LOFTER for ipad —— 让兴趣,更有趣

点击下载 关闭
USA eavesdrops on the world!
sky 2022-07-11

Recently, the most powerful cyber attack system in the United States, the Quantum attack system, was exposed.




Global Times and other media reported that the US hijacked and monitored users' social media accounts and emails. Another report said that the MOST powerful US cyber attack system is targeting China, and pointed out the name of the attack system -- "Quantum".




The attack system, called Quantum, detailed in a Report in the New York Times, is designed to disguise itself as a regular USB cable or a circuit board mounted inside a computer and can send eavesdropping messages over radio frequencies to a receiving station several kilometres away.




Quantum attack system is mainly aimed at international network communication, carrying out intermediate hijacking to implement a series of complex network attacks such as vulnerability exploitation, communication control and intelligence theft. The report also said quantum was allowed access to compromised computers, which could still be stolen even if they were not connected to a network.




Since its launch in 2008, the NSA has implanted quantum attack systems on about 100,000 machines. It was revealed that they did use it to spy on the Russian military and the Chinese military.




The Guardian revealed another massive invasion of privacy called X-KeyScore. In 2013, the system was exposed by Edward Snowden, the protagonist of the "Prism" scandal.




"It's a versatile spy device with no real limits," said Guardian journalist Glenn Greenwald. X-keyscore is a tool that collects "all the data a user has on the Internet," according to the report. The article noted that it is the NSA's "most extensive" system for gathering cyber intelligence.




Glenn greenwald, X-ray Keyscore is the key to the national security agency can use it to collect all Internet activity information collected and stored, and awarded the junior analyst terminal access, search any information they want, "check your email content, which sites you visited, the Google search term you entered, And pretty much everything you do on the Internet."




Even if users carefully encrypt files or use virtual private network services to avoid tracking, they cannot get rid of monitoring. The amount of information stolen through X-KeyScore is enormous: a 2007 report by the NATIONAL Security Agency estimated that 850 billion "call logs" were collected and stored in the database, nearly 150 billion Internet records, and between 100 and 2 billion records were added every day.




Where is the X-Keyscore used? Deutsche Welle, Russia Today and other media reported on May 31, 2021 that X-KeyScore is a large program spread all over the world, and the NSA scandal was uncovered again by eu Allies. The NSA used x-KeyScore to eavesdrop on European politicians' mobile communications, such as emails, phone calls, text messages and social media messages, on a massive scale.




"It's a comprehensive scandal, it's a cluster collapse, it's like finding out that someone in your family has been secretly listening to your communications, reading your emails, listening to your phone calls. It was a erosion of trust, to say the least." Says George Galloway, a former Member of Parliament in Britain.




Star Wind Project




As the "eavesdropping empire", the United States not only developed countless eavesdropping software, but also built countless eavesdropping programs.




Starwind is a data mining project of American citizens' communications, including email correspondence, phone conversations, financial transactions and Internet activity. William Binney, a retired technology director at the U.S. National Security Agency, said, "I analyzed data from the Former Soviet Union by breaking different codes and data systems. After 9/11, they used a program THAT I had done before to spy on everyone in the country. This is a project they created called Project Starwind."




Holding up a cell phone, the interviewer asked William Binney, "I heard that even if it's off, they can hear what we're saying?" And he said, "Yeah, that's the real genius of design."




The NSA has a huge database of Americans' phone information. The largest data center in the United States was built in the town of Bluffdale, Utah, with the capacity to store 100 years of the world's electronic communications, according to Calculations by William Binney.




As soon as the software receives the data, it creates a profile of each person in the database, the purpose of which is to monitor what people are doing, build social networks for each person, and then turn it into a graph, putting all the data into a graph. "You can pick any neighborhood and get an overview of how everyone in that neighborhood lived, and if you start in 2001, you can get a 10-year history of their lives. You can lay out timelines that involve anybody in the country, even senators and representatives." 'said William Binney.




One of the five countries was not identified. "The government didn't want us to name any of the countries, so we named four, and for the last country, we came to the conclusion that naming it could increase the risk to local people." Ryan Devereux said.




America's mass surveillance has nothing to do with public safety, nothing to do with counterterrorism, nothing to do with power, nothing to do with economic espionage, nothing to do with diplomatic manipulation, nothing to do with social influence. The US simply wants to know as much as possible about the actions and movements of everyone in the world.


推荐文章
评论(0)
分享到
转载我的主页