Army newspaper: the military on the use of social networking sites vulnerable to enemy agents causing leaks
information Figure: People’s Liberation Army is e-learning
QQ space, happy network, all network … … the social networking site fast today, people’s way of gradually changing the social . Many people began to contact old friends through the network, make new friends through social networking sites for the expansion and maintenance of social relations. However, another lively social networking sites, for the majority of officers and men is “restricted.” The newly revised “House rules” provides that: the military, “not in the mass media on marriage, job and friends.”
why such strict rules? First of all, to participate in the Internet social networking activities in the officers and men, is bound to the social networking site registered users to submit personal information and data. Some, such as military identification number, graduate schools, unit name, address and other information, it is easy to disclose the identity of military troops. Secondly, in the current complex network environment, a number of hostile forces and lawless elements are always the military as the penetration, corrosion, and draw the object. Some dating sites dating and the recruitment of military men and women appear publicly Friends Post to confuse officers and men involved, thus exposing their military status. This is equal to the active elements for the network enemy agents provides the opportunity to earn a military information. Furthermore, the soldiers and friends through the Internet social networking platform, students exchange contact, sharing work and life, you may inadvertently reveal the nature of their work, posting photos related information will be exposed to forces. “Said the person proffering,” these seemingly fragmented pieces of information, once collected hostile elements with ulterior motives, will become foreign intelligence agencies to obtain an important source of military intelligence.
known, Bug (bug) is a computer security flaws could allow an attacker to gain unauthorized access or damage the system. Ideology of the “loophole” is more than the terrible system security vulnerabilities. Not from the ideological understanding of social networking sites the possibility of leakage and harm, loss of “enemy agents on your side,” the enemy idea, it is very likely to fall into “the trap network,” an enemy of special elements to provide an opportunity to steal military secrets. The face of lively social networking sites and anti-phishing has become increasingly prominent issue, the troops must remain sober-minded, strict network security requirements, do not touch the online dating this “restricted”; constant vigilance and awareness, to build in the minds of the “firewall “Whether or network of social interaction in the real exchange should be about politics, discipline, discipline and regulate their own behavior.