Hot Comment | Northwestern Polytechnical University was attacked by the US network, and the "Matrix" was destroying global network security
Author:Zhejiang Daily Time:2022.09.06
Zhejiang News Client commentator Zhang Ping
Data picture
On September 5th, the National Computer Virus Emergency treatment Center and 360 Company released a survey report on the Northwest Polytechnical University's network attacks by the National Security Agency (TAO) under the National Security Agency (NSA) of the National Security Agency (NSA). More than 40 different types of exclusive network attack weapons continue to attack the stealing of Northwestern Polytechnical University, stealing core technical data such as the school's key network equipment configuration, network management data, and operation and maintenance data. According to the response of the Ministry of Foreign Affairs spokesman Mao Ning, the attack theft operation stole a number of core technical data.
Evidence shows that the US National Security Agency's evidence chain of network attacks and data theft of Northwestern Polytechnical University is clear and complete. It is a "big chess" that has been carefully deployed, long -lasting, and sinister. In April of this year, Northwestern Polytechnical University reported that a group of fishing mails with the theme of scientific research reviews, defense invitations and notifications abroad, including Trojan horse procedures, seduced some teachers and students to click on the link. Some faculty members also have traces of network attacks. Technical analysis shows that the initiative of the attack is the US National Security Agency! The professional network attack weapons used in the attack process contains 41 types, divided into four types, first attack the breakthrough, then continue to control, then lurk theft, and finally eliminate traces. The means are extremely skilled. Even more "coincidental" is that 54 springboard machines and proxy servers are distributed in 17 countries, of which 70%are located in the neighboring countries in China, and they are not "five -eye alliance" countries.
A set of attack methods of cloud flowing water, a huge global layout of energy, so clear, organized in order, and clear goals, almost achieved a "perfect crime". In front of the evidence of the iron plate, the United States has no room for arguing.
China is not the only victim, and the global network attacks have shown that the United States is accelerating the ruin of global network security. The "Prism" exposed in 2013, the global secret monitoring project, the news of the "Wiki revealed" in 2015, the "Swiss encryption machine" incident in 2020, and the "Deng Hammo Action" exposed by the Danish media in 2021 ... Over the years, the United States has been globally in the world. Within the scope, the foreign governments, enterprises and individuals implement large -scale, organizational, and non -difference network stealing, monitoring, and attacks. There is no basic morality. This time, the United States not only attacked key universities in the fields of aviation, aerospace, navigation engineering education and scientific research, but also carried out no different voice monitoring of Chinese mobile phone users for a long time, illegally stealing SMS content of mobile phone users, and wirelessly conducted it wirelessly. position.
What is even more incredible is that the United States is engaged in global eavesdropping monitoring and "career" in the United States. On the one hand, it is also declared that he is the maintenanceer of network security, the defender of the network order, and is keen to "splash dirty water" towards other countries. Essence For example, the United States has repeatedly accused China of the EU, the United Kingdom, and Australia accusing China of supporting hackers and intelligence companies to launch large -scale network attacks to the outside world, but they cannot get evidence. American politicians also touched and coerced other countries to join its so -called "clean network" plan in an attempt to clear Chinese companies in the online market. In July 2021, the United Kingdom, the European Union, and NATO issued a statement to attack China, claiming that China launched a "malicious network action" and was toughly refuted by my country's embassies and consulates abroad. "The thief shouting and catching the thief" has been playing too much. No one believes it. In the face of the iron certificate of various countries, the word of the United States is like to say how to say it.
Sima Zhao's heart, passers -by knowing. The United States is drunk with technical advantages to implement network bullying and digital infringement, but it is just a natural choice in its "US priority" mentality. Unscrupulous seizing information resources around the world, monitoring the people's ideological dynamics, and using American hypocalpiped hegemony logic in order to safeguard its political interests and maintain its hegemony system.
When you see the corner of the ice, it means that the larger iceberg is lurking. The "Matrix" monitoring eavesdropping and cyber attacks, or more, has not been exposed. On September 5th, the National Network Security Propaganda Week was "China National Cyber Security Propaganda Week". At this section, the Northwestern Polytechnical University incident has carried out a profound network security education for the whole people. The threat of network security is around. Everyone is around. It is a part of the national network security defense line. Internationally, China has always advocated the "common, comprehensive, cooperative, and sustainable security concept", which is committed to strengthening global digital governance and cybersecurity cooperation. In front of the hegemony, the people of the world should act as soon as possible to jointly expose and resist the network hegemony, and jointly build a community of human network security.
The right path is the way to return. The United States should be awakened in time. Hegemonism and power politics will never win. It will only stimulate the firm beliefs of the people of the world to safeguard their rights and interests. It will only unite people who love peaceful people. Intersection
- END -
Talking about it | Why does the video website must be merged and integrated?
Recently, Reuters quoted two people familiar with the matter and reported that Bai...
The latest position of 100 billion Jinglin is exposed!Significantly copy Ali, Manchu, heavy warehouse holds this stock!Optimistic about the six major directions
On the evening of August 12, the well -known private offering Jinglin submitted a ...