Did WikiLeaks Sound the Death Knell of Western Tech Dominance?

© NASA . PixabayScience and technology
Science and technology - Sputnik International
Subscribe
Exactly three years after the mysterious disappearance of Malaysia Airlines MH370 on March 7 2014 (17:19 UTC time), the international whistleblowing site WikiLeaks dropped a bombshell on how the US Central Intelligence Agency could weaponize just about every "smart device" on the planet.

According to WikiLeaks: "Year Zero introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of ‘zero day' weaponized exploits against a wide range of US and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones."

Samsung working conditions compared to medieval by new research by ITUC. - Sputnik International
Manual: How to Tell if The CIA Spies On Your Smart-TV
How about Boeing 777-200s laden with US hardware and software? Was MH370 a "pilot study" — pardon the pun — for Washington's cyberwarfare capabilities? Radars developed by the West are useless under such circumstances and may instead blink a huge red "Russia did it" across the screen as soon as a false flag unfolds in real-time. This is perhaps best accompanied by a holographic sickle and hammer and Putin emoticons to drive home the point!

The US intelligence community has turned the global village into a prison planet; one where bedrooms are no longer sacrosanct, bank accounts are no longer secure and national secrets can be retrieved from deceptively "secure" channels and archives. Smart cars can be remotely commandeered to snuff out pesky citizens who get in the way of a train wreck called the United States!

But what apocalyptic scenarios were Year Zero and Zero Day referring to? Did Russia earlier get wind of them? Did the election of Donald Trump finally throw a spanner into the works? Both possibilities may explain the endlessly juvenile hissy fits — replete with threats of war — from US politicians and diplomats as well as their Western lackeys in recent years.

Freeware or Spyware?

The geopolitical and commercial fallout from the March 7 WikiLeaks disclosure have yet to be tabulated. The old adage — there is no such thing as a free meal — should now incorporate a reference to freeware offered by the altruistic Google and its cohorts to software developers worldwide. The masterplan seemed ingenious: Unsuspecting tech developers would be perfecting software modules, apps and scripts that would reduce every house, office and government agency into a potential listening post for the US deep state.

Surrounded by British police WikiLeaks founder Julian Assange, centre, makes a statement to the media and supporters from a window of Ecuadorian Embassy in central London. - Sputnik International
Time Is Running Out for WikiLeaks Founder Julian Assange in Ecuadorian Embassy
Endowed with such near-panoptic capabilities, it is little wonder why US lawmakers are least perturbed by their nation's continued slide across many global indices, including an infrastructure which Trump justifiably likened to Third World levels.

But why bother with such trifles when an army of US intelligence employees and private contractors can snoop on the best ideas, concepts and patents being developed in real-time by unsuspecting foreigners worldwide? If blueprints can't be pilfered due to declared proprietorship in the open source domain, trapdoors still remain open for the denial, disruption and degradation of a variety of developmental undertakings worldwide. US software is now a malignant parasite residing in the body of the global host — reminiscent of plots from the Alien movie franchise.

More ominously, children are now made ever more vulnerable to online predators within the US intelligence hydra and there is growing expectancy that the next WikiLeaks exposé may implicate Washington's movers and shakers in a massive pedophile scandal.

Cyber-Bull in the China Shop?

The WikiLeaks revelations may have provided China with a heaven-sent opportunity to end the US global surveillance complex. While Silicon Valley produces most of the compromised software in use worldwide, the accompanying hardware is mass-manufactured in China. According to WikiLeaks, smart devices and routers from China's Huawei and ZTE as well as Taiwan's Zyxel were among those exploited by the CIA for its global hacking operations.

Unmanned U.S. Predator drone. (File) - Sputnik International
Trump's 'Reaffirming the Right of CIA to Decide Whom to Kill and Where'
The WikiLeaks disclosure however is a double-edge sword for China. Except for the economically disenfranchised, privacy and security concerns may now take precedence over free apps popularized by increasingly cheaper Chinese hardware.

According to WikiLeaks, The CIA reportedly "lost control" of its panoply of hacking tools entailing several hundred million lines of code. Just who has control over them now? Is there a dark net franchise business going on here?

WikiLeaks is not releasing details of these "armed" cyberweapons until "a consensus emerges on the technical and political nature of the CIA's program and how such ‘weapons' should be analyzed, disarmed and published." There are good reasons for these precautions. Cybersecurity Ventures estimates that the annual global cybercrime costs will grow from $3 trillion in 2015 to $6 trillion by 2021.

Will Chinese smart device manufacturers, particularly in the telecommunications industry, take note and plug Western software backdoors? Or will it be business as usual once the patches are fixed by mainstream telco players? In a reversal of the CIA's shenanigans, more than 700 million budget Android smartphones were recently discovered to contain a secret "backdoor" that relayed user text messages, call logs, contact lists, location histories, and apps data to China every 72 hours.

Cybersecurity - Sputnik International
US Accusing Russians in Yahoo Hack Attempt to Take Attention Off 'Vault 7'
There is perhaps a good reason why US software and telco giants have been rather quiet over global piracy issues in recent years. Tightening the global IP regime may entail greater native scrutiny and legal obligations on the part of the software provider — and crippling lawsuits if the real goods ultimately worked against the interests of the user.

China's recent initiative to promote cyber sovereignty within the international community, particularly the BRICS bloc, will be stillborn unless it can bring a greater degree of integrity, discipline and order to its expansive telecommunications industry. The core RIC (Russia, India and China) nations in the emerging Greater Eurasia bloc are software powerhouses in their own right, and there is no reason why these nations should not pool their resources to create the nuts, bolts and algorithmic scripts of a secure Eurasia.Net

In the meantime, WikiLeaks is promising more shocking exposes ahead. These are interesting times indeed!

Mathew Maavak is a writer and geopolitical observer residing in Malaysia.

The views expressed in this article are solely those of the author and do not necessarily reflect the official position of Sputnik.

Newsfeed
0
To participate in the discussion
log in or register
loader
Chats
Заголовок открываемого материала