Thursday, June 12, 2008

'Looking for new realms to bomb, it launched itself into cyberspace'

Tomgram: William Astore, Militarizing Your Cyberspace

Be depressed. Be very depressed. You thought that cyberspace -- a term conjured up long ago by that neuromancer, sci-fi author William Gibson -- was the last frontier of freedom. Well, think again. If the U.S. Air Force has anything to say about it, cyber-freedom will, in the not so distant future, be just another word for domination.

Air Force officials, despite a year-long air surge in Iraq, undoubtedly worry that Secretary of Defense Robert Gates's "next wars" (two, three, many Afghanistans) won't have much room for air glory. Recently, looking for new realms to bomb, it launched itself into cyberspace. The Air Force has now set up its own Cyber Command, redefined the Internet as just more "air space" fit for "cyber-craft," and launched its own Bush-style preemptive strike on the other military services for budgetary control of the same.

If that's not enough for you, it's now proposing a massive $30 billion cyberspace boondoggle, as retired Air Force Lt. Col. William Astore writes below, that will, theoretically, provide the Air Force with the ability to fry any computer on Earth. And don't think the other services are likely to take this lying down. Expect cyberwar in the Pentagon before this is all over. In the meantime, think of cyberspace, in military terms, as a new realm for nuclear-style strategy, with its own developing version of "first-strike capability," its own future versions of "mutually assured destruction," its own "windows of vulnerability" to be closed (while exploiting those of the enemy), and undoubtedly its own "cyber-gaps."

In fact, it looks like the national-security version of cyberspace may soon be a very, very busy place. Noah Shachtman, who covers the subject like a rug at his Wired Magazine Danger Room blog, recently noted that Comcast, the country's second-largest Internet provider, "has just advertised for an engineer to handle 'reconnaissance' and 'analysis' of 'subscriber intelligence' for the company's 'National Security Operations'" -- that is, for the U.S. government. ("Day-to-day tasks, the company says in an online job listing, will include 'deploy[ing], installing] and remov[ing] strategic and tactical data intercept equipment on a nationwide basis to meet Comcast and Government lawful intercept needs.'") Ain't that sweet.

And it shouldn't be too tough a job. As Shachtman also points out, "Since May 2007, all Internet providers have been required to install gear for easy wiretapping under the Communications Assistance for Law Enforcement Act."

Sigh. Those who don't learn from history are bound to… get ever more bloated budgets. Tom

Attention Geeks and Hackers

Uncle Sam's Cyber Force Wants You!
By William J. Astore

Recently, while I was on a visit to Salon.com, my computer screen momentarily went black. A glitch? A power surge? No, it was a pop-up ad for the U.S. Air Force, warning me that an enemy cyber-attack could come at any moment -- with dire consequences for my ability to connect to the Internet. It was an Outer Limits moment. Remember that eerie sci-fi show from the early 1960s? The one that began in a blur with the message, "There is nothing wrong with your television set. Do not attempt to adjust the picture. We are controlling transmission…." It felt a little like that.

And speaking of Air Force ads, there's one currently running on TV and on the Internet that starts with a bird's eye view of the Pentagon as a narrator intones, "This building will be attacked three million times today. Who's going to protect it?" Two Army colleagues of mine nearly died on September 11, 2001, when the third hijacked plane crashed into the Pentagon, so I can't say I appreciated the none-too-subtle reminder of that day's carnage. Leaving that aside, it turns out that the ad is referring to cyber-attacks and that the cyber protector it has in mind is a new breed of "air" warrior, part of an entirely new Cyber Command run by the Air Force. Using the latest technology, our cyber elite will "shoot down" enemy hackers and saboteurs, both foreign and domestic, thereby dominating the realm of cyberspace, just as the Air Force is currently seeking to dominate the planet's air space -- and then space itself "to the shining stars and beyond."

Part of the Air Force's new "above all" vision of full-spectrum dominance, America's emerging cyber force has control fantasies that would impress George Orwell. Working with the Defense Advanced Research Projects Agency (DARPA), the Department of Homeland Security, and other governmental agencies, the Air Force's stated goal is to gain access to, and control over, any and all networked computers, anywhere on Earth, at a proposed cost to you, the American taxpayer, of $30 billion over the first five years.

Here, the Air Force is advancing the now familiar Bush-era idea that the only effective defense is a dominating offense. According to Lani Kass, previously the head of the Air Force's Cyberspace Task Force and now a special assistant to the Air Force Chief of Staff, "If you're defending in cyber [space], you're already too late. Cyber delivers on the original promise of air power. If you don't dominate in cyber, you cannot dominate in other domains."

Such logic is commonplace in today's Air Force (as it has been for Bush administration foreign policy). A threat is identified, our vulnerability to it is trumpeted, and then our response is to spend tens of billions of dollars launching a quest for total domination. Thus, on May 12th of this year, the Air Force Research Laboratory posted an official "request for proposal" seeking contractor bids to begin the push to achieve "dominant cyber offensive engagement." The desired capabilities constitute a disturbing militarization of cyberspace:

"Of interest are any and all techniques to enable user and/or root access to both fixed (PC) or mobile computing platforms. Robust methodologies to enable access to any and all operating systems, patch levels, applications and hardware…. [T]echnology… to maintain an active presence within the adversaries' information infrastructure completely undetected… [A]ny and all techniques to enable stealth and persistence capabilities… [C]apability to stealthily exfiltrate information from any remotely-located open or closed computer information systems…"

Stealthily infiltrating, stealing, and exfiltrating: Sounds like cyber-cat burglars, or perhaps invisible cyber-SEALS, as in that U.S. Navy "empty beach at night" commercial. This is consistent with an Air Force-sponsored concept paper on "network-centric warfare," which posits the deployment of so-called "cyber-craft" in cyberspace to "disable terminals, nodes or the entire network as well as send commands to 'fry' their hard drives." Somebody clever with acronyms came up with D5, an all-encompassing term that embraces the ability to deceive, deny, disrupt, degrade, and destroy an enemy's computer information systems.

No one, it seems, is the least bit worried that a single-minded pursuit of cyber-"destruction" -- analogous to that "crush… kill… destroy" android on the 1960s TV series "Lost in Space" -- could create a new arena for that old Cold War nuclear acronym MAD (mutually assured destruction), as America's enemies and rivals seek to D5 our terminals, nodes, and networks.

Here's another less-than-comforting thought: America's new Cyber Force will most likely be widely distributed in basing terms. In fact, the Air Force prefers a "headquarters" spread across several bases here in the U.S., thereby cleverly tapping the political support of more than a few members of Congress.

Finally, if, after all this talk of the need for "information dominance" and the five D's, you still remain skeptical, the Air Force has prepared an online "What Do You Think?" survey and quiz (paid for, again, by you, the taxpayer, of course) to silence naysayers and cyberspace appeasers. It will disabuse you of the notion that the Internet is a somewhat benign realm where cooperation of all sorts, including the international sort, is possible. You'll learn, instead, that we face nothing but ceaseless hostility from cyber-thugs seeking to terrorize all of us everywhere all the time.

Of Ugly Babies, Icebergs, and Air Force Computer Systems

Computers and their various networks are unquestionably vital to our national defense -- indeed, to our very way of life -- and we do need to be able to protect them from cyber attacks. In addition, striking at an enemy's ability to command and control its forces has always been part of warfare. But spending $6 billion a year for five years on a mini-Manhattan Project to atomize our opponents' computer networks is an escalatory boondoggle of the worst sort.

Leaving aside the striking potential for the abuse of privacy, or the potentially destabilizing responses of rivals to such aggressive online plans, the Air Force's militarization of cyberspace is likely to yield uncertain technical benefits at inflated prices, if my experience working on two big Air Force computer projects counts for anything. Admittedly, that experience is a bit dated, but keep in mind that the wheels of procurement reform at the Department of Defense (DoD) do turn slowly, when they turn at all.

Two decades ago, while I was at the Space Surveillance Center in Cheyenne Mountain, the Air Force awarded a contract to update our computer system. The new system, known as SPADOC 4, was, as one Air Force tester put it, the "ugly baby." Years later, and no prettier, the baby finally came on-line, part of a Cheyenne Mountain upgrade that was hundreds of millions of dollars over budget. One Air Force captain described it in the following way:

"The SPADOC system was… designed very poorly in terms of its human machine interface… [leading to] a lot of work arounds that make learning the system difficult… [Fortunately,] people are adaptable and they can learn to operate a poorly designed machine, like SPADOC, [but the result is] increased training time, increased stress for the operators, increased human errors under stress and unused machine capabilities."

My second experience came a decade ago, when I worked on the Air Force Mission Support System or AFMSS. The idea was to enable pilots to plan their missions using the latest tools of technology, rather than paper charts, rulers, and calculators. A sound idea, but again botched in execution.

The Air Force tried to design a mission planner for every platform and mission, from tankers to bombers. To meet such disparate needs took time, money, and massive computing power, so the Air Force went with Unix-based SPARC platforms, which occupied a small room. The software itself was difficult to learn, even counter-intuitive. While the Air Force struggled, year after year, to get AFMSS to work, competitors came along with PC-based flight planners, which provided 80% of AFMSS's functionality at a fraction of the cost. Naturally, pilots began clamoring for the portable, easy-to-learn PC system.

Fundamentally, the whole DoD procurement cycle had gone wrong -- and there lies a lesson for the present cyber-moment. The Pentagon is fairly good at producing decent ships, tanks, and planes (never mind the typical cost overruns, the gold-plating, and so on). After all, an advanced ship or tank, even deployed a few years late, is normally still an effective weapon. But a computer system a few years late? That's a paperweight or a doorstop. That's your basic disaster. Hence the push for the DoD to rely, whenever possible, on COTS, or commercial-off-the-shelf, software and hardware.

Don't get me wrong: I'm not saying it's only the Pentagon that has trouble designing, acquiring, and fielding new computer systems. Think of it as a problem of large, by-the-book bureaucracies. Just look at the FBI's computer debacle attempting (for years) to install new systems that failed disastrously, or for that matter the ever more imperial Microsoft's struggles with Vista.

Judging by my past experience with large-scale Air Force computer projects, that $30 billion will turn out to be just the tip of the cyber-war procurement iceberg and, while you're at it, call those "five years" of development 10. Shackled to a multi-year procurement cycle of great regulatory rigidity and complexity, the Air Force is likely to struggle but fail to keep up with the far more flexible and creative cyber world, which almost daily sees the fielding of new machines and applications.

Loving Big "Cyber" Brother

Our military is the ultimate centralized, bureaucratic, hierarchical organization. Its tolerance for errors and risky or "deviant" behavior is low. Its culture is designed to foster obedience, loyalty, regularity, and predictability, all usually necessary in handling frantic life-or-death combat situations. It is difficult to imagine a culture more antithetical to the world of computer developers, programmers, and hackers.

So expect a culture clash in militarized cyberspace -- and more taxpayers' money wasted -- as the Internet and the civilian computing world continue to outpace anything the DoD can muster. If, however, the Air Force should somehow manage to defy the odds and succeed, the future might be even scarier.

After all, do we really want the military to dominate cyberspace? Let's say we answer "yes" because we love our big "Above All" cyber brother. Now, imagine you're Chinese or Indian or Russian. Would you really cede total cyber dominance to the United States without a fight? Not likely. You would simply launch -- or intensify -- your own cyber war efforts.

Interestingly, a few people have surmised that the Air Force's cyber war plans are so outlandish they must be bluster -- a sort of warning shot to competitors not to dare risk a cyber attack on the U.S., because they'd then face cyber obliteration.

Yet it's more likely that the Air Force is quite sincere in promoting its $30 billion "mini-Manhattan" cyber-war project. It has its own private reasons for attempting to expand into a new realm (and so create new budget authority as well). After all, as a service, it's been somewhat marginalized in the War on Terror. Today's Air Force is in a flat spin, its new planes so expensive that relatively few can be purchased, its pilots increasingly diverted to "fly" Predators and Reapers -- unmanned aerial vehicles -- its top command eager to ward off the threat of future irrelevancy.

But even in cyberspace, irrelevancy may prove the name of the game. Judging by the results of previous U.S. military-run computer projects, future Air Force "cyber-craft" may prove more than a day late and billions of dollars short.

William J. Astore, a retired lieutenant colonel (USAF), has taught at the Air Force Academy and the Naval Postgraduate School. He currently teaches at the Pennsylvania College of Technology. A regular contributor to Tomdispatch, he is the author of Hindenburg: Icon of German Militarism (Potomac, 2005). His email is wastore@pct.edu.

Copyright 2008 William J. Astore

No comments:


Google
 

image from http://www.spitting-image.net

Favorite Links

~325~ ~9-11...Who Really Did It~ ~10:10~ ~10 Zen Monkeys~ ~911 Truth~ ~13 Indigenous Grandmothers~ ~15O~ ~15th October~ ~Activist Post~ ~ACT UP~ ~Adbusters~ ~Aerogaz (greek)~ ~Afinity Project~ ~Aging Hipsters~ ~Alecto's Ophelia~ ~Al-Jazeera~ ~Alex Constantine's Blacklist~ ~Alliance for Human Research Protection~ ~All Things Cynthia McKinney~ ~All Things Pakistan~ ~Alternative Insight~ ~Alternative Press Review~ ~Alternet~ ~American Friends Service Committee~ ~American Street~ ~Anarkismo~ ~Andy Worthington~ ~Anglican Pacifist Fellowship~ ~Anomaly News Syndicate~ ~Another Day In The Empire~ ~AntiWar~ ~Antiwar League~ ~Anxiety Culture~ ~Appeal For Redress From The War In Iraq~ ~A Poetic Justice~ ~Artists Without Frontiers~ ~Art of Europe~ ~Arts And Letters Daily~ ~Attack the System~ ~Athens IMC~ ~Ballardian~ ~Bilderberg.org~ ~Black Box Voting~ ~BlackListed News~ ~Black Vault~ ~Blog Bioethics net~ ~Blog of the Unknown Writer~ ~Blondsense~ ~Boiling Frog~ ~Boiling Frogs Post~ ~BoingBoing~ ~Book Ninja~ ~Bookslut~ ~Bradley Manning Support Network~ ~Brand New Law~ ~Brainsturbator~ ~Bring Them Home Now~ ~Bruce Eisner's Vision Thing~ ~Buckminster Fuller Institute~ ~Bulletin of the Atomic Scientists~ ~Bureau of Public Secrets~ ~Business & Human Rights Resource Centre~ ~Buzzflash~ ~Campaign For Real Farming~ ~Catapult the Propaganda~ ~Campus Antiwar Network~ ~Cargo Culte~ ~Castan Centre for Human Rights Law~ ~Catch of the Day~ ~Censorship Paradise~ ~Center for Media and Democracy~ ~Centre for Conflict and Peace Studies, Afghanistan~ ~Centre for Research and Action for Peace~ ~Center on Law and Security~ ~Chapati Mystery~ ~Choike~ ~Chomsky.info~ ~Chronicle of Higher Education~ ~Church of the FSM~ ~CIA & Drugs~ ~Citizens for Legitimate Government~ ~Citizens for Tax Justice~ ~Clandestina~ ~CODEPINK~ ~Coilhouse mag~ ~Collateral Murder~ ~Common Dreams~ ~Complete 9/11 Timeline~ ~Concerned Africa Scholars~ ~Connexions~ ~Conspiracy Archive~ ~Contra Info~ ~Corrente~ ~COTO Report~ ~Coup d'Etat in America~ ~Countercurrents~ ~Crapaganda~ ~Create Real Democracy~ ~Creative-i~ ~Crimes of the State~ ~CrimethInc~ ~Crisis Group~ ~Critical Legal Thinking~ ~Cronache da Mileto (Italian)~ ~Crooks and Liars~ ~Crowd Modelling~ ~Cryptoforestry~ ~Cryptome~ ~Cyclos~ ~Culture Change~ ~Cutting Through The Matrix~ ~Cyrano's Journal~ ~Daily What~ ~Damn Interesting~ ~Dangerous Minds~ ~Deliberative Democracy Consortium~ ~Democracy Center~ ~Democracy Journal~ ~Democracy Now~ ~Democratic Underground~ ~Detournement~ ~Digital Rights [greek lang.]~ ~Diplomacy Lessons~ ~Direct Power!~ ~Discoveries-Researchings-Visions-Understandings-Enlightenments~ ~Disinformation~ ~DistributorCap NY~ ~Dr Hugo Heyrman-Motions of the Mind~ ~Dylanology~ ~EAGAINST~ ~Earthnocentric~ ~Eco Tort~ ~Ectoplasmosis!~ ~Educate Yourself~ ~E-Flux~ ~Electronic Frontier Foundation~ ~Electronic Intifada~ ~Eliminate War Forever~ ~End Evil~ ~Energy Bulletin~ ~Eradicating Ecocide~ ~EROCx1 Blog~
~Europeanrevolution~ ~European Revolution~ ~Eurozine~ ~Exposing the Truth~ ~Extinction Protocol: 2012 and beyond~ ~Families of the Fallen for Change~ ~Fellowship of Reconciliation~ ~Financial Armageddon~ ~FKN Newz~ ~Food For Your Eyes~ ~Forward the Revolution~ ~Franchot's Band~ ~Free Bloggers in Greece~ ~Free Expression Network~ ~Free Press International~ ~Freethinking for Dummies~ ~Free Thought Manifesto~ ~From the Wilderness~ ~F-t-W's Peak Oil Blog~ ~G1000~ ~Ghostdancing in Venice~ ~GIMP~ ~Gilles Duley~ ~Global Guerillas~ ~Global Integrity~ ~Global Policy Forum~ ~Global Revolution~ ~Global Security Institute~ ~Global Voices Online~ ~Gold Star Families for Peace~ ~Government Dirt~ ~Greek Alert [greek lang.]~ ~Greek Assembly in London~ ~Green Left Weekly~ ~Groklaw~ ~Hack Democracy~ ~Hakim Bey and Ontological Anarchy~ ~Hiroshima Peace Institute~ ~History Is A Weapon Blog~ ~How Appealing~ ~How To Vanish~ ~Human Rights Law Review~ ~I Can't Believe It's Not a Democracy!~ ~Idler~ ~Impropaganda~ ~Independent Media Center~ ~INIREF~ ~Institute for Media Peace and Security~ ~International Action Center~ ~International ANSWER (Act Now to Stop War and End Racism)~ ~In These Times~ ~Information Clearing House~ ~Information Liberation~ ~Infoshop~ ~Institute for Policy Studies~ ~Institute for War and Peace Reporting~ ~Insurgent American~ ~Intel Hub~ ~International Labor Rights Forum~ ~Intrinsic Impact~ ~Invisible History~ ~Iraq Citizens Against the War~ ~Iraq Freedom Congress~ ~Iraq Veterans Against the War~ ~Irish Peace Institute~ ~Issues and Alibis~ ~James Howard Kunstler~ ~Jesus Radicals~ ~John Zerzan~ ~Jorgen Schäfer's Homepage~ ~JUST~ ~Just For The Love Of It~ ~Justice Not Vengeance~ ~Kasama Project~ ~Keep Talking Greece~ ~Kia Mistilis~ ~Kill Me If You Can by Bob Miller~ ~Killer Coke~ ~Labor Rights~ ~Labor Rights Now~ ~Labour Start~ ~Lava Cocktail~ ~Lemon Gloria~ ~Lemony Snicket~ ~L'ennui mélodieux~ ~Lessig~ ~Liberation Theology~ ~Libertarians for Peace~ ~Life After the Oil Crash~ ~Life & Peace Institute~ ~Lunch Street Party~ ~Lycaeum~ ~Links by George~ ~Literary Kicks~ ~Lubinproductions~ ~MacNN~ ~Mad Cow Morning News~ ~Manageable Ants~ ~Mario Profaca's Cyberspace Station~ ~Maro Kouri~ ~Maud Newton~ ~May it Please the Court~ ~McSpotlight~ ~Medical Foundation for the Care of Victims of Torture~ ~Metta Center for Nonviolence~ ~Metanoia~ ~Michael Moore - Must Read~ ~Mind Control~ ~Military Families Speak Out~ ~Mind in Peace (greek)~ ~Miss Welby~ ~MK Gandhi Institute for Nonviolence~ ~Molly's Blog~ ~Mother Jones~ ~MungBeing Magazine~ ~MyAntiwar.org~ ~n +1 mag~ ~National War Tax Resistance Coordinating Committee~ ~Natural Farming~ ~Neatorama~ ~Neuromarketing~ ~Neurosecurity~ ~New Internationalist~ ~News Dissector~ ~News Frames~ ~News Making News~ ~News Now~ ~New Tactics in Human Rights~ ~New World Dawning~ ~NEXUS~ ~NFAK~ ~Nomadic Academy Of Fools~ ~Non Fides~ ~Noor Images~ ~Not In Our Name~ ~Not Stupid~ ~Nuclear Resister~ ~NUTOPIA2~ ~[Occupy] 2012 Scenario~ ~Occupy America Social Network~ ~OCCUPY Cafe~ ~Occupy Istanbul~ ~Occupy Together~ ~Occupy Together Field Manual~ ~OWS~ ~Occupy Writers~ ~October 2011~ ~Odious Debts~ ~ODYS~ ~Olmaz~ ~On the Path to 2012~ ~Op Ed News~ ~Open Letters to George W. Bush from his ardent admirer,Belacqua Jones~ ~Open Revolt!~ ~Open Source Ecology~ ~Orthodox Peace Fellowship~ ~Orwell Today~ ~Outlaw Journalism~ ~OWNI~ ~Patriots Question 9/11~ ~Peace in Mind (greek)~ ~PeaceJam~ ~Peace Now~ ~Peaceful Tomorrows~ ~Peak Moment~ ~People's Assemblies Network~ ~Peter Frase~ ~Photography is Not a Crime~ ~Picture the Homeless~ ~Pieman~ ~Places the U.S. has bombed~ ~Pogo Was Right - privacy news~ ~Political Reform.ie~ ~Post Carbon Institute~ ~Praxis Peace Institute~ ~Primate Poetics~ ~Prisoner Solidarity~ ~Professors question 9/11~ ~Project Camelot~ ~Project Censored~ ~Project for the Old American Century~ ~Project on Corporations, Law and Democracy~ ~Psyche, Science and Society~ ~Psychogeography~ ~Public Employees for Environmental Responsibility~ ~Radical Anthropology~ ~Rainbow Family~ ~RawStory~ ~Reality Sandwich~ ~Real Democacy GR~ ~Real Democracy Now.net~ ~Rebel Dog~ ~Reflections on a Revolution~ ~Reporters Without Borders~ ~Re-public~ ~Resistance Studies Magazine~ ~Resource Based Economy Foundation~ ~Re-volt Radio~ ~Richard Heinberg's Museletter~ ~Rockefeller's War on Drugs~ ~Ruckus Society~ ~Sacred Texts~ ~Salon~ ~Save Orphan Works~ ~Scholars and Rogues~ ~Scoop~ ~SCOTUS Blog~ ~Secrecy News~ ~Service Academy Graduates Against the War~ ~Shadow Government Statistics~ ~Signs of the Times News~ ~Slovenia Peace Institute~ ~Smirking Chimp~ ~smygo~ ~SNU Project~ ~Soil And Health Library~ ~SourceWatch~ ~Speaking Truth to Power~ ~Spirit Horse Foundation~ ~Spunk~ ~Squattastic~ ~Starhawk~ ~Stockholm International Peace Research Institute~ ~StopCartel TV-GR~ ~Stop The Arms Fair~ ~Stop the Spying.org~ ~Strangers in a Tangled Wilderness~ ~Students Against War~ ~Survival Acres~ ~Survival International~ ~Swan's Commentary~ ~Take The Square~ ~Tangible Information~ ~Tax Justice Network~ ~Tax Research UK~ ~Theatre of the Oppressed~ ~The Black Commentator~ ~The Black Vault~ ~The Borowitz Report~ ~The Carpetbagger Report~ ~The Center for Public Integrity~ ~The Daily Reckoning~ ~The Dark Age Blog~ ~The Digger Archives~ ~The End of Being~ ~The Guardian~ ~The Hidden Evil~ ~The Huffington Post~ ~The Intelligence Daily~ ~The Lazy Man's Guide To Enlightenment~ ~The Mountain Sentinel~ ~The Nation~ ~The National Security Archive~ ~The New Z-Land Project~ ~The Other Israel~ ~The Pathology Guy~ ~The Progress Report~ ~The Progressive Magazine~ ~The Real News~ ~The Situation Room~ ~The Truth Seeker~ ~ The Watcher Files~ ~Think Progress~ ~Third World Traveller~ ~This Land Is Ours~ ~This Modern World~ ~TomDispatch~ ~Total Collapse~ ~Total Dick-Head~ ~Transform!~ ~Transnational Institute~ ~Transnational Foundation for Peace and Future Research~ ~True Democracy~ ~Troops Out Now~ ~True Democracy Party~ ~Truthdig~ ~Truth News~ ~Truthout~ ~TW3 and fotografia la dolce vita~ ~Uncommon Thought~ ~United for Peace & Justice~ ~United States Institute of Peace~ ~Unknown News~ ~UNPA Campaign~ ~Urbanibalism~ ~US Labor Against the War~ ~VBS TV~ ~Veterans Against the Iraq War~ ~Veterans for Peace and Justice~ ~Video Rebel's Blog~ ~Vietnam Veterans Against the War~ ~Virusmyth - Rethinking AIDS~ ~visionOntv~ ~Voices for Creative Non-Violence~ ~Void Network~ ~Voice Memo~ ~Voters for Peace~ ~Waging Nonviolence~ ~Waking the Midnight Sun~ ~Want To Know~ ~War Costs~ ~War Crimes and Military Improprieties~ ~War Criminals Watch~ ~War on Society~ ~War is Illegal~ ~War Resisters International~ ~War Resisters League~ ~Was Jack Kerouac a Punjabi?~ ~Watergate Exposed~ ~West Point Graduates Against The War~ ~What Really Happened~ ~What’s On My Food?~ ~Why Work? Creating Livable Alternatives to Wage Slavery~ ~Wikileaks~ ~WikiLeaks Central~ ~Wild Wild Left~ ~willyloman~ ~Winning Cancer~ ~Win Without War~ ~Women's International League for Peace and Freedom (WILPF)~ ~Wonkette~ ~World Prout Assembly~ ~Worldwide Hippies~ ~Yes Lab~ ~Yippie Museum~ ~Young Protester~ ~Youth Against War and Racism (YAWR)~ ~Zapatistas~ ~Zine Library~ ~Zippy Elder-at-Large~ ~ZMag~
~ Thank you for visiting Circle of 13 ~

FAIR USE NOTICE

This blog may contain videos with copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in an effort to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.