Prism envelopes China: the United States' "Eight Great King Kong" seamlessly penetrates in China

"You have lived like this: every sound you make is heard by someone, and every movement of you, unless in the dark, is carefully observed by someone." This is depicted in the novel "1984" "Big Brother" monitors the "future life".

The reality is: Every time we talk, every action under the camera, and every footprint left on the network, someone is collecting, storing, and analyzing. Previously, we did n’t know who would be so “boring”, but in June this year, the former CIA employee Snowden broke the news to let the world know that our information is being entered into the NSA along with personal data around the world The huge hardware equipment can be preserved for decades.

China is the focus of US surveillance. Under the "care" of multiple US information monitoring and mining projects like "Prism", China is almost naked.

In that box, nine Internet companies in the United States have shown their talents in the prism project; in this box, Cisco, IBM, Google, Qualcomm, Intel, Apple, Oracle, Microsoft—the United States ’“ Eight Major King Kongs ”are driving in China, occupying the government, Customs, postal services, finance, railways, civil aviation, medical treatment, military and police, and Other key areas maintain close ties with the US government and military forces. US intelligence agencies have almost zero threshold for obtaining information through their equipment, software, and networks.

The "prism door" sounded the alarm for China. Some domestic operators have begun to contemplate the "de Ciscoization movement." However, if domestic products are to completely replace American products, there is still a long way to go in key innovations; national-level authoritative information security departments also need to be established as soon as possible.

"Prism doors" and "prisms"

In June, American Edward Snowden became a "hero" on the front pages of many media around the world, and became the target of the US government's criminal charges under the Anti-Spy Law.

Between security and freedom, Snowden chose the latter. As a former employee of the United States Central Intelligence Agency (CIA, hereinafter referred to as the "CIA") and a technical contractor of the National Security Agency (NSA), Snowden exposed the National Security Agency and the Federal Bureau of Investigation (FBI) through the British and American media. A secret project, code-named "Prism", is underway. The two organizations can directly access the central servers of nine American Internet companies to mine data to gather intelligence. Nine American Internet companies including Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, and Apple all participated in the project.

Under the refraction of "prisms", China is almost "not naked." The United States has established multiple surveillance and information mining projects. Through multinational companies with close ties to the government, it has opened up all the seven lines of the Chinese network. Telephone, video, email, and even everyone ’s credit card and travel records are possible. Was transferred to the hard disk of the NSA intelligence personnel one by one.

"Prism", "Main Road", "Pier", "Nuclear"

The exposure of the "prism" caused a thousand waves.

Hong Kong people marched on the street against the request of the United States to extradite Snowden; the US National Security Agency quickly publicized that the project played an important role in counter-terrorism work; the US media and people questioned, is invasion of personal privacy counted as terrorism? The European Union sent a letter to the US Attorney General requesting a "swift" response to this; at the same time, the US and Facebook companies have publicly stated that the US government has indeed requested user data from them. Prior to this, many Internet companies were unclear. , Trying to clear the relationship.

In fact, the "prism" is just an "appetizer" that Snowden presented to the world. It is only part of the American interplanetary project "Interstellar Wind."

After the "9.11" incident, the "Patriot Act" passed by the United States gave the government the power to collect bulk data. Subsequently, the National Security Bureau began a secret surveillance program, code-named "Interstellar Wind."

According to the US "Washington Post" report, "Interstellar Wind" was split into 4 projects: "Prism", "Main Road", "Pier" and "Nuclear". "Prism" and "Nuclear" are mainly used to intercept content. "Prism" is mainly used for Internet information interception, while "Nuclear" is used to intercept telephone conversation content and key information. The "main road" and the "dock" are relatively larger in scale. The "main road" focuses on telephone monitoring, while the "dock" focuses on Internet surveillance. Both rely on the processing of "metadata".

The so-called "metadata" can be understood as the data of the data, which can accurately reveal the communication time, location, equipment used, participants, etc. It is reported that the US National Security Agency spent 146 million US dollars to buy hard drives and other equipment, specifically used to store metadata.

According to Bloomberg News, thousands of technology, finance and manufacturing companies are working closely with the US National Security Agency to provide sensitive information to the latter. Participants in these projects are called "trusted partners". What is even more worrying is that the information collected by government departments is not only used to protect the national security of the country, but also used to invade computers in other countries.

National Security Agency

Can spell a person's life

Snowden pointed out that the surveillance objects of US intelligence agencies cover all parts of the world, of which China is the key target of its surveillance.

Since 2009, the National Security Agency has been invading computer systems in mainland China and Hong Kong. Snowden said that the National Security Agency ’s targets include the Chinese University of Hong Kong (Hong Kong ’s largest network hub is operated by the Chinese University of Hong Kong, which connects Google, Tencent, China Mobile and other network providers), SAR government officials, and enterprises And students ’computers, as well as computer systems located in the Mainland. The National Security Agency has more than 61,000 cyberattacks worldwide, and hundreds of such attacks against the mainland and Hong Kong.

"We (Snowden employed companies and the US National Security Agency) mainly attack network hubs, like large Internet routers." Snowden said, "so that we can access the communication data of hundreds of thousands of computers without having to invade each Computer. "

In addition to proactively attacking to obtain data, the US National Security Agency often requires many technology companies to "give up" information for it.

According to the evidence released by Snowden and the "confession" of the American Internet company, in the second half of 2012, the US federal, state, and local governments at various levels asked Facebook to provide user information up to 10,000 times. These materials involve 18,000 to 19,000 users; in the second half of last year, government departments at various levels in the United States had requested user information from Microsoft more than 6,000 times, and these materials involved 32,000 users.

Snowden is not the first person to expose the "Interstellar Wind". In 2012, William Binney, an official of the National Security Agency, realized the horror of the plan, left the National Security Agency, and disclosed the "Interstellar Wind" plan to the media. Previously, Binny ’s responsibilities were mainly to decipher passwords and manage to import information such as private telephones and emails from around the world into the Security Bureau ’s database.

Binny said that this ambitious plan penetrates various fields such as telephone, banking, and Internet. By extracting information in each field, the National Security Agency can spell out a person ’s life. With his bank transactions, travel itineraries, and Internet access Records and other information are continuously imported, and the National Security Agency has almost the ability to depict all the details of this person's life.

By accessing the Internet company ’s central server, US intelligence analysts can easily track Internet users ’actions and all their contacts. In the past 6 years, the "Prism" project has been "fruitful." It is reported that about 1/7 of the intelligence of the US National Security Agency relies on the project to provide raw data.

Baofeng portable radio

Guangzhou Etmy Technology Co., Ltd. , https://www.digitaltalkie.com