• References Liz Cheney on FNS calling for the U.S. to act unilaterally to take down the WikiLeaks website.

    tags: cyberwar information sharing information society intelligence

    • On Fox News Sunday, conservative commentator Liz Cheney said
    • “I would really like to see President Obama move to ask the government of Iceland to shut that Web site down,” Cheney said. “I’d like to see him move to shut it down ourselves if Iceland won’t do it.” Wikileaks.org is hosted on a server in Sweden.
  • In which Michael Hayden also frames the WikiLeaks incident in terms of “cyberwar.”

    tags: cyberwar information sharing information society intelligence

    • Hayden was asked about Wikileaks and the possible repercussions that will come from the secret-spilling site publishing 77,000 intelligence documents on the Afghanistan war.

      “This is an interesting aspect of a cyberwar [that] would not exist in physical space. So how now do we deal with this? Can we sustain espionage? Will it be possible for America to spy if this cultural trend is not modified or muted . . . ?” he said. “We have less control of our secrets than some other states.”

  • In which, Barbara Starr repeats again that the WikiLeaks incident is a “cyber attack.”

    tags: cyberwar information sharing information society intelligence

    • Think of this as a cyber attack. You know, we talked so much about cyber attacks, cyber warfare this time for the U.S. military. It really came from within.
  • In which Barbara Starr calls the WikiLeaks release of classified documents obtained from a U.S. Army intelligence analyst a “cyber attack.”

    tags: cyberwar information sharing information society intelligence

    • there’s a lot of discussion always about cyber attacks, cyber warfare. This was perhaps the largest cyber attack, and for the U.S. military, it came from within
  • tags: information sharing information society intelligence

    • Well, the Obama administration has a moral responsibility to stop him from wreaking even more damage.

      Assange is a non-U.S. citizen operating outside the territory of the United States. This means the government has a wide range of options for dealing with him. It can employ not only law enforcement but also intelligence and military assets to bring Assange to justice and put his criminal syndicate out of business.

      The first step is for the Justice Department to indict Assange. Such an indictment could be sealed to prevent him from knowing that the United States is seeking his arrest. The United States should then work with its international law enforcement partners to apprehend and extradite him.

    • With appropriate diplomatic pressure, these governments may cooperate in bringing Assange to justice. But if they refuse, the United States can arrest Assange on their territory without their knowledge or approval. In 1989, the Justice Department’s Office of Legal Counsel issued a memorandum entitled “Authority of the Federal Bureau of Investigation to Override International Law in Extraterritorial Law Enforcement Activities.”

      This memorandum declares that “the FBI may use its statutory authority to investigate and arrest individuals for violating United States law, even if the FBI’s actions contravene customary international law” and that an “arrest that is inconsistent with international or foreign law does not violate the Fourth Amendment.” In other words, we do not need permission to apprehend Assange or his co-conspirators anywhere in the world.

    • This should be done, ideally, through international law enforcement cooperation. But if such cooperation is not forthcoming, the United States can and should act alone. Assange recently boasted that he has created “an uncensorable system for untraceable mass document leaking.” I am sure this elicited guffaws at the National Security Agency. The United States has the capability and the authority to monitor his communications and disrupt his operations.

      Last year, the Obama administration stood up a new U.S. Cyber Command (USCYBERCOM) to “conduct full-spectrum military cyberspace operations” in defense of U.S. national security. With the stroke of his pen, the president can authorize USCYBERCOM to protect American and allied forces by eliminating WikiLeaks’ ability to disseminate classified information that puts their lives at risk.

Posted from Diigo. The rest of my favorite links are here.