1. The mobile phone lost its secret while talking.
Mobile phone communication transmission system is an open wireless communication system, and communication signals are transmitted in the air. As long as you have the corresponding technical equipment, you can intercept anyone's call information anytime and anywhere.
At the same time, the mobile phone can surf the Internet wirelessly, and it is easy to leak secrets by talking about confidential content or sending confidential information on the mobile phone.
When the mobile phone is in standby mode, it will lose its secret.
In the standby state, the mobile phone keeps uninterrupted signal exchange with the communication network, which produces electromagnetic spectrum. Therefore, it is easy to find, identify, monitor and track the target by using reconnaissance technology, and can locate the target and obtain valuable information from it.
Some mobile phones have hidden call function, which can change from standby state to call state without ringing or displaying anything, thus transmitting the surrounding sound.
3. The secret is lost when the mobile phone is turned off.
There are two situations in which the mobile phone leaks when it is turned off. One is that the user turns off the mobile phone, and people with special instruments can still remotely turn on the microphone at the mobile phone and eavesdrop on any conversation within a limited range of the microphone.
The other is that some mobile phones have a receiving device, and the receiving and sending functions are embedded in the chip. Although this mobile phone is not turned on or in standby, as long as there is a battery, the receiving device on the mobile phone can receive the voice information within its effective range and send it out.
4. The obsolete old mobile phones lead to the loss of secrets.
Although the information in the old mobile phone has been deleted, it can still be recovered by special technology. The eliminated classified mobile phones should be destroyed by using professional technology as a secret carrier.
Safety measures for using mobile phones
First of all, we must abide by all relevant regulations and requirements of the unit's security department. For example, don't talk about confidential matters in your mobile phone, don't handle sensitive information, and don't use your mobile phone in confidential key parts and confidential activities. These regulations and requirements are the bottom line set by the security department according to the current threat and must be strictly observed.
Secondly, protect personal information when using the mobile Internet. Especially the staff of the party and government organs, because of their special status, should avoid revealing personal information and work content in network applications. Do not talk about or share work content on WeChat and Weibo, so as not to be locked in the network and real identity; Do not use cloud services to store personal life and work information.
Finally, pay attention to prevention when using mobile phones. Try to use domestic mobile phones; Turn off the monitoring functions such as automatic backup and location tracking in the mobile phone system settings; Do not connect WiFi in public places such as airports, stations, hotels and restaurants; Turn off the wireless data connection settings such as Bluetooth; Download the app only in the formal and reliable application electronics market.
Can soldiers wear smart bracelets?
Soldiers can wear smart bracelets, but there are restrictions. It is strictly forbidden for officers and men to use the recording, positioning, photographing, wireless transmission and other functions of smart devices in camps and missions; It is strictly forbidden to connect smart wearable devices to the Internet.
Smart bracelets do bring convenience to life, and training plans can be made more pertinently through the motion monitoring function of bracelets. However, when using such smart wearable devices, we must pay attention to confidentiality. If the uploaded data is used by some people with ulterior motives, it is likely to cause leakage problems. In addition, many smart bracelets also have the functions of recording, talking, wireless transmission, GPS positioning, etc., and may "transform" into enemy bugs or trackers in wartime.
Extended data:
"China People's Liberation Army Secrecy Regulations" Article 26 The public publication and distribution of military newspapers, books, maps and audio-visual products, and the public display of military equipment and national defense scientific and technological achievements shall abide by the relevant confidentiality provisions and shall not disclose military secrets. Papers on military art, national defense science and technology to be published and various manuscripts reflecting the military situation must be kept confidential by the author's unit or the competent unit of the manuscript before submission.
Twenty-seventh leading cadres at all levels shall abide by the confidentiality provisions and shall not disclose military secrets to their families, relatives and friends and other irrelevant personnel.
Article 28 In the event of a leak, it shall be reported to the competent department of security work and the relevant department at a higher level in a timely manner, so as to quickly find out the contents, classification and scope of the leaked military secrets and the degree of harm caused or likely to be caused, and take remedial measures.
