Showing posts with label Business. Show all posts
Showing posts with label Business. Show all posts

Oct 26, 2011

Bioterrorism Preparedness - Shortcomings & Clusterfuckery

Next Sunday's NYT Magazine will feature a piece on possible shortcomings (and actual clusterfuckery) in US preparedness against bioterrorism.

The Article explains why we have not yet developed a needed new Anthrax vaccine:

Five years later, the cancellation of that contract is still a matter of fierce debate in biodefense circles. Many experts say that the decision had less to do with science than politics. Scott Lilly, a senior fellow at the Center for American Progress, recently studied the role that lobbying may have played in VaxGen’s demise. Between 2004 and 2006, Lilly writes in a new study, the company that produced the old anthrax vaccine, which is now called Emergent BioSolutions, employed an army of lobbyists to undermine the VaxGen contract. “Each time VaxGen’s test results were less than had been hoped for,” the report says, “Emergent pounded VaxGen with a highly orchestrated campaign to overstate the problems and discourage government support of the effort.” 

[...]

General Russell, who led the early countermeasure program, told me: “It was Emergent lobbying that killed VaxGen. Period. Emergent bought the Congress. Congress killed VaxGen.” Several current officials share Russell’s view. When I asked one senior biodefense official about the lack of a new anthrax vaccine, the official nearly exploded: “Why don’t we have a second-generation anthrax vaccine? The reason is Emergent lobbying!” Even the director of Barda, Robin Robinson, acknowledged that politics played a role in the decision. “Should we have kept it? I think there’s a long debate,” he said. “They had brought in some really top-flight people in there, and Lance Gordon was really good at judging talent. Unfortunately, there was a lot of political pressure.”

Soon after the VaxGen contract failed, the company folded into another, and Emergent bought the rights to develop the new anthrax vaccine it had spent three years lobbying against. Abdun-Nabi told me his company was still trying to develop that vaccine, but critics question whether Emergent, which signed another contract this month to deliver $1.25 billion more of the old vaccine to the stockpile, is pursuing the replacement vaccine as enthusiastically as possible. “They bought the technology and buried it,” Russell says. “We are five or six years behind where we should be. We should be working on a third-generation vaccine.”

There are disagreements over how far afield we should be looking past the two main bioterror threats: smallpox and anthrax:

In fact, other than the vaccines for anthrax and smallpox, there are no vaccines in the stockpile for any other agents on the material-threat list, nor are any of those vaccines in the advanced development program, nor will any of them enter the program any time soon.

[...]

Many agents on the list, Fauci said, were a product of the cold war, when the U.S. military kept a list of “Category A” pathogens being developed by the Soviet bioweapons program. “So when the decision was made to make an investment into developing countermeasures,” he told me, “that was essentially their matrix from the beginning: these are what we know the Soviets had. We know they have stockpiles. This is what we’re going to protect against.” He mentioned the bacterium glanders, which was reportedly used by Germany in World War I and by Japan in World War II but seemed to Fauci a comparatively minor threat today. “I think the unknown threat of a mutant microbe is infinitely greater than someone coming and dropping a glanders on us!” he said. “I mean, seriously! Get real about that!”

When I mentioned Fauci’s comments to O’Toole, who oversees the biological-threat list at the Department of Homeland Security, she said he was “completely wrong” to suggest that the list is rooted in cold-war thinking. “We use current intelligence as an integral part of every material-threat determination,” O’Toole said. “I’m surprised anyone in N.I.H. would think otherwise, particularly since the details of the material-threat determination process are briefed at the White House. It does raise a troubling question about how seriously N.I.H. is engaged in the biodefense mission.”

Whether or not Fauci is right about the origins of the material-threat list, his observation that a natural outbreak is more likely than a biological attack is difficult to dispute. Each year, seasonal flu leads to about 200,000 hospitalizations and several thousand deaths in the United States. Although a biological attack could be much larger, there is no certainty that such an attack will ever happen. How to balance the unlikely but catastrophic potential of bioterror with the steady advance of natural disease is one of the most puzzling challenges for biodefense policy going forward.

To some extent, this is also a question of framework. Fundamentally, the countermeasure program is a public-health project, yet with its reliance on classified intelligence and secret-threat assessments, it is more closely aligned in many respects with the methodology of other national-security projects. Where biodefense fits into government bureaucracy will have a profound impact on its financing. In public health, the $12 billion necessary to develop new vaccines for a dozen material-threat agents can seem a towering, even absurd, figure. Within the realm of national security, the same amount represents less than a quarter of the cost of the military’s experiment with the V-22 Osprey heli-plane, or about what the U.S. will spend in Afghanistan between now and Christmas.

“We spent trillions of dollars in the cold war preparing for a potential nuclear exchange that never occurred,” says Kenneth Bernard, who was the senior biodefense official in the Clinton White House from 1998 to 2001 and then again in the Bush White House from 2002 to 2005. “We’re not spending that kind of money to prevent a bio attack because the people who work on biology are not trained to think like that. They are much more interested in dealing with the three particular strains of influenza that are in the dish this year than they are in thinking about a plague attack in 2018.”

Oct 26, 2008

Black & White - All-American Manchurians


Pick the true Manchurian. One can't go further awry than granny did on her 401(k).

O(b/s)ama

As if being Kenyan weren't bad enough, John Ray at Stop the ACLU reports that Obama is also Indonesian according to another birth certificate and that he traveled to Pakistan in 1981 on an Indonesian passport where he no doubt met with members of Al Qaeda.

...or
McShame (and this supplementary)

...but John McCain—there has always been talk, and there’s evidence to suggest that there is truth in this, but it’s in his head, and only he and his psychiatrist, if he has one, know, that he—his reasons are that if the North—if the Vietnamese were to release all the information they have on him, the full text of his confessions, how he lived the details, because there have been stories, again, just rumors, that he was provided with a woman companion, and all kinds of things like that, which are—can’t be considered as fact, because they’ve never been confirmed, and very, very difficult, if not impossible, to confirm.

PS (We wish we knew as much about the AQ mindset that we do of the commy ditto - ergo this lopsided post scriptum. (We're really really old school gals)):

We have had doubts about the story of McCain's "heroism" in "refusing early release" from the North Vietnamese.

AFAWK, when Commies run detention facilities, THEY make the rules. If they thought that giving McCon's early release would have gained them propaganda points, they would have sent him back to daddy CINCPAC. He wouldn't have had any say in the decision, wethinks.

Oct 21, 2008

Straight to the Heart - Tête-à-Tête Cyberattacks


Today many hit the internet's WWW for its plethora of social networks, browsing from a distance through server-side catalogs aggregating and organizing the personal profiles of millions.

Tomorrow we will be able to surf and process the profiles of people as we encounter them irl and on the fly: adjacent soccer dads and fellow pedestrians work bound - the bounty will be plenty and immediate. This brown eyed Denny's cashier - I wonder if my dating profile and credit score matches his secret longings for a suave one night stand? (Heck, I even think some of the SMC crew have patents pending for such technology).

Already scenarios are in play that consider the hazards of tête-à-tête cyberhits. A nifty vector of opportunity for assassins and deformed love seekers?

Excerpts below from the report, Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses [14-page pdf]:

Wirelessly reprogrammable implantable medical devices(IMDs) such as pacemakers, implantable cardioverter defibrillators (ICDs), neurostimulators, and implantable drug pumps use embedded computers and radios to monitor chronic disorders and treat patients with automatic therapies.

For instance, an ICD that senses a rapid heartbeat can administer an electrical shock to restore a normal heart rhythm, then later report this event to a health care practitioner who uses a commercial device programmer1 with wireless capabilities to extract data from the ICD or modify its settings without surgery.

Between 1990 and 2002, over 2.6 million pacemakers and ICDs were implanted in patients in the United States; clinical trials have shown that these devices significantly improve survival rates in certain populations. Other research has discussed potential security and privacy risks of IMDs, but we are unaware of any rigorous public investigation into the observable characteristics of a real commercial device. Without such a study, it is impossible for the research community to assess or address the security and privacy properties of past, current, and future devices. We address that gap in this paper and, based on our findings, propose and implement several prototype attack-mitigation techniques.

We assess the security and privacy properties of a common ICD and present attacks on privacy, integrity, and availability. We show that the ICD discloses sensitive information in the clear (unencrypted); we demonstrate a reprogramming attack that changes the operation of (and the information contained in) the ICD; and we give evidence that a battery-powered ICD can be made to communicate indefinitely with an unauthenticated device, thereby posing a potential denial-of-service risk. All of our attacks can be mounted by an unauthorized party equipped with a specially configured radio communicator within range of the ICD.

Attack scenarios. Since health care is a very sensitive and personal subject for many people, we explicitly choose to deviate from standard practice in the academic security research community and do not describe specific scenarios in which an attacker might compromise the privacy or health of a victim. We also do not discuss the potential impact on patients if an adversary were to carry out an attack in vivo. Rather, when discussing attacks we focus solely on the technical properties of those attacks. In addition, in each case where we identify a vulnerability, we propose a solution or technical direction to mitigate it.

Further resources available through the Medical Device Security Center.

Oct 20, 2008

Shift To Shape


Two fine posts (FabMax & Kent's) about smothered writings of deserved heed upon shabby and beckoning ol' walls got us mulling over the divides & gangways between intelligence analysts, prophets, and your regular old soothsaying hacks.

Alerting graffiti (that simultaneously dire and decorative kind) conjectured by all manner a premonitory scribbler abounds: Alien invasion fleets lurking to pounce upon our welfare states from behind the innocent moon. Decadently chateau'd and beak-nosed Rothchildians colluding with coffin-masturbating and creaky old Anglo-satanists for nation-killing and Jesus-ushering global hegemony. Or exploitative street urchins the likes of a Soros or a Lahde publicly accenting Bubble. What the heck is actionable enough to cling to?

Save our souls, Brother - and do tell us before we're all, excuse our French, glass'd, "Which of the millennial incomers is the MIRV and what be the swarm of Siberian-mined aluminum chaff?"

The good analyst but strives to describe a sliver of a moment - now or then.

Prophets haphazardly foresee an amalgamated potpourri of such interconnected moments and invariably get viciously bled and quartered for such un-summoned community service, well rudely ante their utterances are sufficiently Youtube'd for fair chance at corralling abidance.

Soothsayers. Well hey, they're those commonsensical sounding folks with scary pluperfect hair resolutely appearing on CGI'd cable news - and who are almost always wrong in, alas, non-existent retrospect.

Prediction is but for the shaper. Such sculpting animal takes, or leaves, the goodies of the varyingly vying Trinitians under its driven behest and proceeds unflinchingly onwards as myopic molder. Futures made are oft born of steamrolling sows, obliterating difference in fidelity between the considered input of indentured drudge and freelancing druid.

Caught in a cacophony of determined advice, admonition, and analysis, perhaps it's fair to turn deaf ears to courting lips and rear pasty asses t'wards our strong sun and meekly ask, "Who's the shaper now?"

Now a wee diddy`bout oil pricing.


Oil prices seem to be in free-fall. After averaging a staggering $137 a barrel over the first week of July, they were down to $109 a barrel over the final week of August.

Where are prices going next? Who knows? Bearish talk about bubbles bursting and bullish talk about peak oil disguise the fact that the future direction of oil prices is unknown and unknowable. Neither investors nor politicians ought to be betting the economic house on any particular vision of "our energy future."

The fundamental reason for the difficulty associated with forecasting future oil prices is the fact that both demand and supply are relatively inelastic over the short term. That means rather small changes in either can have very large price effects. Hence, those who wish to forecast oil prices are forced to forecast weather patterns, labor relations, gross domestic product (GDP) reports, demographic trends, civil unrest and technological change in all sorts of disparate economic sectors.

Long-run forecasts are no easier to execute. Professor Vaclav Smil of the University of Manitoba has cataloged the vast record of energy forecasts offered by academics, corporations, consultants, trade associations, government agencies, "blue ribbon" commissions, policy activists and "futurists" of all stripes over the past 100 years and finds a "a manifest record of failure." There is simply no reason to believe that mere mortals can foretell oil prices or petroleum market shares in the future, absent some sort of time machine. (Read more)

Aug 22, 2008

Cyber War: Eminent Domaining


Far be it ignoble for a meatball of One to cut 'n paste sweet ramblings of smarter mates and Effwits:

The Cyber Command Power Play?

Last week I reported the Air Force has put formation of its Cyber Command on hold, pending top level review.

At the time, some sources speculated that Adm. Mike Mullen, chairman of the Joint Chiefs of Staff, put the kibosh on the Air Force's efforts because he wanted to see a larger role for the Navy in cyberspace.

But a well-placed Air Force insider told me that the Office of the Director of National Intelligence was behind the abrupt halt. The intelligence community, this source told me, "wants all the cyber money, all the cyber toys and the cyber mission."

There would be one serious problem with the intelligence folks taking over the cyber mission, this source told me. ODNI does not have a warfighting mission, "they only want to milk the cow," the source said. "They don't ever want to kill the cow."

I don't know for sure whether the Navy, JCS, ODNI or little green men are behind the Air Force's decision to put Cyber Command on hold. But I do know the Air Force is really paranoid right now -- and sometimes there is a good reason for paranoia.
---
-Yep, that was pretty much inevitable.
---
The DoD (USAF specifically) is WAY overcomplicating their approach to a cyber warfare strategy IMO. Russia and China's model much better.
---
-Part of it is the AF fumbling nukes and a call to get their s*** together there first before they start f'ing around online.

Part of it is standard internal AF maneuvering. Even as the TV ads were running the move was afoot to make it a numbered AF, not a stand-alone entity, and put it under one of the standing commands.

There isn't much to the intel aspect here; the money is already largely allocated to different entities and there is plenty to go around. If the ODNI is involved its to control and coord the IC money; that's different money than what would go to the services.
---
Now, speaking of the USAF, there is a new paper from the Air War College (now called "Air University") COMMUNICATING FOR EFFECT -- OPERATIONALIZING AND ANALYZING WEAPONS OF MASS INFLUENCE. [141-page pdf]

Feb 11, 2008

IO Planetary Calm

In a subtitled video that popped up in a few places on the Internet earlier this week -- Glosslip.com found it, and it was later picked up by Gawker.com and other sites -- Scientology leader David Miscavige is shown speaking to an audience about both the religion's multipronged campaign for the "global obliteration of psychiatry" and its international effort to disseminate a booklet, authored by Church founder L. Ron Hubbard, that the organization uses for outreach. The video appears to have been made in 2006.

In describing the workings of what he called "the 2006 campaign for the global elimination of psychiatry," Miscavige boasts of a coordinated international public relations attack meant to damage and discredit the psychiatric profession, its revenues and the drugs it employs.

"That campaign was expressly, maybe even diabolically, engineered to ignite both government action and media blizzard," says Miscavige from a lectern. "Our Mental Health Adjustment Kit essentially works like a 'smart' bomb in that it sniffs out 'psych' fuel lines and blows the funding mechanism."

"To put it bluntly," he continues, a moment before receiving rousing cheers from a large audience, "we booby-trap the whole psychiatric ecosystem."

Miscavige also goes into detail about a program he refers to as Operation Planetary Calm, whose goal is the worldwide distribution of Hubbard's "The Way to Happiness," a text the Church of Scientology refers to as a nonreligious "common-sense guide to happier living," according to a website registered under the address of the church. At one point, a computer animation depicts a giant grenade, labeled "Psych Buster," exploding near a building labeled "government" and another building, perhaps a bank, with a large dollar sign on its side. Miscavige repeatedly invokes end-times biblical tropes such as "plagues," "parting seas" and "apocalyspe," and cites the goal of breaking "the dark spell cast across Earth by psychiatry."

As of this writing, at least three copies of the video had been posted on YouTube, the most-watched of which had fewer than 10,000 views.

Read the entire transcript here.

Feb 8, 2008

DNI's 2008 Threat Assessment (version: Baby Talk)


A week of windy and format-challenged posts it would seem.

The Annual Threat Assessment of the Director of National Intelligence for the Senate Select Committee on Intelligence (unclassified version) [47-pages pdf} was released earlier this week. Baby talk aside, passages of sufficient noteworthiness were nonetheless not completely in the lacking. Chosen for reasons undulating between the cynical and the significant, here are excerpts we found almost worth the excerpting effort:

Meddled East

  • The brutal attacks against Muslim civilians unleashed by AQI and AQIM and the conflicting demands of the various extremist agendas are tarnishing al-Qa’ida’s self-styled image as the extremist vanguard. Over the past year, a number of religious leaders and fellow extremists who once had significant influence with al-Qa’ida have publicly criticized it and its affiliates for the use of violent tactics. [A claim as a picture perfect expression of a Strategic PSYOP in play]

  • Many Sunnis who participate in local security initiatives retain a hostile attitude toward Shia parties that dominate the government, and some Shia leaders still view many anti-AQI Sunni groups as thinly disguised insurgents who are plotting to reverse the political process that brought the Shia to power. Security in southern Iraq probably will remain fragile in the coming months as rival Shia groups continue to compete violently for political power and economic resources. In Al Basrah, security remains tenuous. Security also is a problem in northern Iraq. Violence has increased in Mosul, Iraq’s third largest city, as both Sunni resistance elements and AQI increasingly focus their activities in the area. The Iraqi government will have to address Sunni Arab concerns over representation on the provincial councils, defeat AQI and the insurgents, and address Kurdish expansionism to improve security in northern Iraq .[Filed under Significant]

  • Approximately 90 percent of all suicide attacks in Iraq are conducted by foreign terrorists [Oh? and Really?]

  • Negotiations on hydrocarbon laws continue to be stalled by disagreements between the central government and the Kurds over control of resources and revenue sharing. [We keep meaning to write a Mosul for Dummies Like Us]

  • Although Riyadh also has made strides against key supporters and facilitators of extremist attacks in Iraq, Saudi Arabia remains a source of recruits and finances for Iraq and Levant-based militants and Saudi extremists constitute the largest share of foreign fighters and suicide bombers in Iraq.

Pakistan

  • We judge the ongoing political uncertainty in Pakistan has not seriously threatened the military’s control of the nuclear arsenal, but vulnerabilities exist. The Pakistan Army oversees nuclear programs, including security responsibilities, and we judge that the Army’s management of nuclear policy issues—to include physical security—has not been degraded by Pakistan’s political crisis. [Filed under Significant; 5-page pdf]

Russia

  • ...we will be alert for signs of systemic changes such as an indication that [Russian] presidential powers are being weakened in favor of a stronger prime minister.

  • Russia is positioning to control an energy supply and transportation network spanning from Europe to East Asia. Aggressive Russian efforts to control, restrict or block the transit of hydrocarbons from the Caspian to the West—and to ensure that East-West energy corridors remain subject to Russian control

  • [Russian] demographic, health problems, and conscription deferments erode available manpower [in the military].

Balkans

  • We judge that the Balkans will remain unsettled in 2008 as Kosovo’s drive for independence from Serbia comes to a head and inter-ethnic relations in Bosnia worsen. [Filed under - Definitely not sexy]

China

  • China’s global engagement is not driven by Communist ideology or military expansionism, but instead by a need for access to markets, resources, technology and expertise...

  • Beijing is seeking a constructive relationship with the US and the rest of the world, which will allow China to fully capitalize on a favorable strategic environment. Indeed, Chinese officials consistently emphasize the need to seek cooperative relations with Washington, because conflict with the United States would risk derailing China’s economic development. They also seek to alleviate international concerns about China’s strategic intentions.

Ahfriiica

  • Persistent insecurity in Nigeria’s oil producing region, the Niger Delta, poses a direct threat to US strategic interests in sub-Saharan Africa. Ongoing instability and conflict in other parts of Africa pose less direct though still significant threats to US interests because of their high humanitarian and peacekeeping costs...

  • Tensions between longtime enemies Ethiopia and Eritrea have increased over the past year, with both sides seemingly preparing for a new war. The last war killed about 80,000 soldiers on both sides. If conflict reignites, Ethiopian President Meles’s own hold on power could be put in jeopardy if the war went badly for him.

Resources

  • With about 70 percent of global oil reserves inaccessible or of limited accessibility to outside oil companies, competition between international oil companies to secure stakes in the few countries open to foreign investment is likely to intensify. [Filed under Darfur et al]

  • Global food prices also have been rising steadily over the past two years driven by higher energy prices...The double impact of high energy and food prices is increasing the risk of social and political instability in vulnerable countries.

Germs

  • The most direct threat to the US is the spread of infectious pathogens to our shores, or within areas where US personnel are deployed.

Dec 11, 2007

Journo-Lobbyist Glassman to Replace Karen Hughes


Mr. "Dow 36,000" -- James K. Glassman -- is going to be nominated to become the new Public Diplomacy czar, according to a news report.

President Bush intends to name former Washington Post columnist James K. Glassman to lead the State Department's struggling efforts to improve the United States' image abroad, replacing longtime Bush confidante Karen Hughes.

Glassman, now chairman of the Broadcasting Board of Governors, which oversees the Voice of America, will be named the new undersecretary of state for public diplomacy and public affairs, administration officials said. The officials spoke on the condition of anonymity because the announcement has not yet been made.

(...)

Hughes boosted the number of Arabic speakers representing the United States in Arabic media, set up three public relations centers overseas to monitor and respond to the news, and nearly doubled the public diplomacy budget, to almost $900 million annually. Despite her efforts, polls have shown no improvement in the world's view of the United States.


Since Glassman will have nowhere near the access to the president that his predecessor enjoyed (no one really could), the idea seems to be to demonstrate that the administration is serious enough about America's image not to leave the position unfilled.

This nominee will certainly have a handle on the perception-shaping powers of the mass media.

Glassman is the archetype of a Journo-Lobbyist:

James Glassman and TCS [Tech Central Station, founded by Glassman] have given birth to something quite new in Washington: journo-lobbying. It's an innovation driven primarily by the influence industry. Lobbying firms that once specialized in gaining person-to-person access to key decision-makers have branched out. The new game is to dominate the entire intellectual environment in which officials make policy decisions, which means funding everything from think tanks to issue ads to phony grassroots pressure groups. But the institution that most affects the intellectual atmosphere in Washington, the media, has also proven the hardest for K Street to influence--until now.

(...)

Most think tanks are organized under the 501(c)(3) section of the tax code and must disclose many details of how they are financed, being--at least in theory--expected to justify their non-profit status with work in the public interest. Even think tanks of an acknowledged ideological bent seek to insulate the work of their scholars and fellows from the specific policy priorities of the businesses or foundations that provide their funding. Likewise, traditional newspapers and magazines, whether for-profit or not, keep a wall between their editorial and business sides; even at magazines of opinion, the political views of writers are presumed to be offered in good faith, uninfluenced by advertisers.

Unlike traditional think tanks, Tech Central Station is organized as a limited liability corporation--that is, a for-profit business. As an LLC, there is little Tech Central Station must publicly disclose about itself save for the names and addresses of its owners, and there is no presumption, legal or otherwise, that it exists to serve the public interest. Likewise, rather than advertisers per se, TCS has what it calls "sponsors," which are thanked prominently in a section one click away from the front page of the site. (AT&T, ExxonMobil, and Microsoft were early supporters; General Motors, Intel, McDonalds, NASDAQ, National Semiconductor, and Qualcomm, as well as the drug industry trade association, PhRMA, joined during the past year.) Each firm pays a sponsorship fee--although neither Glassman nor any of the sponsors would disclose how much--and gets banner advertisements on the site. When I contacted a few of the sponsors, each described their relationship to TCS in a slightly different way. An Intel spokeswoman said that TCS was "a consultant" to the computer-chip maker. AT&T's representative said her firm was "a funder." A Microsoft representative explained that the company "is constantly looking for ways to educate on some of the critical and important issues in the technology sector."

(...)

[T]ime and time again, TCS's coverage of particular issues has had the appearance of a well-aimed P.R. blitz. After ExxonMobil became a sponsor, for instance, the site published a flurry of content attacking both the Kyoto accord to limit greenhouse gasses and the science of global warming--which happen to be among Exxon-Mobil's chief policy concerns in Washington.



Glassman left TCS in 2006.

Maybe Glassman can scare up the help of some of his corporate buddies in his new gig.

And, if all else fails, maybe he can use his financial expertise to help unload some of the toxic CDO sludge on foreigners.

Nov 13, 2007

The 'Nation Brand' Marketplace


From a new Council on Foreign Relations analytical brief, The ‘Nation Brand’ Marketplace:

National public-relations campaigns typically raise eyebrows. The whole idea of a country advertising itself evokes propaganda—and history’s most notable propaganda efforts, in Stalin’s Soviet Union, for instance, or Nazi Germany, carry dark connotations. Yet just in the last ten years, an industry has emerged to help countries better tailor their image. As a new Backgrounder outlines, “nation branding” has established itself as a hip new field, both in academia and consulting.

It’s no mystery why countries find the idea compelling. Public-relations concerns loom over some of the world’s geopolitical heavyweights—and the stakes include economic prowess and diplomatic power, not just tourism. “Brand China,” for instance, finds itself increasingly threatened (BBC) following a flurry of scandals over dangerous lapses in the quality control of Chinese exports. The United States, too, is besieged with bad press. Recent polling data from the Pew Research Center shows global perceptions of the United States at a nadir in many parts of the world, particularly among Arabs and Muslims, but also in Europe and Latin America. These numbers represent a stunning shift from the years between 1989 and 2001, when the world’s views of the United States, even in Islamic states, were overwhelmingly positive.

Nov 7, 2007

CATCH-ALL: Suck It Up - All Of It


As we recently boasted,
for over a year and a half, readers here have been treated to details of the CATCH-ALL program that are only now being uncovered by our intrepid news media.
An article hacked & jacked from today's business section of the Washington Post might be of some interest to our readers that have followed SMC's mumbling & fumbling exposition of the Catch-All saga from scratch.

The plain-spoken, bespectacled Klein, 62, said he may be the only person in the country in a position to discuss firsthand knowledge of an important aspect of the Bush administration's domestic surveillance program. He is retired, so he isn't worried about losing his job. He did not have security clearance, and the documents in his possession were not classified, he said. He has no qualms about "turning in," as he put it, the company where he worked for 22 years until he retired in 2004.

In an interview yesterday, he alleged that the NSA set up a system that vacuumed up Internet and phone-call data from ordinary Americans with the cooperation of AT&T . Contrary to the government's depiction of its surveillance program as aimed at overseas terrorists, Klein said, much of the data sent through AT&T to the NSA was purely domestic. Klein said he believes that the NSA was analyzing the records for usage patterns as well as for content.

He said the NSA built a special room to receive data streamed through an AT&T Internet room containing "peering links," or major connections to other telecom providers. The largest of the links delivered 2.5 gigabits of data -- the equivalent of one-quarter of the Encyclopedia Britannica's text -- per second, said Klein, whose documents and eyewitness account form the basis of one of the first lawsuits filed against the telecom giants after the government's warrantless-surveillance program was reported in the New York Times in December 2005.

In summer 2002, Klein was working in an office responsible for Internet equipment when an NSA representative arrived to interview a management-level technician for a special job whose details were secret.

"That's when my antennas started to go up," he said. He knew that the NSA was supposed to work on overseas signals intelligence.

"What the heck is the NSA doing here?" Mark Klein, a former AT&T technician, said he asked himself.

The job entailed building a "secret room" in an AT&T office 10 blocks away, he said. By coincidence, in October 2003, Klein was transferred to that office and assigned to the Internet room. He asked a technician there about the secret room on the 6th floor, and the technician told him it was connected to the Internet room a floor above. The technician, who was about to retire, handed him some wiring diagrams.

"That was my 'aha!' moment," Klein said. "They're sending the entire Internet to the secret room."

The diagram showed splitters, glass prisms that split signals from each network into two identical copies. One fed into the secret room, the other proceeded to its destination, he said.

"This splitter was sweeping up everything, vacuum-cleaner-style," he said. "The NSA is getting everything. These are major pipes that carry not just AT&T's customers but everybody's."

One of Klein's documents listed links to 16 entities, including Global Crossing, a large provider of voice and data services in the United States and abroad; UUNet, a large Internet provider in Northern Virginia now owned by Verizon; Level 3 Communications, which provides local, long-distance and data transmission in the United States and overseas; and more familiar names such as Sprint and Qwest. It also included data exchanges MAE-West and PAIX, or Palo Alto Internet Exchange, facilities where telecom carriers hand off Internet traffic to each other.

"I flipped out," he said. "They're copying the whole Internet. There's no selection going on here. Maybe they select out later, but at the point of handoff to the government, they get everything."

Another document showed that the NSA installed in the room a semantic traffic analyzer made by Narus, which Klein said indicated that the NSA was doing content analysis.

Claudia Jones, an AT&T spokeswoman, said she had no comment on Klein's allegations. "AT&T is fully committed to protecting our customers' privacy. We do not comment on matters of national security," she said.

The NSA and the White House also declined comment on Klein's allegations.

Klein is in Washington this week to share his story in the hope that it will persuade lawmakers not to grant legal immunity to telecommunications firms that helped the government in its anti-terrorism efforts

Klein is urging Congress not to block Hepting v. AT&T, a class-action suit pending in federal court in San Francisco, as well as 37 other lawsuits charging carriers with illegally collaborating with the NSA. He was accompanied yesterday by lawyers for the Electronic Frontier Foundation, which filed Hepting v. AT&T in 2006. Together, they are urging key U.S. senators to oppose a pending White House-endorsed immunity provision that would effectively wipe out the lawsuits. The Judiciary Committee is expected to take up the measure Thursday.

Oct 10, 2007

Red CyberWar Tomorrow - Capitalist CyberInsurgents Now

While we may fret over prospects of a nefariously minded red China cyberattacking the Yahoo out of us tomorrow, there is a growing middle market of domestically based and commercially driven cyberinsurgent (SMC term) entities engaged in personal data theft online and the retailing of such goods to third party cyberinsurgents who deploy these capital goods for further commercialized cyberinsurgent activity.

The U.S. is the country most frequently attacked by commercially driven cyberinsurgents. The U.S. is also where most of these cyberinsurgent attacks originate.

What once perhaps were asymmetric cyberattacks designed to destroy data and collect trophies de chaos have now given way to attacks designed to steal data outright for profit. Not unlike the insurgency raging within Iraq, this cyberinsurgency has progressed to being an amorphous and distributed beast fighting smart and dirty for market share where resources brought to bear against it by the state represent just one more scrapping party (and increasingly marginalized at that) in the maelstrom of market conflict. Settling grudges and collecting scalps simply don't pay enough to keep the production of chaos this long in play.

Based on reports obtained from the FBI, Symantec estimates that commercially driven domestic cyberinsurgent activities, including malicious software development and sales, extortion, and wholesale and retail sales of personal information and credit card data, at present turn over hundreds of millions USD per annum.

As can be said of the technical solutions employed by the IC at large (as Kent's Imperative doth profess), today’s [Cyberinsurgent] activities, even those conducted in the far flung corners of the globe, are more likely to involve commercial off the shelf items and kludged and duct-taped solutions than the things of precision and beauty. To be sure, there is still – and always will be – a certain amount of specialized hardware, and a few new cutting edge platforms. But this new age is a very different one – dominated by Small Stuff, and dual use.

What can and will be said about the resources and strategies needed to counter a commercially driven cyberinsurgency at home? Leave it to Symantec? Time for a domestic cyberCOIN doctrine? Will we need cyberPMCs? Maybe declare a GWOCyT? Rest assured, the odds of knowing somebody adversely, and directly so, affected by commercially driven cyberinsurgents dwarf any reasonable risk of getting bruised by any other spooky entity we're at war with. Or do we perhaps best leave this particular insurgency to the cops and the criminal justice system? Or is this insurgency good for business at large? (Some are) Shallow thoughts tendered for deeper minds to dwell a moment or so upon. Perhaps.

Below are some choice excerpts and conclusions drawn and quartered from Symantec's semiannual Symantec Internet Security Threat Report (ISTR) Volume XII, covering the six-month period from January 1, 2007, through June 30, 2007. According to Symantec, it is based on Symantec data collected from more than 40,000 sensors deployed in more than 180 countries in addition to a database that covers more than 22,000 vulnerabilities affecting more than 50,000 technologies from more than 8,000 vendors. Symantec also reviews more than 2 million decoy accounts that attract e-mail messages from 20 different countries around the world allowing Symantec to gauge global spam and phishing activity.

The latest Internet Security Threat Report (ISTR), Volume XII released today by Symantec Corp. concludes that cyber criminals are increasingly becoming more professional -- even commercial -- in the development, distribution and use of malicious code and services. While cybercrime continues to be driven by financial gain, cyber criminals are now utilizing more professional attack methods, tools and strategies to conduct malicious activity.

During the reporting period of Jan. 1, 2007, through June 30, 2007, Symantec detected an increase in cyber criminals leveraging sophisticated toolkits to carry out malicious attacks. One example of this strategy was MPack, a professionally developed toolkit sold in the underground economy. Once purchased, attackers could deploy MPack's collection of software components to install malicious code on thousands of computers around the world and then monitor the success of the attack through various metrics on its online, password protected control and management console. MPack also exemplifies a coordinated attack, which Symantec reported as a growing trend in the previous volume of the ISTR where cyber criminals deploy a combination of malicious activity.

Phishing toolkits, which are a series of scripts that allow an attacker to automatically set up phishing Web sites that spoof legitimate Web sites, are also available for professional and commercial cybercrime. The top three most widely used phishing toolkits were responsible for 42 percent of all phishing attacks detected during the reporting period.

"In the last several Internet Security Threat Reports, Symantec discussed a significant shift in attackers motivated from fame to fortune," said Arthur Wong, senior vice president, Symantec Security Response and Managed Services. "The Internet threats and malicious activity we are currently tracking demonstrate that hackers are taking this trend to the next level by making cybercrime their actual profession, and they are employing business-like practices to successfully accomplish this goal."

Additional Key Findings

* Credit cards were the most commonly advertised commodity on underground economy servers, making up 22 percent of all advertisements; bank accounts were in close second with 21 percent.

*Malicious code that attempted to steal account information for online games made up 5 percent of the top 50 malicious code samples by potential infection. Online gaming is becoming one of the most popular Internet activities and often features goods that can be purchased for real money, which provides a potential opportunity for attackers to benefit financially.

*Theft or loss of computer or other data-storage medium made up 46 percent of all data breaches that could lead to identity theft. Similarly, Symantec's IT Risk Management Report found that 58 percent of enterprises expect a major data loss at least once every 5 years.

Oct 9, 2007

White House Fingerprints on Bin Laden Tape Exploit


Never has one been presented with a more perfect reveal of the procedure behind the ongoing exploitation for domestic propaganda purposes of the Osama Bin Laden video messages.

The proprietor of the marquee private purveyor of the Al Qaeda tapes sent a sneak preview of a recent release to the White House, and now is complaining that the leaking to the press by the administration has blown her operational arrangements for access to the terrorist group's information products.

Did she think that the tapes (even if legit) have any value to the White House aside from propaganda? She claims that she sent them so that White House officials "could prepare for their eventual release." Unintentional satire maybe, but hilarious nevertheless.

A small private intelligence company that monitors Islamic terrorist groups obtained a new Osama bin Laden video ahead of its official release last month, and around 10 a.m. on Sept. 7, it notified the Bush administration of its secret acquisition. It gave two senior officials access on the condition that the officials not reveal they had it until the al-Qaeda release.

Within 20 minutes, a range of intelligence agencies had begun downloading it from the company's Web site. By midafternoon that day, the video and a transcript of its audio track had been leaked from within the Bush administration to cable television news and broadcast worldwide.

The founder of the company, the SITE Intelligence Group, says this premature disclosure tipped al-Qaeda to a security breach and destroyed a years-long surveillance operation that the company has used to intercept and pass along secret messages, videos and advance warnings of suicide bombings from the terrorist group's communications network. ...

Katz said she decided to offer an advance copy of the bin Laden video to the White House without charge so officials there could prepare for its eventual release.

She spoke first with White House counsel Fred F. Fielding, whom she had previously met, and then with Joel Bagnal, deputy assistant to the president for homeland security. Both expressed interest in obtaining a copy, and Bagnal suggested that she send a copy to Michael Leiter, who holds the No. 2 job at the National Counterterrorism Center.

Administration and intelligence officials would not comment on whether they had obtained the video separately. Katz said Fielding and Bagnal made it clear to her that the White House did not possess a copy at the time she offered hers.

Around 10 a.m. on Sept. 7, Katz sent both Leiter and Fielding an e-mail with a link to a private SITE Web page containing the video and an English transcript. "Please understand the necessity for secrecy," Katz wrote in her e-mail. "We ask you not to distribute . . . [as] it could harm our investigations." ...

[W]ithin minutes of Katz's e-mail to the White House, government-registered computers began downloading the video from SITE's server, according to a log of file transfers. The records show dozens of downloads over the next three hours from computers with addresses registered to defense and intelligence agencies.

By midafternoon, several television news networks reported obtaining copies of the transcript. A copy posted around 3 p.m. on Fox News's Web site referred to SITE and included page markers identical to those used by the group. "This confirms that the U.S. government was responsible for the leak of this document," Katz wrote in an e-mail to Leiter at 5 p.m.


This story is being played as a one-off. That interpretation is accepted at one's own risk.

During the Cold War, a not-inconsiderable amount of time and effort was expended conducting official US government propaganda operations to calm Americans' fears of nuclear annihilation. Ostensibly aimed at reassuring foreign audiences as to U.S. intentions, "Atoms For Peace", etc., had the deliberate objective of helping to relieve anxiety about the bomb domestically.

These days, the White House-approved (and administered) practice is to cultivate the specter of the most vividly imagined terrors from abroad and to trumpet the most hare-brained plots discovered at home.

And when all else fails, they play the Bin Laden card.

UPDATE:
Have a look at Michael Tanji's post What Did I Tell You at his journal Haft of the Spear. Drill down while you're at it. All the way down.

Sep 30, 2007

The "Genocide Games" PSYOP and the Burma Crisis


The "Genocide Games" PSYOP -- which for months has concentrated on exploiting China's desire not to allow international political considerations (their support for the Sudanese government, the repression in Tibet, etc.) adversely effect their own propaganda showcase of the decade -- has received a boost of inestimable value from the crackdown on the pro-democracy movement in Burma.

China's role as the key economic and political facilitator of the Burmese junta is being heavily advertised for all to see. Protests outside Chinese embassies worldwide are "spontaneously" erupting.

By holding China responsible for their friends' actions in Burma, the information campaign aims to, at a minimum, compel action from Beijing to restrain the Burmese generals from continuing the violence against the protesters.

Toward the high end of the scale of desired behaviors from China is for them to coerce the Burmese junta into a power-sharing agreement with Aung San Suu Kyi's National League for Democracy.

China's own interests are in play here. Their inexpensive access to Burmese gas and oil under the current regime is being weighed against the prospect of a spoiled 2008 Olympics. And how to handle this mess while preventing a revival of their own democracy movement has to be a big consideration as well.

At this point, the crisis can be resolved only by an effort on the part of China. Hence the ratcheting up of the "Genocide Games" pressure op.

If the Burmese junta fails to pay proper attention to the messages sure to be forthcoming from their Chinese friends and massacres more protesters (the true number to date is much higher than publicly reported), the generals may be invited to relocate permanently to another country.

China would be a likely destination.

Sep 26, 2007

IO The Children Unto Me


...and I thought the West had retired subtleties like this to some Stalinoid or Goebellsonian past or final outpost of Pyonyangian persistence. Apparently not.

History is written by the winners -- but who writes the English lessons? A teaching pack about the Iraq war for British schools commissioned by the Ministry of Defence is stirring up controversy. It comes from a company called Defence Dynamics, and is being promoted by marketing agency Kids Connections.

As reported in New Statesman magazine, the lesson plan titled ‘Promoting peace and security in Iraq’ is intended for English teachers and gives an upbeat view of the war and the occupation.
A student fact sheet states that the occupation has resulted in “Over 150 healthcare facilities completed and many more are in progress. 20 hospitals rehabilitated. Immunisation programme re-started in 2003. 70 million new text books distributed to schools. Sewage and wastewater treatment plants operating again.”

Yet this rosy picture seems woefully at odds with a report by the NGO Coordination Committee in Iraq, backed by Oxfam, which states that Iraq is facing a humanitarian crisis "of alarming scale and severity". It finds that four million Iraqis are ‘food-insecure’ and that four million have fled, creating "the fastest growing refugee crisis in the world".

The pack also anticipates some resistance (often a good move) and suggests countermeasures:
It instructs classes to hold a vote on the war, and to produce a piece writing arguing for or against the withdrawal of soldiers from the Gulf.

The teachers’ notes state: "Most students will vote against the ongoing maintenance of troops. Ask students to justify their opinions."

It continues: "Throughout the lesson, students should come to understand that this activity is representative of democracy on a micro scale and by voting, they have exercised their democratic right, a right that is newly available to Iraqis."

One teacher is not impressed:
“As a lesson plan it’s insanely complicated,” says Victoria Elliott, a secondary English teacher. “The focus is not really on the skills supposedly being taught, but is instead about getting information across, which is completely irrelevant to English teaching.”

And the Guardian newspaper reports there may be a legal challenge:
... if Nick Grant, National Union of Teachers branch secretary in Ealing, London, has his way, it faces a boycott by teachers and legal action by the NUT. Grant thinks the lesson plan breaks the 1996 Education Act, which bans "the promotion of partisan political views in the teaching of any subject in the school".
-A jacked David Hambling von Danger Room

A Picture is Worth a Thousand Words


Although our emphasis here is Information Operations as a military and government enterprise, occasionally we like to direct readers' attention to particularly effective or noteworthy influence activities slightly further afield.

Public health propaganda has a long history of campaigns of varying effectiveness -- from often risible VD films and pamphlets to the decades of anti-smoking and anti-drug abuse crusades.

Private industry -- with the exception of occupational safety initiatives -- has generally played second fiddle to government efforts in the health information field. But when private companies see fit to get involved, the result can be quite innovative.

An Italian fashion chain has stoked controversy with an advertisement featuring a naked anorexic woman. The ad, which is intended to raise awareness about eating disorders, is timed to coincide with Milan fashion week.

Back in 1992, photographer Oliviero Toscani caused controversy around the world with his pictures of a man dying of AIDS which formed part of a Benetton advertising campaign. Now he is back in the headlines with an equally shocking image of a naked anorexic woman, which a fashion chain is using to raise awareness about eating disorders.

The Nolita advertisement, timed to coincide with Milan fashion week, appeared Monday in Italian newspapers, including a two-page center spread in La Repubblica, and on billboards in Italy. A slogan above the naked photograph reads "No Anorexia."

Flash&Partners, the fashion group that owns the Nolita brand, said in a statement that Toscani's aim was "to use that naked body to show everyone the reality of this illness, caused in most cases by the stereotypes imposed by the world of fashion."

The woman in the photo is Isabelle Caro from France, who is 27 years old and has been anorexic for 15 years. She weighs a mere 31 kg (68 lb) and suffers from the skin disease psoriasis. "I hid myself and covered myself up for too long," she told the magazine Vanity Fair in an interview to be published Wednesday. "Now I want to show myself without fear, even though I know my body is repugnant."

Sep 12, 2007

Financial Warfare 101


The Foreign Policy Research Institute has published a new article by Yale professor Paul Bracken on the subject of Financial Warfare (as distinguished from the more traditional Economic Warfare).

There are all sorts of details that in a government document would likely be portion marked in such a way that the operational toolkit would remain inviolate.

An excerpt:

It is important to distinguish between financial and economic systems. This distinction is central to understanding the growing opportunities for financial warfare, as distinct from classic economic warfare. The economic system deals with the hard and soft outputs of the economy—that is, goods and services. The financial system deals with money and credit. In the modern financial system these can be very complicated. Bank credit, money transfers, stocks, bonds, and derivatives are the “stuff” of the financial system. It is a system built on confidence. There is trust that loans will be paid, that money transferred to an account will actually get there, and that money once placed in an account will not suddenly "disappear." ...

Financial warfare complements military operations as well as information operations. When combined with advances in social network mapping, it can give a highly detailed picture of an elite's communication and financial structure that can be used for targeting. Communication and software tools now exist to analyze connections in vast networks of heterogeneous information, such as financial transactions, mobile telephone calls, e-mail, and air travel. This gigantic information pool can be a source of knowledge about a nation's elite, where they stash their money, who they talk to, and their position in a social hierarchy. The key to doing this lies in constructing overlays of these datasets to visualize the various connections.

Watching how money flows out of a country in a crisis can be an important tip-off to who is in the know and who is at least partially responsible for national decisions. Carried to the next step, this can be combined with precise military attacks to go after a nation's elite. For example, tracking mobile telephone calls can reveal things like where the elite live, their vacation homes, and their travel patterns. Financial tracking of their bank accounts can reveal where they keep their money and who has access to their accounts. This creates the conditions for potentially ruinous attacks with far-reaching social implications on the national leadership. Were a national elite's overseas bank accounts frozen and their homes targeted with cruise missiles, simultaneously, a hyper-decapitation attack could destroy a nation's leadership. Clearly, this represents a large escalation. But there are many possibilities which fall short of this, and these constitute an important type of strategy: counter-elite targeting. Counter elite targeting has been considered in the past, both in the Cold War, with nuclear weapons, and more recently in conflicts in Kosovo and Iraq. But the 21st century is likely to see considerably more applications of it.

Spoofing—sending false signals of increased military and financial pressure—could be used to map out the crisis response patterns of a national elite, who they call, and where they send their money. This could be an intelligence treasure-trove of information. It could also be an input to information operations designed to make certain individuals, groups, or companies "suspect" in the eyes of a leader. This could undermine confidence in the regime. Seen as an escalation process, this focuses attention on actions which fall short of all-out attacks. These lower-level or intermediate actions are likely to provide U.S. decision-makers with a range of options between doing nothing and all-out attacks.

Sep 10, 2007

Nation Shaping Then, Now, and Maybe Iran - COIN's Pointy IOs


I remembered this:

No one knows whether or not an Operation Iranian Freedom is in the cards. A good deal of focus is already being placed on military planning. But it is also worth asking what America is doing to prepare for the trove of documents and other media that a newly liberated Iran could produce.

... when I chanced upon this:

Their methods had echoes of the Gestapo: kidnapping at night by state officials who offered no evidence of identity. Recently declassified secret documents reveal how at the end of the second world war an elite British unit abducted hundreds of German scientists and technicians and put them to work at government ministries and private firms in the UK.

The programme was designed to loot the defeated country's intellectual assets, impeding its ability to compete while giving a boost to British business.

In a related programme, German businessmen are alleged to have been forced to travel to post-war Britain to be questioned by their commercial rivals, and were interned if they refused to reveal trade secrets.

The economic warfare programmes are detailed in batches of Foreign Office files, marked "Top Secret", many of which lay unseen at the National Archives at Kew until discovered by the Guardian.

While it has long been known that German scientists and technicians worked in the US and Britain after the war, it has generally been assumed they were all volunteers, lured by the promise of good pay and accommodation. However, the declassified papers make clear that for more than two years after the cessation of hostilities the British authorities were subjecting them to a programme of "enforced evacuation".

The records show that abductions in the British-controlled zone of post-war Germany were carried out on the orders of an organisation called the British Intelligence Objectives Sub-Committee, or Bios. This committee was answerable to the cabinet and made up of representatives of the armed forces and Whitehall departments, including the Board of Trade and Ministry of Supply, as well as MI16 - the War Office's department of scientific intelligence.

The other organisation was the Field Information Agency (Technical), or Fiat, which had been established during the war as a joint Anglo-American military intelligence unit, and which earmarked scientists for "enforced evacuation" from the US and French zones, and Berlin.

Responsibility for seizing the scientists fell to a unique British army unit known as T-Force. Formed shortly after D Day, this lightly armed and highly-mobile force had raced ahead of allied troops at the end of the war, seizing objects which had a scientific or intelligence value before they could be sabotaged by retreating Germans, or captured by the Soviet Union.

After the war some officers and men from T-Force were formed into the Enemy Personnel Exploitation Section, which would escort the Bios and Fiat investigators and then take away the scientists and technicians wanted for interrogation.

Scientists were not the sole targets. The papers disclose brief details about Operation Bottleneck, which aimed to extract business information. In January 1947 Erich Klabunde, head of the German journalists' union, complained about how this was being achieved. A British official in Hamburg reported to headquarters that Klabunde told a public meeting: "An English manufacturer would name his German counterpart and competitor and 'invite' him to England (whether the man comes voluntarily or not is questionable). They then discuss business and the German is gently persuaded to reveal secrets of his trade. When he refuses, he is kept in polite internment until he gets so tired of not being allowed to return to his family that he tells the Englishman what he wants to know. Thus for about £6 a day the English businessman gains the deepest secrets of Germany's economic life."

The rationale for this had been set out by Herbert Morrison, lord president of the council, who told the prime minister, Clement Attlee: "It is most important at this formative stage to start shaping the German economy in the way which will best assist our own economic plans and will run the least risk of it developing into an unnecessarily awkward competitor."

...and went completely off topic revisiting thoughts, trends and topics the scattered likes of this:

The Iraq war came in two phases. The first phase is complete: the destruction of the existing state. The second phase consists of building a new state tied to our interests and smashing dissenting sectors of society. Openly, this involves applying the same sort of economic shock therapy applied to Eastern Europe. Covertly, it entails degrees of intimidating, kidnapping and killing a plethora of opposition voices. (*Covert operations can rarely achieve an important objective alone. At best, a covert operation can win time, forestall a coup, or otherwise create favorable conditions which will make it possible to use overt means to finally achieve an important objective. - From the Report of the Covert Operations Study Group. Dec 1, 1968. (Secret) *h/t Effwit)

The long unfolding pattern of academics assassinated in Iraq appears to lend some credence to claims that a campaign exists and is being conducted to erase a key section of the secular middle class in Iraq — a group that has largely resisted the US occupation of Iraq and refused to be co-opted by the so-called “political process”. Academics are not the only ones being killed: 311 teachers killed the past 4 months, 182 pilots, 416 senior military officers killed in the first 3 months of 2006. 20.000 people kidnapped since the beginning of 2006.

Some commentators claim that the assassination campaign of academics is part of a so-called civil war between Sunni and Shia. That’s it’s the ignorant Islamist Shia who receives direct orders from Iran to kill intellectual Sunni’s, and that it is unfortunately beyond the control of the US now. And thus the occupying forces should remain in Iraq to restore law and order. Another smokescreen is the claim that most of the assassinations are carried out by criminal gangs, who first kidnap their victims, and then a ransom is paid. And after that either they are assassinated, and if not, they flee the country.

Perhaps some context is in order:

What we might very well be witnessing is the result of a carefully planned campaign to liquidate key Iraqis who oppose the occupation, the so-called “Salvador option”. In fact, since 1945, we have developed counterinsurgency policies based much upon the model of the Third Reich's suppression of partisan insurgents that emphasized placing the civilian population under strict control and using terror to make the population afraid to support or collaborate with insurgents.

Patrick Lang, former chief of Middle East analysis for the U.S. Defense Intelligence Agency said: “What those of us in El Salvador learned was that American policy might call for surgical action, but once the local troops are involved, they’re as likely to use a chain-saw as a scalpel. And that, too, can serve American ends."

In almost any counter-insurgency, the basic message the government or the occupiers tries to get across to the population is brutally simple: We can protect you from the guerrillas, but the guerrillas can’t protect you from us, and you’ve got to choose sides. Sometimes you can win the population’s hearts and minds; sometimes you just have to make them more frightened of you than they are of the insurgents. And for this aim we use the likes of the Wolf Brigade, the Scorpions Brigade, the Lions Brigade, the Peshmerga’s and the “security forces” of the Ministry of Interior.

On January 1 2004, Robert Dreyfuss stated that: “part of a secret $3 billion in new funds—tucked away in the $87 billion Iraq appropriation that Congress approved in early November 2003 — will go toward the creation of a paramilitary unit manned by militiamen associated with former Iraqi exile groups. Experts say it could lead to a wave of extra-judicial killings, not only of armed rebels but of nationalists, other opponents of the U.S. occupation and thousands of civilian Baathists—up to 120,000 of the estimated 2.5 million former Baath Party members in Iraq. “They’re clearly cooking up joint teams to do Phoenix-like things, like they did in Vietnam,” said Vincent Cannistraro, former CIA chief of counter terrorism.

“The big money would be for standing up an Iraqi secret police to liquidate the resistance,” said John Pike, an expert of sorts on classified military budgets at www.globalsecurity.org. “And it has to be politically loyal to the United States. It’s also channeling money into the creation of an Iraqi secret police staffed mainly by gunmen associated with members of the puppet Iraqi Governing Council. Those militiamen are linked to Ahmad Chalabi’s Iraqi National Congress, the Kurdish peshmerga forces and Shiite paramilitary units, especially those of the Iran-backed Supreme Council for Islamic Revolution in Iraq. Technically illegal, these armed forces have been tolerated, even encouraged, by the Pentagon.”

Soon after this money entered Iraq, the consequences of this secret operation became clear. According to an article published in New York Times Magazine, in September 2004, Counselor to the US Ambassador for Iraqi Security Forces James Steele was assigned to work with a new elite Iraqi counter-insurgency unit known as the Special Police Commandos, formed under the operational control of Iraq’s Interior Ministry.

Not few of the same men in charge of training El Salvador's counter-insurgency forces during its civil war are advisors to Iraqi security forces.

Max Fuller
, a journalist specializing in Latin-America, has investigated this matter. He writes: “From 1984 to 1986 then Col. Steele had led the US Military Advisory Group in El Salvador, where he was responsible for developing special operating forces at brigade level during the height of the conflict. These forces, composed of the most brutal soldiers available, replicated the kind of small-unit operations with which Steele was familiar from his service in Vietnam. Rather than focusing on seizing terrain, their role was to attack ‘insurgent’ leadership, their supporters, sources of supply and base camps. In military circles it was the use of such tactics that made the difference in ultimately defeating the guerrillas; for others, such as the Catholic priest Daniel Santiago, the presence of people like Steele contributed to another sort of difference:”

“People are not just killed by death squads in El Salvador – they are decapitated and then their heads are placed on pikes and used to dot the landscape. Men are not just disemboweled by the Salvadoran Treasury Police; their severed genitalia are stuffed into their mouths. Salvadoran women are not just raped by the National Guard; their wombs are cut from their bodies and used to cover their faces. It is not enough to kill children; they are dragged over barbed wire until the flesh falls from their bones, while parents are forced to watch.”

In the context of Iraq where good information is extremely scarce, disinformation and black propaganda are endemic and independent journalists and monitors are deliberately eliminated, it is vital to be able to model the situation in order to understand it and, hopefully, be effective. There are two principle dimensions to such modeling. In the first, Iraq has frequently been compared to Vietnam. The similarity is that the US has well over 100,000 soldiers on the ground. However, the analogy is misleading in that in Iraq conflict with a populous enemy state, as North Vietnam was, ended quickly.

As a model, El Salvador is not wholly accurate either. In El Salvador US advisors were few in number and prohibited from taking part in combat. Nevertheless, it is towards this model that the US is attempting to move, hoping to farm out the business of occupation to Iraqi auxiliaries. But, in many ways it is contemporary Colombia that offers the closest analogy: not for the disposition of US forces, but because here the same process of asset-stripping is both deeply entrenched and ongoing.

It is here that is to be found that clearest pattern for the assaults on academics, independent trade unionists and peasant organizations that will increasingly characterize Iraq for those prepared to look beyond the fireworks. This is the second dimension that any model must address, but in essence the pattern is repeated time after time in most every counter-insurgency war.

In Iraq, the Salvador Option may mean returning home to find your entire family seated at the table with their own severed heads served to them and a bowl of blood for relish. IO's too can have their fair share of pointy glory. In fact, maybe it's when they're pointy that they prove most effective in dealing with alien cultured folks. Some say music is the universal language that best bridges cultural divides. I beg to differ. I'll go with pure horror any ol' day, even in the land of Babel.

PS
I recently saw a new face of COIN on The Daily Show. COIN was now main stream laughing matter.

Wow. "You've come a long way baby"