U.S. military to patrol Internet

278

By SHAUN WATERMAN
UPI Homeland and National Security Editor
June 30, 2008

WASHINGTON, June 30 (UPI) — The U.S. military is looking for a contractor to
patrol cyberspace, watching for warning signs of forthcoming terrorist attacks
or other hostile activity on the Web.

“If someone wants to blow us up, we want to know about it,” Robert
Hembrook, the deputy intelligence chief of the U.S. Army’s Fifth Signal Command
in Mannheim, Germany, told United Press International.

In a solicitation posted on the Web last week, the command said it was looking
for a contractor to provide “Internet awareness services” to support
“force protection” — the term of art for the security of U.S. military
installations and personnel.

“The purpose of the services will be to identify and assess stated and
implied threat, antipathy, unrest and other contextual data relating to selected
Internet domains,” says the solicitation.

Hembrook was tight-lipped about the proposal. “The more we talk about
it, the less effective it will be,” he said. “If we didn’t have to
put it out in public (to make the contract award), we wouldn’t have.”

He would not comment on the kinds of Internet sites the contractor would be
directed to look at but acknowledged it would “not (be) far off” to
assume violent Islamic extremists would be at the top of the list.

The solicitation says the successful contractor will “analyze various
Web pages, chat rooms, blogs and other Internet domains to aggregate and assess
data of interest,” adding, “The contractor will prioritize foreign-language
domains that relate to specific areas of concern … (and) will also identify
new Internet domains” that might relate to “specific local requirements”
of the command.

Officials were keen to stress the contract covered only information that could
be found by anyone with a computer and Internet connection.

“We’re not interested in being Big Brother,” said LeAnne MacAllister,
chief spokeswoman for the command, which runs communications in Europe for the
U.S. Army and the military’s joint commands there.

“I would not characterize it as monitoring,” added Hembrook. “This
is a research tool gathering information that is already in the public domain.”

Experts say Islamic extremist groups like al-Qaida use the Web for propaganda
and fundraising purposes. Although the extent to which it is employed in operational
planning is less clear, most agree that important information about targeting
and tactics can be gleaned from extremists’ public pronouncements.

Hembrook said the main purpose of the contract is to analyze “trends in
information.” The contractor will “help us find those needles in that
haystack of information.”

The solicitor says the contractor’s team will include a “principal cyber
investigator,” a “locally specialized threat analyst” and a “foreign-speaking
analyst with cyber investigative skills,” as well as a 24/7 watch team.

The contractor will produce weekly written reports, containing “raw data
and supporting analysis.”

The addresses of the Web page sources will be “captioned under alias to
preserve access,” says the solicitation. Experts have noted in the past
that publishing the addresses of some extremists’ sites has led to them being
attacked or moving. However, the contractor will “consider releasing specific
(Web page addresses) on an as-needed basis … if explicit threat materials
or imminent threat to personnel or facilities are discovered.”

The contractor also will notify the command immediately “upon receipt
of any and all stated or implied threats that contain timing and/or targeting
information relating to personnel, facilities or activities, and to specifically
designated areas of concern.”

While declining to comment on the specific solicitation, Ben Venzke, CEO of
IntelCenter, an Alexandria, Va.-based company that monitors Islamic extremist
propaganda for clients including U.S. government agencies, said it was “common”
for the military or other agencies to employ contractors “to support their
own work on these issues.”

“What most people don’t get,” he said, “is that (each agency
or entity) has their own very specific requirements. … They are looking
for one type of thing in particular.”

Venzke explained that while an analyst for a big-city police department might
be looking at extremist Web sites for certain kinds of information, their requirements
would be different from those of intelligence analysts looking for evidence
of trends in extremist targeting or ideology, which in turn would be different
from those concerned — like the Fifth Signal Command — with force protection.

“There is some overlap,” he said, “and you always have to work
to minimize that, but generally, there are so many different … pieces
you can look at … it’s not duplication.”

Source URL: http://www.upi.com/Emerging_Threats/2008/06/30/Analysis_US_military_to_patrol_Internet/UPI-83401214841029/

Previous articleThursday, 7/10 — 911Truth.org Hosts Truth Movement Conference Call with Rep. Dennis Kucinich
Next articleRep. Dennis Kucinich Introduces Impeachment Article

Since 2004, 911Truth.Org has educated the public about the suppressed realities of the September 11 attacks.

We worked with the 9/11 Families to pressure the Bush administration to convene an investigation into the deadliest attacks on US soil since Pearl Harbor. We attended many of the commission hearings and questioned commissioners and bird-dogged elected officials to get answers to the Unanswered Questions that remain so to this day.

We reported the contradictions, lies and omissions on the public record. 911Truth.Org staff have given hundreds of interviews on radio and mainstream network TV.

We cover a wide range of 9/11-related issues in publishing academic papers, original research, and opinion pieces.

We wish to thank our donors who have kept us on the web since 2004! We appreciate your continued support!

We continue to update the website to make the nearly 3000 articles easier to find, read and share. Thanks for visiting us!