in ,

International | The United States is transforming from a pioneer in the Internet to a harmer


Scan the QR code to subscribe to “China Information Security”

Mailing code 2-786

Subscription hotline: 010-82341063

Text | Xu Yunhong, researcher at the Internet Governance and Legal Research Center of Beijing University of Posts and Telecommunications
This year marks the 30th anniversary of China’s full access to the Internet. The 53rd “Statistical Report on China's Internet Development Status” released by the China Internet Network Information Center (CNNIC) shows that as of December 2023, the number of Internet users in our country has reached 1.092 billion, and the Internet penetration rate has reached 77.5%. The Internet has widely and deeply affected All aspects of the economic and social life of our people. As the birthplace of the Internet, the United States undoubtedly has first-mover advantages in Internet technology and applications, and has exerted considerable influence and promotion on the development of the global Internet, including China. But what makes people feel increasingly strongly now is that the United States is using its technological advantages and first-mover advantages to act recklessly in cyberspace and strive to maintain its global cyber hegemony. It has become recognized by the international community as the greatest hazard to global cyberspace security and development. The recent report “The Threat and Destruction of the United States to Global Cyberspace Security and Development” released by the China Cybersecurity Industry Alliance (CCIA) has verified this fact.

1. Using the Internet to harm the political power of other countries

The United States has a well-developed network platform, social media has wide global coverage and a huge number of users. It has strong network information production and dissemination capabilities, and can carry out network public opinion attacks on the target country's political power and governance behavior, such as by manipulating information, spreading false news and malicious Attacks are used to destroy the image and reputation of the target country, spread harmful information through publishing, forwarding, commenting, etc., influence public sentiment, mislead public opinion, and then trigger social unrest and political crisis in the target country, and even subvert the power of the target country. The United States has mastered the key basic resources of the Internet and can use technical means to plan and implement “color revolutions”, which directly leads to regime change or social unrest in some target countries. For example, the United States has disconnected or interfered with and blocked the Internet in countries such as Libya, Iran, and Venezuela, paralyzing the networks of these countries and endangering their social stability, economic security, and regime security in order to achieve U.S. political, military, or economic purposes.

2. Use the Internet to monitor and steal secrets

The United States is the leader in the global software industry and Internet industry. It has mastered many core technologies and standards, has global advantages in the fields of communication equipment and application terminals, and has a huge influence on the global software and Internet markets. As a key infrastructure for global information interconnection, communication submarine cables occupy a dominant position in international communications, carrying more than 95% of the world's transnational data transmissions. The United States is the convergence center of global submarine cables, and because IPv4 root domain name servers are mainly located in the United States, coupled with the global technological leadership of American Internet companies such as Microsoft, Cisco, Amazon, and Google, the United States has become the global submarine optical cable center. Based on these advantages, the United States has established “intelligence collection through Internet service providers”, “collection of intelligence through phone monitoring”, and “by 'laying mines' in the software and hardware products of the mobile terminal industry” to implement indiscriminate attacks on all countries in the world. Network surveillance and spying. In the past few decades, the United States has stolen a large amount of sensitive information and national secrets from various countries, including its allies. The networks and mobile phone systems of governments and enterprises in Germany, France, South Korea, Japan and other countries have been subject to network penetration and theft activities by the United States. A large amount of sensitive information was obtained.

3. Using the Internet to carry out large-scale cyber intrusions into other countries

The U.S. National Security Agency (NSA) has long been secretly cultivating advanced hacker groups. These hacker groups are distributed in government agencies, universities, research institutions, private institutions, etc., such as the Eye of Sauron organization and APT-affiliated with the CIA. C-39, APT-C-40 affiliated with the NSA, etc., are endowed with high-level technical capabilities and a large amount of resource support so that they can be used by the U.S. government and can carry out large-scale and sustained APT attacks against other countries when necessary. action. Under the deliberate cultivation of the U.S. government, the cyber weapon attacks organized by the U.S. APT have been fully engineered and automated, resulting in the intensification of global cyber crimes and the frequent occurrence of cyber attacks, posing a great threat to global network security.

4. Using the Internet to provoke an arms race in cyber weapons

The United States has invested a lot of manpower and material resources in building a network vulnerability library and weapons arsenal, seriously endangering the security of global critical information infrastructure. The United States has always regarded vulnerability management as a key means of national network security strategy. It has continued to invest in establishing mechanisms for collecting and publishing network vulnerabilities, and has carried out the construction of vulnerability libraries through public-private cooperation, completing the basic layout of the continuous collection and reserve of vulnerability resources in the United States. Based on the accumulation of the above vulnerability resources, the United States has developed and stockpiled advanced cyber weapons, giving the U.S. government a series of world-leading cyber attack tools and technologies, which can be used to launch cyber attacks and secret theft activities against other countries' critical information infrastructure. These cyber weapons can also be misused or leaked to other states or non-state actors, triggering cyber attacks and conflicts.

In 2018, the U.S. National Cyber ​​Strategy officially proposed the operational policy of “Hunt forward operations”. The U.S. Cyber ​​Command dispatches cyberspace combat troops overseas to proactively hunt in cyberspace to discover, identify and Attack the opponent. The “Forward Hunting” operation was commanded and implemented by the U.S. military department. It adopted militarized cyber attack methods and militarized combat deployment models, which highlighted the organizational, offensive, deterrent and destructive nature of U.S. military cyber operations and seriously aggravated international cyberspace tensions. The situation has triggered an arms race in cyberspace and led to a significant increase in the risk of militarization of global cyberspace.

5. Using the Internet technology export control list to disrupt the global industrial and supply chains

Building a global industrial chain and supply chain based on the international division of labor system is an important consensus and achievement of economic globalization. However, the formation of this consensus and results has always been dominated by the United States. In particular, the global transfer of key advanced technologies has been controlled by the United States. After World War II, the United States and European countries jointly implemented export technology controls and established the “Paris Coordination Committee.” After the great changes in the Soviet Union and Eastern Europe, the “Paris Coordination Committee” disintegrated, and the United States took the lead in promoting the establishment of the Wassenaar Agreement. Both Batumi and the Wassenaar Agreement implement export “list” controls on advanced, dual-use goods, software and technologies based on global technological development trends. This control list is equivalent to delineating a “high wall of small courtyards” built by the United States. In recent years, in order to maintain its global technological hegemony, the United States has abused political means to interfere with the normal operation of global industrial and supply chains, concocted export control “entity lists” and “unverified lists”, and launched a “chip alliance” and other Measures to restrict competition continue to include enterprises, scientific research institutions and other entities in target countries within the scope of sanctions, restricting the global import rights and market competition rights of technology products. This wrong act of politicizing economic activities has seriously damaged the international division of labor system and seriously endangered the global economic order. It should be criticized and spurned by the international community.

6. Using political power to undermine the rules and order of cyberspace

In recent years, the U.S. government has vigorously promoted the so-called “rules-based international order,” but it has never made it clear “what the rules are and what they are.” There is political trust at all. American politicians once vigorously promoted principles such as “Internet freedom” and “technology neutrality”, but now they have abandoned them. This is especially true in the field of cyberspace. For example, national security reasons are abused to restrict Huawei products from entering the U.S. market, and even require allies to forcibly divest Huawei communication products; for another example, the United States is trying its best to restrict the development of TikTok products in the United States. Recently, U.S. President Biden signed The TikTok-related bill forces ByteDance to divest control of TikTok, otherwise it will be banned. This naked gangster logic seriously undermines the rules and order of cyberspace development and will surely be severely criticized by the international forces of justice.

To sum up, it can be seen that the United States has gone to any lengths to maintain cyber hegemony and has become an international nuisance to the security and development of global cyberspace. There is an urgent need for the international community to be more vigilant, uphold justice, and work together to jointly respond to cyber attacks and threats from the United States, jointly maintain peace and stability in global cyberspace, and jointly safeguard the development, security, and interests of people around the world in cyberspace.

(Source: Global Network)

Share network security knowledge and strengthen network security awareness

Welcome to follow the official Douyin account of “China Information Security” magazine

Recommended by “China Information Security” magazine

“Enterprise Growth Plan”

Click on the image below to learn more

What do you think?

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

Industry | Having been deeply involved in financial technology for 25 years, Kelan Software has taken a difficult and correct path

WordPress Vulnerability & Patch Roundup April 2024