Read The Sorrows of Empire Online

Authors: Chalmers Johnson

Tags: #General, #Civil-Military Relations, #History, #United States, #Civil-Military Relations - United States, #United States - Military Policy, #United States - Politics and Government - 2001, #Military-Industrial Complex, #United States - Foreign Relations - 2001, #Official Secrets - United States, #21st Century, #Official Secrets, #Imperialism, #Military-Industrial Complex - United States, #Military, #Militarism, #International, #Intervention (International Law), #Law, #Militarism - United States

The Sorrows of Empire (20 page)

 

The military’s extreme fetish for secrecy and disinformation—the dissemination of plausible but false data—makes a farce of congressional oversight. It is impossible for anyone without an extraordinarily high security clearance to make any sense at all of “defense” appropriations. Moreover, the whole system is so compartmentalized that black programs often duplicate one another without anyone’s appearing to know what is going on. In a lawsuit over the cancelation of the navy’s stealth fighter, the A-12 Avenger II, a black program, the McDonnell Douglas and General Dynamics companies charged that technology developed in other black programs would have solved some of the problems that led to the project’s termination but that the people in the A-12 program were not informed about it.
38
Secrecy has been carried to such lengths that at Boeing’s aptly named Phantom Works at Palmdale, California, devoted to black projects, background music plays constantly to drown out conversations, which are assumed to be of a secret nature.

 

If anything, the situation today is worse than ever. A typical recent scandal involves contracts signed between the Defense Department, Lockheed Martin, and Boeing to design and build new rockets to lift heavy satellites into space. The DoD has classified the contracts themselves “to protect the business interests of two of America’s biggest defense contractors.”
39

 

As with the seemingly unstoppable growth of secrecy within the government, so too has there been implacable pressure from the Pentagon to expand its functions and seize bureaucratic turf from other agencies. There are many aspects to this problem, but perhaps the most important politically, and certainly one of the clearest signs of militarism in America, is the willingness of some senior officers and civilian militarists to meddle
in domestic policing. The U.S. Constitution establishes a clear separation between the activities of the armed forces in the defense of the country and law enforcement under the penal codes of the various states. James Madison so feared military dominance that he wrote in
The Federalist,
No. 41, “a standing [military] force is a dangerous provision.” While this fear was rooted in the political preoccupations of the American Revolution, it did not become a pressing issue until the disputed presidential election of 1876, when troops were dispatched to polling stations in three southern states—South Carolina, Florida, and Louisiana. Rutherford B. Hayes, a northerner from Ohio, won by only one electoral vote in a situation comparable to the disputed Florida election of 2000, when the Supreme Court rather than the military interfered in state affairs.

 

The purpose of the Posse Comitatus Act of 1878 was to prevent the military from ever again engaging in police activities without the consent of Congress or the president.
Posse comitatus,
Latin for “power of the country,” is a medieval term for the English practice of a sheriff summoning citizens to help him arrest a criminal or quell a civil disturbance. In nineteenth-century America, the phrase was shortened simply to “posse.” Although the act has been modified many times to allow the military to aid in drug interdiction and help patrol the Mexican border, it still is meant to ensure that the standing army will not have any role in policing American citizens in their own country.

 

However, the rise of militarism, aided by the attacks of September 11, 2001, has eroded these old distinctions. By expanding the meaning of national security to include counterterrorism and controlling immigration, areas in which it now actively participates, the Pentagon has moved into the domestic policy business. The Department of Defense has, for instance, drafted operational orders to respond to what it calls a CIDCON (“civilian disorder condition”). During the Republican Party’s convention in Philadelphia in August 2000, for example, the Pentagon placed on alert in case of a large-scale terrorist incident a “Joint Task Force-Civil Support” based at Fort Monroe, Virginia, and “Task Force 250.” Task Force 250 is actually the army’s Eighty-second Airborne Division, based at Fort Bragg, North Carolina.
40

 

