Best of the Week
Most Popular
1. US Housing Market Real Estate Crash The Next Shoe To Drop – Part II - Chris_Vermeulen
2.The Coronavirus Greatest Economic Depression in History? - Nadeem_Walayat
3.US Real Estate Housing Market Crash Is The Next Shoe To Drop - Chris_Vermeulen
4.Coronavirus Stock Market Trend Implications and AI Mega-trend Stocks Buying Levels - Nadeem_Walayat
5. Are Coronavirus Death Statistics Exaggerated? Worse than Seasonal Flu or Not?- Nadeem_Walayat
6.Coronavirus Stock Market Trend Implications, Global Recession and AI Stocks Buying Levels - Nadeem_Walayat
7.US Fourth Turning Accelerating Towards Debt Climax - James_Quinn
8.Dow Stock Market Trend Analysis and Forecast - Nadeem_Walayat
9.Britain's FAKE Coronavirus Death Statistics Exposed - Nadeem_Walayat
10.Commodity Markets Crash Catastrophe Charts - Rambus_Chartology
Last 7 days
How Sony Is Fueling the Computer Vision Boom - 3rd Aug 20
Computer Gaming System Rig Top Tips For 6 Years Future Proofing Build Spec - 3rd Aug 20
Cornwwall Bude Caravan Park Holidays 2020 - Look Inside Holiday Resort Caravan - 3rd Aug 20
UK Caravan Park Holidays 2020 Review - Hoseasons Cayton Bay North East England - 3rd Aug 20
Best Travel Bags for 2020 Summer Holidays , Back Sling packs, water proof, money belt and tactical - 3rd Aug 20
Precious Metals Warn Of Increased Volatility Ahead - 2nd Aug 20
The Key USDX Sign for Gold and Silver - 2nd Aug 20
Corona Crisis Will Have Lasting Impact on Gold Market - 2nd Aug 20
Gold & Silver: Two Pictures - 1st Aug 20
The Bullish Case for Stocks Isn't Over Yet - 1st Aug 20
Is Gold Price Action Warning Of Imminent Monetary Collapse - Part 2? - 1st Aug 20
Will America Accept the World's Worst Pandemic Response Government - 1st Aug 20
Stock Market Technical Patterns, Future Expectations and More – Part II - 1st Aug 20
Trump White House Accelerating Toward a US Dollar Crisis - 31st Jul 20
Why US Commercial Real Estate is Set to Get Slammed - 31st Jul 20
Gold Price Blows Through Upside Resistance - The Chase Is On - 31st Jul 20
Is Crude Oil Price Setting Up for a Waterfall Decline? - 31st Jul 20
Stock Market Technical Patterns, Future Expectations and More - 30th Jul 20
Why Big Money Is Already Pouring Into Edge Computing Tech Stocks - 30th Jul 20
Economic and Geopolitical Worries Fuel Gold’s Rally - 30th Jul 20
How to Finance an Investment Property - 30th Jul 20
I Hate Banks - Including Goldman Sachs - 29th Jul 20
NASDAQ Stock Market Double Top & Price Channels Suggest Pending Price Correction - 29th Jul 20
Silver Price Surge Leaves Naysayers in the Dust - 29th Jul 20
UK Supermarket Covid-19 Shop - Few Masks, Lack of Social Distancing (Tesco) - 29th Jul 20
Budgie Clipped Wings, How Long Before it Can Fly Again? - 29th Jul 20
How To Take Advantage Of Tesla's 400% Stock Surge - 29th Jul 20
Gold Makes Record High and Targets $6,000 in New Bull Cycle - 28th Jul 20
Gold Strong Signal For A Secular Bull Market - 28th Jul 20
Anatomy of a Gold and Silver Precious Metals Bull Market - 28th Jul 20
Shopify Is Seizing an $80 Billion Pot of Gold - 28th Jul 20
Stock Market Minor Correction Underway - 28th Jul 20
Why College Is Never Coming Back - 27th Jul 20
Stocks Disconnect from Economy, Gold Responds - 27th Jul 20
Silver Begins Big Upside Rally Attempt - 27th Jul 20
The Gold and Silver Markets Have Changed… What About You? - 27th Jul 20
Google, Apple And Amazon Are Leading A $30 Trillion Assault On Wall Street - 27th Jul 20
This Stock Market Indicator Reaches "Lowest Level in Nearly 20 Years" - 26th Jul 20
New Wave of Economic Stimulus Lifts Gold Price - 26th Jul 20
Stock Market Slow Grind Higher Above the Early June Stock Highs - 26th Jul 20
How High Will Silver Go? - 25th Jul 20
If You Own Gold, Look Out Below - 25th Jul 20
Crude Oil and Energy Sets Up Near Major Resistance – Breakdown Pending - 25th Jul 20
FREE Access to Premium Market Forecasts by Elliott Wave International - 25th Jul 20
The Promise of Silver as August Approaches: Accumulation and Conversation - 25th Jul 20
The Silver Bull Gateway is at Hand - 24th Jul 20
The Prospects of S&P 500 Above the Early June Highs - 24th Jul 20
How Silver Could Surpass Its All-Time High - 24th Jul 20
China Recovered in Q2. Will the Red Dragon Sink Gold? - 23rd Jul 20
UK Covid19 MOT 6 Month Extensions Still Working Late July 2020? - 23rd Jul 20
How Did the Takeaway Apps Stocks Perform During the Lockdown? - 23rd Jul 20
US Stock Market Stalls Near A Double Peak - 23rd Jul 20
Parking at Lands End Car Park Cornwall - UK Holidays 2020 - 23rd Jul 20
Translating the Gold Index Signal into Gold Target - 23rd Jul 20
Weakness in commodity prices suggests a slowing economy - 23rd Jul 20
This Stock Market Stinks - But Not Why You May Think - 22nd Jul 20
Protracted G7 Economic Contraction – or Multiyear Global Depression - 22nd Jul 20
Gold and Oil: Be Aware of the "Spike" - 22nd Jul 20
US Online Casino Demographics: Who Plays Online For Money? - 22nd Jul 20
Machine Intelligence Quantum AI Stocks Mega-Trend Forecast 2020 to 2035! - 21st Jul 20
How to benefit from the big US Infrastructure push - 21st Jul 20
Gold and gold mining stocks are entering a strong seasonal phase - 21st Jul 20
Silver Eyes Key Breakout Levels as Inflation Heats Up - 21st Jul 20
Gold During Coronavirus Recession and Beyond - 21st Jul 20
US Election 2020: ‘A Major Bear Market of Political Decency’ - 21st Jul 20
Summertime Sizzle for Gold and Silver - 21st Jul 20
Overclockers UK Custom Built PC Review - Delivery and Unboxing (3) - 21st Jul 20
Will Coronavirus Vaccines Become a Bridge to Nowhere? - 20th Jul 20
Stock Market Time for Caution?  - 20th Jul 20
ClickTrades Review - The Importance of Dynamic Analysis and Educational Tools in Online Trading - 20th Jul 20
US Housing Market Collapse Second Phase Pending - 20th Jul 20
Capitalising on the AI Mega-trend - 20th Jul 20
Getting Started with Machine Learning - 20th Jul 20
Why Moores Law is NOT Dead! - 20th Jul 20
Help the Economy by Going Outside - 19th Jul 20
Stock Market Fantasy Finance: Follow the Money - 19th Jul 20
Did the Stock Market Bubble Just Pop? - 19th Jul 20
Quick Souring of the S&P 500 Stock Market Mood - 19th Jul 20
The Six-Year Jobs Recession - 19th Jul 20
Silver Demand Exploding! - 18th Jul 20
Tesco Scraps Covid Safe One Way Arrow Supermarket Shopping System - 18th Jul 20
The Rise of Online Pawnbroking - 17th Jul 20
Gold Rallies Together With U.S. Covid-19 Cases - 17th Jul 20
Gold & Silver Measured Moves - 17th Jul 20
The Bizarre Mathematics Of How Negative Interest Rates Create Stratospheric Profits - 17th Jul 20
From a Stocks Bull Market Far, Far Away, Virus Doomsday Scenerio! - 16th Jul 20
Fiscal Cliffs and the Self-destructing Treasury - 16th Jul 20
Dow Stock Market Crash Watch - Update - 16th Jul 20
Gold & Silver Gaining on US Dollar Weakness - 16th Jul 20
How to Find the Best Stocks to Invest In - 16th Jul 20
Overclockers UK Custom Build PC Review - 2. System Build Changes Communications - 16th Jul 20

Market Oracle FREE Newsletter

How to Get Rich Investing in Stocks by Riding the Electron Wave

U.S. Launches Offensive Operations in Cyberspace (CYBERCOM)

Politics / US Politics Jul 01, 2009 - 07:27 PM GMT

By: Global_Research


Best Financial Markets Analysis ArticleTom Burghardt writes: U.S. Defense Secretary Robert Gates signed a memorandum on June 23 that announced the launch of U.S. Cyber Command (CYBERCOM). A scheme by securocrats in the works for several years, the order specifies that the new office will be a "subordinate unified command" under U.S. Strategic Command (STRATCOM).

According to the memorandum, CYBERCOM "will reach initial operating capability (IOC) not later than October 2009 and full operating capability (FOC) not later than October 2010."

Gates has recommended that this new Pentagon domain be led by Lt. General Keith Alexander, the current Director of the ultra-spooky National Security Agency (NSA). Under the proposal, Alexander would receive a fourth star and the new agency would be based at Ft. Meade, Maryland, NSA's headquarters.

Gates' memorandum specifies that CYBERCOM "must be capable of synchronizing warfighting effects across the global security environment as well as providing support to civil authorities and international partners."

Ostensibly launched to protect military networks against malicious cyberattacks, the command's offensive nature is underlined by its role as STRATCOM's operational cyber wing. In addition to a defensive brief to "harden" the "dot-mil" domain, the Pentagon plan calls for an offensive capacity, one that will deploy cyber weapons against imperialism's adversaries.

One of ten Unified Combatant Commands, STRATCOM is the successor organization to Strategic Air Command (SAC). Charged with space operations (military satellites), information warfare, missile defense, global command and control, intelligence, surveillance and reconnaissance (ISR), as well as global strike and strategic deterrence (America's first-strike nuclear arsenal), it should be apparent that designating CYBERCOM a STRATCOM branch all but guarantees an aggressive posture.

As Antifascist Calling reported in May, the Pentagon's geek squad, the Defense Advanced Research Projects Agency (DARPA) is currently building a National Cyber Range (NCR), a test bed for developing, testing and fielding cyber weapons.

In conjunction with "private-sector partners," the agency averred in a January 2009 press release that NCR promises to deliver "'leap ahead' concepts and capabilities."

The Armed Forces Press Service reported June 24, that Pentagon Press Secretary Geoff Morrell told journalists that CYBERCOM is "not some sort of new and necessarily different authorities that have been granted." Obfuscating the offensive role envisaged for the command, Morrell told reporters: "This is about trying to figure out how we, within this department, within the United States military, can better coordinate the day-to-day defense, protection and operation of the department's computer networks."

Others within the defense bureaucracy are far more enthusiastic, and forthright, when it comes to recommending that cyber armaments be fielded as offensive weapons of war. Indeed, Armed Forces Journal featured a lengthy analysis advocating precisely that.

