国家安全
Search documents
加密软件成境外间谍新掩护 国家安全机关发布提醒
Yang Shi Xin Wen· 2025-08-30 01:59
Core Viewpoint - The use of general encryption communication software poses significant risks by providing cover for foreign espionage activities while also protecting information [1][2]. Group 1: Espionage Activities - Foreign intelligence agencies are utilizing general encryption communication software as a "dark channel" for infiltration and subversion, spreading extremist ideologies, false information, and organizing illegal activities [2]. - The software's concealment features are exploited to recruit and corrupt domestic personnel, as well as to steal state secrets, thereby threatening national security [2]. Group 2: Data Leakage Risks - Some users of general encryption communication software exhibit weak security awareness, mistakenly believing that encrypted calls are "absolutely safe," leading to the unintentional sharing of sensitive information [2]. - Original data such as call participants, duration, and frequency are often not completely hidden, increasing the risk of data leakage under the guise of security [2]. Group 3: Illegal Activities - Certain criminals are using the concealment properties of encryption communication software to facilitate illegal fund transfers, attempting to evade financial regulations [2]. - There are instances where encrypted communication is used to transmit sensitive information and trade state secrets, treating national core interests as commodities, which poses severe threats to national security [2]. Group 4: Security Recommendations - It is emphasized that maintaining data security is a collective responsibility, urging individuals and organizations to enhance their data security awareness and fulfill their cybersecurity obligations [4]. - Establishing communication tool usage norms and conducting regular anti-leakage education and technical training is recommended to improve security prevention capabilities [4]. - Caution is advised in selecting communication tools, with a strong recommendation against using unverified foreign encryption communication tools [4]. - Citizens are encouraged to report any activities that threaten national security through designated channels [4].
北京涉军区域多次出现无人机,疑似违规拍摄阅兵训练!2人被查
中国基金报· 2025-08-29 02:22
的,在未经相关部门批准情况下,多次在我军 事敏感区域周围违规放飞无人机。最终,有关 部门对其违规行为进行了行政处罚,国家安全 机关依照《公民举报危害国家安全行为奖励办 法》对举报人给予了现金奖励。 来源:国家安全部 为确保阅兵活动安全,北京市人民政府先后发 布《关于在本市部分行政区域内禁止放飞、升 放影响飞行安全的鸟类动物和其他物体的通 告》《关于增设净空限制区的通告》,自 2025年7月16日零时起至9月3日24时止,将 东城、西城、朝阳、海淀、丰台、石景山、通 州、昌平、门头沟等9个区的行政区域设置为 净空限制区,明确在净空限制区内禁止升放无 人 机 、 穿 越 机 等 影 响 飞 行 安 全 的 物 体 ; 自 2025年8月29日零时起至9月3日24时止,将 大兴、顺义、房山、平谷、怀柔、密云、延庆 等7个区的行政区域增设为净空限制区,在增 设的净空限制区内,禁止升放一切未经批准的 无人机、穿越机以及风筝、气球、孔明灯等影 晌飞行安全的物体。 广大人民群众应自觉遵守相关法律法规,如发 现私自拍摄敏感军事装备的违法行为或违规放 r | 智 中 | 加 | 中 中 | 心儿八马驭肌工命线系, 马 巴巴 L ...
无人机疑似拍摄阅兵军机训练,国家安全部通报提醒
Di Yi Cai Jing· 2025-08-29 01:46
Core Points - The National Security Agency has imposed administrative penalties on individuals for unauthorized drone flights near military sensitive areas [1] - The agency received reports of drones flying around military training sites, prompting an investigation that revealed violations by military enthusiasts [1] - Cash rewards were given to whistleblowers under the regulations for reporting national security threats [1] Regulatory Measures - The Beijing Municipal Government has issued notices to prohibit the release of drones and other objects that may affect flight safety in certain administrative regions [1] - From July 16, 2025, to September 3, 2025, nine districts in Beijing will be designated as no-fly zones for drones and other objects [1] - Additional no-fly zones will be established in seven other districts from August 29, 2025, to September 3, 2025, prohibiting all unauthorized aerial activities [1] Public Compliance - The public is encouraged to adhere to laws and regulations regarding the filming of sensitive military equipment and unauthorized drone flights [2] - Citizens can report violations through various channels, including a dedicated hotline and online platforms [2]
军迷违规拍摄阅兵军机训练被举报 注意这些区域为净空限制区
Xin Jing Bao· 2025-08-28 23:56
Core Points - The 80th anniversary of the victory in the Chinese People's Anti-Japanese War and the World Anti-Fascist War will be commemorated with a military parade in Beijing on September 3, showcasing new military equipment [1] - National security agencies have received reports of unauthorized drone activity near military-sensitive areas, leading to administrative penalties for individuals involved [1] - The Beijing municipal government has established no-fly zones in several districts to ensure the safety of the military parade, prohibiting the launch of drones and other flying objects [2] Group 1 - The military parade on September 3 will feature new generation military equipment, attracting attention from military enthusiasts [1] - Reports of unauthorized drone flights near military training areas have prompted investigations and penalties for those involved [1] - The establishment of no-fly zones in nine districts from July 16 to September 3 aims to prevent any interference with the military parade [2] Group 2 - Additional no-fly zones will be implemented in seven districts from August 29 to September 3, further restricting unauthorized aerial activities [2] - Citizens are encouraged to report any illegal drone activities or unauthorized filming of military equipment through designated channels [2]
德媒渲染中国风电设备存在风险,欧盟中国商会为中企清洁技术辩护
Huan Qiu Shi Bao· 2025-08-28 22:41
Group 1 - Concerns over China's influence have led a German investment firm, Luxcara, to withdraw its plan to purchase Chinese wind turbines for a North Sea wind farm project, opting instead for Siemens Gamesa's equipment [1][2] - Luxcara's decision was described as being based on operational considerations and the potential for enhanced safety, despite claims of external pressure and public controversy [1][2] - The EU Chamber of Commerce in China criticized the exclusion of Chinese companies based solely on origin, arguing it undermines efficiency and the established goals of open and sustainable development in Europe [1][2] Group 2 - Mingyang Smart Energy, the Chinese manufacturer initially involved in the project, stated it would explore development opportunities in Germany despite withdrawing from this specific project [2] - Luxcara emphasized that all critical components for the wind farm would be sourced from European manufacturers, aiming to mitigate safety concerns raised by some German media and think tanks [2] - The EU Chamber of Commerce in China expressed regret over the portrayal of Chinese clean technology companies as security risks, asserting that they meet EU regulations on cybersecurity and critical infrastructure [2] Group 3 - Luxcara has informed the German Federal Ministry of Economics about the supplier change, although a formal agreement with Siemens Gamesa has not yet been finalized [3] - The German federal government is concerned about escalating trade disputes with China while also recognizing the importance of Chinese affordable energy technology for Germany's renewable energy expansion plans [3]
德国批准设立国家安全委员会
Yang Shi Xin Wen· 2025-08-27 18:07
当地时间8月27日,德国联邦政府在举行的内阁会议上批准设立国家安全委员会。该委员会由德国总理 领导,由包括财政部长、外交部长、国防部长在内的9位部长组成,初期将下设13个岗位,对接德国联 邦各部委、安全部门、各州以及外部专家。 德国政府网站信息显示,德国国家安全委员会主要有三大核心任务: 德国总理默茨在内阁会议后的记者会上表示,德国对设立国家安全委员会已经争论了30年。该机 构将成为德国政府处理国家安全跨领域问题的核心平台,将统筹内部、外部、经济与数字安全, 为德国政府做出安全决策提供参考和建议。默茨表示,安全从来不是单一部门的职责,国家安全 委员会的设立使得制定前瞻性战略成为可能,将成为德国政府推行整体安全政策的重要基石。 (文章来源:央视新闻) 整合梳理政府各部门信息,基于对国家安全态势的综合研判,筹备作出政治决策; 开展战略性前瞻规划,识别中长期威胁,制定相应预案,其中包括对《国家安全战略》进行持续 修订; 组织进行危机模拟和安全政策演练。 ...
这些跨境寄递行为可能违法 国家安全部提示四大风险
Yang Shi Wang· 2025-08-26 00:30
Core Viewpoint - The article emphasizes the increasing risks associated with cross-border parcel delivery due to varying laws and customs regulations across countries, highlighting the need for vigilance and awareness among citizens engaging in such activities [1] Group 1: Risks in Cross-Border Delivery - Sensitive information stored on digital carriers like hard drives can lead to national security threats if intercepted by foreign entities [2] - Mailing biological materials without understanding the destination country's laws can result in legal consequences, as evidenced by recent customs seizures of illegal packages [2] - Receiving unknown parcels, especially those with discrepancies in labeling or signs of tampering, poses significant risks and should be approached with caution [2] Group 2: Prohibited Items in Daily Life - Common items may be classified as prohibited during cross-border shipping, including books with political, racial, or violent content, as well as alcohol, meat products, e-cigarettes, and drugs [3] - Products infringing on intellectual property rights, such as counterfeit clothing and pirated software, can lead to confiscation and legal penalties [3] Group 3: Safety Measures and Regulations - Citizens should familiarize themselves with relevant laws and regulations before engaging in cross-border shipping to avoid unintentional violations [4] - Maintaining a high level of risk awareness is crucial, including avoiding the mailing of unknown items and selecting reputable international courier services [4] - Delivery companies must enforce strict protocols for package inspection and identification to prevent illegal items from entering the shipping channels [4] - Enhanced regulatory measures are necessary to improve inspection efficiency and combat illegal mailing activities, alongside public awareness campaigns [4] Group 4: Reporting Suspicious Activities - Citizens are encouraged to report any suspicious activities related to cross-border mailing that may threaten national security through designated channels [5]
隐瞒给间谍当“线人”过往欲“上岸”?国安部:法网难逃
Yang Shi Wang· 2025-08-20 01:32
Group 1 - A domestic employee from an energy company, referred to as Yu, was involved in espionage activities after being approached by an agent from a foreign intelligence agency [2][3] - Yu collected sensitive internal information related to China's energy security in exchange for monetary compensation, despite knowing the implications of his actions [2][4] - After resigning from the energy company in 2019, Yu attempted to conceal his past during a recruitment process for a government position, but was ultimately discovered [3][4] Group 2 - The case highlights the importance of adhering to national security laws, as individuals engaging in espionage can face severe legal consequences [4][5] - The National Security Agency emphasizes the need for citizens and organizations to fulfill their obligations in maintaining national security and to report any suspicious activities [5]
“争抢英特尔”背后:全球核心资产正经历一场重估
阿尔法工场研究院· 2025-08-20 00:04
Core Viewpoint - The value of core assets is being redefined by national security, supply chain stability, and energy independence as capital from the US, France, Japan, and emerging economies enters the market [2] Group 1: Investment Activities - SoftBank reached a $2 billion equity investment agreement with Intel, purchasing shares at $23 each [3] - The US government is considering converting part of the $10.9 billion subsidy under the CHIPS and Science Act into approximately 10% equity in Intel, potentially making it the largest shareholder [4] - This competition for Intel highlights its strategic role in the expansion of the US advanced semiconductor manufacturing and supply chain [4][5] Group 2: Strategic Importance of Intel - Intel's value has transcended its individual corporate worth, becoming a foundational infrastructure for US technological sovereignty [5] - The hidden value in Intel's asset package includes its role as a "national security vehicle" and "supply chain stabilizer" [6] - The US government's plan to convert subsidies into equity reflects a non-market valuation based on Intel's strategic necessity rather than its current profitability [6] Group 3: Global Capital Movements - The shift in capital movements indicates a global revaluation of core assets, with similar actions seen in France, Japan, and Saudi Arabia [7] - The French government has fully nationalized EDF, while Japan's national fund invested 900 billion yen in JSR, a leader in photoresists [7] - Central banks in Beijing and Warsaw are accumulating gold, indicating a trend towards securing national resources [7] Group 4: Changing Asset Valuation Logic - The previous focus on efficiency and globalization is being replaced by a new paradigm prioritizing national security, supply chain stability, and energy independence [9] - The traditional metrics of market discount rates and capital returns are being diminished in importance, with new core indicators emerging [9]
国安部:这也泄密?嗯!
Guan Cha Zhe Wang· 2025-08-15 23:42
Core Viewpoint - The increasing frequency of academic research and communication has made confidential academic research a crucial aspect of national security, as the theft of core technologies and strategic research results can severely harm national interests [1] Group 1: Leakage Risk Points - Information device vulnerabilities exist when handling confidential information, especially when using unprotected internet-connected devices, which can provide opportunities for foreign espionage [2] - Some researchers lack awareness of confidentiality and may improperly cite unpublished internal data or confidential materials in their papers, leading to the publication of sensitive information in academic journals accessible to foreign intelligence [2] - There are risks associated with false collaboration, where foreign espionage agencies may disguise themselves as research institutions to solicit confidential data and technology from researchers, posing a threat to national security [2] Group 2: National Security Agency Recommendations - Academic writing, communication, and collaboration are essential for showcasing academic achievements and maintaining national security, necessitating a strong awareness of confidentiality among researchers [3] - It is crucial to use certified secure computers and storage devices for confidential academic writing, ensuring a safe working environment and avoiding public storage for sensitive files [3] - Researchers should actively learn about national secrecy laws and participate in security education to enhance their awareness and understanding of counter-espionage measures [3] Group 3: Cautious Collaboration - When engaging in academic collaborations, especially with foreign entities, projects should be carefully evaluated, and confidentiality reviews must be a mandatory process [4] - For projects involving national secrets, it is advisable to minimize foreign participation and ensure compliance with national laws before proceeding with any collaboration [4] - Citizens and organizations should enhance their awareness of confidentiality and report any suspicious activities to the national security authorities promptly [4]