Why did the United States attack China's earthquake monitoring center? Monitoring Center | Earthquake | United States

Release time:Apr 14, 2024 10:33 AM

This morning, Tan Zhu noticed an unusual news:

The Jianghan Branch of Wuhan Public Security Bureau in Hubei Province has issued a police report stating that some network devices of the Earthquake Monitoring Center of Wuhan Emergency Management Bureau have been implanted with Trojan viruses. It is preliminarily determined that this incident was a network attack initiated by foreign hacker organizations and criminals with government background.

I believe many people, like Tan Zhu, have some doubts when they see this news. Isn't a lot of earthquake data publicly available? Why do foreign hacker organizations and criminals attack an earthquake monitoring center? Where do they come from?

Tan Zhu contacted the Wuhan Emergency Management Bureau, who stated that the National Computer Virus Emergency Response Center and 360 Company have conducted traceability analysis on the Trojan virus. We learned from these two institutions that this overseas hacker organization is from the United States.

It's the United States again. The United States is launching a cyber attack on China's earthquake monitoring center. What are you trying to do?

With this question in mind, Tan Zhu chatted with a professional.

He stated that seismic waves passing through different underground media and structures can cause changes in wave velocity. Obtaining relevant data from the earthquake monitoring center can deduce the underground structure and lithology of a certain area. For example, speculate whether there are large voids underground, and then speculate whether it is a military base or command post.

He gave Tan Zhu an analogy, it's like going out alone after dinner and hearing various sounds. Putting these sounds together at the same time may feel very noisy, it's noise. But by analyzing these sounds in the simplest way possible, you will come up with a lot of information - the sound of wind, the sound of cars.

What is the purpose of the United States launching this cyber attack to analyze? Tan Zhu decided to start with American intelligence agencies and search for clues.

Many people are familiar with American intelligence agencies, such as the Federal Bureau of Investigation, the Central Intelligence Agency, and the National Security Agency.

But in reality, these agencies are just the tip of the iceberg in the US intelligence system. Currently, there are 18 intelligence agencies in the US:

These 18 institutions are affiliated with different departments in the United States and jointly weave an intelligence network.

Among them, the Central Intelligence Agency and the National Security Agency are habitual perpetrators of cyber attacks.

Last year, Northwestern Polytechnical University in China was attacked by the National Security Agency of the United States. More than two months ago, Tan Zhu also made an exclusive interpretation of how close the real version of the "Matrix" is to us, detailing how the Central Intelligence Agency of the United States carried out destructive operations online.

It is highly likely that cyber attacks were initiated by these two departments. In the US scenario, if this data is obtained, who will do the analysis work?


Why did the United States attack China's earthquake monitoring center? Monitoring Center | Earthquake | United States

Based on the US cyber attack on the earthquake monitoring center, Tan Zhu sorted out the functions of these 18 intelligence agencies and then focused on one agency - the US Defense Intelligence Agency.

The US Defense Intelligence Agency, as a foreign military intelligence agency under the US Department of Defense, has confidential information on its number of employees and budget.

The recent report related to it is that DIA established a "China Task Force" at the end of last year, which convened a group of analysts and experts to provide DIA with a "toolbox" specifically for China.

In addition, DIA will regularly release the "China Military Power Report", which is of great significance for the United States to formulate military policies towards China.

Besides, there is not much information about DIA. But after carefully examining the development process and organizational structure of DIA, we found that DIA also has a function - military geological research.

From this picture, it can be seen that there is a strong correlation between geology and military affairs.

The Gulf War, known as the boundary between modern and traditional warfare, saw the US military deploy a large number of high-tech weapons in actual combat, demonstrating overwhelming advantages on the battlefield.

At that time, many people focused their attention on the United States' air superiority, and few paid attention to another factor - the US military's geological and terrain intelligence.

Before launching the war, the US military conducted a large-scale acquisition and analysis of geological data from Iraq, and determined that the Iraqi command center was hidden 30 meters underground. In addition, the US military also conducted a geological analysis of the rock formations at the location of the center.

At the beginning of the war, the US military launched laser guided ground penetrating bombs with geological information chips, directly destroying the Iraqi military's command structure.

Seeing this, looking back at the network attack on the Wuhan earthquake monitoring center, is it a bit scary and thoughtful?

With the continuous development of war forms, the boundary between civilian and military facilities is becoming increasingly blurred, and precise strikes are becoming increasingly important.

To achieve precise strikes, more geological and terrain information is needed as support.

In order to obtain this information, US intelligence agencies have increased their efforts in cyber attacks and cyber theft. Currently, the United States has developed a complete set of cyber attack weapons and equipment that can attack global targets at will.

According to relevant reports, the United States has conducted multiple simulated strike tests on over 10000 key underground targets worldwide using its current geological intelligence, providing important references for precise strikes.


Why did the United States attack China's earthquake monitoring center? Monitoring Center | Earthquake | United States

With the development of geology in our country, the data monitored by earthquake monitoring centers will become increasingly multidimensional. This also means that once this information is leaked, more information can be analyzed.

Professionals say that the monitoring center will also simultaneously monitor information such as groundwater level and soil.

Tan Zhu noticed that the US Defense Intelligence Agency began studying the impact of soil on military operations several years ago, and related research has been subdivided into what effects soil moisture content and temperature will have on military vehicle traffic.

As the US national security strategy defines China as a "strategic competitor," major US intelligence agencies have also adjusted their primary task to help the US succeed in strategic competition with China.

On the wall of the headquarters of the US Defense Intelligence Agency, there is a sentence that says, "Pay attention to the opinions, comments, and jokes of the general public.". This sentence is a reminder to themselves that any subtle data and information has great value.

Now, the US Defense Intelligence Agency holds such an attitude, staring at China, hoping to obtain China's information through illegal means such as cyber attacks, and formulate plans against China.

The cyber attack weapons studied by US intelligence agencies have penetrated into various industries:

The hacker programs studied by the Central Intelligence Agency in the United States can specifically target smart TVs, and the over a thousand hacker systems they manufacture can almost cover the vast majority of electronic device systems on the current market;

The Office of Specific Intrusion Operations, a subsidiary of the US National Security Agency, studies how to remotely invade car computer systems to assassinate specific targets;

The move by the United States to attack the earthquake monitoring center indicates that the next step for US cyber attacks is to penetrate into daily and daily life.

Cyber attacks may seem distant from ordinary people, but when the United States develops cyber attack weapons, it consciously combines areas closely related to ordinary people. Once it launches a cyber attack, it will also affect ordinary people.

Faced with such enemies, what we need to do is not only to improve our protective capabilities, but also to weave a protective "sky net" through interdisciplinary and cross domain collaboration.

Two women were stabbed to death and reported to have committed a crime 4 days before the follow-up visit for schizophrenia. Suspect of a bloody murder case in a Hong Kong shopping mall appeared in court today. Male | Last Friday | Murder case
Two women were stabbed to death and reported to have committed a crime 4 days before the follow-up visit for schizophrenia. Suspect of a bloody murder case in a Hong Kong shopping mall appeared in court today. Male | Last Friday | Murder case

According to Hong Kong's Wen Wei Po, a bloody knife stabbing case occurred at Hollywood Square in Diamond Hill last Friday. The police arrested a 39 year old man on suspicion of stabbing two young women, one of whom was stabbed over 30 times. The suspect appeared in the Kwun Tong Magistrates Court this morning. The police at the Kwun Tong Magistrate's Court temporarily charged the suspect with two counts of murder last Sunday. The suspect appeared in court this morning at the Kwun Tong Magistrate's Court. Acting Chief Magistrate Zheng Jihang, after listening to the opinions of both the prosecution and defense, decided to postpone the hearing for two weeks until 9:30 am on June 19th, waiting for two psychiatric expert reports to be obtained. The defense did not object. Zheng Jihang approved the application, and the defendant needs to be temporarily detained at Xiaolan Mental Hospital. When the suspect appeared in court, he wore black framed glasses, a light gray shirt, and camouflage green shorts, and was able to answer the judge's questions normally. accordingly

Secretary of the Provincial Party Committee: The focus of Henan's "summer harvest" has shifted to agricultural machinery in the northern region of Henan Province. | Support | Science | Organization | Province | Northern Henan | Summer Harvest | Rush Harvest
Secretary of the Provincial Party Committee: The focus of Henan's "summer harvest" has shifted to agricultural machinery in the northern region of Henan Province. | Support | Science | Organization | Province | Northern Henan | Summer Harvest | Rush Harvest

