10/17 Obama: Blogger "Threat to Democracy": Prez Emgcy.Control of Internet; DARPA, Microsoft, Lockheed Reinventing Internet

Obama Asks Bloggers For Help
21 July 2009
President Barack Obama yesterday called on like-minded bloggers to help his administration keep the heat on lawmakers to pass health care reform.
"I know the blogs are best at debunking myths that can slip through a lot of the traditional media outlets," he said. "And that is why you are going to play such an important role in our success in the weeks to come." http://martininthemargins.blogspot.com/2009/07/obama-asks-bloggers-for-h...

"a threat to democracy"
Obama: We Need To Bail Out Newspapers Or Blogs Will Run The World
Obama said he will look at a news paper bailout, otherwise, blogs will take over the world, and that would be a threat to democracy bills that could give tax newspapers tax-breaks if they were to restructure as 50 (c) (3) educational corporations. One of the bills is that of Senator Ben Cardin, who has introduced the "Newspaper Revitalization Act

8/28/9 Bill Would Give President Emergency Control of Internet
by Declan McCullagh
Internet companies and civil liberties groups were alarmed this spring when a U.S. Senate bill proposed handing the White House the power to disconnect private-sector computers from the Internet. They're not much happier about a revised version that aides to Sen. Jay Rockefeller, West Virginia Democrat, have spent months drafting behind closed doors. CNET News has obtained a copy of the 55-page draft of S.773 (excerpt )...The new version would allow the president to "declare a cybersecurity emergency" relating to "non-governmental" computer networks and do what's necessary to respond to the threat. Other sections of the proposal include a federal certification program for "cybersecurity professionals," and a requirement that certain computer systems and networks in the private sector be managed by people who have been awarded that license ...Section 201 permits the president to "direct the national response to the cyber threat" if necessary for "the national defense and security." The White House is supposed to engage in "periodic mapping" of private networks deemed to be critical, and those companies "shall share" requested information with the federal government. ("Cyber" is defined as anything having to do with the Internet, telecommunications, computers, or computer networks.) ...

DARPA, Microsoft, Lockheed team up to reinvent TCP/IP
October 10, 2009
Arms globocorp Lockheed Martin announced today that it has won a $31m contract from the famous Pentagon crazy-ideas bureau, DARPA, to reinvent the internet and make it more suitable for military use. Microsoft will also be involved in the effort. The main thrust of the effort will be to develop a new Military Network Protocol, which will differ from old hat such as TCP/IP in that it will offer "improved security, dynamic bandwidth allocation, and policy-based prioritization levels at the individual and unit level". "New network threats and attacks require revolutionary protection concepts," said Lockheed cyber-arsenal chieftain John Mengucci. "Through this project, as well as our cyber Mission Maker initiatives, we are working to enhance cyber security and ensure that warfighters* can fight on despite cyber attacks."
Lockheed will be partnered with Anagran, Juniper Networks, LGS Innovations, Stanford University and - of course - Microsoft in developing the MNP. Apart from that, Lockheed's own Information Systems & Global Services-Defense tentacle will work on amazing new hardware. According to the firm:
Lockheed Martin's team will develop router technologies that include strong authentication and self configuration capabilities to improve security, reduce the need for trained network personnel and lower overall life cycle costs for network management.
The original Arpanet, which turned into the TCP/IP internet was developed for DARPA's predecessor... for military use

Obama Calls on Americans to Help With Cybersecurity
U.S. President Barack Obama has urged Americans to help guard against cyberattacks in a first-of-its-kind video published on the White House Web site. “Our digital networks are critical to our national security, our military superiority and public safety..." Obama said he will "soon" appoint a cybersecurity coordinator to lead a new government office responsible for making sure that defending the country’s networks becomes a national security priority.... He called for public-private partnerships to ensure security and privacy. “Ultimately it comes down to each of us as individuals,”... http://www.nytimes.com/external/idg/2009/10/16/16idg-obama-calls-on-amer...


...conflict between information masters and information victims...
We, the winners, are a minority......We live in an age of multiple truths. He who warns of the "clash of civilizations" is incontestably right.....One of the defining bifurcations of the future will be the conflict between information masters and information victims.......
Information destroys traditional jobs and traditional cultures; it seduces, betrays, yet remains invulnerable. How can you counterattack the information others have turned upon you? There is no effective option other than competitive performance. For those individuals and cultures that cannot join or compete with our information empire, there is only inevitable failure (of note, the internet is to the techno-capable disaffected what the United Nations is to marginal states: it offers the illusion of empowerment and community) ... The next century will indeed be American, but it will also be troubled. We will find ourselves in constant conflict, much of it violent. The United States Army is going to add a lot of battle streamers to its flag. We will wage information warfare, we will fight with infantry. And we will always surprise those critics, domestic and foreign, who predict our decline..." [...]

