The Permanent Militarization of America

Military-industrial complex in American life. Eisenhower worried that the defense industry’s search for profits would warp foreign policy and, conversely, that too much state control of the private sector would cause economic stagnation.

The Permanent Militarization of America

November 4, 2012 By AARON B. O’CONNELL Annapolis, Md.
IN 1961, President Dwight D. Eisenhower left office warning of the growing power of the military-industrial complex in American life. Most people know the term the president popularized, but few remember his argument.
In his farewell address, Eisenhower called for a better equilibrium between military and domestic affairs in our economy, politics and culture. He worried that the defense industry’s search for profits would warp foreign policy and, conversely, that too much state control of the private sector would cause economic stagnation. He warned that unending preparations for war were incongruous with the nation’s history. He cautioned that war and warmaking took up too large a proportion of national life, with grave ramifications for our spiritual health.
The military-industrial complex has not emerged in quite the way Eisenhower envisioned. The United States spends an enormous sum on defense — over $700 billion last year, about half of all military spending in the world — but in terms of our total economy, it has steadily declined to less than 5 percent of gross domestic product from 14 percent in 1953. Defense-related research has not produced an ossified garrison state; in fact, it has yielded a host of beneficial technologies, from the Internet to civilian nuclear power to GPS navigation. The United States has an enormous armaments industry, but it has not hampered employment and economic growth. In fact, Congress’s favorite argument against reducing defense spending is the job loss such cuts would entail.
Nor has the private sector infected foreign policy in the way that Eisenhower warned. Foreign policy has become increasingly reliant on military solutions since World War II, but we are a long way from the Marines’ repeated occupations of Haiti, Nicaragua and the Dominican Republic in the early 20th century, when commercial interests influenced military action. Of all the criticisms of the 2003 Iraq war, the idea that it was done to somehow magically decrease the cost of oil is the least credible. Though it’s true that mercenaries and contractors have exploited the wars of the past decade, hard decisions about the use of military force are made today much as they were in Eisenhower’s day: by the president, advised by the Joint Chiefs of Staff and the National Security Council, and then more or less rubber-stamped by Congress. Corporations do not get a vote, at least not yet.
But Eisenhower’s least heeded warning — concerning the spiritual effects of permanent preparations for war — is more important now than ever. Our culture has militarized considerably since Eisenhower’s era, and civilians, not the armed services, have been the principal cause. From lawmakers’ constant use of “support our troops” to justify defense spending, to TV programs and video games like “NCIS,” “Homeland” and “Call of Duty,” to NBC’s shameful and unreal reality show “Stars Earn Stripes,” Americans are subjected to a daily diet of stories that valorize the military while the storytellers pursue their own opportunistic political and commercial agendas. Of course, veterans should be thanked for serving their country, as should police officers, emergency workers and teachers. But no institution — particularly one financed by the taxpayers — should be immune from thoughtful criticism.
[snip]
<http://www.nytimes.com/2012/11/05/opinion/the-permanent-militarization-of-america.html>

Virtual machine used to steal crypto keys from other VM on same server

Virtual machine used to steal crypto keys from other VM on same server

By Dan Goodin Ars Technica Nov 6 2012
Piercing a key defense found in cloud environments such as Amazon’s EC2
service, scientists have devised a virtual machine that can extract
private cryptographic keys stored on a separate virtual machine when it
resides on the same piece of hardware.
The technique, unveiled in a research paper published by computer
scientists from the University of North Carolina, the University of
Wisconsin, and RSA Laboratories, took several hours to recover the
private key for a 4096-bit ElGamal-generated public key using the
libgcrypt v.1.5.0 cryptographic library. The attack relied on
“side-channel analysis,” in which attackers crack a private key by
studying the electromagnetic emanations, data caches, or other
manifestations of the targeted cryptographic system.
One of the chief selling points of virtual machines is their ability to
run a variety of tasks on a single computer rather than relying on a
separate machine to run each one. Adding to the allure, engineers have
long praised the ability of virtual machines to isolate separate tasks,
so one can’t eavesdrop or tamper with the other. Relying on fine-grained
access control mechanisms that allow each task to run in its own secure
environment, virtual machines have long been considered a safer
alternative for cloud services that cater to the rigorous security
requirements of multiple customers.
“In this paper, we present the development and application of a cross-VM
side-channel attack in exactly such an environment,” the scientists
wrote. “Like many attacks before, ours is an access-driven attack in
which the attacker VM alternates execution with the victim VM and
leverages processor caches to observe behavior of the victim.”
[…]
http://arstechnica.com/security/2012/11/crypto-keys-stolen-from-virtual-machine/

BITAG Announces Next Technical Topic on Port Blocking

BITAG Announces Next Technical Topic on Port Blocking

Denver, CO (November 7, 2012):  The Broadband Internet Technical Advisory Group (BITAG) is pleased to announce the launch of a new technical review on the topic of Port Blocking best practices. BITAG’s Technical Working Group elected to take up this topic through a self-initiated vote, as Port Blocking is of interest to many stakeholders in the Internet ecosystem.

ICE Releases Documents Detailing Electronic Surveillance Problems and then Demands Them Back a Year Later

ICE Releases Documents Detailing Electronic Surveillance Problems . . . and then Demands Them Back a Year Later

November 5, 2012 | By Jennifer Lynch
This is a first for us in all of EFF’s history of Freedom of Information Act (FOIA) litigation—Immigrations and Customs Enforcement (ICE) has demanded we return records it gave us more than a year ago. The release of these documents doesn’t endanger national security or create a risk to an ongoing law enforcement investigation. Instead, it seems that ICE simply wants to stymie further FOIA requests from EFF as we try to get answers about the government’s electronic surveillance procedures.
< – >
It took ICE almost a year to get back to us on the narrowed request, and when it did, its response was frustrating. Not only did the agency decide that it would still be too burdensome to conduct any kind of a search for similar records, but ICE also told us it never should have turned over the original records in the first place—and it wanted them back. The problem for ICE is, these records have already been in the public’s hands for over six months—we filed them as an exhibit (pdf) in our FOIA litigation (pdf) in March 2012, and they’re readily available on the PACER docket for the case (or from the Internet Archive).
This is yet another example of the federal government failing to comply with the letter and spirit of the Freedom of Information Act—reverting to secrecy when it should be promoting transparency. It’s hard to imagine what harm could come from the release of these documents. ICE was careful to block out any information in the records that would identify the target of the investigation, and the information that isn’t blocked out seems to reinforce the government’s position on CALEA.
And it’s another disappointment from an administration that lauded its commitment to transparency on the first day the President took office four years ago. We can only hope that if the President wins this tight election, he’ll use the next four years to fulfill this commitment.
https://www.eff.org/deeplinks/2012/11/ice-releases-documents-detailing-electronic-surveillance-problems-and-then-demands