body-container-line-1
29.03.2017 Opinion

US Cybercrimes

By Clement Kpeklitsu
US Cybercrimes
29.03.2017 LISTEN

Last publication by WikiLeaks of some 9,000 documents showing the methods used by the US security services to carry out criminal cyber-espionage, exploitation, hacking and disinformation operations all over the world.

The documents reveal that the Central Intelligence Agency (CIA) possesses the ability to exploit and control any internet-connected device, including mobile phones and “smart” televisions. These tools, employed by an army of 5,000 CIA hackers, give the agency the means to spy on virtually anyone, whether inside or outside the United States, including foreign governments, allies and “friends”, as well as international organizations such as the United Nations.

The WikiLeaks documents expose the United States as the world’s greatest “rogue state” and “cyber criminal.” The monstrous US espionage network, paid for with hundreds of billions in tax dollars, uses diplomatic posts to hide its activities from its “allies,” spies on world leaders, organizes kidnappings and assassinations and aims to influence or overturn elections all over the world.

The documents expose the CIA’s use of the US consulate in Frankfurt, Germany as a base for its spying and cyber operations throughout Europe, employing a network of intelligence personnel including CIA agents, NSA spies, military secret service personnel and US Department of Homeland Security employees. Many of these operatives were provided with cover identities and diplomatic passports in order to hide their operations from the German and European governments.

The revelations have already begun to reverberate around the world. German Foreign Ministry spokesman Sebastian Fischer said that Berlin was taking the revelations “very seriously,” adding, “issues of this kind emerge again and again.” Meanwhile Germany’s chief prosecutor has announced an investigation into the contents of the documents. “We will initiate an investigation if we see evidence of concrete criminal acts or specific perpetrators…We’re looking at it very carefully.”

With increasing frequency, aggressive foreign policy moves by Washington have been palmed off by the media and political establishment as defensive responses to “hacking” and “cyber-espionage” by US geopolitical adversaries: Russia and China. For months, news programs have been dominated by hysterical allegations that Russia “hacked” the Democratic National Committee in order to subvert the 2016 election. As the print and broadcast media were engaged in feverish denunciations of Russia, the US and its NATO allies moved thousands of troops and hundreds of tanks to the Russian border. Just one day after the WikiLeaks revelations, the media spin machine was already busy portraying them as part of a Russian conspiracy against the United States, and indicting WikiLeaks for acting as an agent of foreign powers.

Not content to allege interference only in the American election, the US media and its international surrogates have alleged Russian meddling in elections in France, Germany and other far-flung countries. Prior to the current furor over Russian “hacking” of the election, the Obama administration used allegations of “hacking” and “intellectual property theft” to justify the trade sanctions and military escalation against China that accompanied its “pivot to Asia.”

Whenever the State Department, unnamed “intelligence officials” proclaim alleged “cyber” provocation by Washington’s geopolitical rivals, news anchors breathlessly regurgitate the allegations as fact, accompanying them with potted infographics and footage of masked men in darkened rooms aggressively typing away at computer keyboards.

To Fox News, he said Trump is “absolutely right” to claim he was wiretapped and monitored. “His phone calls, everything he did electronically, was being monitored.”

US spy agencies trample on Bill of Rights protections. Their spying domestically and abroad is pervasive. Anything goes is official policy, rule of law principles circumvented. Edward Snowden earlier said he hoped his revelations would make people worldwide aware of how their freedoms and protections are compromised.

Mass surveillance goes on in ways few people realize. Numerous techniques are used – metadata collected unrelated to national security without court authorized warrants. Phone conversations are recorded, emails collected and stored. New WikiLeaks documents revealed that the american security services can circumvent encryption, turn television sets into listening devices, and monitor people in ways that never imagined. From our stolen constitutional rights to our freedom is reminding us how the German populace must have felt under Nazi authoritarian control.

Microchipped drivers licenses , passports, credit cards as well as backdoor installed GPS monitoring and spying devices in our cell phones have illicitly, secretly been in place for years now. Biometrics like facial and voice recognition and implanted microchips are all New World Order population control mechanisms.

The types of spying and disruption mechanisms revealed in the documents constitute a key instrument US foreign policy, which works to subvert the democratic rights of people all over the planet in the interest of US democracy. No methods, whether spying, hacking, blackmail, murder, torture, or, when need be, bombings and invasion, are off the table. America needs enemies to advance its imperial agenda. None exist so they’re invented – a pretext for current wars, future ones, color revolutions, old-fashioned coups and assassinations.

It’s been the American way from the republic’s inception, a culture of violence persisting at home and abroad since the 18th century, far more dangerous with today’s super-weapons able to kill and control us all.

body-container-line