Big Brother Media Articles
Excerpts of Key Big Brother Media Articles from Major Media
Below are many highly revealing excerpts of important big brother articles reported in the mainstream media suggesting a cover-up.
Links are provided to the full articles on major media websites. If any link should fail to function, click here
. These big brother articles are listed by article date. For the same list by order of importance, click here
. For the list by date posted, click here
. By choosing to educate ourselves on these important issues and to spread the word
, we can and will build a brighter future
For an index to revealing excerpts of media articles on several dozen engaging topics, click here
Pentagon Plans New Arm to Wage Cyberspace Wars
2009-05-29, New York Times
The Pentagon plans to create a new military command for cyberspace ... stepping up preparations by the armed forces to conduct both offensive and defensive computer warfare. White House officials say Mr. Obama has not yet been formally presented with the Pentagon plan. But he is expected to sign a classified order in coming weeks that will create the military cybercommand, officials said. It is a recognition that the United States already has a growing number of computer weapons in its arsenal and must prepare strategies for their use — as a deterrent or alongside conventional weapons — in a wide variety of possible future conflicts. [A] main dispute has been over whether the Pentagon or the National Security Agency should take the lead in preparing for and fighting cyberbattles. Under one proposal still being debated, parts of the N.S.A. would be integrated into the military command so they could operate jointly. A classified set of presidential directives is expected to lay out the military’s new responsibilities and how it coordinates its mission with that of the N.S.A., where most of the expertise on digital warfare resides today. The decision to create a cybercommand is a major step beyond the actions taken by the Bush administration, which authorized several computer-based attacks but never resolved the question of how the government would prepare for a new era of warfare fought over digital networks. Officials declined to describe potential offensive operations, but said they now viewed cyberspace as comparable to more traditional battlefields.
Note: Combine this with the BBC's revealing article on US plans to fight the Internet, and there is reason for concern. For lots more on new developments in modern war planning, click here.
Review: 'New World Order' on Independent Film Channel
2009-05-26, Los Angeles Times
"New World Order," which premieres today on the Independent Film Channel, is a film about ... volunteers in an "information war" who see ... that 9/11 was an "inside job," that the military-industrial complex killed Kennedy, and that an international "power elite" is plotting to enslave us all, excepting for those it will kill outright. They are hard to pigeonhole politically, these conspiracy adepts, trusting neither the "socialist Democrats" nor the "fascist Republicans" -- Ron Paul seems to be their man, if anyone is -- yet sounding as often like '60s leftist radicals as right-wing militiamen. They take the 1st Amendment as seriously as any card-carrying member of the ACLU, styling themselves muckrakers and speakers of truth to power, often through a bullhorn. The man with the biggest bullhorn is Alex Jones, an Austin, Texas-based syndicated radio host ... and the point through which all the strands connect in this unexpectedly affecting, nonjudgmental documentary by Luke Meyer and Andrew Neel. Much of what Jones and his fellows and followers believe is, in a general way, hardly controversial. But whether 9/11 was a plot to bring on world government, or whether the government you already have has painted a red or blue dot on your mailbox to indicate whether you will be shot immediately or merely be sent to the "FEMA camps" when the American Armageddon arrives, well, that's a pale horse of a different color. (Still, you'll want to check your mailbox now.) "This is more important than how much Britney Spears' hair sold for on EBay, 'Dancing With the Stars' or who's gonna be America's next idol," says one believer. "People think this is a joke. We're not a joke."
Note: The disparaging tone of this review of the documentary is typical of mainstream media treatment of 9/11 truth activity, but it makes clear that the film itself does not share this attitude.
Four states adopt 'no-smiles' policy for driver's licenses
2009-05-25, USA Today
Stopping driver's license fraud is no laughing matter: Four states are ordering people to wipe the grins off their faces in their license photos. "Neutral facial expressions" are required at departments of motor vehicles (DMVs) in Arkansas, Indiana, Nevada and Virginia. That means you can't smile, or smile very much. Other states may follow. The serious poses are urged by DMVs that have installed high-tech software that compares a new license photo with others that have already been shot. When a new photo seems to match an existing one, the software sends alarms that someone may be trying to assume another driver's identity. But there's a wrinkle in the technology: a person's grin. Face-recognition software can fail to match two photos of the same person if facial expressions differ in each photo, says Carnegie Mellon University robotics professor Takeo Kanade. Dull expressions "make the comparison process more accurate," says Karen Chappell, deputy commissioner of the Virginia DMV, whose no-smile policy took effect in March. Arkansas, Indiana and Nevada allow slight smiles. "You just can't grin really large," Arkansas driver services chief Tonie Shields says. A total of 31 states do computerized matching of driver's license photos and three others are considering it, says the American Association of Motor Vehicle Administrators. Most say their software matches faces regardless of expressions. "People can smile here in Pennsylvania," state Transportation Department spokesman Craig Yetter says.
Note: For incisive commentary and a heart-warming video addressing this very topic, click here.
Billionaire club in bid to curb overpopulation
2009-05-24, Times of London
Some of America’s leading billionaires have met secretly to consider how their wealth could be used to slow the growth of the world’s population. Described as the Good Club by one insider, it included David Rockefeller Jr, the patriarch of America’s wealthiest dynasty, Warren Buffett and George Soros, the financiers, Michael Bloomberg, the mayor of New York, and the media moguls Ted Turner and Oprah Winfrey. They gathered at the home of Sir Paul Nurse, a British Nobel prize biochemist and president of the private Rockefeller University, in Manhattan on May 5. The informal afternoon session was so discreet that some of the billionaires’ aides were told they were at “security briefings”. Stacy Palmer, editor of the Chronicle of Philanthropy, said the summit was unprecedented. “We only learnt about it afterwards, by accident. Normally these people are happy to talk good causes, but this is different – maybe because they don’t want to be seen as a global cabal,” he said. Some details were emerging this weekend, however. Taking their cue from Gates they agreed that overpopulation was a priority. [A] guest said there was “nothing as crude as a vote” but a consensus emerged that they would back a strategy in which population growth would be tackled as a potentially disastrous environmental, social and industrial threat. “This is something so nightmarish that everyone in this group agreed it needs big-brain answers,” said the guest. “They need to be independent of government agencies, which are unable to head off the disaster we all see looming.”
Why all the secrecy? “They wanted to speak rich to rich without worrying anything they said would end up in the newspapers, painting them as an alternative world government,” he said.
Note: This very secret private meeting of billionaires planning to "solve" the world's "overpopulation" problem occurred just a few days before the latest Bilderberg meeting. For an ABC article on the same, click here. Is this a more positive twist on the Bilderberg Group of the worlds' power elite, or more of the same?
Hospitalization Rates Higher in Kids Who Get Flu Shots
2009-05-19, Forbes magazine
Children who get the annual flu vaccine, especially those who have asthma, may be more likely to be hospitalized than children who don't get the shot, a new study shows. But the researcher noted ... "This may not be a reflection of the vaccine but that these patients are the sickest, and their doctors insist they get a vaccination," said study author Dr. Avni Y. Joshi, a fellow at the Mayo Clinic in Rochester, Minn. "I would be very cautious about interpreting this," said Dr. Gurjit Khurana Hershey, director of asthma research and professor of pediatrics at Cincinnati Children's Hospital. "The bottom line is that kids with asthma who get the flu vaccine are probably a different population anyway. They may be the more severely ill children, so it may have very little to do with the vaccine." The study has too many unknowns and covers too wide an age range over too many flu seasons to indicate any change in recommendations, said Dr. Hank Bernstein, a member of the committee on infectious diseases of the American Academy of Pediatrics. The authors looked back at 263 children aged 6 months to 18 years who had visited the Mayo Clinic between 1999 and 2006 with laboratory-confirmed influenza. Children -- including children who had asthma -- who received the annual inactivated flu vaccine were almost three times more likely to be hospitalized than those who were not inoculated.
