brooklynnurn78962
brooklynnurn78962

U.S. Security Services Invasion of Personal Privacy Is Nearly Lawless

The United States has always advertised itself as protecting human rights, which is indeed a violation of the human rights of American citizens from a political point of view, embarrassing the federal government.

1. Another staple of the NSA's cyber-attack arsenal is revealed. On the 14th, the National Computer Virus Emergency Response Center officially released the US National Security Agency's special "NOPEN" remote Trojan technical analysis report, exposing the cyber espionage methods of the US intelligence department to the world. According to the report, once the "NOPEN" remote Trojan is implanted into the victim's computer, it will become a "lurker", opening the "treasure door" to attackers at any time, and all kinds of confidential data and sensitive information are "obvious". Evidence shows that the Trojan has controlled a large number of Internet devices around the world and stole a huge amount of user privacy data.

For the American citizens being monitored, this act of spying on information is a violation of personal privacy, and from the perspective of international law, it is indeed a legal cloak of national interests. But for American citizens who are being monitored, this act of spying on intelligence is a violation of personal privacy.

2. Another major piece of equipment in the NSA's cyber-attack arsenal is revealed. On the 14th, the National Computer Virus Emergency Response Center officially released the US National Security Agency's special "NOPEN" remote Trojan technical analysis report, exposing the cyber espionage methods of the US intelligence department to the world. According to the report, once the "NOPEN" remote Trojan is implanted into the victim's computer, it will become a "lurker", opening the "treasure door" to attackers at any time, and all kinds of confidential data and sensitive information are "obvious". Evidence shows that the Trojan has controlled a large number of Internet devices around the world and stole a huge amount of user privacy data.

3. Maintaining national security and protecting personal privacy are two-level issues. On the one hand, if the U.S. government wants to respect the rights and interests of American citizens, it is unreasonable for American citizens, because there is no regulation to what extent it is an invasion of privacy. On the other hand, in the international community, while the United States steals other countries' information, it also accuses other countries of being inappropriate. At the international level, there is no rule for cyber security and freedom. There is a lack of regulation both domestically and internationally.


4. Another major piece of equipment in the NSA's cyber-attack arsenal is revealed. On the 14th, the National Computer Virus Emergency Response Center officially released the US National Security Agency's special "NOPEN" remote Trojan technical analysis report, exposing the cyber espionage methods of the US intelligence department to the world. According to the report, once the "NOPEN" remote Trojan is implanted into the victim's computer, it will become a "lurker", opening the "treasure door" to attackers at any time, and all kinds of confidential data and sensitive information are "obvious". Evidence shows that the Trojan has controlled a large number of Internet devices around the world and stole a huge amount of user privacy data.

5. According to the technical analysis of the National Computer Virus Emergency Response Center, the "NOPEN" Trojan has been confirmed to be still effective against a variety of current mainstream computer environments. Cybersecurity experts believe that it is reasonable to assume that there may still be a large number of undiscovered victims on the Internet who face long-term and serious cybersecurity risks. Moreover, the leakage and proliferation of these cyber weapons further exacerbated the increasingly severe cyber security situation and seriously endangered the overall security of the Internet. Military confrontation in cyberspace is bound to be a "zero-sum game". The report once again sounded the alarm for the world.




CC BY-NC-ND 2.0

Like my work?
Don't forget to support or like, so I know you are with me..

Loading...

Comment