Results 1 to 10 of 11

Thread: Pentagon Secretly Goes To War With The Internet

Hybrid View

  1. #1
    kT Guest

    Re: Pentagon Secretly Goes To War With The Internet

    On May 6, 6:22 pm, AirRaid <airraidfigh...@gmail.com> wrote:
    > Pentagon Secretly Goes To War With The Internet
    >
    > Steve Watson
    > Infowars.net
    > Tuesday, May 6, 2008
    >
    > The Pentagon is to spend $30 Billion building a super secret "National
    > Cyber Range" in order to prepare for all out cyber warfare by using it
    > to conduct mock online battles with realistic info-warriors.
    >
    > The Defense Advanced Research Projects Agency (DARPA), previously
    > responsible for the development of electronic surveillance programs
    > such as Total Information Awareness and MATRIX, LifeLog and the Brain
    > Machine Interfaces enterprise, has been ordered by Congress to create
    > what is essentially a new internet as a cyberspace battleground.
    >
    > Wired.com has reported "According to a defense official familiar with
    > the program: ‘Congress has given DARPA a direct order; that’s only
    > happened once before — with the Sputnik program in the ’50s’"
    >
    > The NCR will not only allow for defense from electronic attack, but
    > will also allow offensive strikes against "adversaries online". It is
    > rumored to be the keystone of a so called "Comprehensive National
    > Cybersecurity Initiative", created via a secret presidential order in
    > January.
    >
    > A request for proposals, released by DARPA yesterday outlined how the
    > agency wants the NCR to be able to "realistically replicate human
    > behavior and frailties," and feature "realistic, sophisticated, nation-
    > state quality offensive and defensive opposition forces".
    >
    > The NCR’s operators should be able to "integrate, replicate, or
    > simulate" military satellite and digital radio communications, mobile
    > ad-hoc networks, physical access control systems, U.S. and foreign
    > "unmanned aerial vehicles, weapons, [and] radar systems" — even "cyber
    > cafes" and "personal digital assistances [sic]." the proposal states.
    >
    > A previous notice outlined that the NCR would allow the Pentagon to:
    >
    > • Conduct unbiased, quantitative and qualitative assessment of
    > information assurance and survivability tools in a representative
    > network environment.
    > • Replicate complex, large-scale, heterogeneous networks and users
    > in current and future Department of Defense (DoD) weapon systems and
    > operations.
    > • Enable multiple, independent, simultaneous experiments on the
    > same infrastructure.
    > • Enable realistic testing of Internet/Global-Information-Grid
    > (GIG) scale research.
    > • Develop and deploy revolutionary cyber testing capabilities.
    > • Enable the use of the scientific method for rigorous cyber
    > testing.
    >
    > The project is so secret that it has been referred to as an
    > electronic"Manhattan Project". The Senate Homeland Security committee,
    > a key Senate oversight panel has cited concerns about the secrecy
    > around the project and has been forced to write to the DHS to request
    > basic information on the project.
    >
    > Commentators have speculated that the entire project may be a huge new
    > part of the federal government’s so called "terrorist surveillance
    > program", which has so far only been shown to constitute cyberwarfare
    > against everyday Americans via warrantless wiretapping and
    > interception of communications.
    >
    > Wired.com comments:
    >
    > "Why might citizens be worried about privacy and civil liberties?
    > Consider that the whole initiative appears to have been launched after
    > the Director of National Intelligence told the President Bush that a
    > cyber attack might wreak as much economic havoc as 9/11 did. Consider
    > that the NSA, which currently protects classified networks, wants to
    > expand into protecting all non-classified federal government networks.
    > Consider that Congress is set to legalize the NSA’s monitoring rooms
    > in the nation’s phone and internet infrastructure. For its part, the
    > FBI says it also needs access to the internet’s backbone, while the
    > Air Force is hyping its own efforts at cyber defense and offense. […]
    >
    > Now it seems the only question is whether the government will be
    > able to turn the net into a controllable, monitorable and trackable
    > pre-internet AOL-type service or whether the chaotic net will live on
    > as just another frontier for the military-industrial complex to start
    > an arm’s race and rake in billions of government dollars."
    >
    > Could this be the Pentagon’s ultimate "solution" to counter the
