Thursday, January 12, 2012

New York Times Covers Up U.S. Cyberwar vs. Libya

At this point would expect any different?

"U.S. Debated Cyberwarfare in Attack Plan on Libya" by ERIC SCHMITT and THOM SHANKER, October 17, 2011

WASHINGTON — Just before the American-led strikes against Libya in March, the Obama administration intensely debated whether to open the mission with a new kind of warfare: a cyberoffensive to disrupt and even disable the Qaddafi government’s air-defense system, which threatened allied warplanes.

While the exact techniques under consideration remain classified, the goal would have been to break through the firewalls of the Libyan government’s computer networks to sever military communications links and prevent the early-warning radars from gathering information and relaying it to missile batteries aiming at NATO warplanes.

But administration officials and even some military officers balked, fearing that it might set a precedent for other nations, in particular Russia or China, to carry out such offensives of their own, and questioning whether the attack could be mounted on such short notice. They were also unable to resolve whether the president had the power to proceed with such an attack without informing Congress.

Do they seriously expect us to believe they thought about it but didn't do it -- especially after Khadafy's defenses turned out to be s***?  

Related: U.S. Using Internet Against Iran

Cyber Cold War

Oh, we will be having a hot one once the U.S. attacks Iran.

In the end, American officials rejected cyberwarfare and used conventional aircraft, cruise missiles and drones to strike the Libyan air-defense missiles and radars used by Col. Muammar el-Qaddafi’s government.
 
And because the NYT says it must be true(?).

This previously undisclosed debate among a small circle of advisers demonstrates that cyberoffensives are a growing form of warfare. The question the United States faces is whether and when to cross the threshold into overt cyberattacks.  

And if they come from Israel ignore them.

Last year, a Stuxnet computer worm apparently wiped out a part of Iran’s nuclear centrifuges and delayed its ability to produce nuclear fuel. Although no entity has acknowledged being the source of the poisonous code, some evidence suggests that the virus was an American-Israeli project.

Talk about vague obfuscation!! 

Related: The Boston Globe's Invisible Ink: Israeli Virus Infects Iran

Oh, right, newspaper readers never saw that, so....

And the Pentagon and military contractors regularly repel attacks on their computer networks — many coming from China and Russia 

That doesn't mean China and Russia are behind it.  

EVEN FRIENDLY NATIONS(?) SPY on the U.S.!

The Obama administration is revving up the nation’s digital capabilities, while publicly emphasizing only its efforts to defend vital government, military and public infrastructure networks.  

And who i$ getting the contract$, 'eh?

“We don’t want to be the ones who break the glass on this new kind of warfare,” said James Andrew Lewis, a senior fellow at the Center for Strategic and International Studies, where he specializes in technology and national security.  

Then what are all those pieces on the ground in Libya?

That reluctance peaked during planning for the opening salvos of the Libya mission, and it was repeated on a smaller scale several weeks later, when military planners suggested a far narrower computer-network attack to prevent Pakistani radars from spotting helicopters carrying Navy Seal commandos on the raid that killed Osama bin Laden on May 2.  

Pffft!

See: Bin Laden Stories Show AmeriKan Media Not to be Believed

About that or anything else these days.

Again, officials decided against it. Instead, specially modified, radar-evading Black Hawk helicopters ferried the strike team, and a still-secret stealthy surveillance drone was deployed.

“These cybercapabilities are still like the Ferrari that you keep in the garage and only take out for the big race and not just for a run around town, unless nothing else can get you there,” said one Obama administration official briefed on the discussions. 

That's where my printed Globe ended it.

The debate about a potential cyberattack against Libya was described by more than a half-dozen officials, who spoke on the condition of anonymity because they were not authorized to discuss the classified planning.

In the days ahead of the American-led airstrikes to take down Libya’s integrated air-defense system, a more serious debate considered the military effectiveness — and potential legal complications — of using cyberattacks to blind Libyan radars and missiles.

“They were seriously considered because they could cripple Libya’s air defense and lower the risk to pilots, but it just didn’t pan out,” said a senior Defense Department official.  

So we are being told by a completely untrustworthy government and mouthpiece media.

After a discussion described as thorough and never vituperative, the cyberwarfare proposals were rejected before they reached the senior political levels of the White House.

Gen. Carter F. Ham, the head of the military’s Africa Command, which led the two-week American air campaign against Libya until NATO assumed full control of the operation on March 31, would not comment on any proposed cyberattacks. In an interview, he said only that “no capability that I ever asked for was denied.”  

Kinda a cryptic comment, 'eh?

Senior officials said one of the central reasons a cyberoffensive was rejected for Libya was that it might not have been ready for use in time, given that the rebel city of Benghazi was on the verge of being overrun by government forces.  

So they WOULD HAVE DONE it if they COULD HAVE, blah, blah, blah.

While popular fiction and films depict cyberattacks as easy to mount — only a few computer keystrokes needed — in reality it takes significant digital snooping to identify potential entry points and susceptible nodes in a linked network of communications systems, radars and missiles like that operated by the Libyan government, and then to write and insert the proper poisonous codes.  

You know, the MOUTHPIECE MEDIA also makes it seem REAL EASY when they push the FEAR FACTOR on the issue.

Thanks again for the f***ing distortions if not outright lies!!!!

“It’s the cyberequivalent of fumbling around in the dark until you find the doorknob,” Mr. Lewis said. “It takes time to find the vulnerabilities. Where is the thing that I can exploit to disrupt the network?”

Meaning ONLY INTELLIGENCE AGENCIES have the time and resources to do it!!

Had the computer-network attack gone ahead, administration officials said they were confident it could have been confined to Libyan networks and offered high promise of disrupting the regime’s integrated air-defense system.  

Actually, that is a concern because of Stuxnet. The word on the blogs is the virus bled into other networks and may have impacted Fukushima's shutdown orders, as well as those in Germany and Russia. 

Of course, I never expect the paper to go there.

One unresolved concern was whether ordering a cyberattack on Libya might create domestic legal restrictions on war-making by the executive branch without Congressional permission.  

Had they been worried about that they never would have attacked Libya!! There was never Congressional permission for that!

One question was whether the War Powers Resolution — which requires the executive to formally report to lawmakers when it has introduced forces into “hostilities” and sets a 60-day limit on such deployments if Congress does not authorize them to continue — would be required for an attack purely in cyberspace.

The War Powers Resolution, a Vietnam-era law enacted over President Richard M. Nixon’s veto, does not define “hostilities.” In describing its actions to Congress and the American people, the White House argued that its use of conventional forces in the Libyan intervention fell short of the level of hostilities requiring Congressional permission under either the Constitution or the resolution, citing the lack of ground forces and the supporting role the United States was playing in a multilateral effort to fulfill a United Nations resolution. Some officials also expressed concern about revealing American technological capabilities to potential enemies for what seemed like a relatively minor security threat to the United States.  

That last sentence I can believe.

In the end, Libya’s air-defense network was dangerous but not exceptionally robust.  

Did they ever shoot down a plane? Maybe one?

Hey, what's one more obfuscation in a paper full of 'em, 'eh?

American surveillance identified its locations, and it was degraded through conventional attacks.

Yuh-huh.

--more--"