China Military Network-Be careful when using smart bracelets.
People's Network-The "hidden danger of leaking secrets" brought by smart wearable devices should not be underestimated.
Personal information exposure. Mobile phone is the product with the most traces of personal use, and there is a risk of revealing personal information when it is brought to a leaked place. Leaking means telling a secret to someone, who then reveals it to others.
Do you want to buy a children's smart watch with hidden dangers? Why?
Children's smart watches with hidden dangers can be bought, but those with simple functions do have some hidden dangers. First of all, many children's smart watches say that too many functions will affect children's attention. Secondly, the smart watch screen is too small, which will affect children's vision. In addition, smart watches will reveal privacy and are not safe for children.
Nowadays, children's smart watches have almost become the standard for many children. Every child basically has a smart watch in his hand. Some children's smart watches look cool and have perfect functions, which can be said to be mini-versions of smart phones. For smart watches, there are actually many security risks. Personally, I think I can buy it, but I must buy something suitable for children. There are several reasons why it has hidden dangers.
First of all, many children's smart watches say that too many functions will affect children's attention. Smart watches are getting cooler and cooler now. They can not only take photos, but also listen to songs, videos, chat on WeChat and even go shopping. These functions are equivalent to a mini-version of a smart phone, which will trust children's attention. It is also difficult for children to concentrate in class.
Secondly, the smart watch screen is too small, which will affect children's vision. It's not just tablets and mobile phones that affect children's eyesight. This small smart watch will also affect children's eyesight. The child's eyes are focused on the small screen of the smart watch for a long time, and the light source is relatively dark. After a long time, your eyesight will decline. In addition, children's dependence on smart watches is becoming more and more serious, and the impact on vision is more serious.
In addition, smart watches will reveal privacy and are not safe for children. Because there are some loopholes in smart watches, children may be monitored by hackers in real time to get his daily whereabouts and environmental sounds. For children, it is equivalent to being watched. Moreover, children can take photos and send friends through smart watches, which will easily lead to privacy leakage and increase unsafe factors.
When we choose smart watches, we should try to choose those with few functions, and parents should also supervise their children and use smart watches correctly. Moreover, relevant institutions should also formulate some standards and norms in terms of product quality. The above is my personal opinion on whether to buy a smart watch.
What are the hidden dangers of mobile phones?
Mobile phones not only bring convenience to people's lives, but also bring great hidden dangers to information security. Especially in key departments and parts involving state secrets, mobile communication has become a hidden danger that cannot be ignored. 1, the mobile phone leaks when talking. Mobile phone communication is an open electronic communication system. As long as you have the corresponding receiving equipment, you can intercept anyone's call information anytime and anywhere. 2. When the mobile phone is in standby state, the leak expert pointed out that even if the mobile phone is in standby state, it is not absolutely safe. Because in the standby state, the mobile phone should also keep uninterrupted signal exchange with the communication network. The electromagnetic spectrum generated in these processes makes it easy for people to find, identify, monitor and track targets by using reconnaissance and surveillance technology, and can locate targets and obtain valuable information from them. According to experts, some mobile phones have the function of hiding calls, which can change from standby state to call state without ringing or making any display, and can also collect surrounding sounds and send them out. Even if users don't use mobile phones, they can eavesdrop on any conversation within the effective range through simple telecommunications if they remain in standby state. 3. There are two situations when the mobile phone is turned off: one is to use special equipment to remotely open the microphone of the mobile phone and eavesdrop on any conversation within the effective range of the microphone. The other is that in the process of mobile phone manufacturing, the transceiver function device is implanted in the chip. Therefore, although the mobile phone is not turned on, as long as there is a battery, the microphone of the mobile phone can send and receive voice information within its effective range. The information is transmitted to the ground processing system through geosynchronous satellites or nearby relay stations. (Information Office Series)
Why can't you wear smart wearable devices in hidden places?
Smart wearable devices basically have the functions of wireless interconnection, location and even video communication, and there are great hidden dangers of leaks.