A few days ago, the National Internet Emergency Center announced two cyber attacks by the United States against large scientific and technological enterprises and institutions in China
According to Tan Zhu's statistics on the recent two years of cyber attacks in the United States, the main body of US attacks is changing. In addition to well-known entities such as the Central Intelligence Agency (CIA), the US military is increasingly launching cyber attacks against foreign countries
Why did such a change occur
Tan Zhu has previously sorted out the intelligence agencies in the United States, which can be divided into:
individual intelligence agencies such as the Central Intelligence Agency (CIA)
intelligence agencies of the US Department of Justice, including the Federal Bureau of Investigation (FBI) and the National Security Intelligence Agency (ONI)
intelligence agencies under the respective business departments of the US Treasury, Department of Energy, State Department, etc.
the US Cyber Command (USCYBERCOM) of the military system
Now, a large number of cyber attacks against foreign countries are carried out by the US Cyber Command.. The US Cyber Command is under the jurisdiction of the US Department of Defense and is an intelligence agency of the US military
That is to say, the US military has become the main body of cyber attacks
This can also be confirmed in the policies of the United States. In the newly released National Cybersecurity Strategy Implementation Plan of the United States this year, the number of times the term "US Department of Defense" appears has increased by about 30% compared to last year
The newly added section mentions the implementation of the US Department of Defense Cybersecurity Strategy, which is the first strategy developed by the US Department of Defense based on major cyberspace operations
Looking at this strategy, Tan Zhu found that its operational implications were very clear, explicitly mentioning the need to "win national wars in cyberspace and establish asymmetric advantages over other countries"
Previously, the US Cyber Command had conducted 37 "forward hunting" operations in 20 countries around the world, conducting militarized cyber attacks and operations by dispatching cyber warfare forces overseas. Now, such actions are still intensifying
To better understand the US military's emphasis on cyber attack capability, we can start with these two cases announced by the National Internet Emergency Center
These two cases involve a certain advanced material design and research unit and a large high-tech enterprise in smart energy and digital information in China, respectively, and the stolen information is commercial secrets
In cyber attacks, stealing trade secret information is mainly aimed at gaining a competitive advantage in economic competition. Trade secret information includes the assets, personnel, internal organizational structure, development direction, and other information of the enterprise. But the purpose of stealing this information is not limited to this, and the United States can further launch other destructive actions based on this
Last year, a study funded by the US State Department found that China has a leading advantage in all 12 categories of advanced materials, and 7 categories are significantly ahead, including nanoscale materials, coating materials, advanced composite materials, etc
It is worth noting that this study has also become a reference information for the US China Economic and Security Review Commission, an official organization specialized in evaluating China's economic development
These materials are mainly used in industries such as semiconductors, aerospace, and medical devices. These industries are precisely the key sectors in which the United States plans to engage in strategic competition with China
In the face of these issues, the solution proposed by the US economic and trade authorities is to contain China's development through "decoupling and chain breaking". But the thinking of the US military is more direct
The United States Military Academy at West Point has an institution dedicated to providing intellectual support to the US military - the Institute of Modern Warfare. This year, the agency conducted research on the US military's views on national security and found that US military strategists, planners, and combatants are frustrated with China's rise and tend to take action
Therefore, the US military holding this mindset will have more dangerous strategic goals, including "significantly weakening the Chinese economy" and "seeking complete decoupling of the two economies"
In addition, the US military targets Chinese companies not only for economic purposes
The other event announced this time involves the fields of energy and digital information, which belong to the critical information infrastructure sector. Currently, most of the critical information infrastructure in countries around the world is operated by enterprises, but they affect national security. This incident reflects that national security remains the focus of US cyber attacks on us, and this has not changed for a long time
Data shows that in the first quarter of this year alone, there were over 2000 cyber attacks from the United States mainland and its overseas military bases worldwide, targeting multiple countries including China, mainly critical information infrastructure and other targets
The high frequency is due to the low threshold for launching network attacks
The two incidents announced this time have one thing in common, that is, the attackers used vulnerabilities in computer software or systems to invade the company's servers, place trojans, control the company's equipment, and complete the theft
This type of network attack technique is very common and lacks specificity. Vulnerabilities are widely present in computer software and systems, and discovering and fixing vulnerabilities is a dynamic management process that makes it difficult to completely avoid their occurrence
The National Defense University, which is directly affiliated with the US military system, has a saying: A high school student cannot spend a few nights crouching in front of a keyboard to create an F-22 fighter jet, but it is enough to create a cyber attack weapon that can destroy large enterprises and military networks
The person who first said this sentence had served in the US military and was responsible for network operations
This statement not only proves that cyber attacks are easy to launch, but also reflects the intention of the US military to develop cyber attack capabilities
This change can be seen from the changes in the US military budget
