PDA

View Full Version : The Pentagon's Cyber Command: Formidable Infrastructure arrayed against the American People



Magda Hassan
04-27-2009, 01:19 PM
The Pentagon's Cyber Command: Formidable Infrastructure arrayed against the American People

By Tom Burghardt

URL of this article: www.globalresearch.ca/index.php?context=va&aid=13354 (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0DfBbkFauH95_jD5mIILZ5j7bqPnxmPH61Ke Lj-gB7zV7deaMBbrN44WKg4eRl9M5oQ4PL51ujG_u6N4kbVHO7t_x ZJPoxD13_tW7eQ6GNgqc4qhrtJYG4-akybg2jD8JnNA5ZZU7beOKMZJwt5IMQnMHm1V4Nle_s=)

Global Research (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0Chz7Fpw8EULRKlJic-TnmxIVOBBCv3URJsNW5HldNCYcsPA0DQNdYB8OE3v7PRRVO_lT nM479gtPeSBn_zj9T2Dkj-nsoqTl_U2Ky-WnQ7fQ==), April 26, 2009
Antifascist Calling... (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0BOl6NPwBGKGc2qRo3Xka1X7MWzb0wCbKrSV eJ9JzjnUAbFtvIm-NYGsDPsupWPs4eorD2sn6ffmm07EvbEmF6Uiesg_10ebTMYmLS 3bx_PSNwls6VyRoLhygv-pWBzzx8=)

The Wall Street Journal revealed (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0CtpI0v-gpSbDWd9CLzZA-B_SC2dke3QpeGaNsQeP-eBCHJhc_GFbdRZnF4G4qxvXY_lgznS89BTC0qBol35NA_U7l0m An2prPYiZ-wzbCCFYNid_fDYdmOrSQ_aq6g4NazDdTWOwFQDnIfbPqUggnT) April 24 that current National Security Agency (NSA) director Lt. General Keith Alexander will "head the Pentagon's new Cyber Command."
Friday's report follows an April 22 piece (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0A2LdzZrtO9A7gflkupnyDAvr8gLiqR0oArK kJZ2AGyj5w6e3H1l5Dvpx1tcI0wqbuvchF3s9uIQfN9Ga5pnHA oHwYzv1ZaroSqzrVDGhNH7mCX5dIu1D1nXnG-icnUVUJrW2eLx_oS5Fxf9ApBXqz0) published by the Journal announcing the proposed reorganization. The Obama administration's cybersecurity initiative will, according to reports, "reshape the military's efforts to protect its networks from attacks by hackers, especially those from countries such as China and Russia."
When he was a presidential candidate, Obama had pledged to elevate cybersecurity as a national security issue, "equating it in significance with nuclear and biological weapons," the Journal reported.
The new Pentagon command, according to The Washington Post (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0C0wjjswG4aulTLQFScZCZKQnLxgWoA5QZEp 1CIrvM9qjQThoDqwbqQ4APOhbRAH6yJTYBkopwnPJZmLjrSupE qk5WvWRQYy4jlgkPaWsGp_T3nxZjmYHBf3t_dsiTUDA6-079V-7LI3J22lybtLoW74JNdT3kffuxdmshVn7tBdKwIMT3UqmleCUC VveBQaBVIwsetpVWjhw==), "would affect U.S. Strategic Command, whose mission includes ensuring U.S. 'freedom of action' in space and cyberspace, and the National Security Agency, which shares Pentagon cybersecurity responsibilities with the Defense Information Systems Agency."
How Cyber Command's launch would effect civilian computer networks is unclear. However, situating the new agency at Ft. Meade, under the watchful eyes of National Security Agency snoops, should set alarm bells ringing.

