Login Form

US Readies Cyberwar, Virtual Flag Terrorism PDF  | Print |  E-mail

Every aspect of our lives must be subject to inventory”- Nancy Pelosi

Related Articles:
Cyberwar declared as China hunts for the West’s intelligence secrets
Times Online | Sources said that the number of attacks had increased significantly over the past 12 months, with China among the most active players.

Venezuela’s Chavez calls for internet controls
Reuters | Chavez, who is criticized by media freedom groups, called on Saturday for regulation of the Internet and singled out a website that he said falsely reported the murder of one of his ministers.

China has developed its own operating system for cyber war with U.S.
World Tribune | A leading cyber security specialist said last week that China has developed its own ultra-secure operating system for a strategic edge in its cyber warfare with U.S. computer systems.

US Readies Cyberwar, Virtual Flag Terrorism

Webster G. Tarpley
March 16, 2010

Google is now preparing to leave China as a result of this company’s stubborn refusal to obey Chinese laws. Google is in effect demanding extraterritoriality and immunity to the legal norms of the host nation, a claim which goes back to the unequal treaties imposed by foreign imperialists, notably the British, on China starting in the 19th century. It is not surprising that the Chinese response to this arrogant interference in the internal affairs of a sovereign state has been stern.

We must also recall that Google was founded with the help of the US intelligence community, and is now acting as a virtual arm of the US National Security Agency, the electronic espionage department of the US government. Google-NSA’s arrogance and hypocrisy are unbearable, especially when we bear in mind the countless times that Google search engines have been used to suppress exposés of the US governments false flag operations, most notably 9/11, and other sensitive topics.

There are two sides to the conflict between Google-NSA and China. One is the Great Cyberwall erected by the Chinese government against attempts by the US-UK to capitalize on ethnic and social tensions inside China to launch a color revolution, CIA people power coup, or postmodern putsch. The other aspect is Google’s claim that hackers working for the Chinese government raided Google’s e-mail servers. The second charge has been formally denied by the Chinese.

Even as Google prepares to shut down its Chinese operations, something larger and more sinister is looming. The US Wall Street-controlled media are gearing up to educate the public about imminent cyberwarfare and cyber-conflict. We can sense that Andrew Marshall, the Pentagon’s infamous octogenarian Yoda of the Office of Net Assessment, is playing a key role behind the scenes. This effort was formally launched in May 2009 by none other than Obama, who announced a buildup of US cyberwar assets, illustrating his project with the claim that his own campaign websites had been hacked during the 2008 campaign, prompting him to seek the assistance of FBI, CIA, NSA and the rest.

One highlight of this US propaganda campaign has been a two-hour docudrama special recently repeated several times on CNN on Feb. 20-21, simulating a massive cyber attack on the United States, starting with cell phones and then taking over into computers.[1] The impact of this attack is to shut down telephone communications, followed by airports and rail services, and finally to knock out most of the US electrical power grid, causing panic and chaos. The simulation is presented in the form of a meeting of the National Security Council while the US is under attack. Several protagonists of the 9/11 cover-up were among the starring players, including Jamie Gorelick (playing the US Attorney General), John Negroponte (playing the Secretary of State), and Michael Chertoff (in the role of the National Security Council Director).

Another important sign of the times is a Feb. 28 op-ed in the Washington Post by Admiral Mike McConnell, who headed up the NSA under Clinton, and is now a top executive for Booz Allen Hamilton, one of the military consulting firms which claims to have the greatest expertise in matters of cyber warfare.[2] Admiral McConnell’s basic idea is that cyber war is now upon us, and that the US must respond using the experience of the Cold War as the relevant model.

The results of this campaign of preparatory propaganda can be summed up under four basic points.

One is the relentless exaggeration of what cyber warfare can actually do in its present state. The public is now expected to believe that computer viruses and denial of service attacks can be used to shut down phone service, cripple airports, prevent trains from running, sabotage nuclear reactors, and paralyze power grids over the quasi-totality of the United States. Many of these claims were launched in relatively obscure articles by CIA officials or Wall Street Journal writers. It is not at all clear that cyber warfare can do what these interested parties are alleging. Rather, the best intelligence estimate right now is that we are in the presence of a new wave of cynical and demagogic fear mongering, similar to the weapons of mass distraction charges made by the neocons against Iraq during the buildup of war hysteria in 2002-2003. The idea that cyber warfare can shut down electrical grids very likely belongs in the same category with Tony Blair’s ludicrous charge that Saddam Hussein had the ability to strike London in 45 minutes. It was a fantastic lie.

A second Leitmotiv is the transposition of the terminology and mindset of the Cold War and nuclear confrontation into the modern cyber arena. The CNN simulation works towards refurbishing notions of deterrence, retaliation, and first strike, dressing them up in the trendy jargon of the computer age. Notions of preventive attack and preemptive attack are also being revamped. One big difference which the propagandists do not point out is that, while nuclear war was considered an unthinkable last resort by most government officials, the new propaganda portrays cyberwarfare as not unthinkable at all, but something that can be indulged in with relative impunity.

Very important legal questions arise in this context. Does a cyber attack constitute an armed attack? Can a cyber attack be casus belli, grounds for issuing a declaration of war? Is escalation from computers to bombs legal? Can a cyber attack represent a threat to international peace and security for the purposes of the United Nations charter? Can a cyber attack be used to invoke article V of the NATO treaty, which calls for common defense?

A third aspect of the current media blitz is that a new cast of enemies is being groomed and brought onstage, even as the shadowy adversaries of yesterday are relegated to a less prominent position – at least as far as cyber-aggression is concerned. In the CNN simulation, there is some discussion of a possible role of “Al Qaeda” and “bin Laden” in the ongoing attack. But this idea is brusquely and almost scornfully dismissed with the reply that those guys are known to live in caves, and therefore could hardly have the equipment necessary to carry on cyber warfare, even though they might desire to do so. For the CNN producers and their intelligence community consultants, the targets are clear: Russia (specifically the city of Irkutsk), China, and Sudan are the three countries mentioned as sources of the cyber attacks shutting down the US economy. With this, we have gone far beyond the narrow confines of the Middle East to target the largest country in the world, the largest country in Asia, and the largest country in Africa. The new target list involves two great powers, and not simply Iraq or Iran. We can see bigger and more lunatic adventures being prepared by the US scenario writers.

The fourth unmistakable overtone of the current propaganda barrage is the danger we can sum up under the heading of virtual flag terrorism. The world of cyber warfare is so opaque and recondite for the average person, and solid confirmation of claims so hard to come by, that rogue bureaucrats in the US and British governments will be able to a surge virtually anything with little fear of being refuted. Google accuses China of hacking without offering any convincing proof, and China denies the charge. What is the average person to believe? What prevents hackers in league with invisible government rogue moles at the NSA from deliberately attacking US facilities, and then blaming it on China, thus ginning up a major international provocation with little risk of being caught?

If millions of people are plunged into the dark, if trains and airliners crash, if other disasters occur, it is child’s play to issue a communiqué blaming hackers in the service of the Russian, Chinese, Sudanese, the Iranians, or other governments. The governments accused can certainly issue denials, but it is not clear how such a charge could be convincingly refuted.

The CNN simulation includes a discussion of the difference between location and attribution, meaning that the mere fact that an attack is launched from the country’s territory does not mean that the government is responsible. “Location is not attribution,” intones Secretary of State Negroponte at one point. But we can already hear the voice of the inevitable neocon warmonger asserting à la Bush that no distinction must be made between the servers spreading a destructive virus and the government whose territory harbors those servers. For the neocon, location and attribution are sure to be the same. This opens the possibility of starting a conflict by infiltrating physical provocateurs onto the territory of the targeted nation, and letting them launch a cyber attack from there. Even easier, so-called botnets of captive computers commandeered by trojans and related viruses can be used to launch the attack.

It goes without saying that the beltway bandits and Pentagon contractors are eager to cash in on the lucrative contracts that are now in the offing. More broadly, cyber warfare can be used as a great alibi for purposes of avoiding civil liability in the age of underfunding and asset stripping. When we have the next crash in the Washington DC metro, the management and the National Transportation Safety Board can ignore decades of underfunding and simply blame everything on Russia, China, and the Sudan, and tell the families of the victims to go and sue those governments. It is therefore time to begin a campaign of counter-inoculation of international public opinion against this new set of ominous lies which is being foisted off on the world.

[1] http://www.youtube.com/watch?v=MDWEM2jM7qY&feature=related – the entire program is available in 9 parts on youtube.


Back-Up of Video featured in Article

JavaScript is disabled!
To display this content, you need a JavaScript capable browser.

(You may have to click the 'Play button' twice)

Cyberwar Scam Designed to Destroy Open Internet

Kurt Nimmo
March 2, 2010

On March 1, Ryan Singel, writing for Wired, accused the government of plotting to destroy the open and freedom-loving internet. Readers of Infowars and Prison Planet have known this for some time, but it is nice to know a quasi-establishment publication is now telling the truth and warning its readers about the threat to liberty posed by the government.

Cyber ShockWave, a “war game” designed to hype the supposed threat to U.S. infrastructure.

JavaScript is disabled!
To display this content, you need a JavaScript capable browser.

Back-Up of Video
(You may have to click the 'Play button' twice)

“The biggest threat to the open internet is not Chinese government hackers or greedy anti-net-neutrality ISPs, it’s Michael McConnell, the former director of national intelligence,” writes Singel. “McConnell’s not dangerous because he knows anything about SQL injection hacks, but because he knows about social engineering. He’s the nice-seeming guy who’s willing and able to use fear-mongering to manipulate the federal bureaucracy for his own ends, while coming off like a straight shooter to those who are not in the know.”

The former intel boss, now vice president of the spooky Booz Allen Hamilton corporation (notorious for connections to 9/11 and a key DARPA client), has been trotted out to sell “Cybaremaggedon” (as Singel appropriately characterizes it) to the American people. McConnell insists the internet needs to be re-engineered:

We need to develop an early-warning system to monitor cyberspace, identify intrusions and locate the source of attacks with a trail of evidence that can support diplomatic, military and legal options — and we must be able to do this in milliseconds. More specifically, we need to re-engineer the Internet to make attribution, geo-location, intelligence analysis and impact assessment — who did it, from where, why and what was the result — more manageable. The technologies are already available from public and private sources and can be further developed if we have the will to build them into our systems and to work with our allies and trading partners so they will do the same.

“He’s talking about changing the internet to make everything anyone does on the net traceable and geo-located so the National Security Administration can pinpoint users and their computers for retaliation if the U.S. government doesn’t like what’s written in an e-mail, what search terms were used, what movies were downloaded,” writes Singel. “Or the tech could be useful if a computer got hijacked without your knowledge and used as part of a botnet.”

McConnell says the government needs to create a new Cold War, “one complete with the online equivalent of ICBMs and Eisenhower-era, secret-codenamed projects.”

Not directed against Muslims in remote backwater caves, mind you, but the real enemy — the American people who are increasingly aroused, thanks in large part to the internet.

Alex Jones talks about cybersecurity legislation on Russia TV.

JavaScript is disabled!
To display this content, you need a JavaScript capable browser.

Back-Up of Video
(You may have to click the 'Play button' twice)

The Bush era intel boss hyped the overblown Chinese hacker threat in “breathless” stories published in The Washington Post and The Wall Street Journal. The world’s largest security companies McAfee and Symantec have downplayed the story. Singel points out that such fear-mongering is almost completely void of facts.

The anti-open internet echo chamber includes a speech delivered by Lawrence E. Strickling, Assistant Commerce Secretary:

In fact, “leaving the Internet alone” has been the nation’s internet policy since the internet was first commercialized in the mid-1990s. The primary government imperative then was just to get out of the way to encourage its growth. And the policy set forth in the Telecommunications Act of 1996 was: “to preserve the vibrant and competitive free market that presently exists for the Internet and other interactive computer services, unfettered by Federal or State regulation.”

This was the right policy for the United States in the early stages of the Internet, and the right message to send to the rest of the world. But that was then and this is now.

Now? The Pentagon wants to take out enemies with the online equivalent of ICBMs in order to prevent cyberattacks, privacy intrusions and copyright violations (and, of course, take out the real threat — the alternative media overshadowing the staid establishment corporate media).

“As anyone slightly versed in the internet knows, the net has flourished because no government has control over it,” writes Singel. “But there are creeping signs of danger.”

The primary creeping sign is the cybersecurity bill now in the Senate under the direction of the renown internet hater, senator Jay Rockefeller. If passed, Obama would have the ability to initiate “network contingency plans to ensure key federal or private services did not go offline during a counterattack of unprecedented scope,” according to Tony Romm of The Hill.

“Too much is at stake for us to pretend that today’s outdated cybersecurity policies are up to the task of protecting our nation and economic infrastructure,” Rockefeller said. “We have to do better and that means it will take a level of coordination and sophistication to outmatch our adversaries and minimize this enormous threat.”

Rockefeller and the government have but one serious adversary — the American people who are circumventing establishment propaganda via the internet.

The recently passed House cybersecurity bill and the Senate’s version now under considered are peddled as urgent action against Russian and Chinese hackers hellbent on taking down the power grid and the smart phone network.

In fact, all the fear-mongering is a smoke screen for the real purpose of this legislation — to close down the free and open internet and viciously attack those who dare tell the truth and organize opposition to a predatory and dictatorial government.


Click Here to Comment

Take a Poll

Best way to stimulate the economy...