Send a Tweet
Most Popular Choices
Share on Facebook 29 Share on Twitter 2 Printer Friendly Page More Sharing
OpEdNews Op Eds    H1'ed 10/12/15

Privatized NSA Army is Attacking YOU!

By       (Page 4 of 5 pages) Become a premium member to see this article and all articles as one long page. (View How Many People Read This)   2 comments
Author 58313
Follow Me on Twitter     Message George Eliason
Become a Fan
  (59 fans)
  • Rule 31 -- Psy-Ops including leaflets, mass emails is not prohibited behavior.

  • Rule 33 -- If there is doubt to the status of a person, that person is to be considered a civilian and not targetable.

  • Rule 35.5 -- Gathering information for the military makes you a combatant.

  • Journalists are prohibited targets.

  • Once an attack is made, the retribution is legal and does not necessarily need to be in kind. A cyber attack can be met with conventional weapons.

  • Rule 41 -- Means and Methods describes cyber weapons broadly as the means to carry out cyber war by use, or intended use of cyber "munitions" designed to cause damage, destruction, or death to its targets. The breadth of the rule is required because of the wide array of possible attacks through cyber means.

  • Is it treason to target and destroy the lives of fellow citizens of your country while in the employ of a foreign government while working as a military asset? The manual is clear that a cyber attack is a use of force if it causes physical harm to people or property.

    If in this case the number of people just in the US targeted by freelancers like Weisburd is potentially over 250,000 people, is that below the threshold of what is called an attack? Around the world it scales up to over 1 million. And this is just one area cyber war is being waged.The manual spells out the right to defend and even launch a preemptive attack if you know a cyberattack is imminent.

    Your Safety Net

    Cyber war is real war and the general public of the US and every western nation is being attacked. Safety starts with the realization that it is your life, livelihood, and status in your own country that is at stake.

    In the US, start by calling your congressman and senator. Demand to know why the US is giving billions of dollars to Ukraine when it is attacking US citizens. Demand that this funding cease. Should Americans give tax dollars to a regime that hires Americans as "soldiers" to attack them?

    Demand that OSINT tools be regulated and taken out of free public access. The process can still be done, but it becomes slow and costly. The OSINT field needs to be regulated like doctors and lawyers are. Both professions answer to a board for misconduct and can lose their license to practice if guilty.

    Taking OSINT tools out of public reach is also the only way to reform the NSA practices. The legal argument is this simple.

    If a seven-year-old can use software, freeware, or a Microsoft Excel plugin to follow mommy when she goes Christmas shopping in real time, we (the State) deserve State sized tools. As the public tools become more invasive, the State capability grows in kind. The tools should be licensed.

    Call the Police

    If your home was being burglarized, even a mild mannered person would call the police to arrest the criminal.

    • Report this to the FBI. In Weisburd's case, no one understood this in 2005. "Visit his local FBI field office online by clicking this link or telephone them at (816) 512-8200. Ask to speak with Special Agent Marshall Stone and ask them why they have not investigated Weisburd for online terrorism. Point out that their failure to prosecute Weisburd is an example of the FBI's current practice of not providing equal protection under the law, a violation of the US Constitution. Request information on how to file a formal complaint against Weisburd and follow through with the information."

     

    Must Read 4   Supported 3   Well Said 2  
    Rate It | View Ratings

    George Eliason Social Media Pages: Facebook page url on login Profile not filled in       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in

    George Eliason is an American journalist that lives and works in Donbass. He has been interviewed by and provided analysis for RT, the BBC, and Press-TV. His articles have been published in the Security Assistance Monitor, Washingtons Blog, (more...)
     

    Go To Commenting
    The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
    Writers Guidelines
    Contact AuthorContact Author Contact EditorContact Editor Author PageView Authors' Articles
    Support OpEdNews

    OpEdNews depends upon can't survive without your help.

    If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

    STAY IN THE KNOW
    If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
    Daily Weekly     OpEdNews Newsletter
    Name
    Email
       (Opens new browser window)
     

    Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

    The Nazis Even Hitler Was Afraid of

    Ukraine: Notes from the Southeast

    Odessa-- the First Pogrom-- The Obama Genocide

    Ukraine- Kiev's Genocide: What's Happening in Slovyansk

    Ukraine -- Kievs War | The Heroes of Novo Russia

    Zaporozhye Nuclear Problem may be even Scarier

    To View Comments or Join the Conversation: