[ad_1]
Original caption: Pompeo uses data security to discredit China Hua Chunying: People should have a modicum of integrity and shame
China News Service, Beijing, September 1 (Huang Yuqin) In response to the use of data security issues by the Secretary of State of the United States, Pompeo, to discredit the statements of China, the spokesman for the Ministry of China’s Foreign Relations Hua Chunying cited facts and data in a regular press conference on September 1. He refuted and noted that “people should have a minimum of integrity and shame.”
Hua Chunying noted that for some time, Secretary of State Pompeo has practiced his famous phrase “we lie, we cheat and we steal” in his speech at the University of Texas, it is a good case. He lied every day on the subject of network security. Not to mention, everyone doesn’t understand how social media software a young man likes like TikTok, and those easy singing and dancing videos, pose a threat to US national security. Take a look at the United States: What did the Americans do when they emphasized the need to protect themselves against the so-called “China threat” and the theft of user data by China?
“The United States has always been the world’s leading telecommunications thief.” He said the US National Security Agency (NSA) has long forced carriers like AT&T and Verizon to provide it with data. Already more than ten years ago, the US National Security Agency had used a “pseudo base station” called the “Dirtbox” in monitoring projects such as the “Boundless Informant” program to simulate signals from mobile phone base stations and Secretly access the phone and steal data. In this regard, the French “Le Monde” reported that: “The United States has stolen data from at least 62.5 million mobile phones in France through ‘dirty boxes’!”
Hua Chunying said that regarding the apps, Pompeo has repeatedly smeared TikTok, WeChat and other apps as “infiltration” tools of the Chinese government, but did not tell the world that the United States is the usual criminal who manipulates the apps of the mobile phones to steal secrets. According to information revealed in the “Prism Gate” incident, the US National Security Agency has long viewed apps as a “data gold mine.” Over the years, you have spent a lot of money in this field to extract intelligence from data through applications. Twitter, Facebook, YouTube, Skype, Google Maps and even the mobile game “Angry Birds” have been forced to choose cooperation.
He said an “innovation” by the US intelligence service was stealing secrets from mobile app stores. According to the Canadian Broadcasting Corporation (CBC), the US National Security Agency and other members of the intelligence agencies “Five Eyes Alliance” have launched the so-called “Project Irritant Horn” (Irritant Horn), which will use the store of Google Play Store applications. Plant spyware or crack software vulnerabilities. It is precisely by this means that the “Five Eyes Alliance” successfully stole massive amounts of information.
In response to the so-called “clean cloud” issue, Hua Chunying said that the real “cloud stealing secret” gangster is none other than the United States. The Washington Post once revealed that the National Security Agency and the UK Government Communications Headquarters launched the “Muscular Project” (Muscular), frequently invading Google and Yahoo cloud servers, and even draining data directly. to the organization’s database for collection. Hundreds of millions of private messages.
He cited information released by the “New Zealand Herald” and noted that the United States, together with the New Zealand intelligence services, carried out cyber secrets on the data connection line of the Consulate General of China in Auckland. To steal secrets, the United States has not dropped a single network cable from the Chinese embassy and consulate, how can it not get involved in the “intelligence-rich mine” of optical submarine communication cables? In recent years, the German weekly Der Spiegel exposed the US National Security Agency’s invasion of the largest submarine optical cable between Europe and Asia, SME4. The “Washington Post” revealed a series of fiber optic theft projects codenamed Oakstar, Stormbrew, Blarney, Fairview, etc., initiated by the US National Security Agency. The Associated Press once reported that the United States Navy spared no effort to upgrade and transform the “Jimmy Carter” submarine in order to facilitate the theft of optical cables.
“Furthermore, the United States” Four-Year Intelligence Assessment Report “released by the media clearly states that: American intelligence agencies must take all means, including cyber operations, and will not hesitate to attack technology patent institutions from other countries to enhance the competitive advantage of US companies. ” Hua Chunying Snowden’s exposition of the US “Prime Class” project is said to also show that the US has concealed monitoring equipment in its nearly 100 embassies and consulates abroad to steal secrets from the country in which it is stationed. The US Intercept website recently published an article titled “America” Go to China “” Clean Web “is dirty and hypocritical,” the article noted that the “clean Web” envisioned by America is a network without China, and this one has “ethnic exclusion”. His statement is absurd and hypocritical. It only says one truth: “Only the United States can monitor the world.” Also, everyone knows that the Swiss crypto equipment company “Cripto AG” that has been operating for half a century has been confirmed to be the American CIA. The puppet, the company’s “encryption kit” sold in more than 120 countries, has always been a “secret robbery machine.”
“People should have a modicum of integrity and shame. In the face of these ironclad acts, I hope that senior US officials will stop discrediting China immediately,” Hua Chunying emphasized. (Finish)