It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Obama tells intelligence chiefs to draw up cyber target list – full document text

page: 1
5

log in

join
share:

posted on Jun, 8 2013 @ 12:37 AM
link   
So it appears that Obama is off to China right now to call the kettle black. If they put half this exposed effort into thwarting Chinese cyber crime, we would not have had all our technology stolen. It appears that Obama has been up to a bit more than the public has realized. Any more I feel like the entire world is up against the evil Lex Luther. And us Americans created this evil monster.


Eighteen-page presidential memo reveals how Barack Obama has ordered intelligence officials to draw up a list of potential overseas targets for US cyber attacks



PRESIDENTIAL POLICY

MEMORANDUM FOR THE VICE PRESIDENT

THE SECRETARY OF STATE

THE SECRETARY OF THE TREASURY

THE SECRETARY OF DEFENSE

THE ATTORNEY GENERAL

THE SECRETARY OF COMMERCE

THE SECRETARY OF ENERGY

THE SECRETARY OF HOMELAND SECURITY

ASSISTANT TO THE PRESIDENT AND CHIEF OF STAFF
DIRECTOR OF THE OFFICE OF MANAGEMENT AND BUDGET
ASSISTANT TO THE PRESIDENT FOR NATIONAL SECURITY

AFFAIRS
DIRECTOR OF NATIONAL INTELLIGENCE
ASSISTANT TO THE PRESIDENT FOR HOMELAND SECURITY
AND COUNTERTERRORISM
DIRECTOR OF THE OFFICE OF SCIENCE AND TECHNOLOGY
POLICY

DIRECTOR OF THE FEDERAL BUREAU OF INVESTIGATION
DIRECTOR OF THE CENTRAL INTELLIGENCE AGENCY
CHAIRMAN OF THE JOINT CHIEFS OF STAFF

DIRECTOR OF THE NATIONAL SECURITY AGENCY




II. Purpose and Scope (U)

The United States has an abiding interest in developing and
maintaining use of cyberspace as an integral part of U.S.
national capabilities to collect intelligence and to deter,
deny, or defeat any adversary that seeks to harm U.S. national
interests in peace, crisis, or war. Given the evolution in U.S.
experience, policy, capabilities, and understanding of the cyber
threat, and in information and communications technology, this
directive establishes updated principles and processes as part
of an overarching national cyber policy framework.
The United States Government shall conduct all cyber
operations consistent with the U.S. Constitution and other
applicable laws and policies of the United States, including
Presidential orders and directives.
The United States Government shall conduct DCEO and OCEO under
this directive consistent with its obligations under
international law, including with regard to matters of
sovereignty and neutrality, and, as applicable, the law of
armed conflict.

This directive pertains to cyber operations, including those
that support or enable kinetic, information, or other types of
operations. Most of this directive is directed exclusively to
DCEO and OCEO.
The United States Government has mature capabilities and
effective processes for cyber collection.
Therefore, this directive affirms and does not intend to alter
existing procedures, guidelines, or authorities for cyber
collection.
This directive provides a procedure for cyber collection
operations that are reasonably likely to result in
"significant consequences."2



Visit the link to read more. Have you had enough yet folks?

Eighteen-page presidential memo reveals how Barack Obama has ordered intelligence officials to draw up a list of potential overseas targets for US cyber attacks

edit on 8-6-2013 by elouina because: (no reason given)



posted on Jun, 8 2013 @ 12:56 AM
link   
well if past actions should tell you anything , then this means nothing, from your post

The United States Government shall conduct all cyber
operations consistent with the U.S. Constitution and other
applicable laws and policies of the United States, including
Presidential orders and directives.
just as the NSA and IRS have not done nothing wrong, and have done what they did by the law as it written. Obama law, and Bush Laws that is...more kool aid anyone? Pardon me that's King Obama.



posted on Jun, 8 2013 @ 01:09 AM
link   

Originally posted by bekod
well if past actions should tell you anything , then this means nothing, from your post

The United States Government shall conduct all cyber
operations consistent with the U.S. Constitution and other
applicable laws and policies of the United States, including
Presidential orders and directives.
just as the NSA and IRS have not done nothing wrong, and have done what they did by the law as it written. Obama law, and Bush Laws that is...more kool aid anyone? Pardon me that's King Obama.


But the constitution is to protect the citizens of the United States. This pertains to OVERSEAS!
edit on 8-6-2013 by elouina because: (no reason given)



posted on Jun, 8 2013 @ 01:43 AM
link   
reply to post by elouina
 
I think you need to read the whole link it does not specify over seas use, but it odes have long arms... from your link

inhibiting detection or attribution, even if they create cyber
effects.

Defensive Cyber Effects Operations (DCEO): Operations and
related programs or activities other than network defense or
cyber collection - conducted by or on behalf of the

United States Government, in or through cyberspace, that are
intended to enable or produce cyber effects outside

United States Government networks for the purpose of defending
or protecting against imminent threats or ongoing attacks or
malicious cyber activity against U.S. national interests from
inside or outside cyberspace.

Nonintrusive Defensive Countermeasures (NDCM): The subset of
DCEO that does not require accessing computers, information or
communications systems, or networks without authorization from
the owners or operators of the targeted computers, information
or communications systems, or networks or exceeding authorized
access and only creates the minimum cyber effects needed to

mitigate the threat activity.
Offensive Cyber Effects Operations (OCEO): Operations and
related programs or activities other than network defense,

cyber collection, or DCEO -- conducted by or on behalf of the
United States Government, in or through cyberspace, that are
intended to enable or produce cyber effects outside

United States Government networks.

Cyber Operations: Cyber collection, DCEO (including NDCM),
and OCEO collectively. (U)

Significant Consequences: Loss of life, significant
responsive actions against the United States, significant
damage to property, serious adverse U.S. foreign policy
consequences, or serious economic impact on the United States.
(U)

U.S. National Interests: Matters of vital interest to the
United States to include national security, public safety,
national economic security, the safe and reliable functioning
of "critical infrastructure," and the availability of "key
resources."1 (U)

Emergency Cyber Action: A cyber operation undertaken at the
direction of the head of a department or agency with
appropriate authorities who has determined that such action is
necessary, pursuant to the requirements of this directive, to
mitigate an imminent threat or ongoing attack against U.S.
national interests from inside or outside cyberspace and under
circumstances that at the time do not permit obtaining prior

1 As these terms are used in on "Critical Infrastructure,
Identification, Prioritization, and Protection" from December 17, 2003. (U)
as I read it, by just saying "POUTS is a sell out" could have repercussions.



posted on Jun, 8 2013 @ 01:57 AM
link   
reply to post by elouina
 

Here is Bush EO 12333 into law in 2008 www.techlawjournal.com... giving NSA CIA to read listen in and open any post that any one should make if on a "hit list" deemed by NSA. so how do you get on the list NSA has to listen, read, and see what your doing 24/7



posted on Jun, 8 2013 @ 04:18 AM
link   

Originally posted by bekod
reply to post by elouina
 

Here is Bush EO 12333 into law in 2008 www.techlawjournal.com... giving NSA CIA to read listen in and open any post that any one should make if on a "hit list" deemed by NSA. so how do you get on the list NSA has to listen, read, and see what your doing 24/7


I wonder WHY Obama didn't recind that



He is soooo honest and all




top topics
 
5

log in

join