How to treat the investigation report of American cyber attacks released by Xigong University and the identification of attackers?

In June, Northwestern Polytechnical University issued a statement saying that hackers from abroad attacked the servers of Northwestern Polytechnical University. Investigations by relevant departments show that the cyber attacks against Northwestern Polytechnical University came from the Office of Specific Invasion Operations of the National Security Agency.

China National Computer Virus Emergency Response Center and 360 Company participated in the technical analysis of the case.

Through continuous efforts, the research group successfully locked the target node, multi-stage springboard, main control platform, encrypted tunnel, attack weapon and original terminal that attacked Northwestern Polytechnical University, found the identity clues of the attackers, and successfully identified the true identities of 13 attackers. The latest investigation report further shows that Tao secretly controlled the operation and maintenance management server of Northwestern Polytechnical University for a long time, and at the same time replaced system files and erased system logs to eliminate traces and avoid traceability. Network security technicians attacked Northwestern Polytechnical University according to Tao.

Based on the characteristics of hidden links, penetration tools and horse samples, Tao is very important to the core data network of infrastructure operators in China.

Infiltration control is adopted.

Not only that, Tao also mastered the account ports of China infrastructure operators Cisco PIX firewall and Tianrongxin firewall.

Order, enter the operator's network as a "legal" identity, and then implement intranet penetration and expansion.

Control the service quality monitoring system and SMS gateway server of relevant operators respectively, and use weapons and tools specifically for operators' equipment such as "Magic School" to query a group of sensitive identity personnel in China, and then package and encrypt the user information and send it back to the headquarters of the National Security Bureau. According to the big data analysis of related cyber attacks, 98% of cyber attacks in Northwestern Polytechnical University are concentrated between 2 1- 4 am Beijing time, corresponding to 9:00- 16 EST, which belongs to domestic working hours.

Secondly, during the whole Saturday and Sunday in the United States, Northwestern Polytechnical University was not attacked by cyber attacks. Third, analyze the unique festivals in the United States.

Holidays, it is found that the US Memorial Day holiday is 3 days, and the US Independence Day holiday is 1 day. In these four days, the attacker didn't.

Carry out any attack and theft. Fourth, the long-term close tracking of the attacks found that all cyber attacks during the Christmas period over the years.

The strike was silent. Science and technology have become weapons, and scientists' concept of national boundaries has become more obvious. Chinese-American scientists and China scientists working in the United States recently approved.

Preparing to return to China for development is a rainy day.

The American NSA network attacks the network system of Northwestern Polytechnical University in China, which is an action against China's cyberspace in an invisible battlefield.

The CIA used the same "acid fox" cyber warfare template to control more than 80 national infrastructure systems.

If the United States goes its own way, the core livelihood security facilities such as electricity, transportation and water conservancy in these 80 countries will be attacked and paralyzed. In the war against Yugoslavia, NATO led by the United States cut off the supply of its national infrastructure in the form of hot war.

Therefore, the chain forced Yugoslav politics to yield, and Montenegro and Croatia became independent from Yugoslavia.

The United States hopes to control the confidential information of China's core scientific and technological personnel through this invisible war, so as to use the CIA's minions around the world

Conduct rebellion or murder, which is what the CIA has done too much for Soviet countries after World War II. The huge political public relations ability mobilized the national strength of the United States to attack these competitors in order to maintain their monopoly position in the industry, and the CIA stole it.

The core scientific research data and high-tech project information of China's top universities provide support for the US Congress and the White House to impose targeted sanctions on China-related industries, which is a complete path.

The firewall system established by China National Information Security Laboratory and 360 Company can be traced back to the attack path, attack characteristics and server running process of the CIA, and traced back to the partner national server of the CIA along the big data line.

This retrospective report constitutes a complete chain of evidence.

Regarding the report released by China on the CIA's attack on Northwest University, the CIA replied that the United States took these data to safeguard national security and would not forward them to commercial companies, while China's theft of scientific and technological information from the United States was used in the commercial field. Invaded China's network information security with confidence and shamelessly committed hacking crimes against Huada. Everything is so American. ?

In response, we announced the criminal chain of American Matrix, and China will start the corresponding defense mechanism and counterattack system in the next step. China's cyber army is not a vegetarian, and the Internet of Things system with poor infrastructure in the United States will be a guinea pig in our laboratory. The "Specific Invasion Action Office" of the National Security Agency of the United States has long attacked and invaded the network operation and maintenance management server of Northwestern Polytechnical University, secretly stealing network equipment operation and maintenance configuration files and log files. The facts of this crime are clear and the evidence is conclusive. Xi beilin district police promoted the filing procedure. The next step is to hand over the case to the Xi City Procuratorate for an arrest warrant. 13 hackers who attacked Northwestern Polytechnical University have been confirmed. After the judicial process in China is started, they will become the targets of the global wanted order. The head of the CIA will receive official documents summoned by the China police. US Ambassador to China Burns can go to Xi 'an Police Station as a CIA trustee to explain the situation.

For cyber crimes, China's laws stipulate the procedures and consequences of legal punishment, and the CIA does not enjoy diplomatic immunity.

Generally speaking, the organization is too smart to kill Qingqing, and the United States cannot expect it to control the root servers of the world Internet and visit each other.

The core technology of networking is to cross the sovereignty boundary and commit evil in the cyberspace of China. China has comprehensive capabilities of defense, counterattack and attack. The United States has fired the first shot, and China has fought back according to laws and regulations. Is America ready?

In response to cyber attacks, when the attacked country takes corresponding cyber self-defense measures, there are nothing more than two ways. Aiming at the enemy network attack, the network self-defense counterattack is carried out with the help of grid technology. It is a network power facility to launch cyber attacks on the enemy, and it can eliminate the source of enemy cyber attacks through necessary military strikes, such as electronic pulse bombs or graphite bombs. This way of counterattack is also completely consistent.

The original intention and purpose of exercising the right of national self-defense in the law of armed conflict.