11/29/9 Escalating "War on the Net": Control of Information & Communications Central to "GWOT"

The US "war on the internet"
by liz burbank, the burbank digest
November 29, 2009

The US "war on the internet" information below is just the tip of a terrible iceberg, rarely even mentioned, much less examined by US mainstream media. It is chillingly self-explanatory. In the works for years, it is being incrementally implemented (for ex., at the most basic sender-receiver authentication level, as 'anti-spam'. 'anti-ID theft' and other personal 'security' pretexts.)
Total surveillance and control of information and communications is central and essential to the phony 'war on terror' --- a state terror war for global domination as so much of the world on the deadly receiving end knows. Made clear 'in their own words', even blogging and 'social networking' are intolerable threats to those in the business of spreading fear, lies and tyranny.

"The internet needs to be dealt with as if it were an enemy 'weapons system'..."
Information Operation Roadmap Part 3: "We Must Fight the Net"

Unthinkable: How the Internet could become a tool of corporate and government power, based on updates now in the works
Newsweek International Issues 2004
By Steven Levy
Picture, if you will, an information infrastructure that encourages censorship, surveillance and suppression of the creative impulse. Where anonymity is outlawed and every penny spent is accounted for. Where the powers that be can smother subversive (or economically competitive) ideas in the cradle, and no one can publish even a laundry list without the imprimatur of Big Brother. Some prognosticators are saying that such a construct is nearly inevitable. And this infrastructure is none other than the former paradise of rebels and free-speechers: the Internet. ... wasn’t the Internet supposed to be the defining example of empowering technology? Freedom was allegedly built into the very bones of the Internet, designed to withstand nuclear blasts and dictatorial attempts at control. ...
Certainly John Walker (ed: his important article below) believed all that. The hackerish founder of the software firm Autodesk..in the past couple of years noticed a disturbing trend... Walker posted his fears in a web document called The Dangers of Digital Imprimatur http://www.fourmilab.ch/documents/digital-imprimatur/ ...(below)
A concurrent step would be the adoption of "trusted computing," a system by which not only people but computer programs would be stamped with identifying marks. Those would link with certificates that determine whether programs are uncorrupted and cleared to run on your computer. The best-known implementation of this scheme is the work in progress at Microsoft known as Next Generation Secure Computing Base (formerly called Palladium)...

article continues following these inserts:
"Trusted Computing"

What is TCPA? Why Should You Give a Damn?
Walker isn’t the first to warn of this ominous power shift. The Internet’s pre-eminent dean of darkness is Lawrence Lessig, the Stanford University guru of cyberlaw. Beginning with his 1999 book "Code and Other Laws of Cyberspace," Lessig has been predicting that corporate and regulatory pressures would usurp the open nature of the Net, and now says that he has little reason to retract his pessimism. Lessig understands that restrictive copyright and Homeland Security laws give a legal rationale to "total control," and also knows that it will be sold to the people as a great way to stop thieves, pirates, malicious hackers, spammers and child pornographers. "To say we need total freedom isn’t going to win," Lessig says.[...]

US Plans to 'Fight the Net' Revealed
by Adam Brookes
January 27, 2006 BBC
Pentagon's 2003 "Information Operations Roadmap" newly declassified, gives a glimpse into the US military's plans for "information operations" [...]

Secret Pentagon "Roadmap"
National Security Archive Electronic Briefing Book No. 177
A secret Pentagon "roadmap" on war propaganda, approved by Secretary of Defense Donald Rumsfeld in October 2003...calls on DoD to enhance its capabilities in five key Information Operations (IO) areas: electronic warfare (EW), PSYOP, Operations Security (OPSEC), military deception and computer network operations (CNO)....

