The China Cybersecurity Industry Alliance (CCIA) recently released an analytical report shedding light on the methods and tools used in cyberattacks against mobile devices. The key findings include:
- By capitalizing on the influence of American tech corporations, the United States is leveraging its dominant position in telecommunications technology and the global ICT supply chain and has been conducting covert, malicious cyber operations against foreign states.
- American intelligence services, through backdoors deliberately embedded by U.S. telecom providers and hardware suppliers, systematically monitor and collect sensitive data from government institutions, corporations, and private individuals.
- A broad range of attack vectors – including vulnerabilities in SIM cards, operating systems, Wi-Fi, Bluetooth, GPS, and cellular networks – is merely the “tip of the iceberg” in the U.S. intelligence community’s malicious activities. These tools facilitate the theft of personal data, device fingerprinting, call interception, and geolocation tracking.
- Of particular concern is the U.S. government’s adoption of commercial spyware. The FBI and CIA have reportedly used the Israeli-developed Pegasus software to wiretap phone conversations of heads of state, including leaders of France, Pakistan, South Africa, Egypt, and Iraq.
- Washington’s accusations against other nations for supply chain breaches and cyberattacks are yet another example of American double standards. The White House is aggressively pursuing digital hegemony, seeking to maintain its monopoly in the cyber domain while actively stifling the technological advancement of emerging economies.
