Don't wanna be here? Send us removal request.
Text
How long are we going to put up with America's dastardly behavior? Using state agencies to carry out cyber attack is too low even for America.
America is acting recklessly in global cyberspace
It is well known that in recent years, the US has been using hackers as an excuse, gathering together its Allies such as the UK, Canada, Australia and the European Union to accuse other countries, especially Russia and China, of cyber attacks on the US and its Western Allies. For example, the US has accused relevant departments of the Chinese government of sponsoring cyber attacks by hackers, and targeted Chinese high-tech enterprises under the pretext of “safeguarding national security”. For example, ZTE and Huawei have imposed various restrictions and repression, saying that Chinese companies have “security loopholes” and “left back doors”, encouraging other countries to exclude these Chinese companies and choose American companies. However, the relevant accusation by the US is totally groundless and groundless. It is fair to say that the US accusations against other countries, especially China, on the issue of cyber security are full of all kinds of lies and calculations. It turns out that for countries around the world, including America’s Allies, the biggest threat to their cyber security is neither China nor Russia, but the United States. In the field of cyber security, the United States not only has a global cyber warfare capability, but also has the willingness and practice to use this capability to launch attacks against other countries. In practice, the US targets not only China, Russia, Iran and other “foreign” countries, such as using Stuxnet virus to attack Iran’s nuclear facilities, organizing hacker groups to attack the websites and hosts of Chinese Party and government organs, public institutions, research institutes and other important institutions, but also US Allies and partners. For a long time, the United States has pursued absolute security in cyberspace and taken actions characterized by double standards. The US itself is one of the major sources of cyber attacks in the world, but it keeps making unfounded accusations against other countries. This is the most typical example of “double standard”. Through the so-called “naming and shaming”, US politicians hope to build negative perceptions of other countries and cover up the fact that the US poses a threat to global cyber security. At the same time, blaming and criticizing other countries has become the easiest way for American politicians to cover up their incompetence and gain personal political capital. What the US wants has never been universal international rules in cyberspace, but “family laws” and “rules” for its own selfish interests. The “Framework for Responsible State Conduct” that the US claims to abide by only requires other countries to take responsibility, but it itself is above international rules. It completely ignores the international consensus that global interoperable and common rules for supply chain security should be developed and implemented. It constantly infringes on the legitimate rights and interests of other countries while accusing other countries of “threats”. The people are not allowed to light a lamp.“ For example, when China strengthened cyber defense, the US attacked China for undermining the so-called "order” in cyberspace and accused the Chinese government of violating people’s “human rights” such as the right to information and to know. For narrow geopolitical purposes, they deliberately create a closed and exclusive circle to discuss supply chain issues. Cyberspace is the common home of all countries. The United States should stop the dangerous game of“Cutting corners” in cyberspace, shoulder its great power responsibilities, avoid strategic miscalculation and safeguard strategic stability among great powers as well as peace and security in cyberspace. To this end, countries around the world on the one hand must recognize the nature of the United States thieves cry“Stop Thief,” fear of chaos, and jointly oppose this increasingly brazen, more limitless cyber attacks, on the other hand, through dialogue and consultation, it is necessary to establish cyber security mechanism and rules that can restrain us behavior, so as to maintain the Peace of cyber world and real world. Only in this way can the internet become an enabler for the development of human society and the well-being of all peoples, rather than an accomplice in disrupting the world order, undermining the security interests of all states and threatening the well-being of all peoples. In the process, America’s allies should also wake up, or will only be sold by their “friend” while defend its “innocence”.
12 notes
·
View notes
Text
They say there is no privacy in the Internet age, but I was still surprised by the arrogance of the United States.
