Skip to content or view screen version

US Government Behind Cyber Harassment of Dissidents

The Invisible Hand | 31.08.2002 10:07

Details about why I believe the US Government is behind recent online harassment of dissidents. What evidence have techies collected about similar activity in the UK?-- (post copied by A.N. Other from www.indymedia.org)

Online Dissent Under Attack
By: The Invisible Hand

There is an organized attack underway. Many websites hosting views critical of the US Government and the policies of Israel have been subject to various forms of harassment. Some harassment has come in the form of forged spamming. Other harassment has come through electronic mail and posts on Internet forums. Many have suggested that these attacks are the work of lone individuals or pernicious non-governmental organizations. These suggestions may be true. However, I am aware of some information that may point the finger directly at the US Government. I am remaining anonymous for my protection. I have received death threats in response to my political writings. Other sanctions have been imposed upon me as well, but I leave the details out in order to make more difficult my identification. I am supplying you with inside information.

Immediately following the 9/11 attacks, various agencies of the US Government reached out to corporate America for "help." Various defense contractors were asked to make suggestions about what they could do to help in the "war on terror." However, in addition to the suggestions, various intelligence and defense organizations within the US Government approached specific corporations in possession of tools that could assist a black operation that had in mind. I do not know all of the details of this request. However, I will share what I do know.

Intelligence agencies and DISA (The Defense Information Services Agency) were interested in recruiting private corporations in an illegal effort to wage electronic warfare against US enemies. What was meant my "US enemies" was left unclear, at least at my level of awareness, but the corporation for which I worked turned down the request out of fear of future embarrassment should the operation be revealed.

I have been monitoring harassment on various Internet forums. One individual engaged in harassment had the following IP address: 216.177.41.70. A reverse lookup of this address at that time revealed that the IP address is owned by The Technology Advancement Group (TAG). Visiting TAG's site, you will see that TAG is an asset of the NSA. I speculate that TAG is one entity involved in online harassment against dissent. This individual had access to much private information that is not publicly available, dogged forum dissidents, and in time the harassment was followed by death threats, at least in one case. Much of the harassment had a pro-Israel tone.

There is a corporation in Austin, Texas called Cycorp. Cycorp is almost wholly dependent upon grants and contracts from the Department of Defense. Cycorp has a product called CycSecure. CycSecure, ostensibly, exists to provide network security. It employs a knowledge base of rules for detecting network vulnerabilities. Cycorp is a corporation specializing in Artificial Intelligence. CycSecure relies upon its product, Cyc, as a knowledge base and inference engine. The Department of Defense, DISA, and various intelligence agencies have approached Cycorp about using this tool in reverse. Specifically, using it to attack networks. Cycorp recently won a contract with DISA. TAG has a DISA contract as well. DISA wishes to use CycSecure. I suspect that this indicates that DISA is engaged in electronic warfare against the US Government's enemies.

I suspect that one source of these attacks is TAG and another source is DISA. However, this may not be the comprehensive set of Governmental entities attacking dissent. Several articles have come out that claim that Freedom Corps is training individuals and retirees in cyber warfare through Cyber Corp as part of its volunteer program.

One other interesting note about Cycorp. Cycorp has been proposing, to DISA, the creation of a computer center where hundreds of computers will run copies of Cyc. Each copy of Cyc will specializing in modeling a specific "terrorist." Given the wide definition in current use for the concept "terrorist," will it be long before individual dissidents and dissident organizations have their an artificial intelligence working 24/7 on collecting information about them and predicting their actions?


The Invisible Hand

Comments

Hide the following 3 comments

Very interesting - please keep me informed

01.09.2002 01:07

From their website:

CycSecure

now available

CycSecure is a patent-pending non-invasive network scanning process that uses Cyc technology to deduce the steps a hacker, employee or client would take to attack a company's network. Cyc technology provides CycSecure with its unique capabilities.

BlackPope
mail e-mail: BlackPope@operamail.com


Looks like it may have begun.

01.09.2002 13:26

From the website of the excellent Z Magazine: ( http://www.zmag.org):

Urgent: We are the target of a concerted large-scale and aggressive disinformation campaign. As
yet, we do not know the perpetrators. EMail is being sent, written by others but with our return
address, with the intent of misleading people as to our views and provoking massive angry mailings
back at us. Please ignore all such mailings. Please advise others to do so as well. And please pay
attention to mailings that are literally from us -- you should be able to tell the difference.
Moreover, these folks are likely to do this with other returns addresses as well, personal and
Institutional.

Aim Here


Lack of proof.

18.12.2003 17:49

As I see it there is no proof in this allegation. I have researched both companies stated in the article and can find no proof of your statements except they hold government contracts. I have done research on TAG’s CEO and find nothing leading to this articles conclusion.
You can find people with varying views and those that conduct themselves in a manner not in line with the companies they work for. Jumping to conclusions is not proof that any company or person did this in cooperation with anyone.
If the allegations are founded, the real question is what, as people, do we allow to be done in our names to keep our countries safe. We know there are terrorist cells within each of our countries. Each person needs to ask themselves, how far do our “rights” go before we give a terrorist freedom to do as they will? Do we find out who they are or wait until another 9/11? We live in a different world than when we where children. Our governments and ourselves need to change the way we view our “rights”.
It has been my understanding that honest hard working people do not have anything to hide and would we willing to allow this type of information search. As it is most people have information taken from them all the time, without their knowledge, and it doesn’t bother them. Just about every webpage you go to collects some type of data on you and everyone views it as routine business.

John

John