Share on Google Plus Share on Twitter 4 Share on Facebook Share on LinkedIn Share on PInterest Share on Fark! Share on Reddit Share on StumbleUpon Tell A Friend 11 (15 Shares)  

Printer Friendly Page Save As Favorite View Favorites (# of views)   45 comments
OpEdNews Op Eds

Get Ready for Digital False Flag Attacks

By   Follow Me on Twitter     Message Rob Kall     Permalink
      (Page 1 of 1 pages)
Related Topic(s): ; ; ; ; ; ; , Add Tags Add to My Group(s)

Must Read 7   Well Said 7   Supported 4  
View Ratings | Rate It

opednews.com Headlined to H2 5/31/11

Become a Fan
  (308 fans)
- Advertisement -
The US has a history of false flag attacks being used as excuses to start wars. The problem is, to be effective, false flag attacks require bombs, blood, death... 

Now, the Wall Street Journal reports in a top headline, front page article,  Cyber CombatAct of War, that the US is working on developing a policy that defines cyber attacks-- hacks, computer sabotage-- which cause damage or death, including damage to our economy, as acts of war. 
- Advertisement -
One idea gaining momentum at the Pentagon is the notion of "equivalence." If a cyber attack produces the death, damage, destruction or high-level disruption that a traditional military attack would cause, then it would be a candidate for a "use of force" consideration, which could merit retaliation.

The article reports that the military will consider such acts to be cause to retaliate with military, hard weapon attacks. 

- Advertisement -
In part, the Pentagon intends its plan as a warning to potential adversaries of the consequences of attacking the U.S. in this way. "If you shut down our power grid, maybe we will put a missile down one of your smokestacks," said a military official.
With a recent history of attacks on Lockheed Martin, attacks on the banking system in Estonia, the use of the Stuxnet worm to destroy nuclear centrifuges in Iran, the idea of a cyber attack or hacking as an act of war is being codified. The US military is working with allies to define some of the parameters. 


But this policy will open up other possibilities as well, and make it much easier for the same kinds of people who use false flag attacks to start previous wars and conflicts.

- Advertisement -
I asked David Swanson, author of War Is A Lie, his take on this development. He replied:
Treating computer sabotage as war is another leap beyond treating the crimes of a terrorist group as war.  It opens the door to wars the Pentagon wanted anyway.  The Pentagon will not be going into wars it opposes and wants to avoid, even if there is a "cyber-attack" to respond to.  The Pentagon will, however, jump at any justification for a war it already wanted.  And this, of course, makes more likely the provocation of computer sabotage, the faking of computer sabotage, and/or the accidental misinterpretation of computer sabotage.  Given how many accidents have nearly taken us into nuclear war over the decades, do we really want this door opened?
But here's the catch: it doesn't matter what we want.  The Pentagon openly tells the President how many troops to escalate or withdraw.  The CIA openly tells the President what war crimes must not be prosecuted.  We have special forces in many countries and a war in Libya, completely outside any rule of law.  The Defense Authorization Act of 2012 that passed the House on Thursday and now goes to the Senate unconstitutionally gives the President the "legal" power to make war almost anywhere anytime.  A President/Pentagon with that power will feel itself entitled to launch wars on the flimsiest of justifications.  Assertions that a "cyber war" has been started by someone else whose nation must now be bombed or occupied will be no more verifiable by the American public or the Congress than the official outputs of electronic voting machines.  Nothing good can come of this.
Let's be clear that the military is talking about defining cyber aggression that causes financial damage a comparable to something like a naval blockade that causes financial damage. The theory is that both would be seen as acts of war that would warrant violent military attacks, with firepower. 


I also asked former CIA analyst Ray McGovern for his take on this development. Here's his reply:

Smokestacks?  At last count, China has 3,456,962 smokestacks; Iran only 1,298,135.  And there are countless other possible enemies with equally countless smokestacks. This means, of course, the U.S. war industry will have to get busy producing at least as many missiles, drones, etc. to do the job.  It will be expensive, but other priorities will have to wait.  This will make us all much more secure.  Right.

