China’s National Computer Virus Emergency Response Center has released a new report that exposes the US government’s secretive cyber espionage operations. The report, published in multiple languages, reveals how the US has been using cyber weapons to spy on other countries and even frame them for cyberattacks it carries out itself. The report focuses on a US cyber operation called “Volt Typhoon” and claims that the US has been using sophisticated tools to cover its tracks and blame countries like China for its own hacking activities.

What is Volt Typhoon?
Volt Typhoon is the name given to a cyber operation that the US and its allies, known as the Five Eyes (US, UK, Australia, Canada, and New Zealand), have accused China of leading. In May 2023, these countries released a joint statement claiming that Volt Typhoon, supposedly run by the Chinese government, was targeting critical infrastructure in the US. But China’s new report says that this entire narrative is a fabrication, designed by the US to deflect attention from its own illegal cyber activities.
How the US Covers Its Tracks
The report highlights a powerful US cyber tool known as the “Marble” framework. This toolkit, developed by US intelligence agencies like the National Security Agency (NSA) and the Central Intelligence Agency (CIA), is designed to hide the true origins of cyberattacks. It can make it look like attacks are coming from other countries, like China, Russia, or Iran, when in reality, the US is behind them. This deceptive strategy is called a “False Flag” operation, where one country makes it appear as though another is responsible for its actions.

The “Marble” framework is sophisticated and sneaky. It allows US hackers to erase identifying marks in the code, making it impossible to trace the attack back to them. The tool can even insert fake code in languages like Chinese or Russian, misleading investigators to think that hackers from those countries are responsible. This strategy lets the US conduct espionage without getting caught, while pointing the blame at other nations.

A Pattern of Deception
This new report is the third in a series from China’s National Computer Virus Emergency Response Center, and it builds on previous findings from April and July 2023. According to the report, US intelligence agencies have a long history of spying on countries around the world and then covering it up by accusing others of being behind the attacks. The report also claims that US tech companies like Microsoft have been involved in supporting this deception by creating narratives that fit the government’s agenda.

Cybersecurity experts from around the world have reached out to Chinese authorities since the earlier reports were published. Many of these experts have expressed concern that the US government and Microsoft have accused China without solid evidence. Some believe that the Volt Typhoon operation is just another example of the US creating a false threat to justify its own actions and maintain control over global surveillance.
The Bigger Picture: Global Espionage
The report sheds light on the US government’s larger strategy of global surveillance. The US has been tapping into vital communication infrastructure, such as undersea cables that carry internet traffic between continents. According to top-secret NSA documents, the US has built several “tapping sites” around the world where it intercepts and inspects internet data, often without the knowledge of its own allies. These operations allow the US to gather valuable information on a massive scale, giving it a huge advantage in areas like diplomacy, military strategy, and economic negotiations.


Spying on Allies
The report also reveals that the US doesn’t just spy on its enemies; it spies on its allies, too. Countries like France, Germany, and Japan have been targets of US espionage operations. For years, the US monitored the French government’s activities in areas like foreign policy, finance, and international trade, sharing some of the information with other Five Eyes members. This shows that even countries that are supposed to be US allies aren’t safe from its far-reaching surveillance programs.



A Web of Deception
The Volt Typhoon operation is just one piece of a much larger puzzle. The report highlights that the US has been using these cyber tools and tactics for years to manipulate global perceptions of cybersecurity threats. By creating a narrative of constant Chinese and Russian cyber threats, the US government not only distracts from its own espionage but also justifies its large-scale surveillance programs.
US intelligence agencies have been running covert operations under a plan known as “EFFECTS Operation.” This plan includes two main types of activities: “Information Operations,” which focus on spreading disinformation, and “Technical Disruption Operations,” which involve hacking and disrupting the networks of other countries. The goal is to deny, disrupt, degrade, and deceive—essentially to cause chaos while hiding the US’s own involvement.
Secret Cyber Warfare
The report provides a glimpse into the secret world of US cyber warfare. The US has developed a massive arsenal of cyber weapons, many of which have never been disclosed to the public or even to some of its closest allies. These weapons are designed to infiltrate, spy, and disrupt foreign networks while remaining undetected. One of the report’s most shocking claims is that US intelligence agencies have planted spyware in over 50,000 systems worldwide, with targets ranging from Asia to Eastern Europe to the Middle East.
The Race for Control in Cyberspace
As the digital world becomes more interconnected, the report argues that the race for control over cyberspace is intensifying. Countries are building up their cyber capabilities to both defend against and launch cyberattacks. The US has taken a particularly aggressive approach, with its “Defend Forward” strategy, which involves placing cyber forces close to enemy nations to conduct reconnaissance and launch attacks.
However, the report concludes by calling for greater international cooperation in the field of cybersecurity. It emphasizes that, as the world becomes more reliant on digital technologies, it’s crucial for nations to work together to ensure the safety and security of the internet. The Chinese researchers behind the report hope that these revelations will prompt more open discussions about cyber threats and lead to a more transparent and secure cyberspace for everyone.
In short, this latest report uncovers a disturbing pattern of cyber deception and global surveillance carried out by the US, challenging the widely held narrative that China is the primary aggressor in cyberspace. It reveals a world where espionage, disinformation, and manipulation are the tools of choice, with the US leading the charge.
futetaifeng3_EN