The Battleground on The War on Terror-Cyberspace, Creating the Cyber Peace Weapon..Dinner.

The Battleground on The War on Terror-Cyberspace, Creating the Cyber Peace Weapon..Dinner.

Obama picked up Bush’s lead in cyber warfare programs

    The newest battleground on the nearly two decades old War on Terror is in cyberspace. During the end of the Bush Administration through the current Obama Administration malware designed to cripple the merging nuclear capabilities of Iran has been developed and in use by The United States and Israel. The first of such weapons is “Stuxnet”, a worm smuggled into Iran’s Natanz nuclear enrichment facility. This weapon was the first actual malware developed that can physically cause physical damage to objects outside of the network through the production process. There are currently even more cyber weapons systems in production and implementation.

These weapons and their have been hailed as a break through in the War on Terror, but are designed in such a way that target indiscriminate populations and often effect populations without any obvious ties to terrorist groups. One has to ask why are such weapons appropriate for use on a war that is specifically aimed at special targets, yet in these applications used widespread on populations or infrastructure. Does a society or culture that does not necessarily support or embrace terrorism as a component of government policy or activity deserve to suffer the effects of such a program that can cripple and damage whole populations regardless of their Involvement in such activities.

chart, Increases in Cyber Spending

When Iranian President Ahmedinejad announced that Iran was enriching Uranium in the Natanz facility using centrifuges, the idea of a cyberattack or cyber virus program was presented for President George W. Bush’s approval under the title of “Olympic Games”.The cyber attack program utilized a form of malware developed by hackers in The United States National Security Agency called “Stuxnet”.
The program took years to code and develop and has been reported to contain of the largest code of any other worm. The challenge of the designers and US military was getting it into the computer system of the Natanz network at the nuclear plant. The enrichment facility was blocked by an Internet moat or what is referred to as an air gap. This space surrounding the plant was implemented to block any network access or traffic that could interact with the systems running the enrichment site.Various German companies including Siemens were contracted or responsible for much of the technology utilized at the plant.
The implementation of the worm it was decided would best be accomplished using USB thumb drives brought in through technicians or representatives of the private companies. Independent technicians, through the use of these infected thumb drives that carried the Stuxnet worm were able to infiltrate the air gap placed around the Natanz nuclear facility in Iran. Since the deployment of “Stuxnet” into the plant, the malware program has escaped the air gap and is infecting computers worldwide. It has broken through the air gap via these technicians thumb drives into other Nuclear enrichment facilities and 60% of Iranian personal computers.

aerial photograph of Natanz Enrichment Facility, Iran

  The Iranian Nuclear program utilizes the centrifuge method to enrich uranium for weapons grade or fuel rod grade enriched uranium. This method utilizes cascading centrifuges filled with uranium that are spun at high speeds to which gas is added to the centrifuges. This process strips the uranium of some of its heavier isotopes(U235) into the centrifuges. These isotopes travel with the gas into the next centrifuge repeating the process and yielding a higher concentration of nuclear grade uranium. By creating centrifuges that are of a favorable isotope for Uranium enrichment, more of the uranium can be utilized in the fission process.
After the original malware was released into the enrichment plant at Natanz, the Israeli military intelligence agency, Mossad, found out about the malware. Whether they helped the U.S.develop it previous to this or discovered the malware through their espionage program active in Iran and the U.S. or even within their own nuclear program possibly infected by the malware is unknown. The malware infection was spread by technician’s thumb drives after they left Natanz for other nuclear sites in the course of their business. Realizing that their common interests, the destruction of Iran’s nuclear capabilities, were similar, the NSA combined to work jointly with Israel’s Department 8200, to aid in the “Olympic Games ” project. The updated malware was reinserted and managed to cause the automated enrichment process to slow down or speed up rotation of the centrifuge production, which caused the centrifuges to be destroyed rendering them unable to provide the high grade uranium needed for any nuclear program.


   At the height of the malware’s infection of Natanz, nearly 60 % of Iran’s centrifuges were damaged and physically destroyed. It is not known if these were to be used in the production of clean energy for the country so devastated by the continued depletion of their crude oil reserves by foreign companies or for the production of nuclear weapons. To bring home the accomplishment of what had occurred, the computer program was able to break thru the internet gap and change the construction of solid  matter rendering it useless. What became of the centrifuges after they could not be used for high grade uranium enrichment.

The success of this first cyberattack collaboration between the United States and Israel, which has a unique program for those Israelis caught hacking-the hackers are either faced with a prison term or service in Department 8200, Israel’s version of the Nation Security Administration, has birthed a plethora of cyber weapons projects. Department 8200 is Israel’s premier unit associated with cyber surveillance, and military cyber defense systems, as well as the development of cyber weapons. The joint program, with the NSA, yielded the first actual cyber weapon that produced physical damage and subsequent cyber programs target enemies communications networks, government infrastructure, banking, transportation systems, and power grids.

Cyber Air Command Unit on Battlefield

After the success of the “Olympic Project” and the long term ramifications of such a cyber weapon, other systems in development were implemented in The War on Terror. Some of these weapons systems implemented have been used against Libya, and Al Qaida since these programs have proved successful. President Obama, supports these systems as well as the expansion of the drone policy. Both of which have the ability to cripple a nation from an unseen enemy that does not differentiate between military targets, servicemen, or civilians. In fact, the cyber weapons programs being designed after the success of the Stuxnet malware target enemy nations power grids, sewage treatment facilities, banking systems, and Internet.


ISIS recruiting site , wordpress and Twitter acounts

 The War on Terror, directed at a specific Muslim religious extremist groups, including Al Qaida, is now being used as the vehicle to indiscriminately target whole nations and their peoples; regardless of religious, political, sex, military, or sectarian membership, enabling the complete and utter destruction of a nation’s government, infrastructure, and all those within the affected areas. This is a form of Orientalism and is rampant and clearly exemplified by the use of the Stuxnet Malware. Its use against an enemy nation, Iran, without evidence of active Al Qaida members, in fact, one of the few larger concentrations of Shi’a Muslims, shows how this war is now indiscriminately used as a way to attack any perceived enemy. Shi’a Muslims, are more often the terror victims of the mainly Sunni members of Al Qaida, even more so than any Western nation. The attack on Iran shows a blatant misuse of the War on Terror and the powers of the president to use any type of non discriminate weapons in the fight against terrorism. By abandoning the production or reducing the dependence of Iran on its crude oil production and the foreign companies that still finance and sell off Iran’s resources for the profits of the oil companies, Iran has stepped into the War on Terror without evidence of any terrorist activity within its borders.

This type of blanket weapons systems that aim to cripple a whole country regardless of leadership, more often than not doing more harm to its peoples actually creates an environment ripe for terrorist groups to proliferate as seen in the war in both Iraq and Afghanistan. The use of cyber weapons in Afghanistan and Syria provides further documentation of this. These weapons also, although not utilized in the Middle East proved beneficial in the bringing down of all of North Korea’s internet capabilities, thus cutting them off from the rest of the world and their citizenry completely.

DARPA logo, under NSA control and funding, black ops budgets

  The latest known admission of the consideration of the use of such cyber weapons in Afghanistan has shown another dimension of the program. Marine Lieutenant General Richard Mills claims he has used such cyber weapons during his command of international troops in the field to hack into control and command capabilities of his enemy’s forces, thus infecting and crippling the network and its communication capabilities cutting off communication to troops.The weapon was developed by DARPA, the agency under the control of the NSA. The success of this small scale program has spawned “Plan X”, a larger version designed to map out an enemy’s entire computer network in the war zone. It concentrates on a weak point in the network and is designed to once initiated into a weak point grow and infect the entire network similar to the Stuxnet worm.

Fly sized Drone , on venus flytrap leaf. DARPA project.

 The Results of the beginnings of these cyber programs and the drone policy have been shown to provide the terror groups an environment ripe for the expansion or takeover into such areas. This is evident in the current proliferation and rapid expansion of ISIS; rumored and identified as the political wing of the Al Qaida network. In recent months ISIS’s takeover of areas in these affected countries has been the next enemy in the declaration of war on this new enemy. Had these weapons not been deployed or utilized in such a manner that created an environment and victimization of whole populations ideal for extremist groups to grab control of power from the vacuum and aftermath of these attacks. The US by targeting nations as a whole creating widespread chaos to infrastructures and alienating entire groups of people creates the threat.


Cyberbase interacting with Cyberships


Hacker Recruitment now at government DARPA programs.

  While the interface between private sector development and the NSA relies heavily on the corporate side currently the hottest jobs in the NSA involve the transfer of the development of such programs under military control. Recruitment at cyber computer and hacker gatherings is strong now with the military actively seizing these recruits away from the private sector security companies that most are employed by.

As the U.S. Moves forward on such policies to replace the traditional military of ground forces and move away from a military versus military theater of confrontation it targets civilian populations directly without concern as to collateral damage or the killing of innocents not involved in military or terrorist activity. This flies in the face of the self proclaimed enemy which is usually a minority within the country or area of conflict. This policy shows a complete lack of thought or care in who the real enemy is, simply lumping all members of a society or culture together as “terrorists”.

In this doctrine The United States itself becomes the ultimate terrorists as the population that democratically elects the lawmakers that embrace and vote on these programs embracing them as a whole. This is seen by the congressional votes on the such legislation as the War on Terror, The Patriot Act and subsequent re-votes, and more recent the declaration of war on ISIS with little or no opposition in the votes against such programs in either party. The same cannot be said of the enemy which do not vote on such attacks in their own countries but rather arise in the power vacuum after such attacks out of fear and intimidation by our policies. Such policies are clearly in violation of nearly every treaty or rules of engagement such as the Geneva Convention and United Nations votes.

In such policies The U.S. Moves away from warfare against a known identified enemy armed, funded, and organized by a unifying power to the unknown. The vague terms defining the enemy such as terrorists, and ISIS do not fall under any known treaty, leadership, or border even and are used to make warfare on anyone. How does one extricate or negotiate with such an enemy to declare an end to hostilities, a peace treaty, or cease fire? Who are the leaders of such unknown, border less combatants and after nearly 15 years of such warfare when does the conflict end? At what juncture is victory declared? How many times have we heard that victory is at hand with the capture and killing of Saddam Hussein, Osama bin Laden, and other important leaders of these terrorist groups, for now we are without names or faces of the enemy. This is the policy that insures the survival of the military industrial complex that General Dwight D. Eisenhower warned of just prior to leaving office in 1960. A war without end on any and all deemed the enemy.

Update…5/24/2015 New news, The Face of The Enemy. Solutions, simple solutions.

Well it looks like we finally have some names to go with our Isis Enemies. Over the past few weeks The U.S. Government through centcom has released the names and photos of some of our enemies in ISIS. ” What! are you sure we want to show the enemy! “  Well, if we show them after they’re dead, with their names, showing them will prove we had enemies. it is in this way they will not be viewed as living people that can be interacted with ever. One wonders if they were enemies if we did not kill them on a battlefield.

In one of my courses at the local Community college Sacramento City College, in an anthropology class, our Professor Bruce Pierini asked one of our fellow classmates to  speak of his experience as an interrogator  by virtue of speaking Arabic or  learning Arabic while in the U.S. military’s War on Terror, stationed in Iraq several years ago. He was extremely scared and the experience seemed raw, not to mention he was funded for school by the government through the Gi Bill. I will not mention his name . It was his job to round up Iraqis that may have been thought of as having links to Al-Qaeda. He could not differentiate who was linked to terrorism and who was not. He was walking patrols in the evening and had a quota to fill daily. He inquired to his commanding officers as to how to tell the difference?

It doesn’t matter.” was their response.

The  struggles he must have faced were evident as he choked up remembering his nightly quota of ten and how he selected them with the cry of  “it doesn’t matter”. Knowing that many of these people nightly will not be returning to their families for a meal, or the income to provide for it. This done nightly before interrogations which had quotas as well. The interrogations and their process unspoken by him, communicated through his eyes, the horror and guilt.The entire class saw what our friends, brothers, cousins, and young volunteer soldiers did in our name. We, collectively, were silent  and weighted. It did not matter,  just grab the first ten you see, shortly after the curfew, or go into a home with an address you were given and take the men. Democracy indeed.

Imagine going on to this CyberCaliphate  Wordpress site that is listed again below, I will not put a link on it, this is an American Site recruiting for Isis, and referencing the Shia Sunni conflict in its title, with a woman veiled in a designer scarf. Maybe she made the site, maybe her cousin in Michigan made it. Maybe she has nothing to do with Al-Qaida but she is completely veiled. Is she obscuring her identity with it? Why wear it at home? She is telling the world though that she has money, a computer, Internet access, and a voice. Maybe she waits for a son that left to get formula for his daughter whose mother,  his wife , was  killed by an explosion in the bazaar. She heard he last was brought in for questioning a minute after curfew since the local bazaar was bombed out and he had to walk farther to get his daughters  milk.

It was many  years ago. Now, her grand mother is actually the one taking her picture in the scarf. She knows English from the soldiers and recruits for ISIS, it is the only way she can pay back the charity since the Muslim Brotherhood is what kept her and her grandmother alive after the Americans killed everything. There is no one to negotiate her dowry and no dowry to start with even. She is a spinster at 18,  after being orphaned at 3. Who will share her table tonight?

Wouldn’t this be a hoot, for an interesting cultural experience and maybe an attempt to use this technology for Peace.  Go on this  or any other social networking site to arrange a meal with 2 other cultures over web cams- on skype, or any other web meeting program. You can list the memberships on the networking sites. It could and would be good to do during a holiday or holy period, like during Ramadan, Passover, Holy Week, or any time for that matter. One sets up the site to host and invites others, arranging a Ramadan break the fast meal between cultures, bring in some Jewish folks, and  over webcams eat a meal together. 

 At each site  the participants say a blessing  that reflects their spirituality or gratitude, for those other guests and the people, resources, and sacrifice it took to get the meal to their table. After each table does this! they break bread, introducing themselves as they take a hunk of bread. When all are done, explain your meals, did you grow the food, process it , bake the bread from a starter, how far did you walk to get the products in your meal, what are commemorating with this holiday, why do you fast all day? Imagine the connections, although meal times might be a bit off in timing,  with some effort it could be done cross meals. Like Breakfast in Jerusalem with dinner in New York.

How could one after eating with a family and hearing how they got the food to the table, want to drop a bomb, or fly a drone into their house or pay to have it done. Imagine dining with them while or if such an event happens. You are eating during a holiday with them, seeing them massacred by a pilotless drone, maybe the size of a fly equipped with a poison dart, knowing that your taxes paid to kill them. What defense did they have?  Yet they knew as it was happening you paid for it, and you did too,  watching them die, still eating with your children after blessing each other.

That is the power of a webcam and streaming projector shared with families and kids. This could bridge all differences brought by propaganda and isolation. The power of the computer and wireless technology to link us as families, the human family, having a meal together. Could this bring peace as it is now being used to make war on innocent families.

Works CitedWorks Cited

“Cyberwarfare and Cyberweapons, a Real and Growing Threat”.


Ghelten, Tom. “First Strike: U.S. Cyber Warriors Seize the Offensive”.


“Iran Nuclear Facilities Hit By Cyber Attack that Plays AC/DC Thunderstruck at Full Volume.” 07/25/2012

Moskowitz, Jeff. “Cyber Security Unit Drives Israel Internet Economy.” CS


Sanger, David. “Obama Order Sped Up Wave of Cyberattacks Against Iran.” The New York 06/01/2012

“Uranium Enrichment” 10/21/2014

Zettler,Kim. “Countdown to Zero Day: Stuxnet and The Launch of The World’s First Digital

Weapon.” 11/03/2014.

Miyake!  Simplicity in Design, More than Fashion, Remarkable Art. 

Miyake!  Simplicity in Design, More than Fashion, Remarkable Art. 

Desperately trying to find some needed cash, see being poor and the hustle, I stumble upon an online article about a retrospect of Issey Miyake. Issey Miyake is one of the quintessential Japanese dssigners that came to define the fashion industry in the 1980’s and beyond. He was known for his unisex simplistic designs which transcend fashion, becoming instant design classics. 


Issey Miyake


I am amazed and astounded that vintage Miyake is selling for thousands. I pull out a thick black cotton coat from my closet which is classic Miyake, purchased in 1995 in a consignment store in Seattle for less than one hundred dollars it is now a wise investment. The coat is a coarse black cotton weave sewn on the bias with unfinished frayed edges. When splayed out it is square in shape composed of two triangles of fabric. It is breathtaking once on. It’s weight and asymmetrical hang with low triangular shapes weighing down the front of the garment. It’s lines are completely simple with the secret being in the off center area that it is put on, not like the hole in,the middle of a poncho symmetry one normally finds in such a garment. It is unisex and one size indicative of early Miyake and other  Japanese designers of the period such as Commes des Garçons and Yojhi Yamamoto. The top of the coat. Has three buttons which link a piece of fabric into a hood when buttoned. One can roll the hood or unbutton it for a wide collar or tweak it in various stages between for a bit of both should one desire. 


Black Miyake Coat , hood down

I search for a similar coat for sale online and only find a photo. Other used Vintage Miyake coats are selling for upwards of one thousand dollars but none have the hang or lines that this particular design have. I find them either more tailored or less structure in line and drape. Definitely not as versatile in appearance or shape. In comparing the others just lie on the models while this style draws the eye to the structure and design to the geometry of the garment not the model.

I am taken back to my own sojourns to Tokyo during 1986, when my father, on foreign assignment with a major technology firm did a two year stint in their Asian headquarters. Frequenting Harajuku in the Omotosande area, where the Shinjuku and Shibiya subway lines intersect on Sundays I would see many coats like this as well as other styles similar from Rei Kawakubo of Commes des Garçons, Yohji Yamamoto, Kenzo Abe, or the multitude of rising star Japanese designers that were thrust into the fashion world that year. 


Harajuku Kids

Shopping the trendy retail outlets of the district one could find less known designers? Strolling alongside the streets there are squares of stalls selling vintage Levis, Hawaiian shirts, and other classics, ample distraction from the primary activity, people watching. The main thoroughfare around Yoyogi Park, closed to traffic, filed with a multitude of Japanese youth sporting  mohawks, pompidours,  pigtails,  bouffants, wigs, or outlandish hats in every color gather with their respective cliques on parade and public display. The atmosphere is   festive, non-traditional, and always fun in the frivolity of it all. Often found with a boom box blaring, the Harajuku kids’ music of choice whether it be Elvis, the Sex Pistols, or a more current (for the time) 80’s dance favorite leaves tradition behind forget the shamisen or flute.  The youth congregate in circles along the wide boulevard representing their adopted look to a tee.
While budget and economics prevented many of these trendy outlandish mismatched Harajuku youth from sporting the latest in designer fashions, the established ready-to-wear Japanese fashion industry was well represented amongst the  more mature spectators and somewhat more subdued cafe society which left the outdoor cafes and seating areas along the boulevard swelled beyond capacity. An acquaintence of mine commented that this form of expression in addition to getting inebriated while clubbing was her generations way of feeling free, and ultimately expressing their individuality in a culture that at the time offered little way to do so.


Gweyn Stefani , designer of The Harajuku Girls Line

 It seemed as if the world had taken notice of this particular moment in time and rendered it indicative of the Japanese youth culture for decades to come. Rock Stars turned designers like Gwen Stefani even naming clothing lines after the vibrant youth culture contained within the few square kilometers weekly. The designers of the time and present day were no doubt inspired by the creativity expressed in the streets within the confines of the structured and ordered group culture pervasive throughout the history of Japanese culture. 


Runway Style Evocative of Miyake, by Chloe

 These bursts of vibrancy and brilliance so subtly woven into the design threads of the eighties designers and in part responsible for their tremendous embrace by the  world and runways of Europe’s fashion capitols. One only need to look  at the years following the Japanese designers successful debuts in these centers to see the influence on worldwide design which is evident even today. Designers like Donna Karan, Calvin Klein, Betsy Johnson, John Galliano, Christian LaCroix, and John Paul Gaultier found tremendous roots and structure in these well constructed simple geometrical foundations. 

The Hunger Games – Panem Capitol Fashion

By accentuating with texture, color, pattern, accessories, the    young designers of the fashion industry gave the looks depth, fun, whimsy and bridged a gap towards the Harajuku look seen weekly. Garters, petticoats, frilly ruffles and bustles brought an element of  sweet confectionary coyness to the sometimes stark pieces that still appear in fashion and film today. One only need look at the aesthetic in such films as the Hunger Games series, or The Harry Potter films, to notice the staying power of the designers influence and its power in the garment industry as well as popular culture at large. 

 Modeling my black Miyake coat while giving  thought to this, all the while enjoying the garment gave me pause to think of the coat as sort of a matriarch of design, the wise crone cloistered over her cauldron, cloaked, stirring a simmering brew adding roots, barks, and herbs yielding brews of varying thickness, sweetness and hues to be dispensed to her progeny. The tonics for beauty, humor, romance, youth. Dyes for wardrobes as varied as the wearer. All worn and traced to her quiet, understated knowledge and subconscious grasp of foundations solid and sturdy. Her male counterpart a Merlin figure, a hermit figure imparting the same alchemical melange less simmered and more mercurial wearing the same elemental garment.

Twirling a few times the coat with its front triangular asymmetrical corners on each side magically lift and thrust around gently guiding the less weighted section of the backside giving lift. I conjure dervishes whirling into a trancelike state, skirts ballooning out like bulbous bell shaped vessels. As I move, even without  a twirl the garment moves to counter balance my own movement providing an almost pendulum like affect from the swing of the weighted front corners fluidly gliding with each stride. What the photographers and critics must have thought with the first glimpse of such synchronized movement in a runway show.

Now while searching such terms “Issey Miyake + vintage coat + resale value” my browser, I find a plethora of exhibits in both large and small, in public and private galleries lauding the designers, especially Miyake for their vision of simple geometrical unisex constructions that formed amazing garments to which there have been few other examples of since. Permanent exhibitions in museums from New York to London tout all things from the period by this vanguard of design Titans from clothing, to lighting, to such now ubiquitous furnishings such as the futon. All of it showcased in a minimal sparse monochromatic  environment now the norm in retail and advertising.  Designed to showcase the simplistic, sophisticated, quality of design, construction, and organic materials echoed in form, function, and aesthetic. Pieces from this place and period need no model, styling, props., or staging to emphasize  what obviously stand alone as classics in all areas of design. 

In awe of the coat which has held not only its pared down elegant characteristics after nearly 30 years in a closet, but retained its confounding beauty as well as value on sites such as Etsy, eBay, and 1stDibs commanding bids of thousands of dollars. This in an industry where most design pieces from the periodare doomed to be labelled out of style in a few short seasons. Remember the block print oversized day glow, Wham! Frankie says tees, trotted out as a novelty for a themed flashback fete. How about the 80’s shoulder pads in nearly every dress blouse or jacket, at best deemed retro  a generation later- or Members Only jackets. Other fashions of the period seen as an example of an individual designer’s body of work- Bob Mackie’s extravagant Academy Award gowns popularized by Cher. These pieces go far beyond the scope of the majority of fashion over a season or two past into the stratosphere of art, marking the birth of new avenues which the industry has explored and continues to embrace.

Few designers or periods render such treasures that when removed from the dry cleaner bag and inspected or put on, whether on dress form, model, or self, inspire awe, and admiration in new ways without the construct or thoughts of era, year, age, or  regret of decision to purchase. The  Little Black Dress by Coco Chanel, as well as the Chanel Suit , Levis 501’s, Converse HiTops, Keds, Brooks Brothers Oxford Shirts, all of these essential classics spawning decades of variations, subclassifcations, retail outlets, and even designers dedicated to their form  exclusively. Yet something in these Japanese designs nearly transcends these fashion staples. As awe inspiring on a hanger or laid out splayed on a flat surface one appreciates the simplistic form and minimal construction which almost have a life of their own ready to leap off the one dimensional plane with form to guide and give them essence. 

These designs are alive without model, albeit in a altogether unique appearance than that when worn. The Miyake, when flat appears to be a near perfect square, but lacking the congruency found in a poncho if laid in a similar fashion. It appears as if something lies under it waiting to grow thru, Jack’s magic beanstalk sprouting up. The paring down of the most basic of shapes, rudimentary fabrics often coarse lay woven, sewn without frills or extra stitching, basic slit pockets, simple geometrical shapes when pieced to pattern, each step elementary in its origin yielding something magical, complex, with a form entirely and stylistically new.  The genius of these handful of Japanese visionaries recognized by the likes of Steve Jobs, who wore Miyake with Levi’s nearly everyday while the Zen Guru of Apple, Annie Leibowitz- photographer artist extraordinaire to name a few. I bow deeply to thee as the unfinished fringe of the front lines rustle softly  over the hardwood floor. Arigato Gozaiamatshushita…. 

Arigato Gozaimashushita Miyake -san…