In the name of counter-terrorism, the United States acts against the rules -- the third in a series

Date:09-11  Hits:  Belong to:Hot news
Original title: the United States, in the name of counter-terrorism, acts against the rules -- the third in a series of comments on the 20th anniversary of September 11
Xinhua news agency, Beijing, September 11 - Title: the United States, in the name of counter-terrorism, practices anti rules -- the third in a series of comments on the 20th anniversary of September 11
Xinhua News Agency reporter
From monitoring ordinary people to monitoring competitors and even allies, after the "September 11" incident in 2001, the U.S. intelligence agencies, in the name of anti-terrorism and safeguarding national security, vigorously engaged in monitoring and surveillance around the world and secretly extended their tentacles to other countries by taking advantage of technological advantages, which has reached the point of voyeurism addiction and reliance without fear. This kind of "cyber terrorism" that ignores the rules, breaks through the bottom line and violates human rights is really disgusting.
The United States is the world's largest source of cyber attacks, and its monitoring projects are almost "pervasive", covering e-mail, voice calls, social network information, etc. More well-known include the "Echelon" project launched in the 1960s for monitoring various communication signals such as satellites, the "star wind" plan with monitoring objectives covering American citizens, the "arch" plan for global network security manufacturers, the "magic" project for telephone monitoring, the "upstream" project for copying optical signals from network backbone optical cables and switches, and so on.
After the "9.11" incident, the United States started the construction of a larger-scale network monitoring system in the name of "counter-terrorism", forming a strong monitoring, attack, deterrence and defense capability in cyberspace. Its practical application has long exceeded the needs of counter-terrorism and has become a "big stick" in the hands of the United States to promote hegemonism and interfere in the internal affairs of other countries.
In 2013, Edward Snowden, an employee of a former US defense contractor, exposed the US prism large-scale secret monitoring project to the media, including German Chancellor Angela Merkel and other dignitaries. The "eavesdropping situation" that shocked the world ended with the US promise not to monitor Merkel's communication equipment in the future. Just a year later, the WikiLeaks website revealed that the United States had successively monitored several French presidents such as Chirac, Sarkozy and Hollande. In May this year, the media also disclosed that the United States used Danish information cables to monitor and monitor text messages and telephone calls of dignitaries in Germany, France, Norway, Sweden and other countries from 2012 to 2014.
Facts show that every time such monitoring actions of the United States are exposed, it will trigger strong protests from the international community, and the United States will make some "commitments" under international pressure, but it has remained the same since then and does not converge. "WikiLeaks" founder Assange once commented: "don't expect this monitoring super Congress to act with dignity and respect. There is only one rule, that is, there are no rules."
International politicians can still put pressure on the United States through diplomatic channels, but a large number of ordinary people have no resistance or even be aware of the wanton invasion of privacy by the United States. According to the confidential documents of the prism project disclosed in June 2013, the United States collects nearly 5 billion mobile phone records around the world every day; Secretly intruded into the main communication networks between Yahoo and Google in the data centers of various countries, stole hundreds of millions of user information, and wantonly tracked people's private relations and social activities; Over the years, it has been monitoring mobile applications, capturing personal data, etc.
Why is the United States obsessed with being a "eavesdropping maniac"? Counter terrorism is just an excuse. Its fundamental purpose is to maintain its hegemonic position by collecting all kinds of intelligence. This also shows once again that in the eyes of many American politicians, there is only hegemony and no human rights; Only interests, no justice.
On the one hand, the United States unscrupulously listens to the world, on the other hand, it yells to catch thieves, slanders other countries for no reason, and suppresses dissidents in the name of national security and data security. The hypocrisy of "American double standard" makes the world look at it.
In 2020, the United States touted the "clean network" plan around the world, called maintaining data security and privacy, which is actually aimed at suppressing and curbing other countries' communication and Internet enterprises, consolidating their monopoly position in the high-tech field, and opening the "convenient door" for unimpeded secret theft.
People have reason to believe that the various monitoring operations exposed in recent years are just the tip of the iceberg of the huge global secret stealing network in the United States. Some politicians in the United States should realize that acting recklessly in cyberspace under the banner of counter-terrorism will only create more cracks and hostility. No country can seek its so-called "absolute security", let alone seek hegemony, by violating and sacrificing the security of other countries. Disregarding international rules and morality, he will eventually bite himself. (end)
关于我们
扫一扫,关注我们最新消息扫一扫,关注我们最新消息
联系我们
86-0871-68323496

工作时间:周一至周五 9:00-18:00

Contact:Miss Cheng

Mobile:+8613320546173

Email:32560799@qq.com

Address:8-2-702, Zhaohuaxishi community, Wuhua District, Kunming

底部导航
The company's business mainly involves network host domain name service, network application development, website design and production, network marketing scheme design and technical support. Adhering to the customer-centric purpose, we will provide personalized services to different customers to make your e-commerce platform in a leading position in the industry.