3/13/ Global War Fronts: USraeli DIRTY DANCING; MARJA & US Information War:CYBERCOM, Pretexts of Internet Danger Escalate


Netanyahu 'surprised' by U.S. condemnation over East Jerusalem plan
Netanyahu earlier Saturday said he was surprised by the U.S. administration's public condemnation of his government over the building plan in East Jerusalem. Sources in the Prime Minister's Office said the crisis appeared to be orchestrated by the U.S. administration, as Netanyahu apologized to U.S. Vice President Biden and believed the crisis was behind the two allies... "In all negotiations conducted up until now, Israel has clarified for the Palestinians and the U.S. that these neighborhoods are part of the Jerusalem bloc that will remain in Israeli hands in any final-status agreement."

Israel believes East Jerusalem row won't stop Mideast talks
By Barak Ravid, Avi Issacharoff, Nir Hasson and Natasha Mozgovaya
Prime Minister Benjamin Netanyahu believes that despite the crisis with the United States over the plan for new housing in East Jerusalem and the protests by the Palestinian Authority and Arab world, indirect talks with the PA will continue as planned early next week. "The crisis is behind us," sources in the Prime Minister's Bureau said Thursday. They said proof was the invitation to Netanyahu by U.S. Vice President Joe Biden to meet in Washington in 10 days while Netanyahu visits a meeting of the AIPAC lobby group... Senior Israeli sources say that the prime minister expressed confidence that the so-called proximity talks will go ahead as planned. Netanyahu also welcomed two issues in the vice president's Tel Aviv University speech Thursday. The first was the need to move as quickly as possible to direct negotiations. The second was the need to discuss all core issues and not begin with borders, which is what the Palestinians want...
As the diplomatic incident was unfolding in Israel during Biden's visit, Deputy Foreign Minister Danny Ayalon was in Washington for a series of meetings with congressmen and officials at the State Department. He quickly found himself providing explanations for the goings-on in Jerusalem. Ayalon told Haaretz. "Of course I thought that Jerusalem was always off bounds," he added, meaning that the latest construction freeze did not apply. "Most of the criticism focused on the timing,... I think they understood. There is no doubt that the Palestinians will try either to foil the proximity talks or try to squeeze further concessions as a result of this story. And I explained to administration officials that there will be no further concessions," he said...

U.S. gave Israel green light for East Jerusalem construction
By Akiva Eldar, Haaretz Correspondent
To wipe the spit off his face, Biden had to say it was only rain. Therefore, he lauded Netanyahu's assertion that actual construction in Ramat Shlomo would begin only in another several years. Thus Israel essentially received an American green light for approving even more building plans in East Jerusalem... Palestinians certainly remember that this is exactly how East Jerusalem's Har Homa neighborhood began: Then, too, Netanyahu persuaded the White House that construction would begin only in another several years. When Biden arrived, the Arab League had just recommended that Palestinian Authority President Mahmoud Abbas accede to Washington's proposal for indirect talks with Israel. But instead of being able to leave with an announcement that the talks have officially begun, Biden is leaving with the news that the Arab League has suspended its recommendation....

NB: mutually beneficial 'crisis' enhances US 'neutral peacekeeper' act and puts onus on USraeli's Palestinian agent Abbas
Interior Minister Yishai: Israel's relationship with U.S. is above all else
By Mazal Mualem, Haaretz Correspondent
Last update12/03/2010
"Our relationship with the Americans is above all else. It is an alliance that has survived complicated periods, and I had no intention of harming those ties, or to challenge the American administration, or to present obstacles to this important visit by the vice president," Shas chairman and Interior Minister Eli Yishai said Thursday in an interview with Haaretz on the crisis with Washington over the decision to authorize 1,600 housing units in the East Jerusalem neighborhood of Ramat Shlomo. Yishai says that the whole situation was caused by an unfortunate coincidence: a visit by United States Vice President Joe Biden and the decision by the Jerusalem District Planning and Building Committee to authorize the plans for constructing Jewish homes in East Jerusalem. "No official is to blame," Yishai said, referring to Interior Ministry staff. "It was technical authorization only. The committee session was scheduled two weeks in advance, and no one in the committee knew that the vice president of the U.S. was coming." "Those who may have known know that in Jerusalem there is no freeze on construction, so there was nothing unusual,"...

U.S. /Biden 'condemnation' of expanding israeli settlements reflected in expanding 'aid' to its proxy
In Israel, Biden says U.S. dedication to nation's security is 'absolute'
March 9, 2010
He praised Israel for its limited, temporary halt of settlement growth and for increasing Palestinians' ability to move freely in the West Bank. "The cornerstone of the relationship is our absolute, total, unvarnished commitment to Israel's security," he said....The usually garrulous vice president offered no background briefing for reporters on the plane and didn't take questions from Israeli or American reporters in his appearances with Netanyahu or Peres. Biden read from prepared remarks after his two-hour meeting with Netanyahu. http://www.uruknet.de/?s1=1&p=64007&s2=10

