Sunday, May 4, 2008

And the Infowar goes on...

Since 2007, the FBI has very quietly put together a cadre of professionals with U.S. intelligence and other agencies to help battle crime on the Internet to help identify and respond to cyber threats against the United States. The name of the group is the National Cyber Investigative Joint Task Force (NCIJTF), and the FBI has a number of persons training together at an unnamed location near Washington. The leader of the new group is Shawn Henry, the FBI's deputy assistant director of the cyber division. Henry has stated the group is made up of intelligence, law-enforcement and other agencies from the U.S. government.
The FBI claims in a press release about the group that they plan on, "Expanding the National Cyber Investigative Joint Task Force (NCIJTF), to include representation from the U.S. Secret Service and several other federal agencies. This existing cyber investigation coordination organization overseen by the Federal Bureau of Investigation will serve as a multi-agency national focal point for coordinating, integrating, and sharing pertinent information related to cyber threat investigations."
What makes Storm the perfect Internet weapon is how it has been designed to survive. The Storm zombie does no damage to the PCs it infects, and simply sits there, waiting for an order. Those orders come via a peer-to-peer system (similar to things like  Kazaa or Bittorrent). A small percentage of the zombies spend short periods of time trying to spread themselves, then turn off. This makes it more difficult to locate infected PCs. Commands from the Storm operators are sent through several layers of zombie PCs, again making it very difficult to identify where those commands come from. Moreover, Storm operates as a horde of clusters, each of two or three dozen zombie PCs. No existing methods can shut down Storm, although computer security organizations have been able to limit the spread.  In fact, all that will work to kill Storm is to find the people running it, arrest them, and seize their access data. The programmers who put Storm together know their stuff, and police in dozens of country have cooperated to get their hands on them. The Storm owners were traced to Russia, but the government blocked efforts to shut down the hacker operation.
 
Criminal gangs are increasingly active in producing things like Storm, and, in the case of China, so are government Cyber War operations. Russia is also believed to rely on criminal hackers for help in carrying out Cyber War tasks, usually espionage. Meanwhile, it's clear what Storm is up to. It has been launching attacks at web sites involved in stopping or investigating Storm. This involves transmitting huge quantities of bogus messages ,that shut down targeted web sites (this is a DDOS, or distributed denial or service attack). The Storm botherders are also advertising their botnet as available for the usual illegal activities (various types of spam). 
 
Early on, it was  believed that Storm was owned by a Russian criminal syndicate, but once more detailed proof was available, the Russian government refused to cooperate, treating Storm like some kind of secret military resources. And to the Russians, that's apparently what Storm is. Meanwhile, the investigation indicates that the Storm crew have some American members, and now the search is on for them, or any other non-Russians who worked on Storm, and are not inside Russia.
CNN.com was knocked offline for three hours shortly after Chinese hackers claimed to have called off a planned denial of service attack against the US publisher.
Late last week, a group of Chinese hackers called off a planned denial of service attack on CNN.com. It was reported that the attack would occur last weekend, in protest of "anti-Chinese" media reports across the Western world.
Despite the attack being officially called off, Netcraft reported that CNN.com was taken off-line for a period of three hours on Sunday -- even though CNN throttled the number of users that could access the site from risky regions.
"…CNN's website suffered downtime within a three hour period on Sunday morning, followed by other anomalous activity on Monday morning, where response times were greatly inflated," Netcraft reported on its Web site.
There were signs that the attack had already started on Saturday. Arbor Networks' security researchers claim to have monitored several attacks launched against CNN.com, which caused disruption rather than damage.
The news that the Pentagon ran a systematic information campaign to get favourable analysis on Iraq from military officers should hardly be news to many people. The New York Times has used the Freedom of Information Act in America to get some 8,000 pages of transcripts of emails and other communications in the Pentagon to reveal how Donald Rumsfeld waged the war of spin over Iraq, and lost it.
The high point came in 2005, when it was clear that things were really falling apart in Iraq. Chosen analysts, former generals and colonels to the fore, were given privileged access to information, which they then spun on through the media. Some were hired talking heads for mainstream channels like CNN and Fox News. In all, says the New York Times, some 75 officers were hired by Rumsfeld to do the job.
The most striking thing about this story about a story - and full marks to the NYT for uncovering it at last - is how badly the whole thing was done. It has not helped the administration's credibility over Iraq, nor America's standing in the world. As a campaign it has been less than victorious.
When former army general Montgomery Meigs claimed to NBC, that there "had been over $100 million of construction" at Guantánamo, he, and more to the point his editors, must have known that the increasing band of sceptics in the audience were unlikely to be persuaded. The general had been a part of carefully selected group of "analysts" allowed by the Pentagon into the Guantánamo complex.
Keith Allard, a former consultant to NBC and an instructor in information warfare at the National Defence University said that what the analysts were given in their "private" briefings bore little relation to the facts later uncovered by inquiries and reporters' books.
One method of protecting your military networks from hackers is to use an operating system other than the ubiquitous Microsoft Windows (which controls over 85 percent of the market). Linux has been a popular choice for the military. The U.S. Navy uses Linux to run critical systems on its warships. The U.S. Army is using Linux for its networked FCS (Future Combat System) vehicles (which are still in development).  The army is also converting many of its Microsoft Windows applications to run under Linux.
 
It's not just the better security Linux provides, but the fact that there are many versions of Linux to choose from, and the operating system is easier to modify (being an "open source" system, unlike the proprietary Windows.) Currently, the U.S. Department of Defense has over 200 Linux based software projects in development.
 
China has also gone down this route, and is trying to get all Chinese computer users to switch to Linux. This has proved difficult, because so many Chinese use stolen Windows software to run their businesses. Often, there is no Linux alternative for key Windows applications. The military, however, uses custom made software for its most critical applications, and it's easier to create this stuff using Linux.
CIA, Scientists, Engineers & Technology
In today's world of ever-changing challenges, it is more important than ever for the CIA to stay ahead of fast-paced global technology developments. The classified work we are presently undertaking allows us to meet the Agency's foreign intelligence mission through leadership in a wide range of scientific and technical disciplines. This is truly a unique opportunity for scientific and engineering experts to look beyond a commercial, product-driven mindset to goal-oriented, highly focused work of significant national importance.
The Directorate of Intelligence (DI) seeks engineers and scientists to analyze challenging national security issues, such as foreign weapons development, weapons proliferation, information warfare and emerging technologies. These engineers and scientists will serve as professional intelligence officers, applying their scientific and technical knowledge to solving complex intelligence problems, and presenting their assessments to senior policymakers. This work demands initiative, creativity, analytical skills and technical expertise. Agency analysts are encouraged to maintain and broaden professional ties through academic study, contacts, and attendance at professional meetings. They may also choose to pursue additional studies in fields relevant to their areas of responsibility. Opportunities exist for foreign travel, language training, analytic and management training, and assignments in other offices in the Agency and throughout the US Government.
*Higher starting salary possible depending on experience level.
The ongoing army commanders' conference, chaired by General Deepak Kapoor, has decided to boost the "cyber-security" of its information networks right down to the level of divisions, which are basically field formations with over 15,000 troops.

Apart from creating cyber-security organisations down to the division-level to guard against cyber warfare and data thefts, the Army top brass has also underlined the urgent need for "periodic cyber-security audits" by the Army Cyber Security Establishment (ACSE).

"The most advanced armies in the world like the US one also face 3,000 to 4,000 attempts a year to hack their networks. As our Army boosts its infotech levels, we also become more vulnerable to such threats. Future conflicts will be fought by 'networks'," said a senior officer.

Both China and Pakistan, for instance, are bolstering their cyber-warfare or information warfare capabilities at a rapid clip. China, in particular, has made cyber-warfare one of its topmost military priorities, with Chinese hackers breaking into sensitive computer networks of the US, UK, Germany and even India on a regular basis.

"By crippling or destroying an adversary's economic, communication and strategic networks and infrastructure, cyber-warfare can even prove more deadly than ballistic missile strikes. It can, for instance, be in the form of denial-of-service cyber-attacks and paralysing computer viruses," said another officer.

The Indian armed forces, of course, are also trying to hone their information warfare weapons as well as enhance their C4ISR (command, control, communications, computers, intelligence, surveillance and reconnaissance) capabilities.

The tri-service integrated defence staff, on its part, has also come out with an information warfare doctrine. But the progress is slow compared to the infotech boom in the civilian arena.
To the uninitiated, information warfare is precisely that . . . waging warfare through propaganda. It's been used throughout American military history, from convincing the Germans that the Allies planned to land at the Pas de Calais instead of Normandy, right up to the first Gulf War, when airplanes dropped leaflets on Iraqi military formations warning of imminent landings by U.S. Marines. It is irony at its most basic that an information warfare instructor would have fallen prey to propaganda.

The problem, however, is that these so-called former generals lack one thing . . . they are not journalists. This is a phenomenon, it is worth pointing out, that is rearing its ugly head at a time when the public distrusts journalists.

This is an important distinction, because it strikes at how someone is trained. Journalists, even those who don't go to journalism school, are trained to be skeptical of information. Generals have been trained throughout their career for something else, which is to win wars. Some may be equipped with a personal sense of skepticism, but this is about an individual's strengths and not a profession.

Despite denials, military still studying clandestine use of blogs

Last July, Noah Shachtman -- the author of the current Wired article describing the 2006 study -- noted that the Army was working on a new "information operations" field manual that would recognize "information as an element of power [which] ... has the potential to do to highly developed modern democracies what conventional and nuclear weapons could not: compel them to quit."
This past November, Shachtman pointed out an active military effort to make use of blogs. In a piece titled "U.S. Enlists Arab Bloggers for Info War," Shachtman wrote, "It's no secret that, for a long time, the jihadists were kicking American ass in the information war -- especially online. Slowly, slowly, the U.S. government is starting to push back, just a little. The new arsenal of the propaganda campaign: Arab-language bloggers, podcasts, 'webchats' -- and maybe even Second Life and cell phone games, too."
The pilot project described in that article consisted of just a handful of Arabic, Urdu, and Farsi speakers, deployed to post pro-U.S. comments on prominent mainstream blogs in those languages. No original blogs were either initiated or co-opted by the "Digital Outreach Team."
 

No comments:


Google
 

image from http://www.spitting-image.net

Favorite Links

~325~ ~9-11...Who Really Did It~ ~10:10~ ~10 Zen Monkeys~ ~911 Truth~ ~13 Indigenous Grandmothers~ ~15O~ ~15th October~ ~Activist Post~ ~ACT UP~ ~Adbusters~ ~Aerogaz (greek)~ ~Afinity Project~ ~Aging Hipsters~ ~Alecto's Ophelia~ ~Al-Jazeera~ ~Alex Constantine's Blacklist~ ~Alliance for Human Research Protection~ ~All Things Cynthia McKinney~ ~All Things Pakistan~ ~Alternative Insight~ ~Alternative Press Review~ ~Alternet~ ~American Friends Service Committee~ ~American Street~ ~Anarkismo~ ~Andy Worthington~ ~Anglican Pacifist Fellowship~ ~Anomaly News Syndicate~ ~Another Day In The Empire~ ~AntiWar~ ~Antiwar League~ ~Anxiety Culture~ ~Appeal For Redress From The War In Iraq~ ~A Poetic Justice~ ~Artists Without Frontiers~ ~Art of Europe~ ~Arts And Letters Daily~ ~Attack the System~ ~Athens IMC~ ~Ballardian~ ~Bilderberg.org~ ~Black Box Voting~ ~BlackListed News~ ~Black Vault~ ~Blog Bioethics net~ ~Blog of the Unknown Writer~ ~Blondsense~ ~Boiling Frog~ ~Boiling Frogs Post~ ~BoingBoing~ ~Book Ninja~ ~Bookslut~ ~Bradley Manning Support Network~ ~Brand New Law~ ~Brainsturbator~ ~Bring Them Home Now~ ~Bruce Eisner's Vision Thing~ ~Buckminster Fuller Institute~ ~Bulletin of the Atomic Scientists~ ~Bureau of Public Secrets~ ~Business & Human Rights Resource Centre~ ~Buzzflash~ ~Campaign For Real Farming~ ~Catapult the Propaganda~ ~Campus Antiwar Network~ ~Cargo Culte~ ~Castan Centre for Human Rights Law~ ~Catch of the Day~ ~Censorship Paradise~ ~Center for Media and Democracy~ ~Centre for Conflict and Peace Studies, Afghanistan~ ~Centre for Research and Action for Peace~ ~Center on Law and Security~ ~Chapati Mystery~ ~Choike~ ~Chomsky.info~ ~Chronicle of Higher Education~ ~Church of the FSM~ ~CIA & Drugs~ ~Citizens for Legitimate Government~ ~Citizens for Tax Justice~ ~Clandestina~ ~CODEPINK~ ~Coilhouse mag~ ~Collateral Murder~ ~Common Dreams~ ~Complete 9/11 Timeline~ ~Concerned Africa Scholars~ ~Connexions~ ~Conspiracy Archive~ ~Contra Info~ ~Corrente~ ~COTO Report~ ~Coup d'Etat in America~ ~Countercurrents~ ~Crapaganda~ ~Create Real Democracy~ ~Creative-i~ ~Crimes of the State~ ~CrimethInc~ ~Crisis Group~ ~Critical Legal Thinking~ ~Cronache da Mileto (Italian)~ ~Crooks and Liars~ ~Crowd Modelling~ ~Cryptoforestry~ ~Cryptome~ ~Cyclos~ ~Culture Change~ ~Cutting Through The Matrix~ ~Cyrano's Journal~ ~Daily What~ ~Damn Interesting~ ~Dangerous Minds~ ~Deliberative Democracy Consortium~ ~Democracy Center~ ~Democracy Journal~ ~Democracy Now~ ~Democratic Underground~ ~Detournement~ ~Digital Rights [greek lang.]~ ~Diplomacy Lessons~ ~Direct Power!~ ~Discoveries-Researchings-Visions-Understandings-Enlightenments~ ~Disinformation~ ~DistributorCap NY~ ~Dr Hugo Heyrman-Motions of the Mind~ ~Dylanology~ ~EAGAINST~ ~Earthnocentric~ ~Eco Tort~ ~Ectoplasmosis!~ ~Educate Yourself~ ~E-Flux~ ~Electronic Frontier Foundation~ ~Electronic Intifada~ ~Eliminate War Forever~ ~End Evil~ ~Energy Bulletin~ ~Eradicating Ecocide~ ~EROCx1 Blog~