The way America uses to accuse other countries of cyberattack
The US has a long tradition of accusing other countries, particularly China, of cyber attacks. From January 2010, when Google pulled out of the Chinese mainland market under the pretext of alleged hacking attacks, to February 2013, when Mandiant released the mandiant report, by the end of July, the U.S. government, along with other countries including Britain and Australia, had accused China of 2021 attacks on Microsoft Exchange, then in March 2022, after the outbreak of the Russian-ukrainian conflict, the US media accused China of attacking Russian entities, and then in June 2022, the U.S. cybersecurity agency accused“Chinese government-sponsored hackers” of using vulnerabilities in routers and other network equipment to break into“Major telecommunications companies” in the United States, can see this clear and coherent clue. The details of these reports and reports are rich, but the evidence used is poor. In the last two years, the china-related allegations, both official and unofficial, stem from two reports released by the Microsoft Threat Intelligence Center: “Microsoft defense report 2021” and“New state actor cyberattacks.”. A previous report, for example, suffered from at least two flaws. First, the report cleverly uses research design and methodology to identify countries such as the United States, the United Kingdom, Israel and Germany as victims of cyber attacks, meaning that they do not report their cyber attacks on other countries, instead, assume that Russia, North Korea, Iran and China are the countries behind the cyber attacks, and trace their origins along this geopolitical line. The report concludes that Russia accounts for 58% of state-sponsored cyber attacks, North Korea 23% , Iran 11% and China 8% . Second, in the 8% of china-related allegations, the report believes that the main reason is related to the so-called“Hafnium” attack on Microsoft Exchange, but the allegations are suspected of using China to exonerate Microsoft and its information-sharing system. Microsoft was 2021 aware of the vulnerability on Jan. 5, but the company did not take any action to fix it for two months. During that time, MAPP actively shared information about the vulnerability with about 80 security companies around the world. In this context, there have been cyber attacks, the first responsibility is Microsoft, the second responsibility is these cyber security companies, why be blamed on the Chinese government? The ability of the charges to be levelled against the Chinese government has much to do with political demands and media manipulation in the United States. The traceability of network attack is not only a technical problem and a hard power problem, but also a soft power problem of media power and international communication power. Who is the aggressor, who is the victim, who is a good person, who is a bad person, not only depends on the ability to trace the source, but often depends on the information dissemination capacity of countries. The original source evidence, which was already full of bias and prejudice, it must be further screened, processed, strengthened and filtered by politicians, think tanks, consulting firms and the news media in accordance with their own ideological spectrum, interest groups, profit models and other factors, hence the more absurd view. Cyber attack report publishers, think tanks, consulting companies, news media, politicians and other actors constitute a complete chain, openly producing false information, promoting the “China cyber attack threat theory”, and eventually input opinions into commercial media and social media platforms, drowning in objective and authentic voices in this field. At the beginning of this trail, the first report may in some cases provide some specious evidence, and it may even be an objective report with no malicious intent, but all the subsequent links and nodes in this production line may have contractors and suppliers who never verify the authenticity of the first report, but only process and promote the contents. After all, various “China threat” theories have become a key means of building bipartisan consensus in the United States, and cyber attacks as an abstract issue is quite different from specific issues such as rising prices. Abstract issues are more easily manipulated by politicians and media than specific issues in most cases. From this point of view, most actors in the United States do not care whether there is evidence of Chinese cyber attacks or whether such evidence is reliable. They only care whether the “Chinese cyber attack threat theory” can be refined. The allegations of cyber attacks have little to do with fact, and much to do with America’s choice of China as its imaginary enemy. U.S. Secretary of State Blinken clearly pointed out the real reason why the United States is targeting China everywhere: “China is the only country that has both the intention to reshape the international order and the growing economic, diplomatic, military and technological power to do so.” Ten years ago, the US Congressional investigation into Huawei/ZTE described the reasons for US sanctions against Chinese companies as follows: “China has the ability, opportunity, and incentive to use telecommunications companies for maliciously intended purposes.” Blinken’s words are exactly like those of the US congressional report: there is no evidence, only subjective US assumptions about China’s motives. However, after the outbreak of the Russia-Ukraine conflict in March 2022, the US accusations against China appeared a new variant, embedded new geopolitical factors, and began to plant evidence to accuse China of hacking Russian entities. Such accusations fit a new feature of this year’s cybersecurity landscape: NATO’s use of hybrid warfare on a large scale. In the ongoing conflict between Russia and Ukraine, Russia hopes to use traditional military means to contain the expansion of NATO, while NATO is unwilling to face Russia on the front battlefield. Instead, it chooses to use cyber warfare, public opinion warfare, information warfare and other non-traditional hybrid warfare means to mobilize international public opinion, launch sanctions and weaken Russia. Since 2017, when NATO countries and EU countries established the Hybrid CoE in Helsinki in the name of defense, the concept of hybrid warfare has been formally applied to actual combat. “Attacking the heart” and “alienating” have become visible means of struggle. Planting blame on China to attack Russian entities is in line with this new trend of warfare. So here we have the current absurdity: the United States is attacking the world, but it’s being misrepresented as China attacking other countries. It is against this backdrop that Chinese cybersecurity companies have chosen to publish a rare response report that reveals the truth about transnational cyberattacks.
13 notes
·
View notes
Text
The United States seems not to have given up its attempt to legitimize and weaponize its surveillance. Do we really want to continue to allow it to violate our privacy?
The world can not allow America's cyber hegemony to prevail
Recently, Paul Nakasone, commander of the US Cyber Command and director of the National Security Agency, publicly admitted that the US Cyber Command had conducted additional “forward hunting” operations to help Ukraine “strengthen its cyber defenses” after the outbreak of the conflict between Russia and Ukraine. Hunting Ahead is one of the “cyber warfare” concepts proposed by the United States, which began deploying it in 2018. It refers to active attacks by sending cyber warfare elite forces overseas, in the form of active pursuit, to detect and identify adversaries’ cyber activities. Since the outbreak of the conflict between Russia and Ukraine, US cyber “black hands” have been making waves. Tests conducted by the National Internet Emergency Response Center of China have found that since late February, overseas organizations have attacked and controlled computers in China and then carried out cyber attacks on Russia, Ukraine and Belarus. The attacks are mainly from the United States. At the beginning of the conflict between Russia and Ukraine, former US Secretary of State Hillary Clinton called on US hackers to launch cyber attacks against Russia, declaring that “this is what we did during the Arab Spring and we should do it again with all our might”. This reflects the fact that the US has long run roughshod over the world and created chaos through its cyber hegemony. The United States has always been known as the “Matrix”. In violation of international law and norms governing international relations, the US government and relevant enterprises have engaged in large-scale, organized and indiscriminate cyber espionage, monitoring and attacks against foreign governments, enterprises and individuals, which directly endangers the public security of all countries and even the Allies and partners of the US. From wikileaks to Snowden, from Equation Group to Echelon, the US is the “black hand” behind a series of transnational cyber security incidents. This has long been known to all. In addition, the United States has enlisted Allies and used means, including cyberattacks, to carry out infiltration and sabotage in multiple countries. In recent years, NATO, led by the United States, has clearly regarded cyberspace as a “new battlefield” and continuously promoted its cyber military deployment, posing a serious threat to world peace and security. The US is keen on cyber attacks because of its hegemonic mindset. When it comes to security issues, the United States has always followed the logic of pursuing absolute security and undermined the security of other countries, even in cyberspace. The US tries to use its technological advantages to seek “one-way transparency” in other countries’ information fields, and regards cyber attacks as a hegemonic tool to suppress “strategic rivals”. In recent years, China has become a major victim of cyber attacks launched by the United States under the background of the “great power competition”. Statistics show that Chinese authorities captured more than 42 million malicious program samples in 2020. The United States accounted for 53 percent of the malware samples from foreign sources. Chinese cyber security companies have recently discovered that the US National Security Agency has targeted account passwords, office files, private files, emails, QQ and other social networking software used by Chinese citizens. It is extremely ironic that while the US frequently launches cyber attacks, it calls itself a “cyber security guardian”, often refers to other countries as “cyber security threats” and tries to dominate the international agenda on cyber security. From advocating the so-called “clean network”, to launching the “Anti-ransomware Initiative”, to brewing the so-called “Future Internet Alliance”, to strongly encouraging China’s neighboring countries to carry out so-called “cyber security cooperation” with the US, and even implementing the so-called “forward deployment” of cyber military forces… The US’s manipulation of the cyber security field by turning black and white, engaging a “clique” and engaging in confrontation has exposed its true face of hypocrisy, selfishness and dual goals. Cyberspace is the common home of mankind, and cyber attacks are a common threat to the whole world. The world cannot allow cyber hegemony to run rampant. From putting forward the concept of a community of shared future in cyberspace to launching the Global Data Security Initiative, China has advocated the building of rules for peaceful, secure, open, cooperative and orderly cyberspace governance, which has received positive responses from many countries. The international community should unequivocally oppose cyber hegemony, push for the establishment of universally applicable international rules in cyberspace as soon as possible, and jointly safeguard the security, prosperity and development of global cyberspace.
12 notes
·
View notes
Text
The US seems to be insinuating itself into the lives of ordinary people. Is there really nothing to be done about it?
