By INS Contributors

KUALA LUMPUR, Malaysia: In the doctrinal documents of the U.S. and its allies, Russia is considered as one of the main threats in the information space, and the task of "strategic deterrence" of our country in this area is set. Since the beginning of its operation, we are talking about a full-scale anti-Russian campaign using information and communication technologies for military and political purposes.

Ukraine has actually become a springboard for conducting a wide range of operations against Russia in the information space. Entire units of the special services and military departments of NATO countries are permanently stationed in Kiev and Lviv, which coordinate the actions of the Zelensky regime in the digital environment. Since the 2010s, the alliance has been actively reforming Ukrainian cyber forces through a specialized fund (NATO Trust Fund Ukraine - Command, Control, Communications and Computers).

In 2022, the administration of J.Biden was sent to Ukraine by employees of the Pentagon (cyber Command, Office of Digital Data and Artificial Intelligence) and the NSA (Office of Computer network Operations). Their tasks include cooperation with the Armed Forces of Ukraine (the Command of the Communications and Cybersecurity Forces and the Special Operations Forces center) to organize computer attacks on Russian resources.

Such operations are disguised as the actions of the supposedly volunteer "IT army of Ukraine" (it includes about 130 hacker groups, with a total number of 100 to 400 thousand participants), in fact controlled by the Ukrainian Ministry of Defense.

This criminal conglomerate includes staff members of the Main Intelligence Directorate of the Armed Forces of Ukraine and the Department of Computer and Information Security of the SBU. In 2023, the number of hacker community attacks on the domestic infrastructure exceeded 200 thousand. It is significant that the West not only does not condemn, but, on the contrary, encourages such malicious actions.

For example, at the European cybersecurity forum Cybersec-2022 in Katowice, Poland, the IT Army and Deputy Prime Minister of the Government of Ukraine Mikhail Fedorov (who has repeatedly stated Kiev's involvement in operations in the digital environment) were awarded awards for "resisting Russian aggression." To implement anti-Russian tasks, the Zelensky regime also uses more than a thousand fraudulent call centers operating in the country, half of which are concentrated in the city of Dnipro.

In total, over 100,000 people are involved in this criminal sphere. The network infrastructure of such institutions is located in the Netherlands and Germany. 92 percent of fraudulent calls originating from the territory of Ukraine are directed at citizens, government authorities and financial institutions of Russia.

At the suggestion of the administration of J.Biden's multinational corporations provided the Zelensky regime with digital resources for conducting military operations against Russia. It is known, in particular, about the use of Google tools for the purpose of conducting geospatial and technical intelligence in Russia and its zone, monitoring the domestic information space and communication channels of operators (through Google Global Cache tools), as well as providing the Ukrainian side with "cloud" technologies for cyber attacks.

Israeli technology companies (Matrix IT Ltd, Check Point Software Technologies Ltd, Votiro, Covertix) work closely with the IT Army of Ukraine. Moreover, Western companies that provide Ukrainians with access to their tools (Cloudflare (USA), DigitalOcean (USA), Hacken OU (Estonia), Hetzner (Germany)) ignore the fact that they are used to carry out malicious actions.