Author Topic: Pentagon Considers Internet an "Enemy Weapons System" That Must Be Dealt With!!  (Read 8653 times)

0 Members and 1 Guest are viewing this topic.

Offline Optimus

  • Globalist Destroyer
  • Global Moderator
  • Member
  • *****
  • Posts: 12,802
    • GlobalGulag.com
Pentagon: The internet needs to be dealt with as if it were an enemy "weapons system"
http://www.globalresearch.ca/PrintArticle.php?articleId=7980



Information Operation Roadmap Part 3

The Pentagon's Information Operations Roadmap is blunt about the fact that an internet, with the potential for free speech, is in direct opposition to their goals. The internet needs to be dealt with as if it were an enemy "weapons system".

The 2003 Pentagon document entitled the Information Operation Roadmap was released to the public after a Freedom of Information Request by the National Security Archive at George Washington University in 2006. A detailed explanation of the major thrust of this document and the significance of information operations or information warfare was described by me here.

Computer Network Attack

From the Information Operation Roadmap:

    "When implemented the recommendations of this report will effectively jumpstart a rapid improvement of CNA [Computer Network Attack] capability." - 7

    "Enhanced IO [information operations] capabilities for the warfighter, including: ... A robust offensive suite of capabilities to include full-range electronic and computer network attack..." [emphasis mine] - 7

Would the Pentagon use its computer network attack capabilities on the Internet?

Fighting the Net

    "We Must Fight the Net. DoD [Department of Defense] is building an information-centric force. Networks are increasingly the operational center of gravity, and the Department must be prepared to "fight the net." " [emphasis mine] - 6

    "DoD's "Defense in Depth" strategy should operate on the premise that the Department will "fight the net" as it would a weapons system." [emphasis mine] - 13

It should come as no surprise that the Pentagon would aggressively attack the "information highway" in their attempt to achieve dominance in information warfare. Donald Rumsfeld's involvement in the Project for a New American Century sheds more light on the need and desire to control information.

PNAC Dominating Cyberspace

The Project for a New American Century (PNAC) was founded in 1997 with many members that later became the nucleus of the George W. Bush administration. The list includes: Jeb Bush, Dick Cheney, I. Lewis Libby, Donald Rumsfeld, and Paul Wolfowitz among many other powerful but less well know names. Their stated purpose was to use a hugely expanded U.S. military to project "American global leadership." In September of 2000, PNAC published a now infamous document entitled Rebuilding America's Defences. This document has a very similar theme as the Pentagon's Information Operations Roadmap which was signed by then Secretary of Defense Donald Rumsfeld.

From Rebuilding America's Defenses:

    "It is now commonly understood that information and other new technologies... are creating a dynamic that may threaten America's ability to exercise its dominant military power." [emphasis mine] - 4

    "Control of space and cyberspace. Much as control of the high seas - and the protection of international commerce - defined global powers in the past, so will control of the new "international commons" be a key to world power in the future. An America incapable of protecting its interests or that of its allies in space or the "infosphere" will find it difficult to exert global political leadership." [emphasis mine] - 51

    "Although it may take several decades for the process of transformation to unfold, in time, the art of warfare on air, land, and sea will be vastly different than it is today, and "combat" likely will take place in new dimensions: in space, "cyber-space," and perhaps the world of microbes." [emphasis mine] - 60

For more on Rebuilding America's Defences read this.

Internet 2

Part of the Information Operation Roadmap's plans for the internet are to "ensure the graceful degradation of the network rather than its collapse." (pg 45) This is presented in "defensive" terms, but presumably, it is as exclusively defensive as the Department of Defense.

As far as the Pentagon is concerned the internet is not all bad, after all, it was the Department of Defense through DARPA that gave us the internet in the first place. The internet is useful not only as a business tool but also is excellent for monitoring and tracking users, acclimatizing people to a virtual world, and developing detailed psychological profiles of every user, among many other Pentagon positives. But, one problem with the current internet is the potential for the dissemination of ideas and information not consistent with US government themes and messages, commonly known as free speech. Naturally, since the plan was to completely dominate the "infosphere," the internet would have to be adjusted or replaced with an upgraded and even more Pentagon friendly successor.

In an article by Paul Joseph Watson of Prison Planet.com, he describes the emergence of Internet 2.

    "The development of "Internet 2" is also designed to create an online caste system whereby the old Internet hubs would be allowed to break down and die, forcing people to use the new taxable, censored and regulated world wide web. If you're struggling to comprehend exactly what the Internet will look like in five years unless we resist this, just look at China and their latest efforts to completely eliminate dissent and anonymity on the web."
“The Constitution is not an instrument for the government to restrain the people,
it's an instrument for the people to restrain the government.” – Patrick Henry

>>> Global Gulag Media & Forum <<<

Offline Optimus

  • Globalist Destroyer
  • Global Moderator
  • Member
  • *****
  • Posts: 12,802
    • GlobalGulag.com
I think "fight the net" means us.
“The Constitution is not an instrument for the government to restrain the people,
it's an instrument for the people to restrain the government.” – Patrick Henry

>>> Global Gulag Media & Forum <<<

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
2002 exercise preparation for info war (red team/blue team just like on 9/11)

Microsoft PowerPoint - IA_Program_at_West_Point v5.ppt
... West Point, New York Sponsored by IEEE and NSA http://www.itoc.usma.edu/workshop/
Page 13. ... Duty, Honor Country NSA • Full Time NSA Liaison • IA Conference ...
www.csrc.nist.gov/organizations/fissea/2003-conference/presentations/IA_Program_at_West_Point_FISSEA.pdf - 2007-12-11 - Text Version

Other older studies with NIST involvement:

NSA/ISSO Thread
NSA/ISSO Thread Wednesday, 1:30 - 5:00 , Conference Theatre. Opening Address
by Mike Jacobs, DDI, NSA, focusing on the ISSO mission. ...
www.csrc.nist.gov/nissc/1999/program/isso.htm - 4k - Cached

NSA Product Evaluations Yesterday and Today
First Previous Next Last Index Text. Slide 55 of 82.
www.csrc.nist.gov/nissc/1999/program/isso/sld055.htm - 2k - Cached

Round 2 Analysis
... NSA Hardware Analysis. ... At the AES3 conference, Bryan Weeks of NSA gave a presentation
of their preliminary report which was included in the AES3 Proceedings. ...
www.csrc.nist.gov/archive/aes/round2/r2anlsys.htm - 9k - Cached

[MS WORD] Bridge CA Demonstration Phase II
NSA. Bridge Certification Authority Demonstration. Phase II. Directory Requirements.
and. Architecture. ... For example: cn=NSA CA -- OR -- ou=ECA1. 5.3.2 Object Classes ...
www.csrc.nist.gov/archive/pki-twg/dir_docs/BCADirectoryPhaseII-14-04-00.doc - 2007-09-25 - Text Version

[PDF] Producing Quality Configuration Guides –A NSA Perspective ...
Page 1. 1 1 Producing Quality Configuration Guides –A NSA Perspective ... Guides –A
NSA Perspective Trent Pitsenbarger NSA [email protected] ...
www.csrc.nist.gov/checklists/presentations/panel4-how_to_producing_quality_checklists/Pitsenbarger.pdf - 2003-10-01 - Text Version

[TEXT] Computer Systems Laboratory Bulletin February 1991 COMPUTER ...
Computer Systems Laboratory Bulletin February 1991 COMPUTER SECURITY ROLES OF NIST
AND NSA The passage of the Computer Security Act of 1987 and the recent ...
www.csrc.nist.gov/publications/nistbul/csl91-02.txt - 8k - 2000-07-18 - Cached

[PDF] Comment template for draft FIPS 201 and SP 800-73 Submitted by ...
... 1 NSA, R223 Lawrence Reinert G All There is not enough discussion on the maintenance
and usage of the PIV (PIV authentication, Local authentication, digital ...
www.csrc.nist.gov/groups/SNS/piv/documents/FIPS201-Public-Comments/NSA.pdf - 2007-09-27 - Text Version

Security Configuration Checklists Program for IT Products
... This Addendum to Microsoft’s Windows 2003 Security Guide and NSA’s Guides to Securing
Windows 2000 and XP was developed to enhance the confidentiality ...
www.csrc.nist.gov/checklists/repository/1057.html - 72k - Cached
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Pre 9/11 NS view of the internet:

National Security
and the Internet
http://www.utexas.edu/lbj/21cp/isoc.htm
Gary Chapman Director
The 21st Century Project LBJ School of Public Affairs
Drawer Y, University Station University of Texas Austin, TX 78713
(512) 471-8326 (512) 471-1835 (fax)
[email protected]
http://www.utexas.edu/lbj/21cp


July, 1998

This paper was presented at the annual convention of the Internet Society in July, 1998, in Geneva, Switzerland.

Introduction
The modern concept of "national security" and the electronic digital computer are roughly the same age, both products of World War II. ENIAC, the world's first digital electronic computer, went into service at the University of Pennsylvania in 1946. The U.S. government's Central Intelligence Agency and National Security Agency were launched a year later, authorized by the National Security Act.

Until relatively recently, national security and computers enjoyed a symbiotic relationship, too. Until the mid-1960s, perhaps even later, the chief U.S. government agencies responsible for national security were also the chief catalysts and funders for computer research, and also the largest customers of the computer industry. Indeed, the appearance of the digital computer even shaped the strategy of national security in the United States, as more and more national security planning became dependent on computer-based models using techniques of systems analysis and operations research. One might even argue that this symbiotic relationship between computers and national security is the primary bearer and symbol of U.S. power in the latter half of the twentieth century, even more so than nuclear weapons.

Computer technology is still important to national security, perhaps of paramount importance. Without computers, modern arsenals and "battle management" and communications would be impossible. The future appears to belong to so-called "smart" weapons, complex systems of command and control, telecommunications, satellites, electronic surveillance, and split-second information processing. The end of the Cold War has appeared to speed up the process of integrating advanced computers into weapons and command systems, rather than slow it down. The United States' overwhelming superiority in information technologies is the key to its superpower status for the foreseeable future.

But a new phenomenon is the threat to national security posed by networked computers, particularly through the Internet. This is accompanied by more than a small amount of irony, as the Internet was, for decades, a project of the U.S. Department of Defense. For a long time, during the period when the Internet was used almost exclusively by scientists, engineers, academics, and a handful of military personnel, the Internet was viewed by experts mainly as a benign and interesting research project, one with modest and limited application to national security objectives. But in the 1990s, and especially in the past two to three years, the Internet has increasingly been regarded by national security officials as a new playing field for international conflict, a new medium in which national security will take on new forms, and one in which the U.S. government agencies responsible for national security have a growing stake. High officials of the CIA, the National Security Agency, the FBI, the White House, and other, less well-known agencies now believe that the Internet is a "critical national asset" that requires their attention and protection. This may signal a new era in the development of the Internet, equal in importance to its commercial potential. In fact, the commercial use of the Internet may be influenced by national security controversies as much as by consumer response to new Internet applications.

This paper will review this controversy, looking first at the history of the Internet's relationship to national security, then providing an overview of the new landscape now that the Internet is increasingly embedded in "critical national infrastructure." The concept of "infowar," or "cyberwar," will be described, along with the attendant difficulties of assessing computer-based threats to national assets. Finally, the paper will offer some thoughts on what this new phenomenon might mean for the future development of the Internet, what strategies policymakers and technology experts should consider, and what dangers lie ahead for democracy and public policy.

The Internet and the Military in Historical Context
As is common, popular knowledge by now, the Internet was first launched as a research project funded and managed by the U.S. Department of Defense Advanced Research Projects Agency (ARPA) in the late 1960s. In 1983, the Defense Communications Agency split the network into two parts, ARPANET and MILNET, the former for the research community and the latter for nonclassified military communications. ARPANET's name was changed to the Internet, and management was turned over to the National Science Foundation. It was also in 1983 that the network adopted TCP/IP, which was perhaps the most important technical decision in the history of the Internet to date, allowing a vast expansion of the Internet that continues at an amazing rate of growth today.

There is a persistent myth surrounding the history of the Internet that it was designed to "sustain a nuclear attack," and that this was the chief research interest of the Internet's Pentagon sponsors. As described in the definitive history of the Internet, When Wizards Stay Up Late, by Katie Hafner and Matt Lyon, the story that lies behind this myth is somewhat complicated [Hafner and Lyon, 1996].

Paul Baran, a RAND Corporation researcher who joined that Air Force-sponsored thinktank in Santa Monica, California, in 1959, "developed an interest in the survivability of communications systems under nuclear attack," write Hafner and Lyon. "He was motivated primarily by the hovering tensions of the cold war, not the engineering challenges involved. . . . Baran knew, as did all who understood nuclear weapons and communications technology, that the early command and control systems for missile launch were dangerously fragile" [54]. At this time, during the late 1950s and early 1960s, the RAND Corporation was the primary source of strategic thinking for U.S. nuclear policy, and the institution was already heavily dependent on computer technology, producing many of the earliest computer models of nuclear war.

RAND researchers were working on sustainable communications systems before Baran joined their ranks, without much success. It was Baran's theoretical work on distributed networked systems that pointed toward a solution. Baran came up with three theoretical innovations that became fundamental to the development of the Internet: a distributed network, network redundancy, and message disaggregation. This was a radical departure from the then universal model of communications based on centralized switching and open, direct circuits.

Baran's work was understood by only a handful of communications experts in the United States, and it was poorly received by the people in charge of improving defense communications, most of whom came from careers rooted in the more conventional model. He halted his work in 1964, convinced that the agencies responsible for military communications would botch the job even if they adopted his ideas. "So I told my friends in the Pentagon to abort this entire program -- because they wouldn't get it right," he told Hafner and Lyon [64]. Instead, he decided to wait for the right moment, with some different kind of organization.

His opportunity emerged a few years later, when Larry Roberts, one of the ARPA officials in charge of investigating computer networks in the late 1960s, discovered Baran's RAND papers. However, note Hafner and Lyon, "Nuclear war scenarios, and command and control issues, weren't high on Roberts' agenda" [77]. Roberts was intrigued by Baran's theoretical ideas of a distributed network from a purely research point of view. Roberts was also interested in a network that would tie together several of ARPA's chief research sites, universities and other institutions conducting experiments funded by the agency. It was Roberts who laid the first foundations of the Internet, relying on contributions from many different sources, including Baran, who became a consultant to the project.

Thus, while Baran's work was motivated by the goal of building a communications network that could survive a nuclear war, this motivation was only a small part of the flow of ideas that built the technical foundations of the Internet.

Even more important is the fact that the Internet was never linked to any critical military application or system. The Internet never played a role in controlling nuclear weapons, for example. The communications network that connected U.S. nuclear facilities, such as between the North American Air Defense Command in Cheyenne Mountain, Colorado -- the hub of the country's "early warning" system -- and the launch control headquarters of the Strategic Air Command in Omaha, Nebraska, was deliberately isolated from the Internet. The scenario portrayed in the popular movie "War Games," in which a teenage computer whiz taps into the nation's nuclear arsenal from his home computer, was never possible in real life. The Defense Department built its own global communications network, the World-Wide Military Communications System (WWMCs, pronounced "Wimmix"), which shared little with the Internet and was not connected to it; indeed, WWMCs was notoriously unreliable and was eventually abandoned.

For a variety of reasons, the development of the Internet, even when it was funded by the Pentagon, scarcely attracted the attention of military planners or national security officials. In the 1960s and 1970s, ARPA was an agency nearly unto itself, run primarily by and for academic researchers who were distant from military culture. ARPA's character began to change in the 1980s, but in the early days of the Internet, the system was viewed almost universally as a research program, not as a precursor to a communications network tied to national security. In fact, it was this research character that contributed to the ease with which the Internet was absorbed by the civilian sector and now by commercial enterprises. The Internet was not burdened with security classifications, black budgets, or secret technical specifications. And, ironically enough, it was this very openness of the Internet's development that reduced its importance in the eyes of career military officers and high national security officials, who were conditioned to believe that anything significant in their fields must be classified and secret.

In short, while the Internet and the concept of "national security" share common roots in history, they developed along separate and divergent paths. This makes it all the more interesting that these paths are now converging again, but in a way that makes the Internet problematic and even threatening to national security.

The New Intersection of National Security and the Internet
In September of 1997, the President's Commission on Critical Infrastructure Protection released a preliminary report calling for a vast increase in funding to protect eight key elements of U.S. infrastructure: electric power distribution, telecommunication, banking and finance, water, transportation, oil and gas storage and transportation, emergency services and government services.

"These are the life support systems of the nation," said the Commission's chairman, retired Air Force General Robert T. Marsh. "They're vital, not only for day-to-day discourse, they're vital to national security. They're vital to our economic competitiveness world wide, they're vital to our very way of life."

"The Internet provides an access point into all these infrastructures," said Marsh. Commission member John T. Davis, representing the National Security Agency, said the government should develop a secure "Next Generation Internet" for official use.

The commission recommended doubling the current federal R&D budget of $250 million for protecting these systems, with increases of $100 million each year after 1999 to $1 billion per year by 2004.

In February, 1998, U.S. Attorney General Janet Reno unveiled a $64 million plan to build a new "command center" to fight "cyber attacks" against U.S. computer systems. This new "command center" is called the National Infrastructure Protection Center, a Justice Department response to the report from the President's Commission on Critical Infrastructure Protection [Glave, 1998].

These are just some of the more recent and visible results of concern over "cyber war," "infowar," "cyberterrorism," and other, related threats now perceived by law enforcement personnel and national security officials as new and important terrain. And these authorities commonly view the Internet as the "highway" upon which these threats will be borne.

The character of the Internet has been dramatically transformed over the past five years, as everyone knows. What began as a communications network for scientists, academics, engineers, and specialists is now a vast, global, communications medium that rivals the public telephone network, television broadcasting, and even radio. The Internet-using population, worldwide, is now over 60 million people, and Matrix Internet Data Services, an Internet demographic consulting company in Austin, Texas, has predicted that, by the year 2002, there could be more than 700 million people using the network. Senior executives in large telecommunications companies, an industry which is now the largest in the world, routinely report that data traffic will soon surpass voice traffic, and that packet-switched networks, like the Internet, may eventually supersede the circuit-switched telephone network worldwide. The Internet "model," of packet-switching, distributed communication, and unmanned digital nodes, appears to be the bedrock for nearly all future communications.

Of particular importance to those charged with national security is the fact that increasing levels of international commerce are conducted over the Internet, and also increasing levels of government service. International funds transfers, now surpassing over a trillion dollars a day, are carried by computer networks. Power grids, banks, government databases, large corporate enterprises, news networks, transportation facilities, and many other essential components of civilized life are increasingly "on the net," delivering services or conducting critical communications over the Internet.

Disruption of such services or communications could, someday it is feared, resemble or approach in severity an actual physical attack such as a military strike or a major terrorist incident. At present, the potential for a computer attack that would produce a major national calamity is controversial. Most computer attacks documented so far have been merely intrusions or annoyances. In many cases, vulnerability to computer attack is shrouded in secrecy or proprietary prudence. In other cases, vulnerability may be exaggerated to enhance the status and commercial value of computer security firms or to improve the negotiating position of government agencies that are seeking more funding or clout.

What is important now, however, is that officials of the U.S. government and experts in the private sector are arguing, persistently, that the growth of the Internet, and its expanding capabilities, combined with the fact that it is increasingly embedded in "critical national infrastructures," makes protection of computers on the Internet a matter of national security. In other words, regardless of the current threat, the future indicates growing vulnerability and thus a growing urgency for protection and vigilance.

Jamie Gorelick, U.S. Deputy Attorney General, told the host of TV's "Nightline" news talk show, Forrest Sawyer, in December of 1997, "My own assessment, Forrest, is that we have a couple of years before there is a really serious threat. We have seen indications in criminal activity, in the plans of foreign nations, in the plans of terrorist groups that lead us to believe that we should be about the process of hardening our computers against attack" [Nightline, 1997].