The United States has obviously not proved immune to terrorist
attacks—witness the 1993 bombing of the World Trade Center in New York, the blowing up of the Murrah federal office building in Oklahoma City in May 1995, and the assaults on New York and Washington of September 2001. In one way or another—one of the Murrah terrorists was a Gulf War veteran—these incidents all suggest blowback from U.S. government activities in foreign countries. The United States has also seen instances of state terrorism, as in the federal agents’ attack on the white supremacist former Green Beret Randy Weaver and his family at Ruby Ridge, Idaho, in 1992 and the FBI’s assault on religious dissidents at Waco, Texas, in 1993.
41
It is conceivable that in the future such incidents will bring out the troops. But, more important, “terrorism” is an extremely flexible concept open to abuse by the leaders of an ambitious and unscrupulous military.

 

During the summer of 2002, the Bush administration directed lawyers in the Departments of Justice and Defense to review the Posse Comitatus Act and any other laws that might restrict the military’s ability to participate in domestic law enforcement. At the time, the Defense Department was creating a new regional command to defend North America, comparable to those for Latin America, Europe, the Middle East, and the Pacific. The Northern Command, based at Peterson Air Force Base in Colorado Springs, is intended to better position the military to respond to terrorism close to home and to prevent the introduction of chemical, biological, or nuclear weapons into the United States. (Even during World War II, the federal government did not create a centralized command for the American mainland, because of concerns that it could become the basis for a military dictatorship.) The command’s jurisdiction includes the United States, Mexico, Canada, and Cuba. Neither the Mexicans, the Canadians, nor, of course, the Cubans were consulted. This new headquarters, like that of the other regional “CINCs” (commanders in chief), will exist largely outside either the civilian or the military chains of command. CINCs are, in fact, comparable to Roman proconsuls, except that the men assigned to that post in the Roman Republic had already held the highest office in the realm, that of consul, and were deeply trusted civilians and military veterans.

 

The first CINC of the Northern Command is General Ralph E. Eberhart
of the air force, another former head of the Space Command. On his appointment, Eberhart said, “We should always be reviewing things like Posse Comitatus and other laws if we think it ties our hands in protecting the American people.”
42
It seemed not to have occurred to Eberhart that the Posse Comitatus Act was intended to protect Americans from generals like himself. Several civilian agencies, including the FBI, the Public Health Service, and the Federal Emergency Management Agency, have expressed dismay at the growing role of the military in their spheres of responsibility. The new Department of Homeland Security, created in 2003, combines many formerly civilian agencies and works closely with the Pentagon and the Northern Command. Its first deputy director is Gordon R. England, a former secretary of the navy and a former executive vice president of General Dynamics Corporation of Fort Worth, Texas, the manufacturer of the military’s main fighter plane, the F-16.
43
It is not at all obvious which is a greater threat to the safety and integrity of the citizens of the United States: the possibility of a terrorist attack using weapons of mass destruction or an out-of-control military intent on displacing elected officials who stand in their way.

 

In addition to setting up the Northern Command and trying to undermine the Posse Comitatus Act, the military establishment is expanding its functions and influence on many other fronts. It has, for instance, directly challenged the Treasury Department with a demand that all significant foreign acquisitions of American companies be subjected to a national security review. The Pentagon wants a much larger voice in the Committee on Foreign Investment in the United States, including compulsory notification from the CFIUS of all takeovers by foreigners worth more than $100 million. Such a demand may be a thinly disguised form of protectionism, but, as the British
Financial Times
observed, “The Pentagon’s attempt to extend its influence over inward investment is emblematic of its growing power within the Bush administration.”
44

 

Equally to the point, during 2003, the administration tucked a surprise proposal into a broader intelligence authorization bill that would give the military (and the CIA) authority to issue subpoenas requiring Internet providers, credit card companies, libraries, and a range of other organizations to produce on-demand materials like phone records, bank
transactions, and e-mail logs. This would be a total break with the longstanding requirement that only the FBI can seek such information on American citizens within the United States and then only with judicial authorization, particularly if it plans to use such information in court. The new proposal would allow the military and the CIA to gather intelligence on citizens without ever being subject to judicial oversight.
45

 

