Propaganda, disinformation, and censorship in Western media

Status
Not open for further replies.

SanWenYu

Captain
Registered Member
The US tries o drive a wedge between China and SEAN on Mekong river water resources. The so called "Mekong Dam Monitor" project is created by the US state department in December, 2020.

Please, Log in or Register to view URLs content!

Please, Log in or Register to view URLs content!

MDM slanders China with false data. It alledges that dams built upstream of the Mekong river in China are causing water shortage in the downstream countries.

They had to make a correction after their "mistakes" in dam water mark data were pointed out by Chinese scientists. But even these "corrected" data are still far from correct.

近年来,美国多次炒作湄公河水资源问题,试图挑拨地区国家关系。美国国务院资助的“湄公河大坝监测”项目近日更是频频污蔑“中国大坝造成东南亚地区国家缺水”。

《环球时报》本月初独家报道称,清华大学水利系团队使用卫星遥感监测技术和高精度实测数据发现,该项目发布的所谓“监测数据”与实际情况相去甚远,误差高达3-10米,但该项目被“打脸”后发布的修正数据还是存在较大误差。
当地时间3月2日,史汀生中心在其官网发文提及《环球时报》的相关报道,承认“湄公河大坝监测”项目数据存在错误,并称已在专业平台“Planet Labs”上用高分辨率卫星图像进行双重查验后修正了相关数据。

但是,清华大学水文专家向《环球时报》表示,即便是该项目修正后的数据也和真实水位测量值存在高达8米的误差,2020年4月8日这个时间点的测量数据正是其中一例。​

MDM accuses China for lack of transparency in sharing dam water mark data, ignoring the fact that China has started sharing such data with the downstream countries since November, 2020, even before MDM itself was created.

China has also been publishing the water mark data in real time on this open website: 澜湄水资源合作信息共享平台
Please, Log in or Register to view URLs content!


事实上,中国外交部早在该项目正式启动之时就
Please, Log in or Register to view URLs content!
,自2020年11月起,中国就开始向湄公河国家提供澜沧江全年水文信息,澜湄水资源合作信息共享平台也早已开通运行。

Please, Log in or Register to view URLs content!
 

SanWenYu

Captain
Registered Member
China really need to step up in the information warfare domain. CGTN need to be cleaned up of the liberals and be more like Global Times. CGTN is a massive failure to counter Western propaganda.
CGTN is a waste. But the problem is beyond CGTN.

Ever since CPC stopped exporting ideology, its propagada organs have turned inward. Many oversea branches have either become copy machines of the western state/corporate outlets or even become incubators for dissenters and traitors.

If CGTN, or any CPC media outlet, is not allowed to promote PRC's politic system oversea, and does not have the mandate to expose and criticize the dark sides of the competing systems for fear of "China threat", what good can we expect CGTN to do?
 

supercat

Major
Hypocrisy:

Censorship: you do not see this kind of news in Western mainstream media. It's also a form of censorship to undermine the credibility of a tweet by attaching a specific label to it.

Preposterous anti-China propaganda:

Like the former USSR, China is under absolutely relentless, sustained attacks by Western media. Here is an example of the typical Cold-War style propaganda:
 
Last edited:

SanWenYu

Captain
Registered Member
On April 1, The Times newspaper of the Sunset Empire made a lie accusing that China launched massive cyber attacks on Ukraine before Russia started its military action in late February. The newspaper falsely claims that the accusation came from the Security Service of Ukraine, or SBU.

0.png

报道称,乌国家安全局“透露”中国的“网络攻击”早已开始,且在2月23日,即俄对乌展开”特别军事行动”前一天“达到顶峰”。

《泰晤士报》声称乌国家安全局与其“分享”了一系列“情报备忘录”,其中一份列出了黑客对乌克兰核基础设施的攻击。备忘录称:“特别值得关注的入侵事件包括针对国家核监管局的计算机网络刺探(CNE)活动……中国网络程序发起的特定CNE活动包括数千次攻击,指向至少20个不同的漏洞。”

But SBU, in its statements specifically made on multiple social media, denied having provided such info to any news outlet. In the statements, SBU said that it does not have any data about the attacks and it is not investigating the alleged attacks.

"Whatever the newspapers has, it's their own investigation. We have nothing to do with it", said SBU.

对于《泰晤士报》披露的内容,乌国家安全局4月2日在推特、脸书、Telegram等社交媒体发文澄清,该机构没有向任何媒体提供官方消息,称中国在俄罗斯“入侵”之前对乌克兰进行网络攻击。

乌国家安全局强调,《泰晤士报》自己的“调查结果”,与该机构无关,乌国家安全局目前没有这类数据,也没有就此行为进行调查。
1.png2.png

Some twitter users are demanding for explanation.

3.png4.png

China's own national ERT for internet security has found that, since Feburary, there have been increasing coordinated cyber attacks on machines in China. Most of the attackers had IP addresses from within the US, rest from Germany and Netherland etc. Once hijacked by these attackers, the victim machines were used to launch attacks on targets in Russia, Belarus and Ukraine. 87% of the targets were in Russia.

中国国家互联网应急中心近期检测发现,2月下旬以来,中国互联网持续遭受境外组织网络攻击,其通过攻击控制中国境内计算机,进而对俄罗斯、乌克兰、白俄罗斯进行网络攻击。经分析,这些攻击地址主要来自美国,也有少量攻击地址来自德国、荷兰等国家,87%的攻击目标是俄罗斯。

Please, Log in or Register to view URLs content!
 
Status
Not open for further replies.
Top