In yet another irony, what may contribute to the threat of computer attack in the U.S. is the country's unrivaled military superiority. General Marsh said on the same "Nightline" program, "Nobody around the world today would attempt to defeat us on the battlefield. Instead, they will be seeking means to find vulnerabilities in our systems that they can exploit and do serious harm without having to confront us in the conventional armed way of the past."

If the Internet does prove to be a viable means for nations to attack one another, nations capable of such threats will be able to afford a credible threatening status far more cheaply than if they needed vast arsenals of missiles and tanks. A relatively modest investment in the skills of a handful of network trespassers and hackers would become a substitute for immense investments in weaponry. As such, the sources of credible threats could proliferate.

This "new terrain" of computer warfare or cyberterrorism poses some serious and unfamiliar challenges to national security authorities.

First, all forms of warfare in the past have involved a threat to geographically specific assets by equally geographically specific threats -- such as massed armies or ballistic missiles. One of the chief characteristics about computer attacks is their ambiguity in nearly every dimension: it's difficult to ascertain where the attack is coming from, who is behind it, what the motive is, whether it is the work of a determined enemy or merely a curious trespasser, etc. Penetrations that come from trespassers inside the U.S. may not be benign or "domestic." Before the war in the Persian Gulf, for example, there was a report of a U.S. hacker breaking into Pentagon computers and then offering to sell the information to Saddam Hussein (who didn't buy it because he didn't believe it was genuine) [Nightline, 1997].

It's not even clear what the term "cyberwar" describes. If it means an organized and coordinated attack on computer systems by another state government, that may be too high a threshold; it's unlikely we'll see an unequivocal example of this soon, except perhaps by the U.S. attacking an enemy's computers. "Cyberterrorism" may be more likely, but, as in the distinction between war and terrorism by other means, this prospect might call for solutions different than protection from "cyberwar."

If a computer attack were to occur in the midst of some other crisis of national security, says Roger Molander, an expert now at the RAND Corporation, the very ambiguity of the attack may complicate decision-making tremendously. This is a murky world for national security officials.

Second, the United States has historically avoided major military attacks because of its relative isolation from belligerents, a kind of "continental defense." Most of the country's history in military strategy has been to keep conflict as far from the U.S. mainland as possible. But the Internet poses a new dilemma: its global character, and the way it works, allows easy access to almost any networked computer inside the United States, including those running critical systems, from nearly anywhere else in the world. For a determined adversary, there are now millions of entry points to the U.S. heartland, and requiring no logistical effort, in contrast to the obstacles facing adversaries in the past.

Third, because of the fact that computer attacks can come from both inside and outside the U.S., and the fact that the origins of such attacks are difficult to identify promptly, jurisdictional controversies and overlap among law enforcement and national security agencies are already rampant. The U.S. has had a long tradition, for fifty years at least, of separating the jurisdictions of agencies responsible for domestic threats from those responsible for foreign threats. If the Internet is factored into their responsibilities, these jurisdictional boundaries are rendered exceedingly vague and arbitrary, leading to confusion and conflicting interests.

Finally, the biggest issue of all: for the most part, in the past, the U.S. military and its national security allies, such as intelligence agencies, have been charged with protecting military assets first, and using these as offensive weapons or deterrents against enemies. In a "cyberwar" scenario, however, conventional military assets will be useless, and there may be no appropriate offensive weapons available. The military and law enforcement and national security agencies are increasingly faced with protecting private assets, such as corporate computer systems, or other information systems far outside the jurisdiction of the federal government. Given the nature of U.S. democracy, the federal government's powers for forcing protection schemes on private companies or other governmental entities are limited. And, as demonstrated by the ongoing debate over encryption restrictions, the government may have interests quite different from those of private companies, especially those that compete in the global marketplace. Indeed, given the evolving nature of global enterprise, it's commonly unclear where a U.S. company stops and a foreign counterpart or partner begins. The Internet does tend to erase national borders, as does global commerce. The U.S. defense establishment has traditionally been able to circumscribe what constitutes a "national asset," but this is getting more and more difficult to do.

For all these reasons, many of which have emerged only in the past half decade, the Internet is a new factor in national security assessment. And, given the significant influence of national security agencies in setting national political agendas, and in shaping technological trends, this new friction between the Internet and national security is likely to affect the way the Internet develops for the foreseeable future. At stake is whether the Internet can retain its democratic, global, and egalitarian features, or whether it will be absorbed into older patterns of national competition for power and status.

Netwar and Threats to Nations


How big a threat to national security is the Internet?
While the question is obvious, the answer, unfortunately, is not. While advancing technology has made assessing all threats to national security increasingly difficult, assessments of the threat of "cyberwar" or "cyberterrorism" via the Internet may be the most difficult of all, for a variety of reasons.

First, of course, the Internet is constantly changing. Indeed, it may be the most rapidly evolving entity in human history. It is difficult, if not impossible, to fix a "moment" on the Internet to make an assessment that would last more than a few weeks, at most. This is very different than assessing other kinds of vulnerabilities or threats, which change or accumulate much more slowly. During the Cold War, U.S. intelligence sources had a reasonably good idea of the capabilities of the Soviet Union, at least in terms of the raw numbers of its military assets. It's difficult to imagine how the same sources could "count" the threat of Russian hackers, for example, some of whom have penetrated deep into the computers of U.S.-based banks, such as CitiCorp in New York. The Internet has also extended and deepened its reach so broadly over the past few years that it's almost certainly impossible for anyone, or any group of people, to "know" everything it touches at any given time. Not only is the system vast, involving tens of millions of computers, but it is characterized by rapid change, contingency, complexity, innovation, and constant "churn," or the birth and death of new features almost overnight. This is, in short, a risk assessment team's worst nightmare.

Next, even if one were able to narrow one's focus to "critical" systems connected to the Internet, there are no public or even readily available data on how vulnerable such systems might be. Defense computers are buried under layers of secrecy and classification, and private companies are not likely to volunteer such information. We typically only hear about computer vulnerabilities after a break-in, and even then we learn little about the incident, and sometimes the descriptions of break-ins are not accurate, either. A New Jersey State Trooper once told the press that a teenage hacker he had arrested was altering the orbital paths of U.S. defense satellites, which was not only untrue but absurd.

People who reveal computer break-ins often have ancillary reasons for such revelations. Responding to a recent rash of reported break-ins in Pentagon computers, Peter Neumann, one of the world's leading computer security experts, told HotWired News, "Perhaps this is a con game. . . .You put out a system with miserable protection and hope that someone breaks it," he said. "Then you can ask for millions of dollars more to perform further palliative protections, rather than getting to the core of the problem -- significantly ratcheting up the security of the infrastructure" [Glave, 1998].

When officials like General Robert Marsh tell the press that the Internet provides access to many, if not all, of the critical infrastructure systems of the United States, it's difficult to assess this claim, except to suspect that he's right. The nature of the problem is one in which it's unlikely that we'll see detailed government reports on the levels and sources of current risks. Accumulating evidence based on anecdotal reports is likely to be the only information available.

Because of the paucity of hard data, and the difficulty of assessing what computer systems are vulnerable because of being connected to the Internet, it is ipso facto difficult to assess whether there is in fact an Internet-related threat that compares to other kinds of threats. Kevin Poulsen, who appeared on the "Nightline" TV program mentioned earlier, and who was described on that program as a "former computer hacker," said, "I've heard so much talk about the coming info war. I'll be more worried when somebody can actually show me a single case of a hacker doing something that malicious. So far they haven't."

He went on, "The most heinous, coordinated, planned-out, conspiratorial, hacker attack imaginable wouldn't come close to a single bombing of a building. Nobody's ever going to die from anything that happens electronically. The government has held me up as an example of a hacker that had reached the very top. If I wasn't anywhere near having that kind of capability, then what reason is there to think that anybody is?" [Nightline, 1997]

Most examples of computer break-ins have been annoyances and cause for alarm, not serious threats to critical systems. Gene Spafford, another computer security expert, likened hacker break-ins to "being pecked to death by ducks. No one of these instances is really serious. ... But if you've got 10,000 people doing that, its a huge problem" [Glave].

There have been some worrisome computer attacks, such as the attempt by German hackers to secure classified information and sell it to the Soviets, chronicled in Clifford Stoll's book The Cuckoo's Egg [Stoll, 1989]. There is some evidence that there was an attempt to disable Croatian computers during its war with Serbia, and Croatian security experts suspected Serbian programmers for the attacks, although there was no definitive evidence [Pale, 1998]. The 1989 Morris "worm" that brought down thousands of Internet computers, and the 1998 virus that affected Windows computers on the net, highlighted the vulnerability of the system as a whole. The Pentagon has admitted that its computers have been penetrated hundreds of thousands of times. Federal officials have hinted, in press briefings, that they have classified information about far more serious hacking attempts, successes, or penetration capabilities in other countries. And, of course, the Pentagon is busy building an offensive "info-war" capability of its own [Aviation Week and Space Technology, 1998].

But the overall problem facing national security authorities is that this threat of Internet-based terrorism or attack, however grave it might be, is to date not at all tangible to the average citizen, nor is it likely to become more so in the near future unless a catastrophe occurs for "demo" purposes. Their current strategy is to request vast sums of money to prevent something from occuring, not unlike the Year 2000 problem, which the public also barely understands, if at all.

This is, again, far different from the world of the recent past, in which the threat of Hiroshima in the United States was lodged quite vividly in the minds of most citizens. It's considerably more difficult to persuade the public that there is a large potential for threat to the nation via the Internet, when the entire country is on a big campaign to get everyone online, especially schoolchildren, and there is no obvious way to quantify or even nail down the full nature of the threat. Once again, this is "new terrain" for national security advisors.

As everyone knows, "national security" is largely a game of perceptions, a combination of both real and imagined threats and assets. Even during the Cold War, it was controversial how big a threat the Soviet Union was to the U.S.; this controversy continues even today, nearly ten years after the end of that conflict. So it's not surprising that it is controversial whether there is a national security threat posed by the Internet or whether this is a paranoid frame of mind; or, cynically, whether this is related primarily to institutions hoping to increase their budgets and their longevity. This controversy is fueled by the sparse information available about the true level of risk at hand, especially with respect to "critical" systems. Because we can expect that this dearth of information will continue, the controversy about the nature of the threat will no doubt extend far into the future as well. In the digital era, the very nature of the technology paradoxically makes perceptions more important, because tangible facts are harder to come by.

What do we know? When computer security experts are asked whether Internet-networked computers are secure, their answers are almost always along the lines of "not enough," or "not yet." One might discount such answers as self-interest and still conclude that more needs to be done about computer security. The explanation given by security experts about why we don't do more is that the public has not yet demanded more security for computers, and, without significant public demand, companies are not providing it. It's also expensive and sometimes troublesome to secure a computer and to keep it secure, imposing discipline on users and system administrators who would rather not be disciplined. It is common to hear of people learning about computer security the hard way, in a "trial by fire," absorbing a lesson after something nasty has occurred. Obviously if there is a real threat to national security via the Internet, such lessons are not an adequate substitute for prudent policymaking. It is the job of national security officials to prevent catastrophes, not to say "I told you so."

The vexing issue is how we might feel safer without seriously compromising the best features of the Internet, trampling on democracy, or turning into a surveillance society. These are not new concerns; they were not introduced into public debate by the appearance of the Internet. But they have been made rather dramatically more complicated by the first truly significant supra-national sphere of discourse and politics. They are further complicated by the dual role of national security agencies, which is to both protect national assets and to penetrate the defenses of enemies. It is this dual role, embedded in the traditions and histories of national security agencies, which is at the heart of the intense debates about a possible solution to computer-based threats: widespread digital encryption.

All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
The Internet and National Security Agencies
By now, nearly every federal agency within the U.S. government has some department or division responsible for computer security. But the preeminent agencies of the field are still the agencies charged with national security, such as the National Security Agency, the Central Intelligence Agency, the Federal Bureau of Investigation, and, to a lesser extent, the Justice Department and the Secret Service within the Treasury Department. It is important to acknowledge that it is the character of these agencies, their histories and their other responsibilities that give the subject of computer security in the United States a particular kind of atmosphere, largely that of the military and national security community itself. Thus, the "command and control" model of computer security has tended to dominate the U.S. government's approach.

In 1987, the Computer Security Act of the U.S. Congress apportioned responsibilities for computer security to the National Institute of Standards and Technology (NIST), of the U.S. Department of Commerce, for non-classified computer systems; and to the National Security Agency (NSA) for classified systems. This law was the result of a certain level of alarm, on the part of Congress and civil libertarians, during the Reagan administration because of a pair of White House national security directives that pointed toward NSA control over all computers in the U.S. The Computer Security Act was an attempt to mark a boundary for civilian control of unclassified information systems.

However, since the Computer Security Act the U.S. National Security Agency has worked diligently to regain and secure its supremacy over computer security policy. A 1989 "Memorandum of Understanding" between NSA and NIST shifted power back to NSA, and in 1994 President Clinton issued Presidential Decision Directive 29, which set up the Security Policy Board, which has recommended that all computer security functions for the government be merged under NSA control [EPIC].

At the same time that NSA has attempted to impose its own standards on computer security in the U.S., the Justice Department's Federal Bureau of Investigation has tended to extend its responsibilities beyond domestic law enforcement to international crime, counter-terrorism, and counter-intelligence. While officials of the NSA are largely unknown to the public, FBI Director Louis Freeh is a common face in the news, often called upon to testify and make the government's case for control over encryption and computer security in the name of national security. The 1993 bombing of the World Trade Center in New York City, which was apparently connected to a foreign conspiracy in the Middle East, strengthened the FBI's role in monitoring international terrorism immeasurably. Freeh also points to international drug cartels, new foreign sources of organized crime, the international terrorist activities of so-called "rogue states," the frightening potential for the uncontrolled proliferation of small nuclear weapons, and other threats to make the case that the FBI now has a host of new targets.

These two phenomena of recent years have tended to blur the line between domestic security and national security, a blurring that has produced crises of constitutional protections in the past. But Congress has been persuaded by the federal law enforcement and national agencies. The Intelligence Authorization Act of 1997 states:

. . . elements of the Intelligence Community may, upon the request of a United States law enforcement agency collect information outside the United States about individuals who are not United States persons. Such elements may collect such information notwithstanding that the law enforcement agency intends to use the information collected for purposes of a law enforcement investigation or counterintelligence investigation.

Whitfield Diffie, the co-inventor of public key encryption, and his co-author Susan Landau, in their 1998 book Privacy on the Line, comment: "This wording carefully steers clear of permitting the intelligence community to spy on Americans directly, but opens the way for unprecedented collaboration between the intelligence and law enforcement communities" [Diffie and Landau, 1998, 123].

The boundary-free character of the Internet will likely intensify the merging of conventional law enforcement activities inside the U.S. and the activities of national security agencies. The front line in the debate about this trend is encryption policy. In September of 1997, the U.S. Congress' House National Security Committee voted to strengthen controls on the export of digital encryption, reversing a trend toward relaxing such controls, one of the chief goals of the high tech industry. Committee members cited the warnings they received in "classified briefings" as the main reason for their vote.

Congressman Mike Oxley, a Republican of Ohio, told The New York Times, "I would find it difficult to believe that a member who heard the briefing could walk away not committed to addressing security issues. Frankly, I wish everyone interested in this issue could have heard for themselves the alarming briefing that members of our committee heard" [Wayner, 1997].

Constraints of space prevent a comprehensive or even adequate review of the encryption debate here. In summary, the U.S. government's position is that law enforcement and national security authorities need to retain the ability to intercept and interpret communications, including digital data, in order to fulfill their responsibilities to protect the United States from crime and foreign threats. As such, the federal government has proposed a series of arrangements that have all included the concept of "escrowed keys," meaning the ability of authorized officials to acquire an encryption key to unlock scrambled data. Opponents of this scheme, which is the traditional approach in military cryptography, argue that public key encryption, without escrowed keys, is the only safeguard for privacy and authenticated electronic commerce. These opponents also argue that criminals and foreign adversaries will have no incentive to use encryption with escrowed keys -- i.e., the "key escrow" approach will provide keys to the communications of people who obey the law, while others will have easy access to unbreakable encryption algorithms. The ready availability of public key encryption, argue government critics, means that "the horse is out of the barn" already. Moreover, they point out, the task of security in the computer age is for each person, or each computer administrator, to be responsible for computer security, because the task is too immense and complex for bureaucratic oversight. The argument has been framed as one in which the protective schemes are characterized as a choice between armies or locks, and each of these has its attendant interest group.

While the Congress has been largely sympathetic to and supportive of the federal law enforcement and national security agencies, another front has opened up in the U.S. courts.

In early 1997, in a case heard before the United States District Court for the Northern District of California, Bernstein v. United States Department of State , U.S. District Court Judge Marilyn Hall Patel ruled that national security considerations cannot be used to censor cryptographic schemes on the Internet. Daniel Bernstein, a graduate student, created an encryption algorithm called "Snuffle." After four years of correspondence with the U.S. State Department, Bernstein learned that his source code and all other material about "Snuffle" except a research paper were in violation of export control laws and could not be posted to the Internet. Bernstein sued the State Department, claiming that this ban violated his First Amendment rights. Judge Patel agreed with Bernstein, and wrote a stinging rebuke of the government's position. Patel ruled that computer source code is protected as free speech by the First Amendment, and that the government's attempt to ban such speech amounted to "prior restraint," which is unconstitutional. Judge Patel specifically prevented the U.S. government from using claims of a breach of national security to impose prior restraint on the distribution of encryption source code [Cummins, 1997].

The U.S. government has appealed the Bernstein decision to the U.S. Supreme Court, and it is there that a final ruling is expected. If the Supreme Court upholds Judge Patel's ruling, this may close the encryption debate for the foreseeable future; after such a ruling, all encryption source code could be posted to the Internet without intervention by national security or law enforcement agencies. This would effectively kill the means by which such agencies now control the distribution of non-escrow encryption algorithms. On the other hand, if the Supreme Court overturns the Bernstein decision, this will reinforce the role of national security agencies in shaping the future of the Internet. Because of this, the Bernstein case is being watched very closely by both sides of the encryption debate.

The dispute over encryption has put into stark relief the dual nature of the national security mission: the responsibility of such agencies to protect national technological assets and also retain the ability to intercept and interpret digital communications. In the era of the Internet, these two responsibilities are in conflict with each other, thus posing significant dilemmas to national security officials. On the one hand, these agencies are urging businesses, other government agencies, and individuals to protect their computer data from attack. On the other hand, these agencies seek to control the way these people protect such data in order to protect law enforcement and national security agency access to this data. Not surprisingly, both businesses and individuals are hesitant to implement encryption schemes that require turning over keys to people they don't know or whose motives they don't fully comprehend. Because of this hesitancy, the first mission of the security agencies, that of increasing protection for U.S. computer systems, is stymied.

General Marsh, the chairman of the President's Commission on Critical Infrastructure Protection, has told the press he hopes the dispute about encryption policy is resolved soon, because he believes, with justification, that this ongoing dispute is obstructing the implementation of greater security for computer systems. Members of the commission have hinted at their support for a loosening of encryption controls, but have also leaked the information, to The New York Times, that "they are Œunder fairly strict orders' to fall in line with the FBI's push for key recovery" [Wayner, 1997].

Business executives are understandably reluctant to invest in security systems that may be superseded by other technologies or blocked by court rulings. The U.S. federal government's rapid transition from one policy recommendation to another -- such as from DES to the "Clipper chip" to key escrow to "key recovery² -- has not helped foster confidence in the business community. And of course, some influential business organizations, such as the Business Software Alliance (http://www.bsa.org), are allied with civil libertarians and other opponents of U.S. government policy in the case of encryption standards.

Despite the hopes of General Marsh and others, at present the encryption debate in the United States is so polarized that compromise solutions are not visible nor likely to emerge soon. This polarization has been exacerbated by some ideological and political trends in the U.S. Republican conservatives who now control the U.S. Congress are more sympathetic to law enforcement and national security arguments than was true of the Congress just a few years ago. For example, for many years the U.S. House Subcommittee on Civil and Constitutional Rights was chaired by Rep. Don Edwards, a Democrat and a former FBI agent who was highly critical of any law enforcement encroachment on civil liberties. But Congressman Edwards has retired, and conservative Republicans have taken his place as committee chairmen.

Another new phenomenon is the emergence of a new breed of "cyberlibertarians² -- typically young, talented technologists who reject most of the assumptions of the national security establishment. Some of the more radical of these ideologues have argued that the Internet is the beginning of the end of the nation-state, let alone the end of the national security state. This perspective is not just an isolated intellectual discourse, either: the "cypherpunk" movement, for example, has complex and extensive ties to outlaw hackers, most of them young men, some of whom have adopted the intellectual framework of "cyberlibertarianism" as an ideological justification for criminal penetrations of government computers -- casting themselves as "Thomas Paines" of the digital revolution. Such "counterculture" attitudes are widely shared by educated young people all over the world, perhaps a natural attitude of young people rebelling against authority. But when this attitude is combined with the fact that these same people are the most technically adept in the world, and a number of them are affluent or even wealthy because of this skill -- once again, national security officials are confronting a new and alien environment, one dramatically different from eras of the past, when business leaders and skilled technologists were typically undisturbed by the alleged imperatives of national security. Now, when confronting young leaders of the digital revolution, national security authorities are in hostile territory. The end of the Cold War has given new impetus to calls for a dismantling of national security institutions, and the Internet, with its idealistic potential for global communications between planetary citizens, has come along at just the right time to fuel such ideas. Widespread use of phrases like "the digital revolution" and "Third Wave civilization" (lifted from the work of the Tofflers, and adopted by U.S. Speaker of the House Newt Gingrich) reinforce the popular notion that the "information age" entails an overturning of old regimes, including, perhaps, the centuries-old competition between nation states.

For these reasons, in addition to the prosaic clash of interests between the government and pragmatic corporations that are part of a global marketplace, the encryption debate is the leading edge of a much larger philosophical debate about the role of the state in the information age. It is unfair, of course, to characterize national security authorities as "dinosaurs" due for extinction, the way they are characterized by some of the "cyberlibertarians" -- even a small dose of the daily news is enough to convince most people that there are in fact real threats that continue to justify the need for some national security protections. On the other hand, there is no compelling reason to assume that the missions and structures and traditions and size of national security institutions created during the decades of the Cold War need persist into eternity. Many critics of national security agencies argue reasonably and persuasively that the Cold War should be regarded as an anomaly in U.S. history, a struggle that imposed sacrifices in democratic values that need not be sustained or repeated in the absence of a threat equivalent to the Soviet Union. These critics have quite rightly put on the table for debate the question of whether the "national security state" is an essential or necessary political form for nations in the 21st century, particularly in an era in which the Internet is challenging many assumptions and norms inherited from a pre-Internet period, that of World War II and the decades of the Cold War.

It may seem grandiose to suggest that complex technical debates such as those surrounding digital encryption or the prospect of "cyberwar" are the most important political debates of our time. But this is in fact the case. This is not actually all that surprising, when one considers the catalyst of such debates: the Internet itself, one of the most remarkable, promising, and at the same time vexing creations of human enterprise in the history of the world.

What Should We Do?
National security authorities, like everyone else, are confronted with a world far different than the familiar one of just a few years ago -- the tripartite combination of the end of the Cold War, the new intensity in global commerce and competition, and the information revolution has served to upend almost all previous cognitive models about how the world works. National security bureaucracies, of course, are notoriously resistant to change. But they also have many arguments on their side, as new threats have appeared simultaneously with new ways of communicating and doing business.

National security experts are facing several frustrating dilemmas. First is the need to secure U.S. computer systems while retaining some ability to intercept and interpret digital communications. As many people have pointed out, this dual mission may not only be irreconcilable, but the effort may produce some absurdities and unacceptable impositions on people using computers or developing information technologies, particularly software. Peter Wayner, a reporter for The New York Times who wrote about the Security and Freedom Through Encryption (SAFE) bill considered last year in the U.S. Congress, wrote:

The bill would force developers of new software to seek approval for their products from the United States government even if the products did not explicitly include encryption features. Such approval would be the only way to escape prosecution, [a Congressinal staff member] said. While admitting that this language would add a six- to nine-month delay in releasing new products, the staff member asserted that the computer industry would simply have to build this time into product development cycles [Wayner, 1997].

Given the life-cycles of computer software today, and the prospect of international competition not burdened by such delays, the imposition of a nine-month delay in releasing software products appears fatally ill-advised. The idea that computer software companies might need to have their products reviewed by the government, like prescription drugs, is also alarming and bizarre; the task would likely prove impossible, not to mention absurd.

Thus the implications of several initiatives by the national security community are so onerous, and so out of touch with the imperatives of the digital economy, that their chances of becoming law in the United States appear to be slim. Lawmakers are loathe to alienate national security authorities, but in this case they may have no choice -- the economic health of the United States could be seriously damaged by several of the proposals now on the table.

Moreover, it appears inevitable that uncontrolled public key encryption algorithms will proliferate, despite the resistance of the U.S. government. "Key escrow" systems such as those advocated by U.S. government officials are too vulnerable to compromise, and once keys are released into circulation, all encrypted data is compromised. Public key encryption schemes are already available in a wide variety of products and on the Internet, and there doesn't appear to be much that the government can do about these programs. If the Bernstein decision is upheld by the Supreme Court (and this Court has been consistently vigilant about challenges to the First Amendment), it will be illegal, unconstitutional, to block the distribution of source code, rendering all the efforts at government control moot. It is also significant, of course, that foreign governments do not share the U.S. government position on encryption, which creates a vast "safe harbor" for alternative encryption schemes that, because of the way the Internet works, would be merely a "click away."

The arguments of proponents of public key encryption, such as Diffie and Landau, are generally persuasive. They maintain that communications intercept is a "low-value" activity of law enforcement and national security agencies, and far outweighed by the value of more secure computer systems throughout society. They point out that surveillance of foreign communications is dependent on foreign targets of surveillance agreeing to "escrow" keys with the U.S. government, a rather improbable scenario. Diffie and Landau ask what the consequences would be if policymakers were to "make a mistake" by unregulating encryption.

If cryptography comes to present such a problem that there is popular consensus for regulating it, regulation will be just as possible in a decade as it is today. The laws will change, strong cryptography will not be made part of new products, and the ready availability that government claims to fear will decline again quickly. If, on the other hand, we set the precedent of building government surveillance capabilities into our security equipment, we risk the very survival of democracy [Diffie and Landau, 244].

They go on to say, ". . . government efforts to keep honest citizens from using cryptography to protect privacy continue. Such efforts are unlikely to achieve what governments claim to want, but very likely to cause serious damage to both business and democracy in the process" [245].

Widespread use of public key encryption appears to be the only viable and cost-effective means for truly securing computer systems essential to the functioning of modern society. The task then becomes one of adjusting the roles and activities and "mind-sets" of national security officials to this fact. This needs to be a process of collaborative work, as opposed to the current process that is characterized by polarization, hostility, suspicion and even attitudes that suggest that each side wishes the other side would die off and fade into obscurity. Collaborative work between citizens and national security agencies in the United States is unprecedented, too. There is a long history within such agencies that can be summed up in the phrase, "If only you knew what we know, you'd agree with us." But then, of course, the knowledge referred to is out of bounds, unavailable, secret, incapable of being assessed except by those deemed trustworthy enough to possess such knowledge, which typically means people who already agree with the assumptions of the intelligence and national security communities. This has to change, somehow. The end of the Cold War opens up a historic new opportunity for change.

The U.S. Congress should take the lead. Members of Congress should understand the stakes -- in the case of the intersection of the Internet and national security, the perspective of national security agencies is only one side of the coin, maybe even vastly overbalanced on the other side by the potential damage to business and democracy. Unfortunately, Congress has a history of being cowed and frightened by national security briefings. The Congress needs another leader like Don Edwards, who was not intimidated by officials of the FBI or the CIA. Whether this occurs will remain to be seen; high technology executives need to understand the need for such a leader, even if such a person doesn't agree with other features of the high tech sector's public policy agenda.

The public is not likely to be a major player in this debate. The subjects of national security and technology have always been reserved for elites, and, while this situation may be regrettable for democracy, it should not be expected that it will change soon. Consequently, there needs to be intense work on the part of the business community to persuade the White House and the Congress that the world is now a different place, that the changes recommended by government authorities are dangerous and unworkable, and that business stands ready to cooperate with national security officials in finding new solutions. To a certain extent this is already going on, but the dialogue with national security officials could be improved significantly if their Cold War rhetoric was attenuated or even abandoned.

President Clinton could be the leader this issue needs, but unfortunately he doesn't appear up to the task. He is a President more than usually shaped by the demands of law enforcement and national security authorities -- the Clinton administration has been one of the worst in recent memory for civil liberties in the U.S. The President is also famously averse to friction and confrontation, despite the ominipresence of these qualities during his service. He's probably not going to do anything to alienate either the national security community, upon whose approval much of his stature as a "law and order" President depends, or the high tech community, many of whom helped get him elected. The President's dithering on the issue of encryption may thus set the terms of the debate‹a kind of policy fibrillation -- until someone else holds his office or some other leader finds the means for real breakthrough.

In the meantime, proponents of both sides will continue to find opportunities for strategic advantage. Professional societies like the Internet Society, the Association for Computing Machinery, and IEEE should probably increase their efforts to find a workable solution. They might also consider undertaking efforts to educate the public about what's at stake, such as through sponsored television programs or a national campaign of public debate and community meetings. The high tech industry has every reason to help fund such public outreach efforts.

Finally, professional societies need to do more to educate their members that the most fundamental interests of the computing profession are not primarily about technical issues, but are tied up in public policy controversies. The computer industry has demonstrated time and time again that technical obstacles can be overcome, even with astonishing, disorienting rapidity. What hangs up progress in the information age are social and political controversies that have fewer, if any, black and white answers. People in the computer industry need to become far more sophisticated about policy issues, political participation, and how technology affects basic values in society. For too long, public policy has been considered a field separate from technology, and of only marginal importance. This may be changing, but, if so, it is changing too slowly to keep pace with the issues confronting us now. Other technical and scientific fields, particularly physics, do a much better job of integrating public policy work into their professional activities. There are lessons in the experiences of physicists that might help computer professionals, especially because of the tight coupling of the work of physicists with the field of national security.

