Category Archives: IA

Cyber guerrillas can help US

http://www.ft.com/cms/s/0/d3dd7c40-ff15-11df-956b-00144feab49a.html#axzz179p6Blrv

Evgeny Morozov’s “cyber guerrillas” are referred to as Civilian Irregular Information Operators on this blog, but we are both talking about non-state actors. 

Morozov essentially wants somebody to persuade, change and influence the sophomoric Julian Assange to collaborate with traditional media, redact sensitive files, and offer those in a position to know about potential victims of releases the chance to vet the data and turn Wikileaks into a new Transparency International.

I want him dead.

Morozov thinks that would create a global movement of anti-American politicised geeks clamouring for revenge.

Possibly.

Are there enough pro-American politicised geeks to counter vengeful anti-American politicised geeks?

Are there any U. S. .mil /.gov Information Operators capable of  countering vengeful anti-American politicised geeks working by, with and through pro-American politicised geeks?  No real way of knowing.  Bound to be some who are capable of it, but of those, how many are willing to risk their careers associating with politically incorrect  pro-American politicised geeks?

6 Comments

Filed under CNA, CND, IA, Idea War, IW, Morale Operations, PSYOP Auxiliaries, Resisters

Cyber Operations Planner 2

This is the kind of job .mil is seeking contractors to do for them. Not the point of contact, so don’t ask this disgruntled former employee of that particular component of the Military-Industrial Complex for help getting this gig. Blogged here because civilian contractors hired to be cyber operations planners for Regulars are Civilian Irregular Information Operators.

Works as an Operations Analyst at the Army’s Regional Computer Emergency Response Team located at Ft. Gordon, Ga. Responsible for functions pertaining to planning, coordinating, executing, tracking, and reporting of unit operations. Supports the deployment of teams on short-notice and preplanned missions in response to computer security events at Army posts, camps, and stations around the world. Supports the development and maintenance of Tactics, Techniques and Procedures and Standard Operating Procedures. Coordinates vertically and horizontally across internal and external organizations. Responsible for matters that concern training, planning, coordination of missions, operations and plans.
Coordination based on customer needs and requirements. Evaluate and recommend uses of resources required by customer missions in order to complete successfully.

Essential Functions: Preparation, coordination, authentication and distribution of SOP, Operations Plans, Operations Orders, fragmentary orders (FRAGOs), warning orders, review of plans and orders of other departments. Reviews, disseminates and explains plans and orders of other departments to team members. Reviews customer OPLANs and OPORDs for completeness. Ensures necessary support requirements are provided when and where required for the customer. Will be responsible to complete various reports, status updates, and conduct briefings on a variety of subjects. Mission planning and data entry utilizing various mission planning and reporting software applications.

Basic Qualifications:

Exceptional communication skills, strong writing skills. Experience with Military Staff organization and operations policies and procedures is desired. Microsoft Office expertise, Military Decision Making Process (MDMP), and the Joint Operation Planning Process (JOPP), Strong customer interface skills required. Demonstrated ability to schedule and manage support requirements in a dynamic work environment. Secret Clearance required and must be clearable to TS/SCI. Bachelors Degree and 2 years experience, Masters degree and 0 years of experience, or 6 years of relevant experience in lieu of a degree.

Preferred Qualifications:

Experience in performing duties as Battle Captain are highly desired. Functional experience in S3 Operations with experience in developing Operation Orders (OPORDs), Operation Plans (OPLANs), FragmentaryOrders (FRAGOs), and Warning Orders (WARNOs) is desired. Experience with Military Staff organization and operations policies and procedures is desired. Bachelors Degree and 2 years experience, or Masters degree and 0 years of experience preferred

A Department of the Army Civilian GS-13 doing this exact same job would be a Civilian Regular Information Operator, likely a member of Local 2017, American Federation of Government Employees, AFL-CIO, and damn hard to be shed of once his services are no longer required.

1 Comment

Filed under CNA, CND, IA, Info Warriors

Don’t You Just Hate It . . .

. . . when you’re commenting on some one else’s blog and they close comments down before you can post it?

Here’s what Belmont Clubbers were deprived of, Wretchard:

Impotence.

Every day Assange remains unterminated with extreme prejudice is a propaganda defeat for us.

Regular .mil & .gov Computer Network Attack, Operational Security, Psychological Operations/Military Information Support Operations, Information Assurance, Public Affairs and Intelligence have all screwed the pooch on this. Not only is the Emperor naked, he’s fat, ugly and hung like a mouse.

Effective Restrictive Measures have not been applied to Wikileaks.

