Obama Covertly Signs Directive Authorizing Military to Control the Internet
Last week, the Senate failed to pass hurried cybersecurity legislation. To ensure privacy on the Web, the Electronic Communications Privacy Act was revised. Senator Harry Reid explained: “The bill that was and is the most important to the intelligence community and the Pentagon was just killed, and that was cybersecurity. Mr. President, I had a number of people come to me during the day and say ‘Are you going to allow relevant minutes on this?’ I said, ‘Sure.’ They said, ‘How about five?’ I said, ‘Fine.’ But Mr. President, whatever we do on this bill isn’t enough for the [U.S.] Chamber of Commerce. Not enough. So everyone should understand cybersecurity is dead for this Congress.”
Senators Lieberman and Collins concocted the “SECURE IT Act” that restricted the Department of Homeland Security (DHS) from new authority to govern cybersecurity and digital controls over privately owned power grids and internet service providers.
In another move by the Senate, the Federal Trade Commission was given jurisdiction (again) to fight internet fraud.
The Electronic Privacy Information Center (EPIC) filed a Freedom of Information Act (FIOA) request to obtain a copy of Presidential Policy Directive 20 (PPD20) or the new cybersecurity declaration from the executive branch of our US government.
Obama has outlined a protocol that explains procedures that enable the military industrial complex to prevent digital attacks from foreign nations, hackers and any other definable threat to national security by specifying “constitutes an “offensive” and a “defensive” action in the rapidly evolving world of cyberwar and cyberterrorism, where an attack can be launched in milliseconds by unknown assailants utilizing a circuitous route.”
It is said that PPD20 directs the military to take over the internet in the event a cyber-attack is acknowledged by the President. Obama has outlined a protocol that explains procedures that enable the military industrial complex to prevent digital attacks from foreign nations, hackers and any other definable threat to national security on the internet. This “secret law” allows the National Security Agency (NSA) and Pentagon to employ armed forces to ensure American cyber-infrastructure and digital communications.
In March, to convince Congress to vote for legislation (that was subsequently voted down) that would empower the DHS to protect the US government against cyber-attacks, Obama staged hacker attack to US infrastructure with the intention “to provide all senators with an appreciation for new legislative authorities that would help the U.S. government prevent and more quickly respond to cyber-attacks.”
A classified briefing on the “hypothetical cyber-attack against United States critical infrastructure networks” was held as well.
The focus of attack was:
• U.S. banks
• Power grids
• Telecommunications systems
The blame for the lack of cohesive cybersecurity is placed on public and private corporations because of their lack of cooperation with the federal government, according to Mark Weatherford, deputy undersecretary for cybersecurity of DHS. At a Security Innovation Network conference Weatherford asserts: “It’s not a technical issue. The governance of security is equally as important as the technology.”
However these systems are not connected to the internet and therefore that argument is moot. In fact, the power grid and public water systems “are rarely connected directly to the public internet. And that makes gaining access to grid-controlling networks a challenge for all but the most dedicated, motivated and skilled — nation-states, in other words.”
The NSA’s involvement in cybersecurity has been covert which makes Congressional legislation difficult because pin-pointing the NSA’s exact authority is nearly impossible.
The PPD20 is beyond an executive order. This is a declaration by the first American Dictator-in-Chief who plans to use military force to ensure over-reaching governmental control over the Web.
The UN has offered to assist sovereign countries in internet surveillance for anti-terrorism purposes. In a recently published report entitled “The Use of the Internet for Terrorist Purposes” (UITP), the UN claims that social media sites are used for terroristic schemes in terms of organization and recruitment; specifically Skype, Facebook, YouTube and Twitter.
The International Telecommunications Union (ITU), an extension of the UN, became the UN’s official move toward totalitarian control over the internet. And in December of this year, Dubai, India will be hosting their conference which will decide the globalist stance on the free flow of information on the Web.
Hamadoun Toure, the ITU secretary-general, stated that: “When an invention becomes used by billions across the world, it no longer remains the sole property of one nation, however powerful that nation might be.”
The UN’s ITU proclaims that because the internet is a “global entity” that the UN should have jurisdiction over it, manage its abilities according to global UN standards and engage restrictions that could be installed at the fundamental level of the internet to prevent any infractions of international mandates. The UN wants to include the domain-name system along with the Internet Corporation for Assigned Names and Numbers (ICANN), which is currently a privately owned US non-profit organization.
It is expected that the ITU would begin a sort of taxation that international telecommunications corporations would be expected to pay for the ITU’s handling of web traffic as it flows across the world. ITU members would be privy to the new found cash flow that would be in the hands of international governance; which could begin to line the pockets of the UN in record time.
In October, Janet Napolitano, Secretary of the Department of Homeland Security (DHS) claims that unspecified reports coming from US financial institutions assert that hackers are “actively” attacking them. Napolitano said: “Right now, financial institutions are actively under attack. We know that. I’m not giving you any classified information… I will say this has involved some of our nation’s largest institutions. We’ve also had our stock exchanges attacked over the last [few] years, so we know… there are vulnerabilities.”
No comments:
Post a Comment