1, cell phone in the call state lost confidentiality
Mobile phone communication transmission system is an open wireless communication system, communication signals are transmitted in the air, as long as there is the appropriate technical equipment, you can intercept and listen to any time, any place, any person's call information.
At the same time, cell phones can be connected to the Internet wirelessly, so talking about classified content in a cell phone call or sending classified information with a cell phone can easily lead to leakage.
2, the cell phone in the standby state of loss of confidentiality
In the standby state, the cell phone and communication networks to maintain an uninterrupted exchange of signals and electromagnetic spectrum, it is very easy to use reconnaissance techniques to find, identify, monitor and track the target, and can be located on the target, from which valuable information.
Some cell phones have a covert call function that allows them to change from standby to talk without ringing and without any display, thus transmitting the surrounding sound.
3, the cell phone in the state of loss of confidentiality
The cell phone in the state of loss of confidentiality in the state of loss of confidentiality in two cases, one is the user to turn off the cell phone, hold a special instrument of the personnel, but still can be remotely open the cell phone end of the microphone, eavesdropping on the microphone within a limited range of any conversation.
The other is that some cell phones in the chip implanted in the receiving and sending function of the receiving device. This type of cell phone is not turned on or is not on standby, but as long as it has a battery, the receiving device on the cell phone will be able to pick up and send out voice messages within its effective range.
4, out of the old cell phone leads to the loss of confidentiality
The old cell phone in the information has been deleted, but can still be through the special technology of its stored information to recover. The elimination of classified cell phones should be destroyed as a classified carrier using specialized technology.
Security and confidentiality measures for the use of cell phones
First of all, it is necessary to comply with all the relevant regulations and requirements of the unit's confidentiality department. For example, do not talk about confidential matters in the cell phone, do not deal with sensitive information, do not use the cell phone in confidential key parts and confidential activities. These regulations and requirements are the bottom line of prevention set by the confidentiality department according to the current threat and must be strictly observed.
Secondly, personal information should be protected when using the mobile Internet. In particular, party and government workers, because of their special status, should avoid disclosing personal information and work content in online applications. They should not talk about or share their work content in WeChat and Weibo to avoid being locked out of the network and their real identities; and they should not use cloud services to store information about their personal lives and work, etc.
Finally, take precautions when using cell phones. Try to use domestic cell phones; turn off the automatic backup, location tracking and other monitoring functions in the system settings of your cell phone; don't connect to WiFi at airports, stations, hotels, restaurants and other public **** places; turn off the Bluetooth and other wireless data connectivity settings; and download APPs only from regular and reliable apps e-marketplaces.
Can soldiers bring smart bracelets
Soldiers can wear smart bracelets, but there are restrictions. It is strictly prohibited for soldiers and officers to use the recording, positioning, photo-taking, wireless transmission and other functions of smart devices in the camp and during the mission; it is strictly prohibited to connect smart wearable devices to the Internet.
Smart bracelets do bring convenience to life, and can be used to develop training programs in a more targeted manner through the bracelet's sports monitoring function. But in the use of such smart wearable devices, must pay attention to confidentiality, in the uploaded data if some ulterior motives to be utilized, it is likely to cause loss of confidentiality problems. In addition, many smart bracelets also have recording, talking, wireless transmission and GPS positioning function, in wartime may "change" to become the enemy's bug or tracker.
Expanded information:
The People's Liberation Army Secrecy Regulation Article 26 of the public publication and distribution of military newspapers and periodicals, books, maps, audio and video products, public display of military equipment, national defense science and technology achievements, shall comply with the relevant provisions of confidentiality, shall not disclose military secrets. To be publicly published military academic, defense science and technology papers and reflect the situation of the army of all kinds of manuscripts, must be submitted by the author's unit or the competent unit involved in the matter of the manuscript for confidentiality review.
Article 27 of the leading cadres at all levels shall exemplary compliance with the provisions of confidentiality, shall not disclose military secrets to family members, relatives and friends and other unrelated persons.
Article 28 The leakage of secrets shall be promptly reported to the department in charge of confidentiality work and the relevant departments at higher levels, and shall promptly ascertain the content of the leaked military secrets, their classified level, and the scope and extent of the harm caused or likely to be caused, and take remedial measures.
China's military network - the use of smart bracelets need to be cautious
People's Daily Online - smart wearable devices to bring the "hidden danger of leaks" should not be underestimated
Personal information exposure. Cell phone is the most traces of personal use of supplies, brought to the leakage of confidentiality will have the risk of leaking personal information. Leakage is when a person tells someone a secret and the latter reveals it to others.
"Wear" to the hidden dangers of children's smartwatches, in the end to buy? Why?
"Wearing" a children's smartwatch with hidden dangers can be a good idea, but it's important to buy one with simple features, and many smartwatches do have some hidden dangers. First of all, many children's smart watches said to have the function is too complete, will affect the child's attention. Second, the smartwatch screen is too small, which will affect the children's eyesight. In addition, smart watches leak privacy and are not safe for children.
Today's children's smartwatches have almost become the standard for many children, and every child basically has a smartwatch on their hands, and some of the children's smartwatches look so cool and functional that they can be said to be a miniature version of a smartphone. For smart watches, in fact, there are a lot of safety hazards, I personally think you can buy, but must buy suitable for children. The reason why I say it has hidden dangers is mainly for the following reasons.
First of all, many children's smartwatches said to have too full of functions, which will affect the child's attention. Nowadays, smartwatches are getting cooler and cooler, not only can they take photos, but also listen to songs, videos, chat on WeChat, and even shop, these functions are equivalent to a mini version of a smartphone, they will believe in the child's attention, and the child will find it hard to concentrate on the lessons in class.
Secondly, smartwatch screens are too small and can affect children's eyesight. Affecting children's eyesight does not have to be just tablets and cell phones, this small smart watch will also affect the children's eyesight. Children's eyes focus on the small screen of the smartwatch for a long time, and the light source is also relatively dark, so in the long run, the eyesight will decline. Coupled with the fact that children are now becoming more and more dependent on smartwatches, the impact on their eyesight is even more serious.
In addition, smart watches leak privacy and are not safe for children. Because smart watches actually have some loopholes, which may lead to children being monitored by hackers in real time, access to his daily whereabouts trajectory and environmental sounds. For the child, it is equivalent to being watched himself. And small children can take photos and send friend circles through the smart watch, then it is easy to lead to privacy leakage, the insecurity factor increases.
When we pick a smartwatch, try to choose one with fewer functions, and parents should also supervise their children and use the smartwatch correctly. And the relevant organizations in the product quality level, but also to make some standard norms. These are my personal views on whether to buy a smart watch.
What are the hidden dangers of cell phone leakage
Mobile phones bring convenience to people's lives, but also bring great risks to information security. Especially in key departments involving state secrets, key parts, cell phone communication has become a major leakage of confidentiality can not be ignored. 1, cell phone in the call state leakage of cell phone communication is an open electronic communication system, as long as there is a corresponding receiving equipment, will be able to intercept any time, any place, anyone's call information. 2, cell phone in the state of standby leakage of experts pointed out that even if the cell phone in the state of standby is not absolutely safe. is not absolutely safe. Because in the standby state, the cell phone should also be maintained with the communication network uninterrupted signal exchange. In the electromagnetic spectrum generated in these processes, people can easily use reconnaissance and surveillance technology to discover, identify, monitor and track targets, and can locate the target, from which valuable information is obtained. According to relevant experts, some cellular phones have the function of covert call, which can be changed from standby to call status without ringing or any display, and collect the surrounding sound to be emitted. Even if the user does not use the phone, but if you keep the standby state, people can be through a simple telecommunication dark, remote control of the phone's microphone to eavesdrop on any conversation within the effective range. 3, cell phone leakage in the shutdown state cell phone leakage in the shutdown state there are two kinds of cases: one is the use of special equipment, you can remotely open the phone's microphone to eavesdrop on any conversation within the effective range of the microphone. The other is in the cell phone manufacturing process in the chip implanted in the receiving and transmitting function device. As a result, even though this type of cell phone is not switched on, as long as there is a battery, the cell phone's microphone can receive and send out voice messages within its effective range. The information is transmitted to the ground processing system via a geosynchronous satellite or a nearby relay station. (Information Office Series)
Why can't I wear and use smart wearable devices in classified places?
Smart wearable devices basically have wireless interconnection, positioning, and even ingesting over the communication function, the leakage of confidentiality is a great danger.