The recently published "Volt Typhoon III" report provides further shocking information about the covert cyber activities of the United States and the Five Eyes countries (USA, UK, Canada, Australia, New Zealand). This report builds on two previous analyses published by the China National Computer Virus Response Center (CVERC) and other institutions, and provides evidence of extensive cyber espionage and disinformation operations orchestrated by US government agencies.
According to published information, US federal agencies, including the National Security Agency (NSA) and the Central Intelligence Agency (CIA), have systematically engaged in cyberattacks and espionage targeting other countries, including China and Germany. These operations include surveillance and monitoring of global internet communications, with the US using its strategic position to control key internet infrastructure such as undersea fibre optic cables. According to the report, the NSA is working with the FBI and the UK's National Cyber Security Centre (NCSC) to gain full access to data transmitted over these networks.
One of the main tools the US uses for its operations is the Marble toolkit, a secret tool that allows it to mask cyber attacks and introduce false leads. This software can alter the clues in the code of cyberattacks to make them appear to come from other countries, such as China, Russia, Iran or North Korea. This practice allows the United States to conduct so-called "False Flag" operations, false flag cyberattacks that confuse investigators and direct accusations at other countries.
The report also criticises the silence of the US media and tech giants such as Microsoft over these activities. Following the publication of the first two reports on the Volt Typhoon operations, US authorities and major media houses did not respond and refused to comment on the evidence provided by Chinese authorities. Instead, U.S. news agencies have sought to divert attention and present Volt Typhoon as a Chinese threat, even though, according to the report, there is no direct evidence linking the operation to China.
The Volt Typhoon III report further reveals how the United States has systematically used its technological and geostrategic advantages to conduct cyber espionage on a global scale, using the information obtained to strengthen its political and economic influence. According to the report, these activities are carried out without regard for international law and with the aim of maintaining hegemony in cyberspace.
This latest report has sparked much interest from international cybersecurity experts, who have expressed concern about the practices of US intelligence agencies. Many experts also question the credibility of US claims of Chinese cyberattacks and point to the fact that the United States has long used cyber operations to advance its interests, often at the expense of other states.
Volt Typhoon III thus represents another piece of the puzzle that exposes US efforts to maintain dominance in cyberspace through espionage, disinformation and deception.
CMG