12/7 War on Internet Developments and Opposition


A Fresh Start for the Internet
Stanford University researchers aren't just dreaming of a new Internet: they're building it.
By Rachel Ross
March 19, 2007
Researchers at Stanford University are on a mission to completely revamp the Internet. Plans for their multipart program, called the Clean Slate Design for the Internet, will be presented to the public this Wednesday at the school's annual Computer Forum... Ultimately, the researchers hope to make the Internet safer, more transparent, and more reliable by reconsidering both private and public networks.... "We need to take all the technologies we already know and fit them together so that we get a different overall system. This is not about building a technology innovation that changes the world but about architecture -- pulling the pieces together in a different way to achieve high-level objectives." Just such an approach is now gaining momentum, spurred on by the National Science Foundation...
Simply put, the Internet has no inherent security architecture -- nothing to stop viruses or spam or anything else. Protections like firewalls and antispam software are add-ons, security patches in a digital arms race.
The President's Information Technology Advisory Committee, a group stocked with a who's who of infotech CEOs and academic researchers, says the situation is bad and getting worse. "Today, the threat clearly is growing," the council wrote in a report issued in early 2005. "Most indicators and studies of the frequency, impact, scope, and cost of cyber security incidents -- among both organizations and individuals -- point to continuously increasing levels and varieties of attacks."

And we haven't even seen a real act of cyberterror, the "digital Pearl Harbor" memorably predicted by former White House counterterrorism czar Richard Clarke in 2000 (see "A Tangle of Wires"). Consider the nation's electrical grid: it relies on continuous network-based communications between power plants and grid managers to maintain a balance between production and demand. A well-placed attack could trigger a costly blackout that would cripple part of the country.
The conclusion of the advisory council's report could not have been starker: "The IT infrastructure is highly vulnerable to premeditated attacks with potentially catastrophic effects."

The Internet Is Broken
The Net's basic flaws cost firms billions, impede innovation, and threaten national security. It's time for a clean-slate app
By David Talbot
Dec. 2005/Jan. 2006
In his office within the gleaming-stainless-steel and orange-brick jumble of MIT's Stata Center, Internet elder statesman and onetime chief protocol architect David D. Clark prints out an old PowerPoint talk. Dated July 1992, it ranges over technical issues like domain naming and scalability. But in one slide, Clark points to the Internet's dark side: its lack of built-in security ... the whole system needs fundamental architectural change. "We are in the mode of trying to plug holes in the dike," says Leighton, an MIT mathematician who is also a member of the President's Information Technology Advisory Committee and chair of its Cyber Security Subcommittee. "There are more and more holes, and more resources are going to plugging the holes, and there are less resources being devoted to fundamentally changing the game, to changing the Internet." When Leighton says "resources," he's talking about billions of dollars.
Take Microsoft, for example. Its software mediates between the Internet and the PC. These days, of the $6 billion that Microsoft spends annually on research and development, approximately one-third, or $2 billion, is directly spent on security efforts. "The evolution of the Internet, the development of threats from the Internet that could attempt to intrude on systems -- whether Web servers, Web browsers, or e-mail-based threats -- really changed the equation," says Steve Lipner, Microsoft's director of security strategy and engineering strategy...

Federally Funded Plans To Scrap The Internet
Seeking further funding from Congress for "clean slate" projects
by Steve Watson

Microsoft Palladium: Next Generation Secure Computing Base
Doc's Cover Palladium Privacy, Unique Identifier Issues. EPIC has documents
from the National Institute of Standards and Technology under the Freedom of
Information Act describing Microsoft Palladium. The documents (pdf 980k)
describe Palladium's applications for Digital Rights Management and note
that the technology embeds "unique machine identifiers," thus raising risks that
user behavior may be subject to traffic analysis. Issues raised by Palladium,
which is now known as the Next Generation Secure Computing Base, are similar
to privacy problems with the controversial Intel Pentium Serial Number.

Microsoft: "From the depth of our heart -- thanks to The Israeli Defense Forces"
Microsoft and the National Security Agency
April 6, 2007
In January the Washington Post reported that Microsoft had announced that its new operating system, Vista, was being brought to us with the assistance of the National Security Agency... In September 1999, leading European investigative reporter Duncan Campbell revealed that NSA had arranged with Microsoft to insert special "keys" into Windows operating systems, beginning with Windows 95. [ http://www.techweb.com/wire/29110640 ]..
In February 2000, it was disclosed that the Strategic Affairs Delegation (DAS), the intelligence arm of the French Defense Ministry, had prepared a report in 1999 which also asserted that NSA had helped to install secret programs in Microsoft software....
In case the above disturbs your image of Bill Gates and his buddies as a bunch of long-haired, liberal, peacenik computer geeks, and the company as one of the non-military-oriented halfway decent corporations, the DAS report states that the Pentagon at the time was Microsoft's biggest client in the world. The Israeli military has also been an important client. In 2002, the company erected enormous billboards in Israel which bore the Microsoft logo under the text "From the depth of our heart -- thanks to The Israeli Defense Forces", with the Israeli national flag in the background.[15]