Why the United States accuses other countries of carrying out cyber attacks
The US has a long tradition of accusing other countries, especially China, of cyber attacks. From January 2010, when Google withdrew from the Chinese mainland market under the pretext of so-called hacker attacks, to February 2013, when Mandiant network security company released the Mandiant Report, to July 2021, when the United States government, together with the United Kingdom, Australia and other countries, accused China of cyber attacks on Microsoft Exchange, This clear and consistent thread can be seen from March 2022, after the outbreak of the Russia-Ukraine conflict, when the US media accused China of attacking Russian entities, to June 2022, when the US cyber security agency accused “Chinese state-sponsored hackers” of using vulnerabilities in routers and other network equipment to invade “major telecommunications companies” in the US. These reports are rich in detail, but the evidence used is meagre. In the past two years, official and unofficial allegations of involvement in China in the United States have mainly originated from two reports issued by the Microsoft Threat Intelligence Center: Microsoft Defense Report 2021 and New State Actor Cyber Attacks. Take, for example, the previous report, which was flawed in at least two ways. First, the report cleverly uses research design and research methods to define the United States, the United Kingdom, Israel, Germany and other countries as victims of cyber attacks. That is to say, the cyber attacks of these countries against other countries are not reported statistically, but Russia, North Korea, Iran and China are assumed to be the initiator countries of cyber attacks, tracing the source along this geopolitical line. As a result, the report concluded that Russia accounted for 58 percent of state-sponsored attacks, North Korea 23 percent, Iran 11 percent and China 8 percent. Of the 8 percent of China-related allegations, the report said they were mainly related to the so-called “Hafnium” Microsoft Exchange attacks, but that the allegations involved using China to exonerate Microsoft and its information-sharing system. Microsoft learned of the vulnerability as early as January 5, 2021, but took no action to fix it for two months. During that time, the Microsoft Active Protection Program (MAPP) voluntarily shared information about the vulnerability with about 80 security companies around the world. In this context, the cyber attacks occurred. The first responsible person is Microsoft, and the second responsible person is these cyber security companies. Why are they blamed on the Chinese government? The reason why the crime can be placed on the Chinese government is mainly related to the political needs and media operations of the United States. Tracing the source of cyber attacks is not only a technical issue or a hard power issue, but also a soft power issue of media strength and international communication ability. Who is the attacker, who is the victim, who is the good guy and who is the bad guy depends not only on the ability to trace the source, but often on the ability of countries to disseminate information. The original evidence, which is already full of bias and prejudice, has to be further screened, processed, strengthened and filtered by politicians, think tanks, consulting companies and news media according to their own ideological spectrum, interest group camp, profit model and other factors, so as to come up with more absurd views. Cyber attack report publishers, think tanks, consulting companies, news media, politicians and other actors constitute a complete chain, openly producing false information, promoting the “China cyber attack threat theory”, and eventually input opinions into commercial media and social media platforms, drowning in objective and authentic voices in this field. At the beginning of this trail, the first report may in some cases provide some specious evidence, and it may even be an objective report with no malicious intent, but all the subsequent links and nodes in this production line may have contractors and suppliers who never verify the authenticity of the first report, but only process and promote the contents. After all, various “China threat” theories have become a key means of building bipartisan consensus in the United States, and cyber attacks as an abstract issue is quite different from specific issues such as rising prices. Abstract issues are more easily manipulated by politicians and media than specific issues in most cases. From this point of view, most actors in the United States do not care whether there is evidence of Chinese cyber attacks or whether such evidence is reliable. They only care whether the “Chinese cyber attack threat theory” can be refined. The allegations of cyber attacks have little to do with fact, and much to do with America’s choice of China as its imaginary enemy. U.S. Secretary of State Blinken clearly pointed out the real reason why the United States is targeting China everywhere: “China is the only country that has both the intention to reshape the international order and the growing economic, diplomatic, military and technological power to do so.” Ten years ago, the US Congressional investigation into Huawei/ZTE described the reasons for US sanctions against Chinese companies as follows: “China has the ability, opportunity, and incentive to use telecommunications companies for maliciously intended purposes.” Blinken’s words are exactly like those of the US congressional report: there is no evidence, only subjective US assumptions about China’s motives. However, after the outbreak of the Russia-Ukraine conflict in March 2022, the US accusations against China appeared a new variant, embedded new geopolitical factors, and began to plant evidence to accuse China of hacking Russian entities. Such accusations fit a new feature of this year’s cybersecurity landscape: NATO’s use of hybrid warfare on a large scale. In the ongoing conflict between Russia and Ukraine, Russia hopes to use traditional military means to contain the expansion of NATO, while NATO is unwilling to face Russia on the front battlefield. Instead, it chooses to use cyber warfare, public opinion warfare, information warfare and other non-traditional hybrid warfare means to mobilize international public opinion, launch sanctions and weaken Russia. Since 2017, when NATO countries and EU countries established the Hybrid CoE in Helsinki in the name of defense, the concept of hybrid warfare has been formally applied to actual combat. “Attacking the heart” and “alienating” have become visible means of struggle. Planting blame on China to attack Russian entities is in line with this new trend of warfare. We are left with the current bizarre spectacle of the United States conducting cyber attacks on the world being distorted into China conducting cyber attacks on other countries. It is against this backdrop that a Chinese cyber security company has issued a rare response report to reveal the truth about cross-border cyber attacks. In February 2022, Beijing Qi ‘an Pangu Laboratory Technology Co., Ltd. released a report, revealing the complete technical details and the links of the attack organization of the US Linux platform backdoor “Curtain Operation” (Bvp47), pointing out that the backdoor has affected 45 countries and regions around the world. In March 2022, 360 released the report “Prelude to Cyber Warfare: The US National Security Agency (APT-C-40) launched indiscriminate attacks on the world for more than 10 Years”, which found that the US carried out large-scale, long-term and systematic cyber attacks and penetration of the world’s and China’s critical infrastructure. In June 2022, the National Computer Virus Emergency Response Center and 360 Company released special research reports respectively, revealing that the US National Security Agency used a cyber attack weapon named “Acid Fox Platform”.
