Just another Reality-based bubble in the foam of the multiverse.

Saturday, June 13, 2009

Destroying Liberty to Save It

Another balloon from the D.o'D. in The New York Pravda about how we're just going to have to get rid of all this Constitutional nonsense to be $ecure.

WASHINGTON — A plan to create a new Pentagon cybercommand is raising significant privacy and diplomatic concerns, as the Obama administration moves ahead on efforts to protect the nation from cyberattack and to prepare for possible offensive operations against adversaries’ computer networks.

...Much of the new military command’s work is expected to be carried out by the National Security Agency, whose role in intercepting the domestic end of international calls and e-mail messages after the Sept. 11, 2001, attacks, under secret orders issued by the Bush administration, has already generated intense controversy.

There is simply no way, the officials say, to effectively conduct computer operations without entering networks inside the United States, where the military is prohibited from operating, or traveling electronic paths through countries that are not themselves American targets.

The cybersecurity effort, Mr. Obama said at the White House last month, “will not — I repeat, will not — include monitoring private sector networks or Internet traffic.”

But foreign adversaries often mount their attacks through computer network hubs inside the United States, and military officials and outside experts say that threat confronts the Pentagon and the administration with difficult questions.

Military officials say there may be a need to intercept and examine some e-mail messages sent from other countries to guard against computer viruses or potential terrorist action. Advocates say the process could ultimately be accepted as the digital equivalent of customs inspections, in which passengers arriving from overseas consent to have their luggage opened for security, tax and health reasons.

“The government is in a quandary,” said Maren Leed, a defense expert at the bipartisan Center for Strategic and International Studies who was a Pentagon special assistant on cyberoperations from 2005 to 2008.

Ms. Leed said a broad debate was needed “about what constitutes an intrusion that violates privacy and, at the other extreme, what is an intrusion that may be acceptable in the face of an act of war.”

In a recent speech, Gen. James E. Cartwright, vice chairman of the Joint Chiefs of Staff and a chief architect of the new cyberstrategy, acknowledged that a major unresolved issue was how the military — which would include the National Security Agency, where much of the cyberwar expertise resides — could legally set up an early warning system.

Unlike a missile attack, which would show up on the Pentagon’s screens long before reaching American territory, a cyberattack may be visible only after it has been launched in the United States.

“How do you understand sovereignty in the cyberdomain?” General Cartwright asked. “It doesn’t tend to pay a lot of attention to geographic boundaries.”

For example, the daily attacks on the Pentagon’s own computer systems, or probes sent from Russia, China and Eastern Europe seeking chinks in the computer systems of corporations and financial institutions, are rarely seen before their effect is felt inside the United States.

Some administration officials have begun to discuss whether laws or regulations must be changed to allow law enforcement, the military or intelligence agencies greater access to networks or Internet providers when significant evidence of a national security threat was found.

Ms. Leed said that while the Defense Department and related intelligence agencies were the only organizations that had the ability to protect against such cyberattacks, “they are not the best suited, from a civil liberties perspective, to take on that responsibility.”

Under plans being completed at the Pentagon, the new cybercommand will be run by a four-star general, much the way Gen. David H. Petraeus runs the wars in Afghanistan and Iraq from Central Command in Tampa, Fla. But the expectation is that whoever is in charge of the new command will also direct the National Security Agency, an effort to solve the turf war between the spy agency and the military over who is in charge of conducting offensive operations.

While the N.S.A.’s job is chiefly one of detection and monitoring, the agency also possesses what Michael D. McConnell, the former director of national intelligence, called “the critical skill set” to respond quickly to cyberattacks. Yet the Defense Department views cyberspace as its domain as well, a new battleground after land, sea, air and space.

The complications are not limited to privacy concerns. The Pentagon is increasingly worried about the diplomatic ramifications of being forced to use the computer networks of many other nations while carrying out digital missions — the computer equivalent of the Vietnam War’s spilling over the Cambodian border in the 1960s. To battle Russian hackers, for example, it might be necessary to act through the virtual cyberterritory of Britain or Germany or any country where the attack was routed.

General Cartwright said military planners were trying to write rules of engagement for scenarios in which a cyberattack was launched from a neutral country that might have no idea what was going on. But, with time of the essence, it may not be possible, the scenarios show, to ask other nations to act against an attack that is flowing through their computers in milliseconds.

Frida Berrigan, a longtime peace activist who is a senior program associate at the New America Foundation’s arms and security initiative, expressed concerns about whether the Obama administration would be able to balance its promise to respect privacy in cyberspace even as it appeared to be militarizing cybersecurity.

“Obama was very deliberate in saying that the U.S. military and the U.S. government would not be looking at our e-mail and not tracking what we do online,” Ms. Berrigan said. “This is not to say there is not a cyberthreat out there or that cyberterrorism is not a significant concern. We should be vigilant and creative. But once again we see the Pentagon being put at the heart of it and at front lines of offering a solution.”

Ms. Berrigan said that just as the counterinsurgency wars in Iraq and Afghanistan had proved that “there is no front line anymore, and no demilitarized zone anymore, then if the Pentagon and the military services see cyberspace as a battlefield domain, then the lines protecting privacy and our civil liberties get blurred very, very quickly.”


Under Dubya, the cowboys were always arrogant enough to give you something clear to argue about. Dubya or Rummy or Darth Cheney would make an obvious statement dismissive of civil liberties, and that would be that. Obama's full of Hope and Change, though. He says he'll close the Iraqi torture prisons shortly before someone sends an assassin to kill the Iraqi cleric trying to close them.

Not that he had anything to do with that.

He's says he'll end the War on Terror. He does this by renaming it and expanding troops in Afghanistan and Iraq to end the War on Terror. He does this by putting a man Rumsfeld appointed to conduct "targeted executions" in Iraq in charge of the Af-Pak theater.

Not that he can help that.

He'll close Gitmo, and avoid an ugly debate about Amerikan torture, by allowing the tortured to plead guilty and be executed before they can come to trial.

He's just protecting us.

In regards to privacy, one can't help but wonder just how much the Bu$h era NSA's information gathering had to do with the choice of Robert Gates for continued Secretary of Defense, or Petraeus Caesar for the head of CentCom, or Stanley McChrystal for control of the Af-Pak war.

Not that I'm saying anything here.

As usual, it depends on what the definition of "is" is.

The realistic solutions depend on how reality is defined and who's writing the dictionary.

2 comments:

BillP said...

None of you have any clue about what's really going on in the world.

#1 - the cold war never really ended. Russia retains all the nuclear and cyberspace capabilities that the Soviet Union had.

#2 - China is slowly moving towards a world-wide hegemony. They're smart enough to know that they don't need an empire to get all the resources and control that they need to become the largest economy and then to dominate first Asia (including India, especially) and then everything else.

#3 - on conventional military issues, Russia and China are already working closely together in preparation for China conquering Taiwan sometime before 2020.

#4 - the detailed designs and software for our most advanced fighter, the F-22, have already been hadked into by the Russians/Chinese. Thus there is no sepration between war in cyberspace and in the other four areas.

Everyone who thought Obama would be a big left-wing liberal should realize that politically he will be closer to John Kennedy. As a PhD from the University of Chicago (a far more rigorous school than any of the East- or West-Coast institutions) I can guarantee that Obama will exhibit more careful and well-thought out actions than any of our recent Presidents.

kelley b. said...

Rub your rhubarb much?

All I have to say, baby, is that War is Over if You Want It.

China and Russia are moving towards world wide hegemony, but combined they have a fraction of the US defense budget.

Neither combined has but a fraction of our nukes. Or bases. Or desire to use them.

There's another thing you haven't noticed, because you're likely not paying attention. The Russians and the Chinese contractors have helped design some of our most exotic weapons. The Cold War benefits the cold warriors- on all sides.

You're wrong about one more thing: Obama is a lot more like LBJ, who did exactly what the Company told him to do, than JFK, who thought he might actually end the cold war.

Obama is owned by the banksters. He's Poppy's man. Whether he's been that all along, or whether he's a prisoner of his success the result is the same.