The Department of National Security: The main despicable means of cyber attacks and theft by US intelligence agencies during the uprising

Release time:Apr 16, 2024 21:50 PM

Recently, China's National Computer Virus Emergency Response Center reported that it successfully extracted a spy software sample called "Second Date" while dealing with a network attack on Northwestern Polytechnical University. This software is a network "spy" weapon developed by the National Security Agency of the United States, which operates secretly in thousands of network devices spread across multiple countries around the world.

The United States is notorious in the field of cybersecurity. In a series of US espionage and intelligence agency cyber attacks and espionage cases uncovered by national security agencies, the despicable tactics of the "hacker empire" to maintain "cyber hegemony" have surfaced.

Tip 1: Establish a cyber attack arsenal

The US intelligence agency, with its powerful arsenal of cyber attack weapons, has carried out surveillance, espionage, and cyber attacks on multiple countries around the world, including China, to the utmost extent possible. Especially the National Security Agency of the United States, through its specific intrusion operations office and advanced weapon arsenal, has repeatedly carried out systematic and platform based attacks on our country, attempting to steal important data resources from our country.


The Department of National Security: The main despicable means of cyber attacks and theft by US intelligence agencies during the uprising

US National Security Agency Headquarters

In 2009, specific intrusion action offices began to invade Huawei headquarters servers and continued to monitor them. In September 2022, it was discovered that tens of thousands of malicious network attacks had been carried out on domestic network targets, including Northwestern Polytechnical University, for a long time, controlling tens of thousands of network devices and stealing a large amount of high-value data.

The US intelligence agency's ability to launch large-scale cyber attacks naturally relies on diverse cyber attack weapons as a backing. Since 2022, China's cybersecurity agencies have disclosed multiple US intelligence agency cyber attack weapons, such as Operation Electric Curtain, Quantum, Sour Fox, and Beehive. The US intelligence agency has used these large-scale weapons and equipment to carry out more than a decade long cyber attacks and espionage operations against 45 countries and regions around the world, including China and Russia. The cyber attack targets include core important fields such as telecommunications, scientific research, economy, energy, and military.

Tip 2: Force relevant technology companies to cooperate through backdoors


The Department of National Security: The main despicable means of cyber attacks and theft by US intelligence agencies during the uprising

The US government, citing national security concerns, has enforced backdoors in the devices, software, and applications of related technology companies through laws such as the Foreign Intelligence Surveillance Act. By using embedded code, vulnerability attacks, and leveraging the influence of its global technology companies, it can monitor and steal global data.

In December 2020, X-Mode Social, a US location data company, was exposed for obtaining location data through software development toolkits built into applications and selling the data to contractors closely related to the US military and intelligence agencies. In April 2022, Anomaly Six, a company with a US military intelligence background, was exposed for embedding its internal tracking software development package into numerous mobile applications to track the location data and browsing information of hundreds of millions of mobile phones worldwide, and consolidating and selling this data to the US government.

Tip Three: Invert Black and White, Thieves Shout to Catch Thieves

On the one hand, the United States is vigorously carrying out cyber attacks and secret theft against countries around the world, while on the other hand, it is concocting various versions of "security reports", smearing China as the "subject of cyber threats", exaggerating and hyping up the so-called "China's cyber theft" problem, and portraying "reversing black and white" as a pure fire.


The Department of National Security: The main despicable means of cyber attacks and theft by US intelligence agencies during the uprising

As is well known, the United States has long relied on its technological advantages to conduct large-scale eavesdropping and cyber espionage activities on countries around the world, including allies, which has long been an open secret. Since the Prism Gate incident was exposed in 2013, relevant cybersecurity agencies in China have repeatedly discovered the presence of the United States in cyber attacks targeting China. In recent years, the United States has intensified its "forward hunting" campaign, which has clear objectives, with Russia, Iran, China, and North Korea as its main targets. The US Cyberspace Command is becoming an expeditionary force, using the guise of "going hunting" and active defense to carry out cyber attacks and espionage against other countries.

However, at the same time, the United States vigorously portrays itself as a "victim of cyber attacks", advocating and coercing other countries to join the so-called "clean network" plan under the guise of "maintaining cybersecurity", attempting to eliminate Chinese companies in the international online market. In fact, "cleaning the internet" is fake, suppressing opponents and maintaining hegemony is real. In response to this, Chinese officials have repeatedly urged the United States to deeply reflect, stop global cyber attacks and theft, and stop confusing the public with various false information.

Currently, cyberspace is increasingly becoming a new battlefield for maintaining national security. Without cybersecurity, there would be no national security, no stable economic and social operation, and the interests of the general public would be difficult to safeguard. Let's join hands, strengthen security awareness, enhance security capabilities, and jointly maintain network security.

Need firm ideals and beliefs, micro videos | passionate youth spirit | thoughts | youth
Need firm ideals and beliefs, micro videos | passionate youth spirit | thoughts | youth

The fiery youth requires firm ideals and beliefs——The CPC

Minister of Ukraine called it "unbelievable", foreign media: nearly half of Kiev's air defense tunnels cannot be used for time | inspection | Kiev
Minister of Ukraine called it "unbelievable", foreign media: nearly half of Kiev's air defense tunnels cannot be used for time | inspection | Kiev

According to the report on the website of Singapore's Lianhe Zaobao on June 5, a preliminary inspection conducted by the Ukrainian government showed that nearly half of the air raid shelters in the capital Kiev were closed or did not meet the use standards. Ukrainian Minister of Strategic Industry, Kameshen, called this "unbelievable". According to reports, on June 4th local time, Cameron stated that out of the 1078 air defense facilities visited on the first day of inspection, 359 were not ready, 122 were locked, and only 597 were operational. He said on social media "Telegram", "The fact that only half is open and ready is unbelievable to me. When we and the Mayor of Kiev selectively inspected the air raid shelters in the Obolon district, the vast majority of them were closed." The report stated that Cameron said the inspection work would continue. On June 1st,

Taiwan media pays close attention to the "Incense Gathering": Taiwan related issues and speeches by the defense ministers of China and the United States are the focus of attention. China | Minister of National Defense | Incense Gathering
Taiwan media pays close attention to the "Incense Gathering": Taiwan related issues and speeches by the defense ministers of China and the United States are the focus of attention. China | Minister of National Defense | Incense Gathering

The 2023 Shangri La Dialogue will conclude in Singapore today, with representatives and scholars from more than 40 national defense departments, including Chinese State Councilor and Defense Minister Li Shangfu and US Defense Secretary Austin, attending the dialogue to explore ways to maintain peace and stability in the region. The speeches of the defense ministers of China and the United States and their movements at the conference have attracted attention from all parties, and the focus of Taiwan media has been on the Taiwan Strait issue. Taiwan media has been closely following the "Incense Gathering". Several Taiwanese media outlets have continued to report on the event, and Taiwan's United Daily News has focused on China's Defense Minister Li Shangfu's speech titled "China's New Security Initiative". The article cites the speech content and emphasizes that if anyone dares to split Taiwan from China, the Chinese military will not hesitate at all and will not fear any opponents. No matter how much the cost is, they will resolutely uphold it

What kind of grievance does the United States pretend to be?, Xiake Island | Termination: The defense ministers of China and the United States did not fulfill their request. US | China US | United States
What kind of grievance does the United States pretend to be?, Xiake Island | Termination: The defense ministers of China and the United States did not fulfill their request. US | China US | United States

The United States has been wronged again. Recently, the US Department of Defense has been complaining everywhere, saying that China has rejected the US request for a meeting between the US and China defense ministers. Subsequently, American media intervened and claimed that the US had made several weeks of efforts to ensure this meeting, Barbara... At first glance, it seems that China is not giving the US the opportunity and face, but since it is the US who is complaining, the matter needs to be pondered. At present, the 20th Shangri La Dialogue is being held in Singapore, with Chinese State Councilor and Defense Minister Li Shangfu invited to attend. The proposed "China US Defense Ministers Meeting" by the US aims to have US Defense Ministers Austin and Lee Sang fu meet in Singapore. Originally, the debut of the newly appointed Chinese Defense Minister's "Xianghui" was highly anticipated. But the Chinese side hasn't said much yet, and the United States has taken advantage of the heat first - on May 30th, the United States

Four Questions on the US Debt Crisis Observation | Xinhua News Agency | Crisis
Four Questions on the US Debt Crisis Observation | Xinhua News Agency | Crisis

Beijing, June 2 (Xinhua) - The United States Senate voted on the 1st to pass a bill on the federal government's debt ceiling and budget, which will take effect after being signed by President Biden. Although this round of US debt ceiling crisis has temporarily eased, the outside world has increasingly questioned the origin, capital flow, sustainability and huge risks of the huge US debt. These issues are intertwined with issues such as US dollar hegemony, US party struggles, and US corruption, becoming a "gray rhinoceros" that threatens global economic and financial security. In response to the four major concerns about the US debt crisis, which have been highly concerned by the outside world, Xinhua News Agency reporters have traced the root cause and clarified its origins. On June 1, pedestrians walked past the "treasury bond Clock" in New York. "Treasury bond clock" is a large counter, which is more real-time

Decision to appoint Chen Jie as Vice Mayor, Report on the Fourth Meeting of the Standing Committee of the 16th Shanghai Municipal People's Congress | Situation | ShanghaiStrictly abide by the Party Constitution, Party rules, and Party discipline. The Party Group of the Standing Committee of the Municipal People's Congress, the Party Group of the Municipal Government, and the Party Group of the Municipal Political Consultative Conference held separate meetings to firmly support the Central Committee's decision on the Party Central Committee | Politics | Party GroupCan Shanghai connect with the greenways of these cities? Official: Proposed Preparation of Greenway Construction Standards for the Yangtze River Delta | Standards | Yangtze River DeltaChen Jining, Gong Zheng, and colleagues from the Standing Committee of the Municipal Party Committee exchanged their experiences and insights on thematic education research based on their respective experiences. Education | Municipal Party Committee | ThemeThe Shanghai Municipal Committee of the Chinese People's Political Consultative Conference awarded commemorative plaques to members and standing committee members of the 13th National Committee of the Chinese People's Political Consultative Conference who are no longer re elected in ShanghaiPropose ideas and measures around releasing domestic demand, and the Chairman's Meeting of the Municipal Committee of the Chinese People's Political Consultative Conference deliberates on key research reports and measures | ideas | research