Back   OpEd News
Font
PageWidth
Original Content at
https://www.opednews.com/articles/Get-Ready-for-Digital-Fals-by-Rob-Kall-110531-128.html
(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).

May 31, 2011

Get Ready for Digital False Flag Attacks

By Rob Kall

The US has a history of false flag attacks being used as excuses to start wars. The problem is, to be effective, false flag attacks require bombs, blood, death... Now, the Wall Street Journal reports in a top headline article, that the US is working on developing a policy that defines cyber attacks-- hacks, computer sabotage-- which cause damage or death, including damage to our economy, as acts of war.

::::::::

The US has a history of false flag attacks being used as excuses to start wars. The problem is, to be effective, false flag attacks require bombs, blood, death... 

Now, the Wall Street Journal reports in a top headline, front page article,  Cyber CombatAct of War, that the US is working on developing a policy that defines cyber attacks-- hacks, computer sabotage-- which cause damage or death, including damage to our economy, as acts of war. 
One idea gaining momentum at the Pentagon is the notion of "equivalence." If a cyber attack produces the death, damage, destruction or high-level disruption that a traditional military attack would cause, then it would be a candidate for a "use of force" consideration, which could merit retaliation.

The article reports that the military will consider such acts to be cause to retaliate with military, hard weapon attacks. 

In part, the Pentagon intends its plan as a warning to potential adversaries of the consequences of attacking the U.S. in this way. "If you shut down our power grid, maybe we will put a missile down one of your smokestacks," said a military official.
With a recent history of attacks on Lockheed Martin, attacks on the banking system in Estonia, the use of the Stuxnet worm to destroy nuclear centrifuges in Iran, the idea of a cyber attack or hacking as an act of war is being codified. The US military is working with allies to define some of the parameters. 


But this policy will open up other possibilities as well, and make it much easier for the same kinds of people who use false flag attacks to start previous wars and conflicts.

I asked David Swanson, author of War Is A Lie, his take on this development. He replied:
Treating computer sabotage as war is another leap beyond treating the crimes of a terrorist group as war.  It opens the door to wars the Pentagon wanted anyway.  The Pentagon will not be going into wars it opposes and wants to avoid, even if there is a "cyber-attack" to respond to.  The Pentagon will, however, jump at any justification for a war it already wanted.  And this, of course, makes more likely the provocation of computer sabotage, the faking of computer sabotage, and/or the accidental misinterpretation of computer sabotage.  Given how many accidents have nearly taken us into nuclear war over the decades, do we really want this door opened?
But here's the catch: it doesn't matter what we want.  The Pentagon openly tells the President how many troops to escalate or withdraw.  The CIA openly tells the President what war crimes must not be prosecuted.  We have special forces in many countries and a war in Libya, completely outside any rule of law.  The Defense Authorization Act of 2012 that passed the House on Thursday and now goes to the Senate unconstitutionally gives the President the "legal" power to make war almost anywhere anytime.  A President/Pentagon with that power will feel itself entitled to launch wars on the flimsiest of justifications.  Assertions that a "cyber war" has been started by someone else whose nation must now be bombed or occupied will be no more verifiable by the American public or the Congress than the official outputs of electronic voting machines.  Nothing good can come of this.
Let's be clear that the military is talking about defining cyber aggression that causes financial damage a comparable to something like a naval blockade that causes financial damage. The theory is that both would be seen as acts of war that would warrant violent military attacks, with firepower. 


I also asked former CIA analyst Ray McGovern for his take on this development. Here's his reply:

Smokestacks?  At last count, China has 3,456,962 smokestacks; Iran only 1,298,135.  And there are countless other possible enemies with equally countless smokestacks. This means, of course, the U.S. war industry will have to get busy producing at least as many missiles, drones, etc. to do the job.  It will be expensive, but other priorities will have to wait.  This will make us all much more secure.  Right.

