International observation | The "matrix" with bad records-The beginning of the US undermining global network security

International observation | The "matrix" with bad records-The beginning of the US undermining global network security

  Xinhua News Agency, Beijing, September 15th(International observation) The "Matrix" with bad records — — At the beginning, the United States undermined global network security.

  Xinhua News Agency reporter Huang Kun

  According to the latest report of China National Computer Virus Emergency Response Center, in the process of cooperating with 360 Company to investigate the cyber attack of Northwestern Polytechnical University, several samples of spyware named "Second Dating" were successfully extracted. According to reports, the software is a network "spy" weapon developed by the National Security Agency of the United States, and the investigation team found that it runs covertly in thousands of network devices all over the world.

  For a long time, the United States has a bad track record in the field of network security. From the "Prism Gate" ten years ago to the "Leak Gate" this year, a great deal of evidence shows that the network monitoring and attacks in the United States have never stopped, including the victims of the United Nations and its allies.

  "There is no refuge, no resting place, and the US government will not accept any place outside its monitoring vision." American journalist Barton german revealed this in the book American Black Mirror.

  As the world’s largest "matrix" and cyber thief, what the United States has done has seriously damaged the sovereignty of other countries and seriously violated the privacy of global Internet users. China is the biggest victim of global cyber attacks, most of which come from the United States.

  China is the biggest victim of cyber attacks.

  In July this year, the relevant departments of China reported that the Wuhan Earthquake Monitoring Center had suffered a cyber attack. According to media tracking reports, Du Zhenhua, a senior engineer of the National Computer Virus Emergency Response Center, said that the joint investigation team found backdoor malware with very complicated technology in the network of the victim unit, which is in line with the characteristics of American intelligence agencies.

  China’s Foreign Ministry spokesperson Wang Wenbin pointed out at a regular press conference in the same month that China’s government departments are suffering from massive cyber attacks almost every day, most of which originate from the United States.

  On May 4th this year, China National Computer Virus Emergency Response Center and 360 Company jointly released the "Matrix" investigation report — — The United States Central Intelligence Agency. This report shows that the CIA has launched a massive global cyber attack: using a large number of back doors and loopholes that have not been disclosed so far, it has established "zombie" networks and attack springboard networks around the world, and carried out attacks and intrusions in stages against network servers, network terminals, switches and routers, and a large number of industrial control equipment. In the cyber attack specifically targeted at targets in China, relevant institutions successfully extracted several samples of "Dome 7" cyber attack weapons, and institutions in several Southeast Asian countries and Europe also extracted almost identical samples. "Dome 7" is the secret attack method of the CIA Network Intelligence Center disclosed on the Wikileaks website in 2017.

  Last April, Xi ‘an police received an alarm, and the information system of China Northwestern Polytechnical University found traces of cyber attacks. The technical team investigating this incident successively extracted Trojan samples from the university’s multiple information systems and Internet terminals, comprehensively used the existing domestic data resources and analysis methods, and got the full support of some partners in Europe and Southeast Asia, fully restored the overall profile, technical characteristics, attack weapons, attack paths and attack sources of related attacks, and initially determined that related attacks originated from the "Specific Invasion Action Office" of the National Security Agency of the United States.

  The latest circular issued by China National Computer Virus Emergency Response Center said that in the process of cooperating with the investigation of the cyber attack of Northwestern Polytechnical University, several samples of spyware named "Second Dating" were successfully extracted. According to the internal documents of the National Security Agency leaked by the hacker organization "Shadow Broker", this malware is a network "spy" weapon developed by the National Security Agency. It is mainly deployed in the border devices (gateways, firewalls, border routers, etc.) of the target network, secretly monitoring network traffic, and accurately selecting specific network sessions for redirection, hijacking and tampering as needed.

  The above case is the tip of the iceberg for the United States to launch cyber attacks on China. According to the summary report of Internet network security situation released by the website of China National Internet Emergency Center in 2021, in 2020, more than 42 million samples of computer malicious programs were captured in China, among which foreign malicious programs mainly came from the United States, accounting for 53.1%. In 2020, there will be 52,000 overseas computer malware control servers that control hosts in China, among which about 19,000 control servers are located in the United States, ranking first.

  American network monitoring and attacks have never stopped.

  "Espionage is a deep-rooted habit that has been embedded in American history." An article in Time magazine in the United States once commented like this.

  According to the latest report of China National Computer Virus Emergency Response Center, the investigation team found that thousands of network devices all over the world are still running the "second date" spyware and its derivative versions, and found the springboard servers remotely controlled by the National Security Agency of the United States, most of which are located in Germany, Japan, South Korea, India and Taiwan Province, China.