U.S. President Obama salutes Israel's 61st independence day.
Since coming into power last month, Netanyahu and his right-leaning coalition have avoided recognizing the Palestinians' right to an independent state...Netanyahu is to visit Washington early next month. Clinton said she was not going to prejudge the Israeli position until there had been face-to-face talks with him....Clinton said the State Department would carefully track assistance and additional steps being taken to ensure that no U.S. taxpayer money goes to Hamas. "No aid will flow to Hamas or any entity controlled by Hamas," she added... Clinton reiterated that the Obama administration expected any new government that included Hamas to meet three international conditions - to recognize Israel, renounce violence and sign on to previous Palestinian peace accords. Clinton hinted that some flexibility might be needed, pointing to U.S. funding for Lebanon, whose government includes the militant group Hezbollah. "We are doing that because we think, on balance, it is in the interest of the United States," she said.

psywar good-bad cop schtick
"...Upon examining Lieberman's statements, one realizes that his positions are the same as those of Netanyahu. But when it comes to diplomacy, style is important..."

NB: Regardless of which electoral agents run the show, #1 Israel, #1 is the lynchpin of U.S. zionist imperialism's global domination. Its state terrorist attack-dog partner in return gets support for genocide against the Palestinians to destroy its national liberation struggle against 'eretz israel' / 'greater israel' mideast supremacy.

in case you missed it:
An invention called 'the Jewish people'
Tom Segev, 29/02/2008

NB: Staged US 'opposition' never includes even a threat to cut or withdraw massive US support for its ME zionist proxy
Israel approves 1,600 new (illegal) East Jerusalem homes:
"The fact that Eli Yishai couldn't restrain himself for another two-three days until Biden left Israel means his intention was to slap the U.S. administration in the face," Margalit said, adding that the announcement was "a provocation to the U.S. and to the prime minister."http://haaretz.com/hasen/spages/1155171.html

Israeli Scientists: DNA can be fabricated
TEL AVIV, Israel, Aug. 17 /PRNewswire/
Nucleix, Ltd., an emerging life science company specializing in forensic DNA analysis, announced that company researchers have proven DNA evidence found at crime scenes can easily be falsified using basic equipment, know-how and access to DNA or a DNA database. Recognizing the need to safeguard the accuracy and credibility of DNA samples in the field of forensics, Nucleix scientists have developed a novel assay termed "DNA authentication" for combating this form of "biological identity theft" by distinguishing between in-vivo (real) and in-vitro (fake) DNA. ...


Fiction of Marja as City; U.S. Information War
By Gareth Porter
As "Operation Moshtarak" began, U.S. military spokesmen were portraying Marja as an urbanised population centre. On Feb. 14, the second day of the offensive, Marine spokesman Lt. Josh Diddams said the Marines were "in the majority of the city at this point." He also used language that conjured images of urban fighting, referring to the insurgents holding some "neighbourhoods"....
A central task of "information operations" in counterinsurgency wars is "establishing the COIN [counterinsurgency] narrative", according to the Army Counterinsurgency Field Manual as revised under Gen. David Petraeus in 2006. That task is usually done by "higher headquarters" rather than in the field, as the manual notes. The COIN manual asserts that news media "directly influence the attitude of key audiences toward counterinsurgents, their operations and the opposing insurgency." The manual refers to "a war of perceptions…conducted continuously using the news media." Gen. Stanley A. McChrystal, commander of ISAF, was preparing to wage such a war in advance of the Marja operation. In remarks made just before the offensive began, McChrystal invoked the language of the counterinsurgency manual, saying, "This is all a war of perceptions."...intended largely to impress U.S. public opinion with the effectiveness of the U.S. military in Afghanistan by showing that it could achieve a "large and loud victory. The false impression that Marja was a significant city was an essential part of that message.

Obama’s National Cybersecurity Initiative Puts NSA in the Driver’s Seat
by Tom Burghardt / March 8th, 2010
“we must hammer out a consensus on how to best harness the capabilities of the National Security Agency,” and that the “challenge” is to shape “an effective partnership with the private sector so information can move quickly back and forth from public to private–and classified to unclassified–to protect the nation’s critical infrastructure.”...
March 2, the Obama administration issued a sanitized version of the Comprehensive National Cybersecurity Initiative (CNCI), releasing portions that discussed intrusion detection systems on federal networks. The announcement was made by former Microsoft executive Howard A. Schmidt, appointed cybersecurity coordinator by President Obama in December. The partial unveiling came during the RSA Security Conference in San Francisco, an annual industry conference for security professionals.
CNCI’s 2008 launch was shrouded in secrecy by the Bush administration. Authority for the program is derived from a classified order issued by President Bush.... the contents of National Security Presidential Directive 54, also known as Homeland Security Presidential Directive 23 (NSPD 54/HSPD 23) have never been released for public scrutiny...

Despite President Obama’s pledge in May 2009 announcing White House cybersecurity policy, that his administration will not continue Bush-era surveillance practices under the PSP, Tuesday’s partial release of CNCI signals just the opposite.... Einstein 3 is based on technology developed for a NSA program called Tutelage that detects and halts security breaches. However, its filtering software can read the content of email and other electronic communications...

With giant ISP’s such as Google already partnering-up with the NSA and other secret state agencies... And considering that the Empire has reportedly stood-up a giant data base of dissidents called “Main Core,”... a meta data base that contains personal and financial data on millions of U.S. citizens believed to be threats to national security.
The data, which comes from the NSA, FBI, CIA, and other secret state sources, is collected and stored with neither warrants nor court orders. The name is derived from the fact that it contains “copies of the ‘main core’ or essence of each item of intelligence information on Americans produced by the FBI and the other agencies of the U.S. intelligence community,” according to Salon....The Electronic Privacy Information Center (EPIC) has filed suit against the government in federal court after EPIC’s Freedom of Information Act request to the National Security Agency was rejected by NSA. According to EPIC’s complaint, CNCI has been described as “a multi-agency, multi-year plan that lays out twelve steps to securing the federal government’s cyber networks.” The agency refused to release the documents, stating that they “have been withheld in their entirety” because they are “exempt from release” on grounds of “national security.” Tuesday’s summary provided no additional information on NSPD 54/HSPD 23, nor did the Obama administration release information on the Pentagon’s strategy for waging offensive cyberwarfare.

CYBERCOM: U.S. Strategic Cyber Command Launched with Offensive
by Tom Burghardt / July 3rd, 2009

U.S. Defense Secretary Robert Gates signed a memorandum June 23 announcing the launch of U.S. Cyber Command (CYBERCOM).. a “subordinate unified command” under U.S. Strategic Command (STRATCOM)... “will reach initial operating capability (IOC) not later than October 2009 and full operating capability (FOC) not later than October 2010.”...“cyberspace and its associated technologies … are vital to our nation’s security,” the United States will “secure freedom of action in cyberspace” by standing-up a unified command “that possesses the required technical capability and remains focused on the integration of cyberspace operations.” CYBERCOM “must be capable of synchronizing warfighting effects across the global security environment as well as providing support to civil authorities and international partners.”...

One of ten Unified Combatant Commands, STRATCOM is the successor organization to Strategic Air Command (SAC). Charged with space operations (military satellites), information warfare, missile defense, global command and control, intelligence, surveillance and reconnaissance (ISR), as well as global strike and strategic deterrence (America’s first-strike nuclear arsenal)...designating CYBERCOM a STRATCOM branch all but guarantees an aggressive posture... In addition to a defensive brief to “harden” the “dot-mil” domain, the Pentagon plan calls for an offensive cyberattack capacity... the Pentagon’s Defense Advanced Research Projects Agency (DARPA) is currently building a National Cyber Range (NCR), a test bed for developing, testing and fielding cyber weapons....In conjunction with “private-sector partners” ...the agency averred in a January 2009 press release that NCR promises to deliver “‘leap ahead’ concepts and capabilities.”...

" America needs a network that can project power by building an af.mil robot network (botnet) that can direct such massive amounts of traffic to target computers that they can no longer communicate and become no more useful to our adversaries than hunks of metal and plastic. America needs the ability to carpet bomb in cyberspace to create the deterrent we lack. (Col. Charles W. Williamson III, “Carpet Bombing in Cyberspace,” Armed Forces Journal, May 2008)

A botnet is a collection of widely dispersed computers controlled from one or more central nodes. Often built by cyber criminals to implant malicious programs or code, steal passwords and other encrypted data from targeted systems, botnets are the bane of the Internet.... in March, the Electronic Privacy Information Center (EPIC) urged the Federal Trade Commission “to shut down Google’s so-called cloud computing services, including Gmail and Google Docs, if the web giant can’t ensure the safety of user data stored by these online apps,”...Infected computers are referred to as “zombies” that can be controlled remotely from any point on the planet by “master” machines. Unwary users are often “spoofed” by hackers through counterfeit e-mails replete with embedded hyperlinks into “cooperating” with the installation of malicious code...Col. Williamson proposes to transform the Air Force’s high-speed intrusion-detection systems into an offensive botnet by enabling “the thousands of computers the Air Force would normally discard every year for technology refresh, removing the power-hungry and heat-inducing hard drives, replacing them with low-power flash drives, then installing them in any available space every Air Force base can find.” In other words, creating thousands of zombie machines. “After that,” Col. Williamson avers, “the Air Force could add botnet code to all its desktop computers attached to the Nonsecret Internet Protocol Network (NIPRNet). Once the system reaches a level of maturity, it can add other .mil computers, then .gov machines.”...

A U.S. Air Force planning document [http://www.afcyber.af.mil/shared/media/document/AFD-080303-054.pdf] last year:
Cyberspace favors offensive operations. These operations will deny, degrade, disrupt, destroy, or deceive an adversary. Cyberspace offensive operations ensure friendly freedom of action in cyberspace while denying that same freedom to our adversaries. We will enhance our capabilities to conduct electronic systems attack, electromagnetic systems interdiction and attack, network attack, and infrastructure attack operations. Targets include the adversary’s terrestrial, airborne, and space networks, electronic attack and network attack systems, and the adversary itself. As an adversary becomes more dependent on cyberspace, cyberspace offensive operations have the potential to produce greater effects. (Air Force Cyber Command, “Strategic Vision” ...

Under NSA’s Operational Control:
Wired reports, “NSA will be leading this emerging command.” Indeed, NSA “may also come to dominate the wider government cyber defense effort, as well.” As The Wall Street Journal revealed, the Defense Department’s 2010 budget “envisions training and graduating more than 200 cyber-security officers annually.” In contradistinction to DoD, “the Department of Homeland Security has 100 employees dedicated to civilian cyber security, with plans to reach 260 next year,” the Journal reports. the unprecedented power of CYBERCOM to conduct offensive military and surveillance operations within the United States itself is underlined by the preeminent role NSA will assume....
Last year, congressional Democrats, including Senator now President, Obama, handed the NSA virtually unchecked power to spy on the private communications of Americans. In addition to granting retroactive immunity to telecom grifters who profited from their conspiracy to illegally spy on citizens for the state, the despicable FISA Amendments Act (FIA) gave NSA the legal cover to intercept Americans’ communications “so long as it was done only as the incidental byproduct of investigating individuals ‘reasonably believed’ to be overseas,” as the Times delicately put it. CYBERCOM’s brief, and its deployment inside NSA with full access to the agency’s powerful computing assets, and with a mission to conduct global Intelligence, Surveillance and Reconnaissance (ISR) at the behest of their STRATCOM masters, mean that despite bromides about “privacy concerns,” the Pentagon will most assuredly be interested in developing an attack matrix that can just as easily be turned inward. After all as General Chilton asserts, “it’s up to the president to decide.”...

Secret Pentagon "Roadmap"
National Security Archive Electronic Briefing Book No. 177
For more information contact:
Kristin Adair / Thomas Blanto 202 994 7000Washington, D.C., January 26, 2006 -
A secret Pentagon "roadmap" on war propaganda, personally approved by Secretary of Defense Donald Rumsfeld in October 2003...The document calls on DoD to enhance its capabilities in five key Information Operations (IO) areas: electronic warfare (EW), PSYOP, Operations Security (OPSEC), military deception and computer network operations (CNO).... http://www.gwu.edu/%7Ensarchiv/NSAEBB/NSAEBB177/index.htm

Pentagon launches new propaganda network
" ... intended to allow small media outlets in the United States and elsewhere to bypass what the Pentagon views as an increasingly combative press corps."
Associated Press, 3/2004
The Pentagon Channel broadcasts military news and information for and about the 2.6 million members of the U.S. Armed Forces - Active Duty, National Guard and Reserve. The channel is available on-base to more than 1.3 million service members who live and work on more than 368 military bases, camps and installations in the U.S. The channel is also available to the 800,000 service members and their families serving overseas in 178 countries via the American Forces Radio and Television Service (AFRTS). The channel also reaches more than 16 million households through commercial distribution on satellite and cable systems nationwide. In addition, the channel programming is streamed live 24/7 at http://www.pentagonchannel.mil, is available via Video on Demand, and podcast - both audio and video - from this website.

How the spooks took over the news
In his new book, Nick Davies argues that shadowy intelligence agencies are pumping out 'black propaganda' to manipulate public opinion – and the media swallow it wholesale
11 February 2008
On the morning of 9 February 2004, The New York Times carried an exclusive and alarming story. The paper's Baghdad correspondent, Dexter Filkins, reported that US officials had obtained a 17-page letter, believed to have been written by the notorious terrorist Abu Musab al Zarqawi to the "inner circle" of al-Qa'ida's leadership, urging them to accept that the best way to beat US forces in Iraq was effectively to start a civil war. The letter argued that al-Qa'ida, which is a Sunni network, should attack the Shia population of Iraq: "It is the only way to prolong the duration of the fight between the infidels and us. If we succeed in dragging them into a sectarian war, this will awaken the sleepy Sunnis."...

So, who exactly is producing fiction for the media? Who wrote the Zarqawi letters? Who created the fantasy story about Osama bin Laden using a network of subterranean bases in Afghanistan, complete with offices, dormitories, arms depots, electricity and ventilation systems? Who fed the media with tales of the Taliban leader, Mullah Omar, suffering brain seizures and sitting in stationery cars turning the wheel and making a noise like an engine? Who came up with the idea that Iranian ayatollahs have been encouraging sex with animals and girls of only nine? Some of this comes from freelance political agitators. It was an Iranian opposition group, for example, which was behind the story that President Mahmoud Ahmadinejad was jailing people for texting each other jokes about him. And notoriously it was Iraqi exiles who supplied the global media with a dirty stream of disinformation about Saddam Hussein....
The Pentagon has now designated "information operations" as its fifth "core competency" alongside land, sea, air and special forces. Since October 2006, every brigade, division and corps in the US military has had its own "psyop" element producing output for local media. This military activity is linked to the State Department's campaign of "public diplomacy" which includes funding radio stations and news websites... the US has run into trouble with its propaganda in Iraq, particularly with its use of the Zarqawi story. In May 2006, when yet another of his alleged letters was handed out to reporters in the Combined Press Information Centre in Baghdad, finally it was widely regarded as suspect and ignored by just about every single media outlet....

Pentagon launches foreign news websites
WASHINGTON — The Pentagon is setting up a global network of foreign-language news websites, including an Arabic site for Iraqis, and hiring local journalists to write current events stories and other content that promote U.S. interests and counter insurgent messages.... Content for the news sites is written by local journalists hired to write stories that fit the Pentagon's goals for the sites, such as promoting democracy, security, good government and the rule of law. Military personnel or contractors review the stories to ensure they are consistent with those goals. Reporters are paid only for work that is posted to the sites.
The news sites are part of a Pentagon initiative to expand "Information Operations" on the Internet. Neither the initiative nor the Iraqi site, www.Mawtani.com, has been disclosed publicly....
At first glance, Mawtani.com looks like a conventional news website...The Mawtani site is named for the Iraqi national anthem and means "my homeland." It is available in Arabic, Farsi and Urdu — but not in English — and is supervised by the Pentagon's Iraq command. The U.S. Southern Command is building a similar site for Latin American audiences. The Pacific Command, which covers Asia, is interested in setting up a news site, says Navy Lt. Cmdr. Amy Derrick-Frost, a spokeswoman....

Pentagon sets sights on public opinion
The Pentagon is steadily and dramatically increasing the money it spends to win what it calls "the human terrain" of world public opinion...over the past five years, the money the military spends on winning hearts and minds at home and abroad has grown by 63 percent, to at least $4.7 billion this year, according to Department of Defense budgets and other documents. That's almost as much as it spent on body armor for troops in Iraq and Afghanistan between 2004 and 2006. This year, the Pentagon will employ 27,000 people just for recruitment, advertising and public relations — almost as many as the total 30,000-person work force in the State Department. The biggest chunk of funds — about $1.6 billion — goes into recruitment and advertising. Another $547 million goes into public affairs, which reaches American audiences. And about $489 million more goes into what is known as psychological operations.... Recruitment and advertising are the only two areas where Congress has authorized the military to influence the American public. Far more controversial is public affairs, because of the prohibition on propaganda to the American public.

"It is not a matter of what is true that counts, but a matter of what is perceived to be true."
Henry Kissinger

"The internet needs to be dealt with as if it were an enemy 'weapons system'..."
Information Operation Roadmap Part 3: "We Must Fight the Net"

The Washington Post on “Lunatic” 9/11 “Conspiracy Theorists”
by Jeremy R. Hammond / March 9th, 2010
...the facts should matter. The editors of the Washington Post might begin by acknowledging a few more non-controversial facts, including the fact that suspicious trading did occur prior to 9/11, the fact that the identities of at least some of the hijackers has been cast in doubt and that this has never been clarified to the public, and the fact that the collapses of the three WTC buildings has never been adequately investigated. Surely, that proper credible investigations into the events of 9/11 should occur — indeed, should have occurred long ago the facts should matter. The editors of the Washington Post might perhaps begin by acknowledging just a few of the more non-controversial facts, including the fact that suspicious trading did occur prior to 9/11, the fact that the identities of at least some of the hijackers has been cast in doubt and that this has never been clarified to the public, and the fact that the collapses of the three WTC buildings has never been adequately investigated. Surely, that proper credible investigations into the events of 9/11 should occur — indeed, should have occurred long ago — should also be non-controversial...whether it belongs to “the lunatic fringe” or to the U.S. government..

Internet aids terrorist recruiting, radicalization, Pentagon says
Washington – Militant groups can radicalize individuals and train them to carry out terrorist acts much more quickly today, in part thanks to the Internet, according to military and counter terrorism experts testifying on Capitol Hill Wednesday....
The Senate subcommittee on Emerging Threats and Capabilities held a hearing Wednesday as US officials were sorting out the case of Ms. LaRose. The anonymity of the Internet, current regulations governing its surveillance and the sheer speed of communications across it make it an easy tool for recruitment.
So-called lone wolves, or individuals who practice “leaderless jihad” – radicalized individuals working alone – are even harder to find. Suspected Fort Hood shooter Major Malik Hasan used e-mail to contact a radical cleric in Yemen, for example, even though government officials were aware of the exchanges. American officials have still not characterized the shootings at Fort Hood, in which 13 people were killed, as an act of terrorism.
American counterterrorism officials have learned how to go after terrorist networks and “sub-networks,” but the individuals and smaller groups are much harder to pinpoint."The smaller the group, the more empowered the individuals, the more difficult challenge it is for us to counter extremist ideology, One of the keys is to address radicalization before it becomes a problem.
That means the US must engage in many ways and at all levels to get at the root causes of radicalization. Lt. Gen. Frank Kearney III, deputy commander of US Special Operations Command, Tampa, Fla., said violence stems from the crossroads of migration, extremism and crime. Conducting training that builds the capacity of other nations to weed out their own radicalized elements is key. And the State Department is proposing to spend more money to counter violent extremism. “If we can stop them upstream when they are becoming radicalized, than obviously we have an easier job of it than when they are downstream and theyare getting into all kinds of dangerous activities,” said Benjamin.

1-27-06 US Plans to 'Fight the Net' Revealed
by Adam Brookes
Pentagon's 2003 "Information Operations Roadmap", newly declassified, gives a glimpse into the US military's plans for "information operations"
WASHINGTON - A newly declassified document gives a fascinating glimpse into the US military's plans for "information operations" - from psychological operations, to attacks on hostile computer networks. Bloggers beware. As the world turns networked, the Pentagon is calculating the military opportunities that computer networks, wireless technologies and the modern media offer. From influencing public opinion through new media to designing "computer network attack" weapons, the US military is learning to fight an electronic war. The declassified document is called "Information Operations Roadmap". It was obtained by the National Security Archive at George Washington University using the Freedom of Information Act. Officials in the Pentagon wrote it in 2003.
The "roadmap" calls for a far-reaching overhaul of the military's ability to conduct information operations and electronic warfare. And, in some detail, it makes recommendations for how the US armed forces should think about this new, virtual warfare. The document says that information is "critical to military success". Computer and telecommunications networks are of vital operational importance.

The operations described in the document include a surprising range of military activities: public affairs officers who brief journalists, psychological operations troops who try to manipulate the thoughts and beliefs of an enemy, computer network attack specialists who seek to destroy enemy networks. All these are engaged in information operations.

Perhaps the most startling aspect of the roadmap is its acknowledgement that information put out as part of the military's psychological operations, or Psyops, is finding its way onto the computer and television screens of ordinary Americans. "Information intended for foreign audiences, including public diplomacy and Psyops, is increasingly consumed by our domestic audience,",,,

It reveals that Psyops personnel "support" the American government's international broadcasting. It singles out TV Marti - a station which broadcasts to Cuba - as receiving such support. It recommends that a global website be established that supports America's strategic objectives. But no American diplomats here, thank you. The website would use content from "third parties with greater credibility to foreign audiences than US officials". It also recommends that Psyops personnel should consider a range of technologies to disseminate propaganda in enemy territory: unmanned aerial vehicles, "miniaturized, scatterable public address systems", wireless devices, cellular phones and the internet.
'Fight the net'. When it describes plans for electronic warfare, or EW, the document takes on an extraordinary tone [... ]

FTC plans to monitor blogs
New guidelines, expected to be approved late this summer with possible modifications, would clarify that the agency can go after bloggers — as well as the companies that compensate them — for any false claims or failure to disclose conflicts of interest. It would be the first time the FTC tries to patrol systematically what bloggers say and do online.
Any type of blog could be scrutinized, not just ones that specialize in reviews. Proposed guidelines: http://www.ftc.gov/os/2008/11/P034520endorsementguides.pdf

9/21/09 Obama: We Need To Bail Out Newspapers Or Blogs Will Run The World
Obama said he will look at a news paper bailout, otherwise, blogs will take over the world, and that would be a threat to democracy bills that could give tax newspapers tax-breaks if they were to restructure as 50 (c) (3) educational corporations. One of the bills is that of Senator Ben Cardin, who has introduced the "Newspaper Revitalization Act

“Unless a way of intervening in the radicalization process can be found, we are condemned to stepping on cockroaches one at a time.” Social Repression and Internet Surveillance
H. Res. 1695, 1955 & S.1959
By Nikki Alexander
...Jane Harman (D-CA) sponsored H.Res.1955 her partner, Dave Reichert (R-WA),authored the original bill...
H.Res.1695....establishes a National Commission and Center of so-called “Excellence” to censor and crush social concerns... perceived to be “threats” by RAND...“homegrown terrorism,” “violent radicalization” and “ideologically based violence”...who have been “violently radicalized” by “extremist belief systems.”...“The Internet has aided in facilitating violent radicalization, ideologically based violence, and the homegrown terrorism process in the United States by providing access to broad and constant streams of terrorist-related propaganda to United States citizens.”... RAND spokesman, Brian Jenkins... said to Jane Harman’s Committee: “Unless a way of intervening in the radicalization process can be found, we are condemned to stepping on cockroaches one at a time.” ...the precise terminology used by Nazis to justify exterminating Jews. http://www.informationclearinghouse.info/article18998.htm

[how govt. transparency works:
"Don't ask about the status of this bill or when it will be voted on (other ... March 11, 2010 "

Police Take Fight Onto the Web
FIRST, MySpace. Now, Mugshotbook? police departments and other law enforcement agencies are jumping on the social networking bandwagon...to break down bureaucratic boundaries between departments and jurisdictions and further the fight against crime. A few companies in the field are developing promising businesses, and supporters have given the trend a slightly cringe-inducing name: Law Enforcement 2.0... Web services are being developed specifically to allow public and private investigative agencies to share information, and these tools are increasingly popular within law enforcement. One service, called CrimeDex, is billed by its creators as a “Facebook for law enforcement.” ...CrimeReports.com, based in Salt Lake City.. allows police agencies around the country to record instances of crime on a single nationwide map powered by Google. CITIZENS can visit the site and see a map of crimes in their neighborhood, peer across city lines to see crimes elsewhere, and sign up to receive regular e-mail alerts of all recorded criminal activity in their area. Around 450 police agencies pay up to $199 a month to use the service, including departments in cities like San Francisco, Los Angeles, Cleveland and all of Utah and Maryland, according to the site. Next month, CrimeReports plans to add a neighborhood watch feature, so citizens can form groups on the service and send alerts and tips to participating police agencies. That might sound to some like a dangerous call for public vigilantism and an invitation for a million Dirty Harrys to inundate the police with unsubstantiated reports.... law enforcement officials say they welcome the help.

A Fresh Start for the Internet
Stanford University researchers aren't just dreaming of a new Internet: they're building it.
By Rachel Ross, March 19, 2007
Researchers at Stanford University are on a mission to completely revamp the Internet. Plans for their multipart program, called the Clean Slate Design for the Internet,..Simply put, the Internet has no inherent security architecture -- nothing to stop viruses or spam or anything else. Protections like firewalls and antispam software are add-ons, security patches in a digital arms race....
And we haven't even seen a real act of cyberterror, the "digital Pearl Harbor" memorably predicted by former White House counterterrorism czar Richard Clarke in 2000 (see "A Tangle of Wires"). Consider the nation's electrical grid: it relies on continuous network-based communications between power plants and grid managers to maintain a balance between production and demand. A well-placed attack could trigger a costly blackout that would cripple part of the country.
The conclusion of the advisory council's report could not have been starker: "The IT infrastructure is highly vulnerable to premeditated attacks with potentially catastrophic effects."

Federally Funded Plans To Scrap The Internet
Seeking further funding from Congress for "clean slate" projects
by Steve Watson

Microsoft Palladium: Next Generation Secure Computing Base
Doc's Cover Palladium Privacy, Unique Identifier Issues. EPIC has documents
from the National Institute of Standards and Technology under the Freedom of
Information Act describing Microsoft Palladium. The documents (pdf 980k)
describe Palladium's applications for Digital Rights Management and note
that the technology embeds "unique machine identifiers," thus raising risks that
user behavior may be subject to traffic analysis. Issues raised by Palladium,
which is now known as the Next Generation Secure Computing Base, are similar
to privacy problems with the controversial Intel Pentium Serial Number.

NSA took part in development of Windows 7
25 Nov 2009
The National Security Agency (NSA) acknowledged having worked with Microsoft on the development of Windows 7, as testified on 17 November 2009 by Richard Schaeffer, the NSA’s information assurance director, before the U.S. Senate’s Subcommittee on Terrorism and Homeland Security. The cooperation between the NSA and Microsoft has been an open secret since a judiciary agreement was reached between the U.S. Government and the computer giant. It is however the first time that official mention of this has been made. In terms of cyber security, over and above the issue of protection from external intrusions, the crux of the matter lies in who is the doorkeeper. In other words, while it is NSA’s prerogative to have sole security access control over the most-widely used software equipment inside the United States, the fact remains that Windows 7 is marketed globally. Undoubtedly, this opens up considerable opportunities for U.S. cyber espionage beyond its borders....

U.S. Institute of Peace Study by Israeli Professor: Terrorist Groups Active on the Internet
There are hundreds of sites on the Internet serving terrorist groups and their supporters, according to a study done by the * US Institute of Peace (USIP). The study undertaken by Gabriel Weimann, a professor at the Haifa University in Israel and currently a senior fellow at USIP, writes that today all active terrorist groups have established their presence on the Internet…

Israeli high-tech companies work for U.S.
U.S. law enforcement wiretaps authorized by the Communications Assistance for Law Enforcement Act (CALEA)
[Isreali]Amdocs provides billing and directory assistance for most American phone companies, Comverse Infosys handles telephone tapping equipment for US law enforcement, Odigo runs "Instant Message" systems on computers. All three are closely tied to the Mossad and the Israeli Defense Force, which is massively funded by u.s. Most firewalls on US corporate and government computer systems are provided by Israeli Checkpoint Systems. Odigo's offices near the World Trade Towers allegedly received two hour advance warning of the 911attacks... http://archive.newsmax.com/archives/articles/2001/12/18/224826.shtml

"From the depth of our heart -- thanks to The Israeli Defense Forces"
Microsoft logo under the text with the Israeli national flag in the background.

Microsoft CEO: Our company almost as Israeli as American
By Maayan Cohen, TheMarker Correspondent, and Reuters
Microsoft's Chief Executive Steve Ballmer, on a visit to Israel... at the inauguration ceremony of the American software giant's new research and development center in Herzliya...said Microsoft is an Israeli company almost as much as it is American...that the proportion of Microsoft employees per capita in Israel is almost similar to that in the United States...he knows very few places around the world that offer such a variety of startup opportunities, and that his company intends to purchase more Israeli startup companies... the CEO said Microsoft is not looking to buy all of Yahoo! but is currently engaging in negotiations about other types of deals with the U.S. No. 2 search engine.
Related:# Microsoft Israel creating new R&D center in Herzliya # Yahoo! President Susan Decker takes interest in Israel # Internet giant Yahoo! to follow rivals Google, Microsoft to Israel

Emerging Threats Analysis: U.S. military to patrol Internet

The Open Source Center is a component of the Office of the Director of National Intelligence administered by the CIA.
Naquin addressed the Central Intelligence Retirees' Association October 3, 2007. The text of his remarks is at http://www.fas.org/irp/eprint/naquin.pdf
The DNI Open Source Center, which gathers, translates, analyzes, and distributes unclassified open source intelligence from around the world, is steadily growing in capability and impact, according to Doug Naquin, the Center's Director. The Open Source Center, which replaced the CIA's Foreign Broadcast Information Service, is doing more analysis and outreach than it predecessor and is also exploring new media, said Mr. Naquin in a recent speech. "We're looking now at YouTube, which carries some unique and honest-to-goodness intelligence," he said. "We have groups looking at what they call 'Citizens Media': people taking pictures with their cell phones and posting them on the Internet. Then there's Social Media, phenomena like MySpace and blogs.... A couple years back we identified Iranian blogs as a phenomenon worthy of more attention, about six months ahead of anybody else."...

Does The Government Manipulate Social Media?
The U.S. government long ago announced its intention to "fight the net". As revealed by an official Pentagon report called "Information Operations Roadmap" (ed: see above) ... "Strategy should be based on the premise that the Department [of Defense] will 'fight the net' as it would an enemy weapons system".
CENTCOM announced in 2008 a team of employees would be "[engaging] bloggers who are posting inaccurate or untrue information, as well as bloggers who are posting incomplete information." The Air Force is now also engaging bloggers....
Finally, under the post-9/11 "homeland security" laws, the government routinely demands full access to ISPs and websites... Do you doubt the military and homeland security apparatus would step in to take control of what it considered an "enemy" message...the government considers any message questioning anything the government does as an enemy message. See this, this, this and this...

U.S. government taps Facebook, Google, MTV to "Fight Terrorism"
Global Research, November 28, 2009
The US State Department announced plans on Monday to promote online youth groups as a new and powerful way to fight crime, political oppression and terrorism. Drawing inspiration from a movement against FARC rebels in Colombia, the State Department is joining forces with Facebook, Google, MTV, Howcast and others in New York City next week to get the "ball rolling." It said 17 groups from South Africa, Britain and the Middle East which have an online presence like the "Million Voices Against the FARC" will attend a conference at Columbia University Law School from December 3-5. Observers from seven organizations that do not have an online presence -- such as groups from Iraq and Afghanistan -- will attend. There will also be remote participants from Cuba. They will forge an "Alliance of Youth Movement," said James Glassman, under secretary of state for public diplomacy....

DARPA, Microsoft, Lockheed team up to reinvent TCP/IP
Arms globocorp Lockheed Martin announced today that it has won a $31m contract from the famous Pentagon crazy-ideas bureau, DARPA, to reinvent the internet and make it more suitable for military use. Microsoft will also be involved in the effort. The main thrust of the effort will be to develop a new Military Network Protocol, which will differ from old hat such as TCP/IP in that it will offer "improved security, dynamic bandwidth allocation, and policy-based prioritization levels at the individual and unit level". "New network threats and attacks require revolutionary protection concepts," said Lockheed cyber-arsenal chieftain John Mengucci. "Through this project, as well as our cyber Mission Maker initiatives, we are working to enhance cyber security and ensure that warfighters* can fight on despite cyber attacks."
Lockheed will be partnered with Anagran, Juniper Networks, LGS Innovations, Stanford University and - of course - Microsoft in developing the MNP. Apart from that, Lockheed's own Information Systems & Global Services-Defense tentacle will work on amazing new hardware. According to the firm:
Lockheed Martin's team will develop router technologies that include strong authentication and self configuration capabilities to improve security, reduce the need for trained network personnel and lower overall life cycle costs for network management. The original Arpanet, which turned into the TCP/IP internet was developed for DARPA's predecessor...

Twitter becomes mutual friend of Google, Microsoft

Microsoft and the National Security Agency
April 6, 2007
In January the Washington Post reported that Microsoft had announced that its new operating system, Vista, was being brought to us with the assistance of the National Security Agency... In September 1999, leading European investigative reporter Duncan Campbell revealed that NSA had arranged with Microsoft to insert special "keys" into Windows operating systems, beginning with Windows 95. [ http://www.techweb.com/wire/29110640 ]..
In February 2000, it was disclosed that the Strategic Affairs Delegation (DAS), the intelligence arm of the French Defense Ministry, had prepared a report in 1999 which also asserted that NSA had helped to install secret programs in Microsoft software....

Microsoft Palladium: Next Generation Secure Computing Base
Palladium Privacy, Unique Identifier Issues. EPIC has documents from the National Institute of Standards and Technology under the Freedom of Information Act describing Microsoft Palladium. The documents (pdf 980k) describe Palladium's applications for Digital Rights Management and note that the technology embeds "unique machine identifiers," thus raising risks that user behavior may be subject to traffic analysis. Issues raised by Palladium, which is now known as the Next Generation Secure Computing Base, are similar to privacy problems with the controversial Intel Pentium Serial Number.

The Dangers of Digital Imprimatur
by John Walker
September 13th, 2003 Revision 4 — November 4th, 2003

Global Internet,
Once a spring of liberty,
Autumn chill so near.

November 4th, 2003