6/15 CYBER WAR: Why InfoOps. is key to U.S. "Full Spectrum Dominance"

digest note:
As promised in part 1 [6/9 The Angola 3: Unrepentant Black Revolutionaries & U.S. Communication War, http://www.burbankdigest.com/node/355] part 2 is a brief overview of the U.S. national security state Cyber War which underpins its other 4 war domains (land, sea, space and air) to achieve full-spectrum global dominance. This war on the net and all communications systems, including psychological warfare (psyops) is preemptive, against potential enemies -'us' worldwide - as well as capitalist rivals, mainly China, and the anti-imperialist resistance defeating its expanding covert and genocidal 'humanitarian' wars on every continent.
We are drowning in 24/7 Info. Ops. lies - every 'news' story serves specific propaganda purpose because the doomed US juggernaut for global supremacy demands massive, relentless lies: amerika's 'success' in the midst of defeat; bogus threats for public intimidation and fear to whip up patriotic loyalty; lies blaming all who resist its state terror for 'violence'; lies to 'justify' unprecedented crimes, and as pretexts to keep expanding fascist state control. The 'war on the net' to eliminate the internet as we know and use it: for control of all our information and communication. Internet 2 architecture is already operative, total 'trusted, secure' computing an ongoing a work in progress. Still most liberal pundits, by limiting their criticism to legal 'improprieties' of various separate pieces of this systemic, transparently fascist pie, are 'left gatekeepers' helping to keep us 'hopeful',ignorant, pacified and complicit in this monstrous world war for the future of humanity and the planet.

“Our national security strategy is focused on renewing American leadership so that we can more effectively advance our interests in the 21st century. We will do so by building on the sources of our strength at home, while shaping an international order that can meet the challenges of our time.”
2010 National Security Strategy
Just as U.S. national security is built upon maintaining strategic advantages, it is also increasingly predicated on active U.S. leadership of alliance and coalition efforts in peacetime, crisis, and conflict. The United States will retain leadership in space by strengthening our posture at home and collaborating with others worldwide.

"Information Operations Roadmap" for "Full Spectrum Dominance"
US plans to 'fight the net' revealed
By Adam Brookes, BBC Pentagon correspondent
1/27/06 http://news.bbc.co.uk/2/hi/americas/4655196.stm
[Information Operations Roadmap Most computers will open PDF documents automatically, but you may need to download Adobe Acrobat Reader. Download the reader here]

A newly declassified document gives a glimpse into the US military's plans for "information operations" - from psychological operations, to attacks on hostile computer networks.
The document says computer and telecommunications networks are "critical to military success". From influencing public opinion through new media to designing "computer network attack" weapons, the US military is learning to fight an electronic war. The declassified document called "Information Operations Roadmap" was obtained by the National Security Archive at George Washington University using the Freedom of Information Act. Officials in the Pentagon wrote it in 2003. The Secretary of Defense, Donald Rumsfeld, signed it...
Perhaps the most startling aspect of the roadmap is its acknowledgement that information put out as part of the military's psychological operations, or Psyops, is finding its way onto the computer and television screens of ordinary Americans..."Psyops messages will often be replayed by the news media for much larger audiences, including the American public,"...
Psyops personnel "support" the U.S. government's international broadcasting. It singles out TV Marti - which broadcasts to Cuba - as receiving such support.
It recommends that a global website be established to support America's strategic objectives. But no American diplomats here, thank you. The website would use content from "third parties with greater credibility to foreign audiences than US officials". [digest: starring U.S. 'human rights/democracy' NGOs and social media]
'Fight the Net": Strategy should be based on the premise the Department [of Defense] will 'fight the net' as it would an enemy weapons system".Bloggers beware.
US digital ambition: in a grand finale, the document recommends the US should seek the ability to "provide maximum control of the entire electromagnetic spectrum". US forces should be able to "disrupt or destroy the full spectrum of globally emerging communications systems, sensors, and weapons systems dependent on the electromagnetic spectrum".
Consider that for a moment The US military seeks the capability to knock out every telephone, every networked computer, every radar system on the planet. ...

NSA "perfect Citizen' to monitor cyberthreats
A new cybersecurity system to be launched by the National Security Agency is called Perfect Citizen...NSA would insert sensors in computer networks that would be programmed to alert officials to activity that could portend a cyberattack... information gathered by Perfect Citizen could have applications beyond the critical infrastructure sector as a data bank that would help companies and agencies calling on NSA for help with investigations of cyber attacks, as Google did when it sustained a major attack late last year...The classified program is being expanded with funding from the multibillion-dollar Comprehensive National Cybersecurity Initiative started at the end of the Bush administration and continued by the Obama administration...

Clinton to Congress: "We are Losing the Information War"
3/8/11 http://blog.heritage.org/?p=53976
News flash: “We are in an information war, and we’re losing that war.”

surpassing Orwellian 'ministry of truth'
Bill Clinton: Create Federal Internet Agency
Bill Clinton doesn’t like all the misinformation and rumors floating on the Internet. And he thinks the US government or the UN should create an agency to do something about it. Let’s say the U.S. did it, it would have to be an independent federal agency no president could countermand or anything else because people wouldn’t think you were just censoring the news and giving a different falsehood out,” Clinton said, Interviewed alongside the CEO of a cybersecurity company

US Military Steps Up Cyber Propaganda War
US military personnel use of fake profiles in online chat rooms would use social media to spread positive messages about the United States... the Pentagon says is to counter violent extremist and enemy ideologies...

4/15/11 President Obama Releases National Strategy for Trusted Identities in Cyberspace
The White House Blog http://www.whitehouse.gov/blog/2011/04/15/president-obama-releases-natio...
NSTIC envisions a private sector led effort to create a new infrastructure for the Internet, built on interoperable, privacy-enhancing, and secure identity credentials... posted by Howard A. Schmidt, Cybersecurity Coordinator and Special Assistant to the President

US Pentagon to treat cyber-attacks as 'acts of war'
5/31/11 http://www.bbc.co.uk/news/world-us-canada-13614125
...The planning was given added urgency by a cyber-attack last month on the defence contractor, Lockheed Martin."A response to a cyber-incident or attack on the US would not necessarily be a cyber-response. All appropriate options would be on the table," Pentagon spokesman Colonel Dave Lapan told reporters...
The Pentagon's planning follows an international strategy statement on cyber-security, issued by the White House on 16 May. The US would "respond to hostile acts in cyberspace as we would to any other threat to our country", stated the White House in plain terms. "We reserve the right to use all necessary means - diplomatic, informational, military, and economic - as appropriate and consistent with applicable international law, in order to defend our nation, our allies, our partners and our interests."...
The US is also accused of using cyber warfare against other nations... the Stuxnet worm aimed at controlling systems in Iranian nuclear plants....

Obama Cybersecurity Plan...
“Trusted, secure networks are now the foundation of our nation’s infrastructure” said Phil Bond, chief executive of TechAmerica, the Washington-based technology industry association...The administration’s focus on a partnership between the government and the private sector is key since “the private sector owns or operates the vast majority of our nation’s critical infrastructure.”....

