Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
The Internet....Now You Have It....Soon You May Not!
#1
National Cyber Range: Building Attack Tools for Mass Destruction

by Tom Burghardt / May 27th, 2009
http://dissidentvoice.org/2009/05/nation...struction/
A quintessential hallmark of an authoritarian regime, particularly one that operates within highly-militarized, though nominally democratic states such as ours, is the maintenance of a system of internal control; a seamless panopticon where dissent is equated with criminality and the rule of law derided as a luxury ill-afforded “during a time of war.”

In this context, the deployment of new offensive technologies which can wreck havoc on human populations deemed expendable by the state, are always couched in a defensive rhetoric by militarist aggressors and their apologists.

While the al-Qaeda brand may no longer elicit a compelling response in terms of mobilizing the population for new imperial adventures, novel threats–and panics–are required to marshal public support for the upward transfer of wealth into the corporate trough. Today, “cyber terror” functions as the “new Osama.”

And with Congress poised to pass the Cybersecurity Act of 2009, an Orwellian bill that would give the president the power to “declare a cybersecurity emergency” and shut down or limit Internet traffic in any “critical” information network “in the interest of national security” of course, the spaces left for the free flow of information–and meaningful dissent–slowly contract.

DARPA–and Cybersecurity Grifters–to the Rescue

But protecting critical infrastructure from hackers, criminals and terrorists isn’t the only game in town. The Pentagon is planning to kick-start a new office, Cyber Command, armed with the capacity to launch devastating attacks against any nation or group deemed an official enemy by Washington.

As Antifascist Calling reported last year, the Defense Advanced Research Projects Agency (DARPA), the Pentagon’s “geek squad,” is building a National Cyber Range (NCR). As Cyber Command’s research arm, the agency’s Strategic Technology Office (STO) describes NCR as

DARPA’s contribution to the new federal Comprehensive National Cyber Initiative (CNCI), providing a “test bed” to produce qualitative and quantitative assessments of the Nation’s cyber research and development technologies. Leveraging DARPA’s history of cutting-edge research, the NCR will revolutionize the state of the art for large-scale cyber testing. Ultimately, the NCR will provide a revolutionary, safe, fully automated and instrumented environment for our national cyber security research organizations to evaluate leap-ahead research, accelerate technology transition, and enable a place for experimentation of iterative and new research directions. (”National Cyber Range,” Defense Advanced Research Projects Agency, Strategic Technology Office, no date)

According to a January 2009 press release, the agency announced that NCR “will accelerate government research and development in high-risk, high-return areas and work in close cooperation with private-sector partners to jump-start technical cyber transformation.”

Given the Pentagon’s proclivity to frame debates over defense and security-related issues as one of “dominating the adversary” and discovering vulnerabilities that can be “exploited” by war planners, one can hypothesize that NCR is a testing range for the creation of new offensive weapons.

Amongst the “private-sector partners” chosen by the agency to “develop, field, and test new ‘leap ahead’ concepts and capabilities” are:

BAE Systems, Information and Electronic Systems Integration Inc., Wayne, N.J. ($3,279,634); General Dynamics, Advanced Information Systems, San Antonio, Texas ($1,944,094); Johns Hopkins University Applied Physics Laboratory, Laurel Md. ($7,336,805); Lockheed Martin Corp., Simulation, Training and Support, Orlando, Fla. ($5,369,656); Northrop Grumman, Intelligence, Surveillance and Reconnaissance Systems Division, Columbia, Md. ($344,097); Science Applications International Corp., San Diego, Calif. ($2,821,725); SPARTA, Columbia, Md. ($8,603,617).

While little-known outside the defense and intelligence establishment, SPARTA describes its “core business areas” as “strategic defense and offense systems, tactical weapons systems, space systems.” Its security and intelligence brief includes “intelligence production, computer network operations, and information assurance.”

Investigative journalist James Bamford wrote in The Shadow Factory that SPARTA “hired Maureen Baginski, the NSA’s powerful signals intelligence director, in October 2006, as president of its National Security Systems Sector.” According to Bamford, the firm, like others in the netherworld of corporate spying are always on the prowl for intelligence analysts “to pursue access and exploitation of targets of interest.”

Given their spooky résumé, information on SPARTA’s contracts are hard to come by. Indeed, the firm claims that under Section 508 of the Rehabilitation Act they are exempt from providing the public with information because their products involve “the operation, or use of… intelligence activities… related to national security, command and control of military forces, equipment that is an integral part of a weapon or weapons system, or systems which are critical to the direct fulfillment of military or intelligence missions.” How’s that for openness and transparency! One can only hazard a guess as to the firm’s role in devising DARPA’s “leap-ahead” National Cyber Range.

