mirror of
https://github.com/nhammer514/textfiles-politics.git
synced 2025-08-01 18:46:06 -04:00
website major update
This commit is contained in:
parent
a19e773c99
commit
4021f27ae1
369 changed files with 380955 additions and 44498 deletions
468
docs/collection_raw/ntlguard.html
Normal file
468
docs/collection_raw/ntlguard.html
Normal file
|
@ -0,0 +1,468 @@
|
|||
<html xmlns="http://www.w3.org/1999/xhtml">
|
||||
<head>
|
||||
<title>ntlguard</title>
|
||||
<link rel="stylesheet" href="../CSSstyle.css"/>
|
||||
<!--Fill in your link line for CSS and JS in the XSLT here! -->
|
||||
</head>
|
||||
<body>
|
||||
<h1 id="title-index">ntlguard</h1>
|
||||
<div id="conspiracy">
|
||||
<p>
|
||||
|
||||
Subject: the national guards (military consolidating control of info and comm)
|
||||
Keywords: we don't appreciate how quickly our society is being locked up.</p>
|
||||
<p>
|
||||
the U.S. military is the lens focusing the agendas of the corporate states
|
||||
of 'murka. the following article is already four and a half YEARS old.
|
||||
this piece is staggering in its implications. the high-tech gulf war show
|
||||
provided us with just a hint of what is coming. you can be sure the progs
|
||||
described below have only become MUCH more endemic, *regardless* of the
|
||||
current "the cold war's over" mantra we are daily being subjected to. it
|
||||
certainly doesn't help to have a state press obediently parroting the latest
|
||||
official mythologies daily being dished up. so honestly, what's it going to
|
||||
take for people to stand up and put themselves on the line to stop this
|
||||
brand of spreading totalitarian democracy? their own complete enslavement?
|
||||
by that time it'll be just too damn late. (and people balk at the idea
|
||||
that Kennedy was killed by a military coup d'etat...) --ratitor</p>
|
||||
<p>
|
||||
excerpts from "THE NATIONAL GUARDS"
|
||||
(C) 1987 OMNI MAGAZINE, MAY 1987</p>
|
||||
<p>
|
||||
These attempts to keep unclassified data out of the hands of
|
||||
scientists, researchers, the news media, and the public at large are a
|
||||
part of an alarming trend that has seen the military take an ever-increasing role in controlling the flow of information and
|
||||
communications through American society, a role traditionally -- and
|
||||
almost exclusively -- left to civilians. Under the approving gaze of
|
||||
the <span class="PERSON" title="PERSON">Reagan</span> administration, Department of Defense (DoD) officials have
|
||||
quietly implemented a number of policies, decisions, and orders that
|
||||
give the military unprecedented control over both the content and
|
||||
public use of data and communications. . . .
|
||||
Mead Data Central -- which runs some of the nation's largest
|
||||
computer databases, such as Lexis and Nexis, and has nearly 200000
|
||||
users -- says it has already been approached by a team of agents from
|
||||
the Air Force and officials from the <span class="ORG" title="ORG">CIA</span> and the <span class="ORG" title="ORG">FBI</span> who asked for the
|
||||
names of subscribers and inquired what Mead officials might do if
|
||||
information restrictions were imposed. In response to government
|
||||
pressure, Mead Data Central in effect censured itself. It purged all
|
||||
unclassified government-supplied technical data from its system and
|
||||
completely dropped the National Technical Information System from its
|
||||
database rather than risk a confrontation.
|
||||
Representative Jack Brooks, a Texas Democrat who chairs the House
|
||||
Government Operations Committee, is an outspoken critic of the NSA's
|
||||
role in restricting civilian information. He notes that in 1985 the
|
||||
NSA -- under the authority granted by NSDD 145 -- investigated a
|
||||
computer program that was widely used in both local and federal
|
||||
elections in 1984. The computer system was used to count more than one
|
||||
third of all votes cast in the United States. While probing the
|
||||
system's vulnerability to outside manipulation, the NSA obtained a
|
||||
detailed knowledge of that computer program. "In my view," Brooks
|
||||
says, "this is an unprecedented and ill-advised expansion of the
|
||||
military's influence in our society."</p>
|
||||
<p>
|
||||
========================================================
|
||||
ORIGIN: ParaNet Information Service BBS
|
||||
CONTRIBUTED TO PARANET BY: Donald Goldberg
|
||||
========================================================</p>
|
||||
<p>
|
||||
THE NATIONAL GUARDS
|
||||
(C) 1987 OMNI MAGAZINE, MAY 1987
|
||||
(Reprinted with permission and license to
|
||||
ParaNet Information Service and its affiliates.)</p>
|
||||
<p>By Donald Goldberg</p>
|
||||
<p>
|
||||
The mountains bend as the fjord and the sea beyond stretch out
|
||||
before the viewer's eyes. First over the water, then a sharp left
|
||||
turn, then a bank to the right between the peaks, and the secret naval
|
||||
base unfolds upon the screen.
|
||||
The scene is of a Soviet military installation on the Kola
|
||||
Peninsula in the icy Barents Sea, a place usually off-limits to the
|
||||
gaze of the Western world. It was captured by a small French satellite
|
||||
called SPOT Image, orbiting at an altitude of 517 miles above the
|
||||
hidden <span class="NORP" title="NORP">Russian</span> outpost. On each of several passes -- made over a two-week period last fall -- the satellite's high-resolution lens took
|
||||
its pictures at a different angle; the images were then blended into a
|
||||
three-dimensional, computer-generated video. Buildings, docks,
|
||||
vessels, and details of the Arctic landscape are all clearly visible.
|
||||
Half a world away and thousands of feet under the sea, sparkling-clear images are being made of the ocean floor. Using the latest
|
||||
bathymetric technology and state-of-the-art systems known as Seam Beam
|
||||
and Hydrochart, researchers are for the first time assembling detailed
|
||||
underwater maps of the continental shelves and the depths of the
|
||||
world's oceans. These scenes of the sea are as sophisticated as the
|
||||
photographs taken from the satellite.
|
||||
From the three-dimensional images taken far above the earth to the
|
||||
charts of the bottom of the oceans, these photographic systems have
|
||||
three things in common: They both rely on the latest technology to
|
||||
create accurate pictures never dreamed of even 25 years ago; they are
|
||||
being made widely available by commercial, nongovernmental
|
||||
enterprises; and the Pentagon is trying desperately to keep them from
|
||||
the general public.
|
||||
In 1985 the Navy classified the underwater charts, making them
|
||||
available only to approved researchers whose needs are evaluated on a
|
||||
case-by-case basis. Under a 1984 law the military has been given a say
|
||||
in what cameras can be licensed to be used on American satellites; and
|
||||
officials have already announced they plan to limit the quality and
|
||||
resolution of photos made available. The National Security Agency
|
||||
(NSA) -- the secret arm of the Pentagon in charge of gathering
|
||||
electronic intelligence as well as protecting sensitive U.S.
|
||||
communications -- has defeated a move to keep it away from civilian
|
||||
and commercial computers and databases.
|
||||
That attitude has outraged those concerned with the military's
|
||||
increasing efforts to keep information not only from the public but
|
||||
from industry experts, scientists, and even other government officials
|
||||
as well. "That's like classifying a road map for fear of invasion,"
|
||||
says Paul Wolff, assistant administrator for the National Oceanic and
|
||||
Atmospheric Administration, of the attempted restrictions.
