laitimes

Inventory! The four major crimes of the United States manipulating cyber hegemony

author:China Youth Network

In June 2022, Northwestern Polytechnical University issued a Public Statement saying it had suffered an offshore cyberattack. In September, a survey revealed that the cyberattack against Northwestern Polytechnical University came from the National Security Agency's (NSA) Office of Specific Intrusion Operations (TAO). The cyber hegemony manipulated by the United States originated in cyberspace, enveloping the world and affecting the whole world, and cyber attacks have long shown systematic and systematic characteristics. The network has long been integrated into all corners of daily life and work, and the seemingly calm cyberspace has long been hiding mysteries, and the other end of the network is waiting for countless "tentacles" of the United States to seize secrets. Judging from the several cyber attacks launched by the United States, the United States has always manipulated cyber hegemony and stirred up trouble.

First, the United States has established a large and professional cybersecurity intelligence agency to pave the way for cyber intrusion

On September 5, 2022, the "Investigation Report on the Discovery of NSA Cyber Attacks by Northwestern Polytechnical University (Part I)" (hereinafter referred to as the "Investigation Report") jointly released by the China National Computer Virus Emergency Response Center and 360 Company mentioned that the NSA's Office of Specific Intrusion Operations (TAO) was behind the cyberattack on China's Northwestern Polytechnical University. In June 2013, Foreign Policy magazine reported that TAO, which is composed of more than 2,000 military and civilian personnel, is recognized as the world's most high-level cyber warfare force, with abundant funds and government support, and everything in TAO is listed as "top secret". The exposed cases show that TAO is actually a tactical implementation technical unit that steals intelligence data and information from other countries by carrying out large-scale cyber attacks on other countries. In addition, more than 30 agencies, such as the US Central Intelligence Agency, the National Geographic Intelligence Agency, the Department of Homeland Security, the State Secrets Bureau, the Intelligence Service of the Ministry of Finance, and the National Military Intelligence Agency, all have special work directions, and at the same time can form a joint force to compile a fine network near the target target, sniff for lurking, secretly tighten, and continuously steal secrets from other countries.

Second, the United States carries out wanton cyber attacks on other countries and steals secrets from other countries

The investigation report revealed that in order to launch a network theft attack on China's Northwestern Polytechnical University, TAO used more than 1,100 internal infiltration attack links, more than 90 command sequences for operation, 54 springboard machines and proxy servers in 17 countries, 70% of which were concentrated in China's neighboring countries, and 41 kinds of NSA's special network attack weapons and equipment, such as vulnerability attack weapons, long-term ambush control weapons, sniffing sensitive information weapons, and concealed detrace weapons. In recent years, TAO has launched tens of thousands of cyber attacks on China, controlling tens of thousands of network servers, Internet terminals, network switches, telephone exchanges, routers, firewalls, etc., and stealing no less than 140GB of information data. In June 2013, Edward Snowden's Prism Gate project allowed the U.S. government to come directly from Microsoft, Apple, Google, Yahoo, Facebook, PalTalk, AOL, Skype, The servers of 9 companies, including YouTube, directly collect information and provide support for activities such as monitoring and listening, information research and judgment. In addition to the Prism Gate project, there are many other monitoring and eavesdropping projects implemented in the United States, such as the quantum (Quantum) attack system can be disguised as a general USB data line to transmit eavesdropping information outward through radio frequency; The "Dream Project" (MYSTIC) collects audio and video recordings of government officials in different countries every 30 days; The purpose of the "Treasure Map" is to hack into the network service providers of various countries to obtain the topology map of the network equipment. At the same time, the network technology established by the United States through a large amount of money has gradually become a hidden danger to other countries. After a U.S. cyberattack, it is even difficult for other countries' cybersecurity authorities to find out who started it. China is a key target of U.S. cyberattacks, and the U.S. has been profiting from cyberwarfare for years. The United States uses a variety of network attack weapon groups, and in the network infrastructure with pre-emptive threats, it uses leading technology, a powerful network army, and a huge amount of capital investment to continuously intrude and attack the networks of other countries and wantonly steal the core secrets of other countries. The image of the "world police" that the United States usually strives to display is nothing more than a self-intoxication and illusory bubble based on attacks on other countries.

Third, the United States has put a protective shell on cyber attacks by combining public opinion hegemony with cyber hegemony

China is not the only country that has suffered from U.S. cyberattacks, but even U.S. allies are under its watchful eye at all times. On May 30, 2021, Danish Public Radio and Television, German Der Spiegel, France's Le Monde, Germany's Süddeutsche Zeitung, Russia Today and other media outlets exposed the NSA's monitoring and surveillance of mobile phones, emails, chat messages and other leaders of German Chancellor Angela Merkel, then German Foreign Minister Steinmeier, German Finance Minister Steinbrück and other leaders between 2012 and 2014, causing an uproar in the international community and making other European leaders uneasy. The United States is still doing this to its allies, but it is even more reckless to other non-ally countries, and its actions confirm that the United States is a veritable "matrix", "secret empire" and "spy empire". The United States, on the other hand, through its powerful public opinion hegemony, controls the guidance of public opinion, often rendering the image of its own cyber attack perpetrators as "victims" and "forced to fight back"; at the same time, it uses the powerful network platform it has at its disposal to cover up the truth through network public opinion, smear other countries, completely block remarks that do not conform to its interests, and publicize remarks that are in line with its interests. This also fully exposes the hypocrisy of the so-called "freedom of speech" in the United States and other Western countries. The United States and other Western countries have long manipulated online social media and media giants as spokesmen for their online hegemony, inciting and manipulating the development trend of public opinion. Their so-called "freedom of speech" is nothing more than a "new emperor's clothes" based on their political hegemony and the supremacy of economic interests. In the face of US cyber hegemony, it is necessary to make more countries, societies and individuals realize the ugly face under its hypocritical mask, break the double standards of the United States, and condemn and counter its network hegemony.

Fourth, the United States tramples on the cyber sovereignty of other countries and arbitrarily infringes on the online human rights of the citizens of other countries

The United States has always flaunted itself as a beacon of freedom in the world and respects sovereignty and human rights, but facts speak louder than words, and every move it shows is the opposite of its slogan. U.S. attacks on other countries include government departments, corporations, educational institutions, and individual citizens. At the beginning of the 21st century, the NSA began to implement the "Upstream" plan, which intercepts and listens to network data through submarine optical cables. Implement the Boundless Informant program to map the world with mobile call data sources in different colors, indicating that the data set is centralized. In 2010, The Washington Post published an article saying the N.S.A. collects, intercepts and stores about 1.7 billion emails, phone calls and other types of communications a day. On June 30, 2022, Chinese Foreign Ministry spokesman Zhao Lijian mentioned at a regular press conference that the "Security Zai" new media in the field of information security published an article entitled "Demystifying TAO: The Secret of the US National Security Agency APT-C-40 Hacking Group" that revealed that the documents exposed by Snowden in 2013 contained a top-secret document involving the US military and government network departments using borderless informants to remotely steal about 97 billion Internet data and 124 billion call records from around the world in the past 30 days. A lot of personal privacy is involved. Beijing Qianpangu Laboratory Technology Co., Ltd. "Bvp47 - the top backdoor of the NSA Formula Organization" report revealed the February 2022 "Operation Telescreen" (Bvp47) incident, once again confirmed the NSA's infringement of the interests of other countries. The Equation Group, a hacking group affiliated with the N.S.A., has been conducting advanced sustainable threat attacks (APTs) to spy on and control the networks of victimized organizations for more than a decade, including but not limited to telecommunications, scientific research institutions, military institutions, prestigious universities, economic development planning departments, etc., involving 287 important targets in 45 countries and regions around the world. It can be seen that the United States' behavior of stealing information from other countries has formed a "whole industrial chain and full time and space coverage". The United States is rampant in cyberspace with stealing, attacking, and surveillance, but it has not been punished by law. The Washington Post reported in December 2013 that U.S. District Court Judge Richard Leon ruled that the N.S.A.'s telephone surveillance of people was likely in violation of the U.S. Constitution. As Michael Hayden, the former CIA director, has argued, the N.S.A. surveillance program doesn't work against terrorism, but it allows intelligence analysts to track people's online behavior. The Fourth Amendment to the U.S. Constitution prohibits the government from unjustifiably searching and detaining citizens. Russian Satellite News Agency reported in September 2020 that the U.S. Court of Appeals declared that Snowden had exposed a plan to collect people's telephone communications on a large scale in the name of counterterrorism in violation of the U.S. Surveillance Act and the Fourth Amendment to the U.S. Constitution. This is a serious violation of the Internet sovereignty of other countries and the human rights of citizens, and its nature of trampling on the human rights of other countries is fully revealed.

The United States' repeated acts of carrying out cyber attacks on other countries have made more people see that the United States is secretly stealing dirty moves under the network hegemony and public opinion hegemony system it has constructed, and the United States is infringing on the sovereignty and human rights of other countries in a silent way. Today's world is in the midst of major changes unprecedented in a century, the hegemonic system of the United States is gradually disintegrating, and the concept of a community with a shared future for mankind advocated by China is getting more and more recognition. Looking at the US cyber attacks one after another, the international community can more clearly see the operating mechanism and penetration of US cyber hegemony. Breaking the long-standing monopoly of the United States in cyberspace is a difficult road that we must take, and it is also a bright road that must be won. (Cheng Yue, Chinese Public Security University)

Source: World Wide Web

Read on