While the initial outlay of defense funds for NCR may appear to be a substantial amount of boodle for enterprising contractors, it is merely a down payment on Phase I of the project. Melissa Hathaway, the Obama administration’s director of the Joint Interagency Cyber Task Force said, “I don’t believe that this is a single-year or even a multi-year investment–it’s a multi-decade approach.” Hathaway, a former consultant at the spooky Booz Allen Hamilton corporation, told the Intelligence and National Security Alliance (INSA) in April,

Building toward the architecture of the future requires research and development that focuses on game-changing technologies that could enhance the security, reliability, resilience and trustworthiness of our digital infrastructure. We need to be mindful of how we, government and industry together, can optimize our collective research and development dollars and work together to improve market incentives for secure and resilient hardware and software products, new security innovation, and secure managed services. (”Remarks by Melissa E. Hathaway, Acting Senior Director for Cyberspace for the National Security and Homeland Security Councils,” INSA, April 30, 2009)

That Hathaway chose INSA as a forum is hardly surprising. Describing itself as a “non-profit professional association created to improve our nation’s security through an alliance of intelligence and national security leaders in the private and public sectors,” INSA was created by and for contractors in the heavily-outsourced shadow world of U.S. intelligence. Founded by BAE Systems, Booz Allen Hamilton, Computer Sciences Corporation, General Dynamics, Hewlett-Packard, Lockheed Martin, ManTech International, Microsoft, the Potomac Institute and Science Applications International Corporation, The Washington Post characterized INSA as “a gathering place for spies and their business associates.”

“Partners” who benefit directly from the launch of DARPA’s National Cyber Range. No doubt, Hathaway’s remarks are music to the ears of “beltway bandits” who reap hundreds of billions annually to fund taxpayer-fueled “national security priorities.” That the Pentagon is richly rewarding INSA-connected firms with documented track records of “misconduct such as contract fraud and environmental, ethics, and labor violations,” according to the Project on Government Oversight’s (POGO) Federal Contractor Misconduct Database (FCMD) hardly elicits a yawn from Congress.

Among the corporations selected by the agency to construct the National Cyber Range, Lockheed Martin leads the pack in “Misconduct $ since 1995″ according to POGO, having been fined $577.2 million (No. 1); Northrop Grumman, $790.4 million (No. 3); General Dynamics, $63.2 million (No. 4); BAE Systems, $1.3 million (No. 6); Science Applications International Corporation (SAIC), $14.5 million (No. 9); Johns Hopkins University, $4.6 million, (No. 81)

But as disturbing as these figures are, representing corporate grifting on a massive scale, equally troubling is the nature of the project itself. As Aviation Week reports, “Devices to launch and control cyber, electronic and information attacks are being tested and refined by the U.S. military and industry in preparation for moving out of the laboratory and into the warfighter’s backpack.”

High-Tech Tools for Aggressive War

The American defense establishment is devising tools that can wreck havoc with a keystroke. DARPA is currently designing “future attack devices” that can be deployed across the imperialist “battlespace” by the “non-expert,” that is by America’s army of robosoldiers. According to Aviation Week, one such device “combines cybersleuthing, technology analysis and tracking of information flow. It then offers suggestions to the operator on how best to mount an attack and, finally, reports on success of the effort.”

The heart of this attack device is its ability to tap into satellite communications, voice over Internet, proprietary Scada networks–virtually any wireless network. Scada (supervisory control and data acquisition) is of particular interest since it is used to automatically control processes at high-value targets for terrorists such as nuclear facilities, power grids, waterworks, chemical plants and pipelines. The cyberattack device would test these supposedly inviolate networks for vulnerabilities to wireless penetration. (David A. Fulghum, “Network Attack Weapons Emerge,” Aviation Week, May 21, 2009)

As can be expected, the Pentagon’s rhetorical mise-en-scène is always a purely “defensive” response to future depredations by nefarious and shadowy forces threatening the heimat. In fact, the United States has systematically employed battlefield tactics that target civilian infrastructure as a means of breaking the enemy’s will to fight. Stretching across the decades, from Southeast Asia to Iraq to Yugoslavia, imperialist strategists have committed war crimes by targeting the electrical grid, water supply and transportation- and manufacturing infrastructure of their adversaries.