Full Spectrum Information Operation Roadmap: Warfare Without Limits
Brent Jessop

U.S. Department of Defense Information Operations Related Documents
Information Operations Roadmap (DOD 2003):Download: http://information-retrieval.info/info_ops_roadmap.pdf
Information Operations (JP 3-13 2006): Download: http://information-retrieval.info/JP3_13.pdf
Joint Doctrine for Military Deception (JP 3-13.4 2006): Download: http://information-retrieval.info/JP3_13_4.pdf
Joint Doctrine for PSYOPS (JP 3-53 2003):Download: http://information-retrieval.info/JP3_53.pdf
Joint Doctrine for Public Affairs (JP 3-61 2005): Download: http://information-retrieval.info/JP3_61.pdf
Joint Doctrine for Civil Affairs (JP 3-57.1 2003): Download: http://information-retrieval.info/JP3_57_1.pdf
Joint Doctrine for Electronic Warfare (JP 3-13.1 2007): Download: http://information-retrieval.info/JP3_13_1.pdf
Information Operations: The Hard Reality of Soft Power, Joint Forces Staff College and the National Security Agency (2004) (ISBN 1574886991).
America prepares for 'cyber war' with China, Telegraph.uk.co (June 15, 2007).

Pentagon Plans New Arm to Wage Cyberspace Wars
WASHINGTON — The Pentagon plans to create a new military command for cyberspace, administration officials said Thursday, stepping up preparations by the armed forces to conduct both offensive and defensive computer warfare.The military command would complement a civilian effort to be announced by President Obama on Friday that would overhaul the way the United States safeguards its computer networks... Officials said that in addition to the unclassified strategy paper to be released by Mr. Obama on Friday, a classified set of presidential directives is expected to lay out the military’s new responsibilities and how it coordinates its mission with that of the N.S.A., where most of the expertise on digital warfare resides today...

(added after posting)

NSA took part in development of Windows 7
25 Nov 2009
The National Security Agency (NSA) acknowledged having worked with Microsoft on the development of Windows 7, as testified on 17 November 2009 by Richard Schaeffer, the NSA’s information assurance director, before the U.S. Senate’s Subcommittee on Terrorism and Homeland Security. The cooperation between the NSA and Microsoft has been an open secret since a judiciary agreement was reached between the U.S. Government and the computer giant. It is however the first time that official mention of this has been made. In terms of cyber security, over and above the issue of protection from external intrusions, the crux of the matter lies in who is the doorkeeper. In other words, while it is NSA’s prerogative to have sole security access control over the most-widely used software equipment inside the United States, the fact remains that Windows 7 is marketed globally. Undoubtedly, this opens up considerable opportunities for U.S. cyber espionage beyond its borders....

Microsoft VP, TCG: Jing De Jong-Chen
Director of Government Security, Microsoft Corporation Jing de Jong-Chen has over 15 years of industry experience in software development, security technology policy and global partnership development with industry, government and research communities. As Director of Government Security at Microsoft, Jing is responsible for leading the cross-company task force to research, formulate and communicate company strategies and policies on security technology in several global business environments. Since joining Microsoft in 1992, Jing has worked with a wide range of strategic products and businesses across the company, including Microsoft Windows, Advanced Strategies and Policy, Platform and On Line Services Division, and Microsoft Research. She was part of the driving force in the company to launch the Trustworthy Computing Initiative.

The National Security Agency (NSA) defines a trusted system or component as one "whose failure can break the security policy", and a trustworthy system or component as one "that will not fail". Trusted Computing has been defined and outlined with a set of specifications and guidelines by the Trusted Computing Platform Alliance (TCPA), including secure input and output, memory curtaining, sealed storage, and remote attestation.

NGSCB Next-Generation Secure Computing Base: Microsoft’s TPM-based Trusted Computing solution. Formerly known as “Palladium”.
Trusted Computing: A Framework for Data and Network Security
*Authentication *Data Protection/Encryption *Identity and Access Management *Password Management *Network Access Control *Disaster Recovery *Layered Security

DARPA, Microsoft, Lockheed team up to reinvent TCP/IP

Technology Leaders Favor Online ID Card Over Passwords
Michael B. Jones, Microsoft’s director of identity partnerships, said...

