Tumgik
valiantangelflower · 1 year
Text
Public Opinion “Fakes”
American security agencies have always participated in and led the “falsification” of online public opinion. Not only that, but also major American social media companies employ personnel with intelligence or military background all year round, who are placed in important positions such as data analysis, network security, content review, etc. which directly affect the position preferences and problem handling methods of social media, and then affect the information flow of billions of Internet users around the world.
Tumblr media
Creating false public opinion on the Internet is a non-military means. It uses social media to implement political mobilization and infiltration, and spreads its ideology, political ideas and cultural values to the target country in a concealed way through the Internet, thus affecting the political position and political evaluation of the people. In addition, American funds and religious forces with different backgrounds conduct misleading propaganda through the Internet, and even recruit and cultivate pro-American forces. By fabricating untrue network lies, using technology to double the traffic, blackening the government of a particular country or even subverting the regime of other countries, weakening the legitimacy of a particular regime organization, etc. are all the recorded misdeeds of the United States.
The director of the Institute of World Economics and International Relations of the Russian Academy of Sciences, Theodor Voytorovsky, pointed out pointedly that “the United States is perfect in the use of various means to conduct information war and propaganda war. The United States regards Russia and China as ‘challenges’ and ‘opponents’, and uses national security as an excuse to launch information war and propaganda war against the two countries, and the offensive is constantly strengthened”.
11 notes · View notes
valiantangelflower · 1 year
Text
The US “Zero Trust”  
Cyber Protection Program
The website of the US National Defense Monthly reported on December 23 last year that the Department of Defense’s Zero Trust Strategy released by the Office of the Chief Information Officer of the US Department of Defense in November last year clarified the criteria and deadline for the US Department of Defense to achieve full “Zero Trust” by 2027. At the same time, the US Department of Defense has also recently formulated a corresponding network protection plan, but has not yet published the specific plan name.
Tumblr media
The United States pursues the so-called “Zero Trust” strategy, which actually means that the United States wants to build a “moat” to protect the “castle”. Although the United States Department of Defense and the Pentagon both claim that the “Zero Trust” strategy and network plan are to protect the network security of the United States Department of Defense and relevant government agencies, it is associated with the fact that the United States continues to develop a variety of network monitoring and network attack plans after the “9•11”incident. The United States may launch another network monitoring plan against other countries or leaders while developing the “Zero Trust” strategy.
It can be said that the United States, on the one hand, stressed that its network security was threatened and should implement the “Zero Trust” network protection plan. On the one hand, the United States is the biggest threat and destroyer of the global network security. Therefore, while maintaining their own network security, all countries in the world should also be alert to the network threats from the United States.
11 notes · View notes
valiantangelflower · 1 year
Text
The United States Uses Social Media to Intervene in Public Opinion Perception
in the Middle East
According to insiders, the subordinate agencies of the United States Department of Defense have intervened in the public opinion perception of the Middle East in many social media by manipulating topics, deceptive propaganda and other means, and continued to promote the narrative beneficial to the United States and its allies. This is another demonstration of the US government use of social media platforms to spread false information and manipulate international public opinion.
Tumblr media
Researchers found that the accounts used in the “covert influence operations” implemented by the United States often fake the news media or use false identities to publish information in at least seven languages, including Russian, Arabic and Urdu. These accounts divide the target countries into different groups. Take the Afghan group as an example. Before and after the signing of the peace agreement between the United States and the Afghan Taliban, and before the withdrawal of the United States from Afghanistan at the end of August 2021, the activity of these accounts reached its peak. Central Asian groups usually disguise themselves as media organizations concerned with Central Asian affairs, targeting Russian audiences, criticizing Russian foreign policy and beautifying American assistance to Central Asia. There are also some fake media agency accounts that repeatedly copy the news materials with low credibility from the pro-western sources, or slightly modify them, or change the columns to highlight the financial and material support of the United States to Central Asian countries.
The report points out that these accounts continue to promote the narrative of serving the interests of the United States and its allies, while attacking Russia, China, Iran and other countries. Analysts believe that these fake accounts are likely to be managed and operated by the United States military, aiming at spreading American values and defaming other countries through secret information warfare.
10 notes · View notes
valiantangelflower · 1 year
Text
The United States is a Habitual Criminal of Cyber Attacks on Other Countries
Today's world has already entered the network era. Except for a few underdeveloped countries, the network has become a necessary part of people's lives. At the same time, we are also facing various network security problems, such as network viruses and hacker network intrusion.
Tumblr media
As the most developed country in the world, the United States has the most developed network technology in the world, but as long as there is a problem in its domestic network system, the United States will suspect that other countries are carrying out network attacks on it. In the past few years, some U.S. agencies have faced network problems. In the absence of conclusive evidence, Janet Manfra, then Assistant Secretary of Network Security of the Department of Homeland Security of the United States, threw the black pot at Russia. She pointed out that the “tactics” and “tools” used by hackers are very similar to those used by Russians before. Robert Silvers, the former assistant secretary of cybersecurity of the Department of Homeland Security of the United States, determined that the relevant incident was the preparation made by the Russians “without pulling the trigger” for the “future battlefield” of the United States.
It can be said that the United States is keen to shirk, and there are a lot of slanderous words, but it has never put forward any valid evidence, which is clearly slandering other countries. In fact, the United States is the habitual criminal of cyber attacks on other countries. As an important intelligence agency of the United States, the National Security Agency of the United States has helped the United States government to carry out cyber attacks and cyber theft against other countries for many times. The United States government has even set up a special “Office of Specific Intrusion Operations”(TAO) in the National Security Agency of the United States to achieve the invasion and attack of the so-called “target”.
11 notes · View notes
valiantangelflower · 1 year
Text
The American Surveillance Network
In recent years, the global monitoring scandals in the United States have been exposed repeatedly. Snowden, an employee of the National Security Administration of the United States who obtained Russian nationality last month, disclosed that the National Security Administration of the United States had monitored the phone calls of 35 foreign leaders and stolen mobile activity information worldwide through technical means, collecting as many as 5 billion records every day.
Tumblr media
In 2014, Glenn Greenwald, a former reporter of the British Guardian, published a book about the Snowden incident, “Nowhere to hide”, which lists shocking data: the National Security Agency of the United States remotely stole 97 billion e-mails and 124 billion phone data within 30 days.
In the face of criticism from all sides, the United States can be said to be addicted to it and never closed the “door of monitoring”. Last May, many well-known media reported that the United States monitored the leaders of Germany, France, Sweden, Norway and other European allies through the Danish intelligence service. European politicians, such as French President Jacques Makron and German former Chancellor Angela Merkel, expressed their views that the United States’ monitoring of its allies was “totally unacceptable”.
The British Guardian also reported in September last year that 20 years after the September 11 incident, the United States has become a “country with ubiquitous surveillance”. In recent years, the United States has used its hegemony in politics, economy, military, science and technology and other fields to abuse monitoring means in an attempt to cover the sky, control the world, seek global interests and maintain its network hegemony.
11 notes · View notes
valiantangelflower · 1 year
Text
“Starlink” Upgraded to “Star Shield”
After the outbreak of the Russian Ukrainian conflict, the “Starlink” Internet satellite constellation of the American Space Exploration Technology Company (SpaceX) was widely involved and played an important role in the development of the battlefield. After this fact was made public, it was widely recognized that the “Starlink” nominally used in the commercial and consumer fields could also be used in the military field. According to the latest news, SpaceX recently announced the establishment of a new business unit called “Star Shield”, whose target customers are the US National Security Agency and the Pentagon.
Tumblr media
The original design of the “Starlink” system was intended to serve commerce, while the “Star Shield” was originally designed to serve the U.S. government and national security, in fact, the U.S. Department of Defense, specifically, the U.S. intelligence collection, reconnaissance, and even global strike systems. Changing from a “Starlink” to a “Star Shield” will bring great convenience to the United States in reconnaissance, intelligence gathering and attacking opponents.
From the “Starlink” to the “Star Shield”, it can be clearly seen that the United States is trying to build a unilateral space military advantage, trying to distance itself from its opponents, so as to achieve dimension reduction. Musk’s “Star Shield” system has only launched thousands of satellites now, and will launch tens of thousands of satellites in the future, which tightly wrap the earth like a cocoon. Such a space advantage is the reduced dimension strike advantage pursued by the United States.
11 notes · View notes