And how will we know about who attacked us and which country must be held responsible.  No problem.  UIF Gen. Keith Alexander, who leads not only the National Security Agency but also the new Pentagon agency on cyber warfare, can be counted on not only to serve up pure, unadulterated intelligence, but to carry out cyber countermeasures.  UIF?  It stands for "un-indicted felon."  It is a felony to lie to Congress -- the more so in violation of a formal oath to uphold the Constitution in discharge of one's official duties.  And that is precisely what Gen. Alexander did.  It is no secret.
Alexander lied to House Intelligence Committee member Rush Holt (D-NJ) in December 2005 when Holt asked him directly whether NSA was taking part in warrantless eavesdropping on American citizens.  Unfortunately for Alexander, the New York Times published the true story just days later.  At the time Congresman Holt reportedly declared that he would see to it that Alexander would never be promoted.
So who's afraid of Congress?  Far from being reprimanded, Alexander got his fourth star AND a new, highly sensitive agency to head.  So relax, fellow Americans, we are all safe in his hands.
Will this new policy lead to new conspiracy theories? Undoubtedly. The problem is, the worst damage will be done by the "conspiracy theories" that the military and the White House define as real Digital attacks. 

Yes. It is absolutely necessary to develop policies for dealing with and more important, preventing cyber attacks of all kinds. But it is difficult to imagine ANY circumstance where a cyber-attack would justify an armed weapons attack. There is such a huge risk that the wrong perpetrator will be accused, for one thing, and we have seen again and again that revenge does not help. 






Authors Bio:

Rob Kall is an award winning journalist, inventor, software architect,
connector and visionary. His work and his writing have been featured in the New York Times, the Wall Street Journal, CNN, ABC, the HuffingtonPost, Success, Discover and other media.


Check out his platform at RobKall.com


He is the author of The Bottom-up Revolution; Mastering the Emerging World of Connectivity


He's given talks and workshops to Fortune
500 execs and national medical and psychological organizations, and pioneered
first-of-their-kind conferences in Positive Psychology, Brain Science and
Story. He hosts some of the world's smartest, most interesting and powerful
people on his Bottom Up Radio Show,
and founded and publishes one of the top Google- ranked progressive news and
opinion sites, OpEdNews.com


more detailed bio:


Rob Kall has spent his adult life as an awakener and empowerer-- first in the field of biofeedback, inventing products, developing software and a music recording label, MuPsych, within the company he founded in 1978-- Futurehealth, and founding, organizing and running 3 conferences: Winter Brain, on Neurofeedback and consciousness, Optimal Functioning and Positive Psychology (a pioneer in the field of Positive Psychology, first presenting workshops on it in 1985) and Storycon Summit Meeting on the Art Science and Application of Story-- each the first of their kind. Then, when he found the process of raising people's consciousness and empowering them to take more control of their lives one person at a time was too slow, he founded Opednews.com-- which has been the top search result on Google for the terms liberal news and progressive opinion for several years. Rob began his Bottom-up Radio show, broadcast on WNJC 1360 AM to Metro Philly, also available on iTunes, covering the transition of our culture, business and world from predominantly Top-down (hierarchical, centralized, authoritarian, patriarchal, big) to bottom-up (egalitarian, local, interdependent, grassroots, archetypal feminine and small.) Recent long-term projects include a book, Bottom-up-- The Connection Revolution, debillionairizing the planet and the Psychopathy Defense and Optimization Project.


Rob Kall Wikipedia Page


Rob Kall's Bottom Up Radio Show: Over 400 podcasts are archived for downloading here, or can be accessed from iTunes. Or check out my Youtube Channel


Rob Kall/OpEdNews Bottom Up YouTube video channel


Rob was published regularly on the Huffingtonpost.com for several years.


Rob is, with Opednews.com the first media winner of the Pillar Award for supporting Whistleblowers and the first amendment.


To learn more about Rob and OpEdNews.com, check out A Voice For Truth - ROB KALL | OM Times Magazine and this article.


For Rob's work in non-political realms mostly before 2000, see his C.V.. and here's an article on the Storycon Summit Meeting he founded and organized for eight years.


Press coverage in the Wall Street Journal: Party's Left Pushes for a Seat at the Table

Talk Nation Radio interview by David Swanson: Rob Kall on Bottom-Up Governance June, 2017

Here is a one hour radio interview where Rob was a guest- on Envision This, and here is the transcript..


To watch Rob having a lively conversation with John Conyers, then Chair of the House Judiciary committee, click here. Watch Rob speaking on Bottom up economics at the Occupy G8 Economic Summit, here.


Follow Rob on Twitter & Facebook.


His quotes are here

Rob's articles express his personal opinion, not the opinion of this website.


Join the conversation:


On facebook at Rob Kall's Bottom-up The Connection Revolution


and at Google Groups listserve Bottom-up Top-down conversation





Back