Prism door continued: Is the mobile phone message safe? Operators lose their collective voice

Is it true that as Snowden said, our telecommunications system has been hacked? The three major operators and basic telecommunications equipment manufacturers such as ZTE and Huawei are silent on this.

The prismatic door "protagonist" Snowden once said that the National Security Agency continued to invade many major telecommunications companies in China to obtain SMS messages. At the same time, the National Security Agency also attacked the backbone network of Tsinghua University in Beijing, and he has the relevant evidence. Now that Snowden has left Hong Kong, it is unclear whether he boarded a flight from Moscow to Cuba. The so-called "evidence" above has not been exposed. However, information security is closely related to every national.

Is it true that as Snowden said, our telecommunications system has been hacked? Moreover, it continues ... In this regard, the Southern Metropolis Daily reporter interviewed the three major operators and people from basic telecommunications equipment manufacturers such as ZTE and Huawei to ask questions about "anti-intrusion" on the technical level. However, the interviewees officially kept quiet and declined to comment. It is Yang Peifang, chairman of the China Information Economics Society, Zeng Jianqiu, director of the Information Economy and Competitiveness Research Center of Beijing University of Posts and Telecommunications, and Xiang Ligang, a well-known observer of the Chinese communications industry, who expressed their views.

Vulnerabilities and patches, common offensive and defensive battles

"In mainland China, SMS is one of the most popular communication tools, from officials to ordinary people, they use it to exchange information and chat." Citing Snowden's remarks, the National Security Agency invaded many Chinese telecommunications companies According to media reports, in 2012, China sent 900 million SMS messages. China Mobile is the world's largest mobile communications operator with 735 million users. China Unicom and China Telecom rank second and third.

The consensus in the industry is that Chinese cybersecurity experts have been worried for many years that because of the use of foreign-made components, telecommunications equipment is invincible against so-called "backdoor" attacks. As China's hardware manufacturing continues to catch up, China Unicom replaced all Cisco routers in the Jiangsu Wuxi backbone network last year. It is worth noting that in the "Prism Gate", Cisco is also one of the multinational IT giants suspected of submitting data to the US government.

Is the replacement of Cisco equipment really because of national security considerations? China Unicom officials declined to comment. According to a survey by Nandu reporters, taking China Mobile as an example, the base stations and technologies provided by Ericsson used to be used in Guangdong in the past, but domestic brands such as ZTE are gradually increasing or even replacing the original facilities. Just like China Unicom, China Mobile is also reluctant to talk more about the relationship between the move and "security".

However, some operators who did not want to be named slightly revealed one or two from a technical point of view, "There are loopholes in many links of the communication network, such as routers, switches, etc. Network problems may be unpredictable. We are more defensive security Protection, find vulnerabilities and quickly patch. "He emphasized that network security is not only the responsibility of operators, but also involves national security issues. A person close to China Mobile also expressed a similar point of view to Nandu reporters, "just like when using the Microsoft operating system, you are often reminded to patch, as is the communication network, which is normal." The person said, "in Operators still attach great importance to this point. Some vulnerabilities are only hidden dangers and may not be attacked, but the speed of filling the leaks is still very fast. "

Background and prospects should focus on the future

According to the investigation conducted by reporters in Nandu, the so-called cyber attack is not as "poor" as mentioned in the remarks, and the defending party may not be "soft persimmon". In essence, it is more like two opponents competing on the track and field track, faster and more impeccable than anyone. However, from the perspective of historical development, developed countries still dominate global network technology. Will this situation be the decisive factor for the position of information security offensive and defensive between countries? not necessarily.

"It is normal for China's communication system to be invaded by the United States. From a global perspective, the basic information and communication technologies are all led by the United States. In addition, from a network perspective, the central nodes of the Internet are basically in the United States." Zeng Jianqiu said From a technical point of view, it is easy for the United States to spy on the world and collect intelligence.

Xiang Ligang also said, "It is normal for domestic communication systems to be invaded. If it is only at the network level, everything can be broken. In addition, many routers, switches, chips and other products are now made abroad. We do n’t know a lot of things. Although we have a strong network management and backup of related data, even this is still a security risk because there are many things that we ca n’t control. ”

Yang Peifang also believes that China still has to rely on some foreign chips and software technologies. But in the long run, China has its own advantages. "We are mainly in the industrial age now, and our manufacturing technology is still at a disadvantage in terms of fine processing. But in the future, our advantages in software and chip design capabilities will be greater and greater. Cultivating our advantages can and Advanced developed countries form a complementary and mutually restrictive environment and situation. "He said that in this case we are not afraid, we can achieve a network collaboration idea, embarking on a win-win situation, instead of" you "Destroy me, I destroy you" The state of the double loss "You should be the first to do this after you are strong." Yang Peifang said.

Current situation and countermeasures, first solve what can be solved

Knowing the past and the expected future, being in the present and protecting information security, what can we do?

Yang Peifang said frankly, we are still in a "disadvantage" state, and people still don't listen to the "win-win" situation, so we must first take advantage of our advantages. For example, we have such a large market, we can not buy some foreign products or less And equipment, at the same time increase our advantages and internationalize our advantages. However, he also said that some people now do everything they want, which is unrealistic and does not conform to the general trend of network globalization. "We must increase our advantages, or join countries such as Europe and India to jointly enhance technological capabilities, and then put pressure on the United States to require network cooperation through an equal cooperation mechanism."

Zeng Jianqiu believes that national information security involves three levels, and that national information security, enterprise information security, and citizen information security should all be improved.

60CM Range Hoods
Stainless steel + tempered glass
Suction power: 760m³/h air flow
3 speed electronic switch
1x6 layers washable aluminum grease filters
2x2W LED lamps
Rated input power (motor): 170W

Range Hoods



Range Hoods

Downdraft Cooker Hood,Range Hoods,Kitchen Hood,Ceiling Built In Hood

xunda science&technology group co.ltd , https://www.gasstove.be