Author Topic: DoD/DHS/NATO bypasses congress to militarize entire USA via secret cyber memo  (Read 22907 times)

0 Members and 1 Guest are viewing this topic.

Offline birther truther tenther

  • Member
  • *****
  • Posts: 2,726
  • Against all forms of tyranny
retrieved from
http://www.dhs.gov/ynews/releases/pr_1286984200944.shtm

Joint Statement by Secretary of Defense Robert Gates and Secretary of Homeland Security Janet Napolitano on Enhancing Coordination to Secure America's Cyber Networks

Release Date: October 13, 2010

For Immediate Release
Office of the Press Secretary
Contact: 202-282-8010

“Reflecting President Obama’s strong commitment to building an administration-wide approach to combating threats to our cyber networks and infrastructure, the Department of Defense (DoD) and the Department of Homeland Security (DHS) have signed a memorandum of agreement that will align and enhance America’s capabilities to protect against threats to our critical civilian and military computer systems and networks.

Effective cybersecurity means protecting critical networks against a wide range of state and non-state actors that do not adhere to physical borders.

With this memorandum of agreement, effective immediately, we are building a new framework between our Departments to enhance operational coordination and joint program planning. It formalizes processes in which we work together to protect our nation’s cyber networks and critical infrastructure, and increases the clarity and focus of our respective roles and responsibilities. The agreement embeds DoD cyber analysts within DHS to better support the National Cybersecurity and Communications Integration Center (NCCIC) and sends a full-time senior DHS leader to DoD’s National Security Agency, along with a support team comprised of DHS privacy, civil liberties and legal personnel. The agreement will ensure both agencies’ priorities and requests for support are clearly communicated and met.

This structure is designed to put the full weight of our combined capabilities and expertise behind every action taken to protect our vital cyber networks, without altering the authorities or oversight of our separate but complementary missions. We will improve economy and efficiency by better leveraging vital technologies and personnel to serve both Departments’ missions in full adherence to U.S. laws and regulation. This memorandum of agreement furthers our strong commitment to protecting civil liberties and privacy. [INSERT: LMAO, yeah right]

We look forward to building on this vitally important step toward greater collaboration as we continue to work together on new and better ways to protect our economy and critical networks against evolving threats by those who seek to harm the United States.”





http://www.dhs.gov/xlibrary/assets/20101013-dod-dhs-cyber-moa.pdf


MEMORANDUM OF AGREEMENT
BETWEEN
THE DEPARTMENT OF HOMELAND SECURITY
AND
THE DEPARTMENT OF DEFENSE
REGARDING CYBERSECURITY
1.
PARTIES. The parties to this Agreement are the Department of Homeland Security (DHS) and the Department of Defense (DoD).
2.
AUTHORITY. This Agreement is authorized under the provisions of the Homeland Security Act (2002); the Economy Act; U.S. Code Title 10; Executive Order 12333; National Security Directive 42; Homeland Security Presidential Directive-5; Homeland Security Presidential Directive-7; and National Security Presidential Directive54/
Homeland Security Presidential Directive-23.
3.
PURPOSE. The purpose of the Agreement is to set forth terms by which DHS and DoD will provide personnel, equipment, and facilities in order to increase interdepartmental collaboration in strategic planning for the Nation's cybersecurity, mutual support for cybersecurity capabilities development, and synchronization of current operational cybersecurity mission activities. Implementing this Agreement will focus national cybersecurity efforts, increasing the overalI capacity and capability of both DHS' s homeland security and DoD's national security missions, while providing integral protection for privacy, civil rights, and civil liberties.
4.
SCOPE. DoD and DHS agree to collaborate to improve the synchronization and mutual support of their respective efforts in support of U.S. cybersecurity. Departmental relationships identified in this Agreement are intended to improve the efficiency and effectiveness of requirements formulation, and requests for products, services, technical assistance, coordination,and performance assessment for cybersecurity missions executed across a variety of DoD and DHS elements. They do not alter existing DoD and DHS authorities, command relationships, or privacy, civil liberties, and other oversight relationships. In establishing a framework to provide mutually beneficial logistical and operational support, this Agreement is not intended to replicate or aggregate unnecessarily the diverse line organizations across technology development, operations, and customer support that collectively execute cybersecurity missions.
5.
RESPONSIBILITIES.
A. Department of Homeland Security.
1) Identify and assign, in coordination with the Department of Defense, a DHS Director, Cybersecurity Coordination who will be in the National Protection and
Programs Directorate and will be located at the National Security Agency (NSA) but will not be in the NSA chain of command. This individual will also act as the DHS Senior Cybersecurity Representative to U.S. Cyber Command (USCYBERCOM).
2) Receive DoD requests for cybersecurity support and consider DoD requirements, as appropriate and consistent with applicable law and DHS mission requirements and authorities, related to operational planning and mission coordination.
3) Identify qualified DHS personnel to perfom DHS functions under the sole supervision and direction of DHS officials as follows:
a.
Assign DHS personnel to work at NSA as part of a Joint Coordination Element (JCE) performing the functions ofjoint operational planning, coordination, synchronization, requirement translation, and other DHS mission support for homeland security for cybersecurity under the direct supervision of the Director, Cybersecurity Coordination;
b.
Assign personnel to work at the NSA Directorate of Acquisition for .
collaborative acquisition and technology development;
c.
Assign or detail, as appropriate, personnel to work at the National Security Agency/Central Security Services (NSA/CSS) Threat Operations Center (NTOC) to promote joint operational planning, coordination, synchronization, requirement translation, and other DHS mission suppOl1 for homeland security for cybersecurity; and
d.
Assign representatives from the Office of the General Counsel, Privacy Oftice, and the Office for Civil Rights and Civil Liberties to support the DHS Director, Cybersecurity Coordination, at NSA, and coordinate with the 000 countcrparts identified in paragraph B.2.d.
4) Ensure that DHS personnel have current security clearances (TS/SCI) upon assignment to NSA, including training on the appropriate handling and dissemination of classified and sensitive information in accordance with DoD, Intelligence Community and NSA regulations. 5) Provide funding for DHS mission requirements, salaries, and training unique to DHS personnel for assignments under paragraph 5.A.3.
6) Provide appropriate access, administrative support, and space for an NSA Cryptologic Services Group (CSO) and a USCYBERCOM Cyber Support Element (CSE) collocated with the National Cybersecurity and Communications Integration Center (NCCIC), at DHS, and integration into DHS's cybersecurity operational activities. DHS \ViII provide all necessary DHS equipment and connectivity to permit both CSG and CSE entities the capability to carry out their respective roles and responsibilities.
7) DHS Director, Cybersecurity Coordination.
a.
Provide requests for cybersecurity planning, technology, and where appropriate other support to NSA and USCYBERCOM and advocate for such requests based on DHS requirements to protect Federal Executive branch, non-DoD, non-national security systems, and U.S. critical infrastructure and key resources.
b.
Convey to and coordinate within DHS any NSA and USCYBERCOM requests for support or requirements regarding cybersecurity operations.
c.
Participate in and lead, as appropriate, joint planning and other processes.
d.
Promote and facilitatc strong communications between DHS and DoD senior
leadership, including that of NSA, on cybersecurity matters ofjoint interest,
including engaging in joint operational planning and mission coordination.
e.
Maintain cognizance of DHS and, as appropriate, of DoD, NSA, and
USCYBERCOM cybersecurity activities, to assist in deconfliction and
promote synchronization of those activities.
f.
Assist in coordinating DoD and DHS efforts to improve cybersecurity threat
information sharing between the public and private sectors to aid in
preventing, detecting, mitigating, and/or recovering from the effects of an
attack, interference, compromise, or incapacitation related to homeland
security and national security activities in cyberspace.
B. Department of Defense.
1) Direct the Director ofNSA (DIRNSA) and Commander, USCYBERCOM, to undertake collaborative activities and provide cybersecurity support envisioned in this agreement and subsequent implementing agreements.
2) National Security Agency.
a.
Assign an NSA SES-equivalent to serve as the NSA lead to the Joint Coordination Element (JCE). This NSA ofticial will coordinate and work with the DHS Director, Cybersecurity Coordination in carrying out the activities of the Joint Coordination Element. This NSA official will not be in the DHS chain of command, and his OT her performance ratings will be prepared by NSA with input from the DHS Director, Cybersecurity Coordination. This NSA official will supervise and direct all NSA personnel assigned to the JCE.
b.
Receive and coordinate DHS requests for cybersecurity support and consider DHS requirements, as appropriate and consistent with applicable law and NSA mission requirements and authorities, in operational planning and mission coordination.
c.
Provide appropriate access, facilities, and administrative support (including necessary equipment and connectivity) to support the Director, Cybersecurity Coordination and DHS personnel assigned or detailed to the three entities listed below. NSA will provide all necessary NSA equipment and connectivity to permit DHS personnel with the capability to carry out their roles and responsibilities.
i. NSA Directorate of Acquisition
11. Joint Coordination Element to be located at NSA
111. NSNCSS Threat Operations Center
d.
Identify representatives from its Office of the General Counsel and Privacy Office to work with counterparts at 000, USCYBERCOM, and DHS to support the implementation of this Agreement.
e.
Collocate a Cryptologic Services Group at the NCCIC at DHS, for support to and operational synchronization with DHS's cybersecurity operations and the National Cyber Incident Response Plan (NCIRP).
f.
Assign or detail qualified personnel in accordance with this Agreement both to serve in JCE positions and in CSG positions as mutually agreed.

g.
Engage with DHS and USCYBERCOM in joint operational planning and mission coordination.
h.
Provide funding for NSA mission requirements, salaries and training unique
to NSA for personnel identified in B.2.c.
3) USCYBERCOM.
a.
Receive DHS requests for cybersecurity support and consider DHS requirements, as appropriate and consistent with applicable law and USCYBERCOM mission requirements and authorities, in operational planning and mission coordination.
b.
Collocate a Cyber Support Element at the NCCIC at DHS, for support to and operational synchronization with DHS's cybersecurity operations and the NCIRP.
c.
Assign qualified personnel to CSE positions.
d.
As needed to implement this Agreement, provide, on a reimbursable basis, appropriate access, administrative support and space for DHS personnel.
e.
Provide funding for USCYBERCOM mission requirements and training unique to its personnel during the assignment.
f.
Engage with DHS and NSA in joint operational planning and mission coordination.
C. Joint DoD-DHS.
1) Synchronize the roles and relationships of the proposed DoD Integrated Cyber Center (ICC) and the current DBS National Cybersecurity and Communications Integration Center (NCCIC).
2) Develop agenda of appropriate supporting actions, including consideration of the establishment of a Joint Program Office (JPO).
3) Develop jointly appropriate agreements, including necessary funding mechanisms, to implement the objectives and responsibilities of this Agreement pursuant to applicable authority.
6.
OVERSIGHT. To oversee the activities described in the preceding paragraphs, the Deputy Secretary of Homeland Security and the Deputy Secretary of Defense will conduct monthly oversight meetings suppo11ed by the DHS Deputy Under Secretary, National Protection and Programs Direclorate (NPPD); the Principal Deputy Under Secretary of Defense for Policy and the Director ofNSAlCommander, USCYBERCOM.
7.
POINTS OF CONTACT.
Philip Reitinger                                                     James N. Miller
Deputy Under Secretary                                        Principal Deputy Under Secretary for Defense Policy
National Protection and Programs Directorate            Department of  Defense
Department of Homeland Security                           2100 Defense Pentagon 
Washington, DC 20528                                          Washington, DC 20301-2100


