Chapter 14. Conducting Operations in the Cyber-Space-Time Continuum

The United States, NATO, and the European Union all participate in cyber warfare games in order to create scenarios that can be utilized for offensive and defensive planning. However, many of these scenarios fall into the same traditional mode of combat that has served the US Department of Defense so well over the years—that of a known adversary who combines a kinetic attack with a supporting cyber attack. Unfortunately, with the exception of the Russia-Georgia conflict in 2008, that’s almost never the case. Not only does attribution continue to be an unsolved problem, certain government officials like Secretary of State Hillary Clinton are taking attribution for granted based on the skimpiest evidence.[41]

IPB, Intelligent Preparation of the Battlefield, was the former DoD acronym for knowing the lay of the land upon which a battle will be fought (it has since been changed to Joint Intelligence Preparation of the Environment).[42] Eventually, cyberspace will be incorporated into that doctrine; however, based on current thinking (as evidenced by a web search on the subject), it’s being bolted onto warfare in a three-dimensional world that should no longer be defined in three dimensions. A perfect example of this mindset is described in the article “Rise of a Cybered Westphalian Age”[43]:

First, the technology of cyberspace is man-made. It is not, as described by the early “cyber prophets” of the 1990s, an entirely new environment which operates outside human control, like tides or gravity. Rather, as its base, the grid is a vast complex system of machines, software code and services, cables, accepted protocols for compatibility, graphical pictures for human eyes, input/output connections, and electrical supports. It operates precisely across narrow electronic bands but with such an amalgamation of redundancies, substitutions, workarounds, and quick go-to fixes that disruptions can be handled relatively well as long as everyone wants the system to work as planned.

In the earliest days of the Internet, otherwise known as Web 1.0 (the Read-Only Web), this was certainly true. As we moved to Web 2.0 (the Read-Write Web), it became less true. The more integrated our physical and virtual lives become (Web 3.0), the further away from that definition we land. The fact that the authors of the paper still believe that cyberspace is nothing more than a man-made piece of hardware says volumes about how the domain is misunderstood at the highest levels of the DoD, which is obvious with the miscategorization of cyberspace as a fifth domain:[44]

Though the networks and systems that make up cyberspace are man-made, often privately owned, and primarily civilian in use, treating cyberspace as a domain is a critical organizing concept for DoD’s national security missions. This allows DoD to organize, train, and equip for cyberspace as we do in air, land, maritime, and space to support national security interests.

Theoretical physicist Basarab Nicolescu argues that cyber-space-time (CST)—a more accurate name than “cyberspace”—is both artificial and natural at the same time:[45]:

The information that circulates in CST is every bit as material as a chair, a car, or a quantum particle. Electromagnetic waves are just as material as the earth from which the calculi were made: it is simply that their degrees of materiality are different. In modern physics matter is associated with the complex relationship: substance-energy-information-space-time. The semantic shift from material to immaterial is not merely naive, for it can lead to dangerous fantasies.

One of Nicolescu’s influences was Nobel Laureate Wolfgang Pauli.[46] Pauli, in turn, was intrigued by Carl Jung’s theory of synchronicity. In fact, Pauli and Jung spent a great deal of time together because Pauli believed there was a relationship between Jung’s acausal connecting principle and quantum physics—specifically, a conundrum known as “quantum indeterminacy.”[47] In a kind of ironic twist, Carl Jung’s theory of synchronicity has its genesis in his fascination with an ancient Chinese oracle, The Book of Changes, or Yijing. Dating back to the Qin dynasty, this divinatory oracle teaches that the universe is composed of parts that are interconnected. The coins or yarrow stalks[48] used in the Yijing symbolize those parts, while their use symbolizes the mystery of how the universe works (Pauli’s quantum indeterminancy). Chinese emperors and generals have used this oracle since approximately 300 BCE, and it may still provide a glimmer of insight into the mysterious nature of this new age of cyber-space-time, as well as how cyber battles may be fought and won.

There are examples of synchronicity in both psychology and science. During one of Carl Jung’s many talks with Wolfgang Pauli on this subject, Jung described how a patient was relaying her dream of receiving a piece of gold jewelry in the shape of a scarab beetle and, in that exact moment, how a small goldish-green colored scarabeid beetle was repeatedly banging into the glass of Jung’s office window.[49]

A similar example in chaos theory, known as the butterfly effect, connects two seemingly disparate events:

The flapping of a single butterfly’s wing today produces a tiny change in the state of the atmosphere. Over a period of time, what the atmosphere actually does diverges from what it would have done. So, in a month’s time, a tornado that would have devastated the Indonesian coast doesn’t happen. Or maybe one that wasn’t going to happen, does.[50]

While both Jung and Pauli are from the early 20th century, Basarab Nicolescu is a contemporary theoretical physicist who believes that cyber-space-time is on par with organic systems:

The emergence of at least three different levels of Reality in the study of natural systems—the macrophysical level, the microphysical level, and the cyber-space-time—is a major event in the history of knowledge. The existence of different levels of Reality has been affirmed by different traditions and civilizations, but this affirmation was founded either on religious dogma or on the exploration of the interior universe only.[51]

Another important scientific theory, similar to chaos, is the complexity theory. Appropriately, both theories are children of the Computer Age because only computers are capable of performing the immense calculations needed to prove their existence. A complex system is one in which numerous independent elements continuously interact and spontaneously organize and reorganize themselves into more and more elaborate structures over time. The World Wide Web is a perfect example of complexity theory in action, evolving from Web 1.0 to 3.0 and whatever follows from there. The relationship that physics, psychology, and ancient Chinese oracles have with cyber warfare is that the terrain of cyber-space-time is not only chaotic and unknown, but unpredictable. Although network defenses stop millions of automated probes and drive-by attacks each day, we are always surprised by targeted attacks—which are the ones that really matter. Before we can design a superior plan to defend against the targeted attack, we need to understand how dependent we have become on this new networked and wired world.

The world’s militaries are struggling to cope with a new cyber battlefield because they are stuck in an old reality that no longer exists and are affected by a new reality they don’t understand. The following sections present a few examples of threat vectors that can cause significant havoc, yet which current cyber warfare doctrine ignores.

Anarchist Clusters: Anonymous, LulzSec, and the Anti-Sec Movement

Anonymous and the anti-sec movement have offered concrete proof of how effective chaotic attack clusters can be at defeating poorly defended organizations. Their victims have included the Atlanta Infraguard office, the Arizona Department of Public Safety, Vanguard Defense Industries, HB Gary Federal, and the CIA’s public website. Although it’s not a security organization, Sony had its web properties attacked more than 20 times in 60 days, which must be some kind of record. Anonymous hasn’t only gone after US targets—other victims have included the Columbian Black Eagles Special Police Unit, the UK Serious Organized Crime Agency, and government websites in Brazil, Tunisia, Italy, Zimbabwe, and Australia.

Anonymous, LulzSec, Phsy, AntiSecPro Security Team, and many other similar clusters of anarchist hackers and script kiddies haven’t used any advanced hacking techniques. They’ve been incredibly successful using nothing more than spear phishing, social engineering, and SQL injection when breaking into networks. Stolen information is then made public by hosting it on a public website like The Pirate Bay or PasteBin. They’ve been so successful at this that the Department of Homeland Security (DHS) took the unusual step of preparing and releasing a report on the organization.[52] While the FBI, Scotland Yard, and other international law enforcement agencies have made numerous arrests, it has had little effect on these ongoing operations. This is partly due to the nature of a loosely organized, widely distributed network that can randomly come together to form attack cells, then split apart and reform at a later date under new aliases. New members are eager to get involved since the barrier to entry is so low and the anti-establishment appeal is so high.

