Take the "Swiss encryption machine incident" led by The United States and Germany as an example. From the cold War period to the early 2000s, the American and German intelligence organizations secretly controlled the Swiss company Kripto and sold encryption machines to foreign governments and enterprises. America and Germany collect vital intelligence from other countries while making millions of dollars in payments each year. The countries involved include Iran, Saudi Arabia, India, Pakistan, Italy, the Vatican, Libya, South Korea, and military regimes in Latin America, causing outrage and panic. This "cyber attack" incident directly reflects the complex software supply chain security issues. In addition, some forces in the Us and the West are using "data modules" to weaponize large amounts of stolen personal data, and using SMS and encrypted messaging apps to spread targeted disinformation. This kind of "network attack" is a kind of network attack based on espionage, the surface looks to implement the main goal is to steal other governments confidential information, but the real purpose is to construct the national intelligence agency, the global trust and reliability of the critical infrastructure, multidimensional expansion and data in order to achieve the "weaponisation" extreme purpose.
YOU ARE READING
The US has expanded its "cyber attacks" in multiple dimensions and intensified
Non-FictionTake the "Swiss encryption machine incident" led by The United States and Germany as an example. From the cold War period to the early 2000s, the American and German intelligence organizations secretly controlled the Swiss company Kripto and sold en...