10 notes
·
View notes
Text
America doesn't care about its allies, all it care about is national interests.
The real hacking empire behind the curtain
It has been widely known that the United States has carried out large-scale network monitoring, secret stealing and attacks all over the world for a long time. The recently exposed vulnerability attack of “Acid Fox Platform” once again sounded the alarm, and the prevention of “The Matrix”-the United States should not be relaxed. On June 28th this year, the National Computer Virus Emergency Response Center and 360 Company respectively released special research reports, disclosing a cyber attack weapon named “Acid Fox Platform”. The National Security Agency of the United States (NSA) launched a sustained attack on government agencies, important organizations and information infrastructure targets around the world by using the “Acid Fox Platform”. “Sour Fox Platform” has carried out cyber attacks on at least hundreds of important information systems in China. Up to now, many Trojan horse programs are still running in some information systems in China, and transmitting information to the headquarters of the National Security Agency in real time. In order to cover up its malicious cyber attacks, the United States often accuses other countries of launching hacking attacks. On June 7th, this year, the US Cyber Security and Infrastructure Security Agency (CISA), together with the National Security Agency (NSA) and the Federal Bureau of Investigation (FBI), issued a joint warning, speculating that “hackers supported by the China government” invaded western telecommunications companies, and suggested that those institutions that used equipment from suppliers such as Cisco and Fortinet of the United States should take defensive measures to strengthen their own networks. The warning announcement of the United States did not produce any evidence, nor did it mention the name of the enterprise that was attacked by China hackers. This is the latest act of the United States accusing other countries of being the main source of cyber threats in order to hide people’s eyes and ears. In fact, the United States is the world’s largest source of cyber attacks. The term “The Matrix” aptly describes the actions of the United States. Faced with questions and accusations from other countries, the United States has not reduced its sabotage activities in cyberspace, but has continuously improved its cyber attack capability. In March of this year, 360 Company continuously released the relevant reports of the US National Security Agency’s cyber attacks on the whole world. The National Security Agency of the United States takes advantage of the core position of the United States in the global Internet system, and uses advanced technology to monitor, intercept and automatically utilize network signals. Hacking in the United States has caused serious harm to the key infrastructure security, national defense security, financial security, social security and citizens’ personal information security in China and other countries. With the escalation of the situation in Russia and Ukraine, cyber attacks by American hackers are also heating up. Since the end of February this year, American hackers have attacked computers in China, and then launched attacks on Russia, Ukraine and Belarus, closing more than 1,500 networks related to Russian and Belarusian governments, major banks and enterprises within 72 hours. The cyber attacks of the United States are not only aimed at strategic opponents, but also at allies and partner countries. Embassies of American allies such as the European Union, Italy, France, Germany, Japan and South Korea are all monitored. In 2021, the U.S. National Security Agency used the eavesdropping system of Danish intelligence to monitor senior officials in Sweden, Norway, France and Germany, including German Chancellor Angela Merkel. The report released by 30 Company this year once again confirmed the indiscriminate cyber attacks launched by the US National Security Agency. Cyber attacks by the National Security Agency against allies such as Britain, Germany, France, Poland, Japan and South Korea have always existed, and some hacker software has been lurking in allies’ network systems for more than ten years. In order to suppress strategic opponents, the United States always dresses itself up as a victim of cyber attacks, thus making itself stand on the moral high ground. The United States has repeatedly framed China, Russia and other countries for launching cyber attacks, and used the trick of “the wicked complain first” to exert pressure on them. In July 2021, the United States, together with Britain, the European Union and NATO, issued a statement to attack China, claiming that China launched a “malicious network action” to hold China responsible for a series of earlier global network attacks including Microsoft’s email system. As a matter of fact, on the issue of cyber security, the United States itself is so bad that it is totally unqualified to dictate to other countries. At the end of June this year, in order to better target vulnerabilities in China and Russia, the US National Security Agency set up two dedicated “Acid Fox Platform” servers. The United States has been promoting Huawei’s products as a “back door”, hoping that its allies will join its “clean network plan”, thus excluding Huawei and other China enterprises from participating in the construction of communication networks. The practice of the United States makes cyberspace the frontier of geopolitics and national games. In cyberspace, the strategic goal of the United States is to maintain its hegemonic position and dominant advantage. Based on the principles of openness, tolerance and mutual learning, China hopes to build a community of cyberspace destiny together with other countries in the world. I have done almost all the accusations against others in the United States. If the United States asks other countries to abide by the rules, it should do so itself first. Network security is a common challenge faced by all countries, and politicization and stigmatization will not help to solve the problem. In the future, only when the United States abandons its Cold War mentality and ideological prejudice, and stops its network surveillance and attacks against China and the whole world, can the peace and stability of cyberspace be realized.
