The Ministry of State Security is wary of the widespread use of electronic information devices as c

Mondo Education Updated on 2024-02-23

With the vigorous development of networking, digitalization and intelligent technology, all kinds of electronic information equipment are changing with each passing day, and the Internet and the Internet of Things have been deeply integrated with our work and life, providing great convenience. However, if we are not careful, these widely used electronic information devices will be easily attacked and used by people with ulterior motives, becoming invisible "cyber espionage" and stealing sensitive information secretly.

The invisible ear: smart wearables watch in the dark

Last year, **WeChat*** disclosed the possible hidden dangers of leakage of secrets in smartphones (why smartphones were turned into "**Like smartphones, various smart wearable devices may also provide opportunities for criminals to carry out secret theft activities.

The work of the agency found that when the smart wearable device is connected to a smartphone through a wireless network or Bluetooth, the "cyber spy" can attack the device through the Internet, implant a specific "Trojan" program without the user's knowledge, and then gain control over the functions such as recording and taking pictures, so as to achieve the purpose of stealing secrets. When a person involved in secrets enters a place with a device implanted with a "Trojan horse" program, "cyber spies" can carry out secret theft activities. Even if the Bluetooth and wireless networks are disconnected when entering the secret place, the "Trojan" program can automatically turn on the functions of audio recording, video recording, and photography, and save it locally in real time, and when the device connects to the network again, the saved confidential information will be transferred.

The invisible eye: The webcam hides a mystery

Webcam is one of the most common electronic information devices in our lives, providing real-time viewing convenience for daily life and production operations, but some cameras deployed in sensitive or confidential areas will pose a threat to foreign espionage and intelligence agencies once they are used.

The work of the organs has found that some lawless elements from abroad have pretended to be traders selling special surveillance cameras, and under the pretext of installing equipment for fishermen's breeding areas free of charge, they have set up special "spy cameras" that have been cleverly camouflaged and modified in China's sensitive waters. These "spy cameras" can conduct all-round and uninterrupted monitoring of hydrometeorology and sea surface activities in a certain sea area, and transmit them to overseas servers through submarine cables or satellite signals. Through the analysis of the collected data and information, we can grasp the details of the target sea area, which poses a potential threat to China's military activities and marine economic activities.

Invisible tentacles: data monitoring equipment is dark

In the era of rapid development of information technology, all kinds of data monitoring equipment are widely used in aerospace, maritime ships, hydrometeorology and other professional fields, these equipment effectively meet the needs of production, scientific research and other needs, but also face outstanding risks and hidden dangers, once attacked and used by foreign espionage and intelligence agencies, will cause losses to the development of interests.

The work of the organs found that some foreign espionage and intelligence agencies and their ** people used free installation, use, and sharing of data and information as bait to lure relevant enterprises and individuals in China to use the professional equipment they provided; Or use its technical advantages to deliver monitoring equipment with data backhaul function to key parts and critical areas in China. If these special data monitoring equipment is successfully deployed and connected to the Internet, relevant data will be collected immediately and transmitted overseas, which will bring potential safety risks to China's relevant industries.

Trap tips

Enhance safety awareness and keep the alarm bell ringing. The broad masses of the people and relevant enterprises and units should keep their security awareness in mind, keep the alarm bell ringing to prevent it from happening, and always guard against the illegal attempts of foreign espionage and intelligence agencies to use all kinds of electronic information equipment to steal our sensitive information, so that illegal acts have nothing to carry out and nowhere to hide, and jointly protect them

Avoid security risks and strengthen self-protection. Do not click on unknown links, do not install unfamiliar software, do not use suspicious devices, regularly check and kill viruses and upgrade the system of mobile phones, especially when entering confidential places, put mobile phones and smart wearable devices into isolation cabinets to avoid the risk of leakage from the source.

Improve the safety system and strengthen risk management. Relevant enterprise units should raise awareness of maintenance, fulfill the obligation of maintenance, comprehensively use supervision and inspection, risk assessment and other means to improve the level of data security protection, enhance data security situational awareness, strengthen data security risk monitoring and management, and promptly report suspicious situations.

*:* WeChat official account).

For more exciting information, please contact the application market**"Jimu News" client, do not be authorized**, welcome to provide news clues, and pay once adopted.

Related Pages