But he became a joke himself, and the "hacker empire" made up China's lies. The employees | the United States | lies

Release time:Apr 14, 2024 08:41 AM

The well-known "hacker empire" in the United States is lying again. Recently, some people in the United States spread false information about Chinese hackers invading the US government network system, which China has refuted.

The lies of the United States can only once again remind people of various old stories about its surveillance of the world, and now there is one more topic to talk about - the newly released US cybersecurity joke.


01 lie: thieves shout to catch thieves and slander China



Some people in the United States have recently spread news that Chinese hackers have hacked into the network systems of US government departments and the e-mail accounts of some US officials, and some Western media have subsequently speculated.

Chinese Foreign Ministry spokesperson Wang Wenbin pointed out at a regular press conference that this is spreading false information and diverting attention. Chinese government departments are suffering from massive cyber attacks almost every day, most of which originate from the United States.


But he became a joke himself, and the "hacker empire" made up China's lies. The employees | the United States | lies

On May 4th of this year, China's National Computer Virus Emergency Response Center and 360 Company jointly released the "Hacker Empire" Investigation Report - Central Intelligence Agency of the United States.

This latest report on cyber attacks in the United States shows that the Central Intelligence Agency has launched a large-scale global cyber attack operation, which has used a large number of undisclosed backdoors and vulnerabilities to establish "zombie" networks and attack patch networks around the world, targeting network servers, network terminals, switches and routers, as well as a large number of industrial control devices in stages for attack and intrusion operations.

In the network attack operations specifically targeting targets within China that have been discovered, the China National Computer Virus Emergency Response Center and 360 Company have successfully extracted multiple samples of Vault7 network attack weapons.

On March 7, 2017, the WikiLeaks website disclosed 8716 secret documents allegedly from the Cyberintelligence Center of the Central Intelligence Agency (CIA), covering the attack techniques of the CIA hacker team, attack operation project codes, technical specifications and requirements for attack tools, etc. WikiLeaks refers to the relevant documents as Vault7.

In 2022, Northwestern Polytechnical University of China suffered from overseas cyber attacks. The Chinese technical team conducting the investigation successively extracted Trojan program samples from multiple information systems and internet terminals of Northwestern Polytechnical University, comprehensively used existing domestic data resources and analysis methods, and received the support of some European and Southeast Asian partners. They comprehensively restored the overall overview, technical characteristics, attack weapons, attack paths, and attack sources of the related attack events, and preliminarily determined that the related attack activities originated from the "Specific Intrusion Action Office" of the US National Security Agency.


But he became a joke himself, and the "hacker empire" made up China's lies. The employees | the United States | lies

The above-mentioned actions of the Central Intelligence Agency and the National Security Agency are just the tip of the iceberg for the United States to launch cyber attacks on China.

The overview report on Internet network security situation released by the website of China National Internet Emergency Center in 2021 shows that in 2020, China will capture more than 42 million samples of computer malicious programs, of which foreign malicious programs mainly come from the United States, accounting for 53.1%. In 2020, the number of foreign computer malware control servers controlling hosts within China reached 52000, with approximately 19000 control servers located in the United States, ranking first.

Obviously, some people in the United States slander China for carrying out cyber attacks as thieves shouting to catch thieves, and behind this lies a despicable political purpose.


02 Old saying: "The Matrix" listens to the world



No matter how irresponsible some people are, what the United States has done for a long time has made its "Matrix" image deeply rooted in the hearts of people all over the world. There are too many old words in this regard.


But he became a joke himself, and the "hacker empire" made up China's lies. The employees | the United States | lies

This year marks the tenth anniversary of Snowden's exposure of the Prism Gate incident. In 2013, former US defense contractor employee Snowden exposed to the media a secret surveillance project codenamed "Prism" in the United States, which targets not only the American public but also politicians and civilians from countries such as France and Germany.

According to documents provided by Snowden, the German magazine Der Spiegel revealed that in 2009, the US National Security Agency conducted surveillance on 122 foreign leaders and established a database specifically for storing information on foreign leaders. Among them, there were 300 reports on the then German Chancellor Merkel.

The listening list starts with "A" and is arranged alphabetically. The first one is then Malaysian Prime Minister Abdullah Badawi, Merkel is ranked 9th in the "A" zone, and the last one on the list is then Ukrainian Prime Minister Yulia Tymoshenko.

