laitimes

[National Security] involves "file transfer assistant", the Ministry of State Security urgently reminds

[National Security] involves "file transfer assistant", the Ministry of State Security urgently reminds

In the digital age of rapid technological development, online office has become a popular way of working in today's society due to its timeliness and convenience. Many online platforms have brought together powerful "black technology" functions that take into account the attributes of social communication and office tools, such as instant communication, format conversion, file fast transfer, group discussion, etc., and have become the first choice for the majority of office workers to deal with daily affairs. However, in recent years, there have been repeated cases of leakage of secrets caused by the use of online office procedures, exposing a series of hidden risks.

-- Cloud Assistant leaks confidential documents.

The "File Transfer Assistant" can realize cloud storage of files, which can be downloaded and used on different devices. In order to facilitate their work, some office workers illegally transfer confidential documents to the "transfer assistant", so that they can use their personal mobile phones or computers to download and process them after work. As everyone knows, after the confidential documents are uploaded to the network, the process of automatic synchronization and storage of computers and mobile phone devices greatly increases the risk of foreign espionage and intelligence agencies obtaining relevant documents through Trojan viruses. In addition, the backend of the transmission software company can also easily obtain confidential documents, and it is impossible to effectively control the scope of knowledge, which is very easy to cause loss and leakage.

-- The original confidential documents were leaked by the image and text recognition applet.

The maturity of OCR recognition technology has brought full convenience to office work, and a wide variety of image and text recognition applets can easily capture the text in the picture information and convert the text with one click. In order to import the text content of classified documents, some staff members in secret-related positions used online mini programs to photograph and identify confidential documents in violation of regulations. Although the red-headed logo and classification of the classified documents were deliberately obscured, after the pictures of the original documents were uploaded to the online platform, foreign espionage and intelligence agencies were able to easily obtain the back-end data of the software and steal state secrets through technical means.

-- AI writing leaks confidential content.

In recent years, AI writing has boomed and gradually become the "pen" of many office workers, and users only need to enter specific needs to generate articles with one click. In order to save work time, some personnel involved in secrets illegally input confidential materials and the content of confidential documents into the AI writing applet to generate articles when drafting secret-related materials, believing that they are only intercepting fragments of documents and will not cause leaks. As everyone knows, the AI Mini Program will automatically collect the information entered by the user for independent learning, and the relevant data is easy to be stolen by foreign spy and intelligence agencies, resulting in the leakage of state secrets.

-- The work group leaks confidential information.

In order to facilitate communication, many units have set up many "working groups" to inform and exchange work matters. Some units have violated regulations by notifying and discussing work matters involving secrets in "work groups", and have even published content involving state secrets and work secrets in group chats in the form of pictures and documents. The confidential information in these group chats is very easy to be reproduced by group members or even made public, and there is no control over the scope of knowledge. Foreign espionage and intelligence agencies can also obtain the chat records of key work groups through cyber attacks, which has a great potential risk of leakage of secrets.

Reminder from the state security organs

National security is all for the people and depends on the people. While enjoying the convenience that science and technology have brought to our daily work and life, we must also resolutely tighten the strings of secrecy and guard against the conspiracy and trickery of foreign espionage and intelligence agencies to use the Internet to steal the secrets of mainland countries.

-- Do not involve secrets in online office.

It is strictly forbidden to process classified information through the Internet, and it is forbidden to publish or disseminate classified information online when using office software, and confidential documents cannot be stored online on the grounds of facilitating work.

- The use of Mini Programs is careless.

It is strictly forbidden to photograph or excerpt confidential documents and upload them to the Internet, and when using functions such as text recognition and AI writing, it is necessary to prevent the input of confidential documents to prevent the disclosure of secrets while facilitating work.

- Personal devices are often self-checked.

Personnel engaged in secret-related positions and who have access to secret-related content should regularly conduct self-examinations of their mobile phones, computers, and other personal electronic devices, and put an end to the use of Internet equipment to handle classified information, and at the same time, they should also promptly carry out self-tests for viruses on secret-related computers, so as to prevent foreign espionage and intelligence organs from implanting viruses and stealing data.

-- Enterprises and institutions emphasize education.

Enterprises and institutions involved with secrets should regularly carry out national security propaganda and secrecy warning education, strengthen supervision and inspection of internal "work groups", perform daily supervision responsibilities for the handling of secret-related materials, and do a good job in the daily management of personnel involved with secrets.

Source: Rule of Law Xinjiang

[National Security] involves "file transfer assistant", the Ministry of State Security urgently reminds
[National Security] involves "file transfer assistant", the Ministry of State Security urgently reminds
[National Security] involves "file transfer assistant", the Ministry of State Security urgently reminds
[National Security] involves "file transfer assistant", the Ministry of State Security urgently reminds

Read on