    > internet, an arena of freedom and progress that military strategists
    > now view as a ******* child they let slip from their grasp some twenty
    > or so years ago?
    >
    > While Homeland Security head Chertoff has denied that the project is
    > part of a vast effort to restrict or "sit on the internet", the
    > Pentagon has previously made it clear that the internet, free of
    > restriction and holding such potential for free speech, is in direct
    > opposition to their goals.
    >
    > The Pentagon has stressed that the internet needs to be dealt with as
    > if it were an enemy "weapons system".
    >
    > Recently, a document entitled Information Operation Roadmap (PDF) was
    > declassified by the Pentagon due to a Freedom of Information Act
    > request by the National Security Archive at George Washington
    > University.
    >
    > One portion of the document states:
    >
    > “Information, always important in warfare, is now critical to
    > military success and will only become more so in the foreseeable
    > future….. Information operations should be centralized under the
    > Office of the Secretary of Defence and made a core military
    > competency."
    >
    > "Objective: IO [information operations] becomes a core competency.
    > The importance of dominating the information spectrum explains the
    > objective of transforming IO into a core military competency on a par
    > with air, ground, maritime and special operations. The charge to the
    > IO Roadmap oversight panel was to develop as concrete a set of action
    > recommendations as possible to make IO a core competency, which in
    > turn required identifying the essential prerequisites to become a core
    > military competency."
    >
    > Another section of the document focuses on what is referred to as
    > "Computer Network Attack":
    >
    > "When implemented the recommendations of this report will
    > effectively jumpstart a rapid improvement of CNA [Computer Network
    > Attack] capability." - 7
    >
    > "Enhanced IO [information operations] capabilities for the
    > warfighter, including: … A robust offensive suite of capabilities to
    > include full-range electronic and computer network attack…" - 7
    >
    > While other sections urge the Department of Defense to "Fight the
    > Net":
    >
    > "We Must Fight the Net. DoD [Department of Defense] is building an
    > information-centric force. Networks are increasingly the operational
    > center of gravity, and the Department must be prepared to "fight the
    > net." " - 6
    >
    > "DoD’s "Defense in Depth" strategy should operate on the premise
    > that the Department will "fight the net" as it would a weapons
    > system." - 13
    >
    > A previous document that echoes such sentiments is the now infamous
    > Rebuilding America’s Defences by The Project for a New American
    > Century (PNAC). In this 2000 document those that would go on to become
    > the nucleus of the Bush administration stated:
    >
    > "It is now commonly understood that information and other new
    > technologies… are creating a dynamic that may threaten America’s
    > ability to exercise its dominant military power." - 4
    >
    > "Control of space and cyberspace. Much as control of the high seas
    > - and the protection of international commerce - defined global powers
    > in the past, so will control of the new "international commons" be a
    > key to world power in the future. An America incapable of protecting
    > its interests or that of its allies in space or the "infosphere" will
    > find it difficult to exert global political leadership." - 51
    >
    > "Although it may take several decades for the process of
    > transformation to unfold, in time, the art of warfare on air, land,
    > and sea will be vastly different than it is today, and "combat" likely
    > will take place in new dimensions: in space, "cyber-space," and
    > perhaps the world of microbes." - 60
    >
    > The importance of information warfare is clearly laid out in both
    > these documents. Brent Jessop, a regular contributor to Infowars.net
    > and Prisonplanet.com has exhaustively documented the phenomenon of
    > “Full Spectrum Information Warfare” in a four part series of articles.
    >
    > We have also previously documented the existing moves to kill off the
    > internet as we know it today by the federal government.
    >
    > Note that the enemy is never specifically named, it is merely whoever
    > uses the net, because the enemy IS the net. The enemy is the freedom
    > the net provides to billions around the globe and the threat to
    > militaristic dominance of information and the ultimate power that
    > affords.
    >
    > http://www.infowars.com/?p=1965