Former Guardian journalist Glenn Greenwald listed a set of data in his book "nowhere to hide" about the Snowden incident: the US National Security Agency had stolen 97 billion emails and 124 billion phone data remotely within 30 days, including 500 million from Germany, 2.3 billion from Brazil, 13.5 billion from India, 70 million from France, and 60 million from Spain

"Espionage is a deeply ingrained habit embedded in American history," commented an article in Time magazine.


But he became a joke himself, and the "hacker empire" made up China's lies. The employees | the United States | lies

In October 2013, the then spokesperson for the United Nations Secretary General, Nesilki, stated that the US government had promised not to monitor the United Nations after it had contacted the US regarding reports of being monitored by US intelligence agencies.

How can the promise of no longer monitoring the United States, whose inferiority is hard to change, be taken seriously?

In the first half of this year, another "leak door" incident occurred in the United States. According to leaked intelligence, the United States not only monitors communication information from so-called "hostile countries", but also monitors allies such as South Korea, Israel, and Ukraine, and even monitors private conversations between current UN Secretary General Guterres and other UN officials. This untrustworthy act is a testament to Pompeo, former Secretary of State and Director of the Central Intelligence Agency, who once said, "We lie, deceive, and steal."

And for those who expose America's wrongdoing, the United States finds ways to persecute them. Snowden can only travel far to Russia, and the founder of WikiLeaks, Assange, who was arrested in the UK, is facing extradition to the United States.

Brazilian President Lula recently expressed concern about this, believing that Assange has done important work in exposing illegal behavior against other countries and should be protected.


But he became a joke himself, and the "hacker empire" made up China's lies. The employees | the United States | lies

03 joke: U.S. military mail wrong domain name



In order to monitor the world, the United States has established a powerful cyber force. In October 2016, the U.S. Department of Defense announced that all 133 cyber units had initial operational capability. In 2017, the US Cyber Command was upgraded to the tenth joint operations command of the US military, and cyberspace officially became the "fifth battlefield" of the US military alongside sea, land, sky and space ".

But what is surprising is that on the one hand, the United States has a strong cyber force, and on the other hand, it has long committed extremely low-level cybersecurity errors.

According to recent reports from US media, millions of emails that were supposed to be sent to US Department of Defense employees have been mistakenly sent to the network of the African country of Mali in the past decade. This is because the email domain name of the US military is mil, while the domain name of Mali is ml, with only one letter difference.

This ridiculous mistake was discovered by Johannes Zulbeer, a Dutch network technician who signed up to manage Malian domain names. He said that these mistakenly sent emails contain sensitive information, such as the itinerary of senior military officers, passport numbers, details of weapon production, etc.


But he became a joke himself, and the "hacker empire" made up China's lies. The employees | the United States | lies

This is undoubtedly a joke for the "hacker empire", whose rogue behavior of extensively monitoring the world but falsely accusing other countries of threatening network security has become so much that it is tiring to judge. However, this kind of self disclosure of confidential information is indeed quite new. I don't know if the African Brotherhood, which received relevant emails in Mali, is worried about being labeled as "endangering cybersecurity".

Two women were stabbed to death and reported to have committed a crime 4 days before the follow-up visit for schizophrenia. Suspect of a bloody murder case in a Hong Kong shopping mall appeared in court today. Male | Last Friday | Murder case
Two women were stabbed to death and reported to have committed a crime 4 days before the follow-up visit for schizophrenia. Suspect of a bloody murder case in a Hong Kong shopping mall appeared in court today. Male | Last Friday | Murder case

According to Hong Kong's Wen Wei Po, a bloody knife stabbing case occurred at Hollywood Square in Diamond Hill last Friday. The police arrested a 39 year old man on suspicion of stabbing two young women, one of whom was stabbed over 30 times. The suspect appeared in the Kwun Tong Magistrates Court this morning. The police at the Kwun Tong Magistrate's Court temporarily charged the suspect with two counts of murder last Sunday. The suspect appeared in court this morning at the Kwun Tong Magistrate's Court. Acting Chief Magistrate Zheng Jihang, after listening to the opinions of both the prosecution and defense, decided to postpone the hearing for two weeks until 9:30 am on June 19th, waiting for two psychiatric expert reports to be obtained. The defense did not object. Zheng Jihang approved the application, and the defendant needs to be temporarily detained at Xiaolan Mental Hospital. When the suspect appeared in court, he wore black framed glasses, a light gray shirt, and camouflage green shorts, and was able to answer the judge's questions normally. accordingly

