China's "Newsweek": China to build a network of security on the Internet

Source: Internet
Author: User
Keywords Security

Intermediary transaction SEO diagnosis Taobao guest Cloud host technology Hall

A row of computers, the screen has opened the Web page, there are commonly used chat tools QQ or MSN, the computer before the people to fly-this familiar scene looks like a common Internet café identical, but the internet is not ordinary netizens.

They are Sina's community management staff, while in the Forum patrol, while the hands and feet quickly delete some of the posts.

Sina, perhaps China's largest and most active speech position. In its more than 100 BBS and more than 100 chat rooms, the highest peak of 60,000 people speak at the same time, and on the average daily posted on the BBS tens of thousands of posts.

In addition, Sina itself will send out tens of thousands of news-this is equivalent to 300 versions of the Folio newspaper. Each piece of news usually will also thread several or even thousands of netizen comments. In this sense, it may be China's largest media of information capacity.

Similarly, the West Shrine Hutong, which has more than 1 million registered IDs and nearly 60,000 types of discussion groups (data from early 2003), has also turned the West Shrine into a super media. Here, netizens are not only information recipients, but also serve as journalists, commentators, moral judges, and other multiple roles, the information is "DIY" type of processing.

Free from the monopoly of traditional media, in the internet age, everyone seems to be the master of information.

But at the same time as netizens say nothing, the community manager of a large website describes his work as "holding a pack of explosives at any time". The most daunting task for the site manager surnamed Li is to ensure the security of such a vast and complex message-a possible omission may mean unpredictable consequences.

In China's legislation, including obscenity, pornography, violence and other content, there are 9 to 10 kinds of information has been found illegal, not on the Internet.

But inevitably have ulterior motives or mischief-makers touch the bottom line. Li said that his and his colleagues ' important work is to be with these unseen opponents wits.

Online Door Keeper

"Please pay attention to the words, thank you for your cooperation!" ”

Many Sina chat room users have had such an experience: in the input speech, and sometimes return is just such a quiet hint, there is no explanation, even if you can not think of your own speech which is not appropriate.

In the 2003, in order to prevent "rumors" spread, some web chat rooms, even the word "SARS" can not be displayed. Obviously, at this time you face only the cold machine, can only helpless.

In such information confrontation, it is difficult to imagine that there is no certain technical means. To pick out some impurities in the ocean of information, firewalls with blocking and filtering functions are the most effective means.

In the field of information security, filtering software is the most widely used tool. From websites, internet cafes, local area networks to personal computers, it plays the role of "door God" to prevent users from sending or seeing undesirable content. The simplest is the anti-pornography software used by home computers to prevent children from seeing things that are not appropriate for children.

According to the big website Li surname Manager discloses, in his website's firewall, has set more than 100 keywords, each chat room or the BBS according to own characteristic also has set some other key words, mainly involves obscene and so on each kind of bad content word. These keywords are based on regulations and with the relevant departments after the determination, as the situation changes, need to be constantly updated or increased.

Once the online statements containing these words are available, they will be filtered out immediately.

The information Security Center of Beijing Institute of Posts and Telecommunications is one of the earliest development of such technology. Xu Guoya, an associate professor at the center, said that, as early as 1998, they developed a personal firewall, filtering information from the mainframe, and the technology was simple, which listed unhealthy websites in the "blacklist" and filtered them. But as Web sites continue to emerge, this approach will soon be unworkable.

In 2001, they developed the Han Bo monitoring software according to the public security standards. The software uses the method is "keyword filter" and "association", "keyword filter" is to set some key words, depending on the proportion of the text in order to determine whether it is bad information, "the accuracy of more than 95%, or the wrong rate is less than 5%". "Association", that is, to establish a keyword model, set the first word, which word, after the distance in what range, in order to prevent the key words in a paragraph of text interval to write, like the ancient "Tibetan poem."

However, since it is automatic recognition of machines, there will inevitably be accidental injury. As netizens often complain, in case of loss, network companies often spread the net, all "suspected" words into the "blacklist", sometimes resulting in some normal statements can not be displayed.

"This is a technical limitation," Dr. Ching, deputy director of information security at Peking University, told reporters: "The whole world cannot technically understand the full semantics of natural language." He said that the machine will only be identified according to the content of the person, but the good or bad it does not know, and ultimately by people to identify.