The NCR will potentially serve as a new and improved means to bring America’s rivals to their knees. Imagine the capacity for death and destruction implicit in a tool that can, for example, at the push of a button cause an adversary’s chemical plant to suddenly release methyl isocynate (the Bhopal effect) on a sleeping city, or a nuclear power plant to go supercritical, releasing tens of billions of curies of radioactive death into the atmosphere?

During NATO’s 1999 “liberation” of the narco-state Kosovo from the former Yugoslavia, American warplanes dropped what was described as a graphite “blackout bomb,” the BLU-114/B “soft bomb” on Belgrade and other Serbian cities during its war of aggression. As the World Socialist Web Site reported at the time,

A particularly dangerous consequence of the long-term power blackout is the damage to the water systems in many Yugoslav cities, which are dependent on pumping stations run by electrical power. Novi Sad, a city of 300,000 which is the capital of the Vojvodina province of Serbia, has been without running water for eight days, according to residents. Families have been compelled to get water from the Danube river to wash and operate the toilet, and a handful of wells to provide drinking water.

Sewage treatment plants have also been shut down, with the result that raw, untreated sewage has begun to flow into the network of rivers that feed into the Danube, central Europe’s most important waterway. (Marty McLaughlin, “Wall Street celebrates stepped-up bombing of Serbia,” World Socialist Web Site, May 5, 1999)

With technological advances courtesy of DARPA’s National Cyber Range and their “private-sector partners,” the potential for utterly devastating societies ripe for resource extraction by American corporatist war criminals will increase exponentially. As Wired reported,

Comparisons between nuclear and cyberweapons might seem strained, but there’s at least one commonality. Scholars exploring the ethics of wielding logic bombs, Trojan horses, worms and bots in wartime often find themselves treading on ground tilled by an earlier generation of Cold War nuclear gamesmen.

“There are lots of unknowns with a cyberattack,” says Neil Rowe, a professor at the Center for Information Security Research at the U.S. Naval Postgraduate School, who rejects cyberattacks as a legitimate tool of war. “The potential for collateral damage is worse than nuclear technology…. With cyber, it can spread through the civilian infrastructure and affect far more civilians.” (Marty Graham, “Welcome to Cyberwar Country, USA,” Wired, February 11, 2008)

Initiatives such as the National Cyber Range are fully theorized as one facet of “network-centric warfare,” the Rumsfeldian “Revolution in Military Affairs.” Durham University geographer Stephen Graham describes the Pentagon notion that dominance can be achieved through “increasingly omnipotent surveillance and ’situational awareness’, devastating and precisely-targeted aerial firepower, and the suppression and degradation of the communications and fighting ability of any opposing forces.”

Indeed, these are integrated approaches that draw from corporate management theory to create “continuous, always-on support for military operations in urban terrain,” an imperialist battlespace where Wal-Mart seamlessly morphs into The Terminator.

According to Aviation Week, the device currently being field tested will “capture expert knowledge but keep humans in the loop.” As a battlefield weapon, simplicity and ease of operation is the key to successfully deploying this monstrous suite of tools. And Pentagon “experts” are designing a console that will “quantify results so that the operator can put a number against a choice,” “enhance execution by creating a tool for the nonexpert that puts material together and keeps track of it” and finally, “create great visuals so missions can be executed more intuitively.”

A touch-screen dashboard beneath the network schematic display looks like the sound mixing console at a recording studio. The left side lists cyberattack mission attributes such as speed, covertness, attribution and collateral damage. Next to each attribute is the image of a sliding lever on a long scale. These can be moved, for example, to increase the speed of attack or decrease collateral damage. (Aviation Week, op. cit.)

A tunable device for increased destructive capabilities; what are these if not a prescription for mass murder on a post-industrial scale?

Additionally, DARPA sorcerers are combining “digital tools that even an inexperienced operator can bring into play. In the unclassified arena there are algorithms dubbed Mad WiFi, Air Crack and Beach. For classified work, industry developers also have a toolbox of proprietary cyberexploitation algorithms.”

What has been dubbed “Air Crack” deploys “open source tools to crack the encryption key for a wireless network.” Cryptoattacks on the other hand, “use more sophisticated techniques to cut through the password hash.”

One means to “penetrate” an adversary’s protective cyber locks is referred to as a “de-authorization capability.” According to Aviation Week, the attack operator “can kick all the nodes off a network temporarily so that the attack system can watch them reconnect. This provides information needed to quickly penetrate the network.” As The Register reported in January when the ink on the DARPA contracts had barely dried,

Thus the planned Cyber Range must be able to simulate not just large computer networks teeming with nodes, but also the people operating and using these interlocked networks. These software sim-people–users, sysadmins, innocent network bystanders and passers-by–are referred to in the Range plans as “replicants”. It seems clear that they won’t know that they are merely simulated pawns in a virtual network wargame designed to test the efficiency of America’s new cyber arsenal. They will merely have to live in a terrible Groundhog Day electronic armageddon, where the weapons and players change but destruction and suffering remain eternal. (Lewis Page, “Deals inked on DARPA’s Matrix cyber VR,” The Register, January 5, 2009)

Rance Walleston, the head of BAE’s cyber warfare division told Aviation Week in late 2008, “We want to change cyber attack from an art to a science.” And as The Register averred, the Pentagon’s “simulated cyber warzone” should be up and running next year, “ready to pass under the harrow of BAE’s new electronic pestilences, digital megabombs and tailored computer plagues.”

Is it any wonder then, that the Russian revolutionary Lenin wrote nearly a century ago that “the civilized nations have driven themselves into the position of barbarians”?

Tom Burghardt is a researcher and activist based in the San Francisco Bay Area. In addition to publishing in Covert Action Quarterly and Global Research, an independent research and media group of writers, scholars, journalists and activists based in Montreal, his articles can be read on Dissident Voice, The Intelligence Daily and Pacific Free Press. He is the editor of Police State America: U.S. Military "Civil Disturbance" Planning, distributed by AK Press. Read other articles by Tom, or visit Tom's website.
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply
#2
Obama’s Cybersecurity Plan: Bring in the Contractors!
http://dissidentvoice.org/2009/06/obamas...ntractors/
by Tom Burghardt / June 4th, 2009

With billions of dollars in federal funds hanging in the balance, President Barack Obama unveiled the Cyberspace Policy Review May 29 at the White House.

During his presentation in the East Room Obama said that “America’s economic prosperity in the 21st century will depend on cybersecurity” and that efforts to “deter, prevent, detect and defend” against malicious cyberattacks would be run from the White House.

How this debate is being framed however, has a familiar ring to it. Rather than actually educating the public about steps to prevent victimization, state prescriptions always seem to draw from the same tired playbook.

First, issue dire warnings of an imminent national catastrophe; second, manufacture a panic with lurid tales of a “digital Pearl Harbor;” third, gin-up expensive “solutions” that benefit armies of (well-paid) experts drawn from officialdom and the private sector (who generally are as interchangeable as light bulbs however dim).

As Wired magazine’s ”Threat Level” editor Kevin Poulsen said during a panel at the Computers, Freedom and Privacy conference in Washington June 3, “the threat of cyber-terrorism is ‘preposterous’,” arguing that “long-standing warnings” that hackers will attack the nation’s power grid is so much hot-air. Poulsen contends “that calling such intrusions national security threats means information about attacks gets classified unneccessarily.”

While the president claims the new office “will not include–I repeat will not include–monitoring private sector networks or Internet traffic,” and that his administration “will preserve and protect the personal privacy and civil liberties that we cherish as Americans,” the devil is in the details and when they’re added together “change” once again, morphs into more of the same.

As with all things Washington, lurking wraith-like in the background, amidst bromides about “protecting America” from “cyber thieves trolling for sensitive information” are the usual class of insiders: the well-heeled corporations and their stable of retired militarists and spies who comprise the Military-Industrial-Security Complex.

Take Dale Meyerrose, for example. The former Air Force Major General served as U.S. Northern Command’s Chief Information Officer. After a stint at NORTHCOM, Meyerrose became Deputy Director of National Intelligence for Information Sharing for U.S. Director of National Intelligence Mike McConnell, the former NSA Director and ten-year executive vice president at the spooky Booz Allen Hamilton firm.

Last week, Meyerrose told The Wall Street Journal that “one important challenge will be finding a way to persuade private companies, especially those in price-sensitive industries, to invest more money in digital security. ‘You have to figure out what motivates folks,’ he said.”

He should know. After serving as McConnell’s cyber point man, Meyerrose plotted a new flight plan that landed him a plum job with major defense contractor, the Harris Corporation, where he currently directs the company’s National Cyber Initiative.

Headquartered in Melbourne, Florida, the firm boasts $5.4 billion in annual revenue and clocked in at No. 13 on Washington Technology’s “2008 Top 100 Government Contractors” list, with some $1.6 billion in defense-related income. Under the General Services Administration’s Alliant contract worth some $50 billion, the firm is competeing with other defense giants to provide an array of IT services to various federal agencies. Major customers include the Federal Aviation Administration, the National Reconnaissance Office and Defense Department.

