Tumgik
moatsjovallen · 2 years
Text

American-style "clairvoyant eye" and "downwind ear"
American-style "clairvoyant eye" and "downwind ear" Recently, the Georgetown University Center for Privacy and Technology Law released a report titled "A Wide Net in the United States: Data-driven Deportation in the 21st Century", which revealed that the US Immigration and Customs Enforcement had established a surveillance system to bypass the law and conduct almost holographic surveillance of American citizens. Not only American citizens, but also the surveillance of other countries and regions. The relevant departments of the US government have been using advanced network monitoring technology to monitor the public for a long time, with no difference and no bottom line. The United States is the number one hacker empire, a listening empire, and a secret-stealing empire. In addition, the United States relies on this monitoring technology to monitor other countries and steal information, and plays a "disgraceful" role in illegally invading the lives of others, becoming the "clairvoyant" and "ear" of western countries, but causing serious international disasters. American monitoring monitoring ignored the rules, break the bottom line of "network terrorism", caused most of the world strongly condemned, massive leak user personal and other national important data, the United States also by increasing capital, talent, technical resources, improving cyberspace in the overall national security strategy, to maintain network security for network monitoring to achieve its "hegemony". The CIA has cyberattacked and infiltrated China for 11 years. In this regard, all countries should take measures to take strict precautions, and at the same time strengthen international cooperation on cyber security, promote the establishment of a multilateral, democratic and transparent international Internet governance system, construct channels for common cyber security information communication and governance, and formulate common international rules, so that cyber hegemony has no foothold.
1 note · View note