Volt Typhoon III: How US Cyber Weapons Stage Global Hacks To Frame Innocent Countries

China’s National Computer Virus Emergency Response Center has released a new report that exposes the US government’s secretive cyber espionage operations. The report, published in multiple languages, reveals how the US has been using cyber weapons to spy on other countries and even frame them for cyberattacks it carries out itself. The report focuses on a US cyber operation called “Volt Typhoon” and claims that the US has been using sophisticated tools to cover its tracks and blame countries like China for its own hacking activities.

Volt Typhoon III: How US Cyber Weapons Stage Global Hacks To Frame Innocent Countries 1

What is Volt Typhoon?

Volt Typhoon is the name given to a cyber operation that the US and its allies, known as the Five Eyes (US, UK, Australia, Canada, and New Zealand), have accused China of leading. In May 2023, these countries released a joint statement claiming that Volt Typhoon, supposedly run by the Chinese government, was targeting critical infrastructure in the US. But China’s new report says that this entire narrative is a fabrication, designed by the US to deflect attention from its own illegal cyber activities.

How the US Covers Its Tracks

The report highlights a powerful US cyber tool known as the “Marble” framework. This toolkit, developed by US intelligence agencies like the National Security Agency (NSA) and the Central Intelligence Agency (CIA), is designed to hide the true origins of cyberattacks. It can make it look like attacks are coming from other countries, like China, Russia, or Iran, when in reality, the US is behind them. This deceptive strategy is called a “False Flag” operation, where one country makes it appear as though another is responsible for its actions.

Volt Typhoon III: How US Cyber Weapons Stage Global Hacks To Frame Innocent Countries 2
Disruption Operational Playbook by the U.S. and the Five Eyes countries

The “Marble” framework is sophisticated and sneaky. It allows US hackers to erase identifying marks in the code, making it impossible to trace the attack back to them. The tool can even insert fake code in languages like Chinese or Russian, misleading investigators to think that hackers from those countries are responsible. This strategy lets the US conduct espionage without getting caught, while pointing the blame at other nations.

Volt Typhoon III: How US Cyber Weapons Stage Global Hacks To Frame Innocent Countries 3
Submarine fiber optic cable monitoring stations established and operated by the NSA

A Pattern of Deception

This new report is the third in a series from China’s National Computer Virus Emergency Response Center, and it builds on previous findings from April and July 2023. According to the report, US intelligence agencies have a long history of spying on countries around the world and then covering it up by accusing others of being behind the attacks. The report also claims that US tech companies like Microsoft have been involved in supporting this deception by creating narratives that fit the government’s agenda.

Volt Typhoon III: How US Cyber Weapons Stage Global Hacks To Frame Innocent Countries 4
Customer list of the NSA intelligence

Cybersecurity experts from around the world have reached out to Chinese authorities since the earlier reports were published. Many of these experts have expressed concern that the US government and Microsoft have accused China without solid evidence. Some believe that the Volt Typhoon operation is just another example of the US creating a false threat to justify its own actions and maintain control over global surveillance.

The Bigger Picture: Global Espionage

The report sheds light on the US government’s larger strategy of global surveillance. The US has been tapping into vital communication infrastructure, such as undersea cables that carry internet traffic between continents. According to top-secret NSA documents, the US has built several “tapping sites” around the world where it intercepts and inspects internet data, often without the knowledge of its own allies. These operations allow the US to gather valuable information on a massive scale, giving it a huge advantage in areas like diplomacy, military strategy, and economic negotiations.

Volt Typhoon III: How US Cyber Weapons Stage Global Hacks To Frame Innocent Countries 5
Sketch map of the TAO’s global cyber intrusion operations
Volt Typhoon III: How US Cyber Weapons Stage Global Hacks To Frame Innocent Countries 6
Sketch map of the TAO’s cyber intrusion in China

Spying on Allies

The report also reveals that the US doesn’t just spy on its enemies; it spies on its allies, too. Countries like France, Germany, and Japan have been targets of US espionage operations. For years, the US monitored the French government’s activities in areas like foreign policy, finance, and international trade, sharing some of the information with other Five Eyes members. This shows that even countries that are supposed to be US allies aren’t safe from its far-reaching surveillance programs.

Volt Typhoon III: How US Cyber Weapons Stage Global Hacks To Frame Innocent Countries 7
Covert intelligence stations set up in Germany by the U.S. intelligence agencies
Volt Typhoon III: How US Cyber Weapons Stage Global Hacks To Frame Innocent Countries 8
The NSA surveillance records of German government leaders
Volt Typhoon III: How US Cyber Weapons Stage Global Hacks To Frame Innocent Countries 9
The NSA’s monitoring records of Japanese leaders

A Web of Deception

The Volt Typhoon operation is just one piece of a much larger puzzle. The report highlights that the US has been using these cyber tools and tactics for years to manipulate global perceptions of cybersecurity threats. By creating a narrative of constant Chinese and Russian cyber threats, the US government not only distracts from its own espionage but also justifies its large-scale surveillance programs.

US intelligence agencies have been running covert operations under a plan known as “EFFECTS Operation.” This plan includes two main types of activities: “Information Operations,” which focus on spreading disinformation, and “Technical Disruption Operations,” which involve hacking and disrupting the networks of other countries. The goal is to deny, disrupt, degrade, and deceive—essentially to cause chaos while hiding the US’s own involvement.

Secret Cyber Warfare

The report provides a glimpse into the secret world of US cyber warfare. The US has developed a massive arsenal of cyber weapons, many of which have never been disclosed to the public or even to some of its closest allies. These weapons are designed to infiltrate, spy, and disrupt foreign networks while remaining undetected. One of the report’s most shocking claims is that US intelligence agencies have planted spyware in over 50,000 systems worldwide, with targets ranging from Asia to Eastern Europe to the Middle East.

The Race for Control in Cyberspace

As the digital world becomes more interconnected, the report argues that the race for control over cyberspace is intensifying. Countries are building up their cyber capabilities to both defend against and launch cyberattacks. The US has taken a particularly aggressive approach, with its “Defend Forward” strategy, which involves placing cyber forces close to enemy nations to conduct reconnaissance and launch attacks.

However, the report concludes by calling for greater international cooperation in the field of cybersecurity. It emphasizes that, as the world becomes more reliant on digital technologies, it’s crucial for nations to work together to ensure the safety and security of the internet. The Chinese researchers behind the report hope that these revelations will prompt more open discussions about cyber threats and lead to a more transparent and secure cyberspace for everyone.

In short, this latest report uncovers a disturbing pattern of cyber deception and global surveillance carried out by the US, challenging the widely held narrative that China is the primary aggressor in cyberspace. It reveals a world where espionage, disinformation, and manipulation are the tools of choice, with the US leading the charge.

futetaifeng3_EN

Daily Counter-Intelligence Briefing Newsletter

We will send you just one email per day.

We don’t spam! Read our privacy policy for more info.

 
Do you have a tip or sensitive material to share with GGI? Are you a journalist, researcher or independent blogger and want to write for us? You can reach us at [email protected].

Leave a Reply