‘einstein 3’? ‘stellar wind’? they don’t half fancy themselves, do they?

Through the Wormhole: The Secret State’s Mad Scheme to Control the Internet
Tom Burghardt, Antifascist Calling, Jun 27 2010

That the revolving door connecting the military and the corporations who service war making is a highly-profitable redoubt for those involved, has been analyzed here at great length. With new moves to tighten the screws on the immediate horizon, and as “Change” reveals itself for what it always was, an Orwellian exercise in public diplomacy, hitting the “kill switch” serves as an apt descriptor for the new, repressive growth sector that links technophilic fantasies of “net-centric” warfare to the burgeoning “homeland security” market. Back in March, Wired investigative journalist Ryan Singel wrote that the “biggest threat to the open internet” isn’t “Chinese hackers” or “greedy ISPs” but corporatist warriors like former Director of National Intelligence Mike McConnell. Having retreated to his old haunt as a senior vice president with the ultra-spooky firm Booz Allen Hamilton, a post he held for a decade before joining the Bush administration, McConnell stands to make millions as Booz Allen’s parent company, the secretive private equity powerhouse, The Carlyle Group, plans to take the firm public and sell some $300m worth of shares, the WSJ reported last week. The WSJ notes:

With its deep ties to the defense establishment, Booz Allen has become embedded in a range of military operations such as planning war games and intelligence initiatives.

That Carlyle Group investors have made out like proverbial bandits during the endless “War on Terror” goes without saying. With “relatively low debt levels for a leveraged buyout,” the investment “has been a successful one for Carlyle, which has benefited from the U.S. government’s increasing reliance on outsourcing in defense.” And with 15,000 employees in the Washington area, most with coveted top secret and above security clearances, Booz Allen’s clients include a panoply of secret state agencies such as the CIA, the DIA, the DHS, NSA and the USAF. With tentacles enlacing virtually all facets of the secretive world of outsourced intelligence, the firm has emerged as one of the major players in the cybersecurity niche market. While McConnell and his minions may not know much about “SQL injection hacks”, Singel points out that what makes this spook’s spook dangerous (after all, he was NSA Director under Clinton) “is that he knows about social engineering, and now he says we need to re-engineer the internet.” Accordingly, Washington Technology reported in April that under McConnell’s watchful eye the firm landed a $14.4m contract to build a new bunker for CYBERCOM. Chump change by Pentagon standards perhaps, but the spigot is open and salad days are surely ahead. Now that CYBERCOM has come on-line as a “subordinate unified command” of STRATCOM, its dual-hatted Director, Air Force Gen Alexander confirmed by the Senate and with a fourth, gleaming star firmly affixed on his epaulettes, the real fun can begin.

A denizen of the shadows with a résumé to match, Alexander is also Director of the NSA (hence the appellation “dual-hatted”), the Pentagon satrapy responsible for everything from battlefield signals- and electronic intelligence (SIGINT and ELINT), commercial and industrial espionage (ECHELON) to illegal driftnet spying programs targeting US citizens. Spooky résumé aside, what should concern us here is what Alexander will actually do at the Pentagon’s new cyberwar shop. A Fact Sheet posted by STRATCOM informs us:

CYBERCOM plans, coordinates, integrates, synchronizes, and conducts activities to direct the operations and defense of specified DoD information networks and prepare to, and when directed, conduct full-spectrum military cyberspace operations in order to enable actions in all domains, ensure US/allied freedom of action in cyberspace and deny the same to our adversaries.

As Antifascist Calling previously reported, CYBERCOM’s offensive nature is underlined by the role it will play as STRATCOM’s operational cyber wing. The training of thousands of qualified airmen, as the Register revealed last month, will form the nucleus of an “elite corps of cyberwarfare operatives,” underscoring the command’s signal importance to the secret state and the corporations they so lovingly serve. Fueling administration moves to “beef up,” i.e. tighten state controls over the free flow of information is cash, lots of it. The WaPo’s veteran reporter and CIA media asset Walter Pincus reported Jun 22:

Cybersecurity, fast becoming Washington’s growth industry of choice, appears to be in line for a multibillion-dollar injection of federal research dollars, according to a senior intelligence official. Delivering the keynote address at a recent cybersecurity summit sponsored by Defense Daily, Dawn Meyerriecks, deputy director of national intelligence for acquisition and technology, said that along with the White House Office of Science and Technology, her office is going to sponsor major research ‘where the government’s about to spend multiple billions of dollars’.