Charged with coordinating military cybersecurity programs, including computer network defense as well as a top secret mission to launch cyber attack operations against any and all "adversaries," the new command has been mired in controversy ever since the U.S. Air Force declared it would be the lead agency overseeing Cyber Command with the release (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0DAsTll91_tpxw3nUZqDgHkMM_OjKPRPXVyP hg2Ncw9kmQBUWy9YbWQkBwTmSVAO0DUVSf5wZP-Y9e893rnBzAQ80pf0un9dAzzq5yUK0jgN5AakiUuu2MQSid_PG ZHEjoH3wCFIdZkTOLFxBUPBkun) of its "Strategic Vision" last year.
Since that self-promotional disclosure however, multiple scandals have rocked the Air Force. In 2007, a B-52 Stratofortress bomber flew some 1,500 miles from Minot Air Force Base in North Dakota to Barksdale Air Force Base in Louisiana with six live nuclear-tipped cruise missiles affixed to its wings. For nearly six hours, the Air Force was unable to account for the missing weapons. While the scandal elicited scarcely a yawn from the corporate media, physicist Pavel Podvig wrote (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0Bn97KqDkO-cLSLEq_YGnqU8_402uEuMEsHcnQkkr1XyV9hYoeAa9K0GSdx_J WciW9C6KiSGT_bKYwGHYA0Vr8wGPDCqVno7y7KlxjB686JtRok Od6UdoKDbA_cIxGANs8jhmGhLbBopQ1IftcWt6U0mTBwREiDM8 HeEetiM05sR8AqbUl0wC70),

The point is that the nuclear warheads were allowed to leave Minot and that it was surprised airmen at Barksdale who discovered them, not an accounting system that's supposed to track the warheads' every movement (maybe even in real time). We simply don't know how long it would've taken to discover the warheads had they actually left the air force's custody and been diverted into the proverbial "wrong hands." Of course, it could be argued that the probability of this kind of diversion is very low, but anyone who knows anything about how the United States handles its nuclear weapons has said that the probability of what happened at Minot was also essentially zero. ("U.S. loose nukes," Bulletin of the Atomic Scientists, 12 September 2007)
As a result of the affair and numerous procurement scandals (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0DXhJz6ZDWvIjYZIN1_7_9B3vg5Frs6x33AJ QIiCK2SDwC5Gkz8TMdOOuXXshfOZhHSXSdn0y30CUG2DD1dswQ xOhoxUCr2ZkzUtLNgJeP5qzWlP6fOen46-IZZ18DVoImpQy3UYUbuEQ==), Air Force Chief of Staff Gen. Michael Mosley and Air Force Secretary Michael Wynne were fired by Secretary of Defense Robert Gates for incompetence. Numerous defense analysts believe this was a major reason why the Air Force was supplanted as the lead Cyber agency.
While one can reasonably support government efforts to protect critical infrastructure such as electrical grids, chemical plants, nuclear power stations or the nation's air traffic control system from potentially devastating attacks that would endanger the health and safety of millions of Americans, these goals can be achieved by writing better programs. Yet from its inception, Cyber Command has been theorized as a nodal point for launching crippling attacks against the civilian and military infrastructure of imperialism's enemies.
As I reported (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0A8ZWufuo9j1j3BEJsfPsAP71EyKtvEB2osT EIlbN0hQj13tim0g2it9Iyq3YClWECN07UETgYg83Njzl3k00J ozGsTCaaBNRpNHYIaVlQh8u42IhHBQUD4YqjjvobyJrxYiWJo0 uSvDx80vnFdXXYymZzAIv3-6W28yLC38Hf55JqJ0KZi-z0JUGsYY2feXGg=) last July, Air Force Cyber Command (AFCYBER) is centered at the secretive Barksdale Air Force Base. At the time, AFCYBER had a unified command structure and a $2 billion budget through the first year of its operations.
The Air Force Times reported (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0DWzroTSxspa_vin_l3ekmPqhrsI2xacdDIB-KD8YmT5wDFmXKOZKh-DYJaoEMViiiQNL3d3sHtoQKQSB9DUnazwI3Qs9bl3asW7zNHLT 6SPRyWkOspdZdZvO0OlSGtzvQAstWQmON3w5PbBeVY5qvGYRR2 Nr3HscWei7CYFXLXAEa45_gfT9Ac) last year that AFCYBER "has established 17 new enlisted and officer Air Force Specialty Codes--creating major changes in the career paths of more than 32,000 airmen." Whether or not the command structure already in place will transfer to NSA is unknown as of this writing. Nor is it clear whether AFCYBER's offensive capability--real or imagined--will transfer to NSA. But with billions of dollars already spent on a score of top secret initiatives, included those hidden within Pentagon Special Access (SAP) or black programs, its a safe bet they will.
Defense analyst William M. Arkin points out in Code Names (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0BHZ8kjwLvBnbe_ibVr76QJeqrj4utpoyK0j P6IHNS0dJO1cLq3ALTNg0biaLeQpuhPNHa5XvJCgvvY31Wth30 h-wpcYImaU48gyMoSq3SYQ_Q6Yp8Cav9ap_KGJO9R7Ix9NJAFgMJ USBKZAis7r1nsCtoVDUaYPIY=), that these programs fall under the rubric of Special Technical Operations (STO). Arkin defines these as,