Microsoft Palladium: Next Generation Secure Computing Base

Microsoft and the National Security Agency
April 6, 2007 http://www.techweb.com/wire/29110640

A Fresh Start for the Internet
Stanford University researchers aren't just dreaming of a new Internet: they're building it.
By Rachel Ross March 19, 2007 http://www.technologyreview.com/Infotech/18397/

Obama Asks Bloggers For Help
President Barack Obama yesterday called on like-minded bloggers to help his administration keep the heat on lawmakers to pass health care reform. "I know the blogs are best at debunking myths that can slip through a lot of the traditional media outlets," he said. "And that is why you are going to play such an important role in our success in the weeks to come." http://martininthemargins.blogspot.com/2009/07/obama-asks-bl oggers-for-help.html

(NB: Bill passed and Obama since has declared a "swine flu" national emergency)
8/28/9 Bill Would Give President Emergency Control of Internet
by Declan McCullagh
Internet companies and civil liberties groups were alarmed this spring when a U.S. Senate bill proposed handing the White House the power to disconnect private-sector computers from the Internet. They're not much happier about a revised version that aides to Sen. Jay Rockefeller, West Virginia Democrat, have spent months drafting behind closed doors. CNET News has obtained a copy of the 55-page draft of S.773 (excerpt )...The new version would allow the president to "declare a cybersecurity emergency" relating to "non-governmental" computer networks and do what's necessary to respond to the threat. ("Cyber" is defined as anything having to do with the Internet, telecommunications, computers, or computer networks.) ...

"a threat to democracy"
Obama: We Need To Bail Out Newspapers Or Blogs Will Run The World
Obama said he will look at a news paper bailout, otherwise, blogs will take over the world, and that would be a threat to democracy bills that could give tax newspapers tax-breaks if they were to restructure as 50 (c) (3) educational corporations. One of the bills is that of Senator Ben Cardin, who has introduced the "Newspaper Revitalization Act...

U.S. Institute of Peace Study by Israeli Professor: Terrorist Groups Active on the Internet
There are hundreds of sites on the Internet serving terrorist groups and their supporters, according to a study done by the * US Institute of Peace (USIP). The study undertaken by Gabriel Weimann, a professor at the Haifa University in Israel and currently a senior fellow at USIP, writes that today all active terrorist groups have established their presence on the Internet…

Israeli high-tech companies work for U.S.
U.S. law enforcement wiretaps authorized by the Communications Assistance for Law Enforcement Act (CALEA)
[Isreali]Amdocs provides billing and directory assistance for most American phone companies, Comverse Infosys handles telephone tapping equipment for US law enforcement, Odigo runs "Instant Message" systems on computers. All three are closely tied to the Mossad and the Israeli Defense Force, which is massively funded by u.s. Most firewalls on US corporate and government computer systems are provided by Israeli Checkpoint Systems. Odigo's offices near the World Trade Towers allegedly received two hour advance warning of the 911attacks... http://archive.newsmax.com/archives/articles/2001/12/18/224826.shtml

"From the depth of our heart -- thanks to The Israeli Defense Forces"
Microsoft logo under the text with the Israeli national flag in the background.

Microsoft CEO: Our company almost as Israeli as American
By Maayan Cohen, TheMarker Correspondent, and Reuters
Microsoft's Chief Executive Steve Ballmer, on a visit to Israel... at the inauguration ceremony of the American software giant's new research and development center in Herzliya...said Microsoft is an Israeli company almost as much as it is American...that the proportion of Microsoft employees per capita in Israel is almost similar to that in the United States...he knows very few places around the world that offer such a variety of startup opportunities, and that his company intends to purchase more Israeli startup companies... the CEO said Microsoft is not looking to buy all of Yahoo! but is currently engaging in negotiations about other types of deals with the U.S. No. 2 search engine.
Related:# Microsoft Israel creating new R&D center in Herzliya # Yahoo! President Susan Decker takes interest in Israel # Internet giant Yahoo! to follow rivals Google, Microsoft to Israel

Emerging Threats Analysis: U.S. military to patrol Internet

National Dragnet Is a Click Away: Authorities to Gain Fast and Expansive Access to Records
Several thousand law enforcement agencies are creating the foundation of a domestic intelligence system through computer networks that analyze vast amounts of police information to fight crime and root out terror plots. http://www.washingtonpost.com/wp-dyn/content/article/2008/03

