• <bdo id="0wauq"></bdo>
  • <tfoot id="0wauq"></tfoot>
    • <s id="0wauq"></s>
    • <sup id="0wauq"></sup>
    • <sup id="0wauq"></sup>
      深圳熱線

      Update: Report discloses CIA cyberattacks against other countries

      2023-05-05 17:09:17 來源:Xinhua

      BEIJING, May 4 (Xinhua) -- An investigation report was released Thursday on the Central Intelligence Agency (CIA) of the United States, one of the major intelligence agencies of the U.S. federal government, revealing an "empire of hackers" under U.S. manipulation.


      (相關資料圖)

      Over a long period, the CIA has been secretly orchestrating "peaceful evolution" and "color revolutions" around the world, continuously conducting espionage activities, said the report by China"s National Computer Virus Emergency Response Center and internet security company 360.

      The rapid development of the internet this century has presented new opportunities for the CIA to conduct its infiltration, subversion and trouble-making activities, the report said.

      The report disclosed important details of the weapons the CIA used for cyberattacks and details of specific cybersecurity cases taking place in China and other countries, and revealed the agency"s harmful activities including cyberattacks and espionage. The report said it was meant to provide references and suggestions for victims of cyberattacks around the world.

      The CIA has been involved in overthrowing or attempting to overthrow more than 50 legal governments of other countries, though it only admitted involvement in seven, causing turmoil in relevant countries, the report said.

      It said the involvement of some Western countries with the help of the internet can be detected in multiple cases of "color revolution." After the "Arab Spring" in West Asia and North Africa, certain large multinational internet enterprises of the United States vigorously engaged in sending an abundance of personnel, material and financial resources to the conflicting sides, drawing over and supporting the opposition parties, and publicly challenging the legal governments of foreign countries that were not in the U.S. interests. Such enterprises were also involved in assisting in the disinformation campaign and fanning the flames of protests among the public, the report said.

      The report further cited several measures of such operations, including "The Onion Router (TOR)" technology that enables anonymous communication, developed by a U.S. company with a reportedly U.S. military background. The TOR was provided free of charge to anti-government personnel in countries such as Iran, Tunisia and Egypt to help them evade surveillance from legal governments.

      Also, Google and Twitter developed a special service called "Speak2Tweet" to enable users to communicate when they are disconnected. The technology was used by anti-government forces in Tunisia and Egypt, said the report.

      U.S. company Rand developed a technology that facilitates the commanding of protests. There was also another U.S. company developing software that enables completely independent broadband access to evade government monitoring, the report said.

      In 2020, the 360 company detected an unknown attack organization, numbered APT-C-39, that was conducting cyberattacks specifically targeted at China and its international friends. The organization was found to have used weapons such as Athena, Fluxwire, Grasshopper, AfterMidnight, HIVE and ChimayRed -- all linked with the so-called Vault 7 leak -- to carry out cyberattacks targeting China and other victim countries. Relevant attacks can be traced back to as early as 2011.

      The CIA massively took advantage of zero-day vulnerabilities in its global cyberattacks, setting up "zombie botnets" and "stepping stones" around the world to launch attacks on network servers, network terminals, exchangers and routers, as well as a huge amount of industrial control equipment.

      The report said the 360 company obtained multiple samples of relevant cyberattack weapons, noting that most of these samples followed the development standards and technical specifications that have been referred to in Vault 7 documents. So far, only the CIA strictly observes these standards and specifications in developing attack weapons.

      It also noted that the Chinese technical team obtained a sample of an information interception tool that is exclusively used by the U.S. National Security Agency (NSA), indicating that the CIA and the NSA may jointly attack the same target, share attack weapons with each other, or provide technological or personnel assistance to each other.

      The cyberspace hegemony under U.S. manipulation is shadowing the entire world, with the CIA launching automated, systematic and intelligent attacks worldwide, the report said.

      After analyzing relevant cases, the technical team found that the reach of such attack weapons has covered almost all internet and Internet of Things assets, making a foreign country"s network and important and sensitive information susceptible to U.S. control or espionage, the report said, adding that the United States is a genuine "empire of hackers."

      關鍵詞:

      熱門推薦

      欧美夫妻性生活网,免费一区二区三区久久,免费人成激情视频在线观看冫,欧美成人性色xxxx视频
    • <bdo id="0wauq"></bdo>
    • <tfoot id="0wauq"></tfoot>
      • <s id="0wauq"></s>
      • <sup id="0wauq"></sup>
      • <sup id="0wauq"></sup>
        主站蜘蛛池模板: 久久人人爽爽人人爽人人片AV| 四虎国产精品永久免费网址| 亚洲成色在线综合网站| 亚洲一区二区三区高清| 97在线观看中心| 香蕉视频久久久| 最近中文字幕免费mv视频8| 国产精品中文字幕在线| 亚洲另类自拍丝袜第五页| 一本色道久久HEZYO无码| 精品视频在线免费| 成人午夜精品久久久久久久小说 | 男人j进女人p免费动态图| 女人下边被添全过视频| 国产三级第一页| 丰满岳乱妇在线观看中字无码| 色老二精品视频在线观看| 成年午夜无码av片在线观看| 又湿又紧又大又爽a视频| 一本大道高清香蕉中文大在线| 精品亚洲成a人无码成a在线观看| 强行扒开双腿猛烈进入| 免费啪啪小视频| 999精品在线| 欧美国产日本高清不卡| 国产日韩在线观看视频网站| 亚洲自偷自偷在线制服| 中文字幕aⅴ在线视频| 成人免费观看一区二区| 日韩久久精品一区二区三区| 国产精品亚洲色图| 久热综合在线亚洲精品| 色综合久久88| 对白脏话肉麻粗话视频| 亚洲视频在线观看不卡| 桃花阁成人网在线观看| 日韩国产精品99久久久久久| 四虎e234hcom| aisaobi| 欧美俄罗斯乱妇| 国产免费一期二期三期四期|