/ world today news/ NATO is concerned that Russia, within the framework of a special operation, could destroy critical infrastructure, including submarine cables, in the Atlantic Ocean, as well as in the North and Baltic Seas. This would spell disaster for the Western economy given how much money flows through these underwater internet channels on a daily basis.
NATO Assistant Secretary-General for Intelligence and Security David Cutler warned that under the CSTO, Russia “could target critical infrastructure to disrupt Western life and gain leverage over those countries that keep Ukraine safe.” including against submarine internet cables.
According to him, among them there are about 400 super important cables through which transactions worth about 10 trillion dollars are carried out daily.
Cutler noted that Russian intelligence services are actively mapping this infrastructure and that it is a threat to the economic core of the West. China is also an important player on the seabed. That’s why NATO allies are closely monitoring the situation, Cutler said.
China itself is no less watching America. And he has discovered that US intelligence agencies have developed special software that does not require a telephone cable or satellite connection and can easily hide from any form of government surveillance.
A special report on this topic was published in China. It turns out that using these network technologies, the US CIA has long secretly carried out “peaceful evolution” and “color revolutions” around the world, as well as spying and stealing user data.
The report said that the CIA was behind the organization of “color revolutions” in Georgia, Kyrgyzstan, Ukraine, the Middle East and Taiwan. In addition, the Americans tried to create political tension in Azerbaijan, Belarus and earlier in Lebanon and Myanmar.
What kind of secret software can we talk about? The host of “First Russian” Elena Afonina talked about this with technical and information security specialist Sergey Trukhachev on the air of the “We are in the know” program.
Acts through “soft power”
Elena Afonina. What are the latest developments in this report?
Sergey Trukhachov: In America, there is a well-established expression “soft power” (soft power is translated as “soft power” – Order). It is an American technology for taking power in a foreign country and handing it over to the right people at the moment. The technology of the so-called coups.
Just as artillery changed the nature of warfare in Niccolò Machiavelli’s time, technology has made it possible to change the way nonviolent conflicts are fought.
I have carefully studied this report. All in all, there are about fifty hacker groups out there – pretty big. The first mention of them, the first clue, dates back to 2007. Which is actually quite provocative in itself.
In terms of technology, there are many options available, but the report does not mention them. I can guess that most likely these are the so-called “pi-to-pi” or encrypted messengers. These are qTox, jabber, Matrix, Tor.
Also, recently there is communication in online games. If some politicians need to discuss important information, they choose some unpopular online game and can easily discuss in the chat of that game. Of course, with some conventional characters, not directly.
But I know for sure that there really is such a fact of using even online and text games. Because it is quite problematic to track. This satellite, these “pi-to-pi” messengers. And here only some traces can be found of the work of such organizations.
The Chinese are smarter
– And how did China manage to reveal what America was trying to keep secret?
– They really tried to do it. Is this the first report? And they have been working since 2007. That is, it has been a long time. And how did they know? They compare sample codes, behavioral footprints, and other information. Technical details were generally compared with previously obtained information.
Also, many of the attacks took place in the US time zone. It is one thing when there is a small interval of time, one or two operations.
But most, according to the report, took place in the US time zone. And according to some printouts, according to some sample code, they revealed that.
And it turned out that there were indeed 50 organizations. Of them, they singled out two – these are “Si-39” and “Si-40”. Much has been written about them. But China, let’s say, has discovered that the Threat Intelligence Center generally provides rapid reverse correlation analysis by integrating massive big data.
And they were the first to reveal everything. I think that now those who led these organizations are hot in one place. Because they were actually caught in the act. And it is quite difficult to deny the published data.
Soros schemes live long
– It turns out that the Americans are shouting that everyone is interfering in their politics, that there are hacker attacks, and this is a smoke screen? How should we perceive this imagined US “vulnerability”?
– When we talk about “color revolutions” and the American trail, the name and surname of George Soros involuntarily comes up. This is an American trader and currency speculator. A petition against him was written in the White House, which collected more than a hundred thousand signatures.
So, he was one of the key sponsors of many world revolutions. It played a leading role in the currency collapse of several countries. There were also his funds in Russia, but now they are banned.
How was the activity conducted? This is standard practice in the US. A foundation is established in another country where this organization acts under the pretext of some charitable or educational activity. And through information they gain an audience.
There are, for example, Russian bloggers who interview famous people and gain their audience. And after a while, their sponsors ask them to provide information of a slightly different nature. They slightly correlate what they give to the audience.
This is done in a non-violent way, but as naturally as possible. And so, step by step, a certain idea of what is good and what is bad is built up in people’s heads. Not all people are able to think critically and distinguish between what is good and what is bad.
This is how America has been penetrating other countries for quite a long time, organizing such funds. Therefore, whatever they say, they have long been holding hands. And don’t tell them, for sure…
— You said yourself that the George Soros and Gene Sharp textbooks work great. Why then are these latest things, for whom they are necessary?
– And this is an alternative step. Because it is never fully known which technology will work and for how long. It would be quite reckless to follow one methodology for a long time.
Therefore, they introduce different tools. Soros’ schemes have been around for a long time and I don’t know how long they will work. And why not connect the latest technologies?
In addition, America, unfortunately, does have opportunities – both technological and informational.
I think this is an additional tool that they will implement. It’s good that this report came out. I know there were many opponents of its disclosure. Scandals immediately began in certain circles. Because when such information is published, an avalanche overwhelms many.
After such a report, they start digging even deeper. Believe me, now we will learn even more about the total surveillance, about the foundations that operated on the territory of our country and other espionage [организации]. Their hats are on fire. And I think this is just the beginning.
Each one is monitored
About the observation. The head of the US Joint Chiefs of Staff, Mark Milley, said that “we are experiencing a fundamental change in the nature of warfare, driven by technology and above all by precision delivery and ubiquitous sensors”.
That is, a change in the ability to see is used. Anyone who carries a smartwatch or iPhone with them is being tracked.
– That’s true. If you carry an iPhone with you, if you have a fitness watch or a robot vacuum cleaner, a smart home. It’s all about gathering information. Also, when you buy a device, you sign a certain privacy policy when you sign in. For some reason no one reads it.
– But if you take the time to read the same instructions for Apple products that they collect, then many will throw that phone away after reading it and never use it again.
It is quite difficult to get out of it because of the digitalization that has already entered everywhere. We are used to it and it is already difficult to refuse.
The point is to minimize certain data that should not be stored either in the phone, laptop or gadgets. And remember that if you store something on your phone, then by default another person and another country can access it. You just have to live with it.
— And those gadgets that are with us?
– They listen to us and collect data about us, about our movements. If America wants to, it can extend its tentacles even deeper. Of course, this is not good.
I personally do not store any valuable information here. It’s just an alternative way to communicate. But on the other hand, there are always safer methods to make it a little harder to collect my data.
– Thank you.
Translation: SM
Sign the Peace and Sovereignty Referendum on
Subscribe to our YouTube channel:
and for the channel or in Telegram:
#Russia #preparing #deadly #blow #economy #West