国产av不卡一区二区_欧美xxxx做受欧美_成年人看的毛片_亚洲第一天堂在线观看_亚洲午夜精品久久久中文影院av_8x8ⅹ国产精品一区二区二区_久久精品国产sm调教网站演员_亚洲av综合色区无码一二三区_成人免费激情视频_国产九九九视频

The China Story at your Fingertips
OPEN
Editor's note

It's been a decade since former CIA contractor Edward Snowden's leaks. Snowden disclosed to the press details of extensive internet and phone surveillance made by American intelligence.

A decade after Snowden: Unmasking cyber military industrial complex
By Meng Zhe and Xu-Pan Yiru

It has been a decade since Edward Snowden's shocking revelations reverberated around the globe, shedding light on the extensive surveillance activities conducted by the United States. However, rather than witnessing a rollback of these practices, the American surveillance empire has stealthily expanded its reach, with military manufacturers entering the fray of the cyber military industrial complex.

Among the most significant programs exposed by Snowden was Prism, an alarming surveillance initiative that brought to the forefront the US government's daily monitoring of phone calls and text messages. Operating under Section 702 of the Foreign Intelligence Surveillance Act (FISA), the National Security Agency (NSA) compelled internet service providers like Google to relinquish users' private information to the US government.

Although originally intended to target foreigners outside the United States, the US government took advantage of Section 702 to amass extensive amounts of personal data from its own citizens.

The impact of Snowden's revelations extends well beyond the borders of the United States. The US even engaged in spying on its allies, as evidenced by its collaboration with the Danish Defense Intelligence Service from 2012 to 2014. Through underwater communication cables passing through Denmark, the NSA gained access to the conversations and network information of European politicians.

The United States made no distinction between allies and non-allies when it came to espionage. Prominent figures like Angela Merkel, former German Chancellor, found themselves among the prime targets. Political figures in France, Sweden, Norway, and other countries were also subjected to interception. This pervasive monitoring left no one immune, prompting French President Emmanuel Macron to express his outrage and condemn such behavior among allies as unacceptable.

Sevim Dagdelen, a member of the German Parliament, said how Edward Snowden opened the world's eyes to the US's disregard for its supposed allies. The revelations exposed the US's sole pursuit of dominance and control, extending its surveillance apparatus to encompass everyone, everywhere, and everything.

Regrettably, a decade after Snowden's leaks, little has changed, if anything at all. The US government made promises of reform but failed to follow through. Recently declassified court records from the Office of the Director of National Intelligence (ODNI) disclosed that the Federal Bureau of Investigation (FBI) conducted over 278,000 searches on a vast digital database without warrants between 2020 and early 2021.

These surveillance tools have been employed to suppress political dissent, scrutinizing hundreds of Americans connected to protests following the killing of George Floyd and those expressing discontent towards US bureaucratic lawmakers during the Capitol incident.

A comprehensive two-year study by Georgetown University revealed that the Immigration and Customs Enforcement (ICE) agency's annual expenditure on surveillance skyrocketed from $71 million in 2008 to a staggering $388 million in 2022. Utilizing utility bills, facial recognition technology, and even vehicle information, ICE has monitored a significant percentage of American adults.

Alarmingly, surveillance technology has now evolved into a deadly weapon. The US Cyber Command has confirmed the nation's military involvement in offensive cyber operations during the Ukraine crisis. Former Secretary of State Hillary Clinton even publicly encouraged American hackers to target Russia. According to projections by the RAND Corporation, the number of US cyber mission force teams with full operational capabilities may reach 167 by 2024, reflecting a 25% increase compared to 2022. China, too, has fallen victim to US cyber warfare, with Chinese authorities reporting the capture of over 42 million malicious computer programs in 2020, the majority originating from the US.

With traditional defense industry players now venturing into the realm of cyberspace, the likes of Lockheed Martin and BAE Systems are at the forefront of implementing cyber programs. This confluence has birthed what is known as the "cyber military industrial complex," as elucidated by Xu Peixi, a professor at the Communications University of China. While the US Congress asserts their actions are driven by national security imperatives, it is evident that financial considerations play a substantial role in their endeavors, said Xu.

Surveillance still a concern 10 years after Snowden leaks
By Lia Zhu in San Francisco
Edward Snowden speaks from Russia during a Council of Europe meeting in Strasbourg, France, in March 2019. [Photo/Agencies]

Click on the picture above to view the special coverage

Revelations have deep impact on businesses, governments, tech industry

Ten years ago this month, Edward Snowden disclosed to the media United States government intelligence programs that used extensive internet and phone surveillance to collect data.

The former contractor with the US National Security Agency leaked thousands of highly classified documents, revealing the extent of Washington's mass surveillance efforts.

Snowden's disclosures rocked governments, global businesses and the technology world. They also sparked debate on government surveillance, privacy violations and data security.

In the past decade, the "Snowden effect" has had a profound impact on society and the technology industry, with more public attention paid to the US government's abuse of surveillance tools and encryption services.

In a recent report examining Snowden's legacy, the privacy advocacy organization Electronic Frontier Foundation said, "Snowden's revelations acted like a floodlight, allowing everyone to better see and understand what happens inside the black box of government surveillance of millions of innocent people in the US and around the world."

Some observers, including the EFF, are disappointed by how little progress has been made. The programs Snowden pointed out in 2013 are still in operation, and the US government continues to conduct surveillance on foreigners and US citizens under the same legal framework.

The EFF said, "There's still much work to be done to rein in our overzealous national security state, break political gridlock, and end the extreme secrecy that insulates some of the government's most invasive tactics."

Analysts from the group recognized that "some things are undoubtedly better under the intense scrutiny of public attention". For instance, some of the NSA's most egregiously illegal programs and authorities have closed or been forced to end, and the intelligence community has started affirmatively releasing at least some important information.

Five years after the Snowden leaks, the NSA was compelled to delete millions of records in 2018 after it was revealed that some of the data had been collected from phone service providers without legal authority or authorization.

In 2020, Section 215 of the USA Patriot Act — a surveillance law with a rich history of government overreach and abuse — expired due to its sunset clause.

For years, the US government relied on Section 215 to conduct a dragnet surveillance program that collected billions of phone records documenting who a person called and for how long they called them. There was more than enough information for analysts to infer highly personal details about a person, including who they have relationships with and the private nature of those relationships, the EFF said.

In 2015, a federal appeals court held that the NSA's interpretation of Section 215 to conduct this surveillance dragnet was "unprecedented and unwarranted".

