Thursday, March 29, 2007

Taking the war on terror on line.

This is from USA today. The comments on the article don't even bring up the legality of attacking terrorist websites nor do they show any inkling of the complexity of the issue. What are terrorist websites? Who decides which should be attacked and on what grounds. Almost no comments address the valuable intelligence information the sites provide--probably the main reason they are not already attacked.
Among those listed as terrorist sites by the State dept are: Hamas, Hezbollah, but also several Jewish extremist groups. The latter are no doubt regarded as legitimate in Israel and Hamas in Palestine and elsewhere and also Hezbollah. If terrorists attack websites it is cyberterror but if the US intelligence does it I guess it is supposed to be OK.
Actually hackers have already attacked some terrorist websites but attacks are common on all sorts of sites even Yahoo. Who knows for what reason. A US based Marxist archives suffered an attack from China! I guess the Chinese govt. fears Chinese learning about Marxism!
Any attacks by intelligence services is liable to "creep" that is extend the range of attacks and perhaps eventually to any radical criticque of government policy.


Military beefs up Internet arsenal
.




By Jim Michaels, USA TODAY
WASHINGTON — The U.S. military is quietly expanding capabilities to attack terrorist computer networks, including websites that glorify insurgent attacks on U.S. forces in Iraq, military officials and experts say.
The move comes as al-Qaeda and other groups fighting in Iraq and elsewhere have expanded their activities on the Internet and increased the sophistication and volume of their videos and messages. Much of the material is designed to raise money and recruit fighters for Iraq.

"You should not let them operate uncontested" on the Internet and elsewhere in cyberspace, said Marine Brig. Gen. John Davis, who heads a military command located at the National Security Agency. The command was established to develop ways to attack computer networks.

Davis and other officials declined to say whether the military has actually attacked any networks, which would require presidential authorization. The techniques are highly classified.

Pentagon contract documents show the military asks companies to develop a "full spectrum … of computer network attack techniques." Run by the Air Force Research Laboratory, this program aims to spend $40 million over four years, documents show.

FIND MORE STORIES IN: Iraq | Afghanistan | US military | BAGRAM | Intelcenter | Sahab | Jim Michaels
The growth in offensive capabilities signals a shift in military thinking from just monitoring terrorist websites for intelligence to attacking those sites.

"The offensive is increasingly on leaders' minds," said John Arquilla, a professor at the Naval Postgraduate School who also works for the Defense Department on cyberwar issues.

Some officials say cyberattacks can result in losing critical intelligence.

"You always have the built-in tension between the operator who wants to destroy the target and the intelligence officer who wants to use the target to gain more information," said Lani Kass, director of the Air Force's cyberspace task force.

"Our opponents do a heck of a lot more than just watch us in cyberspace," Davis said. "They are acting in cyberspace. We need to develop options so that we can … dominate cyberspace."

Cyberattacks can take different forms, including eliminating terrorist websites and creating doubts among insurgents about their networks' security, said Arquilla, who favors an offensive approach he calls a "virtual scorched-earth policy."

Armed groups in Iraq videotape nearly all of their attacks on U.S. forces to help magnify their impact.

"Everything they do in Iraq and Afghanistan is geared toward propaganda," said Rep. Jim Saxton, R-N.J., who's on the House Armed Services Committee.

The videos and messages are "getting more and more professional," said Andretta Summerville of iDefense, a private contractor that monitors terrorist activity on the Internet.

Some sites find recruits and push "them toward a pipeline that ends in suicide attacks," said Lt. Col. Matthew McLaughlin, a spokesman for Central Command, which runs the wars in Iraq and Afghanistan.

Attacking websites may have limited value, said Ben Venzke of IntelCenter, a contractor that monitors terrorist websites and Internet forums. "The problem is the nature of the Internet itself," he said. "It can always come back up in 10 seconds."


|

No comments:

US will bank Tik Tok unless it sells off its US operations

  US Treasury Secretary Steven Mnuchin said during a CNBC interview that the Trump administration has decided that the Chinese internet app ...