This is a preview of the Shortform book summary of Underground Empire by Henry Farrell and Abraham Newman.
Read Full Summary

1-Page Summary1-Page Book Summary of Underground Empire

The covert operations of the United States have grown in scope, now exerting greater influence and authority across the globe.

The section of the book delves into the intricate web of financial, informational, and technological frameworks that the United States has constructed, which the authors describe as an unseen empire, aimed at preserving its global dominance. The authors carefully follow the development of this empire, emphasizing its initial design for counterterrorism, which has evolved into a powerful tool for exerting economic pressure and managing geopolitical influence.

The creation of an extensive global system by the United States government enables broad surveillance and control through communication and data exchange.

The study delves into the methods by which the United States, particularly via its intelligence organizations, has intentionally created a global network for communication and information, granting it unmatched power in overseeing and controlling data distribution. The book details the repurposing of technological advancements, originally aimed at enhancing productivity and interlinking systems, to serve national security goals.

The global surveillance and data analysis capabilities of the NSA came to fruition through partnerships with essential firms in the telecommunications sector.

Henry Farrell and Abraham Newman provide a detailed account of the partnership between the NSA and major telecommunications companies like AT&T and Verizon, a partnership that was essential for monitoring and examining worldwide communication systems. The book highlights the pivotal role of the STORMBREW program in enabling the National Security Agency to capture international communications that pass through cables within the United States. The book details the obstacles encountered by the National Security Agency as it navigated the shift from traditional to electronic forms of communication, exploiting inherent vulnerabilities present at the junctures where data is transferred via submarine cables. The NSA, working alongside telecom companies, installed equipment at key junctions which facilitated the rerouting of data from fiber-optic cables into their infrastructure for analysis and surveillance. The agency responsible for national security often incentivized partnerships through substantial financial incentives to telecom firms and hinted that refusal to comply with surveillance demands might result in punitive measures from regulators like the FCC.

Practical Tips

  • You can enhance your understanding of data privacy by checking the privacy policies of your service providers to see how they handle your data. Look for sections that mention data sharing with third parties or government agencies, and if you're uncomfortable with the terms, consider switching to providers with more stringent privacy policies.
  • Start using end-to-end encrypted messaging apps for sensitive conversations to prevent potential interception. These apps ensure that only you and the recipient can read the messages, as they are encrypted on the sender's device and can only be decrypted by the recipient.
  • Partner with a friend or family member who is adept at electronic communication to have regular "tech tutoring" sessions. They can introduce you to new tools and platforms, and you can practice together. For instance, if you're not familiar with video conferencing, set up weekly video calls with them to get hands-on experience.
  • You can enhance your personal data security by using a VPN service when accessing the internet, especially on public Wi-Fi networks. A VPN encrypts your data, making it harder for anyone to exploit vulnerabilities during data transfer. For example, when you're at a coffee shop, connecting to their Wi-Fi with a VPN can protect your personal information from being intercepted.
The strategic location of vital internet infrastructure and nodes within the United States grants the authorities the ability to oversee the movement of data across international boundaries.

The authors thoroughly detail how vital components of the internet's framework, particularly data exchange hubs and repositories, are predominantly situated within the United States, with notable clusters in regions such as Ashburn, Virginia. The authors illustrate that a mix of elements, including the proximity of organizations like the Defense Advanced Research Projects Agency, the pivotal position held by U.S. telecom firms, and the zeal for innovation and efficiency, led to the concentration of significant internet data flows in specific regions. The centralization process inadvertently granted the U.S. government unparalleled visibility into global data flows. The decentralized architecture of the internet enables data to seek out the most economical route, resulting in a significant portion of global internet traffic passing through facilities located in the United States, thereby providing the NSA with the chance to capture and examine this data.

Other Perspectives

  • While it is true that many vital internet infrastructure and nodes are located in the United States, the internet is a global network with critical infrastructure spread across many countries, not just the U.S.
  • Technological advancements and the rise of cloud computing have enabled data to be stored and processed in multiple locations around the world, diminishing the centrality of physical data exchange hubs and repositories.
  • Market dynamics and the early commercialization of the internet in the U.S. could be equally or more important in explaining the concentration of internet data flows than the factors mentioned.
  • International cooperation and agreements on cybersecurity and data protection may place checks on the extent to which the U.S. government can unilaterally monitor global data flows.
  • The idea that data seeks the most economical route does not fully account for the...

Want to learn the ideas in Underground Empire better than ever?

Unlock the full book summary of Underground Empire by signing up for Shortform.

Shortform summaries help you learn 10x better by:

  • Being 100% clear and logical: you learn complicated ideas, explained simply
  • Adding original insights and analysis, expanding on the book
  • Interactive exercises: apply the book's ideas to your own life with our educators' guidance.
READ FULL SUMMARY OF UNDERGROUND EMPIRE

Here's a preview of the rest of Shortform's Underground Empire summary:

Underground Empire Summary The United States utilizes progress in financial services, communication systems, and technological innovations as tools to apply influence and control over specific entities, countries, and individuals.

The section explores the methods by which the United States subtly exerts influence and pressure on specific companies, countries, and individuals by capitalizing on its dominance in the realms of finance, communication, and information technology.

The United States perceives the Chinese telecommunications giant Huawei as a possible contender for dominance in technology and worldwide strategic power.

This part examines the steps taken by the US administration to counteract Huawei, a massive telecommunications company from China, because of concerns regarding its potential to contest the tech and global influence of the US. The book details how the U.S. government devised a complex approach to curb the rapid expansion of a Chinese telecommunications behemoth and its potential to challenge U.S. supremacy in worldwide communications, aiming to limit the firm's ambitions.

The American administration's actions to prevent Huawei from obtaining crucial semiconductor parts and to bar the firm from involvement in the global communications infrastructure.

The book outlines how the U.S. administration strategically intervened at crucial points within the global semiconductor...

Try Shortform for free

Read full summary of Underground Empire

Sign up for free

Underground Empire Summary Businesses, along with their partners and competitors, contend with the challenges and vulnerabilities linked to their connections with America's hidden sway.

This section shifts the focus to the challenges and vulnerabilities faced by other actors, including businesses, allies, and rivals, who find themselves entangled in the conflicts stemming from the U.S. “underground empire.”

European companies and organizations face the difficulty of preserving business ties with partners that might conflict with the strategic priorities of the United States.

The narrative explores the difficulties faced by European firms and regulatory bodies as they attempt to sustain business ties with countries deemed adversarial by the United States. Farrell and Newman explain how Europe’s commitment to open markets and its heavy dependence on the U.S.-dominated financial system have made it difficult to resist the pressure of secondary sanctions.

The European Union has encountered difficulties in preserving its commercial relationships with Iran while trying to circumvent U.S. financial sanctions, despite pressure from the United States.

The authors examine the European Union's struggle to maintain economic connections with countries that are impacted by financial sanctions imposed by the United States, despite the complications arising from...

Underground Empire

Additional Materials

Get access to the context and additional materials

So you can understand the full picture and form your own opinion.
Get access for free

What Our Readers Say

This is the best summary of How to Win Friends and Influence People I've ever read. The way you explained the ideas and connected them to other books was amazing.
Learn more about our summaries →