Let’s be clear: “What motivates folks” is cold, hard cash and there’s lots of it to go around courtesy of the American people. The New York Times reported May 31, “The government’s urgent push into cyberwarfare has set off a rush among the biggest military companies for billions of dollars in new defense contracts.” According to the Times,

The exotic nature of the work, coupled with the deep recession, is enabling the companies to attract top young talent that once would have gone to Silicon Valley. And the race to develop weapons that defend against, or initiate, computer attacks has given rise to thousands of “hacker soldiers” within the Pentagon who can blend the new capabilities into the nation’s war planning.

Nearly all of the largest military companies–including Northrop Grumman, General Dynamics, Lockheed Martin and Raytheon–have major cyber contracts with the military and intelligence agencies. (Christopher Drew and John Markoff, “Contractors Vie for Plum Work, Hacking for the United States,” The New York Times, May 31, 2009)

As Washington Technology reported June 1, Zal Azmi, CACI International’s senior vice president for strategic law enforcement and national security programs, told the insider publication: “The timing is perfect. There is a lot of enthusiasm for it. “It’s a very comprehensive plan. It lays out a very good strategy.”

And there you have it.

A Cybersecurity Dream: Bundles of Cash

Although the position of Cybersecurity Coordinator has yet to be filled, its a sure bet whoever gets the nod will be drawn from a narrow pool of security executives, the majority of whom transit effortlessly between the Pentagon and defense corporations. That individual will oversee billions of dollars in funding for developing and coordinating the defense of computer systems that operate the global financial system as well as domestic transportation and commerce.

Under the administration’s plan, the Cybersecurity Coordinator will report to the president’s National Economic Council (NEC) and the National Security Council (NSC). The CSC will be a member of both NEC and NSC, Obama said in his East Room statement, “an acknowledgment that the threat is both to national security and to the economy,” The Washington Post reports.

According to the Post, Obama’s top economic adviser, Lawrence H. Summers, fought for a dominant role for the NEC, ensuring that “efforts to protect private networks do not unduly threaten economic growth.” This however, is unlikely to happen given the make-up of the administration’s team. Which raises the question: who exactly were Obama’s “private sector partners” who helped devise current state policy? The Cyberspace Policy Review sets the record straight.

The U.S. depends upon a privately owned, globally operated digital infrastructure. The review team engaged with industry to continue building the foundation of a trusted partnership. This engagement underscored the importance of developing value propositions that are understood by both government and industry partners. It also made clear that increasing information sharing is not enough; the government must foster an environment for collaboration. The following industry groups and venues participated: the Armed Forces Communications and Electronics Association (AFCEA), Business Executives for National Security (BENS), the Business Software Alliance (BSA), the Center for Strategic and International Studies’ (CSIS) Commission on Cybersecurity for the 44th Presidency, the Communications Sector Coordinating Council (C-SCC), the Cross-Sector Cyber Security Working Group (CSCSWG), the Defense Industrial Base Executive Committee, the Financial and Banking Information Infrastructure Committee (FBIIC), the Financial Services Sector Coordinating Council (FS-SCC), the Intelligence and National Security Alliance (INSA), the Internet Security Alliance (ISA), the Information Technology Sector Coordinating Council (IT-SCC), the National Infrastructure Advisory Council (NIAC), the National Security Telecommunications Advisory Committee (NSTAC), TechAmerica, and the U.S. Chamber of Commerce. (Cyberspace Policy Review, Appendix B: Methodology, pp. B 2-3.)

A bevy of heavy-hitters in the defense, banking, financial services, intelligence and security industries if ever there were one. And much like their predecessors in the Oval Office, the Obama administration has failed to “guard against the acquisition of unwarranted influence” by the Military-Industrial-Security Complex which president Dwight. D. Eisenhower so eloquently warned against–and expanded–decades ago.

Round Up the Usual Suspects

Who then are the new peddlers of “unwarranted influence”? Let’s take a look.

Armed Forces Communications and Electronics Association (AFCEA): The Fairfax, Virginia group describes itself as a “non-profit membership association serving the military, government, industry, and academia” to advance “professional knowledge and relationships in the fields of communications, IT, intelligence and global security.” AFCEA was founded at the dawn of the Cold War in 1946. It serves as an “ethical forum” where “a close cooperative relationship among government agencies, the military and industry” is fostered. With 32,000 individual and 1,700 corporate members, AFCEA was described by investigative journalist Tim Shorrock in his essential book Spies For Hire as “the largest industry association in the intelligence business.” Its board of directors and executive committee are studded with players drawn from major defense and security firms such as CACI International, Booz Allen Hamilton, Science Applications International Corporation, ManTech International Corporation, QinetiQ North America, General Dynamics, Lockheed Martin and the spooky MITRE Corporation.

Business Executives for National Security (BENS): This self-described “nationwide, non-partisan organization” claims the mantle of functioning as “the primary channel through which senior business executives can help advance the nation’s security.” BENS members were leading proponents of former vice president Al Gore’s defense reform initiative that handed tens of billions of taxpayer dollars to BENS members in the heavily-outsourced intelligence and security industries. An advocacy group with a distinct neoconservative tilt, BENS “one special interest: to help make America safe and secure” is facilitated by executives drawn from the Pentagon. Its current Chairman and CEO is retired Air Force General Charles G. Boyd who served as former House Speaker Newt Gingrich’s “defense consultant.” Its board of directors and executive committee include members from Biltmore Capital Group, LLC; Janus Capital Group, Booz Allen Hamilton, Cisco Systems Inc., Perot Systems Inc., Goldman Sachs and The Tupperware Corporation (!) to name but a few. BENS Advisory Council includes major war criminal Henry Kissinger, former Treasury Secretary Robert Rubin, former U.N. Ambassador Thomas Pickering, former FBI and CIA Director William Webster, former CIA head honcho Michael V. Hayden and former Chairman of the Joint Chiefs of Staff, General Peter Pace. “Non-partisan” indeed!

Business Software Alliance (BSA): BSA describes itself as “the largest and most international IT industry group” comprised on the “most innovative companies in the world.” Its members are drawn from the top corporations in the computing and software industries and include Adobe, Apple, Cisco Systems, Dell, Hewlett-Packard, IBM, Intel, Microsoft, Siemens and Symantec. Most of these firms have extensive contractual arrangements with the Defense Department.

Center for Strategic and International Studies (CSIS): For decades, CSIS has been a major right-wing think tank closely tied to the defense and security industries. Since its founding in 1962 by David Abshire and Admiral Arleigh Burke, CSIS has been a mouthpiece for the Defense and Intelligence Complex. Its current President and CEO, John J. Hamre was a former Deputy Secretary of Defense in the Clinton administration and was hired by SAIC to work on the National Security Agency’s scandal-plagued Trailblazer program. The $361 million project to build a new communications intercept system for NSA was described as a “colossal failure” by investigative journalists Donald Bartlett and James Steele in a 2007 piece in Vanity Fair. CSIS was a major behind-the-scenes force urging the 2003 U.S. invasion and occupation of Iraq and was an apologist for the Bush administration’s bogus allegation that the Iraqi government possessed “weapons of mass destruction,” citing “poor intelligence” rather than political mendacity on a grand scale. In the aftermath of the invasion, Booz Allen Hamilton organized a “major conference on rebuilding Iraq that attracted hundreds of corporations eager to cash in on the billions of dollars in contracts about to be awarded by the Bush administration,” according to Tim Shorrock. The closed-door event was held in the CSIS conference room and outlined the Bush regime’s plans for Iraq’s economic make-over–one that would sell-off state assets “in a way very conducive to foreign investment.” The Obama administration’s Cyberspace Policy Review has drawn extensively from CSIS’ Securing Cyberspace for the 44th Presidency report, an alarmist screed that avers that “cybersecurity is now a major national security problem for the United States.” Indeed the CSIS report urges the Obama administration to “reinvent the public-private partnership” with “a focus on operational activities” that “will result in more progress on cybersecurity.” How might this be accomplished? Why by regulating cyberspace, of course! CSIS avers that “voluntary action is not enough,” and states “we advocate a new approach to regulation that avoids both prescriptive mandates, which could add unnecessary costs and stifle innovation, and overreliance on market forces, which are ill-equipped to meet national security and public safety requirements.” But with a dubious track record dating back to the Cold War, and a board of directors manned by multinational defense grifters and neoconservative/neoliberal insiders such as former U.S. Senator Sam Nunn, Henry Kissinger, Richard Armitage, Zbigniew Brzezinski, former Defense Secretary William S. Cohen, James R. Schlesinger and Bush crime family insider Brent Scowcroft, CSIS’ cybersecurity prescriptions are anything but reliable.