Microsoft Palladium: Next Generation Secure Computing Base
Dec. 2003 http://epic.org/news/2003.html
Palladium Privacy, Unique Identifier Issues. EPIC has documents from the National Institute of Standards and Technology under the Freedom of Information Act describing Microsoft Palladium. The documents (pdf 980k) describe Palladium's applications for Digital Rights Management and note that the technology embeds "unique machine identifiers," thus raising risks that user behavior may be subject to traffic analysis. Issues raised by Palladium, which is now known as the Next Generation Secure Computing Base, are similar to privacy problems with the controversial Intel Pentium Serial Number.

in-depth analysis lays out, and demolishes ,all the pretexts for destroying the internet as we know it to establish "secure trusted computing" called "internet 2"
The Dangers of Digital Imprimatur
by John Walker
September 13th, 2003 Revision 4 — November 4th, 2003

US Plans to 'Fight the Net' Revealed
by Adam Brookes
January 27, 2006 BBC
WASHINGTON - Pentagon's 2003 "Information Operations Roadmap", newly declassified, gives a glimpse into the US military's plans for "information operations" - from psychological operations, to attacks on hostile computer networks. Bloggers beware. As the world turns networked, the Pentagon is calculating the military opportunities that computer networks, wireless technologies and the modern media offer. From influencing public opinion through new media to designing "computer network attack" weapons, the US military is learning to fight an electronic war....It reveals that Psyops personnel "support" the American government's international broadcasting. It singles out TV Marti - a station which broadcasts to Cuba - as receiving such support. It recommends that a global website be established that supports America's strategic objectives. But no American diplomats here, thank you. The website would use content from "third parties with greater credibility to foreign audiences than US officials". It also recommends that Psyops personnel should consider a range of technologies to disseminate propaganda in enemy territory: unmanned aerial vehicles, "miniaturized, scatterable public address systems", wireless devices, cellular phones and the internet. 'Fight the net'. When it describes plans for electronic warfare, or EW, the document takes on an extraordinary tone [... ]

The Internet Is Broken
The Net's basic flaws cost firms billions, impede innovation, and threaten national security. It's time for a clean-slate app
By David Talbot Dec. 2005/Jan. 2006

A Fresh Start for the Internet
Stanford University researchers aren't just dreaming of a new Internet: they're building it.
By Rachel Ross
March 19, 2007

Microsoft: "From the depth of our heart -- thanks to The Israeli Defense Forces"
Microsoft and the National Security Agency
April 6, 2007
In January the Washington Post reported that Microsoft had announced that its new operating system, Vista, was being brought to us with the assistance of the National Security Agency... In September 1999, leading European investigative reporter Duncan Campbell revealed that NSA had arranged with Microsoft to insert special "keys" into Windows operating systems, beginning with Windows 95. [ http://www.techweb.com/wire/29110640 ]..
In February 2000, it was disclosed that the Strategic Affairs Delegation (DAS), the intelligence arm of the French Defense Ministry, had prepared a report in 1999 which also asserted that NSA had helped to install secret programs in Microsoft software....
In case the above disturbs your image of Bill Gates and his buddies as a bunch of long-haired, liberal, peacenik computer geeks, and the company as one of the non-military-oriented halfway decent corporations, the DAS report states that the Pentagon at the time was Microsoft's biggest client in the world. The Israeli military has also been an important client. In 2002, the company erected enormous billboards in Israel which bore the Microsoft logo under the text "From the depth of our heart -- thanks to The Israeli Defense Forces", with the Israeli national flag in the background.[15]

Army's information Technology [IT] Strategic Plan
Army CIO/G-6 Campaign Plan, 2008-2015
Published October 2007
The Global Information Grid (GIG) is the Department of Defense's approach to information and decision superiority- a key to the National Military Strategy for continued information dominance. This decision superiority is based on shared information across the Army and with Joint, Interagency, and Multi-National coalitions and allies.[...] http://www.cfr.org/publication/14780/army_ciog6_campaign_plan_20082015.h...

