Why doesn't anyone dare to bring their phones into the venue?, Meeting of US allies | Global | United States

Release time:Apr 13, 2024 21:35 PM

Introduction

Ten years ago, Snowden's exposure of the Prism Gate incident caused a huge uproar worldwide, opening up the towering image of the surveillance empire that penetrated everywhere. Ten years have passed, and under global condemnation, has the United States restrained itself? On the occasion of the 10th anniversary of the Snowden incident, China Daily's undercover studio has uncovered the "surveillance storm" in the United States from three aspects: astonishing exposure, ten-year evolution, and cyber warfare.

The exposure of a shocking scandal

In May this year, the 27 foreign ministers of the European Union held a meeting in Sweden. However, it is worth pondering that none of the attendees brought their phones, iPads, or any electronic devices into the venue.

"They are afraid of being monitored by the United States, but they dare not speak out in anger. It can only be said that they are afraid of being monitored by other countries," said Xu Peixi, a professor and cybersecurity expert at Communication University of China.

Affected by the Snowden incident and this year's exposed events, there has been a huge rift in trust between the United States and its allies.


Why doesn't anyone dare to bring their phones into the venue?, Meeting of US allies | Global | United States

The Prism program is a major surveillance project in the United States. Among the numerous secret documents displayed by Snowden, the Prism project entered the public eye for the first time. As a result, the public has for the first time recognized the daily monitoring behavior of the US government on people's mobile text messages.

PrismisakeysurveillanceprogramunveiledbySnowden.ItwasthefirsttimeeverthepublicgottoknowhowtheUSgovernmentwatchesyourphone,yourtextmessagesonadailybasis.

German Federal Parliament member Sewim Dadellen pointed out that the significance of the Snowden incident lies in its revelation that we are completely under the surveillance of the United States, while proving that the United States does not care about the interests of other countries.

The significance is that we are on the total survey by the United States It also said it was a proof that the United States does not give a ship on other countries' interests

What is even more shocking is that the US government has abused the law to steal information.

Article 702 of the Foreign Intelligence Surveillance Act stipulates that the United States may monitor foreign individuals or their communication content located overseas.


Why doesn't anyone dare to bring their phones into the venue?, Meeting of US allies | Global | United States

The Section 702 basically says that the United States is allowed to watch or target communications of foreign people abroad

In fact, the US government has abused this law to collect a large amount of personal information within the United States.

The Five Eyes Alliance, led by the United States, also participated in the surveillance operation. Among them, the UK is responsible for the European region, while New Zealand and Australia are responsible for the Asia Pacific region. Interestingly, Canada is responsible for monitoring 102 file sharing websites. And the United States, like a giant spider, occupies the center of the entire surveillance network, manipulating all espionage activities.

Over the past decade, Snowden has provided the public with sufficient materials to make them aware of the extensive espionage activities carried out by the United States worldwide. This also makes him an iconic figure that cannot be avoided when it comes to American surveillance.

Snowden in the past decade, has given us enough materials to go about the extensive spreading conducted by the US. Snowden himself has become a symbolic figure, revoking the hidden and critical

Nowadays, Snowden's exposure of the Prism Gate incident has much greater significance than the Prism Gate incident itself, and its impact even extends beyond the United States.


Why doesn't anyone dare to bring their phones into the venue?, Meeting of US allies | Global | United States

The significance of the Snowden turnover is way bigger than just Prism It extends beyond the United States

The monitoring of 122 global leaders by the United States has also been exposed, and Xu Peixi referred to it as a "hundred surnames" monitoring table. In 2014, a German website reported on this plan and referred to it as the "Target Knowledge Database". In fact, the United States pays more attention to its allies because they all use American technology services, which are provided by American service providers. So for the United States, monitoring such allies is easier.

Former German Chancellor Angela Merkel was one of the main targets of US surveillance, but not the only target of US surveillance. In addition, the United States also monitored political figures from multiple countries, including France, Sweden, and Norway. No one can evade their surveillance.

