Internet Anthropologist Think Tank

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Sunday, June 26, 2011

    Is Lulzsec Gone? NO

    The lulzsec phenomena is going to reoccur.


    They have declared their mission is over at an arbitrary 50 days.
    Our paradigm intel indicates the 50 day limit is due to the HEAT.
    ( Many of the helper players are going to get burned, poor Opsec.
    Lulzsec quit to try and protect these guys, the leader is untouchable. He
    has started a legal fund. )
    Not from the Feds, Scotland Yard or CIA or FBI, but from
    Anonymous.
    Anonymous burned 19-year-old Ryan Cleary.
    Exposing his real identity.

    Lulzsec grew from the loins of Anonymous, a splinter group.
    They are the maturing of kiddies of 4chan, who did not mature
    as adults, and are in the hacking for the Lulz, or so they want
    us to believe. In time we will know if there was a secret mission
    behind Lulzsec.
    Lulzsec will dissolve back into Anonymous. We now have
    proof of concept, and are awaiting a Uber hacker to do some 
    real destruction.


    The Image they project is that of Uber hackers, but it is a false
    image, they took relatively low level hacking methods and turned
    parts of the Internet upside down.
    They caused $20 billion loss in stock price for Sony,
    $36 a share down to $26 a share for a billion shares.
    Sony brought this on for trying to maintain ownership of
    a product after they sold the product.
    A hacker changed his Sony game station to be more playable
    and fun, and Sony went after him, and Lulzsec went after Sony
    using a simple hack and released player and Intellectual propriety,
    on what seemed like a dozen Sony servers around the world.

    Lulzsec has taken bottom tier, one step above kiddy scripters
    hacking and taken this relatively low level using standard tools,
     to the ultimate level or distruption.
    While their exploits/adventures are remarkable it is less a
    story of their hacking skills and more a story of the abysmal
    lack or real security and security standards on the WWW.

    And a demonstration of hacktivism, and the descent and abuse
    of the User community. A manifestation of the change in
    the consumer paradigm, a shift from the "buyer is always right"
    to "how far can we legally cheat the customer".
    A fundamental example of this customer paradigm shift
    is the Comptroller of the Currency legalizing usury,
    without any electorate vote by passing Congress and the
    public, legalizing 640% loans, an act for which the FBI used to
    put the Mafia in prison.
    Another example is Million dollar fines for Internet shoplifting
    a few MP3 songs.
    They complain of the control of large corporations over
    Congress and the Whoring by congressmen giving Billionaire
    Wall St Bankers $700 billion tax cuts even while they brought
    down the world wide banking system with their sub-prime
    scam and a $2,7 Trillion dollar bailout and lack of prosecution 
    for their criminal actions.


    The system is begging for more Lulzsec paradigms,
    this is in the spirit of the Egyptian demonstrations
    which brought down a Government and in response
    to the corruption in US Congress.

    Liberty loves Justice

    Lulzsec is in part blowback from a public that feels powerless 
    and abused. Their 250,000 followers gave them the fuel and
    man power to take down the CIA site as a display of power.
    and a new weapon Telephone DDos against the FBI office
    in Detroit.

    This also displays the Feds inability to DOX to burn or
    out someones real Identity, this requires a special skill set
    related to social media. For truly the WWW remembers 
    everything. And trails are every where.
    Once LE found a chip in Luzsec armor they quickly
    exploited that to turn the secret network on its self,
    and Lulzsec quickly disengaged, announcing an end
    of their activities.

    The main members of LulzSec, adds Rachwald, include:
    Sabu – the HBgary hacker and who seems to be the leader
    Nakomis – a coder, rumored to be one of PHPBB coders.
    Topiary – finance, handles donations and payment for services such as botnets
    Tflow – hacker (rumored)
    Kayla – hacker who owns a big botnet
    Joepie91 – website admin
    SOURCE:

    What does the future hold?

    Current operation Opeser:

    Then next Lulzsec paradigm player?
    The Lulzsec paradigm in full.

    Much of this hackivism attacks are related to the passive
    nature of cyber security. THERE IS NO DETERRENT.
    Load your hunny pot with Ebola

    The answer to these attacks is two fold:
    Bring Corporate control of Congress to an end,
    And move to an offensive paradigm against hackers.

    But the US paradigm points to continued inaction
    until there is massive destruction

    Cyber Attacks catastrophe pending


    We see the problem, we see potential solutions and continued
    inaction.


    Gerald
    War Anthropologist
    Tactical Internet Systems analyst.

    Our Paradigm Intel says:
    ( We have run NO operations against Lulzsec, only paradigm Intel. )
    The secret head of Lulzsec isn't a 19yr old, but 50+and Gov trained and rogue He will remain anonymous,even members do not know his ID. We think his objective was to expose just how
    bad security is on the WWW. But he is herding cats, Punks, and the Lulz was a form of control. G




    Labels: , ,

    Terrorist Names SEARCH:
    Loading

    Wednesday, November 04, 2009

    CENTCOM needs lubricant.




    CENTCOM looking for lubricant.
    ( CENTCOM, comes in English, Russian, Arabic
    and FARSI; G )

    Info war is the lubricant for the Transition
    from War fighting to Peace keeping.

    USA is trying to do a DRY transition.
    And it hurts, the paradigm is stuck.

    Transformation, Afpak paradigm stuck.

    Paradigm Intel.
    CENTCOM & SOCOM is stuck, the Afpak paradigm is stuck,
    The Paradigm wheels just aren't getting Traction.

    The elements are in place, building the Miliatary
    Force , developing the SYSADMIN force.

    But the transformation isn't taking place.
    The War fighting component is caught in a
    "Catch 22" cycle.

    The more Taliban they kill the more join.
    The US Military has curtailed killing the
    enemy, the Taliban KIA could be 10X
    what it is now, the Military now .have that
    capability.

    They have unmanned drones in Afpak,
    piloted by troops in Las Vegas, looking
    one person half a world away, to kill
    him with a missile. Time between spoting
    the target and killing him 8 min.

    The Military and CIA are targeting mostly
    the Taliban leadership and only 'attacking forces'.
    Those actively engaged in attacks on US troops.

    If the Taliban are at home, not engaged
    in attacking US Troops at the moment,
    USA doesn't kill them.

    The Paradigm indicates killing rank and file
    Taliban actually increases voluntary recruits.

    H. Clinton put her finger on the problem.
    Afpak does not understand what USA is
    doing in Afpak.

    The Taliban and al Qaeda spin US motives
    constantly, and in the worst directions.


    The Transition from War fighting forces to Peace
    keeping Troops isn't clearly defined,
    And the transition is stuck.

    The war fighting isn't over, and the Peace keeping
    civilians can't be brought in to connect the Country
    to the core, or build up the infrastructure until
    security is established.

    And currently it is believed the war fighting can't
    be completed until the infrastructure is built up.
    To help win the hearts and minds.
    And thats the Catch 22.


    The element/ monkey wrench in the system
    is the Info War failure.

    "We are not getting through". Clinton.

    The average Afpak doesn't GET it.
    The USA message isn't getting through.

    And as long as that is the case the Taliban
    will always have lots of volunteers,
    Replacements.

    The Taliban and al Qaeda are ahead in the
    Info War, they are indigenous and completely
    understand the lines and methods of communication.
    And are effectively spinning USA motives and actions
    against the USA.


    The transition from war fighting
    to peace keeping won't / can't
    happen until the Info war is truned around.
    The Indigenous must "GET US" before
    the war fighting can end and the Peace
    keeping can start.

    Loosing the Info WAr:

    The USA Info War must shift to a new paradigm.

    Find the Michael Moore of Afpak, start with
    a set of facts everyone agrees to, and produce a
    movie in Pashtun, distribute all over Afpak.

    Start an Abbot and Costello as al Qweda
    FM radio show and broadcast it weekly all over
    Afpak in 3 or 4 indigenous languages.

    Info War will spread d be more effective
    if its GOOD entrainment.

    In Afpak the USA Info War doesn't even have to
    WIN the hearts and minds, just expose the
    lies of the Terrorist, and help them "GET"
    USA, motives, etc.

    That has the potential to cut down the
    Taliban volunteers and give attrition
    of leadership a chance to work.

    Some Info War oil will help the Transition
    slide into place.

    The Army and CIA need to coordinate their
    paradigms, Army counter insurgency in Afgha
    and the CIA counter terrorism in Paki.
    So they are working towards same goal.



    Gerald
    Anthropologist

    Labels: , , , ,

    Terrorist Names SEARCH:
    Loading

    Tuesday, July 21, 2009

    Future warfare Pardigm, 07.21.09


    xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx



    Future warfare Paradigm.
    By Gerald Internet Anthropologist Think Tank.


    Our paradigm Intel engine produced
    some scary hypothesis.

    Currently the US Military is moving towards
    a robotic Military.
    Robot mules, choppers, trucks, planes etc.

    I've done some programing on AI projects.

    One prototype had a life span, and personality.
    Each program would respond differently.

    Each came with a total personality inventory.
    Upon activation a random number based
    on exact time and date, did a random block
    of random blocks of personality.

    Thereby making each an Individual.

    Current technology can't build a RAM
    chip big enough to equal the ability
    of the brain.

    They can be modeled, faked but
    technology just can't do it.

    There is also a movement to creating
    We use a 8 lb, ram chip, now,
    our brain.

    How they gona make a bio chip with 100 million
    MIPS of computer power.

    By using all the Technology,




    The question becomes 'will a biological
    computer, living computer, develop
    self awareness'.

    If it does, which seems the natural course
    of nature, will it defend its self.

    The robots are already there, just need a
    bio computer to run them.

    If human kind were to marry a self aware
    bio chip to a robot, at some point we will
    go to war with them.

    Seems MAN is doomed to war,
    based on history.

    In all the scfi on TV and the Movies
    the question of power sources
    never comes up.

    But where does the electrical power
    come from for the robots.

    WIRED, the DANGER ROOM
    spoke to the Question.

    Company Denies its Robots Feed on the Dead

    We completely understand the public’s concern about futuristic robots feeding on the human population, but that is not our mission,” stated Harry Schoell, Cyclone’s CEO. “We are focused on demonstrating that our engines can create usable, green power from plentiful, renewable plant matter. The commercial applications alone for this earth-friendly energy solution are enormous.” (emphasis in the original).


    If you think about it, power from the environment would be the most reasonable.
    But one might think you could get more energy from MEAT vs Vegetable. And a by product:Soylent Green,

    Which would the "Soylent Green" Lobbyist chose a robot that ate Wheat or Meat?

    You know what I think.
    As an analogy the war might look like the war in Pakistan,
    But US Military would be in the weaker role, and the
    Mechas, ( robot + Bio. ) in the current role of the US Military.

    Thats an interesting Hypothesis.
    Will Darpa design the Paradigm for Mecha
    war?
    Is the first pic in this column "mecha abuse",
    if it had a bio computer it might be.
    We may want to rethink our options for a Cyber Pearl Harbor.

    Gerald
    Anthropologist

    copyrighted, that may make a good Movie. G
    2009.
    .





    Do we give them "Rights" before or after
    the REVOLT?

    .

    Labels: , ,

    Terrorist Names SEARCH:
    Loading

    Saturday, August 09, 2008

    Internet Anthropology and the GWOT

    BIG 'SURVEILLANCE BOT' ANNOUNCEMENT MONDAY 2 PM EST gVisualization of the various routes through a ...Image via Wikipedia




    We are entering a new era of Internet warfare, "New uses and discoveries for the INTERNET will center on "PROCESS" & "ORGANIZATION".

    The Internet can be turned against the Terrorist, but there doesn't seem to be much cooperation
    between government agencys. Turf, methods and Intel are still cloistered.

    There is a classification of "Security Anthropologist" but the work I do is a little different,
    it is Internet Anthropology.
    I am defining Internet Anthropology in this case as the study and research of the interactive interfacing of human culture with this technology the Internet.

    And my studies have take me into the war arena looking for ways to implement this information into methods of Intel collection. With the focus on actionable Intel.

    We have written white papers for the Air Force, "Dominating the Internet Domain", to White papers for the Army and Department of Home Land Security.
    And an invitation to speak at the Chinese The 16th World Congress of IUAES, on Social Change Engines.
    And the International Conference Organized by the Turkish National Police on Democracy and Global Security use our Intel and site in presentations.


    Some of my conversations with the Government's genius lead anthropologists Brian R SelmeskiCiv USAF AETC AU/CFA, have been very enlightining, and excitiing.

    There is a open field in the study of Internet anthropology and its uses in the GWOT.

    Gray Intelligence


    Observation, synthesis and action are the essence of applied Anthropology.

    The application of these ethnographic studies can make the Internet work against the Terrorists.

    We continue to work these advantages and drive new uses for Internet technology.

    http://warintel.blogspot.com/2009/02/applied-anthropology-and-fourghs.html

    We have over 100,000 BSU's on call.

    And I want to thank our Civilian Battalion ( 4 companies ) for their hard and diligent work.

    Gerald
    Internet Anthropologist.


    Zemanta Pixie

    Labels: , , , ,

    Terrorist Names SEARCH:
    Loading

    Tuesday, June 24, 2008

    yo


    Analysis: Rice presses for a US diplomatic presence in Tehran

    June 24, 2008, 9:05 AM (GMT+02:00)

    DEBKAfile’s Washington sources, report that by the dramatic step of establishing a US interests section in Tehran, 27 years after relations were severed with the Revolutionary Republic, the Bush administration would hope to wash its hands of any Israeli plan to strike Iran’s nuclear sites this year.

    Behind the step are US secretary of state Condoleezza Rice and her former deputy Nicholas Burns; its disclosure to the American media attests to White House backing.

    The step slots into the American presidential campaign by distancing President George W. Bush from conservative elements, whose thinking was encapsulated by Bill Kristol, of the Weekly Standard when he told Fox News Sunday, June 22: “If President Bush foresees the likelihood of an Obama election, he may decide to go ahead with such an attack. However, if the President thinks Sen. McCain will be the winner, he would leave the Iranian situation for President McCain to handle.” This view was endorsed by Daniel Pipes, a Middle East expert and member of the conservative Hoover Institution.

    Democratic Barack Obama has increased his margin against the Republican John McCain by 15 percent.

    Regarding the likelihood of an Israeli go-it-alone attack on Iran, former U.N. Ambassador John Bolton said in the same broadcast:

    "I think if they [Israel] are to do anything, the most likely period is after our elections and before the inauguration of the next President. I don’t think they will do anything before our election because they don’t want to affect it.”

    Sunday, DEBKAfile reported the estimate of Israeli intelligence and military circles that the extension of Mossad director Meir Dagan’s tenure for another year up to the end of 2009 points to a probable Israeli military action against Iran this year before the Bush presidency runs out.

    The unsolicited statement by Condoleezza Rice came next on Monday, June 23. On her way to a conference in Berlin of donors to the Palestinian Civil Police Force, she spoke of opening a US interests section in Tehran similar to the one maintained in Cuba. In so saying, she broke away sharply from the international drive led by the Bush administration to isolate Iran for refusing to give up uranium enrichment.

    She said: “We do have the station in Dubai where [Iranians] can get visas, but we know that it's difficult for Iranians sometimes to get to Dubai. We want more Iranians visiting the United States. We are determined to find ways to reach out to the Iranian people."

    Middle East peace negotiators, Israeli foreign minister Tzipi Livni and Palestinian ex-prime minister Ahmed Qureia are attending the Berlin conference.

    Since the 1979 siege of the US embassy in Tehran by revolutionary zealots, Washington has been represented in Tehran by the Swiss embassy. This arrangement has become untenable since Switzerland signed a bi gas deal with Iran, in breach US sanctions against the Islamic Republic.

    SOURCE:

    xxxxxxxxxxxxxxxxxxxxxxxxx

    I started to digram DEBKA's Paradigm, and it is not adhering to it's own standards of clarity or argument within its own ontology.

    DEBKA isn't usually sloppy, and I don't think they are here.

    Gerald



    .


    Labels: , , , ,

    Terrorist Names SEARCH:
    Loading

    Friday, June 20, 2008

    Slowly going broke


    24/7

    Internet Anthropologist Team is looking at options to raise funding for out of pocket expenses.
    $1,000 a month doesn't seem like much, unless its coming out of YOUR pocket.
    And over the years it adds up, and doesn't help with savings accounts.
    That could be going to retirement funding.

    One option we are looking at is publishing our ops data, which would create a huge
    jump in readership, and raise our Google adsense revenue.
    ( If Google ever sends us our PIN )
    We would have a week time delay between reporting to feds and publishing.
    ( Looking for guidance advice on this option. )

    Currently we only report ops data to the Feds. None of it is published.
    This would also help with recruitment, as all the Intel work in our Cyber Companies
    is currently compartmentalized , No one but the director ever sees the big picture, or completed work product.
    Allowing the cyber troops to read the finished product would be a huge moral booster and recruiting boon.

    As costs and program fee requirements continue to climb, very soon this funding issue
    will become an issue of survival.

    We welcome all ideas and concepts.
    We have not worked out a funding paradigm as of yet.
    And we have to come up with a solution.

    Gerald

    InternetAnthropologist at Gmail.com

    Ramen noodles even with pizza sauce get old.

    ,

    Labels: , , ,

    Terrorist Names SEARCH:
    Loading

    Sunday, June 01, 2008

    USA supports the Taliban, NOT


    Afghanistan, March 2002 - Afghan girls sing at a celebration of International Women's Day, March 8. The ceremony took place at the Ministry of Women's Affairs, which USAID helped rehabilitate.Image via Wikipedia

    Sunday, June 1, 2008

    Many Afghans believe the US supports the Taliban

    It is a commonly held belief among ordinary Afghans the U.S. forces do not want peace and security in Afghanistan – and that in fact, American forces are supplying and supporting Taliban insurgents.
    Kabul Times editorial, May 21, 2008

    When I read the statement above, I didn’t know if I should be shocked and angry or simply bemused. I’m not sure of the reputation of the Kabul Times, a periodical that appears regularly on my base. One of my Afghan colleagues, for reasons I don’t understand, dismissed it as a publication of the mujahedeen; but I was very curious if in fact the common Afghan really believes that the US supports the Taliban. So I asked several Afghan friends with whom I work, and their polite yet earnest responses were that many of their countrypeople are suspicious that the US doesn’t want a lasting peace in Afghanistan, and they gave the following arguments as typical for supposed US support of the Taliban:

    Why does the US let the Taliban hang around?

    In 2001, US forces routed the Taliban from Kabul and most other regions of Afghanistan in less than two months. With that context, the Afghan mind posits: Why does the US now have trouble destroying small cells of insurgents positioned throughout the country? The answer: Because the US isn’t trying. The US is a victim of its own previous success, with the general Afghan public blithely unaware of the complexities and difficulties inherent in expunging organic groups of rebels who merely need to cross the border into Pakistan for sanctuary and training. Afghan disbelief of the true US intent – to rid Afghanistan completely of insurgents – is analogous to a patient’s dismissal of modern medicine with the argument that physicians are not interested in preventing the common cold even though they relish curing some cancers and transplanting organs.

    THIS POINTS OUT THE EASE OF ATTACKING A SETTING GOVERNMENT VS TAKING ON AN INSURGENCY. IN 2001 USA WAS THE INSURGENCY TYPE FORCE, NOW THE TALIBAN ARE THE INSURGENCY.G

    Corrupt government: Perfected by Afghans, funded by Americans

    A colleague of mine who is a respected physician in the Afghan Army was quite emphatic when he told me that the #1 enemy of the Afghan people is not the Taliban, but corruption; and especially corruption at the highest levels of government. Many Afghans resent their current leaders and ministers, many of whom fled Afghanistan when the Taliban took control of the country. These elites returned to Afghanistan and power due to American support – and money. The typical Afghan, who has seen little benefit from the billions of dollars of international aid sent to Afghanistan in the last seven years, apparently is easily convinced that the power elite of the country, seemingly beloved of the Westerners, has no incentive to alter the current state of affairs in Afghanistan as their graft of foreign aid is quite a lucrative undertaking; and the Western aid dollars might stop passing into Afghanistan and their own pockets should Afghanistan ever stabilize into a peaceful, secure state.

    USA DOESN'T FIGHT CORUPTION, IT IS VIEWED AS A COST OF DOING BUSINESS.G

    Western governments, exemplified by America as the US both politically and militarily has the most visible foreign profile in Afghanistan – indeed, many Afghans assume any Caucasian to be American – must know the corruption exists, reasons the typical Afghan, and yet they still support thieving Afghan officials who have no interest in truly reforming Afghanistan for the good of the common citizen; therefore, the Westerners (i.e. the Americans) must support an unstable Afghanistan, which means they support the newly resurgent Taliban.

    The Afghan argument here proves itself a syllogistic fallacy at several junctures, but a philosophic analysis and repudiation of what many Afghans believe likely will not change their minds. History shows that emotion and belief are usually cruel victors over reason. What might change the Afghan mind, say my colleagues, is evidence that foreign aid is earmarked for the country’s development instead of the ministers’ bank accounts. “No one here wants to fight,” an Afghan physician told me. “Build a road for people, and they will be thankful and peaceful.” This from a man raised in Helmand, a province infamous for producing Taliban fighters.

    The guys you want are just across the border in Pakistan. Why don’t you go get them?

    The Afghan people know, as do the Pakistani people and the American government, that most Taliban and other willing insurgents ready to fight in Afghanistan are trained across the border in Pakistan. Pakistan historically has been the prime supporter of the Taliban. If the US truly wanted to rid Afghanistan of the Taliban and other insurgents, thinks the typical Afghan, it would destroy the bases it knows exist in the northwest territories of Pakistan. The US doesn’t do that, but instead maintains a (notably uneasy) alliance with Pakistan. And so the (illogical) deduction holds that the US supports the Taliban as does its ally Pakistan.

    POINT TAKEN. G

    I’ve learned over my four months in Afghanistan that most people here harbor little-to-no fondness for Pakistan, as the Afghans believe (with some justification) that their neighbor’s goal is to keep Afghanistan poor and destabilized. So I got nowhere arguing to my colleagues that the US-Pakistan alliance had everything to do, initially, with removing the Taliban from Afghanistan. Nor did they cotton to my proposition that the US is overly taxed now fighting wars in two countries, and a third front just might send the military into an irreversible downward spiral.

    I was relieved to hear from my colleagues that although many Afghans might believe the US condones the activities of the Taliban, they don’t think the US directly funds and supplies those insurgents. Instead, many Afghans site evidence that the British are the foreign force bolstering the Taliban with weapons, food and material. I’ll write more on that topic at a later date.

    Labels: , , , ,

    Terrorist Names SEARCH:
    Loading

    Saturday, May 31, 2008

    Pentagon getting close.






    United States ArmyImage via WikipediaUSA military getting close to an effective Internet Paradigm.
    But they are still missing the point.

    MilSpace has the spirit but misses the key point.
    It is secret, high grade encrypted, NON PUBLIC.

    But there is hope they have laid the seeds of self discovery, they will trip over the correct Paradigm, even if their boots are not laced. Read the following.

    "Kimball attributes much of his organization's successes to consistent support from the Army's graduate-level academic establishment centered on Ft. Leavenworth, Kans. The top general at Leavenworth, William Caldwell, even announced in May that blogging would be part of the formal graduate curriculum going forward."
    Great article
    Permalink

    The terrorist have thousands of web sites promoting thier lies, propaganda, and violence.
    The USA has a hand full of sites, and the State Department has 30 people trying to counter the propaganda.

    Train your troops and turn them loose with their own blogs.They will counter the terrorist, and give voice to USA perspective.

    To be sure the Terrorist have secret sites, but most are public, for funding, recruting and propaganda. USA is not recruiting Muslim counter terrorist on the net. And they do have the ability to do so.

    The military could have thousands of sites promoting USA, but they don't, they are still functioning with the wrong paradigm.

    But they have picked up on errors in the old paradigm and corrected them faster than I thought possible. They are evolving faster than al Qaeda ever has.

    A lie posted often enough, in enough places, and not countered becomes the TRUTH, on the Internet... Is a paradigm the Military has yet to learn.

    I submitted a classified white paper to the Air Force when they called for paradigms on the WWW war.
    And to DHS, NICC.

    "Internet WAR Paradigm:"
    Dominant Cyber Offensive Engagement and Supporting Technology.
    We are Paradigm Architects.
    Observation, synthesis and action are the essence of applied Anthropology.

    "New uses and discoveries for the INTERNET will center on "PROCESS" & "ORGANIZATION".
    USA military still lacks a comprehensive, effective WWW paradigm.
    And from what I've seen the most advanced services a year away from having one.

    Gerald
    Internet Anthropologist, ad Magnum
    .






