Archive for the 'Domestic Policy' Tag

Galrahn’s post below is a good overview of the highlights from Day 1. There are so many good things to discuss that picking what to post on is difficult.

That overview gives me a chance to focus on something specific; something that bothered me all day.

Have you ever sat there listening to someone speak, and you hear they say something that you just have trouble believing was spoken? You kind of tilt your head a bit, look at your notes, look back at the speaker, and then lean to the guy next to you and ask, “Did he just say ….?”

Well, that happened early today at West 2010, right out of the box, I heard something that worried me. It doesn’t worry me in the way the black-helicopter AFDB crowd may be worried – but it has worried me nonetheless.

At an early age I came upon a collection of Ben Franklin’s little known works with a very funny title. Not just for that reason though, but for many reasons, Ben Franklin is bar none my favorite Founding Father.

There is a quote of his that is a touchstone for me, one that often comes to mind when this nation’s leaders begin to look for shortcuts when faced with difficult security challenges.

As with many of his quotes, this one is a warning; a timeless warning founded on the lessons of thousands of years of human history.

They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety.

It is closely tied to another of his quotes,

Outside Independence Hall when the Constitutional Convention of 1787 ended, Mrs. Powel of Philadelphia asked Benjamin Franklin, “Well, Doctor, what have we got, a republic or a monarchy?” With no hesitation whatsoever, Franklin responded, “A republic, if you can keep it.”

Franklin knew that like all human institutions, governments are subject to weaknesses and mistakes. These weaknesses and mistakes, often made by good people trying to do the right thing - if not corrected leave doors open for bad men to do evil.

Day 1 was very Cyber Domain focused, and in the kick-off address, Vice Chairman of the Joint Chiefs of Staff, General Cartwright, USMC, said something roughly along the lines of this,

(some Americans might be willing to say) I will voluntarily give up my privacy to ensure that I will be protected.

He saw this as a good thing. Something to be hoped for. Something to be encouraged. And they should give that privacy up to the uniformed services.

Gulp. Yes, a 4-star American General said that in the context of it being good – good for the security of the state.

Here is the context. One of the big transformationalist movements and producers of much PPT is the drive to better protect the critical information infrastructure, AKA the Cyber Domain. All the services are setting up their own cyber security areas (see 10th Fleet), and the experience of Estonia, Georgia, and those “mysterious” probes [thumbdrive] of our systems is driving a lot of smart people – and quite a few civilian companies – to beat the drums of cyber security. That is a good and smart thing.

The problem is complicated by the following statement by the Commander in Chief.

“From now on our digital infrastructure, the networks and computers we depend on everyday, will be treated as they should be – as a strategic national asset,”
- President Barak Obama, 01 JUL 09

This is where the military mind kicks in. With clear direction and guidance from the CINC – the 4-Stars will wait for a nod from the JAGs and march forward.

Where does that get us today? Well, it seems that the some senior leadership in the military have decided that the military needs to take the lead in cyber security. Why? Well, the CINC has designated it as a strategic asset – to be treated like … well …. a strategic asset.

And so the machinery starts.

What makes the military even twitchier is that they have known since the beginning that the .mil 1′s and 0′s would ride their IT pipes on top of existing civilian infrastructure – from fiber to satellites. We have adopted civilian systems, COTS. Everything relies on that civilian infrastructure as a body relies on water. Backup? Ask your IT’men where their HF TTY system is.

Yes; Admiral Adama is worried – but Skynet is pleased.

The military is twitchy – but what about the civilian industry – are they worried? Of course they are, but they have their own security protocols, back-up systems, and ways of addressing computer network attack. They are also relatively nimble, aggressive, and can quickly hire the best personnel with a focus on shareholder value that demands decisive and secure action. On a whole, a distributed, redundant and diverse system. Unorganized and with some critical weaknesses, of course – but some would argue that the diversity and lack of organization is also a strength … but that is a different post for a different day.

Is it industry’s desire for the Pentagon to come in and rescue the day? Treat the Cyber Domain like navigable waterways and the interstate highway system – the sea lanes and the airways? Are the American people ready for the Department of Defense to assume security responsibilities from your house to wherever your information flows or is stored? Really?

Now it is time to ask; – can we do it? Does our nation want us to do it? Should we do it?

Can we do it? Sure – the military can do anything it wants, really. It has the power of the state. The military can do, by order of the CINC, anything unless the Supreme Court says no – by precedence or judgment – or the Legislative Branch acts. Our Founding Fathers knew that – that is why we have the system we have; thank goodness.

Does our nation want us to do it? I would offer you this:

Walk into any bank, insurance company, pharmaceutical manufacturer, or software company and tell them, “Hi. I’m from the Department of Defense. We need full administrator rights to your network, software code, PCs, mainframes, communication infrastructure, security protocols, and file storage facilities. Trust us. We’re here to help. Don’t say no or we will shut you down and do it anyway.

See where that gets you.

Let’s get beyond the Orwellian idea of the U.S. military in our Representative Republic having control of the security of the personnel, professional, and financial data for the civilian population it serves. That is enough to stop anyone cold. Let’s look at the deeper problem.

Ah, what is that line again?

“I …. do solemnly swear (or affirm) that I will support and defend the Constitution of the United States,

Yep, I am going to go there.

Posse Comitatus (Latin): Power of the county.

18 U.S.C. § 1385. Use of Army and Air Force as posse comitatus:
Whoever, except in cases and under circumstances expressly authorized by the Constitution or Act of Congress, willfully uses any part of the Army or the Air Force as a posse comitatus or otherwise to execute the laws shall be fined under this title or imprisoned not more than two years, or both.

10 U.S.C. § 375. Restriction on direct participation by military personnel:
The Secretary of Defense shall prescribe such regulations as may be necessary to ensure that any activity (including the provision of any equipment or facility or the assignment or detail of any personnel) under this chapter does not include or permit direct participation by a member of the Army, Navy, Air Force, or Marine Corps in a search, seizure, arrest, or other similar activity unless participation in such activity by such member is otherwise authorized by law.

One of the challenges of the Cyber Domain is that an attack can come from anywhere – and if done right – nowhere and everywhere.

If the Bank of American in Charlotte, the New York Stock Exchange, and the Chicago Mercantile Exchange all come under cyber attack and the US military has control for security of the nation’s cyber infrastructure – and that attack is coming from Gainesville, FL by American citizens – then in essence the U.S. military is “…willfully (being) use(d) …. to execute the laws...”

Has this angle been looked at? Of course it has. Am I a Constitutional Lawyer? No.

Do we not have federal, civilian law enforcement entities (FBI, DHS, etc call your office) for the purpose of this? Yes we do. You do not have to be a Constitutional lawyer to say that they are the ones who need to take this, with DOD in a supporting role within well defined and highly restricted confines. Most external work in this area should be done by NSA and CIA with DOD again in the supporting role.

Good news though – even through Gen. Cartwright’s brief was very “DOD in Charge” directed, ADM Stavridis’ presentation later on in a related topic put DOD in its correct area – at the bottom of the chart and in a supporting role. That and other panel discussions tell me that this is an ongoing conversation. Good. We have time to get this right.

I ask you though – a lot of very powerful people wearing a uniform who think that it is: is it the legitimate function of the uniformed services to ask of its citizens to, “Give up your privacy to ensure that I can protected you.”?

I don’t know about you – but the fact that the question needs to be asked is worrisome.



New Presidential Arctic Region Policy

Cross Posted from iCommandant

Admiral Allen surveys the summer ice

Observing the summer ice floes from HEALY, Aug 2008.

On January 9, 2009, the President signed the Nation’s new Arctic Region Policy, National Security Presidential Directive 66/Homeland Security Presidential Directive 25. This document, which replaces the Arctic section of PDD-26, establishes comprehensive national policies that recognize the changing environmental, economic, and geo-political conditions in the Arctic and re-affirms the United States’ broad and fundamental interests in the region. The Directive takes into account altered national policies on national defense and homeland security, the effects of global climate change and increased human activity in the region, as well as a growing awareness that the Arctic is both fragile and rich in natural resources.

NSPD 66/HSPD 25 specifically establishes that it is the policy of the U.S. to:

- Meet national security and homeland security needs relevant to the Arctic region
- Protect the Arctic environment and conserve its biological resources
- Ensure that natural resource management and economic development in the region are environmentally sustainable
- Strengthen institutions for cooperation among the eight Arctic nations
- Involve the Arctic?s indigenous communities in decisions that affect them
- Enhance scientific monitoring and research into local, regional, and global environment issues.

Secretary Chertoff met with local leaders in Barrow Alaska while visiting the Arctic Region, August 2008

The development of these policies was a collaborative effort involving myriad stakeholders and, in many ways, marks the first step in the United States taking an active role in the region. Much work remains to be done and we look forward to working closely with our partners at the federal, state, local, and tribal levels, the Arctic nations, appropriate international forums, and the private sector to develop the requirements, action plans, and best mix of resources needed to implement these policies. The following highlights just a few of the specific Coast Guard implications in the new policy. These are by no means all inclusive. As you read these understand that we can accomplish nothing on our own. Every aspect of this directive overlaps the responsibilities and interest of several parties and agencies. Continued collaboration, cooperation and communication will be the keys to success. Also, as we have been, we will Involve the Arctic’s indigenous communities in decisions that affect them.

——————————————–
National and Homeland Security Interests

The Arctic region is primarily a maritime domain and the Coast Guard will continue to apply the following policies and authorities, including law enforcement:

- Freedom of Navigation
- U.S. Policy on Protecting the Ocean and the Environment
- Maritime Security Policy
- National Strategy for Maritime Security

The U.S. will exercise sovereignty within our maritime boundaries and over the continental shelf while preserving Freedom of the Seas. Implementation of this policy requires the development of greater capabilities and capacity to operate in the region to protect our borders, increase Arctic domain awareness and project our presence in the region. This will require close cooperation with our partners the Department of Defense and Department of Homeland Security.

International Governance

The Coast Guard’s main role in this capacity is to represent the U.S. in the International Maritime Organization and other appropriate forums to develop international agreements to ensure effective governance mechanisms, including Arctic-specific regulations to ensure safe, secure, environmentally friendly maritime activities. These efforts will be closely coordinated with the Department of Transportation and Department of State and will also serve to advance multi-national cooperation in the region. We will look at how to expand our highly effective partnerships established through the North Pacific and North Atlantic Coast Guard Forums to meet the objectives of this directive.

Continental Shelf and Boundary Issues / Promoting International Scientific Cooperation

USCGC Healy

USCGC Healy

The Coast Guard will continue to support the necessary research efforts by the National Science Foundation and others through the use of Coast Guard resources for scientific support to establish the outer limit of the continental shelf to the fullest extent permitted under international law.

Maritime Transportation in the Artic region

U.S. priorities for maritime transportation in the Arctic are to facilitate safe, secure and reliable navigation; protect maritime commerce; protect the environment.

This requires the Coast Guard to work with its interagency partners, the Arctic nations, and regulatory

USCGC SPAR operating off the North Slope

USCGC SPAR operating off the North Slope

 bodies to establish infrastructure to support shipping activity; search and rescue response; aids to navigation; vessel traffic management; iceberg warnings and sea ice information; shipping standards; and protection of the marine environment.

Environmental Protection and Conservation of Natural Resources

The Coast Guard will work collaboratively to develop environmental response strategies, plans and capabilities working with the Departments of Energy and the Interior. We will also enforce any international or domestic fisheries laws developed for this unique region in coordination with NOAA and NMFS from the Department of Commerce.
————————————–
I commend all of the participants who helped to develop this comprehensive Arctic Region Policy over the last two years. For the men and women of the Coast Guard, and the partners we work next to every day, this is just the beginning of the work to be done to ensure that we expand our superior mission execution to the increasingly significant Arctic region, consistent with the President’s intent.



2014 Information Domination Essay Contest