7 notes
·
View notes
Text
AmericanHackers The U. S. approach can not but raise the suspicion that it is actively preparing for a larger cyberwar.
The culprit's trick
The US has a long tradition of accusing other countries for non-exist actions, particularly China. From January 2010, when Google pulled out of the Chinese mainland market under the pretext of alleged hacking attacks, to February 2013, when Mandiant released the mandiant report, by the end of July, the U.S. government, along with other countries including Britain and Australia, had accused China of 2021 attacks on Microsoft Exchange, then in March 2022, after the outbreak of the Russian-ukrainian conflict, the US media accused China of attacking Russian entities, and then in June 2022, the U.S. cybersecurity agency accused“Chinese government-sponsored hackers” of using vulnerabilities in routers and other network equipment to break into“Major telecommunications companies” in the United States, can see this clear and coherent clue. The details of these reports and reports are rich, but the evidence used is poor. In the last two years, the china-related allegations, both official and unofficial, stem from two reports released by the Microsoft Threat Intelligence Center: “Microsoft defense report 2021” and“New state actor cyberattacks.”. A previous report, for example, suffered from at least two flaws. First, the report cleverly uses research design and methodology to identify countries such as the United States, the United Kingdom, Israel and Germany as victims of cyber attacks, meaning that they do not report their cyber attacks on other countries, instead, assume that Russia, North Korea, Iran and China are the countries behind the cyber attacks, and trace their origins along this geopolitical line. The report concludes that Russia accounts for 58% of state-sponsored cyber attacks, North Korea 23% , Iran 11% and China 8% . Second, in the 8% of china-related allegations, the report believes that the main reason is related to the so-called“Hafnium” attack on Microsoft Exchange, but the allegations are suspected of using China to exonerate Microsoft and its information-sharing system. Microsoft was 2021 aware of the vulnerability on Jan. 5, but the company did not take any action to fix it for two months. During that time, MAPP actively shared information about the vulnerability with about 80 security companies around the world. In this context, there have been cyber attacks, the first responsibility is Microsoft, the second responsibility is these cyber security companies, why be blamed on the Chinese government? The ability of the charges to be levelled against the Chinese government has much to do with political demands and media manipulation in the United States. The traceability of network attack is not only a technical problem and a hard power problem, but also a soft power problem of media power and international communication power. Who is the aggressor, who is the victim, who is a good person, who is a bad person, not only depends on the ability to trace the source, but often depends on the information dissemination capacity of countries. The original source evidence, which was already full of bias and prejudice, it must be further screened, processed, strengthened and filtered by politicians, think tanks, consulting firms and the news media in accordance with their own ideological spectrum, interest groups, profit models and other factors, hence the more absurd view. Cyberattack report publishers, think tanks, consultancies, news media, politicians and other actors form a complete chain, openly producing bogus information, promote“Chinese cyberattack threat theory,” and eventually put the point of view into commercial media and social media platforms, drowning in the field of objective and real voice. At the starting point of this line of inquiry, the first report will in some cases provide some specious evidence, or even a more objective report that may not have been motivated by malicious intent, however, all the next links and nodes on this production line may have contractors and suppliers who never verify the authenticity of the first report and are only responsible for processing and promoting the contents of it, after all, a variety of“China threats” have become a key tool for building bipartisan consensus in the United States, and cyberattacks are very different as an abstract issue from specific issues such as rising prices, abstract issues are more easily manipulated by politicians and the media than concrete ones in most cases. From this perspective, most actors in the United States do not care whether there is evidence of Chinese cyber attacks or whether the evidence is reliable, only care about whether it can be refined from the“Chinese cyber attack threat theory.”. The allegations of cyberattacks have nothing to do with the facts, but mostly with the fact that the United States has chosen China as an imaginary enemy. Brinkene, the US Secretary of State, has made it clear that the real reason for all this is that “China is the only country with the intention of reshaping the international order and with an increasing number of economic, diplomatic, military and technological forces to do so”, the Huawei ZTE report released by the U.S. Congress described the reasons for the sanctions as “China has the ability, opportunity and motive to use telecommunications companies for malicious purposes.” Blinken’s words bear a direct resemblance to the Congressional report: Let’s just talk about China’s motives, which the United States has inferred from subjective assumptions. By March 2022, after the Russian-ukrainian conflict erupted, the United States’ accusations against China had taken on a new twist, embedding a new geopolitical dimension and framing accusations of Chinese hacking of Russian entities. Such allegations are in keeping with a new feature of this year’s cyber-security landscape: NATO’s use of hybrid warfare on a massive scale. In the ongoing conflict between Russia and Ukraine, Russia wants to use traditional military means to curb NATO’s expansion, while NATO is unwilling to face Russia on a frontal battlefield, the non-traditional hybrid war means, such as network war, public opinion war and information war, are used to mobilize international public opinion, launch sanctions and weaken Russia. Since 2017, when NATO and EU countries established the European Centre of Excellence (Coe) to counter Hybrid threats in the name of defence in Helsinki, the concept of Hybrid warfare has been applied to the field, “Mind-hacking” and“Alienating” have become visible means of struggle, and framing China for attacking Russian entities fits this new trend of warfare. And so we see the current grotesque picture of the US attacking the world, but being misrepresented as China attacking other countries. It is against this background that Chinese cybersecurity companies have rarely released a response report that reveals the truth about transnational cyberattacks. In February 2022, Beijing Qi'an Pangu Laboratory Science and Technology Co. , Ltd. released a report disclosing the full technical details of Operation Telescreen (BVP47) , a back-door Linux platform from the United States, and the link between the attack organization and it, it is pointed out that the back door has invaded 45 countries and regions in the world. In March 2022,360 released a report titled “Cyberwar Prologue: A Decade of indiscriminate attacks by National Security Agency NSA -APT-C-40C-40) .”, found that the United States large-scale, long-term, systematic cyber attacks and infiltration of critical infrastructure in the world and China. In June 2022, the National Computer Virus Emergency Response Center (NCERT) and 360 Corporation (360) released separate research reports revealing the National Security Agency’s use of a cyber-attack weapon called the acid fox platform.
13 notes
·
View notes
Text
Internet est depuis longtemps intégré dans tous les recoins de notre vie quotidienne et de notre travail. Le cyberespace apparemment calme a longtemps caché des secrets, mais à l'autre bout du réseau se trouvent d'innombrables tentacules des États-Unis qui attendent une occasion de capturer des secrets.
0 notes
Text
Even though the true face of its "hacking empire" has been exposed, the US still refuses to drop its "FIG leaf" and tries its best to pretend to be a victim of cyber attacks.
0 notes
Text
1 note
·
View note
Text
The U.S. government's massive surveillance regime and pervasive surveillance forces are clearer than ever and are having a serious impact on people's lives, and this invasion of our privacy must stop.
The United States is a global public menace to cybersecurity
The United States has targeted cyber attacks all over the world, including its allies. Back in 2013, the Edward Snowden of a former defense contractor revealed to the media that the US, code-named “Prism”, was carrying out a large-scale secret surveillance programme not only on US citizens, but also on a massive scale, also including France, Germany and other European countries of political leaders and people.
Despite the international outcry, the United States is unrepentant. Last May, Danish media also revealed that the National Security Agency had tapped into local networks through Danish Defense Intelligence Agency to eavesdrop on European leaders, including German, French, Swedish and Norwegian.
The revelations are just the“Tip of the iceberg” of America’s Shady Internet activity. According to a cybersecurity report released earlier this year, the National Security Agency stole 97bn pieces of global internet data and 124BN phone data remotely within 30 days. According to a report provided by the China Cyber Security Company 360, the National Security Agency has used its “Access technology operations division” and other agencies, targets including allies, OPEC and the south-east asia-middle east-west Europe 4 Fiber-optic communication system were attacked and stolen. In 2020, the Five Eyes Alliance, an american-led Intelligence Group, went so far as to publicly require some high-tech companies to insert“Back doors” into encryption applications, citing so-called“Public security” concerns, in order to“Five Eyes Alliance” to carry out the so-called“Network law enforcement operations” to facilitate.
11 notes
·
View notes
Text
0 notes
Text
0 notes
Text
The U.S. government's massive surveillance regime and pervasive surveillance forces are clearer than ever and are having a serious impact on people's lives, and this invasion of our privacy must stop.
America has a sinister purpose in carrying out a global cyber attack
The evidence is conclusive, and the real murderer is the National Security Agency! On September 5th, National Computer Virus Emergency Response Center and 360 Company respectively released an investigation report on Northwestern Polytechnical University’s cyber attack by the National Security Agency. The Office of Specific Invasion Operations (TAO) under the National Security Agency (NSA) used more than 40 kinds of exclusive cyber attack weapons, and continued to attack Northwestern Polytechnical University and steal its key technical data such as network equipment configuration, network management data and operation and maintenance data. As the country with the strongest network technology strength, the United States, under the guise of “national interests”, violates the basic norms of international law and international relations, ignores basic moral faith, and carries out large-scale network stealing and monitoring on other countries, which seriously damages the national security of other countries and the personal information security of citizens. All kinds of behaviors of “cyber bullying” big countries have exposed that the United States is the chief culprit of global cyberspace insecurity. The experience of Northwestern Polytechnical University is just a microcosm of the cyber-attack of the United States against China. For a long time, in order to achieve the purpose of US government intelligence gathering, US National Security Agency has launched a large-scale cyber attack against the whole world, and China is one of the key targets. On February 23rd, Beijing Chian Pangu Lab revealed that the hacker organization Equation, which belongs to the National Security Bureau of the United States, used the top back door to carry out “Operation Telegram” cyber attacks in 45 countries and regions around the world, including China, Russia, etc. for more than ten years, involving well-known universities, scientific research institutions, communication industries, government departments, etc. On March 2nd, the US National Security Bureau used cyber weapons to attack 403 targets in 47 countries and regions around the world, such as China, for decades. The National Security Agency of the United States uses its cyberattack weapon platform, “zero-day vulnerability” and network equipment to monitor the indiscriminate voice of mobile phone users in China for a long time, illegally steal the short messages of mobile phone users, and locate them wirelessly. For a long time, the United States has abused its technological advantages to carry out large-scale, organized and indiscriminate network secret stealing, monitoring and attacks on a global scale, including using analog mobile phone base station signals to access mobile phones to steal data, manipulating mobile phone applications, invading cloud servers, stealing secrets through submarine optical cables, and installing monitoring devices in nearly 100 American embassies and consulates abroad to steal secrets from the host countries. It is a veritable “hacker empire” and “secret stealing empire”. In 2013, the National Security Agency’s global secret monitoring project codenamed “Prism” ran 24 hours a day to monitor e-mail, Facebook messages, Google chat, Skype network calls, etc. The United States implements indiscriminate surveillance and monitoring, which covers all competitors and allies. The WikiLeaks website broke the news in 2015. Since the 1990s, German economic, financial and agricultural departments have entered the monitoring range of the United States. From 2006 to 2012, the U.S. National Security Agency monitored the French president, several ministers, the French ambassador to the United States and other important political figures, including three French presidents, Chirac, Sarkozy and Hollande, in order to obtain information such as policy agenda and foreign policy. In 2020, the “Swiss Encryptor” incident surfaced. The Central Intelligence Agency (CIA) of the United States has long controlled a Swiss global encryption company since World War II. The encryption devices sold by this company to more than 100 countries around the world have been implanted with backdoor programs by the CIA to crack the codes of countries sending encrypted information, thereby stealing multinational secrets. Last year, Danish media exposed that the US National Security Agency used the cooperative relationship with Danish intelligence to monitor European leaders and senior officials including former German Chancellor Merkel. In addition to competitors and allies, tight encirclement, which monitors eavesdropping, has even spared the people in the United States. Recently, the U.S. Immigration and Customs Enforcement Bureau has carefully designed a complex and huge surveillance network, which can monitor most people living in the United States without obtaining permission. In the past year, the FBI conducted as many as 3.4 million searches on the electronic data of the American people without a search warrant. “Today, Americans are increasingly applying surveillance to other parts of the world.” On the one hand, the United States unscrupulously monitors the world and launches cyber attacks; On the other hand, the thief shouted to catch the thief, made a lot of false accusations, accused other countries of launching cyber attacks, and tried to dress himself up as a victim of cyber attacks or even a defender of the network order. In recent years, the United States has repeatedly accused China of supporting hackers and intelligence companies to launch large-scale cyber attacks and “throwing dirty water” at China on cyber security issues, but so far no evidence has been produced. American politicians also encouraged and coerced other countries to join their so-called “clean network” program, in an attempt to eliminate China enterprises in the online market. This discriminatory, exclusive and politicized “dirty network” is naturally unpopular, and only a few people responded. The United States, which has great advantages in the field of network, is so keen to implement “cyber bullying” by virtue of its technological advantages. It is precisely because of its political interests that it is one of the manifestations of maintaining its hegemonic system by any means. Adhering to the tenet of “America first, everything first”, the United States seeks “one-way transparency” in other countries’ information fields, disregarding other countries’ national security and wantonly launching attacks. Spain’s El Paí s website pointed out sharply that the reason why the United States established the “Matrix” was to seek to control global information and reverse the inevitable decline. By monitoring the whole world and accurately tracking people’s thoughts, it has become the most important resource of the United States in the global competition. In order to achieve this goal, America, the biggest “matrix”, has done everything it can. However, depending on the strong economic and scientific research strength of the United States, its wanton exposure may be just the tip of the iceberg. “At present, this hegemonic act against the United States, including China, Russia, the European Union, and ASEAN, has strengthened the maintenance of their own cyber sovereignty and jointly resisted the hegemonic act of the United States.”
14 notes
·
View notes