Classified SAPs and other programs, weapons and operations associated with the CIA and "other government agencies." Entire separate channels of communication and clearances exist to compartment these military versions of clandestine and covert operations involving special operations, paramilitary activity, covert action, and cyber-warfare. A STO "cell" exists in the Joint Chiefs of Staff and at most operational military commands to segregate STO activity from normal operational activity, even highly classified activity. (Code Names: Deciphering U.S. Military Plans, Programs, and Operations in the 9/11 World, Hanover, NH: Steerforth Press, 2005, p. 20)
Specific cyber-warfare programs identified by Arkin include the following: Adversary: an Air Force information warfare targeting system; Arena: an "object-based" simulation program to create "country studies of electronic infrastructure characteristics, targeting analyses, operational information warfare plans" as well as nearly three dozen other cyber-war programs and/or exercises.
Many of the Pentagon's cyber-warfare initiatives flow directly from research conducted by the Defense Advanced Research Projects Agency (DARPA (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0BNNOjNCZaHbzk1dg-TqptE0EM615c18wIxzlNN4QWLlLdvAKhC204KRAiwJOua8badt YMgm6Fwdkx0Pn69sq2CunuDUjZ24WU=)). For example, the agency's Information Processing Techniques Office (IPTO (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0A3OiCdSGqz1JJqx-mfJAPuDCBLtvcHH3ZVOa0KobDVXU9cAC-YVKUU4kODc4EYfdEtRUBdiwiJImfNfVGhol-jQ8F07nOfgdIFN7JrDdcN6g==)) has a brief to "create the advanced information processing and exploitation science, technologies, and systems for revolutionary improvements in capability across the spectrum of national security needs."
As can be seen from the brief survey above, the vast majority of Pentagon programs concern Cyber Command's offensive capability of which denial of service and other attacks against "adversaries" in the heimat are a distinct possibility. The Journal reports,

The Department of Homeland Security is charged with securing the government's nonmilitary networks, and cybersecurity experts said the Obama administration will have to better define the extent of this military support to Homeland Security. "It's a fine line" between providing needed technical expertise to support federal agencies improving their own security and deeper, more invasive programs, said Amit Yoran, a former senior cybersecurity official at the Homeland Security Department. (Siobhan Gorman, "Gates to Nominate NSA Chief to Head New Cyber Command," The Wall Street Journal, April 24, 2009)
The Obama administration is expected to announce the the new agency's launch next week, after completing what it terms a "comprehensive review" in addition to recommendations for cybersecurity policy.
Geoff Morrell, a Pentagon spokesperson, told the Journal that Gates is "planning to make changes to our command structure to better reflect the increasing threat posed by cyber warfare," but "we have nothing to announce at this time." Morrell said the Department of Defense's 2010 budget proposal "calls for hiring hundreds more cybersecurity experts."
Aside from lining the pockets of enterprising grifters in the shadowy world populated by intelligence corporations, where top secret clearances are traded like highly-prized baseball cards, the potential for abuse by NSA given that agency's key role in illegal domestic surveillance raise the prospect of further entrenching the agency in our lives.
While Alexander sought to allay fears that NSA was out to run the nation's cybersecurity programs, he hastened to add that the agency's "tremendous technical capabilities" would be used to "assist" DHS in securing the government's civilian networks. But given AFCYBER's brief for offensive operations, what does this mean for civil liberties?
As The New York Times reported (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0D9u-uHzpjZJgi6H2L2Gega7gXZlKLa4O-6pbz8AUYqQwqwC93w_9fBJMe3SJ_-JQpQkkm4ZrbaU4f4vsxkUkJ01wfCFf38BuQ-oUqiGCu8xjHZp1yVJvwT8YBX77lwFfCTNszApU_Ou42oFtN8Jt j9cekgO5Oxl2U=) April 17, with NSA leading the charge to control "the government's rapidly growing cybersecurity programs," critics within the national security apparatus fear the move by Gates "could give the spy agency too much control over government computer networks." The Times avers,

