mirror of
https://github.com/nhammer514/textfiles-politics.git
synced 2024-12-28 08:49:24 -05:00
473 lines
32 KiB
XML
473 lines
32 KiB
XML
<xml><p>
|
|
|
|
Subject: the national guards (military consolidating control of info and comm)
|
|
Keywords: we don't appreciate how quickly our society is being locked up.
|
|
|
|
|
|
the U.S. military is the lens focusing the agendas of the corporate states
|
|
of 'murka. the following article is already four and a half YEARS old.
|
|
this piece is staggering in its implications. the high-tech gulf war show
|
|
provided us with just a hint of what is coming. you can be sure the progs
|
|
described below have only become MUCH more endemic, *regardless* of the
|
|
current "the cold war's over" mantra we are daily being subjected to. it
|
|
certainly doesn't help to have a state press obediently parroting the latest
|
|
official mythologies daily being dished up. so honestly, what's it going to
|
|
take for people to stand up and put themselves on the line to stop this
|
|
brand of spreading totalitarian democracy? their own complete enslavement?
|
|
by that time it'll be just too damn late. (and people balk at the idea
|
|
that <ent type='PERSON'>Kennedy</ent> was killed by a military coup d'etat...) --ratitor
|
|
|
|
|
|
excerpts from "THE NATIONAL GUARDS"
|
|
(C) 1987 <ent type='ORG'>OMNI</ent> MAGAZINE, MAY 1987
|
|
|
|
|
|
These attempts to keep unclassified data out of the hands of
|
|
scientists, researchers, the news media, and the public at large are a
|
|
part of an alarming trend that has seen the military take an ever-increasing role in controlling the flow of information and
|
|
communications through <ent type='NORP'>American</ent> society, a role traditionally -- and
|
|
almost exclusively -- left to civilians. Under the approving gaze of
|
|
the Reagan administration, Department of <ent type='ORG'>Defense</ent> (DoD) officials have
|
|
quietly implemented a number of policies, decisions, and orders that
|
|
give the military unprecedented control over both the content and
|
|
public use of data and communications. . . .
|
|
<ent type='ORG'>Mead Data Central</ent> -- which runs some of the nation's largest
|
|
computer databases, such as <ent type='PERSON'>Lexis</ent> and <ent type='ORG'>Nexis</ent>, and has nearly 200000
|
|
users -- says it has already been approached by a team of agents from
|
|
<ent type='ORG'>the Air Force</ent> and officials from the <ent type='ORG'>CIA</ent> and the <ent type='ORG'>FBI</ent> who asked for the
|
|
names of subscribers and inquired what <ent type='PERSON'>Mead</ent> officials might do if
|
|
information restrictions were imposed. In response to government
|
|
pressure, <ent type='ORG'>Mead Data Central</ent> in effect censured itself. It purged all
|
|
unclassified government-supplied technical data from its system and
|
|
completely dropped <ent type='ORG'>the National Technical Information System</ent> from its
|
|
database rather than risk a confrontation.
|
|
Representative <ent type='PERSON'>Jack Brooks</ent>, a <ent type='GPE'>Texas</ent> <ent type='NORP'>Democrat</ent> who chairs the <ent type='ORG'>House</ent>
|
|
Government Operations Committee, is an outspoken critic of the NSA's
|
|
role in restricting civilian information. He notes that in 1985 the
|
|
<ent type='ORG'>NSA</ent> -- under the authority granted by <ent type='ORG'>NSDD</ent> 145 -- investigated a
|
|
computer program that was widely used in both local and federal
|
|
elections in 1984. The computer system was used to count more than one
|
|
third of all votes cast in <ent type='GPE'>the United</ent> States. While probing the
|
|
system's vulnerability to outside manipulation, the <ent type='ORG'>NSA</ent> obtained a
|
|
detailed knowledge of that computer program. "In my view," <ent type='ORG'>Brooks</ent>
|
|
says, "this is an unprecedented and ill-advised expansion of the
|
|
military's influence in our society."
|
|
|
|
|
|
========================================================
|
|
ORIGIN: ParaNet Information Service BBS
|
|
CONTRIBUTED TO PARANET BY: <ent type='PERSON'>Donald Goldberg</ent>
|
|
========================================================
|
|
|
|
|
|
THE NATIONAL GUARDS
|
|
(C) 1987 <ent type='ORG'>OMNI</ent> MAGAZINE, MAY 1987
|
|
(Reprinted with permission and license to
|
|
ParaNet Information Service and its affiliates.)