8.
OTHER Provisions. Nothing in this Agreement is intended to conflict with law, regulation, Presidential order or directive, or the directives of DHS or DoD. If a term of this Agreement is inconsistent with such authority, then that term shall be invalid, but the remaining terms and conditions of this Agreement shall remain in full force and effect. This Agreement shall be interpreted and implemented in a manner that respects and complies with (and does not abrogate) the statutory and regulatory responsibilities of the Secretary of Homeland Security and the Secretary of Defense. This Agreement does not obligate funds.
9.
EFFECTIVE DATE. This Agreement is effective upon signature of both parties.
10.
MODIFICATION AND REVIEW. This Agreement may be modified upon the mutual written consent of the parties. This Agreement will be reviewed by the parties after one year.
11.
TERMINATION. The terms of this Agreement, as modified with the, consent of both parties, ,,,,ill remain in effect until terminated. Either party upon 30 days written notice to the other party may terminate this Agreement.
APPROVED BY:
Janet Napolitano                                     Robert Gates
Secretary of Homeland Security                 Secretary of Defense
9-27-10                                                9-24-10

Offline agentbluescreen

  • Member
  • *****
  • Posts: 7,435
Doesn't any enslaved scaredy-cat at Motherland Insecurity fear cyberattack by the unconstitutional standing army Pentagon Mafia?

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Office of the Secretary of Defense Public Affairs
http://www.dvidshub.net/news/58519/official-details-dod-cybersecurity-environment
Story by Jim Garamone

WASHINGTON, D.C. - Cyber is a new world and a new domain for combat. The Defense Department is working to understand the threats and opportunities that this new domain poses.

Robert J. Butler, deputy assistant secretary of defense for cyber policy, is one of the officials charged with developing defense capabilities in this crucial domain. And there has been progress.

"For the past 14 months, we have been trying to continue to grow [U.S.] Cyber Command and its capabilities, at the same time looking at strategy and policy," Butler told reporters at the Defense Writers' Group here Oct. 20. "We need to find ways to operate more effectively in cyberspace."

DOD needs new operating concepts for the new domain. The department has done a lot of work in systems, education and training, "and beyond that, things like active defense and new ways of looking at resiliency and new ways to operate in different environments," he said.

It comes back to the warfighter, he said. The DOD cyber world needs to focus on ensuring warriors can deploy, get the information they need when they deploy, track supplies and personnel and ensure logistics, he explained. They also must remain in contact with neighboring units and the home front, along with a variety of other tasks, he added.

Defense Department officials have reached out to Great Britain, Australia, Canada and NATO to defend against cyber threats that include nations, rogue states, terrorist groups, criminal gangs and just plain hackers, Butler said.

"The focus within the strategy is to go ahead and build partnerships with like-minded nations in the areas of shared awareness, shared warning and collective response," he said. "As we move forward, we are trying to build capacity at one level, and at another level – interdependence – you are actually laying a foundation for deterring bad behavior in cyberspace."

Operations in Afghanistan and Iraq – and the trust those operations have built among the coalition – have helped to speed this international cooperation, Butler said.

The threat constantly changes, and the department has to keep on top of this aspect of cybersecurity, Butler told the group. "Every day, people think of new ways to use the Internet," he said. "As I look at the advent of social networking sites and what that has done, people have learned to use the Internet to not only communicate in traditional ways, but to build new networks that create both opportunities as well as threats."

The cyber domain is new, and policy has not caught up to reality. Government and private officials are grappling with basics such as what constitutes a cyber attack and who has responsibility to defend against threats. The White House is leading the effort, Butler said, but it is clear that the Department of Homeland Security has the lead inside the United States. The Defense Department has responsibility to defend military networks, and can assist Homeland Security and other civilian agencies when required and ordered.

Who does what and when they do it is under discussion with other government agencies.

"We have our viewpoints laid out, and we're trying to determine the best way to move forward," Butler said. "One of the key things is to agree on the taxonomy. We hear a lot of discussion about cyber war and cyber attacks, and there's legal terminology with hostile intent, hostile acts. Making sure everyone understands the taxonomy is really important."

Butler credited the Homeland Security exercise Cyber Storm 3 with helping officials think through responses. The national cyber incident response framework exercise, conducted at the end of August, looked at the way the U.S. government and private industry faced a cyber threat.

"We were able to work out what the threat was, what the appropriate response was, who takes action, how do you determine conditions and postures," he said.

The exercise included federal and state entities, the private sector and international partners. "It was a huge learning experience for the department," he said.

But no one can stand still, Butler said.

"We recognize as we face this evolving threat that more will be required," he said. "The question is what kind of hybrid models, what kind of rules, what kind of things do we need to counter a threat that continues to advance? We've got congressional support. We got a blueprint, and we're working on it.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: NATO declares...WE OWN THE INTERNET AND EVERYTHING ON IT SUCKERS!
« Reply #3 on: October 20, 2010, 11:22:53 pm »
THIS IS A FULL SPECTRUM ASSAULT WITH ABSOLUTELY ZERO INPUT FROM 7 BILLION HUMANS ON THE PLANET!

NATO IS JUST DECLARING THEY OWN THE INTERNET...THEY ARE MAKING NEW RULES...AND ALL SLAVES MUST FOLLOW THEM!

THIS INCLUDES TAKING OVER EVERY SINGLE DATABASE ON THE PLANET, EVERY VIDEO CAM SESSION, EVERY FINANCIAL WEBSITE, EVERY TRADING WEBSITE, EVERY DATING WEB SITE, EVERY CORPORATE WEB SITE, EVERYTHING.

ALL PHONE CALLS, ALL ILLEGAL SURVEILLANCE SESSIONS, ALL IPHONE DATA, ALL BLACKBERRY DATA, ALL SCHOOL DATA, ALL BIOMETRICS, ALL HEALTH DATA, ETC.

THEY ARE DECLARING THAT THE BILL OF RIGHTS DO NOT EXIST AT ALL, AT ALL, LIKE IT NEVER EXISTED.

JUST READ THE ARTICLE, RESEARCH IT YOURSELVES.

IN THE PAST 10 HOURS OVER 100 ARTICLES HIT THE WEB ALL DECLARING THIS TO BE GOING FORWARD, NOT ONE SENTENCE OF RESISTANCE ALLOWED BY THE MOCKINGBIRD CREW. YOU MAY THROW UP WHEN READING THIS NY TIMES FASCIST/COMMUNIST BRAVE NEW WORLD ARTICLE. IT IS PSYCHOTIC IN THE BRAZEN ATTEMPT TO JUST DECLARE IT NORMAL THAT RAYTHEON LOBBYIST WILLIAM LYNNE III, TOTAL PUPPET JANET NAPOLITANO, BILDERBERGER CHARLIE ROSE, CONFIRMED PSYCHOTIC CONTROL FREAK GLOBALIST CORPORATIST JANE LUTE, SOON TO BE VETTED ROBERT BUTLER, IRAN CONTRA COVER UPPER ROBERT GATES, ILLEGAL ALIEN BARRY SOETORO, AND OPENLY CORPORATISTIC AGENCIES LIKE DHS, NSA, NRO, FEMA, FT MEADE, NATO, PENTAGON, ETC. ALL HAVE AGREED TO THIS CLANDESTINE COUP D'ETAT OF THE PUBLIC INTERNET WITHOUT ONE SINGLE VOTE, ONE SINGLE DEBATE, ONE SINGLE SPEECH...



NY TIMES:

Pentagon Will Help Homeland Security Department Fight Domestic Cyberattacks


WASHINGTON — The Obama administration has adopted new procedures for using the Defense Department’s vast array of cyberwarfare capabilities in case of an attack on vital computer networks inside the United States, delicately navigating historic rules that restrict military action on American soil.  The system would mirror that used when the military is called on in natural disasters like hurricanes or wildfires. A presidential order dispatches the military forces, working under the control of the Federal Emergency Management Agency.  Under the new rules, the president would approve the use of the military’s expertise in computer-network warfare, and the Department of Homeland Security would direct the work.  Officials involved in drafting the rules said the goal was to ensure a rapid response to a cyberthreat while balancing concerns that civil liberties might be at risk should the military take over such domestic operations.  The rules were deemed essential because most of the government’s computer-network capabilities reside within the Pentagon — while most of the important targets are on domestic soil, whether within the government or in critical private operations like financial networks or a regional power grid.  The new approach will begin with a Department of Homeland Security team deploying to Fort Meade, Md., home to both the National Security Agency, which specializes in electronic espionage, and the military’s new Cyber Command. In exchange, a team of military networking experts would be assigned to the operations center at the Homeland Security Department.  The rules were detailed in a memorandum of agreement signed in late September by Janet Napolitano, the secretary of homeland security, and Defense Secretary Robert M. Gates, but they were not released until last week.  Robert J. Butler, the Pentagon’s deputy assistant secretary for cyber policy, said the memorandum was intended to cut through legal debates about the authority for operating domestically, and to focus on how best to respond to the threat of attack on critical computer networks. Mr. Butler said teams of lawyers would watch for potential violations of civil liberties. “We have put protection measures in place,” he said.  The Pentagon is expected to release a full National Defense Strategy for Cyber Operations this year, to be followed by broader interagency guidance from the White House, perhaps in the form of a presidential directive, in 2011.  Congress also is weighing legislation that would update domestic law to deal with advances in computer-based surveillance and cyberwarfare. William J. Lynn III, the deputy defense secretary, underscored the Pentagon’s “need to protect our military networks,” but said that “it’s a national challenge as well.” In an interview with Charlie Rose broadcast Monday by PBS, Mr. Lynn added: “We need to protect our critical infrastructure. We need to protect our intellectual property. And that’s a whole-of-government effort.”  During a visit last week to NATO headquarters in Brussels, Mr. Gates lobbied for new partnerships to combat computer threats, while warning that the NATO networks were vulnerable.

CONTINUED: http://www.nytimes.com/2010/10/21/us/21cyber.html?src=mv



HERE IS THE MOST INSANE PART OF THIS 100% ACT OF TREASON AS THERE IS ABSOLUTELY ZERO INPUT FROM CONGRESS...

PLEASE UNDERSTAND...THEY PLAN ON CHANGING EVERY SINGLE RULE ABOUT HOW DATA IS TRANSFERED, STORED, EXAMINED, ACQUIRED, DISTRIBUTED.

WHAT PROCESS DID THEY GO THROUGH TO MAKE THESE LIFE CHANGING, FINANCIAL CHANGING, SWEEPING CHANGES THAT WILL AFFECT EVERY PHONE CALL, EMAIL, WEBSITE?

THEY WROTE A F*CKING MEMO THAT NO ONE KNOWS ABOUT!

The rules were detailed in a memorandum of agreement signed in late September by Janet Napolitano, the secretary of homeland security, and Defense Secretary Robert M. Gates, but they were not released until last week.  Robert J. Butler, the Pentagon’s deputy assistant secretary for cyber policy, said the memorandum was intended to cut through legal debates about the authority for operating domestically, and to focus on how best to respond to the threat of attack on critical computer networks.


THEY KNOW THAT PEOPLE CAN SEE THE SUPER ELITES CRIMES AGAINST HUMANITY AND ARE NOW ATTACKING OUR CONSTITUTIONAL GOVERNMENT PROCESS OF DEBATE, VOTING, ETC.

THEY JUST WROTE A MEMO  AND BECAUSE OF IT ARE DECLARING IT SO.

AND GUESS WHAT...IT IS NOT EVEN THE PENTAGON...BRITAIN JUST SAID THEY ARE ALSO REVAMING THEIR SYSTEMS...THIS IS A BILDERBERG/NATO DIRECTIVE BIPASSING ALL SOVEREIGN COUNTRIES GOVERNMENTAL PROCESSING FOR BASIC RULE CHANGES IN SECURITY ISSUES, FINANCIAL MATTERS, ETC.

All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: NATO declares...WE OWN THE INTERNET AND EVERYTHING ON IT SUCKERS!
« Reply #4 on: October 20, 2010, 11:28:33 pm »
Here is the admitted act of treason by Robert J. Butler (who no one ever elected and 99% of the public do not even know about)...

Robert J. Butler, the Pentagon’s deputy assistant secretary for cyber policy, said the memorandum was intended to cut through legal debates about the authority for operating domestically...

THAT

IS

TREASON

!!!!
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: NATO declares...WE OWN THE INTERNET AND EVERYTHING ON IT SUCKERS!
« Reply #5 on: October 20, 2010, 11:34:34 pm »
So no legal debates about setting up a cyber prison control grid which bipasses the constitution to operate domestically.

W T F ?

No act of congress

No act of the Supreme Court

Not even an act of the puppet president (the pres never signed the memo).

This was a side deal by the Secretary of DHS (which is now exposed as a corporatistic bohemouth cancer which is only 9 years old but ius already the largest institutional obstruction to basic human rights. They cannot even be called the government because they have zero function within the constitutional government. they seem to be an anti-government anomalie) and the Secretary of Defense.

Unless 3/4 of the states have ratified changes to the constitution when I was not looking...

YOU NEED MORE THAN TWO PUPPETS TO SIGN A SECRET BAR NAPKIN AT A NATO CONFERENCE IN BRUSSELS TO ENACT A MILITARIZATION OF EVERY ELECTRONIC DEVICE IN THE COUNTRY!
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: NATO declares...WE OWN THE INTERNET AND EVERYTHING ON IT SUCKERS!
« Reply #6 on: October 20, 2010, 11:37:15 pm »
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: NATO declares...WE OWN THE INTERNET AND EVERYTHING ON IT SUCKERS!
« Reply #7 on: October 20, 2010, 11:38:16 pm »
DoD expanding domestic cyber role
http://www.navytimes.com/news/2010/10/defense-dod-expands-domestic-cyber-role-102010/
By William Matthews - Staff report
Posted : Wednesday Oct 20, 2010 17:25:08 EDT

The Defense Department is quietly taking on an expanding role in defending U.S. critical infrastructure from cyber attacks.

In a break with previous policy, the military now is prepared to provide cyber expertise to other government agencies and to certain private companies to counter attacks on their computer networks, the Pentagon’s cyber policy chief, Robert Butler, said Wednesday.

An agreement signed this month with the Department of Homeland Security and an earlier initiative to protect companies in the defense industrial base make it likely that the military will be a key part of any response to a cyber attack.

While the Department of Homeland Security officially remains the lead government agency on cyber defense, the new agreement “sets up an opportunity for DHS to take advantage of the expertise” in the Pentagon, and particularly the secretive electronic spying agency, the National Security Agency, said Butler, who is a deputy assistant defense secretary.

The two agencies — Defense and Homeland Security — “will help each other in more tangible ways then they have in the past,” Butler told a group of defense reporters.

Among other things, a senior DHS cyber official and other DHS employees will move to the NSA to be closer to the heart of the military’s cyber defense capability. Closer collaboration provides “an opportunity to look at new ways that we can do national cyber incident response, he said.

“DoD’s focus is really about getting into the mix. We want to plan together and work together with other departments” to ensure that they understand the military’s cyber capabilities and that the military understands what other agencies and private companies can do for cyber defense, Butler said.

Improving agency and industry “situational awareness” in cyberspace is a central objective, Butler said.

Developing and maintaining a clear picture of the threats in cyberspace remains difficult, apparently even for the NSA. In part, that’s because new uses for the Internet are invented every day, Butler said, and it’s not always clear whether new activity is harmful or benign. Even the Defense Department is still “in the mode of understanding.”

In the event of a cyber attack, it’s still extremely difficult to tell who is attacking. It’s not even clear what constitutes an attack.

“As we move forward, one of the key things we have is to agree on is the taxonomy,” he said. There is lots of discussion about “cyberwar,” “cyber attacks,” and “hostile intent,” but there is no agreement on exactly what those terms mean.

Developing standard definitions remains under discussion among U.S. government agencies and between international governments and organizations, he said.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: NATO declares...WE OWN THE INTERNET AND EVERYTHING ON IT SUCKERS!
« Reply #8 on: October 20, 2010, 11:39:05 pm »
New Cyber Strategy Out Soon
http://www.dodbuzz.com/2010/10/20/new-cyber-strategy-out-soon/
By Colin Clark Wednesday, October 20th, 2010 1:01 pm
Posted in Cyber Security, Intelligence, International, Policy


It’s gotten very little coverage in the media, but the Pentagon and Department of Homeland Security tried last week to fix one of the biggest gaps in cyber protection for the United States by trying to ensure coverage of both military and government web sites. That is part of a wider push by the Defense Department to come up with a bona fide strategy for coping with the rising tide of cyber attacks by governments and enterprising hackers.

Robert Butler, deputy assistant defense secretary for cyber policy, told reporters this morning that a new national defense strategy for cyberspace operations should be in place before the end of the year.

In Deputy Defense Secretary Bill Lynn’s seminal article in Foreign Affairs about cyber, he described the outlines of such a strategy: “The principal elements of that strategy are to develop an organizational construct for training, equipping, and commanding cyber defense forces; to employ layered protections with a strong core of active defenses; to use military capabilities to support other departments’ efforts to secure the networks that run the United States’ critical infrastructure; to build collective defenses with U.S. allies; and to invest in the rapid development of additional cyber defense capabilities.”


Butler brushed aside reporters’ questions about the fascinating policy debate about the very basic questions about what constitutes an act of war in the cyber commons and how the US should respond. The national security community is pushing hard, he said, to figure out ways to do what is needed to protect commercial, government and military networks and how to manage such attacks instead of saying, this constitutes the circumstances that would elevate a cyber attack to an act of war.

While the national security establishment continues to be flummoxed by how to answer, it is beginning to find ways around the traditional separation between military functions – directed against threats that reside outside the United States – and domestic security directed against threats that come from within our borders. Unfortunately, cyber threats can be directed against U.S. military targets and U.S. government or commercial assets at the same time and it can be almost impossible to tell where they are coming from, let alone who is directing the attack.

I asked Butler when the military was going to come up with answers to the problem of attribution and how they would do it, and he basically said it’s really complicated, hard to do and requires a great deal of analytic effort, along with some technology.

He also declined to address the question of whether and how the United States would launch an offensive cyber attack.

Much of the Pentagon’s focus, judging by Butler’s comments and Lynn’s article, is on defense and the key questions of operational security. So it makes sense that the memo signed last week by the secretary of Homeland Security, Janet Napolitano, and Defense Secretary Robert Gates allows DHS cyber experts to be posted at the National Security Agency, which provides most of the military cyber manpower. And Napolitano stressed that the agreement between the two agencies “furthers our strong commitment to protecting civil liberties and privacy.”

Another part of that approach is to build self-contained mini-Internets for critical infrastructure such as electrical grids, nuclear plants, water and sewer plants. This would help prevent attacks by wonderful code such as Stuxnet, designed to cripple Supervisory Control And Data Acquisition systems used to control and monitor industrial processes (particularly those used by Iranian nuclear plants). The catchy domain name would be dotsecure.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Re: NATO declares...WE OWN THE INTERNET AND EVERYTHING ON IT SUCKERS!
« Reply #9 on: October 20, 2010, 11:41:36 pm »
Hey look...Butler declares that contractors (an overt security risk) will have unfathomable power over all of this data


whooopeeeeeeee (how is this "Bulter" dude an actual human being? No wonder everyone else resigned from this insane position)



UPDATE 1-Pentagon seeks tight ties with cyber contractors
http://www.reuters.com/article/idUSN2023673520101020
By Jim Wolf

WASHINGTON, Oct 20 (Reuters) - The U.S. Defense Department aims to tighten ties with its cybersecurity contractors in an effort to better protect sensitive computer networks against growing cyber threats. The department's use of top-level system integrators and entrepreneurs will continue to grow, along with the need for so-called "active" defenses that scan incoming code to shield network perimeters, Robert Butler, the Pentagon's top official for cyber policy, said on Wednesday. "And as we thread those together, what we want to do is a very very tight partnership with industry," Butler, the deputy assistant secretary of defense for cyber policy, told reporters at a breakfast session. One key goal, Butler said, was to cut the lag between development of new protective technology and its deployment.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,939
Re: NATO declares...WE OWN THE INTERNET AND EVERYTHING ON IT SUCKERS!
« Reply #10 on: October 21, 2010, 10:08:09 am »
NY TIMES:

Pentagon Will Help Homeland Security Department Fight Domestic Cyberattacks

WASHINGTON — The Obama administration has adopted new procedures for using the Defense Department’s vast array of cyberwarfare capabilities in case of an attack on vital computer networks inside the United States, delicately navigating historic rules that restrict military action on American soil.  The system would mirror that used when the military is called on in natural disasters like hurricanes or wildfires. A presidential order dispatches the military forces, working under the control of the Federal Emergency Management Agency.  Under the new rules, the president would approve the use of the military’s expertise in computer-network warfare, and the Department of Homeland Security would direct the work.  


Officials involved in drafting the rules said the goal was to ensure a rapid response to a cyberthreat while balancing concerns that civil liberties might be at risk should will effectively end when the military take over such domestic operations.
 
The rules were deemed essential because most of the government’s computer-network capabilities reside within the Pentagon — while most of the important targets are on domestic soil, whether within the government or in critical private operations like financial networks or a regional power grid.  The new approach will begin with a Department of Homeland Security team deploying to Fort Meade, Md., home to both the National Security Agency, which specializes in electronic espionage, and the military’s new Cyber Command. In exchange, a team of military networking experts would be assigned to the operations center at the Homeland Security Department.  The rules were detailed in a memorandum of agreement signed in late September by Janet Napolitano, the secretary of homeland security, and Defense Secretary Robert M. Gates, but they were not released until last week.  Robert J. Butler, the Pentagon’s deputy assistant secretary for cyber policy,

said the memorandum was intended to cut through legal debates bypass the Constitution and the Bill of Rights about the authority for operating domestically,

and to focus on how best to respond to the threat of attack on critical computer networks. Mr. Butler said teams of lawyers would watch for potential violations of civil liberties. “We have put protection measures in place,” he said.  The Pentagon is expected to release a full National Defense Strategy for Cyber Operations this year, to be followed by broader interagency guidance from the White House, perhaps in the form of a presidential directive, in 2011.

Congress also is weighing legislation that would update domestic law change the law to make posse commitatus and increased violations of citizens' rights LEGAL in order to deal with advances in computer-based surveillance and cyberwarfare.

William J. Lynn III, the deputy defense secretary, underscored the Pentagon’s “need to protect our military networks,” but said that “it’s a national challenge as well.” In an interview with Charlie Rose broadcast Monday by PBS, Mr. Lynn added: “We need to protect our critical infrastructure. We need to protect our intellectual property. And that’s a whole-of-government effort.”  During a visit last week to NATO headquarters in Brussels, Mr. Gates lobbied for new partnerships to combat computer threats, while warning that the NATO networks were vulnerable.

CONTINUED: http://www.nytimes.com/2010/10/21/us/21cyber.html?src=mv


They plan to make treason legal, and the 95% wholly-NWO-owned Congress will pass whatever legislation they put in front of them, under threat of exposure for closet skeletons, or perhaps directly threatened with the murder of their families, or themselves. They will cave because they are spineless and scared.

The powers-that-be are terrified of what Brzezinski called the "Global Awakening". In this clip, Brzezinki ADMITS that the public has been asleep for decades, until the last 100 years... and that this awakening is making it a much more 'difficult context' for world powers:



CFR Meeting: Zbigniew Brzezinski Fears The Global Awakening
SATURDAY, JUNE 5, 2010
http://geraldcelentechannel.blogspot.com/2010/06/cfr-meeting-zbigniew-brzezinski-fears.html

Zbigniew Brzezinski giving the CFR branch in Montreal a presentation discussing world government and his fears of the mass global awakening that has taken place.


http://www.youtube.com/watch?v=SZyo9HRGeWw&feature=player_embedded

Transcript (by Pilikia... so apologies in advance for any errors)

Brzezinski: "Let me begin by making just a thumbnail definition of the geopolitical context in which we all find ourselves, including America.

And in my perpective, that geopolitical context is very much defined by new, by two new, global realities.
The first is that global political leadership, by which I mean the role of certain leading powers in the world,
has now become much more diversified, unlike what it was until relatively recently.

Relatively recently still, the world was dominated by the Atlantic world, as it had been for many centuries. It no longer is.
Today the rise of the far east has created a new, but much more differentiated, global leadership. One which, in a nutshell, involves, if one can hazard, an arbitrary list of the primary players on the world scene; the United States, clearly, maybe next to it, but maybe the European Union - I say 'maybe' because it is not yet a political entity. Certainly, increasingly so, and visibly so, China.  Russia, mainly in one respect only - because it is a nuclear power coequal to the United States - but otherwise very deficient in all of the major indices of what constitutes global power. Behind Russia, perhaps individually, but to a much lesser extent, Germany, France, Great Britian, Japan. Certainly, although it does not have the politically assertive posture, India is rising, and then in the background of that we have the new entity of the G20; a much more diversified global leadership, lacking internal unity, with many of its members {inaudible} by natural antagonisms. That makes the context much more complicated.

The other major change in international affairs is that, for the first time, in all of human history, mankind is politically awakened.
That's a total new reality. Total new reality.


It has not be so for most of human history, until the last one hundred years.

And in the course of the last one hundred years, the whole world has become politically awakened.

And no matter where you go, politics is a matter of social engagement, and most people know what is generally going on - generally going on in the world, and are consciously aware of the global iniquities, inequalities, lack of respect, exploitation.

Mankind is now politically awakened and stirring.

The combination of the two: the diversived global leadership, politically awakened masses, makes a much more difficult context for any major power, including, permanently, the leading world power, the United States."

===============================================

"The technetronic era involves the gradual appearance of a more controlled society.
Such a society would be dominated by an elite,
unrestrained by traditional values.
Soon it will be possible to assert almost continuous surveillance over every citizen
and maintain up-to-date complete files containing
even the most personal information about the citizen.
These files will be subject to instantaneous retrieval by the authorities."
~ Zbigniew Brzezinski
"Between Two Ages: America's Role in the Technetronic Era"
Penguin, October 28, 1976.

===============================================

Part of laying the groundwork to deal with anyone who resists the tyranny, working together we have Psychiatrists, Psychologists, Pharma and the recent health care legislation, including the plan to put everyone's medical records online for 'instantaneous retrieval'. To resist will be considered abnormal behavior.
CONFIRMED: Psychiatric Manual labels free thinkers as mentally ill
And  the King shall answer and say unto them, Verily I say unto you, 
Inasmuch as ye have done it unto one of the least of these my brethren,  ye have done it unto me.

Matthew 25:40

Offline phasma

  • Member
  • *****
  • Posts: 7,197
  • Have a H.A.A.R.P.Y DAY !
Guess that makes me a nut then . . . pass the red pills . .
Things are not what they appear to be: nor are they otherwise - Surangama Sutra

Anti_Illuminati

  • Guest
You type facts on a web blog exposing the cybernetic fascist false flag terrorists, and this is what they want to be able to do to those Americans:

http://www.liveleak.com/view?i=58b_1179489399

Offline IridiumKEPfactor

  • Member
  • *****
  • Posts: 3,668
I bet the Google CEO just thinks this news is just   FABULOUS!     (Said with musical lispy sound)








This means that the Airforce Cyber command could log into google ads and insert a virus into an ad link graphic and have a truth site that uses google ads get hit. When the virus spreads and appears to come from a truth site they could send marines out to the guys house and arrest them.

Offline phasma

  • Member
  • *****
  • Posts: 7,197
  • Have a H.A.A.R.P.Y DAY !
oh joy. What if you used one of those sites that bounce your IP address through a load of proxys so that it becomes ?difficult to trace?

OR you could break into someone you dislikes house and use their computers to update yourself - two birds one stone :)
Things are not what they appear to be: nor are they otherwise - Surangama Sutra

Offline chris jones

  • Member
  • *****
  • Posts: 21,829

 Disqust yes, suprise NO.
Bye, bye miss American Pie......

Offline Satyagraha

  • Global Moderator
  • Member
  • *****
  • Posts: 8,939
Disqust yes, suprise NO.
Bye, bye miss American Pie......

We'll have to watch legislation as it comes up ... also an executive 'directive' in early 2011 (a disguise for an order from the CSIS, Bilderberg, NCOIC, East/West Institute, and others who collaborate with, and act on the wishes of the globalist elite)... (from the NYTimes article above),

"The Pentagon is expected to release a full National Defense Strategy for Cyber Operations this year, to be followed by broader interagency guidance from the White House, perhaps in the form of a presidential directive, in 2011."

We have time to spread this information - to make people aware of what this is all about. The fact that this 'memo' from Napolitano is now referred to in corporate msm, means they are moving quickly to shut down the uncensored internet as a method of communication between the slaves. We're making their 'context' more 'complicated' for bringing in the new world power - the global government. The memo by Napolitano is treasonous, the actions they propose are treasonous, the legislation they put forth will be in direct violation of the constitution.  We must get this information spread far and wide in order to stop these traitors from completely overtaking the US Government in their desperate rush to stop the awakened masses from "stirring".

And  the King shall answer and say unto them, Verily I say unto you, 
Inasmuch as ye have done it unto one of the least of these my brethren,  ye have done it unto me.

Matthew 25:40

Offline Optimus

  • Globalist Destroyer
  • Global Moderator
  • Member
  • *****
  • Posts: 12,802
    • GlobalGulag.com
The militarization of the Internet

Someone needs to take a good hard look at those Internet surveillance stories being strategically placed on the front page of the New York Times.

There’s a trail here, I believe, that’s worth following.  Here are some data points:

1.  Cyberattack - there appears to be a deep interest in the ability to declare war online, as evidenced by cybersecurity research and public speeches by Herbert Lin, a key player who has worked on several cybersecurity reports for the National Research Council.  Ethan Zuckerman has summarized a presentation by Lin, which included the following paraphrase of Lin’s remarks:

If we’re interested in pre-empting cyber attack, “you need to be in the other guy’s networks.” But that may mean breaking into the home computers of US citizens. To the extent that cloud computing crosses national borders, perhaps we’re attacking computers in multiple jurisdictions. Lin wonders whether a more authenticated internet will actually help us to pre-empt attack. And he reminds us that US Strategic Command asserts authorization to conduct “active threat neutralization” – i.e., logging into your machine to stop an attack in progress. . . .

Dr. Lin notes that it’s not a violation of international law to collect intelligence abroad. It’s possible to engage in covert action as regulated by US statute. And there’s an array of possible responses the US could launch in response to cyberattack (Lin pauses to note that he’s not advocating any of these) – we could attack enemy air defenses, hack their voting machines to influence an election, conduct campaigns of cyberexploitation to spy within those nations. Given all this, aren’t nations entitled to fear the consequences of a “free and open” internet? Might they reasonably choose to tighten national control over the internet?


2.  A “more authenticated Internet” would obviously include using the leverage provided by network operators to permit only fully-authorized, identified machines to connect.  The ability to remotely disconnect machines or devices until they are cleansed is now within reach for federal networks - this same capability will inevitably spread to private connections.

Read More...
“The Constitution is not an instrument for the government to restrain the people,
it's an instrument for the people to restrain the government.” – Patrick Henry

>>> Global Gulag Media & Forum <<<

Offline phasma

  • Member
  • *****
  • Posts: 7,197
  • Have a H.A.A.R.P.Y DAY !
Also Route - The UK govt just scapped our physical defence systems in favour of cyber defence because some new defence publication says that the next attack is most likely to be a cyber one.

Maybe a global moneytrail meltdown is coming - slates wiped clean, all starting again. In a manner to suit TPTB of course.
Things are not what they appear to be: nor are they otherwise - Surangama Sutra

Anti_Illuminati

  • Guest
The militarization of the Internet

Someone needs to take a good hard look at those Internet surveillance stories being strategically placed on the front page of the New York Times.

There’s a trail here, I believe, that’s worth following.  Here are some data points:

1.  Cyberattack - there appears to be a deep interest in the ability to declare war online, as evidenced by cybersecurity research and public speeches by Herbert Lin, a key player who has worked on several cybersecurity reports for the National Research Council.  Ethan Zuckerman has summarized a presentation by Lin, which included the following paraphrase of Lin’s remarks:

If we’re interested in pre-empting cyber attack, “you need to be in the other guy’s networks.” But that may mean breaking into the home computers of US citizens. To the extent that cloud computing crosses national borders, perhaps we’re attacking computers in multiple jurisdictions. Lin wonders whether a more authenticated internet will actually help us to pre-empt attack. And he reminds us that US Strategic Command asserts authorization to conduct “active threat neutralization” – i.e., logging into your machine to stop an attack in progress. . . .