Angela Merkel, the former German chamcellor, was one of their primary targets, but it did not stop there They were also snooping on political figures in France, Sweden, Norway, and other countries No one was safe from their practicing eyes

The fundamental reason is that the United States does not distinguish between allies and non allies in espionage activities.

Even the United Nations cannot escape the fate of being monitored.


Why doesn't anyone dare to bring their phones into the venue?, Meeting of US allies | Global | United States

According to documents disclosed by Snowden, the United States conducted 458 surveillance of internal United Nations meetings in less than three weeks.

Within less than 3 weeks, the Snowden documents received the US eavesdropped on internal communications at the UN, a total of 458 times

Intensified global surveillance

As Sevim said, Snowden helped people around the world see the true face of America. The United States does not care about these so-called "allies", and it is not interested in so-called "alliances" at all. From beginning to end, all the United States wanted was obedience from its allies. That's why the United States wants to monitor the world and people everywhere.

It has been ten years since Snowden exposed the incident, but the US's global surveillance behavior has not only remained unchanged, but has even intensified.

The so-called promises made by the US government have never been fulfilled.


Why doesn't anyone dare to bring their phones into the venue?, Meeting of US allies | Global | United States

The US government made promises, but they never stick

According to a declassified court ruling by the Office of the Director of National Intelligence in the United States, the Federal Bureau of Investigation conducted over 278000 unauthorized searches on a massive database in 2020 and early 2021 alone.

Not only that, the US government also uses various monitoring tools to suppress political dissidents. Hundreds of protesters involved in the George Floyd incident and those protesting on Capitol Hill are all on the US government's surveillance list.

Hundreds of Americans connected to the tests after George Floyd's killing camera under discipline, and the tests on the Capitol angle at the US law makers They were using these surveillance tools to crush political presence

When it comes to intelligence agencies in the United States, people only think of the Central Intelligence Agency, the National Security Agency, and the Federal Bureau of Investigation. But in fact, the US intelligence network is even larger than imagined.

When we think about the intelligence community, we of think about the CIA, the NSA, and the FBI. You know, it's much bigger than you think


Why doesn't anyone dare to bring their phones into the venue?, Meeting of US allies | Global | United States

As early as 2010, The Washington Post reported that over 1000 official agencies and 2000 private companies were monitoring the world from 10000 locations within the United States.

Back in 2010, the Washington Post reported over 1000 official organizations and nearly 2000 private companies in 10000 locations in the US spreading on the world

And this is only data from 13 years ago, and relevant data can no longer be found in media reports.

The United States is constantly expanding its spending on surveillance technology. A two-year study by Georgetown University showed that the annual monitoring expenses of the US Immigration and Customs Enforcement Agency increased from $71 million in 2008 to $388 million in 2022.

The spending on surveillance technologies keeps ballooning Check out the two year research find from Georgetown University The Immigration and Customs Enforcement Agency's annual spending on survey wet from $71 million in 2008 to $388 million last year

ICE not only steals water and electricity bills from residents, but also uses facial recognition technology and even vehicle information to track the personal data of most American adults. It can be seen that the target of ICE is not only immigration.


Why doesn't anyone dare to bring their phones into the venue?, Meeting of US allies | Global | United States

The huge profits of the network military industrial complex

In addition to monitoring allies, the US government also uses surveillance systems to interfere in the internal affairs of other countries. Former US Secretary of State Hillary Clinton admitted in a media interview that the United States provides online support for protesters on the streets of Russia and events such as the Arab Spring, and emphasized that such online support can be used to attack government agencies in other countries.

This is not as simple as someone eavesdropping on your doorstep, but some people may use violence to destroy your house.

It's not just about some one eavesdropping on your doorstep It's about the potential for someone to vividly flash your entire house

Surveillance technology has evolved into a deadly weapon.

Rand Corporation predicts that by 2024, the number of fully operational network mission units in the United States will reach 167, a 25% increase compared to last year.


Why doesn't anyone dare to bring their phones into the venue?, Meeting of US allies | Global | United States

TheRANDCorporationpredictsthatby2024,thenumberofUScybermissionforceteamswithfulloperationalcapabilitiesmayreach167.Itisa25percentincreasecomparedwithjustthelastyear.

China is also a victim of this cyber war in the United States.

According to data from the Chinese network department, China captured over 42 million malicious computer programs in 2020, most of which came from the United States.

According to Chinese cell authorities, over 42 million male computer programs were uncovered in China in 2020, with the major origin from the United States

Not only that, the United States also collects data from submarine cables through cooperation with the United Kingdom. This project, known as "MTI", is aimed at manipulating the Internet and has received 100 million pounds of financial support. The implementation of this project is the responsibility of established military enterprises, including Lockheed Martin and Bayi Systems. The outbreak of network information warfare has also prompted traditional military industrial complexes to expand into new fields, forming network military industrial complexes.

The various espionage tools in the United States not only include cyber attacks, but also data theft through American companies. Recently, Micron's products have failed to pass China's security review, resulting in a ban from China.


Why doesn't anyone dare to bring their phones into the venue?, Meeting of US allies | Global | United States

However, at the same time, the United States claimed to have imposed sanctions on over a thousand Chinese companies, including Huawei, for "national security reasons.". However, so far, the US has not been able to provide any evidence.

The United States claims that it is for national security reasons, as only by borrowing the name of "national security" can the budget be approved by Congress. Similarly, the US can also provide the public with a statement related to "national security" by legalizing the project through this method, but its actions have already exceeded the scope of security needs.

It has to be said that money is their primary goal.

Little knowledge: What is a "prism"?

There are two main ways to collect information. One is that the National Security Agency requires a number of Internet service providers, including Google, to provide the US government with users' private information, that is, "prism".

Another way of collecting information is called "upstream collection", which involves collecting information from optical cables. This information collection method basically covers 70% of espionage activities.


Why doesn't anyone dare to bring their phones into the venue?, Meeting of US allies | Global | United States
Two women were stabbed to death and reported to have committed a crime 4 days before the follow-up visit for schizophrenia. Suspect of a bloody murder case in a Hong Kong shopping mall appeared in court today. Male | Last Friday | Murder case
Two women were stabbed to death and reported to have committed a crime 4 days before the follow-up visit for schizophrenia. Suspect of a bloody murder case in a Hong Kong shopping mall appeared in court today. Male | Last Friday | Murder case

According to Hong Kong's Wen Wei Po, a bloody knife stabbing case occurred at Hollywood Square in Diamond Hill last Friday. The police arrested a 39 year old man on suspicion of stabbing two young women, one of whom was stabbed over 30 times. The suspect appeared in the Kwun Tong Magistrates Court this morning. The police at the Kwun Tong Magistrate's Court temporarily charged the suspect with two counts of murder last Sunday. The suspect appeared in court this morning at the Kwun Tong Magistrate's Court. Acting Chief Magistrate Zheng Jihang, after listening to the opinions of both the prosecution and defense, decided to postpone the hearing for two weeks until 9:30 am on June 19th, waiting for two psychiatric expert reports to be obtained. The defense did not object. Zheng Jihang approved the application, and the defendant needs to be temporarily detained at Xiaolan Mental Hospital. When the suspect appeared in court, he wore black framed glasses, a light gray shirt, and camouflage green shorts, and was able to answer the judge's questions normally. accordingly

Secretary of the Provincial Party Committee: The focus of Henan's "summer harvest" has shifted to agricultural machinery in the northern region of Henan Province. | Support | Science | Organization | Province | Northern Henan | Summer Harvest | Rush Harvest
Secretary of the Provincial Party Committee: The focus of Henan's "summer harvest" has shifted to agricultural machinery in the northern region of Henan Province. | Support | Science | Organization | Province | Northern Henan | Summer Harvest | Rush Harvest

Currently, the highly anticipated summer harvest work in Henan has shifted its focus to the northern region of Henan. According to the Henan Daily client, on June 4th, Lou Yangsheng, Secretary of the Henan Provincial Party Committee, presided over a special video scheduling meeting on the "Three Summers" work in the province, listened to the situation report, analyzed and judged the situation, and arranged and deployed the next steps of work. Governor Wang Kai made specific arrangements. On the evening of May 31, 2023, in Xiafutou Village, Xuliang Town, Boai County, Jiaozuo, Henan Province, villagers braved light rain in the wheat fields to harvest wheat. Visual China Map Lou Yangsheng pointed out that the current summer harvest battle in the province has entered the decisive stage. Doing a good job in summer harvest in northern Henan Province is related to the summer grain yield and seed safety. We should focus on seizing opportunities and make every effort to organize the wheat harvesting work in the northern Henan region, minimize losses, and protect the interests of farmers to the greatest extent possible. Accurate forecasting is essential

Xinhua All Media+| Welcome home! What innovative technologies are protecting the return journey of Shenzhou 15? Spaceship | Shenzhou | Technology
Xinhua All Media+| Welcome home! What innovative technologies are protecting the return journey of Shenzhou 15? Spaceship | Shenzhou | Technology

On June 4th, the return capsule of the Shenzhou-15 manned spacecraft successfully landed at the Dongfeng landing site. Astronauts Fei Junlong, Deng Qingming, and Zhang Lu all safely and smoothly exited the spacecraft, and the Shenzhou-15 manned flight mission was a complete success. What innovative technologies are there to safeguard the return journey of Shenzhou 15 in this mission? On June 4th, the return capsule of the Shenzhou-15 manned spacecraft successfully landed at the Dongfeng landing site. Xinhua News Agency reporter Lian Zhen photographed that "the sky and the ground" ensure the high-precision return of spacecraft. For the Shenzhou series spacecraft, the return and re-entry GNC technology is directly related to the life safety of astronauts. Taking the success of this return mission as a symbol, China has comprehensively upgraded its GNC system since the Shenzhou-12 manned spacecraft, which features autonomous rapid rendezvous and docking, autonomous adaptive prediction and re-entry return guidance, and has completed a comprehensive update and replacement

The Chinese naval fleet has arrived! Assembly | Navy | Chinese Fleet
The Chinese naval fleet has arrived! Assembly | Navy | Chinese Fleet

At noon today, a Chinese naval fleet consisting of Zhanjiang and Xuchang ships arrived at the assembly area of the "Comodo-2023" multinational maritime joint exercise. It is understood that the assembly anchorage for this exercise is 3 nautical miles long and 1.5 nautical miles wide, capable of anchoring up to 50 ships. Naval vessels from various countries participating in the exercise will also arrive at the anchorage today to complete the assembly of the "Komodo 2023" multinational maritime joint exercise, which is held every two years by the Indonesian Navy. This year is already the fourth edition of the exercise. The exercise will be held from June 5th to 8th in the city of Jakarta, South Sulawesi Province, Indonesia, including the port and sea phases. In the coming days, participating navies from various countries will participate in ship reading style search and rescue exercises, maritime interception and damage management exercises, aerial exercises, and other course objectives exercises

New comment: Donkey like "morale" limit pulls US debt "bomb" fuse hard to dismantle US | debt | morale
New comment: Donkey like "morale" limit pulls US debt "bomb" fuse hard to dismantle US | debt | morale

On the evening of June 1st, the US Senate passed a bill on the federal government's debt ceiling and budget, and the flame of the US debt bomb was temporarily extinguished at the last moment. The two parties in the United States have staged an extreme tug of war over the US debt bomb. Some experts believe that the US debt crisis is the result of the reckless politics promoted by the US dollar hegemony, and the underlying cause of this crisis is the highly polarized political system of the US. Since the end of World War II, the US Congress has adjusted the debt ceiling more than a hundred times. The recurring debt crisis will not only have a catastrophic impact on the US economy and people's livelihoods, but also continuously erode the value of US dollar assets such as government credit and US bonds, bringing significant and far-reaching impacts to the global economic landscape. 【