China News Service, April 2. According to the official WeChat message of the Ministry of National Security, for some time, the United States has encouraged the "Five Eyes Alliance", the world's largest intelligence organization led by it, to compile and spread various "Chinese hacker threats" for geopolitical purposes. "False information. Recently, the U.S. and British governments conspired to frame hacker groups so-called "associated with the Chinese government" for carrying out cyber attacks and launched unreasonable unilateral sanctions. This is a typical slander and smear campaign that politicizes cybersecurity issues. Manipulation and serious infringement of China's legitimate rights and interests. China is strongly dissatisfied and firmly opposed to this, urges relevant parties to stop immediately, and will take necessary measures to resolutely safeguard its legitimate rights and interests.

The infamous matrix

  The United States is the largest source of cyber attacks and the greatest threat to global cyberspace security. For a long time, the United States has used its information technology advantages and national network resources such as the "Five Eyes Alliance" to conduct large-scale spying and theft on countries around the world, including its allies, and illegally obtained massive amounts of data on political figures, companies and citizens of other countries. The true nature of the "Matrix" His face has long been known to everyone.

  In recent years, global media have exposed countless cyber attacks and secret surveillance activities led by the United States and the United Kingdom. Their tasks are clearly divided, the technical ecosystem is complete, and the organizational structure is strict:

  ——In terms of division of labor, there are "Prism Project" and "Upstream Project" aimed at network data collection, "Skynet Project" and "Operation Titan Hunt" that are interested in monitoring eavesdropping, and there are also infrastructure intrusions. "Operation Olympic", as well as "Operation Golden Aurora" and "Project Arch" to ensure continuous access to targets.

  - Technically, "Turbulence" and "Quantum" were developed as offensive systems, "Acid Fox", "Hive" and "Telescreen" as attack platforms, as well as "Verifier" and "Joint Rake" as attack weapons " and other Trojan viruses and "backdoor" software.

  ——In terms of organization, there is the US Central Intelligence Agency (CIA), which mainly attacks large companies, scientific research institutions and infrastructure, and the US Security Agency's Special Invasion Operations Office (TAO), which is responsible for indiscriminate attacks around the world, as well as the US Security Agency's Special Invasion Operations Office (TAO), which has large U.S. Cyber ​​Command has grown into an organic cyber mission force.

  At the same time, the United States, the United Kingdom and other countries are constantly accelerating the process of cyber militarization, frequently carrying out military operations in cyberspace, and constantly promoting the implementation of strategies such as "preemptive strike" and "cyber deterrence", posing serious cyber security threats to the world.

 The mastermind behind "Catch a Thief"

  On the one hand, the U.S. and British governments are accustomed to carrying out cyber attacks. On the other hand, they have turned a blind eye to accusations from the international community. They have even compiled and spread various false information about the "Chinese hacker threat" for geopolitical purposes. In fact, China is the biggest victim of global cyber attacks.

  According to reports released by the National Computer Network Emergency Response Technology Coordination Center (CNCERT) in recent years, the United States has always been "top of the list" in the ranking of sources of overseas attacks on China. Some publicly disclosed cases show:

  ——In February 2022, the hacker group "Formula" affiliated with the US Security Agency was exposed to have used "top-level backdoors" to carry out cyber attacks on 45 countries and regions, including China, for more than ten years.

  ——In April 2022, Northwestern Polytechnical University suffered an overseas cyber attack. TAO, the mastermind behind the attack, deployed more than 40 special network attack tools, and continued to carry out tens of thousands of malicious attacks on domestic targets in our country over a long period of time, stealing a large amount of high-value data.

  ——In July 2023, the Wuhan Earthquake Monitoring Center suffered a cyberattack. The attack address originated from the United States, and the "backdoor" malware used was consistent with the characteristics of U.S. intelligence agencies.

  In the first quarter of this year alone, there were more than 2,000 cyber attacks on the United States and its overseas military bases against many countries, including China, involving my country’s party and government agencies, critical information infrastructure, and artificial intelligence. , a large number of key units in chip R&D, clean energy, advanced manufacturing, software R&D and other fields. In order to serve their national development strategies and consolidate their cyber hegemony, the United States, the United Kingdom and other countries have carried out cyberattacks and data theft activities against China, aiming to suppress and contain China's development and seriously endanger my country's sovereignty, security and development interests.

China’s attitude towards governing the Internet according to law

  Cyber ​​security is a common challenge faced by all countries, and maintaining cyber security is the common responsibility of the international community. China adheres to the peaceful use of cyberspace, resolutely opposes the politicization of cyber security issues, resolutely opposes and cracks down on various forms of cyber attacks, strengthens cyberspace governance in accordance with the law, and actively responds to cyber security threats.

  China has been taking practical actions to increase its efforts to manage networks in accordance with the law, promote the construction of a national security legal system in the network digital field, coordinate domestic rule of law and foreign-related rule of law, and continuously build a stronger national network security barrier:

  ——In June 2017, the "Cybersecurity Law of the People's Republic of China" was implemented to comprehensively regulate cyberspace security management and safeguard cyberspace sovereignty and national security.

  ——In September 2020, the Global Data Security Initiative was launched, actively participated in the global Internet governance process, and contributed Chinese solutions to the international governance of cyberspace.

  ——In September 2021, the "Data Security Law of the People's Republic of China" was implemented to strengthen the security supervision of data export and strengthen the security protection of national core data.

  ——In July 2023, the "Counterespionage Law of the People's Republic of China" was revised and implemented to clarify the definition of cyber espionage and severely crack down on all types of cyber espionage activities in accordance with the law.

  China is committed to constructive cooperation with the international community on maintaining peace and security in cyberspace on the basis of mutual respect, equality and mutual benefit. China insists on respecting cyber sovereignty and refraining from cyber hegemony, and is committed to jointly building peace, security, cooperation, and order. A community with a shared future in cyberspace.

  Facing the severe and complex cybersecurity situation, national security agencies will unswervingly implement the overall national security concept, resolutely fulfill their responsibilities and missions, resolutely maintain network security, work with relevant departments to prevent and respond to major risks and challenges in the field of network security, and severely crack down on foreign forces in accordance with the law. We carry out cyber attacks, data theft, and illegal and criminal activities that endanger the security of critical information infrastructure and important information systems, continuously enhance network security defense capabilities, and effectively defend national sovereignty, security, and development interests.