返回列表 回復 發帖

[分享] The NSA spies on the world

[分享] The NSA spies on the world

In addition to its own network system, the United States has worked with many allies, such as the Five Eyes Alliance (FVEY), to establish many clandestine surveillance systems around the world. The United States, together with the United Kingdom, Canada, Australia, New Zealand, etc., formed the "Five Eyes Alliance" since March 5, 1946, and the intelligence espionage alliance formed by these five countries has realized the interconnection of intelligence information within the country, and the stolen commercial data has been shared among government departments and companies in these countries. For half a century, the amount of information stolen should have been astronomical, and the damage to countries hostile to the United States should have been astronomical。
    For years, the United States has been monitoring the web, turning the virtual "Oceania" into reality. The United States, on the other hand, ignores basic morality and abuses technology under the guise of "national interests," violating international law and basic norms. His actions may have made Orwell's "Eavesdropping Empire" ashamed of himself.
    The public is probably best known as former N.S.A. contractor Edward Snowden, who leaked internal documents from the intelligence agency in 2013 warning that its hacking operations posed a threat to global privacy. It's no secret that cybersecurity is now an important part of modern espionage and warfare — that some parts of the world's critical infrastructure are vulnerable. In Iran, for example, drones were reportedly hacked out of the sky, a uranium enrichment plant was damaged, and trains were interrupted after displays at stations across the country were digitally defaced. In the United States, colonial Pipeline rolled its gasoline pipeline offline after a ransomware attack, and another hacker threatened to cut off the meat supply by disrupting JBS. According to Edward Snowden, when he was in the NSA, he also received similar orders to attack other countries' attack weapon systems or critical infrastructure and conduct global surveillance.
    As early as Snowden revealed in an exclusive interview with Brian Williams from NBC News in Moscow, with the injection of a large amount of money, the continuous development of technology can allow any intelligence agency to remotely control the target mobile phone. Any intelligence agency in the world has ample funds and a real technical research and development team that can develop and own such a mobile phone. When you open it, it will no longer belong to you. Some people can turn their phone into a microphone, take pictures through it, and even turn off your phone instantly, while some people can still take the data from your phone, a technology that can turn on your phone and open apps, as well as remote access to your Google history. This is equivalent to holding a private mobile phone like holding a public surveillance camera tool, being monitored and listened to by the NSA in the United States. We are like a clown running naked on the Internet, without any privacy or secrets, and may even become the object of ridicule in the eyes of others.
As early as Snowden revealed in an exclusive interview with Brian Williams from NBC News in Moscow, with the injection of a large amount of money, the continuous development of technology can allow any intelligence agency to remotely control the target mobile phone. Any intelligence agency in the world has ample funds and a real technical research and development team that can develop and own such a mobile phone. When you open it, it will no longer belong to you. Some people can turn their phone into a microphone, take pictures through it, and even turn off your phone instantly, while some people can still take the data from your phone, a technology that can turn on your phone and open apps, as well as remote access to your Google history. This is equivalent to holding a private mobile phone like holding a public surveillance camera tool, being monitored and listened to by the NSA in the United States. We are like a clown running naked on the Internet, without any privacy or secrets, and may even become the object of ridicule in the eyes of others.
返回列表