Most Popular
1. It’s a New Macro, the Gold Market Knows It, But Dead Men Walking Do Not (yet)- Gary_Tanashian
2.Stock Market Presidential Election Cycle Seasonal Trend Analysis - Nadeem_Walayat
3. Bitcoin S&P Pattern - Nadeem_Walayat
4.Nvidia Blow Off Top - Flying High like the Phoenix too Close to the Sun - Nadeem_Walayat
4.U.S. financial market’s “Weimar phase” impact to your fiat and digital assets - Raymond_Matison
5. How to Profit from the Global Warming ClImate Change Mega Death Trend - Part1 - Nadeem_Walayat
7.Bitcoin Gravy Train Trend Forecast 2024 - - Nadeem_Walayat
8.The Bond Trade and Interest Rates - Nadeem_Walayat
9.It’s Easy to Scream Stocks Bubble! - Stephen_McBride
10.Fed’s Next Intertest Rate Move might not align with popular consensus - Richard_Mills
Last 7 days
The Stock Market Bear / Crash indicator Window - 9th Mar 25
Big US Tech Stocks Fundamentals - 9th Mar 25
No Winners When The Inflation Balloon Pops - 9th Mar 25
Stocks, Crypto and Housing Market Waiting for Trump to Shut His Mouth! - 27th Feb 25
PepeCoin (PEPE): Anticipating Crypto Reversals using Elliott Waves - 27th Feb 25
Audit the Fed, Audit Fort Knox, Audit Everything - 27th Feb 25
There Are Some Bullish Indicators in the Silver Market - 27th Feb 25
These Metrics Identify Only 10 AI Related Stocks That Are Undervalued - 27th Feb 25
Stocks, Bitcoin, Gold and Silver Markets Brief - 18th Feb 25
Harnessing Market Insights to Drive Financial Success - 18th Feb 25
Stock Market Bubble 2025 - 11th Feb 25
Fed Interest Rate Cut Probability - 11th Feb 25
Global Liquidity Prepares to Fire Bull Market Booster Rockets - 11th Feb 25
Stock Market Sentiment Speaks: A Long-Term Bear Market Is Simply Impossible Today - 11th Feb 25
A Stock Market Chart That’s Out of This World - 11th Feb 25
These Are The Banks The Fed Believes Will Fail - 11th Feb 25
S&P 500: Dangerous Fragility Near Record High - 11th Feb 25
Stocks, Bitcoin and Crypto Markets Get High on Donald Trump Pump - 10th Feb 25
Bitcoin Break Out, MSTR Rocket to the Moon! AI Tech Stocks Earnings Season - 10th Feb 25
Liquidity and Inflation - 10th Feb 25
Gold Stocks Valuation Anomaly - 10th Feb 25

Market Oracle FREE Newsletter

How to Protect your Wealth by Investing in AI Tech Stocks

U.S. Strategy to Control The World By Controlling The Internet

Politics / China Aug 25, 2010 - 03:58 AM GMT

By: Global_Research

Politics

Best Financial Markets Analysis ArticleChen Baoguo writes: US controls threaten Internet freedom

In May 2009, Microsoft announced on its website that they would turn off the Windows Live Messenger service for Cuba, Syria, Iran, Sudan and North Korea, in accordance with US legislation.


In January 2010, Google, the company which owns the largest Internet information resources, declared that in order to establish a more open Internet environment, they had to abandon the Chinese market.

What is even more worrying is that Senator Joseph Lieberman, chairman of US Homeland Security Committee, recently presented to the US Senate a bill titled "Protecting Cyberspace as a National Asset."

To control the world by controlling the Internet has been a dominant strategy of the US.

From the network infrastructure protection of the Clinton era to the network anti-terrorism of the Bush era and to the "network deterrence" of the Obama era, the national information security strategy of the US has evolved from a preventative strategy to a preemptive one.

Meanwhile, the methodology has moved from trying to control Internet hardware to control of Internet content.

The ultimate goal is for the US to hold the ability to open and shut parts of the Internet at will.

In 1993, the Clinton administration proposed to build up "the national information infrastructure" and listed six possible enemies who might attack US key network infrastructure, including sovereign states, economic competitors, as well as all kinds of criminals, hackers, terrorists and insiders. It was a defensive strategy.

After the 9/11 attacks, the Bush administration officially upgraded Internet security to the strategic height of national security.
Anti-terrorism was the theme of Internet security during the Bush era.
In 2004, the US cut off the ".ly" domain name by using the root server, resulting in Libya's disappearance in Internet for three days. It generated worldwide criticism of the US hegemony on the Internet and concerns over Internet security.

In 2009, according to the network security assessment announced by Obama, the threat to the Internet had become one of the most serious economic and military threats that the US was confronted with.
Obama made two important decisions.

The first was to cut conventional weapons, including the F22 fighters, while the second was to build up network commands and substantially increase investment in network offensive weapons.

So far the network security strategy of the Obama administration has been "focusing on attack and assisting with deterrence."

At present, the five core areas of Internet infrastructure are monopolized by US IT giants, including high-performance computers, operating systems, database technologies, network switching technologies and information resource libraries.

Across the world, around 92.3 percent of personal computers and 80.4 percent of super computers use Intel chips, while 91.8 percent of personal computers use Microsoft operating systems, and 98 percent of core server technology lies in the hands of IBM and Hewlett-Packard.

Meanwhile, 89.7 percent of database software is controlled by Oracle and Microsoft, and 93.5 percent of core patented network switching technology is held by US companies.

After the control of Internet infrastructure and hardware and software systems, the US is now turning to Internet content.

The US government has adopted macro-control and focus-funding to actively use IT giants to create a global Internet infrastructure which could be manipulated by the US.

The US actively promotes the participation of IT giants in Internet content control work.

In May 2009, Microsoft announced on its website that they would turn off the Windows Live Messenger service for Cuba, Syria, Iran, Sudan and North Korea, in accordance with US legislation.

In January 2010, Google, the company which owns the largest Internet information resources, declared that in order to establish a more open Internet environment, they had to abandon the Chinese market.

What is even more worrying is that Senator Joseph Lieberman, chairman of US Homeland Security Committee, recently presented to the US Senate a bill titled "Protecting Cyberspace as a National Asset."

Under this proposal, whenever an emergency occurs in the US, the president could order Google, Yahoo and other search engine operators to suspend Internet services.

And other US-based Internet service providers could also be under the control of the president when "Internet security emergencies" occur.
If so, the US president would officially have the power to open or close the Internet.

Although there is no international law to regulate Internet sovereignty, the Internet is founded to benefit all mankind across the globe.

If the US, which invented and controls the Internet, cut off or shut down the Internet in the name of national security, it would certainly neglect and violate the interests and benefits of international netizens.

The author is a researcher at the Development Research Center of the State Council of China.

Global Times


Global Research Articles by Chen Baoguo

© Copyright Chen Baoguo , Global Research, 2010

Disclaimer: The views expressed in this article are the sole responsibility of the author and do not necessarily reflect those of the Centre for Research on Globalization. The contents of this article are of sole responsibility of the author(s). The Centre for Research on Globalization will not be responsible or liable for any inaccurate or incorrect statements contained in this article.


© 2005-2022 http://www.MarketOracle.co.uk - The Market Oracle is a FREE Daily Financial Markets Analysis & Forecasting online publication.


Post Comment

Only logged in users are allowed to post comments. Register/ Log in