Category Archives: IA

Cyber guerrillas can help US

http://www.ft.com/cms/s/0/d3dd7c40-ff15-11df-956b-00144feab49a.html#axzz179p6Blrv

Evgeny Morozov’s “cyber guerrillas” are referred to as Civilian Irregular Information Operators on this blog, but we are both talking about non-state actors. 

Morozov essentially wants somebody to persuade, change and influence the sophomoric Julian Assange to collaborate with traditional media, redact sensitive files, and offer those in a position to know about potential victims of releases the chance to vet the data and turn Wikileaks into a new Transparency International.

I want him dead.

Morozov thinks that would create a global movement of anti-American politicised geeks clamouring for revenge.

Possibly.

Are there enough pro-American politicised geeks to counter vengeful anti-American politicised geeks?

Are there any U. S. .mil /.gov Information Operators capable of  countering vengeful anti-American politicised geeks working by, with and through pro-American politicised geeks?  No real way of knowing.  Bound to be some who are capable of it, but of those, how many are willing to risk their careers associating with politically incorrect  pro-American politicised geeks?

6 Comments

Filed under CNA, CND, IA, Idea War, IW, Morale Operations, PSYOP Auxiliaries, Resisters

Cyber Operations Planner 2

This is the kind of job .mil is seeking contractors to do for them. Not the point of contact, so don’t ask this disgruntled former employee of that particular component of the Military-Industrial Complex for help getting this gig. Blogged here because civilian contractors hired to be cyber operations planners for Regulars are Civilian Irregular Information Operators.

Works as an Operations Analyst at the Army’s Regional Computer Emergency Response Team located at Ft. Gordon, Ga. Responsible for functions pertaining to planning, coordinating, executing, tracking, and reporting of unit operations. Supports the deployment of teams on short-notice and preplanned missions in response to computer security events at Army posts, camps, and stations around the world. Supports the development and maintenance of Tactics, Techniques and Procedures and Standard Operating Procedures. Coordinates vertically and horizontally across internal and external organizations. Responsible for matters that concern training, planning, coordination of missions, operations and plans.
Coordination based on customer needs and requirements. Evaluate and recommend uses of resources required by customer missions in order to complete successfully.

Essential Functions: Preparation, coordination, authentication and distribution of SOP, Operations Plans, Operations Orders, fragmentary orders (FRAGOs), warning orders, review of plans and orders of other departments. Reviews, disseminates and explains plans and orders of other departments to team members. Reviews customer OPLANs and OPORDs for completeness. Ensures necessary support requirements are provided when and where required for the customer. Will be responsible to complete various reports, status updates, and conduct briefings on a variety of subjects. Mission planning and data entry utilizing various mission planning and reporting software applications.

Basic Qualifications:

Exceptional communication skills, strong writing skills. Experience with Military Staff organization and operations policies and procedures is desired. Microsoft Office expertise, Military Decision Making Process (MDMP), and the Joint Operation Planning Process (JOPP), Strong customer interface skills required. Demonstrated ability to schedule and manage support requirements in a dynamic work environment. Secret Clearance required and must be clearable to TS/SCI. Bachelors Degree and 2 years experience, Masters degree and 0 years of experience, or 6 years of relevant experience in lieu of a degree.

Preferred Qualifications:

Experience in performing duties as Battle Captain are highly desired. Functional experience in S3 Operations with experience in developing Operation Orders (OPORDs), Operation Plans (OPLANs), FragmentaryOrders (FRAGOs), and Warning Orders (WARNOs) is desired. Experience with Military Staff organization and operations policies and procedures is desired. Bachelors Degree and 2 years experience, or Masters degree and 0 years of experience preferred

A Department of the Army Civilian GS-13 doing this exact same job would be a Civilian Regular Information Operator, likely a member of Local 2017, American Federation of Government Employees, AFL-CIO, and damn hard to be shed of once his services are no longer required.

1 Comment

Filed under CNA, CND, IA, Info Warriors

Don’t You Just Hate It . . .

. . . when you’re commenting on some one else’s blog and they close comments down before you can post it?

Here’s what Belmont Clubbers were deprived of, Wretchard:

Impotence.

Every day Assange remains unterminated with extreme prejudice is a propaganda defeat for us.

Regular .mil & .gov Computer Network Attack, Operational Security, Psychological Operations/Military Information Support Operations, Information Assurance, Public Affairs and Intelligence have all screwed the pooch on this. Not only is the Emperor naked, he’s fat, ugly and hung like a mouse.

Effective Restrictive Measures have not been applied to Wikileaks.

Civilian Irregular Information Operators, counterpropagandists, hoaxers, and white hat hackers are going to have to do what Regulars can’t or aren’t allowed to.

Comments Off

Filed under CNA, IA, Morale Operations, PSYOP

National Defense University Blogging About Civilian Irregular Information Operators

Deterring Chinese Cyber Militias with Freedom Militias

US defenses are insufficient to stop Chinese cyber attacks. The US-China Economic and Security Review Commission estimates that Chinese cyber attacks cost the US hundreds of billions of dollars annually. By way of comparison, this is substantially more than the entire Chinese military budget.
What is needed is a threat that is both capable of forcing China to take notice and that it will believe the United States would execute. Such a threat exists. While China’s regime does not appear willing to be deterred by conventional diplomatic or legal complaints, it has demonstrated considerable concern about threats to its censorship apparatus.
The most effective way to threaten Chinese censorship would be for US and partner nations to develop their own cyber militias. Rather than stealing intellectual property and disabling public institutions, however, Western militias would aim at finding ways to bypass Chinese firewalls to spread internet freedom.

