China: “U.S. intelligence agencies are extensively engaged in eavesdropping, stealing information from global users”

China: "u.s. intelligence agencies are extensively engaged in eavesdropping, stealing information from global users"

Pars Today – The China Cyber Security Industry Alliance (CCIA) released a report on U.S. infiltration into mobile phones used by people worldwide.
The China Cyber Security Industry Alliance (CCIA) published a report titled “Eavesdropping and Information Theft Activities by U.S. Intelligence Agencies on Global Mobile Devices and Communication Systems.” The report is based on research and analyses conducted by global cybersecurity manufacturers, research institutions, and experts. According to Pars Today, citing Tasnim News Agency, the 11-chapter report provides detailed disclosures of U.S. intelligence agencies’ activities targeting smart mobile devices and communication systems.
These activities include developing all-out attack and infiltration capabilities through various network products such as SIM cards, operating system software, data cables, Wi-Fi, Bluetooth, cellular networks, GPS, data from major internet and IT companies’ data centers, and even the entire mobile industry ecosystem.
According to the report’s findings, U.S. intelligence agencies are extensively stealing user information, including accounts, devices, links, locations, and other data, posing a serious threat to the cybersecurity and national security of various countries.
As stated by officials from the China Cyber Security Industry Alliance (CCIA), U.S. intelligence agencies have also developed comprehensive cyberattack tools for all scenarios, stages, and processes to target global cyberspace. They continuously carry out cyberattacks, exploit upstream advantages in supply chains, pre-plan vulnerabilities, weaken encryption strength, and use platforms like LinkedIn to gain special access to user data.
The report concludes by examining and proposing solutions to counter U.S. cyberattacks, particularly in terms of infiltrating networks and sustaining data theft and emphasizes the importance of strengthening defensive capabilities across various domains, including industrial chains, mobile operators, smart devices, key individuals, and diplomacy, to preserve nations’ cyber sovereignty.
MG
 

UP NEXT