'Trusted, secure', 'accepted': by & for the ruling class
Trust and Trusted Computing Platforms - 2011funded research and development center sponsored by the U.S. Department of Defense. .... based trusted computing platforms with proposed strategies ..... Issues of infrastructure security and use of the TPM are only a small ....can provide only ..." www.cert.org/archive/pdf/11tn005.pdf
Trust Platform Module / TPM is a hardware chip to enhance the level of trust that one has in certain aspects of computing systems and networks.
Abstract: Hardware-based trusted computing platforms are intended to overcome many of the problems of trust prominent in computing systems. In this paper, a result of the Software Engineering Institute’s Independent Research and Development Project “Trusted Computing in Adversarial Environments: Using Trusted Hardware as a Foundation for Cyber Security,” we discuss the capabilities and limitations of the Trusted Platform Module (TPM). We describe credential storage, device identity, chains of trust, and other techniques for extending hardware-based trust to higher levels of software-based infrastructure. We then examine the character of trust and identify strategies for increasing trust. We show why acceptance of TPM-based trust has been limited to date and suggest that broader acceptance will require more focus on traditional trust issues and on end-to-end services.

Center for Information assurance and security
"Internet gives U.S. the leading edge in development and use of ... Internet technology ... social infrastructure must catch ... development solutions for trusted computing devices. ... cyber terrorism... to identify key network components based on traffic ..."
Security requirements research: characterizes the security requirements within each of the eight critical infrastructure sectors identified in Presidential Decision Directive 63. This research recognizes that the U.S. has long depended on its critical infrastructures for the delivery of services and products vital to its defense, prosperity, safety and general welfare. In the past, owners and operators of these infrastructures have planned against and responded to service disruptions caused by technical failures and natural disasters. However, there are emerging trends that introduce new threats. These include the use of higher levels of automation and remote control, increasing dependency on public networks (especially internet-based remote management systems), and the use of Commercial-Off-The-Shelf (COTS) Personal Computers (PCs) in automation systems combined with custom software. The increase in dependencies and connectivity between information systems has increased the likelihood that individuals or groups may attack and disrupt our infrastructures. Further, the growing dependence on information systems and networks to operate those infrastructures has expanded the number of ways non-deliberate system failures can occur. It is therefore desirable that sectors of the critical infrastructures work together to develop a common set of specific security requirements to establish a set of "best practices". This research will develop a common framework by which the security requirements of all information systems can be characterized. The center brings important science and technological expertise to the problems of information assurance and security.

US Military Steps Up Cyber Propaganda War
US military personnel use of fake profiles in online chat rooms would use social media to spread positive messages about the United States... the Pentagon says is to counter violent extremist and enemy ideologies...

Cybersecurity camp part of nationwide effort to train 10,000 experts
7/25/10 http://www.dailynews.com/news/ci_15600828

New Authorization of Worldwide War Without End? Hidden Executive War Power
http://www.aclu.org/blog/national-security/unchecked-executive-war-power... http://www.aclu.org/new-authorization-worldwide-war-without-end
Tucked inside the National Defense Authorization Act, being marked up by the House Armed Services Committee this week hasn't been getting a lot of attention — a new authorization for worldwide war... The current authorization of war provided the constitutional authority for the executive branch to go to war in Afghanistan. Subsequently, it has been invoked by the executive branch much more broadly to use military force elsewhere, to justify torture and abuse of detainees, to eavesdrop and spy on American citizens without warrants, and to imprison people captured far from any battlefield without charge or trial....Before Congress this week, the proposed authorization of a worldwide war goes much further allowing a president to use military force wherever terrorism suspects are present in the world, regardless of whether there has been any harm to U.S. citizens, or any attack on the United States, or any imminent threat of an attack. The legislation is broad enough to permit a president to use military force within the United States and against American citizens. The legislation contains no expiration date, and no criteria to determine when a president’s authority to use military force would end.

"Information Operations (INFOOPS); influence operations, social media exploitation, new media development."
The Fire This Time. Pentagon Ramps-Up Cyberwar
By Tom Burghardt Antifascist Calling..., June 12, 2011
As the Obama administration expands Bush-era surveillance programs over the nation's electronic communications' infrastructure, recent media reports provide only hints of Pentagon plans for waging cyberwar against imperialism's geopolitical rivals. May 31, The Wall Street Journal disclosed the Pentagon now asserts "that computer sabotage coming from another country can constitute an act of war, a finding that for the first time opens the door for the U.S. to respond using traditional military force."
Also May 31, The Washington Post reported America's shadow warriors have "developed a list of cyber-weapons and -tools, including viruses that can sabotage an adversary's critical networks, to streamline how the United States engages in computer warfare." That "classified list of capabilities has been in use for several months," with the approval of "other agencies, including CIA." Post reporter Ellen Nakashima informed us this "sensitive program ... forms part of the Pentagon's set of approved weapons or 'fires' that can be employed against an enemy."... "Military cyber-warriors...can also, without presidential authorization, leave beacons to mark spots for later targeting by viruses,"... precisely the types of covert actions decried by politicians, media commentators and assorted experts when directed against the heimat ...
the Pentagon propaganda blitz is neither meant to inform nor educate the public but to conceal the essential fact: the US is already engaged in hostile cyber operations against geopolitical rivals--and allies--and have been since the 1990s, if not earlier, as Nicky Hager revealed when he blew the lid off NSA's Echelon program in his1997 piece for CovertAction Quarterly.
Just last week, former Democratic party congressional hack, current CIA Director and Obama's nominee to lead the Defense Department, Leon Panetta, told the Senate Armed Services Committee "the next Pearl Harbor that we confront could very well be a cyberattack that cripples America's electrical grid and its security and financial systems" ... the Defense Department is seeking the technological means to do just that... as The Guardian reported, with the "underground world of computer hackers ... so thoroughly infiltrated by the FBI and Secret service," will some enterprising criminal acting as a catspaw for U.S. handlers, gin-up an incident thereby creating Panetta's "cyber Pearl Harbor" as a pretext for a new war?....

Back in February, The Tech Herald revealed that the private security firms HBGary Federal, HBGary, Palantir Technologies and Berico Technologies were contacted by the white shoe law firm Hunton & Williams on behalf of corporate clients, Bank of America and the U.S. Chamber on Commerce, to "develop a strategic plan of attack against Wikileaks." The scheme concocted by "Team Themis" was to include a dirty tricks campaign targeting journalists, WikiLeaks supporters, their families and the whistleblowing group itself through "cyber attacks, disinformation, and other potential proactive tactics. But when the CEO of HBGary Federal boasted to the Financial Times that he had penetrated the cyber-guerrilla collective Anonymous, the group struck back and pwned ("owned") HBGary's allegedly "secure" servers, seizing a treasure trove of some 70,000 internal emails and other documents, posting them on the internet.
As I reported earlier this year, Team Themis looked like a smart bet. After all, HBGary and the other firms touted themselves as "experts in threat intelligence and open source analysis" with a focus on "Information Operations (INFOOPS); influence operations, social media exploitation, new media development."

Palantir, fronted millions of dollars by the CIA's venture capitalist arm, In-Q-Tel, bragged they could deliver "the only platform that can be used at the strategic, operational, and tactical levels within the US Intelligence, Defense, and Law Enforcement Communities," and can draw "in any type of data, such as unstructured message traffic, structured identity data, link charts, spreadsheets, SIGINT, ELINT, IMINT and documents."
In other words, these firms subsisted almost entirely on U.S. government contracts and, in close partnership with mega-giant defense companies such as General Dynamics, SRA International, ManTech International and QinetiQ North America, were actively building cyber weapons for the Defense Department.

