"US may stop cyber attacks at source" by Ellen Nakashima, Washington Post / September 5, 2010
WASHINGTON — The Pentagon is contemplating an aggressive approach to defending its computer systems that includes preemptive actions such as knocking out parts of an adversary’s computer network overseas — but it is still wrestling with how to pursue the strategy legally.
As if the torturing criminal war regime of AmeriKa ever cared about legality.
The department is developing a range of weapons capabilities, including tools that would allow “attack and exploitation of adversary information systems’’ and that can “deceive, deny, disrupt, degrade, and destroy’’ information and information systems, according to Defense Department budget documents.
But officials are reluctant to use the tools until questions of international law and technical feasibility are resolved, and that has proved to be a major challenge for policy makers. Government lawyers and some officials question whether the Pentagon could take such action without violating international law or other countries’ sovereignty.
We do it all the time.
What do you call invasions, occupations, and covert ops?
Some officials and analysts say they doubt the technology exists to use such capabilities effectively, and they question the need for such measures when, they say, traditional defensive steps such as updating firewalls, protecting computer ports, and changing passwords are not always taken.
Still, the deployment of such hardware and software would be the next logical step in a cyber strategy outlined recently by Deputy Secretary of Defense William Lynn. The strategy turns on the “active defense’’ of military computer systems, what he called a “fundamental shift in the US approach to network defense.’’
*************
“We have to have offensive capabilities, to, in real time, shut down somebody trying to attack us,’’ General Keith Alexander, the head of the Pentagon’s new Cyber Command, told an audience in Tampa last month.
Offense is defense, war is peace, etc, etc, etc.
Military officials have declared that cyberspace is the fifth domain — along with land, air, sea, and space — and is crucial to battlefield success.
“We need to be able to protect our networks,’’ Lynn said in a May interview. “And we need to be able to retain our freedom of movement on the worldwide networks.’’
Another senior defense official said, “I think we understand that in order for us to ensure integrity within the military networks, we’ve got to be able to reach out as far as we can — once we know where the threat is coming from — and try to eliminate that threat where we can.’’
And just who could that be?
--more--"
One wonders why they never shut down Wikileaks.... or maybe not:
"Wikileaks: A Big Dangerous US Government Con Job
by F. William Engdahl
Global Research, December 10, 2010
The story on the surface makes for a script for a new Oliver Stone Hollywood thriller. A 39-year old Australian hacker holds the President of the United States and his State Department hostage to a gigantic cyber “leak,” unless the President leaves Julian Assange and his Wikileaks free to release hundreds of thousands of pages of sensitive US Government memos. A closer look at the details, so far carefully leaked by the most ultra-establishment of international media such as the New York Times, reveals a clear agenda. That agenda coincidentally serves to buttress the agenda of US geopolitics around the world from Iran to Russia to North Korea. The Wikileaks is a big and dangerous US intelligence Con Job which will likely be used to police the Internet.
It is almost too perfectly-scripted to be true. A discontented 22-year old US Army soldier on duty in Baghdad, Bradley Manning, a low-grade US Army intelligence analyst, described as a loner, a gay in the military, a disgruntled “computer geek,” sifts through classified information at Forward Operating Base Hammer. He decides to secretly download US State Department email communications from the entire world over a period of eight months for hours a day, onto his blank CDs while pretending to be listening to Lady Gaga. In addition to diplomatic cables, Manning is believed to have provided WikiLeaks with helicopter gun camera video of an errant US attack in Baghdad on unarmed journalists, and with war logs from Iraq and Afghanistan.
Manning then is supposed to have tracked down a notorious former US computer hacker to get his 250,000 pages of classified US State Department cables out in the Internet for the whole world to see. He allegedly told the US hacker that the documents he had contained "incredible, awful things that belonged in the public domain and not on some server stored in a dark room in Washington, DC." The hacker turned him in to US authorities so the story goes. Manning is now incommunicado since months in US military confinement so we cannot ask him, conveniently. The Pentagon routinely hires the best hackers to design their security systems.
Then the plot thickens. The 250,000 pages end up at the desk of Julian Assange, the 39-year-old Australian founder of a supposedly anti-establishment website with the cute name Wikileaks. Assange decides to selectively choose several of the world’s most ultra-establishment news media to exclusively handle the leaking job for him as he seems to be on the run from Interpol, not for leaking classified information, but for allegedly having consensual sex with two Swedish women who later decided it was rape.
