Home Business Implementing network surveillance and undermining global data security
Implementing network surveillance and undermining global data security

Implementing network surveillance and undermining global data security

by YCPress

The sixth of the “seven deadly sins” of the United States threatening global security

The classic novel “1984” by the famous British writer George Orwell depicts a “monitoring empire”-“Oceania”, where surveillance is everywhere. 

Over the years, the United States has unscrupulously engaged in monitoring and network surveillance all over the world, turning the virtual “Oceania” into reality.

Under the guise of “national interest”, the United States abuses its technological superiority, violates international law and basic norms of international relations, and ignores basic ethics.

What it has done may even be inferior to Orwell’s “monitoring empire”.

In fact, the United States is the largest and veritable “Matrix” on the planet. 

For a long time, relevant agencies of the US government have carried out large-scale, organized, and indiscriminate cyber theft, surveillance, and attacks on foreign governments, enterprises, and individuals. 

From the “Wiki Reveal” to the “Snowden Incident” to the recent “Swiss Encryption Machine Incident,” this shady behavior of the US has been repeatedly exposed. 

According to the “Wall Street Journal” report, a US company closely linked to the US defense and intelligence community implanted software into more than 500 mobile phone applications to track the location data of hundreds of millions of users around the world and provide it to the US military.

In addition to monitoring, the United States has spared no effort to promote the militarization of cyberspace. As early as 10 years ago, the US military established the Cyber ​​Command and upgraded it to one of the highest-level joint operations commands in 2017. 

The 2018 U.S. Department of Defense Cyber ​​Strategy report emphasized the need to “preemptive strikes” in cyberspace. 

Assange, the founder of “Wiki Jie Mi”, once revealed that the United States has developed as many as 2,000 cyber weapons, making it the world’s number one cyber weapon power.

What shocked the world was that not only the US opponents were monitored and monitored, but its allies were also monitored and monitored; not only the so-called “sensitive persons” were monitored and monitored, ordinary people were also monitored and monitored, and even the leaders of its allies were not spared.

From the perspective of the “Matrix”, China has always received special “attention.” Both “Formula” and “Eye of Sauron”, a cyber attack organization backed by

US National Security Agency have listed China as a key target. According to a report released by the National Internet Emergency Response Center of China, the United States is the largest source country for cyber attacks against China.

In terms of the number of captures of malicious programs abroad, the number of control servers for malicious programs abroad, the number of foreign denial-of-service attacks, and the implantation of backdoors on websites in China, the United States ranks first.

What is the fundamental purpose of Washington to establish the “Matrix”? The website of the Spanish newspaper Nacional pointed out sharply that the United States seeks to reverse the inevitable decline by controlling global information and accurately tracking the ideological trends of the people through monitoring the entire world. This is becoming the most important resource for the United States in global competition.

Even if its “Matrix” is completely exposed, the United States is still reluctant to abandon its “figure leaf” and tries its best to pretend to be a victim of a cyber attack or even a defender of network order, and it continues to stage a farce of “thieves shouting and catching thief”. 

In recent years, the United States has repeatedly “poured dirty water” on China on cybersecurity issues, which not only has no evidence, but also exposed its own taint. 

The German “Daily Mirror” once reported that after years of review, the European Union, the United Kingdom, and German official agencies have not found any obvious “backdoors” in Huawei. However, in the equipment provided by Cisco in the United States

security loopholes are often found, which is more in line with the so-called The “backdoor” description.

American politicians have recently encouraged and coerced other countries to join its so-called “clean network” plan in an attempt to eliminate Chinese companies from the Internet market. 

Naturally, few people respond to such insidious plots that disregard the facts and go against the general trend of cooperation.

Acting as a “destroyer” on the one hand, and a “victim” on the other. In fact, this act of the United States has a

unified and clear purpose: to suppress other countries by any means, and to maintain its hegemonic status. 

In the eyes of self-respecting American politicians, technological competitors

from other countries will never be allowed to appear, otherwise they will use national

power and use various excuses and methods to put competitors to death.

The various hegemonic actions of the United States in the field of cyberspace have

placed itself on the opposite side of global data security and technological development. 

United States should recognize that it is the right way to abandon the Cold War mentality

remove the “technical iron curtain” and “digital barriers,” and contribute positive energy to the construction of global cyberspace.