http://dissidentvoice.org/2010/11/cyber-command-prepares-the-ground-for-high
-tech-war-crimes/

 


Cyber Command Prepares the Ground for High-Tech War Crimes


by Tom Burghardt / November 15th, 2010

While a bureaucratic turf war rages between the CIA and U.S. Cyber Command
(CYBERCOM) over which secret state agency will be authorized to launch
network attacks outside a "war zone," the big losers, as always, will be
those unfortunate enough to find themselves on the receiving end of a
military-grade "logic bomb."

Last week, The Washington Post
<http://www.washingtonpost.com/wp-dyn/content/article/2010/11/05/AR201011050
7464.html>  reported that CYBERCOM "is seeking authority to carry out
computer network attacks around the globe to protect U.S. interests."
Leaving aside the thorny question of whose interests are being "protected"
here, the Post tells us that unnamed administration lawyers are "uncertain
about the legality of offensive operations."

Coming from a government that's incorporated the worst features of the
previous regime into their repertoire, that's rather rich.

"The CIA has argued," the Post informs, "that such action is covert, which
is traditionally its turf." Pentagon thrill-kill specialists beg to differ,
asserting that "offensive operations are the province of the military and
are part of its mission to counter terrorism, especially when, as one
official put it, 'al-Qaeda is everywhere'."

That certainly covers a lot of ground! As a practical matter it also serves
as a convenient justification-or pretext, take your pick-for our minders in
Ft. Meade, Langley or Cheltenham to consummate much in the mischief
department.

And with alarmist media reports bombarding us every day with dire scenarios,
reminiscent of the "weapons of mass destruction" spook show that preceded
the Iraq invasion, where China, Iran, Russia and North Korea are now
stand-ins for "Saddam" in the cyberwar Kabuki dance, it is hardly surprising
that "liberal" Democrats and "conservative" Republicans are marching in
lockstep.

InfoSecurity
<http://www.infosecurity-us.com/view/13917/congresswoman-says-chance-of-cybe
r-attack-against-electric-grid-is-100/>  reported last week that during a
recent Manhattan conference, Rep. Yvette Clarke (D-NY) proclaimed that "the
likelihood of a cyberattack that could bring down our [electrical] grid is .
100%. Our networks are already being penetrated as we stand here. We are
already under attack. We must stop asking ourselves 'could this happen to
us' and move to a default posture that acknowledges this fact and instead
asks 'what can we do to protect ourselves'?"

Why cede even more control to the secret state and their corporate partners
who stand to make a bundle in the latest iteration of the endless "War on
Terror" (Cyber Edition), of course!

An Offensive Brief

Despite all the hot air about protecting critical infrastructure and the
mil.com domain, the offensive nature of Pentagon planning is written into
Cyber Command's DNA.

As Antifascist Calling
<http://antifascist-calling.blogspot.com/2010/04/cyberwar-and-repression-cor
poratist.html>  reported in April, the organization's aggressive posture is
writ large in several Air Force planning documents. In a 2006 presentation
to the Air Force Cyber Task Force for example, A Warfighting Domain:
Cyberspace
<http://www.au.af.mil/info-ops/usaf/cyberspace_taskforce_sep06.pdf> , Dr.
Lani Kass asserted that "Cyber is a war-fighting domain. The electromagnetic
spectrum is the maneuver space. Cyber is the United States' Center of
Gravity-the hub of all power and movement, upon which everything else
depends. It is the Nation's neural network."

Kass averred that "Cyber superiority is the prerequisite to effective
operations across all strategic and operational domains-securing freedom
from attack and freedom to attack."

Accordingly, she informed her audience that "Cyber favors the offensive,"
and that the transformation of the electromagnetic spectrum into a
"warfighting domain" will be accomplished by: "Strategic Attack directly at
enemy centers of gravity; Suppression of Enemy Cyber Defenses; Offensive
Counter Cyber; Defensive Counter Cyber; Interdiction."

Two years later, the Strategic Vision
<http://www.dtic.mil/cgi-bin/GetTRDoc?Location=U2&doc=GetTRDoc.pdf&AD=ADA479
060>  unveiled by the Air Force disclosed that the purpose for standing up a
dedicated cyber command is to "deceive, deny, disrupt, degrade, and destroy"
an adversary's information infrastructure.

Air Force theorists averred that since "the confluence of globalization,
economic disparities, and competition for scarce resources" pose significant
challenges for the U.S. Empire, all the more pressing in light of
capitalism's on-going economic crisis, an offensive cyber posture must move
rapidly beyond the theoretical plane.

Echoing Kass, and in order to get a leg-up on the competition, we were told
that "controlling cyberspace is the prerequisite to effective operations
across all strategic and operational domains-securing freedom from attack
and freedom to attack."

