Re: Reaction commentary for guardiannews.com
Subject: Re: Reaction commentary for guardiannews.com
From: Barrett Brown <barriticus@gmail.com>
Date: 7/25/12, 19:47
To: Matt Seaton <matt.seaton@guardiannews.com>

This U.K. firm, which my group has been looking into since it was
caught having provided IT intrusion to Mubarak regime, has now been
shown to be involved in monitoring Bahrain activists, who have
themselves also been targeted via fake online personas by U.S.-based
Qorvis:

http://www.bloomberg.com/news/2012-07-25/cyber-attacks-on-activists-traced-to-finfisher-spyware-of-gamma.html

On Wed, Jul 11, 2012 at 9:58 AM, Matt Seaton
<matt.seaton@guardiannews.com> wrote:
nicely done; good comment

http://www.guardian.co.uk/commentisfree/2012/jul/11/cybersecurity-intelligence-community-nefarious-purposes

many thanks, Matt


On 11 July 2012 08:06, Matt Seaton <matt.seaton@guardiannews.com> wrote:

great, thanks, Barrett -- back to you shortly, M


On Wednesday, 11 July 2012, Barrett Brown wrote:

Matt-

Here's a revised version of the op-ed I sent last night; I thought my
original ending wasn't sufficiently clear, and have made some other
changes here and there.

**

The issue of cybersecurity makes difficult demands on those of us who
wish to understand it. It is not only complex, but growing quickly
more so as the “internetization” of mankind proceeds apace - and as
new opportunities for conflict, crime, oppression, and revolution are
conceived and executed by states and individuals acting on motivations
that are themselves similarly complex, and occasionally even
justifiable. Complexity aside, though, it is an issue that still
eludes popular understanding in part because certain parties do not
wish it to be understood.

John Arquilla, the US Naval Postgraduate School professor who coined
the term “cyberwarfare” and who recently spoke to this newspaper, is
not among them, having long sought to educate the public and influence
policymakers. In this week’s interview, he deemed the unusual vigor
with which the U.S. has prosecuted hackers to be “ridiculous,” citing
missed opportunities and a “poisoning” of the relationship between the
state and the hacker community that might represent missed
opportunities. Going further, he has proposed that the U.S. government
relax any restrictions that might prevent masterful hackers with
criminal histories from being utilized by the military and
intelligence communities.

Such a question is certainly worth pondering. Under other
circumstances, my answer would be “yes.” Redirecting talents used
wrongly and shifting them to purposes of good is a fine idea, one that
has been pursued with some success throughout history. That my answer
must be somewhat different than “yes” has a great deal to do with
those certain parties who would prefer that the issue not merely be
complex, but misunderstood - and who are firmly in charge of both
cybersecurity and cyberwarfare policy as practiced by the U.S.

Such men include former USAF Lt. Col. George A. Crawford, who wrote
the following in 2001:

Personnel skilled at conducting strategic information operations--to
include psychological operations, public information, deception, media
and computer network operations, and related activities - are
important for victory. Despite robust DoD and Intelligence Community
capabilities in this area, efforts to establish organizations that
focus information operations have not been viewed as a positive
development by the public or the media, who perceive
government-sponsored information efforts with suspicion. Consequently,
these efforts must take place away from public eyes.

Crawford now serves on the board of Archimedes Global
(http://wiki.echelon2.org/wiki/Archimedes_Global) - one of countless
intelligence contracting firms that provide a range of little-known
“information operations” services to the intelligence community. That
his opinion is representative of those men whose views actually become
policy becomes clear when we consider such things as the NSA
warrantless wiretapping program, along with other unprecedented
assaults on the U.S. Constitution which were intended to “take place
away from public eyes."

Of course, some large portion of what we refer to as “cybersecurity”
consists of legitimate defense of state and commercial assets in the
face of actual threats. In such cases, sound policy could certainly
include the utilization of former criminal hackers who bring needed
skill and insight to a necessary pursuit. But some other large portion
is instead geared towards the surveillance of the American public -
something that we know only because of the efforts of whistleblowers.
What we will never know is how much of U.S. cybersecurity consists of
the former category and how much consists of the latter. We may only
be certain that the latter will continue to expand, always under the
direction of men who hold the public in contempt. There is too much
power and money at stake for it to be otherwise, and too little
interest from the citizenry for the trend to be reversed.

In such a context as this, it becomes more difficult to advocate the
introduction of criminal talents into the mix of things - not
necessarily because of any threat the criminal may represent to the
enterprise, but because of the threat that the enterprise now
represents to the public.

On Tue, Jul 10, 2012 at 10:25 PM, Barrett Brown <barriticus@gmail.com>
wrote:
Sorry for the delay, just got into NYC today for
Bloomberg/Businessweek round table on security I'm participating in on
Thu and had to run around a bit this afteroon. Let me know if this
works, I'll be around in the morning otherwise.

**

The issue of cybersecurity makes difficult demands on those of us who
wish to understand it. It is not only complex, but growing quickly
more so as the “internetization” of mankind proceeds apace - and as
new opportunities for conflict, crime, oppression, and revolution are
conceived and executed by states and individuals acting on motivations
that are themselves similarly complex, and occasionally even
justifiable. Complexity aside, though, it is an issue that still
eludes popular understanding in part because certain parties do not
wish it to be understood.

John Arquilla, the US Naval Postgraduate School professor who coined
the term “cyberwarfare” and who recently spoke to this newspaper, is
not among them, having long sought to educate both the public and
influence policymakers. In this week’s interview, he deemed the
unusual vigor with which the U.S. has prosecuted hackers to be
“ridiculous,” citing missed opportunities and a “poisoning” of the
relationship between the state and the hacker community that might
represent missed opportunities. Going further, he has proposed that
the U.S. government relax any restrictions that might prevent
masterful hackers with criminal histories from being utilized by the
military and intelligence communities.

Such a question is certainly worth pondering. Under other
circumstances, my answer would be “yes.” Redirecting talents used
wrongly and shifting them to purposes of good is a fine idea, one that
has been pursued with some success throughout history. That my answer
is must be somewhat different than “yes” has a great deal to do with
those certain parties who would prefer that the issue not merely be
complex, but misunderstood - and who are firmly in charge of both
cybersecurity and cyberwarfare policy as practiced by the U.S.

Were Arquilla representative of those in charge of such things, we
could probably expect many cybercriminals to be safely and ethically
deployed against legitimate enemies of the U.S., or defending national
infrastructure. As things stand, they are more likely to be corrupted
by a mentality in which the citizenry must be deceived by powerful men
who knew better. This prevailing view is well-represented by former
USAF Lt. Col. George A. Crawford, who wrote in 2001:

Personnel skilled at conducting strategic information operations--to
include psychological operations, public information, deception, media
and computer network operations, and related activities - are
important for victory. Despite robust DoD and Intelligence Community
capabilities in this area, efforts to establish organizations that
focus information operations have not been viewed as a positive
development by the public or the media, who perceive
government-sponsored information efforts with suspicion. Consequently,
these efforts must take place away from public eyes.

Crawford now serves on the board of Archimedes Global - one of
countless intelligence contracting firms that provide a range of
little-known “information operations” services to the intelligence
community and private corporations. That his opinion is widely shared
among men of the sort whose views become policy by default may be
confirmed by such things as the NSA warrantless wiretapping program,
along with other unprecedented assaults on the U.S. Constitution which
were intended to “take place away from public eyes.”

That the benighted public has had the opportunity to understand this
particular aspect of cybersecurity was due to the heroic efforts of
whisteblowers, several of whom were thereafter raided by the FBI and
prosecuted by the Department of Justice. As such, they were literally
treated like criminals for acting like defenders of the public.

The question of whether actual criminals ought to be involved in
cybersecurity is difficult to answer when we cannot define the term
“criminal” with any clarity. It becomes far easier wh



--
Matt Seaton
Editor, Comment is free America
http://www.guardian.co.uk/commentisfree/us-edition
Tel: 212-584 9938
Cell: 646-532 8475
Skype: mattseaton
Twitter: @mattseaton





--
Matt Seaton
Editor, Comment is free America
http://www.guardian.co.uk/commentisfree/us-edition
Tel: 212-584 9938
Cell: 646-532 8475
Skype: mattseaton
Twitter: @mattseaton


Please consider the environment before printing this email.
------------------------------------------------------------------
Visit guardian.co.uk - newspaper of the year

www.guardian.co.uk    www.observer.co.uk     www.guardiannews.com

On your mobile, visit m.guardian.co.uk or download the Guardian
iPhone app www.guardian.co.uk/iphone

To save up to 30% when you subscribe to the Guardian and the Observer
visit www.guardian.co.uk/subscriber
---------------------------------------------------------------------
This e-mail and all attachments are confidential and may also
be privileged. If you are not the named recipient, please notify
the sender and delete the e-mail and all attachments immediately.
Do not disclose the contents to another person. You may not use
the information for any purpose, or store, or copy, it in any way.

Guardian News & Media Limited is not liable for any computer
viruses or other material transmitted with or as part of this
e-mail. You should employ virus checking software.

Guardian News & Media Limited

A member of Guardian Media Group plc
Registered Office
PO Box 68164
Kings Place
90 York Way
London
N1P 2AP

Registered in England Number 908396




-- Regards, Barrett Brown 512-560-2302