He selects as exclusive newspapers to decide what is to be leaked the New York Times which did such service in promoting faked propaganda against Saddam that led to the Iraqi war, the London Guardian and Der Spiegel. Assange claims he had no time to sift through so many pages so handed them to the trusted editors of the establishment media for them to decide what should be released. Very “anti-establishment” that. The New York Times even assigned one of its top people, David E. Sanger, to control the release of the Wikileaks material. Sanger is no establishment outsider. He sits as a member of the elite Council on Foreign Relations as well as the Aspen Institute Strategy Group together with the likes of Condi Rice, former Defense Secretary William Perry, former CIA head John Deutch, former State Department Deputy Secretary and now World Bank head Robert Zoellick among others.
Indeed a strange choice of media for a person who claims to be anti-establishment. But then Assange also says he believes the US Government version of 9/11 and calls the Bilderberg Group a normal meeting of people, a very establishment view.
Not so secret cables…
The latest sensational Wikileaks documents allegedly from the US State Department embassies around the world to Washington are definitely not as Hillary Clinton claimed "an attack on America's foreign policy interests that have endangered innocent people." And they do not amount to what the Italian foreign minister, called the "September 11 of world diplomacy." The British government calls them a threat to national security and an aide to Canada’s Prime Minister calls on the CIA to assassinate Assange, as does kooky would-be US Presidential hopeful Sarah Palin.
Most important, the 250,000 cables are not "top secret" as we might have thought. Between two and three million US Government employees are cleared to see this level of "secret" document,[1] and some 500,000 people around the world have access to the Secret Internet Protocol Network (SIPRnet) where the cables were stored. Siprnet is not recommended for distribution of top-secret information. Only 6% or 15,000 pages of the documents have been classified as even secret, a level below top-secret. Another 40% were the lowest level, "confidential", while the rest were unclassified. In brief, it was not all that secret.[2]
Most of the revelations so far have been unspectacular. In Germany the revelations led to the removal of a prominent young FDP politician close to Guido Westerwelle who apparently liked to talk too much to his counterpart at the US Embassy. The revelations about Russian politics, that a US Embassy official refers to Putin and Medvedev as “Batman and Robin,” tells more about the cultural level of current US State Department personnel than it does about internal Russian politics.
But for anyone who has studied the craft of intelligence and of disinformation, a clear pattern emerges in the Wikileaks drama. The focus is put on select US geopolitical targets, appearing as Hillary Clinton put it “to justify US sanctions against Iran.” They claim North Korea with China’s granting of free passage to Korean ships despite US State Department pleas, send dangerous missiles to Iran. Saudi Arabia’s ailing King Abdullah reportedly called Iran’s President a Hitler.
Excuse to police the Internet?
What is emerging from all the sound and Wikileaks fury in Washington is that the entire scandal is serving to advance a long-standing Obama and Bush agenda of policing the until-now free Internet. Already the US Government has shut the Wikileaks server in the United States though no identifiable US law has been broken.
The process of policing the Web was well underway before the current leaks scandal. In 2009 Democratic Senator Jay Rockefeller and Republican Olympia Snowe introduced the Cybersecurity Act of 2009 (S.773). It would give the President unlimited power to disconnect private-sector computers from the internet. The bill "would allow the president to 'declare a cyber-security emergency' relating to 'non-governmental' computer networks and do what's necessary to respond to the threat." We can expect that now this controversial piece of legislation will get top priority when a new Republican House and the Senate convene in January.
The US Department of Homeland Security, an agency created in the political hysteria following 9/11 2001 that has been compared to the Gestapo, has already begun policing the Internet. They are quietly seizing and shutting down internet websites (web domains) without due process or a proper trial. DHS simply seizes web domains that it wants to and posts an ominous "Department of Justice" logo on the web site. See an example at http://torrent-finder.com. Over 75 websites were seized and shut in a recent week. Right now, their focus is websites that they claim "violate copyrights," yet the torrent-finder.com website that was seized by DHS contained no copyrighted content whatsoever. It was merely a search engine website that linked to destinations where people could access copyrighted content. Step by careful step freedom of speech can be taken away. Then what?
--MORE--"
I PAID for the NEWSPAPER ARTICLES I'm quoting, sir!
They will never regain my trust or mind in any event.