Pyongyang, March 20 (KCNA) -- Another hacking case spearheaded by the U.S. was disclosed, sparking off a worldwide furor.
Whistleblower website WikiLeaks on March 7 revealed the hacking of
mobile phones and other e-media by the U.S. Central Intelligence Agency
in recent years, citing its more than 8 771 cyber intelligence files as
According to it, the CIA reorganized its structure to serve the
purpose of carrying out cyber strategy with direct approval of the
administration, and has conducted espionage with all means and methods
It hacks and steals telephone talks before they are encoded, plants
"weeping angel", a program developed by it, in TVs, enabling the
wiretapping of dialogues nearby even when the TVs are switched off.
After stealing data, it left fake access mark, to give impressions
that hacking was done by Russia, China, Iran and other countries.
This proves that the U.S. is a hacking empire and the worst rogue
state which stoops to any infamy to realize its ambition for world
Cyber space is one of the preemptive attack means which the U.S.
prioritizes along with nuclear stick and dollars in realizing its
From long ago, the U.S. regarded cyber space as the fifth area for
world domination next to sky, land, sea and outer space, and set up
units specializing in cyber warfare far back in the 1990s.
It set up cyber command in May 2010 and in Oct. 2012, it saw to it
that secret executive order was issued to make it possible to mobilize
all means for hacking attack and mount a preemptive attack on any
country without advance warning.
Its aim is to hack into countries and regions developing politics,
military, economy and other huge fields with the introduction of
internet, foment confusion and realize with ease its ambition for world
It is for this reason that the targets of the cyber attack of the
U.S. covers the whole world, in effect, ranging from anti-U.S. and
independent countries like the DPRK, its potential rivals like Russia
and China and its competitive allies to even its stooges.
At the annual security consultative council with the south Korean
puppet forces in 2015, the U.S. discussed the issue of staging joint
cyber drills targeting the DPRK and intensified education concerning
them and has been busy putting them into practice.
From several years ago, the U.S. set up CNE hack tracking software
in the computer network of the DPRK with an aim to gather major
information. In Dec. 2014, it mounted a massive attack on intranet of
This being a hard fact, the U.S. has made desperate efforts to brand
the DPRK as a hacking criminal while describing itself as the biggest
victim of cyber attack whenever an opportunity presented itself. This is
the height of shamelessness.
The U.S. scenario to brand the DPRK as a criminal of cyber terrorist
attack and create an atmosphere favorable for carrying out cyber
warfare of preemptive attack is a pipedream.
The U.S. is the worst rogue state. -0-