The EFF report said: "Outside of government, companies and organizations have worked to close many of the security holes that the NSA abused, most prominently by encrypting the web. But it's not enough — not even close."

A placard supporting Snowden is held aloft in Washington in October 2013. [Photo/Agencies]

Mass surveillance

Snowden's leaks revealed numerous global surveillance programs previously unknown to the US public. The programs involved collecting private citizens' emails, search history, phone records and file transfers without their knowledge or court orders. He also exposed the NSA harvesting data from big internet companies, including Google, Facebook and Microsoft.

After fleeing to Hong Kong, Snowden told the media the NSA had led more than 61,000 hacking operations worldwide, including many in China. "We hack network backbones — like huge internet routers, basically — that give us access to the communications of hundreds of thousands of computers without having to hack every single one," he said.

Germany's Der Spiegel magazine reported that the NSA also spied on European Union offices in the US and Europe and ran a continent-wide surveillance program in South America. It also spied on the presidents of Brazil and Mexico.

An analysis by The Washington Post of the Snowden leaks found some 90 percent of those being monitored were ordinary US citizens "caught in a net the National Security Agency had cast for somebody else".

The Snowden revelations named two of the key types of surveillance the NSA conducts — Prism and Upstream.

Through the Prism program, the agency collects internet communications from various US internet companies. The information includes email communication, voice calls, SMS, social media communications, metadata, video calls and search preference.

The Upstream program aims to intercept telephone and internet traffic from the internet backbone — major internet cables and switches, domestic and foreign.

Seven years after Snowden blew the whistle on the mass surveillance programs, the Prism program was ruled unlawful by a US court in 2020.

The US Court of Appeals for the Ninth Circuit said the warrantless telephone dragnet that secretly collected millions of citizens' telephone records violated the Foreign Intelligence Surveillance Act, and that the US intelligence leaders who publicly defended it were not telling the truth.

Although there are legal cases pending against the US government, Prism and Upstream are still in operation under the auspices of Section 702 of the Foreign Intelligence Surveillance Act, which Snowden called out in 2013 for its abuse in spying on US citizens.

Section 702 is a law that allows the government to collect — on domestic soil and without a warrant — the communications of foreign targets who are not protected by the Fourth Amendment, including when those people are interacting with US citizens.

Under that law, the NSA can order companies such as Google to turn over copies of all messages in the accounts of any foreign user and network operators like AT&T to intercept and furnish copies of any phone calls, texts and internet communications to or from a foreign target.

Critics of the law are worried that it also gathers data about US citizens, for instance, when they communicate with people overseas.

The newly unsealed Foreign Intelligence Surveillance Court opinion shows that the Federal Bureau of Investigation, or FBI, has continued to abuse its access to information collected under Section 702, including by searching for activist groups and political campaign donors.

The court document also reveals that the FBI used the warrantless foreign intelligence surveillance authority improperly more than 278,000 times in 2021. US citizens involved in the improper searches include people suspected of taking part in the Jan 6, 2021, attack on the US Capitol and those in the George Floyd protests against police brutality and racism in 2020.

The recent revelation of the FBI's search for those rioters and protesters in the spy database has set back the administration of President Joe Biden's effort to renew Section 702, which was last renewed in 2018 and will expire this year.

The Biden administration has been lobbying Congress for months to renew Section 702 without any changes, saying it is a critical tool for counterterrorism operations, cybersecurity and understanding rivals such as China.

To stop mass surveillance, advocates are calling on Congress to end Section 702 in the autumn so that the Prism and Upstream programs will end along with it.

In an article reflecting on the 10th anniversary of the Snowden revelations, security expert Bruce Schneier said the US government did not play its part in addressing the privacy concerns.

"Despite the public outcry, investigations by Congress, pronouncements by President Obama, and federal court rulings, I don't think much has changed," Schneier, adjunct lecturer in public policy at Harvard Kennedy School, wrote in the article for the Internet Engineering Task Force.

"The NSA canceled a program here and a program there, and it is now more public about defense. But I don't think it is any less aggressive about either bulk or targeted surveillance. Certainly its government authorities haven't been restricted in any way. And surveillance capitalism is still the business model of the internet," he said.

German lawmaker Hans-Christian Stroebele (left) holds a news conference in Berlin in November 2013 about his meeting with Snowden in Moscow. [Photo/XINHUA]

Technology's role

The "Snowden effect" rocked the technology industry after it was revealed that the NSA was tapping into information held by some US cloud-based services through the Prism program.

Google, Cisco and AT&T lost international business due to the public outcry over their roles in the NSA spying. Apple and other Silicon Valley tech giants were accused of knowingly taking part in the secret data collection program.

To regain users' trust, Apple pioneered technological change a year after the leaks by encrypting its services in an attempt to prevent law enforcement from accessing users' data.

The company's encryption methods help protect the contents of the device and prevent federal agents, intelligence agencies and even Apple from accessing any users' data. This measure forces the government to go to the owner of the device, rather than Apple.

The Snowden revelations, especially slides showing the NSA was using the unencrypted traffic between the internal data centers of Google and Yahoo as a point of surveillance, triggered the tech industry into wide encryption.

The use of encryption has become more widespread in recent years and many companies now offer it as a standard feature in their products.

But the recent record-breaking fine levied by European Union regulators against social media giant Meta suggests that the days of the US unlawfully accessing users' personal information via the nation's tech giants are not over.

In May, the European Data Protection Board announced the $1.3 billion fine, saying that Meta violated EU privacy laws by transferring the personal data of Facebook users to servers in the US. Meta is the latest company to face a big penalty for privacy violations under the EU's General Data Protection Regulation. The previous record fine of $805.7 million was levied against Amazon in 2021.

Privacy advocates criticize the US Congress for not taking privacy concerns seriously. The EFF report said, "Congress' relationship to privacy comes when it's politically expedient, and disappears as soon as members feel as if they could be too easily painted as being soft on crime or national security."

Despite calls in recent years for federal legislation to reign in big tech companies, the EFF analysts said they have seen nothing significant in limiting a tech company's ability to collect data (then accessed by the NSA via Prism), or regulate biometric surveillance, or close the backdoor that allows the government to buy personal information rather than obtain a warrant.

"It's been 10 years since the Snowden revelations, and Congress needs to wake up and finally pass some legislation that actually protects our privacy from companies as well as from the NSA directly," they said.

Stephen Farrell, research fellow in computer science at Trinity College Dublin, said far more needs to be done to better protect internet users' security and privacy.

