PrisonPlanet Forum

***THE MAIN BOARDS - Welcome to the Prison Planet Educational Forum and Library*** => CISPA, NDAA, SOPA, Rex84, removing citizenship, 'Authorized Assassinations,' Nazi Drones and Other Fake 'Laws' l => General Discussion for the Prison Planet Educational Forum and Library => 4th Amendment Violations are a Threat to National Security => Topic started by: Optimus on August 03, 2011, 10:07:19 am

Title: NATO/Pentagon steal all private/corp/mil data from US/UN and blame China
Post by: Optimus on August 03, 2011, 10:07:19 am
Massive Global Cyberattack Targeting U.S., U.N. Discovered; Experts Blame China

Published August 03, 2011 |

The world's most extensive case of cyber-espionage, including attacks on U.S. government and U.N. computers, was revealed Wednesday by online security firm McAfee, and analysts are speculating that China is behind the attacks.

The spying was dubbed "Operation Shady RAT," or "remote access tool" by McAfee -- and it led to a massive loss of information that poses a huge economic threat, wrote vice president of threat research Dmitri Alperovitch

"What is happening to all this data -- by now reaching petabytes as a whole -- is still largely an open question," Alperovitch wrote on a blog detailing the threat. "However, if even a fraction of it is used to build better competing products or beat a competitor at a key negotiation (due to having stolen the other team’s playbook), the loss represents a massive economic threat."

Analysts told The Washington Post that the finger of blame for the infiltration of the 72 networks -- 49 of them in the U.S. -- points firmly in the direction of China.

California-based McAfee would only say it believed there was one "state actor" behind the attacks -- identified from logs tracked to a single server -- against a long list of victims, including the governments of the U.S., Taiwan, India, Canada and others; the International Olympic Committee; the U.N; and an array of high firms and defense contractors.

Read more:
Title: Re: False Flag Alert: Massive Global Cyberattack to Blame China
Post by: Optimus on August 03, 2011, 10:09:30 am
Revealed: Operation Shady RAT
Tuesday, August 2, 2011 at 9:14pm by Dmitri Alperovitch

Dmitri Alperovitch Download the PDF version of Operation Shady RAT report

For the last few years, especially since the public revelation of Operation Aurora, the targeted successful intrusion into Google and two dozen other companies, I have often been asked by our worldwide customers if they should worry about such sophisticated penetrations themselves or if that is a concern only for government agencies, defense contractors, and perhaps Google. My answer in almost all cases has been unequivocal: absolutely.

Having investigated intrusions such as Operation Aurora and Night Dragon (systemic long-term compromise of Western oil and gas industry), as well as numerous others that have not been disclosed publicly, I am convinced that every company in every conceivable industry with significant size and valuable intellectual property and trade secrets has been compromised (or will be shortly), with the great majority of the victims rarely discovering the intrusion or its impact. In fact, I divide the entire set of Fortune Global 2000 firms into two categories: those that know they’ve been compromised and those that don’t yet know.

Lately, with the rash of revelations about attacks on organizations such as RSA, Lockheed Martin, Sony, PBS, and others, I have been asked by surprised reporters and customers whether the rate of intrusions is increasing and if it is a new phenomenon. I find the question ironic because these types of exploitations have occurred relentlessly for at least a half decade, and the majority of the recent disclosures in the last six months have, in fact, been a result of relatively unsophisticated and opportunistic exploitations for the sake of notoriety by loosely organized political hacktivist groups such as Anonymous and Lulzsec. On the other hand, the targeted compromises — known as ‘Advanced Persistent Threats (APTs)’ (although this term lately lost much of its original meaning due to overzealous marketing tactics of various security companies, as well as to the desire by many victims to call anything they discover being successful at compromising their organizations as having been an APT) — we are focused on are much more insidious and occur largely without public disclosures. They present a far greater threat to companies and governments, as the adversary is tenaciously persistent in achieving their objectives. The key to these intrusions is that the adversary is motivated by a massive hunger for secrets and intellectual property; this is different from the immediate financial gratification that drives much of cybercrime, another serious but more manageable threat.

What we have witnessed over the past five to six years has been nothing short of a historically unprecedented transfer of wealth — closely guarded national secrets (including from classified government networks), source code, bug databases, email archives, negotiation plans and exploration details for new oil and gas field auctions, document stores, legal contracts, SCADA configurations, design schematics and much more has “fallen off the truck” of numerous, mostly Western companies and disappeared in the ever-growing electronic archives of dogged adversaries.

Title: Massive Global Cyberattack Targeting U.S., U.N. Discovered; Experts Blame China
Post by: donnay on August 03, 2011, 05:56:04 pm
Massive Global Cyberattack Targeting U.S., U.N. Discovered; Experts Blame China

The world's most extensive case of cyber-espionage, including attacks on U.S. government and U.N. computers, was revealed Wednesday by online security firm McAfee, and analysts are speculating that China is behind the attacks.

The spying was dubbed "Operation Shady RAT," or "remote access tool" by McAfee -- and it led to a massive loss of information that poses a huge economic threat, wrote vice president of threat research Dmitri Alperovitch.

"What is happening to all this data -- by now reaching petabytes as a whole -- is still largely an open question," Alperovitch wrote on a blog detailing the threat. "However, if even a fraction of it is used to build better competing products or beat a competitor at a key negotiation (due to having stolen the other team’s playbook), the loss represents a massive economic threat."

Analysts told The Washington Post that the finger of blame for the infiltration of the 72 networks -- 49 of them in the U.S. -- points firmly in the direction of China.

California-based McAfee would only say it believed there was one "state actor" behind the attacks -- identified from logs tracked to a single server -- against a long list of victims, including the governments of the U.S., Taiwan, India, Canada and others; the International Olympic Committee; the U.N; and an array of high firms and defense contractors.

Alperovitch admitted he was shocked by the scope of the scam.

"Even we were surprised by the enormous diversity of the victim organizations and were taken aback by the audacity of the perpetrators," he wrote in a 14-page report released on Wednesday.

As the threat of cyberwarfare grows, 56 percent of Americans believe the U.S. should be able to authorize cyberattacks when necessary, according to a poll posted on

McAfee researchers discovered a “command and control” server in 2009 while investigating some attacks against defense contractors, Reuters reported. In March of this year, they returned to that computer and found logs revealing all of the attacks, the agency said.

While McAfee investigators can only guess what exactly was stolen, McAfee's Alperovitch said the attacker looked for data that would give it military, diplomatic and economic advantage, Reuters reported.

McAfee found evidence of security breaches as far back as mid-2006, but said that it’s possible the hacking began before that, Reuters reported. Some attacks lasted just a month, while others lasted for more than two years.

The attacks were carried out using spear-phishing emails, which are tainted with malicious software, to specific people at the organizations they targeted. When people clicked on an infected link, the intruder was able to jump on to the machine and use it to infiltrate the organizations computer network, Reuters said.


The frequency and location of cyberattacks believed to have originated from China, according to research firm McAfee.

The hackers sought out sensitive data on U.S. military systems and satellite communications, with the snooping apparently going on for several years.

Companies in construction, steel, energy, solar power, technology, accounting and media were targeted.

The intrusion into the U.N. computer system in Geneva in 2008 went unnoticed for nearly two years, while the hackers quietly combed through files of secret data, according to McAfee.

The UN said it was aware of the report, and had started an investigation to ascertain if there was an intrusion.