Rod Beckstrom, who resigned in March as director of the National Cyber Security Center at the Homeland Security Department, said in an interview that he feared that the N.S.A.'s push for a greater role in guarding the government's computer systems could give it the power to collect and analyze every e-mail message, text message and Google search conducted by every employee in every federal agency. (James Risen and Eric Lichtblau, "Control of Cybersecurity Becomes Divisive Issue," The New York Times, April 17, 2009)
This is hardly an issue that should only concern government insiders or those who engage in bureaucratic in-fighting as if it were a blood sport. As a Pentagon agency, NSA has positioned itself to seize near total control over the country's electronic infrastructure, thereby exerting an intolerable influence--and chilling effect--over the nation's political life.
As we have seen in our recent history, NSA and their partners at CIA, FBI, et. al., have targeted political dissidents: to varying degrees, antiwar organizers, socialist, anarchist and environmental activists have fallen under NSA's electronic driftnet, most recently during last year's Republican National Convention.
As I reported (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0CbGxBSGcDuF0jA2nkGvfq6HEcIpDRUKszxF 8P57IeAGphovl_fQu--5yXROms9WPCRQT7x9q9T-dNEIM7R0ZEmTzhgYav8--kROVNBv9YAUvKNm7gteUDVNe_3uj_3KUoj76zDJrUnq8_vo57f rGVsJ6mLcSWyM02WXWc3ZRlnxIFYJ7VRk1aldjPw55hhTv0=) last November, during the RNC conclave in St. Paul, Minnesota, local, state, federal officials as well as private security and telecommunications corporations conspired to target activists, journalists and concerned citizens during the so-called National Special Security Event.
The whistleblowing website Wikileaks published a leaked planning document (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0CGdhhs7iUonkLH9K5KY1YsoRNHZHV7fx26X vM1p6Eavz7qVoo8DJVRAb3R7BQTd7Gdn-YojoC1ZKy3hZ1RVZx0lmnzwZu-AOnSwPiaB4jEMztCBCHTkafdn9F4jPQ9PlDWMaLpa1ZM3Oq3kj v-JFMY9CvUHNxYAigvrmay9NB4iQ==) which outlined the close coordination across multiple agencies, including the FBI, NSA, U.S. Northern Command and the National Geospatial-Intelligence Agency (NGA). Cell-phones and other electronic communications were routinely monitored in real-time and NGA provided detailed analysis derived from military spy satellites.
A "Strategic Vision" in the Service of Repression
Although the Air Force has lost out to NSA over control of Cyber Command, AFCYBER's planning document (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0A0VYHNlxS-nQSoxSLw9d21AhGfCaRpdw-AaYOL58Syks1zfIai_sb--l7aAg33Nee_-EmH5rZizsu_dtUHXKa1VkJlPIJyzTM78EOyP09iIwtMAKt_Qk1 fhfJj4uY7y_q_artm4ABTxTXk9z4WQnVRWQORfCt70O1K6Lsxa MqLoQ==) still provides a valuable glimpse into the formidable infrastructure arrayed against the American people.
In the view of Air Force theorists, the strategic environment confronting imperialism is described as "unpredictable and extremely dangerous," characterized "by the confluence of globalization, economic disparities, and competition for scarce resources."
And as "economic disparities" grow, particularly during a period of profound capitalist economic meltdown, newer and more effective measures to ensure compliance are required by the ruling class and its state. This is underscored by Cyber Command's goal "to achieve situational dominance at a time and place of our choosing." [emphasis added] According to the Air Force,

Global vigilance requires the ability to sense and signal across the electromagnetic spectrum. Global reach requires the ability to connect and transmit, using a wide array of communications networks to move data across the earth nearly instantaneously. Global power is the ability to hold at risk or strike any target with electromagnetic energy and ultimately deliver kinetic and non-kinetic effects across all domains. These cyberspace capabilities will allow us to secure our infrastructure, conduct military operations whenever necessary, and degrade or eliminate the military capabilities of our adversaries. (Air Force Cyber Command, "Strategic Vision," no date)
As Wired defense analyst Noah Shachtman wrote (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0BykUDZmYf0gNM5QNMEq6wGJENreRPrz1QnN I0WEAdCzYUecowV-1lVtu1unNX9Ufa5WDpNbjCBeRI49H5KmgdixL7eL6ISM0mFm7t VmF8GYUcZMndU-LWrYbTVD81oHti5Tm7zYbT2au_Az_fm0H_JV-y78RgQZxQ=) last year,

The Air Force wants a suite of hacker tools, to give it "access" to--and "full control" of--any kind of computer there is. And once the info warriors are in, the Air Force wants them to keep tabs on their "adversaries' information infrastructure completely undetected." ...
Traditionally, the military has been extremely reluctant to talk much about offensive operations online. Instead, the focus has normally been on protecting against electronic attacks. But in the last year or so, the tone has changed--and become more bellicose. "Cyber, as a warfighting domain . . . like air, favors the offense," said Lani Kass, a special assistant to the Air Force Chief of Staff who previously headed up the service's Cyberspace Task Force. ("Air Force Aims for 'Full Control' of 'Any and All' Computers," Wired, May 13, 2008)
While the cut and color of the uniform may have changed under the Obama administration, placing Cyber Command under NSA's wing will almost certainly transform "cybersecurity" into a euphemism for keeping the rabble in line. Indeed, cybersecurity operations are fully theorized as a means of achieving "full-spectrum dominance" via "Cyberspace Offensive Counter-Operations,"

Cyberspace favors offensive operations. These operations will deny, degrade, disrupt, destroy, or deceive an adversary. Cyberspace offensive operations ensure friendly freedom of action in cyberspace while denying that same freedom to our adversaries. We will enhance our capabilities to conduct electronic systems attack, electromagnetic systems interdiction and attack, network attack, and infrastructure attack operations. Targets include the adversary's terrestrial, airborne, and space networks, electronic attack and network attack systems, and the adversary itself. As an adversary becomes more dependent on cyberspace, cyberspace offensive operations have the potential to produce greater effects. ("Strategic Vision," op. cit.) [emphasis added]
And when those "greater effects" are directed against American citizens theorized as "adversaries" by U.S. militarists and well-heeled corporate grifters, the problems posed by a panoptic surveillance state for a functioning democracy increase astronomically.
The already slim protections allegedly afforded by the shameful FISA Amendments Act have already been breeched by NSA. As The New York Times reported (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0Dlg2cVEF_ZFychrWnZ344sZKaAOr4W6XB3W DlQ9oiDdWkezerm1D9on6Y838J8iAoVI8SlO3wDX43zYEFtsz8 LOGFQwDa5-K_FVUqxKdonrq9HTOEtJ49qdsrHnJbw-z1CuerjlkiTcCpG4I7EB-7Z) April 16, NSA interception of the private e-mail messages and phone calls of Americans have escalated "in recent months on a scale that went beyond the broad legal limits established by Congress last year."
As Wired reported (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0AhR9XlEAKiC0jRcgKlprfIA1IaA8rqhJlb9 JjpTkBWnuJ4jtXeqVZ8YVxpImVsjw7Cp7ZCu-gul7jm24PCppK40rx6SLVKr5le4Yom1kQz2u6hchvzmPBh-V17f6cYW4PYBVQn8Vsc0a-xijlLJeO3Sy0vhjrra-w=) April 17, the NSA isn't the only agency conducting cyber operations against American citizens. One of the FBI's International Terrorism Operations Sections requested an assist from the Bureau's Cryptographic and Electronic Analysis Unit, CEAU, according to documents (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0CDtNtz7KCD3wITzQGClYYNZbgTNEpEyQTNE h3bEvPhwnce8PXLOpOk7BgnVvH3-TH7yxL7719NlA7ROXJz5etnUHXiXKicTCv0cbiwxD79OlsKCVu Cqk22gjvMJZJrRd_I0TrrRi9ADE9SPV56rR96V1qJty1hxOg=) obtained by the magazine under the Freedom of Information Act. The FBI "geek squad" was in a position to conduct a "remote computer attack" against the target, and that "they could assist with a wireless hack to obtain a file tree, but not the hard drive content."
This followed an April 16 report (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0D6mJH0C-m_v1i1Etn3WslIccjST2s49okAnuZk6NRL4s3gJ5LzvEsIHEZD bdzMjDzw9DxdNyuQYgNOpgNc2E1DmOO1esDW2oMCwn7NxQapmz gDW2HWM9EvSbNnPsjBuvQHnLX8ZS-3d32tIEr_57vdlpPReb0h2vs=) published by Wired that a "sophisticated FBI-produced spyware program has played a crucial behind-the-scenes role in federal investigations into extortion plots, terrorist threats and hacker attacks in cases stretching back at least seven years, newly declassified documents show."
But as I documented (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0CbGxBSGcDuF0jA2nkGvfq6HEcIpDRUKszxF 8P57IeAGphovl_fQu--5yXROms9WPCRQT7x9q9T-dNEIM7R0ZEmTzhgYav8--kROVNBv9YAUvKNm7gteUDVNe_3uj_3KUoj76zDJrUnq8_vo57f rGVsJ6mLcSWyM02WXWc3ZRlnxIFYJ7VRk1aldjPw55hhTv0=) last year in a case involving activists targeted during anti-RNC protests, with "preemptive policing" all the rage in Washington, the same suite of hacking tools and spyware used to target criminals and terrorists are just as easily deployed against political activists, particularly socialists, anarchists and environmental critics who challenge capitalism's free market paradigm.
Despite these revelations, the Obama administration is poised to hand control of the nation's electronic infrastructure over to an out-of-control agency riddled with corporate grifters and militarists whose bottom-line is not the security of the American people but rather, the preservation of an economically and morally bankrupt system of private profit fueled by wars of aggression and conquest.
Tom Burghardt is a researcher and activist based in the San Francisco Bay Area. In addition to publishing in Covert Action Quarterly and Global Research (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0AqOtQYYowP4YpRgj_6vWZUb5mdXLww10Wf8 FCQsgJzexAJPVbD3dzxGaq7Tt4DIEgmK6UCLrkJH5WY4PeuXpc muOP3XFKG07foHE3D-jcY3g==), an independent research and media group of writers, scholars, journalists and activists based in Montreal, his articles can be read on Dissident Voice (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0BJDlmVxz-CveHofaj_SKdvsjeaUf7ZCRsuIXlRpAuUkk5258dCWMwTAnoER aEehvkfXlgleObIN0CF-ycxa7-QM54vkxrQr_kNic-qbKILYw==), The Intelligence Daily (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0CSAgi674NyI8rNhRRgnYa3EJEP0lfCRrhCB D0wxV7fOL0csJcMDWUdF1fHhafua7sdDsL3xrW6sYcIujSJcb_ fwAb-4pUboqPPjCXa3DuECw==), Pacific Free Press (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0CXvyet0FiQlFY9B7vhbWEyYEvWzSqrvnFee 8fheAle6S_DXorhM6YH1MxTNpFTEtjhI9VtTlpwzkU1kPcXRsr JQZVY-q86qUO-0Y6PJI8UD4L4jWM0TCD7) and the whistleblowing website Wikileaks (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0Bj6qeW-nriV6rJvjG3do11ADz4vVzGAbDzAeyX8gpVf9e6Vd7R7twAYIR GUL8XxPOEMGs4_H59mc0T-25IcAZYmfmvNfC9cKfLJ9cpTtuNSA==). He is the editor of Police State America: U.S. Military "Civil Disturbance" Planning, distributed by AK Press (http://rs6.net/tn.jsp?et=1102562637049&s=793&e=001CjzUnpuXx0DFCL8VDz6ur5BnQ5DhO4UcgYCkHGiz4vfV5 1CWpRUv2gvI5nSTuD1U8N3ErCA0FY_BryMoQvJZKDTzJVc9CNb uf1nU23QS_OdrKXrk2jDoaFHu1LAqoX1cEJLnsWraPDICLzfwW wBcoW-iwiAmopkb).

Peter Presland
04-27-2009, 02:03 PM
with "preemptive policing" all the rage in Washington, the same suite of hacking tools and spyware used to target criminals and terrorists are just as easily deployed against political activists, particularly socialists, anarchists and environmental critics who challenge capitalism's free market paradigm. Pace the ham-fisted police-spy recruitment thread, I've no doubt the same applies over here too. Personally all my posts are filtered through the assumption that our security services will be reading them. I hope that doesn't sound conceited because there are certainly others here with far greater in-depth knowledge than mine - and who the hell am I in the great scheme of things anyway? - nonetheless, I know that my interests and views - as evidenced to the world at large from my miniscule presence on the web - are of precisely the sort that unsettle TPTB - the rest follows and 'Big-Brother' will no doubt be watching.

