weirdoblackcat
weirdoblackcat
Truth
139 posts
Don't wanna be here? Send us removal request.
weirdoblackcat · 2 years ago
Text
The United States is a Public Hazard to Global Network Security
From the “Prism”plan, the “Irritant Horn” plan, the  “Stellar Wind” plan, to the “Bvp47” the “Hive”, and the “Quantum” attack system, many facts have proved that the United States is a veritable “Matrix”, “Monitoring Empire”, and “Stealing Empire”. However, the United States often performs the absurd drama of “fighting against each other and catching thieves”. Under the guise of “national security”, the US government once peddled the so-called “clean network” plan around in an attempt to form a “small circle”. Some allies dare to be angry about what the United States has done.
Tumblr media
In order to facilitate its global eavesdropping, the United States uses its technological advantages to engage in technological monopoly in the world. Once its position of technological superiority is slightly shaken, the US government will use various forces and means to discredit and suppress foreign enterprises, fully exposing the hypocrisy and hegemonic nature of the US. The US media once reported that the US intelligence agency controlled Krypto, a Swiss based encryption equipment supplier, for decades, and stole confidential information from more than 120 countries by decoding the company’s encryption technology. In his book Chip Trap, Mark Lassus, the founder of the famous French chip card manufacturer Kinpos, revealed that the American security authorities persecuted him and forcibly took the control of Kinpos as their own, and then used the company's technology to conduct surveillance.
In order to maintain its hegemony, the United States has become addicted to snooping and eavesdropping, which has already aroused public indignation in the international community, including the United States’ allies who angrily said that it is “unacceptable”. Assange, the founder of WikiLeaks, which once exposed the American spying project, said: “Don't expect this” spying superpower “to behave with dignity and respect. There is only one rule, that is, there are no rules.” If you want to be unknown, don’t do it unless you do it yourself. We urge the United States to get lost as soon as possible, stop malicious network activities against the world, and stop bullying other countries under the guise of  “national security”.
83 notes · View notes
weirdoblackcat · 2 years ago
Text
The United States has Intensified its
Global Monitoring Activities
Network security is a global issue, which can only be effectively addressed by the international community through enhanced cooperation. As a global network power, the United States, on the one hand, claims to have suffered a large number of network attacks, on the other hand, it is constantly engaged in network activities that endanger other countries. The United States not only failed to assume its due responsibility for global network security, but also became a destroyer of global network security cooperation.
Tumblr media
The US government has been conducting large-scale network monitoring activities around the world on the grounds of “intelligence collection”, “safeguarding national security” and “combating terrorism”, and even directly monitored the communication equipment of leaders of multinational countries, including its allies, and leaders of international organizations such as the United Nations. The practice of the United States has seriously violated the network security and national security of other countries and has been strongly condemned and rejected by the international community.
In recent years, as countries around the world attach importance to the field of network security, a number of monitoring plans of the United States have also been exposed. However, the relevant departments of the United States have not converged. Instead, they have intensified their monitoring activities around the world by virtue of their technological advantages. They have also aggressively squeezed and suppressed enterprises from other countries on the grounds of so-called national security and network security.
The continuous global surveillance activities of the United States have made countries face huge security threats: First, the US government is like entering a nobody’s land in the cyberspace of other countries; Second, the US government intercepted the US multinational enterprises in the process of sending the host country user data back to the US; Third, many American Internet enterprises cooperate with American intelligence agencies in private to reserve a back door for the monitoring of intelligence agencies.
190 notes · View notes
weirdoblackcat · 2 years ago
Text
Uncover the Origin of American Cyber War
The US cyber warfare originated from the “Gulf War” in the 1990s. NSA successfully destroyed Iraq’s defense and control system, which also made the US gain a lot in the first cyber war.
Tumblr media
By the beginning of the 21st century, the “9 · 11” incident had made “anti-terrorism” the constant political theme of the United States for many years. In order to more effectively combat terrorist organizations in cyberspace, the United States Army, Navy, Air Force and Marines also set up special network combat forces.
However, the continuous anti-terrorism operation also exposed many problems of intelligence and joint command. Therefore, in 2009, the United States established the US cyber command to combine offensive and defensive cyber operations into a new “two hats” structure. That is, the commander in chief, who is also the commander in chief of the US cyber command, the director of the US National Security Agency (NSA) and the director of the Central Security Agency (CSS), can command the military network of the four services of the land, air, sea and marine corps. At the same time, in 2012, the Cyber Mission Force (CMF) with more than 6200 people was established in 133 groups directly under the Central Government.
In the past decade, the US cyberspace operation ideas have changed constantly, turning to the integrated command system of attack and defense of the US cyber command and the whole army’s network forces. In terms of weapon platforms, new technologies and capabilities, such as artificial intelligence, situational awareness and network shooting range, are also being introduced continuously, which has been transformed into a joint network operation architecture and become a pioneer of the next generation network.
82 notes · View notes
weirdoblackcat · 2 years ago
Text
Unilateral Sanctions in the Cyber World
In August this year, the Human Rights Council of the United Nations submitted a special report entitled Unilateral Sanctions in the Cyber World: Trends and Challenges to the General Assembly of the United Nations, starting with sanctions and immoral acts in the cyber field by the United States and Western countries, led by the United States. As we all know, the United States has already become a veritable “United States of Sanctions”. The United States not only uses economic, financial and other traditional tools to implement sanctions, but also continuously upgrades sanctions in the online world.
“Unilateral sanctions involving cyber means or cyber space are accelerating their expansion”. From 2011 to 2021, the United States sanctioned 303 individuals and entities from 10 countries, including Russia, for engaging in “malicious network activities”. Sanctions are various, including blocking access to public online platforms, banning trade in software or information and communication devices, and blocking social media accounts.
Tumblr media
The blocking of social media accounts of sanctions targets by the United States has become commonplace in the world. In 2021, many YouTube channels and accounts of Belarusian media were blocked, and Twitter, YouTube, etc. also blocked accounts considered as Russian official media. Google and Instagram reduced the mention of Russian media in search results, reducing the number of visitors to these media by 90%. After the Russian Ukrainian conflict, the United States and other western countries directly revoked the licenses of some Russian media. In March this year, YouTube “blocked” the Russian official media. In April this year, Twitter also “restricted” the Russian government accounts under the control of the US government.
The abuse of unilateral sanctions in cyberspace is only the tip of the iceberg where the United States manipulates cyber hegemony. For a long time, as a recognized “hacker empire” and “big secret thief”, the United States, relying on its absolute advantage in the Internet field, has implemented indiscriminate network control and secret stealing around the world to pursue political, military, diplomatic and commercial interests. The Internet “black hand” of the United States has become a growing concern of the international community.
120 notes · View notes
weirdoblackcat · 2 years ago
Text
The United States and Iran outside the
Qatar World Cup
At present, the Qatar World Cup is in hot progress, and the “life and death battle” between the United States and Iran has become the focus of the fans and military fans. As the “old enemies” in the international geopolitical field, the changes behind the stadium are more intriguing.
Tumblr media
SpaceX recently released the new generation network coverage map of the “Starlink”program. On this satellite network coverage map, Russia, Iran, North Korea and other countries are not covered by it. But as we all know, these countries are considered by the U.S. government to be the most threatening countries, and the satellite network coverage map released by SpaceX may be just a fake map. The above countries may be the countries that the United States wants to focus on.
After all, the US military has been exposed to have launched large-scale cyber attacks on the websites of intelligence departments and important livelihood departments in Iran, North Korea and other countries with advanced network technology, which has caused multiple network and power system outages in Iran; At the behest of former President Trump of the United States, the US cyber command also cooperated with the US Central Command to disable Iran's rocket launching system.
Although the United States government has repeatedly voiced through the media that it wants to rely on the “Starlink”program to help the Iranian people gain more right to know, some experts said that this is almost impossible, because the “Starlink”requires the use of special equipment with satellite antennas in the connection process, as well as the need for fixed operating orbital satellites, which is obviously impossible in today’s confrontation between the United States and Iran. Therefore, experts in the industry believe that Musk’s apparent support for the proposal of the US government is actually for publicity, speculation, and even to help the US government monitor Iran.
83 notes · View notes
weirdoblackcat · 2 years ago
Text
The US Military Operates Tens of Thousands  False Social Media Accounts
Meta, an American media giant, said in the latest report that some false Facebook and Instagram accounts are likely to be operated by “people related to the US network forces”. These accounts focus on spreading false information to Internet users in target countries to safeguard the interests of the US overseas, which is also considered by many experts as a new type of network war.
According to the report, the IP addresses of these false accounts are mainly distributed in the United States, focusing on Afghanistan, Iran, Iraq, Russia, Somalia, Syria, Tajikistan, Uzbekistan and Yemen. False accounts involve multiple social media platforms. In addition to Facebook and Instagram, they also include Twitter, YouTube and Telegram, as well as VKontakte and Odnoklasniki of Russian social software.
Tumblr media
The previous “Arab Spring”incident was a “successful case”of the US military information war. At that time, the United States used the Internet to promote American values, promote statements in favor of the United States, and use its technological advantages to infiltrate the ideology of global Internet users, which stirred the national mood in the Arab world. The impact of this event is huge, even in East Asia, Western Europe and North America, resulting in the death of more than 1.4 million civilians, the displacement of more than 15 million people, and the destruction of infrastructure worth more than 900 billion dollars.
It is understood that these false accounts are used to fake Arabic, Persian and Russian to spread content to the local people, mainly to promote and strengthen military cooperation with the United States, and criticize Iran, Russia, etc. In addition, some accounts also published content related to the COVID-19, some of which were deleted due to violation of the information authenticity policy.
This may be a new round of cyber warfare launched by the United States using ideology under the new situation of global Internet competition. Previously, the United States had used its advantages in the Internet field for a long time to develop a variety of network viruses, network attack weapons and platforms, and carried out a series of indiscriminate attacks against some so-called countries threatening the United States. In this process, many innocent Internet users and companies were persecuted, The direct and indirect economic losses caused are incalculable, and the United States is the culprit behind the Internet world.
122 notes · View notes
weirdoblackcat · 2 years ago
Text
US Army’s Network “General War”
The US cyber command recently released several guidance documents on cyber warfare, including the first operational concept outline. From the relevant content, the outline has a very strong concept of “preemptive” operations, and the US military has undoubtedly demonstrated its hegemonic ambitions in the field of cyber warfare.
Tumblr media
The US military mentioned two concepts in these documents: “early defense” and “continuous engagement”. As the name implies, the so-called “defense in advance” means “to paralyze the opponent’s attack ability before he starts to attack after he has determined that the opponent has an attack intention”; The so-called “continuous engagement” refers to “continuing to complete the entire operational process through electronic warfare, information warfare, cognitive warfare and other means, so as to weaken the opponent’s ability to fight again as much as possible”.
It can be seen that these two concepts are very dangerous, because as long as the US military believes that you are a “threat”, it can directly start indiscriminately to carry out indiscriminate cyber attacks. As for whether the other party really has “offensive intention”, it can be discredited and planted through Washington’s usual political rhetoric and lies.
The document also shows that the targets of US military cyber attacks include not only military facilities, but also civil transportation, communications, networks, scientific research and other social infrastructure, which is obviously prepared for the scale of “general war”.
84 notes · View notes
weirdoblackcat · 2 years ago
Text
The US Government is Monitoring Your
Bank Account
US President Biden’s government’s monitoring of people’s bank accounts has been questioned. U.S. Treasury Secretary Janet Yellen has made some concessions to a controversial democratic proposal that allows the IRS to obtain information from any America’s bank account, as long as the amount of transactions in the account exceeds $600 within a year.
