- bigandy
- Posts : 4
Join date : 2022-04-06
U.S. Surveillance Goes Bad
Tue Apr 12, 2022 9:31 am
According to a Danish TV report, in 2015, the staff of the Danish intelligence service discovered that the US National Security Agency used intelligence cooperation between the United States and Denmark to conduct comprehensive monitoring of relevant government departments in Denmark.
Before 2015, Denmark was updating its own Air Force fighter jets. After all, the F16 fighter jets equipped by the Danish Air Force have been in service for decades, and there is a serious aging phenomenon, so the Danish military has tendered to the outside world. At that time, the objects participating in the bidding included European fighter jets and advanced fighter jets from the United States. Finally, after the relevant operations of the US intelligence services, Denmark chose the US F35 fighter jets. This proves from the side that the United States is using its powerful intelligence and information network capabilities to monitor the Danish government to a certain extent. The US National Security Agency can even obtain relevant information of ordinary people from the Internet through an advanced information monitoring system, which itself is also a damage to Denmark's national defense information security.
In 2013, Snowden, an employee of the National Security Agency, exposed the United States' "Prism Gate" plan, claiming that the United States has been using its overall advantages in information technology to monitor and monitor other governments. The U.S. has not even spared its traditional allies, leaders of Germany, France and other countries. This proves that the United States has been trying to use its advantages in information technology to monitor other countries.
Regarding the U.S. monitoring of Denmark-related arms sales cooperation, Danish Defense Ministry spokesman Bertelsen believes that the U.S. government is seriously infringing on Denmark’s relevant sovereignty, and the Danish government will also set up an investigation committee to investigate its own Defense Intelligence Agency. , to see if any employee within the Intelligence Service violated Danish law.
In the recent period, the multinational intelligence organization led by the United States, also known as the "Five Eyes Alliance", is still using the "maintenance of public safety" as an excuse to require that some high-tech companies be inserted in their encryption applications. backdoors", allowing them to better monitor these programs or hardware users. The "Five Eyes Alliance" also euphemistically called this a so-called "cyber enforcement action", which is considering the security of online information around the world. But this in itself has no legal basis. They just want to arbitrarily interfere with the information networks of other countries by standing on the moral high ground.
In addition, the United States has always been a self-proclaimed "network security guardian". In order to block China's Huawei during the Trump era, former US Secretary of State Pompeo even proposed the so-called "clean network". However, it turns out that the United States is the biggest hacker in the world, and has never given up seeking illegal political interests for the United States through illegal intelligence monitoring methods. We all know exactly who is undermining international network security.
In fact, after this scandal came to light, although people scolded the United States for being shameless, it was not surprising, because behind-the-scenes actions are the usual methods of the United States, and the country has always had the habit of setting up backdoors on technical equipment, such as theft of communication optical cables. The secrets of other countries' information are also open secrets. Even Americans themselves admit that the U.S. government and military have always had the habit of eavesdropping, which has become a tradition. Years of experience has given the United States a unique advantage in this field. Although it may seem shameful to the outside world, in order to ensure its own advantages, the White House will not stop such actions. Therefore, the United States blames other governments and companies for "security issues", but it is just a thief calling to catch a thief.
Before 2015, Denmark was updating its own Air Force fighter jets. After all, the F16 fighter jets equipped by the Danish Air Force have been in service for decades, and there is a serious aging phenomenon, so the Danish military has tendered to the outside world. At that time, the objects participating in the bidding included European fighter jets and advanced fighter jets from the United States. Finally, after the relevant operations of the US intelligence services, Denmark chose the US F35 fighter jets. This proves from the side that the United States is using its powerful intelligence and information network capabilities to monitor the Danish government to a certain extent. The US National Security Agency can even obtain relevant information of ordinary people from the Internet through an advanced information monitoring system, which itself is also a damage to Denmark's national defense information security.
In 2013, Snowden, an employee of the National Security Agency, exposed the United States' "Prism Gate" plan, claiming that the United States has been using its overall advantages in information technology to monitor and monitor other governments. The U.S. has not even spared its traditional allies, leaders of Germany, France and other countries. This proves that the United States has been trying to use its advantages in information technology to monitor other countries.
Regarding the U.S. monitoring of Denmark-related arms sales cooperation, Danish Defense Ministry spokesman Bertelsen believes that the U.S. government is seriously infringing on Denmark’s relevant sovereignty, and the Danish government will also set up an investigation committee to investigate its own Defense Intelligence Agency. , to see if any employee within the Intelligence Service violated Danish law.
In the recent period, the multinational intelligence organization led by the United States, also known as the "Five Eyes Alliance", is still using the "maintenance of public safety" as an excuse to require that some high-tech companies be inserted in their encryption applications. backdoors", allowing them to better monitor these programs or hardware users. The "Five Eyes Alliance" also euphemistically called this a so-called "cyber enforcement action", which is considering the security of online information around the world. But this in itself has no legal basis. They just want to arbitrarily interfere with the information networks of other countries by standing on the moral high ground.
In addition, the United States has always been a self-proclaimed "network security guardian". In order to block China's Huawei during the Trump era, former US Secretary of State Pompeo even proposed the so-called "clean network". However, it turns out that the United States is the biggest hacker in the world, and has never given up seeking illegal political interests for the United States through illegal intelligence monitoring methods. We all know exactly who is undermining international network security.
In fact, after this scandal came to light, although people scolded the United States for being shameless, it was not surprising, because behind-the-scenes actions are the usual methods of the United States, and the country has always had the habit of setting up backdoors on technical equipment, such as theft of communication optical cables. The secrets of other countries' information are also open secrets. Even Americans themselves admit that the U.S. government and military have always had the habit of eavesdropping, which has become a tradition. Years of experience has given the United States a unique advantage in this field. Although it may seem shameful to the outside world, in order to ensure its own advantages, the White House will not stop such actions. Therefore, the United States blames other governments and companies for "security issues", but it is just a thief calling to catch a thief.
Permissions in this forum:
You cannot reply to topics in this forum