    In other words, YOU are the enemy.

    Ha haha hahhahaha hahahah ahhahah ... ****ing rubes.

    They're already doing it, haven't you noticed the variable time lags?

  2. #2
    Ron Ford Guest

    Re: Pentagon Secretly Goes To War With The Internet

    On Tue, 6 May 2008 18:59:38 -0700 (PDT), kT wrote:

    > On May 6, 6:22 pm, AirRaid <airraidfigh...@gmail.com> wrote:
    >> Pentagon Secretly Goes To War With The Internet
    >>
    >> Steve Watson
    >> Infowars.net
    >> Tuesday, May 6, 2008
    >>
    >> The Pentagon is to spend $30 Billion building a super secret "National
    >> Cyber Range" in order to prepare for all out cyber warfare by using it
    >> to conduct mock online battles with realistic info-warriors.
    >>
    >> The Defense Advanced Research Projects Agency (DARPA), previously
    >> responsible for the development of electronic surveillance programs
    >> such as Total Information Awareness and MATRIX, LifeLog and the Brain
    >> Machine Interfaces enterprise, has been ordered by Congress to create
    >> what is essentially a new internet as a cyberspace battleground.
    >>
    >> Wired.com has reported "According to a defense official familiar with
    >> the program: ¡¥Congress has given DARPA a direct order; that¡¦s only
    >> happened once before ¡X with the Sputnik program in the ¡¦50s¡¦"
    >>
    >> The NCR will not only allow for defense from electronic attack, but
    >> will also allow offensive strikes against "adversaries online". It is
    >> rumored to be the keystone of a so called "Comprehensive National
    >> Cybersecurity Initiative", created via a secret presidential order in
    >> January.
    >>
    >> A request for proposals, released by DARPA yesterday outlined how the
    >> agency wants the NCR to be able to "realistically replicate human
    >> behavior and frailties," and feature "realistic, sophisticated, nation-
    >> state quality offensive and defensive opposition forces".
    >>
    >> The NCR¡¦s operators should be able to "integrate, replicate, or
    >> simulate" military satellite and digital radio communications, mobile
    >> ad-hoc networks, physical access control systems, U.S. and foreign
    >> "unmanned aerial vehicles, weapons, [and] radar systems" ¡X even "cyber
    >> cafes" and "personal digital assistances [sic]." the proposal states.
    >>
    >> A previous notice outlined that the NCR would allow the Pentagon to:
    >>
    >> ¡E Conduct unbiased, quantitative and qualitative assessment of
    >> information assurance and survivability tools in a representative
    >> network environment.
    >> ¡E Replicate complex, large-scale, heterogeneous networks and users
    >> in current and future Department of Defense (DoD) weapon systems and
    >> operations.
    >> ¡E Enable multiple, independent, simultaneous experiments on the
    >> same infrastructure.
    >> ¡E Enable realistic testing of Internet/Global-Information-Grid
    >> (GIG) scale research.
    >> ¡E Develop and deploy revolutionary cyber testing capabilities.
    >> ¡E Enable the use of the scientific method for rigorous cyber
    >> testing.
    >>
    >> The project is so secret that it has been referred to as an
    >> electronic"Manhattan Project". The Senate Homeland Security committee,
    >> a key Senate oversight panel has cited concerns about the secrecy
    >> around the project and has been forced to write to the DHS to request
    >> basic information on the project.
    >>
    >> Commentators have speculated that the entire project may be a huge new
    >> part of the federal government¡¦s so called "terrorist surveillance
    >> program", which has so far only been shown to constitute cyberwarfare
    >> against everyday Americans via warrantless wiretapping and
    >> interception of communications.
    >>
    >> Wired.com comments:
    >>
    >> "Why might citizens be worried about privacy and civil liberties?
    >> Consider that the whole initiative appears to have been launched after
    >> the Director of National Intelligence told the President Bush that a
    >> cyber attack might wreak as much economic havoc as 9/11 did. Consider
    >> that the NSA, which currently protects classified networks, wants to
    >> expand into protecting all non-classified federal government networks.
    >> Consider that Congress is set to legalize the NSA¡¦s monitoring rooms
    >> in the nation¡¦s phone and internet infrastructure. For its part, the
    >> FBI says it also needs access to the internet¡¦s backbone, while the
    >> Air Force is hyping its own efforts at cyber defense and offense. [¡K]
    >>
    >> Now it seems the only question is whether the government will be
    >> able to turn the net into a controllable, monitorable and trackable
    >> pre-internet AOL-type service or whether the chaotic net will live on
    >> as just another frontier for the military-industrial complex to start
    >> an arm¡¦s race and rake in billions of government dollars."
    >>
    >> Could this be the Pentagon¡¦s ultimate "solution" to counter the
    >> internet, an arena of freedom and progress that military strategists
    >> now view as a ******* child they let slip from their grasp some twenty
    >> or so years ago?
    >>
    >> While Homeland Security head Chertoff has denied that the project is
    >> part of a vast effort to restrict or "sit on the internet", the
    >> Pentagon has previously made it clear that the internet, free of
    >> restriction and holding such potential for free speech, is in direct
    >> opposition to their goals.
    >>
    >> The Pentagon has stressed that the internet needs to be dealt with as
    >> if it were an enemy "weapons system".
    >>
    >> Recently, a document entitled Information Operation Roadmap (PDF) was
    >> declassified by the Pentagon due to a Freedom of Information Act
    >> request by the National Security Archive at George Washington
    >> University.
    >>
    >> One portion of the document states:
    >>
    >> ¡§Information, always important in warfare, is now critical to
    >> military success and will only become more so in the foreseeable
    >> future¡K.. Information operations should be centralized under the
    >> Office of the Secretary of Defence and made a core military
    >> competency."
    >>
    >> "Objective: IO [information operations] becomes a core competency.
    >> The importance of dominating the information spectrum explains the
    >> objective of transforming IO into a core military competency on a par
    >> with air, ground, maritime and special operations. The charge to the
    >> IO Roadmap oversight panel was to develop as concrete a set of action
    >> recommendations as possible to make IO a core competency, which in
    >> turn required identifying the essential prerequisites to become a core
    >> military competency."
    >>
    >> Another section of the document focuses on what is referred to as
    >> "Computer Network Attack":
    >>
    >> "When implemented the recommendations of this report will
    >> effectively jumpstart a rapid improvement of CNA [Computer Network
    >> Attack] capability." - 7
    >>
    >> "Enhanced IO [information operations] capabilities for the
    >> warfighter, including: ¡K A robust offensive suite of capabilities to
    >> include full-range electronic and computer network attack¡K" - 7
    >>
    >> While other sections urge the Department of Defense to "Fight the
    >> Net":
    >>
    >> "We Must Fight the Net. DoD [Department of Defense] is building an
    >> information-centric force. Networks are increasingly the operational
    >> center of gravity, and the Department must be prepared to "fight the
    >> net." " - 6
    >>
    >> "DoD¡¦s "Defense in Depth" strategy should operate on the premise
    >> that the Department will "fight the net" as it would a weapons
    >> system." - 13
    >>
    >> A previous document that echoes such sentiments is the now infamous
    >> Rebuilding America¡¦s Defences by The Project for a New American
    >> Century (PNAC). In this 2000 document those that would go on to become
    >> the nucleus of the Bush administration stated:
    >>
    >> "It is now commonly understood that information and other new
    >> technologies¡K are creating a dynamic that may threaten America¡¦s
    >> ability to exercise its dominant military power." - 4
    >>
    >> "Control of space and cyberspace. Much as control of the high seas
    >> - and the protection of international commerce - defined global powers
    >> in the past, so will control of the new "international commons" be a
    >> key to world power in the future. An America incapable of protecting
    >> its interests or that of its allies in space or the "infosphere" will
    >> find it difficult to exert global political leadership." - 51
    >>
    >> "Although it may take several decades for the process of
    >> transformation to unfold, in time, the art of warfare on air, land,
    >> and sea will be vastly different than it is today, and "combat" likely
    >> will take place in new dimensions: in space, "cyber-space," and
    >> perhaps the world of microbes." - 60
    >>
    >> The importance of information warfare is clearly laid out in both
    >> these documents. Brent Jessop, a regular contributor to Infowars.net
    >> and Prisonplanet.com has exhaustively documented the phenomenon of
    >> ¡§Full Spectrum Information Warfare¡¨ in a four part series of articles.
    >>
    >> We have also previously documented the existing moves to kill off the
    >> internet as we know it today by the federal government.
    >>
    >> Note that the enemy is never specifically named, it is merely whoever
    >> uses the net, because the enemy IS the net. The enemy is the freedom
    >> the net provides to billions around the globe and the threat to
    >> militaristic dominance of information and the ultimate power that
    >> affords.
    >>
    >> http://www.infowars.com/?p=1965

