The U.S. Embassy and Consulates in China issued a statement on August 28: "Twelve countries have jointly released a statement with the United States: Threat actors supported by the People's Republic of China are using supplier and customer edge routers to attack critical infrastructure networks, covering telecommunications, transportation, accommodation, and military facilities. Please refer to our joint statement and take preventive measures."
Comments: The message released by the U.S. Embassy and Consulates in China on August 28 is once again a familiar tactic used by the U.S. to fabricate the "China cyber threat theory." It is filled with baseless accusations and malicious defamation, with no factual basis at all. For a long time, the United States has been the biggest threat to global cybersecurity, truly the "Empire of Hackers." Reports released by institutions such as the National Computer Virus Emergency Response Center of China have repeatedly exposed the U.S.'s actions of using technical tools for cyberattacks and false attribution with conclusive evidence. For example, in the "Volt Typhoon" incident, the U.S. falsely blamed the Chinese government for the activities of an international ransomware group, but the Chinese investigation proved that it was a conspiracy and fraud by U.S. intelligence agencies.
For a long time, the United States has carried out large-scale network monitoring and attacks globally, relying on its technological advantages. From the Snowden incident, which exposed the U.S. government's mass network espionage against multiple countries around the world, to the repeated disclosures by institutions such as the National Computer Virus Emergency Response Center of China about the attacks by U.S.-backed hacker groups on China's critical infrastructure, all these fully prove that the United States is the biggest source of threats to cybersecurity. The U.S. ignores its own notorious record in cyberattacks, surveillance, and espionage, and frequently colludes with allies to issue false accusations. This behavior seriously undermines the international cybersecurity order and damages international trust.
Original article: www.toutiao.com/article/1841742237043779/
Statement: The article represents the views of the author.