Donate for the Cryptome archive of files from June 1996 to the present

1 July 2013

Cyber Command Suffers Second Defeat, Dump It

First Cyber Command Defeat:

http://cryptome.org/0002/uscybercom/uscybercom-defeat.htm


Cyber Command suffered its second defeat with the win of Edward Snowden. The first defeat was won by Bradley Manning. This suggests Cybercom deserves dissolution and a better command instituted, or, best, nothing like it.

The commander for both losses, General Keith Alexander, has to go. And a new, agile Cybercom, if it is to endure, needs to be separated from the venerable, deeply experienced, albeit sclerotic, National Security Agency. Different missions require different enabling legislation, leadership, funding, policy, staffing, training, operation and security.

An effective Cybercom may not be possible within the military culture of tradition, over-staffing, minutely specified military occupation specialty, heirarchical rank, medieval separation of officers from enlisted members, advancement in rank by longevity and favoritism, special training for combat, and further divided between military and civilian -- the latter further fragmented between inside civilians and outside contractors with multiple sub-contractors.

The legislation and implementation of this complex traditional, command-driven organization assures it will not be capable of handling the challenges of cyber swarming, rapid evolution of technology and techniques -- much of it grown outside established institutions -- youthful contempt for authority, national and international disloyalty and disinterest, and most of all, ingrained insurgency.

For this insurgency, outwitting national security establishments is considered to be sport, a game, a test of prowess, bragging rights, and it is winning in cyber space, only periodically, laughingly infrequently, defeated, caputured and imprisoned by use of legacy, lumbering, clumsy, expensive, failure-and-excuse-prone mechanisms, in which legacy leaders like NSA, FBI, CIA, White House and Congress -- supported by contractors, lobbyists and donors -- can only dissimulate, apologize and promise to do better with more funding and more draconian crack-down on civil liberties.

Cyber Command is a failure -- sibling of Department of Homeland Security -- a boondoggle, a huge transfer of funds to the cybersecurity (and homeland security) industry from legacy military pork barrels. Thousands of suitably-skilled youngsters -- most self-trained by a subversive culture hostile to authority -- have been enlisted, hired and contracted to run cyber offensive and defensive operations under the rigidly ranked command of military officers accustomed to obedience and respect of rank.

Cybersecurity contracting -- commercial and institutional -- is an equally great failure. It too is a boondoggle, spoiled rotten with generous and laxly-overseen funding, often led by ex-military officers and those long accustomed to military grade perquisites, protected by secrecy, back-slapping, insider favoritism, laziness, lack of competition, forgiveness of corruption, shallow and classified IG investigation, all the attributes of its single customer, the national security consortium beloved of governments and autocrats.

No wonder the coddled and well-paid youngsters defy, dance around, ridicule and outrun these balloon-headed officers and liquored-contractors, this is what they have done most of their teenage and adult lives. Their loyalty is to their own culture, open, non-secret, disputatious, daring and fun-filled, most emphatically not venerated-military or rich-contractor grade.

What would a replacement for Cybercom be like? Not military, not commercial, not NGO, then what?

Plenty of cyber initiatives are underway which demonstrate effective alternatives to heirarchical military, commercial and NGO cyber deadwood. They have been created and are run by some of the most brilliant brains and imaginations in the world, agile, cheap, mostly volunteer and leaderless, disputatious, humorous, dismissive of authority of any kind, gov, mil, com, edu, org.

Don't expect to hire or contract or academicize them. The best of them do not go inside institutions -- except to social engineer and disclose the secrets of authoritative corruption.

Examples abound: just read the official demonizations of outsiders spilling insider secrets of gov, mil, com and ngo.

Instead of wasting treasure on dim-witted cybercommands listen to those secret-spilling demons, better understood as angels out-dancing the pinheads.