Note: With hospitalization rates nearly three times that of children who did not get vaccinated, why are these doctors downplaying this study so much? Why the focus on asthma, when the study covered a wide range of children? Why isn't anyone calling fo rmore research on these striking results? For lots of articles raising serious questions about the safety of vaccines, click here.
Tamiflu Developer: Swine Flu Could Have Come From Bio-Experiment Lab
2009-05-14, ABC News
An Australian researcher claims the swine flu, which has killed at least 64 people so far, might not be a mutation that occurred naturally but a man-made product of genetic experiments accidently leaked from a laboratory -- a theory the World Health Organization is taking very seriously. Adrian Gibbs, a scientist on the team that was behind the development of Tamiflu, says in a report he is submitting today that swine flu might have been created using eggs to grow viruses and make new vaccines, and could have been accidently leaked to the general public. "It might be some sort of simple error that's not being recognized," Gibbs said on ABC's "Good Morning America." In an interview with Bloomberg Television, Gibbs admitted there are other ways to explain swine flu's origin. "One of the simplest explanations if that it's a laboratory escape, but there are lots of others," he said. Regardless of the validity of Gibb's claims, he and several experts say that just bringing the idea of laboratory security to the public's attention is important. "There are lives at risk," Gibbs said. "The sooner this idea gets out, the better."
Note: What would cause one of the developers of Tamiflu to make such a statement? If you read between the lines, there is much more here than meets the eye. For lots more on this intriguing development, click here.
Control of Cybersecurity Becomes Divisive Issue
2009-04-17, New York Times
The National Security Agency has been campaigning to lead the government’s rapidly growing cybersecurity programs, raising privacy and civil liberties concerns among some officials who fear that the move could give the spy agency too much control over government computer networks. The security agency’s interest in taking over the dominant role has met resistance, including the resignation of the Homeland Security Department official who was until last month in charge of coordinating cybersecurity efforts throughout the government. Rod Beckstrom, who resigned in March as director of the National Cyber Security Center at the Homeland Security Department, said ... that he feared that the N.S.A.’s push for a greater role in guarding the government’s computer systems could give it the power to collect and analyze every e-mail message, text message and Google search conducted by every employee in every federal agency. Mr. Beckstrom said he believed that an intelligence service that is supposed to focus on foreign targets should not be given so much control over the flow of information within the United States government. To detect threats against the computer infrastructure — including hackers, viruses and intrusions by foreign agents and terrorists — cybersecurity guardians must have virtually unlimited access to networks. Mr. Beckstrom argues that those responsibilities should be divided among agencies. “I have very serious concerns about the concentration of too much power in one agency,” he said. “Power over information is so important, and it is so difficult to monitor, that we need to have checks and balances.”
Note: For further disturbing reports from reliable sources on government efforts to establish total surveillance systems, click here.
Warning over 'surveillance state'
2009-02-06, BBC News
Electronic surveillance and collection of personal data are "pervasive" in British society and threaten to undermine democracy, peers [in the House of Lords] have warned. CCTV cameras and the DNA database were two examples of threats to privacy, the Lords constitution committee said. It called for compensation for people subject to illegal surveillance. Civil liberties campaigners have warned about the risks of a "surveillance society" in which the state acquires ever-greater powers to track people's movements and retain personal data. In its report, the Lords constitution committee said growth in surveillance by both the state and the private sector risked threatening people's right to privacy, which it said was "an essential pre-requisite to the exercise of individual freedom". People were often unaware of the scale of personal information held and exchanged by public bodies, it said. "There can be no justification for this gradual but incessant creep towards every detail about us being recorded and pored over by the state," committee chairman and Tory peer Lord Goodlad said. "The huge rise in surveillance and data collection by the state and other organisations risks undermining the long-standing tradition of privacy and individual freedom which are vital for democracy," Lord Goodlad added. Human rights campaigners Liberty welcomed the report.
Note: For key reports from major media sources on growing threats to privacy from governments and corporations, click here.
Intelligence Agencies' Databases Set to Be Linked
2009-01-22, Wall Street Journal
U.S. spy agencies' sensitive data should soon be linked by Google-like search systems.
Director of National Intelligence Mike McConnell has launched a sweeping technology program to knit together the thousands of databases across all 16 spy agencies. After years of bureaucratic snafus, intelligence analysts will be able to search through secret intelligence files the same way they can search public data on the Internet. Linking up the 16 agencies is the challenge at the heart of the job of director of national intelligence, created after 9/11. The new information program also is designed to include Facebook-like social-networking programs and classified news feeds. It includes enhanced security measures to ensure that only appropriately cleared people can access the network. The price tag is expected to be in the billions of dollars. The impact for analysts, Mr. McConnell says, "will be staggering." Not only will analysts have vastly more data to examine, potentially inaccurate intelligence will stand out more clearly, he said. Today, an analyst's query might scan only 5% of the total intelligence data in the U.S. government, said a senior intelligence official. Even when analysts find documents, they sometimes can't read them without protracted negotiations to gain access. Under the new system, an analyst would likely search about 95% of the data, the official said.
Note: For key reports from reliable sources on the hidden realities of the War on Terror, click here.
Let's face it, soon Big Brother will have no trouble recognising you
2009-01-13, Times of London
This is the year when automated face-recognition finally goes mainstream, and it's about time we considered its social and political implications. Researchers are developing sharply accurate scanners that monitor faces in 3D and software that analyses skin texture to turn tiny wrinkles, blemishes and spots into a numerical formula. The strongest face-recognition algorithms are now considered more accurate than most humans - and already the Home Office and the Association of Chief Police Officers have held discussions about the possibility of linking such systems with automatic car-numberplate recognition and public-transport databases. Join everything together via the internet, and voilà - the nation's population, down to the individual Times reader, can be conveniently and automatically monitored in real time. So let's understand this: governments and police are planning to implement increasingly accurate surveillance technologies that are unnoticeable, cheap, pervasive, ubiquitous, and searchable in real time. And private businesses, from bars to workplaces, will also operate such systems, whose data trail may well be sold on or leaked to third parties - let's say, insurance companies that have an interest in knowing about your unhealthy lifestyle, or your ex-spouse who wants evidence that you can afford higher maintenance payments.
Note: For disturbing reports on threats to privacy from major media sources, click here.
Bailiffs get power to use force on debtors
2008-12-21, Times of London
The [U.K.] government has been accused of trampling on individual liberties by proposing wide-ranging new powers for bailiffs to break into homes and to use “reasonable force” against householders who try to protect their valuables. Under the regulations, bailiffs for private firms would for the first time be given permission to restrain or pin down householders. They would also be able to force their way into homes to seize property to pay off debts, such as unpaid credit card bills and loans. “These laws strip away tried and tested protections that make a person’s home his castle, and which have stood for centuries,” said Paul Nicolson, chairman of the Zacchaeus 2000 Trust, a London-based welfare charity. “They could clearly lead to violent confrontations and undermine fundamental liberties.” Bailiffs have for hundreds of years been denied powers to break into homes for civil debt or to use force against debtors, except in self-defence. Ministers have now proposed bailiffs be given powers to physically remove debtors who try to defend their property, for example by draping themselves over a car or blocking the door of their home. Details of the new guidelines were obtained under freedom of information laws. Reasonable grounds for breaking down the door include the “movement of a curtain”, a radio being heard or a figure being spotted inside which “may be the offender”. In one case, an 89-year-old grandmother returned home to find a bailiff sitting in her chair having drawn up a list of her possessions. He was pursuing a parking fine owed by her son, who did not even live at the address.
Note: For many disturbing reports from reliable sources on threats to civil liberties, click here.
Boston launches flu shot tracking
2008-11-21, Boston Globe
Using technology originally developed for mass disasters, Boston disease trackers are embarking on a novel experiment - one of the first in the country - aimed at eventually creating a citywide registry of everyone who has had a flu vaccination. The resulting vaccination map would allow swift intervention in neighborhoods left vulnerable to the fast-moving respiratory illness. The trial starts this afternoon, when several hundred people are expected to queue up for immunizations at the headquarters of the Boston Public Health Commission. Each of them will get a bracelet printed with a unique identifier code. Information about the vaccine's recipients, and the shot, will be entered into handheld devices similar to those used by delivery truck drivers. Infectious disease specialists in Boston and elsewhere predicted that the registry approach could prove even more useful if something more sinister strikes: a bioterrorism attack or the long-feared arrival of a global flu epidemic. In such crises, the registry could be used to track who received a special vaccine or antidote to a deadly germ. "Anything you can do to better pinpoint who's vaccinated and who's not, that's absolutely vital," said Michael Osterholm, director of the Center for Infectious Disease Research & Policy at the University of Minnesota. "I wish more cities were doing this kind of thing." When people arrive for their shots, they will get an ID bracelet with a barcode. Next, basic information - name, age, gender, address - will be entered into the patient tracking database. There will be electronic records, too, of who gave the vaccine and whether it was injected into the right arm or the left, and time-stamped for that day.
Note: For more on the serious risks and dangers posed by vaccines, click here and here.
Apocalypse now? 30 days when the world didn't end
2008-09-09, Times of London (One of the U.K.'s leading newspapers)
The beginning of the first serious experiments using CERN’s Large Hadron Collider this week has given rise to a welter of fanciful scare stories about the obliteration of the Earth by a pocket black hole or a cascade reaction of exotic particles. Similar predictions have been made around the launch of several other particle physics experiments and even the first atomic weapons tests. Predictions of the world’s end are nothing new though. We’ve picked out 30 of the most memorable apocalypses that never, for one reason or another, quite happened. 1: 2,800BC: The oldest surviving prediction of the world’s imminent demise was found inscribed upon an Assyrian clay tablet which stated: "Our earth is degenerate in these latter days. There are signs that the world is speedily coming to an end. Bribery and corruption are common." 4: Mar 25, 970 AD. The Lotharingian computists believed they had found evidence in the Bible that a conjunction of certain feast days prefigured the end times. They were just one of a wide scattering of millennial cults springing up in advance of that first Millennium. The millennial panic endured for at least 30 years after the fateful date had come and gone, with some adjustment made to allow 1,000 years after the crucifixion, rather than the nativity. 8: 1648: Having made close study of the kabbalah, theTurkish rabbi Sabbatai Zevi predicted that the Messiah would make a miraculous return in 1648, and that his name would be Sabbatai Zevi. 9: 1666: A year packed with apocalyptic portent. With a date containing the figures commonly accepted as the biblical Number of the Beast and following a protracted period of plague in England, it was little surprise that many should believe the Great Fire of London to be a herald of the Last Days.
U.S. May Ease Police Spy Rules
2008-08-16, Washington Post
The Justice Department has proposed a new domestic spying measure that would make it easier for state and local police to collect intelligence about Americans, share the sensitive data with federal agencies and retain it for at least 10 years. Law enforcement agencies would be allowed to target groups as well as individuals, and to launch a criminal intelligence investigation based on the suspicion that a target is engaged in terrorism or providing material support to terrorists. They also could share results with a constellation of federal law enforcement and intelligence agencies, and others in many cases. Michael German, policy counsel for the American Civil Liberties Union, said the proposed rule may [permit] police to collect intelligence even when no underlying crime is suspected. German, an FBI agent for 16 years, said easing established limits on intelligence-gathering would lead to abuses against peaceful political dissenters. He pointed to reports in the past six years that undercover New York police officers infiltrated protest groups before the 2004 Republican National Convention; that California state agents eavesdropped on peace, animal rights and labor activists; and that Denver police spied on Amnesty International and others before being discovered. "If police officers no longer see themselves as engaged in protecting their communities from criminals and instead as domestic intelligence agents working on behalf of the CIA, they will be encouraged to collect more information," German said. "It turns police officers into spies on behalf of the federal government."
Note: For many disturbing reports on increasing threats to civil liberties from reliable sources, click here.
