Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Myrddin; Alamo-Girl; Amityschild; AngieGal; AnimalLover; Ann de IL; annieokie; aragorn; auggy; ...
My LDS stake in San Diego had ham radio ops, but also had an effective "phone tree" and "on the ground" connectivity via foot or bicycle. We could account for 5,000 people in the space of 30 minutes without phone or radio.

IS
FREEREPUBLIC
????PAYING ATTENTION????

imho,
That should have been accomplished
WITH LOCAL FR GROUPS
10 YEARS AGO!

AND CERTAINLY AFTER
911!

Evidently too many FREEPERS are still asleep or prefer to live in denial.

Sigh

137 posted on 06/08/2010 9:02:40 AM PDT by Quix (THE PLAN of the Bosses: http://www.freerepublic.com/focus/religion/2519352/posts?page=2#2)
[ Post Reply | Private Reply | To 50 | View Replies ]


To: Quix
We know each other by our screen names on FR, yet few of us have met in person. Absent FR, the network and associations dissolve into thin air. The LDS stake arrangement was based on being prepared to react in a severe emergency to account for all the folks in the stake. A practice run occurs twice each year. Messages are planted with a few people and passed back to the stake leadership as sort of a check. As an aside, the hams in the stake are also active in ARES, RACES and some in Animal Rescue Reserve.

The 8 hour FR outage this week reminded me how much FR is a key part of my connection to current events.

156 posted on 06/08/2010 9:37:45 AM PDT by Myrddin
[ Post Reply | Private Reply | To 137 | View Replies ]

To: Quix

New government entity to take control over military and civilian networks

by WINSTON on MAY 31, 2010

With little fanfare, the U.S. Cyber Command (CYBERCOM) has officially begun operation this week.  The entity is a collection of personnel from the National Security Agency (NSA), Army, Navy, Marine, Air Force and policy makers (read that politicians).  The stated purpose is to protect the vital interests of the United States in relation to the Internet.  The entity is not just defensive in nature but can also engage in preemptive “strikes” intended to disrupt threats.  Because this was an internal reorganization within the Department of Defense, the creation of CYBERCOM did not require congressional approval.  

Even though the primary purpose of CYBERCOM is to protect government and military networks, there is incredible pressure to extend that “protection” to civilian and business networks as well.  In fact, the second highest official at the Pentagon, William Lynn III - Deputy Secretary of Defense, recently announced that the Department of Defense might start a protective program for civilian networks.  Defense Secretary Robert Gates stated the same thing in June 2009.

Policies are being finalized that will allow the Department of Homeland Security (DHS) to request help from CYBERCOM to  protect government and civilians networks.  Unfortunately there isn’t any clarity on what the criteria would be to initiate a request for help.  An official at CYBERCOM stated: “From our perspective the threshold is really easy: it’s when we get a request from DHS,” the official noted. “What’s their threshold? I couldn’t tell you what their threshold is.”

On the surface this may sound benign, but it is actually quite insidious.  The NSA is completing work on threat monitoring systems called EINSTEIN 2 and EINSTEIN 3.  According to declassified documents, the stated purposes of these two systems are as follows:

DHS (Department of Homeland Security) is deploying, as part of its EINSTEIN 2 activities, signature-based sensors capable of inspecting Internet traffic entering Federal systems for unauthorized accesses and malicious content. The EINSTEIN 2 capability enables analysis of network flow information to identify potential malicious activity while conducting automatic full packet inspection of traffic entering or exiting U.S. Government networks for malicious activity using signature-based intrusion detection technology…. EINSTEIN 2 is capable of alerting US-CERT in real time to the presence of malicious or potentially harmful activity in federal network traffic and provides correlation and visualization of the derived data….

The EINSTEIN 3 system will also support enhanced information sharing by US-CERT with Federal Departments and Agencies by giving DHS the ability to automate alerting of detected network intrusion attempts and, when deemed necessary by DHS, to send alerts that do not contain the content of communications to the National Security Agency (NSA) so that DHS efforts may be supported by NSA exercising its lawfully authorized missions.

Deputy Secretary of Defense William Lynn stated that private companies who operate critical infrastructure (electrical grid, telecommunication networks, Internet service providers, the banking and financial industry, etc) should install EINSTEIN monitoring agents or else they will face the “wild, wild west of the Internet”.  He went on to state that failing to protect these critical infrastrutures  ”could lead to physical damage and economic disruption on a massive scale.” 

In other words:

Words matter and the usage of them need to be analyzed in order to determine what someone is saying (or not saying) to fully assess a situation:

Lynn stated: ““I think it’s gonna have to be voluntary,” he added. “People could opt into protection – or choose to stay out. Individual users may well choose to stay out. But in terms of protecting the nation’s security, it’s not the individual users [that matter most]. I mean, they have to worry about their individual [data], their credit rating, and all that. But it’s the vulnerability of certain critical infrastructure – power, transportation, finance. This starts to give you an angle at doing that.”

Essentially, Lynn is stating that individual citizens can opt out of EINSTEIN but critical entities will not have a choice. 

In summary, we have a new government entity created without congressional approval whose purpose is to monitor (read that spy on) all Internet traffic in the United States, and to take unspecified preemptive strikes when something happens that the agency deems is not acceptable…

Obviously privacy organizations are deeply troubled by CYBERCOM’s ability to monitor the content of all internet communication.  No information has been presented to date on the privacy implications of EINSTEIN 3 and limited information has been provided on an early 2008 versions of EINSTEIN 2.

Fortunately, we have many recent examples worldwide that we can examine to see how governments use these protective powers to defend their citizens in cyberspace:

“Those who would give up essential liberty to purchase a little temporary safety deserve neither liberty nor safety” – Benjamin Franklin

165 posted on 06/08/2010 9:52:46 AM PDT by Star Traveler (Remember to keep the Messiah of Israel in the One-World Government that we look forward to coming)
[ Post Reply | Private Reply | To 137 | View Replies ]

To: Quix

I think they are Quix, I really do. You are in the midst of a complete takeover and unless and until the America peope RISE UP they will continue to do what they are doing. I’m very disappointed at the reaction to Obama. CO


224 posted on 06/08/2010 8:45:18 PM PDT by Canadian Outrage (Conservatism is to a country what medicine is to a wound - HEALING!!)
[ Post Reply | Private Reply | To 137 | View Replies ]

To: Quix
My LDS stake in San Diego had ham radio ops, but also had an effective "phone tree" and "on the ground" connectivity via foot or bicycle. We could account for 5,000 people in the space of 30 minutes without phone or radio.

That's brilliant Quix.

AlarmAndMuster.com, same idea.

I'd be all in favor of trying to start something like that here.


Frowning takes 68 muscles.
Smiling takes 6.
Pulling this trigger takes 2.
I'm lazy.

227 posted on 06/08/2010 9:41:30 PM PDT by The Comedian (Evil can only succeed if good men don't point at it and laugh.)
[ Post Reply | Private Reply | To 137 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson