On Friday, July 3, while most Americans were preparing for a
weekend of fireworks and hot dogs, the Obama administration had an ominous message: they are going ahead with a Bush-era plan
to allow the NSA even more power to invade, intercept and analyze the data of
anyone visiting a government website, ostensibly to help prevent a major cyberattack.
The timing of the announcement -- the day before a long
holiday weekend -- seemed unusual, but less than 24 hours later just such an
attack began to unfold on a series of websites in America and South Korea,
including those of the White House, Pentagon, New York Stock Exchange, Treasury
Department, Secret Service and Washington Post, amongst others.
The attack itself turns out to have been fairly innocuous -- a run of the mill DDOS (distributed
denial of service) attack that did not even employ the latest malware, but you
wouldn�t know that from reading the sensational reporting in the controlled
corporate media. The VOA
reports that the �Internet attackers� have struck again. US State Department under
cyberattack for fourth day blares a headline from the AFP.
Blame for the attack is now falling on North Korea, but what
North Korea has to gain by taking down The Washington Post�s website is
anybody�s guess (perhaps Kim Jong-il was giving his own pronouncement on the
recent revelation that the Post was selling
access to high-level politicians to lobbyists for $250,000 a pop). The big
winner in this attack, it seems, is the federal government, which has been
preparing to unveil an Internet surveillance spy grid for years, but has
virtually no mandate to do so from a public that has become tired of invasive
government snooping.
Various government stooges have been trying to drum up
support for their Orwellian police state fantasy for years by warning of the
coming �cybergeddon� at the hands of �cyber terrorists.� In 2003, former
National Security Agency (NSA) Director Mike McConnell was going on international fear mongering trips, warning of attacks �equivalent
to the attack on the World Trade Center in New York� unless a new agency were
created to deal with the threat. The �cyber 9-11� meme has carried on ever
since, with hysterical coverage of Chinese cyber warriors and teenage
hackers, attempting to rally the public into supporting a new front in the War on Terror: cyberspace.
Of course, exactly as was the case of 9/11, which was used
as a pretext for introducing and passing (before anyone had time to read it)
the voluminous, labyrinthine, constitution-destroying USAPATRIOT Act, so too will
the �cyber 911� be used to justify an iPATRIOT Act that will destroy any
vestige of legal red tape preventing the government from tracking, tracing and
controlling every movement of every citizen in cyberspace forever.
That this legislation exists and is, in fact, merely waiting
for a large cyberterrorist incident to justify rushing it into law was actually
admitted last year by former Counter Terrorism Czar Richard
Clarke to Lawrence Lessig. �I was having dinner with Richard Clarke and I asked
him if there is an equivalent [to the USAPATRIOT Act],� Lessig recounted to a
technology conference in California last year. �Is there an i-PATRIOT Act just
sitting waiting for some substantial event as an excuse to radically change the
way the Internet works. He said, �Of course there is.��
The three prongs of the attack on Internet freedom and
privacy come from the military, the NSA and the Executive/Legislative branches
of government. In 2003, the military labeled the Internet itself an enemy weapons system and ever since then there has been
growing momentum behind various military, intelligence and governmental schemes
to track and trace all movements of all Internet users, American or foreign.
Last year, the Air Force attempted to establish
its own cyber command, resulting in military turf wars that spawned last
month a new U.S. Cyber Command and the further militarization of
cyberspace. The military has even threatened a military response against any would-be hackers of
government systems (unless you are North Korean, evidently).
