“Today, I am going to discuss how the Pentagon is going to control the internet (after all, they claim they invented it and it is theirs and is being “used by pro-terrorist Americans” to “thwart and frustrate” the Bringing of Democracy to benighted Arabs and liberal Americans.) Yes, control the Internet to keep Bush’s growing legions of enemies from continuing their revelations of his insanities, thefts and slaughters.
But the other purpose is to stuff the gullible media and American public with DoD propaganda that is also being piped to foreign countries. Remember the fake letters manufactured in the Pentagon, sent to Iraq and then returned to hundreds of American newspapers purporting to come from local GIs thrilled with how the Iraqi people are now becoming a New Democratic Country? And many now realize that our DoD is concealing many more dead than are listed in public and have never talked about the over 5,000 deserters (mostly at Shannon in Ireland).
This is their blueprint and we hope you enjoy it. And when I have finished dealing with that subject, I will explain to my many readers, both here and abroad, just exactly how our Friendly Government uses your cable TV to listen to conversations in your house.
Let’s start with the Great Internet War:
It should be fairly obvious that the internet is the one barrier to the total propagandizing of the American people. Flawed as it is with all kinds of irrational material intermixed with the truth, the internet still is more than capable of exposing the ignorance, idleness and vice that are the hallmarks of the current administration. There are various methods devised and contemplated now that would clarify and rectify this problem.
The first part is the establishment of the so-called ‘Internet2’ which was ostensibly established by “academic interests, to speed up and better organize” the present loosely-knit internet. In reality, this concept was under the thumb of the FBI and was designed to permit them a much tighter observation, and eventual control, of the dangerous internet.
Not to be outdone, in 2003, Secretary of Defense Donald Rumsfeld put his signature to a document that is designed to permit his department to not only take physical control of the internet on the pretext of “National Security,” but to utilize it to pump fake official propaganda into everyone, including foreigners, American media sources and, most especially, the American people.
In reading through this, it might be instructive to note that the U.S. government is legally prohibited from conflating these operations by targeting PSYOP activities–intended for foreign audiences–at the American public. 22 U.S.C. § 1461 (Smith-Mundt Act), which created the United States Information Agency (USIA) in 1948, directs that information about the United States and its policies intended for foreign audiences “shall not be disseminated within the United States, its territories, or possessions.” Of course, as we have seen and are now seeing, the law means nothing to the American far right wing, now in power, but obeyed or not, the laws are still in effect.
This order, “Information Operations Roadmap,” calls on the Department of Defense to enhance its capabilities in five key Information Operations (IO) areas: electronic warfare (EW), PSYOP, Operations Security (OPSEC), military deception and computer network operations (CNO). The plan was developed by an oversight panel led by the Deputy Assistant Secretary of Defense (Resource and Plans) and representatives from the Joint Staff, Office of the Secretary of Defense, and Special Operations Command, among other organizations.
Copies of this 74-page document, “Information Operations Roadmap,” and about a dozen ancillary support documents, are now floating around official Washington, along with hilarious tapes of what Bush and his security people fondly believe are “completely secure” personal Presidential conversations that sound like copy for the supermarket tabloids.
Here, for the pro-Bush doubters and jealous bloggers, is a copy of the cover:
The Information Operations Roundup calls for a far-reaching overhaul of the military’s ability to conduct information operations and electronic warfare. And, in some detail, it makes recommendations for how the US armed forces should think about this new, virtual warfare.
The document says that information is “critical to military success”. Computer and telecommunications networks are of vital operational importance. The document states: “Effectively communicating U.S. Government (USG) capabilities and intentions is an important means of combating the plans of our adversaries. The ability to rapidly disseminate persuasive information to diverse audiences in order to directly influence their decision-making is an increasingly powerful means of deterring aggression. Additionally, it undermines both senior leadership and popular support for employing terrorists or using weapons of mass destruction.”
The operations described in the document include a surprising range of military activities: public affairs officers who brief journalists, psychological operations troops who try to manipulate the thoughts and beliefs of an enemy, computer network attack specialists who seek to destroy enemy networks.
All these are engaged in information operations. Perhaps the most startling aspect of the roadmap is its acknowledgement that information put out as part of the military’s <>psychological operations<>, or PSYOPS, is finding its way onto the computer and television screens of ordinary Americans.
“Information intended for foreign audiences, including public diplomacy and PSYOPS, is increasingly consumed by our domestic audience,” it reads.
“PSYOPS messages will often be replayed by the news media for much larger audiences, including the American public,” it goes on. “The increasing ability of people in most parts of the globe to access international information sources makes targeting particular audiences more difficult. Today the distinction between foreign and domestic audiences becomes more a question of USG (U.S. Government ed) intent rather than information dissemination practices.”
The document’s authors acknowledge that American news media should not unwittingly broadcast military propaganda but the program is to legalize this so that “unwittingly” may become “willingly,” In this day and age it is impossible to prevent stories that are fed abroad as part of psychological operations propaganda from blowing back into the United States – even though they were directed abroad.
Public awareness of the US military’s foreign (and domestic) propaganda information operations is growing because of official stupidity and arrogance. .In late 2005, it emerged that the Pentagon had paid a private company, the Lincoln Group, to plant hundreds of stories in Iraqi newspapers. The stories – all supportive of US policy – were written by military personnel and then placed in Iraqi publications.
And many “private” websites that appeared to be information sites on the politics of Africa and the Balkans were found to be totally run by the Pentagon. Also, it became obvious that some sectors of the American media, to include reporters, editors and management, were completely in the government’s pocket.
But the true extent of the Pentagon’s enormous information operations, how they work, who they’re aimed at, and at what point they turn from informing the public to influencing populations, is becoming much clearer.
When it describes plans for electronic warfare, or EW, the document takes on an extraordinary tone. It reveals that Pentagon PSYOPS personnel “support” the American government’s international broadcasting. It recommends that a global website be established that supports America’s strategic objectives. The website would use content from “third parties with greater credibility to foreign audiences than US officials”.
It also recommends that PSYOPS personnel should consider a range of technologies to disseminate propaganda in enemy territory: unmanned aerial vehicles, “miniaturized, scatterable public address systems”, wireless devices, cellular phones and the internet.
In short, this operation views the internet as being equivalent to an enemy weapons system.
“Strategy should be based on the premise that the Department [of Defense] will ‘fight the net’ as it would an enemy weapons system,” it reads.
The slogan “fight the net” appears several times throughout the roadmap.
The authors warn that US networks are very vulnerable to attack by hackers, enemies seeking to disable them, or spies looking for intelligence.
“Networks are growing faster than we can defend them… Attack sophistication is increasing… Number of events is increasing.”
The document stresses the importance of Psychological Operations (PSYOP), particularly in a wartime situation or, currently, a manufactured global “War on Terrorism”: The Department of Defense defines PSYOP generally as “planned operations to convey selected information and indicators to foreign audiences to influence the emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals.”
And adds that the United States should seek the ability to “provide maximum control of the entire electromagnetic spectrum”.
US forces should be able to “disrupt or destroy the full spectrum of globally emerging communications systems, sensors, and weapons systems dependent on the electromagnetic spectrum”.
In summation here, the US military seeks the capability to knock out every telephone, every networked computer, every radar system on the planet.
This is the first part of the program and deals with the dissemination of American propaganda throughout the world via the internet and developing the capacity to knock out any other internet programs that are deemed to be, “hostile to the ideals and goals of the American government.” Documents relating to this operation specifically speak of “hostile elements inside the United States who, in conjunction with external terrorists, seek, by the dissemination of false, denigrating and disruptive” information via the domestic internet system. One parallel DoD study explains, in detail, how the American internet systems works and how, in a declared “National Emergency” it can be co-opted into “full cooperation” with the DoD. By silencing “dissident” sites while promoting “pro-government” sites, either once now fully controlled by the government or set up by them as the occasion calls for.
Supporters of such programs will no doubt object that this is only a plan and that many such plans exist on paper. The response is that certainly, many plans exist. Plans are known for the attack on, and neutralization of, both Syria and Iran but the likelihood of these being implemented are somewhat remote.
This plan, however, is considered to be far more imminent because of the potential damage an unfettered American internet can wreak on a plotting administration. The American print and television media are very easy to control but the internet, on the other hand, is so diverse that a central program has to be, and has been, devised to bring it under control very quickly and effectively.
Now that we have addressed the Seizure of the Internet, let’s look at something less important but still of interest. That is the utilization of your cable television system to spy on you. No, this is not the sort of paranoid concoctions one often finds on the internet but an actual, working program, now in use across America.
Television sets contain both an AM and FM system. A government agent (now the DHS) merely goes to your cable head, located in your area, and easily can locate your outlet at the station. It is only a matter of moments to hook into it and reverse the AM and FM in your set to permit this set to act as a transmitter/receiver. An agent located at the main local office can then listen to, or tape record, any conversation held within the range of the set. Please note that this cannot be done at a distance but requires someone physically on the scene.
The best way to block this? Simply disconnect your cable from the set by unplugging it, if and when you plan to do, or say, anything near your television set. There exists a long, published technical paper from a professor at Tulane University explaining exactly how this process works and the Bell Laboratory in New Jersey is the firm that developed the equipment for this ten year old very successful domestic spy project.
Protecting the Homeland – Report of the Defense Science Board Task Force on Defensive Information Operations 2000 Summer Study Volume II The Defense Science Board Task Force on Defensive Information Operations Related concludes that the United States cannot today defend itself from an information operations attack by a sophisticated nation-state adversary. They also state that the vulnerability of the United States is greater than in 1996 and that more than 20 countries have or are developing computer attack capabilities [published March 2001].
James Bamford, “The Man Who Sold the War: Meet John Rendon, Bush’s general in the propaganda war,” Rolling Stone, November 17, 2005;
Stephen J. Hedges, “Media use backfires on U.S.; Many ask if Pentagon altered information to make case for war,” Chicago Tribune, December 11, 2005.)
See our Inside the White House archive: