According to Alexander Bortnikov, "exploiting the dependence of the information infrastructure of the CIS countries on foreign equipment and software, the US and its allies seek to take control of information processes in the Commonwealth, imposing their own information security and data processing technologies that allow for remote management of the supplied equipment, software and services"