China and the United States have confronted the Internet attacks, and the Ministry of National Security of China issued a document to disclose the three methods of the United States' launch of cyber attacks, and stated that the United States has been invading the Huawei server since 2009 to continue to monitor.The Ministry of National Security criticized these methods as "the" hacking empire "to maintain the‘ network hegemony ’.”

The Ministry of National Security of China issued an article on Wednesday (September 20) on the official WeChat public account entitled to start with the main mean means to start with the Internet attack on the bottom of the United States intelligence agency.The article revealed that the United States used three means to develop online attacks, including the establishment of an online attack arsenal, forced related technology companies to open the back door to cooperate and reverse the black and white thief shouting the thief.

The article states that the US intelligence department has been attacked by a strong cyber attack weapon for many years to implement monitoring, secrets and cyber attacks on many countries including China, especially the National Security Agency.(TAO) has repeatedly conducted a systematic and platform attack on China, trying to steal Chinese data resources.

The article said that Tao has invaded the Huawei headquarters server and continued monitoring since 2009. In September 2022, it was discovered that it continued to implement tens of thousands of malicious maliciousness on Chinese network targets including Northwest China University of Technology.Network attacks, control tens of thousands of network devices, steal a large amount of high value data.

The article also pointed out that the American intelligence department uses a variety of large -scale online attacks using "Electric Screen Operation (BVP47)", "Quantum", "Foxacid", "Hive"Weapons have carried out more than ten years of cyber attacks and spy operations in 45 countries and regions in China, Russia, and other countries in 45 countries and regions in China. They target telecommunications, scientific research, economy, energy, and military fields.

In response to the second means "forced related technology companies to open the back door cooperation", the article said that the U.S. government is forced to implant the back door in the equipment, software and applications of relevant technology companies on the grounds of national security, and use the embedded code to use the embedded code, Vulnerability attacks and other methods, with the influence of its global technology companies, to monitor and steal global data.

The article lists two examples, including the US Location Data Company X-Mode Social in December 2020 was exposed to the application of the built-in software development tool package to obtain location data, and sold the data to the US militaryA contractor close to the intelligence department; another example is that the "Anomaly Six" company with the background of the US military intelligence was exposed to the internal tracking software development package into many mobile applications last April.Thus tracking the location data and browsing information of hundreds of millions of mobile phones around the world, and sells these data to the US government.

Finally, the article also criticized the United States to "reverse black and white thieves to call a thief." While conducting network attacks on countries around the world, it made various versions of "security reports" and discredited China as "network threat".However, in recent years, the United States has stepped up the "front hunting" operation. With Russia, Iran, China, and North Korea as its main goals, under the guise of "front hunting" and active defense, we have conducted cyber attacks and secrets of other countries.

The article states that the United States has tried to build itself into a "network attack victim", under the banner of "maintaining network security", encouraging and coercing other countries to join the so -called "clean network" plan, but in fact, "Cleaning the network "is fake, and it is true for opponents and maintaining hegemony.

Chief Christef Le Le Lei Monday (September 18) said: "Over the years, the Chinese government has been stealing American intellectual property rights and data ... China has already owned all other major countries than all other major countries.It is a huge hacker plan to add together. "