Page 1

Cyber Terrorism how and where to fight it?

The SEQUESTER What it is , and what it Means to you and your family.

Letter From the Editor: Julian Green explains the inception of State Run Magazine

The Second Amedment: “Hottest” Topic in America Right Now

Cheap Arms and ammunition At Wolf Den Pawn

Content 84


Cyber Terrorism The new threat to the to international Saftety

Fiscal Consequences

|Since we fell off the Fiscal cliff at the beggining of this year find out what the Sequester means to You?

Interview with cooperal Jeffrey Turley.

|In this interview we ask Mr. Turley his opionion with the signing of the drone Act.


Government arms race kicks into high gear |DHS buys 2,700 armored vehicles

for streets of America

Pentagon welcomes Chinese general

| threatened nuclear strikes on hundreds of US cities



Republicans Facing Extinction! | The Republican party keeps acting like Socialists and as Reporter David Ortiz reports that’s why the party is nearly extinct.




Use Your Voice

Celebration Party. Whitney Neilson and Julian Green

Hi, my name is julian Green. Alot of you know me but many of you don’t know what im about. I represent the few thats in the world now who strive to protect the simple freedoms many americans in this society take for granted. Im talking about our civil liberties that are listed in the constitution. Amidst the radical governments in the world in the far east and even right here in our own very yard, I am a part of the collective that fights back. Thats where the inspiration for this magazine comes from. I became aware of our social, political, economical and warfare situation last year around this time. To the “zombies” of world i am simply known as a conspirasist , that in part is why I don’t speak much. In the magazine you will find not opinions but real articles and useful resources on how to better care for your self on a general basis. From cultural articles all the way to article detailing the latest information leak from wiki. But where did I come , well we can address that in later editions of my magazine. As for now continue to thumb through my magazine im sure theres something in here all the way from the video game world to the classic bookworm. I hope you enjoy the articles and the rest of this magazine and I’ll talk to you again in next months Editions.

Julian Green

Cyber Terrorism

By: Julian Green


resident O bama has signed a secret directive that effectively enables the military to act more aggressively to thwart cyberattacks on the nation ’ s web of goverment and private computer net works .P residential P olicy D irective 20 establishes a broad and strict set of stan dards to guide the operations of federal agencies in confronting threats in cyber space , according to several U.S. officials who have seen the classified document and are not authorized to speak on the record . T he president signed it in mid October.T he new directive is the most extensive W hite H ouse effort to date to wrestle with what constitutes an “ of fensive ” and a “ defensive ” action in the rapidly evolving world of cyberwar and cyberterrorism , where an attack can be launched in milliseconds by unknown as sailants utilizing a circuitous route . F or the first time , the directive explicitly makes a distinction between network defense and cyber - operations to guide officials charged with making often - rapid deci sions when confronted with threats . The policy also lays out a process to vet any operations outside government and defense networks and ensure that U.S. citizens’ and foreign allies’ data and privacy are protected and international laws of war are followed . “What it does, really for the first time, is it explicitly talks about how we will use cyber -
 operations ,” a senior administra tion official said . “N etwork defense is what you ’ re doing inside your own net works . . . . C yber - operations is stuff out side that space , and recognizing that you could be doing that for what might be called defensive purposes .” T he policy, which updates a 2004 presidential directive , is part of a wider push by the O bama administration to confront the growing cyberthreat , which officials warn may overtake terrorism as the most significant danger to the country . “It should enable people to arrive at more

effective decisions ,” said a second senior administration official . “I n that sense , it ’ s an enormous step forward .” L egislation to protect private networks from attack by setting security standards and promoting voluntary information sharing is pending on the H ill , and the White House is also is drafting an executive order along those lines . J ames A. Lewis, a cybersecurity expert at the C enter for S trategic and I nterna tional S tudies , welcomed the new di rective as bolstering the government ’ s capability to defend against “ destructive scenarios ,” such as those that D efense Secretary L eon E. Panetta recently outlined in a speech on cybersecurity . “I t’ s clear we’ re not going to be a bystander anymore to cyberattacks ,” L ewis said . The Pentagon is expected to finalize new rules of engagement that would guide commanders on when and how the military can go outside government networks to prevent a cyberattack that could cause significant destruction or casualties . The presidential directive attempts to settle years of debate among government agencies about who is authorized to take what sorts of actions in cyberspace and with what level of permission .


example of a defensive cyber - operation that once would have been considered an offensive act , for instance , might include stopping a computer attack by severing the link between an overseas server and a targeted domestic computer .


was seen as something that was aggressive ,” said one defense official , “ particularly by some at the State Department ” who often are wary of actions that might infringe on other countries ’ sovereignty and undermine U.S. advocacy of I nternet freedom . I ntelligence agencies are wary of operations that may inhibit intelligence collection . T he P entagon , meanwhile , has defined cyberspace as an -

other military domain — joining air , land , sea and space — and wants flexibility to operate in that realm . T he N orth has made several similar announcements in the past and has occasionally ignored armistice terms . B ut cyber- operations, the officials stressed , are not an isolated tool . R ather , they are an integral part of the coor dinated national security effort that includes diplomatic , economic and tradi tional military measu res .

O ffensive cyber actions , outside of war zones , would still require a higher level of scrutiny from relevant agencies and generally W hite H ouse permission . effort to grapple with these ques tions dates to the 1990 s but has intensi fied as tools and weapons in cyberspace become ever more sophisticated .

T he

O ne of those tools was Stuxnet, a computer virus jointly developed by the U nited S tates and Israel that damaged nearly 1,000 centrifuges at an Iranian nuclear plant in 2010. I f an adversary should turn a similar virus against U.S. computer systems , whether public or private , the government needs to be ready to preempt or respond , officials have said . Since the creation of the military’ s Cyber Command in 2010, its head, G en. Keith A lexander, has forcefully argued that his hundreds of cyberwarriors at F ort M eade should be given greater latitude to stop or prevent attacks . O ne such cyber - ops tactic could be tricking malware by send ing it “ sleep ” commands .

A lexander

has put a particularly high priority on defending the nation ’ s private sector computer systems that control critical functions such as making trains run , electricity flow and water pure .


repeated efforts by officials to ensure that the C yber C ommand has that flex -

ibility have met with resistance — some times from within the P entagon itself — over concerns that enabling the military to move too freely outside its own networks could pose unacceptable risks . A major concern has always been that an action may have a harmful unintended consequence , such as shutting down a hospital generator .

O fficials

say they expect the directive will spur more nuanced debate over how to respond to cyber - incidents . T hat might in clude a cyberattack that wipes data from tens of thousands of computers in a ma jor industrial company , disrupting business operations , but doesn ’ t blow up a plant or kill people .

Sequester Pains lated spending. During the remainder of

BY: Julian Green the 2013 fiscal year, $85 billion worth of cuts are set to go into effect. The budget The sequester is what everyone, at least cuts would end in 2021. in Washington, seems to be talking about. Why is the sequester happening? But what is sequestration exactly? When the debt limit was raised in 2011, Republicans demanded that budget cuts be included in the legislation. The Congress Joint Select Committee on Deficit Reduction -- or the “super committee� put in charge of figuring out how to implement the cuts called for in the Budget Control Act -- ultimately proved unable to reach a bipartisan agreement The $1.2 trillion in budget cuts would be on cutting $1.2 trillion from the deficit. spread over nine years and are equally di- With the threat of automatic sequestravided between domestic and defense-re- tion still looming, Congress was tasked Set to begin March 1 at 11:59 p.m., the sequester is a set of automatic spending cuts put into law by the Budget Control Act. Signed by President Barack Obama in August 2011, that legislation raised the debt ceiling and sought to apply pressure on Congress to come up with a longer term plan for deficit reduction.

with finding those cuts. No luck so far. So, while sequestration was never intended to actually go into effect, it now most likely will. What funding will the sequester affect The sequester will affect government spending across the board. The military will see $550 billion in cuts, drawing funds away from national security and military operations. On the domestic side, cuts will affect health care, education, law enforcement, disaster relief, unemployment benefits, non-profit organization funds, scientific research and more. Will any funding not be affected? The sequester stipulates certain areas of government spending that will see no cuts. No money will be drawn from spending on wars and military personnel. Funding allocated for Medicaid, Social Security, Pell grants, veterans’ benefits and some low-income programs will not be affected, either. Have lawmakers tried to stop the sequester? Both Democrats and Republicans are trying to figure out how to stop the sequester from going into effect, but the two parties can’t agree on a plan. Senate Democrats introduced a plan titled the

American Family Economic Protection Act, which identified $120 billion in savings that would replace sequester cuts until the end of December 2013. Republicans weren’t in agreement on their own solution, but eventually came forward with a counterproposal that would have kept the sequester in place, but given Obama control in implementing the cuts. Both plans were ultimately voted down.

Explore. . .

Daytona Beach, Fl Sponsored by Ipad

The New Ipad 2. Only from Apple.


Staterun Magazine  

Politics, Guns , Travel