U.S. Intelligence Weakening Internet for Takeover

As in other occasions, exercises are being conducted before full a takeover.  Will the next false-flag attack come to fruition on the net? The Cybersecurity Bill gives Obama the power to shut down companies and the World Wide Web as a whole.

1500 AM

In places like Arlington, Va.; Washington, D.C.; across the U.S. and around the world, a global cybersecurity exercise is underway designed to test the limits not only of the “network of networks,” but the ingenuity of the people charged with protecting it.

Welcome to Cyber Storm III.

This is the third time that the Department of Homeland Security, in conjunction with other federal agencies, is holding this global cybersecurity exercise. Previous Cyber Storm exercises were conducted in 2006, and again in 2008. For the first time, DHS will manage its response to Cyber Storm III from its new National Cybersecurity and Communications and Integration Center.

Normally, this facility, located in a nondescript office building in Arlington is classified and closed to the public. But the NCCIC recently opened its doors for an inside look to let DHS officials brief the media on Cyber Storm III, a worldwide cybersecurity response exercise that has been underway since late Monday.

Brett Lambo, the director of the Cybersecurity Exercise Program with DHS’s National Cybersecurity Division, is the architect, or game master for this global cybersecurity exercise.

“The overarching philosophy,” he told reporters in a recent briefing at the NCCIC, “is that we want to come up with something that’s a core scenario, something that’s foundational to the operation of the Internet.”

Cyber Storm III includes many players in places across the U.S. and around the world:

  • Seven federal departments: Homeland Security, Defense, Commerce, Energy, Justice, Treasury and Transportation.
  • Eleven states: California, Delaware, Illinois, Iowa, Michigan, Minnesota, North Carolina, New York, Pennsylvania, Texas, Washington, plus the Multi-State Information Sharing and Analysis Center (ISAC). This compares with nine states that participated in Cyberstorm II.
  • Twelve international partners: Australia, Canada, France, Germany, Hungary, Japan, Italy, the Netherlands, New Zealand, Sweden, Switzerland, and the United Kingdom (up from four countries that participated in Cyber Storm II).

DHS officials also say 60 private sector companies will participate in Cyber Storm III, up from 40 who participated in Cyber Storm II. Firms include banking and finance, chemical, communications, defense industrial, information technology, nuclear, transportation and water.

Lambo said to preserve the exercise’s value as a vigorous test of cybersecurity preparedness, exact details of the scenario which participants will deal with over the next three days are secret. However, he did share some of the broad parameters of the scenario he helped write, and which he will administer.

“In other exercises, you do have specific attack vectors; you have a denial of service attack, you have a website defacement, or you have somebody dropping a rootkit,” he said. “But we wanted to take that up a level to say, ‘All of those things can still happen, and based on what you do, if you’re concerned about the availability of infrastructure, we can look at what happens when the infrastructure is unavailable.’”

Lambo said another way to look at the scenario is that it builds upon what they learned from previous exercises.

“In Cyber Storm I, we attacked the Internet, in Cyber Storm II, we used the Internet as the weapon, in Cyber Storm III, we’re using the Internet to attack itself,” he said.

Lambo added under normal circumstances, the Internet operates based on trust that a file, or a graphic, or a computer script is what it says it is, and comes from a trusted source. But what if that source was not what it said it was, or the source has a malicious intent?

“What we’re trying to do is compromise that chain of trust,” he said, in further explaining in broad strokes of the Cyber Storm III exercise scenario.

Lambo and his colleagues at the Cyber Storm control center also will introduce new, and hopefully unexpected conditions to the scenario to further test participants.

“We have the ability to do what we call dynamic play,” he said. “If we get a player action coming back into the exercise that is either different from what we expected it to be, if it’s something we’d like to chase down further, or if it’s something we’d like to pursue, we have the ability to write injects on the fly.”

He said those injects could include new attacks.

The Cyber Storm exercise will be conducted primarily using secure messaging systems like e-mail or text messages to relay intersects to participants and that the simulated attacks are not being conducted over a live or a virtual network now in operation on the Internet, he said.

For the U.S. government, Cyber Storm III also offers the opportunity to test the DHS’ National Cyber Incident Response Plan.

“We want to focus on information sharing issues,:” he said. “We want to know how all of the different organizations are compiling, acting on, aggregating information that they’re sharing, especially when you’re thinking about classified lines coming into the unclassified domain. There’s a concept called tearlining, in which we take classified information, and get it below the tearline, so that those without security clearances and get it, and act on it.”

The Cyber Storm III exercise is expected to conclude by Oct. 1.

