Third of Four Installments on Libya: Israel and Libya
Once again, Mahdi Darius Nazemroaya peels away the veneer of legitimacy and deception enveloping the U.S./NATO genocide currently taking place in Libya. In his first article, Nazemroaya exposed the mechanism by which the world came to “know” of the need for a humanitarian intervention in the Libyan Arab Jamahirya and U.S./NATO admissions of targeted assassination attempts against the Leader of the 1969 Libyan Revolution, Muammar Qaddafi. In his first of these four installments since his return from Libya, Nazemraoya makes it clear that there never was any evidence given to the United Nations or the International Criminal Court to warrant or justify United Nations Resolutions 1970 and 1973 or current U.S./NATO operations inside Libya.
One of our contributors passed this to me and asked me to comment in relation to the alarm that Winn Schwartau, Bill Caeli, Jim Anderson, and I sounded in 1994, in writing, to Marty Harris, then head of the National Information Infrastructure (NII).
Stuxnet, the cyberweapon that attacked and damaged an Iranian nuclear facility, has opened a Pandora's box of cyberwar, says the man who uncovered it. A Q&A about the potential threats.
EXTRACT:
CSM: How would you characterize the year since Stuxnet – the response by nations, industry and government?
LANGNER: Last year, after Stuxnet was identified as a weapon, we recommended to every asset owner in America – owners of power plants, chemical plants, refineries and others – to make it a top priority to protect their systems…. That wakeup call lasted only about a week. Thereafter, everybody fell back into coma. The most bizarre thing is that even the Department of Homeland Security (DHS) and Siemens [maker of the industrial control system targeted by Stuxnet] talked about Stuxnet being a wakeup call, but never got into the specifics of what needed to be done.
This is spell-binding radio. Given what she knows, her interviewer, Gary Null, wonders out-load why she has not yet been assassinated. Here’s why:
Susan Lindauer is a former U.S. Intelligence Asset who covered anti-terrorism at the Iraqi Embassy in New York from 1996 up to the invasion. Independent sources have confirmed that she gave advance warning about the 9/11 attack. She also started talks for the Lockerbie Trial with Libyan diplomats. Shortly after requesting to testify before Congress about successful elements of Pre-War Intelligence, Susan became one of the first non-Arab Americans arrested on the Patriot Act as an “Iraqi Agent.” She was accused of warning her second cousin, White House Chief of Staff Andrew Card and Secretary of State Colin Powell that War with Iraq would have catastrophic consequences. Gratis of the Patriot Act, her indictment was loaded with “secret charges” and “secret evidence.” She was subjected to one year in prison on Carswell Air Force Base in Fort Worth, Texas without a trial or hearing, and threatened with indefinite detention and forcible drugging to shut her up. After five years of indictment without a conviction or guilty plea, the Justice Department dismissed all charges five days before President Obama’s inauguration.
Listen to or download the whole show from this link:
There is more, very recent and stunning news – with evidence presented – about 9-11 here:
Study says US government, business need to kick network security up a notch
Michael Cooney
Network World, 12 September 2011
There is an urgent need for businesses and our government to develop high-level cyber intelligence as a way to combat the unacceptable levels of online security threats because the current “patch and pray” system won't cut it in the future.
That was the major thrust of a study by the Intelligence and National Security Alliance's (INSA) Cyber Council which went on to state that such a cyber-intelligence discipline will demand discussion of the unique training, education and skill sets that will be required to successfully conduct meaningful collection and analysis in the cyber domain.
“While there is a great deal of focus on current cyber security issues, there is little focus on defining and exploring the cyber threat environment at a higher level,” INSA stated. INSA describes itself as a non-profit, non-partisan, public-private organization.
The group says the dilemma that exists in the current cyber intelligence apparatus is that the Department of Homeland Security has the authority but lacks the experience and capabilities to orchestrate a comprehensive approach to cyber intelligence. The Department of Defense has much of the actual cyber intelligence capabilities, and private industry owns most of the infrastructure. “Ultimately, INSA's Cyber Council would like to see a meaningful partnership among all relevant government agencies and the private sector to ensure seamless sharing of threat information, timely analytical judgments, and reasoned, measured responses to clear threats.”
The group made a number of suggestions to help businesses and government build this intelligence community including:
Develop strategies (beyond current “patch and pray” processes), policies, doctrines, legal frameworks, and overall global context for cyber intelligence matters
Increase global business, diplomatic and other forms of engagement, which should discuss potential ways to create more stability and mutual security in the cyber arena in order to reduce the potential for cyber conflict, theft, sabotage, and espionage
Support development of deterrence, dissuasion, and other high level concepts and measures for maintaining peace and stability at all levels of conflict and crisis
Define cyber intelligence professions, needed skillsets, training, and education for both industry and government needs.
Enable the creation of cyber intelligence related polices, approaches, and pilot efforts across industry, academia/non-profits, and government that provide unclassified situational awareness and indications and warning data, analytics and 24/7 unclassified and classified (as appropriate) reporting to government agencies, trusted industry, and global partners.
Corporately define specific activities, plans, and intentions of adversaries; continuously identify current and emerging threat vectors, and support our plans and intentions
Identify the specific technical means utilized or planned for cyber attack operations in deep technical detail to include supply chain issues, paths to be exploited, nature and character of deployed infections, systems/product weakness, effects, and anticipated planned or ongoing adjacent activities
Maintain detailed cyber situational awareness writ large
Participate in the rapid control and release of cyber means in order to ensure a viable intelligence gain and loss awareness
Identify what criminal activities are ongoing or have already happened in cyber networks, do formal damage assessments in these areas, and support development of improved defenses
Partner on research and development in the challenging areas of attack attribution, warning, damage assessment, and space related threat collection and analysis
Organize and support counter-intelligence and counter-espionage (CI/CE) activities, with special focus on identifying/using auditing tools and processes to deal with the insider threats
Create a consistent and meaningful approach for the cyber equivalent of Battle Damage Assessment (BDA)/Combat Effectiveness Assessment
Establish public-private partnership cyber outreach forums that address these areas in a comprehensive, practical, and executable fashion. These forums can take the form of commissions that study the demand for cyber intelligence and value added to cyber security.
Phi Beta Iota: The US is not just lacking in cyber-intelligence, it is lacking in all forms of intelligence qua decision-support. The US intelligence community lacks integrity, and General Keith Alexander and General Jim Clapper and Mr. Mike Vickers have all been given too much money with zero adult leadership. Top Secret America is a disgracefully dysfunctional enterprise, and now richly deserving of almost complete shut-down. Congress and the White House have failed to be ethical or intelligent in this matter.
It's no longer about ‘need to know.' Our guiding principle is ‘responsibility to share.'
By James R. Clapper
It has been a decade since our nation suffered the greatest strategic surprise on American soil since the attack on Pearl Harbor. In the aftermath of September 11, as the country sought to understand how such a complex attack could go undetected, much attention was focused on the intelligence community. Pundits, scholars, commentators and others quickly labeled 9/11 an intelligence failure.
Phi Beta Iota: General Clapper means well, but his Op Ed is utterly disingenous and completely out of touch with reality. Below the line is a safety copy of his Op Ed with inserted commentary.