Bingo! According to a Defense Daily profile, before her appointment by Obama’s recently-fired DNI Blair, Meyerriecks was the chief technology officer with the Defense Information Systems Agency (DISA), described on DISA’s web site as:

A combat support agency that engineers and provides command and control capabilities and enterprise infrastructure to continuously operate and assure a global net-centric enterprise in direct support to joint warfighters, National level leaders, and other mission and coalition partners across the full spectrum of operations.

During Defense Daily’s Jun 11 confab at the Marriott Hotel in Washington, generously sponsored by Northrop Grumman, Raytheon, General Dynamics and the Analysis Group, Meyerriecks emphasized although “tons of products” have been commercially developed promising enhanced security, “there’s not an answer Band-Aid that is going to come with this.” All the more reason then, to shower billions of taxpayer dollars on impoverished defense and security corps, while preaching “fiscal austerity” to “greedy” workers and homeowners facing a new wave of foreclosures at the hands of cash-strapped banks. Meyerriecks said:

We’re starting to question whether or not the fundamental precepts are right, and that’s really what, at least initially, this will be aimed at. We need to be really innovative, because I think we’re going to run out of runway on our current approach.

Washington Technology reported Meyerriecks as saying:

We don’t have any fixed ideas about what the answers are. We’re looking for traditional and nontraditional partnering in sourcing.

Amongst the “innovative research” fields which the ODNI, the DS and one can assume, NSA/CYBERCOM, will soon be exploring are what Washington Technology describe as:

Multiple security levels for government and non-government organizations. Security systems that change constantly to create ‘moving targets’ for hackers,” and more ominously for privacy rights, coercive “methods to motivate individuals to improve their cybersecurity practices.

Since major policy moves by administration flacks always come in waves, DHS Sec Napolitano told the American Constitution Society for Law and Policy on Jun 18 that in order to fight “homegrown terrorism” the monitoring of internet communications “is a civil liberties trade-off the US government must make to beef up national security,” the AP reported. While the Obama regime has stepped-up attacks on policy critics who have disclosed vital information concealed from the US people, prosecuting whistleblowers such as Thomas Drake, who spilled the beans on corrupt NSA shenanigans with grifting defense and security corps, and wages a low-level war against WikiLeaks, Cryptome, Public Intelligence and other secret-spilling web sites, it continues to shield those who oversaw high crimes and misdemeanors during the previous and current regimes. In this light, Napolitano’s statement that “we can significantly advance security without having a deleterious impact on individual rights in most instances,” is a rank mendacity. With enough airspace to fly a drone through, the DHS boss told the gathering:

At the same time, there are situations where trade-offs are inevitable.

What those “situations” are or what “trade-offs” were being contemplated by the administration was not specified by Napolitano; Joe Lieberman however, graciously obliged. As “Cyber War” joins the (failed) “War on Drugs” and the equally murderous “War on Terror” as the US’s latest bête noire and panic all rolled into one reeking mass of disinformation, Sens Joe Lieberman (ID-CT), Susan Collins (R-ME) and Tom Carper (D-DE) introduced the Protecting Cyberspace as a National Asset Act of 2010 in the Senate. The bill empowers the Director of a new National Center for Cybersecurity and Communications (NCCC), to be housed in the DHS, to develop a “process” whereby owners and operators of “critical infrastructure” will develop “response plans” for what the legislation calls “a national cybersecurity emergency.” This particularly pernicious piece of legislative flotsam would hand the President the power to declare a “national cyber-emergency” at his discretion and would force private companies, internet service providers and search engines to “comply with the new risk-based security requirements.” Accordingly:

In coordination with the private sector, the President can authorize emergency measures to protect the nation’s most critical infrastructure if a cyber vulnerability is being exploited or is about to be exploited.

Under terms of the bill, such “emergency measures” can force ISPs to “take action” if so directed by the President, to limit, or even to sever their connections to the internet for up to 30 days. While the administration, so far, has not explicitly endorsed Lieberman’s bill, DHS Deputy Undersec Reitinger told reporters that he “agreed” with the thrust of the legislation and that the Executive Branch “may need to take extraordinary measures” in the event of a “crisis.” Under the 1934 Communications Act, the WSWS points out:

The president may, under ‘threat of war,’ seize control of any ‘facilities or stations for wire communications’. Though dated, that definition would clearly apply to broadband providers or Web sites. Anyone disobeying a presidential order can be imprisoned for one year. In addition to making explicit the inclusion of Internet providers, a central component of the Lieberman bill is a promise of immunity from financial claims for any private company which carries through an order from the federal government.