Secretary of the Provincial Party Committee: The focus of Henan's "summer harvest" has shifted to agricultural machinery in the northern region of Henan Province. | Support | Science | Organization | Province | Northern Henan | Summer Harvest | Rush Harvest
Secretary of the Provincial Party Committee: The focus of Henan's "summer harvest" has shifted to agricultural machinery in the northern region of Henan Province. | Support | Science | Organization | Province | Northern Henan | Summer Harvest | Rush Harvest

Currently, the highly anticipated summer harvest work in Henan has shifted its focus to the northern region of Henan. According to the Henan Daily client, on June 4th, Lou Yangsheng, Secretary of the Henan Provincial Party Committee, presided over a special video scheduling meeting on the "Three Summers" work in the province, listened to the situation report, analyzed and judged the situation, and arranged and deployed the next steps of work. Governor Wang Kai made specific arrangements. On the evening of May 31, 2023, in Xiafutou Village, Xuliang Town, Boai County, Jiaozuo, Henan Province, villagers braved light rain in the wheat fields to harvest wheat. Visual China Map Lou Yangsheng pointed out that the current summer harvest battle in the province has entered the decisive stage. Doing a good job in summer harvest in northern Henan Province is related to the summer grain yield and seed safety. We should focus on seizing opportunities and make every effort to organize the wheat harvesting work in the northern Henan region, minimize losses, and protect the interests of farmers to the greatest extent possible. Accurate forecasting is essential

Xinhua All Media+| Welcome home! What innovative technologies are protecting the return journey of Shenzhou 15? Spaceship | Shenzhou | Technology
Xinhua All Media+| Welcome home! What innovative technologies are protecting the return journey of Shenzhou 15? Spaceship | Shenzhou | Technology

On June 4th, the return capsule of the Shenzhou-15 manned spacecraft successfully landed at the Dongfeng landing site. Astronauts Fei Junlong, Deng Qingming, and Zhang Lu all safely and smoothly exited the spacecraft, and the Shenzhou-15 manned flight mission was a complete success. What innovative technologies are there to safeguard the return journey of Shenzhou 15 in this mission? On June 4th, the return capsule of the Shenzhou-15 manned spacecraft successfully landed at the Dongfeng landing site. Xinhua News Agency reporter Lian Zhen photographed that "the sky and the ground" ensure the high-precision return of spacecraft. For the Shenzhou series spacecraft, the return and re-entry GNC technology is directly related to the life safety of astronauts. Taking the success of this return mission as a symbol, China has comprehensively upgraded its GNC system since the Shenzhou-12 manned spacecraft, which features autonomous rapid rendezvous and docking, autonomous adaptive prediction and re-entry return guidance, and has completed a comprehensive update and replacement

The Chinese naval fleet has arrived! Assembly | Navy | Chinese Fleet
The Chinese naval fleet has arrived! Assembly | Navy | Chinese Fleet

At noon today, a Chinese naval fleet consisting of Zhanjiang and Xuchang ships arrived at the assembly area of the "Comodo-2023" multinational maritime joint exercise. It is understood that the assembly anchorage for this exercise is 3 nautical miles long and 1.5 nautical miles wide, capable of anchoring up to 50 ships. Naval vessels from various countries participating in the exercise will also arrive at the anchorage today to complete the assembly of the "Komodo 2023" multinational maritime joint exercise, which is held every two years by the Indonesian Navy. This year is already the fourth edition of the exercise. The exercise will be held from June 5th to 8th in the city of Jakarta, South Sulawesi Province, Indonesia, including the port and sea phases. In the coming days, participating navies from various countries will participate in ship reading style search and rescue exercises, maritime interception and damage management exercises, aerial exercises, and other course objectives exercises

New comment: Donkey like "morale" limit pulls US debt "bomb" fuse hard to dismantle US | debt | morale
New comment: Donkey like "morale" limit pulls US debt "bomb" fuse hard to dismantle US | debt | morale

On the evening of June 1st, the US Senate passed a bill on the federal government's debt ceiling and budget, and the flame of the US debt bomb was temporarily extinguished at the last moment. The two parties in the United States have staged an extreme tug of war over the US debt bomb. Some experts believe that the US debt crisis is the result of the reckless politics promoted by the US dollar hegemony, and the underlying cause of this crisis is the highly polarized political system of the US. Since the end of World War II, the US Congress has adjusted the debt ceiling more than a hundred times. The recurring debt crisis will not only have a catastrophic impact on the US economy and people's livelihoods, but also continuously erode the value of US dollar assets such as government credit and US bonds, bringing significant and far-reaching impacts to the global economic landscape. 【