Category Archives: Uncategorized

Strategic Thinking on Ensuring Ideological & Political Security of Chinese Army // 中國軍媒:確保我軍網上意識形態安全的戰略思考

Strategic Thinking on Ensuring Ideological & Political Security of Chinese Army //



Network era, the information exchange to break the official and civil, military and local boundaries, our army should continue to play the advantages of mobilization, open our army ideological work a new situation. The people are the most extensive and powerful forces involved in the ideological struggle. Our army strives for the dominance of the online ideological struggle. It can not rely solely on the power of propagating and defending the departments. We must also make the people’s faction and stir up the people’s war of online ideological struggle. Our army should play a good mobilization advantage, attract the participation of the masses, and guide the direction of public opinion.

The United States “how to influence China’s national strategy and military strategy,” the report said, “the Internet is our main battle with the Chinese Communist Party.” Western military power has long been the online public opinion struggle into the military strategy, is committed to creating a new network of combat forces.

Military Army: Strategic Thinking on Ensuring the Ideological and Political Security of Our Army

The United States since 2003 in the war in Iraq for the first time to implement the strategic psychological warfare, have made a network war theory update and actual inspection of the record; recently, the US Defense Secretary Ashton Carter announced the Department of Defense new network action strategy report, For example, the United States and Russia have been able to use the information warfare forces to form a “civil army”, demonize the “invading country” regime, from the “invading country” internal disintegration of its national will, To achieve their own strategic objectives. At present, the United States with the Internet technology and cultural hegemony to develop Internet rules, selling political system and cultural ideas, leading the direction of ideological struggle; our military in the key information infrastructure construction, network impact in a weak, facing control, Shaped, interpreted, tagged dilemma, cyberspace security coping overall is still hovering at the tactical level non-strategic level. In the era of media, cyberspace has become the second “living space” of mankind. Our army should be in danger and know ourselves, and attach great importance to the study of cyber ideology struggle strategy and compete for the initiative of online ideological struggle.

1, take the initiative to force the Sword, to seize the high ground of ideological struggle


The Internet is the main battlefield of ideological struggle. The main battlefield failed to master the initiative, decided in the field of ideology in the passive situation. In recent years, including the United States, including Google, Apple, “the eight King Kong” all-round penetration into the network space in China through the opening of the “back door” for the US government to provide information, and pervasive way to push me Western values; , Support the “elite” voice, so that with the help of the Internet openly for the Western head; continuous technological innovation, by virtue of “shadow Internet” and other means to circumvent me

Network control system to support Hong Kong “accounted for” and other subversive separatist activities; leading issues set for China’s military development has been intensive throw “China’s military threat theory”, “China’s spy activities,” “Sino-US military conflict theory” and “South China Sea navigation freedom” and other issues, from the academic, public opinion on me completely suppressed.

In contrast to our military, there are still used in the theoretical study of fried rice, in the propaganda work instilled the preaching, stereotyped in the discourse system, often in the subject matter when the aphasia, weak and weak in the supervision of the phenomenon, not only cause my mainstream ideology Spread the dilemma, but also for the hostile forces to attack my ideological position left a gap. Network ideological struggle, such as against the current sailing,

In the face of the aggressive challenges of the United States and the West, the attack is more advantageous than the defense. Our army must recognize the seriousness of the threat of online ideology and face the above-mentioned deficiencies. Through the all-round change of the thinking idea and working mode, initiative.

The first stage to try to reverse our army passively cope with the situation, lay the online ideological struggle “fighter war”. China is currently the most important strategic opponents of cyber space in the United States, the United States will undoubtedly be its core technology, hegemony and other positions to prevent clinging, want to catch up with its core technology in the short term is not feasible. Our army should not only have the courage to fight the Sword, but also learn to “dance with the wolf”, on the one hand should focus on the matter, in the face of Western issues when the attack in a timely manner to respond, one said, change the traditional conservative ideology work concept, , To avoid the main network-like attitude, or another way to transfer is not conducive to our military wave of public opinion, beware of the Chinese story was misinterpreted, misreading; on the other hand can identify the opponent’s weaknesses, pain hard, propaganda interpretation of the Western scandal, Democratic system malpractice, judging the plight of capitalist development. Learn from the opponents of the struggle, give full play to the role of capitalist countries, in the foreign media, business operations, cooperation and cultural exchanges in the promotion.

The second stage is based on my main counterattack, lay the ideological struggle of the Internet “position war.” The use of the first stage of the development of technology development opportunities, and vigorously promote technological innovation, can bypass the United States and other Western countries accounted for overwhelming advantages of the technical barriers to achieve such as quantum communications technology monopoly, relying on the new platform to implement the ideological strategy to counter; To maintain national ideological security from the traditional security field to the field of cyberspace extension, and actively establish a network space cooperation with other countries, based on Chinese cultural traditions, value system and military practice, to build beyond the West, in line with China’s actual discourse system for the international community Innovative discourse, for our army modernization, national defense policy and the military system name.

2, to support the legislation, to the superiority of the people to achieve the mainstream ideology of soft conquest


Hard power is the fundamental support of soft power, Western ideology has been able to prevail in the world, the key lies in the capitalist countries generally developed economy, people’s living standards are higher, and the key to the upsurge in the Soviet Union is the national economy almost collapse, political Cleaning loss of people, social contradictions continue to intensify. Revolutionary war years, our army suffered inside and outside the attack, but resist the West “peaceful evolution”, the fundamental reason is that when our ideological work to do the “inner saints outside the king.” Reflection of the current, part of the unit and the individual army is not strict, improper words and deeds, misconduct, weakened the army combat effectiveness, discredited the image of the army, for those who have ulterior motives attacked my system, leaving the relationship between the party and the party left a mess, as hostile forces To achieve its political purpose to provide a convenient space.

In addition, the value orientation and behavior of the composition of the officers and men are undergoing profound changes. Once the loss of their trust is caused by the corruption of the military, it is easy to cause the ideal and the landslide, which opens the gap for the infiltration of the West. For a period of time, our army dealing with the behavior of anomorphosis often lost in the wide, lost in the soft, especially Guo Boxiong, Xu Caihou case hit the officers and men “three view”, while the United States to intensify the push of the bourgeoisie to build the military concept, To carry out the deterrence, attack our army unique advantages, which makes our ideological work into a double dilemma. Network era information cohabitation, the face of hostile forces deliberately slander more need “their own hard”.

Our army should play a good way to put forward the traditional advantages of truth, first put the facts, and then tell the truth, to an open and inclusive attitude to the Internet users to monitor the military and the Internet to achieve good interaction, and as a driving force to improve the style Adhere to the line of words and deeds; adhere to the network space management and the reality of space norms both hands, the military’s own problems, neither whitewash short and not allowed to make rumors, eliminate negative thoughts, the root causes of public opinion, to our military good image against Western attack penetration, Enhance the mainstream ideology of inspiration.

3, to network network, to enhance our ideological struggle of the network thinking


The development of the Internet has spawned all-round changes in social structure, way of thinking and behavior. In the face of online ideological struggle, our army must accurately grasp the changes in the mechanism of competition. The network originated in the West, grew up in the West, the West not only has a comparative advantage in technology, but also highly compatible with the Internet culture, cloud computing, large data, artificial intelligence and other technologies are the first breakthrough in the West, the network center war and other Internet operations concept by the US military The first proposed, the Internet “rules of conduct” is also dominated by the West, the United States is the world’s major sources of information. And our army in the online ideological struggle is still at a disadvantage, such as can not keep up with the Internet age changes, will fall into a completely passive situation.

At present, our army has a strong desire and motive to make a good “network gateway”, and the problem of planning breakthroughs in online ideological struggle is basically clear, but it still lacks the organic integration of “Internet + ideological struggle” and can not really grasp the struggle The right to speak. In the face of the grim situation of online ideological struggle, our army needs an Internet “brainstorming”, and comprehensively enhance the ability of online ideological security. To break the core technology monopoly as the main focus, breaking the United States to contain my “life door”, the construction of its own information transmission system and network security protection system, and strive to lead the innovation and technology around the world, lay the ideological “backhand” But also the Internet communication requires creative thinking, the first machine awareness, platform operation and action ability, but also to promote the development of the Internet, but also to promote the development of the Internet, The barracks should follow the trend, as soon as possible to develop a variety of network broadcast and other media, try to mainstream cultural communication embedded in creative industries.

4, close the rule of law cage, remove the online ideological position “noise”


The development of new media technology to open the “everyone has a microphone,” the law of the times of transmission changes, public opinion, more difficult to control, thinking more and more intense competition, but according to the law of the network network did not follow the footsteps.

The current urgent problem is: the phenomenon of my ideological security is widespread, part of the hostile forces openly clamoring, the Western hostile forces not only in my territory to cultivate “well known” “big V”, the purchase of network water army, organization of cults, Extreme forces and other extreme anti-communist elements into the network of public opinion, resulting in a variety of hazards to national and military security information is full of network information platform.

At present, the army information construction in full swing, our army for the new media management legislation process is lagging behind, the network regulation system is not perfect, the lack of norms of online ideological struggle, part of the behavior of the ideological security is illegal, how to deal with the language is not detailed.

On the one hand, the normal ideological control is often misinterpreted as restricting freedom of speech. Once used by hostile forces, it may cause the military officers and soldiers to fluctuate, leading to further deterioration of the situation. On the other hand, due to the lack of relevant norms, Or even often for a small number of wrong acts “pay”, resulting in ideological murmur is not cleared, over time, the ideological institutions of the credibility of a serious decline in the military and the state may also fall into the “Tacitus trap.”

Online ideological struggle from the value of the political system of confrontation, but may be expressed as “to ideology” of public opinion and popular culture. Information in the cyberspace “fission” propagation. The process does not rule out the ulterior motives of the individual groups add oil and vinegar, fueled. Therefore, to win the ideological struggle on the Internet, our army should maintain the ideological security issues in accordance with the law into a strategic position, consolidate the military environment, improve domestic legislation, and resolutely combat the behavior of moral hazard, and create a good online public opinion ecology.

First, the height of the overall national security to promote the legislative amendment, focusing on the norms of cultural transmission in the field of “rent-seeking” phenomenon, management loopholes, powers and responsibilities unclear, poor supervision and other issues to ensure that the work of law, There must be law.

Second, according to the law, the frequent dissemination of bad information on the implementation of accurate monitoring of the site, according to the law should be ordered to rectify the deadline for the threat of ideological security, the negative information according to the law to remove. Third, strict enforcement of law enforcement, illegal research, to endanger our ideological and ideological security of the implementation of full-time monitoring, the spread of negative public opinion of the organization, individuals and the performance of poor supervision departments, resolutely according to law, Outside the earth, the formation of the rule of law deterrence.

5, pay attention to the integration of military and civilian, launched the ideological struggle of the people of the war


Historically, our army in combat and the implementation of military missions before the fighting to mobilize, to boost morale to stimulate morale, while fighting for a wide range of mass support. Whether it is mobilization speech, news propaganda or brief loud fighting slogans, lively forms of literature and art, have played an indelible role, so that our army justice, civilization, the image of mighty people, for our army to integrate military resources, The people’s war laid a good foundation.

Network era, the information exchange to break the official and civil, military and local boundaries, our army should continue to play the advantages of mobilization, open our army ideological work a new situation. The people are the most extensive and powerful forces involved in the ideological struggle. Our army strives for the dominance of the online ideological struggle. It can not rely solely on the power of propagating and defending the departments. We must also make the people’s faction and stir up the people’s war of online ideological struggle. Our army should play a good mobilization advantage, attract the participation of the masses, and guide the direction of public opinion.

At the same time, we should use a good network platform, the use of good hidden in the people of the huge energy, the patriotic enthusiasm of the Internet users to the positive grooming, the formation of the mainstream ideology of the sea, so that our army fortress indestructible, so that hostile forces abroad quit. The integration of military and civilian people can effectively break the problem of insufficient strength of our army in the ideological struggle of the Internet. First of all, lack of platform construction led to the voice of our army can not pass, the situation can not open. In recent years, our army in the dissemination of platform construction is still inadequate. Our military is currently more influential several news sites updated slowly, the news content is still biased towards the traditional propaganda, preaching, the emerging military-related information is also due to the existence of the above problems, so that “lack of capacity” and our army in New media, the use of new platforms often “half a beat”.

We should strengthen cooperation and cooperation with local government media and private media. At the same time, from the media University, well-known enterprises, network celebrities invited experienced people, regular exchange training, absorption of media construction advanced experience, accelerate the improvement of network-related military guidance platform, to create a group of audiences wide visible High-quality brand media. Second, the network crisis on the lack of capacity led to our army often aphasia. At present, the construction of our military space space is limited, staffing is insufficient, leading to information monitoring, filtering capacity is limited, the negative information of the army once fermented for public opinion, relying on the existing technical means and human resources will be difficult to effectively deal with, will make me The military is caught in the unfavorable situation of online ideological struggle.

Therefore, our military should strengthen cooperation with local functional departments to strengthen military and field network engineers to develop information monitoring software and filtering system, so that malicious spread of the rhetoric difficult to spread. At the same time, a wide range of local talent for the use of our military, while absorbing veterans into the local ideological work team, jointly cultivate a group of political excellent, new thinking, technical fine, skilled public opinion analysis, public opinion, network supervision Authoritarian network administrator team, the formation of the people’s war indestructible trend.

Original Mandarin Chinese:

網絡時代,信息交互打破了官方和民間、軍隊和地方的界限 ,我軍應繼續發揮動員優勢,打開我軍意識形態工作新局面。人民群眾是參與意識形態鬥爭最廣泛、最強勁的力量,我軍爭取網上意識形態鬥爭主導權,不能只依靠宣傳保衛部門的力量,還必須做好軍民融合,打響網上意識形態鬥爭的人民戰爭。我軍要發揮好動員優勢,吸引群眾參與,引導輿論走​​向。






互聯網是意識形態鬥爭主戰場。主戰場上未能掌握主導權,決定了我國在意識形態領域處於被動接招的態勢。近年來,包含谷歌、蘋果在內的美“八大金剛”全方位滲透到我國網絡空間,通過開“後門”為美國政府提供情報,並無孔不入地向我推送西方價值理念;培養“第五縱隊” 、扶植“精英”發聲,使之借助互聯網影響力公然為西方張目;持續技術創新,憑藉“影子互聯網”等手段規避我



































Author: 作者:王明哲 軍事科學院軍隊政治工作研究中心

Chinese Internet Security Report 2017 (a) // 中華人民共和國2017年上半年互聯網安全報告

Chinese Internet Security Report 2017 (a) //


1 Internet security situation is grim, to develop network security is imperative

At the same time, the Internet security has become more and more important. In 2014, the central network security and information leading group was formally established, Xi Jinping personally as head of the country and the government’s attention to the degree of network security is evident. In the central network security and information leading group at the first meeting, Xi Jinping first proposed “network power” strategy, “no network security is no national security”, network security is a relationship between national security and sovereignty, social stability, national culture The important issue of inheritance and development. Its importance, with the pace of global information to accelerate and become more and more significant. “Home is the door”, security issues without delay.

In China, the network has entered the tens of thousands of households, the number of Internet users in the world, China has become a network power. The Internet has been deeply involved in all aspects of people’s lives. According to a survey on the information of the public, students and white-collar groups of Internet usage has been close to 100%, more than Jiucheng college students and white-collar groups the most important information access channel for the Internet. Internet users on the Internet to conduct the main news, learning, real-time communication, social networking and all kinds of leisure and entertainment. In the era of universal networking, Internet users how to ensure network security? How does an enterprise network effectively defend against cyber attacks? These have become important issues that countries, governments and the security industry are facing and need to address as soon as possible.

From the domestic “dark cloud Ⅲ” virus, to sweeping the global “WannaCry” extortion virus, and then to “Petya” malignant devastating virus, all that the current network security situation is grim, corporate security vulnerable, vigorously develop the network Security is imperative.

2 to strengthen the network security construction, lack of talent need to improve the current situation

Although China has become a big country network, but there is distance from the network power. Trojans and botnets, mobile Internet malicious programs, denial of service attacks, security vulnerabilities, phishing, web tampering and other network security incidents have occurred, the basic network equipment, domain name systems, industrial Internet and other basic infrastructure and critical infrastructure is still facing Greater security risks, strengthen the network security construction is imminent.

At the same time, the shortage of network security personnel in China is in urgent need of improvement. As a network power, China in addition to research and development of computer equipment to enhance the speed of network transmission, but also should step up the cultivation of computer information security personnel, so that China from the network power into a network power, which is to enhance China’s information security important basis.

Network security has risen to the national strategy, the state is also vigorously invested to promote the construction of network security. But do a good job of network security is not an organization, a department of things, but the need for the participation of the whole society. From the city of Wuhan issued “on the support of national network security personnel and innovation base development policy measures” invested 4.5 billion construction funds, to June 1, 2017 formally implemented the “People’s Republic of China Network Security Law”, are for network security Healthy, steady development and make efforts. We also call for the social responsibility as a safe enterprise, institutions, individuals actively into the network security building, for the country, the national network security protection contribute a force.

3 Tencent to promote the establishment of China’s first strongest Internet security matrix

Tencent security has 17 years of capacity accumulation and 800 million users of large data operating experience, is China’s leading Internet security products, security services provider. In the spirit of “open, joint, shared” concept, will accumulate years of ability and data sharing to partners, is committed to the Internet security and open platform construction, enhance the security of the Internet security industry chain, enhance user safety awareness, and jointly promote China’s Internet security Environmental construction.

At present, Tencent has promoted the establishment of China’s first Internet security matrix, covering the basic security of the laboratory matrix, security product matrix, security, large data platform matrix, and Internet security open platform matrix, committed to China’s Internet security new ecological construction, open core competencies And data for China’s Internet security and ecological construction unremitting efforts.

First, the overall status of network security scan

1.1 affect the world’s six major network security incidents, the cumulative impact of the world

1.1.1 WikiLeaks CIA top secret file leak event

March 7, 2017, WiKiLeaks announced thousands of documents and revealed the CIA on the hacker hacking technology, Mobile phones and smart TVs, but also can invade attacks on Windows, Mac and Linux operating systems, and even control smart cars to launch assassination activities. Outside the name of the leak event named Vault 7, Vault 7 published confidential documents recorded by the United States Central Intelligence Agency (CIA) conducted by the global hacker attacks.

Vault7 contains 8761 confidential documents and documents, which documents the CIA for Android and Apple smart phones developed by the intrusion crack technology details, some of which can also get the complete control of the target device. WikiLeaks founder A Sangqi said the document shows the “CIA network attack the overall ability”, and WikiLeaks in the release of these documents claimed that “CIA network armory has been out of control.”

1.1.2 Shadow Broker Public NSA (US National Security Agency) Hacker Arsenal

On April 14, 2017, Shadow Brokers published a large number of very destructive hacking tools used by the Equation Group in the NSA (National Security Agency) on, including You can remotely break the global about 70% of the Windows machine vulnerability exploit tools. Anyone can use NSA’s hacker weapons to attack someone else’s computer. Among them, there are ten tools most likely to affect Windows personal users, including eternal blue, eternal king, eternal romance, eternal collaboration, emerald fiber, eccentric hamster, Eskimo volume, elegant scholar, eclipse wings and respect review. Hackers do not need any operation, as long as the network can invade the computer, like shock waves, Sasser and other famous worms can instantly blood wash the Internet.

1.1.3 “WannaCry” extortion virus broke out in the world on May 12th

May 12, 2017, “WannaCry” (want to cry) bitbell blackmail virus in the global outbreak, the event affected more than 150 countries and regions, more than 10 million organizations and institutions and more than 30 million Internet users, the total loss Up to more than 500 billion yuan. Including hospitals, educational institutions and government departments, without exception, suffered an attack. Blackmail virus worms in conjunction with the way the spread of the attack is a large-scale outbreak of the important reasons.

User’s most obvious symptoms after poisoning is the computer desktop background is modified, many files are encrypted lock, the virus pops up prompted the user to the relevant bit coin address transfer $ 300 in order to unlock the file. At present, security companies have found ways to restore encrypted files.

1.1.4 FireBall Fireball virus infected more than 250 million computers

June 1, 2017, foreign security agency Check Point reported that the outbreak of a “FireBall” virus abroad, and claimed that more than 250 million computers worldwide are infected, the most affected countries are India (10.1%) and Brazil (9.6%). The United States has 5.5 million computers in the move, accounting for 2.2%. In the infected business network, India and Brazil accounted for 43% and 38% respectively, compared with 10.7% in the US.

This malware will force the browser home page to its own website and search engine, and redirect the search results to Google or Yahoo. These forged search engines track user data and secretly collect user information. The author of this virus for the production of China’s Rafotech company, the company’s Web site has been unable to visit.

1.1.5 “dark cloud” series virus upgrade to “dark cloud III” again struck

June 9, 2017, Tencent computer housekeeper detected, as early as 2015 was first discovered and intercepted killing the “dark cloud” virus resurgence, upgrade to “dark cloud Ⅲ”, through the download station large-scale transmission, at the same time through Infected disk MBR boot boot, the number of infected users has reached millions.

After the upgrade of the “dark cloud Ⅲ” will be the main code stored in the cloud, real-time dynamic updates, and its function is currently downloaded to promote malicious Trojans, lock the browser home page, tampering to promote navigation page id. Once the user in the move, the computer will become a “broiler” to form a “botnet”, and the use of DDoS attacks built on a cloud service provider platform chess class site, resulting in the site access becomes abnormal card slow.

1.1.6 new round of extortion virus “Petya” struck, more destructive

June 27, 2017, a new round of extortion virus “Petya” attacked a number of countries in Europe, including Ukraine, Russia, India, Spain, France, Britain, Denmark and other countries have been attacked, the governments of these countries, Banks, enterprises, power systems, communications systems and airports are affected by different procedures.

This virus is more destructive than “WannaCry”, the virus on the computer’s hard disk MFT encryption, and modify the MBR, so that the operating system can not enter. According to the relevant analysis, said the information on the boot interface even if the information provided to the hackers is no way to decrypt, therefore, had to doubt the “Petya” the real purpose of the virus. “Petya” is more like a purposeful attack, the target can not repair the devastating attack, rather than extortion for the purpose.

1.2 “People’s Republic of China Network Security Law” formally implemented

June 1, China’s first comprehensive standard of cyberspace security management of the basic law – “People’s Republic of China Network Security Law,” the formal implementation of a total of seven chapters seventy-nine, the content is very rich, with six outstanding highlights. One is clear the principle of cyberspace sovereignty; the second is clear the network products and service providers of security obligations; third is clear the network operator’s security obligations; four is to further improve the personal information protection rules; five is the establishment of the key Information infrastructure security protection system; six is ​​to establish a key information infrastructure important data cross-border transmission rules.

At the same time the new law also pointed out that should take a variety of ways to train network security personnel, and promote network security personnel exchanges. The implementation of the new law marks the network security of China from the law, cyber space management, network information dissemination order norms, cybercrime punishment and so forth will open a new page, to protect China’s network security, safeguarding the overall security of the country has far-reaching and significant The meaning of.

1.3 The size of Internet users in China is equivalent to the total population of Europe, the safety gap of up to 95%

1.3.1 Chinese Internet users reached 731 million, equivalent to the total population of Europe

As of December 2016, the scale of Internet users in China reached 731 million, the penetration rate reached 53.2%, more than the global average of 3.1 percentage points, more than the Asian average of 7.6 percentage points. A total of 42.99 million new Internet users, the growth rate of 6.2%. The size of Chinese Internet users has been equivalent to the total population of Europe.

1.3.2 mobile users continue to grow, the proportion of mobile phone users accounted for 95.1%

As of December 2016, China’s mobile phone users reached 695 million scale, the growth rate of more than 10% for three consecutive years. Desktop computers, notebook computers are using the decline in the number of mobile phones continue to squeeze the use of other personal Internet devices.

1.3.3 security talent gap is huge, up to 95%

Although the number of Internet users in China has been ranked first in the world, but China’s information security industry in the very few people, security personnel and its lack. According to relevant information, in recent years, China’s education and training of information security professionals only 3 million people, and the total demand for network security personnel is more than 700,000 people, the gap up to 95%. 710 million Internet users in China network security issues, has become the industry and the country to solve the problem.

