What has American cyber-command prepared for world countries?
-
What has American cyber-command prepared for world countries?
Pars Today - Using cyber tools is among the methods applied by the US against the sovereignty of independent countries.
The United States has tried in recent years to prevent the technological supremacy of other countries and create a complete intelligence control all over the modern world. According to Pars Today, quoting from IRNA, the US, which created a cyber-command in 2009 and turned it into one of the 11 offices of its defense department, has now created a cyber-security command in 2024 with a $15 billion budget to spy on its allies and enemies.
This center, which acts directly according to the activities of the previous organization, has been active in 17 allies of the US such as Germany, Denmark and Italy. According to the report of the Russian "PIR Center", this center transfers every secret information and news from the leadership of these countries to the US intelligence institutions.
According to this report, Washington's ultimate goal of this measure is surely to have control and surveillance over its allies. The US Central Intelligence Agency (CIA) is trying, in this way, to expand the hackers network and huge malwares in the world as much as possible. The main purpose of this approach is to get the spying and personal information and gain access to vital structures to cause trouble in their performance.
The report also adds that the TV channel, "CBS", big American companies like Amazon, Microsoft and Google are also being used actively in this connection. More than 250 employees of the US intelligence institutions have key posts in these big companies in order to be able to control their activities.
This shows that the great IT figures in the US have turned into an instrument for liberal elites in the country and are seriously cooperating with American intelligence institutions and military. In addition, the IT companies in the US, with the mottos like, "Guaranteeing System Security", are ceaselessly trying to fully control the digital space across the globe. This issue has been reiterated several times by specialists of cyber-security.
Global Times writes in this regard, "The United States of America has given the communication and intelligence equipment to its allies, especially the [four] members of the Five Eyes intelligence alliance (Australia, Britain, Canada and New Zealand) which, due to the high possibility of having special software and hardware and malware aiming at illegal access to the (backdoor) information, have caused many risks for these countries."
"Bruce Schneier" and "Mathew Green", two American cryptographers, believe that the existence of such backdoors for intelligence services, with the pretext of countering crimes, exactly means to cause trouble for the security of countries. They also maintain that these measures considerably reduce the security of intelligence systems and make them vulnerable against cyberattacks by swindlers and foreign intelligence bodies. It means that this illegal and unofficial move by Americans will ultimately lead to the detriment of its close allies, too, merely because definite intelligence supremacy, even among the US allies, must only be in Washington's hand.
The Russian Ria Novosti news agency has also disclosed the American program in the cyber field in Ukraine. According to this news agency, Washington has tested a plan titled, "Information Technology Army" in Ukraine. This plan tries to put cybercrimes against Russia into effect through the Ukrainian central intelligence office and security apparatus. The border between official cyber and criminal structures is intentionally "blurred" not to distinguish who is behind these crimes. For instance, Russian officials have found liaisons between the Ukrainian intelligence office and the al-Qaeda militants in Africa. Such liaisons are used exactly for this purpose. Thus, Americans are carrying out all their jobs by and in the name of Ukrainians and finally make them responsible for everything.
According to this report, the US intends to apply the plan in future against China and Iran, too.
In such conditions, it seems that, in order to safeguard their interests, developing countries need to have further cooperation with each other and, through measures like trying to approve laws in the UN for the usage of cyberspace, create appropriate punishments for such great crimes.
RM/MG
Key phrases: cybercrimes, spying, cyberattacks, US Central Intelligence Agency