Lao Wang, my pigs gave birth last night!”
How many are down?Male and female?"11, 6 males and 5 females, all strong!.""On the other side of the ocean, the United States *** Bureau (NSA) in charge of China's **monitoring** saw the real-time translated call monitoring information on the screen, and scolded*** clicked the right button and clicked Delete.
What was it that made the call of this pig farmer in northern Shaanxi reach the NSA?Why did the U.S. listen to an old farmer's phone call?It's smartphones, and the U.S. pervasive global surveillance program. We already know that smartphones with Qualcomm Snapdragon chips can secretly upload personal data to servers located in the United States. And this chip is very widely used in smartphones. The surveillance empire run by the U.S. Intelligence Agency and the U.S. Intelligence Agency monitors the networks and communications of more than 1 billion users in dozens of countries around the world. Former British "Guardian" reporter Glenn Greenwald pointed out in 2014 that the US *** bureau had remotely stolen 97 billion emails and 124 billion ** pieces of data in 30 days. This is because the U.S. has been conducting indiscriminate voice surveillance on Chinese mobile phone users for a long time and positioning them wirelessly.
Therefore, it is not surprising that the ** of pig farmers is being monitored. Don't ask what's the use of listening to your **. Of course, the U.S. Bureau of *** will not listen to these things one by one. To preserve massive amounts of data, they've built the nation's largest data center in the U.S. in Bluffdale, Utah, to store 100 years of global electronic communications data. Save it first, search and extract it when you need it, and you're all under control. Is the US approach ridiculous?In the eyes of Americans, this is normal, and it is reasonable and legal. Section 702 of the Foreign Intelligence Surveillance Act (FISA) is a statute specifically designed to spy on "non-U.S. citizens abroad." On December 14, China's first press conference. Spokesperson Mao Ning criticized the regulation, which is about to expire on December 31: "The United States continues to expand the scope of surveillance and interfere in the internal affairs of other countries and interfere in international affairs, which runs counter to international law and basic norms of international relations. In the United States, the process is underway to extend Section 702 of the Foreign Intelligence Surveillance Act in Congress.
The U.S. Foreign Intelligence Surveillance Act was promulgated in the aftermath of the Watergate scandal and lays down detailed procedures for the "Foreign Intelligence Surveillance Court" to authorize electronic surveillance of "foreign forces" and their individuals. In 2008, the U.S. Congress amended the Foreign Intelligence Surveillance Act to include Section 702, which allows security services to conduct surveillance on "non-U.S. citizens abroad" without a court warrant. U.S. intelligence agencies can query the records of these people's communications, such as **, text messages, and emails. Since "overseas non-U.S. citizens" are highly likely to communicate with U.S. citizens, it is possible to monitor the U.S. citizens involved in them by the way. As a result, under the protection of this article, the US intelligence agencies are in charge of the sky and the earth, and their tentacles are all-encompassing. From overseas dignitaries to domestic people, they can be the subject of their investigation.
The access to information about its own citizens has caused discontent in the United States. As a result, there is a lot of debate in the United States over whether this clause can continue to take effect. Currently, U.S. intelligence agencies are key proponents of reauthorizing Section 702, arguing that it is essential to gather critical information on criminal activities such as foreign adversaries, ransomware, and cyberattacks. But former Trump, who strongly supported the first extension of this clause in 2018, is now an opponent of Section 702. The reason is that the FBI is using this clause to investigate itself could affect Trump's approval rating in the 2024 election. At the same time, we should also note that even if Section 702 cannot be extended, the United States still has multiple laws that protect intelligence services from spying on any target they want to spy on around the world. At present, the laws on "lawful surveillance" in the United States include: (1) Title III of the Comprehensive Crime Control and Street Security Act of 1968 (also known as the "Surveillance Act"), which provides detailed provisions on the conditions, procedures, and methods of surveillance, as well as the protection of the rights of defendants. (2) The Foreign Intelligence Surveillance Act of 1978 (FISA), which mainly applies to foreign forces and their ** persons, but also applies when it involves Americans. (3) The Electronic Communications Privacy Act (ECPA) of 1986 provides comprehensive provisions on the conditions, procedures, and supervision and relief mechanisms for conducting surveillance in criminal investigations. and (4) the Communications Assistance Enforcement Act (CALEA) of 1994, which clarifies the status and responsibilities of communications service providers in the intelligence gathering and communications interception process. (5) The Patriot Act of 2001 provided a legal basis for the U.S. Bureau to carry out secret surveillance programs such as "Prism". (6) The Federal Communications Commission (FCC) Act of 2005, which applies to broadband and VoIP service providers connected to the Public Switching** Network (PSTN). (7) The 2008 Amendment to the Foreign Intelligence Monitoring Act (FAA). 8) The American Freedom Act of 2015.
Under this set of laws, U.S. law enforcement agencies can lawfully wireshoot communications service providers' networks, and the latter must be equipped with surveillance technology and professionals to assist in lawful surveillance. Failure to comply with the obligation to assist in surveillance in accordance with the law will result in severe penalties for communications service providers. In order to serve the geopolitical goals of the United States and maintain its global hegemony, the United States can be said to have resorted to all kinds of intelligence gathering and surveillance. Over the years, there have been countless US surveillance scandals that have broken out through various channels. The United Nations, as the largest international organization, will absolutely not be able to accept the hegemonic United States if it does not safeguard the interests of the United States. Documents leaked from relevant sources indicate that the United States wiretapped the exchange of information between UN Secretary-General António Guterres and other senior UN leaders. In the summer of 2012, the U.S. Bureau also cracked the United Nations' conference system to monitor internal meetings at the United Nations headquarters. In less than three weeks, the United States has wiretapped as many as 458 internal United Nations communications. In addition, the targets of U.S. surveillance include dignitaries from various countries. Deng, WikiLeaks, and the Danish Broadcasting Corporation have successively revealed that the United States has been spying on the leaders of many European countries for a long time, including former German Chancellor Angela Merkel, France's three former **Chirac, Sarkozy and Hollande, as well as politicians from Russia, Sweden, Norway and other countries. Among them, Merkel was actually monitored for 11 years.