Social Networks: The Geopolitical Strategy of Russian Investment in Social Media

There is a troika of powerful individuals fueling the growth of the Russian Internet, as well as Russian investments in cyberspace, while serving the interests of the Kremlin. These men are Gleb Pavlovsky (founder, Foundation for Effective Politics), Vladislav Surkov (Deputy Chief of Staff of the President of the Russian Federation), and Yuri Milner (CEO, DST Global, Inc.). Their genesis of power and influence began in the mid-90s when the Russian Internet was still in its infancy. Today, with Twitter, Facebook, and YouTube live broadcasting the regime changes sweeping across Northern Africa and the Middle East, Internet-savvy politicians and businessmen are the new power brokers in the Kremlin.

Gleb Pavolvsky

The 1990s were the formative years of the Russian Internet (RuNET), led in part by Gleb Pavlovsky and his Foundation for Effective Politics. Pavlovsky saw the value of a Russian Internet early on and was instrumental in creating the first Russian online news magazine, Russkiy Zhurnal, and helping organize and fund the creation of Lenta.ru, Gazeta.ru, and other sites. He served on four presidential election campaign staffs in 1996, 2000, 2004, and 2008. Pavlovlsky’s publishing house, Yevropa, published Khroniki Informatsionnoy Voynyby (Information Warfare Chronicles) by Maksim Zharov and Timofey Shevyakov, which documented the online attacks between Russian and Georgian hackers during the five-day war in August 2008.[53] The book opens with the following paragraph:

Net wars have always been an internal peculiarity of the Internet—and were of no interest to anyone in real life. The five-day war showed that the Net is a front just like the traditional media, and a front that is much faster to respond and much larger in scale. August 2008 was the starting point of the virtual reality of conflicts and the moment of recognition of the need to wage war in the information field too.

As of April 27, 2011, Pavlovsky and the Foundation for Effective Politics have fallen out of favor with the Kremlin for political reasons having to do with the upcoming 2012 presidential election. According to RIA Novasti, Vladislav Surkov personally terminated EPF’s contract.[54]

Vladislav Surkov

Vladislav Surkov, known as the “Grey Cardinal” and the “Dark Prince of the Kremlin,” worked for Mikhail Khodorkovsky at Bank Menatep (1991–1996).[55] Surkov became Deputy Chief of Staff of the President of the Russian Federation in 1999—the same year that Boris Yeltsin resigned and Vladimir Putin became acting President (until the 2000 elections made it official). Surkov is considered the Chief Ideologue of the Kremlin and is an ardent proponent of online activism in support of the interests of the Russian Federation and the United Russia party. After Kyrgyzstan’s Tulip Revolution (2005), Surkov founded a youth organization called Nashi (“Us”) whose purpose was to support then-President Putin and the United Russia party against counteropposition groups both physically and in cyberspace. Nashi is funded in part by the Federal Agency for Youth Affairs, which is headed by cofounder Vasily Yakemenko.[56]

On May 21, 2009, Russian President Dmitry Medvedev signed an edict creating a presidential commission for the modernization and technological development of the Russian economy. Medvedev is chairman, and Vladislav Surkov is one of two deputy chairmen (Sergey Sobyanin, Chief of Government Staff and Deputy Prime Minister is the other). Yuri Milner is the only nongovernmental employee who serves on this commission, which makes his inclusion highly significant.

Yuri Milner

After graduating from the Wharton School of Business, Yuri Milner worked in Washington, DC for the World Bank until spring 1995 when he was recruited by Mikhail Khodorkovsky to run his investment brokerage company, Alliance-Menatep.[57] In February 1997 Milner became Deputy Chairman and Head of Investment Management for Bank Menatep.[58] During the next two years Milner was involved in evaluating investment opportunities for the bank—particularly, Internet properties. While at Menatep, he formed New Trinity Investments. When the bank lost its license in 1999 for financial misconduct (Khodorkovsky is currently serving time in a Russian prison), Milner branched out on his own and in 2000 launched an Internet services company called NetBridge, most likely funded through New Trinity.[59] In February 2001 NetBridge merged with another Internet company (Port.ru) and became Mail.ru, which—10 years later under Milner’s leadership—earned almost US$1 billion in its IPO on the London Stock Exchange.

Mail.ru was originally the press service for a large Russian conglomerate called Neftyanoi Concern, which is a major holding company with investments in the financial (Neftyanoi Bank), energy, real estate, food, and Internet sectors. In 2003 Milner went from CEO/Chairman of Mail.ru to Director General and Chairman of the Board for Neftyanoi Concern. In 2005 Neftyanoi Bank was charged with money laundering, and its CEO, Igor Linshits, eventually fled the country. Milner wasn’t charged with any wrongdoing, but this period of his life was not disclosed in the Goldman Sachs prospectus for the Mail.ru Group IPO, nor was it mentioned on his bio at the former Digital Sky Technologies website.

2005: A Turning Point

The year 2005 was a pivotal one for the Russian government. Longtime evangelists Pavlovsky and Surkov had a concrete event (the Tulip Revolution) that would substantiate the need for the Kremlin’s investment in Internet technologies. In a June 2005 interview with The St. Petersburg Times, Surkov said there would be no Orange Revolution in Russia:

“There will be no uprisings here,” said Surkov, who oversees the Kremlin’s relations with political parties, parliament, and youth organizations. “We realize, of course, that these events have made an impression on many local politicians in Russia—and on various foreign nongovernmental organizations that would like to see the scenario repeated in Russia.”

It was also in 2005 that Yuri Milner left Neftyanoi Concern and founded Digital Sky Technologies (DST) with cofounder Gregory Fingar of New Century Investments. From 2005 forward, the Russian Internet was not only just a place to do business, it had also become a new war-fighting platform from which attacks could be launched against both external and internal opponents with complete anonymity. In addition, it provided a self-funding open source intelligence operation for the Russian Security Services, thanks to the enormous popularity of social networks worldwide—the very networks that Milner and DST were busy investing in. As investments ramped up, so did the Kremlin’s use of cyberspace as an attack platform. Kyrgyzstan (2005), Estonia (2007), Georgia (2008), and possibly Kyrgyzstan again (2009) represent four well-known examples of Internet-based attacks against external opponents.

However, the Russian Internet was also being used to control internal dissent. In March 2009 Vladislav Surkov organized a conference of Russia’s top bloggers to announce a new Internet strategy for influence operations:[60]

“The aim of the conference is to work out a strategy for information campaigns on the Internet. It is formulated like this: To every challenge there should be a response, or better still, two responses simultaneously,” a source who is familiar with the process of preparations for the meeting explained. “If the opposition launches an Internet publication, the Kremlin should respond by launching two projects. If a user turns up on LiveJournal talking about protests in Vladivostok, 10 Kremlin spin doctors should access his blog and try to persuade the audience that everything that was written is lies.”

DST and the Kremlin

In May 2009, Yuri Milner was simultaneously promoted to a presidential commission (May 15) and closed his first $200 million investment in Facebook (May 26).[61] Six months later, as he continued to make investments in US social media companies, he was appointed to an almost year-long project by the Ministry of Communication and Information to analyze the scale and distribution of illegal content on RuNET.[62] Oddly, when this information was made public in a blog posting at Forbes.com, Milner’s attorney sent a letter to Forbes’ Managing Editor, which flatly denied that his client had ever served in such a capacity: “Mr. Milner has never led or been involved in a Ministry of Communications effort to crack down on illegal content on RUNET.”[63]

Milner’s reaction to the post, which Forbes removed immediately upon receiving the complaint (Forbes also had not conducted any fact-checking first), demonstrates how carefully he manages publicity around his background—particularly anything that would reveal his close relationship with the Kremlin. Even DST’s website has changed from a multipage site that listed all of its Internet properties to a single page (www.dst-global.com) with nothing but the name DST and an email address.

In 2010 DST made a series of investments in US social networking companies including Zynga, Groupon, and ICQ; however, Facebook remained its primary interest. After DST’s initial $200M investment, it launched a tender offer of $100M for Facebook employees’ stock. Then, in January 2011, it co-led a $500M round with Goldman Sachs to become one of Facebook’s largest institutional investors, owning approximately 10% of the company [22]. DST and its partners stand to profit greatly from Facebook’s inevitable IPO, which is predicted to occur in 2012 or 2013 [17]. In the meantime, on November 5, 2010, DST changed its name to Mail.ru Group and raised almost US$1 billion in an IPO on the London Stock Exchange.[64] They spun off a new investment company called DST Global “to continue to focus on Internet investments.”[65]

A few months later, the Russian government announced that Mail.ru Group’s CEO Dmitry Grishin would serve as a member of the League of Internet Safety, newly formed under the auspices of the Ministry of Communications and led by its Minister Igor Shchyogolev. The league’s primary purpose is to fight against child pornography and, eventually, other “negative” content by recruiting thousands of volunteers to act as informal Internet police. The likelihood that such a system will be used to restrict freedom of expression—which is currently found on RuNET— has not gone unnoticed by Russian journalists and bloggers, who fear it will lead to the same kind of censorship that occurs in China.[66]

The Facebook Revolution

If the Tulip Revolution of 2005 caused Vladislav Surkov to take steps to make sure that the Orange Revolution would not come to Russia, imagine the impact that the social media-fueled revolutions in Egypt, Tunisia, and Lebanon are having on the Kremlin. Russian President Dmitry Medvedev succinctly expressed his view on that topic at a session of the National Counter-Terrorism Committee in Vladikavkaz, North Ossetia on February 22, 2011: “They prepared such a scenario for us previously. And now they will try to put it into practice. But, in any case, this scenario will not succeed.”

President Medvedev did not specifically identify the “they” during the discussion; however, Russian press quickly tied the “they” to Russian unease over the West’s role in the color revolutions in Georgia, Ukraine, and Kyrgyzstan in the 2000s. The Russian press—The Moscow Times being the most prominent—pointed to increased discussion on Russian regime change taking place on LiveJournal, Facebook, and Twitter. The Moscow Times noted that all three are believed to have served as mobilizing tools for protesters in North Africa, especially in Egypt.

Deputy Prime Minister Igor Sechin endorsed The Moscow Times’ views by naming Google as a force behind the regime change in Egypt. Speaking to The Wall Street Journal, Minister Sechin said: “One should examine closer the events in Egypt, to look into what high-profile Google managers had been doing in Egypt, what kind of manipulations with the people’s energy had taken place there.”

The most expansive view, however, is that espoused by Militia Major-General Vladimir Ovchinsky (former Chief of the Russian Interpol Bureau, and current adviser to the Russian Federation Constitutional Court Chairman) in a March 3, 2011 interview with Moscow Komsomolskaya Pravda Online. According to General Ovchinsky, the cyber aspects of recent events were orchestrated by the heads of major Western technology companies to support the Obama Administration’s political objectives. General Ovchinsky insinuates that a “secret” White House luncheon with the heads of Facebook, Apple, Google, Twitter, Yahoo!, Netflix, and Oracle held after Mubarak’s resignation celebrated recent American success. According to General Ovchinsky, the US President was expanding on Internet techniques developed during his 2008 campaign: “Barack is striking while the iron is hot and is hastening, with the assistance of modern technology, to extend his Tunisian-Egyptian victory to other countries of the region and further across the world.”

In response, according to a March 2, 2011 St. Petersburg Times article,[67] the Federal Security Service (FSB) and Ministry of Internal Affairs (MVD) are proposing Criminal Code amendments making the owners of online social networks responsible for content posted on their sites. The article states that the amendments would force sites to record internal passport data for each registration, facilitating identification of individuals using the site. The article points out that both the FSB and MVD maintain components that operate on the Internet (MVD Directorate K and FSB Information Security Center) to identify “extremist” elements. The article also points out that the recently passed Police Law contains vague language authorizing police to order any organization to change or stop operations that contribute to criminal activity in any way.

