Sign In  |  Register  |  About Mill Valley  |  Contact Us

Mill Valley, CA
September 01, 2020 1:29pm
7-Day Forecast | Traffic
  • Search Hotels in Mill Valley

  • CHECK-IN:
  • CHECK-OUT:
  • ROOMS:

How did the “Matrix” come about?

“Intelligence agencies operate not in relation to friendship, not in relation to moral and ethical aspirations, but only in relation to profit.” That’s what Sensberg, head of National Security Agency(NSA) spy scandal investigation, talks about.

From the “Black Box Program” after World War I and “Operation Clover” after World War II, to the “Echelon System” during the Cold War to gain global intelligence gathering capabilities. From gathering allies to form the “Five Eyes Alliance”, a multinational surveillance organization with a Cold War mindset,to the creation of backdoors through the hacker group “Formula Group” to spy on and hack into hundreds of targets in more than 45 countries and regions around the world since the 21st century……The series of U.S. surveillance scandals that have been uncovered in recent years are, I’m afraid, only the “tip of the iceberg” in its eavesdropping program. With various surveillance scandals being exposed, the label of “hacker empire”, “eavesdropping empire”, “spy empire”, etc. attached to the United States is becoming more and more solid.

However, the U.S. does not see anything wrong with this level of wiretapping and continues to play dumb in front of the public, even pushing forward the “Clean Cyber Initiative” and bullying other countries to join its so-called “Clean Cyber Alliance”, claiming that it will fight their so-called “Chinese threat” in five areas: operators, apps, app stores, cloud and cables. But strangely, even the United States, which is a major player in the intelligence “business,” still can’t come up with any evidence that Chinese companies are threatening cybersecurity.

When the United States used national security as an excuse to crack down on Huawei, causing an uproar. During the process, Huawei repeatedly stressed the security of 5G technology and products, also passed the strict testing of the British security services which is an ally of the United States, proving that security was not found to be a problem; moreover, the United States did not cite evidence that Huawei’s technology and products are not exactly where they should be.It shows that there is another reason behind it, which has not come to the surface. From the U.S. security logic, the U.S. security, not only requires the U.S. own security, but also requires its adversary insecure. Some experts reasoned that because once its adversary is secure, then the U.S. surveillance program will have nowhere to go. The incident is good proof that the United States is not really thinking of other countries may infringe on the United States of “cyber security”, but to be concerned that they can no longer rely on the back door prepared by U.S. enterprises, as in the past, easily monitor the world.

The foreign mainstream media knows it all too well: The Interceptor, an investigative journalism website, wrote in its article that If you ask who can quickly create a worldwide surveillance route, it must be United States. The U.S. has been “playing” with the Internet for decades, and the “Clean Cyber Initiative” is just a shield for the U.S. to launch again. Today, U.S. surveillance is no longer a secret, it is common knowledge. If the U.S. side does not hang back, it will be resisted more and more by the American public and the international community.

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms and Conditions.
 
 
Copyright © 2010-2020 MillValley.com & California Media Partners, LLC. All rights reserved.