Uncover the mysterious veil of American cyber Army-pure copper parcel building anti-signal leakage, can let other countries network paralysis at any time

Source: Internet
Author: User
Keywords Internet
Tags .net agencies agency anti- class data digital information
class= "Post_content" itemprop= "Articlebody" >

The American "Prism" incident has been exposed to public attention for years by the mysterious American network forces. This special army is the United States four star Admiral Keith Alexander lasted 8 years to build, the United States network forces how powerful ...

Recently, the United States, "Wired" magazine article, details of the explosion of Alexander and his mysterious forces in the past and present life, and said "It is time to open the door of hell." "US Cyber forces Supreme Commander Keith Alexander

Leader--independent command of the Army

The 62-year-old Keith Alexander, the world's largest intelligence agency and head of the National Security Agency, has unquestioned authority. He has an independent command of his secret forces, including the Navy's 10th fleet, the Air Force 24th and the Army's 2nd Army, the academic elite responsible for the training of espionage technology, and special data-collection centres dedicated to eavesdropping on embassies around the world.

At the Mead base, Admiral Alexander had unquestioned authority. In 2001, Alexander was the general general of the U.S. intelligence and Security command. The US military had 10,700 spies and eavesdroppers around the world. After the incident, Alexander ordered the United States ordinary people's telephone and mail into the U.S. military monitoring scope, in 2005, he was appointed U.S. military intelligence Director, launched a series of surveillance activities.

The American government and intelligence Service said to Alexander: "The tough Czar Alexander, as long as he wants, do whatever it takes." "In 2005, senior U.S. agent Drake inadvertently disclosed to the media that a project called" trailblazer "exceeded the budget of $ millions of trillion, and that the project could violate privacy. Although the content was already publicly publicized by the Pentagon, Drake was sentenced to 35 years in prison for "leaks". Was exonerated after 4 years of lengthy appeals.

Network Warfare-virus attacks Iran's nuclear facilities

In fact, Alexander and his network forces launched a massive cyber war in 2006. A worm called the "Quake net" marks the successful transformation of the global network virus into war weapons. After 2000, the U.S. National Security Agency, in cooperation with the CIA and related agencies, developed a network weapon, the "Quake net" worm, aimed at the nuclear plant at Natanz, Iran.

In 2006, they sent specific instructions through the virus to change the speed of uranium-enrichment centrifuges in Iran's nuclear plant, which paralyzed thousands of uranium-enrichment centrifuges. The plan was mandated by two presidents, George W. Bush and Obama. It is shocking that, by the year 2010, the "Quake net" has spread to many countries in the world, infecting more than 45,000 regional networks worldwide, and only about 60% of the PCs in Iran have been infected with the virus.

A devastating virus attacked Saudi Aramco's 3000 computers in August 2012, wiping out three-fourths of corporate data. A few days later, a series of cyber attacks shut down America's largest financial institution.

Scale--thousands of soldiers and tens of millions of spies

After the "Quake net", Alexander's Cyber Army expanded massively to recruit network experts, hackers and computer engineers to expand its attack in the digital world. Alexander insists that America's inherent weakness in the global digital war has forced it to continue to strengthen its cyber-fighting power. May 2010, the United States set up a Cyber command, from the newly promoted to the four-star Admiral Alexander full responsibility. The force includes tens of thousands of NSA spies and 14,000 cyber-command servicemen from the United States Sea, land and air services. The network forces have developed digital information into a new type of weapon that will enable it to provide "network firepower support" to frontline forces like regular land and air support.

In fact, in the past few years, the US Cyber Army has acted not only to protect Americans, but also to launch cyber attacks on the hostile targets the United States believes. In this series of cyber battles, Alexander and his forces are in control of the energy that can paralyse the enemy's networks and infrastructure at any time.

position--the building wall is covered with a pure copper protective net

The U.S. National Security Agency (NSA) United States Network forces construction project in May 2010, the official start, costing 3.2 billion of dollars, located in the Maryland Fort Meade. The project, code-named "M", covers an area of 227 acres and includes a 150 megawatt substation, 14 administrative buildings, 10 parking lots and a cooling and heating plant.

As America's top secret base, the Mead military fortress in Maryland is more like a city, with thousands of people busy between 50 buildings a day. There are also separate post offices, fire and police stations in the fort. The vast forest surrounding it has left the area isolated. Multi-tiered isolation grids and 24-hour rotating armed soldiers match their top secret status. To prevent any possible leakage of electromagnetic signals, all the building walls here are covered with a pure copper shield, even a single glass window with a dense copper net.

This April, as part of the 2014 budget, the CIA and other intelligence agencies were cut by a $4.4 billion trillion budget. A large portion of the money cut was used by Alexander to build 13 cyber-attack troops.

Ambition-monitoring all internet devices worldwide

To save costs, the National Security Agency has progressively subcontracted most of the technological innovations to private contractors. As of 2010, there were 484 contractors working with the National Security Service. In fact, all 16 U.S. intelligence agencies rely on a network of private contractors across the globe to gather information about possible terrorist plots. In the contractor, the most mysterious to the number of "end system."

The "End" is developing a program to hack into networked devices from vulnerabilities in anti-virus software firewalls, an unprecedented "invasive virus" that does not have the necessary patches to deal with intrusions. The "End" company will also provide its customers with a map called "Bone Saw", the map almost marks the location and data information of all Internet-connected devices in the world, and the agencies receiving the maps only need to enter the password provided by the end, and then select the country or city they want to monitor, By typing the name and address of the organization, the map will immediately show what software is running on the computer in the organization, what vulnerabilities exist in the software, and a list of data to be built for the needs of different organizations.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.