EVERYWHERE AT ALL

INFORMATION REPOSTED BELOW AS REQUESTED


[Want to do something about this? Copy-Paste the page source html for this page, or everything posted here, to your MySpace/whatever profile, blog, website.]


http://cryptome.org/io-roadmap.htm

Before you read this article, if you could, please start downloading these documents, recently released under the Freedom of Information Act, so they can be as broadly distributed as possible.

http://www.iwar.org.uk/iwar/resources/io/io-roadmap.pdf
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB177/02_psyop-jp-3-53.pdf



“In War, the moral is to the material as three is to one.”
– Napoleon Bonaparte, (West)

“To subdue the enemy without fighting is the supreme excellence.”
– Sun Tzu, (East)

The Pentagon’s war on the Internet targets US Citizens (and their weblogs?)

PSYOP: Military terminology for ‘Psychological Operations’

The Pentagon sees the Internet in the context of a military adversary that poses a vital threat to their stated mission of global domination. This explains the confrontational language in the document which speaks of “fighting the net”; implying that the Internet is the equivalent of “an enemy weapons system.”

The Pentagon has developed a comprehensive strategy for taking over the Internet and controlling the free flow of information. The plan appears in a recently declassified document, “The Information Operations Roadmap,” which was provided under the FOIA (Freedom of Information Act) and revealed in an article by the BBC (download the files at the top of this article).
(BBC http://news.bbc.co.uk/2/hi/americas/4655196.stm)

The Pentagon’s focus on the Internet validates a great deal of what we know about the mainstream media and its connection to the political establishment. (Why, for example, would the Pentagon see the Internet as a greater threat than the mainstream media, where an estimated 75 percent of Americans get their news?) The ultimate goal of the Pentagon, according to these sources, is to create an Internet paradigm that corresponds to the corporate mainstream model, devoid of imagination or divergent points of view. They envision an Internet that is increasingly restricted by the gluttonous influence of industry and its vast “tapestry of lies.”

The nature of this operational roadmap is quite different from previous Pentagon internet/tech objectives and ideas on digigal warfare, which were often focused on ‘cracking’ computer systems with critical physical battelfield signifigance, (i.e. US ‘cyberwarriors’ taking out power grids and other types of infrastructure related to conventional modern warfare- or tracking enemy combatants using their cellphones, etc…). So, though related, this roadmap has little do to do with the use of state-coined ‘cyberweapons’.
http://www.cdi.org/adm/transcripts/1014/

This objective is focused on information warfare, propoganda, misinformation, and discreting/directing information and news relayed across the internet. (Time to bring focus on who uses that dirty word, ‘blogosphere’).

Who is cited as the enemy in this PSYOP? We are.

A critical component of this operation, is the secret Pentagon “roadmap” calls for “boundaries” between “information operations” abroad and at home but provides no actual limits as long as US doesn’t “target” Americans.

http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB177/index.htm



What Do We Do About This?

– Mirror your blog, website, whatever in other countries- distribute information.
– Speak your mind everywhere, flood the PSYOP antannae with roaring traffic noise.
– Investigate and Support anonymizing technologies, and internet service providers.
– For the Geeks, and Geeks at heart, Support IPV6! Help take Internet Protocol Addresses out of the direct control of the US and telco lobbyists. (the US owns 70% of the world’s IP addresses for connecting computers on the internet, IPV6 increases the number of addresses by several magnitudes for distributed global use) http://www.ipv6.org/

If you are a non-geek, just call your DSL/cable/dialup service provider, and ask them for an IPV6 internet connection (they may laugh or be confused, but ask anyway)]


Should We Be Scared?

Yes and no- all of this is proof that THE PEOPLE, CONGEGRATING OVER VIA EXTENSIONS AFFORDED BY THE INTERNET, ARE SCARING THE POWERS THAT BE. Keep writing. Keep thinking. Keep making music and art. Keep living. Keep downloading. Keep uploading.

It all is eroding the powers that be.

Contemporary Related URLs:

National Security Archive Electronic Briefing Book No. 177
For more information contact:
Kristin Adair / Thomas Blanton
202 994 7000
Posted – January 26, 2006
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB177/index.htm

The Pentagon’s war on the Internet
An excellent editorial piece covering this issue- skinny on the footnotes, but all information contained in this piece can be validated by urls on this page- and documents contained the national security archive, and now the library of congress:
http://www.onlinejournal.com/artman/publish/article_510.shtml

NSPD 16 (at the time of this writing, classified)…Orig. Jul 2002
The cover to this classified federal document outlines points for an agenda which inlcude:
PSYOPs that affect friendly nations
National Security Vulnerability on dependency
Legal issues resulting from use of cyberweapons
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB177/06_nspd_16.pdf

Publication: JP 3-53 Doctrine for Joint Psychological Operations
http://jdeis.cornerstoneindustry.com/jdeis/paragraphsPop.jsp?cId=1006&parId=7368&SearchString=”

IWS, The Infomation Warfare Site:
http://www.iwar.org.uk/iwar/

Crypto-Gram Newsletter
Crypto-Gram is a free monthly e-mail newsletter from security expert Bruce Schneier, with over 100,000 readers.
http://www.schneier.com/crypto-gram.html


Historical Perspectives:

WWII:

“In this war, which was total in every sense of the word, we have seen many great changes in military science. It seems to me that not the least of these was the development of psychological warfare as a specific and effective weapon.”

– General of the Army Dwight D. Eisenhower

http://www.fas.org/irp/eprint/gough.pdf

The Smith-Mundt Act of 1948,

ammended in 1972 and 1998, prohibits the U.S. government from propagandizing the American public with information and psychological operations directed at foreign audiences; and several presidential directives, including Reagan’s NSD-77 in 1983, Clinton’s PDD-68 in 1999, and Bush’s NSPD-16 in July 2002 (the latter two still classified), have set up specific structures to carry out public diplomacy and information operations. These and other documents relating to U.S. PSYOP programs were posted today as part of a new Archive Electronic Breifing Book.

http://www4.law.cornell.edu/uscode/html/uscode22/usc_sec_22_00001461—-000-.html

COINTELPRO, 1956-1970’s

The Sabotage Of Legitimate American Dissent

“Some of the largest COINTELPRO campaigns targeted the Socialist Worker’s Party, the “New Left” (including several anti-war groups such as the Students for a Democratic Society and the Student Nonviolent Coordinating Committee), Black Liberation groups (such as the Black Panthers and the Republic of New Africa), Puerto Rican independence groups, the American Indian Movement and the Weather Underground.” – Wikipedia

The founding document of COINTELPRO directed FBI agents to “expose, disrupt, misdirect, discredit, or otherwise neutralize” the activities of these dissident movements and their leaders.

http://www.icdc.com/~paulwolf/cointelpro/cointel.htm


A Related Usefull Technological Projct:

TOR, distributed anonymized internet proxying

Tor aims keeps internet users anonymous, and is freely downloadable:

“Tor aims to defend against traffic analysis, a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security.”

http://tor.eff.org/

Tor allows clients and servers to offer hidden services. That is, you can offer a web server, SSH server, etc., without revealing your IP to its users. In fact, because you don’t use any public address, you can run a hidden service from behind your firewall.

http://tor.eff.org/cvs/tor/doc/tor-hidden-service.html


[Want to do something about this? Copy-Paste the page source html for this page, or everything posted here, to your MySpace/whatever profile, blog, website.]