An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

Chinese Govt Makes Millions of Fake Social Media Posts

Sounds just like Russia…and China has an army that is assigned to keep up the espionage against the West.

 

Red astroturf: Chinese government makes millions of fake social media posts

“50-cent” posters aim to distract from dissent rather than confront it.

arsT: Data scientists at Harvard University have found that the government of the People’s Republic of China generates an estimated 448 million fake social media posts per year. The posts are an effort to shape online conversations by citizens and to distract them from sensitive topics “and change the subject”—largely through “cheerleading” posts promoting the Chinese Communist Party and the government.

The research, conducted by Harvard professor Gary King and former Harvard graduate students Jennifer Pan and Margaret Roberts and supported by Harvard’s Institute for Quantitative Science, made use of a goldmine of propaganda content. This included a leaked archive of e-mails sent to the Zhanggong District Internet Propaganda Office from 2013 to 2014 that showed government workers’ documentation of completion of fake post work, including screen shots. The research also analyzed social media posts on Chinese websites from 2010 to 2015.

Previously, posts like these were believed to be the work of what observers have called the “50-cent Party”—named for what some believed the posters are paid by the state for their propaganda work. As it turns out, the posts analyzed by King and his co-researchers were likely mostly written for free as an extra duty of government employees.

And while the “50c” posts had long been assumed to be focused on attacking critics of the government and the Party, the researchers found instead that “the Chinese regime’s strategy is to avoid arguing with skeptics of the party and the government, and to not even discuss controversial issues. We infer that the goal of this massive secretive operation is instead to regularly distract the public and change the subject, as most of these posts involve cheerleading for China, the revolutionary history of the Communist Party, or other symbols of the regime.” In essence, the fake posts are a government-sponsored “astro-turfing” campaign—an attempt to create the impression of a grassroots groundswell of support for the Party and the government.

The term “astro-turfing” first became widely used  to online public relations efforts by Microsoft as the company was fighting a government anti-trust case through the Microsoft-funded group Americans for Technology Leadership, though the term had been used in the past to describe off-line fake grassroots efforts. It has become a common (but unethical) political and marketing practice—particularly as companies try to shape online reviews and comments about their products and services. But none has engaged in this practice on the scale of the Chinese government’s campaign, which used government workers to spread happy talk about the Party and state. Of the posts analyzed from the Zhanggong archive, the researchers found 99.3 percent were contributed by one of more than 200 government agencies. Twenty percent of those posts were posted directly by employees of the Zhanggong Internet Propaganda Office, with smaller percentages coming from other regional and municipal government agencies.

As for the allegation that these astroturfers get paid by the government for their posts, the researchers noted, “no evidence exists that the authors of 50c posts are even paid extra for this work. We cannot be sure of current practices in the absence of evidence but, given that they already hold government and Chinese Communist Party (CCP) jobs, we would guess this activity is a requirement of their existing job or at least rewarded in performance reviews.”

Yup, there is more….

Related reading: Japan, India agree to boost three-way defense cooperation with U.S.

Related reading: U.S., India Sign 10-Year Defense Framework Agreement

Defence forces on alert after Chinese cyber attack

TheNewIndianExpress: An alert has been issued to the Indian Army, Navy and Air Force that a Chinese Advanced Persistent Threat (APT) group called Suckfly, based in Chengdu region, is targeting Indian organisations. India’s defence establishment is its prime target.

Suckfly is involved in carrying out cyber espionage activities by sending out a malware called Nidiran.

According to the alert, Suckfly has stolen certificates from legitimate software developing firms in South Korea and is using them to camouflage its attacks. “Sensitive information from targeting computers and networks is exfiltrated, and this information is being used to undermine the national security and economic capabilities,” the alert issued from the Ministry of Defence states.

APT is a network attack in which an unauthorised person gains access and stays there undetected for a long period of time. The intention of an APT attack is to steal data instead of causing damage to the network or organisation.

“It has successfully carried out cyber espionage by infecting computers of both government and commercial houses of India involved in e-commerce, finance, healthcare, shipping and technology. Targeting of military personnel cannot be ruled out, keeping in mind the sensitive nature of data being handled by them,” the alert adds.

What is alarming for security agencies is that the cyber attack was carried out from the headquarters of China’s People’s Liberation Army. Chengdu Military Command is in charge of security along India’s eastern sector in the Tibet region, including Arunachal Pradesh. Defence Minister Manohar Parrikar had visited Chengdu Military Command during his visit to Beijing in April.

Entitlements for Dreamers, There is an App for That

Play this short video. Ever wonder about the dreams of Americans who would like to attend schools of higher education that cant because the class size limits are met by foreigners? If these ‘dreamers’ need aid and assistance then how about their home countries paying for it? Rhetorical for sure.

Another rhetorical question….How about home countries provide internal dreamer conditions?

 

Related reading: Facts, numbers and charts

Last year from the White House:

Summary:
The President met with six young “DREAMers” in the Oval Office, all of whom were brought to America by their parents, and — until recently — faced a difficult situation because of their immigration status. The President’s executive action on immigration is changing that.
President Barack Obama shows the Resolute Desk to a group of DREAMers, following their Oval Office meeting in which they talked about how they have benefited from the Deferred Action for Childhood Arrivals (DACA) program, Feb. 4, 2015.

President Barack Obama shows the Resolute Desk to a group of DREAMers, following their Oval Office meeting in which they talked about how they have benefited from the Deferred Action for Childhood Arrivals (DACA) program, Feb. 4, 2015. (Official White House Photo by Pete Souza)


“I don’t think there’s anybody in America who’s had a chance to talk to these six young people … who wouldn’t find it in their heart to say these kids are Americans just like us, and they belong here, and we want to do right by them.”

President Barack Obama, 2/4/2015


Each of the young people who stood in the Oval Office yesterday had one thing in common: They were all brought here by parents dreaming of a better life for their children in America.

Some of them arrived when they were simply months old. They were raised in American communities, often not realizing their status was any different from that of their classmates or neighbors. Many of them, as the President noted in remarks at the end of the meeting, didn’t discover that there was something different about them — something that might prevent them from giving back to their community and their country — until they were about to go to college.

There is also a Dreamer Portal.

The DREAM Act

Over three million students graduate from U.S. high schools every year. Most get the opportunity to test their dreams and live their American story. However, a group of approximately 65,000 youth do not get this opportunity; they are smeared with an inherited title, an illegal immigrant. These youth have lived in the United States for most of their lives and want nothing more than to be recognized for what they are, Americans.

The DREAM Act is a bipartisan legislation ‒ pioneered by Sen. Orin Hatch [R-UT] and Sen. Richard Durbin [D-IL] ‒ that can solve this hemorrhaging injustice in our society. Under the rigorous provisions of the DREAM Act, qualifying undocumented youth would be eligible for a 6 year long conditional path to citizenship that requires completion of a college degree or two years of military service.

For reference on your tax dollars and foreign aid:

In part by Devex: A number of U.S. agencies specifically target private sector partnerships and reforms to drive economic growth, and each of them received a budget increase — some quite significant — under the president’s proposed plan.

The U.S. Trade and Development Agency would see its budget increase by 22 percent if Obama’s request finds traction, a “plus-up” that comes after USTDA’s budget already jumped 19 percent last year. The relatively small agency, which seeks to connect U.S. companies with infrastructure investments in emerging markets, has been lauded from both sides of the political aisle.

The Millennium Challenge Corp., the Overseas Private Investment Corp. and the Export-Import Bank likewise saw budget increases in the 2015 budget request.

Each of these agencies is involved in the whole-of-government Power Africa initiative, a $7 billion U.S. government commitment to help double access to energy in sub-Saharan Africa.