Shortly thereafter, Air Force Col. Charles W. Williamson III wrote in the
prestigious Armed Forces Journal
<http://www.armedforcesjournal.com/2008/05/3375884>  that "America needs the
ability to carpet bomb in cyberspace to create the deterrent we lack."
Williamson averred that "America must have a powerful, flexible deterrent
that can reach far outside our fortresses and strike the enemy while he is
still on the move."

His solution? Create a military-grade botnet that marshals the computing
power of tens of thousands of Defense Department machines. "To generate the
right amount of power for offense," Williamson wrote, "all the available
computers must be under the control of a single commander, even if he
provides the capability for multiple theaters."

And if innocent parties, not to mention a potential adversary's civilian
infrastructure is destroyed in the process, Williamson declares that "if the
botnet is used in a strictly offensive manner, civilian computers may be
attacked, but only if the enemy compels us."

Indeed, "if the U.S. is defending itself against an attack that originates
from a computer which was co-opted by an attacker, then there are real
questions about whether the owner of that computer is truly innocent."

But as we know from observing the conduct of the U.S. military in Iraq
<http://wikileaks.org/iraq/diarydig>  and Afghanistan
<http://wikileaks.info/wiki/Afghan_War_Diary,_2004-2010/> , outside the
imperial blast walls no one is "truly innocent."

While the Air Force may have lost the intramural skirmish to run the
organization, a task now shared amongst the other armed services and NSA,
their preemptive war doctrines are firmly in place. And with an operating
budget of $120 million this year, to increase to $150 million in fiscal year
2011, excluding of course highly-secretive Special Access Programs hidden
deep inside the Pentagon's "black" budget, it's off to the races.

As I reported
<http://antifascist-calling.blogspot.com/2009/06/cyber-command-launched-us-s
trategic.html>  last year, when Secretary of Defense Robert M. Gates penned
a Memorandum <http://online.wsj.com/public/resources/documents/OSD05914.pdf>
that marked its official launch, the former CIA chief and Iran-Contra
criminal specified that CYBERCOM would be a "subordinate unified command"
under U.S. Strategic Command (STRATCOM).

As readers are well aware, STRATCOM is the Pentagon satrapy charged with
running space operations, information warfare, missile defense, global
command, control, intelligence, surveillance and reconnaissance (C4ISR),
global strike and strategic deterrence; in other words, they're the trigger
finger on America's first-strike nuclear arsenal.

A Strategic Command Fact Sheet <http://www.stratcom.mil/factsheets/cc/>
published in June told us that Cyber Command "plans, coordinates,
integrates, synchronizes, and conducts activities to: direct the operations
and defense of specified Department of Defense information networks and;
prepare to, and when directed, conduct full-spectrum military cyberspace
operations in order to enable actions in all domains, ensure US/Allied
freedom of action in cyberspace and deny the same to our adversaries."

Gates ordered that the organization "must be capable of synchronizing
warfighting effects across the global security environment as well as
providing support to civil authorities and international partners."

What form that "support" will take is clear from previous agreements between
the U.S. secret state and their "international partners." Beneath the dark
banner of the UK-USA Security Agreement
<http://www.nationalarchives.gov.uk/ukusa/>  that powers the ECHELON signals
intelligence (SIGINT) collection and analysis network, agencies such as NSA
and Britain's Government Communications Headquarters (GCHQ) keep a watchful
eye on global communications.

On the domestic front, as I reported
<http://antifascist-calling.blogspot.com/2010/10/cyberwar-is-over-and-nation
al-security.html>  last month, a Memorandum of Agreement
<http://www.dhs.gov/xlibrary/assets/20101013-dod-dhs-cyber-moa.pdf>  forged
between the Department of Homeland Security and the National Security Agency
means that "protecting" critical civilian infrastructure and communications
assets, including the internet, is for all practical purposes now part of
the Pentagon's cyberwar brief.

With authority to troll our communications handed to NSA by the Bush and
Obama administrations under top secret provisions of the Comprehensive
National Cybersecurity Initiative (CNCI
<http://www.whitehouse.gov/cybersecurity/comprehensive-national-cybersecurit
y-initiative> ), the American people have no way of knowing what
cybersecurity programs exist, who decides what is "actionable intelligence,"
or where private communications land after becoming part of the "critical
infrastructure and key resources" landscape.

And with civilian control over "black" Pentagon programs off the table since
the darkest days of the Cold War, the Defense Department's announcement
<http://www.defense.gov/releases/release.aspx?releaseid=14030>  last week
that Cyber Command has achieved "full operational capability" should give
pause.

Long-Running Feud

War criminal, arch geopolitical manipulator and corporate bag man Henry
Kissinger once famously said, "covert action should not be confused with
missionary work."

While true as far as it goes, bureaucratic blood-sport between the CIA and
the Defense Department over control of world-wide cyber operations reflects
a long-running battle within the secret state over which covert branch of
government will command resources and run clandestine programs across the
global "War on Terror" landscape.

Currently in the driver's seat when it comes to the deadly drone war in
Pakistan and protecting America's opium-growing and heroin-dealing regional
allies, the Agency vigorously objects to Pentagon maneuvers to carry out
offensive cyber operations away from acknowledged war zones, because, so
goes the argument, they have exclusive rights to the covert action brief.

Such claims have been challenged by the Pentagon, and considering the
formidable assets possessed by Cyber Command and NSA, the Agency is likely
to lose out when the Obama regime issues a ruling later this year.

This raises an inevitable question, not that its being asked by
congressional grifters or corporate media stenographers: should NSA, the
Pentagon or indeed any other secret state agency, including the CIA, be
tasked with cybersecurity generally, let alone given carte blanche to
conduct clandestine and legally dubious missions inside our computer
networks?

As security expert Bruce Schneier wrote
<http://www.schneier.com/essay-265.html>  last year, "Cybersecurity isn't a
military problem." In fact when the Bush and Obama governments gave the
Pentagon a free hand to driftnet spy on the American people, Schneier
averred that programs like the NSA's warrantless wiretapping program
"created additional vulnerabilities in our domestic telephone networks."

Vulnerabilities not likely to be addressed by administration proposals that
would further weaken encryption standards and order telecommunications and
computer manufacturers to build surveillance-ready backdoors into their
devices and networks, as The New York Times
<http://www.nytimes.com/2010/09/27/us/27wiretap.html>  disclosed in
September.

Despite a warning last year by former DHS National Cyber Security division
head Amit Yoran that "the intelligence community has always and will always
prioritize its own collection efforts over the defensive and protection
mission of our government's and nation's digital systems," the
securitization of America's electronic networks is proceeding at break-neck
speed.

Describing the military's power-grab in benign terms, NSA/CYBERCOM director
Alexander characterized Pentagon operational plans as an "active defense,"
one that "hunts" inside a computer network "for malicious software, which
some experts say is difficult to do in open networks and would raise privacy
concerns if the government were to do it in the private sector," The
Washington Post reports.

An unnamed "senior defense official" described the process as an "ability to
push 'out as far as we can' beyond the network perimeter to 'where the
threat is coming from' in order to eliminate it."

Never mind that pushing out "as far as we can" will mean that the American
people will be subject to additional constitutional breaches or that current
Pentagon initiatives, such as NSA's warrantless wiretapping programs are not
subject to meaningful public oversight and are hidden beneath top secret
layers of classification and the continual invocation of the "state secrets"
privilege by the Bush and Obama administrations.

Regardless of which secret state agency comes out on top in the current
dispute, where choosing between the CIA and the Pentagon offers a Hobson's
choice of whether one prefers to be poisoned or shot, as Doug Henwood points
wrote in Left Business Observer
<http://lbo-news.com/2010/11/03/the-meaning-of-the-election/>  following the
mid-term elections: "A country that's rotting from the head, poisoned by
alienation, plutocracy, and an aversion to thinking, careens from one idiocy
to another."

And so it goes, on and on.

 



[Non-text portions of this message have been removed]



------------------------------------

--------------------------
Want to discuss this topic?  Head on over to our discussion list, 
[email protected].
--------------------------
Brooks Isoldi, editor
[email protected]

http://www.intellnet.org

  Post message: [email protected]
  Subscribe:    [email protected]
  Unsubscribe:  [email protected]


*** FAIR USE NOTICE. This message contains copyrighted material whose use has 
not been specifically authorized by the copyright owner. OSINT, as a part of 
The Intelligence Network, is making it available without profit to OSINT 
YahooGroups members who have expressed a prior interest in receiving the 
included information in their efforts to advance the understanding of 
intelligence and law enforcement organizations, their activities, methods, 
techniques, human rights, civil liberties, social justice and other 
intelligence related issues, for non-profit research and educational purposes 
only. We believe that this constitutes a 'fair use' of the copyrighted material 
as provided for in section 107 of the U.S. Copyright Law. If you wish to use 
this copyrighted material for purposes of your own that go beyond 'fair use,' 
you must obtain permission from the copyright owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtmlYahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/osint/

<*> Your email settings:
    Individual Email | Traditional

<*> To change settings online go to:
    http://groups.yahoo.com/group/osint/join
    (Yahoo! ID required)

<*> To change settings via email:
    [email protected] 
    [email protected]

<*> To unsubscribe from this group, send an email to:
    [email protected]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/

Reply via email to