"We now live in a world where a nation’s security depends in no small part on the security awareness and practices of our agencies, firms, suppliers, schools, friends, neighbors, relatives and, well, all of us....To achieve these efforts, we must recruit, educate, train, invest in and retain a cadre of cyber experts who will be conducting seamlessly interoperability – seamless interoperability across the full spectrum of network operations." Gen. Keith Alexander-NSA director.
"Now, there issues that you get into that – and you know, you can take it from a domestic side. So what’s the FBI do and what do we do with a Foreign Intelligence Surveillance Act court? Both of those now get into classified areas, with oversight. And so I think we do that very well. The hard part is, we can’t go out and tell everybody exactly what we did or we give up a capability that maybe extremely useful in protecting our country and our allies. And so that’s the real – what I see as the two things that we balance.
And so I do spend a lot of time with the court and with Congress explaining exactly what we’re doing, where we have issues, where there needs to be change, what we can and cannot do. And we put that up to the court and we get things back from the court. I think it is growing and getting better. We spend a lot of time on that. The hard part: We can’t tell everybody what we’re doing. It will be analogous to you explaining how you defended your system – your computer system.
You say, I’m defending my computer system using the following steps: one, two, three, four. The adversary will say, thank you, one, two, three, four, now I know how to get around it, and within a day, they’re through. That’s the problem that we face. And so I think the real key to the issue – how do we build the confidence that we’re doing it right with the American people, with Congress and everybody else?"
(this rambling monologue seems to me to betray a certain incoherence or at the least an inability to speak properly)
In his address to Black Hat in Las Vegas, Hayden attempted to frame the context of the unprecedented cyber-war battlefield in geographical terms. His allusion was to the limitless flat plain of western Germany and the indefensible frontiers of the Polish nation so often overrun from east and west. He then suggested the need to create in cyberspace the necessary barriers corresponding to such natural defenses found in nature such as mountain ranges, vast rivers, forests and the like (?). Stretching the general's awkward allusion a bit farther, it is indeed true that the Internet has no borders and cyber attacks from a certain geographic become irrelevant. And yet "protecting command and control and cyber-infrastructure" according to Alexander are all important and essential. In other words the post 9/11 paradigm of attacks originating within and outside of the "Homeland" establish the need to pay particular and special attention to the net outposts within the US as well.
While Hayden's allusion seems somewhat clumsy and overdrawn, the implications are clear. In WWII Poland was occupied and ruthlessly subjected to draconian military occupation in addition to being transformed into the locus of the death and extermination camps. If we view Alexander's remarks in this context it is and given the predilection of the US Military to constantly undertake hostile actions in the name of national security and defense, it is not too far reaching to assume that the deployment, penetrations and intrusions already underway by the NSA/Google cyber corps are but the first expeditionary forays into the Internet battlefield, especially "in the Homeland".This scenario assumes even more relevance when it is admitted that the ongoing CBRNE (Chemical, Biological, Radiological, Nuclear, and High Yield Explosives) consequence management plans and preparedness scheduled for the third annual assignment of Army, Army Reserve, and National Guard exercises on Oct. 1, 2010 has now been accorded a Cyber component as well.
As in any war and the invasion of any sovereign area, the residents of the area invaded are usually subjected to harsh treatment. Their natural rights are ignored and abrogated. Freedom of movement and association are curtailed, all in the name of security. Many argue that this remains impossible on the Internet, long known for free and unfettered access to all types of information. It is thought that the logistical complexities of restricting internet usage render any such attempts dubious and even impossible. Yet internet censorship and even the infamous proposed "kill switch" might not be necessary. The very openness of an increasingly heavily monitored internet means ultimate transparency and maximum exposure at least for the denizens of the internet who perhaps inadvertently find themselves the objects of an already pronounced matrix of monitoring, spying and surveillance by the NSA/Google or DOD for whatever reason.
The Assange/WikiLeaks/NSA Connection
Largely due to the indefatigable investigations of Wayne Madsen published last March and receiving the attentions of several cut and paste artists on certain sites and blogs with varying and mostly limited commentary, Assange and WikiLeaks have been treated to a more thorough kind of exposure than the folderol accorded to them by the corporate media and a handful of the more credulous and sympathetic bloggers across the net.The most thorough treatment of the Madsen material was generously dispensed at http://arthurzbygniew.blogspot.com/2010/03/soros-co-back-wikileaks-kosher-mob-oval.html-wikileaks-kosher-mob-oval.html and at an Infowars forum, http://forum.prisonplanet.com/index.php?topic=175998.0 although not to my knowledge on the main page. Madsen did not mention anything concerning the NSA and Assange/WikiLeaks and instead attempted to establish a CIA connection.As Madsen notes, John Young who cofounded WikiLeaks with Assange, quit the organization alleging CIA involvement, going on to found Cryptome, an organization which has encountered significant harassment and intimidation from government investigators as opposed to the apparent hands off approach to WikiLeaks. Prior to finding the above documents, we had discovered Assange's association with Ben Laurie a former intel/security specialist with Google who later became one of the principals of the Apache Software Foundation.
Laurie apparently has assumed the status of informal spokesperson and erstwhile "informal board of advisors"member for WikiLeaks.One has to wonder whether Laurie is just freelancing or is acting as an effective colporteur for the NSA. Our subsequent inquiries into Apache revealed an ongoing interface between Laurie's foundation and the NSA as well as the Bureau of Industry and Security /US Department of Commerce. For example, ASF was the hardware provider for the NSA's Red Hat Enterprise Linux S (October 21, 2009) We mention this only in reference to the increasingly blurred boundaries between so-called private sector security companies and their government, military, and corporate proprietary contracts.Yet given Madsen's in depth investigations concerning WikiLeaks and the CIA , such connections can only "add fuel to the fire". Indeed, Apache Webserver, "software of choice of 23 million websites worldwide" and a host of other ASF entities are all provided services by Covalent Technologies which numbers among its clients the major US financial institutions and international pharmaceutical giants as well as the ATF, NASA, and of course the NSA.This is in keeping with Alexander's assertion that "90% of the military's energy is generated and distributed by the private sector ( think BP) and 80% of its logistics are transported by private companies"(how about Halliburton) I think he forgot to mention funding via US treasury bonds gratis the Federal Reserve and Goldman Sachs.