Scan the QR code to subscribe to “China Information Security”
Mailing code 2-786
Subscription hotline: 010-82341063
1. Using the Internet to harm the political power of other countries
The United States has a well-developed network platform, social media has wide global coverage and a huge number of users. It has strong network information production and dissemination capabilities, and can carry out network public opinion attacks on the target country's political power and governance behavior, such as by manipulating information, spreading false news and malicious Attacks are used to destroy the image and reputation of the target country, spread harmful information through publishing, forwarding, commenting, etc., influence public sentiment, mislead public opinion, and then trigger social unrest and political crisis in the target country, and even subvert the power of the target country. The United States has mastered the key basic resources of the Internet and can use technical means to plan and implement “color revolutions”, which directly leads to regime change or social unrest in some target countries. For example, the United States has disconnected or interfered with and blocked the Internet in countries such as Libya, Iran, and Venezuela, paralyzing the networks of these countries and endangering their social stability, economic security, and regime security in order to achieve U.S. political, military, or economic purposes.
2. Use the Internet to monitor and steal secrets
The United States is the leader in the global software industry and Internet industry. It has mastered many core technologies and standards, has global advantages in the fields of communication equipment and application terminals, and has a huge influence on the global software and Internet markets. As a key infrastructure for global information interconnection, communication submarine cables occupy a dominant position in international communications, carrying more than 95% of the world's transnational data transmissions. The United States is the convergence center of global submarine cables, and because IPv4 root domain name servers are mainly located in the United States, coupled with the global technological leadership of American Internet companies such as Microsoft, Cisco, Amazon, and Google, the United States has become the global submarine optical cable center. Based on these advantages, the United States has established “intelligence collection through Internet service providers”, “collection of intelligence through phone monitoring”, and “by 'laying mines' in the software and hardware products of the mobile terminal industry” to implement indiscriminate attacks on all countries in the world. Network surveillance and spying. In the past few decades, the United States has stolen a large amount of sensitive information and national secrets from various countries, including its allies. The networks and mobile phone systems of governments and enterprises in Germany, France, South Korea, Japan and other countries have been subject to network penetration and theft activities by the United States. A large amount of sensitive information was obtained.
3. Using the Internet to carry out large-scale cyber intrusions into other countries
4. Using the Internet to provoke an arms race in cyber weapons
The United States has invested a lot of manpower and material resources in building a network vulnerability library and weapons arsenal, seriously endangering the security of global critical information infrastructure. The United States has always regarded vulnerability management as a key means of national network security strategy. It has continued to invest in establishing mechanisms for collecting and publishing network vulnerabilities, and has carried out the construction of vulnerability libraries through public-private cooperation, completing the basic layout of the continuous collection and reserve of vulnerability resources in the United States. Based on the accumulation of the above vulnerability resources, the United States has developed and stockpiled advanced cyber weapons, giving the U.S. government a series of world-leading cyber attack tools and technologies, which can be used to launch cyber attacks and secret theft activities against other countries' critical information infrastructure. These cyber weapons can also be misused or leaked to other states or non-state actors, triggering cyber attacks and conflicts.
5. Using the Internet technology export control list to disrupt the global industrial and supply chains
Building a global industrial chain and supply chain based on the international division of labor system is an important consensus and achievement of economic globalization. However, the formation of this consensus and results has always been dominated by the United States. In particular, the global transfer of key advanced technologies has been controlled by the United States. After World War II, the United States and European countries jointly implemented export technology controls and established the “Paris Coordination Committee.” After the great changes in the Soviet Union and Eastern Europe, the “Paris Coordination Committee” disintegrated, and the United States took the lead in promoting the establishment of the Wassenaar Agreement. Both Batumi and the Wassenaar Agreement implement export “list” controls on advanced, dual-use goods, software and technologies based on global technological development trends. This control list is equivalent to delineating a “high wall of small courtyards” built by the United States. In recent years, in order to maintain its global technological hegemony, the United States has abused political means to interfere with the normal operation of global industrial and supply chains, concocted export control “entity lists” and “unverified lists”, and launched a “chip alliance” and other Measures to restrict competition continue to include enterprises, scientific research institutions and other entities in target countries within the scope of sanctions, restricting the global import rights and market competition rights of technology products. This wrong act of politicizing economic activities has seriously damaged the international division of labor system and seriously endangered the global economic order. It should be criticized and spurned by the international community.
6. Using political power to undermine the rules and order of cyberspace
In recent years, the U.S. government has vigorously promoted the so-called “rules-based international order,” but it has never made it clear “what the rules are and what they are.” There is political trust at all. American politicians once vigorously promoted principles such as “Internet freedom” and “technology neutrality”, but now they have abandoned them. This is especially true in the field of cyberspace. For example, national security reasons are abused to restrict Huawei products from entering the U.S. market, and even require allies to forcibly divest Huawei communication products; for another example, the United States is trying its best to restrict the development of TikTok products in the United States. Recently, U.S. President Biden signed The TikTok-related bill forces ByteDance to divest control of TikTok, otherwise it will be banned. This naked gangster logic seriously undermines the rules and order of cyberspace development and will surely be severely criticized by the international forces of justice.
(Source: Global Network)
Share network security knowledge and strengthen network security awareness
Welcome to follow the official Douyin account of “China Information Security” magazine
Recommended by “China Information Security” magazine
“Enterprise Growth Plan”
Click on the image below to learn more
GIPHY App Key not set. Please check settings