“Unless a way of intervening in the radicalization process can be found, we are condemned to stepping on cockroaches one at a time.”
Social Repression and Internet Surveillance
H. Res. 1695, 1955 & S.1959
By Nikki Alexander
...Jane Harman (D-CA) sponsored H.Res.1955 her partner, Dave Reichert (R-WA), authored the original bill, H.Res.1695....establishes a National Commission and Center of so-called “Excellence” to censor and crush social concerns which are subjectively perceived to be “threats” by RAND spokesmen, who supplied the content for this bill. RAND coined the folksy epithets “homegrown terrorism,” “violent radicalization” and “ideologically based violence” to invalidate expressions of social conscience that conflict with corporate interests... it characterizes individuals who care deeply about international human rights, national sovereignty and ecological protection as “homegrown terrorists” who have been “violently radicalized” by “extremist belief systems.” This bill quotes RAND ideology verbatim.

National Dragnet Is a Click Away
Authorities to Gain Fast and Expansive Access to Records
Several thousand law enforcement agencies are creating the foundation of a domestic intelligence system through computer networks that analyze vast amounts of police information to fight crime and root out terror plots.

Technology Leaders Favor Online ID Card Over Passwords
The Information Card Foundation is an effort to create a single industrywide approach to managing identity online.... to bring the concept of an identity card, like a driver’s license, to the online world. Michael B. Jones, Microsoft’s director of identity partnerships, said the information card system would depend on the support of Web site owners in the same way that early Web browsers like Netscape waited for the support of Web server developers. The technology will first be used on desktop systems but will eventually find its way to mobile phones and other hand-held devices, he said. Microsoft has been working on the concept of an identity card for some time. The new organization will ensure various approaches adhere to the same standard.... The foundation, which also includes Equifax, Novell, Oracle and nine industry analysts and technology leaders, will try to set standards for the technology industry. http://www.nytimes.com/2008/06/24/technology/24card.html?th=&emc=th&page...

Emerging Threats
Analysis: U.S. military to patrol Internet
UPI Homeland and National Security Editor

Winning hearts and minds: strategy to polish America's image with communications and 'humanitarian aid' strategies.
By Peter A Buxbaum in Washington, DC for ISN Security Watch 28/07/08
...Two documents emblematic of enhanced US outreach efforts are worth noting. The first, a report from the Pentagon's Defense Science Board, released in September 2004, calls for the development of a national strategic communication strategy and the establishment of an independent Center for Strategic Communication to support the US National Security Council in its efforts to win the world's hearts and minds. The other, also emanating from the Pentagon, is Department of Defense Directive 3000.05, issued in November 2005, which states that addressing the basic human needs of civilians is "a core US military mission that the Department of Defense shall be prepared to conduct and support. They shall be given priority comparable to combat operations."
The fact that both of these documents originate with the Department of Defense is significant....both communication and humanitarian efforts are being funded and supported by the US military...." to synchronize diplomacy with military psychological operations to develop an overarching concept of creating the right message for the right audience delivered in the right way to help shape perceptions."...
"Military humanitarian projects are similar to those conducted by civilian aid agencies and non-governmental organizations," he told ISN Security Watch. "The difference lies in the strategic rationale with which these projects are selected and chosen by the military, rather than the principal focus on humanitarian need and sustainability that is held by civilian development experts." This has been borne out by the experience of the USAID. "I have worked with military officers who acted as development officers in Afghanistan," Elisabeth Kvitashvili, deputy assistant administrator in the Bureau of Democracy, Conflict and Humanitarian Assistance at USAID, told ISN Security Watch....
That the provision of humanitarian assistance is a strategic Pentagon priority was highlighted by the launch of the US Africa Command, or AFRICOM, in 2007. "As with other regional commands, AFRICOM will have responsibility for US military operations with a particular area of responsibility," said Brigety. "Yet it is distinguished from other regional commands because its primary mission will be conducting non-military operations."

Panel Presses to Bolster Security in Cyberspace
License plates may be coming to cyberspace.
A government and technology industry panel on cyber-security is recommending that the federal government end its reliance on passwords and enforce what the industry describes as “strong authentication.” Such an approach would probably mean that all government computer users would have to hold a device to gain access to a network computer or online service. The commission is also encouraging all nongovernmental commercial services use such a device.
“We need to move away from passwords,” said Tom Kellermann, vice president for security awareness at Core Security Technologies and a member of the commission that created the report. The report, which offers guidance to the Obama administration, is a strong indictment of government and private industry efforts to secure cyberspace to date. “The laissez-faire approach to cyber-security has failed,” Mr. Kellermann said.

