Fair Use Notice

FAIR USE NOTICE



OCCUPY CORPORATISM

This site may contain copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in an effort to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. we believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law.

In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml

If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.

FAIR USE NOTICE FAIR USE NOTICE: This page may contain copyrighted material the use of which has not been specifically authorized by the copyright owner. This website distributes this material without profit to those who have expressed a prior interest in receiving the included information for scientific, research and educational purposes. We believe this constitutes a fair use of any such copyrighted material as provided for in 17 U.S.C § 107.

Read more at: http://www.etupdates.com/fair-use-notice/#.UpzWQRL3l5M | ET. Updates
FAIR USE NOTICE FAIR USE NOTICE: This page may contain copyrighted material the use of which has not been specifically authorized by the copyright owner. This website distributes this material without profit to those who have expressed a prior interest in receiving the included information for scientific, research and educational purposes. We believe this constitutes a fair use of any such copyrighted material as provided for in 17 U.S.C § 107.

Read more at: http://www.etupdates.com/fair-use-notice/#.UpzWQRL3l5M | ET. Updates

All Blogs licensed under Creative Commons Attribution 3.0

Sunday, October 9, 2011

The Military-Industrial Complex 2.0

rsn

US Navy X-47B Unmanned Stealth Bomber, 03/07/11. (photo: US Navy)
US Navy X-47B Unmanned Stealth Bomber, 03/07/11. (photo: US Navy)


The Military-Industrial Complex 2.0

By Barrett Brown, Guardian UK

09 October 11

A virtual secret state: the military-industrial complex 2.0. US reliance on private contractors is seeing a sinister focus on surveillance of citizens instead of defense against cyber attack.

n Friday, Wired revealed that a virus of unknown origin has been consistently tracking the remote piloting of US military drones down to each keystroke, and that attempts to remove the intrusion have failed. Although the origin and intent of this virus remain unknown, with military analysts positing that it may be typical malware rather than a successful espionage bid, the incident provides the media with a practical opportunity to finally start examining the processes that determine our republic's ability to protect itself from foreign cyber threats. That examination needs to focus on a particular system of the sort that is most dangerous to any republic - a system that grows ever more consequential while remaining largely invisible even to those who are charged with overseeing it.

Even most members of Congress are unaware of the extent to which both the military and intelligence community have come to depend on private contractors to provide the software and ingenuity necessary for both conventional and information warfare in the 21st century. In 2005, experts estimated that 30% of the US intelligence budget was being outsourced, and this intelligence contracting industry has grown markedly since.

On the surface, this practice makes sense; the modern military tends not to attract sufficient technical talent for its needs, and in a few notable cases, the once-legendary hackers who run crucial firms have felony convictions that would prevent them from doing equivalent work from inside the state. Meanwhile, competition for projects promotes the incubation of new and more powerful capabilities from within the industry, and the bidding system ensures that the US gets the best of these for the least money - at least, in theory.

But as evidenced by the drone virus affair and other, more serious incidents, the overall contracting process is deeply flawed. The "free market" competition for contracts that would otherwise bring gains is corrupted by the industry's thorough overlap with its state customers. Former Department of Homeland Security head Michael Chertoff joined the board of directors of contractor BAE Systems ahead of that firm being awarded a $270 million contract last week, followed by another US Army contract for $67 million; before bringing on the well-connected ex-secretary, the firm was becoming notorious for losing such crucial business.

A glance at the boards and executive listings of similar firms, replete with former military officers and government officials, reveals the revolving door that connects potential clients with a state customer for which money is no object, such money being taxed from an electorate too distracted by other offenses to notice. Of course, America's penchant for overspending on defense would be more defensible if it received what it paid for. The revelations regarding the failure of Halliburton, Mantech and other state-intertwined contractors to provide invoiced services to troops have been so endless as almost to be discounted, rather than add to the popular outrage.

This familiar tendency on the part of the US government to spend money it doesn't have on things it doesn't get is now directed at developing procedures it shouldn't use. The intelligence contracting industry, which includes firms that provide security applications to the entire US government and military, has been encouraged lately to direct more of its collective time and capabilities to the task of monitoring, misinforming and sometimes outright attacking American citizens and others abroad - and benefit from the protection of the state and the incompetence of the media in order to make such attacks with impunity.

The Team Themis affair, which united three such firms to go after journalists, activists and WikiLeaks was revealed by Anonymous earlier this year thanks to the seizure of 70,000 emails from coordinating firm HBGary Federal. The little-known and sinister persona management capability - a state-sponsored "sockpuppet" propaganda program - has been found in widespread development; the National Security Agency-linked Endgame Systems has been revealed to offer comprehensive offensive cyber capabilities, with targets in place, to customers other than the US government; a few months ago, I released a report on a worrying surveillance apparatus known as Romas/COIN.

The shift from infrastructure defense to surveillance and offensive capability comes in the wake of the Chinese-orchestrated Aurora attacks against US state and corporate targets - an operation that continues to reveal itself as even more damaging than initially thought as additional targets admit theft of crucial data. The problem with the changing priorities of the US's cyber-contractor complex are two-fold: by neglecting government systems' vulnerabilities - and the drone virus provides a perfect instance - the state loses face with adversaries, real or potential, who respect only force; and by treating its own citizenry as the leading threat to its security, it loses the loyalty of those who respect truth and the rule of law.

No comments:

Post a Comment