As a 501(c)(3) nonprofit, we depend almost entirely on donations from people like you.
We really need your help to continue this work! Please consider making a donation.
Subscribe here and join over 13,000 subscribers to our free weekly newsletter

With Plan X, Pentagon seeks to spread U.S. military might to cyberspace
Key Excerpts from Article on Website of Washington Post


Washington Post, May 30, 2012
Posted: June 5th, 2012
http://www.washingtonpost.com/world/national-security/with-p...

The Pentagon is turning to the private sector, universities and even computer-game companies as part of an ambitious effort to develop technologies to improve its cyberwarfare capabilities, launch effective attacks and withstand the likely retaliation. The previously unreported effort, which its authors have dubbed Plan X, marks a new phase in the nations fledgling military operations in cyberspace. Plan X is a project of the Defense Advanced Research Projects Agency, a Pentagon division that focuses on experimental efforts and has a key role in harnessing computing power to help the military wage war more effectively. If they can do it, its a really big deal, said Herbert S. Lin, a cybersecurity expert with the National Research Council of the National Academies. If they achieve it, theyre talking about being able to dominate the digital battlefield just like they do the traditional battlefield. The five-year, $110 million research program will begin seeking proposals this summer. Among the goals will be the creation of an advanced map that details the entirety of cyberspace a global domain that includes tens of billions of computers and other devices and updates itself continuously. Such a map would help commanders identify targets and disable them using computer code delivered through the Internet or other means. Another goal is the creation of a robust operating system capable of launching attacks and surviving counterattacks.

Note: Isn't it ironic that the government continually seeks to restrict internet freedoms on the pretext of possible cyberattacks from abroad, while at the same time it carries out an aggressive cyberwar agenda of its own? For lots more reliable information on war manipulations, click here.


Latest News


Key News Articles from Years Past