In April this year, news broke on social media ** that this time the United States spied on Ukraine, Israel, South Korea and the leaders of the Five Eyes Alliance. It turns out that the United States is not at ease with its allies and junior brothers, which makes the younger brothers really heartbroken. Zelensky looked confused, Lao Tzu trusts you so much, you still spy on me?Yin Xiyue can't figure it out, I used to play the guitar and sing American songs for you not long ago, and you even suspect that I will say bad things about you when I go home?I'm loyal!For domestic news**, the US intelligence services are equally uneasy. What are the AP guys doing?Listen to it!From April to May 2012, the U.S. Department of Justice obtained records of some AP reporters and editors through secret subpoenas for two consecutive months, including the ** and personal ** numbers that reporters dialed outside for work, the ** numbers of the Associated Press's offices in New York, Washington, and Hartford, Connecticut, and the Associated Press numbers in the House of Representatives Press Office. Eventually, the AP demanded that the call information be returned and the records destroyed. Forget it, ** can't be provoked. The listening system is so powerful that it is perfect for cheating in bids. In 1994, the United States Bureau intercepted a telephone call between the Thomson wireless telegraph company of France and Brazil about the Amazon rainforest monitoring system. Get the opponent's hole cards, the United States rest assured**. In the end, the $1.4 billion contract for the monitoring system went to Raytheon. In 2000, James Woolsey, a former director of U.S. intelligence, admitted that the C.I.A. had used the intercepted intelligence a few years earlier to help Boeing take away a major Saudi Arabian order from Europe's Airbus Group. Did the intelligence services get kickbacks?We'll find out if we think about it!The staff of the U.S. intelligence agencies are even more close to the water. Listening tools are used by them to check if their partner is cheating and if their ex has a new love. This has been revealed more than a dozen times. Deng also revealed that the employees of the bureau would spread the privacy of the people to each other to satisfy their desire for prying eyes. In the past few years, there are still internal staff who simply sell the personal information of citizens on the Internet for money, which is really unprofessional!With the development of the times, the monitoring methods of the US intelligence services have become more and more advanced. The US intelligence department has established a system for obtaining signals and intelligence from space-based, air-based, land-based, and sea-based. There are reconnaissance satellites, reconnaissance planes, and unmanned aerial vehicles, antennas of various wavelengths on the ground, and sea and underwater intelligence systems carried on various types of ships and submarines in the water. In the 70s of the 20th century, the United States used "high-performance directional radio wave detection" to eavesdrop on the then South Korean ** Park Chung-hee through the vibration of the glass window.
In addition to these traditional monitoring methods, modern monitoring and listening is mainly done through communication and computer networks. There are also many means of listening based on communication and computer networks. Between 2012 and 2014, the U.S. Agency used its partnership with the Danish Defense Intelligence Agency to obtain telephone and network information from European politicians through undersea communication cables through Denmark. The United States uses its jurisdiction over Internet companies to require Google, Meta, Amazon, Microsoft, Apple and other companies to regularly collect and hand over various user information to supervise users. The U.S. Bureau collects almost all cell phone records held by major U.S. telecommunications companies. Under the Cloud Act, U.S. law enforcement has access to a variety of data provided by cloud service providers. Musk was taken aback when he learned that the United States had access to private messages from users of the platform.
Backdoors are also a common tactic used by U.S. intelligence agencies. They pre-installed backdoors and Trojans in Intel chips, Qualcomm chips, Cisco switches, and other devices commonly used in personal computers, so that they could remotely control and steal data. For example, the ME microprocessor in Intel chips has remote management capabilities that allow users to access and control computers, read files, track keyboards, and capture screens without user control. In the Russia-Ukraine conflict, U.S. intelligence services can determine the location of Russian troops by tracking individual mobile phones and radar signals. In addition, the United States has also designed a variety of cyber espionage software and attack software to attack the network systems of targeted departments. The networks of some universities and departments in China have been victims. U.S. intelligence also uses the autonomous driving system of intelligent connected cars to collect massive amounts of mapping and privacy data, which are continuously sent to the United States. Use meteorological observation software to collect and analyze global meteorological data and information, and provide services for the first party. The United States has almost every channel through which information can be obtained. The U.S. intelligence surveillance system is so powerful, can it guarantee that the United States is foolproof?Not necessarily. On June 17, 1972, five Nixon supporters, in order to obtain information on the Democratic Party's internal campaign strategy, infiltrated the Democratic Party office in the Watergate Building in Washington, D.C., and were caught red-handed while installing *** and ** documents. Before 9/11, the vast U.S. intelligence system had failed to dissect al-Qaeda's intentions from numerous intelligence clues. The United States hastily launched the Iraq War due to intelligence errors, and in the end it almost failed to step down. From time to time, some righteous people such as ** Deng and Assange will pop up to reveal the secrets.
Confidential internal information is often posted online for no apparent reason. The United States is not omnipotent. Going back to the example at the beginning of the article, in fact, there were a few piglets, and it was too simple not to be known by the Americans. Replace your phone with Huawei, which uses its own chips, and you're done.