Read more:

Title: Re: NATO/Pentagon steal all private/corp/mil data from US/UN and blame China
Post by: Dig on August 03, 2011, 06:20:50 pm
SHOCKING FBI ADMISSION: "We control the majority of cybercrime in the world"

Top 25% of world's hackers are under FBI control
The FBI and US secret service have used the threat of prison to create an army of cyber terrorists to control all cyber crime globally
Ed Pilkington in New York, Monday 6 June 2011 16.12 BST

A quarter of hackers in the US have been recruited by federal authorities, according to Eric Corley, publisher of the hacker quarterly, 2600. Photograph: Getty Images The underground world of computer hackers has been so thoroughly infiltrated in the US by the FBI and secret service that it is now riddled with paranoia and mistrust, with an estimated one in four hackers secretly informing on their peers, a Guardian investigation has established. Cyber policing units have had such success in forcing online criminals to co-operate with their investigations through the threat of long prison sentences that they have managed to create an army of informants deep inside the hacking community. In some cases, popular illegal forums used by cyber criminals as marketplaces for stolen identities and credit card numbers have been run by hacker turncoats acting as FBI moles. In others, undercover FBI agents posing as "carders" – hackers specialising in ID theft – have themselves taken over the management of crime forums, using the intelligence gathered to put dozens of people behind bars.

So ubiquitous has the FBI informant network become that Eric Corley, who publishes the hacker quarterly, 2600, has estimated that 25% of hackers in the US may have been recruited by the federal authorities to be their eyes and ears. "Owing to the harsh penalties involved and the relative inexperience with the law that many hackers have, they are rather susceptible to intimidation," Corley told the Guardian. "It makes for very tense relationships," said John Young, who runs Cryptome, a website depository for secret documents along the lines of WikiLeaks. "There are dozens and dozens of hackers who have been shopped by people they thought they trusted." The best-known example of the phenomenon is Adrian Lamo, a convicted hacker who turned informant on Bradley Manning, who is suspected of passing secret documents to WikiLeaks. Manning had entered into a prolonged instant messaging conversation with Lamo, whom he trusted and asked for advice. Lamo repaid that trust by promptly handing over the 23-year-old intelligence specialist to the military authorities. Manning has now been in custody for more than a year. For acting as he did, Lamo has earned himself the sobriquet of Judas and the "world's most hated hacker", though he has insisted that he acted out of concern for those he believed could be harmed or even killed by the WikiLeaks publication of thousands of US diplomatic cables. "Obviously it's been much worse for him but it's certainly been no picnic for me," Lamo has said. "He followed his conscience, and I followed mine."

The latest challenge for the FBI in terms of domestic US breaches are the anarchistic co-operatives of "hacktivists" that have launched several high-profile cyber-attacks in recent months designed to make a statement. In the most recent case a group calling itself Lulz Security launched an audacious raid on the FBI's own linked organisation InfraGard. The raid, which was a blatant two fingers up at the agency, was said to have been a response to news that the Pentagon was poised to declare foreign cyber-attacks an act of war. Lulz Security shares qualities with the hacktivist group Anonymous that has launched attacks against companies including Visa and MasterCard as a protest against their decision to block donations to WikiLeaks. While Lulz Security is so recent a phenomenon that the FBI has yet to get a handle on it, Anonymous is already under pressure from the agency. There were raids on 40 addresses in the US and five in the UK in January, and a grand jury has been hearing evidence against the group in California at the start of a possible federal prosecution. Kevin Poulsen, senior editor at Wired magazine, believes the collective is classically vulnerable to infiltration and disruption. "We have already begun to see Anonymous members attack each other and out each other's IP addresses. That's the first step towards being susceptible to the FBI." Barrett Brown, who has acted as a spokesman for the otherwise secretive Anonymous, says it is fully aware of the FBI's interest. "The FBI are always there. They are always watching, always in the chatrooms. You don't know who is an informant and who isn't, and to that extent you are vulnerable."
Title: Re: NATO/Pentagon steal all private/corp/mil data from US/UN and blame China
Post by: Dig on August 03, 2011, 06:22:07 pm
US creates a "Cyber Al-Qaeda" to destroy sovereign countries
Clinton cites 'historic opportunity" to manufacture a new enemy for the future

The Obama administration is leading a global effort to deploy “shadow” Internet and mobile phone systems that dissidents can use to undermine repressive governments that seek to silence them by censoring or shutting down telecommunications networks. The effort includes secretive projects to create independent cellphone networks inside foreign countries, as well as one operation out of a spy novel in a fifth-floor shop on L Street in Washington, where a group of young entrepreneurs who look as if they could be in a garage band are fitting deceptively innocent-looking hardware into a prototype “Internet in a suitcase.” Financed with a $2 million State Department grant, the suitcase could be secreted across a border and quickly set up to allow wireless communication over a wide area with a link to the global Internet. The American effort, revealed in dozens of interviews, planning documents and classified diplomatic cables obtained by The New York Times, ranges in scale, cost and sophistication. Some projects involve technology that the United States is developing; others pull together tools that have already been created by hackers in a so-called liberation-technology movement sweeping the globe.

The State Department, for example, is financing the creation of stealth wireless networks that would enable activists to communicate outside the reach of governments in countries like Iran, Syria and Libya, according to participants in the projects. In one of the most ambitious efforts, United States officials say, the State Department and Pentagon have spent at least $50 million to create an independent cellphone network in Afghanistan using towers on protected military bases inside the country. It is intended to offset the Taliban’s ability to shut down the official Afghan services, seemingly at will. The effort has picked up momentum since the government of President Hosni Mubarak shut down the Egyptian Internet in the last days of his rule. In recent days, the Syrian government also temporarily disabled much of that country’s Internet, which had helped protesters mobilize.

The Obama administration’s initiative is in one sense a new front in a longstanding diplomatic push to defend free speech and nurture democracy. For decades, the United States has sent radio broadcasts into autocratic countries through Voice of America and other means. More recently, Washington has supported the development of software that preserves the anonymity of users in places like China, and training for citizens who want to pass information along the government-owned Internet without getting caught.  But the latest initiative depends on creating entirely separate pathways for communication. It has brought together an improbable alliance of diplomats and military engineers, young programmers and dissidents from at least a dozen countries, many of whom variously describe the new approach as more audacious and clever and, yes, cooler. Sometimes the State Department is simply taking advantage of enterprising dissidents who have found ways to get around government censorship. American diplomats are meeting with operatives who have been burying Chinese cellphones in the hills near the border with North Korea, where they can be dug up and used to make furtive calls, according to interviews and the diplomatic cables.

The new initiatives have found a champion in Secretary of State Hillary Rodham Clinton, whose department is spearheading the American effort. “We see more and more people around the globe using the Internet, mobile phones and other technologies to make their voices heard as they protest against injustice and seek to realize their aspirations,” Mrs. Clinton said in an e-mail response to a query on the topic. “There is a historic opportunity to effect positive change, change America supports,” she said. “So we’re focused on helping them do that, on helping them talk to each other, to their communities, to their governments and to the world.” Developers caution that independent networks come with downsides: repressive governments could use surveillance to pinpoint and arrest activists who use the technology or simply catch them bringing hardware across the border. But others believe that the risks are outweighed by the potential impact. “We’re going to build a separate infrastructure where the technology is nearly impossible to shut down, to control, to surveil,” said Sascha Meinrath, who is leading the “Internet in a suitcase” project as director of the Open Technology Initiative at the New America Foundation, a nonpartisan research group. “The implication is that this disempowers central authorities from infringing on people’s fundamental human right to communicate,” Mr. Meinrath added.

The invisible Web
In an anonymous office building on L Street in Washington, four unlikely State Department contractors sat around a table. Josh King, sporting multiple ear piercings and a studded leather wristband, taught himself programming while working as a barista. Thomas Gideon was an accomplished hacker. Dan Meredith, a bicycle polo enthusiast, helped companies protect their digital secrets. Then there was Mr. Meinrath, wearing a tie as the dean of the group at age 37. He has a master’s degree in psychology and helped set up wireless networks in underserved communities in Detroit and Philadelphia. The group’s suitcase project will rely on a version of “mesh network” technology, which can transform devices like cellphones or personal computers to create an invisible wireless web without a centralized hub. In other words, a voice, picture or e-mail message could hop directly between the modified wireless devices — each one acting as a mini cell “tower” and phone — and bypass the official network. Mr. Meinrath said that the suitcase would include small wireless antennas, which could increase the area of coverage; a laptop to administer the system; thumb drives and CDs to spread the software to more devices and encrypt the communications; and other components like Ethernet cables.