conflict between information masters and information victims
"We, the winners, are a minority......We live in an age of multiple truths. He who warns of the "clash of civilizations" is incontestably right.....One of the defining bifurcations of the future will be the conflict between information masters and information victims.......
Information destroys traditional jobs and traditional cultures; it seduces, betrays, yet remains invulnerable. How can you counterattack the information others have turned upon you? There is no effective option other than competitive performance. For those individuals and cultures that cannot join or compete with our information empire, there is only inevitable failure (of note, the internet is to the techno-capable disaffected what the United Nations is to marginal states: it offers the illusion of empowerment and community) ... The next century will indeed be American, but it will also be troubled. We will find ourselves in constant conflict, much of it violent. The United States Army is going to add a lot of battle streamers to its flag. We will wage information warfare, but we will fight with infantry. And we will always surprise those critics, domestic and foreign, who predict our decline..." [...] http://carlisle-www.army.mil/usawc/Parameters/97summer/peters.htm

US Plans to 'Fight the Net' Revealed
by Adam Brookes
Friday, January 27, 2006 by BBC
WASHINGTON - A newly declassified document gives a fascinating glimpse into the US military's plans for "information operations" - from psychological operations, to attacks on hostile computer networks. Bloggers beware. As the world turns networked, the Pentagon is calculating the military opportunities that computer networks, wireless technologies and the modern media offer. From influencing public opinion through new media to designing "computer network attack" weapons, the US military is learning to fight an electronic war.
The declassified document is called "Information Operations Roadmap". It was obtained by the National Security Archive at George Washington University using the Freedom of Information Act. Officials in the Pentagon wrote it in 2003. The Secretary of Defense, Donald Rumsfeld, signed it.

The "roadmap" calls for a far-reaching overhaul of the military's ability to conduct information operations and electronic warfare. And, in some detail, it makes recommendations for how the US armed forces should think about this new, virtual warfare. The document says that information is "critical to military success". Computer and telecommunications networks are of vital operational importance.

The operations described in the document include a surprising range of military activities: public affairs officers who brief journalists, psychological operations troops who try to manipulate the thoughts and beliefs of an enemy, computer network attack specialists who seek to destroy enemy networks. All these are engaged in information operations.

Perhaps the most startling aspect of the roadmap is its acknowledgement that information put out as part of the military's psychological operations, or Psyops, is finding its way onto the computer and television screens of ordinary Americans. "Information intended for foreign audiences, including public diplomacy and Psyops, is increasingly consumed by our domestic audience," it reads. "Psyops messages will often be replayed by the news media for much larger audiences, including the American public," it goes on. The document's authors acknowledge that American news media should not unwittingly broadcast military propaganda. "Specific boundaries should be established," they write. But they don't seem to explain how.
"In this day and age it is impossible to prevent stories that are fed abroad as part of psychological operations propaganda from blowing back into the United States - even though they were directed abroad," says Kristin Adair of the National Security Archive.

Credibility problem
Public awareness of the US military's information operations is low, but it's growing - thanks to some operational clumsiness. Late last year, it emerged that the Pentagon had paid a private company, the Lincoln Group, to plant hundreds of stories in Iraqi newspapers. The stories - all supportive of US policy - were written by military personnel and then placed in Iraqi publications.

And websites that appeared to be information sites on the politics of Africa and the Balkans were found to be run by the Pentagon.

But the true extent of the Pentagon's information operations, how they work, who they're aimed at, and at what point they turn from informing the public to influencing populations, is far from clear. The roadmap, however, gives a flavour of what the US military is up to - and the grand scale on which it's thinking. It reveals that Psyops personnel "support" the American government's international broadcasting. It singles out TV Marti - a station which broadcasts to Cuba - as receiving such support. It recommends that a global website be established that supports America's strategic objectives. But no American diplomats here, thank you. The website would use content from "third parties with greater credibility to foreign audiences than US officials". It also recommends that Psyops personnel should consider a range of technologies to disseminate propaganda in enemy territory: unmanned aerial vehicles, "miniaturized, scatterable public address systems", wireless devices, cellular phones and the internet. 'Fight the net'. When it describes plans for electronic warfare, or EW, the document takes on an extraordinary tone [... ]

“Unless a way of intervening in the radicalization process can be found, we are condemned to stepping on cockroaches one at a time.”
Social Repression and Internet Surveillance
H. Res. 1695, 1955 & S.1959
By Nikki Alexander
...Jane Harman (D-CA) sponsored H.Res.1955 her partner, Dave Reichert (R-WA), authored the original bill, H.Res.1695....establishes a National Commission and Center of so-called “Excellence” to censor and crush social concerns which are subjectively perceived to be “threats” by RAND spokesmen, who supplied the content for this bill. RAND coined the folksy epithets “homegrown terrorism,” “violent radicalization” and “ideologically based violence” to invalidate expressions of social conscience that conflict with corporate interests... it characterizes individuals who care deeply about international human rights, national sovereignty and ecological protection as “homegrown terrorists” who have been “violently radicalized” by “extremist belief systems.” This bill quotes RAND ideology verbatim.
The Internet... is being systematically strangled by surveillance devices that police the flow of information; filtering web servers, search engines, web sites, email content and keystrokes...The Open Net Initiative reports, “With respect to online surveillance, the United States may be among the most aggressive states in the world in terms of listening to online conversations.” ...

Packaged as a pretext for “preventing terrorism”, the authors of this bill claim that, “The Internet has aided in facilitating violent radicalization, ideologically based violence, and the homegrown terrorism process in the United States by providing access to broad and constant streams of terrorist-related propaganda to United States citizens.”..
The Baltimore Sun reported In November that George Bush requested $154 million in preliminary funding to “prevent cyberspace attacks”...expected to become a seven-year, multibillion-dollar program to “track threats” in cyberspace on both government and private networks... These Government crimes would be permanently institutionalized through the National Security Agency CAEIAE program, the Center of so-called “Excellence” designated by this bill... What Harman describes as “vertical information sharing from the Intelligence Community to the local level and from local sources to State and Federal agencies” is equivalent to The Third Reich’s Ministry for Popular Enlightenment and Propaganda which terrorized German citizens from Party Headquarters through a chain of command that reached all the way down into local communities. With modern telecommunications technology this terror campaign of “intelligence sharing” will persecute citizens in the privacy of their homes, monitoring their online conversations and reporting dissidents to the Gestapo... Inventing a special “Civil Rights and Civil Liberties Officer” embedded in this unlawful operation to create rules for handling the Constitutional rights of US citizens should raise a red flag....Assigning one individual to tailor those rules to an illegal Cointelpro operation...

Masquerading as an “academic” assembly, the political appointees to this Commission will have “relevant expertise” in Information Technology, Juvenile Justice, Corrections, Counterterrorism, Intelligence and Local Law Enforcement. All members of the group will be endowed with sweeping investigative powers and unlimited access to classified files in all branches of government ~ A McCarthy Inquisition with a mandate to hold hearings, administer oaths, take testimony and propose “initiatives to intercede” in the so-called “radicalization process,” a RAND euphemism for crushing social dissent.... The bill requires only that the Commission produce a public “version” of its findings before disbanding, permitting secret versions to permanently remain at the Center of so-called “Excellence” as a catalyst for Government abuse by Federal, State and local law enforcement agents trained to believe that their targets deserve persecution...
RAND spokesman, Brian Jenkins whose personal ideology is fully incorporated into this bill said to Jane Harman’s Committee: “Unless a way of intervening in the radicalization process can be found, we are condemned to stepping on cockroaches one at a time.” ...the precise terminology used by Nazis to justify exterminating Jews.

US warrantless wiretapping since 1990s predates 9/11
By John Leyden
12/19/07 "The Register" -- - Fresh evidence has emerged that the US government's warrantless wiretapping program predates the 9/11 terrorist attacks.
Secret surveillance operations that enabled the National Security Agency (NSA) to access telecommunications traffic data have been in place since the 1990s....
Negotiations between the NSA and AT&T in February 2001 allegedly involved replicating a New Jersey network centre to allow the US signals intelligence "access to all the global phone and email traffic that ran through it". The incident has become one aspect of a lawsuit which also brings in allegations that Verizon set up a dedicated fibre-optic line from New Jersey to a large military facility in Quantico. An AT&T technician at the time has provided evidence supporting the allegations. However, other AT&T technicians are due to testify that the project was confined to improving internal communications within the NSA. News that the NSA eavesdropped on the international communications of terrorism suspects making calls from the US without warrants first emerged two years ago. The latest revelations that this was a development of a much longer running practice that also involved US domestic calls come as the Bush administration is pushing Congress to pass legislation indemnifying telecoms carriers from liability in assisting law enforcement with warrantless eavesdropping programs. Since 2005, the warrantless wiretapping program has become the topic of 40 lawsuits. http://www.informationclearinghouse.info/article18928.htm

Secret Pentagon "Roadmap"
National Security Archive Electronic Briefing Book No. 177
For more information contact:
Kristin Adair / Thomas Blanto 202 994 7000Washington, D.C., January 26, 2006 -
A secret Pentagon "roadmap" on war propaganda, personally approved by Secretary of Defense Donald Rumsfeld in October 2003...The document calls on DoD to enhance its capabilities in five key Information Operations (IO) areas: electronic warfare (EW), PSYOP, Operations Security (OPSEC), military deception and computer network operations (CNO).... http://www.gwu.edu/%7Ensarchiv/NSAEBB/NSAEBB177/index.htm

Army's information technology strategic plan
Army CIO/G-6 Campaign Plan, 2008-2015
Published October 2007
Normally released as 500-day plans, this version of the Army's information technology strategic plan discusses future goals for 2008-2015.
The document's introduction stated, "Our Army faces an ever-changing and evolving enemy and we must be able to respond rapidly to defeat emerging threats. The current operating environment and projections of persistent conflict dictate the need to rapidly develop capabilities for both the current and future forces. Further, the rapid pace of Information Technology (IT) change will create opportunities necessitating transformation of our development and procurement process to exploit these opportunities and effectively integrate them into the force. This transformation must include the ways and means to identify and mitigate risks associated with procurement and acquisition in the global IT market space.
The Global Information Grid (GIG) is the Department of Defense's approach to information and decision superiority- a key to the National Military Strategy for continued information dominance. This decision superiority is based on shared information across the Army and with Joint, Interagency, and Multi-National coalitions and allies. LandWarNet is the Army's portion of the GIG and; therefore, key to Army's decision superiority. LandWarNet has been described as the Army's Battle Command and GIG-derived, orders-based, capabilities focused system of systems, train as you fight, and enhanced orders process. LandWarNet enables information-based Joint, Interagency, multi-national, civil defense, Warfighting and support operations, regardless of Joint Operational Phase, operational urgency, or the battlespace circumstances of its authorized users." [...] http://www.cfr.org/publication/14780/army_ciog6_campaign_plan_20082015.h...

Emerging Threats
Analysis: U.S. military to patrol Internet
UPI Homeland and National Security Editor

National Dragnet Is a Click Away
Authorities to Gain Fast and Expansive Access to Records
By Robert O'Harrow Jr. and Ellen Nakashima
Washington Post Staff Writers
Thursday, March 6, 2008; A01
Several thousand law enforcement agencies are creating the foundation of a domestic intelligence system through computer networks that analyze vast amounts of police information to fight crime and root out terror plots.

Technology Leaders Favor Online ID Card Over Passwords
The Information Card Foundation is an effort to create a single industrywide
approach to managing identity online.... to bring the concept of an identity
card, like a driver’s license, to the online world. Michael B. Jones,
Microsoft’s director of identity partnerships, said the information card
system would depend on the support of Web site owners in the same way that
early Web browsers like Netscape waited for the support of Web server
developers. The technology will first be used on desktop systems but will
eventually find its way to mobile phones and other hand-held devices, he said.
Microsoft has been working on the concept of an identity card for some time.
The new organization will ensure various approaches adhere to the same
standard.... The foundation, which also includes Equifax, Novell, Oracle and
nine industry analysts and technology leaders, will try to set open
standards for the technology industry.

Gates Backs E-Mail Stamp in War on Spam...
Should people have to buy electronic stamps to send e-mail?... In the meantime, the big Internet providers, including Microsoft and Yahoo, in recent weeks have renewed talks that stalled last year about creating technological standards to help identify the senders of legitimate [e.g.approved] e-mail.... Bill Gates, Microsoft's chairman, told the World Economic Forum in Davos, Switzerland, that spam would
not be a problem in two years, in part because of systems that would require people to pay money to send e-mail. Yahoo, meanwhile, is quietly evaluating an e-mail postage plan being developed by Goodmail, a Silicon Valley start-up company.... Goodmail, founded by Daniel T. Dreymann, an Israeli entrepreneur, is developing a system that it hopes will be easier to adopt... Goodmail acting as a clearinghouse.... AOL is testing a system under development by the Internet Research Task Force... called the Sender Permitted From, or S.P.F., creates a way for the owner of an Internet domain, like aol.com, to specify which computers are authorized to send e-mail with aol.com return addresses. ... Microsoft has been floating a similar proposal, labeled "caller ID," that could be expanded in the future to accommodate more sophisticated anti-spam approaches including Internet postage systems. Discussions are under way among the backers of S.P.F., Microsoft and others involved in e-mail to reach a compromise sender notification system.... http://www.nytimes.com/2004/02/02/technology/02spam.html?ex=1076792812&e...

Spam Fighters Turn to Identifying Legitimate E-Mail
...There is also a growing agreement that it is not enough for an e-mail sender to identify itself. The sender must also earn the trust of e-mail recipients, by promising to follow certain standards and having violations tallied and published.... "Just because we can verify your identity doesn't mean you send good email," said Miles Libbey, the manager for antispam products at Yahoo. "You absolutely need identity and you also need reputation."
Deciding whose mail will be delivered and whose will be bounced is a thankless task, and most proposals envision that several independent groups would publish e-mail standards. A sender would choose one of these to follow, and that group, in turn, would monitor its compliance. Truste, a group that monitors Web site privacy policies, wants to get into that business.... http://www.nytimes.com/2003/10/06/technology/06SPAM.html?ex=1066468960&e...

Bush Administration Pushes Plan to Permit Internet Surveillance
NEW YORK, Jan 20, 2004 (IPS) - The Bush administration is pushing to ratify an international convention that civil libertarians say would pose serious threats to privacy rights at home and abroad. After delaying for about two years, U.S. President George W. Bush recently asked the U.S. Senate to ratify the Council of Europe Cybercrime Convention, a global agreement apparently created to help police worldwide cooperate to fight Internet crimes. ”It's the only international treaty to address the problems of computer-related crime and electronic evidence gathering,” Bush said in his November letter asking the Senate to confirm U.S. adherence to the treaty.... In his letter to the Senate, Bush wrote, ”the treaty would help deny 'safe havens' to criminals, including terrorists, who can cause damage to U.S. interests abroad using computer systems”.
But independent legal experts and right activists on both sides of the Atlantic are sceptical about such claims. ..The agreement makes it mandatory for each participating nation to grant nepowers of search and seizure to its law enforcement authorities, including the power to force an Internet service provider (ISP) to preserve acustomer's usage records and to monitor his or her online activities as they occur.... The ACLU and other critics of the treaty argue that it provides too little protection for political activities. They point out that the text fails to define ”political offences”, a fault they call ”a huge omission”, since an act considered political in the United States might be a criminal matter in another country. For example, the treaty section on real-time monitoring of Internet activity does not include an exemption to the mutual assistance requirement for ”political” offences, meaning, the experts say, the FBI could be asked to order an ISP like AOL to spy on a political dissenter in Ukraine or a union organiser in Latin America.(END/2004)

Israeli Professor Says Terrorist groups active on the Internet
There are hundreds of sites on the Internet serving terrorist groups and their supporters, according to a study done by the * US Institute of Peace (USIP). The study undertaken by Gabriel Weimann, a professor at the Haifa University in Israel and currently a senior fellow at USIP, writes that today all active terrorist groups have established their presence on the Internet.....
Prof. Weimann points out that by its very nature, the Internet is an ideal arena for activity by terrorist organisations since it offers easy access, little or no regulation, censorship or government control, potentially huge audiences around the world, anonymity of communication, fast flow of information, inexpensive development and maintenance of web presence, a multimedia environment and the ability to shape coverage in the traditional mass media which increasingly uses the Internet as a source for news stories.A survey undertaken for the study showed that the Internet is used by groups of all description and persuasions, from Marxist to Islamist to racist to anarchist. [...]

FBI turns to broad new wiretap method
By Declan McCullagh, CNET News.com
ZDNet News: January 30, 2007

Spychief Wants to Tap Into Cyberspace:
Spychief Mike McConnell is drafting a plan to protect America’s cyberspace that will raise privacy issues and make the current debate over surveillance law look like “a walk in the park http://tinyurl.com/2ezras

Marching into Cyberspace
Greg Bruno
When Rear Admiral Mark Fox kicked off the Defense Department’s first briefing for online journalists in February 2007, he made no secret of his views on traditional media (PDF)... “I appreciate how bloggers allow [us] to get our message through the media filter directly to the American people.” ...The Pentagon’s Bloggers Roundtable, which dates to February 2007, offers a new twist to Internet outreach: it links military commanders with bloggers to discuss current events and posts briefing transcripts online. Other new government blogs include the Homeland Security Leadership Journal and GovGab, a U.S. General Services Administration site filled with tips on good living. The blog that has caused the biggest stir, however, is arguably the U.S. State Department’s Dipnote. Inaugurated in September, it features observations from department employees and encourages readers to comment on U.S. foreign policy. Sample of candid comments[...]

Full Spectrum Information Warfare Without Limits
Brent Jessop
Information Operation Roadmap Part 1: What Are Information Operations?
When the US military refers to full spectrum domination, they truly mean full spectrum. Information operations or information warfare is a key part of the military battlespace. Recently, a document entitled Information Operation Roadmap was declassified by the Pentagon because of a Freedom of Information Act request by the National Security Archive at George Washington University....

This document defined information operations as follows: "The integrated employment of the core capabilities of Electronic Warfare, Computer Network Operations, Psychological Operations, Military Deception and Operations Security, in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decisions-making while protecting our own." - 22
The following series of articles will examine the Pentagon's intention of gaining full spectrum dominance in information warfare. Including, dominating the electro-magnetic spectrum and fighting the internet. Also on the use of psychological operations or PSYOP as defined by the Information Operation Roadmap...

Information Operation Roadmap Part 2: Maximum Control of the Entire Electro-Magnetic Spectrum

Information Operation Roadmap Part 3: "We Must Fight the Net"
The 2003 Pentagon document entitled the Information Operation Roadmap was released after a Freedom of Information Request by the National Security Archive at George Washington University in 2006...

Fighting the Net
"We Must Fight the Net. DoD [Department of Defense] is building an information-centric force. Networks are increasingly the operational center of gravity, and the Department must be prepared to "fight the net." " - p.6
"DoD's "Defense in Depth" strategy should operate on the premise that the Department will "fight the net" as it would a weapons system." - p.13...
"Control of space and cyberspace. Much as control of the high seas - and the protection of international commerce - defined global powers in the past, so will control of the new "international commons" be a key to world power in the future. An America incapable of protecting its interests or that of its allies in space or the "infosphere" will find it difficult to exert global political leadership."-p. 51
"Although it may take several decades for the process of transformation to unfold, in time, the art of warfare on air, land, and sea will be vastly different than it is today, and "combat" likely will take place in new dimensions: in space, "cyber-space," and perhaps the world of microbes." - p.60

Internet 2
Part of the Information Operation Roadmap's plans for the internet are to "ensure the graceful degradation of the network rather than its collapse." p.45...

Information Operation Roadmap Part 4: Information Warfare Using Aggressive Psychological Operations

Information Operation Roadmap Part 5: Information Warfare Without Limits

Your Govt. Cares, Listens and Watches Over You Around the Clock, Everywhere
Tim Shorrock
A new U.S. intelligence institution will allow government spy agencies to [digest note: legally] conduct broad surveillance and reconnaissance inside the country for the first time. Contractors like Boeing, BAE Systems, Harris Corporation, L-3 Communications and Science Applications International Corporation are already lining up for possible work...The plan for the NAO builds on a domestic security infrastructure that has been in place for at least seven years... intelligence and reconnaissance agencies that were historically confined to spying on foreign countries have been used extensively on the home front since 2001.... In addition to the powerful mapping and signals tools provided by the NGA and the NSA, domestic agencies will also have access to measures and signatures intelligence (MASINT) managed by the Defense Intelligence Agency (DIA), the principal spying agency used by the secretary of defense and the Joint Chiefs of Staff. ... a software package called SOCET GXP uses Google Earth software as a basis for creating three-dimensional maps that U.S. commanders and soldiers use to conduct intelligence and reconnaissance missions. Eric Bruce, one of the BAE employees back from the Middle East, said his team trained U.S. forces to use the GXP software “to study routes for known terrorist sites” ... Another new BAE tool displayed in San Antonio was a program called GOSHAWK, which stands for “Geospatial Operations for a Secure Homeland – Awareness, Workflow, Knowledge.” It was pitched by BAE as a tool to help law enforcement and state and local emergency agencies prepare for, and respond to, “natural disasters and terrorist and criminal incidents.”... BAE was broadcasting that it is not simply a contractor for agencies involved in foreign intelligence, but has an active presence as a supplier to domestic security agencies, a category that includes the Department of Homeland Security (DHS), the FBI as well as local and state police forces stretching from Maine to Hawaii....“To ensure freedom in the world, the United States continues to address the challenges introduced by terrorism,” a Boeing handout said. Its new software, the company said, will allow information to be “shared efficiently and uninterrupted across intelligence agencies, first responders, military and world allies.”...
The NGA was also used extensively during Hurricane Katrina , when the agency provided overhead imagery -- some of it supplied by U-2 photoreconnaissance aircraft -- to federal and state rescue operations. The data, which included mapping of flooded areas in Louisiana and Mississippi, allowed residents of the stricken areas to see the extent of damage to their homes and helped first-responders locate contaminated areas as well as schools, churches and hospitals that might be used in the rescue.... In every situation that the NGA is used domestically, it must receive a formal request from a lead domestic agency, according to agency spokesperson David Burpee. That agency is usually FEMA, a unit of DHS.

Wider Spying Fuels Aid Plan for Telecom Industry
The United States intelligence agencies in cahoots with major telecom providers are intercepting and reviewing your communications. This is occurring without warrants. For months, the Bush administration has waged a high-profile campaign, including personal lobbying by President Bush and closed-door briefings by top officials, to persuade Congress to pass legislation protecting companies from lawsuits for aiding the National Security Agency’s warrantless eavesdropping program. But the battle is really about something much bigger. At stake is the federal government’s extensive but uneasy partnership with industry to conduct a wide range of secret surveillance operations in fighting terrorism and crime[SIC] . The N.S.A.’s reliance on telecommunications companies is broader and deeper than ever before, according to government and industry officials, yet that alliance is strained by legal worries and the fear of public exposure. “The intelligence community cannot go it alone,” Mike McConnell, the director of national intelligence, wrote in a New York Times Op-Ed article Monday urging Congress to pass the immunity provision. “Those in the private sector who stand by us in times of national security emergencies deserve thanks, not lawsuits.” Attorney General Michael B. Mukasey echoed that theme in an op-ed article of his own in The Los Angeles Times on Wednesday, saying private companies would be reluctant to provide their “full-hearted help” if they were not given legal protections. The government’s dependence on the phone industry, driven by the changes in technology and the Bush administration’s desire to expand surveillance capabilities inside the United States, has grown significantly since the Sept. 11 attacks. The N.S.A., though, wanted to extend its reach even earlier. In December 2000, agency officials wrote a transition report to the incoming Bush administration, saying the agency must become a “powerful, permanent presence” on the commercial communications network, a goal that they acknowledged would raise legal and privacy issues....http://www.informationclearinghouse.info/article18916.htm

Big Brother Really Is Watching:
Homeland Security is bankrolling futuristic profiling technology to nab terrorists before they strike.

Top Intel official: Change your definition of privacy
As Congress debates new rules for government eavesdropping, a top intelligence official says it is time that people in the United States changed their definition of privacy. Privacy no longer can mean anonymity, says Donald Kerr, the principal deputy director of national intelligence. Instead, it should mean that government and businesses properly safeguard people's private communications and financial information. [...]

Economic Forum moves to YouTube
Climate change topped the agenda as well as pursuing a workable peace process in the Middle East and how technology is ushering in a new age of social networking that knows no border. Interest has been strong, with more than 1 million hits registered on the YouTube site and hundreds of video replies. And as forum attendees - CEOs, academics or even astronauts - walk by, they are stopping to record quick messages or reply to questions left on the Web site.
Besides Spellings, they include Henry Kissinger and Rajendra Pachauri, the chief U.N. climate scientist who is chairman of the Intergovernmental Panel on Climate Change. Plus at least one attendee who is no stranger to multimedia or video. "Hello! My name is Bono. I'm a rock star ... sort of!" the U2 singer said. "In 2008, if we're able to get anywhere on the fight against extreme poverty or the climate crisis, we have to prove that we can keep the promises that we've already made."
Ed Sanders, who oversees international product marketing for YouTube in Europe, the Middle East and Africa, called the set-up a "tremendous means to get interaction going and to give people a voice... "It's something we want to do long term."..."That's their world and that's how you can communicate with them," she told The Associated Press. "It's through a medium like YouTube and blogs and those sorts of things." http://youtube.com/user/thedavosquestion