Dr. Lin notes that it’s not a violation of international law to collect intelligence abroad. It’s possible to engage in covert action as regulated by US statute. And there’s an array of possible responses the US could launch in response to cyberattack (Lin pauses to note that he’s not advocating any of these) – we could attack enemy air defenses, hack their voting machines to influence an election, conduct campaigns of cyberexploitation to spy within those nations. Given all this, aren’t nations entitled to fear the consequences of a “free and open” internet? Might they reasonably choose to tighten national control over the internet?


2.  A “more authenticated Internet” would obviously include using the leverage provided by network operators to permit only fully-authorized, identified machines to connect.  The ability to remotely disconnect machines or devices until they are cleansed is now within reach for federal networks - this same capability will inevitably spread to private connections.

Read More...
Yup this whole thing is so disgusting it is beyond words.  They are making the Internet the new Iraq and Afghanistan--for eternal warfare, popping up the illegitimate national security state driven economy (because the real economy continues to be obliterated).

There are zero enemies that are not from inside job perpetrators for any and all "cyber" threats.  This new fake threat is necessary to replace the discredited boogeymen brown people, and fake, manufactured religious driven Muslim extremism (which religion has NOTHING to do with whatsoever, but was a powerful psyop developed by real terrorist thinktanks like RAND.

Btw last time I checked, a non-backdoored router/hardware firewall running Linux is pretty bulletproof security against all the "threats" that the terrorist Pentagon and CSIS claim are so dire.  It is as simple as stop making backdoored PROMIS/Ptech based enterprise architectures that allow the globalists to false flag their own systems to create the illusion of a deadly real threat.

Anyways here's a document regarding someone who is instrumental in this--New World Order sh*tbag terrorist enemy traitor John G. Grimes:  (Remember, the "transformation" in which he speaks, is that of Nazi sh*tbag terrorist Andrew Marshall, and Arthur K. Cebrowski--who rolled out the Revolution in Military Affairs agenda which is based on the Soviets "MTR" or "Military Technological Revolution".  The RMA is the application of Cybernetics applied to the military--which is also now being grafted onto the entirety of society itself worldwide.  Cybernetics is about the control of the flow of information at every stage and to and from every point.  It is the foundation that Command and Control is dependent upon--it is also the foundation in which Eugenics itself must utilize by default in order to be effectively executed.  You cannot have total slavery over humanity without employing cybernetics.  The entire 9/11 attack was an exercise in cybernetic command and control--cybernetic overthrow of all of the necessary checks and balances that would otherwise stop such an inside job attack from being possible.  Full knowledge of all of your adversaries, all weaknesses and vulnerabilities known, and all power stripped from anyone remotely genuinely patriotic and non-treasonous--such as the real Chairman of the Joint Chiefs being moved out of the way by being put on a plane flight on 9/11, to where then the criminal conspirator, real terrorist, traitor-General Richard Meyers, would fulfill his roll as one of the real "Al-Qaeda Commanders" on 9/11.
___________________________________________________________________________
http://www.globalsecurity.org/military/library/congress/2006_hr/060406-grimes.pdf

STATEMENT BY

JOHN G. GRIMES ASSISTANT SECRETARY OF DEFENSE (NETWORKS AND INFORMATION INTEGRATION) AND
DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER

BEFORE THE
SUBCOMMITTEE ON TERRORISM, UNCONVENTIONAL THREATS AND CAPABILITIES
HOUSE ARMED SERVICES COMMITTEE

ON

INFORMATION TECHNOLOGY ISSUES AND DEFENSE TRANSFORMATION

APRIL 6, 2006

NOT FOR PUBLICATION UNTIL RELEASED BY THE SUBCOMMITTEE ON TERRORISM, UNCONVENTIONAL THREATS AND CAPABILITIES,
HOUSE ARMED SERVICES COMMITTEE
 
Good afternoon Mr. Chairman and distinguished Members of the Subcommittee.  Thank you for this opportunity to testify before the Subcommittee on Terrorism, Unconventional Threats and Capabilities on the importance of information technology (IT) to the transformation of the Department of Defense (DoD).  I am John Grimes and this is my first opportunity to appear before you as the Assistant Secretary of Defense for Networks and Information Integration and the Department’s Chief Information Officer (CIO). My prepared remarks will focus on how the Department is leveraging ever-increasingly capable information technology to deliver the actionable information that we need to deal with new threats to security and stability around the world.

IT is critical to supporting the warfighter and fighting terrorism.  Today’s warfighter depends on a staggering number of IT systems and information services that feature video, graphics, imagery, collaborative planning tools, remote interactive battlefield operating systems, and systems that rely heavily on geographically distributed databases for their functionality.  Evidence of these information transfer requirements are manifested in the bandwidth requirements captured to support the U.S. Central Command (USCENTCOM) area of responsibility (AOR) from Operation Desert Shield to Operation Iraqi Freedom (OIF).  From Operation Desert Shield/Desert Storm to September 11, 2001, the bandwidth supporting the USCENTCOM AOR remained relatively constant at 45 megabytes per second (Mbps).  By March 2003, supporting a force one-quarter the size of that involved with Operation Desert Shield/Desert Storm, the theater bandwidth requirements increased nearly 5,000 percent and were still growing. Since then, that
 
requirement has grown another 166 percent to approximately 5.9 gigabits per second (GBps).  At the same time, the IT budget has remained relatively constant in comparison to the overall Defense budget.  The President’s fiscal year (FY) 2007 Defense budget request of $439.3 billion represents a seven percent (7%) increase from what was enacted last year, while the Department’s FY 2007 IT budget request of $30.9 billion represents a three percent (3%) increase from what was enacted last year ($29.9 billion).

The IT budget reflects Defense Transformation as a key element of the Secretary of Defense’s Strategy to meet the challenges of the dangerous and uncertain security environment of the 21st century.  In his strategy, the Secretary has identified six critical operational goals that provide the focus for the Department’s transformation efforts and in turn the focus of the FY 2007 IT budget:

•   Protect critical bases and defeat chemical, biological, radiological, and nuclear weapons.
•   Protect and sustain forces in anti-access environment.
•   Deny enemies sanctuary.
•   Leverage information technology.
•   Assure information systems and conducting information operations.
•   Enhance space capabilities.

The DoD and the Services have reaped IT benefits similar to the civil sector.  Soldiers in Iraq send emails and photos home.  They also depend upon emerging IT-based systems that ensure their paychecks arrive when and where expected – something spouses of deployed Soldiers could not depend upon at the start of the war.  As the Department continues down this transformational path, further benefits of the use of IT can be seen in real world application. Two such examples pertain to use of IT by ground forces in Iraq, and the stellar improvement in Air Tasking Orders since Desert Storm.

In the first example, the 1st Cavalry Division implemented a tactical networked capability, known as CAVNET, during their 2004-2005 deployment.  CAVNET linked tactical units and allowed information to be shared and updated on a continual basis, greatly enhancing the situational awareness and effectiveness of the division. In one instance, due to its ability to enable instantaneous information sharing across the division, numerous lives were saved as newly discovered insurgent improvised explosive devices (IED) deployment tactics were communicated to all units via CAVNET.

The second example pertains to Air Tasking Orders (ATOs).  An ATO matches targets, aircraft, and munitions for each set of missions conducted.  The order must also coordinate the many supporting assets including fuel and refueling requirements, intercept and jamming capabilities, and both ground and air tracking of hostile forces.  In 1991, in Operation Desert Storm, an Air Tasking Order took 72 hours to produce, consisted of over 18 inches of paper, and had to be flown to ships and bases for hand- delivery.  Changes required days of work – and delay. Today, ATOs are sent and received completely electronically, can be turned on 24 hour cycles, and are updated in hours, not days.  Efforts are underway to develop a continuous planning and update capability, enabled by a net-centric environment that can more closely follow the dynamics of ongoing operations, and thus further minimize ATO timelines.

Transformation hinges on the recognition that effective access to and use of information is an incredible force multiplier and is critical to maintaining an advantage over adversaries in the current asymmetric threat environment.  Smart leveraging of information allows decision makers at all levels to have early situational awareness for making better decisions faster and act sooner.  Ensuring timely and trusted information is available where it is needed, when it is needed, and to those who need it most is at the heart of the capability required to conduct Network-Centric Operations (NCO) a construct that requires people, processes, and technology to work together to enable timely access to information, sharing of information, and collaboration among all involved.  Instead of “pushing information out” based on individually engineered and predetermined interfaces, Net-Centricity ensures that a user at any level, whether a previously anticipated partner or an unanticipated addition to a coalition, can both “take what he needs” and “contribute what he knows.”

As the National Defense Strategy points out, transforming to a network-centric force requires more than just implementation of IT capabilities alone. Achieving the full potential of network-centric operations requires viewing information both as a strategic asset and as a weapon system to be employed in all phases of the Department’s missions – and it requires fundamental changes in processes, policy, and culture of the Department as a whole.

Net-centricity, rooted in the cyber world, tends to be described in technical terms; but in reality, the concept is quite simple – Net-centricity connects people with information.  To the men and women at all levels across the Services, it means, “I can get the information I need, where I need it and how I need it.”  Net-centricity will enable distributed, integrated operations not only among the combat forces, but also across all the functions of the Department that provide combat power, such as logistics, medical, and intelligence, as well as provide it across all phases of planning, combat, post-combat, and peacetime.  To achieve this vision, the legacy mantra to provide information on a need to know basis will be replaced by making information available on a need to share basis within a global information environment that will provide ubiquitous, assured access to information where and when the user needs it.  This has been demonstrated in Afghanistan and Iraq where ground forces have been supported by Unmanned Aerial Vehicles (UAVs) that were flown remotely by pilots in Nevada. The Department’s investments in IT are key enablers to implementing this vision and improving the operational effectiveness of the warfighter and all defense operations.

Ensuring the delivery of critical capabilities that enable NCO is one of my major responsibilities as the DoD CIO.  To further transformation, and in accordance with the National Military Strategy, we have undertaken the “creation of a collaborative information environment that facilitates information sharing, effective synergistic planning, and execution of simultaneous, overlapping operations.”  We are doing this under the auspices of the Global Information Grid (GIG).

The GIG comprises the people, processes, and technology necessary to enable Net- Centric Operations.  From the technological perspective, the GIG consists of: terrestrial, space, and wireless communications “pipes”; computing, processing, and storage “machinery;” enterprise services (such as Messaging, Discovery, and Mediation); and applications (both Joint and user-defined).  These components, while under disparate network management and information assurance practices today will over time fall under federated enterprise systems management to provide end-to-end GIG performance monitoring and ubiquitous end-to-end Information Assurance (IA).  Information access via the GIG will be enabled by implementation of a Net-Centric Data Strategy that is organized around Communities of Interest using a shared vocabulary to exchange information that ensures data are visible, accessible and understandable.

