Chess pieces and tools--"the culprit" of "Prism Door"

Source: Internet
Author: User

Recently, the "Prism Gate" incident has received widespread attention, the domestic media also from various angles to explain the view of the incident, in fact, as long as to review the development of human society, this based on information acquisition behavior is not interrupted, slowly with the progress of science and technology, this behavior becomes more and more secretive.

If we look at the history of civilization in China for more than thousands of years, the excellence of this behavior is no worse than the "Prism gate" described. It is this state-level behavior that is rarely accessible to ordinary people. However, in the past few years in the Chinese film and television works, these acts are portrayed very clearly.

For example, everyone has seen the "Never Disappear", "latent", "wind" and other descriptions of the birth of New China's various intelligence espionage war story. For example, a lot of people have seen the Eastern Zhou States or the spring and Autumn period of various and information acquisition related stories. However, in ancient China, information between nations was carried out through the subject of human beings. In fact, such as latent TV series described is actually the human-oriented information acquisition process, but such as radio and other technical means has become an important tool for transmission of information.

Looking back at the spy-fighting powers of the United States, in recent decades launched the Iraq War and the war in Afghanistan, and so on, but also monitoring and monitoring of the battlefield intelligence. In this process, information and communication technology has become the most important means of information acquisition.

What can be seen is that intelligence acquisition and monitoring of other countries have never been interrupted since ancient times. And that kind of behavior is going to last, and it's going to get worse.

For the "Prism Gate" the protagonist of the United States Government, will not give up this behavior. Since the end of World War II, the United States has rapidly become the world's first economy and the first military power by using military technology for civilian use and seizing information technology as the new economic growth model. And the rapid spread of ICTs to the world, and because of the cold war thinking and the political ideals of the surname and surname Society, the U.S. government has also paved the way for the acquisition and monitoring of information from other countries to the global , these have been widely disclosed in the "Prism Gate" incident, in fact, governments are also aware of it, just between the defensive, the United States because of the strength of the confrontation process to become winners. And these processes, just by the "prism door" of the material released, let us see the reality version of the "latent."

We can see that the United States is able to achieve a full range of countries and economies in the global monitoring, most directly in addition to government strategy, the global output of ICT is a very important link. In the cold weapons era, you must send spies or develop spy personnel to obtain information, and modern information and communication technology, you can achieve remote monitoring, access to information costs and ease greatly reduced. And as the United States was subjected to new security threats, such as religious conflicts and terrorism, after the end of the cold War, surveillance and intelligence activities became more frequent and acted as national actions above all acts.

Despite America's claim to democracy and freedom, in the process, any American citizen or organization could be a pawn or tool in the Government's conduct of the Act, and there is no question of whether or not a surname or a surname is a security issue.

We see in turn that the US government's defenses against Chinese companies, whether politically or economically or with no light, abound, such as the political act of preventing Huawei and ZTE from entering the United States through Congressional security Investigations. Then, for example, by interfering in the bidding of American operators, they are economically attacking Chinese companies. But the not bright means includes not to give the Chinese many technology enterprise personnel to send the entry visa and so on, is the 18 weapon one not to pull. There are factors that protect American businesses, but security is a factor that cannot be overlooked.

The U.S. government is Delli that Chinese companies must play an important role in the Chinese government's access to and monitoring of US intelligence, whether it's in the right place or not, whether you admit it or not, and in short, you are responsible for helping the Chinese government with these actions.

In the past few decades, the United States has been the leading exporter of information and communication technology in the world, and it seems to have no choice for China, which then poor and vigorously developed its information and communications infrastructure. As a result, almost all of China's information network facilities have the participation of American enterprises, and the share is quite high.

Now, it is obviously not important to accuse the American enterprise of participating in the "Prism gate", what is important is how to comb and plan a long term security action for China's information security, and to quickly carry out thorough action, based on the development of China's information and communication technology and the long-term development strategy in the future. Otherwise, it will become a popular news event, and security issues, still naked exposed to the eyes of others at a glance.

"Edit Recommendation"

Microsoft FB confirms Government cable information prism door or iceberg tip the NSA prism gate event heavy blow public cloud vigilance China's "prism door" prism door rethinking: Social networks and privacy of the big Data Age "responsible editor: Xiao Yun TEL: (010) 68476606"

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.