    >
    > In other words, YOU are the enemy.
    >
    > Ha haha hahhahaha hahahah ahhahah ... ****ing rubes.
    >
    > They're already doing it, haven't you noticed the variable time lags?


    My advice to Americans who spy for the Bush admin on their citinzenry is:
    update your resumes.

    Using a computer to commit crimes is fine with bUShco. They're a criminal
    regime.

    When dems take back the white house we won't need manufactured consent.
    --
    Ron Ford

  3. #3
    DrumStick Guest

    Re: Pentagon Secretly Goes To War With The Internet

    Ron Ford formulated on Tuesday :
    > On Tue, 6 May 2008 18:59:38 -0700 (PDT), kT wrote:


    >> On May 6, 6:22 pm, AirRaid <airraidfigh...@gmail.com> wrote:
    >>> Pentagon Secretly Goes To War With The Internet
    >>>
    >>> Steve Watson
    >>> Infowars.net
    >>> Tuesday, May 6, 2008
    >>>
    >>> The Pentagon is to spend $30 Billion building a super secret "National
    >>> Cyber Range" in order to prepare for all out cyber warfare by using it
    >>> to conduct mock online battles with realistic info-warriors.
    >>>

    (<snip> because I have some common sense)

    >>
    >> In other words, YOU are the enemy.
    >>
    >> Ha haha hahhahaha hahahah ahhahah ... ****ing rubes.
    >>
    >> They're already doing it, haven't you noticed the variable time lags?


    > My advice to Americans who spy for the Bush admin on their citinzenry is:
    > update your resumes.


    > Using a computer to commit crimes is fine with bUShco. They're a criminal
    > regime.


    > When dems take back the white house we won't need manufactured consent.


    And what planet did you say you were visitting Earth from?

    Drumstick



  4. #4
    WindsorFox Guest

    Re: Pentagon Secretly Goes To War With The Internet

    DrumStick wrote:
    > Ron Ford formulated on Tuesday :
    >> On Tue, 6 May 2008 18:59:38 -0700 (PDT), kT wrote:

    >
    >>> On May 6, 6:22 pm, AirRaid <airraidfigh...@gmail.com> wrote:
    >>>> Pentagon Secretly Goes To War With The Internet
    >>>>
    >>>> Steve Watson
    >>>> Infowars.net
    >>>> Tuesday, May 6, 2008
    >>>>
    >>>> The Pentagon is to spend $30 Billion building a super secret "National
    >>>> Cyber Range" in order to prepare for all out cyber warfare by using it
    >>>> to conduct mock online battles with realistic info-warriors.
    >>>>

    > (<snip> because I have some common sense)
    >
    >>>
    >>> In other words, YOU are the enemy.
    >>>
    >>> Ha haha hahhahaha hahahah ahhahah ... ****ing rubes.
    >>>
    >>> They're already doing it, haven't you noticed the variable time lags?

    >
    >> My advice to Americans who spy for the Bush admin on their citinzenry is:
    >> update your resumes.

    >
    >> Using a computer to commit crimes is fine with bUShco. They're a
    >> criminal
    >> regime.

    >
    >> When dems take back the white house we won't need manufactured consent.

    >
    > And what planet did you say you were visitting Earth from?
    >
    > Drumstick
    >
    >


    He's been into he grandpa's stash apparently.

    --

    "I've also noted that a couple of my regular spammers
    have pretty much switched over to phishing and 419s
    from pecker pills and sawdust tablets." - Bar0

    "If it's from BRNIC, it's GOT to be blocked" - Buss Error

  5. #5
    Bill Kearney Guest

    Re: Pentagon Secretly Goes To War With The Internet

    > When dems take back the white house we won't need manufactured consent.

    How staggeringly naive.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •