secrecy {fragments}

~ musings on secrecy ~

Shrouded in Secrecy: Law Enforcement Use of Cell-Site Simulation Technologies

On December 19, 2016, the House Committee on Oversight and Government Reform released revealing its findings on the status, policies, and widespread use of Stingray cell-site simulation technologies. The Committee staff report, Law Enforcement Use of Cell-Site Simulation Technologies: Privacy Concerns and Recommendations, grew out of hearings in October 2015 that opened a Pandora’s box on lack of federal oversight and uniform policies concerning the use of cell-site simulators.

It is interesting to note that in part, the Committee began its investigation after “press reports alleged wide-spread use of cell-site simulation devices by federal, state, and local law enforcement” (p.1). The House Committee’s report cites numerous public investigations, academic papers, and use statistics by federal agency, state and local bodies.* Significant legal cases, such as United States v. Knotts, United States v. Karo, and United States v. Jones add to the Committee’s analysis. The Committee met “with each of the relevant component agencies of DOJ and DHS, the Internal Revenue Service (IRS), the Treasury Inspector General for Tax Administration (TIGTA), and the Department of Defense (DOD) to obtain “an in-person demonstration of this technology” (p.7).

Many of the Committee’s findings and recommendations are discussed elsewhere;  in this post, I take a different road to outline and directly emphasize the most stunning sections of the report, ones that I find most problematic from an information rights and policy perspective.

For example, the Committee writes that (emphasis added):

At the outset of the investigation, the use of these devices by federal, state, and local law enforcement agencies was not well known, and in many instances, appeared to be shrouded in secrecy. This is partly due to the use of the technology by military and intelligence agencies and the need for sensitivity in national security matters. The Federal Bureau of Investigation (FBI), for example, avoided disclosing not only its own use of the devices, but also its role in assisting state and local law enforcement agencies in obtaining and deploying these devices. Indeed, the Committee’s investigation revealed that as part of the conditions for being able to sell cell-site simulators to state and local law enforcement, the manufacturers of these devices must first notify the FBI, and those agencies in turn must sign a non-disclosure agreement with the FBI that expressly prohibits them from publicly disclosing their use of this technology, even in prosecutions where the use of the technology was at issue (p.2-3, 31-32).

What are Cell-Site Simulators?

It is evident from the staff report the Committee sought to educate itself and the public at large on how cell-site simulators work in the real world. In this way, the Committee could draw conclusions as to the depth of covert surveillance and its impact on privacy. For example, the Committee describes cell-site simulators as

Devices that effectively transform a cell phone into a real time tracking device. A cell-site simulator—also known as an “IMSI catcher”—is a device that mimics a cell phone tower. These devices are commonly referred to as “Stingrays,” which is both a generic name and also refers to a specific type of IMSI catcher that is manufactured by the Harris Corporation. When the device is activated, cell phones in the surrounding area connect to the device in a similar way that the cell phones would connect to a cell tower. Once a phone connects to the cell-site simulator, the device is capable of obtaining specific identifying information for the phone, including information that enables law enforcement to determine the location of the phone and, more importantly, its user. The devices were initially designed for the military, but were later adapted for domestic law enforcement. Law enforcement agencies usually operate them from moving vehicles or, to a lesser extent, from airplanes (p.7).


STINGRAY-CST-032315Courtesy of Chicago Sun Times


Cell-site simulators work by impersonating a cell phone tower. Cell phones within range recognize the device as the strongest cell phone tower in the area and connect with the device. Every cell phone has a unique identifying number assigned by a device manufacturer or a cellular network provider called the International Mobile Subscriber Identity (IMSI). When the cell-site simulator connects with a cell phone, the simulator is able to identify that cell phone’s unique identifying number. In addition, most cell-site simulators have the ability to collect and store the IMSI numbers of all the phones they connect with in the area where they are deployed (p.9).

An IMSI catcher is an example of an active surveillance device. It ‘exploit[s] the lack of authentication of the base station by cellular phones,’ and ‘[a]s a result, phones have no way to differentiate between a legitimate base station owned or operated by the target’s wireless carrier and a rogue device impersonating a carrier’s base station.’ Most current phones—those on 3G and 4G networks—’now include the capability for phones to authenticate the network base stations,’ but even these current models ‘are backward compatible with older, vulnerable phone network technologies, which allows the phone to function if it is taken to a rural location or foreign country where the only service offered is 2G’ (p.10).

As The Intercept’s Secret Surveillance Catalogue illustrates, these “devices” are merely a few of the (secret) surveillance technologies available in the intelligence-spying toolbox.

Varying Standards, Non-Disclosure, Warrantless Surveillance, and Recordkeeping

Below is additional commentary from the Committee that expands knowledge of federal agency policies on surveillance, privacy, the right to know, and the dynamics of intelligence gathering:

During the course of the investigation, it became clear that the use of cell-site simulators by state and local law enforcement agencies was not governed by any uniform standards or policies (p.4).

Documents and information obtained by the Committee confirmed varying standards for employing cell-site simulation devices among federal, state, and local law enforcement. Notably, the documents and information revealed that when the Committee first began its investigation in April 2015, federal law enforcement entities could obtain a court’s authorization to use cell-site simulators by meeting a standard lower than probable cause — the standard to obtain a search warrant (p.4).

Documents and information obtained by the Committee also confirmed reports of the widespread use of non-disclosure agreements that bound law enforcement not to reveal their use of these devices and even went so far as to require local prosecutors to agree to dismiss any of their criminal cases if the FBI did not approve the disclosure of the devices in any particular case (p. 7-8).

From April to August 2015, Committee staff met with the component agencies and officials from DOJ and DHS leadership; from those meetings, two things became clear: (1) use of these devices was widespread; and (2) there was a lack of uniformity across the agencies regarding what court authority was required to deploy cell-site simulation technology under different operating scenarios (p.8).

To use the device as an investigative tool, law enforcement deploys the device at a known location of the target and obtains every IMSI number in the vicinity at the time of deployment. By deploying the device numerous times in numerous locations where the targeted individual is present, law enforcement collects a list of IMSI numbers for each cell phone present at every location where the device was deployed. The device analyzes this list to determine if there were common IMSI numbers at each location. By a process of elimination, the common IMSI numbers are identified as likely to be those of the target’s phone, and individuals associated with the target. Law enforcement can then work with cellular service providers to determine telephone numbers and billing information associated with specific IMSI numbers (p.12).

Following he Supreme Court’s decision in United States v Jones, where the installation of a GPS tracker on Antoine Jones’ Jeep without a warrant constitutes an unlawful search under the Fourth Amendment, the Committee notes that

then-FBI General Counsel Andrew Weissmann revealed that in light of the Court’s Jones decision, DOJ had generated two memoranda to be provided to its component agencies: 1) guidance to the field specifically on the use of GPS; and 2) guidance on what Jones means for other types of geolocation techniques beyond GPS (hereinafter, “the Jones Memos”) (p.17).

When the Committee began its investigation of domestic law enforcement’s use of cell-site simulation technology, the only publicly available information on the actual contents of the Jones Memos, aside from Mr. Weissmann’s comments, were two heavily redacted Guidance memoranda DOJ had released in response to a Freedom of Information Act request from the American Civil Liberties Union (p.17).

Prior to the Committee’s investigation into cell-site simulators, DOJ and its component agencies were using geolocation technologies under a less rigid set of guidelines for ensuring that citizens’ Fourth Amendment rights were adequately protected. Those guidelines, which are set forth below, were inadequate to protect the privacy interests of American citizens who found themselves within range of an active cell-site simulator (p.18).

When the Committee begin [sic, began] its oversight of law enforcement’s use of cell-site simulators, DOJ and its component agencies did not have to obtain a warrant based on probable cause. DOJ instead had generally obtained court authorization to use cell-site simulators by seeking an order under the Pen Register and Trap and Trace Statute (The Pen Register Statute). The Pen Register Statute establishes a framework by which the government can receive court authorization to obtain non-content information about outgoing and incoming phone calls. The Pen Register Statute governs law enforcement’s ability to obtain the specific telephone numbers of incoming and outgoing calls for a particular phone through the use of pen register and trap and trace devices. A “pen register” is a device which records the numbers a phone dials out, whereas a “trap and trace device” records the specific telephone numbers of incoming calls. While court authorization for pen registers and trap and trace devices is required, this authorization takes the form of an order, rather than a warrant (p.19).

The 2001 PATRIOT Act amended the Pen Register Statute and added the term ‘signaling information‘ to the definition of information that required court authorization before law enforcement could intercept it (p.20).

On September 3, 2015 DOJ announced its most recent, enhanced policy for use of cell-site simulators. This policy now governs each of its component agencies use of these devices. DOJ’s new policy requires its component agencies to obtain a search warrant supported by probable cause and issued pursuant to Rule 41 of the Federal Rules of Criminal Procedure or the applicable state equivalent, with some limited exceptions.The DOJ policy makes clear that not only is a warrant required for use of cell-site simulators, but that the warrant must meet certain cell-site simulator-specific requirements. Warrant applications must include sufficient information to ensure that courts are aware that it is an application to use cell-site simulator technology, and affirm that law enforcement will make no affirmative investigative use of any non-target data absent further order of the court. The warrant application must also disclose that there may be ancillary service disruption to non-target phones (p.21);

DOJ’s policy also creates an exception to the warrant requirement for exceptional circumstances where the law does not require a search warrant and circumstances make obtaining a search warrant impracticable. In briefings with Committee staff, DOJ stated that this is an amorphous category that is not expected to arise frequently (p.22).

Additionally, unlike DOJ’s policy, DHS’s policy does not require the agency to keep statistics for cases of non-warrant use (p.23).

The IRS did not have an express agency-wide policy and been applying only the general guidelines that it had been using ‘for the use of pen registers and trap-and-trace devices, that is, technology used by cell-site simulators’ (p.25).

DHS allows the purchase of cell-site simulators through certain preparedness grant programs that are administered by FEMA. FEMA policy specifically states that use of such equipment is subject to the prohibitions contained in Title III of the Omnibus Crime and Control and Safe Streets Act of 1968, 18 U.S.C. §§ 2510-2522 (p.27).

The lack of uniformity at the state and local level currently creates the possibility that states and localities are deploying cell-site simulator technology in a manner that is less strict than the guidelines being adhered to by federal law enforcement agencies (p. 30).

Non-Disclosure Agreements as Secret Law

Through the institutionalized use of non-disclosure agreements between the FBI, purchasers, and manufacturers of cell-site simulation technologies, the House Committee identified an embedded layer of secrecy; (trade) secrecy, for example, further reinforced by “language asserting that certain technical information about the technology was confidential and exempt from requests made under the Freedom of Information Act (FOIA) (p. 32). Furthermore, the Committee reports

those state and local entities that do purchase a cell-site simulator frequently sign non-disclosure agreements with two entities, the company selling the device, and the FBI. In addition to the publicly available versions of the non-disclosure agreements, the Committee also obtained copies of non-disclosure agreements between the FBI and various state and local jurisdictions. As explained more fully below, these non-disclosure agreements actively prohibit the public from learning about the use or role that a cell-site simulator may play in a state or local criminal investigation (p. 31).

Because cell-site simulators operate over the airwaves, manufacturers of these devices must obtain a special license from the FCC to sell them. As part of its condition of approving any sale, the FBI imposed a requirement on state and local entities that in order to obtain the devices, they must sign a non-disclosure agreement with the FBI. These non-disclosure agreements impose significant secrecy requirements on the state and local entities seeking to obtain cell-site simulators.A review of these agreements showed that all contained similar language that prohibited state and local entities from disclosing any information about their use of cell-site simulators (p.31).

In Baltimore, for example, prosecutors reportedly withdrew evidence instead of disclosing the possible use of a cell-site simulator. In St. Louis, prosecutors reportedly dropped robbery charges against three co-defendants rather than have an officer from the police intelligence unit testify about the use of a cell-site simulator device in the case. In Erie County, New York, police reportedly used the device 47 times since 2010, but only once sought a court order to do so. The updated DOJ policy does not discuss the FBI non-disclosure agreements (p. 32).

