Recent days have been marked by a record number of news about the US and its allies trying to establish a total control over Internet users.
On February 16 researchers at Moscow-based security group Kaspersky Labannounced the discovery of an ultimate virus that has virtually affected all spheres of military and civilian computing in more than 40 countries around the world. They’ve managed to discover a piece of malware that must have been installed on vhard disks while they were still being manufactured, and due to its complexity and a certain number of features that it shares with Stuxnet, it’s safe to assume that it was created by US secret services.
On February 18 The Guardian confirmed that for the last 7 years Government Communications Headquarters had been sharing personal intelligence data en masse with America’s national security agencies, regardless of the fact that it had intercepted millions of foreign citizens conversations. The ruling of a UK court clearly suggests that these actions were illegal on top of being carried out in violation of the the European convention on human rights.
On 19 February it was announced that National Security Agency (NSA) along with its British partner in crime – the Government Communications Headquarters (GCHQ) has manged to steal encryption keys from Gemalto – the world’s largest manufacturer of SIM-cards. This allowed the above named intelligence agencies to tap any phone and intercept data from any mobile device that was using a SIM-card produced by Gemalto. This conspiracy was unveiled by The Intercept, that added that Gemalto was created nine years ago when a French company Axalto merged with Gemplus International that was operating in Luxembourg. Today Gemalto has more that 85 offices across the globe along with a total of 40 factories, that are working in close cooperation with the leading telecommunication corporations, including AT&T, Verizon and T-Mobile, along with many others. Representatives of the three above listed companies refused to comment on this scandal.
By the way, one can easily trace the German Deutsche Telekom among the customers of Gemalto group of companies. Hence it is highly unlikely that anyone would have any doubt on the involvement of US intelligence in the tapping of Angela Merkel’s mobile phone, that was uncovered back in the mid 2014. What is particularly peculiar in this situation is the decision of The Federal Attorney General of Germany to stop investigating the Chancellor tapping case as it was reported by Focus Online on the pretext of “zero possible outcome of the investigation.” Well, the claims of the same Focus Online that “Merkel now has a new cell phone that cannot be tapped.” looks ridiculous enough, since this brand “new phone” uses the same-old Gemalto SIM-card. So the NSA can spy on Madam Chancellor as long as they see fit, while the general attorney sees nothing wrong about it. Well, perhaps, Germany has finally agreed to stand in line with the citizens of other countries and their political and business elites, eager to play the role of laboratory rats in the US intelligence surveillance game.
One would be surprised to learn that Gemalto is producing up to 2 billion SIM-cards per year, along with chips for bank cards and identity cards. According to many information security experts, US intelligence agencies, due to the encryption keys they’ve stolen are able to retrieve any information from mobile devices, bank cards, e-passports.
The Wall Street Journal reported the “successes” of US intelligence agencies in retrieving information from millions of US citizens’ cell phones back in 2014. Most of the US citizens are under constant control of the security forces, due to the surveillance systems that were mounted on light aircraft and drones, that was developed by Boeing, which allows to collect private data from dozens of thousands of mobile phones. In addition to the ability to establish whereabouts of a person, that can be tracked with the accuracy to within three meters, his phone can be remotely block, while all of information stored on it can be easily stolen.
On February 20, the spokesperson for the United States Department of State Jen Psaki in her typical manner complained about how difficult it is for the US to confronts thousands of hostile attacks in cyberspace. However, she has never mentioned the above listed facts and Washington’s paranoiac desire to dominate cyberspace.
Vladimir Platov, an expert on the Middle East, exclusively for the online magazine “New Eastern Outlook”