In the aftermath of the HBGary sting, investigative journalist Nate Anderson published an essential piece for Ars Technica which described how HBGary and other firms were writing "backdoors for the government." "In 2009," Anderson wrote, "HBGary had partnered with the Advanced Information Systems group of defense contractor General Dynamics to work on a project euphemistically known as 'Task B.' The team had a simple mission: slip a piece of stealth software onto a target laptop without the owner's knowledge."
HBGary's CEO Greg Hoglund's "special interest," Anderson reported, "was in all-but-undetectable computer 'rootkits,' programs that provide privileged access to a computer's innermost workings while cloaking themselves even from standard operating system functions. A good rootkit can be almost impossible to remove from a running machine--if you could even find it in the first place. The secret-shredding web site Public Intelligence published HBGary's 2008 paper, Windows Rootkit Analysis Report. Amongst the nuggets buried within its 243 pages we learned that Hoglund suggested to his secret state - corporate clients that "combining deployment of a rootkit with a BOT makes for a very stealth piece of malicious software."

2008 article published in the influential Armed Forces Journal advocated precisely that. Col. Charles W. Williamson III's piece, "Carpet Bombing in Cyberspace," advocated "building an af.mil robot network (botnet) that can direct such massive amounts of traffic to target computers they can no longer communicate and become no more useful to our adversaries than hunks of metal and plastic." It would appear the HBGary and General Dynamics project would combine the stealthy features of a rootkit along with the destructive capabilities of a botnet.
One can only presume that defense firms are building malware and other attack tools for the Defense Department, the CIA, the National Security Agency and USCYBERCOM, and that they constitute the short list of "approved weapons or 'fires'" alluded to by The Washington Post.

A 2009 HBGary contract proposal released by Public Intelligence, DoD Cyber Warfare Support Work Statement, disclosed that the "contract will include efforts to examine the architecture, engineering, functionality, interface and interoperability of Cyber Warfare systems, services and capabilities at the tactical, operational and strategic levels, to include all enabling technologies." The firm proposed an "operational exercise design and construction," as well as "operations and requirements analysis, concept formulation and development, feasibility demonstrations and operational support. "This will include...efforts to analyze and engineer operational, functional and system requirements in order to establish national, theater and force level architecture and engineering plans, interface and systems specifications and definitions, implementation, including hardware acquisition for turnkey systems."
Under terms of the contract, the company will "perform analyses of existing and emerging Operational and Functional Requirements at the force, theater, Combatant Commands (COCOM) and national levels to support the formulation, development and assessment of doctrine, strategy, plans, concepts of operations, and tactics, techniques and procedures in order to provide the full spectrum of Cyber Warfare and enabling capabilities to the warfighter." ...during an early roll-out of the Pentagon's cyber panic product line five years ago,
Dr. Lani Kass, former Israeli Air Force major, acolyte of war criminals Dick Cheney and Donald Rumsfeld, who directs the Air Force Cyber Space Task Force under Bush and Obama... in her 2006 presentation "A Warfighting Domain: Cyberspace", Kass asserted "the electromagnetic spectrum is the maneuver space. Cyber is the United States' Center of Gravity -- the hub of all power and movement, upon which everything else depends. It is the Nation's neural network...Cyber superiority is the prerequisite to effective operations across all strategic and operational domains--securing freedom from attack and freedom to attack." Accordingly, she informed her Air Force audience, "Cyber favors the offensive," and that the transformation of a militarized internet into a "warfighting domain" will be accomplished by "Strategic Attack directly at enemy centers of gravity; Suppression of Enemy Cyber Defenses; Offensive Counter Cyber; Defensive Counter Cyber; Interdiction."

In the years since, such plans are well underway. In another leaked file, Public Intelligence disclosed that HBGary, again in partnership with General Dynamics, are developing "a software tool, which provides the user a command line interface, that will enable single file, or full directory exfiltration over TCP/IP."mCalled "Task Z," General Dynamics "requested multiple protocols to be scoped as viable options, and this quote contains options for VoIP (Skype) protocol, BitTorrent protocol, video over HTTP (port 80), and HTTPS (port 443)."...

And, as the administration builds upon and quietly expands previous government programs that monitor the private communications... our "change" regime will demand software and communication providers build backdoors accessible to law enforcement and intelligence agencies [ed: increasingly merged in 'Fusion Centers']. Such backdoors enable spooks trolling "encrypted e-mail transmitters like BlackBerry, social networking Web sites like Facebook and software that allows direct 'peer to peer' messaging like Skype to intercept and unscramble encrypted messages." ... the technological "fixes" like HBGary, General Dynamics and other defense contractors are actively building as secret state security partners....

The Fire This Time
While denouncing China, Russia and other capitalist rivals over cyber espionage and alleged hacking escapades, the deployment of digital weapons of mass destruction against selected adversaries is an essential feature of Pentagon targeting profiles, now been fully integrated into overall U.S. strategic military doctrine....hardly the stuff of wild speculation considering evidence that last year's attack on Iran's civilian nuclear program via the highly-destructive Stuxnet worm was a joint U.S.-Israeli operation...
U.S. Cyber Command (USCYBERCOM) directed by NSA Director, Gen. Keith Alexander is "a sub-unified command subordinate to U. S. Strategic Command," charged with running space operations, information warfare, missile defense, global command, control, intelligence, surveillance and reconnaissance (C4ISR), global strike and strategic deterrence; the trigger finger on America's first-strike nuclear arsenal.

US National Security Information Operations: Obama’s Bin Laden Kill Sets Precedent
MAY 10, 2011, by John Stanton, Virginia based writer specializing in national security and political matters
Excerpt: Though the original version of the Bin Laden story continues to crumble, it was wildly successful in stimulating US nationalism through the media’s constant repetition of the matter.
According to Army Special Operations Forces Unconventional Warfare, September 2008, “Information is a strategic resource vital to national security. Dominance of the information environment is a reality that extends to the armed forces of the United States at all levels. Military operations, in particular, are dependent upon many simultaneous and integrated activities that, in turn, depend upon information and information systems, which the United States must protect…With the free flow of information present in all theaters, such as TV, phone, and Internet, conflicting messages can quickly emerge to defeat the intended effects. As a result, continuous synchronization and coordination between Information Operations, Public Affairs, Public Diplomacy, and U.S. allies is imperative. It also helps to ensure that information themes employed during operations involving neutral or friendly populations remain consistent.”[...]

1/23/08 Are You a Homegrown Terrorist?
John Whitehead, http://www.huffingtonpost.com/john-w-whitehead/are-you-a-homegrown-terro...
[NB: Jane Harman's 'Violent Radicalization and Homegrown Terrorism Prevention Act of 2007' based on RAND Corp. 'study' didn't become official law per se but is operative through many other fascist measures and systemic media propaganda in the name of 'national security' - for USraeli global domination/eretz israe]
Congresswoman Jane Harman (D-Calif.) who introduced the the Violent Radicalization and Homegrown Terrorism Prevention Act of 2007, has a long and productive relationship with the RAND Corporation think tank with close ties to the military-industrial-intelligence complex. "Trends in Terrorism," a 2005 study by RAND, contains a chapter titled "Homegrown Terrorist Threats to the United States." In that study, RAND maintains that "homegrown terrorism" will come from anti-globalists and radical environmentalists who "challenge the intrinsic qualities of capitalism." RAND also claims that anti-globalists and radical environmentalists "exist in much the same operational environment as al Qaida" and pose "a clear threat to private-sector corporate interests, especially large multinational business." Any thought, speech or action that threatens corporate hegemony and profit under this law - however protected it might be by the Bill of Rights - could be considered an act of homegrown terrorism... not unlike the government's 1950s McCarthy Red Scare tactics when thousands of Americans were accused of being communists or communist sympathizers for disagreeing with the government or associating with any who did so.

Obama admin. 'information czar'
Conspiracy Theories
Cass R. Sunstein, Harvard Law School
Adrian Vermeule, Harvard Law School
January 15, 2008 Harvard Public Law Working Paper No. 08-03 U of Chicago, Public Law Working Paper No. 199 U of Chicago Law & Economics, Olin Working Paper No. 387
Many millions of people hold conspiracy theories; they believe powerful people have worked together in order to withhold the truth about some important practice or some terrible event. A recent example is the belief, widespread in some parts of the world, that the attacks of 9/11 were carried out not by Al Qaeda, but by Israel or the United States. Those who subscribe to conspiracy theories may create serious risks, including risks of violence, and the existence of such theories raises significant challenges for policy and law. The first challenge is to understand the mechanisms by which conspiracy theories prosper; the second challenge is to understand how such theories might be undermined. Such theories typically spread as a result of identifiable cognitive blunders, operating in conjunction with informational and reputational influences. A distinctive feature of conspiracy theories is their self-sealing quality. Conspiracy theorists are not likely to be persuaded by an attempt to dispel their theories; they may even characterize that very attempt as further proof of the conspiracy. Because those who hold conspiracy theories typically suffer from a crippled epistemology, in accordance with which it is rational to hold such theories, the best response consists in cognitive infiltration of extremist groups. Various policy dilemmas, such as the question whether it is better for government to rebut conspiracy theories or to ignore them, are explored in this light.

Cass Sunstein wants the government to "cognitively infiltrate conspiracy theorist" websites and groups
1/15/10 Glenn Greenwald, http://www.salon.com/news/opinion/glenn_greenwald/2010/01/15/sunstein/pr...
...As Obama’s "Information Czar", Sunstein effectively interprets the law for the Executive, and Sunstein has outlined plans for the government to infiltrate "conspiracy groups" to undermine them via postings on chat rooms and social networks, as well as real meetings. Sunstein effectively penned the blueprint for a Cointelpro "provocateur" style program to silence what have become the government’s most vociferous and influential critics. The specifics of the plans must be read in full in order to gauge their extreme nature and the threat Sunstein poses to the freedom in America. On page 14 of Sunstein’s January 2008 white paper entitled "Conspiracy Theories," he proposed that "under imaginable conditions" the government "might ban conspiracy theorizing" ... demanding websites be mandated by law to link to opposing information or that pop ups containing government propaganda be forcibly included on political blogs..."The best would be for this to be done voluntarily. But the word voluntary is a little complicated and people sometimes don't do what's best for our society...The idea would be to have a legal mandate as the last resort. . . an ultimate weapon designed to encourage people to do better," Sunstein concluded... we have "a well-motivated government" doing this so that "social welfare is improved." Thus, just like state secrets, indefinite detention, military commissions and covert, unauthorized wars, what was once deemed so pernicious during the Bush years -- coordinated government/media propaganda -- is instantaneously transformed into something Good... but who relentlessly spread "false conspiracy theories" of Saddam-engineered anthrax attacks and Iraq-created mushroom clouds and a Ba'athist/Al-Qaeda alliance -- the most destructive conspiracy theories of the last generation? ...who demonized as "conspiracy-mongers" people who warned that the U.S. Government was illegally spying on its citizens, systematically torturing people, attempting to establish permanent bases in the Middle East, or engineering massive bailout plans to transfer extreme wealth to those own the Government? The most chronic and dangerous purveyors of "conspiracy theory" games are the people Sunstein thinks should be empowered ... Government should pay what he calls "credible independent experts" to advocate on the Government's behalf, a policy he says would be more effective because people don't trust the Government itself and would only listen to people they believe are "independent" and thus suggests "government can supply these independent experts with information and perhaps prod them into action from behind the scenes," but warns that "too close a connection will be self-defeating if it is exposed."...

'trusted secure internet 2': acknowledging what has been implemented incrementally for years
White House declassifies Comprehensive National Cybersecurity Initiative summary...
Robert Westervelt, News Editor
02 Mar 2010, http://searchsecurity.techtarget.com/news/1407888/White-House-declassifi...
SAN FRANCISCO -- The Obama administration is declassifying a summary of its $40 billion classified cybersecurity plan Comprehensive National Cybersecurity Initiative (CNCI)
The announcement was made Tuesday by security luminary Howard Schmidt at the 2010 RSA Conference. Schmidt was appointed by President Obama in December 2009 to serve as the cybersecurity coordinator, a role that is the first of its kind instated by the White House.

July 2003 NGSCB Next-Generation Secure Computing Base: Microsoft’s TPM-based Trusted Computing solution (formerly “Palladium”)
Trusted Computing: A Framework for Data and Network Security
*Authentication *Data Protection/Encryption *Identity and Access Management *Password Management *Network Access Control *Disaster Recovery *Layered Security

Microsoft and the National Security Agency
April 6, 2007 http://www.techweb.com/wire/29110640

NSA took part in development of Windows 7
Nov. 25, 2009 http://www.voltairenet.org/article163072.html
The National Security Agency (NSA) acknowledged working with Microsoft on the development of Windows 7, as testified on 17 November 2009 by Richard Schaeffer, the NSA’s information assurance director, before the U.S. Senate’s Subcommittee on Terrorism and Homeland Security. The cooperation between the NSA and Microsoft has been an open secret since a judiciary agreement was reached between the U.S. Government and the computer giant....Undoubtedly, this opens up considerable opportunities for U.S. cyber espionage even beyond its borders....

In September 1999, leading European investigative reporter Duncan Campbell revealed that NSA had arranged with Microsoft to insert special “keys” into Windows software, in all versions from 95-OSR2 onwards. An American computer scientist, Andrew Fernandez of Cryptonym in North Carolina, had disassembled parts of the Windows instruction code and found the smoking gun -- Microsoft's developers had failed to remove the debugging symbols used to test this software before they released it. Inside the code were the labels for two keys. One was called "KEY". The other was called "NSAKEY". Fernandez presented his finding at a conference at which some Windows developers were also in attendance. The developers did not deny that the NSA key was built into their software, but they refused to talk about what the key did, or why it had been put there without users' knowledge. Fernandez says that NSA’s “back door” in the world’s most commonly used operating system makes it “orders of magnitude easier for the US government to access your computer."
Thanks to Bill Blum: Duncan Campbell’s article of September 3, 1999 TechWeb: http://www.techweb.com/wire/29110640 Is no longer at that site but should be googleable,

5/10/11 Microsoft Buys Skype for $8.5 Billion
Skype VOIP (voice over internet protocol) technology treats calls as data like email messages and routes them over the Internet, rather than a traditional phone network.

Microsoft plans to purchase Skype with cash held overseas that it could not otherwise bring back to the U.S. without paying repatriation taxes of more than 30%. The majority of Microsoft's roughly $50 billion in cash is held overseas.

Trust and Trusted Computing Platforms 2011 funded research and development center sponsored by U.S. Department of Defense...
trusted computing platforms with the proposed strategies provides .... infrastructure security and use of the TPM ..."

China Creates New Agency for Patrolling the Internet
BEIJING — A powerful arm of China’s government said Wednesday it had created a new central agency to regulate every corner of the nation’s vast Internet community, a move that appeared to complement a continuing crackdown on political dissidents and other social critics.

The Department of Defense last week increased its efforts to require that Department contacts with the media be monitored and approved by DoD public affairs officials.
The latest Pentagon move follows up on a July 2 memo from Secretary of Defense Robert M. Gates, who stated that the DoD Office of Public Affairs "is the sole release authority for official DoD information to news media in Washington, and ... all media activities must be coordinated through appropriate public affairs channels. This policy is all too often ignored...We have far too many people talking to the media outside of channels, providing information which is incorrect, out of proper context, unauthorized, or uninformed...,"

'let me make it very clear' whose freedom we're about
Internet 'kill switch' bill gets makeover: From "Protecting Cyberspace" to "Internet Freedom"
The 221-page bill hands Homeland Security the power to issue decrees to certain privately owned computer systems after the president declares a "national cyberemergency." The name of the bill has been changed to include the phrase "Internet freedom." But all the recent attention has been focused on the sections handing the president emergency powers. The new version follows the same process as the old one: President Obama would be given the power to "issue a declaration of a national cyberemergency." Once that happens, Homeland Security would receive sweeping new authorities, including the power to require that so-called critical companies "shall immediately comply with any emergency measure or action" decreed. No "notice" needs to be given "before mandating any emergency measure or actions."

One in four US hackers 'is an FBI informer'
The FBI and US secret service have used the threat of prison to create an army of informers among online criminals
The underground world of computer hackers has been so thoroughly infiltrated in the US by the FBI and Secret Service that it is now riddled with paranoia and mistrust, with an estimated one in four hackers secretly informing on their peers, a Guardian investigation has established. Cyber policing units have had such success in forcing online criminals to co-operate with their investigations through the threat of long prison sentences that they have managed to create an army of informants deep inside the hacking community....

US govt. partners: military, finance and corporate partners dish out allegations to support escalation of the information-communications cyberwar - in the name of 'national security' - in reality key to US global domination war to stop #1 rival capitalist China, and silence US 'whistleblowers' and bloggers
Google Asks Spy Agency for Help With Inquiry Into Cyberattacks
“Google and N.S.A. are entering into a secret agreement that could impact the privacy of millions of users of Google’s products and services around the world,” said Marc Rotenberg, executive director of the Electronic Privacy Information Center, a Washington-based policy group....In addition to N.S.A., Google has been working with the F.B.I. but the bureau declined to comment publicly or to share information about the intrusions with Congress.

preemptive counter-revolutionary 'arab spring revolutions': US/Soros 'color revolutions' offspring
Google's Revolution Factory - Alliance of Youth Movements: U.S. 'Color Revolution' 2.0
In 2008, the Alliance of Youth Movements held its inaugural summit in NYC. Attending was a combination of State Department staff, Council on Foreign Relations members, former National Security staff, Department of Homeland Security advisers, and a myriad of representatives from American corporations and mass media organizations including AT&T, Google, Facebook, NBC, ABC, CBS, CNN, MSNBC, and MTV. http://allyoumov.3cdn.net/f734ac45131b2bbcdb_w6m6idptn.pdf

Google and CFR team up to battle violent extremism
21 Mar 2011 http://thecable.foreignpolicy.com/posts/2011/03/21/cfr_and_google_team_u...
The world's leading Internet giant and a leading foreign policy think tank will bring together former violent extremists to discuss how to prevent homegrown terrorism at major conference in Ireland

Google Says Hackers in China Stole Gmail Passwords

Hillary Clinton says FBI will investigate Gmail hacking; China denies involvement
"Allegations the Chinese government supports hacking activities are completely fabricated and made with ulterior motives," Hong said ...In March, Google said the Chinese government was blocking human rights activists in China's access to Gmail. The Chinese government said Google's false accusations were unacceptable...

China Rejects Google’s Hacking Charge
China’s People’s Daily issued a caustic response Monday to Google’s charge that Chinese hackers had taken aim at influential users of its Gmail service, calling the accusations “political gaming” aimed at fomenting new discord between the Beijing and Washington governments...“Many international bystanders believe Google’s charge is thickly tainted with political colors, and Google is taking advantage and provoking new Sino-American Internet security disputes with sinister intentions... What was once a model of leading Internet innovation has now become a political tool for slandering other countries.”...the front page editorial also suggested Google’s actions could cost it credibility in the business world.

Wikileaks: no bloodshed inside Tiananmen Square
Secret cables from the US embassy in Beijing show there was no bloodshed inside Tiananmen Square when China put down student pro-democracy demonstrations 22 years ago.

Google doing its patriotic-partner job spying then blaming China
Google Android flaw could have leaked personal data from millions of phones
5/19/11 http://latimesblogs.latimes.com/technology/2011/05/google-fixing-android...
"For Contact information, private information of others is also affected, potentially including phone numbers, home addresses and email addresses."The vulnerability in Android was first pointed out by Rice University professor Dan Wallach in February, and the University of Ulm probed it further. "Beyond the stealing of such information, an adversary could perform subtle changes without the user noticing," The flaw affected 99.7% of all Android smartphones, not limited to Google Calendar and contacts... " theoretically feasible with all Google services," the University of Ulm said.

Google, CIA Invest in ‘Recorded Future’ Web Monitoring
By Noah Shachtman, 7/28/10 http://www.wired.com/dangerroom/2010/07/exclusive-google-cia/
Danger Room: What's Next in National Security
The investment arms of the CIA and Google are both backing a company that monitors the web in real time — and uses that information to predict the future.The company, Recorded Future, scours tens of thousands of websites, blogs and Twitter accounts to find the relationships between people, organizations, actions and incidents — both present and still-to-come. In a white paper, the company says its temporal analytics engine “goes beyond search” by “looking at the ‘invisible links’ between documents that talk about the same, or related, entities and events.”.. to figure out for each incident who was involved, where it happened and when it might go down. Recorded Future then plots that chatter, showing online “momentum” for any given event. “The cool thing is, you can actually predict the curve, in many cases,” says company CEO Christopher Ahlberg, a former Swedish Army Ranger with a PhD in computer science.
Which naturally makes the 16-person Cambridge, Massachusetts, firm attractive to Google Ventures, the search giant’s investment division, and In-Q-Tel, which handles similar duties for the CIA and the wider intelligence community.... Long before it enlisted the help of the National Security Agency, Google sold equipment to the secret signals-intelligence group. In-Q-Tel backed the mapping firm Keyhole, bought by Google in 2004 — which became the backbone for Google Earth.

CIA - In-Q-Tel Backed Startups
Earlier this year In-Q-Tel. CIA investment arm, invested in Recorded Future, a company that mines websites, blogs and Twitter accounts to “predict the future” by making “invisible links.” The company says it’s also popular among Wall Street traders. Intelligence agencies are increasingly interested in mining open-source intelligence, particularly online, but the proliferation of voices, whether on social networks, blogs, or elsewhere, can be challenging to make sense of. Visible Technologies, FMS and StreamBase Systems, all companies that provide products that analyze the massive amount of data flowing out of social networking and communication sites, all found spots in the In-Q-Tel portfolio.
In-Q-Tel has investments like Destineer Studios that develops military-themed videogames as well as training simulations for active-duty soldiers.

As part of its initiative in 1999 to create IQT, the CIA established the In-Q-Tel Interface Center (QIC). Experienced CIA officers inside CIA headquarters serve as on-site partners, providing In-Q-Tel a direct connection to the IC's technology leaders and front-line users. The QIC not only informs the IQT technology strategy and acts as Executive Agent for IQT’s work with other IC Partners, but also helps ensure relevant technology development, transition, and acceptance within the agency.
Since 1999, IQT has broadened its scope of operations, and now supports multiple agencies within the IC such as the National Geospatial-Intelligence Agency (NGA), Defense Intelligence Agency (DIA), and Department of Homeland Security (DHS). This has often resulted in multiple agencies supporting IQT portfolio investments, allowing each organization to benefit from technology developments that are jointly funded. By investing together in new technologies, they are also reducing risk and fostering better information sharing and inter-agency communications, as well as more seamless inter-agency operations.

