The commander of the U.S. Cyber Command said Thursday that he does not favor giving the United Nations the power to regulate the Internet.
Source: Washington Times; GEOINTV
Remixxing the mainstream news one blog post at a time from the shores of Venice Beach. News, politics & conspiracy theories about world issues. All posts are opinions meant to foster comment, reporting, teaching & study under the "fair use doctrine" in Sec. 107 of U.S. Code Title 17. No statement of fact is made or should be implied. Ads appearing on this blog are solely the product of Blogger.com and do not necessarily reflect the opinions of Remixx World!
The commander of the U.S. Cyber Command said Thursday that he does not favor giving the United Nations the power to regulate the Internet.
The Obama administration is leading a global effort to deploy “shadow” Internet and mobile phone systems that dissidents can use to undermine repressive governments that seek to silence them...
...The group’s suitcase project will rely on a version of “mesh network” technology, which can transform devices like cellphones or personal computers to create an invisible wireless web without a centralized hub.
The bureau recently dispatched a cybersecurity expert to China, in an effort to work more cooperatively with Chinese authorities who oversee information networks, assistant director and head of the FBI’s cyber division Gordon Snow said March 31 at the Air Force Association’s "CyberFutures" conference. (See below).
Gerry Pennell, CIO of the London 2012 Olympics told CBR that, "We will be the target of a cyber attack. It'll happen for sure."
Steve Watson
Prisonplanet.com
Wednesday, Jul 21st, 2010
An increasing clamour to restrict and control the internet on behalf of the government, the Pentagon, the intelligence community and their private corporate arms, could result in a staged cyber attack being used as justification.
Over recent months we have seen a great increase in media coverage of inflated fears over a possible “electronic Pearl Harbor” event, with reports claiming that the U.S. could be “felled within 15 minutes”.
Vastly over-hyped (and in some cases completely asinine) claims that the power grids and other key infrastructure such as rail networks and water sources are wired up to the public internet have permeated such coverage.
Threats against computer networks in the United States are grossly exaggerated. Dire reports issued by the Defense Science Board and the Center for Strategic and International Studies “are usually richer in vivid metaphor — with fears of ‘digital Pearl Harbors’ and ‘cyber-Katrinas’ — than in factual foundation,” writes Evgeny Morozov, a respected researcher and blogger who writes on the political effects of the internet.
Morozov notes that much of the data on the supposed cyber threat “are gathered by ultra-secretive government agencies — which need to justify their own existence — and cyber-security companies — which derive commercial benefits from popular anxiety.”
When the Cybersecurity Act was introduced by Senator John Rockefeller last year, he made similar claims about the threat of cyber attacks, adding “Would it have been better if we’d have never invented the Internet?”.
Rockefeller’s legislation gives the president the ability to “declare a cybersecurity emergency” and shut down or limit Internet traffic in any “critical” information network “in the interest of national security.” The bill does not define a critical information network or a cybersecurity emergency. That definition would be left to the president, according to a Mother Jones report.
Provisions in the bill would allow the federal government, via the DHS and the NSA, to tap into any digital aspect of every citizen’s information without a warrant. Banking, business and medical records would be wide open to inspection, as well as personal instant message and e mail communications – all in the name of heading off cyber attacks on the nation.
Enhancements of such provisions are contained in the more recent “Protecting Cyberspace as a National Asset Act”, which is being pushed hard by Senator Joe Lieberman. The bill would hand absolute power to the federal government to close down networks, and block incoming Internet traffic from certain countries under a declared national emergency.
An accompanying cybersecurity control grid would only create greater risk according to experts who note that it would essentially “establish a path for the bad guys to skip down.” Other countries, such as Australia and the UK are following suit.
The program dovetails with the Pentagon’s newly created Cyber Command, headed by Keith B Alexander, the acting head of the NSA and the man behind the massive program of illegal dragnet surveillance of domestic communications since at least 2001.
During the Senate Armed Services Committee confirmation hearing, Alexander said the Pentagon’s Cyber Command would enjoy “significant synergy” with the NSA. “We have to show what we’re doing to ensure that we comport, comply with the laws,” said Alexander, perversely claiming the agency is respecting and protecting the privacy of the American people.
The Pentagon considers cyberspace a warfighting domain equal to land, sea, air and space. In 2003, the Pentagon classified the internet as an enemy “weapons system” requiring a “robust offensive suite of capabilities to include full-range electronic and computer network attack.” It has spent Billions of dollars building a super secret “National Cyber Range” in order to prepare for “Dominant Cyber Offensive Engagement”, which translates as control over “any and all” computers. The program has been dubbed “The Electronic Manhattan Project”.
