Characteristics of the development of foreign intelligence agencies and its enlightenment to China

With China's more extensive contacts with other countries in the world, the intelligence departments of various countries have turned their attention to China more frequently. With the development of the Internet age, the spy on China's confidential information by intelligence agencies in various countries presents several characteristics:

1 is obtained through the Internet.

In addition to the hacker attacks organized by the state, recruitment websites recruit people living near military bases and hold them hostage through normal social interaction, or those who have contacts with party, government and military personnel, and infiltrate, seduce, corrode and spy on them in the name of so-called recruitment to earn extra money.

In major forums, especially military forums, under the cover of discussion, military topics are thrown out to attract military enthusiasts, and people with military work experience are photographed nearby to talk about the army, making the forum a free source of information.

Under the cover of ordinary tourists, they went to sensitive areas of our country for illegal surveying and mapping in order to serve them in wartime. For example, the so-called Japanese and American tourists captured in recent years have carried out illegal mapping in the name of tourism.

4. They spy on China's commercial and military intelligence in the name of various consulting organizations. They spy on information by tracking eavesdropping, buying, illegally and secretly invading residential offices, etc., which is particularly serious to China's business. Especially in recent years, with the development of science and technology, various spy sneak shots have appeared in the ordinary market one after another, making espionage more pervasive, especially the grim situation that personal information is illegally leaked in large quantities.

There are all kinds of fashionable electronic network terminal devices, which are also a source of information about China abroad, such as the recently reported Apple mobile phone, as well as some loopholes and backdoors in the operating system and software, and also a source of information leakage for individuals and institutions in commercial countries.

Overseas students are also the key targets of the development of spy agencies in various countries, especially the children of leaders of major party, government and military organs or their spouses who study abroad for business, and they are even more "taken care of" by spy agencies. A famous case is that Walter Han Wei spied on the Dongfeng 3 1 missile developed by the secret service of Taiwan Province Province during his study abroad.

In view of the above points, we should pay attention to strengthening the security of the Internet, especially the supervision of online social networking and recruitment websites, so as not to let the Internet become the hardest hit area for information leakage, and at the same time, we should strengthen the management and supervision of foreign institutions in China, forbid them to spy on China, strengthen the management of the surrounding environment of military bases and facilities, and pay attention to the surrounding security where the party and government organs are located. Strengthen patrol and supervision on the periphery of military bases, educate nearby residents about state secrecy, don't sneak shots and spy on military facilities with the mentality of earning extra money, and be lenient with those who unintentionally or are forced to take advantage. Don't let them get deeper and deeper because of fear. Give them relief and education warning and let them go out of their own way on their own initiative or without causing heavy losses. The most important thing is to strengthen the sense of confidentiality and discipline of party, government and military personnel, pay attention to their relatives and friends, and don't casually disclose their work to people around them. For children and spouses who study abroad and engage in confidential business, supervision should be strengthened. When necessary, officials with children and spouses studying or doing business abroad should be transferred from confidential posts, and staff in sensitive posts should pay attention to the management of their mobile phones and computer equipment. For sensitive institutions, it is forbidden to use network communication electronic terminal equipment and operating system without security inspection. Countless history has proved that the harm caused by personal life corruption to the country is immeasurable. National security involves all of us, and we have an obligation to protect state secrets from being stolen by foreigners.