Department of Defense : Increasingly, both communication and humanitarian efforts are funded and supported by the US military...." an effort to synchronize diplomacy with military psychological operations to develop an overarching concept of creating the right message for the right audience delivered in the right way to help shape perceptions.".
Winning the world's hearts and minds... trying to polish America's image with communication and humanitarian assistance strategies.
By Peter A Buxbaum in Washington, DC for ISN Security Watch 28/07/08
But with the winds of change blowing through Washington in anticipation of a new administration next year, thought and action on these fronts are picking up steam.
With world public opinion of the US the lowest it has been in decades...The fact that both of these documents originate with the Department of Defense is significant. Increasingly, both communication and humanitarian efforts are funded and supported by the US military..." to synchronize diplomacy with military psychological operations to develop an overarching concept of creating the right message for the right audience delivered in the right way to help shape perceptions.".

"Open Source Works", previously unknown CIA Directorate of Intelligence initiative
"charged by the Director for Intelligence with drawing on language-trained analysts to mine open-source information for new or alternative insights on intelligence issues...
October 2010," CIA Directorate of Intelligence, November 8, 2010.

Washington Taps Into a Potent New Diplomacy Force
The Obama administration says it has tried to avoid words or deeds that could be portrayed as American meddling in Iran’s presidential election and its tumultuous aftermath. Yet Monday afternoon State Department official, Jared Cohen, e-mailed the social-networking site Twitter: delay scheduled maintenance of its global network, which would cut off service while Iranians were using Twitter to swap information and inform the outside world about the mushrooming protests around Tehran. The request, made to Twitter co-founder, Jack Dorsey, is yet another new-media milestone by the United States government - an Internet blogging service that did not exist four years ago has the potential to change history in an ancient Islamic country.“This was just a call to say: ‘It appears Twitter is playing an important role at a crucial time in Iran. Could you keep it going?’ ” said P.J. Crowley, assistant secretary of state for public affairs. Twitter complied with the request, saying in a blog post Monday it put off the upgrade until late Tuesday afternoon — 1:30 a.m. Wednesday in Tehran — because its partners recognized “the role Twitter is currently playing as an important communication tool in Iran.” The State Department said its request did not amount to meddling... “This is completely consistent with our national policy,” Mr. Crowley said. “We are proponents of freedom of expression. Information should be used as a way to promote freedom of expression.” The episode demonstrates the extent to which the administration views social networking as a new arrow in its diplomatic quiver. Secretary of State Hillary Rodham Clinton talks regularly about the power of e-diplomacy...

U.S. Gov't Software Creates 'Fake People' to Spread Message via Social Networking
The US government offers private intelligence companies contracts to create software to manage "fake people" on social media sites.

Military Report: Secretly ‘Recruit or Hire Bloggers’
By Noah Shachtman March 31, 2008 Info War
This 2006 report for the Joint Special Operations University, "Blogs and Military Information Strategy," offers a third approach — co-opting bloggers, or putting them on the payroll. "Hiring a block of bloggers to verbally attack a specific person or promote a specific message may be worth considering," write the report’s co-authors, James Kinniburgh and Dororthy Denning... The report introduces the military audience to the "blogging phenomenon," and lays out a number of ways in which US armed forces — specifically, military public affairs, information operations, and psychological operations units — might use the sites to their advantage: Information strategists can consider clandestinely recruiting or hiring prominent bloggers or other persons of prominence… to pass the U.S. message. In this way, the U.S. can overleap the entrenched inequalities and make use of preexisting intellectual and social capital[...]

Soros-Funded Democratic Idea Factory Becomes Obama Policy Font
11/18/08 http://www.bloomberg.com/apps/news?pid=washingtonstory&sid=aF7fB1PF0NPg
In 2003 wealthy donors such as Soros and film producer Stephen Bing gave $10 million or more to fill what they believed was an intellectual void in the Democratic Party and create a vehicle to produce an agenda for the party's eventual return to power. The Center for American Progress [CAP] has become in five years an intellectual wellspring for Democratic policy proposals, including many shaping the agenda of the new Obama administration...CAP advocates creation of a "National Energy Council'' headed by an official with national security adviser stature charged with "transforming the energy base'' of the U.S.

State strategic information 'news'
US Navy cluster bombed Misratah 'report' was based on US/Soros Human Rights Watch NGO and NYT reporter, so US could immediately blame Gaddafi
The Libyan regime flatly denied reports they used internationally banned cluster bombs in Misrata
Full report at http://wikileaksaustraliancitizensalliance.net/2011/05/25/the-cluster-bo...

When Unrest Stirs, Bloggers Are Already in Place
As the protests spread across Tunisia for weeks, many international news organizations scrambled to cover the unrest just before President Zine el-Abidine Ben Ali fled on Jan. 14, ending 23 years of authoritarian rule. But Amira al-Hussaini was all over the story. Ms. Hussaini oversaw a handful of bloggers who gathered information about the mounting protests in Tunisia for Global Voices, a volunteer-driven organization and platform that works with bloggers all over the world to translate, aggregate and link to online content. As part of its reporting, she said, the site turned to Facebook, YouTube and Twitter, where other bloggers and hundreds of ordinary people stepped into the role of citizen journalists and shared their experiences, cellphone photos and videos online. “There was a whole army of people who did the job of reporters, sharing what was happening on the streets,” said Ms. Hussaini, 38, who lives in Bahrain and is the organization’s regional editor for the Middle East and North Africa... “Our job is to curate the conversation that is happening all over the Internet with people who really understand what is going on,” said Rebecca MacKinnon, a former Tokyo bureau chief for CNN who founded Global Voices with Ethan Zuckerman, a technologist and Africa expert, while they were fellows at Harvard’s Berkman Center for Internet and Society. “We amplify, contextualize and translate what these conversations are and why they are relevant.” Ms. MacKinnon and Mr. Zuckerman both said the network grew out of an international meeting of bloggers held at Harvard in late 2004. They saw an opportunity to leverage content produced on blogs and social media sites like Twitter outside of the United States and to help create a global community for them and their work...It is led by Ivan Sigal, who studied the role of citizen media in conflict zones at the United States Institute of Peace, before taking over as executive director in 2008... he oversees a virtual team of about 20 staff editors and more than 300 volunteer bloggers and translators outside the United States....

Global Voices is a non-profit project incorporated in the Netherlands as Stichting Global Voices.
Sponsors include: The Soros Open Society Institute: Global Voices was launched as a project of the [Soros] Berkman Center for Internet and Society at Harvard Law School; The John D. and Catherine T. MacArthur Foundation; The Ford Foundation supports the Global Voices Lingua translation project, and research into its further development; Reuters, our flagship editorial supporter for several years, presently an editorial partner; Google, The John S. and James L. Knight Foundation and J-Lab; the McCormick Foundation, and others ...

