Workflow
国家秘密保护
icon
Search documents
郭某境外落美色陷阱被要挟,策反2人泄露国家秘密
Xin Lang Cai Jing· 2026-01-13 23:59
国家保密局微信公众号"保密观"1月14日消息,国际形势暗流涌动,境外间谍的黑手,早已悄悄伸向我 们身边。 伪装、引诱、围猎、策反……他们的套路越来越隐蔽,手段也越来越刁钻。可偏偏有人,理想信念滑 坡,保密弦绷不紧,一步步掉进境外间谍精心编织的围猎陷阱,被拉拢策反、沦为棋子,给国家安全带 来严重威胁。 一场 "偶遇" 藏杀机,军工企业3人接连 "沦陷" 某军工企业项目经理郭某因公务需要,随团赴某国某市进行项目验收工作。在境外期间,一名自称"商 务代表"的境外人员通过刻意安排的社交场合接近郭某。这一看似偶然的邂逅,实则是境外间谍情报机 关精心设计的围猎行动。 郭某未能抵御境外间谍情报机关精心设置的美色诱惑,最终落入对方设下的陷阱。在发生不正当关系 后,某国间谍组织人员随即以曝光隐私相要挟,成功将郭某策反。 此后,郭某接受某国间谍组织及其代理人布置的任务,协助其将同行的企业高级工程师、技术专家陈某 及工作人员黎某策反。应某国间谍组织的要求,郭某、陈某、黎某向其提供了所在军工企业相关内部情 况和涉密信息,整个情报交接过程中,由郭某进行现场翻译。 经鉴定,涉案材料中12份属于秘密级国家秘密,6份属于情报;此外,陈某、黎 ...
张某某(原国家部委工作人员),为外国政府充当间谍,成为外国女官员情人并生下两个私生子,私存单位5200份文件,国家安全部披露
中国基金报· 2025-09-04 01:08
来源:国家安全部 国家安全部4日发文《 间谍的"诈骗"公式 》,披露多起境外间谍拉拢腐蚀相关人员的案例: 当"甜蜜爱情"从天而降、当"亲朋挚友"过分殷勤、当"求职招聘"如此简单……很多人可能在不知 不觉中,就落入间谍的"诈骗"陷阱。随着反间谍斗争形势日趋严峻,境外间谍情报机关对我实施 渗透窃密手段层出不穷。特别是面对境外间谍情报机关通过金钱、美色、情感、恐吓等手段开展 的拉拢、策反活动,要牢记这些"诈骗"公式,提高警惕、谨防"中招"。 后,顺利进入一家涉密重点实验室工作。 期间,"学姐"不时以情侣查岗为名,让他 拍摄实验室现场照片,或是以关心学业为 由,让他"分享"最新学术研究成果。渐渐 地,索要的材料从简单信息变成了具体实 验数据、机密科研资料。当小哲逐渐察觉 异常,欲与"学姐"分手时,却被对方以其 已经泄密相威胁,在威胁与恐吓下,小哲 只能硬着头皮继续踏上这条不归路。 后经国家安全机关查明,所谓的"学姐"实 际是境外间谍情报机关人员,比小哲大了 整整16岁,她用尽手段引诱小哲,以"爱" 之名对小哲实施控制,就是为了获取情 报。小哲总共向"学姐"提供涉及我国防军 工领域近百份情报,收取报酬4.5万元。面 对 ...
随意点击“官方链接”被间谍钓鱼 国家安全部公布三起网络攻击案例
Xin Jing Bao· 2025-06-03 23:37
Core Viewpoint - The article highlights the increasing threat posed by foreign espionage agencies through cyberattacks and data theft, emphasizing the need for heightened vigilance in national security measures [1] Group 1: Incidents of Data Breach - A staff member at a national key laboratory stored over 1,000 classified documents on a personal computer, leading to a significant data breach after unknowingly downloading a malicious email attachment [2] - An office unit fell victim to a phishing email disguised as an official communication, resulting in the compromise of sensitive data after staff clicked on a malicious link [3] - A research unit's OA system was exploited due to unpatched vulnerabilities, allowing hackers to implant malware and steal important data [4] Group 2: Security Recommendations - The National Security Agency advises against using non-secure information systems for storing or processing state secrets, urging individuals, especially those in sensitive positions, to adhere strictly to confidentiality protocols [5] - Organizations are encouraged to implement anti-espionage training and awareness programs to enhance personnel's ability to recognize and respond to potential threats, particularly regarding suspicious emails and links [5][6] - Key information infrastructure operators are mandated to adopt technical security measures to prevent foreign cyberattacks and safeguard critical data systems [6]
退休后向境外间谍泄露国家秘密,冯某被判6年
券商中国· 2025-05-26 01:28
Core Viewpoint - The article emphasizes the importance of maintaining confidentiality among personnel in sensitive positions, highlighting the risks associated with lax security awareness after leaving such roles [1]. Group 1 - Recent incidents have shown that individuals in sensitive positions may leak state secrets after retirement due to diminished awareness and vigilance [1]. - A specific case is mentioned where a retired employee from a state-owned enterprise was lured by foreign intelligence agencies with high consulting fees, leading to the illegal provision of state secrets [1]. - The individual was sentenced to six years in prison, deprived of political rights for two years, and fined 500,000 RMB for their actions [1]. Group 2 - The national security authorities stress that any leak of state secrets, regardless of time or location, will face severe legal consequences [1]. - Personnel in sensitive positions must remain aware of their responsibilities and cannot relax their confidentiality obligations after leaving their roles [1].