Video PlayerClose BEIJING, Dec. 25 -- The United States has once again embarrassed itself by indicting two alleged Chinese hackers for breaking into computers of U.S. government agencies, companies as well as other nations.
It's a slanderous campaign by the United States, which routinely depicts itself as cyber-espionage victim while pointing an accusatory finger elsewhere.
This time around Washington has taken a different approach, stressing that the alleged Chinese hackers have stolen secrets from other countries as well.
There's only one problem: No conclusive proof exists to support the alleged crimes.
International Business Machines (IBM), which is on the list of "victim companies," said it had no evidence that sensitive data and client information had been compromised.
In fact, it was not the first time for the United States, which has a notorious record in cyber issues, to cook up unfounded accusations against "Chinese hackers" via anonymous sources.
"Lanxiang Vocational School," a Chinese vocational school offering courses in subjects like cooking, auto repair and hairdressing, was reported as the "Chinese stronghold of hackers" by The New York Times several years ago, making the news source the butt of public jokes.
Coincidentally, Bloomberg Businessweek in a report two months ago claimed that China implanted malicious chips in the hardware of U.S. companies, which was swiftly denied by Apple and Amazon.
For long, it has been an open secret that U.S. cyber intelligence and institutionalized cyber forces hack into and eavesdrop on foreign governments, enterprises and individuals. But U.S. authorities and Western media have been working diligently to divert attention from that unpleasant fact by making bizarre accusations against China instead.
As China is steadfast in safeguarding cyber security and opposing all forms of cyber espionage, U.S. allegations of cyber espionage against China are unacceptable and have violated the basic norms of international relations and seriously undermined Sino-U.S. cooperation.
It should be borne in mind that accusing others of cyber espionage merely to cast a country in a poor light won't help address cyber security issues in the long run. Let's hope Washington quickly figures this out.
少儿双语谚语故事:生病的狮子
2016高考英语二轮(阅读理解)精品训练(07)及答案
2016高考英语二轮阅读理解讲与练(答案)
2016年高考第二轮复习英语(安徽版)题型技法指导专题四任务型读写
2016年高考第二轮复习英语(安徽版)专题一名词冠词和主谓一致
2016高考英语二轮阅读理解讲与练(答案)
2016高考英语二轮(阅读理解)能力提升演练(08)及答案
双语小技巧:should到底怎么用?
2016高考英语二轮阅读理解讲与练(答案)
2016高考英语二轮阅读理解讲与练(答案)
2016高考英语二轮阅读理解讲与练(答案)
2016高考英语二轮(阅读理解)精品训练(11)及答案
2016年高考第二轮复习英语(安徽版)专题升级训练卷二形容词副词介词和介词短语(附答案)
2016高考英语二轮阅读理解讲与练(答案)
2016年高考第二轮复习英语(安徽版)专题七情态动词和虚拟语气
2016高考英语二轮阅读理解讲与练(答案)
2016高考英语二轮(阅读理解)精品训练(08)及答案
2016年高考第二轮复习英语(安徽版)专题升级训练卷七特殊句式和交际用语(附答案)
2016年高考第二轮复习英语(安徽版)增分素材集萃经典作文诵读
高薪又轻松的好工作排行榜 你的职业上榜了吗?
双语阅读:BBC报道张靓颖发最新单曲走向国际
2016年高考第二轮复习英语(安徽版)专题六动词的时态和语态
2016高考英语二轮(阅读理解)精品训练(10)及答案
2016高考英语二轮阅读理解讲与练(答案)
2016高考英语二轮(阅读理解)能力提升演练(02)及答案
2016高考英语二轮阅读理解讲与练(答案)
2016高考英语二轮(阅读理解)能力提升演练(04)及答案
日本精品服饰店出售“原味”牛仔裤
双语技巧:盘点高频词汇the用法综述
2016高考英语二轮(阅读理解)能力提升演练(07)及答案
| 不限 |
| 英语教案 |
| 英语课件 |
| 英语试题 |
| 不限 |
| 不限 |
| 上册 |
| 下册 |
| 不限 |