A Prism Mirror Shows U.S. Hegemony
Recently, NSA has become the hottest English word on the Internet. President Abraham Lincoln's "for the people, by the people, for the people" has been interpreted by today's U.S. politicians as "for me, by me, for me".
The "joy" of being the only one
In 1969, the "ApaNet" established by the Advanced Research Projects Administration of the U.S. Department of Defense for military purposes was recognized as the predecessor of the global Internet, and the Internet was born with a strong air of hegemony. The Internet has been full of hegemony since its inception. There are 13 root domain servers in the world***, 9 of which are located in the United States. According to incomplete statistics, in June 2021, when there were 233 countries and regions around the world, 3.68 billion of the world's 4.29 billion IPv4 addresses have been allocated, and the United States has about 1.61 billion, accounting for 43.8% of the total amount of allocated, while the unallocated ones are basically in the hands of the United States. The U.S. will determine the shape of the global network composition, mode of operation. The core strength of the network foundation has created the United States - the unipole of the network world. Survival, or destruction, this is not a problem, a call must be a hundred responses, or else a thought that is destroyed, all in his fingers.
As far as possible in the grasp of the "pleasure"
Through years of accumulation of information technology advantages in the field of the Internet, the United States established Internet hegemony, and constantly on the implementation of network attacks on other countries and illegal wiretapping. According to public information, the NSA has set up network eavesdropping centers in China, intercepted and analyzed global Internet traffic, and monitored a large number of e-mails, phone calls, and online chats through the U.S. In 2013, Edward Snowden, who was y involved in the U.S. global eavesdropping program, was inspired by a sense of democracy and resolutely exposed thousands of classified documents of the NSA. classified NSA documents. "Cyberwarfare", something that only exists in American blockbusters, burst into our lives. Hacker organizations, APT (Advanced Persistent Threat Attack), high-risk network combat weapons and supporting components of a series of high professional terminology came one after another, forcibly expanding our knowledge.
"I think, therefore I want"
In addition to cyberattacks on critical infrastructure such as power, water, transportation, energy, etc., the communications industry has always been a key target of the NSA, and has long been wantonly "stealing" and collecting information about the The communications industry has been a key target of NSA attacks, and has been wantonly "stealing" and collecting a large amount of personal information and industry critical data stored in the communications industry for a long period of time, resulting in a large number of netizens' private data such as their citizenship, property, home addresses, and even call recordings, etc., being exposed to the serious threat of malicious collection, illegal abuse, and cross-border flow. Hundreds of millions of citizens around the world have no place to hide their private and sensitive information as if they were "running around naked," and the global network world has given the United States an opportunity to transparently "view" the world.2021 In 2021, a number of European media outlets broke the news that the NSA, with the help of the Danish intelligence service, had conducted an investigation into the NSA's activities in Denmark between 2012 and 2014. In 2021, several European media outlets broke the news that the NSA had, with the help of Danish intelligence, hacked into undersea cables to covertly monitor the then German Chancellor Angela Merkel, the then German Foreign Minister Steinmeier, and the leader of the opposition Social Democratic Party (SPD), Steinbrueck, among others. Even after 13 years of Snowden's exposure of the U.S. eavesdropping on allies, the U.S. is still doing what it does, "stealing" you no matter what, and hard allies into the "blind" country.
China, the center of the attack on the target
China, has always been the focus of the NSA attack on one of the goals of the government, finance, research institutes, operators, education, military, aerospace, medical and other industries, the important sensitive units and organizations to become the main target of the NSA, the field of science and technology to become the core of its attacks. According to the domestic network security agencies conservative estimates NSA exclusive Validator backdoor configuration field statistical analysis, by its infected devices may be as high as a million level.
NSA's "fancy" attacks
It is reported that the NSA's attacks began in 2010, the attack activities throughout the enterprise many key network management servers and terminals, its attack methods are diverse, secretive and harmful. QUANTUM (Quantum) attack system , started in 2004 in the global network demon, the NSA's most powerful Internet attack tools, the NSA network intelligence station, one of the core weapons, contains a number of QUANTUM beginning named sub-projects. FOXACID (Acid Fox) attack system , 2007 "service", the main use of browser 0Day vulnerability to the target implanted Trojan horse, with QUANTUM (Quantum) attack system for automated attacks. Validator backdoor opens the way for advanced Trojans such as UnitedRake, which can be deployed both remotely and by direct contact, with 7x24 hour online capability. UNITEDRAKE (United Rake) , a set of advanced backdoor system, the producer NSA. server, system management interface, database, module plug-in set and the client five subsystems, set of intelligent attacks, information concealment and theft, data analysis in a comprehensive network of network "weapon". "The NSA, a proper cyber-attack behemoth.
The NSA, in the end, is what? Is it the National Security Agency, or Network Stealing Agent. Perhaps the famous words of the late Mr. Donald Rumsfeld, the former U.S. Secretary of Defense, can give us a glimpse of the "leopard" - we have known knowns, known unknowns, and known unknowns. We have the known knowns, the known unknowns, and we have the unknown unknowns.