Saturday, June 30, 2007

JEEP MAN ON FIRE: Threat to civilization?


Jeep Man burnt! Soon to be ex-President of the Dhiren Barot Fan Club.

"An apparent car bomb attack on a crowded Glasgow airport ended in blazing failure as the weekend onslaught of would-be terror outrages continued," reported the Guardian minutes ago.

"A Jeep Cherokee containing two Asian-looking men rammed the doors of the main terminal building and burst into flames ... Amazingly, only one person was injured - one of the men in the car who fell out with his clothes on fire."

"Unconfirmed reports say one of the men was holding a home-made petrol bomb."

Your friendly neighborhood GlobalSecurity.Org Senior Fellow will assume readers may agree pouring gasoline under your crashed vehicle on the fly and setting yourself on fire isn't probably the best way to rig an improvised vehicular bomb. And a very good thing that is, too!

Until the details of the last two days more completely sort out, this blog will do what some in the Metropolitan Police are probably doing -- having a another gander at various recent terror cases for possible relationships.

One case that will probably return to the news (indeed, it already has to some degree) is Operation Rhyme, the plans of crackpot Dhiren Barot.

Barot kept his plans on laptop and these files -- .pdfs -- were put on the web by the Metropolitan Police. One of them dealt with what was called the Gas Limos Project. It has been indicated as something with relevance toward this weekend's events.

Barot's Gas Limos Project files were said to be detailed. DD analyzed the files, which were heavily redacted by the Metropolitan Police, and published an analysis in February here.

One of Barot's plans involved the theoretical assembly of a team to pack limousines with propane cylinders and a few other burnables.

However, Barot was and is not a smart man. Throughout the text, he struggles with his plan, most obviously with how to set off his car bombs. In the end, he really never comes up with a firm way although a few options are ventured. One can perhaps set the car on fire, tape pipe bombs to gas cylinders, maybe employ electronic detonators. Barot is very big on the possibilities but grievously short on practical hands-on details born from experience and savvy. (This general obstacle, efficient and reliable detonation of an improvised explosive, may have some bearing on recent events.)

At one point, he writes:

"Weapons such as grenades and Uzi rifles can be also be brought to the scene in order to aid security and as a final recourse in order to bring about [gas] cylinder fracture, i.e., by shooting or exploding a grenade directly at the cylinder itself."

Indeed, this analyst read Barot's files and became convinced that as a stupid man, the terrorist became a little too sold on the Hollywood idea, perpetrated in action movies, that all one has to do to get a car to explode witht the impact of a 2,000 lb. bomb is shoot at it with a pistol, set it aflame or crunch it in a two car collision.

And there might be some truth to that. Barot surveilled New York City in 2001 and attached his camera footage to a video copy of a John McClane/Willis adventure from the "Die Hard" series.

Throughout his plans, Barot regularly invokes Allah. Inshallah this, inshallah that. Inshallah -- if I'm full of hot air and all this is rubbish, it was Allah's will.

Barot also recommends putting charcoal around his gas cylinders.

"Underneath and around the cylinders, generously place some loose pieces of charcoal..."

Posted at the foot of the article, from a Barot section entitled "Putting It All Together," the terrorist advises of pitfalls which would cause car bombers to fail, the obvious odor of petrol being one.

In a lengthy speech in April of this year, Peter Clarke, the public face of the Met's anti-terror operations said, "One of the challenges for counter terrorist policing is to give ourselves the ability to operate internationally (for every case takes us across the world), but at the same time not lose our local connections within communities.

"This is not going to be easy. We must increase the flow of intelligence coming from communities. Almost all of our prosecutions have their origins in intelligence that came from overseas, the intelligence agencies or from technical means. Few have yet originated from what is sometimes called ‘community intelligence.’ This is something we are working hard to change."

On the Barot case, Clarke said, "The intelligence rightly told us that he was involved in attack planning, but we did not know how far advanced he was."

"We did not know whether he posed an imminent threat or not. Surveillance could not give us the answers we needed, and so the decision was made that we had to arrest him straightaway. It is no exaggeration to say that at the time of the arrest there was not one shred of admissible evidence against Barot. The arrest was perfectly lawful - there were more than sufficient grounds, but in terms of evidence to put before a court, there was nothing.

"There then began the race against time to retrieve evidence from the mass of computers and other IT equipment that we seized. It was only at the very end of the permitted period of detention that sufficient evidence was found to justify charges."

Clarke remarked at some length on the lack of actionable intelligence from human sources in London and the reasons for this:

"... [S]uspicion of anything that is described as intelligence is such that it has been rare to receive the benefit of the doubt from either communities or the media. And this is crucial. I think it is no exaggeration to say that the lack of public trust in intelligence is in danger of infecting the relationship between the police and the communities we serve. Trust and consent are two concepts that lie at the heart of the relationship between the British police and the public. We must maintain that trust. But how to do so? I have no doubt that the operational and political independence of the police is the key to this. The communities must believe, and it must be reality, that the police stand aside from politics in the exercise of their powers. That is why the allegations of political partiality that seem to have been made so lightly in recent times are so damaging.

"They undermine the relationship between police and public. They undoubtedly inhibit the flow of intelligence, and in doing so actually increase the risk to the public."

Paradoxically, a Guardian column from June 21 was entitled: "The government's persecution of the Muslim community is alienating the very people whose support is needed to stop further atrocities."

"The wider question that arises though regards whether what the government has done since 9/11 has been effective in deterring terrorism or whether it has made life more dangerous," wrote Paul Donovan.

"There seems little doubt that there is a small group of foreign nationals that the government, advised by the security services, has been targeting and continually coming back to since December 2001. Mainly Algerian, 10 of these men were originally detained without trial under the Anti-Terrorism Crime and Security Act (ATCSA). They were then put under control orders following the House of Lords 2004 decision that detention power under ATCSA was incompatible with the Human Rights Act."

Donovan primarily refers to men involved in alleged ricin ring. After being acquitted in a fair jury trial except for lone murderer Kamel Bourgass, the British government, in effect, nullified the verdicts through the use of control orders and deportation proceedings.

"The worry at present is that everything that is happening to persecute the Muslim community is simply alienating the very people whose support is needed to stop further terrorist atrocities," wrote Donovan, echoing Clarke's assertion on the difficulty the police face in getting tips. "[Ricin case defense solicitor Gareth] Peirce draws parallels with what happened in Northern Ireland where those in the suspect community completely lost belief in the operation of the rule of law and so were more likely to move toward violent confrontation."

Tips from the community are, of course, geatly needed for the nipping in the bud of homegrown terror plots. Although everyone will take luck and the incompetence of perpetrators if they can have it, chance is not the most reassuring long-term safety net.


Excerpt from Operation Rhyme files of Dhiren Barot, originally furnished by the Metropolitan Police.

Afternote: DD plans to have more of the .pdfs from the Barot case on-line in the coming week.

If you enjoyed this piece, you'll surely enjoy: Reverse-engineering the laptop files of Dhiren Barot.

Peter Clarke lecture: Learning From Experience – Counter Terrorism in the UK since 9/11.

Friday, June 29, 2007

FLOPPED: Car bomb plot foiled by blind luck or incompetence?

We can give Londoners a salute for showing phlegm in the face of news that two car bombs were discovered in their midst. The media hasn't been quite so phlegmatic.

"On the streets of Baghdad the use of car bombs is a daily tactic which reaps horrific results," wrote someone for England's Guardian as the news machine began to gather speed. "Senior officers have been waiting and dreading for those tactics to be employed in the UK by homegrown Islamist extremists."

Yet one is also prompted to ask the writer to get into the differences between the environments in Baghdad and London and not just furnish a drive-by assessment. Fundamentally, they're big.

Iraq is a de facto failed state awash in weapons, bomb-making materials and people professional experienced in the art of making infernally effective improvised bombs. As far as DD can tell, London is not a failed state and it is not obviously overflowing with handy and always available large bomb-making materials. So while it may be tempting to make comparisons between the two for the sake of the argument that since it's happening there, it will eventually happen in London in the same way, it is not ruthlessly logical to embrace the idea.

Naturally, it did not take long for some news agency -- in this case the Times of London -- to drag out a professional witness and an even more extreme outright nutcase (from the obscure British national security trade magazine industry) who foamed at the mouth over how apocalyptic things could have been.

"The patio gas bomb defused in Haymarket would have generated a fireball the size of a house and a shock wave spreading out over a diameter of at least 400 yards, explosives experts said today," wrote the Times.

"Other experts suggested that the total blast could have been bigger still, depending on how many propane cylinders ignited and on whether high explosive was also used ... Andy Oppenheimer, editor of Nuclear, Biological and Chemical International, said the blast radius could have been anything from 200 years [sic] to half a mile. 'It would have been a devastating explosion,' he said."

Newsmen can't resist these excitable types. News operations often seem to display a morbid glee in finding the worst possible interpreters, the scariest tellers of tales, just for the juicing of the news.

For instance, the day news of the liquid bombers broke last year, one American clown, a professional witness in civil cases on the dangers of various chemicals, showed up in multiple newspapers to describe how easy it was to bring a plane down from the refuge of the bathroom.

"All I have to do is take [my ingredients] in the restroom with a standard water bottle ... I empty the water out, mix them in the bottle, and before I'm done mixing them, the reaction had already occured and the plane is in serious trouble," screeched the professional witness, not seen since, for the Los Angeles Times, as well as many other newspapers, in August of last year.

"[The Met's Mr. Peter Clarke] says he recognises that facets of this attempted bombing 'resonate' with previous plots - in particular the gas cylinders and the location," reported BBC News.

"A man called Dhiren Barot jailed for life in 2006 had meticulously planned what he called a gas limousines bomb. He drew up a complex 'business plan' of how he could hit targets in the UK using propane gas canisters."

Your friendly neighborhood GlobalSecurity.Org Senior Fellow analyzed the computer files released by the Metropolitan Police and found no such complex business plan. (Link to analysis provided at end of story.) The Metropolitan Police subsequently withdrew Barot's files from its website. We're in the process of getting some of them back on-line.

In any case, the Beeb reported: "The [Barot] plan was shown to al-Qaeda funders in Pakistan and parts of it were made public when he was jailed. Experts will be considering whether this bomb has any relationship with Barot's project."

And well they should although the public should be made aware, by the media or authorities, that Barot had never accumulated any materials. His plots were outlines and not particularly detailed, although opinions on what constitutes detail may vary.

As for targeting a nightclub, it's where the people are.

In the continuing case, some good fortune seems to be the lesson from the day, as it appears the second bomb car was uncovered after being towed to an impound yard!

A number of newspapers, most notably the New York Times and the Wall Street Journal, even went so far as to rope in the old London ricin case from just prior to the war.

For example, it is read in a Canadian publication, the Chronicle Journal:

"Jan. 5, 2003: Police raid a London apartment and arrest nine people accused of plotting to spread the deadly toxin ricin in the city. No traces of ricin are found, although scientists say evidence shows attempts to make the poison. None of the men were charged in connection with the ricin, although one was convicted of murdering a policeman during his arrest."

Almost all of it is wrong, some of it in large ways, other parts in small. No evidence of ricin-making was found although a jewelry tin of castor seeds was. The alleged ricin ring was fundamentally nonexistent. The accused were acquitted by jury trial except for Kamel Bourgass who was sent away for life. The British government then took action to ensure the acquittals were functionally overturned anyway by issuing a variety of orders designed to either keep the acquitted under house arrest or to return them to prison to await deportation. This blog has covered it previously.

"In [previous] investigations," reported the New York Times, "suspected terrorists have been accused by the police of planning to use a variety of weapons including the poison ricin ..." The Times then attempts to get away without informing its readers what actually happened in the ricin case.

If one were to attempt to explain how the ricin case actually relates to the discovery of car bombs, the potential for a great deal of embarrassment and backtracking arises.

One can hold out a slight if naively optimistic hope that subsequent coverage of the event won't degenerate into the usual exaggeration and hysteria suggesting the empire is about to be overthrown and everyone is at risk. It would also be good to keep in mind that despite one notable success on 7/7, the jihadist aimed at the heart of merry old England has proven, in general, to be an inept one -- far less capable than even the legions of the sinister Dr. Fu Manchu, always thwarted at the last minute by the intrepid Nayland Smith.

Jeep man on fire.

Dhiren Barot archive on DD.

Ricin terror archive.

London peroxide/Chapati flour bombers archive.

Brit airplane liquid bomb plotters archive.

Thursday, June 28, 2007

LIKE DOPING SHOOTING FISH IN A BARREL: Chinese fish imports -- unsurprisingly -- contaminated with fungicides and antibiotics

The FDA banned a number of fish imports from China yesterday, as reported by many newspapers including the Washington Post here.

At this point it become semi-obvious to everyone that if you truly inspect every consumable from China, one has a good chance of finding something ... fishy. However, many importers know Americans will buy anything as long as it seems like they're getting a bargain. Passing off contaminated goods on us is like shooting fish in a barrel.

Call it the result of greed in the global marketplace -- the desire to get something for a price way too good to be true.

One of the Chinese imports banned was catfish. Chinese catfish had been cutting into American catfish sales, obviously -- because it's cheaper. Of course, the catfish is doped with some fungicide that's a carcinogen, or antibiotics, but you don't care about that do you? (Chinese shrimp is very bad news, too.)

It's a rhetorical question. People do care. However, what can be done? The FDA doesn't have the capability to find everything and it must do battle with American importers who are too happy to take dodgy things and push them into the marketplace.

The average person is truly stuck. Who are you going to complain to? Are you to read the news for Chinese food badness every day, log on to FDA.GOV, and keep an updated list of the rotten fish, the bogus toothpastes, the bad petfoods?

If importers and repackagers were compelled immediately to relabel everything from China with a bright yellow banner, many consumers would choose to vote with their wallets and break the sale of Chinese goods until a time when trust had been regained.

But no fish comes with a label, embedded in the ice right next to it in the display case: "This poxy-looking dead thing came from China and it might have probably has something wormy in it; the FDA doesn't have enough people to tell either way. It's cheaper, though, and you'll save some money."

You can take action by moving the battle to your market. Query the grocer when selecting your fish. Tell him you're not interested in imported Chinese food at this time. If he can't tell you where the goods are from, tell him you'll pass on the fish for awhile. Recommend Chinese fish imports get a furlough from the ice and frozen food cases.

Currently, a couple politicians are making indignant noises about Chinese goods. However, so far it's all talk. Chinese poison killed and sickened pets months ago and the same noises were emitted. Then it was back to business as usual.

Make no mistake, your friendly neighborhood GlobalSecurity.Org Senior Fellow informs that refusing anything from China that goes into your mouth is going to be hard. There are too many American trading partners heavily invested in this very bad business and security from contamination driven by consumer-hostile business practices and greed is not possible under the current system.



Eat Zinc! Chinese poison toothpaste for nine cents, cheap! It's only a little poison, five percent.

Browse the fascinating and outraging EAT ZINC archive. Bad food and additives from China, the kind of business guarantee no one wants but can't get rid of.
EAT ZINC! NINE CENT TUBE OF CHINESE TOOTHPASTE IS POISON: Better to brush teeth with a stick


Even an idiot might be expected to know this is a better quality product than a nine cent tube of toothpaste. But not the state of Georgia.

"After federal health officials discovered last month that tainted Chinese toothpaste had entered the United States, they warned that it would most likely be found in discount stores," reported the New York Times today.

"In fact, the toothpaste has been distributed much more widely. Roughly 900,000 tubes containing a poison used in some antifreeze products have turned up in hospitals for the mentally ill, prisons, juvenile detention centers and even some hospitals serving the general population."

Hospitals for the mentally ill, prisons and juvie hall -- not exactly the places one expects to see much oversight or care if patients and inmates suffer organ damage from diethylene glycol, the poison in Chinese toothpaste.

DD adds poisoned Chinese toothpaste was also found in low end stores in the Lehigh Valley, Pennsylvania, your GlobalSecurity.Org Senior Fellow's former place of residence.

However, the most interesting part of the Times story was the amount of money paid for the poison toothpaste. Sold in quantity to Georgia prisons by a company called American Amenities (we think readers will admit the name is quite the rib-tickler), the toothpaste was dirt cheap.

How cheap?

"[Georgia] bought the toothpaste for about 9 cents a tube in 2002," wrote the Times. "[Mr. Rick Beal of Georgia's Dept. of Administrative Services] said he did not know how many tubes had been used."

Nine cents a tube.

One would have been better off recommending inmates brush their teeth with a pack of sugar stolen from a restaurant, a stick or perhaps a tablespoon of sand from the yard.

Indeed, when selling toothpaste for nine cents a unit, the only reason it isn't a tube of dirt, is that dirt doesn't actually look like toothpaste. The texture and color just aren't right.

While the Chinese are certainly deserving of opprobrium, it is a national disgrace when the only working standard for a consumable vended by an American company is this: How cheap can we get it from someone else?

With this kind of system -- where the depraved can easily be rewarded with business contracts -- security and integrity are almost impossible.

Naturally, no one in the United States can actually make toothpaste for nine cents a tube, wholesale, without employing slave labor and using some cheap filler poison as an ingredient. It insults the intelligence and sense of decency to even think so.

It would also be stupid to think the contamination with counterfeit goods can be stopped at the source, China. However, it is not quite so difficult an undertaking to begin heavily punishing companies in the United States which have lost control of their supplies and products in the quest for profit. Or one can contemplate the morality, or lack of it, and come up with a course of action for American companies which exist to sell the cheapest possible rubbish just because they think they can get away with it.

Sgt. Schulz's "I know noszing!" defense shouldn't cut it.

One could also look to officials within the state government of Georgia. What was that bureaucrat thinking when he saw a nine cent price tag for an imported tube of toothpaste?

We do know that he or she was not thinking like a decent human being.

This was how they were thinking: Who cares about the mentally ill, people in prisons or the poor? All they deserve is toothpaste that's cheaper 'n dirt. It saves the taxpayer some money and I won't spend a penny extra on such undesirables. It'll look good on my year-end report, too.




The original from the New York Times.

An earlier story from the archives of Eat Zinc!

Eat Zinc! on Chinese toothpaste from last month.

Browse the fascinating and outraging EAT ZINC archive. Bad food and additives from China, the kind of business guarantee no one wants but can't get rid of.

Wednesday, June 27, 2007

LIVE FREE OR DIE HARD: The more crap you know, the better off you are

"Although 'Live Free or Die Hard' has one of the most convoluted writing credits in memory -- 'screenplay by Mark Bomback, story by Bomback and David Marconi, certain original characters by Roderick Thorp, based upon the article A Farewell to Arms by John Carlin' -- the result is a shrewd, serviceable premise that feels uncomfortably real," wrote movie reviewer Kenneth Turan in today's Los Angeles Times.

Times Calendar section reporters, if you've read this blog regularly, are comfortably detached from reality. So it's no surprise a movie reviewer would think the "electronic Pearl Harbor" shtick that's the basis for the Willis movie is uncomfortably real to one of them.

"The notion, inspired by [Carlin's] Wired magazine article, is that the more we as a society have our essential systems run by computers, the more vulnerable we are to having those systems messed with by brainy bad guys intent on catastrophic results," continues the Times movie reviewer.

If you read through to the finish of your friendly neighborhood GlobalSecurity.Org Senior Fellow's idiot electronic Pearl Harbor grinches essay on Sunday, near the bottom, you say Carlin was one of the first on the spot with the gold-plated rubbish in 1997.


Reprinted:

"Electronic Pearl Harbor" showed up twice in the May 1997 issue of WIRED magazine, both Carlin's "Farewell to Arms."

1. "We will have a cyber equivalent of Pearl Harbor at some point, and we do not want to wait for that wake-up call," attributed to former U.S. Deputy Atty. General Jamie Gorelick.

2. "I-war can be the kind of neat, conceptually contained electronic Pearl Harbor scenario that Washington scenarists like -- collapsing power grids, a stock market software bomb, an electromagnetic pulse that takes the phone system out."

The original e-Pearl Harbor archive from the Wayback Machine.


The essay had well over a thousand readers by Monday.

Since the more crap you know, the better off you are, Carlin's article -- while not perfectly suitable as basis for a movie (who's gonna play Jamie Gorelick? Oh, please ...) -- the second bullet point contained the nut of an idea easily imagined as discussed in Hollywood over a Player-like pitch session. It allows for fire and explosions.

Hey Bruce Willis fans! Don't send hate mail! I like Willis as an action hero and am tickled at anything which has him dispatching evil computer nerds.

Now wait for the deluge of features writers nationwide selling their editors on stories about the plausibility of "Live Free or Die Hard."

If only DD could get someone in Hollywood hooked on an essay from this blog.

Hmmm, the script could be retitled "The Misanthrope."

Sunday, June 24, 2007

ELECTRONIC PEARL HARBOR FOR A DAY: Idiot grinches still around but mostly ignored. A good thing, too.

One of the most satisfying accomplishments from your friendly neighborhood GlobalSecurity.Org Senior Fellow's early career in cyberspace was contributing to the death of belief in "electronic Pearl Harbor."

Many years ago "electronic Pearl Harbor" news stories were commonplace. They were always the same. A variety of mountebanks encompassing computer security software and hardware vendors, government officials and think-tanks "experts" would be lined up to contribute to a mythology that alleged United States was about to be struck down by cyber-attack. Reporters would go into action as stenographers.

Such a cyberwar would deprive us of everything. Lights! Food distribution! Oil refineries would blow up! It would be worse than an earthquake!

Are your eyes rolling?

You don't see the "electronic Pearl Harbor" types much anymore. While they still lurk in the weeds as common vermin, for the most part they've been run off the pages of newspapers.

However, occasionally they still manage to get it up for a few minutes.

Today was such a day, courtesy of the Weekend in Review section of the Sunday New York Times. The article appears to have been spurred by an alleged cyberwar that crushed Estonia, a war seen mostly only by a couple journalists and computer security men.

"When Computers Attack" was the title of the piece.

"Anyone who follows technology or military affairs has heard the predictions for more than a decade," writes John Schwartz.

"Cyberwar is coming. Although the long-announced, long-awaited computer-based conflict has yet to occur, the forecast grows more ominous with every telling: an onslaught is brought by a warring nation, backed by brains and its computer resources; banks and other businesses in the enemy states are destroyed; governments grind to a halt; telephones disconnect..."

Schwartz describes the mythology accurately. The forecasts always grew more ominous because there were many of them. To be heard above the din of competing "electronic Pearl Harbor" scenarios, it helped if your made-up story was thought the most catastrophic and exciting.

Richard Clarke was one such man, always armed with the very best predictions of electronic disaster. He kept at it with great diligence until realizing one could get much more money for a book about how George W. Bush had not taken his advice on the war on terror.

Earlier this year, Clarke returned to "electronic Pearl Harbor" in his techno-thriller, Breakpoint. It has flopped.

If you look over to the side of this blog and surf out to I -- Vermin from Under Rock, you can read more about Clarke's take on the subject and its place in the national story.

DD was there for the beginning. I covered the subject better than anyone else, writing the first major scholarly article debunking "electronic Pearl Harbor," called -- unsurprisingly, "Electronic Pearl Harbor -- Not Likely."

It was paired with a proponent of "electronic Pearl Harbor" in the National Academy of Science's Issues in Science and Technology magazine. The "electronic Pearl Harbor is coming" proponent was some guy from within the thicket of national labs.

Electronic attack on the United States, he claimed, would be more destructive than the Northridge earthquake, which DD had just been through, living in Pasadena. The man was an unintentional laugh riot, not to be taken seriously at any speed. I cannot recall his name.

What would computer war look like, Schwartz mused in today's newspaper. How would it compare to the "blood-and-guts" kind of war?

"And is there really a chance it would happen at all?"

That the question is even asked shows how badly the "electronic Pearl Harbor" meme has worn. A decade ago no one even thought to put such a query into mainstream news articles on the subject.

Still, while the electronic Pearl Harbor lobby has been pushed out of the pages of the mainstream news, others parts of their grand mythology haven't changed.

Ten years ago, five years ago, China was always said to be plotting a cyberattack.

This became such a common claim, my old colleague -- Rob Rosenberger at Vmyths.com and a member of the US Air Force's first dedicated information warfare squadron, the 609th at Shaw AFB in South Caroline, made a joke of it. When writing, we started using variations on "the Chinee are coming!" or "the Chinee did it!" to explain networked computer glitches.

One might expect this idiotic script deserves reviving just for old time's sake. And so it is for the New York Times. You'll read much further down how it was a good story in the national newsmedia in 1999 -- that's eight years ago.

"China, security experts believe, has long probed United States networks," writes Schwartz for the Times.

"According to a 2007 Defense Department annual report to Congress, China's military has invested heavily in electronic countermeasures and defense against attack, and concepts like 'computer network attack,' computer network defense and computer network exploitation."

"According to the report, the Chinese Army sees computer network operations as 'critical to achieving 'electromagnetic dominance' -- whatever that is, early in a conflict."

"An all-out cyberconflict could have huge impacts ... " blabs some computer security vendor to the newspaper, joining the ten thousand other or so of his ilk who've done the same for the meme for over a decade.

Because they've been roughly shoved around by the cold shower of real war in Iraq in the news, the salesmen of "electronic Pearl Harbor" have changed their tune somewhat.

"I think cyberwarfare will be more subtle," admits the salesman for the Times.

The original archive of "electronic Pearl Harbor" contained dillies, too many genuinely ridiculous claims, astonishing in their collective unquestioned publication by respected news agencies. They were compiled by me for the e-publication, Crypt Newsletter. Crypt News lost its homepage/retirement home earlier this year when the prof who maintained the site for over a decade went into semi-retirement.

However, it remained comfortable and well in the Wayback Machine. So DD retrieved the collection and is furnishing an abridged version here.

Readers of this blog may drily note that while the "electronic Pearl Harbor" and cyberterror lobby has been eliminated from its place in the newsmedia, a worse nuclear-chem-bio-terror-is-easy cadre of expert pontificators replaced them.



electronic Pearl Harbor (or "EPH"): a bromide popularized by Alvin Toffler-types, ex-Cold War generals, assorted corporate windbags and hack journalists, to name a few. EPH is meant to signify a nebulous electronic doom always looming over U.S. computer networks. In the real world, it's a cue for the phrase "Watch your wallet!" since those wielding it are usually doing so in an attempt to convince taxpayers or consumers to fund ill-defined and/or top secret projects said to be aimed at protecting us from it. It has been seen thousands of times since its first sighting in 1993.

--from the Crypt Newsletter "Joseph K"
Guide to Tech Terminology


"Electronic Pearl Harbor" and variations on it, Crypt Newsletter has noticed, are now some of the most overused buzz-phrases in the topic of computer security and information warfare. Using Internet search engines, it is possible to quickly find over 500 citations for the phrase in on-line news archives, military research papers and press releases.

Paradoxically, overuse of the phrase has had quite the opposite effect desired by those who unwittingly wield it.

One can easily imagine p.r. handlers coaching our leaders, generals and corporate salesmen to not forget to say "electronic Pearl Harbor" at least one time just before giving a speech or interview. Since it is a gold-plated cliche, anyone with more sense than it takes to pour piss from a boot can use it as an infallible detector of Chicken Little-like cyber-bull.

Paraphrased: Anyone still caught uttering "electronic Pearl Harbor" in 1999 is either an ex-Cold Warrior trying to drum up anti-terrorism funding through the clever use of propaganda, completely out of it, or a used-car salesman/white-collar crook of some type.

Here then, Crypt News presents for your amusement, a selection of the unclothed emperors speaking of "electronic Pearl Harbor."

Note: To underline how rich in history the cliche has become, Crypt Newsletter recently began updating this list after skipping much of 1998. Congressmen, Pentagon officials and hack journalists are those most prone to deploying "electronic Pearl Harbor" ad nauseum. And at this juncture, Crypt Newsletter receives about 2-3 articles a week from the big mainstream press featuring cites on the potential for "electronic Pearl Harbor." Other common players, many of which are listed in this archive, constitute an assortment of aggressive shills pimping consulting services or spot hardware and software solutions aimed at avoiding "electronic Pearl Harbor."

These articles, all of which, obviously, are not included in this page, are distinguished by their mind-numbing repetition and similarity in tone.

The same names tend to appear over and over, always uttering the same menacing declarations.

And -- again and again -- the same clueless media organizations recycle the same clutch of quotes and cliches, uncomprehending or willfully indifferent to the fact that they aren't actually producing anything that is real news.

Other characteristics of "electronic Pearl Harbor" stories are:

1. Obsession with hypotheses upon what might happen -- not what has happened.

2. Rafts of generally insignificant computer security incidents accumulated as anecdotal evidence and delivered in out-of-context or exaggerated manner pointing to the insinuation that something awful is about to happen -- today, tomorrow, a year from now, two years from now . . . always in the not easily glimpsed future.

3. Abuse of anonymous sourcing and slavish devotion to secrecy. All EPH stories usually contain a number of "anonymoids" -- from the Pentagon, the White House, Congressional staff, computer security firms, intelligence agencies, think tanks or unspecified consulting firms. Frequently the anonymoid will allude to even more secret and terrible things which cannot be mentioned in print or the Republic will crumble.

4. Paranoid gossip -- the equivalent of which is offered up as still further proof the nation is in electronic danger. Russia, China, France, India, Israel . . . almost any country not-USA can be portrayed as taking electronic aim at the American way of life. Programmers of foreign decent or mixed American-foreign decent are tarred as potential cybersaboteurs in a kind of modern techno-McCarthyism. Teenagers are transformed into electronic bogeymen with more power at their fingertips than the Strategic Command. The allegations tend to be delivered by anonymous sources or "experts" not required to provide substantive examples backing up the gossip for the print journalists acting as their stenographers.

5. The standard of proof becomes plastic. If your definition of evidentiary proof is restricted to that which is demonstrated by a reproducible public testing process, EPH stories become very confusing. In EPH news, the standard of "proof" is radically different, equivalent to a fantastic but undemonstrated (or when 'demonstrated,' always secret) claim, often passed along by "hackers" looking for publicity, employees of the Pentagon, the National Security Council or related institutions.

This phenomenon has unfolded over six years since the initial prediction of "electronic Pearl Harbor" and national death by keyboard first reared its head.

Perhaps not unexpectedly, as the nation approaches the New Year 2000, the production of stories about a variety of "electronic Pearl Harbor" catastrophes -- hackers attacking under cover of Y2K problems; computer viruses timed to activate on, near or after the rollover; secret cyberwars with names like "Moonlight Maze" and "Eligible Receiver" and; fifth column saboteur programmers working in league with foreign powers -- has also accelerated.




New Year's Day: Reuters continued to insist on deluding itself and readers in spite of all quiet on the cyberfront on January 1, reporting, "While a general Y2K crisis appears to have been averted, concerns remain that malicious hackers have planted viruses that will hit in the days ahead when computer users boot up their machines . . ."

The news agency then produced an anti-virus shill from Computer Associates who warned balefully, "All computer users must take extra precautions during this virus onslaught . . . We can't stress enough the importance of powerful and reliable antivirus software . . ."



January 1, 2000

In the "famous last words" department, this quote -- supplied by a well-known "electronic Pearl Harbor" booster -- is the best thing Crypt News could find to certify the Y2K rollover:

". . . Y2K will illustrate what a attack could do . . . Anybody who says after January 1, 2000 that this [threat of cyber attack] is all just made up I think is an idiot."

--- James Adams, author of "The Next World War" and head of iDefense, a company that provides intelligence on cyberterror, appearing in USC's Networker magazine, 1998-99.
(Editor's note: In the early part of the decade Adams founded a computer security firm known as iDefense. It went bankrupt.)

Or how about this one from November 4, 1999:

``We expect that (terrorists) will attempt to use Y2K as a cover for putting some kind of attack into a vulnerable place . . . That is, when a Y2K solution goes in, they will fly underneath that with an attack of their own that will shut the system down . . . " said Utah Republican Senator Bob Bennett at a National Press Club event.

Or this from an issue of Federal Computer Week:

"Hackers will take advantage of Y2K," Assistant Secretary of Defense John Hamre [said] for a Congressional panel.




December 27, 1999: "Hackers loom over Y2K" was the title of this piece in the Chicago Sun Times.

"Hackers might use Y2K-related chaos as a cover to slip into computer systems, and computer viruses triggered by the new year may already be in place, some law enforcement officials are warning," read the piece.

A computer security salesman shows up: "[Hackers] probably won't be out partying," said a vice president of Telenisus, a local firm.

The bogeyman of foreign programmers working to install trapdoors under cover of Y2K is produced: "A top FBI official has warned that some technicians hired by companies to make Y2K repairs may have used the opportunity to plant a virus . . ."

"Jan. 1 has been described as the Super Bowl for virus writers," was another quote.

No evidence to back any of these claims up was produced.


December 20, 1999: In this transcript from ABC World News Tonight entitled "Computer Hackers Could Target Military," news reader Connie Chung stated:

"Computer experts have been worried for some time about a flood of viruses designed to disrupt the nation's computer systems over the new year. The systems may be at far greater risk than most people believe."

Chung continued: "ABC's Kevin Newman has been granted access to a group of elite hackers who usually operate in secret."

Yes, so secret, the well-known group -- The L0pht -- has a website, has appeared in the New York Times Magazine, has appeared before Congress, has appeared . . . well, you get the idea. For a secret group, they sure appear in the media a lot.

The purpose of the interview seemed to be aimed at convincing the viewing audience that "the L0pht" were the masters of the world.

Senator Fred Thompson appeared in the videotape, inadvertently acting as "the L0pht's" unpaid press agent: "I'm informed that you think that within thirty minutes the seven of you could make the Internet unusable for the entire nation. Is that correct?"

UNIDENTIFIED [L0pht] HACKER #1: "That's correct. It would definitely take a few days for people to figure out what was going on."

[Sound of Crypt Newsletter's channel-changer switching to WWF pro wrestling, where the phonus-balonus and bluster are more entertaining.]

-------------

December 19, 1999: "US Monitors Millennium Trouble Spots Around the World" was the title of a Tim Weiner penned piece in the New York Times.

In keeping with the overkill mania that characterizes New Year's Eve-as-doomsday reporting, this story ran with the predictable theme that terrorists everywhere are taking aim at the US as part of their Year 2000 party itinerary.

"From now until after the New Year's holiday, hundreds of FBI agents will be monitoring cyberspace for warnings, like ancients searching the skies for a sign, looking out for electronic assaults by hackers and tracking political extremists by computer.

"Civilian and military officials across the country, worried about an organized attempt to take down government computers, are watching everything from reservoirs to the Federal Reserve.

Like old Jacob Marley, Richard Clarke -- the broken record of the National Security Council -- is produced to rattle his electronic chains and howl menacingly for the rubes.

" . . . Richard A. Clarke of the National Security Council, repeatedly warns them that 'cyberterrorists' could launch computer attacks 'shutting down a city's electricity, shutting down 911 systems, shutting down telephone networks and transportation systems,' as he said in a recent interview."

More accurately, Clarke has been stupefyingly repetitive on the subject through 1999, beginning with another Weiner-penned article on February 1 (see further entries, below).





December 16, 1999: "Y2K -- Experts Say 1000 Computer Viruses Released by 2000" was the title of a Beijing China Radio International report broadcast in English to North America recently.

"Experts in the field are warning computer users of new viruses that are designed to break out with the coming of the new millenium."

" . . . But in the past year or two, the Y2K bug has been the main focus of attention, and computer viruses have been neglected somewhat," read the Chinese radio reporter over the air.


" . . . However, experts warn that in the less than 20 days before the coming of the new century, a minimum of 1,000 viruses will be released to celebrate, in a very selfish way, the new millenium. They suggest that you back everything up before the fateful day, invest in the latest anti-virus software, and keep your fingers crossed."




December 15, 1999: "Future War in Cyberspace" was the title of a special broadcast on the Voice of America US government radio station. Disclosure: Crypt News made an appearance in it.

"At least twice this year, [the Pentagon's] Dr. John Hamre has said the United States was in the middle of a cyber war -- and the pace of attacks on US Military computers has increased since then," read the announcer

John Hamre said: "We are in a day to day, virtual cold war. In that sense that we have people trying to disrupt the Department of Defense's computers on a daily basis. So far, we are staying ahead of the problem. But just barely."

Frank Cilluffo, of the Center for Strategic and International Studies think tank said the danger of cyberterror "is real and constant."

"The myth persists that the United States hasn't been invaded since 1812. I'd like to inform you otherwise. And that is the fact that invasion through cyberspace is now a daily occurrence," Cilluffo said for Voice of America.

" . . . George Smith is skeptical that offensive military operations will work very well in cyberspace."

"For years, Mr. Smith has been writing a newsletter on computer break-ins . . . He says Pentagon officials are overstating the danger from computer hackers and intruders."

"Nevertheless, [Smith] expects the United States and many other nations to try to create 'cyber-attack' forces: 'I think it is likely that people will try, I think it is unlikely they will have any impact.'"

"Mr. Smith says armies in Bosnia and the Gulf War faced computer problems, including viruses. He says they coped with them in much the same way they coped with flat tires on vehicles, or worn out parts on aircraft.

"[Smith] said] the idea that small groups of people, armed only with keyboards, could seriously hurt a powerful military force belongs in Hollywood -- not the battlefield."




"U.S. torpedoed on information warfare: Experts say the country isn't prepared to fight a war in cyberspace," was the title of piece from the December 9, 1999, issue of the Pittsburgh Post-Gazette.

The inevitable deluge of experts warned of more electronic doomsdays at a short info-war conference held at the Matthew B. Ridgway Center for International Security Studies at the University of Pittsburgh.

" . . . terrorists are getting wise to the potential for disruption hacking can cause, said Professor Stephen Sloan of the University of Oklahoma."

And cribbing from Washington Times articles on November 17 and 18 that the nefarious Chinese were planning to make a move in the field of cyberwar: "The Chinese are thinking of establishing a fourth branch of their military -- in addition to the army, navy and air force -- devoted exclusively to information war, said Lt. Col. Michael Warsocki," an Army officer.

"They think they're in a war now," Warsocki said for the Gazette. "Just the reconnaissance phase, but to them, it's war."

Buckle down, Warsocki! Buckle down!




Still more "Experts warn of hacker threat" was the title of a December 7, 1999, San Francisco Examiner piece.

It was another "electronic Pearl Harbor"-day piece on . . . Pearl Harbor Day!

"Despite numerous well-publicized computer break-ins and crimes, U.S. society remains dangerously vulnerable to hacker attacks on computer and communications networks, experts warn," was cliche number one.

Then a magic number and an unspecified but very bad hypothetical doomsday scenario appear: "Computer crime costs companies more than $100 million a year, but a far worse loss - perhaps in an international catastrophe triggered by a lone hacker . . . is possible, computer security experts said at a Stanford University gathering Monday . . ."

Then a National Infrastructure Protection Center analyst was deployed to furnish another hypothetical -- emphasis on "hype" -- scenario for which no evidence is provided: Osama bin Laden could instigate a computerized equivalent of the World Trade Center bombing. (Editor's note: This was PRIOR to the destruction of the WTC towers on 9/11.)

"Alan B. Carroll, an FBI agent . . . urged those at the conference to imagine a computer or communications version of the World Trade Center bombing - a disaster that brings down, say, computer or telephone networks on which society depends . . . 'Referring to the alleged terrorist Osama bin Laden . . . Carroll said that 'given the resources of this man, you can imagine the kind of damage he could do.'"




Life is full of delicious irony. On December 7, Pearl Harbor Day, the Athens Ta Nea published a story entitled "Greek Defense Ministry Establishes Cyber-Warfare Office."

It was . . . about electronic Pearl Harbor!

Much of the piece, furnished by the CIA's Foreign Broadcast Information Service, was devoted to the usual stack of repetitive and patently ridiculous claims about i-war cobbled together from assorted American stories on Pentagon info-warriors and the ubiquitous uber-wargame, Eligible Receiver.

Sub-slugged "Cyber-Soldiers in the Front Line," the Athens Ta Nea report breathlessly proclaimed:

"The Air Force base in Miami, Florida, is on 'red alert.' The operation -- an exercise -- involves the dispatch of heavily armed aircraft to bomb targets in North Korea during a supposed international crisis. The bomber pilots are waiting, engines ready, for the air-to-ground missiles to be loaded but an unforeseen event interrupts the exercise: at the last minute, crew members suddenly notice that, instead of missiles, all the storage depots are stocked with electric lighters!"

Crypt Newsletter almost fell out of the chair laughing.

"Pyle!!!!" screamed the always enraged Sgt. Carter. "Why are all these crates from Ronson stacked up at the front gate???"

"Well, Golll-eeee, Sarge, when I was shopping for a pack of ten lighters on Amazon the gol-durned '0' key kept sticking."

But back to the Athens Ta Nea story on "e-Pearl Harbor."

" . . . Only a few minutes before . . . gigantic transport planes take off, the crew notices that there is no fuel available!"

Those pesky hackers had drained the aviation gas from our birds on the runway! The nerve of them!

"The incident is not pure speculation," wrote the Ta Nea.

"Kept secret at all costs, the complete collapse of the US Pentagon's supply system occurred recently and was ingeniously characterized as 'the electronic Pearl Harbor'. Its perpetrators were a group of hackers secretly hired by the US Government to locate possible 'holes' in the government's information networks and close them. The tools available to the Red Team (as the group was named) during the 'cyber-attack' were only techniques and information accessible on the Web, with no further internal assistance. In record time, the hackers had incapacitated, apart from the supply system of the Armed Forces, the air traffic system and the energy networks.

"The story might sound like Hollywood, but it is no longer a movie fantasy . . . As far as Greece is concerned, the issue has also gone beyond the movie theaters: at the behest of Akis Tsokhatzopoulos, after recommendations by his colleagues, the Ministry of Defense will establish, as of next week, an Information Warfare Office within the YEETHA [National Defense General Staff].

"Dr. Alexandros Polimenopoulos, a special consultant to the Ministry of Defense, states that these soldiers will also be 'experts in the use of computer viruses, logic bombs, worm programs and other tools, which, used at the critical moment, could completely destroy the enemy's information infrastructure.'"

A diligent Crypt News reader in the US Air Force drily comments:

"Inform Athens Ta Nea we no longer have a base -- per se -- in Miami. A hurricane destroyed it. NONE of the hurricane-proof hangars survived. Repair teams resurrected 12-15 buildings for emergency services, but the rest of the base disappeared in the hurricane or fell to a wrecking ball. 'Homestead AFB' was renamed 'Homestead ARB': a tiny little component of the Air Force Reserve."



December 1, 1999: "Pentagon Planners Gird For Cyber Assault" was the title of a Philadelphia Inquirer generated "electronic Pearl Harbor" story.

It contained the standard EPH elements and claims.

"In a large windowless room of a nondescript office building a few miles from the Pentagon, the war of the future is being waged," read the Inquirer.

". . . If fears of a concerted cyber attack on the U.S. military are realized - what Deputy Defense Secretary John Hamre has called an 'electronic Pearl Harbor' - this room, the Global Network Operations and Security Center, is where the battle will be won."

The Inquirer story warns, "the rapidly approaching Y2K rollover has military officials wondering if they will be able to distinguish between a network intrusion and the millennium computer glitch."

"Capt. Bob West, deputy commander of the Joint Task Force on Computer Network Defense, said there was real potential for a 'crippling' attack at any time because of 'substantial' vulnerability . . ."

The malicious code planted under the cover of Y2K threat scenario is described: " . . . there is some worry that intruders have planted code disguised as Y2K protection but set to go off Jan. 1, like a time bomb."

The now always secret, but seemingly unproductive, cyberwar against Serbia is cited. And new Pentagon jargon for "info-war" is invented: "non-kinetic warfare."

"Some of this 'non-kinetic' warfare occurred during the bombing campaign against Serb forces in Kosovo," reads the Inquirer.

Then the Eligible Receiver script appears.

"A 1997 war-game exercise known as Eligible Receiver showed that sophisticated hackers (in this case from the National Security Agency) could cause power outages and 911 emergency phone system overloads . . . "

Moonlight Maze is referenced: "A real attack occurred from January through March, described by officials as a 'sustained, well-resourced intrusion'. . . No one is commenting, even off the record."




November 18, 1999: "Internet Warfare Concerns Admiral" was the title of another piece by Bill Gertz of the Washington Times.

It continued the story line of China cast as a Net menace started by Gertz in an article the previous day.


"The Pentagon's top intelligence official said yesterday that China's announced plans to conduct 'Internet warfare' poses a future threat to U.S. military dominance on the battlefield."


"We are clearly interested and concerned about this whole idea of information attack," said Vice Adm. Thomas Wilson, director of the Defense Intelligence Agency (DIA), to Gertz for the Times.

Richard Allen, national security advisor during the Reagan administration, is suddenly produced as an expert on cyberspace and information warfare.

"Richard Allen . . . said the Chinese could inflict strategic damage from military-backed information warfare attacks."

"Mr. Allen said the recent computer attacks on the Pentagon by an Israeli hacker and two teen-agers in California would pale in comparison to a Chinese military computer strike."

"This is something about which we ought to be mightily alarmed," said Allen to the Washington Times.




November 17, 1999: "China Plots Winning Role in Cyberspace" was the title of a Bill Gertz front page story in the Washington Times.

The Washington Times is what Congressmen, particularly Republicans, read regularly before work. As such, material in it is influential in decision-making.

This particular piece continues the current Zeitgeist thread in which mainland China is painted as a threat.

"It is essential to have an all-conquering offensive technology and to develop software and technology for Net offensives so as to be able to launch attacks and countermeasures on the Net, including information-paralyzing software, information-blocking software, and information-deception software," Gertz quoted a Chinese military publication as stating. He neglects to mention that US Department of Defense print similar tripe fairly regularly -- and have done so for most of the decade.

Pentagon "anonymoids" show up on schedule: "A senior Pentagon official said he was notified about the article, which has raised concerns among defense officials who see China's information warfare capabilities as a potential threat to U.S. civilian infrastructures . . ."

An "expert," "William Triplett, co-author of a new book on the PLA," said: "All of this offensive-warfare talk, when China is not threatened by anyone, shows that the dragon is at the point where it doesn't have to hide its claws."

Then the scary hypothetical scenario of catastrophe is produced.

According to Triplett, by way of the Washington Times, "China could launch a devastating computer-run sabotage operation by attacking U.S. oil refineries, many of which are grouped closely together in areas of Texas, New Jersey and California."

"A [Chinese] computer attacker could penetrate the electronic 'gate' that controls refinery operations and cause fires or toxic chemical spills . . . "

-------------

In England, Independent Television News On-line published a story in November entitled, "Fears as anarchists organise on the Net."

"President Clinton has pledged $2 billion this year to protect the United States from what has been called 'an electronic Pearl Harbor,'" read the piece.

"In Britain the Government is also waking up to the threat."

"The threat is escalating on pretty much a weekly basis. New tools and technologies are evolving all the time," was one quote from D K Matai, the head of a small UK company that sells solutions for Internet troubles that usually only his company can see.

"The Internet is a military experiment that has escaped [from the US military's] control. It's a whole new way of organising," he said for ITN.

"In the City of London, if you were to hit two or three places - nor more than that -they would be able to turn the city off and that would stop the banking system and it would stop the share-trading system . . . Identifying the crazed, skilled cyber attacker is perhaps the single most difficult task that the cyber spooks face at the moment," said Peter Sommer from the London School of Economics for ITN.

The turn-off-the-power story, it seems, is also popular in the UK media.




"US Corporations Warned of Cyber-Terrorism" was the headline of piece that appeared on November 4, 1999, in the "The Washington File" -- a product of the Office of International Information Programs, U.S. Department of State.

"With the increasing use of the Internet in business operations, it will not be long before, 'more damage can be done with a keyboard than with a car bomb,' according to Nickolas Proctor, Executive Director of the Overseas Security Advisory Council (OSAC). OSAC is an office within the State Department devoted to fostering the exchange of information on security issues between government, businesses and other organizations operating internationally."

"Assistant Secretary of State for Diplomatic Security David Carpenter told [an] audience of business security specialists that they must educate themselves about the mounting threats of cyber-crime. He said terrorists are constantly devising new ways 'to cripple business, government, and infrastructure,' and inventing new methods of 'creative destruction.'"

In what can only be described as a continuing propaganda exercise aimed at the press, the Pentagon grail, Eligible Receiver -- or possibly the new edition of Eligible Receiver -- Zenith Star -- was cited.

"Michael Peters, the technical director for operations, readiness and assessments at the National Security Agency, described his successful efforts to expose weaknesses in the security of U.S. government information systems. In an exercise to test the vulnerability of systems within the Department of Defense (DOD), Peters said a team of 20 government information experts posed as adversaries attempting to break through DOD computer security . . . 'The bad guys won,' Peters said. 'We were able to cause serious problems for DOD.'"



On November 4, 1999, national counter-terror guru appeared yet again in a story entitled "US Said Vulnerable to Cyber Attacks" distributed by the Associated Press.

Sounding like a broken record, or a talking parrot, depending upon your point of view, Clarke declaimed:

``We could wake one morning and find a city, or a sector of the country, or the whole country have an electric power problem, a transportation problem or a telecommunication problem because there was a surprise attack using information warfare.''

"Clarke compared the reliance [on computer networks] to former drug addicts enrolled in a recovery program," read the AP article.

``We need to take a lesson from that -- at least they know they have a dependency problem. Many of you are still in denial.''

"[Clarke] said [programmers] hired to make a company's computer system Y2K compliant could easily slip `a little Trojan horse or malicious code' into the system instead."

``We expect that (terrorists) will attempt to use Y2K as a cover for putting some kind of attack into a vulnerable place . . . That is, when a Y2K solution goes in, they will fly underneath that with an attack of their own that will shut the system down . . . " said Utah Republican Senator Bob Bennett at a National Press Club event.




The Los Angeles Times continued the proud tradition of unsophisticated, shallow reporting on "electronic Pearl Harbor" with an October 31, 1999 -- Trick or Treat day in LA county -- article, entitled: "US Scurries to Erect Cyber-Defenses."

The article, written by Bob Drogin, is unspectacular in that it merely mimics similar reporting done by competing newspapers weeks -- well, actually sometimes even years and months -- before the LA Times joined the business of recycling the same cliches.

In the Times piece, it's "round up the usual suspects:" "The stakes could not be higher," writes Drogin. " . . . how can America best protect itself from hostile nations, foreign spies, terrorists or anyone else armed with a computer, an e-mail virus and the Internet?"

George Tenet, CIA director is quoted: "Potential targets are not only government computers but the lifelines we all take for granted -- our power grids and our water and transportation systems."

Another Pentagon wargame scenario, this time called Zenith Star, is invoked. The standard pro forma claims are issued: "enemy hackers supposedly had triggered blackouts . . . They paralyzed 911 systems . . . They started disrupting crucial Pentagon computer networks."

Repetition is a component of the Times piece.

Just a couple paragraphs from the mention of Zenith Star, the Pentagon's 1997 grail, Eligible Receiver, is repeated. The same claims are made: " . . . a team of NSA hackers proved that they could easily disable power, telephones and oil pipelines across the country as well as Pentagon warfighting capabilities."

The reader should ask himself this general question: If such claims are so demonstrably obvious -- which is a characteristic of the general direction of reporting on "cyberwar" -- why is it necessary to repeat them so frequently?

"We see more and more terrorist organizations . . . are recruiting computer-smart people and even providing the training for them," said John Campbell of the Pentagon's Joint Task Force for Computer Network Defense.

And those terrorist organizations would be? No one can say.

An anonymous "senior" official makes an appearance: "[we are] under constant attack, more than one a day from outside the country."

The usual ripping up of Webpages from NASA-JPL, NDU.EDU., the Naval Coastal Systems Center and others are offered as proof of cyberattack.

And Moonlight Maze was an operation in which "vast amounts of technical defense research were illegally downloaded and transferred to Russia."

And those materials would be? No one can say.

From the LA Times, attributed to CIA director George Tenet:

"Potential targets are not only government computers but the lifelines we all take for granted -- our power grids and our water and transportation systems."

From the LA Times, attribution by way of the Pentagon's John Campbell of the Zenith Star "operation" -- "enemy hackers supposedly had triggered blackouts . . ."

From Richard Clarke, National Security Council counter-terrorism expert, in the August issue of Signal magazine:

"Envision all of these things happening simultaneously - electricity going out in several major cities; telephones failing . . ."

Again, from Richard Clarke, this time in the February 1, 1999, issue of the New York Times:

"I'm talking about people shutting down a city's electricity . . . shutting down 911 systems, shutting down telephone networks and transportation systems. You black out a city, people die. Black out lots of cities, lots of people die."




The Economist published a "cyberwar" editorial on October 30 entitled "Asia's lethal computers: Nerd world war." As far as "electronic Pearl Harbor"-related pieces went, it displayed the "Yellow Peril" and the let's-write-about-what-might-have-happened- not-what-did fetishes.

"Hacking, spamming and spreading viruses. Each is a means to disrupt an enemy's computer systems, and each has been employed by whizz-kids, maybe [CN emphasis added] even by governments, in recent international disputes . . . " read The Economist.

"Especially in Asia, computer nerds have nudged their way to the front line this year, arguing that the Internet is a potent weapon."

The editorial outlined a few "cyberwars" that were said to have happened -- but which seem to accomplish nothing -- if they are even noticed at all outside of the media. "Jose Ramos Horta, a Timorese leader, vowed that specialists would infect computers of the Indonesian banking system with viruses," read the article.

"One report suggests that 72,000 'cyberspace attacks' [have been] launched from China against Taiwan in August alone."

"The toll can be severe," wrote The Economist. "The Pentagon reckons that last year the Taiwanese spread two viruses, known as the Bloody 6/4 and Michelangelo . . . They damaged some 360,000 computers in China, at a cost of $120 million."

"Hackers at NATO may [CN emphasis added] have meddled with Yugoslavia's communications system . . . "

"Cyber attacks have become a favourite topic of military strategists," read The Economist.

No argument there.




The truly wonderful thing about "electronic Pearl Harbor" and "cyberwar" is that you can declare both without providing any evidence to substantiate either.

"U.S. Opened Cyber-War During Kosovo Fight" was the title of a Scripps Howard News Service piece published in the Washington Times on October 24, 1999.

Even by the stretchy standards of "electronic Pearl Harbor" story-telling, the missive was notable for its megalomaniacal and grandiose tone.

"With utmost secrecy during the war in Kosovo, the United States triggered a superweapon that catapulted the country into a military era that could forever alter the ways of war and the march of history . . . Silently, American forces launched offensive cyber-combat, a development of breathtaking promise and peril that some experts say matches in significance the first use of bombs dropped from warplanes during World War I and the nuclear decimation of Hiroshima in 1945," claimed the piece.

This is a rather interesting claim . . . in the sense that the observation of delusional and psychotic behaviors are interesting.

Essentially, it compares an alleged cyberwar in Kosovo -- of which it has been remarkably hard to glimpse even the slightest manifestation -- with the incineration of tens of thousands of Japanese civilians by atomic bomb in World War II.

Which Crypt Newsletter thinks its readers will agree . . . was hard to miss.

The Scripps Howard article was filled to the gunwhales with theories, hypotheses, sci-fi scenarios and a standard number of anonymous national security sources peddling the same.

To wit, "a cruise missile [could be reprogrammed] to turn around and plow into the ship or plane that fired it."

"Details are still classified, but top U.S. military officials only now confirm that during NATO's air war last spring, the United States launched a computer attack on Yugoslav systems . . . " went the piece.

Details about U.S. "cyberwars" are always secret -- classified. Ssshhhh! It burnishes their cachet. However, the Scripps piece was wrong about the confirmation of cyberwar vs. Serbia.

Unnoticed by many in the big mainstream media, the magazine Inside the Army published an article during the Kosovo conflict on April 20 of this year. In it, readers find: "[Asst. Secretary of Defense John Hamre stated] U.S. forces are conducting their own cyber attacks on Serb computers describing a campaign [waged by the Air Combat Command] as 'very heavy electronic warfare against a capable opponent'."

Claims made by the Scripps piece include anonymous sources claiming such non-provables as disruption of the Serbian command network and "keyboard warriors" planting fake electronic mail.

US info-warriors, claimed the article, "can plant computer viruses, erase computer memory, turn an electrical grid on or off and redirect the flow of money in, for instance, a leader's bank account."

Which fails to explain why the Air Force relied so heavily upon high explosive bombs and fancy chaff dispensers -- things you can see as opposed to things you can't -- to attack the power plants around Belgrade.

"Also vulnerable to U.S. cyber-attacks are such critical pillars of foreign civilian infrastructure as public telephone networks; electric or gas production and distribution; water supply; emergency services; financial systems; mass transit, railways and airports," reads the article.

It's no surprise that Crypt Newsletter maintains most of the debate about information warfare coming from the Pentagon is the equivalent of a propaganda war meant to impress Congress, other military men sanguine about its efficacy and passers-by rather easily gulled by Tom Clancy-like stories at home and abroad.

There are, to be sure, literally many easily understood reasons for this: massaging of budget requests, pseudo-public justification for projects of uncertain quality (CN calls this the "My-boss-thinks this-is-a-waste-of-time-so-plant-something-to-the-contrary-in-the- local-paper-that-he'll-read-at-breakfast" ploy), simple ego, salesmanship gone mad, different agencies all jockeying for command roles in the alleged endeavor, et cetera.

While our information warriors are said to be the mightiest in the world, the Scripps Howard piece also reads: "A nation that would have no chance challenging America's conventional or nuclear forces might well prevail in a computer attack."

Then the standard "electronic Pearl Harbor" cast of enemies to the American way are invoked as potential threats: "Among the most sophisticated are India, Syria and Iran [anonymous] experts say."

And the Chinese -- outraged over the bombing of their embassy in Serbia -- "revealed an astonishing 3,000 to 4,000 'back doors' into U.S. computer systems" -- constituting another unverifiable and, on the face of it -- rather ludicrous, claim supplied by "Jay Valentine, head of Infoglide Corp., an Austin, Texas, company that investigates computer security breaches for the U.S. government."

The article goes on to state that this is only "about 5 percent" of the trapdoors the always-to-be-watched Chinese have been able to install in American computer systems.

In the spirit of the times, where the Yellow Peril is now said to be responsible for many plots often seemingly derived from the spirit of Sax Rohmer and his sinister Dr. Fu Manchu -- the theft of nuclear secrets, the planting of software boobytraps under the cover of Y2K remediation, the running of intelligence operations in America under the cover of Chinese-American businesses -- the commie Chinese are also said to be possibly planning to strike America with computer viruses.

If so, they will have to achieve something really spectacular, Crypt News notes, or the accomplishment will likely go unnoticed among the 40,000 computer viruses already tabulated in anti-virus industry labs.

The remainder of the article is devoted to stereotypical and often mutually contradictory Strangelovian theorizing by assorted Pentagon and intelligence agency windbags over the alleged capability of information warriors -- the same talk that has been circulating since 1993.

1. " . . . But a cyberattack on a country's power grid, while militarily defensible, can cause more calamities than a missile and far more 'collateral damage' to innocents than it causes harm to an enemy's forces or ability to fight."

2. Less civilian casualties -- because it's only cyberwar, not blow-'em-up-type war.

3. More civilian casualties -- because cyberwar is more dangerous than blow-'em-up-type war. "It is not benign. It can potentially be very, very deadly," according to "Michael Swetnam, a CIA veteran and consultant to the White House and Senate."

4. Cyberwar could escalate to nuclear war: "Russia, for instance, already has vowed that it will react to a computer attack 'by any means' - including with nuclear weapons."

This is what the info-war hawks at the Pentagon love to talk about.

A great deal of the flavor of bloviation in this article can be seen as the result of simple mirroring. American journalists covering these stories tend to be uncognizant of the impact on people overseas of the periodic, albeit often weird, declarations of the U.S. Department of Defense and ancillary national security mandarins.

Quite frequently those on the receiving end go on to imitate the same, so as not to appear laggard before their national leaders.

For example, National Security Council-member Richard Clarke stated for the press in March of this year that, "An attack on American cyberspace is an attack on the United States, just as much as a landing on New Jersey . . . The notion that we could respond with military force against a cyberattack has to be accepted."

And the US Army rather publicly announced at the beginning of the decade that it was interested in getting into the business of developing computer viruses as weapons to be thrown at an enemy.

The December 1991 issue of the Bulletin of Atomic Scientists, for instance, featured an un-bylined article entitled "Attention hackers: Uncle Sam wants you," which read: "The US Army has caught the computer virus bug and is now expanding its interest in germ warfare to include electronic germs."

