In Afghanistan on April 4, 2012 at 6:32 am
The Pentagon is reportedly deliberating over putting elite troops and Special Forces in Afghanistan under CIA control. The move would reduce official US presence with a view to meeting Obama’s promise of total withdrawal from the country by 2014.
Top US military sources told Agence France-Presse that the idea had been circulated by senior defense intelligence as a way to reduce US presence in Afghanistan before the 2014 deadline.
It is one of several initiatives currently under discussion in the Pentagon, according to AFP sources. The proposals have not yet been presented to US Secretary of Defense Leon Panetta.
Washington has denied the existence of such a proposal, with Pentagon spokesperson George Little calling the claims “simply wrong.”
Continue reading ‘US may use CIA cloak to hide Afghan presence‘ at Global Freedom Technology Firm.
Related articles, courtesy of Zemanta:
In Uncategorized on July 25, 2011 at 11:50 pm
Image via Wikipedia
Last week Republican senator John McCain called for the government to establish a special panel to come up with legislation to address supposed cybersecurity threats facing the United States. “The only way to move comprehensive cyber security legislation forward swiftly is to have committee chairmen and ranking members step away from preserving their own committees’ jurisdiction … (and) develop a bill that serves the national security needs of all Americans,” McCain said.http://c.brightcove.com/services/viewer/federated_f9?isVid=1&isUI=1 As if on cue, the Pentagon announced two previously unpublicized attacks following McCain’s call for a bipartisan action. On Thursday, out-going deputy secretary of defense Bill Lynn said a foreign intelligence service had stolen 24,000 files on a sensitive weapons system from a defense contractor’s network. Lynn said the Defense Industrial Base Cyber Pilot was established to work with the private sector in the battle against cyber foes. “Our success in cyberspace depends on a robust public-private partnership,” said Lynn. “The defense of the military will matter little unless our civilian critical infrastructure is also able to withstand attacks.” Lynn cranked up the paranoia in February when he speculated that al-Qaeda might get its hands on the Stuxnet virus. He said “it is possible for a terrorist group to develop cyberattack tools on their own or to buy them on the black market.” The highly sophisticated malware virus was engineered by the United States and with Israeli Mossad assistance placed on an Iranian industrial computer network in order to undermine the country’s nuclear energy program.
Do it yourself Logo only $49
In Hacktivist, Human Rights, Internet Censorship, Military, Police State, Society on June 1, 2011 at 6:13 pm
has announced that computer intrusions from abroad are to be considered acts of war against the United States
and will be answered with conventional military force.
“If you shut down our power grid, maybe we will put a missile down one of your smokestacks,” a military official told The Wall Street Journal
. In part, the Pentagon intends its plan as a warning to potential adversaries of the consequences of attacking the U.S., according to the Journal.
Pentagon Declares War on Cyber Enemies
The Pentagon document is 30 pages in its classified version and 12 pages in the unclassified one. It concludes that the Laws of Armed Conflict
are applicable in cyberspace as in traditional warfare.
The Pentagon established a new command last year, headed by Gen. Keith B. Alexander
, director of the NSA
, to consolidate military network security and attack efforts. Alexander told the Washington Post
last November that the new outfit wants maneuvering room to mount what he called “the full spectrum” of operations in cyberspace.
The NSA announced its ambitious cyber security plan last year. Dubbed “Perfect Citizen
,” it is designed to detect cyber assaults on private companies and government agencies running such critical infrastructure as the electricity grid and nuclear-power plants, according to the New York Times
According to the Post, offensive actions may include shutting down part of an opponent’s computer network to head off a cyber-attack
or changing a line of code in an adversary’s computer to render malicious software harmless. They are operations that destroy, disrupt or degrade targeted computers or networks, the newspaper reported.
iPhone 4 Cases Now In Stock & Free Shipping at Case-mate.com!