Under terms of the legislation, the president requires no advance notification to Congress in order to hit the internet “kill switch,” and his authority to reign supreme over the free speech rights of USAians can be extended for up to six months after the “state of war” has expired. While the bill’s supporters, which include the secret state lobby shop, the Intelligence and National Security Alliance (INSA) claim the Lieberman-Collins-Carper legislation is intended to create a “shield” to defend the US and its largest corporate benefactors from the “looming threat” of a “Cyber 9/11,” one cannot discount the billions of dollars in plum government contracts that will fall into the laps of the largest defense and security corps, the primary beneficiaries of this legislation; thus the bill’s immunity provisions. Indeed, current INSA Chairwoman, Frances Fragos Townsend, the former Bushist Homeland Security Adviser, was appointed in 2007 as National Continuity Coordinator under the auspices of National Security Presidential Directive 51 (NSPD-51) and was assigned responsibility for coordinating the development and implementation of Federal continuity of government (COG) policies. As readers of Antifascist Calling are aware, plans include contingencies for a declaration of martial law in the event of a “catastrophic emergency.” Whether or not a “national cybersecurity emergency” would fall under the penumbral cone of silence envisaged by NSPD-51 to “maintain order” is anyone’s guess. However, in a Jun 23 letter to Lieberman-Collins-Carper, the Center for Democracy and Technology (CDT) and 23 other privacy and civil liberties groups, insisted:

Changes are needed to ensure that cybersecurity measures do not unnecessarily infringe on free speech, privacy, and other civil liberties interests. While the bill makes it clear that it does not authorize electronic surveillance beyond that authorized in current law, we are concerned that the emergency actions that could be compelled could include shutting down or limiting Internet communications that might be carried over covered critical infrastructure systems. The bill requires CCI owners to share cybersecurity ‘incident’ information with DHS, which will share some of that information with law enforcement and intelligence personnel. While Lieberman-Collins-Carper claim that “incident reporting” doesn’t authorize “any federal entity” to compel disclosure “or conduct surveillance,” the bill does not indicate what might be included in an ‘incident report’ and we are concerned that personally-identifiable information will be included.

Count on it! In a press release, INSA’s chairwoman declared:

The legislation is important in establishing a public-private partnership to promote national cyber security priorities, strengthen and clarify authorities regarding the protection of federal civilian systems, and improve national cyber security defenses.

Amongst the heavy-hitters who will profit financially from developing a “public-private partnership to promote national cyber security priorities,” include INSA “Founding Members” BAE Systems, Booz Allen Hamilton, CSC, General Dynamics, HP, Lockheed Martin, ManTech International, Microsoft, Potomac Institute for Policy Studies and Science Applications International Corporation (SAIC). Talk about one hand washing the other! A casual glance at Washington Technology’s 2010 list of the Top 100 Federal Government Contractors provides a telling definition of the term “stakeholder”! During a recent Cyberspace Symposium staged by the Armed Forces Communications and Electronics Association (AFCEA), an industry lobby group choc-a-bloc with defense and security corps, a series of video presentations set the tone, and the agenda, for CYBERCOM and the secret state’s new push for heimat cybersecurity. During a question and answer session “with a small group of reporters” in sync with the alarmist twaddle peddled by AFCEA and STRATCOM, Defense Systems’ Amber Corrin informed us that “one possibility” floated by Deputy Sec Def Lynne to “keep us safe” is the deployment of the privacy-killing Einstein 2 and Einstein 3 intrusion detection and prevention systems on civilian networks. Defense Systems reported:

To support such a move, a task force comprising industry and government information technology and defense interests has been forged to examine issues surrounding critical infrastructure network security.

As Antifascist Calling reported last July, Einstein 3 is based on technology developed by NSA under its Tutelage program, a subordinate project of NSA’s larger and more pervasive privacy-killing Stellar Wind surveillance operation. Einstein 3’s deep-packet inspection technology can read the content of email messages and other private electronic communications. Those deemed “threats” to national security networks can then be forwarded to analysts and “attack signatures,” or suspect political messages, are then stored in a massive NSA-controlled database for future reference. Federal Computer Week disclosed in March:

The DHS's US Computer Emergency Readiness Team (US-CERT) plans to partner with a commercial Internet Service Provider and another government agency to pilot technology developed by the NSA to automate the process of detecting cyber intrusions into civilian agencies' systems. The exercise aims to demonstrate the ability of an ISP to select and redirect Internet traffic from a participating government agency using the new technology. The exercise would also be used demonstrate the ability for US-CERT to apply intrusion detection and prevention to that traffic and to generate automated alerts about selected cyber threats.