The enemy is never specifically named, it is merely whoever uses the net, because the enemy IS the net. The enemy is the freedom the net provides to billions around the globe and the threat to militaristic dominance of information and the ultimate power that affords.
These initiatives represent a continuation of the so called “Comprehensive National Cybersecurity Initiative”, created via a secret presidential order in 2008 under the Bush administration. former National Intelligence Director Mike McConnell announced that the NSA’s warrantless wiretaps would “be a walk in the park compared to this,”.
“This is going to be a goat rope on the Hill” McConnell said. My prediction is that we’re going to screw around with this until something horrendous happens.”
As we have previously reported, large corporations such as Google, AT&T, Facebook and Yahoo to name but a few are intimately involved in the overarching program. Those corporations have specific government arms that are supplying the software, hardware and tech support to US intelligence agencies in the process of creating a vast closed source database for global spy networks to share information.
Clearly the implications of this program for the open and free internet, and for liberty in general are very worrying, this has been reflected in the resistance and criticism from groups such as the Electronic Frontier Foundation.
In light of this, there is a real danger of a hyped or completely staged cyber attack being propagated in order to bring the issue to public attention and counter the critics who have exposed it as a part of the agenda to restrict the Internet.
In 2008 Stanford Law professor Lawrence Lessig detailed such ongoing government plans for overhaul and restriction.
Lessig told attendees of a high profile Tech conference that “There’s going to be an i-9/11 event” which will act as a catalyst for a radical reworking of the law pertaining to the internet.
Lessig said that he came to that conclusion following a conversation with former government Counter Terrorism Czar Richard Clarke, who informed him that there is already in existence a cyber equivalent of the Patriot Act, an “i-Patriot Act” if you will, and that the Justice Department is just waiting for a cyber terrorism event in order to implement its provisions.
Lessig is the founder of Stanford Law School’s Center for Internet and Society. He is founding board member of Creative Commons and is a board member of the Software Freedom Law Center. He is best known as a proponent of reduced legal restrictions on copyright, trademark and radio frequency spectrum, particularly in technology applications.
These are clearly not the ravings of some paranoid cyber geek.
Though Richard Clarke advocates an enhancement of cyber security, even he has stated that it would be a terrible idea to allow the government to regulate and filter the internet.
We have also recently seen multiple mock attacks conducted by the government, via private outsourcing, on it’s own infrastructure systems. On such exercise, called “We Were Warned: Cyber Shockwave”, involved Former Department of Homeland Security secretary Michael Chertoff and former CIA deputy director John McLaughlin taking the roles of government leaders. CNN broadcast the entire simulation on prime time television.
Alex Jones recently discussed this issue on Russia Today news programming:
Journalist Webster Tarpley also lays out the hyping of cyber threats as a pretext to takedown the internet:
“It could paralyze this country, and I think that's an area we have to pay a lot more attention to,” the CIA chief said.
The Obama administration is set to propose a new system for authenticating people, organizations and infrastructure on the Web. The online authentication and identity management system would be targeted at the transactional level -- for example, when someone logs into their banking website or completes an online e-commerce purchase.
The National Strategy for Trusted Identities in Cyberspace
Posted by Howard A. Schmidt on June 25, 2010 at 02:00 PM EDT
Cyberspace has become an indispensible component of everyday life for all Americans. We have all witnessed how the application and use of this technology has increased exponentially over the years. Cyberspace includes the networks in our homes, businesses, schools, and our Nation’s critical infrastructure. It is where we exchange information, buy and sell products and services, and enable many other types of transactions across a wide range of sectors. But not all components of this technology have kept up with the pace of growth. Privacy and security require greater emphasis moving forward; and because of this, the technology that has brought many benefits to our society and has empowered us to do so much -- has also empowered those who are driven to cause harm.
Today, I am pleased to announce the latest step in moving our Nation forward in securing our cyberspace with the release of the draft National Strategy for Trusted Identities in Cyberspace (NSTIC). This first draft of NSTIC was developed in collaboration with key government agencies, business leaders and privacy advocates. What has emerged is a blueprint to reduce cybersecurity vulnerabilities and improve online privacy protections through the use of trusted digital identities.
