Global Cyberwarfare. High-Level US Intelligence Source: “We Hack Everyone Everywhere”

Obama Asks Military to Draw Up Plans for Offensive Overseas Cyber-Strikes

Glenn Greenwald – who broke the phone and internet spying stories this week – has a new exposé … this time on offensive cyber-warfare:

Barack Obama has ordered his senior national security and intelligence officials to draw up a list of potential overseas targets for US cyber-attacks, a top secret presidential directive obtained by the Guardian reveals.

***

An intelligence source with extensive knowledge of the National Security Agency’s systems told the Guardian … “We hack everyone everywhere. We like to make a distinction between us and the others. But we are in almost every country in the world.”

***

The full classified directive repeatedly emphasizes that all cyber-operations must be conducted in accordance with US law and only as a complement to diplomatic and military options. But it also makes clear how both offensive and defensive cyber operations are central to US strategy.

Under the heading “Policy Reviews and Preparation”, a section marked “TS/NF” – top secret/no foreign – states: “The secretary of defense, the DNI [Director of National Intelligence], and the director of the CIA … shall prepare for approval by the president through the National Security Advisor a plan that identifies potential systems, processes and infrastructure against which the United States should establish and maintain OCEO capabilities…” The deadline for the plan is six months after the approval of the directive.

The directive provides that any cyber-operations “intended or likely to produce cyber effects within the United States” require the approval of the president, except in the case of an “emergency cyber action”. When such an emergency arises, several departments, including the department of defense, are authorized to conduct such domestic operations without presidential approval.

Obama further authorized the use of offensive cyber attacks in foreign nations without their government’s consent whenever “US national interests and equities” require such nonconsensual attacks. It expressly reserves the right to use cyber tactics as part of what it calls “anticipatory action taken against imminent threats”.

The directive makes multiple references to the use of offensive cyber attacks by the US military.

Greenwald and others have long reported that the Obama administration claims the right to be judge, jury and executioner in both drone assassinations and offensive cyber attacks.

Greenwald also reports that the head of the cyber command is the NSA boss … the same guy responsible for much of the spying we’ve been hearing about:

In January, the Pentagon announced a major expansion of its Cyber Command Unit, under the command of General Keith Alexander, who is also the director of the NSA. That unit is responsible for executing both offensive and defensive cyber operations.

(There are other overlaps and interconnections between spying and warfare as well.)

The War Comes Home

Offensive cyber operations are not only occurring overseas …

The Department of Defense has long waged cyber-war against Americans by censoring and manipulating social media and other websites. More proof here and here.

This is not entirely surprising, given that:


Articles by: Washington's Blog

Disclaimer: The contents of this article are of sole responsibility of the author(s). The Centre for Research on Globalization will not be responsible for any inaccurate or incorrect statement in this article. The Centre of Research on Globalization grants permission to cross-post Global Research articles on community internet sites as long the source and copyright are acknowledged together with a hyperlink to the original Global Research article. For publication of Global Research articles in print or other forms including commercial internet sites, contact: [email protected]

www.globalresearch.ca contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to our readers under the provisions of "fair use" in an effort to advance a better understanding of political, economic and social issues. The material on this site is distributed without profit to those who have expressed a prior interest in receiving it for research and educational purposes. If you wish to use copyrighted material for purposes other than "fair use" you must request permission from the copyright owner.

For media inquiries: [email protected]