Police Turn to Secret Weapon: GPS Device
2008-08-13, Washington Post
Across the country, police are using GPS devices to snare [criminal suspects], often without a warrant or court order. Privacy advocates said tracking suspects electronically constitutes illegal search and seizure, violating Fourth Amendment rights of protection against unreasonable searches and seizures, and is another step toward George Orwell's Big Brother society. With the ... ever-declining cost of the technology, many analysts believe that police will increasingly rely on GPS ... and that the public will hear little about it. "I've seen them in cases from New York City to small towns -- whoever can afford to get the equipment and plant it on a car," said John Wesley Hall, president of the National Association of Criminal Defense Lawyers. "And of course, it's easy to do. You can sneak up on a car and plant it at any time." Details on how police use GPS usually become public when the use of the device is challenged in court. Leibig said GPS should be held to a different standard because it provides greater detail. "While it may be true that police can conduct surveillance of people on a public street without violating their rights, tracking a person everywhere they go and keeping a computer record of it for days and days without that person knowing is a completely different type of intrusion," he said. Barry Steinhardt, director of the American Civil Liberties Union's technology and liberty program, considers GPS monitoring, along with license plate readers, toll transponders and video cameras with face-recognition technology, part of the same trend toward "an always-on, surveillance society."
Note: For lots more on threats to privacy from major media sources, click here.
Travelers' Laptops May Be Detained At Border: No Suspicion Required
2008-08-01, Washington Post
Federal agents may take a traveler's laptop computer or other electronic device to an off-site location for an unspecified period of time without any suspicion of wrongdoing, as part of border search policies the Department of Homeland Security recently disclosed. Also, officials may share copies of the laptop's contents with other agencies and private entities for language translation, data decryption or other reasons, according to the policies, dated July 16 and issued by two DHS agencies, U.S. Customs and Border Protection and U.S. Immigration and Customs Enforcement. "The policies . . . are truly alarming," said Sen. Russell Feingold (D-Wis.), who is probing the government's border search practices. He said he intends to introduce legislation soon that would require reasonable suspicion for border searches, as well as prohibit profiling on race, religion or national origin. DHS officials said the newly disclosed policies ... apply to anyone entering the country, including U.S. citizens. Civil liberties and business travel groups have pressed the government to disclose its procedures as an increasing number of international travelers have reported that their laptops, cellphones and other digital devices had been taken -- for months, in at least one case -- and their contents examined. The policies cover "any device capable of storing information in digital or analog form," including hard drives, flash drives, cellphones, iPods, pagers, beepers, and video and audio tapes. They also cover "all papers and other written documentation," including books, pamphlets and "written materials commonly referred to as 'pocket trash' or 'pocket litter.' "
Note: For many reports from reliable, verifiable sources on threats to privacy, click here.
Civil liberties group criticizes new FBI authority
2008-07-02, Boston Globe/Associated Press
Nearly 40 years ago, the FBI was roundly criticized for investigating Americans without evidence [that] they had broken any laws. Now, critics fear the FBI may be gearing up to do it again. Tentative Justice Department guidelines, to be released later this summer, would let agents investigate people whose backgrounds -- and potentially their race or ethnicity -- match the traits of terrorists. Such profiling ... echoes the FBI's now-defunct COINTELPRO, an operation under Director J. Edgar Hoover in the 1950s and 1960s to monitor and disrupt groups with communist and socialist ties. Before it was shut down in 1971, the domestic spying operation -- formally known as Counterintelligence Programs -- had expanded to include civil rights groups, anti-war activists, ... state legislators and journalists. Among the FBI's targets were Martin Luther King Jr., Malcolm X, and John Lennon, along with members of black [political] groups ... and student protesters. The new proposal to allow investigations of Americans with no evidence of wrongdoing is "COINTELPRO for the 21st century," said Barry Steinhardt of the American Civil Liberties Union. "But this is much more insidious because it could involve more people. In the days of COINTELPRO, they were watching only a few people. Now they could be watching everyone."
Note: For many disturbing reports on threats to civil liberties, click here.
The Business of Intelligence Gathering
2008-06-15, New York Times
America is ruled by an “intelligence-industrial complex” whose allegiance is not to the taxpaying public but to a cabal of private-sector contractors. That is the central thesis of Spies for Hire: The Secret World of Intelligence Outsourcing by Tim Shorrock, ... an investigative journalist. His book [provides a] disturbing overview of the intelligence community, also known as “the I.C.” Mr. Shorrock says our government is outsourcing 70 percent of its intelligence budget, or more than $42 billion a year, to a “secret army” of corporate vendors. Because of accelerated privatization efforts after 9/11, these companies are participating in covert operations and intelligence-gathering activities that were considered “inherently governmental” functions reserved for agencies like the Central Intelligence Agency, he says. Some of the book’s most intriguing assertions concern the permeating influence of the consulting firm Booz Allen Hamilton. In 2006, Mr. Shorrock reports, Booz Allen amassed $3.7 billion in revenue, much of which came from classified government contracts exempt from public oversight. Among its more than 18,000 employees are R. James Woolsey, the former C.I.A. director, and Joan Dempsey, a former longtime United States intelligence official who declared in a 2004 speech, “I like to refer to Booz Allen as the shadow I.C.” The “revolving door” between Booz Allen and the I.C. is personified by Mike McConnell, who joined the firm after serving as head of the National Security Agency under President Bill Clinton, only to return as director of national intelligence under President Bush.
Note: For revealing reports on government corruption from reliable sources, click here.
Online warfare research outlined
2008-05-15, Washington Times
Procurement documents released by the U.S. Air Force give a rare glimpse into Pentagon plans for developing an offensive cyber-war capacity that can infiltrate, steal data from and, if necessary, take down enemy information-technology networks. The Broad Area Announcement, posted ... by the Air Force Research Laboratory's Information Directorate, outlines a two-year, $11 million effort to develop capabilities to "access ... any remotely located open or closed computer information systems," lurk on them "completely undetected," "stealthily exfiltrate information" from them and ultimately "be able to affect computer information systems through Deceive, Deny, Disrupt, Degrade, Destroy (D5) effects." "Of interest," the announcement says, "are any and all techniques to enable user and/or root-level access to both fixed [and] mobile computing platforms ... [and] methodologies to enable access to any and all operating systems, patch levels, applications and hardware." The announcement is the latest stage in the Air Force's effort to develop a cyber-war capability and establish itself as the service that delivers U.S. military power in cyberspace. Last year, the Air Force announced it was setting up a Cyberspace Command ... and was developing military doctrine for the prosecution of cyber-war operations. The developments highlight the murky legal territory on which the cyber-wars of the future will be fought. More important, because of the difficulties in identifying attackers and immediately quantifying damage from a cyber-attack, it can be hard to determine when such attacks constitute an act of war as opposed to crime or even vandalism.
Administration Set to Use New Spy Program in U.S.
2008-04-12, Washington Post
The Bush administration said yesterday that it plans to start using the nation's most advanced spy technology for domestic purposes soon, rebuffing challenges by House Democrats over the idea's legal authority. Homeland Security Secretary Michael Chertoff said his department will activate his department's new domestic satellite surveillance office in stages, starting as soon as possible. Sophisticated overhead sensor data will be used for law enforcement once privacy and civil rights concerns are resolved, he said. His statements marked a fresh determination to operate the department's new National Applications Office. But Congress delayed launch of the new office last October. Critics cited its potential to expand the role of military assets in domestic law enforcement, to turn new or as-yet-undeveloped technologies against Americans without adequate public debate, and to divert the existing civilian and scientific focus of some satellite work to security uses. Democrats say Chertoff has not spelled out what federal laws govern the NAO, whose funding and size are classified. Congress barred Homeland Security from funding the office until its investigators could review the office's operating procedures and safeguards. The department submitted answers on Thursday, but some lawmakers promptly said the response was inadequate. [Rep. Bennie G. Thompson (D-Miss.), chairman of the House Homeland Security Committee] said, "We still don't know whether the NAO will pass constitutional muster since no legal framework has been provided."
Note: For many more revealing stories on threats to civil liberties, click here.