All 1 entries tagged Dominance

No other Warwick Blogs use the tag Dominance on entries | View entries tagged Dominance at Technorati | There are no images tagged Dominance on this blog

May 15, 2008

Air Force Seeks Full Spectrum Dominance Over "Any And All" Computers

"Dominant Cyber Offensive Engagement" plans announced

Steve Watson
Infowars.net
Wednes
day, May 14, 2008

The U.S. airforce has announced plans for a two-year, $11 million project that will seek the capability to hack into, fully control and even destroy any form of computer or network there is, in its ongoing "national cybersecurity initiative".

The Air Force Research Laboratory introduced the plans earlier this week in a a request for proposals as a "Dominant Cyber Offensive Engagement."

The request states:

Of interest are any and all techniques to enable user and/or root level access to both fixed (PC) or mobile computing platforms. Robust methodologies to enable access to any and all operating systems, patch levels, applications and hardware are of interest.

The purpose for this is clear:

...this BAA's objective includes the capability to provide a variety of techniques and technologies to be able to affect computer information systems through Deceive, Deny, Disrupt, Degrade, Destroy (D5) effects. Of interest are any and all techniques including enabling D5 effects to computers and their networks...

"...research efforts under this program are expected to result in complete functional capabilities." The request notes.

The program will also focus on a stealth approach:

Also, we are interested in technology to provide the capability to maintain an active presence within the adversaries' information infrastructure completely undetected...

...it is desired to have the capability to stealthily exfiltrate information from any remotely-located open or closed computer information systems with the possibility to discover information with previously unknown existence... Consideration should be given to maintaining a "low and slow" gathering paradigm in these development efforts to enable stealthy operation.

This approach will provide an alternative to another program being proposed under the same overall initiative that will see the airforce build its own zombie network to forcefully and openly "Carpet Bomb" any target computers or networks.

As Wired.com notes, recently the military, mirroring it's pre-emptive war strategy, has shifted to an offensive posture where cyberspace is concerned, rather than a defensive one:

in the last year or so, the tone has changed -- and become more bellicose. “Cyber, as a warfighting domain . . . like air, favors the offense,” said Lani Kass, a special assistant to the Air Force Chief of Staff who previously headed up the service's Cyberspace Task Force. "If you’re defending in cyber, you’re already too late."

"We want to go in and knock them out in the first round," added Lt. Gen. Robert Elder, commander of the 8th Air Force, which focuses on network issues.

"An adversary needs to know that the U.S. possesses powerful hard and soft-kill (cyberwarfare) means for attacking adversary information and command and support systems at all levels," a recent Defense Department report notes. "Every potential adversary, from nation states to rogue individuals... should be compelled to consider... an attack on U.S. systems resulting in highly undesireable consequences to their own security."

"Full Spectrum Dominance" has always been the military aim and exactly as it has done over land, sea and air, the military is seeking to aggressively exert it's control over cyberspace and all those who reside within that terrain.

Multiple programs are being rolled out by the Pentagon and its offshoot agencies such as DARPA, in a secret war with the internet that has been described as a $30 billion "electronic Manhattan Project".


Jack Morgan's blog


The primary purpose of this blog is to syndicate information that is largely excluded from, or spun by, the increasingly consolidated corporate media.


I believe the “War on Terror” is a synthetic construct. It is part of a long term agenda of the political/corporate elites to aggressively consolidate global control. “War on Drugs” deja-vu.


I support a new criminal investigation into the events of 9/11. The previous investigation avoided hundreds of known pieces of evidence contradicting the government’s account – for example, the fact that the head of Pakistani intelligence funded the alleged lead hijacker, and the fact that World Trade Center Building 7 collapsed at 5.20 pm in the exact manner of a controlled demolition.

Disclaimer: I often paste articles from other websites but this does not imply that I am affiliated with them or that I agree with the totality of their content.

Blog archive

Loading…

Most recent comments

  • …I've never wanted you more! by on this entry
  • "Recording my IP is the sort of thing you seem to be very much against. I'm not worried by it, just … by on this entry
  • I watched the program last night. Your comments add to my unease with the reporting and representati… by CT on this entry
  • I watched this last night. It was all very subtle, but one or two moments really demonstrated the bi… by londonbob on this entry
  • Good analysis. There are perhaps a few things to add that the program dealt with badly. The first is… by redadare on this entry

Search this blog

9/11 Research

Architects and Engineers for 9/11 Truth

Do Not Submit to the National Identity Register

Nafeez Mosaddeq Ahmed's Blog

Craig Murray's Blog

Greg Palast's Website

Peace Strike

We Are Change UK

October 2020

Mo Tu We Th Fr Sa Su
Sep |  Today  |
         1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31   
Not signed in
Sign in

Powered by BlogBuilder
© MMXX