Information Assurance (IA) – protecting the data and defending the network – is as critical to the Department's Transformation as the GIG functionality described above. The importance of IA simply cannot be overemphasized, as evidenced by its selection as one of four Critical Joint Enablers considered in the Quadrennial Defense Review.  In order to depend on the GIG as the transformational weapon system it has become, we must be confident the network will be there and trust the integrity of the data.  To this end we have developed and are implementing the DoD Information Assurance Strategic Plan and the IA Component of the GIG Architecture as the overarching mechanisms to achieve and maintain the requisite level of assurance, a challenge that becomes more complex as the pace of technological change increases.  The Department is also aggressively pursuing an Enterprise Architecture and prioritized enterprise IA solutions through centralized funding. These solutions include enterprise network defense tools to: automatically identify and detect anomalies; remediate software vulnerabilities; eliminate spy-ware and mitigate insider threats.

What other types of enterprise capabilities are we working to provide via the GIG?  Some current examples of Joint capabilities to be networked include the following that are today contributing to Operation Iraqi Freedom (OIF):

•   The Air Force’s Global hawk (Unmanned Air System) is an example of an Information Technology platform that is providing daily intelligence, surveillance and reconnaissance support to the Global War on Terrorism (GWOT) in OIF.

•   Global Command and Control System (GCCS)-Joint provides the means for the joint warfighter to plan, execute, and manage military operations.  It is fielded and being used in OIF. It enables National Military Command Center (NMCC), Combatant Commanders (CC), Joint Force Commanders, and Service Component Commanders to plan and conduct military operations, and to maintain awareness of the battlefield.  Commanders can synchronize air, land, sea, space, and special operations forces using an identical view of the battlefield.

•   Global Combat Support System (GCSS) - Combatant Commander/Joint Task

Force is also being used in OIF. It uses the GIG to provide combat support data (predominantly logistics info) to the Commanders on the front lines, and it improves communications between forward deployed units and the sustaining bases.

•   Blue Force Tracking devices have received wide acclaim by the Commanders in OIF. These devices provide Commanders up-to-date location information on deployed forces. In some cases it provides readiness information as well, so Commanders can determine the ability of units to participate in planned operations.  These devices use a mix of Army developed and commercial products and use tactical terrestrial networks or commercial satellite communications to pass data to higher echelons. In support of OIF, the Armed Forces Health Longitudinal Technology Application, as part of the Theater Medical Information Program (TMIP), is currently deployed to medical units in Iraq and Kuwait.  TMIP integrates components of various medical information systems to ensure timely, interoperable medical support for rapid mobilization, deployment, and sustainment of all theater forces anytime, in support of any mission, to protect combat power worldwide.
 
There are many IT efforts underway that will further the warfighter’s and DoD’s ability to win the long war and improve and continue to optimize its enterprise operations.  One such effort is Net-Enabled Command Capability (NECC), formerly the Joint Command and Control (JC2) System. NECC will be the DoD enterprise C2 information technology. It will enable decision superiority via advanced collaborative information sharing achieved through vertical and horizontal interoperability. The current GCCS Family of Systems will migrate to NECC to provide force-level planning, execution, monitoring, and assessment of joint and multinational operations. NECC will use Net-Centric Enterprise Services and other enterprise services to exchange data cross multiple security domains.

In my role as the DoD CIO, I have a number of responsibilities in the acquisition process, which allow me to ensure that IT investments are meeting established cost, schedule and performance thresholds. I chair the Information Technology Acquisition Board and I am the Milestone Decision Authority (MDA) for major Information Technology acquisition programs in the areas of Command and Control, Communications, and such business areas as Health, Logistics, Procurement and Financial Management.  As a member of the Defense Acquisition Board for weapon systems and the Defense Business System Management Committee, I am responsible for ensuring these systems are in compliance with IT policy.  I also have responsibility for Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance and IT acquisition policy and co-sign the Department’s Acquisition Instruction (DoD Instruction 5000.2).  

We have incorporated, or are in the process of incorporating, into the acquisition instruction and guidance, policies and procedures in the areas of implementation of Title 40 (previously the Clinger-Cohen Act), net-centric operations, data management, spectrum management, the acquisition of commercial-off-the-shelf software and compliance with the Global Information Grid. Lieutenant General Croom, who is here with me today, will address the important role his Agency plays in IT Services, to include the Global Information Grid-Bandwidth Expansion (GIG-BE) program.  GIG-BE is a highly successful program that upgrades the existing Defense Information System Network to a 100 percent fiber- optic backbone and increased information flow across the network by an order of magnitude – the program was implemented on schedule and below cost.

Another successful program is the Satellite Teleport, which is upgrading the telecommunications capabilities at selected Standardized Tactical Entry Point (STEP) sites.  This program incrementally provides multi-band and multimedia satellite connectivity from deployed tactical command, control, communications, computers, and intelligence systems to fixed base locations world-wide via Defense Information System Network (DISN).  Installation of key satellite communications terminals began in 2005 with completion expected in 2006.

Interoperability for sharing information with our interagency and coalition partners is critical to winning the long war. The implementation of the Command and Control Information Exchange Data Model (C2IEDM) enables the sharing of situational awareness across the battle space with our partners.  For example, the Army has mandated use of C2IEDM as its standard and is fielding it in the next software version of the Maneuver Control System. Likewise, our North Atlantic Treaty Organization partners have adopted this data model as their standard.  Future U.S. systems like the Joint Common Operational Picture Work Station will also use this data model.

Competition for the Department’s Radio Frequency (RF) Spectrum to satisfy new requirements and the commercial marketplace is a major challenge.  The complexity of managing the RF Spectrum environment has caused the Department to significantly increase its oversight of this critical finite resource.  New technologies, to include Counter-Improvised Explosive Device (C-IED), wireless systems, Global Positioning System are dependent on the availability of RF Spectrum.  The Department has embarked upon upgrading the career progression of spectrum managers and the specialized training required to develop a cadre of experienced RF spectrum professionals that is so desperately needed by the warfighter in the theater of operation.

Information and Communications Technology (ICT) is an essential element of security cooperation and stability.  The Department has bilateral agreements for sharing IT assurance data with other nations. The Department has also established the Regional International Outreach (RIO) program that provides a network web-based environment for open exchange of ideas, collaboration, distance learning, and information sharing that allows both international and national students, alumni and faculty to continue their education and discuss matters that pertain to: terrorism; internal and regional instability jeopardizing the territorial integrity of nation states; regional and local crises that could evolve into transnational threats or spur transnational terrorism.

In summary, information technology is critical to maintaining the strategic and tactical edge on the battlefield and to achieving many of the transformational capabilities that will keep our men and women out of harms way in the increasingly dangerous world we face.  My job is to ensure that our investments in IT satisfy the warfighters’ and users’ requirements in a fiscally constrained environment.

I want to thank you for your interest in our efforts and I am happy to answer any questions you may have.

Offline phasma

  • Member
  • *****
  • Posts: 7,197
  • Have a H.A.A.R.P.Y DAY !
This from skynews UK this evening

http://news.sky.com/skynews/Home/Technology/Cyber-Attack-Threat-Is-Real-Chief-Of-Electronic-Spying-Agency-GCHQ-Demands-Quicker-Response/Article/201010215757285?lpos=Technology_Second_Technology_Article_Teaser_Region__2&lid=ARTICLE_15757285_Cyber_Attack_Threat_Is_Real%3A_Chief_Of_Electronic_Spying_Agency_GCHQ_Demands_Quicker_Response

Spy Chief: 'Cyber Attack Threat Is Real'

Britain is facing a "real and credible" threat of damaging cyber attacks, the head of the UK's electronic spying agency has warned.

GCHQ director Iain Lobban said the nation's future economic prosperity depended on developing effective defences against a cyber assault.

The massive growth of the internet had opened up new areas of vulnerability with opportunities for attack by both hostile states and criminals, he said.

With the Strategic Defence and Security Review due to be published, Mr Lobban called for the government and the telecommunications industry to work together.


Intellectual property theft was taking place on a "massive scale".

GCHQ director Iain Lobban 

"It's not a narrow security issue for the spooks - but a wide economic issue that demands a holistic response," he said.

"In order to flourish, a knowledge economy needs to protect from exploitation the intellectual property at the heart of the creative and high-tech industry sectors.

"It needs to maintain the integrity of its financial and commercial services."

While GCHQis more usually associated with electronic intelligence-gathering, Mr Lobban stressed it also had a security role, referred to as "information assurance".

He said there had been "significant disruption" to government computer systems caused by internet "worms" - ones that had been deliberately targeted and others picked up accidentally.


 
Mr Lobban called for a quicker response to 'cyber events'



There were about 20,000 "malicious" emails on government networks a month, while intellectual property theft was taking place on a "massive scale" - some relating to national security.

The increased use of government services online - with the prospect of £100bn-a-year in tax and benefits payments being processed online - added to the security challenge.

While Mr Lobban did not go into detail about the threat to the UK's critical national infrastructure, he said that it was "real and credible".

He demanded a swifter response to match the speed with which "cyber events" happened.

Things are not what they appear to be: nor are they otherwise - Surangama Sutra

Offline phasma

  • Member
  • *****
  • Posts: 7,197
  • Have a H.A.A.R.P.Y DAY !
Also - we probably need protecting from threats like this one:

http://news.sky.com/skynews/Home/Technology/Stuxnet-Worm-Iran-Deny-Nuclear-Power-Station-Was-Hit-By-First-Cyberweapon-Of-Its-Kind/Article/201009415747044?lpos=Technology_Third_Technology_Article_Teaser_Region__9&lid=ARTICLE_15747044_Stuxnet_Worm%3A_Iran_Deny_Nuclear_Power_Station_Was_Hit_By_First_Cyberweapon_Of_Its_Kind

Stuxnet Worm: Iran Deny Nuclear Station Hit

(so its ok for us to do it, just not them? I see . . . )

The first computer virus designed to damage targets in the real world has not hit Iran's nuclear power plant, the country's Government has claimed.
The Stuxnet worm is the first known malicious software of its kind unleashed by computer hackers and has opened the door to a new era of cyber-warfare.

Experts say it is designed to destroy or sabotage factories, power plants, refineries or other industrial installations.

But Iranian Foreign Ministry spokesman Ramin Mehmanparast denied widespread suggestions the nation's Busheher nuclear station had been badly affected.

He said at a weekly press conference that the reports were part of a "soft war" and "propaganda stratagem" against Iran.

"The Busheher plant is pursuing its activities based on a set timetable," he said.

We are used to Trojans and viruses roaming the internet harming computers and causing financial damage, but Stuxnet is in a league of its own.


This would require a lot of resources on the level of a nation state. Taking into account the intelligence required to attack a specific target it would be virtually impossible that this is a lone attacker sitting at home.

Gadi Evron, Israeli cybersecurity strategist

The worm targets closed and highly secure industrial networks.

After being introduced with a USB key, Stuxnet slips past four previously unknown vulnerabilities in the Windows operating system, so-called "zero day" vulnerabilities.

It is rare for malicious software to exploit even two of them.

Each one can take months for hackers to identify and more time to write software to exploit.

The worm then hunts for specific types of computers made by German company Siemens.