In addition to non-disclosure agreements signed with the FBI, state and local entities also sign purchase agreements with manufacturers that include non-disclosure requirements. These purchase agreements include general language that the buyer would obtain all necessary court orders and comply with all constitutional, federal, state, and local privacy laws (p. 32).

One of the manufacturers included in its terms and conditions of a sale language that the purchaser ‘shall not disclose, distribute, or disseminate any information regarding Customer’s purchaser or use of’ the equipment ‘to the public in any manner, including but not limited to: in press releases, in court documents and/or proceedings, internet or during other public forums or proceedings.’ Additionally, as part of the condition of the sale, the manufacturer required that the purchaser ‘shall not in any civil or criminal proceeding, use or provide information concerning’ the equipment or software ‘beyond the evidentiary results obtained through the use of Equipment and/or Software without the prior written consent’ of the manufacturer (p. 33).

Bad Actors

The Committee also reported that “bad actors” may deploy cell-site simulation technology for a myriad of nefarious purposes:

It is possible, if not likely, bad actors will use these devices to further their aims. Criminals and spies, however, will not be adopting the DOJ and DHS policies and procedures or any other ethics of surveillance. They will not be self-limiting in their use of these devices so as to not capture the content of others’ conversations. Criminals could use these devices to track potential victims or even members of law enforcement. One can imagine scenarios where criminals or foreign agents use this type of technology to intercept text messages and voice calls of law enforcement, corporate CEOs, or elected officials (p. 33).

While law enforcement in the United States has worked for years to keep its use of the device shrouded in secrecy, the outside world has been making, advertising, and discussing cell-site simulators for years. One security consultant was able to outfit his automobile with a “do-it-yourself” surveillance equipment, which included a cell-site simulator. IMEI and IMSI catchers appear for sale on the internet website Alibaba, a Chinese eBay-type online commerce (p. 33-4).



* Unfortunately, the Committee did not include use of cell-site simulation technology by tribal governments – or Joint Terrorism Task Forces/ Fusion Centers.


Written by S.

January 2, 2017 at 2:53 am

Integrity of Info / Fact Checking / “Fake News”

With the election results now in, what is termed “fake news”  is big news lately. The Washington Post recently posted a guide titled The Fact Checker’s Guide for Detecting Fake News. Poynter has a guide; HuffPo has a cheat sheet too. Consortium News weighed in on the matter, and so did OpEd News. Facebook now has assistance from Snopes,, Politifact, ABC News, and AP to “make reporting hoaxes easier and disrupt the financial incentives of fake news spammers.”  This focus is fine and good, but what are we really talking about when we discuss fake news?

From where I sit as a former academic librarian, now college instructor and scholar, “fake news” has been with us a very long time in the guise of propaganda and its various forms, even seeping into the territory of information warfare and conspiracy theory building (see my Lexicon  and Goldman & Maret for definitions). Moreover, fake news is deeply intertwined with critical/analytical thinking and types of literacy (critical media literacy, data literacy, global critical media literacy, information, media-information literacy, news literacy, and research literacy). More importantly, librarians and teachers have been consistently – actively – involved in teaching literacies at the ground level from public libraries, academic libraries through the educational system  for decades. 

There’s oodles to say on the subject of news fakery, such as how specific literacies intersect and mesh with critical thinking skills and analytical reasoning, as well as  the long scholarly history of  fields and disciplines involved in confronting “fake news” (albeit using a different term and concept), such as journalism, media ecology, sociology (critical information studies, sociology of knowledge, social constructivism). Here I bracket a deeper discussion to share a few things from a course I recently taught at the School of Information, San Jose State University titled titled INFO 281-14, Integrity of Information.

Below I share a few notes from the first week of the course and a checklist I developed with the brave students who took the course with me the first time out; perhaps this info will shift thinking away from “fake” to more serious and significant issues on what I think of as conditions of information.


Abbreviated first week notes:

U.S. federal agencies first began using the concept of integrity with information quality and security with the 1995 Paperwork Reduction Act, P.L. 104-13, often referred to as the PRA. Described, but not defined in Sec. 3504 (B) of the PRA as “the integrity, objectivity, impartiality, utility, and confidentiality of information collected for statistical purposes,” by its association with these adjectives, integrity of information has a link to the roots of integrity as complete, whole, perhaps trustworthy information. In a new book titled Intelligence and Information Policy for National Security: Key Terms and Concepts that I co-edited with Dr. Jan Goldman, I included several uses of the information integrity/integrity of information concept (II). Below I briefly share these definitions so you can get a feel for how integrity is related to accuracy and credibility of information.

First, the Office of Management and Budget (2001) or OMB, while it does not define integrity, describes its features and associates the II concept with information quality throughout the life cycle of information.1 OMB directed federal agencies to develop guidelines and principles on information quality:

It is crucial that information Federal agencies disseminate meets these guidelines. In this respect, the fact that the Internet enables agencies to communicate information quickly and easily to a wide audience not only offers great benefits to society, but also increases the potential harm that can result from the dissemination of information that does not meet basic information quality guidelines.

Secondly, the U.S. Department of Defense Center for Development of Security Excellence (2012) took the step of defining II as

The state that exists when information is unchanged from its source and has not been accidentally or intentionally modified, altered, or destroyed.

We can further enlarge our view of II through the remarks of Director of National Intelligence James R. Clapper (2015) in the Worldwide Threat Assessment of the US Intelligence Community. You might have seen Director Clapper’s statements in the news:

In the future, however, we might also see more cyber operations that will change or manipulate electronic information in order to compromise its integrity (i.e., accuracy and reliability) instead of deleting it or disrupting access. (p.3)

Successful cyber operations targeting the integrity of information would need to overcome any institutionalized checks and balances designed to prevent the manipulation of data, for example, market monitoring and clearing functions in the financial sector. (p.4)

Note that Clapper’s comments associate information integrity/integrity of information with accuracy, manipulation, and reliability. Clapper’s highlighting of these features suggests that information, especially in the online sphere, can be altered as to become disinformation, lies, misinformation, and/or propaganda; in other words, information is tampered with in order to present a specific perspective and to actively influence and/or mislead the reader by either omitting important details or flat out manipulating them.


1 OMB (2000) defines the information life cycle as “the stages through which information passes, typically characterized as creation or collection, processing, dissemination, use, storage, and disposition.”


Center for Development of Security Excellence. (2012). Glossary of security terms and definitions. U.S. Department of Defense, November 2012. Retrieved from

Clapper, J.R. (2015).Statement for the record: Worldwide threat assessment of the US intelligence community.Office of the Director of National Intelligence, February 26. Senate Armed Services Committee. Retrieved from

Office of Management and Budget. (2001). Guidelines for ensuring and maximizing the quality, objectivity, utility, and integrity of Information disseminated by federal agencies. Retrieved from


Here’s a copy of a research checklist I developed out of the course: Process_checklist

Written by S.

December 12, 2016 at 6:44 pm

FOIA & Brussell

In March of 2015, I submitted FOIA requests to the CIA, Department of the Army, and FBI for the release of records on the subject of Mae Brussell. Ms. Brussell is an iconic researcher that not only left us an impressive body of research on political assassinations; perhaps her greatest contribution as an investigative journalist is raising critical questions on some of the most significant events of the 20th century.

I submitted FOIA requests to the following U.S. government bodies with exceedingly poor results:

CIA: “With respect to any other records, in accordance with section 3.6(a) of Executive Order 13526, the CIA can neither confirm nor deny the existence or nonexistence of records responsive to your request. The fact of the existence or nonexistence of requested records is currently and properly classified and is intelligence sources and methods information that is protected from disclosure by section 6 of the CIA Act of 1949, as amended, and section 102A(iXl) of the National Security Act of 1947 , as amended. Therefore, your request is denied pursuant to FOIA exemptions (bX1) and (bX3). An explanation of exemptions is enclosed.” Neither confirm nor deny is termed a Glomar response. Response: CIA_final

Department of the Army: “To determine the existence of Army intelligence investigative records responsive to your request, a check was made of the automated Defense Central lndex of lnvestigations (DCll). This index reflects the holdings of all investigative elements within the Department of Defense. As a result of the DCll check, no record responsive to your request was located.” Response: Army_final

FBI:  The Bureau released a disappointing 42 pages. Some of the material released include an extortion attempt investigated by the FBI’s San Francisco office as well as Brussell’s concern to the Sacramento office that her name might appear on a “death list” (p. 18). In this same document (10/22/75), it’s noted that “BRUSSEL is known to various police agencies on the Monterey Peninsula as a chronic complainer.” Of note too is a letter written by Brussell (November 15, 1975) that discusses her inclusion on a “surveillance list” after her work on the Watergate scandal was published. P. 23 is a handwritten letter that states “Mae is soon to have a serious accident”; pages 41-42 discuss a visit to Brussell’s home by “representatives of the U.S. Secret Service”; this document states that Brussell reports she was never fully informed as to the purpose of the interview, but taped the encounter. Secret Service agents quizzed Brussell about weapons in her possession, but Brussell replied “the only thing that she does have in the way of a weapon is a paring shears and hardly feels that that presents a threat to anyone.”

I appealed to DOJ’s Office of Information Policy to gain release of additional records and rec’d the following response: OIP_denial

Under FOIA in October, I requested records dealing with Ms. Brussell’s radio shows that broadcast in the Bay area in the 1970s-1980s. Many of these shows are fully available on YouTube,  World Watchers, and other places on the Web. In November 2016, I received a we “were unable to identify main file records responsive to the FOIA” from the FBI on the radio shows.

I encourage researchers to submit their own requests on Ms. Brussell and her radio shows.

Written by S.

November 2, 2016 at 6:42 pm

Insect Cyborgs & HI-MEMS/MAVS/NAVS

Under the Freedom of Information Act, in July 2015 I requested the following information from DARPA:

DARPA’s role in the development and application of Hybrid Insect Microelectromechanical Systems and microelectromechanical (HI-MEMS) systems. My request also includes release of records on the following subjects:

• Bioelectronic neuromuscular interfaces for insect cyborg flight control
• The Controlled Biological and Biomimetic Systems Program
• Insect-based MAVS/NAVS (Micro and Nano Air Vehicles)
• Insect cyborgs
• Microfluidic control of insect locomotor activity
• Radio-frequency system for neural flight control
• The use of Hybrid Insect Microelectromechanical Systems and microelectromechanical (MEMS) specifically related to bees

DARPA released 88 pages, including one report by Amit Lal titled “ Microsystems, Scaling, and Integration” found in DTIC.  Page 70 of the .pdf contains the header “Key Experiments in 1940s,” which is suggestive of a deepening interest – perhaps even by ARPA, the predecessor of DARPA – in creating “technology to reliably integrate microsystems payloads on insects to enable insect cyborgs” (p. 68).  Reading these documents can’t help but bring up those perennial ethical questions regarding human use and exploitation of animals in war, combat, and surveillance. Here’s the 88 page doc released under FOIA: 15-f-1559-case-documents.

Below is a short bib of materials that helped me grasp the finer points of this Promethean technology; I also included several items that sparked my interest in cyborgs and domination a while back, such as Donna Haraway’s complex work and Chris Hables Gray Cyborg Citizen (Chris was a member of my doc committee). Also included is a brand spanking new article by Hutson on the subject of insect cyborgs.