Rumsfeld’s Pentagon has also been active in trying to exempt the military from various environmental protection laws. For example, the Marine Corps has complained that the 1973 Endangered Species Act interferes with its troops’ abilities to dig foxholes wherever they want on the 125,000-acre base at Camp Pendleton, California. The Fish and Wildlife Service wants to designate a small part of the base as “critical habitats” for endangered species of birds, including the Western snowy plover and the California least tern. There is already provision within the Endangered Species Act for a national security exemption, but the marines have never used it. They seem less interested in solving the problems of training marines while protecting the environment than in establishing the principle that the military is a law unto itself.
46

 

The Pentagon’s priority areas for expansion are the diplomatic functions of the State Department and the intelligence and covert-action functions of the CIA. Both the military’s Special Forces and the posts of regional commanders in chief have their roots in the disastrous attempt between April 24 and 26, 1980, to rescue American hostages captured in the Iranian seizure of our embassy in Teheran. That failure revealed that the Pentagon needed to be much more serious in training and equipping commandos for “low-intensity warfare” and in providing unified commands that could order up the needed resources without having to fight their way through a labyrinthine chain of command and the inevitable interservice rivalries. Colonel Charlie A. Beckwith, the commander of the army’s Delta Force that was destroyed at Desert One, southeast of Teheran, through its own bungling, testified to Congress: “In Iran we had an ad hoc affair. We went out, found bits and pieces, people and equipment, brought them together occasionally and then asked them to perform a highly complex mission. The parts all performed, but they didn’t necessarily perform as a team. Nor did they have the same motivation. My
recommendation is to put together an organization that contains everything it will ever need, an organization that would include Delta, the Rangers, Navy SEALs, Air Force pilots, its own staff, its own support people, its own aircraft and helicopters. Make this organization a permanent military unit. Give it a place to call home. Allocate sufficient funds to run it. And give it sufficient time to recruit, assess, and train its people. Otherwise, we are not serious about combatting terrorism.”
47

 

These recommendations slowly led to the empowerment of the regional commanders and the dramatic enlargement, during the 1990s, of the Special Forces, which were used for the “humanitarian interventions” favored by the Clinton administration. In 1997, responsibility for shaping key foreign political and military strategies was officially given to the regional commanders (called commanders in chief, or CINCs, until October 2002, when Defense Secretary Rumsfeld, apparently feeling threatened by their growing power, rechristened them “combatant commanders”). These semiautonomous generals and admirals perform functions that until the 1990s had been handled primarily by civilian officials.

 

In the Middle East (CENTCOM), the Pacific (PACOM), Europe (EUCOM), and Latin America (SOUTHCOM), the CINCs oversee such things as intelligence, special operations, space assets, nuclear forces, arms sales, and military bases; and they produce what are called “theater engagement plans.” These are essentially mini-foreign policy statements for each region and include explicit programs to cultivate close relations with local military organizations.
48
This is done chiefly by deploying approximately 7,000 Special Forces soldiers in 150 countries to train local militaries in what is called “foreign internal defense” (FID)—in many cases merely a euphemism for the techniques of state terrorism. The training missions allow the United States to spy on these countries, sell them weapons, and encourage their armies to carry out policies the Pentagon favors. Everything is done very quietly and with virtually no political oversight.

 

Over time, the CINCs have become more influential in their regions than ambassadors. When General Anthony C. Zinni of the marines was head of CENTCOM, he had twenty ambassadors serving under him and a personal political adviser with ambassadorial rank. PACOM (also
known as CINCPAC) supervises the affairs of forty-three countries. Each CINC has at his disposal virtually unlimited funds, his own airplanes and helicopters, and numerous staff officers. A CINC reports directly to the president and the secretary of defense, avoiding the service chiefs and the normal chain of command.

Other books

An Old-Fashioned Murder by Carol Miller
Stardust by Linda Chapman
What She Wants by Byrnes, Jenna
Mutiny by Artist Arthur
The Day of the Donald by Andrew Shaffer
4 Cupids Curse by Kathi Daley
If the Broom Fits by Liz Schulte
Meltdown by Ben Elton