U.S. jeopardizes global cyber security: Foreign Ministry - U.S. jeopardizes global cyber security: F

   2023-04-13 ecns0
核心提示:The U.S. is the origin of cyber warfare and the biggest global cyber thief, and it is of common interest for all to reveal U.S.' hypocrisy on cyber security, a spokesperson for the Chinese foreign ministry said Wednesday.The China Cybersecurity Indus
The U.S. is the origin of cyber warfare and the biggest global cyber thief, and it is of common interest for all to reveal U.S.' hypocrisy on cyber security, a spokesperson for the Chinese foreign ministry said Wednesday.The China Cybersecurity Industry Alliance issued a report that discloses over ten cases in which U.S. intelligence agencies launched cyber attacks, carried out internet monitoring and espionage, and leaked and proliferated cyberattack weapons and tools since 2010.Foreign Ministry spokesperson Wang Wenbin told a daily news briefing that China noted that the report provides a systematic account of the history and typical cases of cyber attacks undertaken by relevant departments of the U.S. government and their impact on global cyber security.These cases show once again that the U.S. is the origin of cyber warfare, the biggest spreader of advanced cyber weapons and the biggest global cyber thief, Wang said.The so-called Clean Network and what the U.S. calls "technology that reflects democratic values and interests" are just a pretext for it to unscrupulously conduct cyber thefts and attacks and ensure its supremacy, he added.Wang stressed that safeguarding cybersecurity is a shared responsibility of all countries."Cyberspace should not be used as a tool to split the international community or contain and bring down other countries. It is in the international community's common interest to end the U.S.' lawlessness on cyber theft and reveal its hypocrisy on cyber security," Wang said.Here are some of the cases from the report.Case 1: In 2010, the U.S. was found using the Stuxnet virus to attack Iran's nuclear facilities. This is the first case in history where a government launched cyber attacks against key infrastructure of another country, opening the "Pandora's box" of state-to-state cyberwarfare. In 2022, the U.S. Cyber Command announced that it is their obligation to "own the domain".Case 2: The ransomware WannaCry that affected most countries and caused the most severe losses across the world in 2017 was the result of leaked cyber weapons from the U.S. National Security Agency. Ironically, in 2021, the U.S. put on an act by launching a so-called International Counter-Ransomware Initiative with dozens of countries.Case 3: In 2013, PRISM revealed how the U.S. engaged in cyber espionage across the world, including against China. The U.S. even asked nine international internet giants, including Microsoft, Yahoo, Google and Apple, to cooperate with the U.S. government to secretly monitor information. The program even invaded the network equipment of multiple countries including Germany and the ROK. On the other hand, since 2018, the U.S. has been citing digital security as an excuse to suppress Chinese companies without providing any evidence, and it even coerced its allies who were also victims of U.S. espionage to join the gang.Case 4: In 2013, the media exposed that the U.S. National Institute of Standards and Technology (NIST) used its cryptography standards to install backdoors, which expanded the targets of supply chain attacks from IT products to IT standards. On March 30, 2023, the U.S.' top diplomat said at the "Summit for Democracy" that the U.S. is working with partners to establish necessary rules and norms so that technology is developed in ways that reflect what they call "democratic values and interests".Case 5: In 2015, the media disclosed the U.S. government's Project CAMBERDADA, which is aimed to intrude, divide and suppress foreign cybersecurity vendors and force them to dance to the tune of the U.S.. As a result, few global cybersecurity vendors now choose to disclose cases of the U.S.'s cyberattacks, and some U.S. cybersecurity vendors have even become an accomplice of the U.S. government's disinformation campaign targeting other countries.The U.S. is the origin of cyber warfare and the biggest global cyber thief, and it is of common interest for all to reveal U.S.' hypocrisy on cyber security, a spokesperson for the Chinese foreign ministry said Wednesday.The China Cybersecurity Industry Alliance issued a report that discloses over ten cases in which U.S. intelligence agencies launched cyber attacks, carried out internet monitoring and espionage, and leaked and proliferated cyberattack weapons and tools since 2010.Foreign Ministry spokesperson Wang Wenbin told a daily news briefing that China noted that the report provides a systematic account of the history and typical cases of cyber attacks undertaken by relevant departments of the U.S. government and their impact on global cyber security.These cases show once again that the U.S. is the origin of cyber warfare, the biggest spreader of advanced cyber weapons and the biggest global cyber thief, Wang said.The so-called Clean Network and what the U.S. calls "technology that reflects democratic values and interests" are just a pretext for it to unscrupulously conduct cyber thefts and attacks and ensure its supremacy, he added.Wang stressed that safeguarding cybersecurity is a shared responsibility of all countries."Cyberspace should not be used as a tool to split the international community or contain and bring down other countries. It is in the international community's common interest to end the U.S.' lawlessness on cyber theft and reveal its hypocrisy on cyber security," Wang said.Here are some of the cases from the report.Case 1: In 2010, the U.S. was found using the Stuxnet virus to attack Iran's nuclear facilities. This is the first case in history where a government launched cyber attacks against key infrastructure of another country, opening the "Pandora's box" of state-to-state cyberwarfare. In 2022, the U.S. Cyber Command announced that it is their obligation to "own the domain".Case 2: The ransomware WannaCry that affected most countries and caused the most severe losses across the world in 2017 was the result of leaked cyber weapons from the U.S. National Security Agency. Ironically, in 2021, the U.S. put on an act by launching a so-called International Counter-Ransomware Initiative with dozens of countries.Case 3: In 2013, PRISM revealed how the U.S. engaged in cyber espionage across the world, including against China. The U.S. even asked nine international internet giants, including Microsoft, Yahoo, Google and Apple, to cooperate with the U.S. government to secretly monitor information. The program even invaded the network equipment of multiple countries including Germany and the ROK. On the other hand, since 2018, the U.S. has been citing digital security as an excuse to suppress Chinese companies without providing any evidence, and it even coerced its allies who were also victims of U.S. espionage to join the gang.Case 4: In 2013, the media exposed that the U.S. National Institute of Standards and Technology (NIST) used its cryptography standards to install backdoors, which expanded the targets of supply chain attacks from IT products to IT standards. On March 30, 2023, the U.S.' top diplomat said at the "Summit for Democracy" that the U.S. is working with partners to establish necessary rules and norms so that technology is developed in ways that reflect what they call "democratic values and interests".Case 5: In 2015, the media disclosed the U.S. government's Project CAMBERDADA, which is aimed to intrude, divide and suppress foreign cybersecurity vendors and force them to dance to the tune of the U.S.. As a result, few global cybersecurity vendors now choose to disclose cases of the U.S.'s cyberattacks, and some U.S. cybersecurity vendors have even become an accomplice of the U.S. government's disinformation campaign targeting other countries.
 
标签: Politics
反对 0举报 0 评论 0
 

免责声明:本文仅代表作者个人观点,与好速译英语翻译(本网)无关。其原创性以及文中陈述文字和内容未经本站证实,对本文以及其中全部或者部分内容、文字的真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
    本网站有部分内容均转载自其它媒体,转载目的在于传递更多信息,并不代表本网赞同其观点和对其真实性负责,若因作品内容、知识产权、版权和其他问题,请及时提供相关证明等材料并与我们留言联系,本网站将在规定时间内给予删除等相关处理.

  • Xi在国际儿童节前夕访问北京一所学校 - Xi visi
    Xi在走访学校师生时,向全国各地的孩子们致以节日问候。他强调,儿童是国家的未来,是民族的希望
    06-02 Politics
  • 截至2022年,中国有近1.15亿少先队员 - China h
    截至2022年底,全国共有少先队员11467万余人,根据中国少先队全国工作委员会周三晚间发布的最新消息。截至12月31日,全国共有约26.1万个少先队基层工作委员会,约623万人担任少先队辅导员。6至14岁的中国儿童可以申请加入少先队,并可以佩戴红领巾作为象征。
    06-01 Politics
  • 孩子们收到节日信息 - Children get festive me
    并致力于民族复兴事业。Xi在周四国际儿童节前夕访问北京育英学校时传达了这一信息。此次访问是在Xi主持一次
    06-01 Politics
  • 中国敦促美国停止在南中国海的挑衅行动 - China
    中国周三表示,一架美国RC-135侦察机于5月26日蓄意闯入中国在南海的一个军事训练区进行侦察和干扰,中国人民解放军南部战区司令部发言人。美国最近指责中国进行了“不必要的行动”
    06-01 Politics
  • 印度对中国媒体的偏见受到谴责 - India's
    北京周三证实,中国记者“长期以来在印度受到不公平的歧视”,中国为中国媒体的合法权益采取的反制措施是“恰当的”。在北京举行的每日新闻发布会上,一名记者在向外交部发言人毛宁提问时,毛援引媒体报道称,中国和印度拒绝续签签证,驱逐了对方的记者
    06-01 Politics
  • Xi敦促加快国家安全体系、能力现代化建设 - Xi
    Xi是委员会主席。他强调,要全面贯彻落实党的二十大精神,深刻认识国家发展面临的复杂挑战
    05-31 Politics
  • 马斯克在会见FM时支持稳定的中美关系 - Musk su
    国务委员兼外交部长秦刚周二在会见来访的新能源汽车巨头特斯拉首席执行官埃隆·马斯克时,将驾驶汽车与中美关系相提并论。为了中美关系的成功发展,秦在北京告诉马斯克,应该正确驾驶汽车,走相互尊重的道路,
    05-31 Politics
  • 全球政治人物称赞国家的增长道路 - Global poli
    来自世界各地的政治人物对中国共产党领导的中国现代化道路表示欢迎,称这为世界创造了机遇,鼓励更多发展中国家追求适合本国国情的现代化建设, 莫
    05-31 Politics
  • 中方支持塞维护主权和领土完整的努力 - China s
    随着科索沃局势再次紧张,欧洲继续感到担忧,中国周二表示,支持塞尔维亚维护其主权和领土完整的努力,敦促北约尊重有关国家的主权和领土完整,做有利于地区和平的事情。30多名保卫科索沃北部三个市政厅的北约维和士兵在与塞尔维亚抗议者的冲突中受伤,而塞尔维亚总统则将军队置于最高级别
    05-31 Politics
  • 秦刚告诉伊隆·马斯克发展中美关系就像开车一样
    中国国务委员兼外交部长秦刚周二在北京会见了特斯拉首席执行官马斯克,讨论了中国汽车工业的发展和中美关系。秦强调了健康、稳定和建设性中美关系的重要性,他说发展中美关系就像开汽车一样。驾驶员需要将方向盘保持在正确的方向,必要时踩下制动器以避免危险,并不时踩下油门以加速
    05-31 Politics
点击排行