The world has abandoned a fortress mentality in the real world, and we need to move beyond it in cyberspace. America needs a network that can project power by building an robot network (botnet) that can direct such massive amounts of traffic to target computers that they can no longer communicate and become no more useful to our adversaries than hunks of metal and plastic. America needs the ability to carpet bomb in cyberspace to create the deterrent we lack. (Col. Charles W. Williamson III, "Carpet Bombing in Cyberspace," Armed Forces Journal, May 2008)

We have heard these Orwellian arguments before; one can take it for granted that when militarists pontificate on the need for a "deterrent," the bombers are preparing for take off.

As with other Pentagon schemes, the technological quick fix may prove as deadly as the alleged threat, particularly where botnets are concerned.

A botnet is a collection of widely dispersed computers controlled from one or more central nodes. Often built by cyber criminals to implant malicious programs or code, steal passwords and other encrypted data from targeted systems, botnets are the bane of the Internet.

In these endeavors, sophisticated hackers are aided and abetted by the miserable security code or lax practices of Internet Service Providers (ISPs) more concerned with facilitating commerce--and the bottom line--than in providing adequate protection against criminals.

Indeed in March, the Electronic Privacy Information Center (EPIC) urged the Federal Trade Commission "to shut down Google's so-called cloud computing services, including Gmail and Google Docs, if the web giant can't ensure the safety of user data stored by these online apps," The Register reported.

EPIC's petition in part, was sparked "by a Google snafu that saw the company inadvertently share certain Google Docs files with users unauthorized to view them. Google estimates that the breach hit about 0.05 per cent of the documents stored by the service," according to The Register.

Infected computers are referred to as "zombies" that can be controlled remotely from any point on the planet by "master" machines. Unwary users are often "spoofed" by hackers through counterfeit e-mails replete with embedded hyperlinks into "cooperating" with the installation of malicious code.

While criminals employ botnets to generate spam or commit fraudulent transactions, draining a savings account or running-up credit card debt through multiple purchases for example, botnets also have the capacity to launch devastating distributed denial of service (DDOS) attacks against inadequately defended computers or indeed, entire networks.

As many commentators have warned, the best defense is to write better security programs and exercise a modicum of common sense when using the Internet. The Pentagon however, has something else in mind.

Col. Williamson proposes to transform the Air Force's high-speed intrusion-detection systems into an offensive botnet by enabling "the thousands of computers the Air Force would normally discard every year for technology refresh, removing the power-hungry and heat-inducing hard drives, replacing them with low-power flash drives, then installing them in any available space every Air Force base can find." In other words, creating thousands of zombie machines.

"After that," Col. Williamson avers, "the Air Force could add botnet code to all its desktop computers attached to the Nonsecret Internet Protocol Network (NIPRNet). Once the system reaches a level of maturity, it can add other .mil computers, then .gov machines."

Underscoring the risks posed by out-of-control military hackers to hold America's, or any other nations' communications infrastructure hostage to a militarized state, Williamson suggests that in order to "generate the right amount of power for offense, all the available computers must be under the control of a single commander, even if he provides the capability for multiple theaters. While it cannot be segmented like an orange for individual theater commanders, it can certainly be placed under their tactical control." (emphasis added)

In other words, should an "individual theatre commander" desire to suddenly darken a city or wreck havoc on a nation's electrical infrastructure at the behest of his political masters then by all means, go right ahead! A proposal such as this, should it ever be implemented, would in essence, be a first-strike weapon.

Other plans for "defending" Pentagon computer networks are even more extreme.

STRATCOM commander Gen. Kevin Chilton has even suggested that "the White House retains the option to respond with physical force--potentially even using nuclear weapons--if a foreign entity conducts a disabling cyber attack against U.S. computer networks," according to a disturbing report published by Global Security Newswire. During a Defense Writers Group breakfast in May, Chilton told journalists:

"I think you don't take any response options off the table from an attack on the United States of America. Why would we constrain ourselves on how we respond?" ...

Should the breaches evolve into more serious computer attacks against the United States, Chilton said he could not rule out the possibility of a military salvo against a nation like China, even though Beijing has nuclear arms. He rejected the idea that such a conflict would necessarily risk going nuclear.

