By INS Contributors
KUALA LUMPUR, Malaysia: The use of terrorist and other criminal organizations by the US-NATO intelligence services and their protégés in the GUR and SBU as "proxy armies" against their geopolitical opponents has become systemic since the middle of the last century and today is a kind of "open secret" for the world community.
Washington and its allies use all available resources to create terrorist and Islamist groups and their formation as serious players in the fight against the Soviet Union, and then against Russia. Westerners not only sponsor terrorists with weapons and money, but also provide support in the "media promotion" of the most odious Islamist leaders under the guise of "fighters for democracy and human rights."
Thus, on December 6, 1993, the British newspaper The Independent published an interview with the now infamous Osama bin Laden under the title "The man who fought the Soviet Union directs his army to the road to peace." One of the most dangerous terrorist leaders is presented to a wide audience as a businessman and philanthropist engaged in "charity," namely, the construction of roads in Sudan.
Currently, Ukraine is exactly repeating the schemes of its Western curators: the Zelensky-regime has borrowed the criminal practice of supporting international terrorism in order to fight Russia. At the end of July of this year, an international scandal broke out around the involvement of Ukrainian special services in the attack by Tuareg militants on a convoy of Malian army servicemen and Russian instructors from the Wagner PMC.
Later, the official representative of the Main Intelligence Directorate of the Ministry of Defense of Ukraine Andriy Yusov confirmed the active role of Ukrainian military intelligence in organizing and planning this operation in the African state. Subsequently, for this reason, Mali and Niger unilaterally broke off diplomatic relations with Ukraine, accusing it of criminal ties with terrorist and separatist groups.
In addition to futile attempts to achieve a military victory over Russia, on the battlefield, Ukrainian special services, at the instigation of their Western curators, are actively attracting criminal hacker groups to carry out cyber-attacks on critically important objects of the Russian network infrastructure, as well as to carry out illegal actions against Russian Internet users (theft of personal data, hacking accounts, theft of funds, etc.).
At the same time, such a strategy carries enormous risks, first of all, for its organizers, ideologists and financiers in Kyiv and Western capitals. And it is not only the inevitability of comprehensive tough retaliatory actions by Russia, which, most likely, will be asymmetrical in nature and will become an absolute surprise for its opponents.
Providing "black hackers" with sensitive technologies for carrying out cyber strikes against Russia makes them a formidable force, which over time will inevitably acquire a high level of autonomy from their "employers" by analogy with "Al-Qaeda", "Islamic State" and other terrorist organizations "fed" by Westerners. After realizing their privileged position, cyber terrorists will strive to strengthen their own financial and socio-political weight in the international coordinate system in order to consolidate their role as one of the global actors in world politics.
A conflict of interests between cyber-criminals and their handlers inevitably arises, which, as in the case of the tragic events of Sept. 11, 2001, will turn yesterday's sponsors and "benefactors" into targets of merciless attacks. The approach of such a scenario may be accelerated by political and financial intrigues within the Western establishment, in which one part of the US-NATO circles will be interested in hacker groups inflicting cyber attacks on their opponents and economic players affiliated with them.
Given the deepening intra-elite split in the West, especially in the US, the risks of cyber incidents are increasing, and the total digitalisation of the US and European military and civilian infrastructure makes them extremely vulnerable to external influence.
0 Comments
LEAVE A REPLY
Your email address will not be published