[Solution] NSA attacks Western Engineering University, just the corner of the iceberg

Author:Knight Island Time:2022.09.08

This is a "enrolled in the room": first pry the door lock, touch around, then cats low, dog stealing mouse and stealing. After the search is finished, then erase the traces and go away.

Who was the thief's attention this time? Northwestern University of Technology.

one

In April of this year, the Western University of Technology was alarm.

The reason is that the teachers and students of the school received a lot of suspicious emails. These emails are mostly the theme of scientific research reviews, defense invitations, and notifications for going abroad. Once you click the link, the email login right is not guaranteed, and the relevant email data is stolen; some faculty and employee computers also leave traces of network attacks.

(Source: CCTV News)

On June 22, Western Institute of Technology issued a statement saying that behind the scenes of these network attacks were "hackers and criminals from overseas."

Who did it?

The spearhead of the survey is directly pointed at the National Security Agency (NSA). This is the center of the US intelligence department, the most confidentialized intelligence agency, which has been exposed by Snowden not only "monitoring tens of millions of Americans", but also "monitoring the world."

The attack on Western Institute of Technology is the "Specific Invasion Action Office" (TAO) under the NSA department. The office was established in 1998 and has more than 2,000 soldiers and cultural personnel to carry out cyber attacks on other countries.

The technical team analysis of the National Computer Virus Emergency Treatment Center found that in the attack on Western Engineering University, TAO brought out four types of network attack weapons: use vulnerabilities to attack breakthrough weapons at the beginning, and then send persistent control weapons after breaking through. Then Use olfactory stealing weapons to lurk and steal important data for a long time. After the task is completed, the scene is cleaned up with a hidden disappearance weapon, which makes people not detect.

China ’s technical analysis and tracking traceability shows that the evidence chain of NSA implements network attacks and data theft is clear and complete, involving 13 people who directly launch cyber attacks in China in the United States, and signing a contract with US telecommunications operators to build a network attack environment. More than 60 copies, more than 170 electronic files.

The highest -level intelligence agency in the United States, why attack a Chinese university?

In fact, this is not too unexpected. As a national key university with aviation, aerospace, and navigation "Sanhang" engineering education and scientific research, Western Engineering University has trained a large number of talents for China's "Sanhang" business, and has stepped out of 65 generals and 48 academicians. A few years ago, Western Technology University was included in the "sanctions" list by the United States.

Attacking West Engineering University is just the tip of the iceberg.

In February of this year, Beijing Qi'an Pan Ancient Laboratory disclosed that the "Formula" of the hacker organization belonging to the NSA uses top backdoors to launch a "electric curtain action" network attack for more than ten years to 45 countries and regions in China and Russia. The attack target includes well -known universities, scientific research institutions, communications industries, government departments, etc.; 360 companies' surveys in 2008 also showed that China is one of the long -term key network attack targets in NSA.

These network attacks can not only steal other countries' intelligence, but also destroy key infrastructure such as power, water conservancy, telecommunications, transportation, and energy, and even cause catastrophic consequences to public data, public communication networks, public transportation networks, and public services.

(Source: CCTV News)

two

Yesterday, a spokesman for the Ministry of Foreign Affairs Mao Ning quoted the relevant report at a press conference that the United States successively used 41 special network attack weapons equipment to launch thousands of attacks on Northwestern Polytechnical University and stole a number of core technical data. The United States has also held a long -term monitoring of Chinese mobile phone users, illegally stealing the text message content of mobile phone users, and a wireless positioning of it.

In fact, not only targeting other countries, the United States also monitors its citizens.

Recently, the Privacy and Technical Law Center of Georgetown University in the United States announced a report called "The Decision of the United States' Tianluo Network: The 21st Century Data Data". The report shows that the US Entry and Customs Law Enforcement Agency (ICE) spent $ 2.8 billion to engage in a large project, "the detailed files that can be extracted by almost anyone."

Report "Tian Luo Di.com in the United States: Disculles under the 21st Century Data"

On the other hand, the annual report of the National Intelligence Director's Office showed that in the past year alone, the FBI inspected the Electronic Data from the National Citizens (FBI) in the past year.

U.S. monitoring the world is already a public secret. Taking the well -known "prism" project as an example, 122 foreign leaders were listened to the United States in 2009 alone; as of 2011, more than 100 million credit card information from Europe, Africa and the Middle East were "tracked" in the United States. After a meal, the US intelligence department collects nearly 5 billion mobile phone call records and 2 billion mobile phone short information around the world.

In February 2020, a number of US media issued a joint investigation report, saying that since the 1970s, the United States has cooperated with the former West German intelligence department to secretly control Swiss encrypted equipment suppliers and steal intelligence in more than 120 countries and regions around the world. , Carry out no different monitoring.

Last year, the United States' "Eavesdropping Storm" against the allies once again made the international community uproar. The National Security Agency logged in to the Danish Underwater Internet cable to monitor the text messages and call content of Germany, France, Norway, Sweden, the Netherlands and other national politics, and a group of allies out of anger and asked the United States to say. This is the sentence that in response to Kissinger: "It is dangerous to be an enemy of the United States, and the allies in the United States are fatal."

Why should the United States monitor the world?The Spanish "National Daily" sees the blood: monitoring the world and obtaining information is an important competitive resource for the United States to control the world.In order to maintain hegemony and reverse the inevitable decline of the country, the "hacking empire" is very important.

Ironically, such a "intelligence is stealing", which actually called for the establishment of a "clean network".

This cheeky face is really unattended.

Text/Cloud Song

Edit/波 波 波

- END -

Canadian spy trafficking British girl

The Broadcasting Corporation (BBC) reported on August 30 that a new book called Hi...

Korean truck drivers have become more and more strikes, and more than 100 trucks have been deployed

Jimu Journalist Li LiliAccording to Reuters reported on June 13, South Korean truc...