Hi-there Big Brother :bird:

Jan Klimkowski
04-27-2009, 08:09 PM
Global vigilance requires the ability to sense and signal across the electromagnetic spectrum. Global reach requires the ability to connect and transmit, using a wide array of communications networks to move data across the earth nearly instantaneously. Global power is the ability to hold at risk or strike any target with electromagnetic energy and ultimately deliver kinetic and non-kinetic effects across all domains. These cyberspace capabilities will allow us to secure our infrastructure, conduct military operations whenever necessary, and degrade or eliminate the military capabilities of our adversaries. (Air Force Cyber Command, "Strategic Vision," no date)

This reads very similarly to the kind of megalomaniac, thanatoid, Vril-driven nonsense that used to emanate from the very spooky Aviary mob.

It's a wet dream for control freaks who've spent too much time in deep black operations like Phoenix, and have huge untreated PTSD that they regard as profound insights into the human condition and global geopolitics.

David Guyatt
04-28-2009, 09:00 AM
Global vigilance requires the ability to sense and signal across the electromagnetic spectrum. Global reach requires the ability to connect and transmit, using a wide array of communications networks to move data across the earth nearly instantaneously. Global power is the ability to hold at risk or strike any target with electromagnetic energy and ultimately deliver kinetic and non-kinetic effects across all domains. These cyberspace capabilities will allow us to secure our infrastructure, conduct military operations whenever necessary, and degrade or eliminate the military capabilities of our adversaries. (Air Force Cyber Command, "Strategic Vision," no date)

This reads very similarly to the kind of megalomaniac, thanatoid, Vril-driven nonsense that used to emanate from the very spooky Aviary mob.

It's a wet dream for control freaks who've spent too much time in deep black operations like Phoenix, and have huge untreated PTSD that they regard as profound insights into the human condition and global geopolitics.

But a 21st century Dr. Strangelove "wet dream" methinks...

Jan Klimkowski
04-28-2009, 06:55 PM
This reads very similarly to the kind of megalomaniac, thanatoid, Vril-driven nonsense that used to emanate from the very spooky Aviary mob.

It's a wet dream for control freaks who've spent too much time in deep black operations like Phoenix, and have huge untreated PTSD that they regard as profound insights into the human condition and global geopolitics.

But a 21st century Dr. Strangelove "wet dream" methinks...

Entirely surreally, Elisabeth Kübler-Ross MD chaired US Army Col John B Alexander's PhD committee for his post-Phoenix Program dissertation on the "life/death transition". Alexander is a past President of the International Association for Near Death Studies.

Alexander was PENGUIN in the Aviary.

Dawn Meredith
05-01-2009, 06:24 PM
This reads very similarly to the kind of megalomaniac, thanatoid, Vril-driven nonsense that used to emanate from the very spooky Aviary mob.

It's a wet dream for control freaks who've spent too much time in deep black operations like Phoenix, and have huge untreated PTSD that they regard as profound insights into the human condition and global geopolitics.

But a 21st century Dr. Strangelove "wet dream" methinks...

Entirely surreally, Elisabeth Kübler-Ross MD chaired US Army Col John B Alexander's PhD committee for his post-Phoenix Program dissertation on the "life/death transition". Alexander is a past President of the International Association for Near Death Studies.

Alexander was PENGUIN in the Aviary.

Distressing news about Kubler-Ross. I wonder how much she knew of black ops. I never figured her to have even dabbled in this stuff.

Jan Klimkowski
05-01-2009, 09:17 PM
This reads very similarly to the kind of megalomaniac, thanatoid, Vril-driven nonsense that used to emanate from the very spooky Aviary mob.

It's a wet dream for control freaks who've spent too much time in deep black operations like Phoenix, and have huge untreated PTSD that they regard as profound insights into the human condition and global geopolitics.

But a 21st century Dr. Strangelove "wet dream" methinks...

Entirely surreally, Elisabeth Kübler-Ross MD chaired US Army Col John B Alexander's PhD committee for his post-Phoenix Program dissertation on the "life/death transition". Alexander is a past President of the International Association for Near Death Studies.

Alexander was PENGUIN in the Aviary.

Distressing news about Kubler-Ross. I wonder how much she knew of black ops. I never figured her to have even dabbled in this stuff.

Kübler-Ross may have had little knowledge and less curiosity about black ops.

I'm sure Phoenix Program veteran Alexander's musings on the "life/death transition" were much more fascinating than the usual bourgeois psychoses she dealt with...