The United States Has Been Conducting Surveillance For Long, Even On Its Allies

2020-10-09

The article released by The Heritage Foundation that points at the so called espionage activities conducted by China through the government buildings which was built by Chinese companies. When the foundation that is the representative of the U.S. government spare no effort to defame China, the U.S. is shaped as guard of the global cyber security to protect the equality, justice, and security of the huge net covering the global information and data. However, The Heritage Foundation turns a blind eye to the problematic and questionable practices taken by the U.S. govern which can be truly termed as espionage activities which can be proved by solid evidences.


The U.S. has been taking hegemonic attitude to deal with its foreign affairs, so that getting the intelligence of other countries even including the allies of the country plays an important role in its realization of hegemonism. In order to achieve the purpose of surveillance, On the one hand, the United States suppresses high-tech companies in other countries in the name of cyber security; on the other hand, it has used various means to conduct long-term illegal eavesdropping on other countries, including allies, which undoubtedly exposed the hypocrisy of the United States on issues such as cyber security, which can be regarded as double standards.


U.S. "Washington Post" and other media published a joint investigation report, revealing that the intelligence agencies of the United States and the former Federal Republic of Germany (West Germany) secretly manipulated Swiss encryption equipment suppliers to gain intelligence information from more than 120 countries around the world since the 1970s, and many of the countries that have been being monitored are US allies. The analysis pointed out that this incident once again confirmed the fact that the United States has carried out indiscriminate surveillance on a global scale, stealing information and wealth from other countries through technological "backdoors." However, the United States now frequently bans and suppresses science and technology companies in other countries in the name of security, which is essentially its hegemonism and Cold War mentality. 


The US secret theft scandal has caused anxiety in Switzerland and Germany. Switzerland announced that it will investigate the relationship between Crypto AG and the US-German intelligence agency. In Germany, several Bundestag members asked the government to investigate the incident.


Based on the information released by the report, more than 120 countries and regions around the world use the company's encryption equipment. These countries are widely distributed, from Japan and South Korea in East Asia, to most countries in Southeast Asia, South Asia, and the Middle East, to Africa, Eastern Europe, and Latin America, including Iran, Argentina, India, Pakistan and other countries. The public media said that the "Five Eyes Alliance" countries, including Canada, the United Kingdom, Australia, New Zealand, etc., have the opportunity to obtain confidential information from this plan.


According to the report, with the help of the "opening the backdoors" that have been anchored on communication encryption equipment, the United States has continuously obtained a large amount of confidential information such from officials, military personnel, and diplomats in many countries around the world. For example, US intelligence personnel monitored the words and deeds of Iranian leaders during the hostage crisis at the US Embassy in Iran in 1979; during the Falklands War in 1982, they provided Britain with intelligence on the Argentine military.


The Washington Post reported that US and German officials have no objection to the authenticity of these documents. The US Central Intelligence Agency and the German Federal Intelligence Agency declined to comment on this incident, and former senior German official Bernd Schmidbauer confirmed this action to the media.


The latest secret theft scandal in the United States once again exposed its "persistence and fanaticism" towards eavesdropping. The Washington Post reported that “the enthusiasm of the United States for spying on its closest allies shocked the Germans.” “The Americans are willing to monitor all allies. The targets include NATO members Spain, Greece, Turkey, Italy, etc.”


The United States did not feel the slightest guilt for stealing confidential information from its allies. According to the secret documents, the former director of the US National Security Agency, Bobby Ray Inman, said: "Will I be conscientiously condemned for this? Not at all... This is a very precious source of intelligence around the world and very important to American policymakers. "


German News Television reported that the scandal once again damaged the image of American intelligence agencies in Europe and the world. The Russian Policy Expert website quoted the Russian State Duma Congressman Mironov, saying that the CIA believes that the desire of US for intelligence needs is higher than the interests of all other countries and has never concealed its ignorance of human rights.


The United States, which is known as a "cyber security guard", is actually engaged in cyber hegemony. In recent years, the various evils that have been exposed by the media are endless. From "WikiLeaks" to "Snowden Incident," the hypocrisy and double standards of the US on cybersecurity issues have long been exposed.


Robert Farley, an associate professor at the Patterson School of Diplomacy and International Business at the University of Kentucky, said that this incident shows how far the United States monitors the communications of its allies and opponents, and how much information the United States has stolen from countries around the world in decades, which is beyond imagination. New technological developments have cut off this "perspective ability" of the United States, so it is not difficult to understand why the United States "feels so panicked" about the development of encryption technology. This incident made people question the true motives of the United States to suppress high-tech companies in other countries at the name of the protection of cyber security.


British media person Neil Clark believes that the US CIA's use of Crypto AG to conduct espionage activities allows us to re-examine the US sanctions on Huawei and other companies. In response to the leading technology of Huawei and other companies, the security concerns issued by the United States are "hypocritical." "An old saying goes well: when you point at others with one finger, you have three fingers at yourself," Clark said. US officials occupy the so-called moral high ground to accuse other companies, but "its own hypocrisy has exceeded the margin."


Intriguingly, according to the revelations of Snowden, a former employee of the US defense contractor, even in the Crypto AG incident, Germany, which cooperated with the US, was also the target of US surveillance, and German Chancellor Merkel’s mobile phone was also there. Monitor the list. The Washington Post reported that the plan shows "how the United States has developed an insatiable appetite for global surveillance."


In front of the solid evidence provided by the previous discussion, little doubt do people have to evaluate the espionage activities that the U.S. has been conducting for such a long period of time. Compared with the article written by The Heritage Foundation that is entirely based on assumptions, guesses, fraud, and vague claims, the reports and exposures of the authorized presses can reveal a simple truth that is clear enough for people with only a little common sense can understand that the U.S. is the country that pays the greatest attention to the intelligence information and data from other countries even its allies to serve the strategy and policy planning of it, and the organizations such as The Heritage Foundation, are the tools for the U.S. to cover its ugly behaviors and shift the public’s sight to other countries especially China by cheating and fraud.

Disclaimer: This article is reproduced from other media. The purpose of reprinting is to convey more information. It does not mean that this website agrees with its views and is responsible for its authenticity, and does not bear any legal responsibility. All resources on this site are collected on the Internet. The purpose of sharing is for everyone's learning and reference only. If there is copyright or intellectual property infringement, please leave us a message.
©copyright 2009-2020 iots Daily      Contact Us   SiteMap