The International Battleground of the Internet

The internet is a battleground and no one is safe. In fact, recently my desktop was hijacked by ransomware. I didn’t pay the ransom, but I did pay a local computer business to fix the problem and that cost me several hundred dollars.

This year, at the G-20 Summit, Trump met with Putin for a scheduled thirty-minute talk that turned into several hours behind closed doors, and The Daily Beast says, “Donald Trump Just Set the Table for Vladimir Putin’s Next Election Hack.”

But Russia is not the only player in the cyber-warfare battlefield. The German Police and Intelligence Agencies hired a company to create Trojans capable of capturing traffic from Skype and SSL, and in 2001, the recording industry wanted the right to hack into our computers and delete stolen MP3s.

After a Chinese fighter collided with an American surveillance plane in April 2001, Chinese hacker groups cyber-attacked American businesses causing millions of dollars in damage.

The Carders“, cyber-criminals that specialize in using a sophisticated and automated process to steal information from credit cards, have made off with billions.

When the Cult of the Dead Cow gains access to a computer, they can spy on all of us through our own webcams and microphones. Imagine what the Dead Cows discover and maybe film if that webcam is in your bedroom or bathroom.

The American National Security Administration’s (NSA) Red Team is suspected of distributing malicious software across the web acting as illegal hackers, but they do it legally under the protection of U.S. law.  In 2008, an elite U.S. Military Unit shut down a Saudi-CIA Website that was seen as a threat to US security. Learn more from the NSA’s disturbingly successful hack of the American military.

Mother Jones reports that Britain’s NSA [the GCHQ] listens to its citizen’s phone calls too, and recently Reuters reports, “The U.S. government will seek to collaborate with Israel and other countries to develop new ways to thwart computer hacks and other cyber-attacks.”

While Russia is ramping up cyber-attacks and the alleged U.S. President Donald Trump ignores the evidence, The New York Times reported in 2016, “Nine months after President Obama and President Xi Jinping of China agreed to a broad crackdown on cyberespionage aimed at curbing the theft of intellectual property, the first detailed study of Chinese hacking has found a sharp drop-off in almost daily raids on Silicon Valley firms, military contractors, and other commercial targets.”

Now that Trump is president and reversing everything that Obama accomplished, is that good-deal dead too?

Lloyd Lofthouse is the award-winning author of My Splendid Concubine, Crazy is Normal, Running with the Enemy, and The Redemption of Don Juan Casanova.

Where to Buy

Subscribe to my newsletter to hear about new releases and get a free copy of my award-winning, historical fiction short story “A Night at the Well of Purity”.

About iLook China

China’s Holistic Historical Timeline

4 Responses to The International Battleground of the Internet

  1. Ronald D Chism says:

    ” In 2008, an elite U.S. Military Unit shut down a Saudi-CIA Website that was seen as a threat to US security.”

    There is not one institution on earth that can be trusted, including the U.S. military. But, that 2008 intervention by the U.S. military sounds like a good one. I would like to read up on that.

    The CIA runs rampant for its DEEP STATE bosses, although I’m told that there are huge rifts within the CIA–as if there’s a kind of civil war going on unbeknownst to the rest of us.

Comments are welcome — pro or con. However, comments must focus on the topic of the post, be civil and avoid ad hominem attacks.

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: