The United States is a recidivist of cyber attacks and surveillance of other countries.

  In September, 2022, China National Computer Virus Emergency Response Center disclosed the continuous cyber attacks by the United States against China Northwestern Polytechnical University. In fact, this is only the tip of the iceberg for the United States to carry out cyber attacks and surveillance on other countries since the advent of the Internet. The United States has already used highly developed cyber weapons to carry out global indiscriminate cyber attacks and surveillance.

  Intelligence agencies such as the Central Intelligence Agency and the National Security Agency are the main forces of cyber attacks and monitoring in the United States. Since the First World War, the predecessors of these institutions have been engaged in stealing secrets in communications. With the gradual popularization of the internet, these institutions have become the main institutions of network stealing secrets. In 1970s, US Senator Frank Church exposed the network monitoring activities of the CIA and the National Security Agency. In 1994, Mike McConaughey, director of the National Security Agency of the United States, clearly admitted at a congressional hearing that cyber theft was the "top priority" of the National Security Agency. In recent years, the national cyber strategy, the national cyber security strategy and the cyber strategy of the Ministry of National Defense of the United States put forward the concept of "launching cyber attacks on demand", and then the United States comprehensively developed cyber attacks and secret stealing tools, constantly lowering the threshold for conducting cyber attacks and monitoring on other countries, and was notorious for cyber attacks and monitoring.

  The United States is a veritable "matrix". Statistics from the National Internet Emergency Center of China over the years show that the United States has always been the largest source of cyber attacks in China. In March 2020, 360 Company disclosed that the CIA used the cyber attack weapon "Vault 7" to carry out cyber attacks on China government agencies, aerospace, scientific research institutions, oil industry and large Internet companies from September 2008 to June 2019. In January, 2021, Washington post revealed that the National Security Agency had successfully invaded Huawei’s equipment, and formulated a secret cyber attack plan "Shotgiant" to steal secrets from Huawei’s telecommunications facilities in China. Recently, two network security companies in China also found that social software such as account passwords, office documents, private files, e-mails, real-time data of cameras, real-time data of microphones and even QQ used by China citizens are also targets of US cyber attacks. In March, 2022, when the National Computer Virus Emergency Response Center in China disclosed the main battle network weapon "NOPEN" stolen by the National Security Agency, it pointed out that the United States had carried out long-term cyber attacks and monitoring on China’s government, national defense, aerospace, key infrastructure, enterprises and other key parts.

  The United States is also not soft on cyber attacks in other countries. In 2010, the United States launched a "Shenzhen" virus network attack on the Bushehr nuclear power plant in Iran. In 2011, Kaspersky Security Lab, a Russian cyber security company, revealed that the United States launched a similar cyber attack on the Iranian government and enterprises as early as 2007-2008. In 2015, Kaspersky Security Lab revealed that American intelligence agencies used the "Equation" cyber attack organization to carry out cyber attacks on Russia, India and other countries for 20 years. In 2017, the US intelligence agency "Shadow Broker" disclosed that the United States had launched a long-term cyber attack on the international inter-bank settlement communication system in the Middle East and Latin America. In 2018, the United States launched a destructive cyber attack on Russian Internet research institutions. In June, 2022, Nakasone, director of the US Cyber Security Bureau, also admitted that the US Cyber Command launched a cyber attack on Russia.

  In fact, the United States has built a complete set of weapons and equipment for cyber attacks, which can attack global targets at will. German "Der Spiegel" magazine and "Shadow Broker" disclosed that hundreds of cyber attack weapons of the National Security Agency of the United States can remotely control Cisco network devices, Juniper network firewalls, Huawei routers and so on. Wikileaks also revealed that the CIA’s cyber weapon system "Vault 7" can effectively attack and manipulate all common operating systems, network devices and mobile devices. In addition, American intelligence agencies have built a global network attack system, which can break through network defense means such as physical isolation through supply chain attacks, media ferry attacks and channel attacks. In order to facilitate the implementation of cyber attacks, the United States also requires American companies such as Cisco to insert backdoors in their products, and requires international encryption standards to adopt encryption schemes submitted by the National Security Agency. In 2017, the ransomware "WannaCry" can cause a large-scale infection in the world, mainly because of the use of cyber weapons leaked by American intelligence agencies, which can break through most of the world’s network equipment.