    Labels: , ,

    Terrorist Names SEARCH:
    Loading

    Wednesday, April 02, 2008

    AIR FORCE INTERNET PARADIGM ERROR



    BUMPED SEE SECOND SECTION IF YOU HAVE ALREADY READ FIRST.



    FIRST SECTION:
    The Dogs of Web War

    By Rebecca Grant
    After years of claims and counterclaims concerning the severity of national security threats in cyberspace, the picture is at last starting to become clear. Recent jousting within cyberspace has provided clues about what to expect from combat in this new domain.

    EXCERPTed:

    The new Cyber Command will focus dedicated attention to the problem. Elder and others are working to lay the foundation for a cyberspace career path in the Air Force on a par with those for weapons systems and specialties. "We're looking to set up a professional cadre of cyber operators, and this would be enlisted and officer," Elder said.

    Investing now in survivability should help keep down the costs of buying new technology. A prime system is the Combat Information Transport System Block 30. "This is a system that is reducing our exposure to the commercial Internet," said Elder. "It's providing us much greater situational awareness in terms of being able to track the traffic on our networks.

    ( SURVIVABILITY? ? ?...I am aghast. The main mode of handling the cyber threat is "SURVIVABILITY". While this is crucial, its a poor paradigm. The Marines don't have as their main paradigm DEFENSE. THE main paradigm should be offensive. KILL THE ATTACKERS. G. )


    Already, however, Cartwright hinted at a greater freedom of action in the cyberspace commons. "Once you leave our shores, then the military authorities start to be present, and what we do is layer the defenses out as best we can to get the most warning, situation awareness that we can to protect our interests," he said.

    Given the constant probing, investing in survivability is a big priority. The cyber balance of power is "the most dynamic world we've ever seen," said a senior STRATCOM official. Software security fixes may just last for hours.

    ( NOTHING ABOUT OFFENSIVE CAPABILITIES, DESTROYING THE ATTACKERS WEAPON, THEIR server/PC. FOCUS IS NOT DEVELOPED YET. G )

    Investment will fund software tools to track vulnerabilities "before the hackers find them," said Elder, and insulate them with database wrappers that create portals to block incursions. The Air Force is also investing in extensive database encryption—a proven technique. "It's just much more difficult for someone to fool with your system when the data's encrypted," Elder said.
    Yet it may take an increased sense of strategic threat to force clarification of the cyberspace mission.

    Currently, there are classic divides. The intelligence community uses cyberspace in its tradecraft. Yet there is growing demand for operators to be able to exploit the same turf.

    Also yet to be determined is how much traction the Air Force is getting with its commitment to cyberspace.

    ( NOT MUCH TRACTION, GWOT HAS BEEN IN EFFECT FOR 6 YRS AND AIR FORCE DOESN'T EVEN HAVE ACTIVE CYBERWAR, WEB PAGE OR ACTIVE RSS FEEDS FOR THE WWW SERVICE, NAVY ( NNIC ) IS WAY AHEAD ON OSINT AND ITS VALUE/CAPABILITIES. They have a web page but I can't get into, no sec. clearance, which is ok, and no public face. G )


    US armed forces face "peer" adversaries in only one area—military cyberspace. ( NOT )


    More than ever before, cyberspace is on the minds of America's top leaders. Air Force Gen. Kevin P. Chilton, the new head of US Strategic Command, said during his confirmation hearing that "attacks impacting our freedom to operate in space and cyberspace pose serious strategic threats."

    Defending the nation from cyberspace attacks is STRATCOM's mission—but one of the big challenges is assessing the strategic threat and demarcating lines of response.

    It all begins with knowing the adversary. China is at the top of most lists of nations with advanced cyber capability—and the will to use it. ( The RBN has more advanced capabilities, G )

    Because of the overall tenor of military competition with China, every report of Chinese activity raises hackles. In fact, there's been a steady level of reported skirmishing in cyberspace this decade.

    Tactic No. 1 is near-constant pressure on US government systems. The goal of these attacks is to breach systems and leave behind malicious code capable of redirecting network activity or enabling access to stored data—to change it or steal it. "Cyber is all about 'protect it or steal it,'" Lt. Gen. Robert J. Elder Jr., commander of 8th Air Force and USAF's point man on cyber issues, said last year.

    "Estonia was kind of a wake-up call," said Marine Corps Gen. James E. Cartwright, vice chairman of the Joint Chiefs of Staff and previous head of STRATCOM. "We've got to make sure we have situation awareness at a scale commensurate with our equities."

    All doubt about Chinese culpability in these sorts of attacks vanished shortly after Russia's likely assault on Estonia. Pentagon sources acknowledged that a Chinese attack broke into an unclassified e-mail system used by the Office of the Secretary of Defense in June 2007. As reported by the Financial Times, the Pentagon attributed the attacks not only to Chinese server locations but to the People's Liberation Army itself.



    Air Force Lt. Gen. Daniel P. Leaf, deputy commander at US Pacific Command, told the Washington Times in November 2007 that computer attacks were a growing problem. "We're very concerned about that—for the information that may be contained on [the networks] or for the activities we conduct that are command and control and situation awareness related," he said.

    The attacks are of interest not for their fleeting effects—but for what they suggest about adversary intent, evolving capabilities, and the potential for debilitating breaches.

    ( I WANT TO HEAR COMPLAINTS FROM ATTACKERS ABOUT PC HARD DRIVES/SERVERS BEING DESTROYED, ABOUT THE USA MILITARY HARSH DEALINGS WITH HACKERS, G )

    "China has put a lot of resources into this business," said Elder. Communist China's public doctrine calls for dominating the five domains of air, land, sea, space, and the electromagnetic spectrum. Although "they're the only nation that's been quite that blatant," Elder said, "they're not our only peer adversary."



    The Air Force has recently taken bold action in this regard. In 2005, it elevated cyberspace to a level on par with air and space, when cyberspace was added to USAF's mission statement.
    Marine Corps Gen. James Cartwright (l) meets with USAF Lt. Gen. Robert Elder for a status brief on issues including the stand-up of Cyberspace Command.


    Rules of Engagement ( NONE )
    Elder himself oversaw the service's cyberwar capabilities during the time when the mission was being reinforced by the creation of a new Cyber Command, the Air Force's 10th major command.

    A larger policy problem rests with calibrating cyberspace operations to a scale of legitimate action. Over the last decade, rules of engagement for kinetic military operations—like targeting a terrorist safehouse in Iraq—have become highly refined.

    Theater-level rules of engagement, collateral damage estimation, and positive identification all must be observed before any strike takes place. Rules such as these keep responses proportionate to the political-military goals of an operation. It's a framework familiar to the hundreds of thousands of US troops operating around the world today.

    With cyberspace operations, that framework is not so prominent. German Chancellor Angela Merkel said recently that China "must respect a set of game rules."

    But what are those rules, and what constitutes a breach? Connecting cyberspace activities to the geographical norms of international politics is no easy task.

    ( YES IT IS, IF AN ATTACK COMES FROM XYZ SERVER, TAKE IT DOWN, USA HAS A RIGHT TO SELF DEFENSE, IF A SERVER HAS POOR SECURITY, AND IS COMPROMISED, USED FOR AN ATTACK, USA STILL HAS A RIGHT TO SELF DEFENSE, AND THE RIGHT TO TAKE OUT THE ATTACKING SERVER OR PC. WHICH WILL ALSO FORCE OWNERS OF THE SERVERS TO USE GOOD SECURITY AND VET USERS. G )


    For centuries, most international law has depended on the concept of sovereign borders and sovereign rights of states to gauge legitimacy. Everything from the Geneva Convention to the law of armed conflict is predicated on most offenses taking place between—or within—sovereign states. Rules of war also take for granted that events occur at a physical location tracing back to a nation-state.

    It is easy to tell when a state is using tanks or artillery against its neighbors or its own populace. With cyber attacks, it's unclear when and whether the state is involved.

    ( DOESN'T MATTER, IF IT IS STATE SPONSORED OR NOT, AN ATTACK IS AN ATTACK, USA HAS A RIGHT TO SELF DEFENSE. POLICE ARE NOT CONCERNED ABOUT OWNERSHIP OF A BUILDING A SNIPER IS IN, THEY TAKE OUT THE THREAT. G )

    Tracing attacks back to the originating Internet service provider does yield a physical location. (Cyberspace is projected from a physical infrastructure of servers, routers, and computers that have definite and sovereign physical locations.) However, cyberspace exists in a domain deemed independent of the nation-state.

    What's harder to establish is whether people conducting the attacks are hackers working on their own or at a government's behest. If a computer remotely "occupied" by hackers traces a physical location to China, that is not necessarily evidence that China is behind the scheme. The ambiguity works both ways, however. If China is behind an attack, it has built-in deniability.
    Estonian police use tear gas and truncheons to disperse a crowd protesting the removal of a bronze statue of a Russian soldier from the center of the capital city. The clash resulted in a massive cyber attack on government and private Web sites.


    A Fundemental Question
    "In this environment it's just very difficult to tell the point of origin," said Cartwright. "The source of the activity can be widely separated. Al Qaeda can live on a US ISP and execute from someplace else. How do we handle that?"

    ( TAKE OUT THE ATTACKING SERVER OR PC, THIS WILL IN THE LONG RUN HELP SERVICE PROVIDERS EXPAND SECURITY, FROM A BOTTOM LINE VIEW, G )

    It boils down to a fundamental question: When does an attack in cyberspace become a de jure attack? Even in the case of Estonia, protected by NATO's collective defense principle, the proper response to last spring's attack was open to debate.

    ( THERE WAS AN ATTACK, AND IT WAS TRACED TO SPECIFIC SERVERS, HOWEVER THE PERSONS CAUSING THE ATTACK WERE UNKNOWN, WHY WERE THE SERVERS NOT TAKEN OUT? G)



    Still undefined is the proper role for the US military. Inside the United States, legal precedent and direction limits what the military can do. According to Cartwright, "If it's inside the US, if we're to do anything about it, it's got to be on dot.mil" for the military to act. Most classified military networks are self-contained and rarely subject to the same barrage of attacks carried via the Internet.

    "If it's outside that and they want the military to do anything about it, then its military support to civil authorities just like we would do with a hurricane or anything else," he explained.

    In fact, it's the Department of Homeland Security that houses the key response teams for responding to Internet attack.

    Already, however, Cartwright hinted at a greater freedom of action in the cyberspace commons. "Once you leave our shores, then the military authorities start to be present, and what we do is layer the defenses out as best we can to get the most warning, situation awareness that we can to protect our interests," he said.

    Given the constant probing, investing in survivability is a big priority. The cyber balance of power is "the most dynamic world we've ever seen," said a senior STRATCOM official. Software security fixes may just last for hours.

    Expect to see an impact on Air Force budgets as service leaders fund the new mission. "What we're trying to do in '08 and '09 is to accelerate the programs that are tied to survivability of the Air Force portion of the global information grid," Elder said.

    The new Cyber Command will focus dedicated attention to the problem. Elder and others are working to lay the foundation for a cyberspace career path in the Air Force on a par with those for weapons systems and specialties. "We're looking to set up a professional cadre of cyber operators, and this would be enlisted and officer," Elder said.

    Investing now in survivability should help keep down the costs of buying new technology. A prime system is the Combat Information Transport System Block 30. "This is a system that is reducing our exposure to the commercial Internet," said Elder. "It's providing us much greater situational awareness in terms of being able to track the traffic on our networks."

    Serious money is going to the effort. "Some things we're trying to do with the CITS Block 30, for example, are in the range of half a billion dollars," Elder said.

    ( WHEN WILL THEY HAVE "RULES OF ENGAGEMENT" ABILITY TO GO ON THE OFFENSIVE? IF ATTACKED USA HAS A RESPONSIBILITY TO TAKE OUT THE ATTACKER. IF A SERVICE PROVIDER LOOSES A SERVER BECAUSE OF POOR SECURITY OR LACK OF OVER SIGHT ON WHOM THEY LET USE THE SERVER, THAT SHOULD NOT DETER USA FROM COUNTER STRIKING AN ATTACKING SERVER. G )

    Investment will fund software tools to track vulnerabilities "before the hackers find them," said Elder, and insulate them with database wrappers that create portals to block incursions. The Air Force is also investing in extensive database encryption—a proven technique. "It's just much more difficult for someone to fool with your system when the data's encrypted," Elder said.
    Yet it may take an increased sense of strategic threat to force clarification of the cyberspace mission.

    Currently, there are classic divides. The intelligence community uses cyberspace in its tradecraft. Yet there is growing demand for operators to be able to exploit the same turf.

    Creating Effects
    Many acknowledge the current US cyberspace strategy is "dysfunctional"—to use Cartwright's term from when he headed STRATCOM. But there's been only tepid enthusiasm for the Air Force's willingness to step up to the growing mission. Ultimately, the Air Force may be recognized as the chief force provider for cyber capabilities. Signs suggest it won't come without a period of debate.

    That debate will center first on the logic of cyberspace as a domain. To Air Force planners, the domain aspects have become self-evident. Cyberspace operations include activity to maintain the freedom to attack and freedom from attack in that domain. In fact, counterdomain operations are being defined, too.

    As Elder put it, "The better your cyber is, the [more] quickly you can do decision-making, [to] create effects." Degrading and slowing operations—especially to the point where "you can't operate anymore"—creates what Elder termed a "counterdomain effect."

    Not all accept cyberspace as a clear-cut domain like air, space, or the sea, however. Cartwright, for one, pointed out that it all turns in part on whether cyberspace is to be treated as a truly separate and co-equal area of warfare. "That's the huge debate," he said. "Should this be a domain or not be a domain?"

    ( ONLY A TROGLIDITE , WOULD CLAIM THE WEB ISN'T A DOMAIN, I THINK AL QAEDA HAS PROVED THAT HYPOTHESIS. G )

    Even as the pace of activity escalates, there's a sense of proceeding carefully. Part of the concern rests with a reluctance to lock in poor solutions.

    ( "LOCK IN " IS BS FOR LACK OF DECISION MAKING, NOTHING IS LOCKED IN, IT WILL BE TRIAL AND ERROR. G )

    Cartwright urged senior leaders to recognize how much there is to learn from the younger generation. "The Joint Staff is an old staff, demographically," he said. "So here we are, in charge of thinking our way through cyber without the 20-somethings."

    He warned against putting in place a rigid doctrine for cyberspace that might end up squashing the creative thinking that has always been a hallmark of the domain.

    "If we try to use our industrial-age Napoleonic decision structures, are we disadvantaging ourselves?" asked Cartwright. He saw "a lot of cultural issues that far outreach the technical issues and the organizational constructs. What I'm most concerned about is protecting the decision space and the opportunity space of the 20-somethings."

    But he stopped well short of handing over the cyber mantle to the Air Force. "Where we are right now, each of the services has found value," Cartwright said. The Air Force is making investments and letting its money "speak about their risk equations. We've got enough time to let that play out."

    ( EVENTUALLY EACH SERVICE WILL HAVE ITS OWN CYBER FORCE. G )

    Rebecca Grant is a contributing editor of Air Force Magazine. She is president of IRIS Independent Research in Washington, D.C., and has worked for RAND, the Secretary of the Air Force, and the Chief of Staff of the Air Force. Grant is a fellow of the Eaker Institute for Aerospace Concepts, the public policy and research arm of the Air Force Association. Her most recent article, "There When it Counts," appeared in the December 2007 issue.

    SOURCE:

    XXXXXXXXXXXXXX

    Its just so frustrating to see discussions of fiat acompli like they are NOT.
    Is the WWW a domain, is something that is self evident, to the Internet
    I don't want to hear from anyone that doesn't have a PC on his desk, and I suspect there are a lot of general officers that don't , and they should be replaced.


    "US armed forces face "peer" adversaries in only one area—military cyberspace." NOT. USA armed forces are 5 years behind, force projection on the www.

    This reminds me of, I think it was Doolittle, that exposed the air as a domain by bombing some battle ships to the bottom of the sea, to show air as force projection.

    The Internet itself is at sever risk NOW.
    The world is facing a Pearl Harbor www attack that could take out the Internet.
    And they are discussing if it is a domain?

    Hell: there is a new www WMD and we are still discussing if its a "domain" we are 5 years behind.

    The same logic that applies to coastal defenses applies to server and net defenses.
    Offense not defense. ( I'm not saying to drop defenses but we MUST have and use a offensive capability. Right now it takes an ok FROM BUSH, to take down a server.)
    Would any military service exist with out offensive capabilities?
    We acting with out rules of engagement on the WWW, USA IS AN EASY,SAFE
    TARGET.
    If USA used the rules of engagement in Iraq as they use on the WWW, USA would have surrendered by now.

    NSA is hiding all the cool www side arms.
    Our Intel paradigm on NSA remains confidential, their capabilities boggle the mind.


    Gerald


    "





    SECOND SECTION

    UPDATE:


    US reveals plans to hit back at cyber threats

    MY COMMENTS IN CAPS.G

    Tom Espiner ZDNet.co.uk

    Published: 02 Apr 2008 17:27 BST

    The US Air Force Cyber Command is developing capabilities to inflict denial of service, confidential data loss, data manipulation, and system integrity loss on its adversaries, and to combine these with physical attacks, according to a senior US general.

    Air Force Cyber Command (AFCYBER), a US military unit set up in September 2007 to fight in cyberspace, is due to become fully operational in the autumn under the aegis of the US Eighth Air Force. Lieutenant general Robert J Elder, Jr, who commands the Eighth Air Force's Barksdale base, told ZDNet.co.uk at the Cyber Warfare Conference 2008 that Air Force is interested in developing its capabilities to attack enemy forces as well as defend critical national infrastructure.

    "Offensive cyberattacks in network warfare make kinetic attacks more effective, [for example] if we take out an adversary's integrated defence systems or weapons systems," said Elder. "This is exploiting cyber to achieve our objectives."

    However, this is a double-edged sword, as adversaries will also attempt to develop similar capabilities, especially considering the US military's heavy use of technology, said Elder.

    NOW THIS IS A ONE EDGED SWORD, THEY MAY HAVE THAT CAPABILITY, USA DOES NOT AND WOULD NEED BUSH'S OK TO ENGAGE. G

    "Terrorists and criminals are doing the same thing. We depend so heavily as a military on the use of cyber, we have to be cautious about it," said Elder. "Cyber gives us a huge advantage but adversaries look at our capabilities and see areas they can undermine. We need to protect our asymmetric advantage — on the one hand by having people further exploit cyber, and on the other by having mission assurance."

    This problem is made more pressing by the military's reliance on the public internet to perpetrate cyberattacks. The infrastructure the US military uses to both launch and defend against cyberattacks runs through the public internet system. Military networks such as the Global Information Grid are linked to US government and critical national infrastructure systems, which in turn are linked to the public internet. Adversary systems are subverted by the US military through public channels — however, this also leaves the US military open to attack through the same channels, said Elder.

    ELDER IS MISSING A GOOD POINT HERE, IF THE PUBLIC INTERNET SYSTEM IS TAKEN DOWN WHAT HAPPENS TO THE C2 FOR THE MILITARY.G

    "The infrastructure on which the Air Force depends is controlled by both military and commercial entities and is vulnerable to attacks and manipulation," said Elder.

    Other causes for military concern include possible supply-chain vulnerabilities, where vulnerabilities are introduced into chipsets during manufacturing that an adversary can then exploit, and electronics vulnerabilities.

    "We need to make sure chips aren't manipulated — we're worried about information assurance just like everyone else," said Elder.

    Other problems being faced by the Cyber Command are centred around different Air Force and military units needing to improve their channels of communication before the autumn.

    "We have 10,000 people to do this, but the problem is they are stovepiped," said Elder.

    10,000 PEOPLE THEN WHY ARE THERE 5,000 TERROR WEB SITES STILL UP?
    WHY ARE WE ALLOWING THEIR C2 TO FUNCTION ON THE INTERNET?G
    I HAVE 100 AND WE ARE COMPILING LISTS OF TERROR SITES.
    MY TROOPS JUST VETTED 700 SITES IN 2 DAYS.G

    "Stovepiping" has two complementary meanings. In IT terms it describes information held in separate databases which is difficult to access due to its multiple locations — the UK equivalent term would be "siloed". In intelligence-gathering terms — the Eighth also serves as the US Air Force information operations headquarters — "stovepiping" refers to information which has been passed up the chain of command without undergoing due diligence.

    Elder said that, while he was satisfied with AFCYBER's covert operations capabilities and its demonstrable ability to remotely destroy missile defence systems, he wished to further develop its attack capabilities.

    "IT people set up traditional IT networks with the idea of making them secure to operate and defend," said Elder. "The traditional security approach is to put up barriers, like firewalls — it's a defence thing — but everyone in an operations network is also part of the [attack] force. We're trying to move away from clandestine operations. We're looking for real physics — a bigger bang resulting in collateral damage."

    MOVING AWAY FROM COVERT OR CLANDESTINE OPERATIONS ON THE INTERNET
    IS THE OPPOSITE OF A FORCE MULTIPLIER. FORCE REDUCER? BAD MOVE. THE INTERNET WAS MADE FOR COVERT OPERATIONS, AND USA HAS THE TECHNOLOGY AND POWER TO DOMINATE THE INTERNET LIKE THE AIR FORCE DOES THE AIR.
    THE PARADIGM AND EXPERIENCED LEADERSHIP IS MISSING.G

    For deterrence we have to clearly identify the attacker. We're working on rapid forensics to determine who the adversary is.

    WITH BOT NETS I DON'T THINK THIS IS POSSIBLE OR THAT YOU CAN DO IT WITH CURRENT TECHNOLOGY.G


    Lieutenant general Robert J Elder, Jr

    US Cyber Command also needs to develop the means to quickly pinpoint exactly where an attack is coming from, to be able to retaliate, and also to deter potential attackers.

    "We haven't done a good job in the cyber-domain just yet," said Elder. "We have to demonstrate the capability to do [rapid forensics] then message that to our adversaries. For deterrence we have to clearly identify the attacker. We're working on rapid forensics to determine who the adversary is."

    MESSAGE THE ADVERSARIES WE KNOW WHO AND WHERE THEY ARE?
    WOULD YOU DO THIS ON A BATTLE FIELD? THIS IS NUTZ, IT MAKES USA A SAFE TARGET AGAIN, YOU ENABLE THEIR ATTACKS WITH THIS PARADIGM. TAKE THE BASTARDS OUT.G
    WE ARE UNDER ATTACK. ELDER DOESN'T SEEM TO GET THAT.G

    While cyber-espionage was inevitable, said Elder, knowledge of the US military being able to pinpoint the source of cyberattacks could deter assaults on critical national infrastructure that use Supervisory Control And Data Acquisition (Scada) systems.

    "We're not going to deter cyber-espionage, but we might be able to deter attacks on Scada networks," said Elder.

    As well as developing forensics tools, Cyber Command is also coding tools to check for incursions, including a "Cyber Sidearm", which will monitor activity on the Combat Information Transport System — the US Air Force cyber-network.

    A CYBER SIDEARM DOES NOT MONITOR, A SIDEARM DOES DAMAGE, YOU DO NOT HAVE A CYBER SIDEARM IF IT ONLY MONITORS, YOU HAVE A DAMAGE RECORDER NOT A SIDEARM. I HAVE BEEN ISSUING CYBER SIDEARMS TO SELECT TROOPS SINCE MAR 22 IN OUR "C" COMPANY THAT CAN DO DAMAGE, QUOTE FROM OUR BLACK WIKI:
    "We will issue you a cyber sidearm, and rules of engagement.
    Violation of the rules of engagement could result in criminal prosecution, they are strictly for self defense only,
    (YOUR PC under attack.).
    Use of the small arms may automatically notify the Watch Officer, calling in backup, and alerts me to a situation.
    And activates Internal Affairs.

    Gerald"



    "We've been working to get the functionality built — we're supposed to have it in the next couple of months," said Elder.

    US Eighth Air Force said it was seeking partnerships with both public- and private-sector organisations to "secure cyberspace". The Department for Homeland Security's Strategy to Secure Cyberspace includes establishing a public-private architecture to gauge and respond to cyberthreats, and increase information-sharing between public- and private-sector organisations and the military.

    SOURCE:

    XXXXXXXXXXXXXXXXXXXXXXXXXXXXX

    AIR FORCE IS STILL A GENERATION BEHIND, AND WORKING WITH THE WRONG PARADIGM.

    WHEN AN ENEMY JET COMES UP AGAINST THE USA AIR FORCE, THEY RUN AWAY OR DIE.
    THAT IS THE PARADIGM FOR THE US AIR FORCE ON THE INTERNET.

    YOU DOMINATE YOUR DOMINION BE IT AIR OR CYBER.

    GERALD ( WITH ARMS OPEN )
    INTERNET ANTHROPOLOGIST
    DIRECTOR OF "C" COMPANY

    .

    Labels: , , , , ,