|
|
|
|
By <ent type='PERSON'>Donald Goldberg</ent>
|
|
|
|
|
|
The mountains bend as the fjord and the sea beyond stretch out
|
|
before the viewer's eyes. First over the water, then a sharp left
|
|
turn, then a bank to the right between the peaks, and the secret naval
|
|
base unfolds upon the screen.
|
|
The scene is of a <ent type='NORP'>Soviet</ent> military installation on the Kola
|
|
Peninsula in the icy <ent type='LOC'>Barents Sea</ent>, a place usually off-limits to the
|
|
gaze of the <ent type='NORP'>Western</ent> world. It was captured by a small <ent type='NORP'>French</ent> satellite
|
|
called SPOT Image, orbiting at an altitude of 517 miles above the
|
|
hidden <ent type='NORP'>Russian</ent> outpost. On each of several passes -- made over a two-week period last fall -- the satellite's high-resolution lens took
|
|
its pictures at a different angle; the images were then blended into a
|
|
three-dimensional, computer-generated video. Buildings, docks,
|
|
vessels, and details of the <ent type='LOC'>Arctic</ent> landscape are all clearly visible.
|
|
Half a world away and thousands of feet under the sea, sparkling-clear images are being made of the ocean floor. Using the latest
|
|
bathymetric technology and state-of-the-art systems known as <ent type='ORG'>Seam Beam</ent>
|
|
and <ent type='NORP'>Hydrochart</ent>, researchers are for the first time assembling detailed
|
|
underwater maps of the continental shelves and the depths of the
|
|
world's oceans. These scenes of the sea are as sophisticated as the
|
|
photographs taken from the satellite.
|
|
From the three-dimensional images taken far above the earth to the
|
|
charts of the bottom of the oceans, these photographic systems have
|
|
three things in common: They both rely on the latest technology to
|
|
create accurate pictures never dreamed of even 25 years ago; they are
|
|
being made widely available by commercial, nongovernmental
|
|
enterprises; and the <ent type='ORG'>Pentagon</ent> is trying desperately to keep them from
|
|
the general public.
|
|
In 1985 the <ent type='ORG'>Navy</ent> classified the underwater charts, making them
|
|
available only to approved researchers whose needs are evaluated on a
|
|
case-by-case basis. Under a 1984 law the military has been given a say
|
|
in what cameras can be licensed to be used on <ent type='NORP'>American</ent> satellites; and
|
|
officials have already announced they plan to limit the quality and
|
|
resolution of photos made available. <ent type='ORG'>The National Security Agency</ent>
|
|
(<ent type='ORG'>NSA</ent>) -- the secret arm of the <ent type='ORG'>Pentagon</ent> in charge of gathering
|
|
electronic intelligence as well as protecting sensitive U.S.
|
|
communications -- has defeated a move to keep it away from civilian
|
|
and commercial computers and databases.
|
|
That attitude has outraged those concerned with the military's
|
|
increasing efforts to keep information not only from the public but
|
|
from industry experts, scientists, and even other government officials
|
|
as well. "That's like classifying a road map for fear of invasion,"
|
|
says <ent type='PERSON'>Paul Wolff</ent>, assistant administrator for <ent type='ORG'>the National</ent> Oceanic and
|
|
Atmospheric Administration, of the attempted restrictions.
|
|
These attempts to keep unclassified data out of the hands of
|
|
scientists, researchers, the news media, and the public at large are a
|
|
part of an alarming trend that has seen the military take an ever-increasing role in controlling the flow of information and
|
|
communications through <ent type='NORP'>American</ent> society, a role traditionally -- and
|
|
almost exclusively -- left to civilians. Under the approving gaze of
|
|
the Reagan administration, Department of <ent type='ORG'>Defense</ent> (DoD) officials have
|
|
quietly implemented a number of policies, decisions, and orders that
|
|
give the military unprecedented control over both the content and
|
|
public use of data and communications. For example:
|
|
|
|
|
|
* The <ent type='ORG'>Pentagon</ent> has created a new category of
|
|
"sensitive" but unclassified information that allows
|
|
it to keep from public access huge quantities of data
|
|
that were once widely accessible.
|
|
|
|
* <ent type='ORG'>Defense Department</ent> officials have attempted to
|
|
rewrite key laws that spell out when the president can
|
|
and cannot appropriate private communications
|
|
facilities.
|
|
|
|
* The <ent type='ORG'>Pentagon</ent> has installed a system that enables it
|
|
to seize control of the nation's entire communications
|
|
network -- the phone system, data transmissions, and
|
|
satellite transmissions of all kinds -- in the event
|
|
of what it deems a "national emergency." As yet there
|
|
is no single, universally agreed-upon definition of
|
|
what constitutes such a state. Usually such an
|
|
emergency is restricted to times of natural disaster,
|
|
war, or when national security is specifically
|
|
threatened. Now the military has attempted to redefine
|
|
emergency.
|
|
|
|
The point man in the Pentagon's onslaught on communications is
|
|
Assistant <ent type='ORG'>Defense</ent> Secretary <ent type='PERSON'>Donald</ent> C. <ent type='PERSON'>Latham</ent>, a former <ent type='ORG'>NSA</ent> deputy
|
|
chief. <ent type='PERSON'>Latham</ent> now heads up an interagency committee in charge of
|
|
writing and implementing many of the policies that have put the
|
|
military in charge of the flow of civilian information and
|
|
communication. He is also the architect of National Security Decision
|
|
Directive 145 (<ent type='ORG'>NSDD</ent> 145), signed by <ent type='ORG'>Defense</ent> Secretary Caspar
|
|
<ent type='PERSON'>Weinberger</ent> in 1984, which sets out the national policy on
|
|
telecommunications and computer-systems security.
|
|
First <ent type='ORG'>NSDD</ent> 145 set up a steering group of top-level administration
|
|
officials. Their job is to recommend ways to protect information that
|
|
is unclassified but has been designated sensitive. Such information
|
|
is held not only by government agencies but by private companies as
|
|
well. And last October the steering group issued a memorandum that
|
|
defined sensitive information and gave federal agencies broad new
|
|
powers to keep it from the public.
|
|
According to <ent type='PERSON'>Latham</ent>, this new category includes such data as all
|
|
medical records on government databases -- from the files of the
|
|
National Cancer Institute to information on every veteran who has ever
|
|
applied for medical aid from <ent type='ORG'>the Veterans Administration</ent> -- and all
|
|
the information on corporate and personal taxpayers in the Internal
|
|
Revenue Service's computers. Even agricultural statistics, he argues,
|
|
can be used by a foreign power against <ent type='GPE'>the United</ent> States.
|
|
In his oversize yet Spartan <ent type='ORG'>Pentagon</ent> office, <ent type='PERSON'>Latham</ent> cuts anything
|
|
but an intimidating figure. <ent type='ORG'>Articulate</ent> and friendly, he could pass for
|
|
a network anchorman or a television game show host. When asked how the
|
|
government's new definition of sensitive information will be used, he
|
|
defends the necessity for it and tries to put to rest concerns about a
|
|
new restrictiveness.
|
|
"The debate that somehow the DoD and <ent type='ORG'>NSA</ent> are going to monitor or
|
|
get into private databases isn't the case at all," <ent type='PERSON'>Latham</ent> insists.
|
|
"The definition is just a guideline, just an advisory. It does not
|
|
give the DoD the right to go into private records."
|
|
Yet the <ent type='ORG'>Defense Department</ent> invoked the <ent type='ORG'>NSDD</ent> 145 guidelines when it
|
|
told the information industry it intends to restrict the sale of data
|
|
that are now unclassified and publicly available from privately owned
|
|
computer systems. The excuse if offered was that these data often
|
|
include technical information that might be valuable to a foreign
|
|
adversary like the <ent type='NORP'>Soviet</ent> Union.
|
|
<ent type='ORG'>Mead Data Central</ent> -- which runs some of the nation's largest
|
|
computer databases, such as <ent type='PERSON'>Lexis</ent> and <ent type='ORG'>Nexis</ent>, and has nearly 200000
|
|
users -- says it has already been approached by a team of agents from
|
|
<ent type='ORG'>the Air Force</ent> and officials from the <ent type='ORG'>CIA</ent> and the <ent type='ORG'>FBI</ent> who asked for the
|
|
names of subscribers and inquired what <ent type='PERSON'>Mead</ent> officials might do if
|
|
information restrictions were imposed. In response to government
|
|
pressure, <ent type='ORG'>Mead Data Central</ent> in effect censured itself. It purged all
|
|
unclassified government-supplied technical data from its system and
|
|
completely dropped <ent type='ORG'>the National Technical Information System</ent> from its
|
|
database rather than risk a confrontation.
|
|
Representative <ent type='PERSON'>Jack Brooks</ent>, a <ent type='GPE'>Texas</ent> <ent type='NORP'>Democrat</ent> who chairs the <ent type='ORG'>House</ent>
|
|
Government Operations Committee, is an outspoken critic of the NSA's
|
|
role in restricting civilian information. He notes that in 1985 the
|
|
<ent type='ORG'>NSA</ent> -- under the authority granted by <ent type='ORG'>NSDD</ent> 145 -- investigated a
|
|
computer program that was widely used in both local and federal
|
|
elections in 1984. The computer system was used to count more than one
|
|
third of all votes cast in <ent type='GPE'>the United</ent> States. While probing the
|
|
system's vulnerability to outside manipulation, the <ent type='ORG'>NSA</ent> obtained a
|
|
detailed knowledge of that computer program. "In my view," <ent type='ORG'>Brooks</ent>
|
|
says, "this is an unprecedented and ill-advised expansion of the
|
|
military's influence in our society."
|
|
There are other <ent type='ORG'>NSA</ent> critics. "The computer systems used by counties
|
|
to collect and process votes have nothing to do with national
|
|
security, and I'm really concerned about the NSA's involvement," says
|
|
<ent type='NORP'>Democrat</ent>ic congressman <ent type='PERSON'>Dan Glickman</ent> of <ent type='GPE'>Kansas</ent>, chairman of the <ent type='ORG'>House</ent>
|
|
science and technology subcommittee concerned with computer security.
|
|
Also, under <ent type='ORG'>NSDD</ent> 145 the <ent type='ORG'>Pentagon</ent> has issued an order, virtually
|
|
unknown to all but a few industry executives, that affects commercial
|
|
communications satellites. The policy was made official by <ent type='ORG'>Defense</ent>
|
|
Secretary <ent type='PERSON'>Weinberger</ent> in June of 1985 and requires that all commercial
|
|
satellite operators that carry such unclassified government data
|
|
traffic as routine <ent type='ORG'>Pentagon</ent> supply information and payroll data (and
|
|
that compete for lucrative government contracts) install costly
|
|
protective systems on all satellites launched after 1990. The policy
|
|
does not directly affect the data over satellite channels, but it does
|
|
make the <ent type='ORG'>NSA</ent> privy to vital information about the essential signals
|
|
needed to operate a satellite. With this information it could take
|
|
control of any satellite it chooses.
|
|
<ent type='PERSON'>Latham</ent> insists this, too, is a voluntary policy and that only
|
|
companies that wish to install protection will have their systems
|
|
evaluated by the <ent type='ORG'>NSA</ent>. He also says industry officials are wholly
|
|
behind the move, and argues that the protective systems are necessary.
|
|
With just a few thousand dollars' worth of equipment, a disgruntled
|
|
employee could interfere with a satellite's control signals and
|
|
disable or even wipe out a hundred-million-dollar satellite carrying
|
|
government information.
|
|
At best, his comments are misleading. First, the policy is not
|
|
voluntary. The <ent type='ORG'>NSA</ent> can cut off lucrative government contracts to
|
|
companies that do not comply with the plan. The <ent type='ORG'>Pentagon</ent> alone spent
|
|
more than a billion dollars leasing commercial satellite channels last
|
|
year; that's a powerful incentive for business to cooperate.
|
|
Second, the industry's support is anything but total. According to
|
|
the minutes of one closed-door meeting between <ent type='ORG'>NSA</ent> officials -- along
|
|
with representatives of other federal agencies -- and executives from
|
|
AT&T, <ent type='ORG'>Comsat</ent>, <ent type='ORG'>GTE Sprint</ent>, and <ent type='ORG'>MCI</ent>, the executives neither supported
|
|
the move nor believed it was necessary. The <ent type='ORG'>NSA</ent> defended the policy by
|
|
arguing that a satellite could be held for ransom if the command and
|
|
control links weren't protected. But experts at the meeting were
|
|
skeptical.
|
|
"Why is the threat limited to accessing the satellite rather than
|
|
destroying it with lasers or high-powered signals?" one industry
|
|
executive wanted to know.
|
|
Most of the officials present objected to the high cost of
|
|
protecting the satellites. According to a 1983 study made at the
|
|
request of the <ent type='ORG'>Pentagon</ent>, the protection demanded by the <ent type='ORG'>NSA</ent> could add
|
|
as much as $3 million to the price of a satellite and $1 million more
|
|
to annual operating costs. Costs like these, they argue, could cripple
|
|
a company competing against less expensive communications networks.
|
|
<ent type='NORP'>American</ent>s get much of their information through forms of electronic
|
|
communications, from the telephone, television and radio, and
|
|
information printed in many newspapers. Banks send important financial
|
|
data, businesses their spreadsheets, and stockbrokers their investment
|
|
portfolios, all over the same channels, from satellite signals to
|
|
computer hookups carried on long distance telephone lines. To make
|
|
sure that the federal government helped to promote and protect the
|
|
efficient use of this advancing technology, <ent type='ORG'>Congress</ent> passed the
|
|
massive Communications Act of of 1934. It outlined the role and laws
|
|
of the communications structure in <ent type='GPE'>the United</ent> States.
|
|
The powers of the president are set out in Section 606 of that law;
|
|
basically it states that he has the authority to take control of any
|
|
communications facilities that he believes "essential to the national
|
|
defense." In the language of the trade this is known as a 606
|
|
emergency.
|
|
There have been a number of attempts in recent years by <ent type='ORG'>Defense</ent>
|
|
Department officials to redefine what qualifies as a 606 emergency and
|
|
make it easier for the military to take over national communications.
|
|
In 1981 the Senate considered amendments to the 1934 act that would
|
|
allow the president, on <ent type='ORG'>Defense Department</ent> recommendation, to require
|
|
any communications company to provide services, facilities, or
|
|
equipment "to promote the national defense and security or the
|
|
emergency preparedness of the nation," even in peacetime and without a
|
|
declared state of emergency. The general language had been drafted by
|
|
<ent type='ORG'>Defense Department</ent> officials. (The bill failed to pass the <ent type='ORG'>House</ent> for
|
|
unrelated reasons.)
|
|
"I think it is quite clear that they have snuck in there some
|
|
powers that are dangerous for us as a company and for the public at
|
|
large," said <ent type='ORG'>MCI</ent> vice president <ent type='PERSON'>Kenneth Cox</ent> before the Senate vote.
|
|
Since President Reagan took office, the <ent type='ORG'>Pentagon</ent> has stepped up its
|
|
efforts to rewrite the definition of national emergency and give the
|
|
military expanded powers in <ent type='GPE'>the United</ent> States. "The declaration of
|
|
'emergency' has always been vague," says one former administration
|
|
official who left the government in 1982 after ten years in top policy
|
|
posts. "Different presidents have invoked it differently. This
|
|
administration would declare a convenient 'emergency.'" In other
|
|
words, what is a nuisance to one administration might qualify as a
|
|
burgeoning crisis to another. For example, the Reagan administration
|
|
might decide that a series of protests on or near military bases
|
|
constituted a national emergency.
|
|
Should the <ent type='ORG'>Pentagon</ent> ever be given the green light, its base for
|
|
taking over the nation's communications system would be a nondescript
|
|
yellow brick building within the maze of high rises, government
|
|
buildings, and apartment complexes that make up the <ent type='GPE'>Washington</ent> suburb
|
|
of <ent type='GPE'>Arlington</ent>, Virginia. Headquartered in a dusty and aging structure
|
|
surrounded by a barbed-wire fence is an obscure branch of the military
|
|
known as the <ent type='ORG'>Defense</ent> Communications Agency (<ent type='ORG'>DCA</ent>). It does not have the
|
|
spit and polish of <ent type='ORG'>the National</ent> Security Agency or the dozens of other
|
|
government facilities that make up the nation's capital. But its lack
|
|
of shine belies its critical mission: to make sure all of America's
|
|
far-flung military units can communicate with one another. It is in
|
|
certain ways the nerve center of our nation's defense system.
|
|
On the second floor of the DCA's four-story headquarters is a new
|
|
addition called <ent type='ORG'>the National</ent> Coordinating Center (<ent type='ORG'>NCC</ent>). Operated by
|
|
the <ent type='ORG'>Pentagon</ent>, it is virtually unknown outside of a handful of industry
|
|
and government officials. The <ent type='ORG'>NCC</ent> is staffed around the clock by
|
|
representatives of a dozen of the nation's largest commercial
|
|
communications companies -- the so-called "common carriers" --
|
|
including AT&T, <ent type='ORG'>MCI</ent>, <ent type='ORG'>GTE</ent>, <ent type='ORG'>Comsat</ent>, and <ent type='ORG'>ITT</ent>. Also on hand are officials
|
|
from the State Department, the <ent type='ORG'>CIA</ent>, the Federal Aviation
|
|
Administration, and a number of other federal agencies. During a 606
|
|
emergency the <ent type='ORG'>Pentagon</ent> can order the companies that make up the
|
|
National Coordinating Center to turn over their satellite, fiberoptic,
|
|
and land-line facilities to the government.
|
|
On a long corridor in the front of the building is a series of
|
|
offices, each outfitted with a private phone, a telex machine, and a
|
|
combination safe. It's known as "logo row" because each office is
|
|
occupied by an employee from one of the companies that staff the <ent type='ORG'>NCC</ent>
|
|
and because their corporate logos hand on the wall outside. Each
|
|
employee is on permanent standby, ready to activate his company's
|
|
system should the <ent type='ORG'>Pentagon</ent> require it.
|
|
<ent type='ORG'>The National</ent> Coordinating Center's mission is as grand as its title
|
|
is obscure: to make available to the <ent type='ORG'>Defense Department</ent> all the
|
|
facilities of the civilian communications network in this country --
|
|
the phone lines, the long-distance satellite hookups, the data
|
|
transmission lines -- in times of national emergency. If war breaks
|
|
out and communications to a key military base are cut, the <ent type='ORG'>Pentagon</ent>
|
|
wants to make sure that an alternate link can be set up as fast as
|
|
possible. <ent type='ORG'>Company</ent> employees assigned to the center are on call 24
|
|
hours a day; they wear beepers outside the office, and when on
|
|
vacation they must be replaced by qualified colleagues.
|
|
The center formally opened on <ent type='EVENT'>New Year</ent>'s Day, 1984, the same day Ma
|
|
Bell's monopoly over the telephone network of the entire United States
|
|
was finally broken. The timing was no coincidence. <ent type='ORG'>Pentagon</ent> officials
|
|
had argued for years along with AT&T against the divestiture of Ma
|
|
Bell, on grounds of national security. <ent type='ORG'>Defense</ent> Secretary <ent type='PERSON'>Weinberger</ent>
|
|
personally urged the attorney general to block the lawsuit that
|
|
resulted in the breakup, as had his predecessor, <ent type='PERSON'>Harold Brown</ent>. The
|
|
reason was that rather than construct its own communications network,
|
|
the <ent type='ORG'>Pentagon</ent> had come to rely extensively on the phone company. After
|
|
the breakup the dependence continued. The <ent type='ORG'>Pentagon</ent> still used
|
|
commercial companies to carry more than 90 percent of its
|
|
communications within the continental United States.
|
|
The 1984 divestiture put an end to AT&T's monopoly over the
|
|
nation's telephone service and increased the Pentagon's obsession with
|
|
having its own nerve center. Now the brass had to contend with several
|
|
competing companies to acquire phone lines, and communications was
|
|
more than a matter of running a line from one telephone to another.
|
|
Satellites, microwave towers, fiberoptics, and other technological
|
|
breakthroughs never dreamed of by <ent type='PERSON'>Alexander Graham Bell</ent> were in
|
|
extensive use, and not just for phone conversations. <ent type='ORG'>Digital</ent> data
|
|
streams for computers flowed on the same networks.
|
|
These facts were not lost on the <ent type='ORG'>Defense Department</ent> or the White
|
|
<ent type='ORG'>House</ent>. According to documents obtained by "<ent type='ORG'>Omni</ent>," beginning on December
|
|
14, 1982, a number of secret meetings were held between high-level
|
|
administration officials and executives of the commercial
|
|
communications companies whose employees would later staff the
|
|
National Coordinating Center. The meetings, which continued over the
|
|
next three years, were held at the White <ent type='ORG'>House</ent>, the State Department,
|
|
<ent type='ORG'>the Strategic Air</ent> Command (<ent type='ORG'>SAC</ent>) headquarters at Offutt Air Force Base
|
|
in <ent type='GPE'>Nebraska</ent>, and at the <ent type='PERSON'>North</ent> <ent type='NORP'>American</ent> Aerospace <ent type='ORG'>Defense</ent> Command
|
|
(<ent type='ORG'>NORAD</ent>) in <ent type='GPE'>Colorado Springs</ent>.
|
|
The industry officials attending constituted <ent type='ORG'>the National</ent> Security
|
|
Telecommunications Advisory Committee -- called <ent type='ORG'>NSTAC</ent> (pronounced N-stack) -- set up by President Reagan to address those same problems
|
|
that worried the <ent type='ORG'>Pentagon</ent>. It was at these secret meetings, according
|
|
to the minutes, that the idea of a communications watch center for
|
|
national emergencies -- the <ent type='ORG'>NCC</ent> -- was born. Along with it came a
|
|
whole set of plans that would allow the military to take over
|
|
commercial communications "assets" -- everything from ground stations
|
|
and satellite dishes to fiberoptic cables -- across the country.
|
|
At a 1983 <ent type='ORG'>Federal Communications Commission</ent> meeting, a ranking
|
|
<ent type='ORG'>Defense Department</ent> official offered the following explanation for the
|
|
founding of <ent type='ORG'>the National</ent> Coordinating Center: "We are looking at
|
|
trying to make communications endurable for a protracted conflict."
|
|
The phrase protracted conflict is a military euphemism for nuclear
|
|
war.
|
|
But could the <ent type='ORG'>NCC</ent> survive even the first volley in such a conflict?
|
|
Not likely. It's located within a mile of the <ent type='ORG'>Pentagon</ent>, itself an
|
|
obvious early target of a <ent type='NORP'>Soviet</ent> nuclear barrage (or a conventional
|
|
strike, for that matter). And the <ent type='ORG'>Kremlin</ent> undoubtedly knows its
|
|
location and importance, and presumably has included it on its
|
|
priority target list. In sum, according to one <ent type='ORG'>Pentagon</ent> official, "The
|
|
<ent type='ORG'>NCC</ent> itself is not viewed as a survivable facility."
|
|
Furthermore, the NCC's "Implementation Plan," obtained by "<ent type='ORG'>Omni</ent>,"
|
|
lists four phases of emergencies and how the center should respond to
|
|
each. The first, Phase 0, is Peacetime, for which there would be
|
|
little to do outside of a handful of routine tasks and exercises.
|
|
Phase 1 is Pre Attack, in which alternate <ent type='ORG'>NCC</ent> sites are alerted. Phase
|
|
2 is Post Attack, in which other <ent type='ORG'>NCC</ent> locations are instructed to take
|
|
over the center's functions. Phase 3 is known as Last Ditch, and in
|
|
this phase whatever facility survives becomes the de facto <ent type='ORG'>NCC</ent>.
|
|
So far there is no alternate National Coordinating Center to which
|
|
<ent type='ORG'>NCC</ent> officials could retreat to survive an attack. According to <ent type='ORG'>NCC</ent>
|
|
deputy director <ent type='PERSON'>William Belford</ent>, no physical sites have yet been
|
|
chosen for a substitute <ent type='ORG'>NCC</ent>, and even whether the <ent type='ORG'>NCC</ent> itself will
|
|
survive a nuclear attack is still under study.
|
|
Of what use is a communications center that is not expected to
|
|
outlast even the first shots of a war and has no backup?
|
|
The answer appears to be that because of the Pentagon's concerns
|
|
about the AT&T divestiture and the disruptive effects it might have on
|
|
national security, the <ent type='ORG'>NCC</ent> was to serve as the military's peacetime
|
|
communications center.
|
|
The center is a powerful and unprecedented tool to assume control
|
|
over the nation's vast communications and information network. For
|
|
years the <ent type='ORG'>Pentagon</ent> has been studying how to take over the common
|
|
carriers' facilities. That research was prepared by <ent type='ORG'>NSTAC</ent> at the DoD's
|
|
request and is contained in a series of internal <ent type='ORG'>Pentagon</ent> documents
|
|
obtained by "<ent type='ORG'>Omni</ent>." Collectively this series is known as the Satellite
|
|
Survivability Report. Completed in 1984, it is the only detailed
|
|
analysis to date of the vulnerabilities of the commercial satellite
|
|
network. It was begun as a way of examining how to protect the network
|
|
of communications facilities from attack and how to keep it intact for
|
|
the DoD.
|
|
A major part of the report also contains an analysis of how to make
|
|
commercial satellites "interoperable" with <ent type='ORG'>Defense Department</ent> systems.
|
|
While the report notes that current technical differences such as
|
|
varying frequencies make it difficult for the <ent type='ORG'>Pentagon</ent> to use
|
|
commercial satellites, it recommends ways to resolve those problems.
|
|
Much of the report is a veritable blueprint for the government on how
|
|
to take over satellites in orbit above <ent type='GPE'>the United</ent> States. This
|
|
information, plus <ent type='ORG'>NSDD</ent> 145's demand that satellite operators tell the
|
|
<ent type='ORG'>NSA</ent> how their satellites are controlled, guarantees the military ample
|
|
knowledge about operating commercial satellites.
|
|
The <ent type='ORG'>Pentagon</ent> now has an unprecedented access to the civilian
|
|
communications network: commercial databases, computer networks,
|
|
electronic links, telephone lines. All it needs is the legal authority
|
|
to use them. Then it could totally dominate the flow of all
|
|
information in <ent type='GPE'>the United</ent> States. As one high-ranking White <ent type='ORG'>House</ent>
|
|
communications official put it: "Whoever controls communications,
|
|
controls the country." His remark was made after our State Department
|
|
could not communicate directly with our embassy in <ent type='GPE'>Manila</ent> during the
|
|
anti-<ent type='PERSON'>Marcos</ent> revolution last year. To get through, the State
|
|
Department had to relay all its messages through the <ent type='NORP'>Philippine</ent>
|
|
government.
|
|
Government officials have offered all kinds of scenarios to justify
|
|
<ent type='ORG'>the National</ent> Coordinating Center, <ent type='ORG'>the Satellite Survivability Report</ent>,
|
|
new domains of authority for the <ent type='ORG'>Pentagon</ent> and the <ent type='ORG'>NSA</ent>, and the
|
|
creation of top-level government steering groups to think of even more
|
|
policies for the military. Most can be reduced to the rationale that
|
|
inspired <ent type='ORG'>NSDD</ent> 145: that our enemies (presumably the <ent type='NORP'>Soviet</ent>s) have to
|
|
be prevented from getting too much information from unclassified
|
|
sources. And the only way to do that is to step in and take control of
|
|
those sources.
|
|
Remarkably, the communications industry as a whole has not been
|
|
concerned about the overall scope of the Pentagon's threat to its
|
|
freedom of operation. Most protests have been to individual government
|
|
actions. For example, a media coalition that includes the Radio-Television Society of Newspaper Editors, and the Turner Broadcasting
|
|
System has been lobbying that before the government can restrict the
|
|
use of satellites, it must demonstrate why such restrictions protect
|
|
against a "threat to distinct and compelling national security and
|
|
foreign policy interests." But the whole policy of restrictiveness has
|
|
not been examined. That may change sometime this year, when <ent type='ORG'>the Office</ent>
|
|
of Technology Assessment issues a report on how the Pentagon's policy
|
|
will affect communications in <ent type='GPE'>the United</ent> States. In the meantime the
|
|
military keeps trying to encroach on national communications.
|
|
While it may seem unlikely that the <ent type='ORG'>Pentagon</ent> will ever get total
|
|
control of our information and communications systems, the truth is
|
|
that it can happen all too easily. The official mechanisms are already
|
|
in place; and few barriers remain to guarantee that what we hear, see,
|
|
and read will come to us courtesy of our being members of a free and
|
|
open society and not courtesy of the <ent type='ORG'>Pentagon</ent>.
|
|
|
|
|
|
=============================================================================
|
|
=============================================================================
|
|
|
|
<ent type='ORG'>Black Crawling Systems</ent> @ V0iD Information Archives
|
|
|
|
( 6 1 7 ) 4 8 2 - 6 3 5 6
|
|
|
|
|
|
</p></xml> |