{"id":5769,"date":"2009-06-13T07:36:51","date_gmt":"2009-06-13T06:36:51","guid":{"rendered":"http:\/\/rinf.com\/alt-news\/?p=5769"},"modified":"2009-06-13T07:36:51","modified_gmt":"2009-06-13T06:36:51","slug":"pentagon-cyber-command-threat-to-civil-liberties","status":"publish","type":"post","link":"https:\/\/rinf.com\/alt-news\/surveillance-big-brother\/pentagon-cyber-command-threat-to-civil-liberties\/","title":{"rendered":"Pentagon Cyber Command threat to civil liberties"},"content":{"rendered":"<p>The Obama administration\u2019s plan to create a Pentagon Cyber Command to conduct both defensive and offensive cyberwarfare is arousing concern about potential threats to privacy and civil liberties.<\/p>\n<p>A new <a href=\"http:\/\/www.nytimes.com\/2009\/06\/13\/us\/politics\/13cyber.html?_r=1&amp;partner=rss&amp;emc=rss\">report<\/a> in the <em>New York Times<\/em> warns that even though President Obama has promised that protections will be built into the cyberdefense strategy, such protections will be difficult to implement in practice.<\/p>\n<p>\u201cMuch of the new military command\u2019s work is expected to be carried out by the National Security Agency, whose role in intercepting the domestic end of international calls and e-mail messages after the Sept. 11, 2001, attacks, under secret orders issued by the Bush administration, has already generated intense controversy,\u201d the <em>Times<\/em> explains. \u201cThere is simply no way, the officials say, to effectively conduct computer operations without entering networks inside the United States, where the military is prohibited from operating, or traveling electronic paths through countries that are not themselves American targets.\u201d<\/p>\n<p>The establishment of a Cyber Command first became a source of controversy when it was <a href=\"http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2009\/04\/22\/AR2009042200029.html\">announced<\/a> in April. One of the most chilling assessments was in an <a href=\"http:\/\/www.globalresearch.ca\/index.php?context=va&amp;aid=13354\">article<\/a> at GlobalResearch, which spoke of \u201cbillions of dollars already spent on a score of top secret initiatives, included those hidden within Pentagon Special Access (SAP) or black programs\u201d and warned direly that \u201cNSA has positioned itself to seize near total control over the country\u2019s electronic infrastructure, thereby exerting an intolerable influence\u2014and chilling effect\u2014over the nation\u2019s political life.\u201d<\/p>\n<p>Although the article\u2019s conclusion that cybersecurity is nothing more than a \u201ceuphemism for keeping the rabble in line\u201d is not widely shared, even the experts interviewed by the <em>Times<\/em> expressed unusually strong fears of a threat to civil liberties.<\/p>\n<p>Peace activist Frida Berrigan \u2013 the daughter of renowned Vietnam War protester Philip Berrigan \u2013 told the <em>Times<\/em> of her concern that \u201cif the Pentagon and the military services see cyberspace as a battlefield domain, then the lines protecting privacy and our civil liberties get blurred very, very quickly.\u201d<\/p>\n<p>Even defense expert Maren Leed \u2013 a former assistant to the vice chairman of the Joint Chiefs of Staff \u2013 suggested that a broad national debate should be undertaken to define the line between acceptable and unacceptable intrusions into email and other private information. Leed emphasized that although the military and intelligence agencies may be best equipped to detect and ward off cyberattacks, \u201cthey are not the best suited, from a civil liberties perspective, to take on that responsibility.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Obama administration\u2019s plan to create a Pentagon Cyber Command to conduct both defensive and offensive cyberwarfare is arousing concern about potential threats to privacy and civil liberties. A new report in the New York Times warns that even though President Obama has promised that protections will be built into the cyberdefense strategy, such protections [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1614],"tags":[],"class_list":{"0":"post-5769","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-surveillance-big-brother"},"_links":{"self":[{"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/5769","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/comments?post=5769"}],"version-history":[{"count":0,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/5769\/revisions"}],"wp:attachment":[{"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media?parent=5769"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/categories?post=5769"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/tags?post=5769"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}