男女羞羞视频在线观看,国产精品黄色免费,麻豆91在线视频,美女被羞羞免费软件下载,国产的一级片,亚洲熟色妇,天天操夜夜摸,一区二区三区在线电影
Global EditionASIA 中文雙語Fran?ais
Opinion
Home / Opinion / Opinion Line

No room for complacency with data security in cyberattacks era

By ZHANG ZHOUXIANG | CHINA DAILY | Updated: 2025-04-16 07:40
Share
Share - WeChat
[Photo/IC]

The Harbin Public Security Bureau in Northeast China's Heilongjiang province announced on Tuesday that three individuals — Katheryn A. Wilson, Robert J. Snelling, and Stephen W. Johnson, who are believed to be attached to the US National Security Agency — are wanted for their suspected role in launching cyberattacks against China during the Asian Winter Games in Harbin in February.

That the Chinese authorities could identify the suspects within two months speaks volumes about China's growing capability to defend itself in cyberspace.

The investigation attributed the cyberattacks to the NSA's Tailored Access Operations unit, a specialized division known for its sophisticated cyber espionage. To obscure their tracks, the attackers reportedly used proxy networks, purchasing IP addresses from multiple countries and leasing servers across Europe and Asia. The precision and scale of the operation left one in little doubt about the intent behind it.

Targeting the Asian Winter Games, a major international sporting event, demonstrates that Washington's cyber aggression shows no bounds. And it is not an isolated case. The US has long leveraged its technological dominance to conduct cyber operations against not only its perceived adversaries but even its allies.

The US enjoys significant advantages in cyber warfare. With 10 of the 13 Domain Name System or DNS servers based in its territory, US intelligence agencies benefit from structural advantages in global internet governance, although their actual surveillance capabilities rely more on direct partnerships with tech companies and physical network interception. The NSA, in collaboration with the Five Eyes alliance, maintains probably the most extensive surveillance network in history. Advanced malware, zero-day exploits, and deep integration with private tech companies further enhance its offensive capabilities. The US Cyber Command operates under a "defend forward" doctrine, which means defending with preemptive strikes.

For China, the lesson is clear: it is not enough to rely on passive defense. It has been forced to strengthen its cyber defenses. The only viable path is continuous advancement in cybersecurity, threat detection, and counterintelligence. But this is not just China's challenge. When strategic interests are at stake, even friendly nations can be on the receiving end of cyberattacks, a lesson the US' allies should make note of.

The Asian Winter Games incident is a reminder that in the digital age, no country can afford complacency. The US will continue to exploit its cyber dominance. The only question is — who will be next?

Most Viewed in 24 Hours
Top
BACK TO THE TOP
English
Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
License for publishing multimedia online 0108263

Registration Number: 130349
FOLLOW US
主站蜘蛛池模板: 同仁县| 巢湖市| 庆城县| 临夏市| 长宁区| 麟游县| 滦南县| 新平| 阿克陶县| 台湾省| 灵川县| 敖汉旗| 南川市| 日喀则市| 闻喜县| 桂阳县| 三亚市| 钟祥市| 遵化市| 抚顺市| 南充市| 常山县| 新乐市| 桃江县| 焦作市| 法库县| 蓬莱市| 河北区| 宣武区| 南丰县| 东兰县| 壤塘县| 宜城市| 镇江市| 郓城县| 津南区| 吉首市| 商丘市| 陕西省| 商河县| 北海市| 二连浩特市| 连城县| 石嘴山市| 抚远县| 高安市| 寿宁县| 莱州市| 桂林市| 福建省| 佛教| 炉霍县| 合山市| 霍山县| 化隆| 寿宁县| 磴口县| 贵定县| 呼玛县| 三原县| 弋阳县| 项城市| 通山县| 依安县| 凌海市| 普陀区| 翼城县| 永靖县| 长寿区| 湛江市| 南京市| 崇左市| 邵阳市| 毕节市| 松江区| 定结县| 南木林县| 肇东市| 彰化市| 封开县| 南通市| 临夏县|