Communications Sector Coordinating Council (CSCC): Created in 2005 “to represent the Communications Sector, as the principal entity for coordinating with the government in implementing the National Infrastructure Protection Plan (NIPP),” CSCC’s “unique industry-government partnership” facilitates the “exchange of information among government and industry participants regarding vulnerabilities, threats, intrusions and anomalies affecting the telecommunications infrastructure.” Certainly one “anomaly” not addressed by CSCC is the National Security Agency’s driftnet surveillance of Americans’ private communications. A major hub where telecommunications’ grifters meet, CSCC members include AT&T, Boeing, Cisco Systems, Comcast, Computer Sciences Corporation, Level 3, the MITRE Corporation, Motorola, the National Association of Broadcasters, Nortel, Quest, Sprint, Tyco, U.S. Internet Service Provider Association, VeriSign and Verizon. Many of the above-named entities are direct collaborators with the NSA and FBI’s extensive warrantless wiretapping programs.

Intelligence and National Security Alliance (INSA): As Antifascist Calling reported May 26, INSA was created by and for contractors in the heavily-outsourced world of U.S. intelligence. Founded by BAE Systems, Booz Allen Hamilton, Computer Sciences Corporation, General Dynamics, Hewlett-Packard, Lockheed Martin, ManTech International, Microsoft, the Potomac Institute and Science Applications International Corporation, The Washington Post characterized INSA as “a gathering place for spies and their business associates.” According to an INSA paper on cybersecurity, Critical Issues for Cyber Assurance Policy Reform: An Industry Assessment, the group recommended “a single leadership position at the White House-level that aligns national cyber security responsibilities with appropriate authorities.” Among other prescriptions, reflecting the group’s close ties to defense firms and the Pentagon INSA calls on the Obama administration to “establish a stronger working relationship between the private sector and the U.S. Government” (!) With their members heavily-banking on an expansion of Pentagon development of cyber attack tools, the group calls on the state to “Incorporate private sector cyber threat scenarios within government cyber-related test beds (e.g., DARPA’s Cyber Test Range). Government cyber-related test beds should reflect private sector operational scenarios, especially to demonstrate how similar threats are detected and deterred, as well as to demonstrate private sector concerns (e.g., exploitation of electric utility control system).” As I previously reported, INSA founding members BAE Systems, General Dynamics, Lockheed Martin and SAIC have all been awarded contracts by DARPA to build and run the National Cyber Range.

Internet Security Alliance (ISA): According to a self-promotional blurb on their website, ISA “was created to provide a forum for information sharing” and “represents corporate security interests before legislators and regulators.” Amongst ISA sponsors one finds AIG (yes, that AIG!) Verizon, Raytheon, VeriSign, the National Association of Manufacturers, Nortel, Northrop Grumman, Tata, and Mellon. State partners include the U.S. Department of Homeland Security, Congress, and the Department of Commerce. Among ISA’s recommendations for the Obama administration’s Cyberspace Policy Review was its unabashed claim that “the diversity of the internet places its security inescapably in the hands of the private sector.” When one considers that the development of the Internet was the result of taxpayer dollars, ISA’s cheeky demand is impertinent at best, reflecting capitalism’s inherent tendency to “forget” who foots the bill! In this vein, ISA believes that “government’s first role ought to be to use market incentives to motivate adhering to good security practices.” In other words, taxpayer-financed handouts. Considering the largess already extended to ISA “sponsor” AIG, “regulation for consumer protection” that use “government mandates” to “address cyber infrastructure issues” will be “ineffective and counter-productive both from a national security and economic perspective.” Give us the money seems to be ISA’s clarion call to the new “change” regime in Washington. And why not? Just ask AIG!

The Information Technology Sector Coordinating Council (IT-SCC): According to their website, the IT-SCC was established in 2006 and brought together “companies, associations, and other key IT sector participants,” in a forum that “envisions a secure, resilient and protected global information infrastructure that can rapidly restore services if affected by an emergency or crisis,” and may “consider the use of government resources to support appropriate tasks such as administrative, meeting logistics, specifically defined and mutually agreeable projects, and communications support (particularly in response to government requests or needs).” With some six dozen corporate members, the majority of whom are heavily-leveraged in the defense and security industries, IT-SCC affiliates include the usual suspects: Business Software Alliance, Center for Internet Security, Computer Sciences Corporation, General Dynamics, IBM, Intel, Internet Security Alliance, ITT Corporation, Lockheed Martin, Microsoft, Northrop Grumman, Perot Systems, Raytheon and Verizon, to name but a few. One IT-SCC affiliate not likely craving public scrutiny is Electronic Warfare Associates, Inc. (EWA). According to Wired, one EWA company, the Herndon, Virginia-based EWA Government Systems, Inc., “is one of several firms that boasts of making tiny devices to help manhunters locate their prey. The company’s ‘Bigfoot Remote Tagging System’ is a “very small, battery-operated device used to emit an RF [radio frequency] transmission [so] that the target can be located and/or tracked.” Allegedly in use along the AfPak border, the devices are RFID beacons planted by local operatives “near militant safehouses,” which guide CIA Predator and Reaper drones to their targets. Sounds like any number of government-sponsored “mutually agreeable projects” to me!