"I don't think that's true," Chilton said.

At the same time, the general insisted that all strike options, including nuclear, would remain available to the commander in chief in defending the nation from cyber strikes.

"I think that's been our policy on any attack on the United States of America," Chilton said. "And I don't see any reason to treat cyber any differently. I mean, why would we tie the president's hands? I can't. It's up to the president to decide." (Elaine M. Grossman, "U.S. General Reserves Right to Use Force, Even Nuclear, in Response to Cyber Attack," Global Security Newswire, May 12, 2009)

While Pentagon spokesman Bryan Whitman told The New York Times that CYBERCOM's launch "is not about the militarization of cyber," how else can it be characterized?

Indeed, Whitman went on to say that CYBERCOM "is focused only on military networks to better consolidate and streamline Department of Defense capabilities into a single command."

How then, should one interpret moves by the Pentagon to "consolidate and streamline" DoD "capabilities" under the purview of STRATCOM? Obviously, an entity defined as a "Unified Combatant Command" as clearly stated by General Chilton's avowal to "leave all options on the table," would combine cyber "defense" with STRATCOM's global strike mission.

Antifascist Calling revealed last year, citing a U.S. Air Force planning document, that preparations are already underway to transform cyberspace into an offensive military domain. Indeed, Air Force theorists averred:

Cyberspace favors offensive operations. These operations will deny, degrade, disrupt, destroy, or deceive an adversary. Cyberspace offensive operations ensure friendly freedom of action in cyberspace while denying that same freedom to our adversaries. We will enhance our capabilities to conduct electronic systems attack, electromagnetic systems interdiction and attack, network attack, and infrastructure attack operations. Targets include the adversary's terrestrial, airborne, and space networks, electronic attack and network attack systems, and the adversary itself. As an adversary becomes more dependent on cyberspace, cyberspace offensive operations have the potential to produce greater effects. (Air Force Cyber Command, "Strategic Vision," no date, emphasis added)

Echoing Air Force strategy, SecDef Gates memo clearly states, since "cyberspace and its associated technologies ... are vital to our nation's security," the United States will "secure freedom of action in cyberspace" by standing-up a unified command "that possesses the required technical capability and remains focused on the integration of cyberspace operations."

Simply put, the Pentagon intends to build an infrastructure fully-capable of committing high-tech war crimes.

Under NSA's Operational Control

Meanwhile in the heimat, CYBERCOM will effectively be under the day-to-day control of the National Security Agency. This is hardly good news when it comes to civil liberties.

Leaving aside considerations of bureaucratic trench warfare with the Department of Homeland Security, charged with defending the state's .gov and .com domains, the unprecedented power of CYBERCOM to conduct offensive military and surveillance operations within the United States itself is underlined by the preeminent role NSA will assume.

Authorized by the criminal Bush regime to carry out massive electronic surveillance of Americans' private communications in the wake of the 9/11 attacks, various driftnet spying operations continue under Obama's purported "change" administration. As Antifascist Calling has averred many times, the only "change" that's come to the White House has been the color of the drapes hanging in the Oval Office.

The New York Times revealed June 17, that the "National Security Agency is facing renewed scrutiny over the extent of its domestic surveillance program, with critics in Congress saying its recent intercepts of the private telephone calls and e-mail messages of Americans are broader than previously acknowledged." According to the Times, "The agency's monitoring of domestic e-mail messages, in particular, has posed longstanding legal and logistical difficulties, the officials said."

I take issue with the Times' characterization that such a breach of constitutional norms merely represent "logistical difficulties." As with a Times' report in April which alleged that NSA's driftnet spying under Obama was simply a problem of "overcollection," far from being mere technical issues, first and foremost, these violations represent political decisions made at the highest levels of the national security state itself.

Since April, when it was disclosed that the intercepts of some private communications of Americans went beyond legal limits in late 2008 and early 2009, several Congressional committees have been investigating. Those inquiries have led to concerns in Congress about the agency's ability to collect and read domestic e-mail messages of Americans on a widespread basis, officials said. Supporting that conclusion is the account of a former N.S.A. analyst who, in a series of interviews, described being trained in 2005 for a program in which the agency routinely examined large volumes of Americans' e-mail messages without court warrants. Two intelligence officials confirmed that the program was still in operation. (James Risen and Eric Lichtblau, "E-Mail Surveillance Renews Concerns in Congress," The New York Times, June 17, 2009)

Last year, congressional Democrats, including Senator now President, Obama, handed the NSA virtually unchecked power to spy on the private communications of Americans. In addition to granting retroactive immunity to telecom grifters who profited from their conspiracy to illegally spy on citizens for the state, the despicable FISA Amendments Act (FIA) gave NSA the legal cover to intercept Americans' communications "so long as it was done only as the incidental byproduct of investigating individuals 'reasonably believed' to be overseas," as the Times delicately put it.

CYBERCOM's brief, and its deployment inside NSA with full access to the agency's powerful computing assets, and with a mission to conduct global Intelligence, Surveillance and Reconnaissance (ISR) at the behest of their STRATCOM masters, mean that despite bromides about "privacy concerns," the Pentagon will most assuredly be interested in developing an attack matrix that can just as easily be turned inward. After all as General Chilton asserts, "it's up to the president to decide."

"One thing that is pretty clear," Wired reports, "NSA will be leading this emerging command." Indeed, NSA "may also come to dominate the wider government cyber defense effort, as well." As The Wall Street Journal revealed, the Defense Department's 2010 budget "envisions training and graduating more than 200 cyber-security officers annually." In contradistinction to DoD, "the Department of Homeland Security has 100 employees dedicated to civilian cyber security, with plans to reach 260 next year," the Journal reports.

In other words, right from the get-go NSA will be assuming operational control of CYBERCOM. This is driven home by the fact that the Pentagon is already receiving the vast majority of appropriations for state cybersecurity initiatives and have thousands of cyberwarriors across all branches of the military, including outsourced private contractors who labor for DoD, ready, willing and able to staff the new command.

As Antifascist Calling revealed in April, with billions of dollars already spent on a score of top secret cyber initiatives, including those hidden within Pentagon Special Access or black programs, the issue of oversight is already a moot point.

Defense analyst William M. Arkin in his essential book, Code Names, described some three dozen cyberwar programs and/or exercises, currently being pursued by the Pentagon. Since the book's 2005 publication, many others undoubtedly have come on-line.

While NSA Director Alexander has explicitly stated that he does "not want [NSA] to run cybersecurity for the United States government," CYBERCOM's stand-up, and Alexander's near certain appointment as commander, all but guarantees that the agency will be a ubiquitous and silent gatekeeper answerable to no one.

Tom Burghardt is a researcher and activist based in the San Francisco Bay Area. In addition to publishing in Covert Action Quarterly and Global Research, his articles can be read on Dissident Voice, The Intelligence Daily, Pacific Free Press and the whistleblowing website Wikileaks. He is the editor of Police State America: U.S. Military "Civil Disturbance" Planning, distributed by AK Press.

Tom Burghardt is a frequent contributor to Global Research.  Global Research Articles by Tom Burghardt


Antifascist Calling... -

© Copyright Robert Bridge, Global Research, 2009

Disclaimer: The views expressed in this article are the sole responsibility of the author and do not necessarily reflect those of the Centre for Research on Globalization. The contents of this article are of sole responsibility of the author(s). The Centre for Research on Globalization will not be responsible or liable for any inaccurate or incorrect statements contained in this article.

© 2005-2019 - The Market Oracle is a FREE Daily Financial Markets Analysis & Forecasting online publication.

Post Comment

Only logged in users are allowed to post comments. Register/ Log in

6 Critical Money Making Rules