PDA

View Full Version : Off to the cyber wars...




tangent4ronpaul
06-06-2013, 07:00 PM
Cyberspace Interactive On-Net Operator
Location: Fort Meade, MD
Job Code: Cyber001
# of Openings: 49
Description

Job Title: Cyber Interactive On-Net Operator

US Army Civilian (non-military)



Location: Ft. Meade, MD

Become a member of the newly formed elite intelligence unit, the 780th Military Intelligence "Cyber" Brigade, charged with maintaining US military freedom of action in cyberspace while denying the same to adversaries. As a Department of Army Civilian Employee, you will be working side-by-side with other civilian cyber specialists as well as US Army Military Cyber Warriors as an Interactive On-Net Operator for the Cyber Brigade team. You will conduct network reconnaissance and vulnerability analyses to map networks, identify strong points and vulnerabilities among network segments, and develop plans and strategies for the application of cyber capabilities. Using in-depth technical expertise in network architectures, TCP/IP and OSI models and protocols, computer components and peripherals, programming concepts and languages, and assembly codes, Interactive Operators develop exploitation opportunities and maintain situational awareness of ongoing network operations. Interactive On-Net Operators participate in planning and executing cyber Red Team activities as well as support the research, development and fielding of advanced cyberspace technologies.

The brigade is comprised of two battalions. The 781st battalion is located in Ft. Meade, MD, and the 782nd battalion is located in Ft. Gordon, GA. The Intelligence and Security Command (INSCOM) is hiring multiple civilian employees for both locations. There are three job titles (R&D Engineer, Interactive On-Net Operator, and Digital Network Analyst), but INSCOM is hiring hundreds of civilian employees. You will be working at the forefront of addressing our nation's growing needs in cyber operations. Be a part of history in a stable federal (non-military) government working environment, with competitive pay and benefits.

Required Skills

Bachelors or higher in computer engineering, mathematics, or computer science. Other degrees with strong computer technology curriculum may be considered. Certifications such as Red Hat Certified Engineer (RHCE), Certified Ethical Hacker, Certified Information Systems Security Professional (CISSP), and other relevant certification(s) in combination with academic degrees are highly desired.
Demonstrated knowledge (2-7 years) of computer components and networking architecture.
Demonstrated knowledge (2-7 years) of physical computer components and architectures, including the functions of various components and peripherals, basic programming concepts, assembly codes, TCP/IP, OSI models, underlying networking protocols, security hardware, and software.
Demonstrated knowledge (2-7 years) of the effects on exploitation, encryption algorithms, tools, network construction, and administration. Advanced technical, operational, and authoritative knowledge conducting network operations.
Demonstrated experience (2-7 years) in using one or more of the following:
Network analysis, operations, construction, maintenance, and administration;
Network analysis tools such as Foundstone, fuzzers (fault injection) and packet sniffers for network penetration and testing (Wireshark, Snort, Metasploit);
Basic programming, assembly, and disassembly knowledge to identify software communications and network vulnerabilities;
Designing, developing, and testing (all three) of Windows-based, UNIX-based, or other platform application software; and
Encryption algorithms, intrusion detection, security hardware and security software.

Desired Skills

Advanced degrees in computer engineering, mathematics, or computer science.
Knowledge of Distributed Systems, Advanced Routing, Wireless Systems; Telecom and Datacom Platforms.
C, C++, Java, with additional familiarity in languages such as Ruby, Perl, Python, and SQL.
Demonstrated knowledge of concepts, principles, and practices of computer network technology and knowledge of network vulnerability assessment or exploitation and skill in applying this knowledge to the development of new capabilities.

Keywords: Cyber Security R&D Engineer, Firmware Engineer, Embedded Firmware Engineer, Embedded Software Engineer, Network and Forensic Analyst, Ethical Hacker, Network Exploitation Analyst, Network Vulnerability Analyst, Reverse Engineer, software reverse engineer, Embedded Systems Reverse Engineer, Kernel Developer, Kernel OS Developer, penetration tester, exploit, vulnerability

http://ch.tbe.taleo.net/CH05/ats/careers/requisition.jsp?org=MBACSI&cws=37&rid=11&source=Indeed

-t

pcosmar
06-06-2013, 08:50 PM
Well,,
isn't that interesting.

http://pixdaus.com/files/items/pics/6/10/572610_5617d8a3a3a391b570d4a6fbe7b59648_large.jpg

parocks
08-24-2013, 04:55 AM
Cyberspace Interactive On-Net Operator
Location: Fort Meade, MD
Job Code: Cyber001
# of Openings: 49
Description

Job Title: Cyber Interactive On-Net Operator

US Army Civilian (non-military)



Location: Ft. Meade, MD

Become a member of the newly formed elite intelligence unit, the 780th Military Intelligence "Cyber" Brigade, charged with maintaining US military freedom of action in cyberspace while denying the same to adversaries. As a Department of Army Civilian Employee, you will be working side-by-side with other civilian cyber specialists as well as US Army Military Cyber Warriors as an Interactive On-Net Operator for the Cyber Brigade team. You will conduct network reconnaissance and vulnerability analyses to map networks, identify strong points and vulnerabilities among network segments, and develop plans and strategies for the application of cyber capabilities. Using in-depth technical expertise in network architectures, TCP/IP and OSI models and protocols, computer components and peripherals, programming concepts and languages, and assembly codes, Interactive Operators develop exploitation opportunities and maintain situational awareness of ongoing network operations. Interactive On-Net Operators participate in planning and executing cyber Red Team activities as well as support the research, development and fielding of advanced cyberspace technologies.

The brigade is comprised of two battalions. The 781st battalion is located in Ft. Meade, MD, and the 782nd battalion is located in Ft. Gordon, GA. The Intelligence and Security Command (INSCOM) is hiring multiple civilian employees for both locations. There are three job titles (R&D Engineer, Interactive On-Net Operator, and Digital Network Analyst), but INSCOM is hiring hundreds of civilian employees. You will be working at the forefront of addressing our nation's growing needs in cyber operations. Be a part of history in a stable federal (non-military) government working environment, with competitive pay and benefits.

Required Skills

Bachelors or higher in computer engineering, mathematics, or computer science. Other degrees with strong computer technology curriculum may be considered. Certifications such as Red Hat Certified Engineer (RHCE), Certified Ethical Hacker, Certified Information Systems Security Professional (CISSP), and other relevant certification(s) in combination with academic degrees are highly desired.
Demonstrated knowledge (2-7 years) of computer components and networking architecture.
Demonstrated knowledge (2-7 years) of physical computer components and architectures, including the functions of various components and peripherals, basic programming concepts, assembly codes, TCP/IP, OSI models, underlying networking protocols, security hardware, and software.
Demonstrated knowledge (2-7 years) of the effects on exploitation, encryption algorithms, tools, network construction, and administration. Advanced technical, operational, and authoritative knowledge conducting network operations.
Demonstrated experience (2-7 years) in using one or more of the following:
Network analysis, operations, construction, maintenance, and administration;
Network analysis tools such as Foundstone, fuzzers (fault injection) and packet sniffers for network penetration and testing (Wireshark, Snort, Metasploit);
Basic programming, assembly, and disassembly knowledge to identify software communications and network vulnerabilities;
Designing, developing, and testing (all three) of Windows-based, UNIX-based, or other platform application software; and
Encryption algorithms, intrusion detection, security hardware and security software.

Desired Skills

Advanced degrees in computer engineering, mathematics, or computer science.
Knowledge of Distributed Systems, Advanced Routing, Wireless Systems; Telecom and Datacom Platforms.
C, C++, Java, with additional familiarity in languages such as Ruby, Perl, Python, and SQL.
Demonstrated knowledge of concepts, principles, and practices of computer network technology and knowledge of network vulnerability assessment or exploitation and skill in applying this knowledge to the development of new capabilities.

Keywords: Cyber Security R&D Engineer, Firmware Engineer, Embedded Firmware Engineer, Embedded Software Engineer, Network and Forensic Analyst, Ethical Hacker, Network Exploitation Analyst, Network Vulnerability Analyst, Reverse Engineer, software reverse engineer, Embedded Systems Reverse Engineer, Kernel Developer, Kernel OS Developer, penetration tester, exploit, vulnerability

http://ch.tbe.taleo.net/CH05/ats/careers/requisition.jsp?org=MBACSI&cws=37&rid=11&source=Indeed

-t







INSCOM also has significant responsibilities in counterintelligence, force protection, electronic warfare, and information warfare


http://en.wikipedia.org/wiki/Mark_Willis_(politician)
He worked with the United States Army Intelligence and Security Command (INSCOM) from 1999 to 2008. During that time, from 2000 until 2005,
he served as an IT liaison between INSCOM and the National Security Agency (NSA) personnel divisions.[4]

http://en.wikipedia.org/wiki/United_States_Army_Intelligence_and_Security_Comma nd
INSCOM also has significant responsibilities in counterintelligence, force protection, electronic warfare, and information warfare

http://en.wikipedia.org/wiki/Counterintelligence
Threats have broadened to include threats from non-national or trans-national groups, including internal insurgents, organized crime,
and transnational based groups (often called "terrorists", but that is limiting).

Counterespionage goes beyond being reactive, and actively tries to subvert hostile intelligence services, by recruiting agents in the foreign service,
by discrediting personnel actually loyal to their own service, and taking away resources that would be useful to the hostile service.


http://en.wikipedia.org/wiki/Information_warfare
Information warfare may involve collection of tactical information, assurance(s) that one's own information is valid,
spreading of propaganda or disinformation to demoralize or manipulate[1] the enemy and the public,
undermining the quality of opposing force information and denial of information-collection opportunities to opposing forces.
Information warfare is closely linked to psychological warfare.





You know what INSCOM is?
Remember when we heard that people with Ron Paul stickers on their cars would be targeted?
Domestic enemies or domestic insurgents or some such?

Well, those kind of things are the kind of things that INSCOM does.
If the Fed Gov wanted to harm or interfere with or sabotage Ron Paul or the "Liberty Movement",
people from INSCOM are possibly the people who would do that.

And we elected, in Augusta in May in Maine, as the National Committeeman, Mark Willis, who worked for INSCOM for 9 years.
He worked as the liason between INSCOM and the NSA. The NSA. Is this person likely to be a Ron Paul supporter? (Yeah, I know, Snowden).
But Willis probably knew something similar to what Snowden knew, and he didn't say anything. No, he became a Ron Paul National Committeeman. Hey, I voted
for him. You get a list. You vote for the people on the list. Where was Brakey?

From Wiki
http://en.wikipedia.org/wiki/Mark_Willis_(politician)
He worked with the United States Army Intelligence and Security Command (INSCOM) from 1999 to 2008. During that time, from 2000 until 2005,
he served as an IT liaison between INSCOM and the National Security Agency (NSA) personnel divisions.[4]


Anyway, it's belief that, since last May, all Willis has been trying to do could be considered "Information warfare", or "Counterintelligence"

From Wiki -

United States Army Intelligence and Security Command (INSCOM)
http://en.wikipedia.org/wiki/United_States_Army_Intelligence_and_Security_Comma nd
"INSCOM also has significant responsibilities in counterintelligence, force protection, electronic warfare, and information warfare"

Other interesting things from Wiki -

Counterintelligence

http://en.wikipedia.org/wiki/Counterintelligence
Threats have broadened to include threats from non-national or trans-national groups, including internal insurgents, organized crime,
and transnational based groups (often called "terrorists", but that is limiting).

Counterespionage goes beyond being reactive, and actively tries to subvert hostile intelligence services, by recruiting agents in the foreign service,
by discrediting personnel actually loyal to their own service, and taking away resources that would be useful to the hostile service.

and

Information Warfare

http://en.wikipedia.org/wiki/Information_warfare
Information warfare may involve collection of tactical information, assurance(s) that one's own information is valid,
spreading of propaganda or disinformation to demoralize or manipulate[1] the enemy and the public,
undermining the quality of opposing force information and denial of information-collection opportunities to opposing forces.
Information warfare is closely linked to psychological warfare.

Let's change these definitions around a little bit.

Counterintelligence

http://en.wikipedia.org/wiki/Counterintelligence
Threats have broadened to include threats from non-national or trans-national groups, including internal insurgents
(RON PAUL CAMPAIGN / LIBERTY MOVEMENT), organized crime,
and transnational based groups (often called "terrorists", but that is limiting).

Counterespionage goes beyond being reactive, and actively tries to subvert hostile intelligence services (RON PAUL CAMPAIGN / LIBERTY MOVEMENT),
by recruiting agents (MICHELLE ANDERSON, ETC) in the foreign service (RON PAUL CAMPAIGN / LIBERTY MOVEMENT).
by discrediting personnel(BRAKEY, BOYER, DOLPAC, TWEED) actually loyal to their own service (RON PAUL CAMPAIGN / LIBERTY MOVEMENT),
and taking away resources (STATE COMMITTEE / RNC SEATS) that would be useful to the hostile service (RON PAUL CAMPAIGN / LIBERTY MOVEMENT).

and

Information Warfare

http://en.wikipedia.org/wiki/Information_warfare
Information warfare may involve collection of tactical information, assurance(s) that one's own information is valid,
spreading of propaganda or disinformation to demoralize or manipulate[1] the enemy (RON PAUL CAMPAIGN / LIBERTY MOVEMENT)
and the public, (CHRIS DIXON - UNDERCOVER PORCUPINE - THE ENDLESS BLARING TO QUIT QUIT QUIT)
undermining the quality of opposing force information and denial of information-collection opportunities to opposing forces.
Information warfare is closely linked to psychological warfare.






Ok. Let's compare what has happened, what Willis has been involved in, with what Wiki says INSCOM (which Willis worked for about 10 years, from
1999-2008. If he's working at INSCOM in 2008, it's easy to imagine Willis being sent in as an agent of the government to disrupt the liberty movement,
or the Ron Paul campaign, or whatever the goal was.

Let's start at the convention in August. What the Maine delegation ended up doing was largely his idea. There were heated debates about what to
do, but I don't remember the specifics. My thinking was that their debates didn't need to be so heated, as they were arguing over the appropriate
empty symbolic gesture which removed them from the field of battle. The game had been lost, anyway. I was also hopeful / curious to see if
anybody would take up the suggestions I had made about really making a mess of the RNC. Really doing damage to Romney. They didn't do that.
They did a little march around protest and left. It was fairly clear that the Ron Paul delegates from around the country really weren't
in any mood to, or capable of, taking collective action at the event which would've been effective in achieving whatever goal they might have set.
There were more than enough Ron Paul delegates spread around to make things really interesting and damaging to Romney. Willis was able to
remove all the Maine delegates from the floor (Counterintelligence - taking away resources that would be useful).

Skip to December, and the election of the new GOP Chair. Here is a situation where Brakey and Boyer basically put together a team to pick the
state committeepeople to be on the Ron Paul list in Augusta in May. I would assume that Brakey would simply pick the Chair, and there would
be full unity (all these people owe their spots to Brakey), and Beth would win. But, no, Michelle Anderson wanted Rich and Traci. And encouraged
everyone to do the same. This is not what you should do. Anyway, Rich won.

Then, shortly after that, there was a confusing mess for the Penobscot County Chair. Apparently it was Rich's fault. And, after a few months
Michelle Anderson quit the State Committee and at least 2 other Ron Paul picked State Committeepeople. Chris Dixon at the same time is creating
dissention, pushing and goading people to quit the GOP, quit their seats. Willis wasn't visibly involved in these state and local level doings, but
the locals were supportive of Willis.

Willis, in January, decided to run for RNC Chair. Why? What purpose does this serve? How does this help Liberty?
http://www.onlinesentinel.com/news/willis-claims-gop-leaders-running-smear-campaign_2013-01-18.html?pagenum=full
"A former counter-intelligence agent in the military"
Maine candidate for RNC chairman claims smear campaign against him
Some Republican National Committee members question whether Mark Willis can even serve on panel, nonetheless be named chairman

Listen, not too long ago he was working with the NSA, for INSCOM, and now, Willis is acting like this? You know, all these stunts
which don't make Ron Paul and Ron Paul supporters look good. He isn't hurting the movement by accident, this seems like on purpose.
(But, again, I don't actually know this.) Ron Paul supporters act like idiots is not the message we want to send.

Story Aug 17, about a week ago, from Politico - look, Ashley Ryan is being nice, and Mark Willis is being difficult. (He's the one
who always seems to protest and piss everybody off when he could be working on the plan, as described by Ron Paul, which is to join
the Republican Party and take it over.) http://www.politico.com/story/2013/08/rnc-reince-priebus-ron-paul-95633.html

And what just happened this week. Willis quits as National Committeeman. And 6 state committeepeople also quit. That sounds like
Counterintelligence and "taking away resources (STATE COMMITTEE / NATIONAL COMMITTEE SEATS) that would be useful to the hostile service
(RON PAUL CAMPAIGN / LIBERTY MOVEMENT).

Here's NBC news on that:
http://firstread.nbcnews.com/_news/2013/08/20/20105182-off-to-the-races-clinton-drama?lite
“A Maine Republican National Committee member and six state committee members have resigned and left the GOP,
a sign of continued tensions within in the party as it attempts to unify ahead of the 2014 elections,” AP writes.
“Libertarian-leaning RNC member Mark Willis of Washington County and the others resigned in a letter Sunday,
citing concerns about the party's direction in Maine and across the country. The letter was signed by six others Republicans…
All 13 said they are withdrawing from the party.” More: “The group pointed to a number of issues including Maine GOP lawmakers'
failure to override Gov. Paul LePage's veto of the state budget, which raised the meals and lodging and sales taxes.
It also criticized Republicans in Congress for backing ‘feel good,’ restrictive and ineffective gun control legislation.”

Again, I don't know what the truth is, I'm just looking at his resume. Ron Paul was huge huge threat to the military.
He was arguing for huge cuts in military spending. I suspect that the military did not like that one bit.
Since they now do "internal insurgents" - maybe they're sitting around talking at INSCOM in 2008, "hey Willis, why don't get over to
Maine and infiltrate the Ron Paul Campaign and wreck stuff." "Ok" Not saying that happened. In 2008, he was living in Virginia working
for INSCOM. INSCOM does stuff like that. Like Cointelpro. And then, all of sudden, after working for, basically, a spy agency of the Federal Government
who are one of the ones that do the infiltrations, he suddenly loves liberty and moves to Maine in 2008. And then, in 2008 (according to someone
on facebook), starts working for Ron
Paul. Wow, quick conversion from "infiltrating spy"-type to honest liberty lover. Less than a year. Maybe there was actually overlap. Was he
working for the spy agency when he was working for Ron Paul? Maine caucus was Feb 2008, and his wiki page says he was working for them in 2008.
So, January 2008 - working for INSCOM? February 2008 helping Ron Paul in Washington County, Maine, where he never lived before?
Does that seem normal to people? I mean, National Committeeman is a pretty important position. I would think it's an important enough position that
Mark Willis would have to be vetted by higher ups in the Ron Paul campaign. But not necessarily.

This might be a scandal.

Willis = INSCOM = Cointelpro??? read my post




Willis = INSCOM = Cointelpro??? read post 85

http://www.youtube.com/watch?v=Yxde-PETEWg at 4100

http://scintelligencer.blogspot.com/2013/07/this-is-inscom.html