Such contradictions plague the whole world. The famous search engine Google's SafeSearch feature can filter pornographic sites, which is a good thing for children, but a recent report by the Harvard Law School's Internet and Social Research Center found that the White House website, IBM, The Web sites of the American Library Association and some clothing companies will be filtered out innocently, and many of the only news stories, websites and games that have the word "adult" will be shut out.

As far as possible to achieve "accurate", "do not let go of a bad person, also not wronged a good person", this is still the ideal state of scientists efforts.

The human brain monitors the computer

"You never believe that computers are smarter than brains. "Zheiyun said.

On the other hand, the machine's "retarded" may also miss some deliberate troublemakers, so manager Li eventually has to use the human brain to monitor the computer. He has hundreds of full-time or compulsory "network management", 24-hour watch screen, a network management to stare at dozens of chat rooms. They are professionally trained, certified and highly vigilant. These network management will be dubbed as "Aunt" by netizens------------------"defense team".

Sina also has more than 10 employees and more volunteer moderators, "Millions of information every day, is a piece of view." "Sina Customer service director Zhongyan said. Sina's request is that for bad information, moderators must be within 30 minutes to respond, its permissions to delete posts, large to the IP.

Chat room is usually more lively, for the offending speaker, the punishment method is also more, including "Kicking", prohibition, etc.--netease chat room system administrator "night boundless" said, kicking is divided into kicking ID and IP, ordinary administrators have no IP rights, only the system administrator. Kicking people clear kicking and dark kicking, Ming kick is generally targeted at trouble, curse people; The dark kick is to deal with that net name is extremely indecent or publish pornography, advertising information and incorrigible, such people do not need to notice, lest cause two pollution.

monitoring network, to network management is a difficult test. Li, for example, the domestic netizens at four or five o'clock in the morning may have been sleepy, and this is the most nervous when the administrator, because one to the morning is to browse the peak, if harmful information is not deleted in time, that responsibility is big.

Hundreds of network management to monitor tens of millions of of netizens, it is difficult to do foolproof. The help of the volunteer coordinator is needed at this time. "Coordinators" are hardcore netizens, "the quality of their own better, more familiar with the network, but also willing to help us to build a good network atmosphere." Said manager Li. Once the abnormal situation is found, they immediately notify the network management, will speak to remove or kick the troublemakers out, and the illegal information related to the relevant departments report.

"We can also say we have eyeliner on the Internet. "said Lee.

Another type of "coordinator" is a variety of BBS on the moderator, a quote from the relevant department of documents reported this description, "online moderators also have a political mind, with a strong sense of responsibility, high political sensitivity, social experience and a wide range of knowledge and other excellent quality, played a role in the online content." ”

A "War of the Races"

As China's largest ICP, SINA's structure of the security system, is only a large national security network.

After years of exploration, the Government has realised that a limited number of "cyber policemen" can effectively cope with tens of millions of of netizens and vast amounts of information. Therefore, on the one hand, with the help of the perfection of the law, with the help of telecom operators, network operators and the power of netizens, a network security system has been preliminarily formed.

In other words, China has quietly played a "war" against harmful Internet information. "The Chinese government has also played a big role in monitoring the content of the information," said Mao Wenjie, vice president of the US think-tank Blue. ”

More than 130 websites in Sina and Beijing also signed a convention on self-regulation of China's internet industry in 2002, commitment "not to produce, publish or disseminate harmful information that endangers national security, endangers social stability, violates laws and regulations, superstition, obscenity, etc., and monitors the information posted by users on the website and clears harmful information in a timely manner. ”

The Convention also requires that Internet access service providers should "check and supervise the information of the websites inside and outside of the access, refuse to access the websites that publish harmful information, and eliminate the harmful effects of bad information on our network users." ”

The drafting and signing of the Convention is organized by the China Internet Association, the Deputy Secretary-General of the association, said Huang, currently has thousands of enterprises signed, they also often carry out self-examination and mutual check activities to ensure that the network clean.

In Beijing, the famous Feiyu Internet cafes, a total of 320 machines, professional network management 8 people divided into two classes, waiter 10 people. Network management is responsible for real-time monitoring, and the waiter will be between the machines from time to back patrol, such as a glimpse of which customer opened the illegal web page, the waiter will turn to tell network management, by network management in the system sent letters to the customer to be reminded.

Similar self-regulatory initiatives have spread to most internet practitioners in China. Huang believes that self-discipline is an important part of the healthy development of the Internet.

Network Tracker

Since 2002 Beijing Blue Speed Net bar fire, Internet cafes have become the focus of public opinion. Government departments in the bitter experience, but also as an opportunity to strengthen the supervision of Internet cafes-from public security supervision to content supervision.

Starting from May this year, the whole country launched a huge "internet harmful information Special clean-up treatment", by November, nearly 200,000 internet business places in the country were cut off nearly half, according to the new regulations required, reserved Internet cafes are required to install a management software.

Liu Fuhai, police officer of Public Information Network Supervision Department of Liaoning Province Jinzhou PSB, commonly known as "network Police". After 2003 Spring Festival, he is busy to the city nearly 600 internet cafes to install a call "Liaoning Province internet cafes real-name management system" software. Since then, netizens must be in Internet cafes to buy an Internet IC card, do not draw card computer can not use. Liu said that this can prevent minors into the Internet café.

Of course, this software is far more functional. It can filter and block tens of thousands of sites that contain illegal information. If someone browses the yellow information or other bad webpage, the software will automatically alarm to the monitoring center system of the public security organ, and display the number of the Internet Café address and Operation Machine, the public security organ can investigate and punish the illegal Internet café owner and internet operator.

In the Jinzhou Public Security Bureau Network Supervision Office room, a computer monitors the city's Internet cafes in about 20000 computer trends.

Jinzhou and Yingkou, Dandong and Dalian are the first pilot cities to fully install the software in Liaoning Province. Trita, director of the Public Information Network Security Supervision Department of Liaoning Province, said that all the Internet cafes in Liaoning province--more than 7,000 in 2003--will be placed under the monitoring of the software. In Liaoning, about 40% of netizens surf the Internet through internet cafes. The police can therefore carry out very effective monitoring on them.

The real-name real-name of internet cafes is the regulations promulgated in 2002 on the administration of business premises for the Web services. Police initially asked Internet cafes to manually register the surfer, a real-name Internet card called the "Electronic ID", which was soon considered a more stringent measure.

According to regulatory requirements, internet Café management software can also automatically record the computer 60 days of online records, and IC card on the Internet recorded the name of the person, address, ID number and other information. In this way, in theory, managers can find every Internet user accordingly.

Beijing that big Web site Li Chunli example, see netizens, your mobile phone was cheated away, now as long as you report to the police, provide your network name and Internet time, you can use technical means to find each other, through the legal procedures to return your things.

Such surveillance systems were quickly extended from some provinces to the country. April 27, 2004, Chinese Ministry of Culture officials announced: by the end of 2004, all over the country Internet cafes will be installed "Internet services business premises Computer Management system." Through this system, the cultural administrative department will use High-tech means to the Internet café implementation of real-time monitoring, and "Internet cafes operating undesirable cultural products" to monitor.

Party members of the Ministry of Culture, team leader Chang is in the "National Prevention of juvenile delinquency and schools surrounding public Security Comprehensive Management Conference" said this remark, which shows that the prevention of Internet bad information poisoned young people, is the important goal of this decision.

Of course, such measures are far more effective than this, and will also allow those who engage in illegal activities online to escape tracking.

In the dragnet of the national Tsinghua University bombing, such a show of power. According to public information disclosed, after the incident, Tsinghua University received a suspect from the suspect's e-mail, and detected the suspect from Fuzhou, quickly will be internet cafes Huang capture. According to the Hong Kong "Wen Wei Po" reported that yellow after the crime back to Fuzhou, in chat with the crime process as heard in detail, the police have been through the Internet monitoring system, filtered to these content, and locked its whereabouts.

This is an encouraging development for the law and politics sector. They believe that criminals cannot do it online without any trace. through to the user (whether in the Internet café or in the unit, the home Internet), the Internet service business site and network operators of the layers of fortification, everywhere to stay, illegal internet users will have nowhere to hide.

With the implementation of various initiatives, a "safe" coverage of the entire internet is being woven in China.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.