Beijing Institute of Electronic Science and Technology, vice president of the Ministry of Education of Higher Education Information Teaching Committee of the Secretary-General Fenghua pointed out that the current important information systems and information infrastructure in China need all kinds of network information security personnel will be 15,000 per year The rate of increase, by 2020 the relevant talent needs will grow to 1.4 million. But at present, only 126 colleges and universities in China have set up 143 network security related professionals, accounting for only 10% of the 1200 science and engineering institutions.

Analysis on the situation of network virus threat in the first half of 2017

2.1 Tencent security anti-virus laboratory PC-side virus interception over 1 billion, the chain by 30%

2.1.1 Trojan horse intercepts an average of nearly 170 million times per month

In the first half of 2017, Tencent security anti-virus laboratory statistics show that PC-side total has blocked the virus 1 billion times, the overall number of viruses compared to the second half of 2016 Tencent security anti-virus laboratory to intercept the number of viruses increased by 30% Interception Trojan virus nearly 170 million times. April, June to intercept the peak of the virus, interceptions are 180 million times.

2017 Q2 quarter compared to 2016 Q2 quarter, Tencent security anti-virus laboratory virus blocking an increase of 23.7%. From 2014 to 2017 Q2 season, the amount of virus blocking the number of malicious programs increased year by year.

2.1.2 PC users in Guangdong, the highest number of poisoning, poisoning peak for the morning 9-11 points found a total of 230 million times in the first half of the user machine Trojan virus 

The first half of 2017 Tencent security anti-virus laboratory found a total of 230 million times the user machine Trojan virus, compared to the second half of 2016 down 0.5%, an average of 38.8 million poisoning machines per month for virus killing. 2017 Q2 quarter compared to Q1 quarter, a slight increase in the number of poisoning machines.

In the second quarter of 2017, the number of users in the second quarter of 2016 increased by 3% compared with the same period in the second quarter of 2016. From 2015 to 2017 Q2 season, the number of poisoning machine growth trend is obvious, was increasing year by year state. PC end user poisoning peak for the morning 9:00 to 11:00

According to statistics, the peak time of daily poisoning for the morning 10 am – 11 am, in line with business and ordinary users 9 am – 11 am to open the computer processing work of the law. This time the user poisoning virus type is more use of e-mail, sharing, etc. spread Office document macro virus, indicating that the office security situation is still grim. PC end poisoning user provinces up to Guangdong, which ranks first in Shenzhen

According to Tencent security anti-virus laboratory to monitor the number of poisoning PC statistics, from the urban distribution point of view, the Internet is more developed city users poisoning situation is heavy, the country ranked the first city to intercept the virus in Shenzhen City, accounting for 3.76% , The second for the Chengdu City, accounting for 3.57% of all interceptions, the third for the Guangzhou City, accounting for 3.39% of all interceptions.

From the provincial geographical distribution, the largest number of PC poisoning in Guangdong Province, accounting for 13.29% of the total intercept, the second in Jiangsu Province, accounting for 7.75% of all interceptions, the third in Shandong Province, accounting for all Intercept the amount of 7.12%.

2.1.3 The largest virus category accounted for 53.8% of the Trojan virus, blackmail virus added 13.39% PC-side of the first major virus is still Trojans, PE-infected virus type, but the spread of large

According to Tencent security anti-virus laboratory 2017 Q2 season to obtain the virus sample analysis, from the virus type, Trojans accounted for 53.80% of the total number, is still the first major virus. Adware class (adware, forced installation, user privacy, spam, etc.) for the second largest virus category, accounting for 39.02% of the total number. Backdoor category for the third largest virus category, accounting for 5.13% of the total number. Compared to the 2017 Q1 quarter, the virus type did not change much.

The number of virus samples from the top of the division, ranked first and second is still the Trojans and Adware class, but ranked third in the PE infection, accounting for 25.07% of the total number.

There are not many types of infectious samples, which is difficult to produce infectious virus, hackers and other programmers need to master the technology, high cost, long development time and other factors. At the same time, the transmission of infectious virus is very large, the survival time is relatively long, therefore, less species of PE infection type in the sample transmission level accounted for a certain proportion, which is due to infection with a wide range of viruses, Fast propagation characteristics. extortion virus sample number Q2 added 13.39%, the first is not WannaCry

The extortion of the virus is the purpose of extortion money for the purpose of making the Trojan horse infected computer user system specified data files are malicious encryption, resulting in user data loss. At present, most of the domestic extortion of the virus by the need to pay the rupiah to be able to decrypt. As the bit currency completely anonymous circulation, the current technical means can not track behind the extortion behind the virus operator, which also makes the extortion virus from 2013 after the explosive growth.

The amount of extortion

According to Tencent security anti-virus laboratory to detect the extortion virus, 2017 in the first half of the total has been found in the number of extortion virus samples in about 300 million, the average monthly detection of the number of extortion virus nearly 500,000, Q2 quarterly extortion virus samples The number increased by 13.39% over Q1 quarter. May, June to intercept the peak of the virus, respectively, 57 million, 530,000.

Extortion virus type

According to the relevant data analysis shows that the May 12 outbreak of the WannaCry extortion virus is the most active in this quarter, the greatest impact on the virus. The virus and other viruses in the way of transmission is significantly different, due to the use of the windows system vulnerabilities, making the virus can spread around the world, as the quarter of the hot safety events. On June 27, a new type of extortion virus called Petya began spreading around the world, and its extortion was similar to WannaCry, but more destructive, directly encrypting the MFT of the user’s hard drive and modifying the MBR, causing the user to fail to windows system.

Although the impact of the virus is large, but from the sample size point of view, the largest or with the spread of infection PolyRansom virus. This virus will be infected, encrypted users of the file to extortion, but because there is no use like WannaCry virus key encryption, but the use of a simple encryption algorithm, and the algorithm is reversible, anti-virus software can help users to restore files, So although the number of samples in the first, but the impact is not great. This type of extortion virus accounted for 78.84% of all extortion virus, we can see the spread of infectious virus strong.

From the sample size point of view, in addition to infectious extortion virus, the first is Blocker, accounting for 36.82% of all extortion virus, the second category is Zerber, accounting for 23.63% of all extortion virus, the third category Is the most affected this quarter, WannaCry extortion virus, accounting for all extortion virus 12.06%. WannaCry virus volume quickly rose to the third position, because the means of communication using the spread of vulnerability.

The current extortion virus mainly uses the following kinds of transmission:

Document infection spread

File infection is the use of infectious virus transmission characteristics, such as PolyRansom virus is the use of infectious virus characteristics, encrypted users all the documents and then pop-up information. Because the PE class file is infected with the ability to infect other files, so if the file is carried by the user (U disk, network upload, etc.) to run on other computers, it will make the computer’s files are all infected with encryption.

Site hanging horse spread

Web site is through the site or the site server to obtain some or all of the authority, in the web page file to insert a malicious code, these malicious code, including IE and other browser vulnerabilities use code. When a user accesses a linked page, a malicious code is executed if the system does not update the exploit patch used in the malicious code.

The virus can also use known software vulnerabilities to attack, such as the use of Flash, PDF software vulnerabilities, to the site with malicious code to add the file, the user with a loopholes in the software to open the file will be executed after the malicious code, download virus.

Using system vulnerabilities

May outbreak of WannaCry is the use of Windows system vulnerabilities to spread, the use of system vulnerabilities is characterized by passive poisoning, that is, users do not have to visit a malicious site, not open the unknown file will be poisoned. This virus will scan with the network vulnerabilities in other PC host, as long as the host is not marked with a patch, it will be attacked.

Tencent anti-virus laboratory to remind you, timely updates third-party software patches, timely update the operating system patches to prevent known vulnerabilities attack.

Mail attachment spread

The extortion virus that spreads through e-mail attachments usually disguises documents that users need to view, such as credit card spending lists, product orders, and so on. The attachment will hide the malicious code, when the user opens the malicious code will begin to perform, release the virus. This type of camouflage virus is usually sent to enterprises, universities, hospitals and other units, these units in the computer usually save the more important documents, once malicious encryption, the possibility of payment of ransom far more than ordinary individual users.

Network share file spread

Some small-scale spread of extortion virus will be spread through the way the file spread, the virus will upload the virus to the network sharing space, cloud disk, QQ group, BBS forums and other places to share the way to send a specific crowd to trick the download and install The

Tencent anti-virus laboratory to remind users to download the software go to the official formal channel download and install, do not download the unknown program, such as the need to use the unknown source of the program can be installed in advance Tencent computer housekeeper for security scanning.

2.2 mobile side killing a total of 693 million Android virus, mobile phone users over 100 million

2.2.1 mobile side of the virus package growth trend slowed down, but the total is still 899 million

In the first half of 2017, Tencent mobile phone housekeeper intercepted Android new virus package totaled 8990000, compared with 2016 in the first half of a small decline, but the total is still very large.

2.2.2 Guangdong mobile users poisoning the most, the number of mobile phone users decreased by 45.67% Tencent mobile phone housekeeper in the first half were killing Android virus 693 million times

In the case of a large number of virus infection users in the case, the first half of 2017 Tencent mobile phone housekeeper killing the virus has reached 693 million times, an increase of 124.24%, the total number of more than double the first half of 2016 more than doubled. Malicious programs and Trojans to reduce the cost of production, virus transmission channel diversification is an important factor in this phenomenon.

In addition to June, the first half of 2017 killing more than 100 million times a month, of which the number of mosquitoes in January up to 136 million times, almost the first half of 2014, 140 million in the killing of the same level. 2017 in the first half of the number of mobile phone users over 100 million 

In the first half of 2017, the number of virus infected users was 109 million, down 45.67% year on year, compared with 2015, the first half of 2016 compared to all declined.

January 2017 single month infected users reached 21.66 million, the highest for the first half, then the number of infected users began to slow down. the number of mobile users poisoning Guangdong ranks first

In the infected mobile phone users geographical distribution, Guangdong ranked first, accounting for up to 11.41%.

2.2.3 hooliganism and resources accounted for more than 80%, two-dimensional code is most easy to poison mobile-side virus in the hooliganism and tariff consumption accounted for more than 80%

In the first half of 2017, the proportion of mobile phone viruses, rogue behavior and tariff consumption accounted for the highest, to 44.59% and 44.44% ratio of one or two. Ranked third of the same access to privacy accounted for 5.85%, lodging fraud, malicious deductions, remote control, system damage and malicious spread accounted for 1.94%, 1.55%, 0.80%, 0.74% and 0.08%.

Hooliganism refers to the malicious behavior of a virus that has a rogue attribute. Such as the recent WannaCry virus and once again concerned about the mobile phone lock screen Serbia virus with rogue behavior. This type of virus through the forum paste it and other means to spread, the drug will usually use plug-in, free, brush drill, red envelopes and other words on the Trojan virus packaging, induction users download and install. After the installation of the virus will be forced to lock the phone screen, forcing the victim had to contact the drug maker in order to make the equipment back to normal.

Whether the computer or mobile phone, with rogue behavior of the extortion virus to the user losses are difficult to estimate, if accidentally poisoning, not only will cause property damage, will also lead to loss of important information, so users should be careful to guard.

Tariff is also a common type of mobile phone virus, such a virus usually in the user without the knowledge or unauthorized circumstances, by sending text messages, frequent connections to the network, etc., resulting in user tariff losses. Part of the malicious promotion of the virus to help third-party advertisers to increase traffic for the purpose of the user to download and install the virus, access to mobile portal privileges, the implementation of the download malicious advertising software. These software will continue to push a variety of pop advertising, affecting the user’s mobile phone experience, and even those who will disclose user privacy information, stolen online banking accounts, resulting in serious personal and property safety.

Infected with the world’s ultra-36 million Andrews device malicious ad click software “Judy” is a tariff consumption of mobile phone viruses. The malware is hidden in a Korean tour. After completing the download and install, the infected device will send the information to the target page and automatically download the malicious code in the background and access the advertising link, theft of user traffic, to the user Consumption. two-dimensional code, software bundles are the main source of mobile virus source

Mobile virus channel sources are mainly seven categories, namely, two-dimensional code, software bundles, electronic market, network disk communication, mobile phone resource station, ROM built-in and mobile forum. The diversification and diversification of the entrance of the virus channel also further increases the risk and risk of the user’s exposure.

In the first half of 2017, two-dimensional code became the source of mainstream virus channels, accounting for up to 20.80%. Two-dimensional code in the various areas of the popularity of more and more users to develop a habit of sweeping the random, the drug maker also increased for the two-dimensional code channel virus package delivery ratio. Part of the virus is embedded in the two-dimensional code, as long as swept away will automatically download the malicious virus, ranging from mobile phone poisoning, while the personal privacy information is caused by leakage, resulting in property losses.

Third, anti-harassment fraud effect is remarkable, but the user loss situation is grim

3.1 the first half of the number of spam messages over 566 million, illegal loans over 50%

3.1.1 In the first half of 2017, the total number of spam messages continued to grow close to 600 million

Low spread costs and the existence of a huge chain of interests, resulting in spam messages have been difficult to be effectively remediation, the number of users is also increasing the number of reports. In the first half of 2017, Tencent mobile phone housekeeper received a total of 586 million copies of spam messages reported by users, an increase of 40.69%, more than 2 times in the first half of 2014.

3.1.2 users to report spam messages up to the provinces of Guangdong, the largest city for Shenzhen

In the geographical distribution of spam messages, the top three provinces that reported spam messages were Guangdong, Jiangsu and Shandong, accounting for 12.91%, 6.98% and 5.70% respectively. In addition, Henan, Zhejiang, Sichuan, Hebei, Beijing, Hunan and Shanghai also ranked the top ten. These provinces or municipalities are generally distributed in the eastern coastal and central regions, and densely populated and economically developed are their greatest common ground, which creates favorable conditions for fraudulent bulk spam messages and profiteering.

City, the first half of 2017 users in Shenzhen reported a total of 23.34 million spam messages (accounting for 3.98%), Chengdu, Guangzhou and Suzhou, two to four, the number of spam messages are 10 million level.

3.1.3 2017 first half of the common types of fraud SMS

Although the overall amount of fraud SMS reported a downward trend, but its means of diversification and secrecy makes the dangers of fraud has always been high. According to Tencent mobile phone housekeeper to monitor the 28.57 million fraud messages show that illegal loans, online shopping, viral Web site, malicious Web site and pseudo-base station is the highest proportion of several fraudulent SMS type.

One of the illegal loan fraud messages a dominant, accounting for more than 50%. In the modern “room full of things” and rely on home buyers to seek a sense of security in the context of the community, the loan to buy a house has become a major social needs. Liar also keep up with this social pain points, a large number of illegal loans to send text messages, to profit.

3.2 harassing telephone users labeled up to 235 million times, down 27.12%

3.2.1 2017 users in the first half of the total number of harassment calls 235 million times down 27.12%

After the first half of 2015, after the explosive growth in the first half of 2015, the number of harassing telephone marks began to decline year by year in the first half of 2016, and the total number of harassing telephone marks in the first half of 2017 was 235 million, down from the first half of 2016 %.

3.2.2 In the first half of 2017, more than 50% of harassing calls were sounded

User-tagged harassing phone types are divided into five categories. Among them, the sound ranked first, accounting for more than 50%. This kind of harassing phone will not cause serious harm to the user, but will still affect the use of mobile phones, interference users. Phishing calls accounted for 15.14%, ranked second, in addition to advertising sales, real estate intermediary and insurance management also occupy a certain percentage.

3.2.3 harassing telephone calls for the highest proportion of verification code

According to Tencent mobile phone housekeeper users take the initiative to report the harassment of telephone malicious clues show that asking for verification code, fake leadership, transfer, online shopping and offense is the most common keywords. Which requires the highest proportion of verification code, nearly 24.74% of the harassing phone, the liar will be through various means to ask for verification code, and verification code as an important private information, once leaked, it is easy to cause property damage.

3.2.4 fraud telephone mark down 59.68% year on year, Beijing up

In the user has been marked 235 million harassing phone, scams like telephone ratio is far less than loud, but its substantial harm caused by the largest. Based on Tencent mobile phone housekeeper user fraud phone tag data show that in the first half of 2017 defraud telephone mark down 59.68%, a total of 35.59 million.

These frauds are targeted at the target area is more clear to the eastern coastal economically developed areas and inland central provinces. On the urban side, Beijing is the largest number of cities with the largest number of fraudulent calls, up to 1.826 million. Shenzhen and Guangzhou, respectively, to 141.8 million and 1.257 million mark the number followed. Shanghai, Xi’an, Changsha, Chengdu, Hangzhou, Chongqing and Wuhan are ranked fourth to ten.

3.3 malicious Web site to intercept up to 47.8 billion, pornographic fraud head of the site

3.3.1 The number of malicious web sites detected in the first half of 2017 exceeded 1.83 billion

In the first half of 2017, Tencent security in the PC and mobile side detected a total of more than 183 million malicious web site, the overall trend of rising volatility. Which in June detected 35.75 million malicious Web site, the highest for the first half, the lowest in April, the number of 25.53 million detection.

3.3.2 Pornography The website is still the main means of committing malicious web sites

In the effective detection of malicious Web site at the same time, the first half of 2017 Tencent security in the PC and mobile side to intercept malicious sites up to 47.8 billion times, equivalent to 265 million times a day intercept. This huge data also further illustrates the grim situation of Internet security.

In Tencent’s securely intercepted malicious Web site, pornographic websites, gambling sites, information scams, malicious files, fake ads and phishing scams are the most widely distributed six categories of malicious Web sites. Which accounted for half of the site of pornography, accounting for 51.98%, pornographic fraud sites will be embedded fraudulent advertising or trick users to pay online. Malicious Web site will also be embedded in the fraud message to spread, to increase the confusion, so users see the text in the URL, should consciously raise vigilance, remember not to click.

3.4 iOS harassment and fraud phone calls fell by about 35%, calendar ads into new harassment

3.4.1 iOS harassment calls and phishing calls appear more substantial decline

In September 2016, Tencent mobile phone housekeeper and Apple introduced a new version of iOS10, the first increase in interception harassment and fraud phone features, effectively alleviate the troubled iPhone users troubled phone problems. Data show that the first half of 2017 iOS users were marked a total of 14.492 million harassing telephone, fraud, telephone 2.196 million times.

From the overall trend point of view, the first half of the iOS harassment phone signs showed a downward trend in the number of signs in January the highest number of 3.195 million times, only 2.0 million in April, the first half of the lowest peak. In contrast, the overall trend of fraudulent phone is more stable. From the above data can be seen, the first half of 2017 harassing telephone and phishing calls have emerged a more substantial decline, which is inseparable from the relevant departments, mobile operators and mobile phone users to work together.

3-4 calendar ads into the third largest harassment of Apple phones

Spam, harassing the phone, calendar advertising has become the main source of iPhone users harassment. Among them, the calendar advertising harassment problem is increasingly serious. 61.1% of users have experienced calendar ads, including gambling ads, real estate advertising, taxi software advertising top three.

3.5 Tencent Kirin system to combat pseudo-base station protection 150 million people

3.5.1 Tencent Kirin system to intercept 230 million fraud messages to protect 150 million people

In the first half of 2017, Tencent Kirin pseudo-base station real-time positioning system for the national users to intercept 230 million pseudo-base station fraud messages, the total impact of the number of 150 million people.

3.5.2 pseudo-base station regional characteristics: Sichuan, Shaanxi, Hubei, Hubei and Hubei provinces up

From the geographical point of view, Tencent Kirin for Sichuan, Shaanxi, Beijing, Hubei, Hunan users to intercept the largest number of fraudulent SMS, the five provincial administrative departments to intercept the number of fraud messages more than 50% of the total.

From the city point of view, the number of intercepting the number of fraud messages Top 10 cities such as Beijing, Chengdu, Xi’an, etc. are almost capital cities or economically developed cities, due to densely populated, urban residents income is higher, by pseudo-base station fraud gang included in the key attack Object.

3.5.3 pseudo-base station crime time characteristics: the most frequent working hours

From the time of committing the crime point of view, pseudo-base station fraud messages sent between 9 am to 19 pm, which in 10 am to 12 pm, 15 pm to 18 pm for the two peaks. It is easy to see that the peak of fraudulent SMS coincides with the daily working hours.

3.5.4 Content characteristics: Industrial and Commercial Bank of China, China Mobile most “lying gun”

Pseudo-base station SMS type, the points exchange, account abnormalities and bank credit card mention category accounted for close to 90%. These three categories often associated with operators, banks, often points to clear, credit card to mention the amount, account real name, abnormal and other reasons to fraud.

Tencent Kirin intercepted pseudo-base station counterfeit port, counterfeit industrial and commercial bank fraud SMS up to (up to 52%), Top 5 counterfeit port in addition to middle peasants construction of four major banks, as well as operators China Mobile. It is not difficult to see that these “lying gun” business because the user community is huge, business mode, short message is particularly important, so become a pseudo-base station fraud group to simulate the main object to send.

Fake base station SMS reach the user’s operator distribution, China Mobile accounted for 74%, followed by China Telecom (16%), China Unicom (10%).

Fourth, the first half of 2017 safety personnel development progress and results

4.1 “Network Security Law” to promote the comprehensive training of talent

June 1, 2017 from the implementation of the “Internet Security Law” for the first time in the form of legal provisions of the network space security field of personnel requirements, not only reflects the country’s attention to the network of talent, but also for the State Council and the local network The rules of safety personnel training provide the highest level of legal basis.

“Network Security Law” provides that: state support enterprises and institutions of higher learning, vocational schools and other education and training institutions to carry out network security-related education and training, to take a variety of ways to train network security personnel, and promote network security personnel exchanges. Network security personnel not only include technical talent, but also management talent. The current network security is not only the technical contest, it is the idea, the rules of the contest, familiar with international rules, power relations network security personnel in the future of cyberspace competition can play a greater role. Therefore, the training of network security personnel not only to cultivate traditional talents, but also based on the domestic, look at the world, cultivate a comprehensive understanding of network diplomacy talent.

At the same time, the provisions of the provisions of the “network of security personnel exchanges”, reflects the training mechanism for China’s open innovation and innovative ideas. Talent training is inseparable from the advanced countries of academic research and technical exchanges, the business organizations should attract foreign high-end technical personnel, while speeding up the training of our top talent.

4.2 security personnel training “Tencent mode”: to create talent closed-loop

As an advocate of Internet security open platform, Tencent has been “network security” as an important part of the enterprise design and strategic project. In the process of continuous attention and support of safe personnel selection and training, Tencent has gradually recruited a set of safety personnel selection system in the aspects of campus recruitment, social recruitment, promotion of internal talents, salary and welfare, etc .; at the same time, Security events and promote personnel training program, Tencent has gradually formed a mature, perfect, and for social reference to the safety of personnel training system.

Tencent in 2017, the parties launched the Tencent Information Security Competition (TCTF), through the internationalization of the system to explore talent, through high-quality counseling mechanism and professional mentor team training personnel and through the construction of enterprises and universities bridge transport personnel. At the same time, Tencent through the creation of “Hundred Talents Program” to build the Internet security personnel training closed-loop, through the TCTF contest layers of competition examinations, selected the most potential of 100 security personnel, and through continuous follow-up training to build the Internet security complex, Leading talent.

Tencent hopes to TCTF as a professional security personnel training platform between enterprises and universities to build a bridge between the formation of selection, training, transportation in one of the closed-loop talent for the Chinese new forces to provide a multi-dimensional growth environment, and further promote the development of China’s network security The

4.3 Tencent security joint laboratory set up the first anniversary: ​​escort six key areas of the Internet

July 2016, Tencent security integration of its laboratory resources, the establishment of the first domestic Internet laboratory matrix – Tencent security joint laboratory, which covers Cohen Laboratory, basaltic laboratory, Zhan Lu laboratory, cloud tripod laboratory, Anti-virus laboratory, anti-fraud laboratory, mobile security laboratory, including seven laboratories. Laboratory focus on security technology research and security attack and defense system structures, security and security coverage covers the connection, systems, applications, information, equipment and cloud, touch the six key areas of the Internet.

2016, Tencent security joint laboratory for Google, Microsoft, Apple, adobe and other international manufacturers to dig a total of 269 loopholes, ranking first in the country. In addition, by virtue of “the world’s first long-range non-physical contact with the invasion of Tesla car” research results, Tencent security joint laboratory Cohen laboratory selected “Tesla security researcher Hall of Fame”, and Tesla CEO Maske’s personal thanks The

In the field of anti-fraud in the country concerned, the anti-fraud laboratory in Tencent Security Joint Laboratory has formed a set of new standards for anti-fraud evaluation based on AI innovation + ability and openness in the field of anti-fraud research. Stop mode. In the AI ​​innovation and the ability to open the two-wheel drive, the laboratory has launched Hawkeye anti-telephone fraud system, Kirin pseudo-base station real-time positioning system, God anti-phishing system, God investigation funds flow control system, God sheep intelligence analysis platform Five systems, and through the Tencent cloud SaaS services open to the need for government units, enterprises, etc., to help users prevent Internet fraud.

Five, safe hot event inventory

5.1 outbreak of Serbian virus and virus outbreak

5.1.1 WannaCry extortion virus broke out globally on 12 May

Event Background:

On May 12th, WannaCry (wanna cry) bitbell blackmail virus broke out on a global scale. According to Tencent security anti-virus laboratory security researchers found that the extortion event compared with the past, the biggest difference is that the extortion virus combined with the way worms to spread. Due to the leak in the NSA file, WannaCry spread vulnerability code is called “EternalBlue”, so some reports that the attack is “eternal blue”.

Virus Detailed Explanation:

The outbreak of blackmail virus in the past two years is largely related to the increasing perfection of encryption algorithms. The continuous updating of cryptography and algorithms ensures the security of data transmission and preservation in our daily network. Unfortunately, the author of the extortion virus also used this feature, so that although we know the Trojan algorithm, but do not know the author to use the key, there is no way to restore the file is maliciously encrypted.

Encryption algorithms are usually divided into symmetric encryption algorithm and asymmetric encryption algorithm two categories. These two types of algorithms are used in the blackmail virus.

The encryption and decryption of the symmetric encryption algorithm uses exactly the same key, which is characterized by a faster operation, but when using such an algorithm alone, the key must be exchanged with the server using a method that is recorded in the process And the risk of leakage. The symmetric encryption algorithms commonly used for blackmail viruses include AES and RC4.

Asymmetric encryption algorithm is also known as public key encryption algorithm, which can use the public key to encrypt the information, and only the owner of the private key can be decrypted, so as long as the public key and save the private key, you can guarantee The encrypted data is not cracked. The asymmetric encryption algorithm is usually slower than symmetric encryption. The asymmetric encryption algorithms commonly used by blackmail viruses include RSA algorithms and ECC algorithms.

Usually, the blackmail virus will combine these two categories of encryption algorithms, both can quickly complete the entire computer a large number of documents encryption, but also to ensure that the author’s private key is not leaked.

5.1.2 new round of extortion virus “Petya” struck, more destructive

Event Background: 

June 27 A new round of extortion virus Petya attacked several European countries. This virus is more damaging than WannaCry. The virus encrypts the computer’s hard disk MFT and modifies the MBR so that the operating system can not enter. Compared to the previous, Petya more like a purpose of the attack, rather than a simple extortion. Tencent Hubble analysis system has been able to identify the virus and determine the high risk, the use of Tencent computer housekeeper can kill the virus.

Virus Detailed Explanation:

Petya Serbia virus virus poisoning will scan the network after the machine, through the eternal blue loopholes since the spread, to achieve the purpose of rapid propagation. Foreign security researchers believe that Petya extortion virus variants will be spread through the mailbox attachment, using the vulnerability to carry the DOC document to attack. After poisoning, the virus will modify the system MBR boot sector, when the computer restart, the virus code in the Windows operating system before taking over the computer, the implementation of encryption and other malicious operations. After the computer restarts, it will display a disguised interface, this interface is actually a virus display, the interface is suspected of being a disk scan, in fact, the disk data encryption operation.

5.1.3 Laurent virus Tencent security response program

For the outbreak of extortion virus, Tencent security emergency response program, for the advance prevention, in the virus cleanup and after the file recovery three cases, to the majority of users to deal with recommendations:


1. Use the computer housekeeper’s extortion virus immune tools, automated installation system patches and port shielding, or manually download and install.

2. Back up the data, install the security software, turn on the protection.

a) the relevant important documents using offline backup (that is, the use of U disk, etc.), such as backup;

b) the use of some computers with the system restore function, without attack before setting the system restore point, after the attack can restore the system, defense file encryption;

c) install Tencent computer housekeeper, open real-time protection, to avoid attack;

d) the use of computer housekeeper’s document guardian of the file backup, protection.

3. To establish an inactivated domain name for immunization.

According to the existing sample analysis, there is a trigger mechanism for extortion software, if you can successfully access the specified link, the computer will be in the extortion of the virus directly after the exit, it will not file encryption.

a) Ordinary users can be connected to the site, to ensure access to the site, you can avoid the attack to avoid being encrypted (only known to extortion virus);

b) enterprise users can build Web Server through the intranet, and then through the way DNS DNS domain name resolution to Web Server IP way to achieve immunity; through the domain name of the visit can also monitor the situation of intranet virus infection.

Things in the virus clean up

1. Unplug the cable and other ways to isolate the computer has been attacked to avoid infection with other machines.

2. Use the computer steward’s antivirus function to directly check out the blackmail software, scan clean up directly (isolated machines can be downloaded through the U disk, etc. to install the offline package).

3. Back up the relevant data directly after the system reload.

After the file is restored

1. Blackmail software with the ability to restore part of the encrypted file, you can directly through the extrapolated software to restore part of the file; or directly click on the blackmail interface, “Decrypt” pop-up recovery window to restore the list of files.

2. You can use third-party data recovery tool to try data recovery, cloud users can contact Tencent security cloud tripod laboratory to help deal with.

5.2 DDOS attacks continue, dark clouds variants frequently struck

Event Background:

June 9, a 2017 years since the largest DDoS network attack activities swept the country, Tencent security cloud tripod laboratory released traceability analysis report, through the attack source machine analysis, engineers found in the machine dark cloud Ⅲ variants. Through the flow, memory DUMP data and other content analysis, Tencent cloud tripod laboratory to determine the large-scale DDoS attacks by the “dark cloud” hacker gang initiated. After the upgrade, “Dark Cloud III” will be the main code stored in the cloud, real-time dynamic updates.

Virus Detailed Explanation:

“Dark cloud” series Trojan from the beginning of 2015 by Tencent anti-virus laboratory for the first time to capture and killing, has been more than two years. In the past two years, the Trojan constantly updated iteration, continue to fight against the upgrade.

From the beginning of April this year, the Trojans comeback again, the outbreak of the outbreak of the dark horse than the previous version of the more obvious promotion features, so we named it dark clouds Ⅲ. Dark clouds Ⅲ compared with the previous version has the following characteristics and differences:

First, more subtle, dark cloud Ⅲ is still no file without a registry, compared with the dark cloud II, cancel the number of kernel hooks, cancel the object hijacking, become more hidden, even professionals, it is difficult to find traces The

Second, the compatibility, because the Trojan mainly through the hook disk drive StartIO to achieve the protection and protection of the virus MBR, such a hook is located in the bottom of the kernel, different types of brand hard drive need hook point is not the same, this version of the Trojan increased More judgment code, able to infect the vast majority of the market and hard disk.

Third, targeted against security software, security vendors, “first aid kit” type of tool to do a special confrontation, through the device name of the way to try to prevent the pit of some tools to load the run.

5.3 in the first half of the focus of fraud cases inventory

5.3.1 Xu Yuyu telegraphic case

August 2016, just by the Nanjing University of Posts and Telecommunications Xu Yuyu, received a fraudulent phone, the other scholarship in the name of cheating Xu Yuyu University of the cost of 9900 yuan. After the report of Xu Yuyu emotional abnormalities, leading to sudden cardiac death, unfortunately died, triggering social concern about the unprecedented fraud. The case was publicly declared on July 19, 2017, the principal Chen Wenhui was sentenced to life imprisonment, confiscation of all personal property. The other six defendants were sentenced to 15 to 3 years imprisonment and fined. This verdict, to the community to pass the court in accordance with the law severely punished the telecommunications network fraud crime clear attitude.

Proposed: Xu Yuyu tragedy enough to cause public vigilance. Internet era, each person’s information flow are online through different channels of circulation, to the lawless elements can take advantage of the machine. Faced with such an environment, we should be on the strange phone and SMS alert. Even if the other can speak personal accurate information, can not be trusted, any event needs to be verified by reliable channels to protect their own security.

5.3.2 Henan large telecommunications fraud: lied to sell college entrance examination answers cheat nearly 100 million students

June 2017, Henan HebiCity police cracked the big telecommunications fraud, arrested two suspects, seized more than 70 copies of bank cards. These suspects under the guise of selling college entrance examination questions answer the way, through the network of college entrance examination candidates to implement fraud. According to the police preliminary investigation, fraud victims accumulated more than 3,500 people, involving more than 3 million yuan.

Prevention recommendations: the annual admission of college entrance examination, college entrance examination fraud is a high period of time. Candidates and parents need to beware of all the so-called “internal indicators”, false check the site, false search results such as college entrance examination in the name of all kinds of fraud means, do not have luck, deceived.

5.3.3 Wuhan female teachers suffered a series of telecommunications fraud 7 months to cheat 2.53 million

Wuhan, a secondary school teacher Chen, master’s degree, 2017 May to the police alarm fraud. It is understood that in November 2016, Chen received a strange call, said its social security card was stolen brush, and directly to the phone to the “Hunan Provincial Public Security Department.” Answer the phone “police” said Ms. Chen involved a fraudulent money laundering case, as “washing charges”, Ms. Chen half a year to the other side of the transfer of 2.53 million, the debt owed more than 300 million. The case is still in the investigation.

Precautionary advice: people need to be alert to unfamiliar calls and text messages. When receiving a suspected fraud or SMS, pay attention to verify the identity of the other party, especially the other party to the designated account remittance, do not easily remittance, should be the first time to inform the family to discuss or consult the public security organs; The public security department can not provide a security account, but will not guide you transfer, set a password.

Six, security experts advice

In the computer use, set the security factor high password. Using a password that is not easily guessed by violent attacks is an effective way to improve your security. Violent attack is an attacker using an automated system to guess the password. Avoid using words that can be found in the dictionary, do not use pure digital passwords; use special characters and spaces, and use uppercase and lowercase letters. This password is harder to crack than use your mother’s name or birthday as a password. In addition, the password length for each additional one, the combination of the composition of the password characters will increase in multiple, so the long password will be more secure.

Regularly upgrade the software, update the security patch. In many cases, it is important to patch the system before installing and deploying the production application software. The final security patch must be installed on the PC’s system. If not for a long time without a security upgrade, may lead to the computer is very easy to become an unethical hacker attack target. Therefore, do not install the software on a computer that does not have a security patch update for a long time.

Protect your data by backing up important documents. Back up your data, which is one of the important ways you can protect yourself from minimizing the loss in the face of a disaster. If the amount of data is huge, the data can be saved to the hard disk. But more convenient way, you can use Tencent computer steward class of security software, at any time to automatically restore the data to the local, you can also store to the cloud, maximize the data to ensure security.

Do not easily trust the external network, open network risk is huge. In an open wireless network, such as in a wireless network with a coffee shop, the network risk will multiply, this concept is very important. This does not mean that in some untrusted external network can not use the wireless network, but to always keep the security and caution of security. The key is that the user must be through their own systems to ensure safety, do not believe that the external network and its own private network as safe.

Improve the unfamiliar telephone, SMS alertness, do not believe in which the content. Fraudulent forms of SMS diversification, a variety of new SMS Trojans flooding through the temptation of the SMS comes with the virus link to pay the class, privacy stealth virus rapid growth. For the “college entrance examination”, “school notice”, “test report card”, “household registration management”, “mobile phone real name system”, “video video” and “traffic violation” and other text messages embedded in the URL link should be vigilant, Do not click anywhere. For unfamiliar calls, SMS should be vigilant and wary, do not believe what the other side of the content, if necessary, to verify their identity information.

Protect personal privacy information, do not easily disclose personal information to others. Personal account, password, ID card information and other key personal privacy information, it is absolutely free to any unfamiliar SMS, the phone revealed. Receive a strange message, the phone asked personal privacy, be sure to be vigilant. When publishing a message on a social platform, beware of important privacy information in the form of photos, screenshots, etc. Do not arbitrarily discard tickets, tickets or courier documents containing personal information to prevent personal information from being stolen.

Mobile phone users should develop good habits to use security software to protect the safety of mobile phones. Mobile phone users can download and install such as Tencent mobile phone housekeeper a class of mobile phone security software, regular mobile phone physical examination and virus killing, and timely update the virus database. For the latest popular and difficult to remove the virus or vulnerability, you can download the killing tool in time to kill or repair. At the same time open Tencent mobile phone housekeeper harassment intercept function, which can effectively intercept fraud phone, SMS, enhance mobile phone security.

Original Mandarin Chinese:

1 互联网安全形势严峻,大力发展网络安全防护势在必行












1.1 影响全球的六大网络安全事件,累计影响遍及全球


2017年3月7日,维基解密(WiKiLeaks)公布了数千份文档并揭秘了美国中央情报局关于黑客入侵技术的最高机密,根据泄密文档中记录的内容,该组织不仅能够入侵iPhone手机、Android手机和智能电视,而且还可以入侵攻击Windows、Mac和Linux操作系统,甚至可以控制智能汽车发起暗杀活动。外界将此次泄漏事件取名为Vault 7,Vault 7公布的机密文件记录的是美国中央情报局(CIA)所进行的全球性黑客攻击活动。



2017年4月14日,影子经纪人(Shadow Brokers)在steemit.com上公开了一大批NSA(美国国家安全局)“方程式组织” (Equation Group)使用的极具破坏力的黑客工具,其中包括可以远程攻破全球约70%Windows机器的漏洞利用工具。任何人都可以使用NSA的黑客武器攻击别人电脑。其中,有十款工具最容易影响Windows个人用户,包括永恒之蓝、永恒王者、永恒浪漫、永恒协作、翡翠纤维、古怪地鼠、爱斯基摩卷、文雅学者、日食之翼和尊重审查。黑客无需任何操作,只要联网就可以入侵电脑,就像冲击波、震荡波等著名蠕虫一样可以瞬间血洗互联网。

1.1.3 “WannaCry”敲诈勒索病毒5月12日在全球爆发



1.1.4 FireBall火球病毒感染超过2.5亿电脑

2017年6月1日,国外安全机构Check Point发报告称在国外爆发了“FireBall”病毒,并声称全球有超过2.5亿台电脑受到感染,其中受影响最大的国家分别是印度(10.1%)和巴西(9.6%)。美国有550万台电脑中招,占2.2%。受感染的企业网络中,印度和巴西分别占到43%和38%,美国则为10.7%。





















2.1.1 木马病毒拦截量平均每月近1.7亿次



2.1.2 PC端广东用户中毒最多,中毒高峰期为上午9-11点 上半年共发现2.3亿次用户机器中木马病毒 


2017年Q2季度相较于2016年Q2季度报毒用户量同比增长3%。从2015年到2017年Q2季度中毒机器数增长趋势明显,呈逐年递增状态。 PC端用户中毒高峰期为上午9点到11点

根据统计,每天中毒高峰时间为上午10点-上午11点,符合企业及普通用户上午9点-上午11点开启电脑处理工作的规律。这段时间用户中毒的病毒类型较多为利用邮件、共享等方式传播的Office文档类宏病毒,说明企业办公安全防护形势依旧严峻。 PC端中毒用户省份最多为广东,其中深圳市居首



2.1.3第一大病毒种类为占比53.8%的木马病毒,勒索病毒新增13.39% PC端第一大种类病毒依然是木马,PE感染型病毒种类少但传播性大

























2.2 移动端共查杀Android病毒6.93亿次,手机染毒用户数超1亿



2.2.2 移动端广东用户中毒最多,染毒手机用户数同比减少45.67%上半年腾讯手机管家共查杀Android病毒6.93亿次


除6月以外,2017年上半年每月查杀病毒次数均超过1亿次,其中1月份查杀次数更高达1.36亿次,几乎与2014年上半年1.4亿的查杀次数持平。 2017年上半年染毒手机用户数超1亿 


2017年1月单月感染用户数达到2166万,为上半年最高纪录,此后感染用户数开始缓慢下降。 移动端中毒用户数量广东居首







感染了全球超3600万安卓设备的恶意广告点击软件“Judy”就属于资费消耗类手机病毒。该恶意软件暗藏于一款韩国手游中,在完成下载安装后,会将感染设备的信息发送到目标页面,并在后台自动下载恶意代码并访问广告链接,盗刷用户流量,给用户造成资费消耗。 二维码、软件捆绑是移动病毒主要渠道来源





3.1.1 2017年上半年垃圾短信持续增长 总数接近6亿





3.1.3 2017年上半年常见的诈骗短信类型




3.2.1 2017年上半年用户共标记骚扰电话2.35亿次 同比下降27.12%


3.2.2 2017年上半年骚扰电话超过50%为响一声


3.2.3 骚扰电话中索要验证码占比最高


3.2.4 诈骗电话标记数同比下降59.68%,北京最多



3.3 恶意网址拦截次数高达478亿,色情欺诈网站居首

3.3.1 2017年上半年检出恶意网址数量超1.83亿





3.4 iOS骚扰及诈骗电话降幅约35%,日历广告成新的骚扰

3.4.1 iOS骚扰电话和诈骗电话出现较大幅度下降





3.5 腾讯麒麟系统打击伪基站保护1.5亿人次





从城市来看,拦截诈骗短信数量Top 10的城市如北京、成都、西安等几乎均为省会城市或经济较发达城市,由于人口密集、城市居民收入较高,被伪基站诈骗团伙列入重点攻击对象。

3.5.3 伪基站作案时间特征:工作时间最频繁




腾讯麒麟拦截的伪基站仿冒端口中,仿冒工商银行的诈骗短信最多(高达52%),Top 5仿冒端口除中农工建四大银行,还有运营商中国移动。不难看出,这些“躺枪”的企业是因为用户群体巨大,业务模式中短信息又尤为重要,所以成为伪基站诈骗团伙主要模拟的发送对象。







4.2 安全人才培养“腾讯模式”:打造人才闭环









5.1 勒索病毒集中爆发及病毒详解

5.1.1 WannaCry敲诈勒索病毒5月12日在全球爆发









5.1.2 新一轮勒索病毒“Petya”来袭,更具破坏性

















b)企业用户可以通过在内网搭建Web Server,然后通过内网DNS的方式将域名解析到Web Server IP的方式来实现免疫;通过该域名的访问情况也可以监控内网病毒感染的情况。








5.2 DDOS攻击不断,暗云变种频繁来袭







第二、兼容性,由于该木马主要通过挂钩磁盘驱动器的StartIO来实现隐藏和保护病毒MBR,此类钩子位于内核很底层,不同类型、品牌的硬盘所需要的 hook点不一样,此版本木马增加了更多判断代码,能够感染市面上的绝大多数系统和硬盘。



5.3.1 8.19徐玉玉电信诈骗案宣判






5.3.3武汉女教师遭遇连环电信诈骗 7个月被骗253万











Referring URL:

Comparative Analysis of Military Command Structures : China. DPRK, Russia, US // 中,美,苏,俄罗斯,朝鲜武装力量指挥体系

Comparative Analysis of Military Command Structures :China. DPRK, Russia, US //



China ‘s Armed Forces Command System

China, the United States, the Soviet Union, Russia, North Korea armed forces command system

Overview of China ‘s Armed Forces

China, the United States, the Soviet Union, Russia, North Korea armed forces command system


China, the United States, the Soviet Union, Russia, North Korea armed forces command system


China, the United States, the Soviet Union, Russia, North Korea armed forces command system

Description: blue font for the deputy military units. Xinjiang Military Region is the only deputy deputy military district, under the Lanzhou Military Region.

American military command system

China, the United States, the Soviet Union, Russia, North Korea armed forces command system

US military command system description

The president of the United States is the commander in chief of the armed forces and the supreme commander of the armed forces. The president, through the Ministry of Defense leadership and command of the army, emergency can be leapfrog command. The strategic nuclear forces are controlled by the president at all times.

The National Security Council is the supreme defense decision-making advisory body. Its legal members include the President, Vice President, Secretary of State, Defense Minister. The Chairman of the Joint Chiefs of Staff is the statutory military adviser to the National Security Council. The Director of the CIA is the National Security Council’s statutory intelligence adviser. The daily work of the National Security Council is the responsibility of the President’s National Security Adviser (Consultant).

The Ministry of Defense is the supreme military organ that leads and directs the US Armed Forces, is responsible for the defense policy, the formulation and implementation of the plan, and the management of the defense affairs, and through the joint meeting of the Chief of Staff to carry out operational command. It consists of the Ministry of Defense headquarters system, the military system and operational command system composed of three parts.

Department of Defense Department of the system is mainly responsible for the policy, finance, military and other military affairs, as well as the coordination between the military. Under the policy, procurement and technical, personnel and combat readiness, auditing and finance, directing communication control and intelligence, legislation, logistics affairs, intelligence supervision, administration, public affairs, supervision, combat test and evaluation departments, respectively, by the Deputy Defense Minister , Assistant defense minister, director, director or department head and other supervisors.

The military system consists of the Ministry of War, the Air Force Department and the Department of the Navy three military (military department). The military departments are responsible for the administration of the service, education and training, weapons and equipment development and procurement and logistical support and other duties, and the responsibility to warfare to the joint operations headquarters to provide combat troops and the corresponding service and logistical support, but no combat Command. The military minister is a civilian officer, under which he is the chief of staff (Navy for the combat minister). The chief of staff (naval combat minister) is the highest military officer of the service.

The operational command system refers to the Joint Chiefs of Staff and the Joint Command and Special Command affiliated to it. The Joint Chiefs of Staff is both the President, the Minister of Defense, the Military Advisory Body of the National Security Council, and the Military Commander of the President and the Minister of Defense to issue operational orders to the Joint Command and Special Command. In a sense, the Department of Defense is the military and government departments of the President, and the Joint Chiefs of Staff is the President’s military order.

The former Soviet Union military command system

China, the United States, the Soviet Union, Russia, North Korea armed forces command system

Russian military command system

China, the United States, the Soviet Union, Russia, North Korea armed forces command system

North Korea ‘s Military Command System

China, the United States, the Soviet Union, Russia, North Korea armed forces command system

Original Mandarin Chinese:

























中國政府要求公開評論保護中國關鍵基礎設施 // Chinese Government Requests Public Comment on Securing China Critical Infrastructure


Chinese Government Requests Public Comment on Securing China Critical Infrastructure

Notice of the National Internet Information Office on the Public Opinion on the Protection of Key Information Infrastructure Security Regulations (Draft for Soliciting Opinions)

    In order to ensure the security of key information infrastructure, according to the “Internet Security Law of the People’s Republic of China”, we will draft the “Key Information Infrastructure Safety Protection Regulations (draft)” with the relevant departments. The relevant units and people of all walks of life may submit their views by August 10, 2017 by:

First, by mail to the views sent to: Xicheng District, Beijing Chegongzhuang Street on the 11th National Internet Information Office Network Security Coordination Bureau, Zip code 100044, and in the envelope marked “comments”.

Second, by e-mail to:


Annex: Key information infrastructure security regulations (draft)


National Internet Information Office

 July 10, 2017

Key information infrastructure security regulations


Chapter 1 General Provisions

    Article 1 These Regulations are enacted in accordance with the Network Security Law of the People’s Republic of China in order to ensure the safety of key information infrastructures.

Article 2 These Regulations shall apply to the planning, construction, operation, maintenance and use of key information infrastructures within the territory of the People’s Republic of China and the protection of key information infrastructures.

Article 3 The key information infrastructure security protection adhere to the top design, overall protection, coordination, division of labor is responsible for the principle, give full play to the role of the main operation, the active participation of all parties to jointly protect the key information infrastructure security.

Article 4 The competent department of national industry or the supervisory department shall be responsible for guiding and supervising the protection of key information infrastructure in the industry and in the field in accordance with the division of responsibilities stipulated by the State Council.

State network letter department is responsible for coordinating the key information infrastructure security protection and related supervision and management work. The State Council public security, national security, state secrecy administration, national password management and other departments within their respective responsibilities are responsible for the relevant network security protection and supervision and management work.

The relevant departments of the local people’s governments at or above the county level shall carry out the key information infrastructure safety protection work in accordance with the relevant provisions of the State.

