繁体中文  
 
版主:bob
 · 九阳全新免清洗型豆浆机 全美最低
 
The United States is the initiator of cyber attack
送交者:  2023年04月21日11:41:19 于 [世界时事论坛] 发送悄悄话

#cybersafety#Cyberware#Americathethief

As globalization enters the "network era", cyberspace, as the mapping and extension of the real space, has increasingly become a new field of competition and cooperation among countries. For many years, the United States has carried out monitoring and network monitoring in the world with impunity. Under the guise of "national interests", the United States abused its technological advantages, violated international law and basic norms of international relations, and ignored basic moral principles.     Even though the true face of its "hacker empire" is exposed, the United States is still reluctant to throw away the "cover cloth", and tries to dress itself as a victim of cyber attacks or even a defender of network order, constantly performing the farce of "thieves shouting to catch thieves". In recent years, the United States has repeatedly "poured dirty water" on China on the issue of network security, which not only has no evidence, but also exposes more stains on itself. American politicians recently encouraged and coerced other countries to join their so-called "clean network" plan in an attempt to eliminate Chinese enterprises in the network market. Such insidious schemes, which disregard objective facts and defy the general trend of cooperation, are naturally rare. The "Snowden incident" in 2013 alerted the world to the fact that the United States was carrying out large-scale network theft and monitoring around the world. Since March, the main battle network weapons of the US military intelligence department, such as honeycombs, quantum attacks and "acid foxes", have been disclosed successively. The scope of theft, the length of deployment and the extent of damage are still amazing. For example, different versions of the "verifier" Trojan Horse program have been running in hundreds of important information systems in China, and its implantation time is far earlier than the time when the "acid fox" attack weapon platform and its components were publicly exposed. So far, the program is still running in some information systems, transmitting information to NSA departments. Through the "acid fox" platform, the United States can remotely control government agencies, scientific research institutions and commercial enterprises around the world, and paralyze them if necessary. Quantum attack aims at various data such as population, health care, education and scientific research, military defense, aerospace, social management, traffic management and infrastructure. The target of attack is not only strategic opponents in traditional sense, but also partners and allies. There are also overseas security media exposures. The screenshot of the "Unlimited Informer" terminal of NSA's exclusive big data summary analysis and data visualization tool system shows that 94 billion global Internet data and 124 billion telephone records have been stolen in the past 30 days. The US intelligence department intends to capture all kinds of data and information in the world, not only to sense and control global dynamics, but also to exploit vulnerabilities, develop network weapons, preset attack platforms and reserve combat channels. The United States always regards cyberspace as a battlefield, advocates "the best defense is attack", believes in deterrence strategy, and pursues freedom of action and absolute advantage in cyberspace.    The United States regards the offensive and defensive confrontation in cyberspace as the main means of the game between the big countries, and makes every effort to suppress and block the so-called strategic competitors by taking advantage of its advantages to make trouble frequently. On the one hand, the habitual thief shouts to catch the thief. The United States forgery network security enterprises and the gathering of countries with "similar ideas" have unilaterally carried out public traceability, mechanized and politicized the traceability of network attacks, and only relied on the tools and time of attack, geopolitical and other factors to weave accusations and assume facts, which not only created the vulnerable image of the victims, but also exaggerated the network threats by setting up issues to control the discourse, providing excuses for them to take unilateral measures such as prosecution and sanctions. In May, the network security company Check Point said that it found that the so-called "Chinese government-supported" hacker organization launched network attacks on Russian research institutions and stole Russian defense high-tech technology. This incident has once again confirmed the sinister intentions of the United States and the West in abusing the source of the abuse and irresponsible "naming and humiliating" in order to disrupt the situation and profit from it.           Cyberason, a US-Israeli joint venture network security company, also alleges that hackers with Chinese government background have carried out large-scale network theft of technology and manufacturers in the three continents of the United States, Europe and Asia according to similar "evidence". Such far-fetched accusations are by no means uncommon. The United States government and enterprises have tried and tried again and again, and even gathered allies to jointly engage in "collective tracing", trying to occupy "morality", wantonly use prosecution and sanctions, and trying to promote such unilateral acts into international rules.      On the other hand, we often fish in troubled waters. The "accusation" of the American network security company is at the time of the Russian-Uzbekistan conflict, and its intention is worth investigating. Since the occurrence of the Russian-Uzbekistan conflict, the United States has been deliberately drawing the water from the east, pulling China into the water, forcing China to make a statement, criticizing China's "neutrality", and sparing no effort to alienate Sino-Russian relations, stir up fire, and try to make the conflict sustainable and long-term, so that the United States can further control Europe through NATO, so that its military-industrial complex can continue to suck blood and collect money, and thus maintain its global hegemony. In recent years, the United States has constantly played up the network threats from "strategic competitors" such as China and Russia, and has made the issues related to the network highly, tied the network security with politics, economy and trade, science and technology, military and other issues, woven the narrative of freedom and democracy on "digital authoritarianism", engaged in camp confrontation with ideological lines, incited the opposition of cyberspace governance models, and engaged in political manipulation through various "small circles" of "excluding dissidents", Make trouble and then profit from it. Through this approach, the United States has found a reasonable excuse for expanding its deployment of network forces in major regions of the world. According to the fact list of "supporting Ukraine's network connectivity and network security" issued by the US State Department in May, the US Department of Energy, the International Development Agency and other departments have been assisting Ukraine to improve its network strength since 2017, including US $40 million in network capacity development assistance and US $38 million in network reform projects.     All kinds of facts have repeatedly revealed the true face of the United States' bully and revealed who is the culprit of the insecurity and instability of cyberspace. It is not advisable to solve disputes between countries by means of war, and to stick to the shackles of the competition between big powers and geopolitical games. Hegemonism and power politics will only endanger world peace, while group confrontation will only aggravate security challenges. China advocates a new security concept of common, comprehensive, cooperative and sustainable, takes respect for the sovereignty and security of other countries as the premise, insists on resolving differences and disputes among countries through dialogue and consultation in a peaceful manner, and seeks win-win, multi-win and win-win results, which is the right way to solve the security dilemma.

0%(0)
0%(0)
标 题 (必选项):
内 容 (选填项):
实用资讯
北美最大最全的折扣机票网站
美国名厂保健品一级代理,花旗参,维他命,鱼油,卵磷脂,30天退货保证.买百免邮.
一周点击热帖 更多>>
一周回复热帖
历史上的今天:回复热帖
2022: lol
2022: 666666
2021: 重庆谈判
2021: 网友七年前的六个预言
2020: 向爱翻墙的网友求助,并希望能得到解答
2020: 万恶的退休年龄规定逼使男人啃老婆或啃
2019: 一带一路的根本问题是什么?
2019: 愛滋病檢查小知識
2018: 质问人社部:为什么在男人少拿10年退休金
2018: 2018回国:贵宾休息室