  In April this year, the "Leak Door" incident caused a great uproar. A batch of suspected secret documents of the US military were leaked to social media, and their contents showed that the United States monitored the internal dialogue between Ukrainian President Zelensky and Ukrainian officials, and obtained the internal communication between South Korea and Israel and other allies. The US media pointed out that the relevant information was obtained by the US through the so-called "signal intelligence", which is a special term in the intelligence community, which means that the US government continues to monitor these countries.

  The surveillance scandal in the United States is nothing new. In 2013, edward snowden, a former American defense contractor employee, exposed to the media a large-scale secret surveillance project codenamed Prism, which covered not only American citizens, but also politicians and people in European countries such as France and Germany. In May 2021, the European media broke the news that the United States, with the help of the Danish intelligence department, monitored the leaders of European countries such as Germany, France, Sweden and Norway.

  On July 12, 2013, journalists opened a web page in Moscow, Russia, to browse Snowden’s message. Xinhua News Agency reporter Jiang Kehong photo

  In recent years, various monitoring projects in the United States have been exposed continuously, including the "echelon" project for satellite communication initiated in the 1960s, the "Star Wind" project whose monitoring target covers American citizens, the "arch" project for global network security vendors, the "magic" project for telephone monitoring, and the "upstream" project for copying optical signals from network backbone optical cables and switches. It can be said that from e-mail, voice calls to social networks, from foreign leaders, foreign people to the American people, the United States is also listening.

  In addition to monitoring, the United States frequently launches cyber attacks on other countries. According to the hacker organization "Shadow Broker", the US National Security Agency conducted cyber attacks on 287 targets in more than 45 countries and regions, including Russia, Japan, Spain, Germany and Italy, which lasted for more than ten years. Andrei Krutskikh, Director of the Department of International Information Security of the Russian Foreign Ministry, said that as of May 2022, more than 65,000 hackers from the United States and other countries regularly participated in the attacks on Russia’s key information infrastructure.

  The United States also combines cyber attacks with traditional intelligence means as an important means of "mixed war." In 2010, the United States implanted the "Shenzhen" virus into the internal network of Iran’s Natanz nuclear facility through espionage, which led to the paralysis of a large number of uranium enrichment centrifuges.

  The cyber military power of the United States has also been expanding in recent years. In 2017, the US Cyber Command was upgraded to the 10th Joint Operations Command of the US Army, and the cyberspace was officially juxtaposed with the ocean, land, sky and space, becoming the "fifth battlefield" of the US military. In 2018, the US Department of Defense’s cyber strategy report emphasized that it is necessary to "preempt" in cyberspace.

  The United States has always gone its own way to safeguard hegemony.

  Over the years, American network monitoring and attacks have been repeatedly exposed and widely criticized by the international community. However, in order to safeguard its own hegemony, the United States still goes its own way, and continues to wantonly undermine network security and trample on international norms and the sovereignty of other countries.

  After the "Prism Gate" was exposed, Nassil Key, then spokesman of the UN Secretary-General, said in October 2013 that the UN contacted the US on the report that it was monitored by the US intelligence department, and the US government had promised not to monitor the UN. He emphasized that the inviolability of diplomatic missions, including the United Nations, is a widely accepted principle of international law, and all Member States of the United Nations should abide by this principle. However, the information exposed by Leak Door this year shows that the United States is still listening to the private conversations between the UN Secretary-General and other UN officials.

  On October 26th, 2013, hundreds of people took part in a demonstration in Washington, D.C., protesting the large-scale surveillance activities of the National Security Agency (NSA) against ordinary Americans. Xinhua News Agency reporter Fang Yushe

  The same is true of the United States to its allies. The documents exposed by Prism Gate show that the United States has monitored dozens of diplomatic institutions, including the Korean Embassy in the United States. At that time, the South Korean government asked the US for an explanation, while the US prevaricated with the statement that "the intelligence operation will be reassessed". However, this year’s "Leak Door" information shows that the US intelligence agencies continue to monitor South Korean government officials. A few months after the "Prism Gate" incident in 2013, the German government revealed that the mobile phone of then Chancellor Angela Merkel might be monitored by US intelligence agencies. Merkel later called the then US President Barack Obama directly and criticized this as a "serious breach of trust". The incident ended with the US promising not to monitor Merkel’s communication equipment. However, the "monitoring door" exposed in 2021 shows that the United States is still monitoring Merkel at least until 2014.

  With false promises, but in fact, there is no convergence, and cyber attacks undermine the sovereignty of other countries. All kinds of actions confirm the comments of the article on the website of Helsinki Times in Finland: The United States has been proved to be the largest matrix in the world and the most serious threat to global cyber security.

  -END-

  Planning: Ni Siyi

  Producer: Feng Junyang, Shang Jun

  Coordinator: Zhao Zhuoyun, Yan Junyan and Lin Xiaochun

  Reporter: Huang Wei

  Editor: Liu Zan Song Ying Liang Shanggang Chen Yufen

  Produced by Xinhua News Agency International Department

关于作者

admin administrator