Restricting Internet access is one of a series of recommendations that a group of more than 60 government and business computer security specialists will make in a public presentation, “Securing Cyberspace in the 44th Presidency,” on Monday. The report has been prepared during the last 18 months under the auspices of the Center for Strategic and International Studies, a Washington policy group, after a number of break-ins into government computer systems. “The damage from cyber attack is real,” the report states. “Last year, the Departments of Defense, State, Homeland Security, and Commerce, NASA and the National Defense University all suffered major intrusions by unknown foreign entities.” The report describes a laundry list of serious break-ins ranging from the hacking of the secretary of Defense’s unclassified e-mail to the loss of “terabytes” of data at the State Department.

The group recommends the creation of a White House cyber-security czar reporting to the president and the consolidation of the powers that have largely been held by the Homeland Security Department under the Bush administration. The report argues that cyber-security is one of the most significant national security threats and that it can no longer be relegated to information technology offices and chief information officers.

The commission included the top Democrat and Republican members of the House Homeland Security subcommittee that oversees cyber-security. The chairmen of the commission included Jim Langevin, a Democratic congressman from Rhode Island; and Michael McCaul, a Republican congressman from Texas. Scott Charney, corporate vice president for trustworthy computing at Microsoft; and Harry D. Raduege Jr., a retired Air Force lieutenant general who is chairman of the Center for Network Innovation at Deloitte & Touche, were also on the commission.

The report calls for new laws and regulations governing cyberspace. “We believe that cyberspace cannot be secured without regulation,” the report said. The proposed regulations included new standards for critical infrastructure providers like the finance and energy industries, as well as new federal product acquisition rules to force more secure products. The report does not entirely reject the work of the Bush administration. It cites the creation of the Comprehensive National Cybersecurity Initiative, adopted by the government as part of a presidential memorandum issued last January as a good starting point for remaking the nation’s cyber-security strategy.
That effort has led to a commitment by the federal government to spend more than $30 billion in the next seven years to enhance computing security.

Does The Government Manipulate Social Media?
The U.S. government long ago announced its intention to "fight the net". As revealed by an official Pentagon report called "Information Operations Roadmap": ...
"Strategy should be based on the premise that the Department [of Defense] will 'fight the net' as it would an enemy weapons system".
CENTCOM announced in 2008 that a team of employees would be "[engaging] bloggers who are posting inaccurate or untrue information, as well as bloggers who are posting incomplete information." The Air Force is now also engaging bloggers. Indeed, an Air Force spokesman Capt. Faggard says. "I am concerned with how insurgents or potential enemies can use Social Media to their advantage. It's our role to provide a clear and accurate, completely truthful and transparent picture for any audience." .... under the post-9/11 "homeland security" laws, the government routinely deman, ds full access to ISPs and websites... Do you doubt the military and homeland security apparatus would step in to take control of what it considered an "enemy" message...the government considers any message questioning anything the government does as an enemy message. See http://georgewashington2.blogspot.com/2008/09/police-terrorize-children-..., http://georgewashington2.blogspot.com/2008/09/what-violence-against-prot..., http://www.prisonplanet.com/air-force-creates-counter-blog-response-plan....

U.S. plots major upgrade to Internet router security
By Carolyn Duffy Marsan , Network World
"There doesn't exist a formally verifiable source for who owns what address space on the Internet, and absent that you can't really validate the routing system," McPherson says.With its extra funding, DHS hopes to develop ways to authenticate IP address allocations as well as router announcements about how to reach blocks of IP addresses....The U.S. government first discussed the vulnerability of the Internet's routing system in its "National Strategy to Secure Cyberspace," issued in 2003. The Presidential directive identified two Internet protocols -- BGP and DNS -- that require modifications to make them more secure and robust...
The U.S. government is accelerating its efforts to secure the Internet's routing system, with plans this year for the Department of Homeland Security to quadruple its investment in research aimed at adding digital signatures to router communications. DHS says its routing security effort will prevent routing hijack attacks as well as accidental misconfigurations of routing data. The effort is nicknamed BGPSEC because it will secure the Internet's core routing protocol known as the Border Gateway Protocol (BGP). (A separate federal effort is under way to bolster another Internet protocol, DNS, and it is called DNSSEC.)...
A secure routing infrastructure will require enterprises to operate a certificate authority function so that they can digitally sign and certify that they own a particular IP address block and have the authority to subdelegate it, outsource it or make some other decisions about how its traffic is routed.What securing BGP does is that "when somebody sends out an update that they are now routing traffic for a particular autonomous system, you can validate that because those BGP updates will be signed," Maughan says....Despite the federal efforts, some experts say the Internet engineering community needs a massive threat akin to the Kaminsky DNS bug before it will take action to secure BGP and the rest of the routing infrastructure. "The real barrier to securing BGP is that we just haven't had a serious enough attack," Maughan says....

Secure Protocols for the Routing Infrastructure (SPRI)
The National Strategy to Secure Cyberspace (NSSC) calls out the fact that there are problems with the existing Internet infrastructure. As a step toward fulfilling its responsibility for coordinating implementation of the NSSC with respect to the routing infrastructure, DHS has instituted the Secure Protocols for the Routing Infrastructure (SPRI) program within the S&T Directorate....

Court Affirms Wiretapping Without Warrants
WASHINGTON — In a rare public ruling, a secret federal appeals court has said telecommunications companies must cooperate with the government to intercept international phone calls and e-mail of American citizens suspected of being spies or terrorists. The ruling came in a case involving an unidentified company’s challenge to 2007 legislation that expanded the president’s legal power to conduct wiretapping without warrants for intelligence purposes. But the ruling, handed down in August 2008 by the Foreign Intelligence Surveillance Court of Review and made public Thursday, did not directly address whether President Bush was within his constitutional powers in ordering domestic wiretapping without warrants, without first getting Congressional approval, after the terrorist attacks of 2001...The finding bolstered the Bush administration’s broader arguments on wiretapping without warrants, both critics and supporters said.

The Spy Factory: The NSA Wants to Know How You Think—Maybe Even What You Think
by James Bamford
The National Security Agency (NSA) is developing a tool that George Orwell's Thought Police might have found useful: an artificial intelligence system designed to gain insight into what people are thinking. With the entire Internet and thousands of databases for a brain, the device will be able to respond almost instantaneously to complex questions posed by intelligence analysts. As more and more data is collected—through phone calls, credit card receipts, social networks like Facebook and MySpace, GPS tracks, cell phone geolocation, Internet searches, Amazon book purchases, even E-Z Pass toll records—it may one day be possible to know not just where people are and what they are doing, but what and how they think...
Known as Aquaint ("Advanced QUestion Answering for INTelligence") the project was run for many years by John Prange, an NSA scientist at the Advanced Research and Development Activity. ARDA was set up by the agency to serve as a sort of intelligence community DARPA... ARDA has now morphed into the Intelligence Advanced Research Projects Activity (IARPA)....

Collecting information, however, has always been far less of a problem for the NSA than understanding it, and that means knowing the language. To expand its linguistic capabilities, the agency established another new organization, the Center for Advanced Study of Language (CASL), and housed it in a building near IARPA at the M Square Research Park. But far from simply learning the meaning of foreign words, CASL, like Aquaint, attempts to find ways to get into someone's mind and understand what he or she is thinking.One area of study is to attempt to determine if people are lying simply by watching their behavior and listening to them speak. According to one CASL document, "Many deception cues are difficult to identify, particularly when they are subtle, such as changes in verb tense or extremely brief facial expressions. CASL researchers are studying these cues in detail with advanced measurement and statistical analysis techniques in order to recommend ways to identify deceptive cue combinations."

Do We Need a New Internet?
What a new Internet might look like is still widely debated, but one alternative would, in effect, create a “gated community” where users would give up their anonymity and certain freedoms in return for safety...scientists armed with federal research dollars and working in collaboration with the industry are trying to figure out the best way to start over. At Stanford, where the software protocols for original Internet were designed, researchers are creating a system to make it possible to slide a more advanced network quietly underneath today’s Internet. By the end of the summer it will be running on eight campus networks around the country....
The Stanford Clean Slate project won’t by itself solve all the main security issues of the Internet, but it will equip software and hardware designers with a toolkit to make security features a more integral part of the network and ultimately give law enforcement officials more effective ways of tracking criminals through cyberspace....The idea is to build a new Internet with improved security and the capabilities to support a new generation of Internet applications, as well as to do some things the current Internet does poorly — such as supporting mobile users...
The Stanford Clean Slate project won’t by itself solve all the main security issues of the Internet, but it will equip software and hardware designers with a toolkit to make security features a more integral part of the network and ultimately give law enforcement officials more effective ways of tracking criminals through cyberspace.

Pentagon sets sights on public opinion
The Pentagon is steadily and dramatically increasing the money it spends to win what it calls "the human terrain" of world public opinion. In the process, it is raising concerns of spreading propaganda at home in violation of federal law. An Associated Press investigation found that over the past five years, the money the military spends on winning hearts and minds at home and abroad has grown by 63 percent, to at least $4.7 billion this year, according to Department of Defense budgets and other documents. That's almost as much as it spent on body armor for troops in Iraq and Afghanistan between 2004 and 2006. This year, the Pentagon will employ 27,000 people just for recruitment, advertising and public relations — almost as many as the total 30,000-person work force in the State Department. The biggest chunk of funds — about $1.6 billion — goes into recruitment and advertising. Another $547 million goes into public affairs, which reaches American audiences. And about $489 million more goes into what is known as psychological operations. Staffing across all these areas costs about $2.1 billion, as calculated by the number of full-time employees and the military's average cost per service member. That's double the staffing costs for 2003. Recruitment and advertising are the only two areas where Congress has authorized the military to influence the American public. Far more controversial is public affairs, because of the prohibition on propaganda to the American public.

Officials Say U.S. Wiretaps Exceeded Law
April 16, 2009
The National Security Agency intercepted private e-mail messages and phone calls of Americans in recent months on a scale that went beyond the broad legal limits established by Congress last year, government officials said in recent interviews. Several intelligence officials, as well as lawyers briefed about the matter, said the N.S.A. had been engaged in “overcollection” of domestic communications of Americans. They described the practice as significant and systemic.

Pentagon Plans New Arm to Wage Cyberspace Wars
WASHINGTON — The Pentagon plans to create a new military command for cyberspace, administration officials said Thursday, stepping up preparations by the armed forces to conduct both offensive and defensive computer warfare.The military command would complement a civilian effort to be announced by President Obama on Friday that would overhaul the way the United States safeguards its computer networks... Officials said that in addition to the unclassified strategy paper to be released by Mr. Obama on Friday, a classified set of presidential directives is expected to lay out the military’s new responsibilities and how it coordinates its mission with that of the N.S.A., where most of the expertise on digital warfare resides today...

Defend America, One Laptop at a Time
OUR economy, energy supply, means of transportation and military defenses are dependent on vast, interconnected computer and telecommunications networks. These networks are poorly defended and vulnerable to theft, disruption or destruction by foreign states, criminal organizations, individual hackers and, potentially, terrorists...Acknowledging such threats, President Obama recently declared that digital infrastructure is a “strategic national asset,” the protection of which is a national security priority....
President Obama has recognized the need to educate the public about computer security. The government should jump-start this education by mandating minimum computer security standards and by requiring Internet service providers to deny or delay Internet access to computers that fall below these standards, or that are sending spam or suspicious multiple computer probes into the network...
The Obama administration recently announced that it would set up a Pentagon cybercommand to defend military networks. Some in the administration want to use Cybercom to help the Department of Homeland Security protect the domestic components of private networks.. a Senate bill introduced in April would give the executive branch broad emergency authority to limit or halt private Internet traffic related to “critical infrastructure information systems.” ... But the president is less than candid about the tradeoffs the nation faces. The government must be given wider latitude than in the past to monitor private networks...

FBI “Going Dark.” Budget Request for High-Tech Surveillance Capabilities Soar
by Tom Burghardt / May 18th, 2009
October 15, 2009
A new RAND Corporation report suggests the U.S. may be better off playing defense and pursuing diplomatic, economic, and prosecutorial efforts against cyberattackers, instead of making strategic cyberwarfare an investment priority. The study comes as the U.S. military fires up its new unified Cyber Command (USCYBERCOM) program this month. The new outfit will be responsible for network-related operations, defense, and attacks and will operate under the U.S. Strategic Command...
Meanwhile, the military has hinted that it's ready to skip the games and deal with cyberattackers in the real world--provided they can find them. "The Law of Armed Conflict will apply to this domain," Air Force General Kevin P. Chilton told Stars and Stripes . "You don't take any response options off the table from an attack on the United States of America. Why would we constrain ourselves on how we would respond?"
Mark Rutherford is a West Coast-based freelance writer. He is a member of the CNET Blog Network , and is not an employee of CNET. Email him at markr@milapp.com. Disclosure .