  The United States is the largest "monitoring empire" in the world. In 2013, Snowden revealed that since 2005, the National Security Agency of the United States has been building a series of network monitoring systems represented by Turbulence, including "Prism" project which uses donkey kong data such as Google and Facebook of the United States for network monitoring, "Main Road" project which uses global telecom suppliers for communication monitoring, and "Nuclear" project which intercepts global communication content. After American intelligence agencies can monitor any designated target in the world, every move from politicians to ordinary citizens in the world has become an "eternal record" stored by American intelligence agencies. From the war in Iraq to the war in Afghanistan, American network monitoring has provided accurate support for finding bin Laden’s hiding place and destroying Iraqi dissidents. Since 2011, a large number of "terrorists" in the Middle East have been leaked in the monitoring of Muslim social media applications in the United States, and they have been killed by American drones. In 2021, the American orange task force also monitored the mobile phone of Iranian general Soleimani, thus locking the order of Soleimani’s vehicles for the assassination of drones.

  The United States has no scruples about monitoring its allies. Since 2002, the United States has set up "special collection service" departments in 19 embassies in European countries to monitor the communications in the capital regions of various countries, and has been monitoring Merkel and other dignitaries for more than ten years. In 2010, Keith Alexander, then director of the National Security Agency, reported the monitoring activities against Merkel to President Obama, and Obama instructed the National Security Agency to continue monitoring. It was not until 2013, after the German intelligence department confirmed that Merkel’s mobile phone communication was monitored by the United States, that Merkel called Obama to express "unacceptable" and got the "commitment" from the State Council, and her name was withdrawn from the monitoring list of the National Security Agency. However, the United States has not repented in the opposition of European leaders, but has intensified its efforts to implement large-scale monitoring of Europe from national leaders to ordinary citizens. The Danish Defense Intelligence Agency disclosed that since 2012, the US National Security Agency began to intercept and monitor the information of Danish submarine network optical cables, controlled the Internet traffic between European allies such as Sweden, Norway, Germany, the Netherlands and the United Kingdom, and was able to monitor senior officials from Sweden, Norway, France and Germany, including then German Chancellor Angela Merkel and Foreign Minister Frank Walter Steinmeier. In November 2020 and May 2021,European media continuously disclosed the US National Security Agency’s network monitoring cable and then stole secrets from European allies such as France and Germany. Italian weekly L’Espresso reported that the US intelligence department monitored three submarine optical cables in Italy and carried out large-scale monitoring of telephone and Internet traffic in Italy. According to the statistics of Der Spiegel, the United States monitors 2 million French communications and more than 100 million German communications every day.

  After the Snowden incident, American intelligence agencies adopted the way of supporting network monitoring enterprises and purchasing the services of monitoring enterprises to cover up the ugliness and decompress the global monitoring in the United States. A large number of American defense contractors, such as "Ulysses Group" and "Abnormal Six", have built monitoring networks to monitor the location of vehicles and mobile phones in most countries around the world. In July 2021, the Israeli NSO Group was exposed to monitor the mobile phones of a large number of global dignitaries and senior officials, such as French President Macron and European Council President Michelle, which caused a global uproar. Although it is an Israeli enterprise that carries out network monitoring on the surface, the United States is the financial owner behind this Israeli enterprise: the American pension fund is the long-term largest shareholder of this enterprise, the American intelligence agency has purchased the services of NSO Group, and the American enterprise Zerodium and others have provided the monitoring tools used by NSO Group. At the beginning of 2022, after the cash flow of NSO Group had problems, American defense contractor L3S Harris also tried to inject capital into the enterprise and completely control it.

  The United States covers up its cyber attacks and surveillance activities in every way. The National Security Agency has built a large-scale hidden infrastructure around the world, which can counterfeit the network address of any country and has strong traceability. The CIA’s cyber weapons also include anti-traceability functions such as code confusion and trace removal. American intelligence agencies have also implemented projects such as the "CAMBERDADA" program, aiming at monitoring cyber security companies such as China and Russia, and analyzing whether cyber security vendors have discovered and mastered their cyber attack weapons and activities. The United States has also added Kaspersky Lab and China 360 Company to the list of entities of the Ministry of Commerce, and imposed sanctions on cyber security enterprises that can track their cyber attacks and monitoring activities around the world.

  The evil deeds of the United States in cyber attacks and monitoring are countless. It is the public enemy of global cyber security, but it plays the defender of international cyber security. Its overbearing and hypocritical face is being seen through by the whole world and spurned by the world. (Zhou Ningnan, China Institute of Contemporary International Relations)