|
||||
These attempts to keep unclassified data out of the hands of
|
||||
scientists, researchers, the news media, and the public at large are a
|
||||
part of an alarming trend that has seen the military take an ever-increasing role in controlling the flow of information and
|
||||
communications through American society, a role traditionally -- and
|
||||
almost exclusively -- left to civilians. Under the approving gaze of
|
||||
the <span class="PERSON" title="PERSON">Reagan</span> administration, Department of Defense (DoD) officials have
|
||||
quietly implemented a number of policies, decisions, and orders that
|
||||
give the military unprecedented control over both the content and
|
||||
public use of data and communications. For example:</p>
|
||||
<p>
|
||||
* The Pentagon has created a new category of
|
||||
"sensitive" but unclassified information that allows
|
||||
it to keep from public access huge quantities of data
|
||||
that were once widely accessible.</p>
|
||||
<p>* Defense Department officials have attempted to
|
||||
rewrite key laws that spell out when the president can
|
||||
and cannot appropriate private communications
|
||||
facilities.</p>
|
||||
<p>* The Pentagon has installed a system that enables it
|
||||
to seize control of the nation's entire communications
|
||||
network -- the phone system, data transmissions, and
|
||||
satellite transmissions of all kinds -- in the event
|
||||
of what it deems a "national emergency." As yet there
|
||||
is no single, universally agreed-upon definition of
|
||||
what constitutes such a state. Usually such an
|
||||
emergency is restricted to times of natural disaster,
|
||||
war, or when national security is specifically
|
||||
threatened. Now the military has attempted to redefine
|
||||
emergency.</p>
|
||||
<p>The point man in the Pentagon's onslaught on communications is
|
||||
Assistant Defense Secretary Donald C. Latham, a former NSA deputy
|
||||
chief. Latham now heads up an interagency committee in charge of
|
||||
writing and implementing many of the policies that have put the
|
||||
military in charge of the flow of civilian information and
|
||||
communication. He is also the architect of National Security Decision
|
||||
Directive 145 (NSDD 145), signed by Defense Secretary Caspar
|
||||
Weinberger in 1984, which sets out the national policy on
|
||||
telecommunications and computer-systems security.
|
||||
First NSDD 145 set up a steering group of top-level administration
|
||||
officials. Their job is to recommend ways to protect information that
|
||||
is unclassified but has been designated sensitive. Such information
|
||||
is held not only by government agencies but by private companies as
|
||||
well. And last October the steering group issued a memorandum that
|
||||
defined sensitive information and gave federal agencies broad new
|
||||
powers to keep it from the public.
|
||||
According to Latham, this new category includes such data as all
|
||||
medical records on government databases -- from the files of the
|
||||
National Cancer Institute to information on every veteran who has ever
|
||||
applied for medical aid from the Veterans Administration -- and all
|
||||
the information on corporate and personal taxpayers in the Internal
|
||||
Revenue Service's computers. Even agricultural statistics, he argues,
|
||||
can be used by a foreign power against the United States.
|
||||
In his oversize yet Spartan Pentagon office, Latham cuts anything
|
||||
but an intimidating figure. Articulate and friendly, he could pass for
|
||||
a network anchorman or a television game show host. When asked how the
|
||||
government's new definition of sensitive information will be used, he
|
||||
defends the necessity for it and tries to put to rest concerns about a
|
||||
new restrictiveness.
|
||||
"The debate that somehow the DoD and NSA are going to monitor or
|
||||
get into private databases isn't the case at all," Latham insists.
|
||||
"The definition is just a guideline, just an advisory. It does not
|
||||
give the DoD the right to go into private records."
|
||||
Yet the Defense Department invoked the NSDD 145 guidelines when it
|
||||
told the information industry it intends to restrict the sale of data
|
||||
that are now unclassified and publicly available from privately owned
|
||||
computer systems. The excuse if offered was that these data often
|
||||
include technical information that might be valuable to a foreign
|
||||
adversary like the Soviet Union.
|
||||
Mead Data Central -- which runs some of the nation's largest
|
||||
computer databases, such as Lexis and Nexis, and has nearly 200000
|
||||
users -- says it has already been approached by a team of agents from
|
||||
the Air Force and officials from the <span class="ORG" title="ORG">CIA</span> and the <span class="ORG" title="ORG">FBI</span> who asked for the
|
||||
names of subscribers and inquired what Mead officials might do if
|
||||
information restrictions were imposed. In response to government
|
||||
pressure, Mead Data Central in effect censured itself. It purged all
|
||||
unclassified government-supplied technical data from its system and
|
||||
completely dropped the National Technical Information System from its
|
||||
database rather than risk a confrontation.
|
||||
Representative Jack Brooks, a Texas Democrat who chairs the House
|
||||
Government Operations Committee, is an outspoken critic of the NSA's
|
||||
role in restricting civilian information. He notes that in 1985 the
|
||||
NSA -- under the authority granted by NSDD 145 -- investigated a
|
||||
computer program that was widely used in both local and federal
|
||||
elections in 1984. The computer system was used to count more than one
|
||||
third of all votes cast in the United States. While probing the
|
||||
system's vulnerability to outside manipulation, the NSA obtained a
|
||||
detailed knowledge of that computer program. "In my view," Brooks
|
||||
says, "this is an unprecedented and ill-advised expansion of the
|
||||
military's influence in our society."
|
||||
There are other NSA critics. "The computer systems used by counties
|
||||
to collect and process votes have nothing to do with national
|
||||
security, and I'm really concerned about the NSA's involvement," says
|
||||
Democratic congressman Dan Glickman of Kansas, chairman of the House
|
||||
science and technology subcommittee concerned with computer security.
|
||||
Also, under NSDD 145 the Pentagon has issued an order, virtually
|
||||
unknown to all but a few industry executives, that affects commercial
|
||||
communications satellites. The policy was made official by Defense
|
||||
Secretary Weinberger in June of 1985 and requires that all commercial
|
||||
satellite operators that carry such unclassified government data
|
||||
traffic as routine Pentagon supply information and payroll data (and
|
||||
that compete for lucrative government contracts) install costly
|
||||
protective systems on all satellites launched after 1990. The policy
|
||||
does not directly affect the data over satellite channels, but it does
|
||||
make the NSA privy to vital information about the essential signals
|
||||
needed to operate a satellite. With this information it could take
|
||||
control of any satellite it chooses.
|
||||
Latham insists this, too, is a voluntary policy and that only
|
||||
companies that wish to install protection will have their systems
|
||||
evaluated by the NSA. He also says industry officials are wholly
|
||||
behind the move, and argues that the protective systems are necessary.
|
||||
With just a few thousand dollars' worth of equipment, a disgruntled
|
||||
employee could interfere with a satellite's control signals and
|
||||
disable or even wipe out a hundred-million-dollar satellite carrying
|
||||
government information.
|
||||
At best, his comments are misleading. First, the policy is not
|
||||
voluntary. The NSA can cut off lucrative government contracts to
|
||||
companies that do not comply with the plan. The Pentagon alone spent
|
||||
more than a billion dollars leasing commercial satellite channels last
|
||||
year; that's a powerful incentive for business to cooperate.
|
||||
Second, the industry's support is anything but total. According to
|
||||
the minutes of one closed-door meeting between NSA officials -- along
|
||||
with representatives of other federal agencies -- and executives from
|
||||
AT&T, Comsat, GTE Sprint, and MCI, the executives neither supported
|
||||
the move nor believed it was necessary. The NSA defended the policy by
|
||||
arguing that a satellite could be held for ransom if the command and
|
||||
control links weren't protected. But experts at the meeting were
|
||||
skeptical.
|
||||
"Why is the threat limited to accessing the satellite rather than
|
||||
destroying it with lasers or high-powered signals?" one industry
|
||||
executive wanted to know.
|
||||
Most of the officials present objected to the high cost of
|
||||
protecting the satellites. According to a 1983 study made at the
|
||||
request of the Pentagon, the protection demanded by the NSA could add
|
||||
as much as $3 million to the price of a satellite and $1 million more
|
||||
to annual operating costs. Costs like these, they argue, could cripple
|
||||
a company competing against less expensive communications networks.
|
||||
Americans get much of their information through forms of electronic
|
||||
communications, from the telephone, television and radio, and
|
||||
information printed in many newspapers. Banks send important financial
|
||||
data, businesses their spreadsheets, and stockbrokers their investment
|
||||
portfolios, all over the same channels, from satellite signals to
|
||||
computer hookups carried on long distance telephone lines. To make
|
||||
sure that the federal government helped to promote and protect the
|
||||
efficient use of this advancing technology, Congress passed the
|
||||
massive Communications Act of of 1934. It outlined the role and laws
|
||||
of the communications structure in the United States.
|
||||
The powers of the president are set out in Section 606 of that law;
|
||||
basically it states that he has the authority to take control of any
|
||||
communications facilities that he believes "essential to the national
|
||||
defense." In the language of the trade this is known as a 606
|
||||
emergency.
|
||||
There have been a number of attempts in recent years by Defense
|
||||
Department officials to redefine what qualifies as a 606 emergency and
|
||||
make it easier for the military to take over national communications.
|
||||
In 1981 the Senate considered amendments to the 1934 act that would
|
||||
allow the president, on Defense Department recommendation, to require
|
||||
any communications company to provide services, facilities, or
|
||||
equipment "to promote the national defense and security or the
|
||||
emergency preparedness of the nation," even in peacetime and without a
|
||||
declared state of emergency. The general language had been drafted by
|
||||
Defense Department officials. (The bill failed to pass the House for
|
||||
unrelated reasons.)
|
||||
"I think it is quite clear that they have snuck in there some
|
||||
powers that are dangerous for us as a company and for the public at
|
||||
large," said MCI vice president Kenneth Cox before the Senate vote.
|
||||
Since President <span class="PERSON" title="PERSON">Reagan</span> took office, the Pentagon has stepped up its
|
||||
efforts to rewrite the definition of national emergency and give the
|
||||
military expanded powers in the United States. "The declaration of
|
||||
'emergency' has always been vague," says one former administration
|
||||
official who left the government in 1982 after ten years in top policy
|
||||
posts. "Different presidents have invoked it differently. This
|
||||
administration would declare a convenient 'emergency.'" In other
|
||||
words, what is a nuisance to one administration might qualify as a
|
||||
burgeoning crisis to another. For example, the <span class="PERSON" title="PERSON">Reagan</span> administration
|
||||
might decide that a series of protests on or near military bases
|
||||
constituted a national emergency.
|
||||
Should the Pentagon ever be given the green light, its base for
|
||||
taking over the nation's communications system would be a nondescript
|
||||
yellow brick building within the maze of high rises, government
|
||||
buildings, and apartment complexes that make up the Washington suburb
|
||||
of Arlington, Virginia. Headquartered in a dusty and aging structure
|
||||
surrounded by a barbed-wire fence is an obscure branch of the military
|
||||
known as the Defense Communications Agency (DCA). It does not have the
|
||||
spit and polish of the National Security Agency or the dozens of other
|
||||
government facilities that make up the nation's capital. But its lack
|
||||
of shine belies its critical mission: to make sure all of America's
|
||||
far-flung military units can communicate with one another. It is in
|
||||
certain ways the nerve center of our nation's defense system.
|
||||
On the second floor of the DCA's four-story headquarters is a new
|
||||
addition called the National Coordinating Center (NCC). Operated by
|
||||
the Pentagon, it is virtually unknown outside of a handful of industry
|
||||
and government officials. The NCC is staffed around the clock by
|
||||
representatives of a dozen of the nation's largest commercial
|
||||
communications companies -- the so-called "common carriers" --
|
||||
including AT&T, MCI, GTE, Comsat, and ITT. Also on hand are officials
|
||||
from the State Department, the <span class="ORG" title="ORG">CIA</span>, the Federal Aviation
|
||||
Administration, and a number of other federal agencies. During a 606
|
||||
emergency the Pentagon can order the companies that make up the
|
||||
National Coordinating Center to turn over their satellite, fiberoptic,
|
||||
and land-line facilities to the government.
|
||||
On a long corridor in the front of the building is a series of
|
||||
offices, each outfitted with a private phone, a telex machine, and a
|
||||
combination safe. It's known as "logo row" because each office is
|
||||
occupied by an employee from one of the companies that staff the NCC
|
||||
and because their corporate logos hand on the wall outside. Each
|
||||
employee is on permanent standby, ready to activate his company's
|
||||
system should the Pentagon require it.
|
||||
The National Coordinating Center's mission is as grand as its title
|
||||
is obscure: to make available to the Defense Department all the
|
||||
facilities of the civilian communications network in this country --
|
||||
the phone lines, the long-distance satellite hookups, the data
|
||||
transmission lines -- in times of national emergency. If war breaks
|
||||
out and communications to a key military base are cut, the Pentagon
|
||||
wants to make sure that an alternate link can be set up as fast as
|
||||
possible. Company employees assigned to the center are on call 24
|
||||
hours a day; they wear beepers outside the office, and when on
|
||||
vacation they must be replaced by qualified colleagues.
|
||||
The center formally opened on New Year's Day, 1984, the same day Ma
|
||||
Bell's monopoly over the telephone network of the entire United States
|
||||
was finally broken. The timing was no coincidence. Pentagon officials
|
||||
had argued for years along with AT&T against the divestiture of Ma
|
||||
Bell, on grounds of national security. Defense Secretary Weinberger
|
||||
personally urged the attorney general to block the lawsuit that
|
||||
resulted in the breakup, as had his predecessor, Harold Brown. The
|
||||
reason was that rather than construct its own communications network,
|
||||
the Pentagon had come to rely extensively on the phone company. After
|
||||
the breakup the dependence continued. The Pentagon still used
|
||||
commercial companies to carry more than 90 percent of its
|
||||
communications within the continental United States.
|
||||
The 1984 divestiture put an end to AT&T's monopoly over the
|
||||
nation's telephone service and increased the Pentagon's obsession with
|
||||
having its own nerve center. Now the brass had to contend with several
|
||||
competing companies to acquire phone lines, and communications was
|
||||
more than a matter of running a line from one telephone to another.
|
||||
Satellites, microwave towers, fiberoptics, and other technological
|
||||
breakthroughs never dreamed of by Alexander Graham Bell were in
|
||||
extensive use, and not just for phone conversations. Digital data
|
||||
streams for computers flowed on the same networks.
|
||||
These facts were not lost on the Defense Department or the White
|
||||
House. According to documents obtained by "Omni," beginning on December
|
||||
14, 1982, a number of secret meetings were held between high-level
|
||||
administration officials and executives of the commercial
|
||||
communications companies whose employees would later staff the
|
||||
National Coordinating Center. The meetings, which continued over the
|
||||
next three years, were held at the White House, the State Department,
|
||||
the Strategic Air Command (SAC) headquarters at Offutt Air Force Base
|
||||
in Nebraska, and at the <span class="LOC" title="LOC">North Command</span>
|
||||
(NORAD) in Colorado Springs.
|
||||
The industry officials attending constituted the National Security
|
||||
Telecommunications Advisory Committee -- called <span class="ORG" title="ORG">NSTAC</span> (pronounced N-stack) -- set up by President <span class="PERSON" title="PERSON">Reagan</span> to address those same problems
|
||||
that worried the Pentagon. It was at these secret meetings, according
|
||||
to the minutes, that the idea of a communications watch center for
|
||||
national emergencies -- the NCC -- was born. Along with it came a
|
||||
whole set of plans that would allow the military to take over
|
||||
commercial communications "assets" -- everything from ground stations
|
||||
and satellite dishes to fiberoptic cables -- across the country.
|
||||
At a 1983 Federal Communications Commission meeting, a ranking
|
||||
Defense Department official offered the following explanation for the
|
||||
founding of the National Coordinating Center: "We are looking at
|
||||
trying to make communications endurable for a protracted conflict."
|
||||
The phrase protracted conflict is a military euphemism for nuclear
|
||||
war.
|
||||
But could the NCC survive even the first volley in such a conflict?
|
||||
Not likely. It's located within a mile of the Pentagon, itself an
|
||||
obvious early target of a Soviet nuclear barrage (or a conventional
|
||||
strike, for that matter). And the Kremlin undoubtedly knows its
|
||||
location and importance, and presumably has included it on its
|
||||
priority target list. In sum, according to one Pentagon official, "The
|
||||
NCC itself is not viewed as a survivable facility."
|
||||
Furthermore, the NCC's "Implementation Plan," obtained by "Omni,"
|
||||
lists four phases of emergencies and how the center should respond to
|
||||
each. The first, Phase 0, is Peacetime, for which there would be
|
||||
little to do outside of a handful of routine tasks and exercises.
|
||||
Phase 1 is Pre Attack, in which alternate NCC sites are alerted. Phase
|
||||
2 is Post Attack, in which other NCC locations are instructed to take
|
||||
over the center's functions. Phase 3 is known as Last Ditch, and in
|
||||
this phase whatever facility survives becomes the de facto NCC.
|
||||
So far there is no alternate National Coordinating Center to which
|
||||
NCC officials could retreat to survive an attack. According to NCC
|
||||
deputy director William Belford, no physical sites have yet been
|
||||
chosen for a substitute NCC, and even whether the NCC itself will
|
||||
survive a nuclear attack is still under study.
|
||||
Of what use is a communications center that is not expected to
|
||||
outlast even the first shots of a war and has no backup?
|
||||
The answer appears to be that because of the Pentagon's concerns
|
||||
about the AT&T divestiture and the disruptive effects it might have on
|
||||
national security, the NCC was to serve as the military's peacetime
|
||||
communications center.
|
||||
The center is a powerful and unprecedented tool to assume control
|
||||
over the nation's vast communications and information network. For
|
||||
years the Pentagon has been studying how to take over the common
|
||||
carriers' facilities. That research was prepared by <span class="ORG" title="ORG">NSTAC</span> at the DoD's
|
||||
request and is contained in a series of internal Pentagon documents
|
||||
obtained by "Omni." Collectively this series is known as the Satellite
|
||||
Survivability Report. Completed in 1984, it is the only detailed
|
||||
analysis to date of the vulnerabilities of the commercial satellite
|
||||
network. It was begun as a way of examining how to protect the network
|
||||
of communications facilities from attack and how to keep it intact for
|
||||
the DoD.
|
||||
A major part of the report also contains an analysis of how to make
|
||||
commercial satellites "interoperable" with Defense Department systems.
|
||||
While the report notes that current technical differences such as
|
||||
varying frequencies make it difficult for the Pentagon to use
|
||||
commercial satellites, it recommends ways to resolve those problems.
|
||||
Much of the report is a veritable blueprint for the government on how
|
||||
to take over satellites in orbit above the United States. This
|
||||
information, plus NSDD 145's demand that satellite operators tell the
|
||||
NSA how their satellites are controlled, guarantees the military ample
|
||||
knowledge about operating commercial satellites.
|
||||
The Pentagon now has an unprecedented access to the civilian
|
||||
communications network: commercial databases, computer networks,
|
||||
electronic links, telephone lines. All it needs is the legal authority
|
||||
to use them. Then it could totally dominate the flow of all
|
||||
information in the United States. As one high-ranking White House
|
||||
communications official put it: "Whoever controls communications,
|
||||
controls the country." His remark was made after our State Department
|
||||
could not communicate directly with our embassy in Manila during the
|
||||
anti-Marcos revolution last year. To get through, the State
|
||||
Department had to relay all its messages through the Philippine
|
||||
government.
|
||||
Government officials have offered all kinds of scenarios to justify
|
||||
the National Coordinating Center, the Satellite Survivability Report,
|
||||
new domains of authority for the Pentagon and the NSA, and the
|
||||
creation of top-level government steering groups to think of even more
|
||||
policies for the military. Most can be reduced to the rationale that
|
||||
inspired NSDD 145: that our enemies (presumably the Soviets) have to
|
||||
be prevented from getting too much information from unclassified
|
||||
sources. And the only way to do that is to step in and take control of
|
||||
those sources.
|
||||
Remarkably, the communications industry as a whole has not been
|
||||
concerned about the overall scope of the Pentagon's threat to its
|
||||
freedom of operation. Most protests have been to individual government
|
||||
actions. For example, a media coalition that includes the Radio-Television Society of Newspaper Editors, and the Turner Broadcasting
|
||||
System has been lobbying that before the government can restrict the
|
||||
use of satellites, it must demonstrate why such restrictions protect
|
||||
against a "threat to distinct and compelling national security and
|
||||
foreign policy interests." But the whole policy of restrictiveness has
|
||||
not been examined. That may change sometime this year, when the Office
|
||||
of Technology Assessment issues a report on how the Pentagon's policy
|
||||
will affect communications in the United States. In the meantime the
|
||||
military keeps trying to encroach on national communications.
|
||||
While it may seem unlikely that the Pentagon will ever get total
|
||||
control of our information and communications systems, the truth is
|
||||
that it can happen all too easily. The official mechanisms are already
|
||||
in place; and few barriers remain to guarantee that what we hear, see,
|
||||
and read will come to us courtesy of our being members of a free and
|
||||
open society and not courtesy of the Pentagon.</p>
|
||||
<p>
|
||||
=============================================================================
|
||||
=============================================================================</p>
|
||||
<p>Black Crawling Systems @ V0iD Information Archives</p>
|
||||
<p>( 6 1 7 ) 4 8 2 - 6 3 5 6</p>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
Loading…
Add table
Add a link
Reference in a new issue