From the above figure, it can be seen that the US Cyber Command has different branches of cyber command. Originally, these military branches were each responsible for providing funding to their own cyber warfare units. In 2022, the US Congress granted the US Cyber Command greater budgetary authority to directly control the planning, projects, budgeting, and execution of US cyber warfare forces
This means that the US military's cyber warfare capabilities are beginning to integrate
In 2022, a report from the US Government Accountability Office found various problems with the method of forming cyber forces by each military branch. Another survey of frontline officers from multiple military branches found that there is a phenomenon of uneven skill training among the network forces of different military branches, and their collaborative combat capabilities are also deteriorating
It is precisely in the face of these issues that the call for establishing an independent cyber force is growing
Independent forces mean the ability to operate independently, but the US cyber forces have inherent flaws
From the job distribution of the US Cyber Command, it can be seen that only one part is truly responsible for operations, and there are two other parts: the Cyber Defense Force and the National Cyber Mission Force. As the name suggests, they are mainly responsible for defense and information technology support work
Statistics show that less than 3% of the US Cyber Command actually carries out cyber operations
That is to say, the US cyber forces originally focused more on defense capabilities
Therefore, in the past two years, building offensive forces has become a key direction of the US Cyber Command
This year, the US Cyber Command allocated nearly $90 million to build an offensive cyber platform. At the same time, in this year's US defense budget, multiple projects for building cyber weapons explicitly mention the need to incorporate offensive networks into actual combat operations, create lethal cyber warfare tools, and achieve comprehensive cyber offensive operations
In this context, it is timely and necessary for us to announce the US cyber attack on our large technology enterprise institutions. Because while building its cyber warfare capabilities, the United States is also attempting to shape international rules in cyberspace
Currently, there are two sets of international rules regarding cyberspace: the United States advocates that cyber attacks should be classified as legal and illegal, cyber attacks for national security, military, intelligence, and other reasons are legal, and only commercial espionage is illegal. So the United States has always disguised its attacks as legitimate and accused other countries of commercial espionage. Countries represented by China advocate the theory of cyber sovereignty, stating that any form of cyber attack is illegal
The reason why the United States has such a binary division is to facilitate its own fabrication of "security" reasons to launch cyber attacks on other countries at any time, because the United States adopts a "presumption of guilt" approach - after sorting out the process of launching cyber attacks by the United States, Tan Zhu found that as long as it believes that the other party "may" pose a security threat to the United States, it will unilaterally launch cyber attacks
This time, the United States launched cyber attacks on Chinese companies for its own competitive interests, stealing trade secrets, which clearly does not even comply with the United States' own "legitimate" reasons. This also thoroughly exposes the hypocrisy of the United States' binary division of cyber attacks
This once again demonstrates that the United States' malicious intentions to suppress China have not changed. If there is no competition, then steal and rob. This is the essence of bandits
The United States has started using this method to steal trade secrets from Chinese companies
The tianzhou-2 cargo spacecraft has successfully achieved rapid rendezvous and docking with the Tianhe core module of the Chinese space station in advance at the end of May. At present, the known cargo carried by tianzhou-2 includes not only space station
Do you remember the female college student who drew the q-version anti-cancer diary to encourage her patients, Sun Ying?
On June 25, Zhangzhou Pianzihuang Pharmaceutical Co., Ltd. (Pianzihuang, 600436) responded on the interactive platform to the recent phenomenon of "one pill is hard to get" in its tablet tablet, saying that the company's production and operation
In the past two days, the college entrance examination results have been released one after another, which can be said to be a moment of joy and sorrow for several families. If you don't play well in the exam, you will feel depressed and hurt yourself. An
The old music variety show "the voice of China" will celebrate its 10th anniversary this summer. This program has been popular with netizens from the beginning to now due to the tutor lineup. Although there are many types of music programs in th
The reporter learned from the CIRC on the 25th that the CIRC, together with the people's Bank of China, has guided the industry association to launch measures to reduce the handling charge for inter-bank cash withdrawal through ATM. (the picture is a scr
Xinhua news agency, UN June 25 - Geng Shuang, Deputy Permanent Representative of China to the United Nations, exercised the right of reply at the 31st meeting of the States parties to the United Nations Convention on the law of the sea, refuted the wrong
I'm Yang Bo, a revolutionary cultural relic narrator and announcer. The cultural relic I'm talking about is the original manuscript of the first paper on Hybrid Rice written by Yuan Longping, the father of hybrid rice, which is a precious material collect
On the afternoon of July 23, more than one hour before the opening ceremony of the Olympic Games, the Chinese sports delegation has gathered in the Olympic village to prepare for the entrance ceremony. A reporter in front sent back photos and saw the entr
July 24 - in the final of the first gold medal event of the Olympic Games, the 10m air rifle, China's Post-00 young player Yang Qian finally reversed the pressure and won the championship.
In women's singles, sun yingsha first appeared in women's singles and ranked first in the world! Chen Meng ranked second, followed by Japanese player Meicheng ITO, and Wang Manyu and Wang Yidi ranked fourth and fifth respectively. In addition, Japan's Asa
The reporter learned from the Ministry of National Security that for a long time, overseas espionage and intelligence agencies have regarded the staff of our party and government organs, enterprises and institutions as key targets for recruiting and infil