Conclusion
The global extension of the Internet -- a natural and predictable development of computer networking -- was destined to clash with traditional principles of national security. Admitting this with the benefit of hindsight, of course, does not relieve the pressures of this clash that exist today, many of which are so vexing as to seem nearly insoluble. Two immense forces of great momentum are at odds: technological progress, which takes a million different forms, emerging from countless points around the world; and national security, the gravest and most fundamental public responsibility of the world's richest and most powerful nation. How the frictions between these forces will be resolved is not yet clear. Neither is likely to go away or even fade in strength.

What seems to be required is a new concept of national security that can accommodate the Internet. This does not have to be a radically libertarian utopia, one in which the nation-state itself withers and dies, as seems to be the hope of some young cyber-activists. Nor does it need to be an accommodation in which national security and police surveillance and enforcement are the rulers of the Internet. Any new accommodation would probably need to take uncontrolled, public key, so-called "strong" encryption for granted, as this seems to be inevitable. National security authorities were once faced with another technological revolution of comparable significance -- intercontinental ballistic missiles with nuclear warheads -- and security policy managed to adjust, for better or worse, to this new technology. The same kind of adjustment will now be required. The "national security state" that was a product of the Cold War may no longer be recognizable in ten or twenty years, but neither will any other institutions of modern society, because of the changes tied to the Internet. Because of this, national security officials need to start thinking in fresh ways. Right now they're on the wrong side of history, as noble as their aims might be.

Gary Chapman is director of The 21st Century Project at the LBJ School of Public Affairs at the University of Texas at Austin.

References
Aviation Week and Space Technology, special issue on "Information Warfare," January 19, 1998.

Cummins, Guylyn R., "National Security Alone Can't Be Used To Censor Cryptographic Speech On The Internet," Daily Transcript, March 12, 1997, available at http://www.sddt.com/reports/97reports/iWorld97_03_12/DN97_03_12_ti.html.

Diffie, Whitfield and Susan Landau, Privacy on the Line: The Politics of Wiretapping and Encryption, The MIT Press, 1998.
EPIC, Electronic Privacy Information Center, "The Computer Security Act of 1987," at http://www.epic.org/crypto/csa/.
Glave, James, "Critics Bash Reno's Cyberwar Plan," HotWired News, February 27, 1998, available at http://www.wired.com/news/news/technology/story/10605.html.
Hafner, Katie and Matthew Lyon, Where Wizards Stay Up Late: The Origins of the Internet, Simon and Schuster, 1996.
Nightline (ABC News TV talk show), December 9, 1997. Transcript available at http://www.infowar.com/CLASS_3/class3_011298a.html-ssi.
Pale, Predrag, personal interview with the Croatian Deputy Minister of Science and Technology, Predrag Pale, March 16, 1998, Zagreb, Croatia.
Stoll, Clifford, The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage, Doubleday, 1989.
Wayner, Peter, "Computer Privacy: Your Shield? Or a Threat to National Security?" The New York Times, September 24, 1997.
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline trixi1

  • Member
  • *****
  • Posts: 1,891
  • He is watching. Smile because Jesus is Lord.
http://www.khaleejtimes.com/DisplayArticleNew.asp?xfile=data/theworld/2008/February/theworld_February77.xml&section=theworld&col

Quote
Ships did not cause Internet cable damage
(AFP)

3 February 2008


CAIRO - Damage to undersea Internet cables in the Mediterranean that hit business across the Middle East and South Asia was not caused by ships, Egypt’s communications ministry said on Sunday, ruling out earlier reports.

The transport ministry added that footage recorded by onshore video cameras of the location of the cables showed no maritime traffic in the area when the cables were damaged.

‘The ministry’s maritime transport committee reviewed footage covering the period of 12 hours before and 12 hours after the cables were cut and no ships sailed the area,’ a statement said.

‘The area is also marked on maps as a no-go zone and it is therefore ruled out that the damage to the cables was caused by ships,’ the statement added.

Two cables were damaged earlier this week in the Mediterranean sea and another off the coast of Dubai, causing widespread disruption to Internet and international telephone services in Egypt, Gulf Arab states and South Asia.

A fourth cable linking Qatar to the United Arab Emirates was damaged on Sunday causing yet more disruptions, telecommunication provider Qtel said.

Earlier reports said that the damage had been caused by ships that had been diverted off their usual route because of bad weather.

Egypt’s communication and information technology ministry said it would report its findings to the owners of the two damaged Mediterranean cables, FLAG Telecom and SEA-ME-WE4.

A repair ship was expected to begin work to fix the two Mediterranean cables on Tuesday.

Now, we'll see if the MSM continues with its propaganda machine on this.
John 3:16 teaches us: "For God so loved the world, that he gave his only begotten Son, that whosoever believeth on him should not perish, but have everlasting life."

John 14:6 says:  "I am the way the truth and the life; NO MAN cometh unto the Father BUT BY ME."

Offline chris jones

  • Member
  • *****
  • Posts: 21,832
Thats what they think of free speach, welcome to the new America.

I would enjoy so very much tosee these turncoats do an about face and march off in chains.

Offline trixi1

  • Member
  • *****
  • Posts: 1,891
  • He is watching. Smile because Jesus is Lord.
http://www.rense.com/general80/cable.htm

Quote
Connecting The Many Undersea
Cut Cable Dots - 9 Or More?
By Richard Sauder, PhD
Copyright 2008. All rights reserved.
2-5-8


The last week has seen a spate of unexplained, cut, undersea communications cables that has severely disrupted communications in many countries in the Middle East, North Africa and South Asia. As I shall show, the total numbers of cut cables remain in question, but likely number as many as eight, and maybe nine or more.
 
The trouble began on 30 January 2008 with CNN reports that two cables were cut off the Egyptian Mediterranean coast, initially severely disrupting Internet and telephone traffic from Egypt to India and many points in between. According to CNN the two cut cables "account for as much as three-quarters of the international communications between Europe and the Middle East." CNN reported that the two cut cables off the Egyptian coast were "FLAG Telecom's FLAG Europe-Asia cable and SeaMeWe-4, a cable owned by a consortium of more than a dozen telecommunications companies".(10) Other reports placed one of the cut cables, SeaMeWe-4, off the coast of France, near Marseille.(9)(12) However, many news organizations reported two cables cut off the Egyptian coast, including the SeaMeWe-4 cable connecting Europe with the Middle East. The possibilities are thus three, based on the reporting in the news media: 1) the SeaMeWe-4 cable was cut off the coast of France, and mistakenly reported as being cut off the coast of Egypt, because it runs from France to Egypt; 2) the SeaMeWe-4 cable was cut off the Egyptian coast and mistakenly reported as being cut off the coast of France, because it runs from France to Egypt; or 3) the SeaMeWe-4 cable was cut both off the Egyptian and the French coasts, nearly simultaneously, leading to confusion in the reporting. I am not sure what to think, because most reports, such as this one from the International Herald Tribune, refer to two cut cables off the Egyptian coast, one of the two being the SeaMeWe4 cable,(11) while other reports also refer to a cut cable off the coast of France.(9)(12) It thus appears that the same cable may have suffered two cuts, both off the French and the Egyptian coasts. So there were likely actually three undersea cables cut in the Mediterranean on 30 January 2008.
 
In the case of the cables cut off the Egyptian coast, the news media initially advanced the explanation that the cables had been cut by ships' anchors.(10)(13) But on 3 February the Egyptian Ministry of Communications and Information Technology said that a review of video footage of the coastal waters where the two cables passed revealed that the area had been devoid of ship traffic for the 12 hours preceding and the 12 hours following the time of the cable cuts.(5)(11) So the cable cuts cannot have been caused by ship anchors, in view of the fact that there were no ships there.
 
The cable cutting was just getting started. Two days later an undersea cable was reported cut in the Persian Gulf, 55 kilometers off of Dubai.(11) The cable off of Dubai was reported by CNN to be a FLAG Falcon cable.(10) And then on 3 February came reports of yet another damaged undersea cable, this time between Qatar and the UAE (United Arab Emirates).(6)(7)(11)
 
The confusion was compounded by another report on 1 February 2008 of a cut undersea cable running through the Suez to Sri Lanka.(19) If the report is accurate this would represent a sixth cut cable. The same article mentions the cut cable off of Dubai in the Persian Gulf, but seeing as the Suez is on the other side of the Arabian peninsula from the Persian Gulf, the article logically appears to be describing two separate cable cutting incidents.
 
These reports were followed on 4 February 2008 with a report of even more cut undersea cables. The Khaleej Times reported a total of five damaged undersea cables: two off of Egypt and the cable near Dubai, all of which have already been mentioned in this report. But then the Khaleej Times mentions two that have not been mentioned elsewhere, to my knowledge: 1) a cable in the Persian Gulf near Bandar Abbas, Iran, and 2) the SeaMeWe4 undersea cable near Penang, Malaysia.(3) The one near Penang, Malaysia appears to represent a new incident. The one near Bandar Abbas is reported separately from the one off Dubai and is evidently not the same incident, since the report says , "FLAG near the Dubai coast" and "FALCON near Bandar Abbas in Iran" were both cut. Bandar Abbas is on the other side of the Persian Gulf from Qatar and the UAE, and so presumably the cut cable near Bandar Abbas is not the one in that incident either. Interestingly, the report also states that, "The first cut in the undersea Internet cable occurred on January 23, in the Flag Telcoms FALCON submarine cable which was not reported.(3) This news article deals primarily with the outage in the UAE, so it raises the question as to whether this is a reference to yet a ninth cut cable that has not hit the mainstream news cycle in the United States.
 
By my count, we are probably dealing with as many as eight, maybe even nine, unexplained cut or damaged undersea cables within the last week, and not the mere three or four that most mainstream news media outlets in the United States are presently reporting. Given all this cable-cutting mayhem in the last several days, who knows but what there may possibly be other cut and/or damaged cables that have not made it into the news cycle, because they are lost in the general cable-cutting noise by this point. Nevertheless, let me enumerate what I can, and keep in mind, I am not pulling these out of a hat; all of the sources are referenced at the conclusion of the article; you can click through and look at all the evidence that I have. It's there if you care to read through it all.
 
one off of Marseille, France
two off of Alexandria, Egypt
one off of Dubai, in the Persian Gulf
one off of Bandar Abbas, Iran in the Persian Gulf
one between Qatar and the UAE, in the Persian Gulf
one in the Suez, Egypt
one near Penang, Malaysia
initially unreported cable cut on 23 January 2008 (Persian Gulf?)
 
Three things stand out about these incidents:
 
all of them, save one, have occurred in waters near predominantly Muslim nations, causing disruption in those countries;
all but two of the cut/damaged cables are in Middle Eastern waters;
so many like incidents in such a short period of time suggests that they are not accidents, but are in fact deliberate acts, i.e., sabotage.
 
The evidence therefore suggests that we are looking at a coordinated program of undersea cable sabotage by an actor, or actors, on the international stage with an anti-Muslim bias, as well as a proclivity for destructive violence in the Middle Eastern region.
 
The question then becomes: are there any actors on the international stage who exhibit a strong, anti-Muslim bias in their foreign relations, who have the technical capability to carry out clandestine sabotage operations on the sea floor, and who have exhibited a pattern of violently destructive policies towards Muslim peoples and nations, especially in the Middle East region?
 
The answer is yes, there are two: Israel and the United States of America.
 
In recent years, Israel has bombed and invaded Lebanon, bombed Syria, and placed the Palestinian Territories under a pitiless and ruthless blockade/occupation/quarantine/assault. During the same time frame the United States of America has militarily invaded and occupied Iraq and Afghanistan, and American forces remain in both countries at present, continuing to carry out aggressive military operations. Simultaneous with these Israeli and American war crimes against countries in the region, both Israel and the United States have made many thinly veiled threats of war against Iran, and the United States openly seeks to increase its military presence in Pakistan's so-called "tribal areas".(15) Israel and the United States both have a technically sophisticated military operations capability. Moreover, the United States Navy has a documented history of carrying out espionage activities on the sea floor. The U.S. Navy has long had special operations teams that can go out on submarines and deploy undersea, on the seabed itself, specifically for this sort of operation. This has all been thoroughly documented in the excellent book, Blind Man's Bluff: The Untold Story of American Submarine Espionage, by Sherry Sontag and Christopher Drew (New York: Public Affairs, 1998). The classic example is Operation Ivy Bells, which took place during the Cold War, in the waters off the Soviet Union. In a joint, U.S. Navy-NSA operation, U.S. Navy divers repeatedly tapped an underwater cable in the Kuril Islands, by swimming out undersea, to and from U.S. Navy submarines.(14)
 
This sort of activity is like something straight out of a spy novel thriller, but the U.S. Navy really does have special submarines and deep diving, special operations personnel who specialize in precisely this sort of operation. So cutting undersea cables is well within the operational capabilities of the United States Navy.
 
Couple this little known, but very important fact, with the reality that for years now we have seen more and more ham-handed interference with the global communications grid by the American alphabet soup agencies (NSA, CIA, FBI, HoSec) and major telecommunication companies. Would the telecommunication companies and the American military and alphabet soup agencies collude on an operation that had as its aim to sabotage the communications network across a wide region of the planet? Would they perhaps collude with Israeli military and intelligence agencies to do this? The honest answer has to be: sure, maybe so. The hard reality is that we are now living in a world of irrational and violent policies enacted against the civilian population by multinational corporations, and military and espionage agencies the world over. We see the evidence for this on every hand. Only the most myopic among us remain oblivious to that reality.
 
In light of the American Navy's demonstrated sea-floor capabilities and espionage activities, the heavy American Navy presence in the region, the many, thinly veiled threats against Iran by both the Americans and the Israelis, and their repeated, illegal, military aggression against other nations in the region, suspicion quite naturally falls on both Israel and the United States of America. It may be that this is what the beginning of a war against Iran looks like, or perhaps it is part of a more general, larger assault against Muslim and/or Arab interests across a very wide region. Whatever the case, this is no small operation, seeing as the cables that have been cut are among the largest communication pipes in the region, and clearly represent major strategic targets.
 
Very clearly, we are not looking at business as usual. On the contrary, it is obvious that we are looking at distinctly unusual business.
 
The explanations being put forth in the mainstream news media for these many cut, undersea communications cables absolutely do not pass the smell test. And by the way, the same operators who cut undersea cables in the Persian Gulf, Mediterranean Sea, Malaysia and possibly the Suez as well, presumably can also cut underwater cables in the Gulf of Mexico, the Great Lakes, the Chesapeake Bay and Puget Sound. This could be a multipurpose operation, in part a test run for isolating a country or region from the international communications grid. The Middle East today, the USA tomorrow?
 
What's that you say? I don't understand how the world works? That kind of thing can't happen here?
 
In any event, if the cables have been intentionally cut, then that is an aggressive act of war. I'm sure everyone in the region has gotten that message. I'm looking at the same telegram as they are, and I know that it's clear as a "bell" to me.(14)
 
It is little known by the American people, but nevertheless true, that Iran intends to open its own Oil Bourse this month (February 2008) that will trade in "non-dollar currencies".(16) This has massive geo-political-economic implications for the United States and the American economy, since the American dollar is at present still (if not for much longer) the dominant reserve currency internationally, particularly for petroleum transactions. However, due to the mind-boggling scale of the structural weaknesses in the American economy, which have been well discussed in the financial press in recent weeks and months, the American dollar is increasingly shunned by corporate, banking and governmental actors the world over. No one wants to be stuck with vaults full of rapidly depreciating dollars as the American economy hurtles towards the basement. And so an operational Iranian Oil Bourse, actively trading supertankers full of petroleum in non-dollar currencies, poses a great threat to the American dollar's continued dominance as the international reserve currency.
 
The American fear and unease of this development can only be increased by the knowledge that, "Oil-rich Gulf Cooperation Council (GCC) member states Bahrain, Kuwait, Qatar, Saudi Arabia and the UAE have set 2010 as the target date for adopting a monetary union and single currency."(2) The American government's fear must have ratcheted up another notch when Kuwait "dropped its dollar peg" in May "and adopted a basket of currencies", arousing "speculation that the UAE and Qatar would follow suit or revalue their currencies."(2) Although all the GCC members, with the exception of Kuwait, agreed at their annual meeting in December 2007 to continue to peg their currencies to the American dollar,(2) the hand writing is surely on the wall. As the dollar plummets, their American currency holdings will be worth less and less. At some point, they will likely decide to cut their losses and decouple the value of their currencies from that of the dollar. That point may be in 2010, when they establish the new GCC currency, maybe even sooner than that. If Iran succeeds in opening its own Oil Bourse it is hard to imagine that the GCC would not trade on the Iranian Oil Bourse, given the extremely close geographic proximity. And it is hard to believe that they would not trade their own oil in their own currency. Otherwise, why have a currency of their own? Clearly they intend to use it. And just as clearly, the three cut or damaged undersea communications cables in the Persian Gulf over the last week deliver a clear message. The United States may be a senescent dinosaur, and it is, but it is also a violent, heavily armed, very angry senescent dinosaur. In the end, it will do what all aged dinosaurs do: perish. But not before it first does a great deal of wild roaring and violent lashing and thrashing about.
 
There can be no doubt that Iran, and the other Gulf States, were intended recipients of this rather pointed cable cutting telegram, for all of the reasons mentioned here; and additionally, in the case of Iran, probably also as a waning for its perceived insults of Israel and dogged pursuit of its nuclear program in contravention of NeoCon-Zionist dogma that Iran may not have a nuclear program, though other nations in the region, Pakistan and Israel, do.
 
I must mention that one of my e-mail correspondents has pointed out that another possibility is that once the cables are cut, special operations divers could hypothetically come in and attach surveillance devices to the cables without being detected, because the cables are inoperable until they are repaired and start functioning again. In this way, other interests who wanted to spy on Middle Eastern communications, let's say on banking and trading data going to and from the Iranian Oil Bourse, or other nations in the Middle East, could tap into the communications network under cover of an unexplained cable "break". Who knows? -- this idea may have merit.
 
It is noteworthy that two of the cables that were cut lie off the Egyptian Mediterranean coast, and another passes through the Suez. During the height of the disruption, some 70 percent of the Egyptian Internet was down. (13) This is a heavy blow in a day when everything from airlines, to banks, to universities, to newspapers, to hospitals, to telephone and shipping companies, and much more, uses the Internet. So Egypt was hit very hard. An astute observer who carefully reads the international press could not fail to notice that in recent days there has been a report in the Egyptian press that "Egypt rejected an Israeli-American proposal to resettle 800,000 Palestinians in Sinai." This has evidently greatly upset the Zionist-NeoCon power block holding sway in Tel Aviv and Washington, DC with the result that Israel has reportedly threatened to have American aid to Egypt reduced if Egypt does not consent to the resettlement of the Palestinians in Egyptian territory.(17) This NeoCon-Zionist tantrum comes hard on the heels of the Israeli desire to cut ties with Gaza, as a consequence of the massive breach of the Gaza-Egypt border by hundreds of thousands of Palestinians in January 2008. (18)
 
What are NeoCon-Zionist tyrants to do when their diplomatic hissy fits and anti-Arab tirades no longer carry the day in Cairo? Or in Qatar and the UAE? Maybe they get out the underwater cable cutters and deploy some special operations submarines and divers in the waters off of Alexandria and in the Suez and in the Persian Gulf.
 
This would be completely in line with articulated American military doctrine, which frankly views the Internet as something to be fought. American Freedom Of Information researchers at George Washington University obtained a Department of Defense (Pentagon) document in 2006, entitled "Information Operation Roadmap", which says forthrightly and explicitly that "the Department must be prepared to 'fight the net'".(20) This is a direct quote. It goes on to say that, "We Must Improve Network and Electro-Magnetic Attack Capability. To prevail in an information-centric fight, it is increasingly important that our forces dominate the electromagnetic spectrum with attack capabilities." (20) It also makes reference to the importance of employing a "robust offensive suite of capabilities to include full-range electronic and computer network attack."(8)(20)
 
So now we can add to our list of data points the professed intent of the American military to "fight the net", using a "robust offensive suite of capabilities" in a " full-range electronic and computer network attack."
 
Maybe this sudden spate of cut communications cables is what it looks like when the American military uses a "robust offensive suite of capabilities" and mounts an "electronic and computer network attack" in order to "fight the net" in one region of the world. They have the means, and the opportunity, I've amply demonstrated that in this article. And now we also have the motive, in their own words, from their own policy statement. The plain translation is that the American military now regards the Internet, that means the hardware such as computers, cables, modems, servers and routers, and presumably also the content it contains, and the people who communicate that content, as an adversary, as something to be fought.
 
Oh yes, just a couple of more dots to connect before you fall asleep tonight:
 
1) The USS San Jacinto, an anti-missile AEGIS cruiser, was scheduled to dock in Haifa, Israel on 1 February 2008. The Jerusalem Post reported that this ship's anti-missile system "could be deployed in the region in the event of an Iranian missile attack against Israel."(1) Are we to expect another "false flag" attack, like the inside job on 9-11 perhaps? -- an attack that will be made to appear that it comes from Iran, and that is then used as a pretext to strike Iran, maybe with nuclear weapons? And when Iran retaliates with its own missiles, then the Americans and Israelis will unleash further hell on Iran? Is that the Zionist-NeoCon plan, or something generally along those lines?
 
2) I have to wonder because just this past Saturday, there was a report in the news that, "Retired senior officers told Israelis ... to prepare 'rocket rooms' as protection against a rain of missiles expected to be fired at the Jewish State in any future conflict." Retired General Udi Shani reportedly said, "The next war will see a massive use of ballistic weapons against the whole of Israeli territory."(4)
 
Now that we know the Israeli military establishment's thinking, and now that we have a view into the American military mindset, we ought to be looking at international events across the board with a very critical, analytical eye, especially as they relate to possible events that either are playing out right now, or may potentially play out in the relatively near future, say in the time frame of the next one month to five years. These people are violent and devious; they have forewarned us, and we should take them at their word, given their murderous record on the international stage.
 
Contact the author at:
[email protected]
 
 
References
 
1) http://www.jpost.com/servlet/Satellite?c=JPArticle&cid=12020645732
79&pagename=JPost%2FJPArticle%2FShowFull
 
2) http://www.middle-east-online.com/english/business/?id=24186
 
3) http://www.khaleejtimes.com/DisplayArticle.asp?xfile=data/the
uae/2008/February/theuae_February121.xml&section=theuae
 
4) http://www.breitbart.com/article.php?id=080202132053.iohfg5ob&show_article=1
 
5) http://www.abc.net.au/news/stories/2008/02/04/2153455.htm
 
6) http://afp.google.com/article/ALeqM5i03tUdyj8wf2Xa9P4trWEjqAJdyQ
 
7) http://www.arabianbusiness.com/510132-internet-probl
ems-continue-with-fourth-cable-break?ln=en
 
8) http://www.globalresearch.ca/PrintArticle.php?articleId=7980
 
9) https://confluence.slac.stanford.edu/display/IEPM/Effect
s+of+Fibre+Outage+through+Mediterranean
 
10) http://www.cnn.com/2008/WORLD/meast/02/01/internet.outage/?iref=hpmostpop
 
11) http://www.iht.com/articles/2008/02/04/technology/cables.php
 
12) http://www.nytimes.com/2008/01/31/business/worldbu
siness/31cable.html?_r=2&oref=slogin&oref=slogin
13) http://www.infoworld.com/article/08/01/31/Cut-cabl
e-disrupts-Internet-in-Middle-East_1.html
 
14) http://www.specialoperations.com/Operations/ivybells.html
 
15) http://www.guardian.co.uk/pakistan/Story/0,,2213925,00.html
 
16) http://www.presstv.ir/detail.aspx?id=37468&sectionid=351020103
 
17) http://www.roadstoiraq.com/2008/02/02/egypt-rejected-an-american-israeli-
proposal-to-re-settle-800000-palestinians-in-sinai/
 
18) http://www.telegraph.co.uk/news/main.jhtml?xml=
/news/2008/01/24/wgaza124.xml
 
19) http://www.smartmoney.com/news/on/inde
x.cfm?story=ON-20080201-000320-0524
 
20) http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB177/info_ops_roadmap.pdf
John 3:16 teaches us: "For God so loved the world, that he gave his only begotten Son, that whosoever believeth on him should not perish, but have everlasting life."

John 14:6 says:  "I am the way the truth and the life; NO MAN cometh unto the Father BUT BY ME."

Offline Joe(WI)

  • Member
  • *****
  • Posts: 2,272
    • Knowledge
Remember the good old days, when the puzzle palace worries about keeping its own secrets? Now it must keep us safe from our own secrets! Ooh, the naughty fun. *Eisenhauer ringing in ears yet...*
The number, 666, has been changed. The new number is, 999.

Offline DELiRiOUS

  • Member
  • *
  • Posts: 5
Interesting articles, I agree with most of the points except the internet 2.0 part. I can tell you w/ confidence who ever decided to throw that part in is trying to get a rise out of people and its not at all based on reality, from personal/hands-on experience.

Quote
Internet 2

Part of the Information Operation Roadmap's plans for the internet are to "ensure the graceful degradation of the network rather than its collapse." (pg 45) This is presented in "defensive" terms, but presumably, it is as exclusively defensive as the Department of Defense.

As far as the Pentagon is concerned the internet is not all bad, after all, it was the Department of Defense through DARPA that gave us the internet in the first place. The internet is useful not only as a business tool but also is excellent for monitoring and tracking users, acclimatizing people to a virtual world, and developing detailed psychological profiles of every user, among many other Pentagon positives. But, one problem with the current internet is the potential for the dissemination of ideas and information not consistent with US government themes and messages, commonly known as free speech. Naturally, since the plan was to completely dominate the "infosphere," the internet would have to be adjusted or replaced with an upgraded and even more Pentagon friendly successor.

In an article by Paul Joseph Watson of Prison Planet.com, he describes the emergence of Internet 2.

    "The development of "Internet 2" is also designed to create an online caste system whereby the old Internet hubs would be allowed to break down and die, forcing people to use the new taxable, censored and regulated world wide web. If you're struggling to comprehend exactly what the Internet will look like in five years unless we resist this, just look at China and their latest efforts to completely eliminate dissent and anonymity on the web."

In truth, Internet 2 isn't 'emerging', you're on it now, you've been on networks branching from it since about 1996 if I remember the first conferences I attended about the upgrades to our networks - I work for one of the big three telecom companies in Canada as a network security analyst and infrastructure engineer, mainly auditing and implementing current/future security solutions. The history of it starts within the campuses of the states and Canada, the original network design connected all the major ones with fiber and eventually spanned under the oceans to connect the continents with fiber optics, each fiber on average is 10Gbps multiplied by potentially thousands in each bundle. Not many people have home access to these backbones but your ISP is probably a branch of one.

You also need to distinguish between Internet 2.0 and Web 2.0, both are here and have been for years but Web 2.0 is the one most often talked about and that too has been here a couple years and in itself is pretty uninteresting - think blogs, community websites, cnn.com has a lot of W2.0 content, google uses a lot in it's backend software, etc.

Maybe I'm missing some integral part of the conspiracy theory and its playing out before my eyes but I would HOPE I'd notice. I work regularly with Tier 2 EDGE routers and team with other engineers a few times a year to do work on Tier 1 servers, I mean I've seen all the hardware and the chance of an inside job being pulled off I would say is next to impossible. To even enter the room where Tier 1 routers/servers are located; you need a lawyer present, you sign in, some locations take your picture, if you're late for your scheduled time in the room they'll wave at you from inside through the glass, theres security with you and more cameras than in a best buy condensed into a tiny room. Even if you payed the guards, stole the tapes that aren't recorded on site, had a fake ID and used someones severed finger to gain access, the moment changes were affected it would bring down the entire internet if the traffic wasn't redirected around that site - hence the security.

The US govt doesn't control all the Tier 1 routers, but it has tried to in the past, as long as they are spread out all over the world I'm not worried about censorship. If push comes to shuv, theres more than one internetwork out there, "The Internet" is just the most popular, there are some based on P2P technology with no central DNS tables to propagate and therefor would be impossible to shutdown without individually visiting people's houses. In fact the second incarnation of P2P should start showing up in late 08, or sometime into 09 which will expand a great deal on the current protocol making it even more impossible to control.

COULD the internet one day be controlled? I guess, if a system of world govt. was put into play then they could take over all Tier 1 providers around the world and only propagate the websites it deemed proper for the public to see. At the very least though, everyone would know, it would most definitely be impossible to keep that a secret and monitor you without you knowing unless you never watched the news. And since everyone knew you'd start seeing the immergence of non-centralized P2P networks reclaiming the internet and "The Internet" begin to die.

My take on the whole thing anyway.

Offline ryanwv

  • Member
  • ****
  • Posts: 284
    • The Ghost of Liberty
`Fighting the Net`?

That proves it right there to me. The DOD considers the people the enemy.
The gentlemen from Tokyo MR. Ryan D. Smith


Offline heavyhebrew

  • Member
  • *****
  • Posts: 3,986
  • Laughter is the best medicine.
Internet 2.
www.internet2.edu
Atlas: http://atlas.grnoc.iu.edu/I2.html

Most important part of the internet2.edu site, the corporate membership list: http://members.internet2.edu/corporate/corporate.cfm

The most scary part of open information on internet2: http://shibboleth.internet2.edu/
Yes, the name of the project is Shibboleth. I am not making this up. Scary?

Internet 2 is being branded as the successor network system for the original ARPAnet based Internet (also known as "commodity internet"). One thing that initially impressed me was the bandwidth being offered. Why so much on the upload? Video conferencing can not explain it all. 2 way traffic scares me, paired with HD television and massive ability to upload in real time makes me think that the 'telescreen' of Winston Smith in George Orwell's 1984 is not far off.
We work jobs we hate to pay for stuff we don't need to impress people we don't like. Am I the crazy one here?