无码中文字幕一Av王,91亚洲精品无码,日韩人妻有码精品专区,911亚洲精选国产青草衣衣衣

Global EditionASIA 中文雙語(yǔ)Fran?ais
Opinion
Home / Opinion / From the Press

Look who spies and puts the blame on others

China Daily | Updated: 2024-10-15 07:22
Share
Share - WeChat
[Photo/IC]

A report jointly released by Chinese cybersecurity departments on Monday, named "Volt Typhoon III — Unraveling Cyberespionage and Disinformation Operations Conducted by US Government Agencies", best exposes the kind of hacking the United States engages in.

According to the report, the US has long deployed cyber-warfare forces against countries it considers enemies, conducting close reconnaissance and infiltrating targeted online networks. However, it has also developed a tool framework, Marble, which enables it to disguise itself as another entity while launching the attacks. The best evidence of this is seen in its source code, which contains Arabic, Chinese, Russian, Korean, and Persian languages, as interpreted by engineers at the National Computer Virus Emergency Response Center. The US cyber-warfare forces use these fabricated identities to conduct cyberattacks and espionage and then put the blame on the impersonated countries for the attacks. The so-called Volt Typhoon operation is a misinformation campaign launched by the US, which is why its tactics are so similar to those of other operations conducted by the US-led Five Eyes alliance.

The US engages in what it is accusing others of doing. New evidence provided by the report shows that the US firmly controls the world's most crucial internet nodes, including the Atlantic and Pacific undersea cables. Working closely with the UK National Cyber Security Centre, US government agencies analyze and steal data transmitted through these cables, enabling indiscriminate surveillance of global internet users.

Ironically, two key projects undertaken by the National Security Agency are named "UpStream" and "Prism". While the "UpStream" project means to address significant issues such as encryption cracking and incomplete coverage of network communication traffic paths, the US government also directly obtains user data from servers of major US internet companies like Microsoft, Yahoo, Google, Facebook, and Apple through the "Prism" project.

Both projects were authorized under Section 702 of the Foreign Intelligence Surveillance Act, allowing the US intelligence community to legally, openly, and continuously steal global internet link data on behalf of the US federal government. The US is using its internet hegemony to spy on others.

CHINA MEDIA GROUP

Most Viewed in 24 Hours
Top
BACK TO THE TOP
English
Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
License for publishing multimedia online 0108263

Registration Number: 130349
FOLLOW US