"In particular, we (the technical community) haven't done nearly as good a job at countering surveillance capitalism, which has exploded in the last decade," Farrell wrote in a Snowden retrospective published on May 20.

However, the "legal but hugely privacy-invasive activities" of major tech companies have not caused as much "annoyance" as the Snowden revelations, he said.

Bad actors are not limited to governments, Farrell said. "Many advertising industry schemes for collecting data are egregious examples of pervasive monitoring, and hence ought also to be considered an attack on the internet that ought to be mitigated where possible. However, the internet technical community clearly hasn't acted in that way over the last decade," he said.

"While we got a lot right in our reaction to Snowden's revelations, currently, we have a 'worse' internet."

Journalist Laura Poitras (left) and her colleagues, who reported on Snowden's leaks, attend an awards ceremony in New York in 2014. [Photo/Agencies]
Who is Edward Snowden, the self-styled NSA leaker?
Newly released "Permanent Record" by Edward Snowden is displayed on a shelf at Books Inc. on Sept 17, 2019 in San Francisco, California. [Photo/VCG]

June 21, 1983

Edward Snowden is born in Elizabeth City, North Carolina. He spends his early life there before moving with his parents, Lonnie, a Coast Guard officer, and Elizabeth, known as Wendy, to Maryland.

1991-98

Snowden attends public schools in Anne Arundel County, south of Baltimore, before dropping out of high school in his sophomore year.

1999-2001

During this period, The New York Times reports, he developed a fascination for computers and technology. He registers on the Ars Technica website, a hacking and technology forum. After his parents' divorce in 2001, Snowden lives with his mother in Ellicott City, Maryland.

2002-04

After attending a local community college off and on, Snowden passes a General Educational Development test to receive a high school equivalency credential. In March 2004, he is enlisted in an Army Reserve Special Forces training program. But he breaks his leg in a training accident, and Army records show he is discharged in September. He then lands a job as a security guard at the Center for Advanced Study of Language at the University of Maryland, which has a close relationship with the National Security Agency.

2006

Snowden is hired by the CIA as a technical/IT expert and receives top-secret clearance.

2007-09

Snowden is posted to Geneva, Switzerland, under diplomatic cover as an IT and cybersecurity expert for the CIA, a position that gives him access to a wide array of classified documents.

Late 2009-March 2012

Snowden's supervisor at the CIA places a critical assessment of his behavior and work habits in his personal file and voiced suspicion that he tried to "break into classified computer files to which he was not authorized to have access", The New York Times reports after he is identified as a leaker, quoting two unnamed"senior US officials". Snowden leaves the CIA soon and starts work as an NSA contractor assigned by Dell—one of 854,000 contractors with top-secret clearance working for the federal government. Over the next several years, he switches between assignments with the NSA and the CIA for Dell, including a stint at an NSA facility in Japan that lasts until March 2012.

March 2012

Snowden moves to Hawaii to work at NSA facility as a Dell employee.

Dec 1, 2012

Snowden reaches out to Glenn Greenwald, a lawyer and columnist for The Guardian.

In this file still frame grab recorded on June 6, 2013 and released to AFP on June 10, Edward Snowden speaks during an interview with The Guardian newspaper at an undisclosed location in Hong Kong. [Photo/VCG]

January 2013

Snowden reaches out to Laura Poitras, a documentary filmmaker.

March 2013

He seeks a new contractor job with Booz Allen Hamilton at the same NSA facility in Hawaii.

May 2013

Snowden begins sending some documents to Poitras, Greenwald and to Barton Gellman of The Washington Post.

May 20, 2013

Snowden arrives in Hong Kong from Hawaii.

June 2, 2013

Greenwald and Poitras arrive in Hong Kong.

June 5, 2013

First revelations arising from the documents provided by Snowden are published in The Guardian's article about NSA's collection of domestic email and telephone metadata from Verizon as part of what is later revealed to be an even broader collection effort.

June 6, 2013

The Guardian and The Washington Post each publish an article about NSA program PRISM, which forces biggest US internet companies to hand over data on domestic users.

June 8, 2013

The Guardian publishes NSA slides on Boundless Informant, which shows NSA collected nearly 3 billion pieces of intelligence inside the US in February 2013 alone.

June 9, 2013

The Guardian reveals Edward Snowden as the source of NSA leaks.

June 11, 2013

The European Union demands US assurances that Europeans' rights are not infringed upon by the newly-revealed surveillance programs. Snowden is fired by Booz Allen Hamilton.

June 14, 2013

US Justice Department charges Snowden with theft, "unauthorized communication of national defense information"and "willful communication of classified communications intelligence information to an unauthorized person" — the two charges are violations of the 1917 Espionage Act.

June 23, 2013

Snowden leaves Hong Kong for Ecuador, with a planned stopover in Russia. But he gets stranded at Sheremetyevo International Airport in Moscow after US authorities rescind his passport. He spends the next month living in limbo in the airport's transit center.

Aug 1, 2013

He is granted temporary asylum by Russian authorities as they consider his application for permanent political asylum.

Edward Snowden addresses attendees through video link at the Web Summit technology conference in Lisbon on Nov 4, 2019. [Photo/VCG]

Oct 2, 2013

At a Senate hearing on the Foreign Intelligence Surveillance Act, Director of National Intelligence James Clapper tells lawmakers that Snowden's leaks have aided the US' enemies and "done great damage"to its allies.

Oct 14, 2013

The Washington Post reports the NSA has collected over 250 million email inbox views and contact lists a year from online services, such as Yahoo, Gmail and Facebook. The documents are provided by Snowden.

Dec 16, 2013

US District Judge Richard Leon rules that the NSA's gathering of data on all telephone calls made in the US appears to violate the Constitution's protection against unreasonable searches. But Leon, an appointee of former president George W. Bush, puts his ruling on hold to allow the government to appeal.

Dec 17, 2013

Snowden posts an open letter to Brazil, offering to help investigate US surveillance of Brazilian citizens.

Feb 7, 2014

NBC News reports, based on Snowden documents, that British spies have developed"dirty tricks"for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into"honey traps".

March 6, 2014

The Pentagon might need to spend billions to overcome the damage done to military security by Snowden's leaks of intelligence documents, Army General Martin Dempsey, the chairman of Joint Chiefs of Staff, tells members of Congress at a hearing on the defense budget.

10 famous whistleblowers in US history

Some call them heroes, many others call them traitors, but all of these figures became famous for providing information, sometimes secretly, in an attempt to expose the people or organizations they worked for. A number of them have even been portrayed in movies. Here are 10 famous whistleblowers in US history compiled by China Daily.

Mark Whitacre

The FBI seal is pictured on Aug 10, 2022. [Photo/VCG]

In 1992, the corporate vice-president of Archer Daniels Midland visited the FBI with some potentially damaging information about the company. Mark Whitacre — the subject of the 2009 film The Informant! — soon teamed up with the FBI for a three-year undercover operation to expose the company's price-fixing scheme.

While Whitacre may have been given immunity from actions during his time at the company, he was certainly accountable for the $9 million he embezzled during his undercover role. In the end, Whitacre was sentenced to 9 years in federal prison for those actions, while the longest sentence given to an ADM employee — for the crimes Whitacre brought attention to — was 30 months.

The General Electric logo is displayed on a sign outside their headquarters, Nov 10, 2021. [Photo/VCG]

Vera English

While working as a lab technician at a nuclear facility operated by General Electric in the US in 1984, Vera English was alarmed by the frequency of radioactive spillages. English contacted both her supervisor and the Nuclear Regulatory Commission about her concerns, but nothing was done and English was fired shortly after.

After a long legal battle, her Supreme Court case, English v. General Electric Company, set a precedent that allowed whistleblowers to pursue cases under the state law. English's victory also set a precedent for the use of whistleblower protection laws in other nuclear energy cases, and demonstrated how the existing whistleblower laws can be used to protect against corporate retaliation.

A general view of the Centers for Disease Control and Prevention (CDC) headquarters in Atlanta, Georgia Sept 30, 2014. [Photo/Agencies]

Peter Buxton

As a US Public Health Service, or PHS, disease investigator, Peter Buxton publicly blew the whistle on the Tuskegee Syphilis Study, an unethical medical study conducted by the PHS and the Centers for Disease Control and Prevention, or CDC.

The purpose of the study, which was conducted on poor African-American sharecroppers from 1932 to 1972, was to see what happens when syphilis is left untreated. Despite the widespread availability of penicillin to treat syphilis by 1947, the study continued. By the end of the study, 128 participants had died of syphilis or its complications, 40 of participants' wives were infected, and 19 children were born with congenital syphilis.

Buxton first registered his concerns about the ethics of the experiment in 1966. The CDC, which by then controlled the study, ignored his concerns and reaffirmed the need to complete the study — in other words, to let all of the participants die and conduct an autopsy on them. In 1972, Buxton went to the press. A public outcry ensued that finally led to the review and termination of the study.

Detainees at Abu Ghraib prison reach hold the fence at a new section of the prison named Camp Redemption May 26, 2004 in Baghdad, Iraq. [Photo/VCG]

Joe Darby

In 2004, army reservist Joe Darby turned in a CD containing photographs of prisoner mistreatment and torture at Baghdad's Abu Ghraib prison to the US Army's Criminal Investigation Division. The photos were aired on 60 Minutes on CBS News and prompted global outrage.

While seven officers at the military prison in Iraq were immediately removed from the site and later tried, Darby's whistleblowing efforts had a much larger effect. While initially members of the Bush administration attempted to paint the photos as actions of a few sadistic individuals, as a result of Abu Ghraib investigations, increased scrutiny of treatment improved prisoners' conditions.

Cars drive down southbound US Route 412 as snow falls in Oklahoma on Feb 2, 2022. [Photo/VCG]

Karen Silkwood

In 1972, Karen Silkwood began working as a chemical technician at the Kerr-McGee nuclear plant near Crescent, Oklahoma. Silkwood joined the local Oil, Chemical & Atomic Workers' Union, and investigated health and safety issues at the plant as a union activist. Silkwood discovered numerous safety issues, including exposure of workers to contamination, faulty respiratory equipment, and more. She testified to the United States Atomic Energy Commission in summer 1974 about her concerns.

Silkwood died in a car accident on Nov 13, 1974, at age 28 under suspicious circumstances. While officials ruled the death as an accident, paint on the rear bumper of her new car and missing documents regarding plant safety caused onlookers to question whether she had been intentionally forced off the road. Silkwood was on her way to meet a New York Times reporter regarding plutonium contamination at the time of her death. In 1975, the Kerr-McGee plant was shuttered, and in 1979, Silkwood's father and children successfully sued Kerr-McGee on behalf of her estate. Meryl Streep was nominated for an Academy Award for her portrayal of Karen Silkwood in the 1984 film, Silkwood.

Edward Snowden

In this file still frame grab recorded on June 6, 2013 and released to AFP on June 10, Edward Snowden speaks during an interview with The Guardian newspaper at an undisclosed location in Hong Kong. [Photo/VCG]

In 2013, Edward Snowden, a former computer intelligence consultant, released documents on top-secret National Security Agency programs to reporters at The Guardian and The Washington Post. Snowden tried to raise his ethical concerns about the global surveillance programs internally but was ignored.

In June 2013, Snowden blew the whistle publicly on the NSA, sparking a debate about privacy and national security. Snowden was charged with violating the Espionage Act, but sought asylum in Russia before he was apprehended. On Sept 2, 2020, a US federal court ruled in United States v. Moalin that Snowden did expose illegal US surveillance behavior. Snowden continues to reside in exile in Moscow.

Daniel Ellsberg

Photo taken on Feb 19, 2020 shows the Pentagon seen from an airplane over Washington DC. [Photo/Xinhua]

Former US military analyst Daniel Ellsberg Ellsberg leaked the Pentagon Papers, a secret account of the Vietnam War, to The New York Times in 1971. The Pentagon Papers demonstrated that the Lyndon Johnson administration had repeatedly lied to both the public and Congress about the scope and actions of US political and military involvement in Vietnam. Ellsberg, who had worked on the report as an employee of the RAND Corporation, was initially charged with conspiracy, espionage, and theft of government property, but the charges were dismissed when prosecutors investigating the Watergate Scandal found evidence that White House staff had engaged in illegal attempts to discredit Ellsberg.

The release of the Pentagon Papers led to the Supreme Court case's landmark decision in the New York Times v. United States that affirmed the First Amendment right of free press against prior restraint by the government.

Frank Serpico

A cyclist rides past a New York Police Department (NYPD) station in Times Square in the Manhattan borough of New York City, New York, US, Dec 15, 2021. [Photo/Agencies]

Frank Serpico was the first police officer in history to openly testify about corruption in the New York Police Department. Serpico worked as a plainclothes detective throughout the 1960s and early 1970s, and, in 1967, he reported police corruption, including bribes and payoffs, to no avail. When his attempts to curb corruption internally failed, Serpico contributed to a 1970 New York Times story on systemic corruption within the NYPD which led to the formation of the Knapp Commission. In 1971, Serpico survived a shot in the face during an arrest in Brooklyn. While there was never a formal investigation, the murky circumstances around the shooting were suspicious, and some allege it was an attempt by his colleagues to get Serpico murdered.

Serpico retired from the NYPD in 1972 and continued to suffer pain and deafness from the shooting. The 1973 film based on his story, Serpico, features Al Pacino in the title role, and a 2017 documentary, Frank Serpico, features Serpico telling his story in his own words.

Chelsea Manning

Former US Army intelligence analyst Chelsea Manning addresses reporters before entering the Albert Bryan US federal courthouse May 16, 2019 in Alexandria, Virginia. [Photo/VCG]

Whistleblowers are often figures of controversy, and Chelsea Manning exemplifies this more than any other figure in recent US history. In 2010, Manning, a US Army intelligence analyst, released the largest set of classified documents in US history, primarily published by WikiLeaks. The trove included documents describing detention, abuse, and torture of prisoners, and more. The leaks sparked a still-ongoing debate about the role of transparency, technology, and ethics in the US military.

Manning was convicted of violating the Espionage Act and sentenced to 35 years in prison, but was unexpectedly granted clemency by then-president Barack Obama during the final days of his administration.

Former FBI deputy director Mark Felt emerges as his daughter Joan Felt (L) and grandson Nick Jones (R), look on from his home in Santa Rosa, California, May 31, 2005. [Photo/Agencies]

W. Mark Felt (Deep Throat)

For more than 30 years, people speculated about the identity of "Deep Throat", the secret informant of Bob Woodward and Carl Bernstein, The Washington Post reporters who broke the Watergate Scandal in 1972. In 2005, Felt's identity was finally made public. Felt was associate director of the FBI, the second-in-command at the bureau, when he leaked information about then-president Richard Nixon's involvement in Watergate.

While Watergate eventually led to Nixon's resignation and prison terms for two top officials, since the revelation of Felt's identity, historians have debated whether he acted as informant due to ethical concerns, or if it was simply an attempt to get the top job at the bureau. Either way, the decades-long mystery surrounding his identity and the history-making implications of his actions land Felt in the top spot of famous whistleblowers in US history.

Unchecked surveillance empire
A huge slogan board stands in front of the US Capitol building during a protest against government surveillance in Washington DC, capital of the United States, on Oct 26, 2013. [Photo/Xinhua]

BEIJING -- The United States is notorious for its cyber record. Just ask the National Security Agency, which in 2013 suffered the biggest leak in its history when Edward Snowden, a former CIA contractor, walked out with a vast trove of secret documents.

Snowden disclosed to the press details of extensive internet and phone surveillance by American intelligence. As the scandal widened, multiple media outlets revealed that NSA tapped directly into the servers of internet firms to track online communication in a surveillance program known as Prism.

A decade later, it's the Pentagon in the limelight this time. A set of highly classified documents from the department were leaked online in recent weeks, in an apparent security breach that revealed US intelligence gathering on some of its key allies. South Korea, one of those affected, has played down any possibility of tension, reiterating its "strong" ties with America.

Those documents also reportedly include military assessments on the Ukraine crisis and CIA reports on a range of global issues. The embarrassing leak has endangered intelligence methods, exposed American strategy and undermined trust among U.S. allies, CNBC quoted former defense department officials and intelligence experts as saying.

Surveillance obsession

For years, Washington has been spying on the world through electronic eavesdropping and communication interception, with the targets ranging from what it called "strategic competitors" to its European partners.

Anti-secrecy group WikiLeaks in 2015 released a trove of documents titled "Target Tokyo" detailing systematic mass surveillance the agency undertook of Japanese politicians, ministries and corporations over a number of years.

According to the documents, America had gleaned intimate details of internal Japanese deliberations on trade-related issues, including agricultural imports and trade disputes and positions.

European leaders should not be surprised, either. The Danish state broadcaster DR reported in 2021 that the NSA used a partnership with Denmark's foreign intelligence unit to spy on senior officials of neighbouring countries, including then German Chancellor Angela Merkel.

The findings are the result of a 2015 internal investigation in the Danish Defence Intelligence Service into NSA's role in the partnership, DR said.

According to the investigation, which covered the period from 2012 to 2014, the NSA used Danish information cables to spy on senior officials in Sweden, Norway, France and Germany.

China has been a target too. In September 2022, China's National Computer Virus Emergency Response Center and cybersecurity company 360 respectively released investigation reports on the NSA attacks on China's Northwestern Polytechnical University with aeronautics and space research programs. The reports indicated that the agency's Tailored Access Operations unit mounted hundreds of thousands malicious cyberattacks targeting Chinese objectives.

"No rules"

The United States is sparing no effort to militarize cyberspace, develop offensive cyber capabilities, and create systematic cyberattack platforms. In 2017, cyberspace was officially listed alongside the sea, land, air, and space as the "fifth domain" of the U.S. military.

The aim is thinly veiled: to maintain America's hegemony. Analysts say that cyber warfare is one of the tools used in its "hybrid warfare." Like economic sanctions, terrorist activities, psychological warfare, and military actions, it is a means by which the United States interferes in other countries and achieves its own political goals.

In seeking its own absolute security, the United States flagrantly violates the sovereignty of other countries' cyberspace and undermines their information security. This seriously hinders the efforts of the international community to maintain cybersecurity and data security, disrupts the international order in cyberspace, and undermines global strategic stability.

Andrey Krutskikh, former director of the Department of International Information Security at the Russian Ministry of Foreign Affairs, said that the United States and other Western countries are militarizing cyberspace, attempting to turn it into a stage for interstate confrontation, which exacerbates the risk of direct military conflict and can lead to unpredictable consequences.

Speaking of "Target Tokyo," Julian Assange, founder of WikiLeaks, said the revelations should not come as a surprise, given the track record of the United States as a global surveillance superpower.

"In these documents we see the Japanese government worrying in private how much or how little to tell the United States, in order to prevent undermining of its climate change proposal or its diplomatic relationship," Assange said in a statement.

"And yet we now know that the United States heard everything and read everything, and was passing around the deliberations of Japanese leadership to Australia, Canada, New Zealand and the UK. The lesson for Japan is this: do not expect a global surveillance superpower to act with honor and respect. There is only one rule: there are no rules."

USA is Universal Spying Agency: China Daily editorial
Photo taken on Feb 19, 2020 shows the Pentagon seen from an airplane over Washington DC. [Photo/Xinhua]

In an interview with Fox News that aired on Monday night, Twitter CEO Elon Musk said that the US government has full access to everything on the platform, including direct messages between users.

"The degree to which government agencies effectively had full access to everything that was going on Twitter blew my mind," Musk told Fox News anchor Tucker Carlson, adding that he "was not aware of that" until he gained full control of the social media platform last October.

One marvels at his naivety, since the US government has an infamous record of such snooping. It is well-evidenced that it conducts both large-scale indiscriminate and discriminate drag netting of the data of not only its own citizens but also other users of US social media, as well as clandestinely eavesdropping on foreign governments, businesses, and individuals, including those of its allies. Recently leaked highly classified Pentagon documents show that the US has been a bugbear for supposed foes and allies alike, including the leaders of the Republic of Korea, Ukraine and Israel.

With Musk revealing that all the content on Twitter is transparent to US intelligence agencies, it is clear why there is such a clamor in Washington accusing TikTok of such practices. They want to bring the app within the scrutiny of the US' prying eyes.

Since the Prism Project was launched in 2007, something that was made public thanks to Edward Snowden's courage in 2013, exposures of the US poking its nose into the private affairs of others have become commonplace. The US behavior is both that of a voyeur that can get no satisfaction unless uncovering others' secrets and that of a tyrant who wants everything under his thumb. Its motivation is clear: It wants to be all-seeing, all-hearing and all-knowing so it can reinforce, maintain and perpetuate its hegemony.

Since the cyber hounds and their overseers in Washington love their acronyms, they should give themselves a pat on the back as the USA now stands for the Universal Spying Agency.

And that frisson of excitement can be a thrill for both the Democrats and Republicans because, although the administration has supposedly changed its spots four times since the Prism project was launched, the US snooping has persisted unabated.

With its voyeurism now compulsive, Washington regards it as a normal behavior and thus assumes it is something everyone is doing. That is why it makes unsubstantiated claims that other governments have direct access to app users' data, especially users of Chinese apps.

The US always accuses others of wrongdoings that it is doing itself. Its snooping is another example of that.

What are CIA and NSA doing every day?

Snowden just held a mirror to the US surveillance state.

Instead of making amends, the US went after him so fiercely that he had to seek Russian citizenship.

Makes one wonder what the CIA and NSA are doing every day.

 

Snowden granted Russian citizenship
By REN QI in Moscow
Former contractor of US National Security Agency Edward Snowden is seen on a screen during his interview presented via video link at the New Knowledge educational online forum in Moscow, Russia, September 2, 2021. [Photo/Agencies]

Russian President Vladimir Putin on Monday granted Russian citizenship to former US intelligence contractor Edward Snowden, who exposed massive surveillance operations by the US National Security Agency and was granted refuge by Moscow.

A presidential decree published on Monday included Edward Joseph Snowden on a list of newly minted Russian citizens, at a time when relations between Washington and Moscow are at historic lows over the conflict in Ukraine.

Snowden, 39, has been living in Russia since 2013 to escape prosecution in the United States, where the authorities have for years wanted him returned to face a criminal trial on espionage charges.

While Snowden is considered by supporters to be a righteous whistleblower who wanted to protect civil liberties in the US, intelligence officials there have accused him of putting US personnel at risk and damaging national security. He faces charges in the US that could result in decades in prison.

Snowden leaked documents on the National Security Agency's collection of data passing through the infrastructure of US phone and internet companies. He also released details about the classified US intelligence budget and the extent of surveillance on foreign officials, including the leaders of US-allied countries.

Snowden said he made the disclosures because he believed the US intelligence community had gone too far and wrongly infringed on civil liberties. He also has said he didn't believe the administration of president Barack Obama, which was in office when Snowden leaked the records to journalists, would act had he made an internal whistleblower complaint instead.

In 2020, Snowden said that he and his then-pregnant wife were applying for Russian citizenship in order not to be separated from their future son in an era of pandemics and closed borders.

Russia granted him permanent residency rights the same year, paving the way for him to obtain citizenship.

"After years of separation from our parents, my wife and I have no desire to be separated from our sons," Snowden, whose name appeared on a list of 72 foreign-born individuals for whom Putin was granting citizenship, said on Twitter on Monday. "After two years of waiting and nearly 10 years of exile, a little stability will make a difference for my family. I pray for privacy for them — and for us all."

Kremlin spokesman Dmitry Peskov told news agencies that Snowden had received Russian citizenship as a result of his own request.

US State Department spokesman Ned Price said on Monday: "Our position has not changed", adding that "Mr Snowden should return to the United States where he should face justice as any other American citizen would."

Putin's decree to grant Snowden citizenship quickly led to quips on social media that the whistleblower will soon be conscripted into the Russian army to fight in Ukraine as part of the country's nationwide partial mobilization campaign.

Snowden's Russian lawyer Anatoly Kucherena told the state news agency RIA Novosti that his client could not be drafted in the mobilization because he has not previously served in the Russian armed forces. The lawyer added that Snowden's wife, Lindsay Mills, was also applying for Russian citizenship.

Agencies contributed to the story.

Cyberattack blamed on US targets China
By CUI JIA
[Photo/IC]

A Trojan horse program that is believed to have been planted by the United States National Security Agency has been found in hundreds of key information systems in China. The possible leak of information may have already occurred, a leading cybersecurity expert said on Wednesday.

In a report published by internet security company 360 Security Group's WeChat public account on Wednesday, the Trojan horse program "validator" was described as an "advanced troop in US cyberattacks against China". It was first discovered in a key information system of a Chinese research institute.

According to files leaked by former NSA contractor Edward Snowden, validator is part of a backdoor access system under NSA's FoxAcid cyberattack platform.

The Trojan implant provides unique backdoor access to targeted computers. The program, which can be deployed remotely, targets Windows operating systems from Windows 98 through Windows Server 2003.

Once the computer is successfully attacked by validator, it secretly calls back to a FoxAcid server, which then performs additional attacks on the target computer to ensure that it remains compromised long-term, and continues to provide eavesdropping information back to the NSA, an affiliate of the US Department of Defense.

Upon the discovery of validator, 360 then launched a nationwide screening. Its result showed that different versions of validator had existed in hundreds of key information systems in China for a long period of time. Furthermore, possible leaks may have already occurred, the company said in the report.

It added that validator may still be operating in some computers and continuing to send key information back to the NSA.

Also on Wednesday, China's National Computer Virus Emergency Response Center said in an analysis published on its official website that a number of Chinese research institutions have found traces of validator, which means that they may have become the targets of an NSA cyberattack.

What's more, special FoxAcid servers have been set up to carry out attacks particularly targeting China and Russia, according to the analysis.

Currently, FoxAcid remains a key cyberattack platform for Tailored Access Operations, the cyberwarfare intelligence agency under the NSA, to carry out cyberespionage operations against other countries, it added.

The center warned that governments, research institutes and businesses in other countries should also watch out for FoxAcid, which can attack any computer that is connected to the internet. Besides information theft, such attacks could also paralyze key information systems.

Page 1 of 1
Most Read Stories
Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
License for publishing multimedia online 0108263

Registration Number: 130349
FOLLOW US
成人3d动漫网站| 久久成人在线| 欧美性感美女一区二区| 榴莲视频成人app| 欧美一区 二区 三区| av免费在线观看网址| 男人天堂网在线观看| 激情六月婷婷| eeuss影院在线观看第一页| 欧美色黄视频| 中国女人内谢69xxxx免费视频| 久久国产精品偷| 在线观看国产欧美| 亚洲免费av网址| 精品国产伦一区二区三区免费| 尤物视频在线免费观看| 日韩dvd碟片| 亚洲精品高清在线| 欧美大片免费观看| 中文字幕福利片| 在线观看高清av| 手机福利视频欧美| 日韩av三区| 国产网红主播福利一区二区| 日韩精品视频在线| 情趣视频在线观看| 欧洲午夜精品| 日本成人在线一区| 91精品国产欧美一区二区18| 搞黄在线观看| 精品免费av一区二区三区| 国产一区二区在线影院| 亚洲精品一区中文字幕乱码| 中文字幕在线网| 99久久影视| 欧洲精品一区二区| 黄色av免费网站| 日韩黄色网络| 婷婷六月综合网| 嫩草影院入口一二三| 私拍精品福利视频在线一区| 亚洲欧洲日本在线| 九九热精品在线视频| 视频一区在线| 欧美人动与zoxxxx乱| 欧美裸体男粗大视频在线观看| 免费观看v片在线观看| jazzjazz国产精品久久| 成人丝袜视频网| 欧美激情小视频| 欧美黄色网页| 中文字幕不卡在线观看| 久久福利网址导航| 欧美精品另类| 一区二区在线免费播放| 亚洲欧美一区二区不卡| 国产男女av| 国产亚洲久久| 婷婷亚洲久悠悠色悠在线播放| 拍拍拍在线观看视频免费| 国产欧美日韩| 精品国产自在久精品国产| 比比资源先锋| 国产九九在线| 欧美.日韩.国产.一区.二区| 亚洲成人av在线| av网站大全在线| 99视频精品在线| 国产剧情在线一区| 国内精品久久久久久99蜜桃| 日韩欧美一级二级三级| 国产大片在线免费观看| 99国产精品一区| 看全色黄大色黄大片免责看的| 色婷婷成人网| 一本到高清视频免费精品| 永久av在线| 亚洲欧洲精品成人久久奇米网| 国产剧情演绎av| 国产成人激情av| 91社影院在线观看| 模特精品在线| 欧美日韩在线免费| 丁香综合在线| 红杏视频成人| 日本韩国一区二区| av大全在线免费看| 欧美激情一区二区在线| 99热播在线观看| 秋霞午夜av一区二区三区| 影音先锋中文字幕影院| 免费毛片在线不卡| 亚洲精品一区二区网址| 亚洲国产综合在线观看| 欧美三级电影一区| 欧美hdxxxxx| 亚洲资源在线观看| 你懂的视频在线播放| 久久女同精品一区二区| 国产bdsm| 国产91丝袜在线观看| 日日爱66.cn| 日韩影院免费视频| 正在播放亚洲一区| 日本电影一区二区在线观看 | 99国产精品视频免费观看一公开 | 蜜桃av一区二区| 久久影院免费观看| 欧美性xxx| 欧美另类videos死尸| 欧美xxxx做受欧美护士| 97久久超碰国产精品电影| 免费黄色影片在线| 日韩精品午夜视频| 欧美最猛性xxxxx喷水| 女人香蕉久久**毛片精品| 欧美激情精品久久久久| 91日韩在线| 欧美xxxx做受欧美| 日韩一区二区三区四区五区 | 久久久久久久久亚洲| 亚洲综合图色| 美女视频久久黄| 日本电影一区二区| 精品成人免费观看| 三级成人黄色影院| 麻豆精品久久久| 欧美富婆性猛交| 欧美日韩18| 麻豆国产在线视频| 开心九九激情九九欧美日韩精美视频电影 | 国产精品www.| 一本大道久久a久久精品| 亚洲一区二区三区高清| 91麻豆产精品久久久久久夏晴子| 麻豆国产91在线播放| 99热在线观看| 中文无字幕一区二区三区 | 黄色aa久久| 欧美成人一区二区三区在线观看| www.久久热| 久久久精品免费| 欧美深夜福利| 香蕉视频在线视频| 91色乱码一区二区三区| 一级片免费在线| 亚洲成av人片观看| 成人国产激情| 在线激情影院一区| 综合视频在线| 色姑娘资源站| 国产三级久久久| caoporn97在线视频| 日韩欧美一级二级三级久久久| 99精品国产高清一区二区麻豆| 欧美另类高清videos| 久久都是精品| 成人亚洲一区二区三区| 亚洲激情六月丁香| 91精品影视| www.日本久久久久com.| 亚洲欧洲综合| 国产私人影院| 欧美性猛交xxxxx水多| 精品国产亚洲一区二区在线观看| 欧美大片在线看| 青青青爽久久午夜综合久久午夜 | 久久久久久久久97黄色工厂| 狂野欧美性猛交xxxxx视频| 亚洲第一区第一页| 一区免费视频| 黄色国产网站| 欧美在线视频你懂得| 精品在线手机视频| 桃乃木香奈和黑人aⅴ在线播放| 久久精品夜夜夜夜久久| 中文字幕在线官网| 欧美精品乱码久久久久久| 亚洲一区二区三区日本久久九| 色dvdxxx| 国产精品1区二区.| xxx在线免费观看| 欧美一二三视频| 一区二区三区四区在线播放 | 欧美一级爆毛片| 亚洲永久在线| 国产婷婷视频在线| 欧美激情xxxx| 亚洲欧美一区二区不卡| 性xxxx欧美老肥妇牲乱| 成人在线电影网| 精品盗摄一区二区三区| 久久成人av少妇免费| 成人在线爆射| 任你操视频在线观看| 欧美人妇做爰xxxⅹ性高电影| 国产精品老牛| av中文在线资源库| 国产又粗又长| 9191国产精品| 香蕉久久夜色精品国产使用方法| 黑巨人与欧美精品一区| 亚洲精品久久久蜜桃| 国产精品成人a在线观看| aⅴ在线视频男人的天堂| 亚洲电影av在线| 中文欧美日韩| 理论片午夜视频在线观看| 国产美女高潮一区二区三区| 欧美日韩精品电影| 极品美女销魂一区二区三区 | 日韩欧美卡一卡二| 精品国产欧美日韩| 天天槽夜夜槽| 亚洲免费福利视频| 国产一区二区三区四| 欧洲av一区二区| 国产大奶在线| 欧美视频一区二区在线观看| 国产亚洲精品v| 蜜桃视频m3u8在线观看| 国产精品自拍在线观看| 欧美日韩国产免费| 久久av中文字幕片| 国产黄色一区| 四虎最新网站| 最近2019中文字幕第三页视频| 日本一区二区三区dvd视频在线| 亚洲激情播播| 国产高清免费在线播放| 91精品国产色综合| 色婷婷久久一区二区三区麻豆| 亚洲欧美日韩国产一区二区| 免费在线小视频| 日本丰满www色| 色妞欧美日韩在线| 国产精品一区二区在线观看不卡| 成人激情综合| 成年女人午夜毛片免费看| 中文亚洲视频在线| 亚洲一区精品在线| 捆绑变态av一区二区三区| 国产写真视频在线观看| 丁香视频五月| 欧美激情久久久久| 欧美日本一区二区三区| av电影天堂一区二区在线观看| sdde在线播放一区二区| 国产伦理精品| 黄色小视频在线播放| 欧美成人高清手机在线视频| 欧美成人一区二区三区片免费| 国产精品欧美精品| 亚洲综合日本| 98视频精品全部国产| 麻豆传媒在线免费看| 99不卡视频| 男人精品网站一区二区三区| 欧洲另类一二三四区| 久久精品毛片| 国产一区一一区高清不卡| 深夜福利免费在线观看| 中文字幕一区二区三区四区不卡| 视频精品一区二区三区| 青青草视频导航| 亚洲欧美中文字幕| 日韩欧美精品在线观看| 成人福利视频在线| 亚洲深夜影院| 日韩在线观看| av日韩在线播放| 欧美视频精品| 涩涩涩视频在线观看| 草草影院在线观看| 超碰在线免费| 久草在线资源网站| 免费人成a大片在线观看动漫| 午夜精品一区二区三区在线视频| 亚洲电影中文字幕| 欧美在线|欧美| 一区二区三区中文字幕| 99免费精品在线观看| 免费看的黄色欧美网站| 欧美久久一级| 欧美理论电影在线精品| 99久久er| 日本在线高清| www 日韩| 97香蕉久久| 天堂网在线.www天堂在线视频| 欧美国产日韩在线| 亚洲欧美激情另类校园| 欧美日韩中文一区| 亚洲国产一区二区三区| 一区二区中文视频| av福利在线导航| 影音av资源站| 色猫咪免费人成网站在线观看| 欧美性xxxx极品hd欧美| 91爱视频在线| 欧美日韩国产丝袜另类| 亚洲日本护士毛茸茸| 中文字幕在线一区| 国产精品久久久久久久久搜平片| 2024国产精品视频| 26uuu国产在线精品一区二区| www.色综合.com| 26uuu久久综合| 国产午夜精品一区二区| 中文字幕精品一区二区精品绿巨人| 欧美一区高清| 婷婷精品进入| 四虎视频在线精品免费网址| 69xxxx欧美| 日日摸夜夜爽人人添av| 亚洲成年人视频| 国产偷亚洲偷欧美偷精品| 亚洲欧美中日韩| 成人精品免费视频| 久久国产生活片100| 亚洲字幕久久| 亚州精品国产| 澳门成人av| 亚洲成人精品| 久久中文字幕电影| 中文字幕色站| 欧美区一区二区| 五月天激情综合| 国产主播色在线| 亚洲黄色高清| 国产亚洲精品久久久久动| 日本乱理伦在线| 91免费看`日韩一区二区| 一本本久综合久久爱| 高清精品视频| 欧洲一区二区三区在线| 在线视频1区| 美女诱惑一区二区| 久久久在线观看| 成人51免费| 第一福利永久视频精品| 在线观看成年人视频| 日日摸夜夜添夜夜添亚洲女人| 久久久久999| a成人v在线| 亚洲一区在线播放| 成年人免费网站| 国产婷婷精品| 美女久久久久久久久久久| 成人免费黄色| 亚洲v中文字幕| 波多野结衣中文字幕在线| 日日夜夜免费精品视频| 久久久噜噜噜久久中文字免| 日韩中文字幕视频网| 色婷婷久久久综合中文字幕| 亚洲日本伦理| 国产精品一区二区男女羞羞无遮挡 | 四虎激情影院| 欧美一区二区三区红桃小说| 在线播放视频一区| 日本亚洲精品| www久久精品| 日日干夜夜草| 在线观看一区| 两个人的视频www国产精品| 999精品嫩草久久久久久99| 色综合欧美在线视频区| 欧美性孕妇孕交| 成人网在线播放| 91在线免费观看| 欧美理论在线| 久久韩剧网电视剧| 久久精品九色| 欧美日韩精品福利| 国产黄色在线网站| 国产日韩v精品一区二区| xxx电影网| 午夜精品久久久久99热蜜桃导演| 在线观看国产精品日韩av| 狠狠久久综合| 欧美午夜精品一区二区蜜桃 | 久久裸体视频| 57pao国产成人免费| 国产aⅴ精品一区二区三区久久| 亚洲第一网站免费视频| 三妻四妾的电影电视剧在线观看| 亚洲乱码精品一二三四区日韩在线| 免费黄视频网站| 国产精品资源站在线| 国产图片综合| 韩日成人av| 久久久久久久久电影| 亚洲精品无吗| 亚洲欧洲黄色网| 国产毛片精品久久| 欧美日韩激情一区二区三区| 少女频道在线观看免费播放电视剧| 亚洲欧美偷拍另类a∨色屁股| **毛片在线网站|