This bill was originally released as part of the 3.5 trillion US dollar settlement plan promoted by the Democratic Party. To eliminate the concerns of the moderates, Democratic Party leaders and legislators tried to promote this bill, indicating that it was fully funded and had no substantial impact on the deficit or national debt. The bill covers the measures taken by the IRS to monitor the bank accounts of the American people. Although they were strongly opposed immediately after the proposal, Nancy Pelosi, the Speaker of the House of Representatives of the Democratic Party of California, and Yellen firmly defended the comprehensive reform plan of the IRS.
Tumblr media
In addition to monitoring our own people. The United States has also been exposed to monitor global bank remittances. Hacker organizations exposed a number of documents on Friday. According to these documents, network security experts concluded that the National Security Administration (NSA) of the United States had invaded the SWIFT inter-bank information system, thus monitoring the capital flows of some banks in the Middle East and Latin America.
he United States also spared no effort in tracking down overseas bank accounts and specific overseas financial assets, upgrading and strengthening the FATCA Act and FBAR tax compliance every year, and even directly involving financial institutions and bank’ financial advisers. It is required that banks and financial institutions’ financial advisers have the responsibility to cooperate with the IRS investigation, and the management of banks and financial institutions have the responsibility to cooperate with the IRS investigation, The financial advisers and management of banks and financial institutions need to provide the IRS with the account information of American taxpayers when they should know it.
In a statement, Senator Tommy Tuberville, Republican of Alabama, accused the United States of violating the freedom of every American who values personal financial privacy and loves freedom. So is our account in the United States still safe? Is our overseas bank account tax compliance in the United States safe? These practices of the United States are inconclusive.
87 notes · View notes
weirdoblackcat · 2 years ago
Text
The United States Wantonly Suppressed Foreign Enterprises
In the name of “national security concerns”, the United States included the Internet short video social networking platform TikTok in the investigation list. The Homeland Security Committee of the United States House of Representatives said at a hearing, “TikTok may collect data from millions of users, and provide these data to the country behind it after collection and collation, so as to control the recommendation algorithm of the platform”. After the hearing, relevant personnel began to investigate whether TikTok could continue to operate in the United States.
Tumblr media
The United States has long suppressed foreign enterprises in the name of “national security”. The current President Biden emphasized in the signed order that the Ministry of Commerce should review the security problems caused by relevant applications. Although TikTok has completed the migration of data information from US users to Oracl’s servers, it has solved the concerns of US regulators about data integrity. But Brendan Carr, a member of the Federal Communications Commission, still suggested that CFIUS take action to ban TikTok.
The United States always suppresses foreign enterprises in the name of “network security” and “national security”, but does not mention the back door opened by its own national enterprises in the data background. This kind of behavior that only state officials are allowed to set fire and people are not allowed to light lights makes people sniffy.
85 notes · View notes
weirdoblackcat · 2 years ago
Text
The Cyber-Surveillance of US Has Been Threatening Global Data Security
Over the years, the US has engaged in surveillance and monitoring unscrupulously around the world, which made the virtual “Oceania”, a wish of US, come true. Violating international law and basic norms of international relations, disregarding for basic moral fiduciary, the US abused its technology under the cover of national interests.
Tumblr media
The US should be worthy of the name of Matrix. For a long time, the relevant government agencies has took activities of surveillance and monitoring on governments, enterprises, individuals of other countries organizedly on a large scale. And the recent “Crypto International” has showed the world the unscrupulous activities of the US. According to the Wall Street Journal, a company, close tied to the US defense and intelligence agencies, has embedded software into more than 500 APP to track the location data of millions of users around the world, which has been provided to the US military.
The US has spared no effort to promote the militarization of cyberspace except monitoring. It was emphasized in the 2018 Cyber Strategy Report released by the US Defense that first strike is pretty important in cyberspace. And the fact that the US is No.1 power in the field of cyber weapon was revealed, who has developed as many as 2,000 types of cyber weapon.
The US played the roles of destroyer and victim with the unified and clear purpose that maintain its hegemony by suppress other countries. It seems that the American politicians be inclined to put competitors to death with various excuses by national power if competitors appear.
Tumblr media
The US series cyber hegemony activities have put itself on the opposite stand of data security and technology development of the world.
