Felipe Rodriquez on Wed, 21 Feb 96 19:53 MET


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

nettime: Pentagon net-trolling




synopsis: Het Pentagon (US militair-industrieel complex) geeft nogmaals
          aan waarom encryptie beschikbaar moet blijven voor een ieder.
          (impliciet ook waarom remailers nodig zijn) 

          X-URL: http://www.fas.org/pub/gen/fas/sgp/


> 
> Pentagon Trolls the Net
> By David Corn
> c1996
> 
>  Internet users beware; Pentagon snoops are taking an interest in your
> cyber-communications. Last summer, Charles Swett, a policy assistant in the
> Office of the Assistant Secretary of Defense for Special Operations and
> Low-Intensity Conflict, produced a report  that assessed the intelligence
> value of the Internet for the Defense Department. His study discovered the
> obvious: By monitoring computer message traffic and alternative news sources
> from around the world, the military might catch "early warning of impending
> significant developments." Swett reports that the "Internet could also be
> used offensively as an additional medium in psychological operations
> campaigns and to help achieve unconventional warfare objectives." A striking
> aspect of his study is that there is one sort of Internet user who attracts a
> large amount of attention from Swett: cyber-smart lefties.
>    The thirty-one-page, unclassified study is mostly cut and dry. Much of it
> describes what the Internet is and what can be found within its infinite
> confines. Swett lists various "fringe groups" that are exploiting the
> Internet: the white-supremacist National Alliance, the Michigan Militia,
> Earth First, and People for the Ethical Treatment of Animals (PETA). He
> highlights MUFON--the Mutual UFO Network--which uses the Internet to
> disseminate information on "U.S. military operations that members believe
> relate to investigations and cover-ups of UFO-related incidents." MUFON
> computer messages, Swett notes, "contain details on MUFON's efforts to
> conduct surveillance of DoD installations." The report does not suggest that
> the computer communications of MUFON and these other groups should be
> targeted by the military--though X Filers will be forgiven for wondering if
> something sinister is afoot.
>    What Swett apparently finds of greater interest than MUFON and the "fringe
> groups" is the online left. A significant portion of the report is devoted to
> the San Francisco-based Institute for Global Communications, which operates
> several computer networks, such as PeaceNet and EcoNet, that are used by
> progressive activists. I.G.C. demonstrates, he writes, "the breadth of
> DoD-relevant information available on the Internet." The paper refers to
> I.G.C. conferences that might be considered noteworthy by the Pentagon,
> including ones on anti-nuclear arms campaigns, the extreme right, social
> change, and "multicultural, multi-racial news." Swett cites I.G.C. as the
> home for "alternative news sources" that fill gaps in the mainstream media.
> (It might be good for Pentagon analysts to read I.G.C. dispatches from
> Holland's Peace Media Service.) Yet he seems to say that one can  also track
> the left around the world by monitoring I.G.C.: "Although [I.G.C.] is clearly
> a left-wing political organization, without actually joining I.G.C. and
> reading its message traffic, it is difficult to assess the nature and extent
> of its members' actual real-world activities."
>  Swett's paper presents the world of opportunity awaiting a cyber-shrewd
> military and intelligence establishment. The Pentagon and intelligence
> services will conduct "routine monitoring of messages originating in other
> countries" in the search for information on "developing security threats."
> That means overseas e-mail, like overseas phonecalls, will be intercepted by
> the electronic eavesdroppers of the National Security Agency or some other
> outfit. The data will be fed into filtering computers and then, if it
> contains any hot-button words, forwarded to the appropriate analyst.
> "Networks of human sources with access to the Internet could be developed in
> areas of security concern to the U.S." (But bureaucrats rest assured; "this
> approach"--using computer-assisted spies--"could never replace official DoD
> intelligence collection systems or services.") The Internet "can also serve
> counterintelligence purposes" by identifying threats to the Pentagon and U.S.
> intelligence activities. As an example, Swett refers to a message posted in a
> discussion group for "left-wing political activists" that repeated an A.P.
> article about an upcoming U.S. Army Special Operations Command training
> exercise at an empty Miami Beach hotel.
>  Another growth area is the dirty tracks department. Noting that government
> officials, military officials, business people, and journalists all around
> the world are online, Swett envisions "Psychological Operations" campaigns in
> which U.S. propaganda could be rapidly disseminated to a wide audience. He
> adds, "The U.S. might be able to employ the Internet offensively to help
> achieve unconventional warfare objectives." Swett does not delve into details
> on how the Internet could serve such a mission. But he tosses out one
> possibility: communicating via the Internet with political and paramilitary
> groups abroad that Washington wants to assist while "limiting the direct
> political involvement of the United States." Imagine this: contras with
> computers.
>  Swett does point to a few potential problems. The Internet is chockful of
> chit-chat of no intelligence value. Retrieving useful nuggets will require
> monumental screening. He also predicts that one day video footage of military
> operations will be captured by inexpensive, hand-held digital video cameras
> operated by local individuals and then up-loaded to the Internet. Within
> minutes, millions of people around the world will see for themselves what has
> happened--which could lead to calls for action (or calls to terminate action)
> before government leaders have had a chance to react and formulate a
> position. Such a development, he observes, "will greatly add to the burden on
> military commanders, whose actions will be subjected to an unprecedented
> degree of scrutiny." And opponents of the Pentagon might try to exploit the
> Internet for their own devilish ends: "If it became widely known that DoD
> were monitoring Internet traffic for intelligence or counterintelligence
> purposes,  individuals with personal agendas or political purposes in mind,
> or who enjoy playing pranks, would deliberately enter false or misleading
> messages." The study ends with a series of vague recommendations--all to be
> carried out "only in full compliance with the letter and the spirit of the
> law, and without violating the privacy of American citizens." 
>  The Swett paper is "refreshingly candid," says Steven Aftergood of the
> Federation of American Scientists, who placed a copy of the document on the
> FAS web site on government secrecy, where it is being downloaded about twenty
> times a day (at http://www.fas.org/pub/gen/fas/sgp/.).  The I.G.C. staff is
> amused by Swett's interest. "We must be doing something right," notes George
> Gundrey, program coordinator of I.G.C.'s PeaceNet. "But it is interesting
> that all of his [I.G.C.] examples are the most left-wing items [on the
> network]." 
>  Swett's study is not the first of its kind. Under the rubric of "information
> warfare," other Pentagon outfits and military contractors have studied how to
> use computer networks to collect public information, disseminate propaganda,
> politically destabilize other governments, and plant computer viruses into
> the information systems of foes. (The latter task is particularly foolhardy.
> Deploying viruses into cyber-space--even if targeted against an enemy--would
> likely pose a danger to the United States, since this country is more
> networked than any other.) But Swett's office--the Pentagon's dirty tricks
> shop--is a newcomer to this scene, acoording to David Banisar, a policy
> analyst for the Electronic Privacy Information Center. Banisar's group has
> been helping international human rights groups use encryption to protect
> their global e-mai, "so the spooks don't listen in"
>  It is natural that the national security gang will try to infiltrate and use
> a communication medium like the Internet to its advantage. What is most
> troubling about Swett's paper is its preoccupation with left-of-center
> travelers in cyberspace and _domestic_ political activities. In the appendix,
> Swett reproduces four examples of notable e-mail. One (written by progressive
> activists Richard Cloward and Frances Fox Piven) calls for 100 days of
> protest in response to the Republican's Contract with America, another
> announces plans for a demonstration at the 1996 G.O.P. convention in San
> Diego, the third relays to lefties information on the U.S. Army exercise at
> the Miami Beach hotel, and the last is a communique from the Zapatistas of
> Mexico. Swett's use of these cyber dispatches can be explained one of two
> ways. Either the left has made much more progress in cyber-organizing than
> the right and "such fringe groups" as PETA, or Swett, true to institutional
> tradition, is overwrought about the use of the Internet by a certain parties.
> In any case, the would-be watchers in the defense establishment ought to be
> watched closely--especially if Swett's report refelcts broader sentiment
> within the Pentagon.
> 
> =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
> This message was forwarded through the Red Rock Eater News Service (RRE).
> Send any replies to the original author, listed in the From: field below.
> You are welcome to send the message along to others but please do not use
> the "redirect" command.  For information on RRE, including instructions
> for (un)subscribing, send an empty message to  rre-help@weber.ucsd.edu
> =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=


--
*  distributed via nettime-l : no commercial use without permission
*  <nettime> is a closed moderated mailinglist for net criticism,
*  collaborative text filtering and cultural politics of the nets
*  more info: majordomo@is.in-berlin.de and "info nettime" in the msg body
*  URL: http://www.desk.nl/nettime/  contact: nettime-owner@is.in-berlin.de