This is the most colorful era of the Internet, and this is the darkest era of the Internet; at the regular press conference of the Ministry of National Defense on June 30, Senior Colonel Tan Kefei, deputy director of the Information Bureau of the Ministry of National Defense and

2024/05/0503:52:33 technology 1225

This is the era when everyone creates data,

This is the era when everyone has data;

This is the most colorful era of the Internet,

This is the darkest era of the Internet;

This is the most secretive era,

This is the most The age of transparency.

When we are relaxing and playing our favorite games, it is peeping; when we are searching for information on the Internet to gain knowledge, it is peeping; when we are happily chatting remotely with family and friends, it is eavesdropping.

Where are people in the Internet age?

On the surface, everyone seems to be freely surfing the Internet and enjoying a wonderful online life according to their own wishes; in fact, without knowing it, "it" behind the electronic screen has stolen their data, stolen their privacy, and stolen their dignity. .

It is the United States, the “masked boss” that sneaks behind the Internet and eavesdrops on the world.

This is the most colorful era of the Internet, and this is the darkest era of the Internet; at the regular press conference of the Ministry of National Defense on June 30, Senior Colonel Tan Kefei, deputy director of the Information Bureau of the Ministry of National Defense and  - DayDayNews

At the regular press conference of the Ministry of National Defense on June 30, Colonel Tan Kefei, deputy director of the Information Bureau of the Ministry of National Defense and spokesperson of the Ministry of National Defense, said that for a long time, the United States has violated international law and basic norms of international relations, and has carried out persecution against foreign governments, enterprises and individuals. Large-scale, organized, and indiscriminate cyber theft, surveillance, and attacks. From the "Prism Gate ", "Project Angry Angle" and "Project Starwind" to "Operation Telescreen", "Hive" platform and quantum attack system, facts have proven that the United States is a veritable Matrix, eavesdropping and secret-stealing empire. .

In the fake online world, the various hegemonic behaviors of the United States have repeatedly made the world "look at it with admiration". It is no exaggeration to say that even if all the most ferocious fraudsters, thieves and criminals on the Internet were added up, they would still be far less powerful than the United States, which wears many layers of masks.

Top secret level

Network surveillance plan

This is the most colorful era of the Internet, and this is the darkest era of the Internet; at the regular press conference of the Ministry of National Defense on June 30, Senior Colonel Tan Kefei, deputy director of the Information Bureau of the Ministry of National Defense and  - DayDayNews

Turn mobile phone application

into a surveillance unit

In June 2013, the former Central Committee of the United States Intelligence Agency staff Edward Snowden via the British " Guardian " and the United States " The Washington Post 》Exposed the US "Prism (PRISM)" program. According to reports, the "Prism" project, officially codenamed "US-984XN," requires the telecommunications giant Verizon to hand over the call records of millions of users every day. It also uses the servers of nine well-known Internet companies in the United States to monitor the servers to obtain massive information. On June 7, the then President of the United States Obama recognized the plan.

Launch time Since 2007

Annual cost $20 million

Implementers

National Security Agency , FBI

participants

Microsoft , Yahoo, Google , Facebook , PalTalk , YouTube, Skype, United States Online, Apple Inc.

Monitoring objects

Any user who uses the services of participating companies such as Microsoft, Yahoo, and Google in countries and regions outside the United States; U.S. citizens who communicate with people abroad

Monitored content

Emails, instant messages, videos, photos , storage of data, voice chat, file transfer, etc.

incident results

incident whistleblower Edward Snowden was hunted globally by the US government and fled to Russia for refuge.

This is the most colorful era of the Internet, and this is the darkest era of the Internet; at the regular press conference of the Ministry of National Defense on June 30, Senior Colonel Tan Kefei, deputy director of the Information Bureau of the Ministry of National Defense and  - DayDayNews

"Project Angry"

An "innovation" by the US intelligence agency

Via the App Store

Stealing data

According to the Canadian Broadcasting Corporation (CBC), as early as 2012, the US National Security Agency and the " Five Eyes Alliance "Other member intelligence agencies have targeted online stores where mobile applications can be downloaded and computer servers . In regions other than their countries, such as Europe, Africa, Asia, etc., they use Google's application store Play Store to download to mobile phones. Implant spyware or cracking program vulnerability . It is precisely by relying on this method that the "Five Eyes Alliance" successfully stole massive amounts of information.

This is the most colorful era of the Internet, and this is the darkest era of the Internet; at the regular press conference of the Ministry of National Defense on June 30, Senior Colonel Tan Kefei, deputy director of the Information Bureau of the Ministry of National Defense and  - DayDayNews

"Project Starwind"

The beginning of Project "Prism"

"Project Starwind" is a data mining of the communications of U.S. citizens, including email communications, phone conversations, financial transactions and Internet activity. In 2004, the U.S. government launched the "Stellar Wind" project to conduct large-scale intelligence collection and surveillance. Later, due to legal and other issues, the "Stellar Wind" was split into "Prism" and "Main Street" Projects such as Main Way, Marina and Nucleon were taken over by the National Security Agency.

This is the most colorful era of the Internet, and this is the darkest era of the Internet; at the regular press conference of the Ministry of National Defense on June 30, Senior Colonel Tan Kefei, deputy director of the Information Bureau of the Ministry of National Defense and  - DayDayNews

Main Road and Terminal projects store and analyze billions of "metadata" on communications and the Internet respectively (under the semantics of phone and Internet surveillance, metadata mainly refers to the time and place of a call or communication , use of equipment, participants, etc., excluding phone calls or emails, etc.).

Compared with main roads and docks, the nuclear project focuses more on obtaining content information, and achieves daily monitoring by intercepting the conversation content and keywords of callers.

This is the most colorful era of the Internet, and this is the darkest era of the Internet; at the regular press conference of the Ministry of National Defense on June 30, Senior Colonel Tan Kefei, deputy director of the Information Bureau of the Ministry of National Defense and  - DayDayNews

William Binney, the retired technical director of the US National Security Agency, responded in an interview that "even if the phone is turned off, people can still be heard." On the 23rd, Beijing Qi'an Pangu Laboratory Technology Co., Ltd. disclosed the complete technical details and attack organization connections of the backdoor from the United States - "Operation Telescreen" (Bvp47). Pangu Lab stated that this is a top-level backdoor created by "Formula", a top-notch hacker organization affiliated with the US National Security Agency, which is used to peek into and control the victim organization's network after intrusion.

This is the most colorful era of the Internet, and this is the darkest era of the Internet; at the regular press conference of the Ministry of National Defense on June 30, Senior Colonel Tan Kefei, deputy director of the Information Bureau of the Ministry of National Defense and  - DayDayNews

Click to view the larger image

Researchers revealed that "Operation Telescreen" extensively invaded 45 countries and regions including China, Russia, Japan, Germany, Spain, and Italy, and involved 287 important institutional targets, including well-known universities and scientific research institutions. , communications industry, government departments, etc. At least 64 targets have been invaded in China. The backdoor is mainly distributed in the basic core data department of Tongtong Communications, well-known universities and military-related units. There is evidence that the "Operation Telescreen" that has been raging for more than ten years is highly related to the "Prism Project" disclosed by Snowden, and it is still iterating its attack capabilities. Its existence may be close to 20 .

"Hive Platform"

The CIA

Main battle network weapons

Important information infrastructure

became a US "intelligence station"

China’s National Computer Virus Emergency Response Center released a relevant report in April, exposing and the CIA’s -specific "Hive" malicious code attack control weapon platform, as well as deploying network attack platforms globally, and setting up multi-layer springboard servers and VPN channels in France, Germany, Canada, Turkey , Malaysia and other countries.

This is the most colorful era of the Internet, and this is the darkest era of the Internet; at the regular press conference of the Ministry of National Defense on June 30, Senior Colonel Tan Kefei, deputy director of the Information Bureau of the Ministry of National Defense and  - DayDayNews

The U.S. Central Intelligence Agency uses the "Hive" weapon platform to customize malicious code programs adapted to multiple operating systems based on the attack target characteristics . It attacks and invades the border routers and internal hosts of the victim unit's information system, and implants various Trojans. , backdoor to achieve remote control, implements indiscriminate network attacks on information systems around the world.

This is the most colorful era of the Internet, and this is the darkest era of the Internet; at the regular press conference of the Ministry of National Defense on June 30, Senior Colonel Tan Kefei, deputy director of the Information Bureau of the Ministry of National Defense and  - DayDayNews

CIA attackers used a console program called "cutthroat" to control the client. Its main command parameters are shown in the figure. The

report points out that as long as contains hardware, operating systems and application software provided by American Internet companies, it is very likely that various " backdoors" will be embedded in the existing backbone network equipment of the Internet and important information infrastructure around the world. Program " has become a target of attacks and secret theft by U.S. intelligence agencies. The "Hive" platform, as a typical US military product, also shows that the weapon system used by the US Central Intelligence Agency to launch cyber hacker attacks on other countries has achieved systematization, scale, traceability and artificial intelligence ization .

"Quantum" attack system

The most powerful

cyber attack system in the United States

Representative cyber weapons targeting China

Representative cyber weapons

On March 22, 360 Government and Enterprise Security Group released a report, fully disclosing for the first time the U.S. National Security Agency’s targeting of targets in China. The technical characteristics of the representative cyber weapon used - the Quantum attack platform - also prove that the US cyber attacks are indiscriminate attacks and can hijack the normal web browsing traffic of any Internet user in any region around the world.

This is the most colorful era of the Internet, and this is the darkest era of the Internet; at the regular press conference of the Ministry of National Defense on June 30, Senior Colonel Tan Kefei, deputy director of the Information Bureau of the Ministry of National Defense and  - DayDayNews

"Quantum" attack is the most powerful Internet attack tool of the US National Security Agency . It is also one of the most important capability systems for conducting network intelligence warfare. The earliest project has been created since 2004. It is the general name for a series of network attack and exploitation platforms, including multiple sub-projects, all named starting with QUANTUM.

This is the most colorful era of the Internet, and this is the darkest era of the Internet; at the regular press conference of the Ministry of National Defense on June 30, Senior Colonel Tan Kefei, deputy director of the Information Bureau of the Ministry of National Defense and  - DayDayNews

"Quantum" attack is an advanced network traffic hijacking attack technology specially designed for national-level Internet. The US National Security Agency uses it to target countries around the world to access Facebook , Twitter , YouTube, Amazon and other US websites. All Internet users launch cyber attacks, and Chinese social software such as QQ are also targets.

This is the most colorful era of the Internet, and this is the darkest era of the Internet; at the regular press conference of the Ministry of National Defense on June 30, Senior Colonel Tan Kefei, deputy director of the Information Bureau of the Ministry of National Defense and  - DayDayNews

" New York Times " once disclosed that even if the compromised computer is not connected to the Internet, it can still be stolen.

According to the analysis of US cyber attack activities by technical personnel, the US uses a combination of human, electromagnetic and cyberspace operations to achieve its optimal attack effect. Faced with the US attack capabilities, there is no safe system.

Such numerous Internet scandals are just the tip of the iceberg in the emergence of American Internet hegemony. Former U.S. President Obama once said that "the Internet world is like the wild west in the past, and the U.S. government should become the Sheriff there."

In the hidden corners of the vast network that no one knows about, how many conspiracies the United States has secretly launched and how many dirty secrets it has covered up by using its superpower strength may never be known to the world, but what is certain is: as the With the explosive development of technology in the new era, the United States' ambition to control the world is also expanding crazily. Its hegemony remains stubborn and its hegemonic behavior has never paused.

Super-scale cyber theft, indiscriminate cyber attacks ... The United States' attempts to establish cyber deterrents and control global network control are affecting and even endangering the world at all times. Under the aggressive cyber strategy of the United States, everyone is a victim and no one is immune. What should we do in the face of the invisible cyber mafia in the United States? What should the world do? This is definitely not an easy problem to solve, but no matter what difficulties we face, we will never give in to any behavior that endangers national security!

written at the end

After land, sea, air and sky, the invisible fifth space - cyberspace is becoming a new field that countries around the world are paying close attention to and competing for. Opportunities and challenges coexist.

"Without network security, there will be no national security, no stable economic and social operations, and it will be difficult to protect the interests of the broad masses of the people." Keenly grasping the "times" and "trends" of the information age, the Party Central Committee with Comrade Xi Jinping as the core attaches great importance to Maintain national security, place major issues such as network security and informatization work at the national level, promulgate laws and regulations such as the National Security Law and the Cyber ​​Security Law, and encourage the development of emerging network security technologies such as 5G, AI, and big data, We have carried out multiple special actions to rectify Internet violations... taking multiple measures and taking a multi-pronged approach to strive to build our country into a cyber power so that Internet development can better benefit the people.

In addition to the country’s efforts, the network security Great Wall requires the joint protection of all walks of life. According to the " China Internet Development Statistical Report ", as of December 2021, the number of netizens in my country has reached 1.032 billion, the Internet penetration rate has reached 73.0%, and the average online time per capita in my country has reached 28.5 hours per week. Such a huge and vibrant digital society is undoubtedly a great temptation in the eyes of certain countries and lawless individuals with evil intentions and misuse of technology. To safeguard national security, you and I are the key. Let’s build and share a safe and clean online society together. Let’s be vigilant together and build strong online security!

(Source: " Global Network ", "Communist Youth League Central Committee", "People's Daily", "Science and Technology Daily" WeChat public account, etc.)

Produced by China Military Network WeChat (zgjw_81)

Author: Yan Bingqian

Editor: Yang Xiaolin

technology Category Latest News