Naquin addressed the Central Intelligence Retirees' Association October 3, 2007. The text of his remarks is at http://www.fas.org/irp/eprint/naquin.pdf

The DNI Open Source Center, which gathers, translates, analyzes, and distributes unclassified open source intelligence from around the world, is steadily growing in capability and impact, according to Doug Naquin, the Center's Director. The Open Source Center, which replaced the CIA's Foreign Broadcast Information Service, is doing more analysis and outreach than it predecessor and is also exploring new media, said Mr. Naquin in a recent speech. "We're looking now at YouTube, which carries some unique and honest-to-goodness intelligence," he said. "We have groups looking at what they call 'Citizens Media': people taking pictures with their cell phones and posting them on the Internet. Then there's Social Media, phenomena like MySpace and blogs.... A couple years back we identified Iranian blogs as a phenomenon worthy of more attention, about six months ahead of anybody else."...

NYT fear-mongers and liars....
Thieves Winning Online War, Maybe in Your PC
Internet security is broken, and nobody seems to know quite how to fix it. Despite the efforts of the computer security industry and a half-decade struggle by Microsoft to protect its Windows operating system, malicious software is spreading faster than ever. The so-called malware surreptitiously takes over a PC and then uses that computer to spread more malware to other machines exponentially. Computer scientists and security researchers acknowledge they cannot get ahead of the onslaught. With vast resources from stolen financial information, cyberattackers are winning a technology arms race. Many Internet executives fear that basic trust in what has become the foundation of 21st century commerce is rapidly eroding. “There’s an increasing trend to depend on the Internet for a wide range of applications, many of them having to deal with financial institutions,” said Vinton G. Cerf, one of the original designers of the Internet, who is now Google’s “chief Internet evangelist.”...
The United States government has begun to recognize the extent of the problem. In January, President Bush signed National Security Presidential Directive 54, establishing a national cybersecurity initiative. The plan, which may cost more than $30 billion over seven years, is directed at securing the federal government’s own computers as well as the systems that run the nation’s critical infrastructure, like oil and gas networks and electric power and water systems. That will do little, however, to help protect businesses and consumers who use the hundreds of millions of Internet-connected personal computers and cellphones, the criminals’ newest target.
Despite new technologies that are holding some attackers at bay, several computer security experts said they were worried that the economic downturn will make computer security the first casualty of corporate spending cuts. Security gets hit because it is hard to measure its effectiveness, said Eugene Spafford, a computer scientist at Purdue University. He is pessimistic. “In many respects, we are probably worse off than we were 20 years ago,” he said, “because all of the money has been devoted to patching the current problem rather than investing in the redesign of our infrastructure.”(emphasis added)

with a little help from his friends? this article is silent about U.S. 'war on the net' and internet 2 development
Berlusconi plans to use G8 presidency to 'regulate the internet'
By Chris Williams
Italian president and media baron Silvio Berlusconi said today that he would use his country's imminent presidency of the G8 group to push for an international agreement to "regulate the internet".Speaking to Italian postal workers, Reuters reports Berlusconi said: "The G8 has as its task the regulation of financial markets... I think the next G8 can bring to the table a proposal for a regulation of the internet."

Soft power 'pro-democracy' NGOs partner with the state to 'fight terrorism'
U.S. government taps Facebook, Google, MTV to "Fight Terrorism
Global Research, November 28, 2008
The US State Department announced plans on Monday to promote online youth groups as a new and powerful way to fight crime, political oppression and terrorism.
Drawing inspiration from a movement against FARC rebels in Colombia, the State Department is joining forces with Facebook, Google, MTV, Howcast and others in New York City next week to get the "ball rolling."
It said 17 groups from South Africa, Britain and the Middle East which have an online presence like the "Million Voices Against the FARC" will attend a conference at Columbia University Law School from December 3-5.
Observers from seven organizations that do not have an online presence -- such as groups from Iraq and Afghanistan -- will attend. There will also be remote participants from Cuba.

They will forge an "Alliance of Youth Movement," said James Glassman, under secretary of state for public diplomacy. "The idea is put all these people together, share best practices, produce a manual that will be accessible online and in print to any group that wants to build a youth empowerment organization to push back against violence and oppression around the world," he told reporters.The conference will be streamed by MTV and Howcast, he said.

The list of organizations due to attend include the Burma Global Action Network, a human rights movement spurred into action by the ruling junta's crackdown on monks and other pro-democracy protesters last year. There is also Shabab 6 of April, which has emerged as Egypt's largest pro-democracy youth group, and Invisible Children, which spotlights atrocities committed by the Lord's Resistance Army in Uganda, Glassman said.
Others include Fight Back, which fights domestic violence in India, the Save Darfur Coalition, as well as One Million Voices Against Crime in South Africa, said Jared Cohen, from the secretary's policy planning staff. Also attending will be People's March Against Knife Crime from Britain and Young Civilians from Turkey. Cohen said Young Civilians is a human rights and pro-democracy organization which works online but has brought thousands of protesters into the streets of Turkey. Glassman said the State Department is providing about 50,000 dollars in order to help bring delegates from the groups to the U.S.

Unthinkable: How the Internet could become a tool of corporate and government power, based on updates now in the works
Christoph Niemann for Newsweek International Issues 2004
By Steven Levy
Picture, if you will, an information infrastructure that encourages censorship, surveillance and suppression of the creative impulse. Where anonymity is outlawed and every penny spent is accounted for. Where the powers that be can smother subversive (or economically competitive) ideas in the cradle, and no one can publish even a laundry list without the imprimatur of Big Brother. Some prognosticators are saying that such a construct is nearly inevitable. And this infrastructure is none other than the former paradise of rebels and free-speechers: the Internet. ... wasn’t the Internet supposed to be the defining example of empowering technology? Freedom was allegedly built into the very bones of the Internet, designed to withstand nuclear blasts and dictatorial attempts at control. ...
Certainly John Walker believed all that. The hackerish founder of the software firm Autodesk, now retired to Switzerland to work on personal projects of his choosing, enjoyed “unbounded optimism” that the Net would not only offset the powers of industry and government but actually restore some previously threatened personal liberties. But in —the past couple of years, he noticed a disturbing trend. Developments in technology, law and commerce seemed to be directed toward actually changing the open nature of the Net. And Internet Revisited would create opportunities for business and government to control and monitor cyberspace... Walker posted his fears in a web document called
The Dangers of Digital Imprimatur http://www.fourmilab.ch/documents/digital-imprimatur/ The name refers to his belief that it’s possible that nothing would be allowed to even appear on the Internet without having a proper technical authorization....

A concurrent step would be the adoption of “trusted computing,” a system by which not only people but computer programs would be stamped with identifying marks. Those would link with certificates that determine whether programs are uncorrupted and cleared to run on your computer.

The best-known implementation of this scheme is the work in progress at Microsoft known as Next Generation Secure Computing Base (formerly called Palladium). It will be part of Longhorn, the next big Windows version, out in 2006. Intel and AMD are onboard to create special secure chips that would make all computers sold after that point secure... The giants of Internet commerce are eager to see this happen. “The social, economic and legal priorities are going to force the Internet towarsecurity,” says Stratton Sclavos, CEO of VeriSign, a company built to provide digital certificates (it also owns Network Solutions, the exclusive handler of the “dot-com” part of the Internet domain-name system). “It’s not going to be all right not to know who’s on the other end of the wire.” Governments will be able to tax e-commerce—and dictators can keep track of who’s saying what.

Walker isn’t the first to warn of this ominous power shift. The Internet’s pre-eminent dean of darkness is Lawrence Lessig, the Stanford University guru of cyberlaw. Beginning with his 1999 book “Code and Other Laws of Cyberspace,” Lessig has been predicting that corporate and regulatory pressures would usurp the open nature of the Net, and now says that he has little reason to retract his pessimism. Lessig understands that restrictive copyright and Homeland Security laws give a legal rationale to “total control,” and also knows that it will be sold to the people as a great way to stop thieves, pirates, malicious hackers, spammers and child pornographers. “To say we need total freedom isn’t going to win,” Lessig says.[...]

from the Summary and Conclusion of John Walker's The Dangers of Digital Imprimatur
The Dangers of Digital Imprimatur
How big brother and big media can put the Internet genie back in the bottle.
by John Walker
September 13th, 2003 Revision 4 — November 4th, 2003

Global Internet,
Once a spring of liberty,
Autumn chill so near.
... Over the last three decades the Internet has evolved from a research tool linking a handful of elite sites into a global mass medium. Its rapid, and often reactive, evolution has resulted in a present day architecture widely perceived as inadequate to hold users accountable for their actions, ]providing unwarranted anonymity to disruptive and destructive actors, and placing intellectual property at risk in disregard of applicable law and with impunity to its sanctions. A collection of technologies in various states of design, development, and deployment promises to remedy these perceived shortcomings of the Internet. If implemented and extrapolated to their logical conclusion, the result will be an Internet profoundly different from today's ...Measured relatively, this individual empowerment comes at the expense of the power of governments and large commercial enterprises, thereby reversing a trend toward concentration of power more than a century old which has acted to reduce free citizens and productive individuals to mere subjects and consumers.
Power, especially concentrated power, is rarely relinquished willingly.
Each technology proposed to ameliorate supposed problems with present-day computing and network architectures must be carefully examined, individually and in conjunction with others, for the potential it holds to shift the balance of power... to supplant the peer architecture of the Internet with a producer/consumer model more comparable to publishing and broadcasting. Technologies should also be evaluated for the potential they have to create (or restore) central points of control in the flow of information and interaction among individuals; to impose hierarchy upon a structure designed for equality.... The components of this emerging architecture are already on the table, and various players are beginning to explore how they fit together into a whole. In this paper, I've tried to acquaint you with the basics of these components, show how each can be promoted on its obvious merits as the solution to widely-perceived problems, then sketch the possible implications, some of them dire, which may result as these components are used in combinations and to ends those advocating them seldom discuss...

Whatever solutions are adopted (or not adopted--one may rationally choose to live with problems if the solutions are worse), are likely to be with us for a long time. Whether they preserve the essential power of the Internet and its potential to empower the individual or put the Intenet genie back into the bottle at the behest of government and media power centres who perceive it as a threat will be decided over the next few years. That decision will determine whether the long dawn of the Internet was, itself, a false dawn, or will continue to brighten into a new day for humanity.

“Trusted Computing”