And how will we know about who attacked us and which country must be held responsible.  No problem.  UIF Gen. Keith Alexander, who leads not only the National Security Agency but also the new Pentagon agency on cyber warfare, can be counted on not only to serve up pure, unadulterated intelligence, but to carry out cyber countermeasures.  UIF?  It stands for "un-indicted felon."  It is a felony to lie to Congress -- the more so in violation of a formal oath to uphold the Constitution in discharge of one's official duties.  And that is precisely what Gen. Alexander did.  It is no secret.
Alexander lied to House Intelligence Committee member Rush Holt (D-NJ) in December 2005 when Holt asked him directly whether NSA was taking part in warrantless eavesdropping on American citizens.  Unfortunately for Alexander, the New York Times published the true story just days later.  At the time Congresman Holt reportedly declared that he would see to it that Alexander would never be promoted.
So who's afraid of Congress?  Far from being reprimanded, Alexander got his fourth star AND a new, highly sensitive agency to head.  So relax, fellow Americans, we are all safe in his hands.
Will this new policy lead to new conspiracy theories? Undoubtedly. The problem is, the worst damage will be done by the "conspiracy theories" that the military and the White House define as real Digital attacks. 

Yes. It is absolutely necessary to develop policies for dealing with and more important, preventing cyber attacks of all kinds. But it is difficult to imagine ANY circumstance where a cyber-attack would justify an armed weapons attack. There is such a huge risk that the wrong perpetrator will be accused, for one thing, and we have seen again and again that revenge does not help. 




 

- Advertisement -

Must Read 7   Well Said 7   Supported 4  
View Ratings | Rate It

Rob Kall has spent his adult life as an awakener and empowerer-- first in the field of biofeedback, inventing products, developing software and a music recording label, MuPsych, within the company he founded in 1978-- Futurehealth, and founding, organizing and running 3 conferences: Winter Brain, on Neurofeedback and consciousness, Optimal Functioning and Positive Psychology (a pioneer in the field of Positive Psychology, first presenting workshops on it in 1985) and Storycon Summit Meeting on the Art Science and Application of Story-- each the first of their kind. Then, when he found the process of raising people's consciousness and empowering them to take more control of their lives one person at a time was too slow, he founded Opednews.com-- which has been the top search result on Google for the terms liberal news and progressive opinion for several years. Rob began his Bottom-up Radio show, broadcast on WNJC 1360 AM to Metro Philly, also available on iTunes, covering the transition of our culture, business and world from predominantly Top-down (hierarchical, centralized, authoritarian, patriarchal, big) to bottom-up (egalitarian, local, interdependent, grassroots, archetypal feminine and small.) Recent long-term projects include a book, Bottom-up-- The Connection Revolution, debillionairizing the planet and the Psychopathy Defense and Optimization Project.

Rob Kall Wikipedia Page

Rob Kall's Bottom Up Radio Show: Over 200 podcasts are archived for downloading here, or can be accessed from iTunes. Rob is also published regularly on the Huffingtonpost.com

Rob is, with (more...)
 

Share on Google Plus Submit to Twitter Add this Page to Facebook! Share on LinkedIn Pin It! Add this Page to Fark! Submit to Reddit Submit to Stumble Upon



Go To Commenting
/* The Petition Site */
The views expressed in this article are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.

Follow Me on Twitter

Contact AuthorContact Author Contact EditorContact Editor Author PageView Authors' Articles
- Advertisement -

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

A Conspiracy Conspiracy Theory

Debunking Hillary's Specious Winning the Popular Vote Claim

Terrifying Video: "I Don't Need a Warrant, Ma'am, Under Federal Law"

Hillary's Disingenuous Claim That She's Won 2.5 Million More Votes is Bogus. Here's why

Ray McGovern Discusses Brutal Arrest at Secretary Clinton's Internet Freedom Speech

Cindy Sheehan Bugged in Denver