Where do "digital" spies come from? What moves are there? The National Security Department is bottoming out!

Release time:Apr 16, 2024 21:07 PM

The current rapid development of network technology, coupled with the emergence of new things such as 5G, metaverse, and ChatGPT, makes people exclaim that the future has arrived. Along with it comes a large number of hidden network security risks and hidden dangers.

As a specialized agency for maintaining national security and a competent department for anti espionage work, the national security organs continue to strengthen the tracking, monitoring, and prevention of related activities, effectively safeguarding our network security, and allowing "digital" spies to be exposed in their true form and have nowhere to hide!

Where did the attack come from?

Heavy spy shadows thousands of miles away

Currently, cyberspace has become an important battlefield for foreign espionage and intelligence agencies to carry out cyber espionage work against China, and China has become the main victim of sustained high-level threat attacks. In recent years, national security agencies have discovered dozens of espionage and intelligence agencies from different countries and regions conducting cyber attacks within our territory. They may form specialized agencies, establish "cover companies", develop professional means to directly carry out cyber attack infiltration operations against me, or use "behind the scenes manipulation" and "service outsourcing" to instruct professional company institutions and hacker organizations to carry out operations, or use "purchasing" data, vulnerabilities, tools and other methods to lure domestic institutions and personnel to carry out operations. Some countries also use the pretext of "going out hunting" to persuade other countries to jointly implement them.

Who is the potential target?

Knife and sword shadows within reach


Where do "digital" spies come from? What moves are there? The National Security Department is bottoming out!

From the perspective of attack targets, in addition to continuing to carry out cyber attacks on traditional targets such as government agencies and classified units in our country, foreign espionage and intelligence agencies are also constantly strengthening their attack infiltration into our key information infrastructure and major infrastructure network systems, and further extending their black hands to institutions such as higher education institutions, scientific research institutions, large enterprises, high-tech companies, as well as corporate executives, experts and scholars.

From the perspective of the attack situation, it involves various software systems such as email, office automation, user management, security protection, as well as various hardware devices such as servers, computers, switches, routers, as well as civilian household devices such as mobile phones, WIFI, cameras, etc., which can be described as "no hole, no entry".

What techniques are there?

A highly threatening "professional team"

Unlike general hackers in society, foreign espionage and intelligence agencies have the ability to mobilize resources, strong technical capabilities, rich experience in network attack activities, and more covert methods.

Some of them collect and steal personal information data, use social engineering to accurately forge phishing emails and websites targeting their target audience for deception attacks; Some directly attack and infiltrate me by mining and purchasing critical software systems and hardware devices with zero day vulnerabilities; Some first invade and control the network of our supply chain enterprises or operation and maintenance service institutions, and then use this as a "springboard" to attack downstream user units; Some have infiltrated and controlled our civilian and household network equipment on a large scale, establishing "positions" to carry out cyber attack activities against me and other countries. Behind highly professional and covert attack techniques, there are often more dangerous attempts!

Common methods of overseas cyber attacks on me


Where do "digital" spies come from? What moves are there? The National Security Department is bottoming out!

How much harm does it cause?

Security issues that cannot be underestimated

The network attack activities of overseas espionage and intelligence agencies are large-scale, deep in scale, and highly persistent. Once the network systems of our country's government agencies, confidential units, and other important enterprise institutions are attacked or invaded, the stored and processed state secrets, important data, file materials, etc. may be completely wiped out. Once my critical information infrastructure and major infrastructure network systems are invaded and controlled, they will face the risk of being interfered with and destroyed at any time. Foreign espionage and intelligence agencies engage in cyber attacks to steal commercial secrets and intellectual property rights of our corporate institutions, monitor the content of our citizens' online communication for a long time, and seriously infringe upon the legitimate rights and interests of our citizens and organizations.

Restoration of Network Attack and Stealing Scenes of Overseas Spy Intelligence Agencies

Need firm ideals and beliefs, micro videos | passionate youth spirit | thoughts | youth
Need firm ideals and beliefs, micro videos | passionate youth spirit | thoughts | youth

The fiery youth requires firm ideals and beliefs——The CPC

Minister of Ukraine called it "unbelievable", foreign media: nearly half of Kiev's air defense tunnels cannot be used for time | inspection | Kiev
Minister of Ukraine called it "unbelievable", foreign media: nearly half of Kiev's air defense tunnels cannot be used for time | inspection | Kiev

According to the report on the website of Singapore's Lianhe Zaobao on June 5, a preliminary inspection conducted by the Ukrainian government showed that nearly half of the air raid shelters in the capital Kiev were closed or did not meet the use standards. Ukrainian Minister of Strategic Industry, Kameshen, called this "unbelievable". According to reports, on June 4th local time, Cameron stated that out of the 1078 air defense facilities visited on the first day of inspection, 359 were not ready, 122 were locked, and only 597 were operational. He said on social media "Telegram", "The fact that only half is open and ready is unbelievable to me. When we and the Mayor of Kiev selectively inspected the air raid shelters in the Obolon district, the vast majority of them were closed." The report stated that Cameron said the inspection work would continue. On June 1st,

Taiwan media pays close attention to the "Incense Gathering": Taiwan related issues and speeches by the defense ministers of China and the United States are the focus of attention. China | Minister of National Defense | Incense Gathering
Taiwan media pays close attention to the "Incense Gathering": Taiwan related issues and speeches by the defense ministers of China and the United States are the focus of attention. China | Minister of National Defense | Incense Gathering

The 2023 Shangri La Dialogue will conclude in Singapore today, with representatives and scholars from more than 40 national defense departments, including Chinese State Councilor and Defense Minister Li Shangfu and US Defense Secretary Austin, attending the dialogue to explore ways to maintain peace and stability in the region. The speeches of the defense ministers of China and the United States and their movements at the conference have attracted attention from all parties, and the focus of Taiwan media has been on the Taiwan Strait issue. Taiwan media has been closely following the "Incense Gathering". Several Taiwanese media outlets have continued to report on the event, and Taiwan's United Daily News has focused on China's Defense Minister Li Shangfu's speech titled "China's New Security Initiative". The article cites the speech content and emphasizes that if anyone dares to split Taiwan from China, the Chinese military will not hesitate at all and will not fear any opponents. No matter how much the cost is, they will resolutely uphold it

What kind of grievance does the United States pretend to be?, Xiake Island | Termination: The defense ministers of China and the United States did not fulfill their request. US | China US | United States
What kind of grievance does the United States pretend to be?, Xiake Island | Termination: The defense ministers of China and the United States did not fulfill their request. US | China US | United States

The United States has been wronged again. Recently, the US Department of Defense has been complaining everywhere, saying that China has rejected the US request for a meeting between the US and China defense ministers. Subsequently, American media intervened and claimed that the US had made several weeks of efforts to ensure this meeting, Barbara... At first glance, it seems that China is not giving the US the opportunity and face, but since it is the US who is complaining, the matter needs to be pondered. At present, the 20th Shangri La Dialogue is being held in Singapore, with Chinese State Councilor and Defense Minister Li Shangfu invited to attend. The proposed "China US Defense Ministers Meeting" by the US aims to have US Defense Ministers Austin and Lee Sang fu meet in Singapore. Originally, the debut of the newly appointed Chinese Defense Minister's "Xianghui" was highly anticipated. But the Chinese side hasn't said much yet, and the United States has taken advantage of the heat first - on May 30th, the United States

Four Questions on the US Debt Crisis Observation | Xinhua News Agency | Crisis
Four Questions on the US Debt Crisis Observation | Xinhua News Agency | Crisis

Beijing, June 2 (Xinhua) - The United States Senate voted on the 1st to pass a bill on the federal government's debt ceiling and budget, which will take effect after being signed by President Biden. Although this round of US debt ceiling crisis has temporarily eased, the outside world has increasingly questioned the origin, capital flow, sustainability and huge risks of the huge US debt. These issues are intertwined with issues such as US dollar hegemony, US party struggles, and US corruption, becoming a "gray rhinoceros" that threatens global economic and financial security. In response to the four major concerns about the US debt crisis, which have been highly concerned by the outside world, Xinhua News Agency reporters have traced the root cause and clarified its origins. On June 1, pedestrians walked past the "treasury bond Clock" in New York. "Treasury bond clock" is a large counter, which is more real-time

Decision to appoint Chen Jie as Vice Mayor, Report on the Fourth Meeting of the Standing Committee of the 16th Shanghai Municipal People's Congress | Situation | ShanghaiStrictly abide by the Party Constitution, Party rules, and Party discipline. The Party Group of the Standing Committee of the Municipal People's Congress, the Party Group of the Municipal Government, and the Party Group of the Municipal Political Consultative Conference held separate meetings to firmly support the Central Committee's decision on the Party Central Committee | Politics | Party GroupCan Shanghai connect with the greenways of these cities? Official: Proposed Preparation of Greenway Construction Standards for the Yangtze River Delta | Standards | Yangtze River DeltaChen Jining, Gong Zheng, and colleagues from the Standing Committee of the Municipal Party Committee exchanged their experiences and insights on thematic education research based on their respective experiences. Education | Municipal Party Committee | ThemeThe Shanghai Municipal Committee of the Chinese People's Political Consultative Conference awarded commemorative plaques to members and standing committee members of the 13th National Committee of the Chinese People's Political Consultative Conference who are no longer re elected in ShanghaiPropose ideas and measures around releasing domestic demand, and the Chairman's Meeting of the Municipal Committee of the Chinese People's Political Consultative Conference deliberates on key research reports and measures | ideas | research