NewScientist: Iran's Scientific Growth Fastest in World
Scientific output has grown 11 times faster in Iran than the world average, faster than any other country. A survey of the number of scientific publications listed in the Web of Science database shows that growth in the Middle East -- mostly in Turkey and Iran -- is nearly four times faster than the world average....China's prominence in world science is known to have been growing, but Science-Metrix discovered its output of peer-reviewed papers has been growing more than five times faster than that of the US... While Asia's growth in output was mirrored by North America's fall, Europe, which invests heavily in cross-border scientific collaboration, held its own, and now produces over a third of the world's science, the largest regional share....Scientific output fell in the former Soviet Union after its collapse in 1991 and began to recover in 2006. Latin America and the Caribbean together grew fastest of any region, although its share of world science is still small. Growth in Oceania, Europe and Africa has stayed at about the same rate over the past 30 years. Only North American scientific output has grown "considerably slower" than the world as a whole..."Asia is becoming the world leader in science, with North America progressively left behind".

"This project is intended to contribute to the following NEA strategic goals..."
State Department Grant for News Website Targeting Iran
Wikileaks obtained a Department of State document laying out the terms of a grant in part for the purpose of helping to import new media technology into Iran for the creation of a website to “promote democracy”. According to Wikileaks: This file provides budgetary information regarding a specific covert new media initiative funded by the US State Department that targets Iran. This document was leaked because the man in charge of the initiative has strong ties to Israeli Intelligence and subcontracts portions of the work to Israeli intel fronts such as MEMRI [Middle East Media Research Institute] using US dollars. It is currently not known if this project is still funded by the US State Department.[...]

revealing the nature of US agents and expat 'Iranian opposition'
US funds for democracy initiative in Iran
By Farah Stockman, Globe Staff | February 16, 2006 Boston Globe
WASHINGTON — Secretary of State Condoleezza Rice asked Congress yesterday to fund a sweeping initiative to promote democracy inside Iran that would expand satellite broadcasts to enable Washington to ”engage” directly with the Iranian people. The initiative also would lift US restrictions to allow US funding for Iranian trade unions, political dissidents, and nongovernmental organizations. The new request, which was made yesterday at a Senate Foreign Relations Committee hearing on Bush’s foreign affairs budget, would increase spending on democracy programs for Iran this year from $10 million to $85 million. Rice announced the initiative as Washington steps up pressure on the hard-line regime in Tehran over its nuclear program, which Washington suspects is geared toward producing a nuclear weapon.
”We find it in our interest now . . . to see if we can’t engage the Iranian population,” Rice told the senators. ”In some ways, you could argue that they need it even more now because they are being isolated by their own regime.”...The initiative would be a boon to the Iran Human Rights Documentation Center [ed: US/Soros] which last year received about one-third of the $3.5 million the State Department spent on promoting democracy in Iran....
State Department officials at yesterday’s briefing stopped short of calling for regime change in Iran, but talked of a desire to foment internal drives for massive political change, similar to movements in Ukraine and the former Soviet republic of Georgia, where US funds paid for media and [NGO] civil society outreach....
Ramesh Setehrrad, president of the National Committee of Women for a Democratic Iran, an advocacy group in Washington, said the administration would have a hard time finding organizations to fund if it rejected the political opposition in exile, most of which is associated with the Mujaheddeen Khalq, which the State Department considers a terrorist organization, or with monarchists associated with the late shah, Mohammed Reza Pahlavi. ”There is nothing left as far as the opposition is concerned,” Setehrrad said. She called the move a ‘’step in the right direction,” but said it would be inadequate until Washington decided to openly support the political opposition...Rice’s package for democracy would provide an extra $50 million to broadcast programming into Iran in the hopes that a significant number of Iranians will be able to get it via satellite dishes, which are common despite being banned. Some of the money would go to expand the Persian-language service of Radio Farda, a joint venture between Voice of America, Radio Free Europe, and Radio Liberty, which now runs only four hours per day. State Department officials traveled to Los Angeles, home to a large Iranian community and nearly two dozen Persian-language television stations, to vet other groups that could broadcast in Persian, officials said yesterday. An additional $15 million in funds would go to US organizations that would support Iranian labor unions and civic activities, and to fund Iranian groups. Another $5 million would expand educational exchanges with Iranian students, and $5 million more would expand efforts to reach out to Iranians with the Internet and instant messaging.

ABC News Exclusive: The Secret War Against Iran
4/3/07 Brian Ross, http://blogs.abcnews.com/theblotter/2007/04/abc_news_exclus.html
A Pakistani tribal militant group responsible for a series of deadly guerrilla raids inside Iran has been secretly encouraged and advised by American officials since 2005, U.S. and Pakistani intelligence sources [ISI] tell ABC News. The group, called Jundullah, is made up of members of the Baluchi tribe and operates out of the Baluchistan province in Pakistan, just across the border from Iran. It has taken responsibility for the deaths and kidnappings of more than a dozen Iranian soldiers and officials.

"an electronic war has been launched against Iran"
"U.S. Department of Homeland Security running the worm on test systems to monitor its patterns since July"
Iran: Bushehr Nuclear Plant Not Harmed by Computer Worm

made by microsoft
Stuxnet malware is 'weapon' out to destroy ... Iran's Bushehr nuclear plant?
www.csmonitor.com/ USA/ 2010/ 0921/ Stuxnet-malware-is-weapon-out-to-destroy-Iran-s-Bushehr-nuclear-plant
The U.S. confirmed...Stuxnet is a essentially precision, military-grade cyber missile deployed last year to seek out and destroy a real-world target of high importance..."Stuxnet is a 100% - directed cyber attack aimed at destroying an industrial process in the physical world... not about espionage, as some have said. This is a 100 percent sabotage attack." A geographical distribution of computers hit by Stuxnet, which Microsoft produced in July, found Iran to be the apparent epicenter of the Stuxnet infections. That suggests any enemy of Iran with advanced cyber war capability might be involved...US is acknowledged to have that ability, and Israel is also reported to have formidable offensive cyber-war-fighting capability....

Torture of Iranian Women is Focus of PBS NEWSHOUR, Center for Investigative Reporting Exclusive
6/10/11 PBS Newshour Margaret Warner introduced the report on the horrific abuse of Iranian women in the [USAID/StateDept. backed] 'green movement' as a coproduction of PBS and the Center for Investigative Journalism (CIR). An liberal imperialistzionist 'non-profit independent news organization', with a straight face, portrays itself as 'muckrakers for justice and against the abuse of power': CIR's big funders include such 'humanitarian' imperialists as these:
Soros Open Society Institute Gates Foundation Ford Foundation William Hearst II Hellman Family Foundation William and Flora Hewlett Foundation James Irvine Foundation
John D. and Catherine T. MacArthur Foundation Stewart R. Mott Foundation Charles Stewart Mott Foundation Rockefeller Brothers Fund Rockefeller Financial Services Inc.