Space Based Laser Weapons

fas.org

The potential to intercept and destroy a missile over enemy territory soon after launch, rather than over friendly territory, makes the development of a boost phase intercept (BPI) capability very desirable. In concert with ground based theater missile defense (TMD) systems already under development, the U.S. continues to investigate BPI concepts for BMD systems.

The SBL program could develop the technology to provide the U.S. with an advanced BMD system for both theater and national missile defense. BMDO believes that an SBL system has the potential to make other contributions to U.S. security and world security as a whole, such as inducing potential aggressors to abandon ballistic missile programs by rendering them useless. Failing that, BMDO believes that the creation of such a universal defense system would provide the impetus for other nations to expand their security agreements with the United States, bringing them under a U. S. sponsored missile defense umbrella.

An SBL platform would achieve missile interception by focusing and maintaining a high powered laser on a target until it achieves catastrophic destruction. Energy for the sustained laser burst is generated by the chemical reaction of the hydrogen fluoride (HF) molecule. The HF molecules are created in an excited state from which the subsequent optical energy is drawn by an optical resonator surrounding the gain generator.

Lasers have been studied for their usefulness in air defense since 1973, when the Mid Infrared Advanced Chemical Laser (MIRACL) was first tested against tactical missiles and drone aircraft. Work on such systems continued through the 1980s, with the Airborne Laser Laboratory, which completed the first test laser intercepts above the earth. Initial work on laser based defense systems was overseen by the Defense Advanced Research Projects Agency (DARPA), but transferred to the newly created Strategic Defense Initiative Organization (SDIO) in 1984. Work continues today under the auspices of the BMDO, the successor to the SDIO.

The SBL program builds on a broad variety of technologies developed by the SDIO in the 1980s. The work on the Large Optics Demonstration Experiment (LODE), completed in 1987, provided the means to control the beams of large, high powered lasers. The Large Advanced Mirror Program (LAMP) designed and built a 4 meter diameter space designed mirror with the required optical figure and surface quality. In 1991, the Alpha laser (2.8 mm) developed by the SDIO achieved megawatt power at the requisite operating level in a low pressure environment similar to space. Numerous Acquisition, Tracking, and Pointing/ Fire Control (ATP/ FC) experiments both completed and currently underway will provide the SBL platform with stable aimpoints. Successes in the field of ATP include advances in inertial reference, vibration isolation, and rapid retargeting/ precision pointing (R2P2). In 1995 the Space Pointing Integrated Controls Experiment offered near weapons level results during testing.

Most recently, the Alpha LAMP Integration (ALI) program has performed integrated high energy ground testing of the laser and beam expander to demonstrate the critical system elements. The next step is an integrated space vehicle ground test with a space demonstration to conclusively prove the feasibility of deploying an operational SBL system.

Future plans include orbiting the SBL Readiness Demonstrator (SBLRD) in order to test all of the systems together in their intended working environment. Designs for the SBLRD satellite call for four major subsystems: the ATP system; providing acquisition, tracking, targeting, stabilization, and assessment capabilities; the laser device, providing the optical power, and beam quality, as well as maintains nozzle efficiency; the optics and beam control systems, enhancing and focus the beam, augmenting the capabilities of the laser device; and the space systems, providing a stable platform, storage of the reactants, and furnish electrical power (but do not power the laser).

The SBLRD is intended to demonstrate the capability to perform boost phase Theater Missile Defense from space. The objectives of the space demonstration include gaining performance information critical to the development of an operational SBL system, as well as gain a general understanding of operating such a system.

BMDO and the Air Force agreed to transfer the execution of the SBLRD project and the related SBL technology developments to the Air Force. BMDO retained overarching SBL architecture responsibilities.

Alpha High Energy Laser (HEL)

Megawatt class power levels were first achieved by the Mid-Infrared Advanced Chemical Laser (MIRACL) originally sponsored by the Navy, later by DARPA, and then by BMDO. Because the design was intended for sea level operation, the MIRACL laser does not achieve the optimum efficiency necessary for space-based operation. DARPA launched the Alpha laser program, with the goal of developing a megawatt level SBL that was scaleable to more powerful weapon levels and optimized for space operation. In this design, stacked cylindrical rings of nozzles are used for reactant mixing. The gain generation assembly achieves higher power by simply stacking more rings. In 1991, the Alpha laser demonstrated megawatt class power levels similar to MIRACL, but in a low pressure, space operation environment. Alpha demonstrates that multi-megawatt, space-compatible lasers can be built and operated.

Large Advanced Mirror Program (LAMP)

To demonstrate the ability to fabricate the large mirror required by an SBL, the Large Advanced Mirror Program (LAMP) built a lightweight, segmented 4 m diameter mirror on which testing was completed in 1989. Tests verified that the surface optical figure and quality desired were achieved, and that the mirror was controlled to the required tolerances by adaptive optics adjustments. This mirror consists of a 17 mm thick facesheet bonded to fine figure actuators that are mounted on a graphite epoxy supported reaction structure. To this day, this is the largest mirror completed for use in space. This LAMP segmented design is applicable to 10 m class mirrors, and the Large Optical Segment (LOS) program has since produced a mirror segment sized for an 11 m mirror. The large dimension of this LOS mirror segment approximates the diameter of the LAMP mirror.

Beam Control- Large Optics Demonstration Experiment (LODE) and ALI

The ability to control a beam was demonstrated at low power under the Large Optics Demonstration Experiment (LODE) in 1987. The current high power beam control technology is now being integrated with the Alpha laser and the LAMP mirror in a high power ground demonstration of the entire high energy laser weapon element. This is known as the Alpha-LAMP Integration (ALI) program.

Acquisition, Tracking, Pointing (ATP)

The ATP technologies required (sensors, optics, processors, etc.) have been validated through a series of component and integrated testing programs over the last decade. In 1985, the Talon Gold brassboard operated sub-scale versions of all the elements needed in the operational ATP system including separate pointing and tracking apertures, an illuminator, an inertial reference gyro system, fire control mode logic, sensors and trackers. Talon Gold achieved performance levels equivalent to that needed for the SBL. In 1991, the space-borne Relay Mirror Experiment (RME), relayed a low-power laser beam from a ground site to low-earth orbit and back down to a scoring target board at another location with greater pointing accuracy and beam stability than needed by SBL. The technology to point and control the large space structures of the SBL was validated in 1993 by the Rapid Retargeting and Precision Pointing (R2P2) program that used a hardware test bed to develop and test the large and small angle spacecraft slewing control laws and algorithms. The Space Pointing Integrated Controls Experiment (SPICE) demonstrated in 1995 near weapon scale disturbance isolation of 60-80 db and a pointing jitter reduction of 75:1. In 1998, the Phillips-Laboratory-executed High Altitude Balloon Experiment, (HABE) will demonstrate autonomous end-to-end operation of the key ATP-Fire Control (FC) functions in a realistic timeline against actual thrusting ballistic missiles. HABE will use a visible low-power marker beam as a surrogate to the megawatt HF beam and measure beam pointing accuracy, jitter and drift against a fixed aimpoint on the target.

SBLRD Characteristics
Weight: 17,500 kg Length: 20.12 m
Diameter: 4.57 m Mirror Diameter: 4.0 m



  • Hydrogen fluoride chemical energy powered laser.
  • On board surveillance capabilities.
  • Super reflective mirror coatings allowing for uncooled optics.
  • Concurrent NMD / TMD capability.

Resources



  • Space-Based Laser Project Office – AF SMC
  • LASERS IN SPACE TECHNOLOGICAL OPTIONS FOR ENHANCING US MILITARY CAPABILITIES by Mark E. Rogers, Lieutenant Colonel, USAF November 1997 Occasional Paper No. 2 Center for Strategy and Technology Air War College Maxwell Air Force Base, Alabama
  • Lasers and Missile Defense: New Concepts for Space-based and Ground-based Laser Weapons, William H. Possel, Lt Col, USAF — CSAT Occasional Paper No. 5 Center for Strategy and Technology Air War College, July 1998
  • Laser Options for National Missile Defense Steven G. Leonard; Mark L. Devirgilio (Faculty Advisor) Air Command and Staff College 1998 – The Space Based Laser (SBL) can meet the NMD requirements. A 24 SBL satellite constellation can kill 20 Taepo Dong 2 missiles launched anywhere in the world at anytime. Each SBL satellite is projected by BMDO to weigh 17,500 kilograms. Using the Aerospace Corporation’s historical cost verses weight information, which shows that satellites average cost is roughly $50,000 per pound, the first satellite in this constellation would approach $2 billion dollars.
  • SPACE BASED LASER INTEGRATED FLIGHT EXPERIMENT The U.S. Air Force contracted with an industry joint venture on February 08, 1999 for the Space Based Laser Integrated Flight Experiment (SBL IFX). The award constitutes the first increment of a Cost Plus Award Fee/Cost Plus Fixed Fee contract valued at approximately $2-3 billion once completed.
  • Space Based Laser Readiness Demonstrator Acquisition Approach Space and Missile Systems Center Advanced Systems Directorate — 01 September 1998
  • MEMORANDUM FOR ALL POTENTIAL OFFERORS 10 Jul 98
  • Draft Request for Proposal 10 Jul 98
  • STATEMENT OF OBJECTIVES DRAFT - 10 Jul 98
  • SBL Glossary of Terms 10 July 1998
  • INFORMATION PROTECTION GUIDE [DRAFT] 10 July 1998
  • SECURITY GUIDANCE 10 July 1998
  • Interest in “Other than Prime” for the SBLRD Contract(17 Jun 98)
  • DRAFT STATEMENT OF OBJECTIVES 9 June 1998
  • Interim Request for Proposal Release 15 Jun 98
  • Teaming within Space Based Laser (SBL) Project Competition 9 Feb 98
  • STATEMENT OF OBJECTIVES (23 Jan 98)
  • DRAFT TECHNICAL REQUIREMENTS DOCUMENT (TRD) 23 January 1998
  • Answers to Questions Submitted at Industry Day- 26 Aug 97 (11 Sep 97)
  • SBL Technologies Request for Information 11 Sep 97
  • SBL Technologies Request for Information 11 Aug 1997
  • SBL Technologies Request for Information 29 July 1997
    Hi-res 200 dpi images [~400k JPEGs]

Star Wars High Power Invisible Energy Weapons Technology

Journalists Maurizio Torrealta and Sigfrido Ranucci along with Retired Colonel John Alexander, former Pentagon Analyst and Washington Post Reporter William Arkin and Human Rights Watch’s Marc Garlasco explain how modern warfare went from kinetic to high power energy weapons.  The United States spends at least five hundred million (500,000,000) dollars a year in Research and Development of these technology.  Among the companies that receive contracts for the development of high energy weapons are Raytheon and Zeus.

Secret Raytheon Military Contract Rolls out Internet Clamp Down

It would rely on a set of sensors deployed in computer networks to spy on the Internet for “attacks” on infrastructure.  The irony is that the only people who have the power and technology to cause a massive attack of the scale it is being promoted, are the very same people who are clamping down on the Internet to establish censorship and control.  The program’s name (Perfect Citizen) could not be more deceiving.

WSJ

The federal government is launching an expansive program dubbed “Perfect Citizen” to detect cyber assaults on private companies and government agencies running such critical infrastructure as the electricity grid and nuclear-power plants, according to people familiar with the program.

The surveillance by the National Security Agency, the government’s chief eavesdropping agency, would rely on a set of sensors deployed in computer networks for critical infrastructure that would be triggered by unusual activity suggesting an impending cyber attack, though it wouldn’t persistently monitor the whole system, these people said.

Defense contractor Raytheon Corp. recently won a classified contract for the initial phase of the surveillance effort valued at up to $100 million, said a person familiar with the project.

An NSA spokeswoman said the agency had no information to provide on the program. A Raytheon spokesman declined to comment.

Some industry and government officials familiar with the program see Perfect Citizen as an intrusion by the NSA into domestic affairs, while others say it is an important program to combat an emerging security threat that only the NSA is equipped to provide.

“The overall purpose of the [program] is our Government…feel[s] that they need to insure the Public Sector is doing all they can to secure Infrastructure critical to our National Security,” said one internal Raytheon email, the text of which was seen by The Wall Street Journal. “Perfect Citizen is Big Brother.”

Raytheon declined to comment on this email.

A U.S. military official called the program long overdue and said any intrusion into privacy is no greater than what the public already endures from traffic cameras. It’s a logical extension of the work federal agencies have done in the past to protect physical attacks on critical infrastructure that could sabotage the government or key parts of the country, the official said.

U.S. intelligence officials have grown increasingly alarmed about what they believe to be Chinese and Russian surveillance of computer systems that control the electric grid and other U.S. infrastructure. Officials are unable to describe the full scope of the problem, however, because they have had limited ability to pull together all the private data.

Perfect Citizen will look at large, typically older computer control systems that were often designed without Internet connectivity or security in mind. Many of those systems—which run everything from subway systems to air-traffic control networks—have since been linked to the Internet, making them more efficient but also exposing them to cyber attack.

The goal is to close the “big, glaring holes” in the U.S.’s understanding of the nature of the cyber threat against its infrastructure, said one industry specialist familiar with the program. “We don’t have a dedicated way to understand the problem.”

The information gathered by Perfect Citizen could also have applications beyond the critical infrastructure sector, officials said, serving as a data bank that would also help companies and agencies who call upon NSA for help with investigations of cyber attacks, as Google did when it sustained a major attack late last year.

The U.S. government has for more than a decade claimed a national-security interest in privately owned critical infrastructure that, if attacked, could cause significant damage to the government or the economy. Initially, it established relationships with utility companies so it could, for instance, request that a power company seal a manhole that provides access to a key power line for a government agency.

With the growth in concern about cyber attacks, these relationships began to extend into the electronic arena, and the only U.S. agency equipped to manage electronic assessments of critical-infrastructure vulnerabilities is the NSA, government and industry officials said.

The NSA years ago began a small-scale effort to address this problem code-named April Strawberry, the military official said. The program researched vulnerabilities in computer networks running critical infrastructure and sought ways to close security holes.

That led to initial work on Perfect Citizen, which was a piecemeal effort to forge relationships with some companies, particularly energy companies, whose infrastructure is widely used across the country.

The classified program is now being expanded with funding from the multibillion-dollar Comprehensive National Cybersecurity Initiative, which started at the end of the Bush administration and has been continued by the Obama administration, officials said. With that infusion of money, the NSA is now seeking to map out intrusions into critical infrastructure across the country.

Because the program is still in the early stages, much remains to be worked out, such as which computer control systems will be monitored and how the data will be collected. NSA would likely start with the systems that have the most important security implications if attacked, such as electric, nuclear, and air-traffic-control systems, they said.

Intelligence officials have met with utilities’ CEOs and those discussions convinced them of the gravity of the threat against U.S. infrastructure, an industry specialist said, but the CEOs concluded they needed better threat information and guidance on what to do in the event of a major cyber attack.

Some companies may agree to have the NSA put its own sensors on and others may ask for direction on what sensors to buy and come to an agreement about what data they will then share with the government, industry and government officials said.

While the government can’t force companies to work with it, it can provide incentives to urge them to cooperate, particularly if the government already buys services from that company, officials said.

Raytheon, which has built up a large cyber-security practice through acquisitions in recent years, is expected to subcontract out some of the work to smaller specialty companies, according to a person familiar with the project.

The Military Industrial Complex’s Scheme to Control the Internet

By Tom Burghardt

The training of thousands of qualified airmen, will form the nucleus of an elite corps of cyberwarfare operatives.

Prussian military theorist Carl von Clausewitz once famously wrote that “war is the continuation of politics by other means.” Acentury later, radical French philosopher Michel Foucault turned Clausewitz on his head and declared that “politics is the continuation of war by other means.”

In our topsy-turvy world where truth and lies coexist equally and sociopathic business elites reign supreme, it would hardly be a stretch to theorize that cyber war is the continuation of parapolitical crime by other means.

Through the Wormhole

In Speed and Politics, cultural theorist Paul Virilio argued that “history progresses at the speed of its weapons systems.” With electronic communications now blanketing the globe, it was only a matter of time before our political masters, (temporarily) outflanked by the subversive uses to which new media lend themselves, would deploy what Virilio called the “integral accident” (9/11 being one of many examples) and gin-up entirely new categories of threats, “Cyber Pearl Harbor” comes to mind, from which of course, they would “save us.”

That the revolving door connecting the military and the corporations who service war making is a highly-profitable redoubt for those involved, has been analyzed here at great length. With new moves to tighten the screws on the immediate horizon, and as “Change” reveals itself for what it always was, an Orwellian exercise in public diplomacy, hitting the “kill switch” serves as an apt descriptor for the new, repressive growth sector that links technophilic fantasies of “net-centric” warfare to the burgeoning “homeland security” market.

Back in March, Wired investigative journalist Ryan Singel wrote that the “biggest threat to the open internet” isn’t “Chinese hackers” or “greedy ISPs” but corporatist warriors like former Director of National Intelligence Mike McConnell.

Having retreated to his old haunt as a senior vice president with the ultra-spooky firm Booz Allen Hamilton (a post he held for a decade before joining the Bush administration), McConnell stands to make millions as Booz Allen’s parent company, the secretive private equity powerhouse, The Carlyle Group, plans to take the firm public and sell some $300 million worth of shares, The Wall Street Journal reported last week.

“With its deep ties to the defense establishment” the Journal notes, “Booz Allen has become embedded in a range of military operations such as planning war games and intelligence initiatives.” That Carlyle Group investors have made out like proverbial bandits during the endless “War on Terror” goes without saying. With “relatively low debt levels for a leveraged buyout,” the investment “has been a successful one for Carlyle, which has benefited from the U.S. government’s increasing reliance on outsourcing in defense.”

And with 15,000 employees in the Washington area, most with coveted top secret and above security clearances, Booz Allen’s clients include a panoply of secret state agencies such as the CIA, the Defense Intelligence Agency, the Department of Homeland Security, NSA and the U.S. Air Force. With tentacles enlacing virtually all facets of the secretive world of outsourced intelligence, the firm has emerged as one of the major players in the cybersecurity niche market.

While McConnell and his minions may not know much about “SQL injection hacks,” Singel points out that what makes this spook’s spook dangerous (after all, he was NSA Director under Clinton) “is that he knows about social engineering. … And now he says we need to re-engineer the internet.”

Accordingly, Washington Technology reported in April, that under McConnell’s watchful eye, the firm landed a $14.4 million contract to build a new bunker for U.S. Cyber Command (CYBERCOM). Chump change by Pentagon standards perhaps, but the spigot is open and salad days are surely ahead.

Now that CYBERCOM has come on-line as a “subordinate unified command” of U.S. Strategic Command (STRATCOM), it’s dual-hatted Director, Air Force General Keith B. Alexander confirmed by the Senate and with a fourth, gleaming star firmly affixed on his epaulettes, the real fun can begin.

A denizen of the shadows with a résumé to match, Alexander is also Director of the National Security Agency (hence the appellation “dual-hatted”), the Pentagon satrapy responsible for everything from battlefield signals- and electronic intelligence (SIGINT and ELINT), commercial and industrial espionage (ECHELON) to illegal driftnet spying programs targeting U.S. citizens.

Spooky résumé aside, what should concern us here is what Alexander will actually do at the Pentagon’s new cyberwar shop.

Fact Sheet posted by STRATCOM informs us that CYBERCOM “plans, coordinates, integrates, synchronizes, and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full-spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.”

As Antifascist Calling previously reported, CYBERCOM’s offensive nature is underlined by the role it will play as STRATCOM’s operational cyber wing. The training of thousands of qualified airmen, as The Register revealed last month, will form the nucleus of an “elite corps of cyberwarfare operatives,” underscoring the command’s signal importance to the secret state and the corporations they so lovingly serve.

Cybersecurity: The New Corporatist “Sweet Spot”

Fueling administration moves to “beef up,” i.e. tighten state controls over the free flow of information is cash, lots of it. The Washington Post reported June 22 that “Cybersecurity, fast becoming Washington’s growth industry of choice, appears to be in line for a multibillion-dollar injection of federal research dollars, according to a senior intelligence official.”

“Delivering the keynote address at a recent cybersecurity summit sponsored by Defense Daily,” veteran Post reporter and CIA media asset, Walter Pincus, informs us that “Dawn Meyerriecks, deputy director of national intelligence for acquisition and technology, said that along with the White House Office of Science and Technology, her office is going to sponsor major research ‘where the government’s about to spend multiple billions of dollars’.”

Bingo!

According to a Defense Daily profile, before her appointment by Obama’s recently fired Director of National Intelligence, Dennis C. Blair, Meyerriecks was the chief technology officer with the Defense Information Systems Agency (DISA), described on DISA’s web site as a “combat support agency” that “engineers and provides command and control capabilities and enterprise infrastructure to continuously operate and assure a global net-centric enterprise in direct support to joint warfighters, National level leaders, and other mission and coalition partners across the full spectrum of operations.”

During Defense Daily’s June 11 confab at the Marriott Hotel in Washington (generously sponsored by Northrop Grumman, Raytheon, General Dynamics and The Analysis Group), Meyerriecks emphasized although “tons of products” have been commercially developed promising enhanced security, “there’s not an answer Band-Aid that is going to come with this.”

All the more reason then, to shower billions of taxpayer dollars on impoverished defense and security corps, while preaching “fiscal austerity” to “greedy” workers and homeowners facing a new wave of foreclosures at the hands of cash strapped banks.

“We’re starting to question whether or not the fundamental precepts are right,” Meyerriecks said, “and that’s really what, at least initially, this [new research] will be aimed at.”

Presumably, the billions about to feed the “new security paradigm,” all in the interest of “keeping us safe” of course, means “we need to be really innovative, because I think we’re going to run out of runway on our current approach,” she said.

Washington Technology reported Meyerriecks as saying “We don’t have any fixed ideas about what the answers are.” Therefore, “we’re looking for traditional and nontraditional partnering in sourcing.”

Amongst the “innovative research” fields which the ODNI, the Department of Homeland Security and one can assume, NSA/CYBERCOM, will soon be exploring are what Washington Technology describe as: “Multiple security levels for government and non-government organizations. Security systems that change constantly to create ‘moving targets’ for hackers,” and more ominously for privacy rights, coercive “methods to motivate individuals to improve their cybersecurity practices.”

The Secret State’s Internet Control Bill

Since major policy moves by administration flacks always come in waves, Homeland Security Secretary Janet Napolitano told the American Constitution Society for Law and Policy June 18, that in order to fight “homegrown terrorism” the monitoring of internet communications “is a civil liberties trade-off the U.S. government must make to beef up national security,” the Associated Press reported.

While the Obama regime has stepped-up attacks on policy critics who have disclosed vital information concealed from the American people, prosecuting whistleblowers such as Thomas Drake, who spilled the beans on corrupt NSA shenanigans with grifting defense and security corps, and wages a low-level war against WikiLeaksCryptomePublic Intelligence and other secret spilling web sites, it continues to shield those who oversaw high crimes and misdemeanors during the previous and current regimes.

In this light, Napolitano’s statement that “we can significantly advance security without having a deleterious impact on individual rights in most instances,” is a rank mendacity.

With enough airspace to fly a drone through, the Home Sec boss told the gathering “at the same time, there are situations where trade-offs are inevitable.” What those “situations” are or what “trade-offs” were being contemplated by the administration was not specified by Napolitano; arch neocon Joe Lieberman however, graciously obliged.

As “Cyber War” joins the (failed) “War on Drugs” and the equally murderous “War on Terror” as America’s latest bête noire and panic all rolled into one reeking mass of disinformation, Senators Joseph Lieberman (ID-CT), Susan Collins (R-ME) and Tom Carper (D-DE) introduced the Protecting Cyberspace as a National Asset Act of 2010 in the Senate.

The bill empowers the Director of a new National Center for Cybersecurity and Communications (NCCC), to be housed in the Department of Homeland Security, to develop a “process” whereby owners and operators of “critical infrastructure” will develop “response plans” for what the legislation calls “a national cybersecurity emergency.”

This particularly pernicious piece of legislative flotsam would hand the President the power to declare a “national cyber-emergency” at his discretion and would force private companies, internet service providers and search engines to “comply with the new risk-based security requirements.” Accordingly, “in coordination with the private sector … the President [can] authorize emergency measures to protect the nation’s most critical infrastructure if a cyber vulnerability is being exploited or is about to be exploited.”

Under terms of the bill, such “emergency measures” can force ISPs to “take action” if so directed by the President, to limit, or even to sever their connections to the internet for up to 30 days.

While the administration, so far, has not explicitly endorsed Lieberman’s bill, DHS Deputy Undersecretary Philip Reitinger told reporters that he “agreed” with the thrust of the legislation and that the Executive Branch “may need to take extraordinary measures” in the event of a “crisis.”

Under the 1934 Communications Act, the World Socialist Web Site points out, “the president may, under ‘threat of war,’ seize control of any ‘facilities or stations for wire communications’.”

“Though dated,” socialist critic Mike Ingram avers, “that definition would clearly apply to broadband providers or Web sites. Anyone disobeying a presidential order can be imprisoned for one year. In addition to making explicit the inclusion of Internet providers, a central component of the Lieberman bill is a promise of immunity from financial claims for any private company which carries through an order from the federal government.”

Under terms of the legislation, the president requires no advance notification to Congress in order to hit the internet “kill switch,” and his authority to reign supreme over the free speech rights of Americans can be extended for up to six months after the “state of war” has expired.

While the bill’s supporters, which include the secret state lobby shop, the Intelligence and National Security Alliance (INSA) claim the Lieberman-Collins-Carper legislation is intended to create a “shield” to defend the U.S. and its largest corporate benefactors from the “looming threat” of a “Cyber 9/11,” one cannot discount the billions of dollars in plum government contracts that will fall into the laps of the largest defense and security corps, the primary beneficiaries of this legislation; thus the bill’s immunity provisions.

Indeed, current INSA Chairwoman, Frances Fragos Townsend, the former Bushist Homeland Security Adviser, was appointed in 2007 as National Continuity Coordinator under the auspices of National Security Presidential Directive 51 (NSPD-51) and was assigned responsibility for coordinating the development and implementation of Federal continuity of government (COG) policies. As readers of Antifascist Calling are aware, plans include contingencies for a declaration of martial law in the event of a “catastrophic emergency.” Whether or not a “national cybersecurity emergency” would fall under the penumbral cone of silence envisaged by NSPD-51 to “maintain order” is anyone’s guess.

However, in a June 23 letter to Lieberman-Collins-Carper, the Center for Democracy and Technology (CDT) and 23 other privacy and civil liberties groups, insisted that “changes are needed to ensure that cybersecurity measures do not unnecessarily infringe on free speech, privacy, and other civil liberties interests.”

CDT states that while “the bill makes it clear that it does not authorize electronic surveillance beyond that authorized in current law, we are concerned that the emergency actions that could be compelled could include shutting down or limiting Internet communications that might be carried over covered critical infrastructure systems.”

Additionally, CDT avers that the bill “requires CCI owners to share cybersecurity ‘incident’ information with DHS, which will share some of that information with law enforcement and intelligence personnel.” While Lieberman-Collins-Carper claim that “incident reporting” doesn’t authorize “any federal entity” to compel disclosure “or conduct surveillance,” the bill does not indicate what might be included in an ‘incident report’ and we are concerned that personally-identifiable information will be included.” Count on it!

In a press release, INSA’s chairwoman declared that the legislation is important in “establishing a public-private partnership to promote national cyber security priorities, strengthen and clarify authorities regarding the protection of federal civilian systems, and improve national cyber security defenses.”

Amongst the heavy-hitters who will profit financially from developing a “public-private partnership to promote national cyber security priorities,” include INSA “Founding Members” BAE Systems, Booz Allen Hamilton, CSC, General Dynamics, HP, Lockheed Martin, ManTech International, Microsoft, Potomac Institute for Policy Studies and Science Applications International Corporation (SAIC).

Talk about one hand washing the other! A casual glance at Washington Technology’s 2010 list of the Top 100 Federal Government Contractors provides a telling definition of the term “stakeholder”!

Blanket Surveillance Made Easy: Einstein 3′s Roll-Out

During a recent Cyberspace Symposium staged by the Armed Forces Communications and Electronics Association (AFCEA), an industry lobby group chock-a-block with defense and security corps, a series of video presentations set the tone, and the agenda, for CYBERCOM and the secret state’s new push for heimatcybersecurity.

During a question and answer session “with a small group of reporters” in sync with the alarmist twaddle peddled by AFCEA and STRATCOM, Defense Systems’Amber Corrin informed us that “one possibility” floated by Deputy Defense Secretary William Lynne III to “keep us safe,” is the deployment of the privacy-killing Einstein 2 and Einstein 3 intrusion detection and prevention systems on civilian networks.

“To support such a move” Defense Systems reported, “a task force comprising industry and government information technology and defense interests … has been forged to examine issues surrounding critical infrastructure network security.”

As Antifascist Calling reported last July, Einstein 3 is based on technology developed by NSA under its Tutelage program, a subordinate project of NSA’s larger and more pervasive privacy-killing Stellar Wind surveillance operation.

Einstein 3′s deep-packet inspection technology can read the content of email messages and other private electronic communications. Those deemed “threats” to national security networks can then be forwarded to analysts and “attack signatures” (or suspect political messages) are then stored in a massive NSA-controlled database for future reference.

Federal Computer Week disclosed in March that the Department of Homeland Security’s U.S. Computer Emergency Readiness Team (US-CERT) “plans to partner with a commercial Internet Service Provider and another government agency to pilot technology developed by the National Security Agency to automate the process of detecting cyber intrusions into civilian agencies’ systems.”

“The exercise,” according to reporter Ben Bain “aims to demonstrate the ability of an ISP to select and redirect Internet traffic from a participating government agency using the new technology. The exercise would also be used demonstrate the ability for U.S. CERT to apply intrusion detection and prevention to that traffic and to generate automated alerts about selected cyber threats.”

That testing is currently underway and has been undertaken under authority of National Security Presidential Directive 54, signed by President George W. Bush in 2008 in the waning days of his administration. While the vast majority of NSPD-54 is classified top secret, hints of its privacy-killing capabilities were revealed in the sanitized version of the Comprehensive National Cybersecurity Initiative (CNCI) released by the Obama White House in March.

The Electronic Privacy Information Center (EPIC) has filed suit against the government in federal court after their Freedom of Information Act request to the National Security Agency was rejected by securocrats. The agency refused to release NSPD-54, since incorporated into Obama’s CNCI, stating that they “have been withheld in their entirety” because they are “exempt from release” on grounds of “national security.”

In a follow-up piece earlier this month, Federal Computer Week disclosed that the exercise “will also allow the Homeland Security Department, which runs the Einstein program, to share monitored information with the National Security Agency, though that data is not supposed to include message content.”

“The recent combination of those three elements–reading e-mail messages, asking companies to participate in the monitoring program, and getting the NSA in the loop–has set off alarm bells about future uses of Einstein 3,” FCW’s John Zyskowski disclosed.

Those bells have been ringing for decades, tolling the death of our democratic republic. As military-style command and control systems proliferate, supporting everything from “zero-tolerance” policing and urban surveillance, the deployment of packet-sniffing technologies will soon join CCTV cameras, license plate readers and “watchlists,” thus setting the stage for the next phase of the secret state’s securitization of daily life.

Tom Burghardt is a researcher and activist based in the San Francisco Bay Area. In addition to publishing in Covert Action Quarterly and Global Research, his articles can be read on Dissident Voice, The Intelligence Daily, Pacific Free Press, Uncommon Thought Journal, and the whistleblowing website Wikileaks. He is the editor of Police State America: U.S. Military “Civil Disturbance” Planning, distributed by AK Press.

Related Links:

Togel178

Pedetogel

Sabatoto

Togel279

Togel158

Colok178

Novaslot88

Lain-Lain

Partner Links