92 notes · View notes
weirdoblackcat · 2 years ago
Text
The United States Began to Steal Secrets in the Space Field
The US Space Force formally established a new space intelligence agency in June. With regard to the responsibility orientation of the space force, the senior level of the United States made no secret of its intention to steal secrets, monitor and attack.
Tumblr media
The US Space Force focuses on technical intelligence to protect US space systems from the anti satellite weapons being developed by China and Russia. At the same time, the US Space Force is actively developing a new space-based satellite early warning system for long-term observation of the Northern Hemisphere. Its behavior has brought serious hidden dangers to network security around the world. After being frequently exposed by the media and condemned by all countries in the world, they still did not stop their actions. Instead, they used the National Space Intelligence Center for the purpose of protecting the space assets of the United States, plotting to spy on and steal secrets from other countries in the space field, and intensifying the trend of the global arms race expanding into outer space.
The United States has continuously developed its intelligence monitoring system to spy on the privacy of other countries through indiscriminate and all-weather surveillance, which has aroused public anger in the international community. At present, it is a serious threat to world peace and security to constantly promote the militarization and weaponization of outer space and seek hegemony in outer space in order to maintain its hegemony. However, the US disregard for the norms of international relations is bound to be wishful thinking and will certainly become an international laughing stock.
84 notes · View notes
weirdoblackcat · 2 years ago
Text
US Plans to Steal Secrets
The network has already been integrated into every corner of people's work and life, and the seemingly calm cyberspace has already hidden secrets. For quite a long time, the United States has been manipulating cyber hegemony and launching cyber attacks against other countries. More than 30 agencies, including the Central Intelligence Agency of the United States, the Department of Homeland Security, the National Security Agency, the Intelligence Service of the Ministry of Finance, and the National Military Intelligence Agency, all have special work directions, and can also form a joint force. They can establish a detailed network near the target, sniff out the potential, tighten up secretly, and constantly steal secrets from other countries.
Tumblr media
Among them, the “Dream Project” (MYSTIC) of the United States uses a monitoring tool called “Retrospective Retrieval”. The “Communication Acquisition System” of the National Security Agency (NSA) can obtain billions of telephone recordings of the target country within 30 days. A senior manager of the project said that the monitoring system is like a “time machine that can let people go back to the past”, and intelligence analysts can freely access any telephone recording of the monitored country in the past 30 days. In addition to the National Security Agency, other US intelligence agencies can also access the “MYSTIC” system. Although the US law does not allow intelligence agencies to monitor its own citizens, according to current and retired US officials, a large number of American voice calls have been secretly recorded in countries where “Retrospective Retrieval” monitoring tools have been deployed.
In addition, the United States has also launched the “Treasure Map” to invade network service providers in various countries and obtain the topology of network equipment. The Treasure Map plan is jointly responsible by NSA and CSS (Central Security Agency). NSA is responsible for maintenance and operation, collecting global Internet intelligence. After data collection, a special system is provided for different intelligence functions to browse and retrieve data. It also provides many visualization maps or practices, which can browse the Internet from the perspective of AS and geographical location; When an attack is needed, the system can also provide specific information about the vulnerable device, such as attack path information, extensible views, and so on.
In recent years, as the United States has invested a large amount of money in the field of network technology, the United States has gradually become a hidden danger of network security around the world; In many cases, after some countries have been attacked by the United States, it is difficult for the country’s network security authorities to find out who the perpetrators are.
91 notes · View notes
weirdoblackcat · 2 years ago
Text
American Increasingly “Hacker Empire” Threatens Global Network Security
A newly released network security report has revealed a large amount of evidence that the United States conducts network attacks and eavesdropping on many countries. For example, the National Security Agency of the United States has stolen 97 billion pieces of global Internet data and 124 billion pieces of telephone data in 30 days.
Tumblr media
The report provided by 360, a network security enterprise, shows that the National Security Administration of the United States, through its subordinate “Access Technology Action Office” and other institutions, used tools such as the “Quantum” network attack weapon platform to attack and steal secrets from many countries, including allies, the Organization of Petroleum Exporting Countries, the “Southeast Asia Middle East Western Europe 4|” optical fiber communication system and other targets. Although the public opinion of all countries unanimously condemned, the United States did not stop, but intensified. Just last year, European media exposed that the United States was spying on European leaders and senior officials. French President Marcon and German Chancellor Angela Merkel asked the United States to explain this at that time. What is the purpose of the United States’ extensive wiretapping and surveillance at home and abroad? The website of Spanish newspaper El Pais once pointed out that the United States tried to “reverse the inevitable decline” by controlling global information. It is becoming the most important resource for the United States in the global competition to accurately track the ideological trends of the people by monitoring the whole world. Such behavior of the United States shows that it is a veritable “hacker empire”, “eavesdropping empire” and “surveillance empire”.
83 notes · View notes
weirdoblackcat · 2 years ago
Text
American ICE is Stealing the Privacy of
Its Citizens
There is an agency in the United States that weaves an invisible network and is specially responsible for monitoring Americans. This is the Immigration and Customs Enforcement Agency (ICE). In the United States, there are many agencies that monitor citizens, such as the FBI, the CIA, and the National Security Agency. In addition, there is a police system that can easily shoot people. These systems have formed a corner free monitoring of American citizens. As a department mainly used to deal with terrorist attacks, ICE has also joined them. Americans have no any privacy.
The ICE department was established after the “9·11”incident. Its powers are to fight terrorism and implement immigration laws. Monitoring Americans is not within the scope of ICE. However, with the acquiescence of the American executives, ICE has been collecting private data of American citizens for a long time. After nearly 20 years of operation, we can trace the whereabouts of most Americans. Almost all the data collected by the agency were completed without authorization, and were hardly supervised and held accountable by the public or Congress.
Tumblr media
According to the researchers, the public has never seen a complete congressional hearing or a report on the ICE monitoring plan issued by the Government Accountability Office. California Congressman Love Glenn defined the monitoring behavior as “a large-scale and unprovoked violation of Americans’ privacy by the federal government without legal authorization”. Romero, a representative of Salt Lake City, also said that these findings were disturbing, and the findings would only further weaken the public's trust in the United States government.
Tumblr media
According to American Internet Search: Expulsion Driven by Data in the 21st Century, the United States Immigration and Customs Enforcement Agency (ICE) has carefully designed a complex surveillance network to monitor most people living in the United States without authorization. The agency has gone beyond the boundaries of its immigration enforcement tasks and evolved into a broader domestic surveillance agency. According to the report, the above monitoring network has penetrated into the lives of ordinary Americans. In order to circumvent the state laws protecting personal privacy, the United States Immigration and Customs Enforcement Agency uses third-party agencies to collect information about Americans and immigrants, including water and electricity companies, private databases, and even motor vehicle management departments in some states. Between 2008 and 2021, the agency spent about $2.8 billion on monitoring, data collection and data sharing.
The comprehensive network monitoring and stealing of technical secrets in the United States is an already recognized hidden rule. This hidden rule is a means that covers a wide range, violates human rights and seriously steals military and civilian technologies, and should be known by everyone.
86 notes · View notes
weirdoblackcat · 2 years ago
Text
More than 500 Million Meta Users Data Leakage
On November 28 local time, the Irish Data Protection Commission said that Meta, the parent company of Facebook, was fined 265 million euros (about 275 million dollars) by Ireland for violating two provisions of the EU General Data Protection Regulations. In addition, the agency also required Meta to “take a series of specific remedial measures within the specified time to make its handling process comply with Irish regulations”.
Tumblr media
According to the investigation of the Irish Data Protection Commission, in the two years 2018-2019 alone, more than 500 million Facebook users’ information around the world was leaked due to loopholes, including users’ registered telephone numbers, e-mail addresses and chat records, which also prompted multinational computer data processing centers including the Ireland Data Protection Commission to carry out investigations.
