Charlie Wilson's War (2007) is a biographical drama film recounting the true story of U.S. Congressman Charlie Wilson (Dem., TX) who partnered with "bare knuckle attitude" CIA operative Gust Avrakotos to launch Operation Cyclone, a program to organize and support the Afghan mujahideen in their resistance to the Soviet occupation of Afghanistan. The USA had the ability to stabalize Afghanistan at the end of the Soviet–Afghan War (Date December 27, 1979 to February 15, 1989) but chose not to and Osama bin-Laden and other crazies poured into Afghanistan and took over.
The Obama administration is seeking billions in budget increases to target terror threats from abroad, especially Pakistan and Yemen, with boosts for surveillance and attack drones, special operations forces and a new military cyber command.
The focus is on regions that have served as insurgent sanctuaries, where U.S. counterterror officials say the next attack against America is likely being planned. Pentagon aid to Pakistan would balloon to $1.2 billion in 2011, aimed at bolstering its war on internal militants. And military funding to target al-Qaida could double in Yemen, where the U.S. spent more than $6 million last year just on aerial surveillance provided by drones, according to internal documents obtained by The Associated Press.
The rise in proposed counterterror spending reflects a new urgency within the administration, dovetailing with warnings this week from top intelligence officials of a possible terror strike from abroad within the next six months. The boost in Pentagon funding would also target a wider array of enemies, from al-Qaida and allied militant networks and dangerous nation-states, to sophisticated computer hackers and homegrown insurgents armed with dirty bombs.
But one indication of the sweep of increased spending is evident in a massive Pentagon account used to provide training, equipment and other assistance to foreign militaries. Under President Barack Obama's budget proposal, that fund would increase from $350 million in 2010 to $500 million in 2011.
In Yemen, where al-Qaida elements are suspected of aiding in the Christmas Day attack on a Detroit-bound airliner by a Nigerian suspect, American counterterror funding is expected to more than double, from $67 million in the past year to as much as $140 million.
"It's obvious to us," Defense Secretary Robert Gates told Congress this week, that "helping (Yemen's leaders) build their own capabilities in lieu of eventually perhaps having to have U.S. forces present on the ground in substantial numbers or doing this ourselves is clearly much cheaper and much better for us."
Gen. David Petraeus, head of U.S. Central Command, has said he believes the Yemen funding will double. But Pentagon officials said Wednesday there have been no final decisions and the money allocated for this year has not begun to flow.
According to documents, the aid that began flowing to Yemen last year included almost $6 million for aerial surveillance. That figure would include flights of pilotless drones — which have been critical to the recent increase in Yemeni operations against insurgent leaders.
To augment counterterror operations, the Pentagon is also looking to dramatically expand its surveillance and strike capabilities. The proposed budget would double the number of unmanned Reaper drones over the next two years — from 24 in this fiscal year to 48 in 2012.
Use of the drones by the U.S. military in Afghanistan, Iraq, and other hotspots has skyrocketed in recent years.
Also moving up in priority, cyber threats will consume more of the federal budget in 2011 than ever before — including the launch of the military's new Cyber Command.
Pentagon officials are asking for $139 million — compared to about $34 million this year — to set up temporary facilities for the new command at Fort Meade in Maryland, and will spend an additional $59 million on personnel and operations.
Defense policy chief Michele Flournoy said the Defense Department has to better organize itself to deal with cyber challenges, both offensive and defensive.
Pentagon officials rarely discuss the nation's capability for offensive cyber strikes, but as the U.S. is increasingly targeted from abroad, they are growing more open about that prospect.
"There's a lot of ongoing activities," Vice Adm. Stephen Stanley told reporters when asked about cyber operations during a briefing on the budget.
"We're establishing defenses. We are involved in exploitation activities," he added. "And we're positioning ourselves in order to be able to conduct attacks. So all of those different areas are ongoing. The cyber command focuses it and establishes the structure that we'll use in the future." more from this source.................
ANNAPOLIS, Md. (AP) ― Maryland officials are cheering the Navy's decision to re-establish its 10th Fleet Navy Cyber Command at Fort Meade.
Gov. Martin O'Malley, who wants Maryland to become the "Silicon Valley of cyber security," said Friday announcement represents another step forward to create and save quality jobs.
The fleet will focus on efforts to defend the nation's computer systems from cyber attack. Sen. Barbara Mikulski, D-Md., says cyber raiders are at work every day, trying to steal national secrets and bring computer systems down. Maryland is also home to the National Security Agency at Fort Meade (connected to).
The National Security Agency/Central Security Service (NSA/CSS) is a cryptologic intelligence agency of the United States government, administered as part of the United States Department of Defense. Headquarters for the National Security Agency at Fort George G. Meade, Maryland, about 15 miles (24 km) southwest of Baltimore.
Also at Fort Meade is the Criminal Investigation Command (CID); As the Army's primary criminal investigative organization and DoD's premier investigative organization, CID is responsible for conducting criminal investigations in which the Army is, or may be, a party of interest. CID Special Agents conduct criminal investigations that range from death to fraud, on and off military reservations and when appropriate, with local, state and other federal investigative agencies. Fort Meade CID Office
CID supports the Army through the deployment, in peace and war, of highly trained Special Agents and support personnel, the operation of a certified forensic laboratory, a protective services unit, computer crimes specialists, polygraph services, criminal intelligence collection and analysis and a variety of other services normally associated with law enforcement activities.
855 Chisholm Avenue
Fort Meade, MD 20755-5345
NSA's eavesdropping mission includes radio broadcasting, both from various organizations and individuals, the Internet (radical right wing blogs), telephone calls, and other intercepted forms of communication. Its secure communications mission includes military, diplomatic, and all other sensitive, confidential or secret government communications
Created on November 4, 1952 by President Harry S. Truman, it is responsible for the collection and analysis of foreign communications and foreign signals intelligence, which involves cryptanalysis. It is also responsible for protecting U.S. government communications and information systems from similar agencies elsewhere, which involves cryptography. As of 2008 NSA has been directed to help monitor U.S. federal agency computer networks to protect them against attacks.
The NSA is directed by a lieutenant general or vice admiral. NSA is a key component of the U.S. Intelligence Community, which is headed by the Director of National Intelligence. The Central Security Service is a co-located agency created to coordinate intelligence activities and co-operation between NSA and U.S. military cryptanalysis agencies. NSA's work is limited to communications intelligence; it does not perform field or human intelligence activities. By law, NSA's intelligence gathering is limited to foreign communications, although there have been numerous reports that the agency does not always abide by these laws, more from this source........
Bill Warner Director of CSPI..Covert Surveillance by Private Investigators at WBI Inc.