Wednesday, October 20, 2010

Uh, huh.

"The Obama administration has adopted new procedures for using the Defense Department’s vast array of cyberwarfare capabilities in case of an attack on vital computer networks inside the United States, delicately navigating historic rules that restrict military action on American soil."


Mark Matis said...

Hey, it's in the New York Times (their motto: "All the news that fits our views!") so it must be correct!

Defender said...

Very interesting, considering that "NCIS" this week dealt with some "domestic terrorists" who want all the troops home from foreign wars to ASSIST IN everyday LAW ENFORCEMENT.
Incidentally, their leader is described as "really into" hunting. The murder weapon of the week is a HUNTING RIFLE with -- wait for it -- doe urine scent in the action. No faux bubba here.

Anonymous said...

Gee, how very convenient!

Anonymous said...

Wait, wait, wait, let me get this straight. We try military combatants in civilian courts now, but we have the military spy on civilians domestically?

Defender said...

Obama must have had this Al-Awlaki guy to a state dinner at the White House so the FBI could REALLY watch him carefully.

Anonymous said...

Constitution, Smonstitution!

Just jack up the country's radiator cap and drive a new hammer and sickle car underneath it.

Hey! When can I pickup those stylish red berets and bananas for my kids?

Anonymous said...

What exactly constitutes "an attack on vital computer networks inside the United States"? An attack could mean "a direct assault" as might be found in a hacker or terrorist bomber; but it could also mean anything that could potentially threaten the integrity or existence of a network such as a flood, fire, solar flare, or even a worker strike.

Taken to an extreme, it is possible a really large anti-government protest taking place at the Washington Monument could be seen as a potential threat to the "vital computer networks" located in the White House only 1.4 miles away.

Since nearly everything from utilities and phone to credit card and banking is connected via network and many backup servers exist in discreet locations around the country, there doesn't appear to be any defined boundaries of containment and operation.

Aside from the issues with Posse Comitatus, this deal is much too broad and is ripe for abuse.