Social networking services aren’t constrained by national borders. Facebook has almost 600 million members, with a majority residing outside of the United States. DST already owns or controls most of Russia’s social networks and, with its partners Tencent and Naspers, they dominate social media worldwide. This provides a unique platform for the Russian government to conduct influence operations, intelligence collection, and information warfare. This is due to the unique political environment that exists inside the Russian Federation, where relationships are built upon usefulness and end when that usefulness ends (e.g., Pavlovsky’s recent contract termination by Surkov). A timeline of DST’s recent high-profile investments shows a corresponding government affiliation shortly before or after each one:

May 26, 2009

DST invests US$200M in Facebook. Just days earlier it was announced that Yuri Milner was serving on the Presidential Commission; in November of the same year, Milner led a Ministry of Communications survey of illegal content on RuNET.

April 2010

DST buys ICQ from AOL and receives a US$300M investment from Tencent. In August 2010 Milner served on the Government Commission on High Technology, chaired by Putin.

November 2010

Mail.ru Group’s IPO raises US$1B on the London Stock Exchange. In February 2011 Mail.ru Group CEO Grishin sits on the board of the new League of Internet Safety.

Today, Yuri Milner and DST Global are seeing unparalleled success in Silicon Valley. Every new startup that graduates from the technology incubator Y Combinator receives $150,000 from DST. Traditional VCs have had to revise their term sheets because of DST’s generous deals. A new investment vehicle (DST-Global 2) has been set up for Western investors to take advantage of DST’s successful business model. However, none of the investment prospecti or company biographies that this author has found contain any information about Milner’s activities on behalf of the Russian government, nor his time at Neftyanoi or Menatep, nor how he managed to avoid being investigated when the other principals at both firms were found guilty. Investors and business partners of DST Global and DST Global 2 should be fully informed of the relationship among the company, its officers, and the Russian government, because the Kremlin is certainly interested in them.

Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec

Although the Committee on Foreign Investment in the United States (CFIUS) blocked Huawei’s effort to acquire 3Leaf,[68] and AT&T[69] was officially discouraged from purchasing equipment from Huawei by the National Security Agency, NSA, Huawei successfully formed a joint venture with Symantec in 2007 called Huawei Symantec Technologies Co. Ltd. (HS). Huawei is the majority partner at 51% ownership. HS headquarters are in Chengdu, China. According to the Huawei Symantec website (http://www.huaweisymantec.com):

Huawei Symantec Technologies Co. Ltd. (Huawei Symantec) is a leading provider of network security and storage appliance solutions to enterprise customers worldwide. Our solutions are developed to keep pace with evolving risks and demanding availability requirements facing enterprises. As a joint venture, Huawei Symantec combines Huawei’s expertise in telecom network infrastructure and Symantec’s leadership in security and storage software to provide world-class solutions that address the ever-changing needs in network security and storage for enterprises.

A 2008 “Corporate Briefing”[70] describes the history, capabilities, and business goals of HS, one of which is to “build China’s first laboratory of attack and defense for networks and applications” (slide 12). This essentially means that Symantec, a major US information security company, is assisting China’s cyber security research in computer network attack and defense; research that has high potential for abuse by state and nonstate actors in the PRC.

In early 2010 HS formed two new joint ventures with US companies SYNNEX (http://www.synnex.com/) and Force10 Networks (http://www.force10networks.com/):

  • SYNNEX (NYSE:SNX): “As part of this agreement, SYNNEX will distribute Huawei Symantec’s storage and security products to its resellers throughout North America.”[71]

  • Force10 Networks: “Huawei Symantec is pleased to establish this strategic partnership with Force10 Networks, and expects the relationship to further drive strong results for our existing North American customer base as well as tap into new business opportunities.”[72]

Both SYNNEX and Force10 Networks currently sell to the US government. Force10 Networks’ website says it sells its products to “...defense, intelligence and civilian agencies to advance the bandwidth needs and reliability demands of government IT infrastructure while ensuring the economics and performance of mission critical networks.” Since Huawei’s growth strategy includes financial support from Chinese banks, enabling Huawei to offer very low-cost bids on key contracts, and since many governments (including India and the United States) have legal provisions requiring them to go with the lowest bidder, these partnerships provide an apparently winning strategy. SYNNEX and Force10 Networks secure government sales thanks to Huawei Symantec’s low manufacturing costs—and HS’s name never appears on the contract.

In May 2011 Huawei Symantec secured its first high-performance storage cluster win: the University of Tennessee’s National Center for Computational Engineering.[73] Huawei Symantec defeated US firms NetApp, EMC, and BlueArc, among others, for the UT sale via its channel partner, MPAK Technology out of San Diego. The national security implications of the sale are visible at the SimCenter’s website (http://www.utc.edu/Research/SimCenter/):

The SimCenter: National Center for Computational Engineering is a center for integrated research and education whose primary goals are to establish next-generation technologies in computational modeling, simulation and design, to educate a new breed of interdisciplinary computational engineer who can solve a broad range of real-world engineering problems, and to provide consequent leadership and national impact in critical technology areas affecting defense, sustainable energy, environment, and health.

Huawei Symantec is aggressively looking for more channel partners in North America, which began with its first-ever channel summit in Cupertino, California in July 2011.[74] The joint venture has generated more than US$1B in revenue since it was founded in 2008, and it has operations in 42 countries (as of this writing.) Symantec CEO Enrique Salem is apparently happy with his investment of US$150M to launch the joint venture (Huawei put in zero cash) and is looking for options to increase his holdings, up to and including an IPO.[75]

Although there’s nothing illegal about either company’s actions, there is a clear threat to US security interests when one of the world’s leading information security companies (Symantec) has joined forces with a Chinese corporation with strong government ties. The potential security threats are numerous, including, for example, malicious code passed to Huawei hardware through updates or vendor support activities, or the coding of a backdoor in HS devices to intercept data at the source before it’s encrypted.



[41] Jeffrey Carr, “Why is Hillary Clinton so interested in cyber-attacks on Google?”, The Guardian, June 3, 2011, http://www.guardian.co.uk/commentisfree/cifamerica/2011/jun/03/china-gmail-hack-cyber-attack.

[42] “Field Manual 34-130—Intelligence Preparation of the Battlefield,” Enlisted.info, http://www.enlisted.info/field-manuals/fm-34-130-intelligence-preparation-of-the-battlefield.shtml.

[43] Chris C. Demchak and Peter Dombrowski, “Rise of a Cybered Westphalian Age,” Strategic Studies Quarterly, Spring 2011.

[44] Department of Defense Strategy for Operating in Cyberspace, July 2011.

[45] Basarab Nicolescu, “The Manifesto of Transdisciplinarity,” SUNY Press 2002.

[46] Even though Pauli’s lifetime preceded the Internet age, he wrote extensively about a unifying connecting principle that bridged mind and matter. Nicolescu references Pauli’s work, and calls that connecting principle cyber-space-time.

[47] “Indeterminacy,” The Information Philospher, http://www.informationphilosopher.com/freedom/indeterminacy.html.

[49] “Indeterminacy,” The Information Philospher, http://www.informationphilosopher.com/freedom/indeterminacy.html.

[50] Ian Stewart, Does God Play Dice? The Mathematics of Chaos (Wiley), p. 141.

[51] Basarab Nicolescu, “Methodological Foundation of Transcultural and Transreligious Studies,” www.esoteric.msu.edu/VolumeIII/HTML/Nicolescu.html.

[52] US DHS—National Cybersecurity and Communications Integration Center Bulletin, “Anonymous and Associated Hacker Groups Continue To Be Successful Using Rudimentary Exploits To Attack Public And Private Organizations,” A-0010-NCCIC-160020110719.

[53] “WWW. It’s Not Just a Virtual Country,” The New Times Online, February 16, 2009,

[54] “Kremlin tears up contract with Pavlovsky think tank,” RIA Novosti, April 27, 2011, http://en.rian.ru/russia/20110427/163737335.html.

[55] Richard Sakwa, “Surkov: dark prince of the Kremlin,” RIA Novosti, April 8, 2011, http://en.rian.ru/valdai_op/20110408/163429757.html.

[56] “Spin Doctor of All Russia. Vladislav Surkov—The Man with a Thousand Faces,” RIA Novosti, March 7, 2011.

[57] Parmy Olson, “The Billionaire Who Friended the Web,” Forbes.com, March 9, 2011, http://www.forbes.com/forbes/2011/0328/billionaires-11-profile-yuri-milner-billionaire-friended-web.html.

[58] “Personnel changes in the Manatees,” Kommersant, February 11, 1997, 8.

[59] New Trinity Investments is probably the vehicle for Milner’s first investment in NetBridge in 2000 since New Trinity Investment’s listed phone number also tracks to NetBridge.

[60] “Kremlin Ideologist Surkov Reportedly To Meet Bloggers To Plan Internet Strategy,” The New Times Online, February 16, 2009.

[61] Joseph Menn and Charles Clover, “Man in the news: Yuri Milner,” FinancialTimes.com, May 29, 2009, http://www.ft.com/intl/cms/s/0/f81bb0be-4c7d-11de-a6c5-00144feabdc0.html#axzz1Z7AyOAEo.

[62] “Yuri Milner Will Clean Up The Internet,” InFox.ru, September 12, 2009.

[63] Email from Daniel Tench to Lewis Dvorkin re: Jeffrey Carr’s Forbes article, “Facebook Investor Leads New Russian Internet Police,” February 11, 2011.

[64] John Bonar, “Russia’s Mail.ru IPO a resounding success on London Exchange,” BSR, November 8, 2010, http://www.bsr-russia.com/en/mergers-acquisitions-a-ipos/item/1109-russias-mailru-ipo-a-resounding-success-on-london-exchange.html.

[65] “Digital Sky Technologies (‘DST’) Changes Name to Mail.ru Group,” Business Wire, September 16, 2010, http://www.reuters.com/article/2010/09/16/idUS43356+16-Sep-2010+BW20100916.

[66] Kevin O’Flynn, “Russia Launches Initiative To Police Internet,” Radio Free Europe/Radio Liberty, February 8, 2011, http://www.rferl.org/content/russia_laimches_initiative_to_police_internet/2301671.html.

[67] “Kremlin’s Plan to Prevent a Facebook Revolution,” The St. Petersburg Times, March 2, 2011.

[68] John Leyden, “Huawei drops 3Leaf buy,” The Register, February 21, 2011, http://www.theregister.co.uk/2011/02/21/huawei_3leaf_deal_dropped/.

[69] George Leopold, “Report: NSA pressures AT&T on Huawei deal,” EE Times, October 8, 2010, http://www.eetimes.com/electronics-news/4209450/Report--NSA-pressures-AT-T-on-Huawei-deal.

[73] Joseph F. Kovar, “Huawei Symantec Intros SSD Array, Shows Hi-End Storage Roadmap,” CRN, July 19, 2011, http://www.crn.com/news/storage/231002111/huawei-symantec-intros-ssd-array-shows-hi-end-storage-roadmap.htm;jsessionid=CAsG5F-ZPtgy0wwMKckZ7Q**.ecappj03?pgno=1.

[74] Larry Walsh, “Huawei Symantec Seeks ’Wingmen,’” ChannelNomics, July 19, 2011, http://channelnomics.com/2011/07/19/huawei-symantec-seeks-%E2%80%98wingmen%E2%80%99/.

[75] Jim Finkle and Nadia Damouni, “Reuters Summit—Update 1—Symantec looking to buy,” Reuters, May 17, 2011, http://www.reuters.com/article/2011/05/17/idUSN1718067920110517.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.15.137.75