9/27 "A clandestine cyber war is being fought against Iran by US with cyber war units established by Israel", part 1

"USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries."
Pentagon's Cybercom, part of U.S. Strategic Command, launched June 23, 2009, by Defense Secretary Robert Gates. Lt. Gen. Keith Alexander appointed by Senate to head Cybercom, is also director of the National Security Agency (NSA). U.S. CYBERCOM based in Fort Meade, MD. comprises units of U.S. military, including Army, Navy, Air Force and Marines.

"This follows debkafile's exclusive report Sept. 23, from its Washington and defense sources, that a clandestine cyber war is being fought against Iran by the United States with elite cyber war units established by Israel"
Tehran confirms its industrial computers under Stuxnet virus attack
DEBKAfile Exclusive Report September 25, 201
Mahmoud Alyaee, secretary-general of Iran's industrial computer servers, including its nuclear facilities control systems, confirmed Saturday, Sept. 25, that 30,000 computers belonging to classified industrial units had been infected and disabled bythemalicious Stuxnet virus. This followed debkafile's exclusive report Thursday, Sept. 23, from its Washington and defense sources that a clandestine cyber war is being fought against Iran by the United States with elite cyber war units established by Israel. Stuxnet is believed to be the most destructive virus ever devised for attacking major industrial complexes, reactors and infrastructure. The experts say it is beyond the capabilities of private or individual hackers and could have been produced by a high-tech state like America or Israel, or its military cyber specialists.
The Iranian official said Stuxnet had been designed to strike the industrial control systems in Iran manufactured by the German Siemens and transfer classified data abroad.
The head of the Pentagon's cyber war department, Vice Adm. Bernard McCullough said Thursday, Sept. 22, that Stuxnet had capabilities never seen before. In a briefing to the Armed Forces Committee of US Congress, he testified that it was regarded as the most advanced and sophisticated piece of Malware to date. According to Alyaee, the virus began attacking Iranian industrial systems two months ago. He had no doubt that Iran was the victim of a cyber attack which its anti-terror computer experts had so far failed to fight. Stuxnet is powerful enough to change an entire environment, he said without elaborating. Not only has it taken control of automatic industrial systems, but has raided them for classified information and transferred the date abroad. This was the first time an Iranian official has explained how the United States and Israel intelligence agencies have been able to keep pace step by step of progress made in Iran's nuclear program. Until now, Tehran attributed the leaks to Western spies using Iranian double agents.

Last Thursday, debkafile first reported from its Washington sources that US president Barack Obama had resolved to deal with the nuclear impasse with Iran by going after the Islamic republic on two tracks: UN and unilateral sanctions for biting deep into the financial resources Iran has earmarked for its nuclear program, and a secret cyber war with Israel to cripple its nuclear facilities. In New York, the US offer to go back to the negotiating table was made against this background.

Leaks by American security sources to US media referred to the recruitment by Israel military and security agencies of cyber raiders with the technical knowhow and mental toughness for operating in difficult and hazardous circumstances, such as assignments for stealing or destroying enemy technology, according to one report. debkafile's sources disclose that Israel has had special elite units carrying out such assignments for some time. Three years ago, for instance, cyber raiders played a role in the destruction of the plutonium reactor North Korea was building at A-Zur in northern Syria.
Some computer security specialists reported speculated that the virus was devised specifically to target part of the Iranian nuclear infrastructure, either the Bushehr nuclear plant activated last month - which has not been confirmed - or the centrifuge facility in Natanz.
debkafile's sources add: Since August, American and UN nuclear watchdog sources have been reporting a slowdown in Iran's enrichment processing due to technical problems which have knocked out a large number of centrifuges and which its nuclear technicians have been unable to repair. It is estimated that at Natanz alone, 3,000 centrifuges have been idled.

"an electronic war has been launched against Iran"
"U.S. Department of Homeland Security running the worm on test systems to monitor its patterns since July"
Iran: Bushehr Nuclear Plant Not Harmed by Computer Worm

Iran's nuclear agency battles virus that can bring down power plants
Sophistication of computer virus suggests a Western government may have been involved in creating it, analysts say.
Haaretz.com 26.09.10
..."Stuxnet is a working and fearsome prototype of a cyber-weapon that will lead to the creation of a new arms race in the world," it said in a statement about the virus, which attacks Siemens AG's widely used industrial control systems.The companies' remarks are the latest in a series of specialist commentary stirring speculation that Iran's first nuclear power station, at Bushehr, may have been targeted in a state-backed attempt at sabotage or espionage. "It's pretty clear based on the infection behavior that installations in Iran are being targeted," Hogan said of the virus. At a cyber watch center run by the U.S. Department of Homeland Security, a U.S. government official declined to be drawn out on reports that Bushehr was the main target. "It's very hard to understand what the code was developed for," Sean McGurk, who runs the National Cybersecurity and Communications Integration Center, told reporters.

Iran Fights Malware Attacking Computers
By DAVID E. SANGER, http://www.nytimes.com/2010/09/26/world/middleeast/26iran.html?_r=1&th&e...
WASHINGTON — The Iranian government agency that runs the country’s nuclear facilities, including those the West suspects are part of a weapons program, has reported that its engineers are trying to protect their facilities from a sophisticated computer worm that has infected industrial plants across Iran. The agency, the Atomic Energy Organization, did not specify whether the worm had already infected any of its nuclear facilities, including Natanz, the underground enrichment site that for several years has been a main target of American and Israeli covert programs.
But the announcement raised suspicions, and new questions, about the origins and target of the worm, Stuxnet... While it is not clear that Iran was the main target — the infection has also been reported in Indonesia, Pakistan, India and elsewhere — a disproportionate number of computers in Iran appear to have been struck, according to reports by computer security monitors.
Given the sophistication of the worm and its aim at specific industrial systems, many experts believe it is most probably the work of a state, rather than independent hackers. The worm is able to attack computers that are disconnected from the Internet, usually to protect them; in those cases an infected USB drive is plugged into a computer. The worm can then spread itself within a computer network, and possibly to other networks....
It is extraordinarily difficult to trace the source of any sophisticated computer worm, and nearly impossible to determine for certain its target. But the Iranians have reason to suspect they are high on the target list: in the past, they have found evidence of sabotage of imported equipment, notably power supplies to run the centrifuges that are used to enrich uranium at Natanz. The New York Times reported in 2009 that President George W. Bush had authorized new efforts, including some that were experimental, to undermine electrical systems, computer systems and other networks that serve Iran’s nuclear program, according to current and former American officials. The program is among the most secret in the United States government, and has been accelerated since President Obama took office, according to some American officials. Iran’s enrichment program has run into considerable technical difficulties in the past year, but it is not clear whether that is because of the effects of sanctions against the country, poor design for its centrifuges, which it obtained from Pakistan, or sabotage. “It is easy to look at what we know about Stuxnet and jump to the conclusion that it is of American origin and Iran is the target, but there is no proof of that,” said James Lewis, a senior fellow at the Center for Strategic and International Studies in Washington and one of the country’s leading experts on cyberwar intelligence. “We may not know the real answer for some time.” Based on what he knows of Stuxnet, Mr. Lewis said, the United States is “one of four or five places that could have done it — the Israelis, the British and the Americans are the prime suspects, then the French and Germans, and you can’t rule out the Russians and the Chinese.”
President Obama has talked extensively about developing better cyberdefenses for the United States, to protect banks, power plants, telecommunications systems and other critical infrastructure. He has said almost nothing about the other side of the cyber effort, billions of dollars spent on offensive capability, much of it based inside the National Security Agency...

"Stuxnet is essentially a precision, military-grade cyber missile deployed early last year to seek out and destroy one real-world target of high importance..."Stuxnet is a 100-percent-directed cyber attack aimed at destroying an industrial process in the physical world...This is not about espionage, as some have said. This is a 100 percent sabotage attack."
Stuxnet malware is 'weapon' out to destroy ... Iran's Bushehr nuclear plant?
www.csmonitor.com/ USA/ 2010/ 0921/ Stuxnet-malware-is-weapon-out-to-destroy-Iran-s-Bushehr-nuclear-plant
The Stuxnet malware has infiltrated industrial computer systems worldwide. Now, cyber security sleuths say it's a search-and-destroy weapon meant to hit a single target. At least one expert suggests it may be after Iran's Bushehr nuclear power plant. Cyber security experts say they have identified the world's first known cyber super weapon designed specifically to destroy a real-world target – a factory, a refinery, or just maybe a nuclear power plant. The cyber worm, called Stuxnet, has been the object of intense study since its detection in June. As more has become known about it, alarm about its capabilities and purpose have grown. Some top cyber security experts now say Stuxnet's arrival heralds something blindingly new: a cyber weapon created to cross from the digital realm to the physical world – to destroy something.
At least one expert who has extensively studied the malicious software, or malware, suggests Stuxnet may have already attacked its target – and that it may have been Iran's Bushehr nuclear power plant, which much of the world condemns as a nuclear weapons threat.
The appearance of Stuxnet created a ripple of amazement among computer security experts. Too large, too encrypted, too complex to be immediately understood, it employed amazing new tricks, like taking control of a computer system without the user taking any action or clicking any button other than inserting an infected memory stick. Experts say it took a massive expenditure of time, money, and software engineering talent to identify and exploit such vulnerabilities in industrial control software systems....

But it gets worse. Since reverse engineering chunks of Stuxnet's massive code, senior US cyber security experts confirm what Mr. Langner, the German researcher, told the Monitor: Stuxnet is essentially a precision, military-grade cyber missile deployed early last year to seek out and destroy one real-world target of high importance – a target still unknown."Stuxnet is a 100-percent-directed cyber attack aimed at destroying an industrial process in the physical world," says Langner, who last week became the first to publicly detail Stuxnet's destructive purpose and its authors' malicious intent. "This is not about espionage, as some have said. This is a 100 percent sabotage attack."
A guided cyber missile: On his website, Langner lays out the Stuxnet code he has dissected. He shows step by step how Stuxnet operates as a guided cyber missile. Three top US industrial control system security experts, each of whom has also independently reverse-engineered portions of Stuxnet, confirmed his findings to the Monitor...

"What we're seeing with Stuxnet is the first view of something new that doesn't need outside guidance by a human – but can still take control of your infrastructure," says Michael Assante, former chief of industrial control systems cyber security research at the US Department of Energy's Idaho National Laboratory. "This is the first direct example of weaponized software, highly customized and designed to find a particular target." "I'd agree with the classification of this as a weapon," Jonathan Pollet, CEO of Red Tiger Security and an industrial control system security expert, says in an e-mail.
Langner's research, outlined on his website Monday, reveals a key step in the Stuxnet attack that other researchers agree illustrates its destructive purpose. That step, which Langner calls "fingerprinting," qualifies Stuxnet as a targeted weapon, he says.Langner zeroes in on Stuxnet's ability to "fingerprint" the computer system it infiltrates to determine whether it is the precise machine the attack-ware is looking to destroy. If not, it leaves the industrial computer alone. It is this digital fingerprinting of the control systems that shows Stuxnet to be not spyware, but rather attackware meant to destroy, Langner says.Stuxnet's ability to autonomously and without human assistance discriminate among industrial computer systems is telling. It means, says Langner, that it is looking for one specific place and time to attack one specific factory or power plant in the entire world."Stuxnet is the key for a very specific lock – in fact, there is only one lock in the world that it will open," Langner says in an interview. "The whole attack is not at all about stealing data but about manipulation of a specific industrial process at a specific moment in time. This is not generic. It is about destroying that process."
So far, Stuxnet has infected at least 45,000 computers worldwide, Microsoft reported last month. Only a few are industrial control systems. Siemens this month reported 14 affected control systems, mostly in processing plants and none in critical infrastructure. Some victims in North America have experienced some serious computer problems, Eric Byres, an expert in Canada, told the Monitor. Most of the victim computers, however, are in Iran, Pakistan, India, and Indonesia....

Langner's analysis also shows, step by step, what happens after Stuxnet finds its target. Once Stuxnet identifies the critical function running on a programmable logic controller, or PLC, made by Siemens, the giant industrial controls company, the malware takes control. One of the last codes Stuxnet sends is an enigmatic “DEADF007.” Then the fireworks begin, although the precise function being overridden is not known, Langner says. It may be that the maximum safety setting for RPMs on a turbine is overridden, or that lubrication is shut off, or some other vital function shut down. Whatever it is, Stuxnet overrides it, Langner’s analysis shows."After the original code [on the PLC] is no longer executed, we can expect that something will blow up soon," Langner writes in his analysis. "Something big."...
A geographical distribution of computers hit by Stuxnet, which Microsoft produced in July, found Iran to be the apparent epicenter of the Stuxnet infections. That suggests that any enemy of Iran with advanced cyber war capability might be involved, Langner says. The US is acknowledged to have that ability, and Israel is also reported to have a formidable offensive cyber-war-fighting capability....

Computer Worm May Be Targeting Iranian Nuclear Sites
Bloomberg, By Arik Hesseldahl - Sep 24, 2010
www.bloomberg.com/ news/ 2010-09-24/ stuxnet-computer-worm-may-be-aimed-at-iran-nuclear-sites-researcher-s ays.html

"Hides in Windows"
The worm initially infects computers running several editions of Microsoft Corp.’s Windows, including older versions such as Windows 2000, and recent ones such as Windows 7, using one of four vulnerabilities known only to the worm’s creators, said Liam O Murchu, manager of North American security-response operations for Mountain View, California-based Symantec.
“It hides in Windows and then tries to spread itself to other computers running Windows,” O Murchu said. An infected computer shows no ill effects and the worm ensures that no software crashes, which is unusual, he said.
Specific System: As it spreads, the worm searches for connections to a device known as a programmable logic controller, which helps link Windows computers and computerized industrial-control systems, converting commands sent from the Windows machine into a format the industrial machines can understand. The worm targets industrial software made by Munich-based Siemens AG, researchers said. Once an industrial machine is infected, the worm lies dormant until certain conditions in the machine are met, O Murchu said. For example, when the temperature of a certain component gets hot, the worm might prevent a cooling system from functioning. What conditions the worm waits for are unclear, he said. ‘It was designed to go after a specific system set up in a very specific way...What we don’t yet know is where such a system exists in the real world.” O Murchu said...
A computer worm that has infected industrial computers around the world may be part of a campaign targeting nuclear installations in Iran, computer-security researchers said.
The highest concentration of affected systems -- almost 60 percent -- is in that country, according to data from Symantec Corp., the computer-security software maker. The worm’s sophisticated programming and ability to hide itself suggest it may have been built by a government-sponsored organization in a country such as the U.S. or Israel, said Frank Rieger, technology chief at GSMK, a maker of encrypted mobile phones.He estimated that building the worm cost at least $3 million and required a team of as many as 10 skilled programmers working about six months.“All the details so far to me scream that this was created by a nation-state,” Rieger said in a telephone interview. Iran’s nuclear facilities may have been targets, said Rieger and Richard Falkenrath, principal at the Chertoff Group, a Washington-based security advisory firm.
Iran, which has the world’s second-largest oil reserves, is under United Nations sanctions because it has refused to curtail uranium enrichment and the development of ballistic missiles that might carry a weapon. The country started a 1,000-megawatt nuclear-power reactor near the city of Bushehr in August.
It is theoretically possible that the U.S. government did this,” Falkenrath said during an interview today with Bloomberg Television. “But in my judgment, that’s a very remote possibility. It’s more likely that Israel did it.” A message left at the Israeli embassy’s press office wasn’t immediately returned. The U.S. Department of Homeland Security, which is studying the worm, hasn’t identified its origins, a spokeswoman said....
The U.S. Department of Homeland Security has been running the worm on test systems to monitor its patterns since July, said Amy Kudwa, a department spokeswoman....
There is historical precedent for cyber attacks by nation- states, according to a 2004 book by a former U.S. Air Force secretary. Spies working for the U.S. Central Intelligence Agency inserted malicious software into computer-control systems for a Soviet natural-gas pipeline in Siberia, Thomas C. Reed wrote in “At The Abyss: An Insider’s History Of The Cold War.”
Ultimately the effort caused a massive explosion, said Reed, Air Force Secretary in the 1970s and later advisor to President Ronald Reagan on national security policy.

For background on US & partners' 'war on the net' as part of its overall information warfare strategy

US appoints first cyber warfare general
Peter Beaumont, foreign affairs editor, The Observer, 23 May 2010
The US military appointed its first senior general to direct cyber warfare – despite fears the move marks another stage in the militarisation of cyberspace. The newly promoted four-star general, Keith Alexander, takes charge of the Pentagon's ambitious and controversial new Cyber Command, designed to conduct virtual combat across the world's computer networks. He was appointed on Friday afternoon in a low-key ceremony at Fort Meade, in Maryland.The creation of America's most senior cyber warrior comes just days after the US air force disclosed that some 30,000 of its troops had been re-assigned from technical support "to the frontlines of cyber warfare"...James Miller, deputy under-secretary of defence for policy, hinted that the US might consider a conventional military response to certain kinds of online attack....
Plans for Cyber Command were originally conceived under President George W Bush. Since taking office Barack Obama has embraced the theme of cyber security, describing it last year as "one of the most serious economic and national security challenges [the US faces] as a nation"....While Alexander has tried to play down the offensive aspects of his command, the Pentagon has been more explicit, stating that Cyber Command will "direct the operations and defence of specified Department of Defense information networks [involving some 90,000 military personnel] and prepare to, when directed, conduct full-spectrum military cyberspace operations in order to enable actions in all domains, [to] ensure US allied freedom of action in cyberspace and deny the same to our adversaries."

U.S. military cyberwar...
by Declan McCullagh, 7/29/10 http://news.cnet.com/8301-31921_3-20012121-281.html?tag=mncol;posts
...DoD created the U.S. Cyber Command [CYBERCOM] last spring allowing the U.S. armed forces to conduct "full-spectrum military cyberspace operations in order to enable actions in all domains," which includes destroying electronic infrastructure as thoroughly as a B-2 bomber would level a power plant. US current cyberwar policy remains vague. Earlier this year, a congressional committee asked Lt. Gen. Keith Alexander, now head of NSA and Cyber Command, whether the use of offensive force would be "pre-authorized" below the level of the president, and whether there should be "classes" of networks operated by allies that should be off-limits to infusion. In his written response (PDF), Alexander refused to answer any of those questions publicly, saying the information was classified. ...Last year Rod Beckström, director of Homeland Security's National Cybersecurity Center quit saying NSA's takeover of Cyber Security threatens 'our democratic process'...Michael Hayden, former head of the CIA and NSA challenged attendees of Black Hat - thousands of programmers, analysts, and security researchers -to devise ways to reshape the Internet's security architecture [e.g. Microsoft-led 'secure trusted internet 2 architecture', in the works nearly a decade, requiring identification, authorization and probably payment to use]

President Obama's Cyberspace Policy Review called for development of a National Strategy for Trusted Identities in Cyberspace

The Department of Defense last week increased its efforts to require that Department contacts with the media be monitored and approved by DoD public affairs officials.
The latest Pentagon move follows up on a July 2 memo from Secretary of Defense Robert M. Gates, who stated that the DoD Office of Public Affairs "is the sole release authority for official DoD information to news media in Washington, and ... all media activities must be coordinated through appropriate public affairs channels. This policy is all too often ignored,"
"We have far too many people talking to the media outside of channels, sometimes providing information which is simply incorrect, out of proper context, unauthorized, or uninformed...,"

IDF unit to fight enemies on Facebook, Twitter
December 1, 2009

DRAFT National Strategy for Trusted Identities in Cyberspace
June 25, 2010 http://www.dhs.gov/xlibrary/assets/ns_tic.pdf (excerpt)
This Strategy and its associated implementation actions aim to transform the current identity landscape to the desired target state – the Identity Ecosystem. The Identity Ecosystem comprises a combination of transaction participants and interoperable infrastructure to foster trusted digital identities. The Identity Ecosystem is an online environment where individuals, organizations, services, and devices can trust one another through proper identification and authentication.
National Strategy Development
In recognition of the far-reaching impacts of cyber threats to our Nation’s economy, society, government, and critical infrastructure, the EOP has called for a unified effort across public and
private sectors to improve online security. Most recently, the President’s Cyberspace Policy Review stated that:
The Federal government - in collaboration with industry and the civil liberties and privacy communities - should build a cyber security-based identity management vision and strategy for the
Nation that considers an array of approaches, including privacy-enhancing technologies. The Federal government must interact with citizens through a myriad of information, services, and
benefit programs and thus has an interest in the protection of the public’s private information as well. 3 ...
The Federal Government, in collaboration with individuals, businesses, non-profits, advocacy groups, associations, and other governments, must lead the way to improve how identities are trusted and used in cyberspace. Ongoing collaboration between private and public sectors has already resulted in significant gains towards establishing Identity Ecosystem components. However, much more remains to be done.

Microsoft and the National Security Agency
April 6, 2007 http://www.techweb.com/wire/29110640

NSA took part in development of Windows 7
25 Nov 2009
The National Security Agency (NSA) acknowledged having worked with Microsoft on the development of Windows 7, as testified on 17 November 2009 by Richard Schaeffer, the NSA’s information assurance director, before the U.S. Senate’s Subcommittee on Terrorism and Homeland Security. The cooperation between the NSA and Microsoft has been an open secret since a judiciary agreement was reached between the U.S. Government and the computer giant. It is however the first time that official mention of this has been made. In terms of cyber security, over and above the issue of protection from external intrusions, the crux of the matter lies in who is the doorkeeper. In other words, while it is NSA’s prerogative to have sole security access control over the most-widely used software equipment inside the United States, the fact remains that Windows 7 is marketed globally. Undoubtedly, this opens up considerable opportunities for U.S. cyber espionage beyond its borders....

Microsoft VP, TCG: Jing De Jong-Chen
Director of Government Security, Microsoft Corporation Jing de Jong-Chen has over 15 years of industry experience in software development, security technology policy and global partnership development with industry, government and research communities. As Director of Government Security at Microsoft, Jing is responsible for leading the cross-company task force to research, formulate and communicate company strategies and policies on security technology in several global business environments. Since joining Microsoft in 1992, Jing has worked with a wide range of strategic products and businesses across the company, including Microsoft Windows, Advanced Strategies and Policy, Platform and On Line Services Division, and Microsoft Research. She was part of the driving force in the company to launch the Trustworthy Computing Initiative.
The National Security Agency (NSA) defines a trusted system or component as one "whose failure can break the security policy", and a trustworthy system or component as one "that will not fail". Trusted Computing has been defined and outlined with a set of specifications and guidelines by the Trusted Computing Platform Alliance (TCPA), including secure input and output, memory curtaining, sealed storage, and remote attestation.

NGSCB Next-Generation Secure Computing Base: Microsoft’s TPM-based Trusted Computing solution. Formerly known as “Palladium”.
Trusted Computing: A Framework for Data and Network Security
*Authentication *Data Protection/Encryption *Identity and Access Management *Password Management *Network Access Control *Disaster Recovery *Layered Security

DARPA, Microsoft, Lockheed team up to reinvent TCP/IP

Microsoft CEO: Our company almost as Israeli as American

"From the depth of our heart -- thanks to The Israeli Defense Forces"
Microsoft logo under the text with Israeli national flag in the background.

Israeli high-tech companies work for U.S.
U.S. law enforcement wiretaps authorized by the Communications Assistance for Law Enforcement Act (CALEA)
[Isreali]Amdocs provides billing and directory assistance for most American phone companies, Comverse Infosys handles telephone tapping equipment for US law enforcement, Odigo runs "Instant Message" systems on computers. All three are closely tied to the Mossad and the Israeli Defense Force, which is massively funded by u.s. Most firewalls on US corporate and government computer systems are provided by Israeli Checkpoint Systems. Odigo's offices near the World Trade Towers allegedly received two hour advance warning of the 911attacks... http://archive.newsmax.com/archives/articles/2001/12/18/224826.shtml

How 'strategic communications',works as the other, soft power, arm of US imperialism
The Department of Defense Dictionary of Military and Associated Terms: strategic communication consists of “[f]ocused US Government efforts to create, strengthen, or preserve conditions favorable for the advancement of United States Government interests, policies, and objectives through the use of coordinated programs, plans, themes, messages, and products synchronized with the actions of all instruments of national power.” 10 JFQ / issue 56, 1st quarter 2010 ndupress.ndu.edu

Strategic Communications, incl.ADM Mullen's “Strategic Communication: Getting Back to Basics” and complementary articles

National Defense University Press reveals the vast practical applications of propaganda beyond VofA, especially social media:
The Department of Defense social media directory lists all of DoD's official pages across various social media networks. Social media is all about collaboration, and we want to hear from you. Check out our pages, ask questions, provide feedback and share your thoughts. Do you have an official DoD-level social media page that you want included in this directory? If so, please submit the link, using an official e-mail account, and the page will be added to the registry. For Service-level social media pages -- i.e. Air Force, Army, Marine Corps, Navy, etc. please register with one of the following Service-specific registries. After the Services have approved the pages, they will be automatically added to the main DoD directory.
Army - http://www.army.mil/media/socialmedia/
Navy - http://www.navy.mil/socialmedia/
Marines - http://www.usmc.mil/usmc/Pages/SocialMedia.aspx
Air Force - http://www.af.mil/socialmedia.asp