~Europeanrevolution~ ~European Revolution~ ~Eurozine~ ~Exposing the Truth~ ~Extinction Protocol: 2012 and beyond~ ~Families of the Fallen for Change~ ~Fellowship of Reconciliation~ ~Financial Armageddon~ ~FKN Newz~ ~Food For Your Eyes~ ~Forward the Revolution~ ~Franchot's Band~ ~Free Bloggers in Greece~ ~Free Expression Network~ ~Free Press International~ ~Freethinking for Dummies~ ~Free Thought Manifesto~ ~From the Wilderness~ ~F-t-W's Peak Oil Blog~ ~G1000~ ~Ghostdancing in Venice~ ~GIMP~ ~Gilles Duley~ ~Global Guerillas~ ~Global Integrity~ ~Global Policy Forum~ ~Global Revolution~ ~Global Security Institute~ ~Global Voices Online~ ~Gold Star Families for Peace~ ~Government Dirt~ ~Greek Alert [greek lang.]~ ~Greek Assembly in London~ ~Green Left Weekly~ ~Groklaw~ ~Hack Democracy~ ~Hakim Bey and Ontological Anarchy~ ~Hiroshima Peace Institute~ ~History Is A Weapon Blog~ ~How Appealing~ ~How To Vanish~ ~Human Rights Law Review~ ~I Can't Believe It's Not a Democracy!~ ~Idler~ ~Impropaganda~ ~Independent Media Center~ ~INIREF~ ~Institute for Media Peace and Security~ ~International Action Center~ ~International ANSWER (Act Now to Stop War and End Racism)~ ~In These Times~ ~Information Clearing House~ ~Information Liberation~ ~Infoshop~ ~Institute for Policy Studies~ ~Institute for War and Peace Reporting~ ~Insurgent American~ ~Intel Hub~ ~International Labor Rights Forum~ ~Intrinsic Impact~ ~Invisible History~ ~Iraq Citizens Against the War~ ~Iraq Freedom Congress~ ~Iraq Veterans Against the War~ ~Irish Peace Institute~ ~Issues and Alibis~ ~James Howard Kunstler~ ~Jesus Radicals~ ~John Zerzan~ ~Jorgen Schäfer's Homepage~ ~JUST~ ~Just For The Love Of It~ ~Justice Not Vengeance~ ~Kasama Project~ ~Keep Talking Greece~ ~Kia Mistilis~ ~Kill Me If You Can by Bob Miller~ ~Killer Coke~ ~Labor Rights~ ~Labor Rights Now~ ~Labour Start~ ~Lava Cocktail~ ~Lemon Gloria~ ~Lemony Snicket~ ~L'ennui mélodieux~ ~Lessig~ ~Liberation Theology~ ~Libertarians for Peace~ ~Life After the Oil Crash~ ~Life & Peace Institute~ ~Lunch Street Party~ ~Lycaeum~ ~Links by George~ ~Literary Kicks~ ~Lubinproductions~ ~MacNN~ ~Mad Cow Morning News~ ~Manageable Ants~ ~Mario Profaca's Cyberspace Station~ ~Maro Kouri~ ~Maud Newton~ ~May it Please the Court~ ~McSpotlight~ ~Medical Foundation for the Care of Victims of Torture~ ~Metta Center for Nonviolence~ ~Metanoia~ ~Michael Moore - Must Read~ ~Mind Control~ ~Military Families Speak Out~ ~Mind in Peace (greek)~ ~Miss Welby~ ~MK Gandhi Institute for Nonviolence~ ~Molly's Blog~ ~Mother Jones~ ~MungBeing Magazine~ ~MyAntiwar.org~ ~n +1 mag~ ~National War Tax Resistance Coordinating Committee~ ~Natural Farming~ ~Neatorama~ ~Neuromarketing~ ~Neurosecurity~ ~New Internationalist~ ~News Dissector~ ~News Frames~ ~News Making News~ ~News Now~ ~New Tactics in Human Rights~ ~New World Dawning~ ~NEXUS~ ~NFAK~ ~Nomadic Academy Of Fools~ ~Non Fides~ ~Noor Images~ ~Not In Our Name~ ~Not Stupid~ ~Nuclear Resister~ ~NUTOPIA2~ ~[Occupy] 2012 Scenario~ ~Occupy America Social Network~ ~OCCUPY Cafe~ ~Occupy Istanbul~ ~Occupy Together~ ~Occupy Together Field Manual~ ~OWS~ ~Occupy Writers~ ~October 2011~ ~Odious Debts~ ~ODYS~ ~Olmaz~ ~On the Path to 2012~ ~Op Ed News~ ~Open Letters to George W. Bush from his ardent admirer,Belacqua Jones~ ~Open Revolt!~ ~Open Source Ecology~ ~Orthodox Peace Fellowship~ ~Orwell Today~ ~Outlaw Journalism~ ~OWNI~ ~Patriots Question 9/11~ ~Peace in Mind (greek)~ ~PeaceJam~ ~Peace Now~ ~Peaceful Tomorrows~ ~Peak Moment~ ~People's Assemblies Network~ ~Peter Frase~ ~Photography is Not a Crime~ ~Picture the Homeless~ ~Pieman~ ~Places the U.S. has bombed~ ~Pogo Was Right - privacy news~ ~Political Reform.ie~ ~Post Carbon Institute~ ~Praxis Peace Institute~ ~Primate Poetics~ ~Prisoner Solidarity~ ~Professors question 9/11~ ~Project Camelot~ ~Project Censored~ ~Project for the Old American Century~ ~Project on Corporations, Law and Democracy~ ~Psyche, Science and Society~ ~Psychogeography~ ~Public Employees for Environmental Responsibility~ ~Radical Anthropology~ ~Rainbow Family~ ~RawStory~ ~Reality Sandwich~ ~Real Democacy GR~ ~Real Democracy Now.net~ ~Rebel Dog~ ~Reflections on a Revolution~ ~Reporters Without Borders~ ~Re-public~ ~Resistance Studies Magazine~ ~Resource Based Economy Foundation~ ~Re-volt Radio~ ~Richard Heinberg's Museletter~ ~Rockefeller's War on Drugs~ ~Ruckus Society~ ~Sacred Texts~ ~Salon~ ~Save Orphan Works~ ~Scholars and Rogues~ ~Scoop~ ~SCOTUS Blog~ ~Secrecy News~ ~Service Academy Graduates Against the War~ ~Shadow Government Statistics~ ~Signs of the Times News~ ~Slovenia Peace Institute~ ~Smirking Chimp~ ~smygo~ ~SNU Project~ ~Soil And Health Library~ ~SourceWatch~ ~Speaking Truth to Power~ ~Spirit Horse Foundation~ ~Spunk~ ~Squattastic~ ~Starhawk~ ~Stockholm International Peace Research Institute~ ~StopCartel TV-GR~ ~Stop The Arms Fair~ ~Stop the Spying.org~ ~Strangers in a Tangled Wilderness~ ~Students Against War~ ~Survival Acres~ ~Survival International~ ~Swan's Commentary~ ~Take The Square~ ~Tangible Information~ ~Tax Justice Network~ ~Tax Research UK~ ~Theatre of the Oppressed~ ~The Black Commentator~ ~The Black Vault~ ~The Borowitz Report~ ~The Carpetbagger Report~ ~The Center for Public Integrity~ ~The Daily Reckoning~ ~The Dark Age Blog~ ~The Digger Archives~ ~The End of Being~ ~The Guardian~ ~The Hidden Evil~ ~The Huffington Post~ ~The Intelligence Daily~ ~The Lazy Man's Guide To Enlightenment~ ~The Mountain Sentinel~ ~The Nation~ ~The National Security Archive~ ~The New Z-Land Project~ ~The Other Israel~ ~The Pathology Guy~ ~The Progress Report~ ~The Progressive Magazine~ ~The Real News~ ~The Situation Room~ ~The Truth Seeker~ ~ The Watcher Files~ ~Think Progress~ ~Third World Traveller~ ~This Land Is Ours~ ~This Modern World~ ~TomDispatch~ ~Total Collapse~ ~Total Dick-Head~ ~Transform!~ ~Transnational Institute~ ~Transnational Foundation for Peace and Future Research~ ~True Democracy~ ~Troops Out Now~ ~True Democracy Party~ ~Truthdig~ ~Truth News~ ~Truthout~ ~TW3 and fotografia la dolce vita~ ~Uncommon Thought~ ~United for Peace & Justice~ ~United States Institute of Peace~ ~Unknown News~ ~UNPA Campaign~ ~Urbanibalism~ ~US Labor Against the War~ ~VBS TV~ ~Veterans Against the Iraq War~ ~Veterans for Peace and Justice~ ~Video Rebel's Blog~ ~Vietnam Veterans Against the War~ ~Virusmyth - Rethinking AIDS~ ~visionOntv~ ~Voices for Creative Non-Violence~ ~Void Network~ ~Voice Memo~ ~Voters for Peace~ ~Waging Nonviolence~ ~Waking the Midnight Sun~ ~Want To Know~ ~War Costs~ ~War Crimes and Military Improprieties~ ~War Criminals Watch~ ~War on Society~ ~War is Illegal~ ~War Resisters International~ ~War Resisters League~ ~Was Jack Kerouac a Punjabi?~ ~Watergate Exposed~ ~West Point Graduates Against The War~ ~What Really Happened~ ~What’s On My Food?~ ~Why Work? Creating Livable Alternatives to Wage Slavery~ ~Wikileaks~ ~WikiLeaks Central~ ~Wild Wild Left~ ~willyloman~ ~Winning Cancer~ ~Win Without War~ ~Women's International League for Peace and Freedom (WILPF)~ ~Wonkette~ ~World Prout Assembly~ ~Worldwide Hippies~ ~Yes Lab~ ~Yippie Museum~ ~Young Protester~ ~Youth Against War and Racism (YAWR)~ ~Zapatistas~ ~Zine Library~ ~Zippy Elder-at-Large~ ~ZMag~
~ Thank you for visiting Circle of 13 ~

FAIR USE NOTICE

This blog may contain videos with copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in an effort to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.