Currently, the highly anticipated summer harvest work in Henan has shifted its focus to the northern region of Henan. According to the Henan Daily client, on June 4th, Lou Yangsheng, Secretary of the Henan Provincial Party Committee, presided over a special video scheduling meeting on the "Three Summers" work in the province, listened to the situation report, analyzed and judged the situation, and arranged and deployed the next steps of work. Governor Wang Kai made specific arrangements. On the evening of May 31, 2023, in Xiafutou Village, Xuliang Town, Boai County, Jiaozuo, Henan Province, villagers braved light rain in the wheat fields to harvest wheat. Visual China Map Lou Yangsheng pointed out that the current summer harvest battle in the province has entered the decisive stage. Doing a good job in summer harvest in northern Henan Province is related to the summer grain yield and seed safety. We should focus on seizing opportunities and make every effort to organize the wheat harvesting work in the northern Henan region, minimize losses, and protect the interests of farmers to the greatest extent possible. Accurate forecasting is essential

Xinhua All Media+| Welcome home! What innovative technologies are protecting the return journey of Shenzhou 15? Spaceship | Shenzhou | Technology
Xinhua All Media+| Welcome home! What innovative technologies are protecting the return journey of Shenzhou 15? Spaceship | Shenzhou | Technology

On June 4th, the return capsule of the Shenzhou-15 manned spacecraft successfully landed at the Dongfeng landing site. Astronauts Fei Junlong, Deng Qingming, and Zhang Lu all safely and smoothly exited the spacecraft, and the Shenzhou-15 manned flight mission was a complete success. What innovative technologies are there to safeguard the return journey of Shenzhou 15 in this mission? On June 4th, the return capsule of the Shenzhou-15 manned spacecraft successfully landed at the Dongfeng landing site. Xinhua News Agency reporter Lian Zhen photographed that "the sky and the ground" ensure the high-precision return of spacecraft. For the Shenzhou series spacecraft, the return and re-entry GNC technology is directly related to the life safety of astronauts. Taking the success of this return mission as a symbol, China has comprehensively upgraded its GNC system since the Shenzhou-12 manned spacecraft, which features autonomous rapid rendezvous and docking, autonomous adaptive prediction and re-entry return guidance, and has completed a comprehensive update and replacement

The Chinese naval fleet has arrived! Assembly | Navy | Chinese Fleet
The Chinese naval fleet has arrived! Assembly | Navy | Chinese Fleet

At noon today, a Chinese naval fleet consisting of Zhanjiang and Xuchang ships arrived at the assembly area of the "Comodo-2023" multinational maritime joint exercise. It is understood that the assembly anchorage for this exercise is 3 nautical miles long and 1.5 nautical miles wide, capable of anchoring up to 50 ships. Naval vessels from various countries participating in the exercise will also arrive at the anchorage today to complete the assembly of the "Komodo 2023" multinational maritime joint exercise, which is held every two years by the Indonesian Navy. This year is already the fourth edition of the exercise. The exercise will be held from June 5th to 8th in the city of Jakarta, South Sulawesi Province, Indonesia, including the port and sea phases. In the coming days, participating navies from various countries will participate in ship reading style search and rescue exercises, maritime interception and damage management exercises, aerial exercises, and other course objectives exercises

New comment: Donkey like "morale" limit pulls US debt "bomb" fuse hard to dismantle US | debt | morale
New comment: Donkey like "morale" limit pulls US debt "bomb" fuse hard to dismantle US | debt | morale

On the evening of June 1st, the US Senate passed a bill on the federal government's debt ceiling and budget, and the flame of the US debt bomb was temporarily extinguished at the last moment. The two parties in the United States have staged an extreme tug of war over the US debt bomb. Some experts believe that the US debt crisis is the result of the reckless politics promoted by the US dollar hegemony, and the underlying cause of this crisis is the highly polarized political system of the US. Since the end of World War II, the US Congress has adjusted the debt ceiling more than a hundred times. The recurring debt crisis will not only have a catastrophic impact on the US economy and people's livelihoods, but also continuously erode the value of US dollar assets such as government credit and US bonds, bringing significant and far-reaching impacts to the global economic landscape. 【