US warrantless wiretapping since 1990s predates 9/11
12/19/07 "The Register"- Secret surveillance operations that enabled the National Security Agency (NSA) to access telecommunications traffic data have been in place since the 1990s.... http://www.informationclearinghouse.info/article18928.htm

The Open Source Center is a component of the Office of the Director of National Intelligence administered by the CIA.
Naquin addressed the Central Intelligence Retirees' Association October 3, 2007. The text of his remarks is at http://www.fas.org/irp/eprint/naquin.pdf
The DNI Open Source Center, which gathers, translates, analyzes, and distributes unclassified open source intelligence from around the world, is steadily growing in capability and impact, according to Doug Naquin, the Center's Director. The Open Source Center, which replaced the CIA's Foreign Broadcast Information Service, is doing more analysis and outreach than it predecessor and is also exploring new media, said Mr. Naquin in a recent speech. "We're looking now at YouTube, which carries some unique and honest-to-goodness intelligence," he said. "We have groups looking at what they call 'Citizens Media': people taking pictures with their cell phones and posting them on the Internet. Then there's Social Media, phenomena like MySpace and blogs.... A couple years back we identified Iranian blogs as a phenomenon worthy of more attention, about six months ahead of anybody else."...

Does The Government Manipulate Social Media?
The U.S. government long ago announced its intention to "fight the net". As revealed by an official Pentagon report called "Information Operations Roadmap" (ed: see above) ... "Strategy should be based on the premise that the Department [of Defense] will 'fight the net' as it would an enemy weapons system".
CENTCOM announced in 2008 a team of employees would be "[engaging] bloggers who are posting inaccurate or untrue information, as well as bloggers who are posting incomplete information." The Air Force is now also engaging bloggers....
Finally, under the post-9/11 "homeland security" laws, the government routinely demands full access to ISPs and websites... Do you doubt the military and homeland security apparatus would step in to take control of what it considered an "enemy" message...the government considers any message questioning anything the government does as an enemy message. See this, this, this and this...

digest note: Soft power 'pro-democracy' propaganda partners US/NED/Soros NGOs
U.S. government taps Facebook, Google, MTV to "Fight Terrorism"
Global Research, November 28, 200
The US State Department announced plans on Monday to promote online youth groups as a new and powerful way to fight crime, political oppression and terrorism. Drawing inspiration from a movement against FARC rebels in Colombia, the State Department is joining forces with Facebook, Google, MTV, Howcast and others in New York City next week to get the "ball rolling." It said 17 groups from South Africa, Britain and the Middle East which have an online presence like the "Million Voices Against the FARC" will attend a conference at Columbia University Law School from December 3-5. Observers from seven organizations that do not have an online presence -- such as groups from Iraq and Afghanistan -- will attend. There will also be remote participants from Cuba. They will forge an "Alliance of Youth Movement," said James Glassman, under secretary of state for public diplomacy....

"Unless a way of intervening in the radicalization process can be found, we are condemned to stepping on cockroaches one at a time."
Social Repression and Internet Surveillance: H. Res. 1695, 1955 & S.1959
By Nikki Alexander
...Jane Harman (D-CA) sponsored H.Res.1955 her partner, Dave Reichert (R-WA),authored the original bill... H.Res.1695....establishes a National Commission and Center of so-called "Excellence" to censor and crush social concerns... perceived to be "threats" by RAND..."homegrown terrorism," "violent radicalization" and "ideologically based violence"...who have been "violently radicalized" by "extremist belief systems."..."The Internet has aided in facilitating violent radicalization, ideologically based violence, and the homegrown terrorism process in the United States by providing access to broad and constant streams of terrorist-related propaganda to United States citizens."... RAND spokesman, Brian Jenkins... said to Jane Harman’s Committee: "Unless a way of intervening in the radicalization process can be found, we are condemned to stepping on cockroaches one at a time." ...the precise terminology used by Nazis to justify exterminating Jews. http://www.informationclearinghouse.info/article18998.htm

The Dangers of Digital Imprimatur
by John Walker

Global Internet,
Once a spring of liberty,
Autumn chill so near.

November 4th, 2003


**** related information at: http://www.burbankdigest.com/node/239 http://www.burbankdigest.com/node/153