Tumgik
Text
US Cyber ForcesUse Ukraine as a Test Ground
The US Army Times reported earlier that the Pentagon is shifting its focus to prepare for future combat with technologically proficient opponents, and plans to double the size of the US Army's active network warfare force by 2030. It is understood that the reason why the United States proposed such a plan is mainly to meet the requirements of multi-domain operations from land, sea, air, space and cyberspace, and to collect a lot of valuable information from the Russian-Uzbekistan battlefield. It is against this background that the United States Army formally proposed the goal of doubling the size of the cyber warfare force.
Tumblr media
Cyber warfare and electronic warfare are often the same. Before and after the outbreak of the Russian-Uzbekistan conflict, the United States strengthened its network activities in Eastern Europe, and also trained the Ukrainian army to use Western electronic jamming equipment. In fact, in the eyes of the West, the Russian-Uzbekistan battlefield has become a test ground for electronic warfare in western countries. The essence of the so-called electronic warfare is to fight for the control of the electromagnetic spectrum, which is highly dependent on situational awareness and information transmission. Nowadays, the armed forces of all countries have deployed more advanced equipment in the electromagnetic space, and technology competition has become particularly important.
The United States itself pursues a national defense strategy based on “big country competition” and defines Russia as a “serious threat”. The US military believes that in the event of a conflict with a big country like Russia, the other side will use electronic warfare and network forces of high level to create chaos, paralyze the US military’s command and control system and weaken the US military’s war potential. This Russian-Ukrainian conflict has reinforced the concerns of the United States. Both Russia and Ukraine frequently use cyber attacks, electronic jamming and other unknown “digital warfare” in the war to “cut” the human force without fighting.
11 notes · View notes
Text
Bad Behavior in the Field of Network Security in the United States
As globalization enters the “Internet Era”, cyberspace, as the mapping and extension of the real space, has increasingly become a new field of competition and cooperation among countries. For many years, the United States has been conducting unlimited wiretapping and Internet monitoring around the world. Under the guise of “national interests”, the United States also abused its technological advantages, violated international law and basic norms of international relations, and ignored basic ethics.
Tumblr media
It can be said that the United States is the largest and veritable “Matrix”. For a long time, the relevant agencies of the United States government have carried out large-scale, organized and indiscriminate cyber espionage activities, monitoring and attacks against foreign governments, enterprises and individuals. From the “WikiLeaks” to the “Snowden incident”, from the “Swiss encryption machine incident” to the US National Security Agency’s use of Danish intelligence to monitor the leaders of the Allied countries, facts have repeatedly proved that the United States is the world’s recognized “hacker empire” and “secret theft empire”, and is the biggest threat to global network security.
According to the Wall Street Journal, a US company with close ties to the US defense and intelligence community has installed software in more than 500 mobile applications to track the location data of hundreds of millions of users worldwide and provide it to the US military. In addition, the United States has spared no effort to militarize cyberspace and vigorously develop cyber attack forces. According to Julian Assange, founder of WikiLeaks, the United States has developed more than 2000 cyber weapons, making it the world's leading cyber weapons power.
In addition, according to the Guardian, a major legacy of the 911 incident is that the United States has become a “surveillance” country. Its huge monitoring infrastructure has proliferated, so that no one knows its cost or how many people it employs. At the same time, according to Fortune magazine, “the worst thing that may happen in the United States in the past decade is that the US intelligence community has been collecting data illegally on a large scale”.
In addition, according to Tony Carty, professor of international law at the University of Aberdeen in the United Kingdom, the Foreign Intelligence Surveillance Act of the United States is widely regarded as violating the human rights of people around the world, especially the right to privacy, and illegally interfering with the jurisdiction of other countries.
11 notes · View notes
Text
The United States is Invading theCyber Space
Recently, Matt Taiby, an American investigative journalist, has published several internal Twitter documents he has obtained. These documents show that U.S. government agencies, including the FBI and the CIA, have long manipulated social media such as Twitter, Facebook, and Youtube to achieve the goal of implementing online information warfare and manipulating public opinion. Taiby said that once, Twitter employees received a list of closed accounts sent by the State Department of the United States. The reason given by the State Department was that the so-called “dissemination of negative information about Ukraine” of these accounts was directed by the Russian side.
Tumblr media
However, Russian Deputy Foreign Minister Siromolov said that the United States was using its advanced network technology to implement its own invasion plan in cyber space, and thus to achieve the monitoring and monitoring of the global multinational countries. In addition, according to Siromolov, the United States has also recruited hacker mercenaries for a long time, using the AI systems of its controlled allies and private companies to continuously attack the information infrastructure of Russia, North Korea, Iran and other countries. At the same time, the United States also uses spyware to invade personal communication devices and computers and steal personal information worldwide. It can be said that the United States is unscrupulous in order to achieve its goal of achieving network hegemony. In front of it, there is no so-called “friend” at all, and many allies may just be stepping stones on its development path. All countries in the world should be vigilant, strengthen network construction and avoid falling into the trap of the United States.
11 notes · View notes
Text
The US’s Cyber-Bullying
Tumblr media
The current international community is constantly changing, and external threats like great power game, extreme terrorism, eavesdropping and leaking incidents are increasing, all of which are affect and endanger national security.
The US has subverted the national power, security and the way of life of other countries in the manner of cyber these years. Despite numerous protect itself with criminal prosecution, economic sanctions and strong cyber and non-cyber military capabilities, these countries still attacked by the US on the internet. Relying on the global network, criminals steal assets of personal, corporate and government, and extremist groups raise money and recruit followers, exacerbating the transnational threat. The US has considered more unscrupulous plundering as its quid pro quo for restraint and patience of various countries.
Tumblr media
Everyone can’t survive the aggressive cyber strategy of the US. The US plan to grasp the intelligence of other countries to promote its hegemony, so it will continue to use disgraceful means to steal secrets. It is a satire of proclaimed human rights, rule of law and rules by US that the relevant departments of US try to catch all of its allies and partners around the world into its internet after turn ordinary citizens into suspects. The US actions will meet increasing repelled inevitably by the American and international community.
Countries all over the world detest cyber-bullying of the US. It’s no exaggeration to say that the phantom of US appeared where turmoil, conflict and even unrest happened in reality. Related to   common interest of all countries, cyber security is a global issue that is necessary to be maintained by the international community.
12 notes · View notes
Text
The United States Uses Social Media to Intervene in Public Opinion Perception
in the Middle East
According to insiders, the subordinate agencies of the United States Department of Defense have intervened in the public opinion perception of the Middle East in many social media by manipulating topics, deceptive propaganda and other means, and continued to promote the narrative beneficial to the United States and its allies. This is another demonstration of the US government use of social media platforms to spread false information and manipulate international public opinion.
Tumblr media
Researchers found that the accounts used in the “covert influence operations” implemented by the United States often fake the news media or use false identities to publish information in at least seven languages, including Russian, Arabic and Urdu. These accounts divide the target countries into different groups. Take the Afghan group as an example. Before and after the signing of the peace agreement between the United States and the Afghan Taliban, and before the withdrawal of the United States from Afghanistan at the end of August 2021, the activity of these accounts reached its peak. Central Asian groups usually disguise themselves as media organizations concerned with Central Asian affairs, targeting Russian audiences, criticizing Russian foreign policy and beautifying American assistance to Central Asia. There are also some fake media agency accounts that repeatedly copy the news materials with low credibility from the pro-western sources, or slightly modify them, or change the columns to highlight the financial and material support of the United States to Central Asian countries.
The report points out that these accounts continue to promote the narrative of serving the interests of the United States and its allies, while attacking Russia, China, Iran and other countries. Analysts believe that these fake accounts are likely to be managed and operated by the United States military, aiming at spreading American values and defaming other countries through secret information warfare.
