Cyber Fear Echo Chamber

Written by SoVaSec on December 2nd, 2009



 

Theologians, Politicians, and Financiers agree! When in doubt use a little fear and not FUD.

Interesting how things pick up right where we left off; with discussion of MAD and CyOffensive Stratagies. A policy of ‘deterrence’ only works when you are not bluffing, and can neutralize your opponent. Hence
Can America take over the internet?”, because thats the only way such a policy would be effective. CyWar is more of a guerrilla operation, there is no specific target to nuke.

 

A threat pops up here, we whack it down, and another one comes up here – this is the environment that many of your enterprise cybersecurity officers are facing,”Bruce McConnell, counselor to DHS’ top cybersecurity official


Threats like al Qaeda?

 

I don’t think they’re the most capable in the world, but they have some capability,”Former Homeland Security Secretary Michael Chertoff


I am worried about some terrorist group [with] the capability to destroy the U.S. money supply,” The impact of such an attack would be “an order of magnitude greater” than the Sept. 11 terrorist attacksthe former Director of National Intelligence Mike McConnell


Spottswoode: From what Intelligence has gathered, it would be 9/11 times 100.
Gary:9/11 times 100? Jesus, that’s–”
Spottswoode: “Yes, 91,100.

Kim Jong Il:It will be 9/11 times 2,356.”
Chris:My god, that’s… I don’t even know what that is.”
Kim Jong Il: Nobody does.” – Team America World Police

 


FBI Suspects Terrorists Are Exploring Cyber Attacks

While there is no evidence that terrorist groups have developed sophisticated cyber-attack capabilities, a lack of security protections in U.S. computer software increases the likelihood that terrorists could execute attacks in the future, the official warned.

If terrorists were to amass such capabilities, they would be wielded with “destructive and deadly intent,”

Cyber agencies mum on how they try to identify cyberattackers

Identifying the sources of cyberattacks might not be technically possible in all cases, federal agencies can draw conclusions based on motive and the consequences of the attack

There is “no evidence” terrorists are ready for CyWar, but Chertoff seems to think they have some capability, and McConnell is worried they will destroy the economy before the bankers finish it off.  I almost feel like some of these people are doing the work of the terrorists by striking fear of  “destructive and deadly” CyAttacks into the hearts of hard working men and women.

McAfee stirred things up the month with some secondhand fearmongering.

Nations all over the world are gearing up for a cyber war and that everyone must adapt to these threats”David Dewalt, McAfee president and CEO

Now the media, which knows exactly squat about CySec, can only put into the echo chamber what they are fed into the. Which is exactly what happens with the McAfee statements.

McAfee Cautions About The Possibility Of Cyber Wars

Cyber Warfare Warning Sounded

Cyber Warfare Warning Sounded
In its annual report on cybercrime, McAfee says that the age of cyber warfare has arrived.

FBI Suspects Terrorists Are Exploring Cyber Attacks

Separately, the computer anti-virus company McAfee Inc. issued a report by Paul Kurtz, who led the cyber-security review for the Obama transition team. He concluded that some cyber-attacks in 2007, including Israeli cyber-attacks on Syria and U.S. cyber-weapons employed in Iraq, constitute cyber-warfare.

Cyber ‘cold’ war may have started

Cyber ‘cold’ war may have started


Hold the phone. A cyber cold war? I’ve been talking about this for several months now. To clarify it is not a ‘cyber cold war’, it is The Cold War. The established and powerful military industrial complex, which Dwight Eisenhower warned us against, is moving its resources into the Intelligence Industrial Complex. The same old players, now working the intelligence angle; The Cold War.

 

CyberWar is a Racket

Under the threat of war, the cost of defense is never too high. A nation is under significant obligation to protect its investments where ever they may be. What we see now, is the transition from physical to electronic defense. The United States is returning to Cold War status. In preparation for this the advancement of technology and the power of the intelligence community is of the foremost importance. In order to maintain a position of dominance, the government must sustain its partnership with wartime industry. Through a metamorphosis of the “military industrial complex”, into a new “intelligence industrial complex”, this accomplishment can be witnessed. The ever present fear of terrorism will still be used as justification for sustained engagement. The new terrorist threat comes from what the media refers to as hackers.

 

Its not even McAfee’s report. It’s Richard A. Clarke’s. See how this works? The Public-Private sycophants spoon feed the media into a frenzy to get them stirred up. The media echo chamber picks up the supplied message, and unsuspecting members of the public become influenced by it and believe the lie, which causes them to be more than willing to vote for any sort of legislation that could remedy the issue. Sounds like we’ve gone back to the Hegelian scheme once again.

Dick Destiny
The report itself is attributed to Paul Kurtz, another of Richard Clarke’s
men. Buttressing quote is furnished by Greg Rattray, another in a small
circle of individuals all known for pushing the coming age of cyberwar.

Paul Kurtz, if you remember, was one of my first picks for CyCzar.

CzarWars Episode 1
Paul Kurtz an Obama advisor who served in the national security council
under bush and Clinton, he has in the white house for long enough to
know its politics. Kurtz is also one of the people quoted in the
findings on which the Cybersecurity Act was drafted saying “the United
States is unprepared to respond to a `cyber-Katrina’ and that `a
massive cyber disruption could have a cascading, long-term impact
without adequate co-ordination between government and the private
sector”. Here is a person that fits my criteria, he is technical,
political, and a possesses an overwhelming desire to over-hype the
cybersecurity threat with the understanding that it will create revenue
to his and others private interests. It’s all about the money. If you
check out the consulting team Paul B. Kurtz is on, it’s also about the
cyber-FUD.


He is also mentioned in the CySecurity Act of 2009:

 

(6) Paul Kurtz,
a Partner and chief operating officer of Good Harbor Consulting as well
as a senior advisor to the Obama Transition Team for cybersecurity,
recently stated that the United States is unprepared to respond to a
`cyber-Katrina’ and that `a massive cyber disruption could have a
cascading, long-term impact without adequate co-ordination between
government and the private sector.’.


The people who stand to make the most profit from a little cyFear create a report. They give it to a company whose name is well known to the general public. The company feeds the report into the media echo chamber which bounces it back and forth making it seem legitimate. The public believes the lie, and is now willing to continue funding the people who stand to make the most profit from a little cyFear.

Hegelian Dialectic – Step 1: need $$$ Step 2: FUD Step 3: $$$

 

 

Despite the apparent lack of leadership or direction, the money is still getting spent. It seems that many of the recommendations set out in the proposed bill 773 are being implemented. Regional CySecurity Centres, and competitions to recruit skilled workers are two I can think of at the moment. In addition to competition based recruitment, thousands of skilled CyOps (Cyber Operators) have been offered employment for the purpose of national CySecurity. It is not just regional centres, which as the bill suggested would be facilitated by existing local institutions, but there are many new structures being constructed.


It’s almost as if they are taking CySecurity and the CyWar seriously, while appearing to seem incompetent. I know what you’re thinking, it’s the government, “
Never ascribe to malice that which is adequately explained by incompetence”, but I’ve never agreed with that statement. I know that by feigning incompetence you can avoid responsibility, it’s even in the Art of War; “Appear weak when you are strong, and strong when you are weak.

By preventing unwanted meddling with development of CyDefenses, the NSA and DHS and their corporate partnerships are actually throwing a fair amount of money at the problem. The issue with the CyCzar, and apparent lack of focus, could be a clever ruse.

So what is the real plan?
Monitoring, storeing and most importantly indexing every communication possible. Why else would the NSA be in charge? Now they have their own Air Force unit, where the CyWar will begin to merge with NetCent Ops. Imagine! A mobile militarized and offensive arm of the NSA; for those hard to reach communications during the next Cold War years.

CyWar is job security for an industry who has run out of sophisticated enemies to fight on the ground.


Bonus:

Buzzword: “IT Eco-System”
Freudian Typo:

Senate Panel: 80 Percent of Cyber Attacks Preventable

We need to, as a nation and as an IT echo system, continue to make it more simple for people to institute protections to determine if they’ve been compromised and to make sure they stay secure,” said Reitinger, a former Microsoft executive.

 

Leave a Comment





Twitter links powered by Tweet This v1.8, a WordPress plugin for Twitter.

Get Adobe Flash player