At the same time, the NSA is jockeying to launch a new system dubbed Einstein that would see all telecoms
route data traveling to or from government networks through an NSA monitoring
box. This is on top of existing programs like Pinwale
and Stellar Wind, which have already given them legal access to
secretly spy on billions of communications records. Now Mike
McConnell is back on the fear mongering trail telling anyone who will
listen that if the NSA doesn�t have the authority to examine everyone�s search
history, private emails and file transfers, then there will be a (you guessed
it) �cyber 9/11.�
The third prong of the attack comes from America�s own
elected representatives. Even back in 2007 the powerful think tank known as the
Center for Strategic and International Studies was already preparing for the
coming Obama presidency, convening a yearlong panel that issued a report called
Securing Cyberspace for
the 44th Presidency, which
contained the following chilling passage under the heading Regulate cyberspace: �Voluntary action is not enough. The United
States must assess and prioritize risks and set minimum standards for securing
cyberspace in order to ensure that the delivery of critical services in
cyberspace continues if the United States is attacked.�
Now, Jay Rockefeller is attempting to do just that with a
bill that would kick start this process of setting �minimum standards� for
cybersecurity over to an
advisory panel filled with globalists, corporate chieftains and hand-picked
academics. Rockefeller tried to drum up his own support for the bill by
reaching new heights of hysterical fear mongering over the Net, even going so
far as to say the
Internet should never have existed. Obama is getting in on the act as well,
threatening to pick a new �cyber czar� who is conspicuous for having taken
every opportunity during his time in Congress to vote
for the expansion of NSA spying programs and authorities.
The entire cyberterror hysteria seems to have reached a peak
in the last month, with the announcement of U.S. Cyber Command, the impending
vote on Rockefeller�s bill and the naming of Obama�s cyber czar expected to
occur in the near future.
Up until last week, there has only been one problem: there
has been no clear mandate for any of this hysterical rush toward increased
government snooping and regulation on the Internet. The American public is
becoming disgusted with Obama�s continuation of the NSA spying program
and has been unwilling to get behind giving up their online liberties in
exchange for protection from the threat of teenage hackers and Russian
spambots. The former head of the National Cybersecurity Center resigned this March citing �threats to the democratic
process from the NSA�s attempts to dominate all governmental cybersecurity
efforts. Wired even ran a story detailing how the U.S. Cyber Command is an
agency without a purpose, function or mission that has been trying to find a
reason for existing.
Now along comes a relatively unsophisticated DDOS attack
from what may or may not be North Korea (there is no proof for the origin of
the attack other than the government�s say-so) and suddenly it all seems
justified: the creation of new branches of the military to deal with cyberwarfare
and even create sophisticated new cyberweapons for destroying hackers and rogue
governments; the NSA programs to track and trace all searches, file transfers
and communications of seemingly everyone on the planet; Rockefeller�s
legislation to appoint big business and globalists to advise on mandatory
communications regulations. It seems that Obama and the NSA have more to gain
from these attacks than do the North Koreans.
Of course, the capability (and presumably the intention) to
monitor every electronic communication passing through the United States in
real time has long existed. What we are seeing now is the revelation of
long-established policies and technologies to a public that may have rejected
them before. The Communications
Assistance for Law Enforcement Act (CALEA) of 1994 already mandated that
every communications device in the country be accessible by law enforcement,
and it has now been mainstream news for years that the FBI can (and has) dialed
into cellphones to listen in on any conversations taking place within reach of
the microphone . . . even if the power is turned off. In 2006, an AT&T
whistleblower revealed an NSA spy room directly in the data hub monitoring every
email, every phone call and every fax traveling through that hub. In 2008, it
was admitted that part of the NSA�s efforts to catch Al-CIAda included agents
passing around particularly humorous phone
sex conversations between US military overseas and their wives back home.
No, the capability of spying on all communications of all
Americans is not being developed now; that has already happened. Right now we
are witnessing the implementation of the phase in which the capability to track
and trace all communications are being introduced to the public and justified
on the grounds of national security. Expect to see an increasing number of
media-hyped �cyberattack� stories before the cyber 9/11 makes the iPATRIOT Act a reality.
Of course, it should be obvious by now that those in charge
of multi-billion dollar agencies are in positions to directly materially
benefit from just such large, stunning cyberattacks, opening the door to the false-flag mentality by which attacks are to be welcomed
for their transformative nature. Certainly the NSA is not building a $1.6 billion data center to sit on their hands waiting for
an attack, nor are the governments of the UK,
Canada, Ireland
and many other countries suddenly considering draconian new e-spying
legislation for the fun of it.
For those who are interested in how a false-flag cyber terrorist
attack could be generated, the PTech story remains a crucial piece of the puzzle. The
technology exists for those in the know to commit sophisticated, convincing and
devastating attacks through the government�s own cyber infrastructure. The only
question is who has the means, motive and opportunity to use it.
James Corbett publishes the Corbett
Report.com.