The NSTIC, which is in response to one of the near term action items in the President’s Cyberspace Policy Review, calls for the creation of an online environment, or an Identity Ecosystem as we refer to it in the strategy, where individuals and organizations can complete online transactions with confidence, trusting the identities of each other and the identities of the infrastructure that the transaction runs on. For example, no longer should individuals have to remember an ever-expanding and potentially insecure list of usernames and passwords to login into various online services. Through the strategy we seek to enable a future where individuals can voluntarily choose to obtain a secure, interoperable, and privacy-enhancing credential (e.g., a smart identity card, a digital certificate on their cell phone, etc) from a variety of service providers – both public and private – to authenticate themselves online for different types of transactions (e.g., online banking, accessing electronic health records, sending email, etc.). Another key concept in the strategy is that the Identity Ecosystem is user-centric – that means you, as a user, will be able to have more control of the private information you use to authenticate yourself on-line, and generally will not have to reveal more than is necessary to do so.
The Department of Homeland Security (DHS), a key partner in the development of the strategy, has posted the draft NSTIC at www.nstic.ideascale.com. Over the next three weeks (through July 19th), DHS will be collecting comments from any interested members of the general public on the strategy. I encourage you to go to this website, submit an idea for the strategy, comment on someone else’s idea, or vote on an idea. Your input is valuable to the ultimate success of this document. The NSTIC will be finalized later this fall.
Thank you for your input!
Howard A. Schmidt is the Cybersecurity Coordinator and Special Assistant to the President
Visa is warning financial institutions that it has received reliable intelligence that an organized criminal group plans to attempt to move large amounts of fraudulent payments through a merchant account in Eastern Europe, possibly as soon as this weekend.
In an alert sent to banks, card issuers and processors this week, Visa said it “has received intelligence from a third-party entity indicating that a criminal group has plans to execute “a large batch settlement fraud scheme.”
The government is planning to conduct mock cyber war games every year, unleashing malicious mock attacks on computers of critical establishments like defence, telecom companies, airlines, banks and railways to prepare the nation against a cyber war. The move to have mock cyber wars comes in the wake of increased attacks by Chinese hackers on computers of major defence establishments in India, last year.
A top general says the Air Force will train all new recruits in the basics of cyberwarfare and add more advanced schooling for others to help combat the growing threat of attacks on U.S. computer networks.
Four-star Gen. Robert Kehler, who heads the Air Force Space Command, said Monday details are still being worked out on a cyberwarfare component for basic training.
The biggest threat to the open internet is not Chinese government hackers or greedy anti-net-neutrality ISPs, it’s Michael McConnell, the former director of national intelligence..
When he was head of the country’s national intelligence, he scared President Bush with visions of e-doom, prompting the president to sign a comprehensive secret order that unleashed tens of billions of dollars into the military’s black budget so they could start making firewalls and building malware into military equipment...
Make no mistake, the military industrial complex now has its eye on the internet. Generals want to train crack squads of hackers and have wet dreams of cyberwarfare. Never shy of extending its power, the military industrial complex wants to turn the internet into yet another venue for an arms race.
While the United States' critical infrastructure, from the electric grid to the financial sector, is vulnerable to attack through cyberspace, al-Qaeda lacks the capability and motivation to exploit these vulnerabilities. To penetrate, map, and damage the networks that control the industrial base requires a large team of experienced hackers, a lot of time, and advanced infrastructure. Only a handful of groups, mostly nation state actors, possess this level of capability, and al-Qaeda is not one of them.
A vast electronic spying operation has infiltrated computers and has stolen documents from hundreds of government and private offices around the world, including those of the Dalai Lama, Canadian researchers have concluded...reporting on the spying operation dubbed GhostNet...
[T]he researchers said that the system was being controlled from computers based almost exclusively in China, but that they could not say conclusively that the Chinese government was involved...
Their sleuthing opened a window into a broader operation that, in less than two years, has infiltrated at least 1,295 computers in 103 countries, including many belonging to embassies, foreign ministries and other government offices, as well as the Dalai Lama’s Tibetan exile centers in India, Brussels, London and New York.
Wozniak was speaking at Discovery Forum 2010 when he went off topic for a few minutes and spoke about problems with his 2010 Toyota Prius.
"I don't get upset and teed off at things in life, except computers that don't work right," was his segue into the Toyota comments. Then he said he had been trying to get through to Toyota and the National Highway Transportation Safety Administration (NHTSA) for three months but could not get anyone to explore an alleged software-related acceleration problem--as described below.
"Toyota has this accelerator problem we've all heard about," Wozniak said. "Well, I have many models of Prius that got recalled, but I have a new model that didn't get recalled. This new model has an accelerator that goes wild, but only under certain conditions of cruise control. And I can repeat it over and over and over again--safely."
"This is software. It's not a bad accelerator pedal. It's very scary, but luckily for me, I can hit the brakes," he said.