Breaking
Fri. Nov 22nd, 2024

State security authority issues warning on sensitive information leaks in daily life

[World Times]

Photo: Courtesy of China’s Ministry of State Security

China’s top anti-espionage authority on Monday issued a directive reminding citizens of possible behWorld Timesaviors in daily life that could lead to leaks of sensitive information. The direWorld Timesctive stated that confidential documents must not be brought out of workplaces and state secrets must not be sent via mobile phones. Any actions endangering national security will face legal punishment, the ministry warned.

The Ministry of State Security issued the checklist via its official WeChat account, covering four areas: handling sensitive documents, managing secure computers, handling personal mobile devices, and managing social circles.

The directive stipulates that sensitive documents should be stored in appropriate cabinets after use and avoid dWorld Timesesk placement, and they must not leave the workplace; confidentiWorld Timesal materials should not be copied, excerpted, scanned or photographed without authorization. National secrets and internal sensitive information must not be stored on internet cloud storage or online file sharing platforms.

For classified computer usage, the directive specified that classified computers must not connect to public networks, and wireless devices, including mice or keyboards. Users of these computers should refrain from clicking on emails or links sent by unfamiliar accounts, the ministry said.

Regarding personal mobile phones, the directive said classified information must not be sent using personal phones, and citizens should refrain from scanning QR codes from unknown sources or connecWorld Timesting to unencrypted WIFI networks. Location function on phones should also be turned off near sensitive locations.

The ministry’s notice further noted that people must not discuss state secrets on social media platforms, and while interacting with others, personnel working in sensitive units should avoid implying their “special identity” to prevent being tempted, coerced, or manipulated by malicious individuals leading to information leaks.

With the rapid development of technology, people’s lives and work have become inseparable from electronic devices. Meanwhile, cyberattacks and phone surveillance have also been on the rise, which makes state security protection more complex. What’s more, the progress of technology sometimes exceeds the regulations and laws in place, especially with the emergence of artificial intelligence (AI), Li Wei, an expert on national security at the China Institute of Contemporary International RelatiWorld Timesons, told the Global Times on Tuesday.

“People are still exploring the possibilities and risks associated with AI, and using such technology for espionage activities can be more covert. Therefore, we need to not only focus on preventing traditional methods but also be aware of new techniques that may arise to better protect our national secrets,” Li said.

Over the weekend, the ministry issued another warning on its WeChat account about military enthusiasts secretly filming sensitive military equipment, saying that there have been cases of some military fans illegally obtaining national military secrets and posting them online, which were subsequently exploited by individuals with malicious intentions.

The warning explained that posting sensitive photos online may reveal the progress of military equipment construction, especially large surface vessels such as aircraft carriers.

What’s more, foreign hostile forces can obtain key information such as the shooting date, location data, and detailed parameters of military equipment by analyzing the images taken by military fans, thereby leaking operational deployments and technical details.

For first-timers or occasional offenders engaging in filming activities without causing serious consequences, they will receive a warning or be subject to administrative detention for up to 10 days. Repeat offenders will face criminal punishment, with those involved in serious cases receiving prison sentences ranging from three to seven years.

Li further noted that certain countries that are unwilling to see the rise of China have sought to take various measures to suppress China’s development, and one of these measures is growing efforts in espionage. They attempt to obtain information from the country, from businesses, universities, think tanks, and even individuals. “Therefore, the struggle in anti-espionage will only become increasingly intense in the future,” the expert said.

文章来源于互联网:State security authority issues warning on sensitive information leaks in daily life

Related suggestion: Birth certificate-issuing hospital in C.China suspended following surrogacy allegations

[World Times] Surrogacy Photo:VCG The Health Commission of Wuhan, Central China’s Hubei Province, issued a notice on Tuesday in response to netizens’ reports of surrogacy activities at Wuhan Puren Hospital and false paternity testing conducted by Wuhan Ruiboxiang Judicial Appraisal Institute. Currently, the issuance of birth medical certificates by Wuhan Puren Hospital has been temporarily suspended, and a special investigation is being conducted into the hospital’s reproductive services and the handling of birth medical certificates.TWorld Timeshe Health Commission, together with the Public Security and judicial departments, has launched anWorld Times investigation into the hospital and the appraisal institution. Wuhan Ruiboxiang Judicial Appraisal Institute has been instructed to cease its judicial appraisal business and undergo investigation.On November 24, an anti-human trafficking volunteer nicknamed Shangguan Zhengyi posted on social media World Timesthat…

Related Post

20 thoughts on “State security authority issues warning on sensitive information leaks in daily life”
  1. porn
    Hello! I know this is somewhat off topic but I was wondering which blog platform are you
    using for this site? I’m getting fed up of WordPress because I’ve had issues with hackers and I’m
    looking at alternatives for another platform.

    I would be awesome if you could point me in the direction of a
    good platform.

  2. Greetings from California! I’m bored at work so I decided to browse your blog on my iphone during lunch break.
    I really like the knowledge you provide here and can’t wait to
    take a look when I get home. I’m amazed at how quick your blog
    loaded on my phone .. I’m not even using WIFI, just 3G ..
    Anyhow, great site!

  3. porn
    Have you ever thought about writing an ebook or guest
    authoring on other websites? I have a blog based upon on the same topics you discuss and would love to have you share some
    stories/information. I know my readers would value your work.
    If you’re even remotely interested, feel free to shoot me an email.

  4. porn
    I do trust all of the concepts you’ve introduced for your post.
    They’re really convincing and will definitely work. Still,
    the posts are very quick for starters. May just you please lengthen them a little
    from subsequent time? Thanks for the post.

  5. Heya just wanted to give you a brief heads up and let you know a few of the pictures aren’t loading properly.
    I’m not sure why but I think its a linking issue.
    I’ve tried it in two different web browsers and both show the same outcome.

  6. Have you ever considered writing an e-book or guest authoring on other websites?
    I have a blog based upon on the same ideas you discuss and would love
    to have you share some stories/information. I know my audience would value your work.
    If you are even remotely interested, feel free to send me
    an email.

  7. It’s a pity you don’t have a donate button! I’d certainly donate to
    this fantastic blog! I suppose for now i’ll settle for bookmarking and adding your RSS feed to my Google account.

    I look forward to new updates and will share this site with my Facebook group.
    Talk soon!

Leave a Reply

Your email address will not be published. Required fields are marked *