Civilian Irregular Information Operators, counterpropagandists, hoaxers, and white hat hackers are going to have to do what Regulars can’t or aren’t allowed to.

Comments Off

Filed under CNA, IA, Morale Operations, PSYOP

National Defense University Blogging About Civilian Irregular Information Operators

Deterring Chinese Cyber Militias with Freedom Militias

US defenses are insufficient to stop Chinese cyber attacks. The US-China Economic and Security Review Commission estimates that Chinese cyber attacks cost the US hundreds of billions of dollars annually. By way of comparison, this is substantially more than the entire Chinese military budget.
What is needed is a threat that is both capable of forcing China to take notice and that it will believe the United States would execute. Such a threat exists. While China’s regime does not appear willing to be deterred by conventional diplomatic or legal complaints, it has demonstrated considerable concern about threats to its censorship apparatus.
The most effective way to threaten Chinese censorship would be for US and partner nations to develop their own cyber militias. Rather than stealing intellectual property and disabling public institutions, however, Western militias would aim at finding ways to bypass Chinese firewalls to spread internet freedom.

There already are American cyber militias. Pretty much the entire Psychological Operation effort intended for the American domestic target audience is entrusted to them. American cyber militia Computer Network Exploitation is a specialty of Internet Anthropologist Think Tank.

The Jawa Report are outstanding American cyber militia Computer Network Attackers and counterpropagandists, specializing in monitoring and taking down Jihadi websites.

Most of the conservative and libertarian blogosphere would love to be involved in disseminating information that annoys the Chicoms and spreads internet freedom behind the Great Firewall. But who amongst the .gov/.mil Regulars dares to work by, with and through Irregular Information Operators in the current political environment?

Also at GlobalSecurity.org

Countering the Cyber Jihad, 2006/04/28

Geek Battalion, 2006/05/01

Virtual Cyber Militias Must Run with the Ball OGAs Dropped, 2007/09/15

The Unorganized Cyber Militia of the United States, 2007/09/26

Wedges and Mauls, 2007/09/30

Irregular Restrictive Measures — Blogospheric Computer Network Attack, 2007/10/11

Plausibly Deniable Cat Herders, 2007/10/19

People’s Information Support Team, 2008/02/24

Fuzzy Bunny Slippers IO — The Rise of Pajamahadeen, Virtual Militias, and Irregular Information Operators, 2008/05/22

Red Chinese Cyber-Militia, 2008/05/29

Civilian Irregular Auxiliary Counterprogandists Contributed To Victory, 2008/11/22

Public Affairs and Information Operations, 2008/12/31

eResistance in Moldova, 2009/04/07

The amateurization of cyberwarfare, 2009/08/09

3 Comments

Filed under CNA, CND, IA, Info Warriors, Pamphleteers, PSYOP Auxiliaries

CJCSI 6504.01

Chairman of the Joint Chiefs of Staff Instruction 6504.01, Information Assurance and Computer Network Operations, dated 1 APR 10,  is out.  Irregulars who want to impress Regulars by larding their conversation with the latest buzz words should memorize these: 

 
 
 

Cyberwar 

War using cyberspace operations to achieve sensational yet bloodless results for friendly forces while seeking to inflict massive inconvenience on the adversary in a manner that offers the most photogenic and telegenic depiction for domestic and international public audiences. 

 
 

Cyberwarrior 
 
Uniformed and non-uniformed personnel of the Department of Defense, civilian resources, and other government agencies (OGA) conducting fullspectrum cyberwarfare operations. 

 

Make sure you get to p. 11. 

H/T:  InfowarMonitor

Comments Off

Filed under CNA, CND, IA, PSYOP

Private Military Company Recruiting Mercenary Cyber Warriors

Contractor Seeks ‘Cyber Warriors’ to Help Defend U.S.

National cybersecurity is a hugely growing field, with the crude but effective shutdown of U.S. and South Korean government Web sites over July 4 weekend coming as the latest example of our weaknesses.

A report released just this past Wednesday found that the federal government is woefully behind in cybersecurity, with the lack of trained personnel the biggest problem.

Cyber Warriors Wanted

  • Information Operations/Information Assurance
  • Software engineers/developers – JAVA/J2EE/, JAVA/XML, C++
  • FPGA expertise
  • Software security engineers
  • Test engineers
  • Software testers
  • Systems administrators – Linux, Solaris, Unix, Red Hat, VMware (Certifications are preferred)
  • Systems engineers – CNO, CNA, CNE, NOC, Requirements management
  • NOC is Network Operations Center. Had to look that up.

    How many military Information Operations can be conducted without the involvement of non-military information operators?   And of those non-military information operators, how many are Government Employees?

    H/T: Bill Austin

    Comments Off

    Filed under CNA, CND, IA, Info Warriors, IW

    Buccaneer.com

    INFOSEC Privateering as a Solution to Cyberspace Threats by Michael Tanji

    There are only a few courses of action available when it comes to addressing cyber threats. The first is the maintenance of the status quo: victim hood. Note that organizations that deal with cyber threats all have “response” in their name and you will realize that INFOSEC today is almost entirely reactive.

    The second course of action has the government building the capability to bring law and order to cyberspace. This is unlikely if for no other reason than the stateless nature of the Internet precludes exercising dominion by any single nation. Consider that the Department of Justice’s cyber crime budget for 2005 was projected to be roughly $300 million dollars and a similar program within Homeland Security’s was much less.6 Contrast cyber defense spending to the tens of billions of dollars malicious actors are estimated to be making and you will understand the priority cyber threat has on Capitol Hill.7

     

    The final option – outsourcing – has private-sector enterprises performing the tasks necessary to defend national interests online. Unlike the government the private sector has ample resources and a strong motivation to succeed: reducing threats means less risk which translates into higher profits.

     


    I’m loving this.  Read the whole thing.  Non-state actors are eating our lunch in the infowar and the regularly constituted authorities of my beloved Westphalian nation-state have neither the mandate, the resources, nor the political will to capture or destroy enemies in cyberspace.  Those of us who still think America and Americans and American minds and American intellectual, virtual, and physical property are still worth protecting are rapidly realizing the limits of .gov.  

    I’m old.  Meatspace analogies make sense to me.  The Bad Guys in cyberspace are numerous but most of them don’t work well together.  Cyberspace is Major Dundee meets The Road Warrior.  Rustlers, horse thieves, and raiders under every rock, plus invading armies.  Irregulars, a cyber Magnificent Seven, can do more than cavalry that never comes.  

    You don’t have to sit around and bitch that Bush hasn’t asked you to buy War Bonds or conserve food.   Mobilize yourself.  You don’t even have to get off your ass. 

    5 Comments

    Filed under CNA, CND, Electronic Counter Media, G-2, IA, InfoPaladins, IW

    Battle Command Knowledge System

    Q I wonder, consistent with OPSEC, do you guys plan to make any of this stuff available to the public?

    COL. GALVIN: Partly the communities are behind AKO, so the members are comprised of those in uniform, civilians in DOD, and also contractors. And then you get retirees and family members have various levels of access, as well. So, no, there’s no immediate opening to the general public because we put “for official use only”- type information in these communities and try to keep it at that level of discussion.

    The Triumph of IA. 

    The military arc of the blogosphere will slowly shrink as the .mil walls go up and the NIPR loses connectivity to the .com world and the troops are herded into DKO and the credibility of Muddy Boots IO is sacrificed. 

     Soldiers’ Online Chats Produce Valuable Army Knowledge, Colonel Says

                  

    Comments Off

    Filed under CND, G-2, IA

    Friends of Yours?

    Paul D. Grant, information assurance executive reassigned to deputy to the information sharing executive, Office of the Assistant Secretary of Defense (Networks and Information Integration), Washington, D.C.

    Janice C. Haith, principal deputy/chief operating officer reassigned to deputy for information sharing for intelligence and homeland defense, Office of the Assistant Secretary of Defense (Networks and Information Integration), Washington, D.C.

    Michael E. Krieger, director, information management reassigned to principal director to the deputy assistant secretary of defense (information, management, integration and technology), Office of the Assistant Secretary of Defense (Networks and Information Integration), Washington, D.C.

    Tell ‘em not to block my blog or I’ll sic Frontier 6 on ‘em.

    Comments Off

    Filed under IA

    There goes the NIPR

    DOD considers prohibiting personal use of networks

    I’m going to miss you guys. My readership is so small, your  absence will be noticed.

    Muddy Boots IO will have to be done from the hooch, on your own time and your own dime. 

    IA fraticiding the hell out of PA and PO.

    H/T:  Haft of the Spear

    UPDATE:  Maybe it has already started.  In From the Cold is blocked by the Air Force.  Scroll down to CENTCOM Chick’s comment:

    I work for the Air Force and do quite a bit of open source research – including on blogs. I can understand blocking eBay, or sites like You Tube for bandwidth issues. But many blogs are useful for work-related purposes, at least for my job.Also, their choices for blocked sites are at times ridiculous, and their reasoning is even worse. It irritates me to no end every time I see something blocked for ridiculous reasons like “general news” or “educational.” I think the worst was the search engine blocked for “personal” reasons. If it made more sense, I’d understand it more.

    Sounds like IA fratricide to me. 

    4 Comments

    Filed under IA

    Today’s conflicts are not only won on the battlefield, but through the use of websites and blogs, over the airwaves and on the front pages of our newspapers.

    I didn’t hate Donald Rumsfeld. 

    This is a time in which warfare is being waged in the realms of space and cyberspace. In China, the recent test of an anti-satellite missile has shown that our network of satellites could be vulnerable to an attack that could cripple both U.S. military and civilian communications. Small bands of organized hackers earlier this year demonstrated by their attacks on Estonia, that the governments and financial institutions of advanced nations can be paralyzed through cyber attacks.

    These enemies have learned a crucial lesson about warfare in the 21st century — a lesson others seem slow in understanding. Today’s conflicts are not only won on the battlefield, but through the use of websites and blogs, over the airwaves and on the front pages of our newspapers. Through skillful propaganda operations, the enemy successfully leverages their asymmetric attacks to encourage potential recruits to join their violent cause and to try to convince those of us in free nations to give in to hopelessness, self-doubt and despair.

    Their decentralized networks have been able to effectively employ the tools of the Information Age, while the U.S. government remains ponderous, muscle-bound and unable to respond in real time to the deceits of these enemies. To succeed in this first struggle of the 21st century, we will need fresh thinking and capabilities well beyond the Defense Department. If free people are to meet the challenges posed by what will be a long struggle against violent extremists, we will need all elements of national power, private as well as public — diplomatic, economic, as well as intelligence and military to work in concert. We will need to rethink and rearrange our domestic and global institutions designed for the Industrial Age to better suit the Information Age.

    Emphasis mine.  He makes sense to me.

    7 Comments

    Filed under CND, IA, Idea War, Info Warriors

    Effects Synchronization

      WASHINGTON, Oct. 3, 2007 – A multi-pronged approach to conflict resolution that includes military force coupled with a powerful social push is vital to winning over hearts and minds and countering insurgents’ lure, a U.S. Central Command official said today.During a news conference at the Foreign Press Club here, Air Force Brig. Gen. Robert H. Holmes, deputy director of operations for U.S. Central Command, told reporters that his command is exploring a counterinsurgency concept called “effects synchronization.”

    “This is a new approach to looking at all of the national and international instruments of power that actually go beyond the military,” he said. “(They) look at the diplomatic activities, political activities, economic activities, social and cultural activities that really need to come together as we look at the particular conflict or activities we’re in.”

    Holmes serves as chairman on U.S. Central Command’s effects synchronization committee. The group comprises headquarters staff members from areas that include operations, resourcing, intelligence, planning and public affairs. Other representatives hail from the departments of State, Justice and Treasury, plus the Federal Bureau of Investigation and the intelligence community.

    “We sit and address the common goals and objectives for our region,” he said. “And in addition to just the kinetic, or those hardcore combat operations, … we say, ‘What do we need to do with non-kinetic operations? What might we need to do with humanitarian ops?’”

    The general said military efforts that are married to those of interagency partners create a hybrid force that is more effective than if components were to operate independently. “It’s about what we as the military to do in synchronization and integrated with other elements of power,” Holmes said.

    The military’s limitations and the need for additional problem-solving means are especially profound in asymmetric conflicts like Afghanistan and elsewhere, Holmes said.

    “With regard to asymmetric warfare, what we’re in is, in a sense, a battle for hearts and minds, not for military objectives,” he said. “It’s about the hearts and minds of the people, not only of the Middle East, but of the world.”

    Those engaged in asymmetric warfare around the globe eschew “values that are very important to peace-loving peoples of the world,” the general said.

    “If these violent actors are able to pursue their vision, to pursue their end-states, then (victory) ultimately rests on being able to go after the hearts and minds of many of the world’s population,” he said.

    By helping to build Afghanistan’s fledgling government, infrastructure and economy, U.S. efforts present a more promising future to Afghans than do Taliban or other extremist elements.

    “What we do in Afghanistan gives a very strong signal; it communicates our intent,” Holmes said. “We don’t just come in and create a situation and then leave, but we stay. We stay there for the good of that nation, and we stay there for good of the international community.”

    The American domestic target audience is part of the world population.  If there is a government agency going after our hearts and minds it’s doing a piss poor job.  A significant and powerful branch of our government would not allow it to do a good job anyway.  The solution to that problem lies outside of government.

    Is IA Information Assurance or InterAgency? 

    H/T:  SandRat

    6 Comments

    Filed under IA, IW