The US Army, said the article, was "soliciting proposals for the development of a 'weaponized virus' or a piece of 'malicious software' that could destroy enemy computers or software."

"This is the Army, we're in the weapons business," said one of the Army's project engineers.

It comes as no surprise, then, when other countries issue similar proclamations . . . sometimes years after the US military professed a desire for involvement in the same types of projects.

In fact, a good intelligence analyst would tell you this is to be expected.


October 22, 1999: A Defense Information and Electronics Report story entitled "DOD Official Says Hackers Are More Sophisticated Since Solar Sunrise" reveals a Pentagon official, Arthur Money, and a National Security Council official, turning up the volume once again on the issue of cyberterror.

It's worse than "electronic Pearl Harbor," claims an official, adhering steadfastly to the pro forma requirements of a good "electronic Pearl Harbor" story:" absence of smoking guns, allegations that unnamed "state actors" are involved and reliance on impressive-sounding but devoid-of-content policy wonk jargon like "assymetric attack" and "existential terrorism."

"Moonlight Maze brings a whole different, much more sophisticated approach . . . But it also brings another dimension -- no longer with hackers, but with the problem of a state-sponsored attack," said Money for the publication.

Ironically, alert readers will recall that Arthur Money has not been averse to contributing to the mythos of the hacker as national security menace with his old story of hospital blood-type information tampering. (See September 8, 1999 entry, below.)

The publication explains that Moonlight Maze was more serious than a previous cyberwar the Pentagon blew the whistle on -- Solar Sunrise -- "because of reports the hacking originated from the Russian Academy of Sciences . . . Reports indicate the hackers accessed sensitive DOD science and technology information."

"Moonlight Maze points a much stronger feasibility of an asymmetrical attack sponsored by a nation state," writes the publication.

The DI&ER article went on to mention that critics of the Pentagon maintain DoD uses EPH to scare financing from Congress.

Money said for the magazine that the danger of EPH was "not exaggerated."

Jeffrey Hunker, a colleague of Clinton administration counter-terror guru Richard Clarke (also well known to readers of this archive), claimed that "electronic Pearl Harbor" is not scary enough to accurately describe the nefarious Internet threats aimed at the Department of Defense.

"[The term Electronic Peal Harbor] connotes this 'lights-out' idea," Hunker said for Defense Information. "It tends to oversimplify the threat, which ranges from existential terrorism to overt acts to overthrow the military. . . . It trivializes the real [danger], which I think is much more than what's been understood."




October 9, 1999: "In Theory, Reality, US Open to Cyber-Attack -- An NSA test exposed vulnerability of critical computer systems to hackers; Outside assault proved it," was the sensational headline from the Los Angeles Times.

The piece continued the trend of inexplicably poor reporting on Moonlight Maze by the Times.

LA Times reporter Bob Drogin's pieces on Moonlight Maze in the second week of October have been notable for their great reliance on anonymous sources and a number of notable factual gaffes.

In paragraph seventeen, buried near the end of the piece, Drogin writes: "Indeed, the evidence suggests a certain amount of hype and hysteria have overshadowed the reality of cyberspace."

It was an inadvertently telling choice of words, for in the story's second paragraph -- one of the piece's impact points -- Drogin falls prey to the same phenomenon.

Drogin invokes the Pentagon ghost story of Eligible Receiver -- the secret DoD wargame conducted two years ago which proponents of "electronic Pearl Harbor" insist demonstrated the nation could be flattened by cyberattack.

Drogin writes: "The [Eligible Receiver] hackers broke into networks that direct 911 emergency systems."

It is a clear and rather extravagant error.

Appearing in June of 1998 to testify before Congress, Ellie Padgett, deputy chief of the National Security Agency's office of defensive information warfare spoke of how Eligible Receiver addressed the alleged vulnerability of the 911 phone system.

In a simulated exercise, Padgett said, "we scripted (an) Internet message (that) would be sent out to everybody saying there was a problem with the 911 system, understanding that human nature would result in people calling the 911 system to see if there was a problem."

The working idea in this part of Eligible Receiver revolved around the hypothesis that many people viewing the message on the Internet in a newsgroup might panic and phone their local 911 trunk, causing a jam-up on the line.

"It can probably be done, this sort of an attack, by a handful of folks working together . . ." Padgett said.

This is an extremely far cry from Drogin's assertion that the 911 system was broken into by alleged Eligible Receiver hackers. In fact, it has nothing at all to do with breaking into a 911 computer system, whatever that might be.

However, it is consistent, thematically, with the flavor of of the mythology propagated on Eligible Receiver.

In fact, during an interview with Crypt Newsletter in the summer of 1998 concerning Eligible Receiver, a Pentagon spokeswoman for the affair asserted "no actual switching systems" were broken into at any time during Eligible Receiver. She went on to say that Eligible Receiver had only simulated these attacks on NSA computer networks set up to emulate potential domestic national systems.

Nevertheless, Drogin also writes in paragraph two of the Times piece: "In less than three months, the [Eligible Receiver hackers] secretly penetrated computers that control electrical grids in Los Angeles, Washington, and other major cities."

The lead claims in the Los Angeles Times article are the framing points for a larger discussion on how Moonlight Maze has publicly proved what the Eligible Receiver exercise secretly demonstrated two years ago, which constitutes another rather extensive leap in linking the facts that are known about both.

Drogin quotes from counter-terrorist "czar" Richard Clarke:

"An enemy could systematically disrupt banking, transportation, utilities, finance, government functions and defense."

The Clarke quotes are functionally identical to the same assertions made for Signal magazine (see below) in August of this year when it was suggested that the Freedom of Information Act could be "modified" as part of a plan to help protect us from cyberattack. They add nothing to the actual body of knowledge on Moonlight Maze.

"It's cheaper and easier than building a nuclear weapon," said Clarke for the LA Times.

Buried in Drogin's piece is comment by John Gilligan who "directs information technology and information systems at the [Department of Energy.]"

Gilligan, while talking about hacker attacks, "[also argued] that the danger is usually overstated," according to the Times.

"To get access to the electricity grid computers, to start to shut some of the grid, you have to really work at it . . . To do a Pearl Harbor, you need a lot of inside information."

Which is precisely the point Crypt Newsletter made in a more lengthy article late last year.

Or read this media analysis condensing what is known about Moonlight Maze over the past nine months.




On National Public Radio's "All Things Considered," Representative Curt Weldon declaimed on topics related to Moonlight Maze.

"[Curt] Weldon says a successful hacker could disrupt civilian life, striking hospitals or train systems," said the NPR interviewer.

WELDON: "It's not a matter of if America has an electronic Pearl Harbor, but when."

This favorite Weldon mantra has appeared a number of times in the past year.




October 1, 1999: Electronic Pearl Harbor between 1:30 and 3:30 quoth the teenage hacker.

"Hacker Threatens To Leave Country In The Dark" was the headline of an un-bylined story issued by Reuters on Wednesday, Sept. 29.

"A computer hacker has threatened to break into the computers of Belgian electricity generator Electrabel Wednesday afternoon and halt the power supply to the entire country," proclaimed the news service in 500-word squib.

``Tomorrow I will leave Belgium without power, and that is not so difficult,'' an anonymous hacker crowed to a Belgian newspaper.

``Wednesday I will get into Electrabel's computers between 1:30 and 3:30 in the afternoon and shut down all the electricity.''

The Belgian electric company, Electrabel, "said it was taking the threat seriously but felt that the hacker had little chance of succeeding."

``There is very little chance that Belgium could be without power,'' said a corporate spokersperson.

No national blackout was subsequently reported.

Reuters reporters have established a reputation as easy targets for "hacker" pranks. Earlier this year, the news agency ran a story in which a hacker group claimed to have hijacked a British military satellite. This, too, was revealed to be without substance. (See below or Crypt News 51 for extended comment).

This new addition to the Crypt Newsletter Joseph K Guide to Tech Terminology results:

cyberwar: a condition in which electronic conflicts, threats and absurd claims are reported by the media but not experienced by anyone else. Anonymous teenagers or employees of the Pentagon tend to be central players.

Usage: After being forbidden to attend a rave in Antwerp by his mother, the teenage "hacker" went grumpily to his room and declared a cyberwar on Belgium by sending a menacing electronic mail to a local reporter.






The August '99 issue of Signal magazine ran a long interview with counter-terror national security advisor Richard Clarke.

Entitled "Hidden Hazards Menace U.S. Information Infrastructure," it contained all of the cliches, bromides and unbacked-up theories and allegations about information warfare that Crypt Newsletter readers have come to know and love over the past five years.

"The greatest threat to U.S. security may come from internal software or hardware trapdoors lying dormant in the nation's critical infrastructure. The digital equivalent of Cold War moles, these hidden threats would serve as access points for criminals, terrorists or hostile governments to extort money, impel foreign policy appeasement or ultimately launch crippling information attacks on the United States," states Signal.

There is "a very real possibility of an electronic Pearl Harbor," said Clarke for Signal.

"Without computer-controlled networks, there is no water coming out of your tap; there is no electricity lighting your room; there is no food being transported to your grocery store; there is no money coming out of your bank; there is no 911 system responding to emergencies; and there is no Army, Navy and Air Force defending the country . . . All of these functions, and many more, now can only happen if networks are secure and functional.

"A systematic [attack] could come from a terrorist group, a criminal cartel or a foreign nation . . . and we do know of foreign nations that are interested in our information infrastructure and are developing offensive capabilities that would allow them to take down sectors of our information infrastructure."

For Signal, Clarke claimed "trapdoors" unspecified and theoretical, "some of which may already be in place, as the greatest potential threat to the information infrastructure. Residing in the operating systems of key networks that support the U.S. critical infrastructure, these trapdoors would provide windows of opportunity for any ill-intentioned adversary to wreak considerable havoc. 'It is at least theoretically possible that a nation could insert such trapdoors, and then make demands of the United States under threat to our infrastructure.'"

And then the standard cyber-terror scenario that any fifteen year-old could dream up was deployed.

"One possible scenario would feature a demand leveled by a foreign government or terrorist group. When the U.S. government refuses to comply, this adversary demonstrates its capabilities by reducing a region of the United States to chaos. 'I think the capability to do that probably exists in the hands of several nations,' Clarke states. 'I think it could exist in the near future in the hands of criminal and terrorist organizations.'"

Clarke then repeats the mantra of "Eligible Receiver": "Envision all of these things happening simultaneously -electricity going out in several major cities; telephones failing in some regions; 911 service being down in several metropolitan areas. If all of that were to happen simultaneously, it could create a great deal of disruption, hurt the economy . . . "

The updating and patching of software is detailed as a grave threat to national security.

"Malicious individuals and organizations regularly peruse [software patch] lists, and they probe systems to find someone who has not applied the patch," said Clarke.

Clarke alleges, theoretically -- of course, that foreign governments inimical to the United States, could be, were or are inserting malicious trapdoors in the computer and networking industry by having their agents pose as programmers who are subsequently hired to do contract work on the inside. So anyone who employs foreign nationals, or Chinese-Americans, or . . . or . . . is vulnerable. " . . . a few could act as enemy saboteurs, either sympathetically or through blackmail or bribery."

"Malicious, self-propagating viruses strike computer systems worldwide," states Signal, rather obviously. Therefore viruses, too, will be the harbinger of "electronic Pearl Harbor." "It doesn't merely have to be the use of a trapdoor to enter a system, seize control and destroy the system . . . Any combination of malicious virus, denial of service and trapdoor disruptions can create chaos," states Clarke.

Clarke democratically opines for Signal that the US government is willing to work with corporate America to change laws that could be "impediments to information assurance and security."

And these impediment laws might be?

Why, only ". . . the Freedom of Information Act, antitrust legislation and liability laws," reads the Signal piece.




From the London Sunday Times, July 25, 1999:

"Russian Hackers Steal US Weapons Secrets" was the title of this breathless article.

"American experts have long warned of a 'digital Pearl Harbor' in which an enemy exploits America's reliance on computer technology to steal secrets or spread chaos as effectively as any attack using missiles and bombs." wrote the Times.

In this piece, the ubiquitous Assistant Secretary of Defense, John Hamre, appeared claiming: "We are in the middle of a cyberwar."

This particular "cyberwar," which you may not have heard of, has been dubbed Moonlight Maze.

The Hamre quote is not new, dating from the first quarter of the year. [See subsequent entries.]

The Times wrote this secret cyberwar could be with Russia or China and speculated: " . . . Russia's relations with America have reached their lowest ebb since the Cold War because of NATO's intervention in Yugoslavia. Relations with China have also suffered. An offensive in cyberspace may be their one way of retaliating without getting into a shooting war."




On June 26, 1999, the Christian Science Monitor featured a story entitled: "The hidden dangers of information warfare."

The Monitor's reporter cited the Pentagon's secret exercise, Eligible Receiver, as an opportunity to invoke the cliche.

". . . Operation Eligible Receiver demonstrated the potential vulnerability of the U.S. government's information systems. The National Security Agency hired 35 hackers to launch simulated attacks on the national information structure. The hackers obtained 'root access' - the highest level of control - in 36 of the government's 40,000 networks.

"If the exercise had been real, the attackers would have been able to create power outages across Los Angeles, Chicago, Washington, and New York. They could have disrupted the Department of Defense's communication systems (taking out most of the Pacific Command) and gained access to computer systems aboard U.S. Navy vessels.

"It was a disturbing exercise. So much so, that several top White House officials have spoken of the possibility of an 'electronic Pearl Harbor' attack on the U.S. mainland. Added to these vulnerabilities is the fact that most Americans have no sense of how information warfare will affect them."

Further along, the Monitor called upon James Adams to provide the pro forma warnings.

"It is a very serious problem," said Adams for the Monitor. "And it's getting more serious day by day. The structures that we have held constant for many years are disappearing and we need to look at things with new eyes. After all, your defenses are only as good as the single event that takes you down."

Adams is well-know to Crypt Newsletter readers as author of "The Next World War," a book on the threat of information warfare. It contained a number of laughable hoaxes, among them the infamous Gulf War virus myth, which Adams accepted as fact.

Adams is also the director of iDefense, a northern-Virginia based firm that offers consulting services aimed at the avoidance of the type of "electronic Pearl Harbor" scenarios he predicts.

An iDefense press release distributed on June 3, 1999, states, in the grand hyperbole that is rather standard for missives distributed via PR Newswire:

.
"Infrastructure Defense, Inc. (iDEFENSE), an innovative market leader in protecting industry from cyber- attacks, announced today the launch of the only service available to the private sector that provides daily, comprehensive critical infrastructure threat and vulnerability alerts. Available next Monday (6/7/99), the unique service provides iDEFENSE clients daily notification and tailored analysis of a wide range of threats, vulnerabilities and incidents that could adversely impact their critical business operating systems.

"The ongoing cyber-war between the government and various hacker groups highlights the urgency for the public and private sectors to develop a comprehensive approach to protecting the 'critical infrastructure.' While the hackers are currently focused on federal computer systems, the skirmish could quickly spill over into the private sector . . . 'One need only look at today's headlines to recognize industry's need for iDEFENSE -- the trusted source for knowledge it can use to protect the critical networks and systems upon which it are so dependent," said James Adams, CEO of iDEFENSE. "iDEFENSE draws upon an unparalleled understanding of the critical infrastructure and a keen awareness of the growing threats and vulnerabilities confronting industry to provide its clients a timely and truly unique service."

[iDefense went bankrupt and ceased operation a few years ago. Its CEO's bizarre proclamations, however, deserve preservation.]

James Adams was highly quotable on what would happen in cyberwar. No one in the mainstream press cast even the slightest fishy eye at his claims, most of which were laughably absurd.

Here then, is a small sampling of James Adams:

Pentagon hackers employed in Eligible Receiver "did more than the massed might of Saddam Hussein's armies, than the Nazis in the Second World War." From Techweek, 1999.

"iDefense is way ahead of the competition." From Washington Technology, "the business newspaper for government systems integrators," November 1999.

"Which brings us to the final rung on the escalatory ladder: the virtual equivalent of nuclear deployment. I offer as illustration Eligible Receiver." From a speech, "The Future of War, Wright-Patterson Air Force Base, June 2000.

"Consider the recent LoveLetter virus... The effect? The equivalent of a modest war... No terrorist organization in history has ever achieved such damage with a single attack. Few small wars cost so much... The LoveLetter attack was indeed the first real taste of terrible things to come." Also from "The Future of War."

"Adams stated: 'iDefense is now beginning a period of very rapid growth.'" From a press release naming Brian Kelly as CEO and Adams as "visionary," January 2001.

On National Public Radio's "Talk of the Nation," April 2001, a listener to a show on information warfare, featuring James Adams as a panelist, called in with this statement: "...I also have a question for Mr. Adams, I'm concerned about the scare tactics used by a lot of these security companies out there, including iDefense, which sells reports and services." Adams replied: "I think that's an interesting point. And clearly business is business. But I think there is a balance to be made between making aware what is going on and being responsible. And I am aware-- I am very aware of everything that is going on in the classified arena."

"Estimates of the cost of [the LoveLetter virus] to the United States range from $4 billion to $15 billion -- or the equivalent, in conventional war terms, of the carpet-bombing of a small American city." From Foreign Affairs, May-June 2001.




U.S. Deputy Defense Secretary John Hamre warned Congress of an "electronic Pearl Harbor" by cyber-terrorists on March 9, 1999, and said the target is more likely to be commercial than military. "And this Pearl Harbor's going to be different," Hamre said scarily. "It's not going to be against Navy ships sitting in a Navy shipyard. It's going to be against commercial infrastructure . . . "




"It's not a matter of if America has an electronic Pearl Harbor -- it's a matter of when," said Rep. Curtis Weldon, R-Penn, to reporters John Miklazewski and Robert Windrem, for MSNBC on March 5.

In the same article and for the New York Times, Richard Clarke, a Clinton advisor on terrorism, said "An attack on American cyberspace is an attack on the United States, just as much as a landing on New Jersey . . . The notion that we could respond with military force against a cyberattack has to be accepted."

Acting on the advice of Clarke, President Clinton recently proposed spending $1.5 billion for cyberdefense.




On February 1, 1999, The New York Times' Tim Weiner profiled Richard Clarke: "The Man Who Protects America From Terrorism."

"[Richard Clarke's] stock in trade is the stuff of techno-thrillers -- biological bombs in the Wall Street subway, chemical clouds of death in the Pentagon parking lot, cyberwar attacks . . . "

"The mission of protecting Americans from attack, whether by states or rogue groups," wrote the Times, "is 'almost the primary responsibility of the government.' [Clarke] is trying to raise the fear of terrorism in the United States to the right level -- higher, not too high -- as he girds the nation against the possibility of an assault from nerve gas, bacteria and viruses, and from what he calls 'an electronic Pearl Harbor.'"

"In his office, where a small sign reads 'Think Globally/Act Globally,' he spoke passionately about the threat of cyberwar, invisible attacks on the nation's computers, a terror so insidious, so arcane he has trouble convincing corporate chieftains and political commissars it is real. But it is out there, somewhere, he says, even if he can't prove it," wrote the Times reporter.

"There is a problem convincing people that there is a threat . . . There is disbelief and resistance. Most people don't understand. CEOs of big corporations don't even know what I'm talking about. They think I'm talking about a 14-year-old hacking into their Web sites."

Clarke rambles on, referencing the Pentagon's secret wargame "Eligible Receiver," but not mentioning it directly: "I'm talking about people shutting down a city's electricity . . . shutting down 911 systems, shutting down telephone networks and transportation systems. You black out a city, people die. Black out lots of cities, lots of people die. It's as bad as being attacked by bombs."

"An attack on American cyberspace is an attack on the United States, just as much as a landing on New Jersey . . . The notion that we could respond with military force against a cyber-attack has to be accepted."

"Imagine a few years from now: A president goes forth and orders troops to move. The lights go out, the phones don't ring, the trains don't move. That's what we mean by an electronic Pearl Harbor."

"Clarke's profile first surfaced in 1986," Weiner writes. "He was an intellectual author of a plan to use psychological warfare against the Libyan leader, Moammar Gadhafi. Under his plan, flights of SR-71 spy planes set off 'sonic booms over [Gadhafi'] head, to tell him his air defenses couldn't stop us,' and mysterious American rafts floated up on the shores of Tripoli, Clarke said. The operation backfired when the Reagan White House was caught planting a false report in The Wall Street Journal about Libya's support of terrorism."




On May 25, 1998, Brigadier General Robert F. Behler of the Strategic Command stepped up to the plate in the pages of Federal Computer Week to opine on "electronic Pearl Harbor" in a piece entitled "Fighting the virtual Cold War: There's no peace in cyberspace." Excerpts are included for your reference.

"Less than a decade after the Berlin Wall came tumbling down, we are in the midst of a new Cold War," stated Behler on the secret cyberwars of the Internet.

"A digital enemy can bypass the military and take down critical infrastructure -- automated power plants, stock markets and transportation systems -- and disable this nation without firing a shot . . . Call it a virtual Cold War . . ."

"As the point man for computer security at the U.S. Strategic Command, which directs all U.S. strategic nuclear forces, I'm keenly aware of the stakes of warfare in the cyberworld. Each day, I see evidence that the United States is in a digital war with cyberbandits and terrorists who are intent on destroying our nation's computer systems. We are faced with individuals who may attack our computer systems, and more than 30 nations have sponsored programs to disrupt information systems worldwide. Experience has taught me that there is no peace in the cyberworld."

"Keeping ahead of cyberenemies must become a national priority . . . I suggest the United States commit to a 'Year of Cyberspace Security.' Such an initiative would range from teaching schoolchildren the consequences of giving out their Internet addresses to developing better means of safeguarding sensitive information.

". . . Are we losing this war in cyberspace? Maybe; at this time I'm not certain. But I am certain that if we maintain the current level of complacency about computer security, 21st century cyberwarlords will 'eat our lunch.'

". . . The Year of Cyberspace Security is an idea whose time has arrived. We must step up to this challenge now or face an electronic Pearl Harbor . . ."




Twice in the May 1997 issue of WIRED magazine, both in John Carlin's "Farewell to Arms."

1. "We will have a cyber equivalent of Pearl Harbor at some point, and we do not want to wait for that wake-up call," attributed to former U.S. Deputy Atty. General Jamie Gorelick.

2. "I-war can be the kind of neat, conceptually contained electronic Pearl Harbor scenario that Washington scenarists like -- collapsing power grids, a stock market software bomb, an electromagnetic pulse that takes the phone system out."




Twice in Robert Minehart's tutorial on Information Warfare, a course currently presented by the U.S. Army's training school in Carlisle, PA. Minehart's bio refers to him as an NSA/CIA/DIA employee and Visiting Professor of Information Warfare at Carlisle. Minehart prefers "Information Pearl Harbor" to "electronic Pearl Harbor" but as far as Crypt Newsletter is concerned, they're the same thing.

1. "So what would an effective Information Pearl Harbor look like?"

2. "The U.S. may find it difficult to use military force in response to an Information Pearl Harbor-type attack."




Once by John Woodward, a mouthpiece for MITRE Corporation in McLean, VA, in a long-winded 1997 company Website sales pitch for hiring MITRE expertise in avoiding "electronic Pearl Harbor":

"It's MITRE's job to keep the information warfare equivalent of [electronic] Pearl Harbor solely and exclusively in the realm of simulation."

Also attributed to Woodward, "MITRE is the best source on information warfare in the world."




"Electronic Pearl Harbor" was invoked three times by strategist Martin Libicki, in "Defending Cyberspace and other Metaphors," a paper on info-war published by the Pentagon-administered National Defense University in Washington, D.C. The paper appeared earlier this year and Libicki uses the term "digital" in place of "electronic."

1."A strategic motive for a digital Pearl Harbor could be to dissuade the United States from military operations (perhaps against the attacking country) or to hinder their execution by disrupting mobilization, deployment, or command and control.

2. "How much damage could a digital Pearl Harbor cause?"

3. "A more pertinent question than how much damage a digital Pearl Harbor might cause is how well hackers attacks can delay, deny, destroy, or disrupt military operations."




In the January 6, 1997 edition of the Wall Street Journal, reporter Tom Ricks attributes Duane Andrews of Science Applications International Corporation and the Pentagon's Defense Science Board with:

"Warning of a possible 'electronic Pearl Harbor,' the task force appointed by the Defense Science Board also said the Pentagon should seek the legal authority to launch counterattacks against hackers."




"We could be on the brink of an 'electronic Pearl Harbor' or an 'information Chernobyl' and not even know it."

This one was uttered by Frank Morgan, an Air Force Intelligence Agency/Air Force Information Warfare Center officer out of Kelly AFB, Texas, in an article for the September 1996 issue of Airman magazine entitled "Info Warriors!"




In Cybernautics Digest, Vol. 3, No. 7 (1996), "All's Not Quiet on the Information Front":

"Pentagon officials fear an electronic Pearl Harbor: an attack which could go undetected until it is too late."




"[John] Deutch favors center to avoid `electronic Pearl Harbor' and [it] would not require hiring new personnel," showed up in a July 1, 1996 story on Congressional testimony on the subject of hackers and info-war. It appeared in Federal Computer Week.

If you've been following newspapers, sometimes it seemed as if CIA-director Deutch spent most of 1996 talking about "electronic Pearl Harbor," a remarkable feat from someone who could not distinguish the PenPal Greetings Net virus hoax from reality.

And in the same story, a couple paragraphs on:

"I don't know whether we will face an electronic Pearl Harbor, but we will have, I'm sure, some very unpleasant circumstances in this area," said John Deutch.

"Senator Sam Nunn (D-Ga.), who chaired the hearing, raised the issue of 'an electronic Pearl Harbor' against the 'national information infrastructure,' and asked 'are we fully alerted to this danger now?"

The above quote came from an article written by John Elliston for something called "Dossier." It, of course, also repeats the Deutch "electronic Pearl Harbor" quote -- published by hundreds around the country -- taken from the same July 1996 Congressional hearings.




"We're facing an electronic Pearl Harbor," said Ronald Gove, a vice president of Science Applications International Corporation, at a 1995 National Computer Security Association Info-war conference, as reported by a September '95 issue of the Arizona Star.




"The Pentagon's New Nightmare: An Electronic Pearl Harbor" was the title of a Neil Munro-penned editorial in the July 16, 1995 edition of The Washington Post.




And in Alvin and Heidi Toffler's 1993 book entitled "War and Anti-War," "electronic Pearl Harbor" is said to be just waiting to happen. (Page 149 in a section entitled "Info-terror.")

Duane Andrews of Science Applications International Corporation also makes an appearance in the Toffler book, and similar to what he said in 1997, he says in "War and Anti-War:" "Our information security is atrocious, our operation [secrecy] is atrocious, our communications secrecy is atrocious."



The old homepage of the Crypt Newsletter. From the Wayback Machine.

Saturday, June 23, 2007

WARMEST GREETINGS FROM DOLTSVILLE: Enjoy our fairy tales but don't overstay your welcome

On Tuesday DD was enjoying the endless summer in Santa Barbara, unable to bring you the usual news that the LA Times Calendar section had delivered more to insult the intelligence when considering pop music.

"It used to be about women, booze, and jobs," wrote some editor in a subhed on E1. "But honky-tonk dudes see times are changing."

Caught red-handed treating readers likes rubes again.

"Brad Paisley wants you and his wife to know that his willingness to hold her handbag while she shops for post-pregnancy dresses at Bebe doesn't mean he won't put it down later and go shoot a deer," wrote Ann Powers.

Hold a handbag! Hoo! Shoot a deer! Can't get away from the latter with Miranda Lambert in heavy rotation.

Powers informs readers Paisley is a New and Sensitive Country Man, somehow missing the dirty jokes about fat and/or ugly women at the end of his new CD. Indeed, if any reader took even half-seriously what was written about Paisley's Fifth Gear CD for the newspaper, they came away with no idea that it's a good to excellent country album, one that doesn't take itself too seriously, rocking with plentiful squealing licks from Paisley's guitar.

This would would almost be OK as the lead-in to a good joke at the artist's expense if the Times had a sense of humor when it came to reporting on country music, a genre that cries out for laughs and a serrated edge of superciliousness.

But the Times has very little, if any, of either.

So far the next twenty graphs or so you get an essay and ersatz concrete trend piece on an illusory moral transformation in country music superstar men, complete with instruction on how it's being carried out.

Management skills, apparently. Could you think of a more stupid claim? No, of course not.

So imagine the next assertions as if delivered by a professor of pop psychology during an elective course you regret having signed up for.

"If Paisley is a New Man using management skills to modify conventions, Toby Keith is his opposite -- a proud Neanderthal who would never hold a handbag, though he might swipe one in a pinch ... Keith's attitude recalls another high profile blusterer: Tony Soprano. Like Tony, Keith's characters expose the violence inherent in old school masculinity ... Clearly Keith knows that to live by wielding power is to know that others wield power over you."

A few weeks ago, readers were asked to swallow a different heap of horsecrap accompanying Miranda Lambert's Crazy Ex-Girlfriend CD.

In this case, the gun-toting, white tail deer-shooting, scumbag-drilling young redneck gal was full of twangy and tangy rebellion. Good girl!

As has been said before, Times entertainment writers are snobs. And so they can't be direct, everything having to be dressed up in some artificial and elaborate prepared script, made to persuade readers that some Philosopher's Stone has transformed lead into gold.

In this way, a literally "shitty" heavy metal band like Cattle Decapitation, one with unpublishable album art of a cow defecating human remains and song titles like "Extracted Pus, Mistaken for Yogurt and Gargled" and "Colon-Blo" was alleged to be an example of "Metal -- growing up, speaking out." (Originally a wire story, no one with an actual shred of common sense would have run such a thing.)

So in like manner, country music -- fresh from Doltsville, the place you couldn't get away from fast enough, is changing.

Is it, now?

DD tunes into CMT (Country Music Television) semi-regularly and has been following its Top 20.

Eric Church's "Guys Like Me" from the album Sinners Like Me -- one of the selections in the current hit parade -- is a good song to wipe one's feet upon while exploring the concept of reality and change in modern country.

Church sing he's glad girls, the "like you" in the verse -- a mostly offscreen college-going ideal -- love him -- "guys like me" -- the town grease-monkey. Church is happy "girls like you" prefer "guys like me" to the "trust-fund" boys rubbing up against 'em at university. It's a class war, with the lump victorious. At the climax a "girl like you" comes out from under the sports car, in her underwear, stained with motor oil.

It would have been good to have mixed in a laugh track.

However, since there is none, back in the real world, DD puts the script into revision.

Here, Mr. Church, "guys like you" get "Dear John" letters -- or maybe not any letter at all -- from the crush who goes off to collij and discovers it's a whole lot better that Doltsville. Plus the booze is more plentiful.

"Guys like you" join the Army and are sent to Iraq, where you are maimed while on patrol. Scratch the beauty from under the car, wearing only lingerie. (Don't send money. For you, man, it's free.)

"Broke down, beaten and busted (Once Again)."

Still, everyone likes fairy tales and bull is the linqua franca of countless good pop tunes.

However, CMT and its version of modern country music is exceptional in this regard. In this special place, the USA isn't anything remotely like our country. On CMTUSA, the Dukes of Hazzard are always on television. Vehicles are always the General Lee, heavy trucks and sporty cars from Sixties-Seventies Detroit. The weak are not routinely victimized, beatings go unseen, there is nothing close to real rage and the national image isn't in tatters.

Rent the Dixie Chicks' documentary, Shut Up & Sing, and you'll note the great divide. Dismay grows in the singers as they realize all their former fans really were hots on from Doltsville. And that while such fans alleged to like Natalie Maines' feistiness, it was only sanctioned within a narrow superficial framework of that twangy tangy rebellion for which country music women are lauded.

Punished for committing no crime other than being awkwardly spontaneous while the nation was working itself into a good kill frenzy, Maines & Co. proved what you might have already known: Doltsville is filled with lots and lots and lots of, hmmmm, intolerant dolts.

CMT, by definition, is an empty-headed place where one can go to escape all friction and dissonance, where many musicians sing wistfully of hometowns, never mind that most of 'em were probably not looked fondly after when they left to make it in Nashville.

The network even has a contest aimed at finding the number one Doltsville. Viewers are to send in clips from camera phones and the best Doltsville of all (of course, it's not called that) will be selected and a special made for fall viewing.

Naturally, with most of the content from CMT, the more crap you believe, the better off you are.

Which brings us to Miranda Lambert's "Famous in a Small Town," a single now airing on CMT. It's given us the shot-the-first-deer-in-season meme, an event to land you in the pages of the local Daily Crapper. Here are some song ideas free from DD: "I've Pellets in My Backside Blues (Again)" and "So Excited (I Shot My Dog.)"

On the CD player, "Famous In a Small Town" is a medium tempo train, rocking with the winningest of melodies. And if you don't pay attention to the trash about being seventeen in tiny town being the same as TV fame, you'll be all right. Better, though, is "Dry Town," which Lambert didn't write. It's about being desperate for a drink, something with which you'll actually be able to relate. Its jaunty thumping rhythm is great.


Welcome to Doltsville. DD was here. Hey, let's go hang at the gas station and piss in the back stairwell to Eric Church.


Related:

Cattle Decapitation.

Two syllable words too big in Doltsville.

Thursday, June 21, 2007

TERROR SALESMAN: Caught contaminating the minds of spies; UNMOVIC reports on Iraq

Western nations have less than 20 years to prepare for the next generation of terror threats, according to Dr Yair Sharan, director of Tel Aviv University's Interdisciplinary Centre for Technology Analysis and Forecasting, reads a piece from today's Reg.

"Brain chip implants could create a more obedient servant than conventional techniques like hypnosis: 'Imagine that this suicide bomber is remote controlled and cannot give up, even if he wants,' warned Sharan," it continues.

Now, if we could fit some of the professional class of terror prognosticators with electrocuting anti-bark collars, like those cruel owners put on dogs they deem too noisy, DD reckons have more obedient servants without going through all the trouble of brain implants.

Read it here.

In other matters, mostly ignored was a report from Iraq by UNMOVIC at the very end of May. You remember UNMOVIC - the inspectors who were trying to ascertain if Saddam Hussein didn't have WMD's before we precipitated the current disaster.

In a report to the UN Secretary General at the very end of May, an appendix in the tome contained a lengthy discussion involving UNMOVIC's efforts to monitor the potential for chemical and biological attacks in Iraq now that it's a de facto failed state.

Read the rest here.

Sunday, June 17, 2007

TWO SYLLABLE WORDS TOO ARCANE IN LINDALE, TX: The wit and wisdom of Miranda Lambert's fans

A few weeks ago DD put up an entry on Miranda Lambert, a country pop star with a new album entitled Crazy Ex-Girlfriend. It was a collection of the deadening and repetitive cant published in daily newspapers across the nation in advance of her album's release.

It also included a rewrite/parody of a piece on Lambert built off the original which ran in the Los Angeles Times. That portion was filled with a number of moderately amusing and fairly obvious landmines.

The entry generated a steady stream of readers and last week some fans of Lambert's stumbled upon it. At which point, one of them reposted it to her website and a landmine went off.

Brows furrowed in MirandaLand. Some wondered whether it was real. Had their gal "dialed drunk" to a reporter?

Wasn't it illegal to write things like that?

However, the best parts were reserved for the use of the word pilfer. It had been used in one of the "quotes" nestled within the spoof piece.

Pilfer was too complex a word.

It took me right back to Pine Grove, Pennsyltucky, in Schuylkill County, where if you used a word that others didn't know, even a simple one, the people who didn't understand the word held you up to be scoffed at.

Ha-ha, Smith wouldn't come out the other day, went a convenient story in junior high used as a putdown, because I was too busy reading a dictionary. Ho-ho! Hilarious! A real rib-tickler, right up there with "Hey, Four Eyes!"

The quote in question in the Lambert piece on this blog was an obvious rewritten plant:
"I'm not trying to be this badass chick all the time but if someone wants to try and pilfer from my can of strawberries, that's where I'm going to get them," Lambert [said].


A few of Lambert's fans believed it to show it was clearly not her.

Ya think?

"Pilfer?!?!?" wrote one. "We are from Lindale, TX -- we don't use the word pilfer!!"

"And, what does pilfer even mean?!," added another. "Why not say 'jack' or 'steal'?" the fan wrote, answering her first question. "Seriously. Who even says that??"

"I don't even use the word pilfer," the conversation went on. "I can't even be bothered to look up the real definition."

"Count me in in the whole pilfer thing," announced another. "I certianly [sic] wouldn't know how to use it in a sentence."

Here, gentle fan, graduate of Gobble-Wallah High School in Lindale, TX, part of the United States, is how to use the root -- pilfer -- in a sentence.

It's a famous usage, one that has been shown on TV in Lindale, home of Miranda Lambert and others, a few times a year, every year, for the past few decades.

"The pilfering of food is a very serious occurrence on board a ship." -- Captain Queeg

DD couldn't have asked for a better gift than to be found by the community of Mirandalambert.com.

It underlined the original point of the article, stated plainly but somewhat differently, that pop music journalists write ebullient phonied-up intelligence-insulting crap about stars in genres they mostly don't have the time of day for because usually, unless a special dispensation has been made for it through chart-topping status, they deem the makers and fans of it beneath them.

The delivery is always the same: Here's the star, in this case Miranda Lambert, hot out of Dullsville, dressed up for a day. It's the new cool, because it's so -- like -- genuine.

Eyes roll.

Take me back, country roads, to the place, I bee-long. Pennsyl-tucky, Mountain Mama! Take me home, to where they don't ... know too many words.


No link provided.

Thursday, June 14, 2007

TEEN TERRORISTS STRIKE WITH CHLORINE BOMBS: Brag about it on YouTube; Michael Chertoff speaks of liability issues

Chlorine reaction in plastic bottles: Threat or menace?

"A disturbing trend appears to be on the rise in New Jersey, and authorities believe teen pranksters are behind it," reported an NJ news agency recently. "Homemade liquid bombs are being placed in mailboxes, and are left there waiting to explode."

At some point prior to Wednesday morning, a dangerous delivery was waiting in [someone's] mailbox -- a chlorine bomb package ... "

"[CBS 2] found nearly 300 videos labeled 'chlorine bomb,' including one showing teens using a homemade soda bottle explosive to blow up a mailbox," on YouTube.

Listed under "Comedy," "Entertainment" and "DIY," the videos spurred local surveillance of YouTube, this in apparent hope of spotting teen terrors in the act of uploading potentially incriminating evidence.

"The pressure that results from the chemical combination [in a chlorine bomb -- usually bleaching powder and an alcohol with weak acid or base] causes a massive ["massive" being open to interpretation] explosion, but instead of seeing the danger in the prank, [teenagers] simply find it funny," reported the horrified news agency.

"One can only imagine what kind of damage the bomb could cause to the human body."

Some chlorine bomb vids on YouTube. Go nuts. What will those dadgum kids think of next? Excrement in a burning paper bag left on the front porch? Fire, fire!


In a semi-related story, moves were afoot this week to yet again scare the country over the potential menace posed by its foolish addiction to chlorine.

The message: Chlorine bombs in Iraq! There's lots of chlorine in this country, too! It's not secure enough!

"Safety officials are warning about the risk of a potentially deadly release of chlorine gas unless the government requires equipment for transporting it," insisted the Associated Press in a story entitled, "Steps sought to avert chlorine disaster."

"About 15 million tons of chlorine is produced each year, and 3 million tons is shipped by rail," reported AP, failing to add, "Causing virtually nil fatal injuries."

"Homeland Security Secretary Michael Chertoff yesterday urged operators of water and waste treatment plants to secure chemicals such as chlorine from terrorists, although they're not required to do so," said Newsday, its reporter apparently sensing an appalling inattention to looming danger.

"Referring to water treatment plants' use of chlorine - an ingredient used in an increasing number of truck bombs in Iraq - Chertoff warned that the consequences of ignoring terror threats was 'quite severe' in potential liability as well as lives.

"An estimated 3,000 drinking-water and wastewater treatment plants are listed in EPA documents as keeping more than 2,500 pounds of chlorine gas," continued the newspaper.

By annoying contrast, cholera -- an extremely serious microbial intestinal illness -- has been spotted in Iraqi children recently.

This is primarily a result of the the United States having created a failed state in Iraq, conducting and setting about the smashing of the country's infrastructure, severely damaging its capacity for producing and distributing clean water in a region that has always had a shortage of it.

Nevertheless, the US continental security apparatus continues to hoot about the imminent dangers posed by the use of chlorine although there is no indication that terrorists have the capability to strike with masses of the halogen here.

Up to this point, the chemical industry as well as the science academy have been successful in pushing back against many alleged chemical safety initiatives by the Department of Homeland Security, measures which are unlikely to be of real benefit to any average American. (Why? Hint: Real life just doesn't work the way the disaster scenarists see it.)

Hey kids, keep those chlorine bomb vids coming!

Maybe strict regulations on bleaching powder can be suggested because you never know what terrorists are planning and the liability -- if they strike -- could be quite severe.



Chlorine bombs in New Jersey. Potentially deadly and menacing videos discovered on YouTube.

Chlorine disaster waiting to happen. Chertoff says liability will be high, needs to have prescription of STFU refilled.

Government Homeland Security functionary, Richard Falkenrath, the father of chlorine-terror phobia. Official bio gives him credit for being central to "standing up" the Dept. of Homeland Security. Went before Congress in 2005 to weave scenario describing millions of deaths due to potential terrorist attack on a chlorine generating facility. Now a counter-terror man for the government of New York City, if he says something, believe the opposite.
SISSIFYOSIN: Achtung! Not work safe!

More frequently than one would wish, DD finds the tolerance for ideas and people in need of a good purging from the US military for the hazards posed to common sense and reason, in news.

Yesterday was one of those days.

An errant gay bomb test trashed morale at Wright Laboratory.
Leaked classified photo of effects of sissifyosin, USAF Wright Lab's experimental chemical intended to make soldiers "sexually irresistible" to each other.



If you must. Hold your nose.

Tuesday, June 12, 2007

BIG IN ALBANIA, APPENDIX A: Convenient dumping ground

Just when DD is cracking a grim joke about Albania's love affair with George W. Bush having to do with taking a couple billion under the table for abetting torture like Poland and Romania, the Council of Europe report on secret prisons comes along to give me a hot shower fresh from the dungeon honeybucket.

"From a policy point of view, Albania has also proven to be a willing bilateral partner in providing the United States with a 'dumping ground' for its unwanted detainees in the 'war on terror,'" it reads. (See excerpt as .jpg.)





Council of Europe report on secret prisons.

Join the Waffen SS or patrol Iraq? Which duty called more from Albania?

Monday, June 11, 2007

BIG IN ALBANIA: When Enver Hoxha is all you can scrape up, anyone looks good

In the world of American rock 'n' roll being sent to Japan used to be a sure morale builder. After coming off a major label record that sold poorly, US labels would often schedule a rock act for a series of dates in Japan.

This was because Japanese kids liked everything. They could be expected to reliably turn out in the thousands and shriek wildly for any number of rock music industry pariahs, no-names and has-beens.

So when your friendly neighborhood GlobalSecurity.Org Senior Fellow opened the Monday paper at lunch and saw George W. Bush being warmly embraced by a "crowd" in Albania, DD thought, "Albania must be the new Japan!"

Then reality replaced my funnybone and suspicion was aroused that Albania must be hosting some secret prison where we torture people for a couple billion a year under the table.

Albania, one of the few lumps of coal left in the President's coalition-of-the-toadies in Iraq, will triple its military commitment to 120 "elite commandos," informed the Times.

This is a good deal less enthusiastic, though, than the approximately 6500 Albanians who joined the Waffen SS in World War II, the Waffen SS also being known as an "elite" bunch.

Albania's leader, someone who is worth reward by not mentioning his name, called George W. Bush "the greatest and most distinguished guest we have ever had in all times," according to the Times, making him a good candidate for a bit part in any sequel to Borat.


Albania's contribution to the Waffen SS. Historically speaking, not such big believers in freedom.

Wednesday, June 06, 2007

LEARN TO BE A LEADER AT SUMMER CAMP: Through 168 hours of drill, following orders and adherence to standards of military cleanliness

Today's Los Angeles Times contained a page on summer camps! Aimed at parents, camps for many types of future training were advertised. If you were in grades 9-12, one can attend a summer camp in LA to learn how to write sitcoms and develop scripts for the entertainment industry. In Pasadena, DD was also amused to find a ROCK CAMP called Dayjams.

Do you think I would make a good counselor?

To be true to the experience, though, summer camps must be about pain and embarrassment. It's also important they be totally useless. It's a bonus if they're scarring, too.

Boy Scouts of America summer retreat in Pine Grove, Pennsylvania, was good for all three decades ago. You went, more accurately -- were sent -- to be physically purged and have a week gouged from your summer.

It reliably meted out punishment to those who had committed no crime.

If you slipped up in even the pettiest way -- made the biscuits wrong -- you had to do push-ups in front of the troop leader, a thirty-something man with an icky fondness for watching his charges do physical training with their shirts off.

On a par with Boy Scouts of America summer retreat was Keystone Boys State.

Keystone Boys State was a one-shot, eligible to you only when you were between junior and senior year in high school.

This year's Keystone Boys State is at Shippensburg College (Shippensburg State Teachers, originally), running between June 24-30. (That was for 2007. -ed) Perhaps Keystone Boys State campers will Google this essay and be persuaded to threaten their parents with reprisals should they be forced to fulfill their commitment later this month.

Kids, don't go!

DD is giving it to you straight. Keystone Boys State is not the Army but you'll get a little dose of it later this month. Except you won't be able to drink heavily, shoot guns or patrol foreign boulevards for prostitutes. You won't be made Army Strong.

Naturally, DD did not volunteer for Keystone Boys State. I was drafted by irresponsible vainglorious parents and members of the local American Legion who thought of me as a utensil, an honors student at Pine Grove Area High School, something to be offered to the state Legion leadership. In a small town like Pine Grove, kids didn't have the luxury of snubbing their noses at "gifts" from the local American Legion-VFW. Parents wouldn't have it.

My Keystone Boys State was held at State College. It is a tribute to Penn State University that the American Legion sponsored operation wasn't capable of bringing out a loathing in me for all things Nittany Lions. I remain a fan of the college football team and Joe Paterno.

Indeed, it's astonishing that Penn State University would have allowed the use of its facilities to an organization and operation which determinedly obstructed any efforts by campers to enjoy Penn State, or even get to know about the school.

You see, attendance at Keystone Boys State didn't give camp-goers much of a glimpse of the university.

When I attended, Boys Staters were restricted to two dormitories, a nearby cafeteria and attached playing fields.

How Keystone Boys State managed this in the Seventies was nasty business.

Upon arrival in State College, campers were separated into platoons, with each platoon being assigned a nominal city, named after some Pennsylvania government functionary.

DD was assigned to "Bethman City." Each city resided on one floor of a dorm. Each city's adult minders were from the active ranks of the US military. Bethman City's minder was a USMC man from Parris Island. I'll call him Gunny, although that was not his real name.

Gunny was a power drunk with a talent for cussing, neither of which DD thinks could be any liability in the Marines, although it was momentarily surprising to see him lay it out so plainly within 60 seconds of arrival.

The first thing Gunny told us about was screening at Parris Island. He was specific in his description of a Marine Corps recruit found with a rubber dildo in his rectum. Why this was important to tell a bunch of high school boys, other than it being an X-rated shaggy dog story, was not immediately obvious.

More pressing, Gunny said, was that we campers recognize we were to stay within the bounds of Keystone Boys State. Under no circumstances were we to take walks to downtown State College, described as a potentially dangerous place.

At this point, DD's high school eyes rolled, having already been to State College a number of times to see Saturday football. Since I was in the back, Gunny did not see the contempt in which I held him and his developing tale. If he had, perhaps I would have been ordered to do some push-ups without my shirt on.

Gunny explained that there were women who were pros in downtown State College and they were eager to take advantage of us. It was such an outrageously stupid story, a few of us assumed he'd been told to tell it by someone old and weird and higher-up from within the American Legion.

The current website for Keystone Boys State advertises it as "non-military."

Whether this is true now I don't know, but in the Seventies the claim was utter horsecrap.

The camp was functionally administered by US military men. Every morning there was inspection -- the kind in which a military man examined your bed and opened the drawers of your empty desk to see if there was any dust in them. If there was dust in an empty drawer, it was scooped up and put on your bed or on the top of some of your property to teach you a lesson. Whatever miscellaneous lint or dirt was found during inspection was always deposited on your belongings or personal space. This kept up until our military counselors realized we'd stopped giving a shit about what they thought and did, around mid-week.

How well a Boys Stater's city did in inspection determined in which order you would eat lunch during the day. Bethman City always did poorly and, as a result, we always ate lunch last or near to last.

In late afternoon, after some worthless class on state government and a round of compulsory softball in the sweltering heat, the camp retired to the drill field to practice calisthenics, marching in formation and pass-in-review. During the exercises, each city was judged on its form and ability to follow orders snappily. That determined in which order you ate dinner.

Bethman City, you guessed it, often finished last.

By mid-week, Gunny had reported in for Keystone Boys State duty drunk or with savage hangover too many times. He was dismissed and the slack taken up by an USAF man.

At that point, the boys of Bethman City made the decision to stop paying attention to cleaning up bathrooms, sweeping rooms atomically clean and making beds quarter-bounce-worthy for inspection. Then we always finished last.

Being snappy on the drill field went out, too. On the last day of camp, when all the thugs from high-school football teams and their assorted camp lackeys had been "elected" leaders of Keystone Boys State and allowed to go into the reviewing stand as the elite who watched the rest of the lumpen pass-in-review, we dropped our pants while trudging past the bleechers. We ate last.

The people who ran my Keystone Boys State liked nothing better than to order around teenagers, mostly for what appeared to be the sheer sake of it.

"A week at Keystone Boys State condenses what might take several months in real life to less than 168 hours," informs the official KBS website. "This compressed simulation helps people learn lessons about the actions and consequences of leadership in a very realistic way."

Yes, one thinks learning to suck up, march in formation and follow pointless orders does teach something about life but one ought not to ask teenage kids to give up a week of summer to learn it. The current website seems to indicate Keystone Boys State is big with those junior ROTC operations which haven't yet been run off public high school properties.

"The effort to get everyone involved at [KBS] manifests itself by having every 'citizen' elected, selected, assigned or appointed to leadership positions throughout the week. Each citizen also is provided with text materials based on organizational science and personal development exercises. Much of what we do is a spin-off of the Stephen Covey text, The 7 Habits of Highly Effective [People]," the boys camp proclaims.

"All citizens should become familiar with parliamentary procedures, 'Robert’s Rules of Order' and Covey’s The 7 Habits of Highly Effective People - NOW ! ! !"

"The 7 Habits of Highly Effective People" wasn't required reading when DD attended Keystone Boys State, probably because it hadn't yet been written.

It is another in a long line of publications from the self-help industry, filled with the kinds of slogans and advice people used to following orders and doing pointless institutional or corporate busy work for work's sake think will help them improve their attitude so they can earn a quick million dollars, get promoted and exit the logjam of daily life.

Some of its tenets: Think Win/Win! Seek First to Understand, Then to be Understood! Synergize!

Adoption of such a thing indicates the Keystone Boys State experience is, more than likely, an even more annoying and brainwashing experience in 2007 than it was in the Seventies.

It was true that every "citizen" of Keystone Boys State had to hold a "political" position by the end of the week.

This meant that as the inner core of apple-polishers was exhausted during the awarding of positions of "leadership" within the quasi-state camp apparatus, other positions were handed out on the basis of an ad hoc cronyism until, by the end of the week, everyone had one. It was mandated that everyone hold a public office.

I was made Bethman City dog catcher on the last day of formal camp operation. It didn't require a vote.

For kids stumbling into this, if you must go to Keystone Boys State (and you SHOULD NOT if possible), I recommend you take a musical instrument, even if you aren't in the high school band. Campers with instruments got to be in the Keystone Boys State community band. Perks were associated with it, like getting out of marching-in-formation and being allowed to eat ahead of everyone else, regardless of how badly your city did during inspection.

In the weeks following Keystone Boys State, I was able to make productive use of the camp one time and only once.

Everyone from Pine Grove High School who attended KBS was required to attend an American Legion dinner at the local Veterans of Foreign Wars banquet hall. After dinner, the campers would be asked to speak about their experience at Keystone Boys State.

I had no interest in attending and told my parents that if they forced the issue, like they'd forced KBS, I would tell the Legion dinner audience exactly what KBS was like. I would start with Gunny and his stories about a Marine recruit with a dildo up his ass and hookers patrolling the streets of State College looking for fresh-faced young boys.

That was all it took, really. When Mom and Dad asked what they should tell the organizers of the dinner, I told them to say I was at ... another camp for the week.


Update: Keystone Boys Staters write to DD! And they're not happy campers! Outstanding! See here.

Seven Habits of Highly Effective People.

Keystone Boys State.

Oops! The Keystone Boys State page has been moved. And those tricky people in the Pennsyltucky American Legion have removed all the embarrassing stuff about having to read Covey's Habits of Highly Effective People.

However, they still have a hard time with simple English.

"No boys are permitted to attend [KBS] because of either poverty or wealth," state the KBS masters. "It is not a program for underprivileged boys nor is it a summer camp for recreation."

Here at DD, I know what they mean. But they don't quite know how to put it, do they?

See the new and less thrilling KBS homepage here. When they see that I've linked to it, perhaps they'll change or move it again.




Learn to rock at summer camp.

Monday, June 04, 2007

EAT ZINC! CHINESE SAY POISON GOOD FOR YOU: Faced with worldwide boycott of cheap solvent-tainted toothpaste

"FDA inspectors identified and detained one shipment of toothpaste at the U.S. border, containing about 3 percent [diethylene glycol] DEG by weight," announced the agency last week.

"In addition, FDA inspectors found and tested toothpaste products from China located at a distribution center and a retail store. The highest level found was between 3-4 percent by weight. The product at the retail store was not labeled as containing
DEG but was found to contain the substance.

"[Diethylene glycol] poisoning is an important public safety issue. The agency is aware of reports of patient deaths and injuries in other countries over the past several years from ingesting DEG-contaminated pharmaceutical preparations [from China where it is used as cheap adulterant in place of glycerin], such as cough syrups and acetaminophen syrup..."

The diethylene glycol-poisoned toothpaste from China consists of a variety of cheap brands placed in discount stores where it most likely impacts the poor, or those unlikely to know of the taintings and the product advisories.

In response to what now, in common sense, ought to be a worldwide blacklisting of -- at least -- all Chinese toothpastes shotgunned into the world market, the Beijing government insisted over the weekend that the poison, diethylene glycol, was good for people.

While it wasn't put exactly that way, "China's General Administration of Quality Supervision, Inspection and Quarantine says the advisory from the U.S. Food and Drug Administration is unscientific and irresponsible," reported Voice of America news.

"China says low-levels of the chemical, diethylene glycol, have been approved for consumption," continued the report. "It also says the U.S. food regulator has approved all Chinese-made toothpaste exported to the United States," which may have been true, DD hasn't checked, but now certainly is not.

To keep the subject congruent with material often discussed within the pages of this blog, it is interesting to note that Maxwell Hutchkinson's The Poisoner's Handbook advocates the use of diethylene glycol.

Readers now know, assuming they've followed the subject regularly here, that Hutchkinson's book was published in the United States by Loompanics in 1988. It is a thin volume riddled with errors. And while it is very generally correct in the naming of common poisons, it is not of practical use in actually poisoning people, a fact that is often lost in the lore on it.

For example, Hutchkinson writes on using poisonous snakes as murder weapons: "There are only four types of venomous snakes in the US. At least one of these, the copperhead, is only poisonous enough to reliably kill the sick, the quite young and the quite old ... If you have a target who owns a boat ... that would be a good place to plant a well-grown cottonmouth right before ... a boat trip. Do it on a chilly morning when the snake, being cold-blooded, will probably stay where you hide him, say, under a seat."

On fluorine, Hutchkinson writes fluoridated water destroys tooth enamel, causes cancer and ages you prematurely, which puts the author in the same school of thought held by General Jack Ripper in Dr. Strangelove, that it's important not to let such things contaminate your precious bodily floods and purity of essence.

Or, of the always popular Botox, Hutchkinson writes: "Botulism is fun and easy to make." Often translated into jihadi terrorist documents, the "fun" Hutchkinson way to make Botox is to throw meat and dirt together in a can.

Parts from Hutchkinson were copied to the Internet in the Nineties.

Around 1996, these articles, or fragments, were translated into Arabic for the Mujahideen Poisons Handbook which is only a smaller subset of the original content found in The Poisoner's Handbook.

In turn, the Mujahideen Poisons Handbook has been copied into a number of other Islamic terror documents still regularly seized off the Internet and the computers of those arrested in terror investigations. It is accurate to say that those implicated in terrorism cases and found with the content of Hutchkinson in their possession see it contribute to their usually inevitable trip to prison for a long time.

In the chapter on "Chemical Poisons" -- something of a laugher of a title which unwittingly reveals Hutchkinson's actual savvy -- ethylene and diethylene glycol are recommended because they have "a sweetish, agreeable taste." Which is why the Chinese use it as a replacement for glycerin in toothpaste and some medicines which have caused poisonings in the developing world.

DD has written before that if al Qaeda had been caught running something like a toothpaste factory putting diethylene glycol into its product for the shelves on the United States, it would be much more than a business story to be buried in the middle of the newspaper. You wouldn't see any reporter seriously putting into print claims from al Qaeda that diethylene glycol was OK and you should continue buying Osama bin Minty Fresh terror-brand toothpaste. Instead, cruise missiles would be flying and prisoners would be on Air Torture for delivery to some dungeon.

In place of cruise missiles, we recommend the US government make those consumable products, drugs and toiletries which contain ingredients from China be made to have bright easily-visible signage, much like a Hazmat symbol, which says so. If this is done, the US marketplace will hit the Chinese vendors of adulterants/poisons where it will hurt.


FDA announcement on poisoned toothpaste from China.

Voice of America news.

EAT ZINC from May, in which a Chinese vendor insists his particular poison is a healthful product.

Friday, June 01, 2007

BEWARE STINK-BOMB TOTING TERRORISTS: Dept. of Homeland Security 'chemicals of interest' list informed by Poisoner's Handbook

General knowledge of chemistry and biology within the US government's security bureaucracy is dreadful.

While it is not a subject anyone wants to discuss in a public mainstream forum, the ignorance does impact policy-making, particulary when it involves people writing rules to keep us safe.

For instance, unusual paranoia over chemical attack in the US takes many forms. It can be seen in a recent piece of trouble from the Department of Homeland Security, a long list of "chemicals of interest" it wishes to require all university settings to inventory and track.

"Academic institutions across the country claim they will have to spend countless hours and scarce resources on documenting very small amounts of chemicals in many different labs that are scattered across sometimes sprawling campuses," reported a recent Chemical & Engineering News, the publication of the American Chemical Society.

"For 104 chemicals on the list, the threshold is 'any amount.'"

An update to address university workload concerns is said to be scheduled for "early to mid-June."

However, before that happens, let's take a peek at the list.

If one has a little bit of background in chemical weapons synthesis, one can see DHS is possessed by the idea that terrorists might storm into universities and plunder chem labs for precursors to nerve gases.

This seems almost reasonable. However, the precursors, all fearsomely named organic compounds likely to make the average reader passer-by fall asleep in disinterest, is not where the list stops.

Your friendly neighborhood GlobalSecurity.Org Senior Fellow has written an analysis of the trouble sheer ignorance has caused at the Register. See it here.

Caution: You'll be entering a zone which requires you to accept the fact that I have a drop-dead serious advanced degree in the hard sciences and also know, first hand, the biochemical literature of terrorists and how it has been evaluated by our national counter-terror mavens.



Chemicals of interest list at DHS.

Official comments of the American Chemical Society.

Terrorists Planned Deadly Gas Attack On Western Targets.News story at DHS/FEMA, referencing unnnamed terrorist chemical attack document. Your friendly neighborhood GlobalSecurity.Org Senior Fellow has this document. Fundamentally, much of it is simply an Arabic translation of parts of Maxwell Hutchkinson's The Poisoner's Handbook.

To "make" the toxin that causes botulism, use "horse dung or cow dung," it reads. Combine "dung, meat or soil" in a can. Then "wait ten days." "30ml of the agent can kill 60 million people, God willing," it continues.

The stupid and embarrassing parts about horse dung and cow dung in a can are not furnished in the story at the fema.gov site.