Traditional Culture Encyclopedia - Traditional stories - What are the security threats facing China?
What are the security threats facing China?
Individual maritime neighbors have taken provocative actions on issues involving China's territorial sovereignty and maritime rights and interests, and strengthened their military presence on the illegally "occupied" China island reef. Some foreign countries have also tried to intervene in South China Sea affairs. Some countries keep high-frequency sea and air close to China for reconnaissance, and the struggle for rights protection at sea will exist for a long time.
Some land territorial disputes still exist. There are many unstable and uncertain factors in the situation on the Korean Peninsula and Northeast Asia. Terrorism, separatism and extremism are rampant in this region, which has also adversely affected the security and stability around China.
The issue of Taiwan Province Province is related to national unity and long-term development, which is the historical necessity of the great rejuvenation of the Chinese nation. In recent years, cross-strait relations have maintained a good momentum of peaceful development, but the root causes affecting the stability of the Taiwan Strait have not been eliminated. The "Taiwan independence" separatist forces and their separatist activities remain the biggest threat to the peaceful development of cross-strait relations.
The task of maintaining national political security and social stability is arduous and arduous, and the separatist forces of "East Turkistan" and "Tibet independence" have done serious harm. In particular, the threat of "East Turkistan" violent terrorist activities has escalated, and anti-China forces are plotting to create a "color revolution", posing more challenges to national security and social stability.
Extended data:
The sixty-eighth session of the United Nations General Assembly considered and adopted the United Nations Global Counter-Terrorism Strategy for the fourth time. According to the amendment proposed by China, this resolution was first written into the content of combating cyber terrorism. In the face of cyber terrorism, all countries should work together to combat it, and the Internet must not be allowed to become a breeding ground for terrorism.
In the information age, the network is playing an increasingly important role in people's lives, and has become the survival foundation of national politics, military affairs, diplomacy and many other fields related to the national economy and people's livelihood. However, scientific and technological progress not only allows mankind to enjoy the fruits of civilized progress, but also provides new means and methods for terrorist organizations.
All network-related activities of terrorist organizations can be included in the category of cyber terrorism.
1997, Bailey Colin, a senior researcher at the California Institute of Intelligence and Security, put forward the term "cyber terrorism" for the first time, thinking that it is the product of the combination of Internet and terrorism. In the same year, Mark Bo Park Jung Su, an expert of the Federal Bureau of Investigation of the United States, added this concept, arguing that "cyber terrorism is a premeditated and politically targeted attack on information, computer systems, computer programs and data, and it is a violent activity launched by sub-national groups or secret organizations to combat non-military targets". Since then, the definition of cyber terrorism has been constantly supplemented and improved, and expressions such as "electronic jihad" and "cyber jihad" have appeared one after another, highlighting the initiator and its purpose, so as to distinguish it from cyber criminals and hackers in the usual sense.
Although there is no unified concept, the understanding of the international community is that, like terrorism in the traditional sense, all network-related activities of terrorist organizations can be included in the scope of cyber terrorism, including terrorist propaganda, recruiting personnel, teaching terrorist technology, raising funds, organizing and planning terrorist attacks, and carrying out cyber attacks and sabotage. , and should be regarded as acts that endanger social security.
The anonymity and complexity of cyberspace make it easier for terrorists to hide in it, and the "end" of boundaries and distances can theoretically allow terrorists to carry out actions anywhere. Every chip is a potential weapon, and every computer may become an effective combat unit. Terrorist organizations have woven a complex web, and everyone is a node. Even if most organizations are destroyed, they can complete the operation independently. Online attacks usually occur without any obvious signs, and it is difficult to judge the real source of the attacks. The combination of reality and virtual world has become the best breakthrough and attack point for terrorists.
The number of terrorist-related websites around the world is growing rapidly, and the content is creepy.
In the eyes of terrorists, the Internet is a "natural battlefield" for launching psychological warfare and propaganda warfare. Al-Qaida leader Al-Zawahiri once said, "We are in a media war to win people's hearts". The US Senate Committee on Homeland Security and Government Affairs reported in 2008 that al-Qaeda has gradually established a multi-level online publicity network around the world, with strict procedures from production to dissemination. We mainly rely on four media centers for online publicity, namely Team (affiliated to the Islamic State of Iraq), Yun Yun (affiliated to Al Qaeda headquarters), Media Committee (affiliated to Al Qaeda in Maghreb) and Voice of Jihad (affiliated to Al Qaeda in Arabian Peninsula). These organizations produce a wide variety of publicity materials, including videos that record the whole process of terrorist attacks in the form of illustrations, sound effects, slogans, subtitles and animations. There are also various online magazines, real-time news, articles, white papers and even poems. Publicity materials are generally sent to the so-called "clearing house" for verification before being uploaded to the internet, and at the same time, the information is guaranteed to be updated in real time. According to Gabriel Weiman, a professor of communication at Haifa University in Israel, there were 12 websites related to terrorists in 198, and now the number has increased to nearly 10000. 20 1 1, there are 7500 extremist websites in Russia; In Southeast Asia, websites and forums promoting extreme thoughts, mainly in Indonesian and Malay, have developed rapidly, and websites such as "Indonesian Liberation Party" and "Paradise Jihad" have a great momentum.
Internet has become an excellent place for terrorists to communicate and impart "skills", and has also become the first choice "classroom" for new terrorists. Although an Al-Qaida website named "Sword" is only opened twice a month, its content is creepy-terrorists openly discuss the techniques of kidnapping and killing hostages. The website also provides some other tutorials, such as sarin gas, car bombs and the lethality and usage of various explosives. When some experts used Internet search technology to understand the current situation of these websites, they found that there were 500 million terrorist web pages and posts in 2008, of which tens of thousands discussed improvised explosive devices.
Terrorist organizations use the Internet to collect a large number of government information of various countries, and the network is developing towards intelligence.
The open network also provides rich resources for terrorist organizations. The content on the internet is all-encompassing. Terrorists can not only obtain political, economic and military information about countries, but also master weapons manufacturing and hacking techniques. Before the "9. 1 1" incident, the official websites of the American Federation of Scientists, the Nuclear Energy Coordination Committee, the Environmental Protection Agency and the Centers for Disease Control and Prevention contained a large number of archival materials on the US nuclear weapons list, spy satellites, the distribution of nuclear weapons production plants, emergency handling and chemical equipment safety. The Al Qaeda computer found in Afghanistan contains instructions and planning information on how to use the communication, power and hydraulic distribution networks in the United States, as well as detailed structural drawings of some dams. In the Indian mumbai bombings in 2008, terrorists used GPS and Google Maps to master the target terrain, and used BlackBerry to know the government's response deployment in real time.
In addition, the network of terrorist organizations has got rid of the original exchange fund-raising method and developed in the direction of intelligence. For example, by accessing other people's computers, stealing bank cards, credit card passwords and stealing money. Tesuri, the leader of cyber terrorism known as "Cyber 007", once stole 37,000 credit cards, totaling 3.5 million US dollars. Another example is online gambling and behind-the-scenes manipulation of the gambling industry. Every year, terrorists use online gambling to launder money and raise hundreds of millions of dollars. Terrorist organizations also cheat money under the guise of "charity". For example, they use the Global Aid Foundation, which has close ties with Al Qaeda and the Taliban, and use the websites of non-governmental organizations under the banner of humanitarian aid.
The online activities of terrorist organizations have new methods and features.
First of all, the popularity of new media such as Facebook has set off a new wave of cyber terror.
Some experts pointed out that social media has become a "strategic tool" for terrorists, allowing terrorists to directly "knock on" the door of the target audience without waiting for visitors to come to the door. Major jihad forums call for "Facebook invasion", and "Twitter terror" and "Youtu terror" are common occurrences. 20 13 In September, the maker of the terrorist attack on Ximen Shopping Center in Nairobi, Kenya, conducted a "Twitter live broadcast" of the attack.
Second, it has spawned a large number of "local terror." The "online bombing" of terrorist organizations such as Al Qaeda began to target young people, especially young people in the West.
At-tibyan Publishing, a global Islamic extremist ideological network, is mainly responsible for propaganda to western countries. His article "39 Ways of Serving and Participating in Jihad" is very popular on the Internet. The propaganda film "Islamic State in Iraq and the Levant" is also aimed at European countries such as Britain. In the video, a 20-year-old British student joined the organization after traveling to Syria, claiming that "there is not much work, the salary is good, and food and shelter are included". Using these tactics, terrorist organizations have successfully "inspired" a large number of "white Muslims" in the United States and Western European countries and turned them into "jihadists". Anwar Aulaqi, the former leader of the Yemeni branch of Al Qaeda, was born and raised in the United States, and the "white widow" suspected of bloodbath Kenyan shopping was born and raised in the United Kingdom. The bipartisan policy center of the Washington think tank in the United States is worried that "the biggest terrorist threat facing the United States no longer comes from the border mountains of Afghanistan and Pakistan, but from terrorists bred in the United States." Malmstrom, Commissioner for Home Affairs of the European Commission, said that more than 1200 Europeans have gone to war-torn areas to participate in the activities of terrorist organizations. If they return to Europe in the future, it will definitely pose a threat. On May 24th this year, a Frenchman who returned from the Syrian battlefield was shot dead in the Jewish Museum in Brussels, Belgium.
Third, the "lone wolf" terrorists have proliferated, and network technology has become the blood of the "lone wolf".
20 13 February, Jeffrey Simon, president of American political risk assessment company, pointed out in his book "lone wolf terrorism: understanding its growing threat" that the progress of science and technology, especially the revolution of network technology, has contributed to lone wolf terrorism, and mankind is about to face the fifth "wave of terrorism", that is, "wave of scientific and technological terrorism". The "lone wolf" can get information from all over the world through websites and social media without showing up, and even directly carry out cyber terrorist attacks. Al Qaeda's Arabian Peninsula branch specially produced and published the English online magazine Motivation, inciting western extremists to launch "lone wolf" terrorist attacks. Nidal Hassan, an army psychologist who killed 13 American soldiers in the shooting at Fort Hood military base in 2009, and Charles Najev, the 438+03 brother who committed a terrorist attack at the Boston Marathon in April 1965, are all "lone wolves" who have been baptized by the idea of "jihad".
Fourth, terrorists began to turn from using the network to attacking the network, and the boundaries between radicals, hackers and terrorists tended to blur.
Black markets selling attack programs, system vulnerabilities and user information on the Internet are all over the world, and even "buying off murderers" through brokers can greatly reduce the threshold for implementing cyber attacks. In addition, the boundaries between radicals, hackers and terrorists are increasingly blurred, and the possibility of "confluence" of the three in the future cannot be ruled out. For example, the well-known hacker organization "Syrian Electronic Army" is increasingly involved in international and domestic affairs, which has a bad influence. 20 13 On April 23rd, the organization stole the official Twitter account of the Associated Press and lied that "two explosions occurred in the White House and Obama was injured". The American stock market fluctuated sharply, losing about $200 billion.
References:
People's Daily Online-China still faces multiple and complex security threats.
People's Network-China is facing the threat of network security, and the network has become a new battlefield for great powers.
- Previous article:The practice of fried rice in jiaozi
- Next article:What is the Wulin 16 Sect?
- Related articles
- How to make meat loaf video tutorial
- What are the uses of induction lamp and which are more suitable for induction lamp?
- The significance of learn Chinese traditional dance music.
- What are the hidden dangers in the heat dissipation design of LED street lights?
- Is a pair of jeans expensive in 300 yuan?
- German heating boiler brand list
- How do traditional industries find customers?
- The auspicious beast in China's ancient mythology.
- What chapter is Yi Sheng's first reading?
- The origin of traditional Chinese New Year is 30 words.