There already are American cyber militias. Pretty much the entire Psychological Operation effort intended for the American domestic target audience is entrusted to them. American cyber militia Computer Network Exploitation is a specialty of Internet Anthropologist Think Tank.

The Jawa Report are outstanding American cyber militia Computer Network Attackers and counterpropagandists, specializing in monitoring and taking down Jihadi websites.

Most of the conservative and libertarian blogosphere would love to be involved in disseminating information that annoys the Chicoms and spreads internet freedom behind the Great Firewall. But who amongst the .gov/.mil Regulars dares to work by, with and through Irregular Information Operators in the current political environment?

Also at GlobalSecurity.org

Countering the Cyber Jihad, 2006/04/28

Geek Battalion, 2006/05/01

Virtual Cyber Militias Must Run with the Ball OGAs Dropped, 2007/09/15

The Unorganized Cyber Militia of the United States, 2007/09/26

Wedges and Mauls, 2007/09/30

Irregular Restrictive Measures — Blogospheric Computer Network Attack, 2007/10/11

Plausibly Deniable Cat Herders, 2007/10/19

People’s Information Support Team, 2008/02/24

Fuzzy Bunny Slippers IO — The Rise of Pajamahadeen, Virtual Militias, and Irregular Information Operators, 2008/05/22

Red Chinese Cyber-Militia, 2008/05/29

Civilian Irregular Auxiliary Counterprogandists Contributed To Victory, 2008/11/22

Public Affairs and Information Operations, 2008/12/31

eResistance in Moldova, 2009/04/07

The amateurization of cyberwarfare, 2009/08/09

3 Comments

Filed under CNA, CND, IA, Info Warriors, Pamphleteers, PSYOP Auxiliaries

CJCSI 6504.01

Chairman of the Joint Chiefs of Staff Instruction 6504.01, Information Assurance and Computer Network Operations, dated 1 APR 10,  is out.  Irregulars who want to impress Regulars by larding their conversation with the latest buzz words should memorize these: 

 
 
 

Cyberwar 

War using cyberspace operations to achieve sensational yet bloodless results for friendly forces while seeking to inflict massive inconvenience on the adversary in a manner that offers the most photogenic and telegenic depiction for domestic and international public audiences. 

 
 

Cyberwarrior 
 
Uniformed and non-uniformed personnel of the Department of Defense, civilian resources, and other government agencies (OGA) conducting fullspectrum cyberwarfare operations. 

 

Make sure you get to p. 11. 

H/T:  InfowarMonitor

Comments Off

Filed under CNA, CND, IA, PSYOP

Private Military Company Recruiting Mercenary Cyber Warriors

Contractor Seeks ‘Cyber Warriors’ to Help Defend U.S.

National cybersecurity is a hugely growing field, with the crude but effective shutdown of U.S. and South Korean government Web sites over July 4 weekend coming as the latest example of our weaknesses.

A report released just this past Wednesday found that the federal government is woefully behind in cybersecurity, with the lack of trained personnel the biggest problem.

Cyber Warriors Wanted

  • Information Operations/Information Assurance
  • Software engineers/developers – JAVA/J2EE/, JAVA/XML, C++
  • FPGA expertise
  • Software security engineers
  • Test engineers
  • Software testers
  • Systems administrators – Linux, Solaris, Unix, Red Hat, VMware (Certifications are preferred)
  • Systems engineers – CNO, CNA, CNE, NOC, Requirements management
  • NOC is Network Operations Center. Had to look that up.

    How many military Information Operations can be conducted without the involvement of non-military information operators?   And of those non-military information operators, how many are Government Employees?

    H/T: Bill Austin

    Comments Off

    Filed under CNA, CND, IA, Info Warriors, IW

    Buccaneer.com

    INFOSEC Privateering as a Solution to Cyberspace Threats by Michael Tanji

    There are only a few courses of action available when it comes to addressing cyber threats. The first is the maintenance of the status quo: victim hood. Note that organizations that deal with cyber threats all have “response” in their name and you will realize that INFOSEC today is almost entirely reactive.

    The second course of action has the government building the capability to bring law and order to cyberspace. This is unlikely if for no other reason than the stateless nature of the Internet precludes exercising dominion by any single nation. Consider that the Department of Justice’s cyber crime budget for 2005 was projected to be roughly $300 million dollars and a similar program within Homeland Security’s was much less.6 Contrast cyber defense spending to the tens of billions of dollars malicious actors are estimated to be making and you will understand the priority cyber threat has on Capitol Hill.7

     

    The final option – outsourcing – has private-sector enterprises performing the tasks necessary to defend national interests online. Unlike the government the private sector has ample resources and a strong motivation to succeed: reducing threats means less risk which translates into higher profits.

     


    I’m loving this.  Read the whole thing.  Non-state actors are eating our lunch in the infowar and the regularly constituted authorities of my beloved Westphalian nation-state have neither the mandate, the resources, nor the political will to capture or destroy enemies in cyberspace.  Those of us who still think America and Americans and American minds and American intellectual, virtual, and physical property are still worth protecting are rapidly realizing the limits of .gov.  

    I’m old.  Meatspace analogies make sense to me.  The Bad Guys in cyberspace are numerous but most of them don’t work well together.  Cyberspace is Major Dundee meets The Road Warrior.  Rustlers, horse thieves, and raiders under every rock, plus invading armies.  Irregulars, a cyber Magnificent Seven, can do more than cavalry that never comes.  

    You don’t have to sit around and bitch that Bush hasn’t asked you to buy War Bonds or conserve food.   Mobilize yourself.  You don’t even have to get off your ass. 

    5 Comments

    Filed under CNA, CND, Electronic Counter Media, G-2, IA, InfoPaladins, IW