The accompanying budget justification describes a robust role for using the additional funding provided under the president’s request in support of Power Africa’s goals, although some observers have wondered where the $7 billion will come from, and whether it really represents concrete administration commitments or merely aspirational targets.

Each agency’s specific contribution to the initiative cannot be parsed out of the 2015 numbers. However, the budget — together with the recent congressional vote in favor of the bipartisan “Electrify Africa Act,” which directs the president to create a strategy for alleviating energy poverty in Africa –—suggests Power Africa transactions are poised to represent a substantially larger percentage of the U.S. development portfolio next year.

Climate change

The issue of global climate change has risen in profile since Secretary of State John Kerry took office last year, but funding for the Global Climate Change Initiative remained at a flat $840 million in the 2015 request.

The administration has maintained that a significant portion of Power Africa transactions will target clean energy development on the continent, but attempts to strip OPIC of a controversial cap on carbon power investments has led some observers to question whether Power Africa is truly committed to a balanced blend of clean and conventional fuels.

Just as the President’s budget request does not specify how much it will spend directly on Power Africa, it also sheds little light on what portion of Power Africa’s transactions will focus on non-carbon energy sources.

That could leave climate change advocates wondering what’s in it for them — and whether the funding will ever match the rhetoric — when it comes to foreign affairs spending in 2015 and beyond.

Operating expenses, Middle East democracy

USAID receives a more than 20 percent increase to its operating budget in the president’s request, after a 10 percent reduction to that same account in 2014. While agency officials were confident they could sustain current operations using carry over funding this year, they also maintained that surplus funding will be gone by 2015 and that staffing and programs would suffer if the OE budget was not restored.

The agency will have to wait and see if Congress agrees with Obama’s show of support for investing in the agency’s ability to hire new staff and continue funding the USAID Forward agenda, which seeks procurement system reforms and increased agency capacity.

One past administration request — the Middle East North Africa Incentive Fund — has been scrapped in favor of a new, scaled-back version, the Middle East North Africa Initiative Reforms, which will use $225 million to support ”targeted programs that will advance the transitions under way across the region.”

Such pro-democracy language and overt funding for “locally-led change and emerging reformists” could be read as a response to criticism some have leveled at the administration that it has not done enough to support opposition groups and popular movements against entrenched autocrats.

Next steps

The president’s budget request marks the first step in an appropriations process that will play out for months and ultimately determine how the U.S. government prioritizes spending next year.

The proposal is strong on its message about a “new model of development,” which sees opportunities for partnerships with the private sector in spurring development gains, as well as an obligation for U.S. action to respond effectively when global hot spots ignite.

Some signals — the Electrify Africa Act and USTDA’s continued budget plus-ups, for example — suggest bipartisan support exists for the partnerships model of development, at least in some sectors. But it will be important to watch closely to see if the administration is nearly as successful in defending those priorities within the foreign affairs budget — like new emphases on maternal health and child stunting, and global climate change — that do not appear to lend themselves so easily to the mutual economic benefit argument.

California is real generous: Read the full document here.

California Dream Act AB-130 and AB-131
Allows students eligible for state financial aid to apply for and
receive;
* Institutional scholarships such as the UC
Grant, State University Grant & Educational
Opportunity Program funds;
* California Community College Board of
Governor (BOG) Fee Waivers;
* State financial aid, including Cal Grants and
Chafee Foster Youth for use at qualifying
public and private institutions

Dreamers California

 

 

 

 

Global Human Trafficking, Here at Home

Pigs Fly, the UN Finally Admitted Global Sex Violence/Trafficking

Even CNBC is Sounding Alarm on Smuggling at Southern Border

 

Reps. Cohen, Kinzinger, Cárdenas and Wagner Introduce Bipartisan Human Trafficking Bill

June 9, 2016
Press Release

[WASHINGTON, DC] – Congressman Steve Cohen (D-TN), Congressman Adam Kinzinger (R-IL), Congressman Tony Cárdenas (D-CA) and Congresswoman Ann Wagner (R-MO) yesterday introduced H.R. 5405, the Stop, Observe, Ask and Respond (SOAR) to Health and Wellness Act. This bipartisan legislation would provide health care professionals at all levels training on how to identify and appropriately treat human trafficking victims. It is a companion bill to S. 1446, which was introduced by Senators Heidi Heitkamp (D-ND) and Susan Collins (R-ME).