The project will also rely on the innovations of independent Internet and telecommunications developers. “The cool thing in this political context is that you cannot easily control it,” said Aaron Kaplan, an Austrian cybersecurity expert whose work will be used in the suitcase project. Mr. Kaplan has set up a functioning mesh network in Vienna and says related systems have operated in Venezuela, Indonesia and elsewhere. Mr. Meinrath said his team was focused on fitting the system into the bland-looking suitcase and making it simple to implement — by, say, using “pictograms” in the how-to manual. In addition to the Obama administration’s initiatives, there are almost a dozen independent ventures that also aim to make it possible for unskilled users to employ existing devices like laptops or smartphones to build a wireless network. One mesh network was created around Jalalabad, Afghanistan, as early as five years ago, using technology developed at the Massachusetts Institute of Technology. Creating simple lines of communication outside official ones is crucial, said Collin Anderson, a 26-year-old liberation-technology researcher from North Dakota who specializes in Iran, where the government all but shut down the Internet during protests in 2009. The slowdown made most “circumvention” technologies — the software legerdemain that helps dissidents sneak data along the state-controlled networks — nearly useless, he said. “No matter how much circumvention the protesters use, if the government slows the network down to a crawl, you can’t upload YouTube videos or Facebook postings,” Mr. Anderson said. “They need alternative ways of sharing information or alternative ways of getting it out of the country.” That need is so urgent, citizens are finding their own ways to set up rudimentary networks. Mehdi Yahyanejad, an Iranian expatriate and technology developer who co-founded a popular Persian-language Web site, estimates that nearly half the people who visit the site from inside Iran share files using Bluetooth — which is best known in the West for running wireless headsets and the like. In more closed societies, however, Bluetooth is used to discreetly beam information — a video, an electronic business card — directly from one cellphone to another. Mr. Yahyanejad said he and his research colleagues were also slated to receive State Department financing for a project that would modify Bluetooth so that a file containing, say, a video of a protester being beaten, could automatically jump from phone to phone within a “trusted network” of citizens. The system would be more limited than the suitcase but would only require the software modification on ordinary phones. By the end of 2011, the State Department will have spent some $70 million on circumvention efforts and related technologies, according to department figures. Mrs. Clinton has made Internet freedom into a signature cause. But the State Department has carefully framed its support as promoting free speech and human rights for their own sake, not as a policy aimed at destabilizing autocratic governments.  That distinction is difficult to maintain, said Clay Shirky, an assistant professor at New York University who studies the Internet and social media. “You can’t say, ‘All we want is for people to speak their minds, not bring down autocratic regimes’ — they’re the same thing,” Mr. Shirky said.  He added that the United States could expose itself to charges of hypocrisy if the State Department maintained its support, tacit or otherwise, for autocratic governments running countries like Saudi Arabia or Bahrain while deploying technology that was likely to undermine them.

Shadow cellphone system
In February 2009, Richard C. Holbrooke and Lt. Gen. John R. Allen were taking a helicopter tour over southern Afghanistan and getting a panoramic view of the cellphone towers dotting the remote countryside, according to two officials on the flight. By then, millions of Afghans were using cellphones, compared with a few thousand after the 2001 invasion. Towers built by private companies had sprung up across the country. The United States had promoted the network as a way to cultivate good will and encourage local businesses in a country that in other ways looked as if it had not changed much in centuries. There was just one problem, General Allen told Mr. Holbrooke, who only weeks before had been appointed special envoy to the region. With a combination of threats to phone company officials and attacks on the towers, the Taliban was able to shut down the main network in the countryside virtually at will. Local residents report that the networks are often out from 6 p.m. until 6 a.m., presumably to enable the Taliban to carry out operations without being reported to security forces. The Pentagon and State Department were soon collaborating on the project to build a “shadow” cellphone system in a country where repressive forces exert control over the official network. Details of the network, which the military named the Palisades project, are scarce, but current and former military and civilian officials said it relied in part on cell towers placed on protected American bases. A large tower on the Kandahar air base serves as a base station or data collection point for the network, officials said. A senior United States official said the towers were close to being up and running in the south and described the effort as a kind of 911 system that would be available to anyone with a cellphone. By shutting down cellphone service, the Taliban had found a potent strategic tool in its asymmetric battle with American and Afghan security forces. The United States is widely understood to use cellphone networks in Afghanistan, Iraq and other countries for intelligence gathering. And the ability to silence the network was also a powerful reminder to the local populace that the Taliban retained control over some of the most vital organs of the nation. When asked about the system, Lt. Col. John Dorrian, a spokesman for the American-led International Security Assistance Force, or ISAF, would only confirm the existence of a project to create what he called an “expeditionary cellular communication service” in Afghanistan. He said the project was being carried out in collaboration with the Afghan government in order to “restore 24/7 cellular access.” “As of yet the program is not fully operational, so it would be premature to go into details,” Colonel Dorrian said.  Colonel Dorrian declined to release cost figures. Estimates by United States military and civilian officials ranged widely, from $50 million to $250 million. A senior official said that Afghan officials, who anticipate taking over American bases when troops pull out, have insisted on an elaborate system. “The Afghans wanted the Cadillac plan, which is pretty expensive,” the official said.

Broad subversive effort
In May 2009, a North Korean defector named Kim met with officials at the American Consulate in Shenyang, a Chinese city about 120 miles from North Korea, according to a diplomatic cable. Officials wanted to know how Mr. Kim, who was active in smuggling others out of the country, communicated across the border. “Kim would not go into much detail,” the cable says, but did mention the burying of Chinese cellphones “on hillsides for people to dig up at night.” Mr. Kim said Dandong, China, and the surrounding Jilin Province “were natural gathering points for cross-border cellphone communication and for meeting sources.” The cellphones are able to pick up signals from towers in China, said Libby Liu, head of Radio Free Asia, the United States-financed broadcaster, who confirmed their existence and said her organization uses the calls to collect information for broadcasts as well.  The effort, in what is perhaps the world’s most closed nation, suggests just how many independent actors are involved in the subversive efforts. From the activist geeks on L Street in Washington to the military engineers in Afghanistan, the global appeal of the technology hints at the craving for open communication.  In a chat with a Times reporter via Facebook, Malik Ibrahim Sahad, the son of Libyan dissidents who largely grew up in suburban Virginia, said he was tapping into the Internet using a commercial satellite connection in Benghazi. “Internet is in dire need here. The people are cut off in that respect,” wrote Mr. Sahad, who had never been to Libya before the uprising and is now working in support of rebel authorities. Even so, he said, “I don’t think this revolution could have taken place without the existence of the World Wide Web.”

Turkey arrests Pentagon funded Cyber Terror Patsies
By Agence France-Presse
Tuesday, June 14th, 2011 -- 4:34 pm

Turkish police have detained 32 suspected members of the online cyberactivism collective Anonymous, over possible links to attacks on a number of websites. The arrests were in response to a complaint from Turkey's Directorate of Telecommunications, whose website was taken down last Thursday as part of a protest against what Anonymous has said is government censorship of the internet. The Anatolia news agency reported on Tuesday that nine minors out of the group of 32 suspects had been released without charges, but that the remaining 23 were still being questioned. Turkey, whose ruling AKP party won a parliamentary vote on Sunday, plans to introduce a new internet filtering system in August, under which users will have to sign up for one of four filters - domestic, family, children and standard. Anonymous, a loose activist collective that previously attacked websites including Amazon and Mastercard, says the system will make it possible to keep records of people's online activity. Last week access to Turkey's telecoms authority website, identified as a main target in the group's "Operation Turkey" campaign was blocked at 1500GMT on Thursday. In a posting on its official website, Anonymous issued a statement pledging to fight what it said was internet censorship there. There has been a crackdown on the group in recent days. Last week Spanish police arrested three suspected members of the group on charges of cyber attacks against targets including Sony Corp's PlayStation Network, governments, businesses and banks. Police on Friday alleged the three arrested 'hacktivists' had been involved in recent attacks on the Japanese electronics manufacturer, Spanish banks BBVA and Bankia and Italian energy group Enel SpA. The arrests are the first in Spain against members of Anonymous following similar legal proceedings in the US and Britain. Police said all three men were Spanish and in their 30s. One worked in the merchant navy. The suspected Anonymous members, who were arrested in Almeria, Barcelona and Alicante, were guilty of co-ordinated computer hacking attacks from a server set up in a house in Gijon in the north of Spain, the Spanish police said. Sony shocked gamers in late April by revealing that hackers had stolen personal information from the accounts of 77 million users of its online video-games network. A week later, it said hackers had stolen data from another 25 million users of its computer games system. Sony's PlayStation Network was crippled for a month as the company tried to find and fix the problem. Anonymous, a loose grouping of activists which has carried out cyber attacks on organisations including Sony in the past, said at the time it was not responsible for those attacks and had no interest in stealing credit-card details. Its members describe themselves as internet freedom fighters and have previously brought down the websites of the Church of Scientology, Amazon, Mastercard and others they saw as hostile to WikiLeaks.
Title: Re: NATO/Pentagon steal all private/corp/mil data from US/UN and blame China
Post by: Dig on August 03, 2011, 06:22:54 pm
Prepare for Cyber-War Tonkin Gulf False-Flag Attacks From the US
by Jack D. Douglas June 3, 2011

The U.S. and almost all nations today in our age of mass societies and Big Media Propaganda whip up war-lust among their people before attacking other nations.

The Nazis were masters of false-flag attacks, such as dressing up dead men in Polish uniforms and planting them on German soil and then screaming "Poland Is invading Germany!," which Poland would have done only if they had gone totally insane because it was obvious that Germany could annihilate them quickly, as it did after the false-flag attacks whipped the German people up for war [though probably not as much as the Nazis hoped to do].

The U.S. always goes to war ONLY under waving banners of righteous indignation over "Enemy attacks on the U.S.," "Terrorist threats against the U.S." and so on. Some of these immense Media Propaganda Barrages on Americans have been carefully whipped up by the administration in power, as Wilson did to prep Americans for WWI and as FDR did to push the U.S. into WWII to save the U.K. Some have been totally false-flag Big Lies, as was LBJ's "North Vietnamese attack on U.S. ships in the Tonkin Gulf" and Bush 2's "Iraqi WMD's Threaten America!" Some have been attacks by some small group within a huge nation, such as al-Queda in Afghanistan, which the U.S. used as a pretext for annihilating the whole nation with immense bomb and rocket attacks and then invading the whole nation and occupying it and killing and maiming and uprooting masses of people. I

The U.S. has been working furiously to develop Cyber-War technologies, both offensive and defensive. The U.S. apparently worked with Israel to launch an extremely complex and dangerous Cyber-War Attack on Iran's nuclear energy facilities in total secrecy and with not the slightest provocation from any Cyber Attacks from Iran, not even alleged, since Iran was hardly working on Cyber-War and that's how they got hit so hard by the secret Stuxnet attack on their nuclear energy programs.

Now the U.S. is openly declaring that it will use "Cyber Attacks" on important U.S. facilities as "causes of just war" for counter attacks with conventional military forces.

It will be totally easy for the U.S. to fake Cyber-Attacks on the U.S. any time they want from any supposed source in the world.

The world will come to see this as a threat to all developed nations from U.S. military attacks, as soon as they digest this news and think it out.

The U.S. has started another great armaments races, just as it did with nuclear weapons and many others. LIke all paranoids, the U.S. will insist "They're the ones attacking us!" but in fact it is the U.S. attacking the world, as it attacked Vietnam, Afghanistan, Iraq, Somalia [many times], Yemen, Iran......

Nations with great high-tech capabilities and futures, such as China and Russia and Iran and India and Europe, must now arm themselves for cyber-war with the U.S. and conventional war.

As long as the American people believe these Big Military-Industrial-High Tech Lies, the U.S. will continue using them to produce terrible wars against largely defenseless little nations and then losing the immense wars to the tiny guerilla armies of peasants defending their homes and families.

Like paranoids so commonly, the U.S. has turned almost everyone against it, though few dare say so publicly to the Superpower. The U.S. sees enemies everywhere even when there are none and this makes everyone eventually an enemy. Paranoids become unintentional self-murderers.

The sane and reasonable and judicious thing for the U.S. to do would be to develop better and better DEFENSES AGAINST CYBER-ATTACKS, exactly as the U.S. private high-tech world is doing, not using "possible" future cyber-attacks as a justification for developing cyber-offenses and threatening all out military attacks.

Jack D. Douglas [send him mail] is a retired professor of sociology from the University of California at San Diego. He has published widely on all major aspects of human beings, most notably The Myth of the Welfare State.

IMF hit by Pentagon funded hackers to be blammed on a foreign government
12-Jun-11, 7:50 AM | Reuters

The International Monetary Fund has been hit by a cyber attack on its computer systems, an IMF spokesman said on Saturday, highlighting a growing rash of network break-ins at high-profile institutions. "The fund is fully functional," said IMF spokesman David Hawley. "I can confirm that we are investigating an incident. I am not in a position to elaborate further on the extent of the cybersecurity incident." Bloomberg News reported the IMF's computer system was attacked by hackers "believed to be connected to a foreign government, resulting in the loss of e-mails and other documents." The attack occurred before the May 14 arrest of former IMF Managing Director Dominique Strauss-Kahn on sexual assault charges, Bloomberg said. It did not identify a suspect government. Cybersecurity experts say it is very difficult to trace a sophisticated cyber break-in to its ultimate source. An official with the World Bank, the IMF's sister institution in Washington, said the World Bank had cut its network connection with the IMF out of "caution." The information shared on that link was "non sensitive info," the official added. "The World Bank Group, like any other large organization, is increasingly aware of potential threats to the security of our information system and we are constantly working to improve our defenses," said World Bank spokesman Rich Mills. The IMF, which has sensitive information on the economies of many nations, was hit during the last several months by what computer experts described as a large and sophisticated cyber attack, The New York Times reported. The newspaper said the IMF's board of directors was told on Wednesday about the attack. Experts say cyber threats are increasing worldwide. CIA Director Leon Panetta told the U.S. Congress this week the United States faces the "real possibility" of a crippling cyber attack. "The next Pearl Harbor that we confront," he said, could be a cyber attack that "cripples our power systems, our grid, our security systems, our financial systems, our governmental systems." "This is a real possibility in today's world," Panetta told his June 9 confirmation hearing in his bid to become the next U.S. defense secretary.

Internal IMF memos had warned employees to be on their guard. "Last week we detected some suspicious file transfers, and the subsequent investigation established that a Fund desktop computer had been compromised and used to access some Fund systems," said a June 8 email to employees from Chief Information Officer Jonathan Palmer. Details of the email were first reported by Bloomberg. Reuters' sources confirmed the wording of the email. "At this point, we have no reason to believe that any personal information was sought for fraud purposes," the message to employees said. The incident comes when attacks on computer systems are said by experts to be on the rise -- notably those targeting major companies and potentially compromising government security and customer information. For instance, Lockheed Martin Corp, the Pentagon's No. 1 supplier by sales and the biggest information technology provider to the U.S. government, disclosed two weeks ago that it had thwarted a "significant" cyberattack and said it was a "frequent target of adversaries around the world." Also hit recently have been Citigroup Inc, Sony Corp and Google. The attack on Lockheed followed the compromise of "SecurID" electronic keys issued by EMC's Ltd RSA Security division. SecurIDs are widely used electronic keys to computer systems, designed to thwart hackers by requiring two passcodes: one that is fixed and another that is automatically generated every few seconds by the security system. SecurIDs are used at the World Bank for remote log-ins. As an extra precaution, employees receive an automatic email each time they log in from outside, to flag the operation in case it was originated fraudulently by someone else, a World Bank staff member said. The IMF is seeking a new head following the resignation of Strauss-Kahn after he was charged with the sexual assault of a New York hotel maid.
Title: Re: NATO/Pentagon steal all private/corp/mil data from US/UN and blame China
Post by: Dig on August 03, 2011, 06:24:28 pm
Hayden calls for a "DIGITAL-BLACKWATER" to instigate violent cyber false flags

I cannot even believe all of the open acts of treason committed at every Aspen Institute meeting:

Former Bush NSA director calls for ‘digital Blackwater’
Posted on 07.30.11 By David Edwards

The man who headed the NSA and CIA under President George W. Bush suggested Friday that mercenaries were needed to deal with growing cyber threats.

Gen. Michael Hayden told the Aspen Security Forum that in the near future, the Department of Defense may have to allow the creation of a “digital Blackwater.”

Private sector offense “might be one of those big new ideas in terms of how we have to conduct ourselves in this new cyber domain,” Hayden explained. “You think back long enough in history and there are times when the private sector was responsible for its own defense.”

“We may come to a point where defense is more actively and aggressively defined even for the private sector and what is permitted there is something that we would never let the private sector do in physical space… Let me really throw out a bumper sticker for you. How about a digital Blackwater?” he suggested.

“I mean, we have privatized certain defense activities even in physical space and now you’ve got a new domain in which we don’t have any paths trampled down in the forest in terms of what it is we expect the government or will allow the government to do. In the past when that has happened, private sector expands to fill the empty space. I’m not quite and advocate for that but these are the kinds of things that are going to be put into play soon.”

Watch the entire Aspen Security Forum on cyber security here.

Watch this video from the Aspen Institute, broadcast July 29, 2011.

Please read the following at least 5x:

“I mean, we have privatized certain defense activities even in physical space and now you’ve got a new domain in which we don’t have any paths trampled down in the forest in terms of what it is we expect the government or will allow the government to do. In the past when that has happened, private sector expands to fill the empty space. I’m not quite an advocate for that but these are the kinds of things that are going to be put into play soon.”

He is saying that the people would never allow the government to engage in such wanton mass murder, but with a 'digital blackwater.' the government is shielded from the private groups' actions.

That statement right before this one where he mentions a 'digital blackwater' proves that blackwater was always set up to shield the US government and anti-constitutional military globalists by blaming all the crap on blackwater.

This also proves that the agenda is to never truly investigate blackwater, to never really target blackwater because they are just fulfilling their contract. Their contract is to engage in indiscriminate mass murder, false flags, manufacture chaos, act as inhumane to the native populations as possible. When they were targeting Eric Prince, he slipped through the cracks oddly enough. Now we know why, he could have just explained what was really going on. The New World Order need both physical and digital blackwaters to rob US wealth and transform a healthy society into a destabilized warzone.

And psychopathic delusional trilateral terrorist General Hayden is proud to proclaim such treasonous statements at Bilderberg's Aspen Institute meeting.
Title: Re: NATO/Pentagon steal all private/corp/mil data from US/UN and blame China
Post by: Dig on August 03, 2011, 06:25:46 pm
NWO/MIC planning to attack U.S. /w Stuxnet, blame patsies & usher in tyranny

DHS Fears a Modified Stuxnet Could Attack U.S. Infrastructure
By Kim Zetter     July 26, 2011  |  5:51 pm


One year after the discovery of a sophisticated worm that was used to attack centrifuges in Iran’s nuclear program, the U.S. Department of Homeland Security told Congress it fears the same attack could now be used against critical infrastructures in the U.S.

DHS “is concerned that attackers could use the increasingly public information about the code to develop variants targeted at broader installations of programmable equipment in control systems. Copies of the Stuxnet code, in various different iterations, have been publicly available for some time now,” Bobbie Stempfley, acting assistant secretary for the DHS Office of Cybersecurity and Communications, told the House Subcommittee on Oversight and Investigations (.pdf) on Tuesday.

The testimony comes in the wake of accusations that the U.S. was itself responsible, along with Israel, for developing and unleashing Stuxnet into the wild, thereby making it possible for the hackers, nation-state attackers and terrorists that DHS fears, to now repurpose the malware for use against critical infrastructure systems in the U.S.

Stuxnet, considered to be the first cyberweapon discovered in the wild, was found on a computer in Iran in June 2010 and was believed to have been launched in June 2009.

Private researchers who spent months digging through the code, discovered that the sophisticated malware was designed to target a specific industrial control system made by Siemens, and replace legitimate commands in the system with malicious ones. But Stuxnet wasn’t out to destroy just any Siemens system – it sought out the specific system believed to be installed at Iran’s nuclear enrichment plant at Natanz. Any system that didn’t have the same configuration as the system Stuxnet targeted would go unharmed.

Although Stuxnet was designed to attack a specific system, researchers like Ralph Langner have pointed out that the malware could be easily tweaked to attack other industrial control systems around the world. According to Langner, an attacker would need “zero insider information and zero programming skills at the controller level in order to perform a Stuxnet-inspired attack” against other control systems.

Langner and others have vocally criticized DHS and ICS-CERT for failing to provide adequate information about Stuxnet in a timely manner. But in its testimony to Congress, DHS touted the efforts it made to analyze Stuxnet after its discovery and provide government and private entities with the information they needed to mitigate the affects of a Stuxnet infection.

“To date, ICS-CERT has briefed dozens of government and industry organizations and released multiple advisories and updates to the industrial control systems community describing steps for detecting an infection and mitigating the threat,” DHS claimed in its testimony.

The testimony came just one day after the surprise news that one of the nation’s top cybersecurity czars resigned abruptly and mysteriously from his job. Randy Vickers had been director of U.S.-CERT (Computer Emergency Readiness Team), a division of DHS that is responsible, in part, for coordinating the defense of federal networks and working with the private sector to mitigate cyberattacks against the nation’s critical infrastructure. Vickers resigned July 22, effectively immediately, according to an e-mail that Stempfley reportedly sent to DHS staff. Vickers’ Linked-in profile had already been changed to indicate his departed status from US-CERT by the time the news went public. DHS did not give any reason for Vickers’ abrupt departure.

Photo courtesy Office of Presidency of the Republic of Iran

And when the false flag occurs, they will say: "if only we had the power to monitor social networks"

guess what, they always had this power, they were set up to be controlled and contained platforms to begin with.

NSA regards all social media as government owned weapons to use any way it likes
Posted on Wednesday Jul 27th at 5:21pm

The National Security Agency (NSA) aims to use social media and improved data sharing as part of an enhanced strategy to fight organized crime in the United States and abroad.

The White House has launched the Strategy to Combat Transnational Organized Crime to step up its efforts to fight this type of crime by better integrating diverse work from various agencies that collect intelligence data and track and investigate these types of criminals.

The new plan is the result of a year-long study of the current state of these types of crimes, the most comprehensive of its kind in 15 years, according to a White House blog post.

The feds in general have been working across various agencies that are responsible for crime investigations and the protection of the general public--such as the FBI, Department of Homeland Security, and the Department of Defense--to better share information. Often agencies with different responsibilities for investigation don't communicate effectively with each other, a problem the federal government has been trying to remedy through the use of technology.

The same is the case with those investigating organized crime, and the new strategy aims to fix that by coordinating information sharing among various organizations and specialized intelligence centers that are responsible for handling these types of crimes.

This will involve the Cyber Crimes Center to coordinate the collection and analysis of intelligence regarding various aspects of the threat from transnational organized crime, according to the strategy, which is posted online.

The plan also includes the NSA coordinating with the interagency International Organized Crime Intelligence and Operations Center (IOC-2) to use existing resources and databases of the Organized Crime Drug Enforcement Task Force Fusion Center (OCDETF) and the Drug Enforcement Agency's Special Operations Division to share intelligence and produce leads for investigators and prosecutors working across the United States, according to the plan.

The IOC-2, formed in 2009, collects information from law-enforcement agencies and federal prosecutors to fight organized crime, while the OCDETF--set up 2006--serves as a central warehouse for drug and financial intelligence as well as provides cross-agency analysis and integration of that data.

Social networks also will play a role in helping the NSA track organized criminals. Through the federal Open Source Center, which provides intelligence information from around the world, the NSA will use social media, among other online outlets, to develop profiles of individuals, companies and institutions linked to transnational organized crime networks, according to the plan.

What industry can teach government about IT innovation and efficiency. Also in the new, all-digital issue of InformationWeek Government: Federal agencies have to shift from annual IT security assessments to continuous monitoring of their risks. Download it now. (Free registration required.)
Title: Re: NATO/Pentagon steal all private/corp/mil data from US/UN and blame China
Post by: Dig on August 03, 2011, 06:27:40 pm
Raytheon Lobbyist (and Dep. Sec. Def.) William Lynn: I own your computer, slave!

Pentagon to treat cyberspace as operational domain

Deputy Defense Secretary William Lynn unveiled a new U.S. strategy on Thursday for protecting military computer networks, moving away from a passive defense toward treating cyberspace as an "operational domain" in which trained forces defend against attacks.

Lynn, in a speech at the National Defense University at Fort McNair, said the Pentagon wanted to avoid militarizing cyberspace but at the same time secure strategic networks, both by threat of retaliation and by mounting an effective defense.

"Our ability to identify and respond to a serious cyber attack is ... only part of the strategy. Our strategy's overriding emphasis is on denying the benefit of an attack," he said. "If an attack will not have its intended effect, those who wish us harm will have less reason to target us through cyberspace in the first place."

He said as part of its active defenses, the Pentagon would introduce new operating concepts and capabilities on its networks, such as sensors, software and signatures to detect and stop malicious code before it affects U.S. operations.

"Far from militarizing cyberspace, our strategy of securing networks to deny the benefit of an attack will help dissuade military actors from using cyberspace for hostile purposes," Lynn said.


William Lynn III is the biggest Raytheon lobbyist ever. His entire soul is a bona fide conflict of interest. His goal is to serve up every electronic device for Raytheon to utilize in NWO false flag and red teaming operations.

This has been planned for years, here is the entire agenda which is 100% illegal, seditious, and treasonous as it directly stifles commerce, rights of man, and just plain common decency.

Here is a bit about the agenda of the DIRT bags...
Information Warfare allows obstruction of Posse Comitatus

Brian K. Houghton
Doctoral Fellow

Offensive information warfare techniques developed for military use at a state level could also be utilized to respond to information terrorism. Law enforcement agencies, in general, do not have similar offensive information warfare capabilities. For this reason a specialized and integrated counter information terrorism group is required. These highly trained information warriors would be the national security equivalent of Carnegie Mellon’s Computer Emergency Response Team, but with an offensive capability. Like a “Digital Delta Force” these Digital Integrated Response Teams (DIRTs) would work from remote computer systems and use information warfare tactics to detect, locate and counter the information terrorists. The DIRTs would be in networked remote cells inside CONUS (with one on the East and West coasts, and an additional cell in the Midwest). The DIRTs would exploit law enforcement IT-oriented assets, investigative capabilities, and intelligence bases. The DIRTs, created by Executive Order, would operate as a cell of the National Security Council and take its directives from the information terrorism counterpart to the White House “Drug Czar.”

These information warriors, comprised of members from the Joint Services, as well as Justice and Treasury Departments, would strike using digital means against computers and networks used by the information terrorists. Using an anonymous response, the U.S. government could strike at information terrorists without large display or legitimizing the terrorists, both of which would occur with a physical response. Such a response offers ultimate plausible denial. In addition, the DIRTs close integration with law enforcement agencies would provide legal guidance and accountability, and avoid a “Posse Comitatus” syndrome.

This structure would combine the investigative and jurisdictional assets of the law enforcement community with the offensive capabilities of the military. If the United States is going to enter the Information Age, we need to have policy that spans the spectrum of information-related threats to our national security, driving offensive and defensive assets that can respond symmetrically and effectively. Our offensive capabilities against peer or near-peer competitors are formidable, whether in information or conventional warfare.
Title: Re: NATO/Pentagon steal all private/corp/mil data from US/UN and blame China
Post by: Dig on August 03, 2011, 06:29:24 pm
Here is the agenda, all cyberspace will be controlled by deception...this is their blueprint for the future...

A Framework for Deception

by Fred Cohen, Dave Lambert, Charles Preston, Nina Berry, Corbin Stewart, and Eric Thomas


Executive Summary

This paper overviews issues in the use of deception for information protection. Its objective is to create a framework for deception and an understanding of what is necessary for turning that framework into a practical capability for carrying out defensive deceptions for information protection.
[1] Sun Tzu, "The Art of War", (Translated by James Clavell), Dell Publishing, New York, NY 10036 (1983).
[2] David Kahn, "The Code Breakers", Macmillan Press, New York, 1967
[3] Robert E. Huber, "Information Warfare: Opportunity Born of Necessity", News Briefs, September-October 1983, Vol. IX, Num. 5, "Systems Technology" (Sperry Univac) pp 14-21.
[4] Tom Keaton, "A History of Warfare", Vintage Books, NY, 1993
[5] Robert W. Mitchell and Nicholas S. Thompson, "DECEPTION: Perspectives on human and nonhuman deceipt", SUNY Press, 1986, NY.
[6] Andrew Wilson, "The Bomb and The Computer", Delacorte Press, NY, 1968.
[7] Field Manual 90-02: Battlefield Deception, 1998.
[8] Bart Whaley, "Stratagem: Deception and Surprise in War", Cambridge: MIT Center for International Studies. 1969
[9] James F. Dunnigan and Albert A. Nofi, "Victory and Deceipt: Dirty Tricks at War", William Morrow and Co., New York, NY, 1995.
[10] Colonel Michael Dewar, "The Art of Deception in Warfare", David and Charles Military Books, 1989.
[11] Knowledge Systems Corporation, "C3CM Planning Analyzer: Functional Description (Draft) First Update", RADC/COAD Contract F30602-87-C-0103, December 12, 1987.
[12] William L. Griego, "Deception - A 'Systematic Analytic' Approach", (slides from 1978, 1983)
[13] Gordon Stein, "Encyclopedia of Hoaxes", Gale Research, Inc, 1993, p. 293.
[14] Chuck Whitlock, "Scam School", MacMillan, 1997.
[15] Fay Faron, "Rip-Off: a writer's guide to crimes of deception", Writers Digest Books, 1998, Cinn, OH.
[16] Bob Fellows, "Easily Fooled", Mind Matters, PO Box 16557, Minneapolis, MN 55416, 2000
[17] Thomas Gilovich, "How We Know What Isn't So: The fallibility of human reason in everyday life", Free Press, NY, 1991
[18] Charles K. West, "The Social and Psychological Distortion of Information", Nelson-Hall, Chicago, 1981.
[19] Al Seckel, "The Art of Optical Illusions", Carlton Books, 2000.
[20] Donald D. Hoffman, "Visual Intelligence: How We Create What We See", Norton, 1998, NY.
[21] Diana Deutsch, "Musical Illusions and Paradoxes", Philomel, La Jolla, CA 1995.
[22] Chester R. Karrass, "The Negotiating Game", Thomas A. Crowell, New York, 1970.
[23] Robert B. Cialdini, "Influence: Science and Practice", Allyn and Bacon, Boston, 2001.
[24] Richard J. Robertson and William T. Powers, Editors, "Introduction to Modern Psychology, The Control-Theory View". The Control Systems Group, Inc., Gravel Switch, Kentucky, 1990.
[25] David Lambert, "A Cognitive Model for Exposition of Human Deception and Counter-deception" (NOSC Technical Report 1076 - October, 1987). [Main Table]

[26] Charles Handy, "Understanding Organizations", Oxford University Press, NY, 1993. img35.jpg
[27] National Research Council, "Modeling Human and Organizational Behavior", National Academy Press, Washington, DC, 1998.
[28] Robert Greene, "The 48 Laws of Power", Penguin Books, New York 1998
[29] Various documents, A list of documents related to MKULTRA can be found over the Internet.
[30] Richards J. Heuer, Jr., "Psychology of Intelligence Analysis", History Staff Center for the Study of Intelligence Central Intelligence Agency 1999.
[31] Aldert Vrij, "Detecting Lies and Deceipt", Wiley, New York, NY, 2000.

[32] Bill Cheswick, An Evening with Berferd, 1991. - ALSO - Bill Cheswick, Steve Bellovin, Diana D'Angelo, and Paul Glick, "An Evening with Berferd" - followed by S. M. Bellovin. "There Be Dragons". Proceedings of the Third Usenix UNIX Security Symposium. Baltimore (September 1992).
[33] F. Cohen, Operating System Protection Through Program Evolution Computers and Security 1992.
[34] F. Cohen, "Internet Holes - Internet Lightning Rods", Network Security Magazine, July, 1996.
[35] F. Cohen, A Note On Distributed Coordinated Attacks, Computers and Security, 1996.
[36] F. Cohen, "A Note on the Role of Deception in Information Protection", Computers and Security 1999.
[37] Fred Cohen, "The Unpredictability Defense", Managing Network Security, April, 1998.
[38] Fred Cohen, "Method and Aparatus for Network Deception/Emulation", International Patent Application No PCT/US00/31295, Filed Octoboer 26, 2000.
[39] F. Cohen, "A Mathematical Structure of Simple Defensive Network Deceptions", 1999, (InfoSec Baseline Studies).
[40] Scott Gerwehr, Jeff Rothenberg, and Robert H. Anderson, "An Arsenal of Deceptions for INFOSEC (OUO)", PM-1167-NSA, October, 1999, RAND National Defense Research Institute Project Memorandum.
[41] Scott Gerwehr, Robert Weissler, Jamison Jo Medby, Robert H. Anderson, Jeff Rothenberg, "Employing Deception in Information Systems to Thwart Adversary Reconnaissance-Phase Activities (OUO)", PM-1124-NSA, Novermber 2000, RAND National Defense Research Institute.

[42] Fred Cohen, "Deception Toolkit", March, 1998
[43] Norbert Weiner, "Cybernetics", 1954?
[44] Fred Cohen, "Simulating Cyber Attacks, Defenses, and Consequences", IFIP TC-11, Computers and Security, 1999.
[45] Kalbfleisch, Pamela J. The language of detecting deceit. Journal of Language & Social Psychology, Dec94, Vol. 13 Issue 4, p469, 28p, 1 chart [Provides information on the study of language strategies that are used to detect deceptive communication in interpersonal interactions. Classification of the typology; Strategies and implementation tactics; Discussions on deception detection techniques; Conclusion.]

[46] Fred Cohen, "The Structure of Intrusion and Intrusion Detection", May 16, 2000, (InfoSec Baseline Studies)
[47] National Technical Baseline, "Intrusion Detection and Response", Lawrence Livermore National Laboratory, Sandia National Laboratories, December, 1996
[48] Fred Cohen Cynthia Phillips, Laura Painton Swiler, Timothy Gaylor, Patricia Leary, Fran Rupley, Richard Isler, and Eli Dart, "A Preliminary Classification Scheme for Information System Threats, Attacks, and Defenses; A Cause and Effect Model; and Some Analysis Based on That Model", The Encyclopedia of Computer Science and Technology, 1999.
[49] Colonel John Hughes-Wilson, "Military Intelligence Blunders", Carol & Graf, NY, 1999
[50] John Keegan, "A History of Warfare", Vintage Books, NY 1993.
[51] Donald Danial and Katherine Herbig, ed. "Strategic Military Deception", Pergamon Books, 1982.
[52] Charles Mackay, "Extraordinary Popular Delusions and the Madness of Crowds", Templeton Publications, 1989 (originally Richard Bently Publishers, London, 1841)
[53] Western Systems Coordinating Council WSCC Preliminary System Disturbance Report Aug 10, 1996 - DRAFT [This report details the August 10, 1996 major system disturbance that separated the Western Systems Coordinating Council system into 4 islands, interrupting service to 7.5 million customers for periods ranging from several minutes to nearly six hours.]
[54] Bob Pekarske. Restoration in a Flash---Using DS3 Cross-connects, Telephony. September 10, 1990. [This paper describes the techniques used to compensate for network failures in certain telephon switching systems in a matter of a millisecond. The paper points out that without this rapid response, the failed node would cause other nodes to fail, causing a domino effect on the entire national communications networks.]
[55] Heidi Vanderheiden, Boston University "Gender swapping on the Net?",
[56] Mimi Ito, "Cybernetic Fantasies: Extended Selfhood in a Virtual Community", 1993.

[57] Mark Peace, "Dissertation: A Chatroom Ethnography", May 2000
[58] Daniel Chandler, "Personal Home Pages and the Construction of Identities on the Web", 2001
[59] SSCSD Tactical DecisionMaking Under Stress
[60] The HoneyNet Project web site (
[61] Fred Cohen, "Red Teaming and Other Agressive Auditing Techniques", Managing Network Security", March, 1998.


12th International Command and Control Research and Technology Symposium


ITS Strategic Research Plan, 2010-2014

Policing on the Global Scale

Development and command-control tools for many-robot systems (pre-9/11)
Title: Re: NATO/Pentagon steal all private/corp/mil data from US/UN and blame China
Post by: Dig on August 03, 2011, 06:30:44 pm
Pentagon perception manager knows how to manipulate search engine algorithm
Old-Thinker News | July 14, 2011

By Daniel Taylor

The Pentagon announced today that the internet is an active “Operational Domain” for the military. In fact the internet was already targeted by the Pentagon in its 2003 Information Operations Roadmap that outlined a strategy to “fight the net” as if it were an enemy weapons system. The strategy as outlined for the public involves protecting “national security” and sensitive government networks from hack attacks.

Information warfare is the front line of battle in the 21st Century, a fact that the Pentagon is clearly aware of.

    "It begins with getting inside the algorithm."

“Perception manager” John Rendon is a key figure in the information war. As Rolling Stone reports, his job was to sell the Iraq war to the American people, but Rendon firmly denies any involvement. As of 2005, John’s firm, the Rendon Group, has earned more than $56 million in Pentagon contracts.

In his newly released book The Filter Bubble: What the internet is hiding from you, Eli Pariser of interviews Rendon, where he candidly spoke of perception management in the digital world. Specifically, Rendon hints that he knows how to game the system of search engine algorithms – the system by which pages are ranked and internet searches are displayed – and in turn shift the mindset of the masses.

Rendon stated during the interview, “It begins with getting inside the algorithm. If you could find a way to load your content up so that only your content gets pulled by the stalking algorithm, then you’d have a better chance of shaping belief sets.”

Rendon hinted to Pariser that this was already happening.

    “In fact, he suggested, if we looked in the right places, we might be able to see traces of this kind of thing happening now – sentiment being algorithmically shifted over time.”

“I returned to the question about using algorithms to shift sentiment,” writes Pariser.

    “I have to think about it more, Rendon said, “But I think I know how to do it.” “How?” I asked. He paused, then chuckled: “Nice try.”

In fact the internet was already targeted by the Pentagon in its 2003 Information Operations Roadmap that outlined a strategy to “fight the net (” as if it were an enemy weapons system.

Pentagon: The internet needs to be dealt with as if it were an enemy "weapons system"


Information Operation Roadmap Part 3

The Pentagon's Information Operations Roadmap is blunt about the fact that an internet, with the potential for free speech, is in direct opposition to their goals. The internet needs to be dealt with as if it were an enemy "weapons system".

The 2003 Pentagon document entitled the Information Operation Roadmap was released to the public after a Freedom of Information Request by the National Security Archive at George Washington University in 2006. A detailed explanation of the major thrust of this document and the significance of information operations or information warfare was described by me here.

Computer Network Attack

From the Information Operation Roadmap:

    "When implemented the recommendations of this report will effectively jumpstart a rapid improvement of CNA [Computer Network Attack] capability." - 7

    "Enhanced IO [information operations] capabilities for the warfighter, including: ... A robust offensive suite of capabilities to include full-range electronic and computer network attack..." [emphasis mine] - 7

Would the Pentagon use its computer network attack capabilities on the Internet?

Fighting the Net

    "We Must Fight the Net. DoD [Department of Defense] is building an information-centric force. Networks are increasingly the operational center of gravity, and the Department must be prepared to "fight the net." " [emphasis mine] - 6

    "DoD's "Defense in Depth" strategy should operate on the premise that the Department will "fight the net" as it would a weapons system." [emphasis mine] - 13

It should come as no surprise that the Pentagon would aggressively attack the "information highway" in their attempt to achieve dominance in information warfare. Donald Rumsfeld's involvement in the Project for a New American Century sheds more light on the need and desire to control information.

PNAC Dominating Cyberspace

The Project for a New American Century (PNAC) was founded in 1997 with many members that later became the nucleus of the George W. Bush administration. The list includes: Jeb Bush, Dick Cheney, I. Lewis Libby, Donald Rumsfeld, and Paul Wolfowitz among many other powerful but less well know names. Their stated purpose was to use a hugely expanded U.S. military to project "American global leadership." In September of 2000, PNAC published a now infamous document entitled Rebuilding America's Defences. This document has a very similar theme as the Pentagon's Information Operations Roadmap which was signed by then Secretary of Defense Donald Rumsfeld.

From Rebuilding America's Defenses:

    "It is now commonly understood that information and other new technologies... are creating a dynamic that may threaten America's ability to exercise its dominant military power." [emphasis mine] - 4

    "Control of space and cyberspace. Much as control of the high seas - and the protection of international commerce - defined global powers in the past, so will control of the new "international commons" be a key to world power in the future. An America incapable of protecting its interests or that of its allies in space or the "infosphere" will find it difficult to exert global political leadership." [emphasis mine] - 51

    "Although it may take several decades for the process of transformation to unfold, in time, the art of warfare on air, land, and sea will be vastly different than it is today, and "combat" likely will take place in new dimensions: in space, "cyber-space," and perhaps the world of microbes." [emphasis mine] - 60

For more on Rebuilding America's Defences read this.

Internet 2

Part of the Information Operation Roadmap's plans for the internet are to "ensure the graceful degradation of the network rather than its collapse." (pg 45) This is presented in "defensive" terms, but presumably, it is as exclusively defensive as the Department of Defense.

As far as the Pentagon is concerned the internet is not all bad, after all, it was the Department of Defense through DARPA that gave us the internet in the first place. The internet is useful not only as a business tool but also is excellent for monitoring and tracking users, acclimatizing people to a virtual world, and developing detailed psychological profiles of every user, among many other Pentagon positives. But, one problem with the current internet is the potential for the dissemination of ideas and information not consistent with US government themes and messages, commonly known as free speech. Naturally, since the plan was to completely dominate the "infosphere," the internet would have to be adjusted or replaced with an upgraded and even more Pentagon friendly successor.

In an article by Paul Joseph Watson of Prison, he describes the emergence of Internet 2.

    "The development of "Internet 2" is also designed to create an online caste system whereby the old Internet hubs would be allowed to break down and die, forcing people to use the new taxable, censored and regulated world wide web. If you're struggling to comprehend exactly what the Internet will look like in five years unless we resist this, just look at China and their latest efforts to completely eliminate dissent and anonymity on the web."

DHS, DOD team to protect U.S. cyberspace

DOD's 5-point cyber plan sees Internet as an 'operational zone'

Averting another Stuxnet will require new cybersecurity approach

Evolving cyber threats demand coordinated defense
Title: Re: NATO/Pentagon steal all private/corp/mil data from US/UN and blame China
Post by: Effie Trinket on August 03, 2011, 08:32:17 pm

US-CERT director resigns

U.S. Computer Emergency Readiness Team Director (US-CERT) Randy Vickers has resigned, Federal News Radio reported after obtaining an internal Homeland Security Department email.

The email said that Vickers’ resignation is effectively immediately and that US-CERT Deputy Director Lee Rock will serve as acting director. No reason was provided as to why Vickers is resigning, according to the report.

US-CERT is the operational arm of the National Cyber Security Division at DHS and works to improve the nation’s cybersecurity position by coordinating cyber information sharing and managing cyber risks.

Posted by Alyah Khan on Jul 25, 2011 at 12:39 PM

Washington CyberSecurity Official Resigns


Resignations at the Top of the Cyber Sec Ranks

Mischel Kwon has resigned as director of the U.S. Computer Emergency Response Team in the Department of Homeland Security. She was the fourth U.S. CERT director in five years.
 It is believed she will remain in authority until September 2nd of this year. This comes at a particularly interesting time. The same day she resigned, Phil Reitinger, the director of the National Cyber Security Center at DHS, said in a statement that the administration "has made cyber security a top priority." One article stated that Kwon had become frustrated by bureaucratic obstacles and a lack of authority to fulfill her mission.

Kwon's resignation follows that of Rod Beckstrom who resigned back in March.
He claimed the lack of support inside the agency and what he described as a power grab by the National Security Agency were the reasons for his departure.

Earlier this week Melissa Hathaway, who was regarded as one of the top cyber advisor to the White House recently resigned as well. So why did she resign? Good question and a question that Sen. Susan Collins (R-Maine), a senior ranking member on the Senate Homeland Security and Government Affairs Committee, wants answered. Collins has requested that her staff members interview Hathaway regarding why she is leaving. Hathaway would only site personal reasons for her resignation which is effective August 24th.

That being said Hathaway reportedly noted in her comments that it has been two months since President Obama made a highly publicized speech stating the importance of cyber security. Hathaway has been quoted as saying "I wasn't willing to continue to wait any longer, because I'm not empowered right now to continue to drive the change."

These resignations highlight a much larger problem, it shows the inability of the federal government to hire and retain qualified cyber security leaders. Two months after President Obama pledged to "personally" select someone to be the White House's cyber security coordinator (AKA Cyber Czar), the position remains unfilled. He said that it was time the country had one official to coordinate against likely future attacks on the nation's technological infrastructure. One report by Government Info Security says that about 30 people have been considered for the job and yet the position remains unfilled.

Why not takers? What do they know that we don't? The nation's security is actually at risk and not having a cyber czar doesn't help. The continued churn has other concerning implications that point to a much bigger issue.

-- Kevin Coleman
August 10, 2009 06:32 AM | Cyber-warfare
Title: Re: NATO/Pentagon steal all private/corp/mil data from US/UN and blame China
Post by: Optimus on August 04, 2011, 11:05:57 am
US gov't building hacker army for cyber war
Digital TrendsBy Andrew Couts | Digital Trends – Tue, Aug 2, 2011

The US National Security Agency hopes to hire a mass of “cyber warriors” this year, and another large group next year, to help the country fight the increasingly intense international cyber war, reports Reuters.

To find new recruits, representatives from the NSA, Department of Defense, Department of Homeland Security and NASA, will be attending the annual DEF CON hacker conference in Las Vegas, which takes place this weekend.

Started in 1993 by hacker Jeff Moss (aka Dark Tangent), DEF CON is the preeminent meet-up for US hackers. The four-day conference costs $150 — in cash only — to attend. There is no registration, no credit cards allowed, which keeps everything anonymous. About 10,000 computer savvy individuals are expected to attend this year’s conference.

The NSA spy agency hopes to find skilled individuals willing to help the United States conduct itself — both defensively and offensively — in the growing global cyber war, which is gaining combatants and victims more and more each day. (Sources who attended last year’s DEF CON tell us that members of the US nation security complex were also in attendance then, as well, with similar recruiting goals.)