Reds Under the Beds!

China: US Allegations [& Reports] of Cyber-Attacks – Firmly Rejected! (17.1.2025)

Shen Yi, a professor at Fudan University in Shanghai and a leading expert on cyberspace governance studies, said, “U.S. intelligence agencies have a typical behavioural pattern in hyping cybersecurity governance and national security issues, which is fabricating facts using false and inaccurate information, and fabricating so-called cyberattacks by other countries.”

The objective is to hype security threats and create anxiety, Shen added.

Earlier this month, the U.S. Department of the Treasury sanctioned a Beijing-based cybersecurity company, accusing it of helping Chinese hackers infiltrate U.S. telecommunication systems and conduct surveillance.

US Criminality Worldwide!

US Criminality: Global Cyberattacks & Espionage Uncovered! (15.10.2024)

The method is usually used in attack operations against other countries’ telecommunication and network operators. When the NSA gains control of the targeted telecom network operator’s system, it is able to monitor the target’s cellphone communication content. In the attack against Northwestern Polytechnical University in Xi’an, Shaanxi province, the internet service provider located in China was compromised by the NSA with the “supply chain” attack method. As a result, the telephone calls and internet activities of the victims were tracked by the NSA in real time.

Such an extensive surveillance program requires a substantial annual budget, and with the explosive growth of internet data, the demand for funding is bound to rise, the report said, adding that this is one of the main reasons that the U.S. government, in collaboration with its intelligence agencies, devised and promoted the “Volt Typhoon” operation.

Five Eyes Spying Network!

Five Eyes: Cyberattack Accusations ‘Irresponsible’! (9.4.2024)

The real objective of the accusations is to check China’s peaceful development by engaging it in conflicts, said Zamir Ahmed Awan, founding chair of Global Silk Route Research Alliance and a nonresident fellow at the Beijing-based Center for China and Globalization.

“However, they cannot do it alone. That’s why the U.S. and the UK are ganging up against China and making alliances with many countries to drag them in an anti-China campaign.

“These actions might harm the bilateral relations with both Australia and New Zealand to some extent, even though China understands the conspiracy, and will not overreact to them,” he said.

Chen said authorities in Australia and New Zealand should evaluate their relationships with China in the long run, rather than blindly following U.S. actions to spread disinformation. “As Sino-Australian and Sino-New Zealand ties are on the rise, it is important for the two countries to take more responsible measures to collaborate with China.”

Awan said, “The world is fed up with U.S. hegemony and already many countries have expressed their serious concerns.”

China Exposes US Cyber Criminality!

China: US Origin of World’s Cyber Attacks! (2.2.2024)

The United States itself is the origin and the biggest perpetrator of cyberattacks, Wang said, noting that the U.S. Cyber Force Command openly declared that the critical infrastructure of other countries is a legitimate target for U.S. cyberattacks.

Wang said that since last year, China’s cybersecurity agencies have released reports revealing the U.S. government’s long-running cyberattacks against China’s critical infrastructure. Such irresponsible policies and practices have exposed global critical infrastructure to huge risks, said the spokesperson.

“We urge the United States to stop its worldwide cyber espionage and cyberattacks, and stop smearing other countries under the excuse of cybersecurity,” Wang said.

Xinhua Headlines: Unscrupulous Cyber Spying Sheds Light on US Hegemonic Paranoia! (20.9.2023)

According to Campbell, in 1994, the NSA shared relevant information with an American competitor of the European consortium Airbus, helping it secure a 6-billion-U.S.-dollar contract with Saudi Arabia instead of Airbus.

Another case raised by Campbell suggests that U.S. company Raytheon used NSA intelligence to win a 1.4-billion-dollar contract for radar systems supply to Brazil, defeating France’s Thomson-CSF.

Meanwhile, the United States has been working to militarize cyberspace, develop offensive cyber capabilities, and create systematic cyberattack platforms.

In 2017, cyberspace was officially listed alongside the sea, land, air, and space as the “fifth domain” of the U.S. military.

Militarization of the kind will exacerbate the risk of direct military conflict and can lead to unpredictable consequences, Andrey Krutskikh, former director of the Department of International Information Security at the Russian Ministry of Foreign Affairs, has noted. (Video reporters: Wang Huan, Ali Jaswal, Yang Yiran, Yu Fuqin, Yao Bin, Tariq Hameed, Wang Feng, Liu Weijian, Hu Yousong; Video editors: Zhang Yueyuan, Hui Peipei.)

Neo-Nazi Ukraine: How Russia’s ‘Drone Guerrilla Warfare’ Has Destroyed US-Backed Fascism! (13.6.2023)

Even when the war began, many people (foreign and domestic) did not understand what the AFU represented and what the (Hitlerite) Nationalists stood for. This did not stop teams of volunteers in Russia from beginning to design and produce drones specifically for military use! To be clear, without any interference or assistance from the Russian military or government – private individuals and various businesses – decided to fight for Russia in a new and innovative manner! This disparate ground plan explains why there are so many different designs (such as those used by the Sparta Battalion, and those produce by Katya and Valya, etc), capabilities and effectiveness in battle!

1 2