- Meanwhile, 89.7 percent of database software is controlled by Oracle and Microsoft, and 93.5 percent of core patented network switching technology is held by US companies.
- After the control of Internet infrastructure and hardware and software systems, the US is now turning to Internet content.
- The US government has adopted macro-control and focus-funding to actively use IT giants to create a global Internet infrastructure which could be manipulated by the US. [18]
He also mentioned that Senator Joseph Lieberman, chairman of the Senate Committee on Homeland Security and Governmental Affairs, recently presented to his colleagues in the Senate a bill called Protecting Cyberspace as a National Asset which provides for the president to "order Google, Yahoo and other search engine operators to suspend Internet services.
"And other US-based Internet service providers could also be under the control of the president when 'Internet security emergencies' occur.
"If so, the US president would officially have the power to open or close the Internet." [19]
The Chinese expert's apprehensions were confirmed by retired Air Force general Michael Hayden - director of the National Security Agency from 1999-2005, principal deputy director of National Intelligence from 20052006 and director of the CIA from 2006-2009 - who last month stated, as paraphrased by Reuters, that "Cyberterrorism is such a threat that the U.S. president should have the authority to shut down the Internet in the event of an attack." In his own words: "My personal view is that it is probably wise to legislate some authority to the President, to take emergency measures...when he feels as if he has to take these measures" [20]
The Pentagon and the White do not intend to act alone in developing an international cyber warfare structure.
U.S. cyber warfare security experts met in Omaha, Nebraska shortly after CYBERCOM was inaugurated in May for a two-day Strategic Command Cyberspace Symposium which included "cyber commanders from several U.S. combatant commands, NATO, Japan and the U.K." [21]
In the same month, May, the NATO Group of Experts headed by former U.S. Secretary of State Madeleine Albright released its report, NATO 2010, which stated "NATO should plan to mount a fully adequate array of cyber defence capabilities, including passive and active elements." [22]
A feature three weeks later in the Sunday Times of London disclosed that "A report by Albright's group said that a cyber attack on the critical infrastructure of a Nato country could equate to an armed attack, justifying retaliation.
"'A large-scale attack on Nato's command and control systems or energy grids could possibly lead to collective defence measures under article 5,' the experts said."
The article also cited a legal expert at NATO's Cooperative Cyber Defence Centre of Excellence established in Estonia in 2008 affirming that "because the effect of a cyber attack can be similar to an armed assault, there is no need to redraft existing treaties." That is, the Alliance's Article 4 - used to move Patriot anti-ballistic missiles into Turkey on the eve of the war against Iraq in 2003 - and its Article 5 - used for NATO's participation in the war in Afghanistan - can be evoked and activated in the event of a cyber attack.
The Sunday Times piece added:
"[NATO] concerns follow warnings from intelligence services across Europe that computer-launched attacks from Russia and China are a mounting threat.
"NATO is considering the use of military force against enemies who launch cyber attacks on its member states.
Next Page 1 | 2 | 3 | 4 | 5 | 6
(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).