Article 5 The operator of the key information infrastructure (hereinafter referred to as the operator) shall bear the responsibility for the security of the key information infrastructure of the unit, perform the obligation of network security protection, accept the government and social supervision, and bear social responsibility.

The country encourages network operators outside key information infrastructures to participate voluntarily in critical information infrastructure protection systems.

Article 6 Key information infrastructure In the network security level protection system, based on the implementation of key protection.

Article 7 Any person or organization who discovers the safety of the infrastructure of the critical information infrastructure shall have the right to report to the department of the letter, telecommunications, public security and industry supervisors or supervisors.

The department that receives the report shall handle it in a timely manner and if it does not belong to the duties of the department, it shall promptly transfer the department to be handled.

The relevant departments shall keep the relevant information of the whistleblower and protect the legitimate rights and interests of the whistleblower.


Chapter II Support and Safeguard

    Article 8 The State shall take measures to monitor, defend and dispose of network security risks and threats arising from the territory of the People ‘s Republic of China, protect the critical information infrastructure from attack, intrusion, interference and destruction, and punish the criminal activities of the Internet according to law.

Article 9 The State shall formulate policies such as industry, finance, taxation, finance and personnel, support the innovation of key information infrastructure related technologies, products and services, promote safe and reliable network products and services, train and select network security personnel, and improve key information The level of safety of the infrastructure.

Article 10 The State shall establish and improve the network security standard system and use standard guidance to standardize the work of key information infrastructure security protection.

Article 11 The people ‘s governments at or above the municipal level shall incorporate the key information infrastructure security protection into the overall planning of the economic and social development of the district, increase the investment and carry out the evaluation and evaluation of the work performance.

Article 12 The State encourages government departments, operators, scientific research institutions, network security services, industry organizations, network products and service providers to carry out key information infrastructure security cooperation.

Article 13 The competent department of industry or the supervisory department of the State shall set up or clarify the institutions and personnel who are responsible for the protection of key information infrastructure in the industry and in this field, and compile and organize the implementation of the industry, the network security planning in the field, and establish a sound work Funding protection mechanism and supervise the implementation.

Article 14 Energy, telecommunications, transportation and other industries shall provide key support and support for power supply, network communication, transportation and other aspects of emergency management and network function restoration of key information infrastructure network security incidents.

Article 15 Public security organs and other departments shall, according to law, investigate and punish illegal and criminal activities against and use key information infrastructures.

Article 16 Any individual or organization shall not engage in any of the following activities and actions that endanger the critical information infrastructure:

(I) attacks, intrusion, interference, and destruction of critical information infrastructures;

(B) illegally obtaining, selling or unauthorized access to information such as technical information that may be used exclusively for the safety of critical information infrastructures;

(Iii) unauthorized penetration of critical information infrastructures, aggressive scanning detection;

(D) knowing that others are engaged in activities that endanger the security of key information infrastructure and still provide assistance such as Internet access, server hosting, network storage, communication transmission, advertising promotion, payment settlement and so on;

(E) other activities and actions that endanger the critical information infrastructure.

Article 17 The State shall safeguard the network security based on the open environment and actively carry out international exchanges and cooperation in the field of key information infrastructure security.


Chapter 3 Key Information Infrastructure Scope

    Article 18 The network facilities and information systems operated and managed by the following units shall be included in the scope of protection of key information infrastructures in the event of damage, loss of function or data leakage, which may seriously endanger the national security, the people’s livelihood and the public interest.

(A) government agencies and energy, finance, transportation, water conservancy, health care, education, social security, environmental protection, public utilities and other sectors of the unit;

(B) telecommunications networks, radio and television networks, the Internet and other information networks, and provide cloud computing, large data and other large public information network services units;

(3) scientific research and production units in the fields of national defense science and technology, large-scale equipment, chemical industry, food and medicine industry;

(4) news units such as radio stations, television stations and news malls;

(5) other key units.

Article 19 The State Network Letter Department shall, in conjunction with the competent departments of telecommunications under the State Council and the public security departments, formulate guidelines for the identification of key information infrastructure.

National industry supervisors or regulators organize identification of the industry and key information infrastructures in the field in accordance with the key information infrastructure identification guidelines and submit the identification results according to the procedures.

Key information infrastructure identification process, should give full play to the role of experts, improve the identification of key information infrastructure identification accuracy, rationality and scientific.

Article 20 If a major change in the key information infrastructure or key information infrastructure has occurred, the operator shall promptly report the relevant situation to the national competent or supervisory department.

The national industry supervisor or the supervisory department shall promptly carry out the identification and adjustment according to the situation reported by the operator and submit the adjustment according to the procedure.


Chapter IV Operator Safety Protection

    Article 21 The construction of a key information infrastructure shall ensure that it has the performance of supporting the stable and continuous operation of the business and ensures that the safety and technical measures are synchronized, synchronized and synchronized.

Article 22 The principal responsible person of the operator is the first person responsible for the safety protection work of the key information infrastructure of the unit. It is responsible for establishing and perfecting the network security responsibility system and organizing the implementation, and is fully responsible for the security protection of the key information infrastructure of the unit.

Article 23 The operator shall, in accordance with the requirements of the network security level protection system, perform the following security protection obligations to protect the critical information infrastructure from interference, damage or unauthorized access to prevent the leakage or theft of the network data:

(1) to formulate internal safety management systems and operating procedures, strict identity authentication and rights management;

(B) to take technical measures to prevent computer viruses and network attacks, network intrusion and other hazards to network security behavior;

(3) to take technical measures to monitor and record the operation status of the network and the network security incident, and keep the relevant network log in accordance with the regulations for not less than six months;

(D) to take data classification, important data backup and encryption authentication and other measures.

Article 24 In addition to Article 23 of these Regulations, the operator shall perform the following safety and protection obligations in accordance with the requirements of national laws and regulations and the mandatory requirements of the relevant national standards:

(A) set up a dedicated network security management and network security management, and the person in charge and key positions for security background review;

(2) regularly carry out network security education, technical training and skills assessment for employees;

(C) of the important systems and databases for disaster recovery, in time for system vulnerabilities and other security risks to take remedial measures;

(D) the development of network security incident contingency plans and regular exercise;

(5) other obligations stipulated by laws and administrative regulations.

Article 25 The person in charge of network security management of the operator shall perform the following duties:

(1) to formulate network security rules and regulations, operational procedures and supervise the implementation;

(2) organizing the skills assessment of key positions;

(3) to formulate and implement the network safety education and training program of the unit;

(4) to organize network security checks and emergency drills to deal with the handling of network security incidents;

(5) to report to the relevant departments of the country on network security important matters, events.

Article twenty-sixth operators of network security key positions of professional and technical personnel to implement the system of certificates.

The specific provisions of the promulgation of posts by the State Council human resources and social security departments in conjunction with the State Network letter and other departments to develop.

Article 27 Operators shall organize the training of network safety education for employees. Each year, the training time shall not be less than one working day, and the number of professional and technical personnel in key positions shall not be less than 3 working days per year.

Article 28 The operator shall establish and improve the safety assessment and evaluation system for the key information infrastructure, and carry out the safety inspection and evaluation when the key information infrastructure is on or after the major changes.

The operator shall, at its own expense, entrust the network security service organization to carry out at least one annual inspection and evaluation of the safety and possible risk of the key information infrastructure, rectify the problems found in time and report the relevant situation to the national industry supervisor or the supervisory department The

Article 29 Personal information and important data collected and produced by the operator in the operation of the People’s Republic of China shall be stored in the territory. For business needs, it is necessary to provide overseas, should be in accordance with personal information and important data outbound security assessment methods to assess; laws, administrative regulations otherwise provided, in accordance with its provisions.


Chapter 5 Product and Service Security

    Article 30 The key equipment and network security special products purchased and used by the operators shall comply with the requirements of laws and administrative regulations and the mandatory requirements of relevant national standards.

Article 31 Where an operator purchases a network product and service that may affect the security of the State, it shall, through the network security review, sign a security confidentiality agreement with the provider in accordance with the requirements of the safety inspection method of the network product and service.

Article 32 Operators shall carry out safety testing on the system, software, and donated network products that have been developed for outsourcing.

Article 33 Where an operator finds that there is a risk of security defects or loopholes in the use of the network products and services, it shall promptly take measures to eliminate the risks and involve significant risks in reporting to the relevant departments.

Article 34 The operation and maintenance of key information infrastructures shall be implemented in the territory. Due to business needs, do need to remote maintenance, should be reported to the national industry executives or regulatory authorities and the State Council public security departments.

Article 35 Institutions that carry out safety assessment and evaluation, publish security threats such as system vulnerabilities, computer viruses, and network attacks for key information infrastructures, provide services such as cloud computing and information technology outsourcing, shall meet the relevant requirements.

The specific requirements by the State Network letter department in conjunction with the relevant departments of the State Council to develop.


Chapter 6 Monitoring, Early Warning, Emergency Handling and Testing

    Article 36 The national network communication department shall co-ordinate the establishment of the key information infrastructure network security monitoring and early warning system and the information communication system, organize and guide the relevant agencies to carry out the network security information summary, analyze and judge the report, and publish the network security monitoring and early warning information according to the regulations The

Article 37 The competent department of industry or the supervisory department of the State shall establish and improve the network security monitoring and early warning and information reporting system of the key information infrastructure in this industry, and keep abreast of the industry, the operation status of the key information infrastructure in the field and the security risks, Inform the operator about safety risks and related work information.

The national industry supervisor or the supervisory department shall organize the judgment of the safety monitoring information, and if it is necessary to take immediate preventive measures, it shall promptly issue the early warning information and emergency preventive measures to the relevant operators and, in accordance with the requirements of the national network security incident contingency plan, Relevant departments report.

Article 38 The national network communication department shall coordinate the relevant departments, operators and relevant research institutions and network security service agencies to establish a network information sharing mechanism for key information infrastructure and promote the sharing of network security information.

Article 39 In accordance with the requirements of the national network security incident contingency plan , the State Network shall, in accordance with the requirements of the national network security incident contingency plan, coordinate the relevant departments to establish and perfect the key information infrastructure network security emergency coordination mechanism, strengthen the network security emergency power construction, and coordinate the relevant departments to organize cross- Regional network security emergency drills.

National industry supervisors or regulators should organize the development of the industry, the field of network security incident contingency plans, and regularly organize exercises to enhance the network security incident response and disaster recovery capabilities. After major network security incidents or early warning information received by the network letter department, should immediately start the contingency plan to respond, and timely report on the situation.

Article 40 The competent department of national industry or the regulatory department shall regularly organize the inspection and inspection of the safety risks of the industry and the key information infrastructure in the field and the performance of the operators’ performance of safety protection, and propose measures to improve the supervision and supervision of the operators in time The problems found in the assessment.

State network letter department co-ordinate the relevant departments to carry out the spot checks to prevent cross-testing and evaluation.

Article 41 The relevant departments shall organize the assessment and evaluation of the key information infrastructure safety, and shall adhere to the principle of objectivity, impartiality, efficiency and transparency, adopt a scientific evaluation and evaluation method, standardize the inspection and evaluation process and control the risk of testing and evaluation.

Operators should be carried out by the relevant departments to implement the assessment and assessment to the assessment of the problems found in time for rectification.

Article 42 The relevant departments may organize the following measures to carry out the safety inspection and evaluation of key information infrastructure:

(1) requiring the relevant personnel of the operator to make a statement on the examination and evaluation;

(B) access to, retrieval, reproduction and safety protection related documents, records;

(C) to view the network security management system development, implementation and network security technical measures planning, construction, operation;

(4) to use the testing tools or commissioned by the network security services for technical testing;

(5) other necessary means agreed by the operator.

Article 43 The information obtained by the relevant departments and the network security service organizations in the assessment of key information infrastructure safety inspection and evaluation can only be used for the maintenance of network security and shall not be used for other purposes.

Article 44 The relevant departments shall organize the assessment of the security of the key information infrastructure, and shall not charge the units to be tested and tested, and shall not require the persons to be tested and appraised to purchase the designated brand or the products and services of the designated production and sales units.


Chapter VII Legal Liability

    Article 45 An operator shall fail to perform the provisions of Article 20, Paragraph 1, Article 21, Article 23, Article 24, Article 26, Article 27, and Article 2 Article 18, Article 30, Article 32, Article 33, Article 34 of the network security protection obligations, by the relevant authorities in accordance with their duties ordered to correct, give a warning; refused to correct or Resulting in damage to the network security and other consequences, at a fine of more than 100,000 yuan a million yuan, the person in charge directly responsible for more than 10,000 yuan more than 100,000 yuan fine.

Article 46 Where an operator violates the provisions of Article 29 of these Regulations, he or she shall, in accordance with his / her duties, make corrections, give a warning, confiscate the illegal income, And shall be ordered to suspend the relevant business, suspend business for rectification, close the website, revoke the relevant business license; the person directly in charge and other directly responsible persons shall be fined not less than 10,000 yuan but not more than 100,000 yuan The

Article 47 Where an operator violates the provisions of Article 31 of these Regulations and uses the network products or services that have not passed the security examination or security examination, the relevant competent department of the State shall order it to cease to use and double the purchase amount More than ten times the fine; the person in charge directly responsible and other directly responsible persons at a fine of not less than 10,000 yuan but not more than 100,000 yuan.

Article 48 Where an individual violates the provisions of Article 16 of these Regulations and does not constitute a crime, the public security organ shall confiscate the illegal gains and shall be detained for less than five days and shall be fined not less than 50,000 yuan but not more than 500,000 yuan; Shall be imposed a fine of not less than 100,000 yuan but not more than one million yuan; if the case constitutes a crime, the criminal responsibility shall be investigated according to law.

If the unit has any of the acts mentioned in the preceding paragraph, the public security organ shall confiscate the illegal gains and impose a fine of not less than 100,000 yuan but not more than one million yuan and impose penalties on the directly responsible person in charge and other directly responsible persons in accordance with the provisions of the preceding paragraph.

Violation of the provisions of Article XVI of the Ordinance, the criminal punishment of personnel, life shall not be engaged in key information infrastructure security management and network operations key positions in the work.

Article 49 Where the operator of a key information infrastructure of a state organ fails to perform the obligations of the network security protection provided for in these Regulations, the superior organ or the relevant organ shall order it to make corrections; and the person directly in charge and other directly responsible persons shall be punished according to law.

Article 50 Where any of the following departments and their staff members commits any of the following acts, the directly responsible person in charge and other directly responsible persons shall be punished according to law; if a crime is constituted, criminal responsibility shall be investigated according to law:

(A) in the work of the use of authority to obtain, accept bribes;

(B) neglect of duty, abuse of authority;

(Iii) unauthorized disclosure of relevant information, information and data files of key information infrastructures;

(4) other acts that violate statutory duties.

 Article 51 Where a major cyber security incident occurs in a critical information infrastructure, the responsibility for the investigation shall be identified, and the responsibility for the relevant network security service and relevant departments shall be identified in addition to the investigation of the responsibility of the operating unit and the investigation , For dereliction of duty, dereliction of duty and other violations, shall be held accountable.

Article 52 If the organs, organizations and individuals engaged in attack, intrusion, interference, or damage to the key information infrastructure of the People’s Republic of China cause serious consequences, they shall be investigated for legal responsibility according to law; the public security department of the State Council and the State security organ And the relevant departments and may decide to impose a frozen property or other necessary sanctions on the institution, organization or individual.


Chapter VIII Supplementary Provisions

    Article 53 The security protection of key information infrastructures involved in the storage and handling of information concerning state secrets shall also be subject to the provisions of confidentiality laws and administrative regulations.

Critical information infrastructure in the use and management of passwords, should also comply with the password laws and administrative regulations.

 Article 54 The security protection of military key information infrastructures shall be separately stipulated by the Central Military Commission.

Article 55 These Regulations shall enter into force on the date of ****.

Original Mandarin Chinese:


第一章 總則
第一條 為了保障關鍵信息基礎設施安全,根據《中華人民共和國網絡安全法》,制定本條例。
第二條 在中華人民共和國境內規劃、建設、運營、維護、使用關鍵信息基礎設施,以及開展關鍵信息基礎設施的安全保護,適用本條例。
第三條 關鍵信息基礎設施安全保護堅持頂層設計、整體防護,統籌協調、分工負責的原則,充分發揮運營主體作用,社會各方積極參與,共同保護關鍵信息基礎設施安全。
第四條 國家行業主管或監管部門按照國務院規定的職責分工,負責指導和監督本行業、本領域的關鍵信息基礎設施安全保護工作。
第五條 關鍵信息基礎設施的運營者(以下稱運營者)對本單位關鍵信息基礎設施安全負主體責任,履行網絡安全保護義務,接受政府和社會監督,承擔社會責任。
第六條 關鍵信息基礎設施在網絡安全等級保護製度基礎上,實行重點保護。
第七條 任何個人和組織發現危害關鍵信息基礎設施安全的行為,有權向網信、電信、公安等部門以及行業主管或監管部門舉報。

第二章 支持與保障
第八條 國家採取措施,監測、防禦、處置來源於中華人民共和國境內外的網絡安全風險和威脅,保護關鍵信息基礎設施免受攻擊、侵入、干擾和破壞,依法懲治網絡違法犯罪活動。
第十條 國家建立和完善網絡安全標準體系,利用標準指導、規範關鍵信息基礎設施安全保護工作。
第十一條 地市級以上人民政府應當將關鍵信息基礎設施安全保護工作納入地區經濟社會發展總體規劃,加大投入,開展工作績效考核評價。
第十二條 國家鼓勵政府部門、運營者、科研機構、網絡安全服務機構、行業組織、網絡產品和服務提供者開展關鍵信息基礎設施安全合作。
第十四條 能源、電信、交通等行業應當為關鍵信息基礎設施網絡安全事件應急處置與網絡功能恢復提供電力供應、網絡通信、交通運輸等方面的重點保障和支持。
第十五條 公安機關等部門依法偵查打擊針對和利用關鍵信息基礎設施實施的違法犯罪活動。
第十六條 任何個人和組織不得從事下列危害關鍵信息基礎設施的活動和行為:
第十七條 國家立足開放環境維護網絡安全,積極開展關鍵信息基礎設施安全領域的國際交流與合作。

第三章 關鍵信息基礎設施範圍
第十八條 下列單位運行、管理的網絡設施和信息系統,一旦遭到破壞、喪失功能或者數據洩露,可能嚴重危害國家安全、國計民生、公共利益的,應當納入關鍵信息基礎設施保護範圍:
第十九條 國家網信部門會同國務院電信主管部門、公安部門等部門製定關鍵信息基礎設施識別指南。
第二十條 新建、停運關鍵信息基礎設施,或關鍵信息基礎設施發生重大變化的,運營者應當及時將相關情況報告國家行業主管或監管部門。

第四章 運營者安全保護
第二十一條 建設關鍵信息基礎設施應當確保其具有支持業務穩定、持續運行的性能,並保證安全技術措施同步規劃、同步建設、同步使用。
第二十二條 運營者主要負責人是本單位關鍵信息基礎設施安全保護工作第一責任人,負責建立健全網絡安全責任制並組織落實,對本單位關鍵信息基礎設施安全保護工作全面負責。
第二十三條 運營者應當按照網絡安全等級保護製度的要求,履行下列安全保護義務,保障關鍵信息基礎設施免受干擾、破壞或者未經授權的訪問,防止網絡數據洩漏或者被竊取、篡改:
第二十四條 除本條例第二十三條外,運營者還應當按照國家法律法規的規定和相關國家標準的強制性要求,履行下列安全保護義務:
第二十五條 運營者網絡安全管理負責人履行下列職責:
(一) 組織製定網絡安全規章制度、操作規程並監督執行;
第二十六條 運營者網絡安全關鍵崗位專業技術人員實行執證上崗制度。
第二十七條 運營者應當組織從業人員網絡安全教育培訓,每人每年教育培訓時長不得少於1個工作日,關鍵崗位專業技術人員每人每年教育培訓時長不得少於3個工作日。
第二十八條 運營者應當建立健全關鍵信息基礎設施安全檢測評估制度,關鍵信息基礎設施上線運行前或者發生重大變化時應當進行安全檢測評估。
第二十九條 運營者在中華人民共和國境內運營中收集和產生的個人信息和重要數據應當在境內存儲。因業務需要,確需向境外提供的,應當按照個人信息和重要數據出境安全評估辦法進行評估;法律、行政法規另有規定的,依照其規定。

第五章 產品和服務安全
第三十條 運營者採購、使用的網絡關鍵設備、網絡安全專用產品,應當符合法律、行政法規的規定和相關國家標準的強制性要求。
第三十一條 運營者採購網絡產品和服務,可能影響國家安全的,應當按照網絡產品和服務安全審查辦法的要求,通過網絡安全審查,並與提供者簽訂安全保密協議。
第三十二條 運營者應當對外包開發的系統、軟件,接受捐贈的網絡產品,在其上線應用前進行安全檢測。
第三十三條 運營者發現使用的網絡產品、服務存在安全缺陷、漏洞等風險的,應當及時採取措施消除風險隱患,涉及重大風險的應當按規定向有關部門報告。
第三十四條 關鍵信息基礎設施的運行維護應當在境內實施。因業務需要,確需進行境外遠程維護的,應事先報國家行業主管或監管部門和國務院公安部門。
第三十五條 面向關鍵信息基礎設施開展安全檢測評估,發布系統漏洞、計算機病毒、網絡攻擊等安全威脅信息,提供雲計算、信息技術外包等服務的機構,應當符合有關要求。

第六章 監測預警、應急處置和檢測評估
第三十八條 國家網信部門統籌協調有關部門、運營者以及有關研究機構、網絡安全服務機構建立關鍵信息基礎設施網絡安全信息共享機制,促進網絡安全信息共享。
第四十一條 有關部門組織開展關鍵信息基礎設施安全檢測評估,應堅持客觀公正、高效透明的原則,採取科學的檢測評估方法,規範檢測評估流程,控制檢測評估風險。
第四十二條 有關部門組織開展關鍵信息基礎設施安全檢測評估,可採取下列措施:
第四十三條 有關部門以及網絡安全服務機構在關鍵信息基礎設施安全檢測評估中獲取的信息,只能用於維護網絡安全的需要,不得用於其他用途。
第四十四條 有關部門組織開展關鍵信息基礎設施安全檢測評估,不得向被檢測評估單位收取費用,不得要求被檢測評估單位購買指定品牌或者指定生產、銷售單位的產品和服務。

第七章 法律責任
第四十九條 國家機關關鍵信息基礎設施的運營者不履行本條例規定的網絡安全保護義務的,由其上級機關或者有關機關責令改正;對直接負責的主管人員和其他直接負責人員依法給予處分。
第五十條 有關部門及其工作人員有下列行為之一的,對直接負責的主管人員和其他直接責任人員依法給予處分;構成犯罪的,依法追究刑事責任:

第八章 附則
第五十三條 存儲、處理涉及國家秘密信息的關鍵信息基礎設施的安全保護,還應當遵守保密法律、行政法規的規定。
第五十四條 軍事關鍵信息基礎設施的安全保護,由中央軍事委員會另行規定。
第五十五條 本條例自****年**月**日起施行。

Referring URL:

中國網絡安全防禦將是量子計算…未來將面臨這些網絡攻擊威脅 // China network security defense will be quantum computing… The future will face these cyber-attack threats


China network security defense will be quantum computing… The future will face these cyber-attack threats


Quantum computers can give attackers the ability to crack the current encryption standard overnight and steal personal data. Imagine, if you wake up and lose all the important information, what kind of helpless?

Experts predict that by 2026, commercial quantum computers can crack the code we now rely on. “IEEE Spectrum” magazine reported last year that quantum computers were fast enough to crack the level of RSA encryption.

The nine years from 2026 are not long and the consequences of failing to update the security technology through quantum security solutions are not yet clear. In order to ensure that the arrival of quantum computers to protect data security, need to upgrade from now on to quantum security needs.

What is a quantum computer?

Quantum computer (quantum computer) is a class of quantum mechanics to follow the law of high-speed mathematical and logical operations, storage and processing of quantum information, physical devices. When a device processes and computes quantum information, it is a quantum computer when it runs a quantum algorithm.

It can be achieved for each superposition of the transformation of the equivalent of a classic calculation, all of these classic calculations at the same time, and according to a certain probability amplitude superimposed, given the output of quantum computers. This calculation is called quantum parallel computing, but also the most important advantages of quantum computers. (Source Baidu)

Quantum computer can invade daily network activities

If an attacker uses a quantum computer to successfully crack the encryption technology that we currently trust and rely on, then sensitive data may be vented, giving serious consequences to users and organizations. As a technical user, people may perform the following common activities on any day:

Send an e-mail: The user logs on to the laptop and sends several e-mails, whose information may be read by the attacker and published publicly for everyone to read.

Check the online banking account: the user login bank account and transfer, the financial data will be attacked by the attacker, and the account balance looted.

Update the social media account information: user login microblogging and other social media publishing dynamic, share family photos, etc., if the user only choose to share these dynamic friends, the attacker can all photos and personal information “everyone visible”, and in addition to The user himself, others can arbitrarily tamper with.

Updating software on the smartphone: If the user receives a software update notification and accepts the update, it is not aware that the verification process from a trusted source (such as Google or Apple’s official download) will also be compromised. Malware may enter the smartphone, disguised as a trusted update, so that the attacker gets the application’s login credentials and data.

Driving the network car: the network will automatically accept the software update. These updates may come from an attacker, the user without the knowledge of the circumstances, may allow third parties to control the car’s embedded system, undermine navigation, cut off the car power and so on.

In addition, many other day-to-day transactions may be vulnerable to attack.E.g:

Use the original security of the Internet equipment: thermostat, home security system or baby monitor;

Transfer funds to public transport as prepaid expenses;

Use VPN to log on to the corporate network.

Public transport, security systems, and physical access systems can also have many public safety risks.

As the networking equipment provides more attack surface, data leakage events are frequent. As companies and governments continue to prevent cyber security attacks through technological advances, quantum computing may make cybercriminals more arbitrary and unscrupulous.

The key to quantum secure encryption solutions will be to update the vulnerable quantum solution in a timely manner, which means that it is now necessary to understand which systems will be affected by quantum risk and plan to migrate to quantum security solutions (including appropriate testing and test).

This transition can be done from a hybrid solution, enabling flexible encryption, and the classic encryption technology used today.

Quantum computers or will change the pattern of artificial intelligence research

Source: Artificial Intelligenceologist

Summary: Chinese scientists have built quantum computers that are “natural photonics” by reviewers called “ENIAC in Quantum Computers”.

Chinese scientists have built quantum computers that are “natural photonics” by reviewers called “ENIAC in Quantum Computers.” Quantum computer of this achievement and the subsequent development, it is possible to change the current pattern of artificial intelligence research.

First, it may mean strong, weak artificial intelligence, and “quantum” approach of the three technical paradigm of confluence. Second, it is possible to open up the traditional Chinese culture “programming” approach, as well as more to explore the Chinese and Eastern traditions and pre-traditional culture of resources. Third, in the human cognitive structure can not keep up with the pace of technological development, the quantum computer may help the human hand, set up from the original understanding of the future of the world bridge.

Although all this can not change the fate of mankind will eventually be replaced by “singularity”, but may change in the singularity of the continuation of the “human” connotation.

Competition and confluence of three paradigms

Artificial intelligence The current research mainly exists strong artificial intelligence, weak artificial intelligence two kinds of technical paradigm.

The strong artificial intelligence paradigm follows the development of technology along the form of movement from low to high order, by the first industrial revolution in the basic physical movement (mechanical, thermal and electromagnetic motion), by the second industrial revolution of chemical movement (organic synthesis ), The end of the 20th century high-tech life movement (genetic engineering, gene editing), and then into the human brain and consciousness of the field; technology step by step, all the way to follow the natural to the human footprint. The human brain is the highest achievement of the evolution of nature, the nature of consciousness is far from being revealed.Artificial intelligence will continue to follow this trajectory, there is no reason to leave this path of success.

In this journey, “physical and mental” relationship is an insurmountable peak. Polanyi’s knowledge of congregation is well known, and IQ and EQ are inseparable. “Artificial intelligence is no more intelligent and only emotionally.”

Weak artificial intelligence paradigm is taking the “smart is intelligent” path. Science and technology may not follow the people as a whole, emotional intelligence and IQ, heart and brain synchronization of the path of evolution, but can take the path of heart and brain separation. Artificial intelligence is only “wisdom”, is the “cylinder in the brain” (“three body” as the envoy of the earth Cheng Tianming), rather than “love” non-human; because of this, artificial intelligence beyond the situation ( Including all kinds of ideological struggle) the trapped people’s intelligence, regardless of “emotional” when things do better, more absolutely. Through the repeated game and the evolution of the game, the development of in-depth learning, step by step, migration learning, learn by analogy, and even into the rules and boundaries across the “Texas poker” to achieve a major breakthrough in artificial intelligence.

The achievement of these results follows the pace of the West since Descartes. “Epistemological turn”, “brain” debut, “head to the ground.”Intelligence is intelligent, do not care about the heart; one to do, do not do all-around champion; step by step to do, do not think people are people. Why should artificial intelligence be based on human beings as a reference system?Get rid of anthropocentrism.

The development of artificial intelligence will eventually go beyond the basic weakness of human nature: people are self-interested, people are limited.The development of artificial intelligence has nothing to do with dignity, but to follow the law. Not to overcome, but to bypass the weakness of human nature.No self-consciousness, means that does not matter “self-interest”, for all the emotions “do not feel”; and in time and space endless large data and extraordinary computing power is beyond the “limited.”

Strong artificial intelligence and weak artificial intelligence combination model, perhaps “God’s return to God, Caesar’s return to Caesar”. Please take care of the soul of God, and I take care of the flesh of men. People, take care of their own souls, make decisions; machine, artificial intelligence in the calculation, to provide decision-making basis and options. “Mind machine brain”.

“Quantum paradigm” can be said to be strong, weak artificial intelligence outside the two paradigms of the third paradigm, related to the relationship between consciousness or free will and quantum entanglement, and quantum computer. “From this point of view, not to quantum up before, that is less than the era of quantum artificial intelligence, I was not worried about artificial intelligence will replace humans.” Pan Jianwei said. Ma Zhaoyuan holds the same view, before understanding by the nano-scale consciousness, “artificial intelligence at least three hundred years there is no chance to go beyond the human brain.”

From the perspective of quantum cut, there may be more than other ways to approach the nature of consciousness, which is “strong artificial intelligence” paradigm of the pursuit of the goal. At this point these two paradigms came together. However, even if this paradigm is a breakthrough, from the current trend, “quantum paradigm” hardware is not “complete life form”, may lead to “strong artificial intelligence” paradigm of dissatisfaction.

This breakthrough in the quantum computer highlights the strength of the artificial intelligence technology paradigm outside the third paradigm. On the one hand it is possible in a sense to set up a bridge between the two paradigms.If you can manipulate more than 1000 quantum, you may be able to study the generation of consciousness. Pan Jianwei predicted that quantum computers will eventually expand into the field of quantum artificial intelligence.

On the other hand, the purpose of studying quantum computers is not to replace existing computers. Quantum computing is suitable for discrete optimization, and high performance computing systems (HPC) perform better in large-scale numerical simulations. Need to determine what problems are suitable for quantum computing, the two complement each other. There are many examples of quantum computer assisting high performance computing systems. In a certain sense, the classic computer with universal, quantum computer may be “earmarked.”From the standard computing power, the D-Wave quantum computer is still much slower than the traditional computer, but in solving some specific engineering problems, the quantum computer is several thousand times faster than the existing supercomputer.

China ‘s Resources and Opportunities

With the development of the Internet, a virtual world has been generated and is continuing to develop and improve. Everything in the real world is constantly moving to the virtual world. From the center, intervene, embedding, blurring, conferencing, going to the center, non-embedding, precision and coding; real world in virtual world reconstruction. As the real world moves to the virtual world, the weight of the virtual world is growing, and non-participants will be marginalized.

From the real to the virtual link is the core of programming. Virtual world is not a real world simple mapping, projection, but selective reconstruction.Not everything in the real world can move to the virtual world. Any programming language written by the instructions on the current computer must be accurate without any ambiguity to ensure that under the same conditions, this code is executed in accordance with established procedures. This is what the so-called software defines everything. All kinds of software, defined the data, the model, the function, the machine, the definition of the process, the rules, the network, the definition can define everything [1].

“People are the sum of social relations.” When the social relations continue to move from the real world to the virtual world, and even the latter as the most important, the status of people in the real world will be affected. Stay in the real world is only a personal secret of the faith, can not be part of the software definition [2]. Can not be moved to the virtual world, can not be mapped, but can not operate the real world, there may be dismissed in the virtual world “ball”, and even come back to the real world can not interact with others. The rapid development of the block chain further highlights the importance of being virtual and real. Human beings continue to enter the orderly degree of machine and society [3]. In society, the order of the carrier is also more and more by the machine to complete. When the basic contract of mankind, such as education, economy and law, its normal operation is carried by the machine, the mission of human beings as an orderly transfer has been completed.The society of machines will replace the real society that can not be moved.

The so-called “programming”, in other words is the code, through programming, the real world projection to the virtual world.

In a sense it can be said that Western culture is “coding culture”. Science and technology, industrial revolution, market economy, universal value, contractual relationship, and so on, all without coding. It is important to note that the first day of computer birth, the development of computer language is infiltrated in the Western coding culture. Computer language is the most basic statement is if-else, as the switchcase statement can be replaced with if else statement, in the if-else behind that is either: 0, or 1, orthogonal. Thus, relatively speaking, the already “encoded” Western society easier to “programming” into the virtual world, and in turn accept the virtual world of the real world norms and constraints.

In contrast, Chinese culture is clearly “conception culture”. Road to Road, very Avenue. “Road”, how to encode? TOEFL IELTS, 20,000 words; Chinese, 5000 words is enough, the word polysemy. So the United Nations documents can not prevail in Chinese, even if the feelings of the Chinese people hurt. Words made up of words are more ambiguous. Winter, how much can wear to wear how much; summer, how much can wear to wear how much. Contextual correlation. In the face of such Chinese examinations, foreign candidates can only be “kneeling”. China’s various levels of documents must be “in principle” three words, the back is endless and not for example and case handling. The highest state is simply: “do not say”. Such a society and its operation process, not if-else, also far from the switchcase can be included, can be exhausted. Can not be programmed, does it mean that China’s traditional culture and social operation can not be mapped to the virtual world?

Quantum computer may be the traditional Chinese culture, the way for the operation of Chinese society programming.

The key to quantum computers is the essential nature of quantum mechanics, such as the superposition and coherence of quantum states. Superposition, coherence, entanglement, so that some concepts and the meaning of knowledge have the same place. The input and output states of the quantum computer are generally superimposed states of multiple states between 0 and 1, which are usually not orthogonal to each other. The quantum computer transforms each superimposed component, where each “component” can be considered to correspond to one of the “cases” in Chinese society.

But in real life these cases are difficult to compare with the same standard, and in the quantum computer, all of these transformations at the same time, and according to a certain probability of superposition, give the results.Quantum computers are probabilistic rather than deterministic, and return to the user may be multiple sets of values, not only to provide the system to find the best solution, but also provide other alternative alternatives. The user can specify the number of systems that the system sends to itself.

The classic way of solving a problem by a classic computer is similar to trying to escape a maze – try all possible aisle, on the way will encounter a dead end until the final find the exit. The magic of the superposition state is that it allows the quantum computer to try all the paths at the same time, that is, it will quickly find a shortcut. In a sense, it can be said that the quantum computer not only contains the highly complex and “conception” characteristics of Chinese traditional culture and real society, but also gives the possibility of coding and programming. The former retains the particularity of China to a certain extent , Which makes this particularity compatible with the universality of human society.

In turn, China has special resources, such as hieroglyphics, language, and traditional culture, which may be another way for the development of quantum computers.

Quantum computers operate in much the same way as classic computers, and now quantum computing is very early, and even specialized programming languages ​​are not [4]. Since non-orthogonal, or if-else? When the need to compare the more things, or a lot of other control process, with if else statement control will be very cumbersome, and poor readability, and the switch statement is more simple and intuitive, more readable and more. But if it is further fragmented, embedded in the infinite number of specific contexts? Quantum computer is completely different from today’s CPU mechanism, nor is the if-else mechanism, can not use the current computer language for its programming. Otherwise it may be as Sokal triggered the science war in the “post-modern text generator”, with a series of contradictory words superimposed together, so that the reader in the fog, no solution.

“The scientific revolution in the 21st century will show two main themes, one is” the convergence of physics and life sciences “; the second is” the confluence of modern science and Chinese philosophy ” The Quantum computer development, it is possible to let the latter “confluence” down the philosophy of the altar, to a certain extent, into the operational level. The advent of quantum computers suggests that it is possible to look at Chinese words and grammar from a new perspective. Perhaps, the ancient “Book of Changes”, River map book, there may be in the dialogue with the quantum computer complement each other.

3 Human reversion and continuation

In the Qiwen “decarburization into the silicon”, the author of the Czech Republic, there are four sets of human cognitive system: the original reptile cognitive system, 50,000 years ago when the language developed, 5000 years ago, after the development of the text, And 500 years ago after the rise of science and development. Each set is more than the previous set of “natural”, more energy consumption, slower. So people tend to use low-level cognitive systems.Every time the cognitive system is advanced, some people are thrown off. Here you can also add the fifth set of cognitive systems, 50 years ago the rise of programming + computing + learning +.

Everyone is a combination of multiple cognitive methods, the difference is the proportion of a variety of cognitive methods. The overall population, in 90% of the human brain “machine”, is that the original cognition at work. The majority of the population as a whole tends to “do not mind” in most of the time. Analysis, symbols and rationality are enemies of the brain, and must be used to fight them all the time.

In this sense, Bao Jie to “stupid” under a definition. Stupid is a human inertia of inertia, the individual is more inclined to use 50,000 years ago mature set of thinking system, rather than 5000 years ago, and five years ago after the development of science and development of these two sets of thinking system, more Not 50 years ago programming. This is the advertising and other means of marketing and election canvassing and so the effectiveness of the human nature of the foundation. Artificial intelligence goes beyond human intelligence and does not need to be smarter than people, just to avoid people’s stupid enough. The machine is just stupid and people are stupid. Stupid can rule, stupid from the human physiological basis, no medicine to save.

The advent of quantum computers, it is possible for humans to open the “sixth set of cognitive systems.” The new cognitive system may emerge within five years if the fifth set of 50-year rhythms are added in the “decarburization of silicon” in the range of 50,000 to 5,000 to 500, and by the experts, Five years, the computing power of quantum computers may catch up with the current supercomputer). The classical computer is linear, and all input states are orthogonal to each other. And thinking is often parallel, pluralistic, and even jumping. With quantum computers, it is possible to understand the human behavior based on the first and second sets of cognitive systems, changes in mind, and even emotional changes.

What is the “cognitive system” of the so-called “first and second sets of cognitive systems”? Levi’s “original thinking” and Levi-Strauss’s “wild thinking” made a profound study of this.

Levi – Boulei stressed that the original thinking of the “mutual infiltration”, both specific to trivial, natives can recognize the footprints of each acquaintance, after the rain, the pit of water retained the longest; and by mutual penetration and care of the whole The For example, call a name or name, also implicated it or he embedded everything. Embedded in every detail, all have the object of all the information. The original logical thinking is essentially a comprehensive thinking, different from the logical thinking of the synthesis, does not require pre-analysis. “The logical thinking of the original logic is broader than our thinking, if we do not say it’s better than our rich.” The idea of ​​D-Wave America’s president, BoEwald, is that “the traditional computer will always get the same answer, and the answer to the quantum computer Is a probability, just like the principles of the universe, “says David Mermin, a physicist at Cornell University, in a related argument:” Close your mouth and calculate your mind! ”

Levi-Strauss argues that [5] that the concrete thinking of uncivilized people and the enlightening thinking of the enlightened people are not different from those of “primitive” and “modern” or “primary” and “advanced” Thinking mode, but the history of mankind has always been the existence of two parallel development, the Secretary of different cultural functions, complement each other to infiltrate the way of thinking. As the plants have “wild” and “garden” two categories, the way of thinking can be divided into “wild” (or “wild”) and “civilized” two categories.

It seems that the human “stupid” may not be really stupid, but there is no corresponding means and means to understand the original and wild cognitive system, when not yet. The advent of quantum computers may indicate that time has arrived.

The knowledge of the traditional society is the starting point of human knowledge, both the object of non-embedded coding knowledge denial, and the goal of dialectical reversion of the 21st century. In the original state of knowledge, is the source of human knowledge inexhaustible, which contains the endless treasure to be excavated.

Primitive thinking or wild thinking, human first and second sets of cognitive systems, although the rise of words and technology, especially the “fifth set” of cognitive system after the rise of such as the clogs, but also may be 21 The Object of Dialectical Return of Human Cognitive System in the Century. Fundamentally, Bao Jie’s view of four sets of cognitive systems implied a certain linear implication. Similarly, Kevin Kelly thinks [6] that the most common misconception about artificial intelligence is that natural intelligence is a single dimension that does not have a smart ladder to say. The different parts of the mind, or the interdependence of the “five sets” of cognitive methods, are thus proposed.


Original Mandarin Chinese:


專家預計,到2026年,商用量子計算機能破解我們如今依賴的密碼。 《IEEE Spectrum》雜誌去年報告稱,量子計算機快達到可以破解RSA加密的水平。
量子計算機(quantum computer)是一類遵循量子力學規律進行高速數學和邏輯運算、存儲及處理量子信息的物理裝置。當某個裝置處理和計算的是量子信息,運行的是量子算法時,它就是量子計算機。
它能對每一個疊加分量實現的變換相當於一種經典計算,所有這些經典計算同時完成,並按一定的概率振幅疊加起來,給出量子計算機的輸出結果。這種計算稱為量子並行計算,也是量子計算機最重要的優越性。 (來源百度)

來源: 人工智能學家

在這一征途上,“身心”關係是難以逾越的高峰。波蘭尼關於意會知識的研究廣為人知,智商與情商不可分割。 “人工智能再聰明也沒有情感,只是機器而已。”
這些成果的取得沿襲了西方自笛卡爾以來的步點。 “認識論轉向”,“腦”登場,“以頭立地”。智能就是智能,不在乎心;一項一項去做,不做全能冠軍;一步一步去做,不去想人之為人。人工智能為什麼一定要以人類為參照系,為追趕的目標?擺脫人類中心主義的思路。
強人工智能與弱人工智能結合的模式,或許是“上帝的歸上帝,凱撒的歸凱撒”。請上帝照看人的靈魂,我來照看人的肉體。人,照看自己的靈魂,做出決策;機,人工智能從事計算,提供決策的依據和選項。 “人心機腦”。
“量子範式”可以說是強、弱人工智能這兩種範式之外的第三種範式,關係到意識或自由意志與量子糾纏的關係,以及量子計算機。 “從這個角度上來講,沒有到量子用上去之前,即不到量子人工智能的時代,我是一點兒不擔心人工智能會取代人類。”潘建偉說道。馬兆遠持同樣的觀點,在由納米尺度理解意識之前,“人工智能至少在三百年內還沒什麼機會超越人腦”。
另一方面,研究量子計算機的目的不是要取代現有的計算機。量子計算適合離散優化,高性能計算系統(HPC) 則在大規模數值模擬中表現更好。需要判斷哪些問題適合量子計算,二者相互補充。有很多量子計算機協助高性能計算系統的例子。在一定意義上,經典計算機具有普適性,量子計算機可能是“專款專用”。從標準的計算能力來看,D-Wave量子計算機還是會比傳統計算機慢得多,但在解決某些特定的工程問題方面,量子計算機要比現有超級計算機快幾千倍。
在某種意義上可以說,西方文化就是“編碼文化”。科學技術、工業革命、市場經濟、普適價值、契約關係等等,無一不編碼。有必要指出,從計算機誕生的第一天起,計算機語言的發展就浸潤在西方的編碼文化之中。計算機語言最基本的語句是if-else,至於switchcase語句完全可以用if else語句來替換掉,在if-else的背後即非此即彼:0,或1,正交。由此可見,相對而言,本已“編碼”的西方社會較容易“編程”而進入虛擬世界,以及反過來接受虛擬世界對現實世界的規範與製約。
相比之下,中國文化顯然是“意會文化”。道可道非常道。 “道”,如何編碼?考托福雅思,2萬單詞;漢語,5000單詞足矣,一詞多義。所以聯合國文件不能以中文為準,即使傷害了中國人民的感情。由單詞組成的語句更多歧義。冬天,能穿多少就穿多少;夏天,能穿多少就穿多少。語境相關。面對這樣的中文考題,外國考生也只能是“跪了”。中國的各級文件中必有“原則上”三個字,其背後是無窮無盡的下不為例和個案處理。最高境界乾脆是:“盡在不言中”。這樣的社會及其運作過程,絕非if-else,亦遠非switchcase可以囊括,可以窮盡。不能編程,是否意味著中國的傳統文化與社會運行不能映射到虛擬世界?
量子計算機的運行方式與經典計算機大為不同,現在的量子計算還非常早期,甚至連專門的編程語言都沒有[4]。既然非正交,還是if-else嗎?當需要比較的事項較多,或者很多其他控制流程的時候,用if else語句控制起來就會很麻煩,且可讀性太差,而用switcase可以囊括,可以窮盡。不能編程,是否意味著中國的傳統文化與社會運行不能映射到虛擬世界?
量子計算機的運行方式與經典計算機大為不同,現在的量子計算還非常早期,甚至連專門的編程語言都沒有[4]。既然非正交,還是if-else嗎?當需要比較的事項較多,或者很多其他控制流程的時候,用if else語句控制起來就會很麻煩,且可讀性太差,而用switch語句就更加簡潔直觀,可讀性也更強。但要是進一步碎片化,嵌入於不可勝數的特定語境之中呢?量子計算機完全不同於今天的CPU機理,也不是if-else機理,沒法用現在的計算機語言為其編程。否則很可能如索卡爾引發的科學大戰中的“後現代文本發生器”,用一連串互相矛盾的詞彙疊加在一起,讓讀者云裡霧裡,不得其解。
中國科學院大學已故數學教授牛實為先生認為,21世紀的科學革命將呈現出兩個主旋律,其一是“物理學與生命科​​學的合流”;其二是“現代科學與中國哲學的合流” 。量子計算機的發展,有可能讓後一個“合流”走下哲學的聖壇,在一定程度上步入操作的層面。量子計算機的問世提示,或許可以從一個新的視角審視中文的單詞和語法。或許,古老的《易經》,河圖洛書,有可能在與量子計算機的對話中相得益彰。
列維-布留爾強調了原始思維的“互滲”,既具體到瑣碎,土人能認出每個熟人的足跡,雨後,那個坑里的水留存最久;又經由互滲而關照整體。譬如呼喚一個名稱或名字,也就牽連它或他所嵌入的一切。嵌入的每一個細節,都擁有對象的全部信息。原邏輯思維本質上是綜合的思維,不同於邏輯思維的綜合,不要求預先的分析。原邏輯思維“比我們的思維廣闊,如果不說比我們的豐富。”D-Wave美國區總裁BoEwald的觀點是:“傳統計算機求解相同問題總會得到相同的答案,而量子計算機得到的答案卻是一種概率,就像宇宙的運行原理。”康奈爾大學物理學家David Mermin在一次相關的爭論中說:“閉上你的嘴,用心作計算吧!”

Original URL:

China Military Interpretation of information warfare, cyber warfare, cyber – centric warfare 中國軍隊解读信息战、网络战、网络中心战


China Military Interpretation of information warfare, cyber warfare, cyber – centric warfare

With the rapid development of information technology and its extensive application in the military field, some new operational concepts and operational styles came into being. Such as information warfare, cyber warfare, cyber-centric warfare, in recent days local war has demonstrated a powerful power, has become the topic of the current officers and men to explore. Then this new “war” in the end what is the difference and contact? How do you understand it? I have the following views.

The so-called information warfare, refers to the hostile parties in the field of information struggle and confrontation activities. Specifically, it is based on the digital forces as the basic strength to compete, control and use of information as the main content of a variety of information weapons and equipment as the main means of confrontation and struggle, with a transparent battlefield, real-time action, The overall coordination and the higher degree of intelligence. From the point of view of combat, information warfare is to control the “energy flow” and “material flow” with “information flow”, gain the advantage of decision-making and the advantage of action, and then end confrontation or reduce confrontation and realize ” Soldiers “. From the content and form of combat, information warfare is different from information warfare and information warfare. Information operations are specific actions of information warfare, can be divided into electronic warfare, intelligence warfare and network warfare. The information war is relative to the mechanized war, refers to a form of war. Information warfare is the main battlefield and core of information war.

The so-called network warfare refers to the information and network environment which the enemy and the enemy can use for the war, and surrounds the “system of information right” to compete, through the computer network to ensure that their own information and network system security at the same time, disrupt, destroy and threaten each other’s information and Network Systems. In essence, cyber warfare is a special form of information warfare, a kind of combat action carried out in cyberspace. Compared with the traditional war, the network war has a sudden, hidden, asymmetric and low cost, strong participation and so on. Network-centric warfare, whose English name is “NetworkCentricWarfare”, is a new concept of warfare relative to the traditional platform-centric warfare. The so-called platform center warfare, refers to the platform mainly rely on their own detectors and weapons to combat, its main feature is the platform between the information sharing is very limited. The network center war is through the network of the combat unit, the information advantage into the combat action advantage, so that the scattered configuration of the common sense of the battlefield situation, so as to coordinate their own actions to play the largest overall combat effectiveness of the combat style, it So that the focus of combat from the past platform to the network. It goes without saying that cyber-centric warfare can help combat forces create and exploit information superiority and dramatically improve combat effectiveness. It has the battlefield situation full-dimensional perception ability, the combat power integration, the combat action real-time, the army coordination synchronism and so on the characteristic.

In short, information warfare is the core of information war. Network warfare is a special form of information warfare, belonging to the category of information warfare. Network-centric warfare is the product of the transition from mechanized war form to informational warfare because the development of the network is the regeneration of the operational form of the mechanized forces of the industrial age. Therefore, whether it is information warfare or network warfare and network-centric warfare, are inseparable from the rapid development of information technology, but also inseparable from the application and popularization of network technology.


所謂網絡戰,是指敵對雙方針對戰爭可利用的信息和網絡環境,圍繞“制信息權”的爭奪,通過計算機網絡在保證己方信息和網絡系統安全的同時,擾亂、破壞與威脅對方的信息和網絡系統。從本質上講,網絡戰是信息戰的一種特殊形式,是在網絡空間上進行的一種作戰行動。與傳統戰爭相比,網絡戰具有突然性、隱蔽性、不對稱性和代價低、參與性強等特點。網絡中心戰,其英文名稱為“ NetworkCentricWarfare”,是相對於傳統的平台中心戰而提出的一種新作戰概念。所謂平台中心戰,是指各平台主要依靠自身探測器和武器進行作戰,其主要特點是平台之間的信息共享非常有限。而網絡中心戰是通過各作戰單元的網絡化,把信息優勢變為作戰行動優勢,使各分散配置的部隊共同感知戰場態勢,從而自主地協調行動,發揮出最大整體作戰效能的作戰樣式,它使作戰重心由過去的平台轉向網絡。不言而喻,網絡中心戰能夠幫助作戰部隊創造和利用信息優勢並大幅度提高戰鬥力。它具有戰場態勢全維感知能力,作戰力量一體化,作戰行動實時性,部隊協調同步性等特點。

Using Psychological Warfare in Information War China’s Military Advantage ~ 信息戰爭中使用心理戰爭中國的軍事優勢


Using Psychological Warfare in Information War China’s Military Advantage

Since the eighties of the 20th century, with the development of science and technology and the evolution of war forms, so that the psychological war plug in the high-tech wings. In the information war, the psychological warfare fully demonstrated a series of distinctive features, its status, domain objects and methods of means have undergone major changes, the impact of the war far more than any period in history.

Status is strategic

Psychological warfare has been incorporated into the national strategic areas, to achieve the national strategic objectives of the important form of struggle. At the end of the twentieth century, the drastic changes in Eastern Europe and the disintegration of the Soviet Union showed the success of the “peaceful evolution” strategy pursued by the Western capitalist countries headed by the United States. “Peaceful evolution” can be said to be synonymous with “psychological warfare.” Its success has made it more strongly aware that psychological warfare is no longer an adjunct to military struggle, but an important battlefield of strategic importance in international struggle The In view of this, the world in the strategic thinking, all the psychological warfare into the overall strategic structure. In the information war, the psychological war has become the country’s strategic behavior and basic tactics, not only troops and horses did not move, heart war first, and psychological attack and psychological defense throughout the whole, as all-round, all time and space, Level of strategic action, so that the psychological battle to become an important factor leading the war situation.

Psychological warfare of the macro-level has risen to the highest strategic decision-making level of the state and the army, and the psychological attack of the primary target directly to each other’s top strategic decision-makers. After the September 11 incident, under the instigation of the National Security Council, Bush decided to make a public opinion in the international community, the Iraqi as “evil axis”, for its military strike for political pave the way. In this overall decision-making traction, the United States Department of Psychology and Strategy and the control of the “Voice of America”, newspapers, publications, film, television, the International Exchange Department, are their responsibilities, from the strategic psychological war straight Refers to the Saddam regime, with a view to leading international public opinion, for the military action to create a suitable environment.

Psychological warfare has become an important factor in leading the war situation, the outcome of the war has a pivotal role. The most representative of the recent information war mainly four: 1991 Gulf War, the 1999 war in Kosovo, the 2001-2002 war in Afghanistan and the 2003 war in Iraq. The four wars are exactly the same in the strategic use of the psychological warfare. The United States is an important part of the military’s high-intensity psychological warfare as an indispensable part of the military strategy. The intensity, scope and time of the military strike are as limited as possible within the limits of politics, and even every military action Not only to consider the military value, but also to consider the political and psychological values, every stage of the war, to assess the psychological effects of the enemy, and then decide the next stage of military strike to achieve the military goals and political and psychological goals coincide. These four wars, not only to show people the psychological war is “war before the war, after the war of war”, but also to fully demonstrate the great power of psychological warfare and to play a major role in the war.

The field is broad

The psychological warfare in the information war has transcended the boundaries of military struggle and has become a well-planned and comprehensive strategic action in various fields such as politics, economy, military affairs, diplomacy, culture and religion.

Looking at the information war in recent years, we can clearly see that the United States is not political, economic, diplomatic, military, cultural and religious and other areas of the psychological war as a whole, so that the psychological battle became a veritable “psychological encirclement and suppression ”

The object of the war of information warfare has also completely broken through the scope of the traditional warfare against the military. “The whole purpose of mental warfare is to encourage emotions in foreign groups and people to influence their attitudes or behavior in order to support the goals of the United States.” That is to say, the psychological warfare of information war Object range, has been extended to both the enemy combat forces, but also against the enemy of the people, and even the psychological warfare to the war with the object of friendly countries and regions, pointing to neutral countries and neighboring countries and neighboring countries and the entire international community. Information war in the psychological war also bear the education of their own military and civilian, to maintain the heart to the same and psychological stability of the task.

Methods show diversity

From the Gulf War, the Kosovo War, the war in Afghanistan to the war in Iraq, the United States not only attached great importance to “heart war” and “war” closely, but also in the psychological warfare will be used in a variety of ways to complement each other, complement each other , Thus greatly enhancing the effectiveness of psychological warfare. 9.11 after the incident, the United States to fight the psychological war, for the war on terror to lay the foundation of public opinion. The United States on the day of making a decision to send troops in Afghanistan, the State Council set up a “propaganda group”, the use of domestic major media, repeated rendering of the United States in the “9.11” loss, widely for the people to form a terrorist The On the eve of the military strike, the US Department of State has set up a “public relations team”, responsible for the full implementation of national propaganda strategy. After the war began, for the support of international public opinion, the United States in Washington, London and Islamabad established three “wartime press room”, the timely release of the so-called “real and reliable” battlefield information, and the Taliban propaganda to compete. The US Department of Defense has also set up a “strategic information office”, specifically concocted false information, through a variety of ways to pass abroad. In the implementation of military strikes, strengthen the deterrence of the enemy. First to deploy troops to push to change. In a short period of 20 days, within 500 km of Afghanistan, the assembly of five aircraft carrier formation, 18 million combat troops, 550 combat aircraft, from the air, the ground basically blocked the whole territory of Afghanistan, its intention is to Strong military pressure to force the Taliban unconditionally to meet the demands of the United States. Then, continuous blow to fried change. The US military every day out of hundreds of fighters on the Taliban strategy and tactical goals for continuous bombing. In the air raid, the US military intends to use a variety of powerful psychological deterrent effect of new weapons, such as AC-130 laser attack aircraft, this aircraft carrying a new laser weapons, it can be said that the light flash, that is, ashes, The Afghan army is called “the light of death”. US Department of Defense officials have made no secret that the main intention is not to completely eliminate the Taliban military forces, but to strive to defeat its morale, weaken its psychological affordability, triggering “internal chaos and fission.”

Means to show high technology

High-tech makes the psychological warfare endless. In the recent wars, the United States has made use of satellite positioning and direction finding, television broadcasting technology, computer information processing technology, network technology, signal simulation and distortion technology, audio and video technology and other high-tech means to improve the psychological warfare comprehensive combat effect The According to incomplete statistics, in the Iraq war, the United States used military and civilian satellites up to 160, compared with the Gulf War increased by 23. The US news media is through these communications satellites to the domestic and the world launched a large number of favorable to the enemy is not conducive to the enemy’s war information and images. Now, people can use computer graphics synthesis technology, easy to create such as “a country army in the enemy capital square lined up”, “a country leader and the enemy leaders secret talks, shake hands” and other fictional photos or television pictures, to Suddenly these “information bomb” fired at each other’s military and civilian, to destroy the other side of the military and civilian defense line. People can use the audio and video technology to simulate the voice of the head of the enemy and battlefield commander, issued a wrong command of the war, so that the enemy decision-making mistakes, command into chaos, and can use these high-tech means to adjust their military and civilian psychology, inspire morale. In 1993, the United States in the Somali Marine Corps in the implementation of peacekeeping missions, suffered some setbacks. Once, the wind, the dust storm suddenly, the troops suddenly chaos up. At this critical moment, the American Army forces suddenly appeared on a head of up to 150 meters of Jesus image, the US soldiers saw after kneeling, and some frightened, and some burst into tears, that God is really with them, they Somali warfare is “the will of God” and is “fighting for God”. Later, this image exists for a full five minutes to disperse. It is said that this is the United States psychological warfare forces with laser holographic imaging system projection to the air image, to improve the morale of the troops. The United States also attaches great importance to the use of network technology, network infiltration, information and psychological attacks. Network transmission speed, in a very short period of time, heart war information up to front-line officers and men, up to the warrior family, can affect the highest decision-making body, under the ordinary people, its influence is self-evident. In the Iraq war, the United States even organized “hackers” experts to crack the Iraqi military high-level characters e-mail password, send a large number of e-mail, but also directly call the Iraqi high-level mobile phone, the implementation of psychological deterrence and inducement. There is a recent report that the US military engaged in a “666” computer virus, the virus into the computer, you can make the screen repeated an image, people repeatedly see this image, will produce some inexplicable potential awareness, leading to nerve Disorder, hallucinations and even death.

Power show professional

In contemporary times, the developed countries in the world not only attach great importance to the use of psychological warfare, but also pay special attention to strengthening the psychological warfare from all levels.

First, the establishment of a scientific and effective organization and leadership institutions. Now, many countries in order to effectively carry out psychological defense and external implementation of psychological operations, have established a corresponding psychological warfare organizational system. The United States is the most complete system of psychological warfare, the commander of the body by the President of the psychological warfare counsel, chief of staff of the joint meeting of the psychological warfare, the Ministry of Defense of the General Office of the Department of psychological operations; middle institutions by the Joint Command and the theater headquarters of the psychological war department; The lower body consists of psychological war camps and psychological warfare groups. The state and the armed forces have unified their organization and coordinated mental warfare work from top to bottom, serving not only for military struggle but also for international and domestic political struggle.

Second, the establishment of psychological warfare research and think tank institutions. The United States and some Western countries and military personnel attach great importance to the study of psychological warfare, and the establishment of research institutions, specializing in psychological warfare theory and technology research. But also pay attention to play the role of civil “think tank”, the use of universities, research institutions and a variety of senior specialized personnel for the psychological warfare service.

Third, the establishment of professional psychological warfare forces and training of psychological warfare professionals. The US military has a large number of psychological warfare troops, allocated in the land and sea and air forces, including the army has four psychological battle groups, 12 psychological war camps, 22 psychological warfare, the Navy has a psychological warfare brigade, the Air Force has a special operations The wing is used to support the psychological warfare. At the same time, also set up a special psychological warfare institutions or professional, training professional psychological warfare talent. In the war in Afghanistan, the US military to the two most combat capability of the psychological warfare force – Air Force 193 Special Combat Wing and the Army 4th psychological war brigade, deployed in Uzbekistan and Pakistan, the use of various means to start the Taliban The battlefield psychological attack, such as flight radio, cast leaflets, block the Taliban news channel. Iraq war, the US military used almost all of the current psychological warfare forces, but also mobilized and organized a folk psychological strength. The Air Force Psychological Warfare Force is equipped with EC-130E psychological warfare aircraft, from time, space, audio-visual, electromagnetic and other dimensions of the release of psychological warfare information; the Army psychological warfare forces are mostly proficient in Arabic, by telephone, e-mail, And so on to lobby the Iranian specific figures, but also with the Iraqi people and soldiers in general face to face dialogue and exchange.

Original Mandarin Chinese:

心理戰已被納入國家戰略範疇,成為實現國家戰略目標的重要鬥爭形式。 20世紀末期,東歐劇變和蘇聯解體,顯現了以美國為首的西方資本主義國家推行的“和平演變”戰略取得成功。 “和平演變”可以說是“心理戰”的代名詞,它的成功,使人們更加強烈地認識到,心理戰已不再是軍事鬥爭的輔助性手段,而是國際鬥爭上具有戰略意義的重要戰場。有鑑於此,世界各國在戰略思維中,無不把心理戰納入整體戰略結構之中。在信息化戰爭中,心理戰已成為國家的戰略行為和基本戰法,不僅兵馬未動,心戰先行,而且把心理進攻和心理防禦貫穿全程,作為全方位、全時空、多領域、多層次的戰略行動,使心理戰成為主導戰局走向的重要因素。
心理戰的宏觀策動層次已上升為國家和軍隊的最高戰略決策層,並將心理戰的首要攻擊目標直接指向對方的最高戰略決策者。 9·11事件之後,布什在國家安全委員會的策動下,決定在國際進行輿論布勢,將伊拉克列為“邪惡軸心”,為其進行軍事打擊作政治鋪墊。在這一總的決策牽引下,美國務院心理戰略局和控制“美國之音”、報紙、出版物、電影、電視的國際交流署,都各司其責,從戰略上將心理戰的鋒芒直指薩達姆政權,以期主導國際輿論,為軍事行動營造適宜的環境。

從海灣戰爭、科索沃戰爭、阿富汗戰爭到伊拉克戰爭,美國不僅高度重視“心戰”與“兵戰”的緊密結合,而且在心理戰中還將各種方法綜合運用,使之互為補充,相得益彰,從而大大地增強了心理戰的功效。 9·11事件以後,美國大打宣傳心理戰,為反恐戰爭奠定輿論基礎。美國在做出對阿富汗出兵決策的當天,國務院即成立“宣傳小組”,利用國內各主要媒體,反复渲染美國在“9·11”中的損失,廣泛爭取民心,以形成對恐怖主義的輿論圍剿。軍事打擊前夕,美國務院又成立了“公關小組”,負責全面執行國家宣傳戰略。戰爭開始後,為爭取國際輿論的支持,美國在華盛頓、倫敦和伊斯蘭堡建立了三個“戰時新聞發布室”,及時發布所謂“真實可靠的”戰場信息,與塔利班的宣傳相抗衡。美國防部還成立了“戰略新聞辦公室”,專門砲制虛假信息,通過各種途徑向國外傳遞。在實施軍事打擊中,強化對敵心理威懾。先是調兵遣將,以壓促變。在短短的20天內,在阿富汗周邊500公里的範圍內,集結了5個航母編隊、18萬軍作戰部隊、550架作戰飛機,從空中、地面基本封鎖了阿富汗全境,其意圖是,以強大的軍事壓力威逼塔利班無條件滿足美國的要求。接著,連續打擊,以炸促變。美軍每天均出動上百架戰機對塔利班戰略與戰術目標進行連續轟炸。在空襲中,美國軍有意使用多種具有強大心理震懾作用的新式武器,如AC—130激光攻擊機,這種飛機載有新型激光武器,可以說是光閃之處,即化為灰燼,被阿富汗軍隊稱為“死亡之光”。美國防部官員曾毫不掩飾地說,主要意圖不在於完全消滅塔利班軍事力量,而是力求打垮其士氣,削弱其心理承受能力,引發“內部混亂與裂變”。
高新技術使心理戰手段層出不窮。在近期的幾場戰爭中,美國均利用了衛星定位測向、電視轉播技術、計算機信息處理技術、網絡技術、信號模擬和失真技術、聲像技術等高新技術手段,努力提高心理戰綜合作戰效果。據不完全統計,在伊拉克戰爭中,美國使用的軍用和民用衛星達160顆,比海灣戰爭時增加了23顆。美國的新聞媒體就是通過這些通信衛星向國內和世界發播了大量有利於己、不利於敵的戰爭信息和圖像。現在,人們可以利用計算機圖像合成技術,輕鬆地製造出諸如“某國軍隊在敵國首都廣場上列隊前進”、“某國領導人與敵國首腦秘密會談,握手言和”等虛構的照片或電視畫面,到時突然將這些“信息炸彈”射向對方軍民,以摧毀對方軍民的心理防線。人們可以利用聲像技術模擬敵方國家元首和戰場指揮員的聲音,下達錯誤的作戰命令,使敵方決策失誤、指揮陷入混亂,並可以利用這些高技術手段調節本國軍民心理,鼓舞己方士氣。 1993年,美國駐索馬里海軍陸戰隊在執行維和任務中,受到一些挫折。一次,狂風大作,沙塵暴驟起,部隊一下子混亂起來。在這個關鍵時刻,美軍部隊頭頂上突然出現了一個高達150米的耶穌圖像,美軍士兵見到後紛紛跪下,有的大驚失色,有的痛哭流涕,認為上帝確實與他們同在,他們來索馬里作戰更是“上帝的旨意”,是“為上帝而戰”。後來這個圖像存在了足足五分鐘才散去。有資料說,這是美國心理戰部隊用激光全息成像系統投影到空中的圖像,用以提高部隊的士氣。美國還十分重視利用網絡技術,進行網絡滲透、信息恐怖和心理攻擊。網絡傳播速度快,在極短的時間內,心戰信息前可達前線官兵,後可達參戰者家庭,上可影響最高決策機構,下可及普通民眾,其影響力不言而喻。伊拉克戰爭中,美國甚至組織“黑客”專家,破解伊軍方高層人物的電子郵箱密碼,發送大量電子郵件,還直接撥打伊拉克高層人物的手機,實施心理威懾和誘降。近期有一則報導,稱美軍搞了一個“666”計算機病毒,這種病毒進入電腦後,可以使屏幕反復出現一種圖像,人們反复看到這一圖像,會產生一些莫名其妙的潛在意識,導致神經錯亂、幻覺甚至死亡。

China’s “Network-centric warfare”: let the future battlefield dominate ~ 中國“網絡中心戰”:讓未來戰場占主導地位


China’s “Network-centric warfare”: let the future battlefield dominate

“Network-centric warfare” is an important symbol in the process of the evolution of the mechanized war form to the information war form. It is the advanced form of the joint operation of the information age. It is a new mode of warfare on the information warfare platform which is relatively “platform center war” At present, from the “network-centric warfare,” the real arrival, although there is a long distance, but with its gradual maturity and rise, will inevitably lead to revolutionary changes in the future battlefield.

Combat operations from “asynchronous” to “synchronization”

The operations of the mechanized era are the same as the production lines of the industrial age, and there is usually a clear sequence of stages, such as firepower preparation, assembly and entry, and the first echelon attack. In the sequence of operations, due to the lack of real-time information can not grasp the battlefield, let alone the information sharing between the various forces, so the process of combat, mutual action can only be pre-planned asynchronous collaboration. In the “network center war”, the entire battlefield is a “information grid”, “sensor network” and “war network” composed of interconnection, seamless connection, dynamic open integrated network, commanders at all levels through The network can continue to perceive the entire battlefield situation, the full access to the battlefield information, and the use of the network to obtain information on the rapid processing, the development of operational plans and the issuance of operational orders, combat operations at all levels of the network at the same time almost at the same time get the same information, The command and order of the superior commander, according to the “network” to act, thus a high degree of autonomy to implement operations, to achieve operational synergy with self-synchronization.

Power concentration from the “quantity” to “system”

Since ancient times, the principle of concentrated forces has been regarded as the combat power of the military forces of the golden rule. The history of large-scale naval warfare, air combat and land brigade combat, concentrated tens of thousands of troops to fight the battlefield battle case too numerous. However, in the information age, the use of combat forces will be a series of major changes. In the “network-centric warfare”, the army became a complex and large-scale integrated system consisting of a number of command and control systems, battlefield awareness systems and weapons systems, in order to manage such a system and make it most efficient And give full play to the power and potential of the system, it must be information network technology as a link to the battlefield operation of the various functional systems highly integrated, into an organic whole, the formation of a high-performance war power system. This is by the traditional number of concentration can not be achieved, we must rely on the highly integrated system. Highly integrated combat system can make the theater, battlefield, warriors at all levels through the digital network, linked into a string of closely related chain, so that a general through the screen to see the fighting scene, a soldier can also see from his monitor , And thus achieve different combat forces, different levels of command of the real joint.

Combat group from “hard link” to “soft connection”

The general joint operations, to achieve only the combat entities of the “hard” connection, and “network-centric” approach, through the computer network as the core of the wide-area distribution, seamless connection, dynamic open integrated network system, not only To achieve combat entities “hard” connection, but also to achieve “combat procedures”, “operating mechanism” of the soft connection. Therefore, the “network-centric warfare” is a high-level form of joint operations in the information age, in this battlefield, land, sea, air and other military (soldiers) kind of block-like division of the group has no practical significance, the battlefield all combat units Are integrated network system in an equivalent cell, while the perception of the various states of the battlefield. Therefore, in the “network-centric warfare” approach, the combat group structure will be more grouped by ability, according to the need for joint “useful” combination. The so-called grouping by ability, that is, to break the boundaries of military and civilian forces will have the same combat capability of the unified grouping, thus greatly reducing the arms and arms between the overlap and waste; the so-called joint need, is based on the actual needs of combat, to have different Combat capability of the troops together, the joint operations.

Logistics support from “build” to “focus”

“Network-centric warfare” under the battlefield, will show a typical multi-dimensional, non-linear and non-contact characteristics. Logistics forces to build a large number of traditional means of protection, in this battlefield environment, will appear extremely cumbersome and discomfort. And the information, materials and transportation technology into one, through the automated supply network system to track and master the flow of a variety of materials and the demand situation of the troops, the required logistical supplies in a timely manner to the strategy, campaign and tactical units of the ” Focus “logistics, will become” network-centric warfare “in the logistics of the inevitable choice.

“Network center war” mode, the entire battlefield is a computer network technology as the core of the intelligent integrated system, through a highly integrated and highly intelligent information network, can achieve information, materials and transportation technology integration; through the combat Troops on the various sites to access the computer system, the security sector can grasp the needs of combat forces in real time, the combat forces can also real-time understanding of combat materials consumption and supplement the situation, so that real-time as needed to the required direction Materials, and to keep track of the material throughout. To ensure that logistical support is more accurate, flexible and accurate in terms of time, location and quantity.

Combat mission from “stability” to “change”

On the traditional battlefield, due to the weak sense of the battlefield, from the discovery of the target to attack the target reaction is slow, combat mission allocation is mostly planned, the middle rarely change. In the “network-centric warfare” approach, due to the battlefield perception, command and control and fire strike has become a whole, from the discovery of the target to the implementation of the attack time difference is getting smaller, near real time, the commander can change the battlefield situation, at any time To carry out dynamic adjustment and redistribution of the tasks of the troops, so as to maximize the operational potential of combat troops. In the Iraq war, the US military used its advanced and powerful information and network technology to reduce the time from the discovery of the target to the completion of the attack from the Gulf War 3 days, 2 hours of the Kosovo war to tens of minutes. And the real realization of the “network-centric warfare”, the reaction time will be further reduced or even reached in seconds to calculate, which makes the commander of the battlefield can make a quick change, more sensitive response, timely and efficient command, Control and coordination, greatly improving the ability to temporarily change the operational response to the rapid response. (Liu Yushan)

“China Defense News” July 1, 2004

Original Mandarin Chinese:

一般的聯合作戰,實現的只是各作戰實體的“硬”連接,而“網絡中心戰” 方式下,通過以計算機網絡為核心的廣域分佈,無縫連接,動態開放的綜合網絡系統,不僅可實現作戰實體的“硬”連接,而且可實現“作戰程序”、“運行機制”的軟連接。因此,“網絡中心戰”是信息時代聯合作戰的高級形態,在這種戰場上,陸、海、空等各軍(兵)種條塊式的區分編組已無實際意義,戰場上所有作戰單元都是綜合網絡系統裡的一個等同的細胞,同時感知著戰場的各種狀態。因此,在“網絡中心戰”方式下,作戰編組結構更多的將是按能力編組、按需要聯合的“有用”組合。所謂按能力編組,就是打破軍兵種界限將具備同樣作戰能力的部隊統一進行編組,從而大大減少各軍兵種力量之間的重疊和浪費;所謂按需要聯合,就是根據作戰的實際需要,把具備不同作戰能力的部隊組合起來,進行聯合作戰。

傳統戰場上,由於戰場感知能力弱、從發現目標到攻擊目標反應慢,作戰任務分配多是預先計劃,中間很少有變。而在“網絡中心戰”方式下,由於戰場感知、指揮控制和火力打擊已成為一個整體,從發現目標到實施攻擊的時差越來越小,近乎實時,指揮員可以根據戰場態勢的變化,隨時對部隊的任務進行動態的調整和重新分配,從而最大限度地發揮作戰部隊的作戰潛能。伊拉克戰爭中,美軍運用其先進和強大的信息及網絡技術,使戰場上從發現目標到完成攻擊的時間從海灣戰爭時的3天,科索沃戰爭時的2小時縮短至幾十分鐘。而真正實現“網絡中心戰”後,這一反應時間還會進一步縮短甚至達到以秒來計算,這使得指揮員可對戰場的瞬息變化作出更快、更靈敏的反應,及時高效地進行指揮、控制與協調,大大提高臨時改變作戰計劃的快速反應能力。 (劉玉山)
《中國國防報》 2004年07月01日

互聯網”的混沌與網絡空間的迷茫 ~ China’s Internet – creating chaos and confusion in cyberspace


China’s Internet – creating chaos and confusion in cyberspace

One, chaotic “internet”

1 , from the Apache network to the “Internet”

“Internet” What is the network? China has no “Internet”? The world whether there is no “Internet”? This is not a problem, due to language and cultural expression and understanding of different interests due to the scope and purpose of the different Academic research conditions and the different atmosphere, and so on, these years more and more chaotic. “Internet”, “Internet”, “Internet”, “Mobile Internet”, “Internet Finance”, “Internet +” … … and so on, what are linked to a “Internet”, “Internet” has become a fashion term.

Today’s world has become the “Internet” encompasses the world of the world, in addition to what are “the Internet” that an “Internet”, many people do not know there is no other network, but also can not have other networks, why There are other networks. “Internet” in the end is a network or should be more than one network? Recognize the chaos, chaos awareness, are derived from this.

In 1969, Dr. Xu became the first member of the internetwork at the University of California, Los Angeles (UCLA), and later became the only senior vice president of Chinese lab in the history of Bell Labs, Institute of Engineers (IEEE) academician, has been known as the US network communications industry, “the first Chinese.” In 2004, Mr. Xu told me that people today are keen on the “Internet”, the predecessor of the ARPANET (ARPANET), the US government based on the defense considerations to the university to study the large computer mutual communication of an experimental network, 20 years of innovation and improvement from a network.

In 1970, the American Information Processing Association defined the computer network as “a collection of computer systems with separate functions that could be shared in a way that shared resources (hardware, software, data, etc.).” The definition of this computer network in the United States, perhaps regarded as the earliest from the United States “Internet” definition?

2 , two network architecture

In the 1950s, the United States established a semi-automatic ground air defense system (SAGE, Chinese translation “赛 Qi”), the computer technology and communication technology combined application attempt. In the early 1960s, the American Air Ticket Booking System (SABRE-1) consisted of a central computer and more than 2,000 terminals distributed across the United States to form a computer communication network, enabling the terminals to connect to the central computer via telephone lines on a larger scale Of the typical application. This is a single computer-centric, through the multi-line controller and remote terminal connected to the online system, known as the terminal-based remote online system, that is, early computer network.

At the end of the 20th century, the International Organization for Standardization ISO standardization of computer and information processing technology committee to study and develop network communication standards to achieve the international standardization of network architecture. In 1984, ISO formally promulgated the International Standard ISO 7498, referred to as the “Open System Interconnection Basic Reference Model”, referred to as the OSI RM (Open System Interconnection Basic Reference Model), the famous OSI seven-layer model. OSI RM and standard protocol development and improvement to promote a unified, open network architecture, greatly accelerating the development of computer networks.

However, the United States does not put ISO in the eyes, insist on arbitrary. In 1983, the United States in the Apache network officially launched TCP / IP protocol to replace the original NCP network control protocol, and then the formation of the Internet (Internet). For more than 30 years, the United States has used its technology, economy and military advantages to implement the Internet’s Internet-wide network strategy. The Internet Task Force (ICANN) is naked to put forward the slogan of “the same world, the same Internet”. The Obama administration is also praised “the Internet is unique in the international environment.” As a result, the Internet by the United States and its dormant countries in the iron powder are relish for the “Internet”.

In fact, the Internet is the United States to develop rules, control the exchange, monitoring information of a computer network architecture, does not fully comply with the International Organization for Standardization ISO officially issued OSI RM requirements. In other words, there are two dominant network architectures in the world: one is the OSI RM (open system interconnection reference model) proposed by the ISO, and the other is the use and pushing of the Internet. TCP / IP RM (TCP / IP reference model). The fundamental difference between the two models is that OSI RM to promote the global computer network open system interconnection, TCP / IP forced all the world’s computer terminals are connected to the Internet one network; ISO is committed to all countries, various types of computer network system The interconnection between the United States stressed that the computer between the end of the exchange of information between the end.

3 , “Internet” definition

So far, the scientific and technological circles, academia, education, industry and commerce, there is no uniform, clear, accurate and standardized Internet definition. Here the Chinese Internet, referring to the Internet as early as July 18, 1997 by the State Council authorized by the National Science and Technology Nomenclature Committee clear English internetwork, rather than the Internet.

Some people following the US Internet strategy insist that “the Internet is the Internet,” “China is the Internet translated into the Internet.” This is not a scientific, academic definition, nor is it from the academicians and “authority” of the mouth, more like an unidentified “Ah Q” said.

Or Obama frankly. “Through the Internet connection, the US company’s business can be extended to any place in the world to create countless jobs and opportunities for the American people,” he said in the preface to the International Strategy for cyberspace, published in the White House, “The Internet itself can not open a new era of international cooperation.”

Internet, Internet from English. As a proper noun, it refers to the use of TCP / IP communication protocol of a computer system, and the system provides information, services and users. The Internet requires that the user (the terminal) use the specified domain name and address for information exchange within the defined Internet framework in accordance with its specific rules, which is excluded and closed to the network using other communication protocols, or simply replace it.

Some people say that the definition of the Internet, English should be “a computer network forming of a worldwide network of computer networks that use the TCP / IP network protocols to facilit data transmission and exchange.” Translated into Chinese, is “by a use of TCP / IP Network protocol to promote data transmission and exchange of computer networks composed of a global network. “Please note that this” definition “is very clear:

First, you must use the TCP / IP protocol;

Second, must be the same use of TCP / IP protocol composed of computer networks;

Third, must be in the TCP / IP protocol on the basis of a global network.

Around a long circle around the same circle, or “use TCP / IP protocol computer network”! Can only accept and use TCP / IP with a protocol, the same type of rules, in the same network space for transmission and exchange Of the network, which is not the Internet? How to become the “Internet” in the end is a dull chaos, or chaos led to a dull?

It is said that in the foreign literature, the Internet is described as “no leadership, no law, no political, no army … … incredible social organizational structure.” Dare to ask the US government to the global implementation of such a network structure is what is it? Is to ensure that to induce or force countries, regions, organizations and each use of computers around the world users have succumbed to the Internet, subject to, The United States?

It was argued that, from a general point of view, the definition of the Internet should include three aspects, namely:

– is a TCP / IP protocol based on the network;

– is a computer users of the network group, the user in the use of network resources at the same time, but also for the development and expansion of the network contribute;

– is a collection of all the information resources that can be accessed and used.

The question is whether or not the other computer networks that do not use or do not apply the TCP / IP protocol exist. Is it allowed to exist? Should it exist? Use different protocols The interconnection, convergence, exchange between networks is not the Internet, is it interconnected? Even if the same from the TCP / IP protocol network, IPV6 and IPV4 network is the relationship between the interconnection, or the upgrading of the relationship between China’s national intellectual property rights of IPV9 and the United States have intellectual property IPV6, IPV4 network, is the sovereign equality of network interconnection, or technology-compatible coverage of the alternative relationship? If the realization of IPV9, V6, V4 technology system network of mutual integration and sharing co-governance, which is the Internet? It is only the Internet To the future of the network of technological progress?

According to the above Internet, the definition and statement of the Internet, China only has a network within the Internet framework, there is no consistent with the national sovereignty, consistent with the public network, there is no interconnection with non-sovereign public Internet (internetwork).

The concept of “the Internet is the Internet” that the Americans themselves can not say clearly define, in recent years, have appeared in China’s strategic, planned, decision-making documents and media coverage. Some “authorities” who take the opportunity to hustle and dust, constantly extending, expanding, distorting, fabricating its connotation and extension, it is chilling. If only by the United States 忽悠, but also not detained our independent innovation thinking, and will not be able to reverse and adjust the decision-making mistakes and mistakes strategy. If we themselves fool yourself, self-deception, does not mean that we know the chaos has been deep mud, it is difficult to extricate themselves?

Second, the confusion and confusion of cyberspace

U = 590280692, 1668539107 & fm = 21 & gp = 0.jpg

1 , the Internet constitutes the network space

With the approval of the Central Network Security and Information Leading Group, the National Internet Information Office published the “National Network Space Security Strategy”, which was first published by “Internet, Communication Network, Computer System, Automated Control System, Digital Equipment and Its Bearer Which is “a new area of ​​human activity that is important to land, sea, sky and space. National sovereignty extension extends to cyberspace, and cyberspace sovereignty becomes An important part of national sovereignty.

What is the “Internet” mentioned above? Refers to the network of Internet coverage of a global network of space or the world’s multiple sovereign network interconnection of the network space formed? This problem is not clear, people’s cyberspace awareness, Recognize and identify the ability to distinguish still deep chaos, confusion and confusion.

The Internet is the Internet, in order to achieve the exchange of information between the terminal and the terminal in a network within the framework of the formation of a joint network of space; the Internet is the Internet, is a number of different types of networks in order to share the purpose of mutual benefit Interconnected network space. The Internet and the Internet constitute the integration of the network space, inclusive of common, but also the existence of their own specific and specific rules, categories, ecological and other characteristics. Different cyberspace can not be generalized, confused. Our knowledge should not be disturbed more and more chaos.

Different network space is the most fundamental, the most typical characteristic difference is that countries in the Internet (internetwork) under the framework of sovereignty can not be changed, can not cover up, irreversible, can only be between the sovereignty of the handshake, shake hands, In contrast, bullying. The sovereignty of the Internet is only one, that is, the United States a unique sovereignty, or hegemony. Within the framework of the Internet, any country’s sovereignty has been unilaterally formulated and closely governed by the United States, the scope and the shackles and shackles of ecology, and have to let the United States and its allies (such as Japan) violate, penetrate, , To play, to play in the applause.

In particular, the need for deep and clear, highly important is the dissemination of information, economic development, prosperity, culture, governance, cooperation and exchanges, not the Internet patent, the national sovereign network can also be implemented and implemented, based on national sovereign cyberspace Internet interconnection may do better. The use of the Internet in the United States a network of technical systems and means to bypass the national network of sovereignty, governance and legal rights, is leading to the sovereign cyberspace security is the biggest source of security, is the sovereign state of the greatest threat to security, The most destabilizing factors that endanger the peace, stability and national unity of the sovereign states. In the Internet, there is no country with the country’s diplomacy, there is no equal and mutual respect for international cooperation, only the United States a dominance, a strong, one dominate, one of the words have the final say. In the framework of such a network, with the United States to talk about the rules, stresses the principle of governance, on the Pratt & Whitney, not with the tiger skin, dance with the wolf? How can the United States take their own national interests to share with other countries, to sell their own network sovereignty To allow other countries to rival the country’s cyberspace “sovereignty in me, not subject to people”, if subject to the people, will be subject to chaos, will suffer! The truth, Iran understand, Germany understand that Russia understands that many countries understand. Over the years, from Asia, the Americas, the Middle East to the EU lessons one by one, we have no reason not to understand, do not accept the lesson?

2 , cyber space sovereignty belongs to the United States

Some people say that cyberspace is cyberspace, that the English Cyberspace is internetwork. If the two English words is entirely a meaning, pointing to the same category of words, why have to be divided into how to see, how to read, how to write can not stand on the two words, speak English foreigners tired tired!

It is said that Cyberspace translated into Chinese cyberspace is more meaningful. Some people say that the US Presidential Decree on Cyberspace’s definition shows that “the Internet is an important infrastructure for cyberspace,” “Internet computers are the most basic elements of Cyberspace,” “Internet + is the Internet’s most important move to cyberspace ”

Here the “Internet”, obviously refers to the Internet that Internet, “Internet +” is the Internet +. There is also a dizzy chaos: the Internet or “Internet” does not constitute cyberspace, the Internet or “Internet” is only Cyberspace this cyberspace infrastructure? “Internet +” is only the Internet to Cyberspace this Network space expansion of an important action, but also does not belong to the network space?

English Cyberspace Chinese literal translation, is cyberspace. 2008 President of the United States President Bush issued the Presidential Decree No. 8 (NSPD) / 23 Homeland Security Presidential Decree, the Chinese translation of cyberspace definition is: “a global domain in the information environment, by independent and interdependent information Technology infrastructure network, including the Internet, telecommunications networks, computer systems and embedded processors and controllers, etc. “This seemingly rigorous definition defines cyberspace as a global information environment, encompassing all of the world’s” information technology Infrastructure network “. US Air Force Chief of Staff said the cyber space encompasses everything from “direct current to visible light”. To say that, or the Internet a network of the world that the concept of a replica, for a noun, changed the argument only, not the right.

This definition can be seen almost as an American imperial edict to declare war on all sovereignty over the world. The definition does not recognize the resources, conditions and foundations of countries to build and develop sovereign cyberspace, and first incorporate all kinds of network infrastructures into the category of cyber cyberspace. The definition is preemptively bundled with political, economic, military and cultural Hands and feet of the “certain rules”, thrown out of the national scientists, strategists in the future development of the field of network innovation voyage cable; the definition of only state officials set fire to the people not allowed to light, domineering, ambition, aggressive.

3 , Internet sovereignty and power confused

Although the OSI RM (Open Systems Interconnection Reference Model) proposed by the International Organization for Standardization (ISO) is one of the two dominant network architectures in the world, these years have not resulted in large-scale market applications. Some people think that the model exists level and content is not the best, the session layer and presentation layer is almost empty, the corresponding service definition and protocol complexity and other technical shortcomings.

And the obvious and unsafe problems caused by the inherent lack of Internet technology have been widely concerned by countries and international organizations. Fundamentally change the Internet’s single control center framework, TCP / IP protocol, identity and security authentication mechanism, has become a major global key core technology innovation research topics.

Perhaps because of this, the current countries have not yet formed in the sovereign cyberspace based on the construction of the global Internet (internetwork) conditions, resources and support, not the ability and the Internet “zhongjiang governance”, “equally”, “shared peace” Can only “send people”, in access to the Internet, rent Internet services, to prevent excessive penetration of the Internet and so on, put huge costs and bargaining with the United States to try to minimize harm and loss. Countries are equally involved in Internet governance, equitable distribution of Internet infrastructure resources, common management of Internet root servers and other key information infrastructure, to strengthen the representation and voice of developing countries, like slogans, and like a mirage, shouting fills, and can not reach.

In the framework of the United States Internet within a network, in the United States cyberspace sovereignty and security under the serious deterrence, the peaceful development of the theme of cyberspace international cooperation strategy is likely to only wishful thinking, the premise and the foundation is wrong, direction and route Biased The United States and the rest of the world continue to lag behind the United States in the network space, subject to the United States, the United States, the United States, the United States, the United States, the United States, the United States, Succumbed to the United States, and will actually lose cyberspace sovereignty, loss of development opportunities and strategic opportunities, more harm than good, regret not the beginning.

4 , cyberspace international cooperation trade-offs

Z (8) .jpg

Corresponding to the Chinese cyberspace English is Net Space, the scientific definition is: information infrastructure to connect, cover and carry information processing space-time domain.

This definition specifies the most common commonality of the Internet, the Internet, cyberspace, and any other cyberspace, not to the will of a particular country or interest, not limited to a particular network, Country to build the network space.

With this definition as a prerequisite to support countries to strengthen the construction and development of sovereign cyberspace, to promote the international community in a spirit of mutual respect for dialogue and cooperation, have the resources to protect the public in the cyberspace of the right to know, participation, expression, supervision Rights and conditions to build a multilateral, democratic and transparent global network space management system, it is possible to achieve scientific and rational, fair and orderly, equal and reciprocal, security checks and balances of international cooperation in cyberspace.

China in the supercomputer development, aerospace computer system applications, etc. has been rushed in the forefront of the world, can be compatible with IPV6 and IPV4 IPV9 technical system test run test is satisfactory. Russia in the domestic network information control and prevention of foreign network invasion and so has accumulated a good experience, the establishment of a good system. The EU has embarked on a potential threat to the Internet and is committed to building an autonomous cyberspace system. More and more countries put forward cyber space sovereignty demands, in favor of Xi Jinping President “jointly build cyberspace fate community” claims.

In the current limited conditions, the basis and the expected prospects, China’s international cooperation in cyberspace initiatives should be able to assess the situation, do what, careful operation, not rushed into the routines of other countries. Should be single-handedly with the United States and other countries to negotiate international Internet space governance diplomacy, a rainy day, one hand to build the power of the United States enough to balance the US Internet and cyberspace of China’s sovereign public network system. At the same time, take decisive and resolute measures to resolutely deal with domestic and foreign network security risks and threats, and resolutely punish the network of criminal activities, and resolutely crack down on China’s cyberspace sovereignty, betrayal of national and national interests, resolutely correct long passive Cyberspace following strategy and strategy.

Third, the world cyberspace security situation

U = 2873491118, 2968306817 & fm = 11 & gp = 0.jpg

The US Internet-dominated world cyberspace security situation is increasingly grim. Wearing the “Internet” caps of the Internet security problems riddled with more and more countries to become difficult to save the network of ills and long-lasting “heart disease.”

According to the “China cyberspace security report (2016)” Blue Book, since 2015, based on the Internet and cyber space network conflict and attack, become the main form of confrontation between countries. Russia Kaspersky accused the United States “Formula Group” through the implantation of spyware, infected Iran, Russia, China, more than 30 countries such as military, financial, energy and other key sectors of the tens of thousands of computers. Iran says it has thwarted the United States’ cyber attacks on its oil sector. Italy “Hacking Team” more than 400G of the company’s data was open and found that the United States, Morocco, Ethiopia and other institutions in more than 20 countries to buy a network of spy and vulnerability tools. The company blames Russia’s “APT28” organization for exploiting zero-day vulnerabilities to attack NATO and US defense agencies.

Blue Book Disclosure, the United States set up “Network Threat Intelligence Integration Center”, and expand the State Council “Anti-Terrorism Strategy Information Center” scale, the CIA set up “Digital Innovation Department” to strengthen the network intelligence gathering capacity. The US Department of Defense launched a network security incubator program, the British government to expand its network security research capabilities, the US Navy prepared offensive network action, NATO announced the preparation of mixed network warfare, countries focus on network attack and defense and hard and soft strength, and strive to security and attack Ability to enhance the two-way. Media disclosure, the world has more than 50 countries set up a network warfare forces, the global cyberspace “military race” escalating.

According to the disclosure, relying on the United States Internet technology, agreements and infrastructure development developed “China Internet”, government, banking, energy and other vital departments of the network information system generally can not achieve safe and controllable, the domestic industrial control system is ” Security loopholes. ” 2015 appears Alipay, Ctrip data loss, Netease e-mail leakage and other troubles, in recent years through SMS, WeChat implementation of financial fraud every day in a large number of occur. Minister of Industry and Trade Miao Wei told reporters that now an average of one month to search for 173 million telecommunications fraud information.

According to the “National Internet Information Center”, “Network Security Information and Dynamic Weekly”, February 13, 20-19, the number of domestic infected network virus host 400,000 units, up 6.6% over last week; territory was implanted back door Of the government website rose 47.1%; for the domestic website of the number of counterfeit pages increased by 165.2%; new information security high-risk loopholes rose 26.2%. Monitoring found that the source of network virus transmission to the site of the horse, involving 68 domain names in 30.9% for overseas registration, and the top domain for the .com about 83.8%, most of the horse site through the domain name to visit the implementation of the virus spread.

National Defense University professor Dai Xu pointed out that today’s world has been in a “network”. Changes in the military field have taken place. From the sensor as the core, to electromagnetic space as the boundary of the electronic information warfare (which can be called “telecommunications war”), to the network as the core, to the psychological space for the characteristics of the network, psychological warfare (can be called “network Heart war “),” network “into the basic characteristics of the seventh generation of war, is becoming the main battle of the big country game. China’s traditional strategic advantage is becoming the focus of opponents crack, China once again in a natural barrier can rely on the dangerous situation, the face of being blackmail the state of the network. The traditional cognitive system of war and anti-war requires urgent upgrading. In the new era of mixed warfare of the network, China must also have the ability to hold the “bull nose” of the times.

Fourth, the history of sovereign cyberspace

1 , “cyber space” alert the world

The United States carefully thrown out the “cyberspace” theory, self-righteous, and then without hesitation in its delineation of the “cyber space that cyberspace” large-scale global information monitoring, network war deployment and network information intelligence collection And plunder, etc., alert the world’s scientists, economists, military scientists, socialists and businessmen, politicians, people and so on. People suddenly realized that “the Internet is the Internet” and “cyber space is cyberspace” exactly the same. In the final analysis, the superpower capitalist hegemony of the United States regarded himself as the head of the “global village” and regarded “economic globalization” as “selfish”. “I am my, you or my, this earth on the land and sea sky all everything is my” – this is the real United States, which is all the interests of the United States. The United States, is so arrogant unreasonable.

However, reality and science have repeatedly verified that cyberspace is only a type of network that exists in a variety of independent runs, and is part of a space for different types of networks that are different in technology, different in purpose, and for different purposes. Cyberspace is not equal to cyberspace, cyberspace covers cyberspace, cyberspace is a subset of cyberspace.

Since the performance of the United States sovereignty and interests of cyber space, indicating that all constitute a subset of cyberspace, all countries and areas of the network space, have their sovereignty and interests of the demands. Iran, Russia, Germany, China and so on the EU and so on, should have, there must be, otherwise there is no construction of “cyberspace fate community,” the basic conditions and the necessary basis for peace, sharing, co-governance, win-win International cyberspace is out of the question.

In this way, to strengthen the national sovereignty network construction and development, build and maintain their own security and stability, national unity, and promote the prosperity of the domestic community of sovereign cyberspace, become a sovereign state important event. This is the common responsibility of the United Nations, the United States and the world’s sovereign States. “Cyber ​​space” deter the world, is the United States contempt for the world’s cyberspace strategy of the major errors; any follow the US Internet, cyber space strategy decisions and initiatives, will be lost in the direction of major mistakes.

2 , Internet space strategy has been put on the agenda

U = 2559533438,1219077096 & fm = 23 & gp = 0.jpg

Network space (Net Space), is the space-time system created by mankind, is the generic name of the concept, is the information processing and exchange of bearing space. It summarizes the three elements that make up the cyberspace: attributes, connection coverage, and the ability to carry processing information. Regardless of the financial network, enterprise network, government network, regardless of the Internet, Internet, Internet, regardless of land-based network, aviation network, space network, regardless of cable network, wireless network, quantum network, regardless of public or private network related services Providers and operators of private access networks, and so on, there are independent connections to cover the space-time domain and bearer processing exchange of different information on the network space.

The cyberspace has not been able to rigorously, regulate and accurately reflect and embrace all of its inherent characteristics, and extend the scope of the cyber space in the new network space. The conditions and the basis for the development of the law of change. This network and the network between the super network space, inspired the “Internet space” (Nets Space) doctrine. Internet space is an integrated domain of cyberspace.

Standing in the Internet space height, depth and breadth of the full dimension, full view of cyberspace, our vision will be wider and farther and clearer, our thinking will be easier to jump out yesterday and today, looking to tomorrow, we will from the Internet , “Internet”, cyber space caused by chaos in the liberation of ideas, out of a computer network era beyond the new path of the human information society.

A network space, wireless networks, quantum communication, space networks and other interconnected, interactive, interdependent constitute the era of Internet space, has come and is entering a more advanced stage. The rise of China’s cyberspace strategy will inevitably lead to the rise of revolutionary thought, the rise of science and technology, the rise of economy, the rise of the nation, the rise of the country, the benefit of future generations, the impact and drive the global human society by leaps and bounds.

Internet space strategy and technical preparation has been put on the agenda, the best time may be in front of and in the next few years. China can not seize the opportunity to seize the opportunity to go beyond the United States to lead the new super cyberspace – Internet space era, to seize the day and night, to now move from scratch, to the number of romantic figures, but also to see the current.

3 , the development of Internet space to be the power of the whole country

The United States to push the country to push the Internet, push IPV6, push the Bo space, leading to chaos in the country and confused at the same time, but also indeed created a remarkable network technology, network economy and network military glory.

China has become the world’s second largest economy. China is fully capable, conditional and confident to develop the international space strategy and technology with the power of the whole country.

Ideological emancipation, institutional reform is China’s reform and opening up since the two initiatives complement each other. From this start, it is recommended:

⑴ the establishment of the CPC Central Committee, the National People’s Congress, the State Council and the CPPCC under the leadership and under the constraints of a highly authoritative, rule of law and error correction mechanism and error correction mechanism, and resolutely put an end to the confusion and decision-making road.

A small number of follow the United States, “experts”, “authority” long-term impact and intervention in the national network of information authorities who also a number of “one speech” strange thing, no longer allow, exist and continue, and must be resolutely reversed and broken.

Should immediately resolutely correct the “comprehensive introduction, upgrading, the deployment of IPV6” major strategic decision-making and planning mistakes, abolished with the United States signed all the hazards and endanger China’s cyberspace sovereignty and security of the unequal agreement; cyberspace field investment projects one by one The implementation of the audit and post-evaluation, obviously “for others to marry clothes,” all shut down and turn.

(2) The State encourages and supports the construction, development and maintenance of a sovereign public network on the basis of the premise and national ownership of intellectual property rights.

Should be clearly in the United States based on the current “Internet”, the construction of independent development of the Chinese public network and other sovereign public network and provide services, the people have the right to use the sovereign public network and non-sovereign public network rights. The state should introduce the tendency of the incentive policies and measures to allow the sovereign public network using IPV9, Zheng code, Tao Chen code, CFL safety certification, MISC, and so on with national independent intellectual property rights technology. Actively build, develop and maintain the domestic independent operation of the multi-network constitute the Internet, can build a global network space fate community to explore the model, the accumulation of experience and create the conditions.

(3) to seize the opportunity to create a national-led, social participation, private operation of the “Internet Space Research Institute”, all-round, multi-dimensional, deep-level research and development of Internet space technology and development of development strategies and strategies to create a world-class training of Internet space talent base , Build the sovereign network / future network / Internet space experiment, test the system application environment, explore and solve the sovereign network, cyberspace and the development of Internet space in various problems, strides in the lead in the forefront of the development of Internet space.

(4) First of all, with Russia, Iran, Germany, the European Union and other countries committed to the development, development and maintenance of their own sovereign cyberspace and actively organize the construction of cyberspace destiny community communication, exchange, negotiation and cooperation, joint multi- The United States is the main negotiator.

Clear the chaos, swing confused, we will no longer be subject to the people, let the mercy, we will be firmly into the era of cyberspace, we will be far-sighted toward the future of Internet space.

Original Mandarin Chinese:



“互聯網”究竟是什麼網?中國究竟有沒有“互聯網”?世界究竟有沒有“互聯網”?這本不是問題的問題,由於語言文化表達和理解的不同,由於利益追求範圍和目的的不同,由於學術研究條件和氛圍的不同,等等,這些年越來越顯得混沌不清。 “互聯網”、“中國互聯網”,“國際互聯網”、“移動互聯網”、“互聯網金融”、“互聯網+”……等等,什麼都掛上個“互聯網”,“互聯網”竟成為時尚用語。

今天的世界儼然成了“互聯網”囊括天下的世界,除了什麼都是“the Internet”那一張“互聯網”,許多人都不知道還有沒有其它網,還能不能有其它網,為什麼還會有其它網?。 “互聯網”到底是一張網?還是應該不止一張網?認識的混沌,混沌的認識,皆源於此。

1969年,許浚博士成為在美國加州大學洛杉磯分校(UCLA)實驗室誕生的第一個互聯網絡(internetwork)的研究成員,他後來成為貝爾實驗室歷史上唯一的華裔高級副總裁,美國電子電氣工程師學會(IEEE)院士,曾被譽為美國網絡通信界“第一華人”。 2004年,許先生告訴我,人們今天熱衷的“互聯網”,前身是阿帕網(ARPANET),是美國政府基於國防上的考量出錢給高校研究的大型計算機互相通信的一個實驗網,又經過20多年的創新和改進而來的一張網。



20世紀50年代,美國建立了一個半自動的地面防空系統(SAGE,中文譯作“賽琪”),進行了計算機技術與通信技術相結合的應用嘗試。 60年代初,美國航空訂票系統(SABRE-1)由一台中心計算機和分佈在全美範圍內的2000多個終端組成計算機通信網絡,更大規模地實現了各終端通過電話線連接到中心計算機的典型應用。這種以單個計算機為中心、通過多重線路控制器與遠程終端相連接的聯機系統,被稱做面向終端的遠程聯機系統,即早期的計算機網絡。

20世紀70年代末,國際標準化組織ISO的計算機與信息處理標準化技術委員會著手研究和製定網絡通信標準,以實現網絡體系結構的國際標準化。 1984年,ISO正式頒布了稱為“開放系統互連基本參考模型”的國際標準ISO 7498,簡稱OSI RM(Open System Interconnection Basic Reference Model),即著名的OSI七層模型。 OSI RM及標準協議的製定和完善推動了統一、開放的網絡體系結構,大大加速了計算機網絡的發展。

但是,美國並不把ISO放在眼裡,堅持獨斷專行。 1983年,美國在阿帕網中正式推出TCP/IP協議取代原有的NCP網絡控制協議,進而形成因特網(Internet)。 30多年來,美國利用其科技、經濟和軍事優勢,以舉國之力推行因特網一張網連接覆蓋全球的戰略。美國因特網任務工作組(ICANN)赤裸裸地提出“同一個世界,同一個因特網”的蠱惑人心口號。奧巴馬政府更是讚譽“因特網在國際環境中獨樹一幟”。由此,因特網被美國及其蟄伏在各國的鐵粉們津津樂道為“互聯網”。

實際上,因特網就是美國製定規則、控制交換、監控信息的一種計算機網絡體系結構,並不完全符合國際標準組織ISO正式頒布的OSI RM的要求。也就是說,目前世界上存在著兩種占主導地位的網絡體系結構:一種是國際標準化組織ISO提出的OSI RM(開放式系統互連參考模型);另一種是因特網使用和力推的TCP/IP RM(TCP/IP參考模型)。兩種模型的根本區別在於,OSI RM推動全球計算機網絡開放式系統互連,TCP/IP迫使世界所有計算機終端都接入因特網一張網之中;ISO致力於各國、各種類型的計算機網絡系統之間的相互連接,美國強調的是計算機端對端之間的信息互通。




還是奧巴馬坦誠。他在白宮發表的《網絡空間國際戰略》的序言裡說,“通過因特網連接,美國公司的業務可以延伸至全球任何一個地方,為美國民眾創造無以計數的就業崗位和機會”,他承認, “因特網本身無法開啟國際合作的新紀元。”


有人說,因特網的定義,英文應該是“a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange.”翻譯成中文,就是“一個由使用TCP / IP網絡協議促進數據傳輸和交換的計算機網絡組成的全球網絡。”請注意,這個“定義”說得很明確:










問題在於,不使用或者不適用TCP/IP協議的其它計算機網絡是否存在?是否允許存在?是否應該存在?使用不同協議網絡之間相互連接、融合、交換構成的是不是互聯網、是不是互連互通的網絡空間?即便同樣源於TCP/IP協議的網絡,IPV6與IPV4網絡之間是互連互通的關係,還是升級換代的關係?具有我國民族自主知識產權的IPV9與美國擁有知識產權的IPV6、 IPV4網絡之間,是主權平等的網絡互連關係,還是技術兼容的覆蓋替代關係?如果實現IPV9、V6、V4技術體系網絡的相互融通與共享共管共治,這是互聯網呢?還僅僅是因特網走向未來網絡的技術進步?













還是奧巴馬坦誠。他在白宮發表的《網絡空間國際戰略》的序言裡說,“通過因特網連接,美國公司的業務可以延伸至全球任何一個地方,為美國民眾創造無以計數的就業崗位和機會”,他承認, “因特網本身無法開啟國際合作的新紀元。”


有人說,因特網的定義,英文應該是“a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange.”翻譯成中文,就是“一個由使用TCP / IP網絡協議促進數據傳輸和交換的計算機網絡組成的全球網絡。”請注意,這個“定義”說得很明確:










問題在於,不使用或者不適用TCP/IP協議的其它計算機網絡是否存在?是否允許存在?是否應該存在?使用不同協議網絡之間相互連接、融合、交換構成的是不是互聯網、是不是互連互通的網絡空間?即便同樣源於TCP/IP協議的網絡,IPV6與IPV4網絡之間是互連互通的關係,還是升級換代的關係?具有我國民族自主知識產權的IPV9與美國擁有知識產權的IPV6、 IPV4網絡之間,是主權平等的網絡互連關係,還是技術兼容的覆蓋替代關係?如果實現IPV9、V6、V4技術體系網絡的相互融通與共享共管共治,這是互聯網呢?還僅僅是因特網走向未來網絡的技術進步?














英文Cyber​​space的中文直譯,就是賽博空間。 2008年美國總統布什發布的54號國家安全總統令(NSPD)/23號國土安全總統令,對賽博空間定義的中文翻譯是:“信息環境中的一個全球域,由獨立且相互依存的信息技術基礎設施網絡組成,包括因特網、電信網、計算機系統以及嵌入的處理器和控制器等。”這個看上去嚴謹的定義,將賽博空間圈定為全球信息環境域,囊括世界所有的“信息技術基礎設施網絡”。美國空軍參謀長說,賽博空間囊括了從“直流電到可見光波”的一切東西。說來說去,還是因特網一張網網羅天下的那一套概念的翻版,換了個名詞、換了個說法而已,不出其右。



儘管國際標準化組織ISO提出的OSI RM(開放式系統互連參考模型)是目前世界上兩種占主導地位的網絡體系結構之一,但這些年並沒有形成規模化的市場應用。有人認為,該模型存在層次數量與內容不是最佳、會話層和表示層幾乎為空、相應的服務定義和協議複雜等技術缺點。





與中文網絡空間對應的英文是Net Space,科學的定義是:信息基礎設施連接、覆蓋及承載信息處理的時空域。







據《中國網絡空間安全報告(2016)》藍皮書,2015年以來,基於因特網和賽博空間的網絡衝突和攻擊,成為國家間對抗的主要形式。俄羅斯卡巴斯基公司指責美國“方程式小組”通過植入間諜軟件,感染伊朗、俄羅斯、中國等30多個國家的軍事、金融、能源等關鍵部門的上萬台電腦。伊朗稱挫敗了美國對其石油部門的網絡攻擊。意大利“Hacking Team”公司逾400G的數據被公開後發現,美國、摩洛哥、埃塞俄比亞等20多個國家的機構向其購買了網絡間諜和漏洞工具。美國火眼公司指責俄羅斯“APT28”組織利用零日漏洞,攻擊北約和美國國防機構。


另據披露,依托美國因特網技術、協議和基礎設施建設發展起來的“中國互聯網”,政府、銀行、能源等機要要害部門的網絡信息系統普遍無法實現安全可控,國內工業控制系統更是“安全漏洞百出”。 2015年出現的支付寶、攜程網數據丟失,網易郵箱信息洩漏等鬧得沸沸揚揚,近年來通過短信、微信實施的金融詐騙每天都在大量發生。工信部長苗圩告訴記者,現在平均一個月能夠搜索到1.73億條電信詐騙的信息。




網絡空間(Net Space),是人類創造的時空體系,是泛指的名稱概念,是信息處理與交換的承載空間。它概括了構成網絡空間的三大要素:屬性、連接覆蓋範圍和承載處理信息的功能。無論金融網、企業網、政府網,無論因特網、互聯網、網間網,無論陸基網、航空網、太空網,無論有線網、無線網、量子網,無論公網或私網涉及的相關服務提供商和運營商的專用接入網絡,等等,都有自主連接覆蓋的時空域和承載處理交換不同信息的網絡空間。

地球各種網絡空間並存構成的集合體,已經大大超出了網絡空間泛指的概念和定義,“網絡空間”已不能嚴謹、規範、準確地反映和包容其全部的內在特徵、延伸範疇與在全新的條件和基礎上發展變化的規律。這種網絡與網絡之間構成的超級網絡空間,喚生了“網際空間”(Nets Space)的學說。網際空間是網絡空間的集成域。








⑴ 建立黨中央、全國人大、國務院和全國政協共同領導和約束下的具高度權威性、法治化的決策糾錯機構和糾錯機制,堅決杜絕借混淆視聽左右決策之路。



⑵ 國家鼓勵和支持在民族自主知識產權前提和基礎上建設、發展與維護主權公眾網絡。


⑶ 不失時機地創建國家主導、社會參與、民間操作的“網際空間研究院”,全方位、多維度、深層次研究開發網際空間技術並製訂發展戰略和策略,打造世界一流的培養鍛煉網際空間人才基地,構建主權網絡/未來網絡/網際空間實驗、測試架構系統應用環境,探索與解決主權網絡、網絡空間和網際空間發展中的各種問題,大踏步地走在引領網際空間發展的世界前列。

⑷ 首先與俄羅斯、伊朗、德國、歐盟等致力於建設、發展、維護各自主權網絡空間的國家和國際組織積極進行構建網絡空間命運共同體的溝通、交流、洽談與合作,聯合多國積蓄力量,不以美國為主要談判對手。


China Military Operational Use of Information Warfare Equipment //中國軍事信息戰裝備的作戰運用





Information warfare is against C4ISR systems and C4ISR systems, information superiority is the competition, the main purpose is to ensure the normal operation of one’s own information systems, from the enemy’s use, paralysis and destruction; the same time, trying to use, paralysis and destruction of the enemy’s information systems, make paralyzed, confused state. Including strategic information warfare and information warfare battlefield information warfare two parts.

Strategic information warfare and information warfare battlefield

Strategic information warfare is the main features of a wide range of sectors covering all key political, economic, technological, military and special areas; special way, relates to psychological warfare, media warfare, deception warfare, media warfare and other special tools; special target, mainly through the decoy attack warfare, psychological warfare, information awareness enemy deterrence system and thinking system; great harm, make the whole country’s economic, political or military to a standstill, even regime change can make it happen; special person, not necessarily military combatants, computer experts, international crime syndicates, hacking or terrorist organizations with ulterior motives and so may become combatants.

Battlefield Information War battle took place in the space of information warfare, refers to the battle for the preparation and the integrated use of information technology tools and a variety of information weapons, information warfare platform and C4ISR systems, reconnaissance and early warning detection, information processing and transmission, arms control and guidance, operational command and control, deception and disguise interference and military strategy and other aspects of all-out confrontation and struggle. Battlefield Information War by interfering with or disrupting the enemy’s decision-making process, so that the enemy can not effectively coordinated action. Thus, the first enemy influence decisions, then the impact of their actions, which is to win air superiority electromagnetic, and then obtain air superiority, and finally the use of conventional forces to take combat operations. Seized control of information, seize the initiative on the battle space, and the competition for the right to make land, air, naval supremacy and control of space to lay a good foundation and a necessary condition.

Basic information warfare battlefield combat forces and means of information is digitized forces and weapons and equipment, the main contents include operational secrecy, military deception, electronic warfare, psychological warfare and firepower to destroy, core purpose is to fight for the right to access information battle space, control and use rights. Battlefield Information War is against information systems, which directly affects the entire battle space, processes, and success or failure of the entire war. The main battlefield information warfare style combat electronic warfare and cyber warfare. Electronic warfare is an important part of information warfare battlefield, mainly decoy for enemy communications, radar and other electromagnetic radiation sources of interference, sabotage and destruction activities. The Gulf War, not only the first large-scale use of electronic warfare, and formally adopted as a battle of the war and the particular stage of the battle action. Kosovo War, NATO used a lot of electronic warfare equipment, and the first use of electromagnetic pulse bombs and conducted the first network warfare. Cyber ​​warfare in cyberspace computer, using a network against the Internet activities, and for the first time in the Kosovo war. NATO cyber warfare measures include: network publicity; hacker attacks; attacks on financial networks. The main characteristics of the FRY cyberwarfare is people’s war mode, geek, geeks and computer enthusiasts spontaneously a lot of network operations, such as conduct online propaganda attack NATO website, use the Internet to pass intelligence.

War information warfare equipment, electronic warfare equipment.

Electronic warfare equipment, the development trend of increasing integration and universal, local wars under conditions of informatization, the electromagnetic environment on the battlefield increasingly complex, kind of separation from each other in the past, single-function electronic warfare equipment has been far can not meet the operational needs.Integration and generalization has become the focus of the development of electronic warfare equipment and electronic warfare equipment, the total future direction of development. In order to deal more effectively with the threat of information warfare electromagnetic complex, the next generation of electronic warfare equipment, the extensive use of advanced computer technology to significantly improve the automation of the entire system in order to have better real-time capabilities, since the adaptability and full power management capabilities. Working frequency electronic warfare equipment continuously expanding, increasing the transmission power, the development of millimeter-wave technology and photovoltaic technology, the modern electronic warfare equipment to keep the operating frequency band wider development.Overall, the future scope of work of electronic warfare equipment will be extended to the entire electromagnetic spectrum. GPS interference and anti-interference will be concerned about the practice of war has shown that, if they lose the support of GPS, information superiority will be greatly weakened, so that command and control, reconnaissance, combat, troop movement and other military links are facing a severe test, severely reduced combat effectiveness. Focus on the development of new anti-radiation and electronic warfare jamming aircraft, emphasis on the development of new, special electronic warfare technology and equipment, such as for anti-satellite laser weapons, high-energy particle beam weapons, and meteor burst communications, neutrino communication and the like.

Computer viruses as weapons

Within military information systems, battlefield information acquisition, transmission, processing and other functions required to complete computer and network, computer network is performed on the basis of information warfare and Pioneer. Use of software drivers and hardware magnetic induction sniffer sniffer network sniffer, etc. is an important way to attack networks. These sniffing tool was originally a test device, used to diagnose and repair assistance network, so it is a powerful tool for network administrators to monitor the network, but in the information war is a terrible computer virus weapons. It enables network “denial of service”, “information tampering” Information “halfway stealing” and so on. In addition, it will focus on design “trap door.” “Trap door” also known as “back door” is an agency computer system designers previously configured in the system, appear in the application or during the operating system, programmers insert some debugging mechanism. System Programmer For the purpose of attacking the system, deliberately left few trap door for a person familiar with the system to outdo each other to sneak into the normal system protection system. Network is an important infrastructure of information warfare, network centric warfare is mainly carried out based network, the network is reliable to determine the outcome of the war. Therefore, to strengthen the research network attack and defense operations for the win future information warfare is essential.

Electromagnetic pulse bomb

During the Iraq war, the US used a lot of electronic warfare equipment, and use of electromagnetic pulse bombs fell on Iraq and the Iraqi army broadcast television systems of various types of electronic radiation. Electromagnetic pulse bomb, also known as microwave pulse bomb, by a microwave beam into electromagnetic energy, a new type of directed energy weapons damage other electronic facilities and personnel.Its working principle is: after high power microwave antenna gathered into a bunch of very narrow, very strong electromagnetic waves toward each other, heat, ionizing radiation, etc. relying on the combined effect of electromagnetic waves generated by this beam, lethal voltages in electronic circuits inside the target and current, breakdown or burn sensitive components which, damage data stored in the computer, so that each other’s arms and paralyzed the command system, the loss of combat effectiveness. According to tests, a briefcase-sized microwave bomb, can produce up to 300 million watts of power pulse. After its plurality of coupling, then become adjustable radiation source, generating more than 2 billion watts of pulse waves. This is somewhat similar to pulse electromagnetic pulse generated when nuclear explosions, can easily enter the underground bunker from power and communication channels, which rely on radio to make, radar, computer, power grids and telephone modern weapons systems, biological and chemical weapons and their production Libraries workshop in an instant paralysis.

GPS jamming devices

Also in the Iraq war, the Iraqi use of GPS jamming device for Tomahawk cruise missiles were effective interference, this is the first time in actual combat on the GPS guidance system interference. GPS signal is weak, it is easy to interference. A Russian company to provide a 4-watt power handheld GPS jammers, less than $ 4,000 can buy.If purchased from retail electronic component assembly shops, you can spend $ 400 to create a disturbance over a radius of 16 km of GPS jammers. Before the war in Iraq war, the United States had expected to interfere with the GPS signal the Iraqi side. In fact, the United States had already given their GPS bombs and missiles loaded with anti-jamming technology to make these GPS-guided weapons to continue to use the GPS signal in the case of interference; even if the GPS signal is lost, they can also use their own weapons guidance systems other inertial navigation, laser-guided, so that their own to reach the target. Nevertheless, early in the war in Iraq, the US military more than a dozen Tomahawk cruise missiles due to interference or deviates from a predetermined route, fell Turkey, Syria and Iran. Small GPS jammers problem alerted the US government, Powell personally investigate the source of Iraq GPS jammers, Russia and other countries exerted considerable pressure.

During the first Gulf War, GPS navigator as a trial product for the first time issued to desert warfare personnel, the effect is obvious. At that time, all weapons, including cruise missiles, including not using the GPS navigation device. The war in Iraq, we see that almost all combat platforms, every man, almost all of missiles and bombs have adopted this navigation device, so that the tanks, planes, ships maneuver more accurate missiles and bombs original the probability of error reduced to 1-3 meters, maximum 10 meters range.   Everything there is a benefit must be a disadvantage. Disadvantages and drawbacks of GPS navigation information is the same weaponry, is the electronic interference.From the perspective of the development of weapons and equipment, the purchase of a cruise missile costs $ 100 million, while manufacturing a GPS jammer only a few hundred dollars, as a strategic defensive side, if a large number of development and the development of GPS jammers, not only for the US missile and the bomb is a threat to its tanks, planes, ships and navigation personnel will also have a huge impact. Of course, we should also see the US fight a battle, and further, after the end of the war in Iraq is bound according to the lessons of the war, improved GPS system. Is expected to be improved in three areas: First, the GPS satellites, satellite launch is mainly to enhance the signal and transmit as many GPS satellites; the second is to improve the guidance system, mainly to increase the combined guidance system, after interference in the GPS guidance, automatic recovery or transfer other inertial navigation mode to ensure the normal operation of the platform and weapons; the third is GPS anti-jamming, mainly to improve the GPS receiver anti-jamming capability, the development of new GPS receiver, in the theater of the local military and civilian GPS reception machines and electronic jammers and interference suppression.

Original Mandarin Chinese: