2/11/13 Obama claims preemptive cyberwar powers; US "target of massive China Cyber-espionage"; NSA Whistleblower Truth

Between Two Ages: America’s Role in the Technetronic Era
Zbigniew Brzezinski, 1970
"The technotronic era involves the gradual appearance of a more controlled society. Such a society would be dominated by an elite, unrestrained by traditional values. Soon it will be possible to assert almost continuous surveillance over every citizen and maintain up-to-date complete files containing even the most personal information about the citizen...millions of uncoordinated citizens, easily within the reach of magnetic and attractive personalities effectively exploiting the latest communications techniques to manipulate emotions and control reason... These files will be subject to instantaneous retrieve/review by the authorities...Technology will make available to the leaders of major nations, techniques for conducting secret warfare, of which only a bare minimum of security forces need be appraised....techniques of weather modification could be employed to produce prolonged periods of drought or storm...

Obama claims broad premeptive cyber war powers
2/4/13 www.fastcompany.com/3005446/obama-granted-cyberwar-powers -
A secret legal review on the use of America's growing arsenal of cyberweapons concluded President Obama has the broad power to order a pre-emptive strike if the United States detects evidence of a major digital attack looming from abroad...as the administration moves, in the next few weeks, to approve the nation's first rules for how the military can defend, or retaliate, against cyberattack...will also govern how intelligence agencies can carry out searches of faraway computer networks for signs of potential attacks on the US and, if the president approves, attack adversaries by injecting them with destructive code - even with no declared war. The rules will be highly classified, just as those governing drone strikes have been. John O. Brennan, Mr. Obama's chief counterterrorism adviser and nominee to run the CIA, played a central role in developing the administration's policies regarding drones and cyberwarfare....US Cyber Command (CYBERCOM) and computer network warfare is one of the few parts of the military budget expected to grow...Officials said the new cyberpolicies were guided by a decade of evolution in counterterrorism policy, particularly on the division of authority between the military and the intelligence agencies in deploying cyberweapons

War on China, the major 'threat' to US global dominance, which holds trillions of US debt, it would be laughable if not so deadly:

U.S. said to be target of massive cyber-espionage campaign
2/10/13 http://www.washingtonpost.com/world/national-security/us-said-to-be-targ...
A The National Intelligence Estimate assessment concluded the US is the target of a massive, sustained cyber-espionage campaign threatening the country’s economic competitiveness, according to individuals familiar with the report. The NIE identifies China as the country most aggressively seeking to penetrate the computer systems of U.S. businesses and institutions to gain access to data that could be used for economic gain. China staunchly rejected such allegations, saying the government neither condones nor carries out computer hacking.

state cyberterrorism:

Newly discovered malware linked to Stuxnet, Flame
Researchers have identified a new kind of malicious software, Gauss that appears to be the creation of the same state-sponsored program that produced the viruses known as Stuxnet aimed at computers tied to Iran’s nuclear program. Stuxnet and Flame, believed to have been developed by the United States and Israel ...most likely a nation-state sponsored operation.”...It is unclear how Gauss is transmitted from computer to computer...But it does download monitoring software onto portable USB drives to collect information from uninfected machines to profile computers not connected to the Internet.

Software tracks people on social media created by defence firm
Exclusive: Raytheon's Riot program mines social network data like a 'Google for spies'
2/10/13 http://www.guardian.co.uk/world/2013/feb/10/software-tracks-social-media...
Raytheon...shared the technology with US government and industry...in 2010, to help build a national security system capable of analysing "trillions of entities" from cyberspace...
demonstrating the same social networks that helped propel Arab Spring revolutions can be a "Google for spies"...as means of monitoring and control. Using Riot it is possible to gain an entire snapshot of a person's life – their friends, the places they visit charted on a map – in little more than a few clicks of a button.... Raytheon's "principal investigator" Brian Urch explained in the video acquired by the Guardian, how photographs that users post on social networks may contain latitude and longitude details – automatically embedded by smartphones within "exif header data." Riot pulls out this information, showing not only the photographs posted... but also the location where photographs were taken...Riot can display on a spider diagram the associations and relationships of individuals by looking at who they have communicated with online over Twitter...mine data from Facebook and sift GPS location information from Foursquare, a mobile phone app used by more than 25 million people to alert friends of their whereabouts...can be used to display, in graph form, the top 10 places visited by tracked individuals and the times at which they visited them....Law enforcement data mining is legal in most countries. In February 2012 the FBI requested help developing a social-media mining application for monitoring "bad actors or groups"....Jared Adams, a spokesman for Raytheon's intelligence and information systems, said in an email: "Riot is a big data analytics system design we are working on with industry, national labs and commercial partners to help turn massive amounts of data into useable information to help meet our nation's rapidly changing security needs....
In December, Riot was featured in a newly published patent Raytheon is pursuing for a system designed to gather data on people from social networks, blogs and other sources to identify whether they should be judged a security risk. In April, Riot was scheduled to be showcased at a US government and industry national security conference for secretive, classified innovations, where it was listed under the category "big data – analytics, algorithms."According to records published by US government's trade controls department, the technology has been designated an "EAR99" item under export regulations, which means it "can be shipped without a licence to most destinations under most circumstances".

"US Needs Offensive Cyberwar Weapons "
10/4/12 General Keith Alexander, NSA director and US CYBERCOM commander: "If your defense is only to try to block attacks you can never be successful,"US Needs Offensive Weapons in Cyberwar" Gen. Alexander *
According to CNET , using a FOIA request, EPIC obtained 190 pages of Perfect Citizen files, at least 98 of which completely deleted for security reasons. The readable portions showed that defense company Raytheon received a $91 million contract to build Perfect Citizen and hire...hardware and software engineers to analyze and document vulnerability research against control systems and devices.

"Cyber threats are pretexts..."
Pentagon's Massive Expansion of 'Cyber-security' Unit is About Everything Except Defense
By Glenn Greenwald
The purpose of a surveillance state: The surveillance state impedes, deters, and chills any attempt to challenge state or corporate power. That is its purpose. It does that by design. Therefore, understanding what the surveillance state is and how it operates is essential.The US surveillance state is a full-scale merger of government and corporate America... The US government reflexively labels everything it does "classified" and "secret". There is supposed to be government transparency; individuals are supposed to live in a sphere of privacy. This basic tenet of democracy has been reversed.

“We Are This Far From A Turnkey Totalitarian State”
In its April cover story, Wired has an exclusive report  on the NSA’s Utah Data Center, a must read for anyone who believes any privacy is still a possibility in the US: “A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks…. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.”… The heavily fortified $2 billion center should beup and running in September 2013"...virtually anything one communicates through any traceable medium, or any record of one’s existence in the electronic medium, which these days is everything, will unofficially be property of the US government to deal with as it sees fit. The codename of the project: Stellar Wind....
[As a] 2007 Department of Defense report puts it, the Pentagon is attempting to expand its worldwide communications network, known as the Global Information Grid, to handle yottabytes (1024 bytes) of data. (A yottabyte is a septillion bytes—so large no one has yet coined a term for the next higher magnitude) ... because, according to a recent report by Cisco, global Internet traffic will quadruple from 2010 to 2015, reaching 966 exabytes per year. (A million exabytes equal a yottabyte.) In terms of scale, Google's Eric Schmidt once estimated the total of all human knowledge created from the dawn of man to 2003 totaled 5 exabytes.)...
William Binney, senior NSA crypto-mathematician largely responsible for automating NSA's worldwide eavesdropping network, went on record to describe Stellar Wind...

NSA whistleblower: 'Everyone in US under virtual surveillance'
William Binney revealed the massive (NSA) massive domestic spying program, Stellar Wind, which intercepts domestic communications without protections for US citizens...and that NSA concealed Stellar Wind under the "Terrorist Surveillance Program," to give cover to the warrantless surveillance program. He told the public that, since 9/11, the agency has intercepted between 15 and 20 trillion communications. Binney suggests the government under Obama has “assembled on the order of 20 trillion transactions about US citizens with other US citizens.” They’ve assembled data “about everybody” and, from that data, they target anybody they want...with this amount of information, it is possible to fabricate charges against virtually anyone then indict that person... the national security state expansions further entrenched as bipartisan consensus makes Americans more and more apathetic and complacent... an Orwellian state accelerates and become more and more a reality

Mining Electronic Records for Revealing Health Data

United States allies, including Bahrain, Saudi Arabia, and Qatar, use Blue Coat systems for censorship and surveillance....

US Tests Terrorist 'pre-crime' detector field
Screening system aims to pinpoint passengers with malicious intentions.
Future Attribute Screening Technology (FAST), a US Department of Homeland Security (DHS) programme designed to spot people intending to commit a terrorist act, has in the past few months completed its first round of field tests at an undisclosed location in the northeast. FAST measures a variety of physiological indicators, ranging from heart rate to the steadiness of a person's gaze, to judge a subject's state of mind, but relies on non-contact sensors, so it can measure indicators as someone walks through public spaces, not depend on active questioning of the subject.

Pentagon's DARPA Project LifeLog Partly Back Under New Name: ASSIST
7 months ago the pentagon scrapped a questionable project called LifeLog to chronicle almost everything about a person... LifeLog would dump everything an individual does into a giant database: every e-mail sent or received, every picture taken, every Web page surfed, every phone call made, every TV show watched, every magazine read. All of this and more would combine with information gleaned from a variety of sources: a GPS transmitter to keep tabs on where that person went, audio-visual sensors to capture what he or she sees or says, and biomedical monitors to keep track of the individual's health. This gigantic amalgamation of personal information could then be used to "trace the 'threads' of an individual's life," to see exactly how a relationship or events developed, according to a briefing from the Defense Advanced Projects Research Agency (DARPA), LifeLog's sponsor...LifeLog came on the heels of Total Information Awareness, Darpa's unnervingly far-reaching effort to use ordinary citizens' records to profile potential terrorists..."LifeLog has the potential to become something like 'TIA cubed."... [ Total Information Awareness program - to scour databases of US citizens' purchases, travels and other activities to pinpoint potential terrorist threats - is not the Total Information Awareness program anymore - DARPA, Defense Advanced Research Projects Agency, which administers the program, changed the name to "Terrorism Information Awareness." The agency said the original name "created in some minds the impression that TIA was a system to be used for developing dossiers on U.S. citizens," according to its website. http://www.wired.com/politics/security/news/2003/05/58936] "The Defense Department is bringing parts of it back under project ASSIST. "If it doesn't fly the first time around, you can be sure it'll be back. And so it is," says Steven Aftergood, analyst with the Federation of American Scientists. "This time around an effort IS made to connect it to a military application."... In the private sector, a number of LifeLog-like efforts already are underway to digitally archive one's life--to create a "surrogate memory"...

Military Report: Secretly ‘Recruit or Hire Bloggers’
By Noah Shachtman March 31, 2008 Info War http://www.wired.com/dangerroom/2008/03/report-recruit/
This 2006 report for the Joint Special Operations University, "Blogs and Military Information Strategy," offers a third approach — co-opting bloggers, or putting them on the payroll. "Hiring a block of bloggers to verbally attack a specific person or promote a specific message may be worth considering," write the report’s co-authors, James Kinniburgh and Dororthy Denning... The report introduces the military audience to the "blogging phenomenon," and lays out a number of ways in which US armed forces — specifically, military public affairs, information operations, and psychological operations units — might use the sites to their advantage: