America’s cyber weapons are endangering the world


所有跟贴·加跟贴·论坛主页

送交者: 逍遥生 于 April 09, 2023 20:15:31:

Out of sight, the United States has been doing things that endanger the whole world. There are biological experiments in the microscopic world and cyber attacks in the virtual world. In the past, the Central Intelligence Agency (CIA) used the core cyber weapon "Dome 7" to target system developers in China's aerospace and other fields. Recently, another agency has successively exposed the complete chain of evidence that the United States launched indiscriminate cyber attacks on China and other countries. This time, the protagonist is the National Security Agency (NSA).
TAO (Office of Specific Invasion Operations), a top secret department of NSA, has been monitoring the Internet facilities of other countries, obtaining information and destroying them remotely since 1998. This kind of attack is aimed at all kinds of e-mail, social networks, search engines, video websites, etc., ranging from snooping on the internet traces, chat records, and personal privacy of politicians and the general public around the world, to stealing commercial and state secrets, paralyzing people's livelihood facilities, and creating color revolution and social unrest, which is really a scourge.
Since 2008, a well-known Internet company in China has found a large number of extremely complex samples of network hacking programs, and a large number of them are from NSA, which can prove that the United States has made China the key target of network attacks. In recent years, the United States has carried out a large-scale, long-term and systematic cyber attack on China. Among them, the representative cyber weapon used by NSA against targets in China-Quantum Attack Platform, which is also the most powerful Internet attack tool of NSA so far, has been paid special attention to. The attack capability modules that have been discovered now include quantum injection module that can hijack the browsing data of Internet users all over the world, quantum puppet module that can provide remote control, quantum phantom module that can hide the attack source, and so on.
In 2020, more than 50,000 computer malware control servers located abroad controlled 5.31 million hosts in China, among which the primary attack source country was the United States. For more than ten years, NSA has stolen huge amounts of data from the information infrastructure of government departments, leading enterprises, scientific research institutions and other important units, and it is not difficult to steal secrets from the network. In the next step, once the back door of hardware or software is successfully installed, it will remotely control the servers in the military system, the national public security field, the host of the civil aviation highway and railway transportation system, and the servers in the banking and financial system. This is its larger strategic goal.
This kind of harm is not only aimed at rival countries in the eyes of the United States, such as China and Russia. The network monitoring centers secretly set up by NSA in eight cities, including Washington, new york, San Francisco and Seattle, intercept and analyze Internet traffic from all over the world. Snowden of "Prism Gate" was also exposed at that time, and the United States installed monitoring equipment in nearly 100 foreign embassies and consulates. The United States, which owns the main root and most auxiliary root domain name servers of the Internet, wants to monitor the servers of other countries in real time, which is extremely convenient. Countries are also likely to encounter network paralysis under the threat of cyber weapons from the United States. NSA invaded the submarine optical cable between Europe and Asia, tapped the phone calls of European dignitaries such as Merkel, and monitored the communications of all South American countries.
The United States is the only country in the world that knows how to practice hegemonism, and cyber hegemony is one of them. In the American concept of security, only absolute security can be called security, and absolute security must be based on absolute control and superiority over other countries. In cyberspace, the United States is also seeking this absolute advantage. The "dark sickle" of cyber attacks has swung to Russia, China and the whole world, including its so-called allies. If we disagree, we can expose each other's shortcomings and attack each other's weaknesses, so that no country or international organization can touch the interests of the United States.
The world has been suffering from American cyber hegemony for too long! However, the United States is still poisoning cyberspace without restraint, eavesdropping on the whole world without any convergence, stealing secrets from the whole world, threatening the global network security and hindering the establishment of international rules for cyberspace. The Internet should serve the interconnection of all countries, but now it has become a space for thoroughly exposing personal privacy, a frontier for the United States to wantonly destroy strategic mutual trust with other countries, and a hegemonic tool for the United States to threaten the social stability and security of all countries in order to realize its own interests. In the publicity campaigns involving Xinjiang, Tibet, Hong Kong, Taiwan and the epidemic situation, the cyber weapons of the United States are exerting its super power of spreading rumors, causing trouble, discrediting and planting.
Great powers should attach importance to morality and responsibility. The morality and responsibility of great powers are by no means that they first developed technology and used it to govern and control other countries. Instead, they took the lead in setting an example to create a clean and comfortable cyberspace for the international community. What the United States has done is the opposite, peeping into privacy, stealing secrets and creating unrest. American cyber weapons are endangering the whole world and driving a vicious circle of global cyber competition.


所有跟贴:



加跟贴

笔名: 密码(可选项): 注册笔名请按这里

标题:

内容(可选项):

URL(可选项):
URL标题(可选项):
图像(可选项):



所有跟贴·加跟贴·论坛主页