A report jointly released by Chinese cybersecurity departments on Monday, named "Volt Typhoon III — Unraveling Cyberespionage and Disinformation Operations Conducted by US Government Agencies", best exposes the kind of hacking the United States engages in.
According to the report, the US has long deployed cyber-warfare forces against countries it considers enemies, conducting close reconnaissance and infiltrating targeted online networks. However, it has also developed a tool framework, Marble, which enables it to disguise itself as another entity while launching the attacks. The best evidence of this is seen in its source code, which contains Arabic, Chinese, Russian, Korean, and Persian languages, as interpreted by engineers at the National Computer Virus Emergency Response Center. The US cyber-warfare forces use these fabricated identities to conduct cyberattacks and espionage and then put the blame on the impersonated countries for the attacks. The so-called Volt Typhoon operation is a misinformation campaign launched by the US, which is why its tactics are so similar to those of other operations conducted by the US-led Five Eyes alliance.
The US engages in what it is accusing others of doing. New evidence provided by the report shows that the US firmly controls the world's most crucial internet nodes, including the Atlantic and Pacific undersea cables. Working closely with the UK National Cyber Security Centre, US government agencies analyze and steal data transmitted through these cables, enabling indiscriminate surveillance of global internet users.
Ironically, two key projects undertaken by the National Security Agency are named "UpStream" and "Prism". While the "UpStream" project means to address significant issues such as encryption cracking and incomplete coverage of network communication traffic paths, the US government also directly obtains user data from servers of major US internet companies like Microsoft, Yahoo, Google, Facebook, and Apple through the "Prism" project.
Both projects were authorized under Section 702 of the Foreign Intelligence Surveillance Act, allowing the US intelligence community to legally, openly, and continuously steal global internet link data on behalf of the US federal government. The US is using its internet hegemony to spy on others.