That testing is currently underway and has been undertaken under authority of NSPD-54, signed by Bush 43 in 2008 in the waning days of his administration. While the vast majority of NSPD-54 is classified top secret, hints of its privacy-killing capabilities were revealed in the sanitized version of the Comprehensive National Cybersecurity Initiative (CNCI) released by the Obama White House in March. The Electronic Privacy Information Center (EPIC) has filed suit against the government in federal court after their Freedom of Information Act request to the National Security Agency was rejected by securocrats. The agency refused to release NSPD-54, since incorporated into Obama’s CNCI, stating that they “have been withheld in their entirety” because they are “exempt from release” on grounds of “national security.” In a follow-up piece earlier this month, Federal Computer Week disclosed:

The exercise will also allow the DHS, which runs the Einstein program, to share monitored information with the National Security Agency, though that data is not supposed to include message content. The recent combination of those three elements — reading e-mail messages, asking companies to participate in the monitoring program, and getting the NSA in the loop — has set off alarm bells about future uses of Einstein 3.

Those bells have been ringing for decades, tolling the death of our democratic republic. As military-style command and control systems proliferate, supporting everything from “zero-tolerance” policing and urban surveillance, the deployment of packet-sniffing technologies will soon join CCTV cameras, license plate readers and “watchlists,” thus setting the stage for the next phase of the secret state’s securitization of daily life.

6 Comments

  1. lafayette sennacherib
    Posted June 28, 2010 at 4:35 pm | Permalink

    I assumed this stuff was already operative. I heard that GCHQ auto-scans all UK telephone call for key-words and flags for further attention, so I expected they’d be at least well advanced to doing it for email.

  2. Posted October 27, 2010 at 11:10 am | Permalink

    At one time, I was against these spies collecting all that personal info, but not anymore.

    I say we clog up their fucking spy apparatus with so much useless info, that the stuff worthwhile gets lost like a needle in that haystack.

  3. niqnaq
    Posted October 27, 2010 at 12:02 pm | Permalink

    It always seemed to me that the mere ease of collecting information was counter-productive in the sense that it would produce a meaningless glut. ‘Content analysis’ is supposed to deal with this, but I do not see how it can really become ‘heuristic’ and get beyond the ‘keyword’ stage, which still leaves you with the glut, because for every perpetrator who talks about forbidden activities, there are hundreds of armchair critics (like ourselves) who idly speculate about them, not to mention writers of ‘hard-boiled’ trash fiction, who customarily begin their stories with sentences like:

    The cops were dead before they hit the ground.

  4. Tom
    Posted October 27, 2010 at 12:21 pm | Permalink

    Not to mention the nerds who are assigned to sort through this sort of stuff are ideologically indoctrinated in obvious ways (as we all are, but their biases and blind spots will be obvious to anyone who is familiar with their State’s ideology) and so you sort of know what they’re going to come up with anyways. They can only really chase things that they know to look for, they can’t locate the real and present threat to their grounding, which derive from the demands of the population they govern. They repress these demands in various ways that produce biproducts and change the focalization of the demands, so that they are basically only ever playing Whacka Mole against their own citizenry.

  5. niqnaq
    Posted October 27, 2010 at 12:30 pm | Permalink

    I just found a site apparently dedicated to exposing the nefarious doings of the global Muslim Brotherhood:
    http://www.globalmbreport.com/
    However, to judge by its front page, what they are actually exposing is the everyday working of the US Govt, which must perforce consult with all sorts of Muslim organisations, practically all of which can be linked historically to the MB in some way. I was led to this by an article in Ynet called “The Real Muslim Threat”:
    http://www.ynetnews.com/articles/0,7340,L-3975144,00.html
    One could imagine the Roman empire of circa 200 c.e. sending round scrolls detailing “the real Christian threat.” This is rather a disconcerting thought, because we know how they dealt with the “threat” in the end: by becoming a castrated version of “Christians” themselves, and stamping out all other versions, at least within the borders of the then empire. However, as I remind myself, the Qur’an is a lot more explicit that the Christian ‘Gospel’ in ruling out all the obvious means of doing this. There were doubtless a lot of much more explicit ‘Gospels’, but not being organised into a coherent whole the way the Qur’an is, these were a lot easier to dispose of (as ‘heretical’).

  6. Hoarsewhisperer
    Posted October 27, 2010 at 3:54 pm | Permalink

    What’s amusing about this is that, as Greg B points out, it’s impossible to sift all of the information gathered. But what makes it hilarious is that the system is so expensive to operate and maintain that it is under constant pressure to produce ‘results’ in an environment in which genuine terror plots are few and far between.

    Thus they need the CIA and FBI to keep making stuff up and setting up sting operations to frame people (and make sure that each case includes a tall tale about how indispensable the surveillance operation was to cracking the case).

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s