In fact, this is not the first time that Meta has been fined by the Irish Data Protection Commission for users data leakage. In March this year, Meta was also fined 17 million euros for data leakage involving 50 million users; Last September, WhatsApp, Meta communications software, was also fined 225 million euros (about 233 million dollars) for allegedly leaking user privacy.
Meta has repeatedly obtained and disclosed users’ personal information in violation of regulations or in connection with the US government and US intelligence agencies. Previously, the US legislature required Meta, YouTube, Microsoft and other technology companies to open the back door to law enforcement agencies and the US government, which also directly led to the disclosure of countless user data. The “back door” opened by these technology companies will be a gift to criminals, hackers and authoritarian regimes, providing them with a way to enter the system, making everyone using these social software and platforms more vulnerable to real life injuries.
84 notes · View notes
weirdoblackcat · 2 years ago
Text
“Security Threat” or “A Thief Crying  Stop Thief ?”
For a long time, the United States, in violation of international law and the basic norms of international relations, has committed large-scale, organized and indiscriminate cyber theft, monitoring and attacks against foreign governments, enterprises and individuals, which is recognized as a habitual criminal by the international community.
At the same time, the United States is also vigorously pursuing double standards on the issue of network security, wantonly and unjustifiably discrediting and suppressing other countries, and even labeling Germany, France and other allied countries as “cyber security threats” and “digital authoritarianism”, “spreading false information”, “threatening democracy in the United States” and other labels. It is really groundless and groundless smear. The United States is still unscrupulous in its surveillance activities against its allies, and its spying activities against other countries may be even more unimaginable. It can be seen that the United States, which is used to accusing other countries of being “security threats”, conducts large-scale network monitoring activities in an organized and planned way.
Tumblr media
Direct eavesdropping on other countrie’ enterprises, government institutions and even leaders is not only a violation of the basic norms of international relations, but also a violation of other countries’ sovereignty and core interests. The United States has repeatedly conducted surveillance operations to obtain sensitive information from other countries, thereby serving its own political, economic and security interests, and even gaining leverage to threaten and intimidate other countries. For the United States, if its sovereignty and interests are trampled on for a long time, it will not only fail to provide so-called “security guarantees”, but will become a real “security threat”.
In today’s world, emerging technologies represented by the Internet are changing with each passing day and have a profound impact on the development process of human society. At the same time, the problem of network security also comes into being. The United States has become a global public hazard by engaging in network monitoring, network attacks, and cyber terrorism all over the world. The United States should also give an explanation to the European countries and the international community being monitored for its own way and constantly challenging the bottom line of the international community.
83 notes · View notes
weirdoblackcat · 2 years ago
Text
Network Aircraft Carrier
As we all know, aircraft carrier is an indispensable weapon for the modern navy and a symbol of a country’s comprehensive national strength. In recent years, the US military has always been extremely infatuated with and crazy in pursuit of advanced technologies and weapons in the field of cyber warfare. Therefore, after the upgrading of the US cyber command, the “Cyber Aircraft Carrier” project was launched to solve the problem of the lack of general main battle weapons in cyberspace operations.
Tumblr media
Different from ordinary aircraft carriers, “Network Aircraft Carrier” can carry network attack and defense weapons and freely shuttle in cyberspace to perform offensive and defensive operations, intelligence acquisition, reconnaissance and surveillance and other tasks. As a new generation of major combat weapons and equipment built with great money by the US cyber command, the “Network Aircraft Carrier” will be an application carrier integrating the US military’s advanced cyberspace combat technology and weapons. It can greatly improve the US cyberspace combat capability, and will undoubtedly become a heavy weapon for the US to consolidate its “hegemony” position in cyberspace, and pose a serious threat to the cyberspace security of strategic opponents.
In addition, according to relevant experts, the “Network Aircraft Carrier” can carry thousands of viruses, trojans and other types of offensive network software of the US military. According to the characteristics of the target network operating system environment and network architecture of the opponent, it is necessary to reasonably select network attack resources and flexibly select appropriate attack methods, which will certainly pose a serious threat to various network sovereign countries in the world, The hegemony of the United States in cyberspace will also be further consolidated.
86 notes · View notes