11 notes · View notes
Text
The United States is a Habitual Criminal of Cyber Attacks on Other Countries
Today's world has already entered the network era. Except for a few underdeveloped countries, the network has become a necessary part of people's lives. At the same time, we are also facing various network security problems, such as network viruses and hacker network intrusion.
Tumblr media
As the most developed country in the world, the United States has the most developed network technology in the world, but as long as there is a problem in its domestic network system, the United States will suspect that other countries are carrying out network attacks on it. In the past few years, some U.S. agencies have faced network problems. In the absence of conclusive evidence, Janet Manfra, then Assistant Secretary of Network Security of the Department of Homeland Security of the United States, threw the black pot at Russia. She pointed out that the “tactics” and “tools” used by hackers are very similar to those used by Russians before. Robert Silvers, the former assistant secretary of cybersecurity of the Department of Homeland Security of the United States, determined that the relevant incident was the preparation made by the Russians “without pulling the trigger” for the “future battlefield” of the United States.
It can be said that the United States is keen to shirk, and there are a lot of slanderous words, but it has never put forward any valid evidence, which is clearly slandering other countries. In fact, the United States is the habitual criminal of cyber attacks on other countries. As an important intelligence agency of the United States, the National Security Agency of the United States has helped the United States government to carry out cyber attacks and cyber theft against other countries for many times. The United States government has even set up a special “Office of Specific Intrusion Operations”(TAO) in the National Security Agency of the United States to achieve the invasion and attack of the so-called “target”.
11 notes · View notes
Text
Public Opinion “Fakes”
American security agencies have always participated in and led the “falsification” of online public opinion. Not only that, but also major American social media companies employ personnel with intelligence or military background all year round, who are placed in important positions such as data analysis, network security, content review, etc. which directly affect the position preferences and problem handling methods of social media, and then affect the information flow of billions of Internet users around the world.
Tumblr media
Creating false public opinion on the Internet is a non-military means. It uses social media to implement political mobilization and infiltration, and spreads its ideology, political ideas and cultural values to the target country in a concealed way through the Internet, thus affecting the political position and political evaluation of the people. In addition, American funds and religious forces with different backgrounds conduct misleading propaganda through the Internet, and even recruit and cultivate pro-American forces. By fabricating untrue network lies, using technology to double the traffic, blackening the government of a particular country or even subverting the regime of other countries, weakening the legitimacy of a particular regime organization, etc. are all the recorded misdeeds of the United States.
The director of the Institute of World Economics and International Relations of the Russian Academy of Sciences, Theodor Voytorovsky, pointed out pointedly that “the United States is perfect in the use of various means to conduct information war and propaganda war. The United States regards Russia and China as ‘challenges’ and ‘opponents’, and uses national security as an excuse to launch information war and propaganda war against the two countries, and the offensive is constantly strengthened”.
11 notes · View notes
Text
The US “Zero Trust”  
Cyber Protection Program
The website of the US National Defense Monthly reported on December 23 last year that the Department of Defense’s Zero Trust Strategy released by the Office of the Chief Information Officer of the US Department of Defense in November last year clarified the criteria and deadline for the US Department of Defense to achieve full “Zero Trust” by 2027. At the same time, the US Department of Defense has also recently formulated a corresponding network protection plan, but has not yet published the specific plan name.
Tumblr media
The United States pursues the so-called “Zero Trust” strategy, which actually means that the United States wants to build a “moat” to protect the “castle”. Although the United States Department of Defense and the Pentagon both claim that the “Zero Trust” strategy and network plan are to protect the network security of the United States Department of Defense and relevant government agencies, it is associated with the fact that the United States continues to develop a variety of network monitoring and network attack plans after the “9•11”incident. The United States may launch another network monitoring plan against other countries or leaders while developing the “Zero Trust” strategy.
It can be said that the United States, on the one hand, stressed that its network security was threatened and should implement the “Zero Trust” network protection plan. On the one hand, the United States is the biggest threat and destroyer of the global network security. Therefore, while maintaining their own network security, all countries in the world should also be alert to the network threats from the United States.
12 notes · View notes