“Human trafficking is a hidden crime that impacts hundreds of thousands of people across the U.S., and many of these victims end up in a health care setting while being exploited,” said Congressman Cohen. “Our bill aims to ensure health care professionals are trained to identify victims of human trafficking and provide them with critical, victim-centered health care.  Our bill also enables health care providers to implement protocols and procedures to work with victims, service organizations, and law enforcement so that victims can get proper support and perpetrators of human trafficking are brought to justice. I would like to thank Reps. Kinzinger, Cárdenas and Wagner for joining me in introducing this bill.”  

“It is critical that our health care providers are trained to recognize cases of human trafficking and have the proper procedures to best help those most vulnerable,” said Rep. Kinzinger. “I’m proud to be an original cosponsor of the SOAR Act and I believe this pilot program will have a significant impact towards identifying cases of human trafficking and helping more victims across the country from this disgusting crime.”  

“Human trafficking has grown into a large scale industry that is disproportionately geared towards women,” said Rep. Cárdenas. “This is just one of the many reasons why I did not hesitate to become an original cosponsor of the SOAR bill. Victims of trafficking suffer long-term effects, and with the introduction of new research, it is evident that the people who seek help can be identified and properly cared for by trained professionals. It is time to use this information in order to help stop the growth of the trafficking industry and facilitate the well-being of both survivors and victims.”   

“Education and awareness are critical in the fight to end human trafficking. This legislation will provide health care providers on all levels with the appropriate training and tools necessary to identify and report potential cases of human trafficking,” said Congresswoman Wagner. “With tens of thousands of victims being trafficked in the United States each year, I am happy to work with my colleagues across the aisle to introduce and quickly pass this legislation.”   

“Victims of human trafficking are hidden in plain sight – making those in captivity unrecognizable even to our most trusted professionals like doctors and nurses,” said Senator Heitkamp. “By implementing across the country the successes of health worker pilot training programs in North Dakota, my bipartisan bill with Sen. Collins would help provide the critical tools medical professionals need to recognize and protect victims of human trafficking. Today’s introduction of our bill in the U.S. House of Representatives is a critical step toward putting an end to human trafficking by identifying victims and getting them the support they need.” 

“Sex trafficking is a heinous crime that tragically affects every corner of America.  Human traffickers prey upon the most vulnerable, often homeless or runaway children,” said Senator Collins.  “Identification is a crucial, and frequently missed, step in helping victims and stopping these atrocities.  This bipartisan legislation would expand a successful pilot program at the U.S. Department of Health and Human Services to ensure that more health care providers have the training to identify, report, and treat these cases, which will help us shine a light on some of the darkest stories imaginable and protect victims of these detestable crimes.” 

The Stop, Observe, Ask and Respond (SOAR) to Health and Wellness Act supports efforts underway at the Department of Health and Human Services (HHS) to combat human trafficking by directing the Secretary to establish a pilot program to be known as ‘Stop, Observe, Ask and Respond to Health and Wellness Training.’ While human trafficking victims are often difficult to identify, a reported 68 percent of trafficking victims end up in a health care setting at some point while being exploited, including in clinics, emergency rooms and doctor’s offices.  Despite this, out of more than 5,680 hospitals in the country, only 60 have been identified as having a plan for treating patients who are victims of trafficking and 95 percent of emergency room personnel are not trained to treat trafficking victims. The SOAR Act will help close the gap in health care settings without plans for treating human trafficking victims.

**** How bad is it?

BBC: Dubbed “the General”, Mered Medhanie is alleged to have led a multi-billion dollar empire which specialised in people-smuggling.

Undated handout photo, issued by the Kk'S National Crime Agency, of Mered Medhanie, dubbed "The General", one of the world's most wanted people smugglers, who has been arrested Mered Medhanie styled himself on the late Libyan leader Col Muammar Gaddafi 

A 35-year-old Eritrean, he came to public attention after being linked to the worst migrant disaster at sea – the deaths of 359 migrants in October 2013 after their boat sank near the Italian island of Lampedusa.

Canada-based barrister Christine Duhaime, who specialises in money-laundering legislation, said Mr Mered was suspected to be a ringleader of the people-smuggling network which stretched across Africa and Europe.

“He is notorious just for the fact that he controlled a lot of money and a lot of people,” she told the BBC’s Newsday programme.

“As kingpin, the amount of money that went through him is apparently in the billions.” More to the story here.

State Dept Blocking Hillary’s Emails on TPP

It was several months ago that there was a major controversy on the Transpacific Partnership Pact. Everyone was and sorta is against it, when no one especially knew why as none of the text has been released that spells out any controversy. It is quite curious that even the leader of WikiLeaks put out a reward for anyone to provide chapters of the trade pact. Many in Congress have not even seen the documents while others have to go to a special room and read under an ‘eyes only’ condition.

If Hillary has a position in electronic communications over the trade deal, it is a legitimate part of her vetting but now we have John Kerry the current Secretary of State apparently running interference for Hillary or….for the trade deal….or both. It appears this is once again a case where FOIA requests on certain topics and certain people are forwarded to the White House for pre-approval, so in this case, the Obama top leadership could have their fingerprints on this matter as well.

The other curious item is, are these emails part of a separate Hillary release that is unknown to us?

This is like trying to nail jello to a wall. Could it be that Hillary’s emails prove she is against the TPP?

State Department Blocks Release Of Hillary Clinton-Era TPP Emails Until After The Election

IBTimes: Trade is a hot issue in the 2016 U.S. presidential campaign. But correspondence from Hillary Clinton and her top State Department aides about a controversial 12-nation trade deal will not be available for public review — at least not until after the election. The Obama administration abruptly blocked the release of Clinton’s State Department correspondence about the so-called Trans-Pacific Partnership (TPP), after first saying it expected to produce the emails this spring.

The decision came in response to International Business Times’ open records request for correspondence between Clinton’s State Department office and the United States Trade Representative. The request, which was submitted in July 2015, specifically asked for all such correspondence that made reference to the TPP.

The State Department originally said it estimated the request would be completed by April 2016. Last week the agency said it had completed the search process for the correspondence but also said it was delaying the completion of the request until late November 2016 — weeks after the presidential election. The delay was issued in the same week the Obama administration filed a court motion to try to kill a lawsuit aimed at forcing the federal government to more quickly comply with open records requests for Clinton-era State Department documents.

Clinton’s shifting positions on the TPP have been a source of controversy during the campaign: She repeatedly promoted the deal as secretary of state but then in 2015 said, “I did not work on TPP,” even though some leaked State Department cables show that her agency was involved in diplomatic discussions about the pact. Under pressure from her Democratic primary opponent, Bernie Sanders, Clinton  announced in October that she now opposes the deal — and has disputed that she ever fully backed it in the first place.

While some TPP-related emails have been released by the State Department as part of other open records requests, IBT’s request was designed to provide a comprehensive view of how involved Clinton and her top aides were in shaping the trade agreement, and whether her agency had a hand in crafting any particular provisions in the pact. Unions, environmental organizations and consumer groups say the agreement will help corporations undermine domestic labor, conservation and other public interest laws.

If IBT’s open records request is fulfilled on the last day of November, as the State Department now estimates, it will have taken 489 days for the request to be fulfilled. According to Justice Department statistics, the average wait time for a State Department request is 111 days on a simple request — the longest of any federal agency the department’s report analyzed. Requests classified as complex by the State Department can take years.

Earlier this year, the State Department’s inspector general issued a report slamming the agency’s handling of open records requests for documents from the Office of the Secretary. Searches of emails “do not consistently meet statutory and regulatory requirements for completeness and rarely meet requirements for timeliness,” the inspector general concluded.

Last year, a Government Accountability Office report found that at the agencies it surveyed, there was not political interference in responding to open records requests. However, last month, a conservative group filed a lawsuit alleging that an Obama administration directive has deliberately slowed the response to open records requests that deal with politically sensitive material.

Nate Jones of the National Security Archive told IBT that whether or not the State Department’s move to delay the release of TPP-related correspondence is politically motivated, it reflects a systemic problem at the agency.

“In my opinion it is more incompetence than maliciousness, but either way, it is a gross error by FOIA processors to not get these documents out before the election,” said Jones, whose group helps journalists obtain government records. “Their inefficiency is doing great harm to the democratic process.”

 

How the Military is Defeating Hackers

Here’s how the US military is beating hackers at their own game

US Soldiers IraqStaff Sgt. Stacy L. Pearsall/USAF

TechInsiders: There’s an unseen world war that has been fought for years with no clear battle lines, few rules of engagement, and no end in sight.

But it’s not a shooting war; not a war where combatants have been killed or wounded — at least not yet.

It’s a war that pits nations against each other for dominance in cyberspace, and the United States, like other nations employing professional hackers as “cyber soldiers,” sees it as a battlefield just like any other.

“It’s like an operational domain: Sea, land, air, space, and cyber,” Charlie Stadtlander, chief spokesperson for US Army Cyber Command, told Tech Insider. “It’s a place where our presence exists. Cyber is a normal part of military operations and needs to be considered as such.”

As US military leaders warn of the growing progress of Russia, China, and North Korea in cyberspace, the Pentagon has ramped up its own efforts in what it calls the “cyber domain” after the release of a new cyber strategy in April 2015.

“This ephemeral space that’s all around us, literally, is a space where operations can be performed against us,” Frank Pound, a program manager who leads DARPA’s “Plan X” cyber warfare platform, told Tech Insider. “And how do we defend against that? How do we detect that?”

Building a cyber army

In its cyber strategy, the military proposed 133 teams for its “cyber mission force” by 2018, 27 of which were directed to support combat missions by “generating integrated cyberspace effects in support of … operations.” (Effects is a common military term used for artillery and aircraft targeting, and soldiers proclaim “good effect on target” to communicate a direct hit).

The cyber mission force will comprise some 4,300 personnel. But only about 1,600 of those would be on a “combat mission team” that would likely be considered to be taking an offensive hacking role. They are up against China’s own “specialized military network warfare forces,” North Korea’s secretive Bureau 121 hacker unit, other nation-states, hacktivists like Anonymous, and criminal enterprises alike.

They have been further tasked with breaking into the networks of adversaries like ISIS, disrupting communications channels, stopping improvised explosive devices from being triggered through cellphones, or even, as one Marine general put it, just “trying to get inside the enemy’s [head].”

Online hacks can lead to offline outcomes, and the military has become keenly aware of that power. In 2009, the US and Israel reportedly infected Iranian computers with the Stuxnet malware that destroyed roughly one-fifth of the country’s nuclear centrifuges. And as recently as February, hackers were used against ISIS as others fought on the ground, quite possibly for the first time ever.

“These are strikes that are conducted in the war zone using cyber essentially as a weapon of war,” Defense Secretary Ash Carter told NPR. “Just like we drop bombs, we’re dropping cyber bombs.”

As one Army officer said during a 2015 training exercise, the cyber war seems to just be getting started: “Future fights aren’t going to be guns and bullets. They’re going to be ones and zeroes.”

soldiers cyber commandBrian Rodan/US ArmySoldiers work together during a training exercise in 2011.

‘Prepping the battlefield’

That the Pentagon would employ specialists to defend itself in cyberspace is not surprising, since government and military systems are attacked regularly by nations trying to read soldier’s email, or others who want to uncover personal details on millions who undergo background checks for security clearances.

But the defense of networks — while still an important function — has been supplanted in some cases by an offensive strategy. That is, soldiers hacking into computers overseas for intelligence or to disrupt the enemy on the battlefield — a kind of digital tit-for-tat.

“If there’s something that you can do to prep the battlefield before a kinetic attack or to disrupt defenses during kinetic attacks, why wouldn’t a combatant commander turn to that?” Stadtlander said.

Stadtlander couldn’t talk about ongoing operations that Army Cyber Command is involved in, mainly due to the unique nature of cyber warfare. An enemy who knows the US is developing a next-generation fighter jet might develop something in response that could take years, but with a cyberattack, a fix can be developed sometimes within days.

“The unique thing about cyber activity and defense is you’re talking about building a couple thousand lines of code or having a certain electronic device, or some sort of cyber capability. And just based on the nature of this space, a lot of times it can only be used once,” he said. “Once it’s known … it’s no longer a viable tool.”

Still, some insight into what the US military is capable of can be found within its own training manuals, presentations, and the few news stories by the military’s own writers. And it’s likely that hackers with Army Cyber Command, subordinate to US Cyber Command and NSA, benefit from top secret initiatives to infect “millions” of computers with malware in an effort aimed at “owning the net.”

“Denying the ability to coordinate, communicate, and assess,” Stadtlander said. “That’s an advantage that we might be able to leverage.”

Inside the Army’s cyber warfare ‘Bible’

Perhaps one of the most important publications on cyber warfare was released with little fanfare in Feb. 2014. Known as Army Field Manual 3-38 Cyber Electromagnetic Activities, it proclaimed itself as the “first doctrinal field manual of its kind,” unifying a number of other publications on network operations, electronic warfare, and intelligence into one 96-page document.

In FM 3-38, the Army defined offensive cyberspace operations as actions “intended to project power by the application of force in or through cyberspace,” while noting they are to be carried out in support of command objectives and within legal frameworks.

But what can soldiers do in cyberspace that can affect what happens on the battlefield? Quite a bit, according to the manual.

us army cyber soldierUS Army

“A cyberspace attack may be employed in conjunction with” other methods of attack “to deceive, degrade, destroy, and disrupt a specific enemy integrated air defense system or enemy safe haven,” it says.

As an example, the manual offers an early warning radar site as a target which, if soldiers can get inside the network, could possibly be destroyed or degraded.

That’s just what students trained for during an exercise in March, according to the Fort Gordon Globe. Acting just as they would on the battlefield, cyber soldiers patrolled to their objective — a simulated enemy air defense control system — then searched for their target’s wireless network so it could be exploited or neutralized.

There’s little need for stealth coating on aircraft when a guy behind a computer can disable the radar site for you. The manual also offers other systems Army hackers may consider breaking into, such as enemy telephone networks, servers, and smartphones.

“Even if you think about the way that IEDs are triggered,” Stadtlander said, using the acronym for improvised explosive devices. “Or an adversary’s [intelligence, surveillance, and reconnaissance], a lot of these are done through electronics and with internet connections.”

Getting into the Army’s ‘hacker university’

Located just southwest of Augusta, Georgia is Fort Gordon, an Army installation that brings together most of the service’s cyber warriors under one roof. In 2013, the Army chose the site as the home base of its Cyber Command after the unit was established in 2010.

Also home to a 604,000 square foot operations center for the National Security Agency, Gordon is where cyber warriors are taught their craft at what the Army calls its Cyber Center of Excellence. But before they get to the military’s “hacker university,” enlisted soldiers need to score high technical scores on the military entrance exam, and sign on for five years of service, instead of the normal four-year tour.

army cyber commandUS ArmyInsider Fort Gordon’s Cyber Operations Center.

Due to the classified nature of their work, cyber training is often conducted in secure compartmented information facilities (SCIFs) where cell phones and other outside recording devices are not allowed, and all soldiers will have to obtain a Top Secret clearance prior to being assigned to their unit.

Soldiers go through a lengthy period of training after basic training: Six months spent at the Navy’s Center for Information Dominance in Pensacola, Florida followed by six months at Fort Gordon.

Army officers go through their own training program at the Georgia base, called Cyber Basic Officer Leader Course. The course takes nearly nine months to complete and is the longest officer training program in the Army.

Enlisted soldiers train with members of all military branches over six months at the Navy’s Cyber Analysis Course, according to Bloomberg. Since students can come from a variety of skill sets and backgrounds, the first two-thirds of classroom time focuses on basic programming, mathematics, and how networks and operating systems function. But later on they learn the steps to research and infiltrate targets, defend networks, and even hack a simulated network with Metasploit, a common tool hackers have used since its release in 2004.

Meanwhile, officers receive similar training, though their position merits other coursework in leading operations as opposed to carrying them out. Though a cyber officer can likely step in and be more than capable, given the certifications they obtain, to include Cisco’s Certified Network Associate (CCNA) and the independent Certified Information Systems Security Professional (CISSP) credential.

“They are really valuably trained after that [schooling],” Stadtlander said.

So valuable in fact that the Army is seeing a challenge in retaining its talent from heavyweights in Silicon Valley.

Is hacking considered an ‘act of war’?

Chinese Army Hackersvia Flickr

“There is no international standing or framework that is binding over any one nation-state in terms of offensive cyber operations,” Bradley P. Moss, a national security lawyer, told Tech Insider. “It’s whatever rules we put in place for ourselves.”

In essence, the US, China, Russia, and others are operating in a sort-of “digital Wild West” with few overarching guidelines outside of the Law of War that predates our interconnected world.

Cyber warfare continues unabated because there is no governing body such as the United Nations telling nations not to hack one another. Not that that would necessarily make a difference, as a 2014 UN report criticized mass surveillance programs employed by NSA and others as violating privacy rights “guaranteed by multiple treaties and conventions,” The Intercept reported.

Still, Moss explained that nations are less concerned with the legalities of hacking each other, and instead, worry about the potential diplomatic and political fallout should they be exposed.

“More or less, we all engage in some manner of warfare these days, we just don’t go to ‘war’ over it,” Moss said.

How foreign nations would likely respond to being hacked by the US is something that is considered before any offensive operation, according to a top secret presidential policy directive leaked by ex-NSA contractor Edward Snowden.

The document, made public in 2013, listed cyber attacks resulting in “loss of life, significant responsive actions against the United States, significant damage to property, serious adverse US foreign policy consequences, or serious economic impact” as requiring presidential approval.

And for US military hackers who may be on a battlefield in Iraq, Syria, or elsewhere, their self-imposed rules for cyber attacks are clear:

“Military attacks will be directed only at military targets,” reads the Pentagon’s cyberspace operations document.

us army cyber commandUS Army

But what of cyber attacks that have potentially devastating effects on foreign nations, such as US-made worms that cause nuclear centrifuges to fall apart, or alleged Russian-made malware that knocks out power and heat to people in the dead of winter?

Are these “acts of war”?

“From a strictly legal matter, you could designate the US Army hacking the Russian Army’s [computer] system as an act of war,” Moss said. “Just as much as if we were to have infiltrated and damaged a Russian bomber, that would be an act of war.”

But, he added: “There’s nothing that necessarily stops us, except the political and diplomatic ramifications.”