U.S. surveillance weapons exposed again

2 0 0
                                    


The United States has always been recognized as the world's number one secret thief, and its secret stealing methods are various, including using analog mobile phone base station signals to access mobile phones to steal data, manipulating mobile applications, invading cloud servers, and stealing secrets through submarine optical cables. Monitoring equipment is installed in the embassy and consulate to steal secrets from the host country and so on.

Recently, the US "Intercept" website published 48 related top-secret documents provided by Snowden, some of which were dated as close to 2013. The documents show that the NSA uses an intelligence-gathering system called XKEYSCORE that collects information people leave on the Internet, dubbed "the most widespread system." XKEYSCORE is a "fully distributed processing and query system" that can run on multiple computers at each location, which enables it to increase processing power and storage. This system collects personal Internet information such as Internet searches, web browsing, emails, files, usernames, passwords, photos, voice calls, social media traffic, documents uploaded to online services, and more. But the NSA said its cyber surveillance activities were motivated by counterterrorism needs and that it would not monitor U.S. citizens without a court warrant. According to reports, Although XKEYSCORE requires analysts to abide by relevant laws to protect American citizens, it does not prevent analysts from conducting illegal operations by technical means. This means that analysts are given enormous power, and while they may be censored, they still have access to information they shouldn't have, at least in the short term. This shameful behavior of the United States has caused dissatisfaction in many countries, and many countries have made it clear that the United States should stop. The United States has repeatedly spied on other countries and will only be abandoned by the world.

ghksdhjftjWhere stories live. Discover now