The National Security Telecommunications Advisory Committee (NSTAC): As Antifascist Calling reported last year (see: “Comcast’s Spooky Employment Opportunities”) NSTAC is comprised of telecom executives representing the major communications, network service providers, information technology, finance and aerospace companies who provide “industry-based advice and expertise” to the President “on issues and problems relating to implementing national security and emergency preparedness communications policy,” according to SourceWatch. Created in 1982 when former president Ronald Reagan signed Executive Order 12382, in all probability NSTAC facilitates U.S. telecommunication firms’ “cooperation” with NSA and other intelligence agencies’ efforts in conducting warrantless wiretapping, data-mining and other illegal surveillance programs in highly-profitable arrangements with the Bush and Obama administrations. NSTAC’s current Chair is Edward A. Mueller, Chairman and CEO at Qwest. The group’s Vice Chair is John T. Stankey, the President and CEO at AT&T. Additional corporate members include: The Boeing Company, Motorola, Science Applications International Corporation, Lockheed Martin, Rockwell International, Juniper Networks, the Harris Corporation, Tyco Electronics, Computer Sciences Corporation, Microsoft, Bank of America, Inc., Verizon, Raytheon and Nortel.

TechAmerica: Self-described as “the driving force behind productivity growth and jobs creation in the United States,” TechAmerica represents some 1,500 member companies and “is the industry’s largest advocacy organization,” one that “is dedicated to helping members’ top and bottom lines.” Indeed, the lobby shop offered lavish praise for president Obama’s Cyber Security plan. Calling the administration’s Cyberspace Policy Review a “historic step in the right direction,” one that will “protect America” (wait!) “from a digital 9/11.”

Conclusion

The Obama administration’s Cyberspace Policy Review is a corporatist boondoggle that will neither ameliorate nor frankly, even begin to address the most pertinent cybersecurity threats faced by the vast majority of Americans: hacking and spoofing attacks by criminals. Why? The wretched programs riddled with bad code and near non-existent “security” patches breeched as soon as they’re written are not part of the playbook. Indeed, the corporations and software developers who’ve grown rich off of the Internet have no incentive to write better programs!

After all, from a business perspective its far better to terrorize the public into demanding more intrusive, and less accountable, minders who will “police” the Internet–for a hefty price.
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Researchers Map How Scientific Misinformation Spreads On The Internet Drew Phipps 2 6,354 10-01-2016, 03:13 PM
Last Post: Drew Phipps
  New Malware spying at Internet service & telecommunications companies..and you! Peter Lemkin 2 5,785 25-11-2014, 09:13 AM
Last Post: Magda Hassan
  MAIDSAFE - A New Attempt At An Alternative 'Internet' - with Privacy and Annonymity Peter Lemkin 2 4,374 14-08-2014, 04:03 PM
Last Post: Peter Lemkin
  Who holds the seven keys to the internet? Magda Hassan 0 2,590 01-03-2014, 02:00 AM
Last Post: Magda Hassan
  Scientist scanned internet for traces of time travellers David Guyatt 0 2,607 04-01-2014, 10:54 AM
Last Post: David Guyatt
  Internet TVs can watch you as you watch them David Guyatt 1 2,562 04-05-2013, 02:42 AM
Last Post: Magda Hassan
  Homeland Attack On Internet Anonymity Albert Doyle 2 3,330 16-10-2012, 01:12 PM
Last Post: Magda Hassan
  Non-profit ISP start up promises fully encrypted, private Internet Magda Hassan 0 2,433 13-04-2012, 02:50 PM
Last Post: Magda Hassan
  Internet Freedom Fighters Build a Shadow Web Magda Hassan 2 3,448 02-03-2012, 09:18 AM
Last Post: Peter Lemkin
  FBI Wants New App to Wiretap the Internet Peter Lemkin 4 3,764 31-01-2012, 09:30 PM
Last Post: Peter Lemkin

Forum Jump:


Users browsing this thread: 1 Guest(s)