Major US Cyber-Attacked Prevented!

China: US [NSA] Planned to Sabotage “Beijing Time” to Disrupt GPS! (20.10.2025)

Besides causing severe disruptions in China, such cyberattacks could lead to international time chaos with incalculable consequences, the agency said in a post on its official WeChat account.

Wei Dong, deputy director of the general office at the centre, said a time discrepancy of just one millisecond can disrupt the sequencing of power substations, leading to widespread blackouts. A difference of one microsecond could result in fluctuations worth billions in international stock markets.

“Furthermore, a nanosecond discrepancy, which is one-billionth of a second, can reduce the positioning accuracy of the Beidou Navigation Satellite System by 30 centimetres and impact everyday communications. And a one-trillionth of a second could cause several kilometres of deviation in the positioning of lunar soil collection vehicles and the Chang’e spacecraft, potentially preventing it from returning successfully,” Wei told China Central Television.

US Dictates Terms!

US: Population Warned to Stop “Droning” On! (18.12.2024)

As the US government instils a sense of invincibility in its people – what constitutes this “threat” often takes on a definite “other-worldly” dimension! Even before WWII (and the later US-derived “Cold War”) – the sheep-like population of the US believed it’s country was under attack from Martians! Following a radio broadcast of HG Wells’ “War of the Worlds” (narrated by Orson Wells) in 1938 – widespread panic ensued as aeroplanes, kites, clouds, stars, and tricks of the light were reported all over the US as “UFOs”! Witnesses believed 100% that the US was being invaded by Martians armed with advanced weaponry and technology. Farmers armed with shotguns mistook unfamiliar water-towers for Martians already deployed on earth – and opened-fire!

US Criminality Worldwide!

US Criminality: Global Cyberattacks & Espionage Uncovered! (15.10.2024)

The method is usually used in attack operations against other countries’ telecommunication and network operators. When the NSA gains control of the targeted telecom network operator’s system, it is able to monitor the target’s cellphone communication content. In the attack against Northwestern Polytechnical University in Xi’an, Shaanxi province, the internet service provider located in China was compromised by the NSA with the “supply chain” attack method. As a result, the telephone calls and internet activities of the victims were tracked by the NSA in real time.

Such an extensive surveillance program requires a substantial annual budget, and with the explosive growth of internet data, the demand for funding is bound to rise, the report said, adding that this is one of the main reasons that the U.S. government, in collaboration with its intelligence agencies, devised and promoted the “Volt Typhoon” operation.

Clive Wiiliams - Australian Intelligence

Australian Intelligence Officer: Clive Williams – “Anti-China 5G Hysteria is Illogical!” (8.10.2024)

The Vietnamese withdrew from Cambodia in 1989 leaving a “tourist” attraction for curious Westerners – falsely blaming the US-killing of the locals on the Kampuchean Communists themselves – whilst disrespecting the Kampuchean dead. All this was to stop the spread of Chinese Communism (the British had already destroyed its nucleus in Malaya) and demonise it into being a “new” form of Hitlerism in the world! Yoko Ono, being the fascist she is, even allowed the music of John Lennon to be used in the fake film “The Killing Fields” – which was the US government’s attempt of using Hollywood to brainwash the masses into learning and accepting the “new” narrative. (The Imperial War Museum in London once held an exhibition regarding the Nazi Holocaust which I attended – but made a point of informing the audience that “Socialists commit mass-killings as well” – citing Cambodia). The anti-China narrative runs deep and wide and is not limited to 5G – 5G is an important contemporary element of it.

Five Eyes Spying Network!

Five Eyes: Cyberattack Accusations ‘Irresponsible’! (9.4.2024)

The real objective of the accusations is to check China’s peaceful development by engaging it in conflicts, said Zamir Ahmed Awan, founding chair of Global Silk Route Research Alliance and a nonresident fellow at the Beijing-based Center for China and Globalization.

“However, they cannot do it alone. That’s why the U.S. and the UK are ganging up against China and making alliances with many countries to drag them in an anti-China campaign.

“These actions might harm the bilateral relations with both Australia and New Zealand to some extent, even though China understands the conspiracy, and will not overreact to them,” he said.

Chen said authorities in Australia and New Zealand should evaluate their relationships with China in the long run, rather than blindly following U.S. actions to spread disinformation. “As Sino-Australian and Sino-New Zealand ties are on the rise, it is important for the two countries to take more responsible measures to collaborate with China.”

Awan said, “The world is fed up with U.S. hegemony and already many countries have expressed their serious concerns.”

China: Beware US-Controlled Keyboard Warriors! (29.11.2023)

Chinese state security organs eventually discovered the abnormalities and launched an investigation. They found that the “developer” was actually an overseas espionage and intelligence agency that had planted Trojan horse malware onto the software programs. The malware could invade and manipulate computers and servers, allowing the agency to steal archives and data.

The agency used the infected software programs to conduct cyberattacks and theft against dozens of military institutes and high-tech enterprises, the ministry said. They have alerted the victims to the attacks to minimize potential losses.

Wang was given an administrative penalty according to the law, the ministry said, without giving details.

The ministry urged the public, especially IT workers, to be wary of such traps when offering technical services. They advised individuals to keep evidence and report suspicious activities to the authorities.

1 2