I’ll leave readers with a quote from Adam Dodd (2014) that sums up the current reality of projects involving HI-MEMS:

DARPA has no problem calling a cyborg a cyborg; indeed, the agency is not known for downplaying its own science fictional aspirations — quite the opposite, DARPA’S use of the term anchors my own: I am not discussing the cyborg as a material abstraction, as “a condensed figuration of both material reality and feminist/popular imagination… as an entry point into the contemporary turn to ontological issues within feminist theory and technoscience studies” (Âsberg, 2010, p. 1), though such discussions are not without utility. I am discussing, critiquing, and indeed reporting on, the cyborg as a material entity that exists in the here and now. (p. 162)


A Short Bib

Alberts, David, and Papp, Daniel S. (eds.). (2001). Information Age Anthology: The Information Age Military. Volume III. Center for Advanced Concepts and Technology, Advanced Concepts, Technologies, and Information Strategies Institute for National Strategic Studies, National Defense University: Washington, DC.

Armstrong, Robert, Drapeau, Mark D., Loeb, Cheryl A., and Valdes, James J. (eds.). (2010). Bio-Inspired Innovation and National Security. Center for Technology and National Security Policy, National Defense University Press: Washington, DC. 

Chung, Aram J., and David Erickson. (2008). Microfluidic Control of Insect Locomotor Activity. In Proceedings of IMECE 2008 ASME International Mechanical Engineering Congress and Exposition, October 31-November 6, 2008, Boston  (pp. 949-952).  (google scholar)

Delaney, Lois. (2011). Military Applications of Apiculture: The (Other) Nature of War. Masters of Military Studies Research Paper, Marine Corps University. ADA600636.

Dodd, Adam. (2014). The Trouble with Insect Cyborgs. Society & Animals 22, no. 2: 153-173. (google scholar)

Gray, Chris Hables. (2000). Cyborg Citizen: Politics in the Posthuman Age. New York: Routledge.

Hundley, Richard O., and Eugene C. Gritton. (1994). Future Technology-Driven Revolutions in Military Operations. Results of a Workshop. RAND-DB-110-ARPA.

Hutson, Matthew. (2016, November). Even Bugs Will Be Bugged. The Atlantic.

Kick, Russ. (2016, August 22). The Navy’s Remote-Controlled Sharks. The Memory Hole 2.

Kladitis, Paul E. (2010). How Small Is Too Small? Technology into 2035. Wright  Flyer Paper No. 46. Air University, Air Command and Staff College, Maxwell AFB.

Lal, Amit. Microsystems, Scaling, and Integration (Briefing charts). (2007). DARPA Microsystems Technology Symposium, San Jose, California on March 5-7. ADA 503730. (Included in the above FOIA release and DTIC).

U.S. Department of Defense. (2007). Unmanned Systems Roadmap 2007-2032. ADA475002.


Black Mirror 3 (BM3) ep. 6 titled “Hated in the Nation” is pure synchronicity in terms of my FOIA post. The opening segment of this episode is a chilling announcement of extinction of the Siberian Crane, but also showed the dystopian replacement for honeybees: ATIs or autonomous cyborg bees, who replicate, create hives, and operate in the natural world via pattern recognition. The solar-fueled bees were activated “for the second summer” to pollinate in BM3’s futuretechnoworld. In a twist I didn’t see coming, the cyborg bees are dual use technology (tech that has civilian as well as military and/or national security applications). You can read more about the episode 6 at Thrillist as well as catch a glimpse at the cyborg pollinators. It’s important to note that a DARPA document included in the FOIA release (if I’m interpreting the doc correctly) excluded bees as “insects too unpredictable (temperature, wind, humidity, mating, feeding, etc.)” (p.56) .

See the 2016 interview with Eye in the Sky director Gavin Hood on the use of nano hummingbirds and the micro RPA/M.A.V. (Microaerial Vehicle) beetle depicted in the film.

As bee populations dwindle, robot bees may pick up some of their pollination slack (Khan, Los Angeles Times 2017): “Scientists in Japan say they’ve managed to turn an unassuming drone into a remote-controlled pollinator by attaching horsehairs coated with a special, sticky gel to its underbelly.”

And now the bee drone prototype.
Photo of the “robotic flower pollinator”courtesy of CNN (2/15/2017).



And “rise of the robot pollinators” on The Salt (March 3, 2017).

Written by S.

October 23, 2016 at 12:55 am

New Book

Written by S.

September 10, 2016 at 12:16 am