Having found its host, it lies dormant, waiting for a certain moment to override the computer's control of industrial machinery, with potentially disastrous consequences.

Things are not what they appear to be: nor are they otherwise - Surangama Sutra

Anti_Illuminati

  • Guest
"GCHQ director Iain Lobban said the nation's future economic prosperity depended on developing effective defences against a cyber assault."

Know what correlation I keep seeing dozens of times?

They keep talking about the economy with respect to their inside job cyber threats.

This sounds to me like they plan on sacking digital monetary systems with a coordinated massive cyber false flag--such as liquidate people's savings and checking accounts by a Stuxnet like worm.

That will get people begging the govt. to do whatever they say because if people don't even have the capability to get a paycheck for a week or 2, or can't withdraw any cash whatsoever from an ATM, bank, their reasoning and logical thinking will be non-existent, and this will completely be shut down their ability to function as a rationally thinking human being.


Remember, even NWO terrorist traitor Michael McConnel said that "his greatest concern" was a "cyberattack" that would undermine or severely disrupt the electronic banking system in the U.S.

That means he is admitting that he has inside info of a known false flag inside job attack agenda to kick people when they are down by attacking what remains of their fiat currency in the digital realm so that it creates a "really strong" awareness that you better let the fascist, terrorist Military Industrial Complex take over.

Remember, the psyops on CNN about this insanity almost a year ago preemptively, viciously blamed the American people for the cyber attack that has yet to happen, all because you were too irresponsible and you didn't allow Microsoft Windows Update to run, or that you used "evil software" that wasn't written nor approved by the New World Order--and THAT was the reason an entire power grid got shut down--because of the American people.  Just liked they blamed the American people for the economic crisis that THEY created.

Note to terrorist WIlliam J. Lynn, CSIS, James Lewis, et.al.  WE DECIDE WHAT IS NEWS, NOT YOU.  THE OLD DINOSAUR CIA/PENTAGON FUNDED PSYOPS MEDIA IS NOW DEAD, PTECH AND PROMIS SOFTWARE NEED FULL UNMITIGATED, UNTAINTED INVESTIGATION.  ALL GOVERNMENT AND ALL INDUSTRIAL COMPUTER/INFORMATION SYSTEMS ARE INHERENTLY VULNERABLE WITH INSANE WIDE-OPEN BACKDOORS SUCH AS DEFAULT PASSWORDS THAT SIEMENS TOLD PEOPLE NOT TO CHANGE, BUT THEN WHERE THE DEFAULT PASSWORD IS WHAT WAS EXACTLY EXPLOITED.  WE KNOW YOUR FALSE FLAGS ARE FAR MORE SOPHISTICATED THAN STUXNET, SUCH AS HOW YOU USED PTECH TO INJECT FAKE RADAR IMAGES ONTO NORAD AND FAA COMPUTER SCREENS, AND HOW THE SAME SOFTWARE HAD FULL CAPABILITY TO USE CYBERNETICS TO COMPLETELY DESTROY ANY AND ALL REAL U.S. AIR DEFENSE RESPONSE AND TIMELY AWARENESS.  SAME WITH THE PSYOPS OF HOW YOU PIECES OF SHIT CONSTANTLY SCREAM FOR THE NEED FOR INTEROPERABILITY FOR FIRST RESPONDERS, FIREFIGHTER, POLICE, ET.AL.--BECAUSE OF YOUR "SHOWCASE" EXAMPLE ON 9/11 HOW THEIR COMMUNICATION DEVICES ALLEGEDLY FAILED.

THEIR RADIOS DIDN'T F*CKING FAIL--YOU SABOTAGED THEM!!!  AND YOU DID IT FOR THE EXPRESS PURPOSE OF PROBLEM-REACTION-SOLUTION.

Offline phasma

  • Member
  • *****
  • Posts: 7,197
  • Have a H.A.A.R.P.Y DAY !
Your 100% on the money AI - I said something less eloquent but similar today.

They want to wipe out "cash" money.

Oh - and in relation to radio`s failing - isn`t there an echo here?

http://www.metro.co.uk/news/844067-emergency-services-radios-failed-on-7-7

Emergency services radios 'failed' on 7/7
Rescue efforts after one of the July 7 bomb attacks were hampered by poor radio coverage underground, the inquest was told yesterday.


Read more: http://www.metro.co.uk/news/844067-emergency-services-radios-failed-on-7-7#ixzz131RJCAVj
Things are not what they appear to be: nor are they otherwise - Surangama Sutra

Anti_Illuminati

  • Guest
Your 100% on the money AI - I said something less eloquent but similar today.

They want to wipe out "cash" money.

Oh - and in relation to radio`s failing - isn`t there an echo here?

http://www.metro.co.uk/news/844067-emergency-services-radios-failed-on-7-7

Emergency services radios 'failed' on 7/7
Rescue efforts after one of the July 7 bomb attacks were hampered by poor radio coverage underground, the inquest was told yesterday.


Read more: http://www.metro.co.uk/news/844067-emergency-services-radios-failed-on-7-7#ixzz131RJCAVj
Unreal.  I had never heard of that with respect to 7/7/05.  Just shows you their patterns.

Look at this inanity.  Be sure to check out the photos using the PW on this site:

http://www.afcea.org/events/stratcom/introduction.asp
http://carpenterphoto.zenfolio.com/f625198307

Offline phasma

  • Member
  • *****
  • Posts: 7,197
  • Have a H.A.A.R.P.Y DAY !
They are holding the "Inquest" into 7/7 at the moment thats why its in the press

Its all in secret - all we are getting is hero stories and the odd blip like that above

the find a plan that works then its copy + paste into the next "exercise"

As for the links thanks !

Ensuring Commanders’ Freedom of Action in Cyberspace

LMAO - what about OUR FREEDOM IN CYBERSPACE !!!
Things are not what they appear to be: nor are they otherwise - Surangama Sutra

Offline phasma

  • Member
  • *****
  • Posts: 7,197
  • Have a H.A.A.R.P.Y DAY !
For AI and anyone else interested in UK / US paralels

http://www.direct.gov.uk/prod_consum_dg/groups/dg_digitalassets/@dg/@en/documents/digitalasset/dg_191639.pdf

Securing Britain in an Age of Uncertainty:The Strategic Defence and Security Review

or

http://www.direct.gov.uk/prod_consum_dg/groups/dg_digitalassets/@dg/@en/documents/digitalasset/dg_191639.pdf

A Strong Britain in an Age of Uncertainty: The National Security Strategy

Take note people - especially you guys in the US - Believe me when I say UK is Just about good to go with the next "event"

Watch and learn by what unfolds here
Things are not what they appear to be: nor are they otherwise - Surangama Sutra

Offline phasma

  • Member
  • *****
  • Posts: 7,197
  • Have a H.A.A.R.P.Y DAY !
And while I have a bee in my bonnet about this here is an extract from the reports I just posted (3 "cyber attacks" in 2 paragraphs)

I guess a cyber attack is a done deal

All of you guys take note - keep your cash out of the banks !

Second, the National Security Council has overseen the development of a proper National Security Strategy, for the first time in this country’s history. To be useful, this strategy must allow the Government to make choices about the risks we face. Of course, in an age of uncertainty the unexpected will happen, and we must be prepared to react to that by making our institutions and infrastructure as resilient as we possibly can. Unlike the last Government, our strategy sets clear priorities – counter-terrorism, cyber, international military crises and disasters such as floods. The highest priority does not always mean the most resources, but it gives a clear focus to the Government’s effort.

Fourth, we need to build a much closer relationship between government, the private sector and the public when it comes to national security. Of course, the Government has a crucial role to play, and we will certainly fulfil our responsibilities. But we all have a part to play in keeping the country safe – be it from terrorists, cyber attack or natural disasters. For example, business and government will need to work much more closely together to strengthen our defence against cyber attack and to prepare for the worst, so that if it happens, we are able to recover rapidly and keep Britain moving.
Things are not what they appear to be: nor are they otherwise - Surangama Sutra

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated


THIS IS A HITLER RALLY FOR A GLOBALIST VIOLENT TAKEOVER OF AMERICA

THEY ARE EATING CAKE, DRINKING WINE, AND PLANNING ON ENSLAVING THE ENTIRE COUNTRY AFTER THE BANKSTERS GET DONE STEALING EVERY LAST PENNY

THESE PICTURES WILL FOREVER REMAIN AS A COMPLETE INDICTMENT OF THE TRUE ANTI-GOVERNMENT RADICAL FUNDAMENTALIST CRAZED TERRORISTS WHO HATE US BECAUSE OF OUR FREEDOMS AS GEORGE W. BUSH THE 43RD PRESIDENT OF THE UNITED STATES OF AMERICA SAID ON SEPTEMBER 20TH, 2001 TO A JOINT SESSION OF CONGRESS. IT IS THE ONLY TRUE THING HE HAS EVER SAID!
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated

"Fascism should more appropriately be called Corporatism because it is a merger of state and corporate power."
Benito Mussolini



CRIMES OF MUSSOLINI


All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Anyone can buy Black Helicopters with Treasonous Military Surveillance Systems
http://forum.prisonplanet.com/index.php?topic=190078.0

Who are the cyberterrorists? What is their agenda?
http://forum.prisonplanet.com/index.php?topic=187100.0

Don't cover up or remove your webcams...if you do you are a loser!!!
http://forum.prisonplanet.com/index.php?topic=183656.0

Who are the true terrorists engaging in anti-government, violent, radical acts?
http://forum.prisonplanet.com/index.php?topic=187085.0

Bilderberg is pissed: Mel Gibson exposed their nuke FF plans in Edge of Darkness
http://forum.prisonplanet.com/index.php?topic=179093.0

More deaths attributed to the Theft by the Private Federal Reserve Ponzi Scheme
http://forum.prisonplanet.com/index.php?topic=182497.0

***High level DHS Officers use "Electronic Dog Collars" to create Sex Slaves
http://forum.prisonplanet.com/index.php?topic=185239.0


STUXNET CYBER FALSE FLAG LAUNCHED DURING THE PLANNED CYBER STORM MILITARY DRILL
http://forum.prisonplanet.com/index.php?topic=128774.0

GPS-coded images (by stealth) help Brzezinski's plan for electronic enslavement
http://forum.prisonplanet.com/index.php?topic=183638.0

Google CEO: Of course I am adamantly opposed to the US constitution
http://forum.prisonplanet.com/index.php?topic=182794.0

Brzezinski celebrates the success of the Communist Red Army
http://forum.prisonplanet.com/index.php?topic=179385.0

***WSJ expose on kid's websites pushes us to accept the rape of privacy!
http://forum.prisonplanet.com/index.php?topic=187098.0

DOJ Urges Citizens to Report “Extremists” Handing Out Literature
http://forum.prisonplanet.com/index.php?topic=188499.0

NY Times hides their connections to Terrorists w/"How to spot a terrorist?" BS
http://forum.prisonplanet.com/index.php?topic=187866.0

Soetoro arrests patriot corporal and hunts wiki founder, but wants Suu Kyi free
http://forum.prisonplanet.com/index.php?topic=175696.0

Suicide of surveillance target exposes rampant gov 4th Amendment violations
http://forum.prisonplanet.com/index.php?topic=187967.0

"Identity Dominance"
http://forum.prisonplanet.com/index.php?topic=187829.0

Supreme Court rules 9-0 against the 4th amendment in mind blowing decision
http://forum.prisonplanet.com/index.php?topic=175608.0

Bosses are now spying on workers’ home lives-incluing beroom video camera recording and audio recording
http://forum.prisonplanet.com/index.php?topic=166994.0

Phoenix Launches Free iPhone App to instigate stalking technologies
http://forum.prisonplanet.com/index.php?topic=186195.0

EVIDENCE OF PSYCHOSIS: Deputy Secretary of Defense is a psychotic maniac!
http://forum.prisonplanet.com/index.php?topic=185006.0

Fusion Centers and SARs Will Help Disrupt [Patriots], Says Janet Napolitano
http://forum.prisonplanet.com/index.php?topic=187519.0

Elite warn of more inside job white Al-Qaeda patsies if we defend Constitution
http://forum.prisonplanet.com/index.php?topic=186534.0

Sunstein psycho writes and sends 170 pp child molest manual to kill 1st/4th amendments
http://forum.prisonplanet.com/index.php?topic=185484.0

PROVOCATEUR EXPOSED: Greg Evensen calls for open anti-constitutional rebellion
http://forum.prisonplanet.com/index.php?topic=187752.0

US Citizens Soon Be Required to Register to Work
http://forum.prisonplanet.com/index.php?topic=177633.0

Court Says Screw the 4th Amendment by Allowing Warrantless Cell Tracking
http://forum.prisonplanet.com/index.php?topic=161012.0

THE SECRET SHADOW GOVERNMENT A STRUCTURAL ANALYSIS
http://forum.prisonplanet.com/index.php?topic=145380.0

Al Gore and David de Rothschild: "It's Time For Civil Disobedience" (video clip)
http://forum.prisonplanet.com/index.php?topic=186762.0

9 Pakistani Officers arrested at gunpoint for pre-crime violations for 10 words
http://forum.prisonplanet.com/index.php?topic=185244.0

Google/CIA Perfecting Precrime Analytics System to create guilt from innocence
http://forum.prisonplanet.com/index.php?topic=181803.0

***Practice Run for NORAD NCIS UAV DC False Flag Attack!!!
http://forum.prisonplanet.com/index.php?topic=184562.0

The Post Office now a Bilderberg surveillance system for electronic enslavement
http://forum.prisonplanet.com/index.php?topic=183645.0

Biotech Corp. Rolls Out Big Brother Iris Scanners to Track Everything We Do
http://forum.prisonplanet.com/index.php?topic=184055.0

Mosque at Ground Zero part of Rockefeller/Brzezinski plan for SOCIAL UNREST!
http://forum.prisonplanet.com/index.php?topic=182506.0

Sacramento Surprise: AB1942...cameras in your cars. PEEK-A-BOO!
http://forum.prisonplanet.com/index.php?topic=183137.0

DHS/SS Admit to Storing millions of naked body images for "Remote Operations"
http://forum.prisonplanet.com/index.php?topic=182521.0

US Census controlled by Dutch/UK Queens via Reed-Elsevier (Planners of 7/7)
http://forum.prisonplanet.com/index.php?topic=176400.0

EVIDENCE OF PSYCHOSIS: Homeland Security's Jane Lute wants more POWER!
http://forum.prisonplanet.com/index.php?topic=179150.0

Chris Dodd: “No one will know until this is actually in place how it works"
http://forum.prisonplanet.com/index.php?topic=178107.0

Apple tracks your every move w/their iPhone
http://forum.prisonplanet.com/index.php?topic=176240.0

Zbigniew Brzezinski to Terrorists:"Your cause is right. God is on your side."
http://forum.prisonplanet.com/index.php?topic=170452.0

LA Fitness Killer - MK ULTRA! Videos released! Agenda-more surveillance!!!
http://forum.prisonplanet.com/index.php?topic=123072.0

Cyber War Games using "Red Teams" to prep for cyber false flags
http://forum.prisonplanet.com/index.php?topic=88948.0
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline phasma

  • Member
  • *****
  • Posts: 7,197
  • Have a H.A.A.R.P.Y DAY !
That is quite a list Dig, thankyou :)
Things are not what they appear to be: nor are they otherwise - Surangama Sutra

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline birther truther tenther

  • Member
  • *****
  • Posts: 2,726
  • Against all forms of tyranny
Unreal.  I had never heard of that with respect to 7/7/05.  Just shows you their patterns.

Look at this inanity.  Be sure to check out the photos using the PW on this site:

http://www.afcea.org/events/stratcom/introduction.asp
http://carpenterphoto.zenfolio.com/f625198307

Anybody interested in taking a class at AFCEA?

http://www.afcea.org/education/




These two particular links are directed to Anti_Illuminati (or anyone else into the PhD hardcore stuff)

http://www.afcea.org/education/details.cfm?course_number=503-11-SDCA-1

http://cio-nii.defense.gov/docs/DoDAF%20V2%20-%20Volume%201.pdf


Offline Optimus

  • Globalist Destroyer
  • Global Moderator
  • Member
  • *****
  • Posts: 12,802
    • GlobalGulag.com
Obama Tells Pentagon to Attack “Cyberthreats” On American Soil

Kurt Nimmo
Infowars.com
October 22, 2010

Obama has directed the Pentagon to attack “cyberthreats” within the United States. The teleprompter reading front man for the globalists “has adopted new procedures for using the Defense Department’s vast array of cyberwarfare capabilities in case of an attack on vital computer networks inside the United States, delicately navigating historic rules that restrict military action on American soil,” reports the New York Times.

http://www.youtube.com/watch?v=AZuLMy6CXes&feature=player_embedded

The corporate media has pushed the nominal “cyberthreat” for more than a year.

Delicately? Obama has trounced the Constitution, the Bill of Rights, and particularly Posse Comitatus. Crimes committed within the United States are the business of federal, state, and local police, not the Pentagon.

“In a break with previous policy, the military now is prepared to provide cyber expertise to other government agencies and to certain private companies to counter attacks on their computer networks, the Pentagon’s cyber policy chief, Robert Butler, said Oct. 20,” reports Defense News. “An agreement signed this month with the Department of Homeland Security and an earlier initiative to protect companies in the defense industrial base make it likely that the military will be a key part of any response to a cyber attack.”

Katrina is the model here. “The system would mirror that used when the military is called on in natural disasters like hurricanes or wildfires. A presidential order dispatches the military forces, working under the control of the Federal Emergency Management Agency,” reports the Times.

“FEMA is the Patriot Act on crack,” writes Sheila Samples, a former civilian U.S. Army Public Information Officer. “Once its powers are unleashed, Oliver North’s REX 84 ‘exercise’ will become a reality. The Constitution will be suspended and FEMA will have the right to detain or seize the property of anyone even suspected of engaging in, or who might be thinking of conspiring with others to engage in acts of espionage or sabotage.”

FEMA was created outside of Constitutional law by president Kennedy. It is not subject to congressional oversight. It was consistently modified and magnified under Carter, Reagan (especially Reagan), Bush Senior, Clinton, Bush Junior (who moved FEMA under the control of the Department of Homeland Security), and now Obama.

“Genocide fascists like Henry Kissinger, and greedy patriots like former General Richard Secord and Lt. Col. Oliver North, the architects of both the Iran-Contra scandal and today’s FEMA, must be laughing their asses off at the juvenile disinformation bait-and-switch scenario playing itself out in the US media,” Samples noted as Katrina unfolded.

Under Obama’s rules, the New York Times continues, “the president would approve the use of the military’s expertise in computer-network warfare, and the Department of Homeland Security would direct the work.” Expertise. Breaking things and killing people.

In 2008, a document entitled Information Operation Roadmap surfaced. Penned by the Pentagon, it declares the internet needs to be dealt with as if it were an enemy “weapons system.” It suggests a “robust offensive suite of capabilities to include full-range electronic and computer network attack” against perceived enemies. DoD, the document explains, will “fight the net as it would a weapons system” in order to achieve dominance in information warfare.

In short, enemies of the state — hardly limited to Muslims dwelling in far-flung caves — will be attacked with the full force of the military.

Not to worry, though. The Pentagon is sensitive to your civil liberties. “Officials involved in drafting the rules said the goal was to ensure a rapid response to a cyberthreat while balancing concerns that civil liberties might be at risk should the military take over such domestic operations.”

Sort of like the Pentagon was concerned about the Bill of Rights when it sent National Guard troops and mercenaries house-to-house to steal weapons in the aftermath of Hurricane Katrina? Sort of like the Pentagon was sensitive to the civil liberties of Americans when it created CIFA, the Counterintelligence Field Activity, and used it to snoop antiwar demonstrations?

Obama, the Pentagon, and the corporate media are exploiting the highly dubious prospect that al-CIA-duh or some other shadowy miscreant will cyber-attack “important targets… on domestic soil, whether within the government or in critical private operations like financial networks or a regional power grid.”

As we have noted on numerous occasions, the U.S. power grid is not susceptible to terrorist hackers, never mind the inanities of Senaor Joe Lieberman and other fear-mongers in the government. “To start, these systems are rarely connected directly to the public internet. And that makes gaining access to grid-controlling networks a challenge for all but the most dedicated, motivated and skilled — nation-states, in other words,” writes Michael Tanji for Wired.

You know, sort of like the Stuxnet computer worm, so sophisticated it was obviously created by a nation-state. “A number of governments with sophisticated computer skills would have the ability to create such a code. They include China, Russia, Israel, Britain, Germany and the United States,” the Associated Press reported after Iran said it was the victim of a Stuxnet attack.

Not cave dwellers in Afghanistan or, for that matter, Biloxi. If the U.S. is attacked, as the government tells us ad nauseam it will be, it will be China, Israel, or somebody in the Pentagon. It will not be patsies bundling together barbeque gas canisters or setting their undies on fire.

The Pentagon’s newly announced cyberwarfare capabilities in collaboration with the Ministry and that paragon of protecting liberty, the NSA (in the business of snooping Americans for close to 60 years), is not about protecting infrastructure not connected to the public internet. It is about tightening the noose.

“President Obama will be handed the power to shut down the Internet for at least four months without Congressional oversight if the Senate votes for the infamous Internet ‘kill switch’ bill, which was approved by a key Senate committee yesterday and now moves to the floor,” Paul Joseph Watson wrote on June 25. “The Protecting Cyberspace as a National Asset Act, which is being pushed hard by Senator Joe Lieberman, would hand absolute power to the federal government to close down networks, and block incoming Internet traffic from certain countries under a declared national emergency.”

In the event of some contrived national emergency — one the government continually warns is right around the corner — Obama’s globalist handlers will want to shut down the internet, not because it would allow hackers to turn off the power grid or attack networks, but because a free and open internet allows people to circumvent government propaganda.
“The Constitution is not an instrument for the government to restrain the people,
it's an instrument for the people to restrain the government.” – Patrick Henry

>>> Global Gulag Media & Forum <<<