was directly implicated did the government fall. Remember the Pentagon Papers: it takes a whistleblower, someone whose conscience can’t stand it another minute, to document the data for us. It’s cumulative, yes?
LJ: Yes, it’s whether it culminates into something that matters.
RT: Yes, and what would it take, today? I don’t know what that would look like. Watergate was a wholesale appropriation of the law enforcement and intelligence worlds to commit crimes–it took a lot.