Israel has already attacked Iran
Israeli intelligence, in cooperation with its American counterparts, has made a military strike on Iran's nuclear facilities redundant.
1/17/11 By Yossi Melman, http://www.haaretz.com/misc/article-print-page/israel-has-already-attack...
Israel will not attack Iran. At least not in the next few years. It will not attack, first and foremost, because the United States opposes such a move. Israel has never taken any independent step on a strategic issue of global importance without first coordinating or consulting.. or at least without reaching the conclusion that the move would be received favorably in Washington

Israel Tests on Worm Called Crucial in Iran Nuclear Delay
http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html?_r=1&h... by William J. Broad, John Markoff and David E. Sanger.
Mr. Obama’s chief strategist for combating weapons of mass destruction, Gary Samore, sidestepped a Stuxnet question at a recent conference about Iran, but added with a smile: “I’m glad to hear they are having troubles with their centrifuge machines, and the U.S. and its allies are doing everything we can to make it more complicated.”...The Dimona complex in the Negev desert is famous as the heavily guarded heart of Israel’s never-acknowledged nuclear arms program, where neat rows of factories make atomic fuel for the arsenal. Over the past two years, according to intelligence and military experts familiar with its operations, Dimona has taken on a new, equally secret role — as a critical testing ground in a joint American and Israeli effort to undermine Iran’s efforts to make a bomb ...Though American and Israeli officials refuse to talk publicly about what goes on at Dimona, the operations there, as well as related efforts in the US, are among the newest and strongest clues suggesting the virus was designed as an American-Israeli project to sabotage the Iranian program...By the accounts of a number of computer scientists, nuclear enrichment experts and former officials, the covert race to create Stuxnet was a joint project between the Americans and the Israelis,

‘Gay Girl in Damascus’ comes clean
US/Soros human rights/democracy agent in the massive US soft power propaganda war called a singular "hoax" and a 'gay' issue
Syria's human rights record is among the worst in the world, according to Human Rights Watch.[12]...Amina had been increasingly critical of the government in the months of the Syrian uprising. Her character wrote in late May of President Assad's regime: "they must go, they must go soon. That is all there is to say."In April, Araf told how her father confronted two security agents who came to arrest her, threatened to rape her, and accused her of being involved in a salafist plot...
Brooklyn journalist Andrew Belonsky wrote an article for Death and Taxes magazine saying the "U.S. government should...use its power and influence to call for Arraf's release...Such a statement would of course prove that the U.S. remains committed to freeing citizens held overseas, just as we have in North Korea and Iran...The U.S. State Department said 7 June it was looking into the issue...

Autocratic regimes fight Web-savvy opponents with their own tools:
Syrian democracy activists have used Facebook and Twitter to promote a wave of bold demonstrations. Now, the Syrian government and its supporters are striking back with their own social-media offensive...“There is a war going on in cyberspace,” said Wissam Tarif, head of the Middle East human rights organization Insan, whose Web site has been attacked. Syria offers just one example of the online backlash in countries ruled by authoritarian regimes. Although social media sites have been lionized for their role in the Arab Spring protests, governments are increasingly turning the technology against the activists...Congress has given the State Department millions of dollars annually to provide technology to help activists evade Internet censorship by oppressive governments. “In the same way a few years ago, it became commonplace to talk about Web 2.0, we’re now seeing Repression 2.0,” said Daniel B. Baer, a deputy assistant secretary of state for democracy, human rights and labor. Secretary of State Clinton has expressed alarm about the trend, which began years ago in places such as China and Iran and has spread recently. “A lot of leading bloggers had to flee the country because of threats” said Robert Guerra, head of the global Internet program at Freedom House, a pro-democracy group.

* Advocacy: Freedom House seeks to encourage American policymakers, as well as other government and international institutions, to adopt policies that advance human rights and democracy around the world. Freedom House has been instrumental in the founding of the worldwide Community of Democracies, has actively campaigned for a reformed Human Rights Council at the United Nations, and presses the Millennium Challenge Corporation to adhere to high standards of eligibility for recipient countries.
• Action: Through exchanges, grants, and technical assistance, Freedom House provides training and support to human rights defenders, civil society organizations, and members of the media in order to strengthen indigenous reform efforts in countries around the globe.
1301 Connecticut Avenue, NW, Washington, DC 20036

Freedom on the Net 2011
USA ...In June 2010, the Obama administration released plans for a National Strategy for Trusted Identities in Cyberspace (NSTIC). The stated goal of the effort is to ensure the creation of an “identity ecosystem” in which internet users and organizations can more completely trust one another’s identities and systems when carrying out online transactions.[35 A site created to foster discussion on the proposed strategy can be found at http://www.nstic.us/. 36 Jay Stanley, “Don’t Put Your Trust in ‘Trusted Identities,’” Blog of Rights, American Civil Liberties Union, January 7, 2011, http://www.aclu.org/blog/technology-and-liberty/dont-put-your-trust-trusted-identities]
The Communications Assistance for Law Enforcement Act (CALEA) requires telephone companies, broadband carriers, and interconnected Voice over Internet Protocol (VoIP) providers to design their systems so that communications can be easily intercepted when government agencies have the legal authority to do so,38 and some in the Obama administration suggested in late 2010 the law could be expanded to permit increased access to online communications tools such as Gmail, Skype, and Facebook.39
Following the terrorist attacks of September 11, 2001, Congress passed the USA PATRIOT Act, which broadly expanded the government’s surveillance and investigative powers in cases involving terrorism. Among other things, the law requires ISPs to provide more detailed information about the internet activities of terrorism suspects—including their browsing history—with less judicial oversight and, in some cases, without probable cause. In February 2010, three expiring provisions of the USA PATRIOT Act were renewed for an additional year, including the government’s broad authority to conduct roving wiretaps of unidentified or “John Doe” targets, to wiretap “lone wolf” suspects who have no known connections to terrorist networks, and to secretly access a wide range of private and to secretly access a wide range of private business records without warrants under Section 215. 40

Plan Preparing Mass Grave for Police and Security Martyrs and Filming It to Be Broadcast and Attributed to the Army
H. Sabbagh, Syrian Arab News Agency, Jun 08, 2011 http://www.sana.sy/eng/337/2011/06/08/351524.htm
IDLEB, (SANA) – A phone call between members of armed groups in Jisr al-Shughour revealed their plan to exploit the bodies of police and army martyrs they massacred and mutilated to undermine the army and tarnish its reputation. The Syrian TV broadcast a call between two members of these groups, one called Hussein and the other called Jihad, with the latter revealing that they plotted to dig a mass grave for the military security personnel they murdered and bury them in it "like the mass grave in Daraa." Jihad discussed the issue with someone next to him called Bassam, while Hussein said he will call someone called Anas. Jihad asked Bassam if they should bury the security personnel in a mass grave, and Bassam answered by instructing them to videotape them and not to bury them all together because this might cause the truth to be revealed, while Jihad responded by saying that they should bury them out of town and quickly. Hussein responded by saying "it doesn't matter if we're revealed or not… they will be portrayed as a mass grave containing people from Jisr al-Shughour, and that we know nothing about it." To this, Jihad told him to go ahead, and asked to send either Anas or someone called Jamil, instructing him to make sure that they videotape this grave.

NB: US / NGOs operate a vast empire of exclusively overseas 'strategic information' propaganda not accessible in u.s. :

What American Public Should Know
By Kourosh Ziabari, http://www.informationclearinghouse.info/article28299.htm
...US Information and Educational Exchange Act of 1948, known as the Smith-Mundt Act... allows the US to establish and initiate media outlets aimed at non-American audiences to further the political objectives of the U.S. overseas...Seven radio and TV stations are covered by the Act, two exclusively dedicated to Iran: Radio Farda and Voice of America... American citizens cannot watch the TV programs which VOA airs and listen to what the Radio Farda broadcasts... the U.S. statesmen and politicians have predetermined and programmed plans for the nation of Iran...in which nothing can be traced but propaganda, falsification and fabrication....According to statistics released by Washington Post, the U.S. Congress allocated an annual budget of $7 million to Radio Farda with which this soft war machine unremittingly produces and disseminates falsehood and mendacious propaganda against the nation of Iran...American people are deprived of listening to the propaganda of Radio Farda and VOA... to know their government does not represent a "beacon of freedom" nor...a "pioneer of democracy" but spends taxes on its unrelenting wars with the countries which don't want to fall under the umbrella of U.S. hegemony.