Home / News / It is imperative to build a space security force system for military

It is imperative to build a space security force system for military

[Editor’s note] At present, China’s cyberspace security is still not reversed: the territorial sovereignty of the network is severe, the data security crisis is raging, the US cyberspace ambitions are only increasing, and the cyberspace defense capabilities are seriously lagging behind. Network security and data The asset management system is missing. It is imperative to strengthen the integration of the military and the people. From the deployment of a number of major scientific research projects, the cultivating of the network security industry echelon, and the formation of the network command, we will build a cyberspace security force system with both offensive and defensive and independent control to ensure the security interests of cyberspace in China.

It is imperative to build a space security force system for military

At present, the rigorous situation of China’s cyberspace security internal and external troubles has not been reversed. The United States has always held my “network lifeline” and stolen my core data assets. It is imperative to use Xi Jinping’s new era of socialism with Chinese characteristics as a guide to strengthen the deep development of military-civilian integration, solidly deploy the “cyberspace security strength system”, and build a network space security guarantee that checks and balances strong enemies and achieves the second century goal.

The first is to control the “main switch” of my civil network. The United States actually controls most of the core facilities of the Internet and the control of the root domain names of countries. On December 5, 2017, a mirror node that the US had set up the F root name server in Beijing was deleted from the root domain name server resource list. So far, no organization or unit has notified Chinese users and netizens. This incident shows that the US . . . top-level domain name assigned to China by the Internet Corporation for Assigned Names and Numbers (ICANN) is still subject to the control of the United States. In addition, in recent years, we have stepped up the development of network shutdown and control technology, which makes it easy for me to “stop serving the network.”

The second is to clear the legal obstacles to launching cyber warfare and stopping service. There are indications that the United States is using network suspension and cyber warfare as tools for international international struggle. In 2015, the US Cybersecurity Law gave the President the power to “stop the Internet” and the Defense Defense Authorization Act of 2016 granted the US Secretary of Defense the power to launch a cyber war.

It is imperative to build a space security force system for military

Third, the United States continues to strictly control Internet governance through ICANN’s “unequal treaties”. ICANN has only symbolic changes after the “Prism Gate” incident, and its core “Overlord Clause” has not yet been substantially revised: ICANN must be recognized as a global Internet administrator; national domain names have no right to use only; national domain name registration The information database must be open to ICANN and the data is owned by ICANN; any arbitration and litigation surrounding the agreement will take place in New York or Los Angeles.

First, Meicheng is the biggest beneficiary of my massive data assets. The core focus of the cyberspace game is “data assets.” At present, massive data is released online, and the civil network agreement is upgraded without fully considering security. China’s public network DNS, e-mail, website three key data management systems are always in the “managed” and “hosted” state, which means that network data is fully open to the United States. At the same time, the United States has a large number of paid-spread reptile software to capture sensitive information related to China’s national security, economic and social operations, and public opinion. Beauty has become the biggest beneficiary of my data assets.

Second, the US Internet Enterprise “Big King Kong” monopolizes the information infrastructure of most core areas in China. Take “Cisco” as an example. Its network equipment and other products and services account for 50% of the customs, public security and other government agencies, 60% of railways, airports, ports, oil, manufacturing, 70% of the financial industry, and 80% of the media industry. %. The “Big King Kong” has long been a partner of the US intelligence system, adding filters to the server for the military, and reserving backdoors in the software to report system vulnerabilities to the military in advance. If this situation does not change, in the future, my big data system, smart society, digital China, etc. will all be built in the “wall” of the United States, and the United States can easily penetrate the land, sea and air defense lines to obtain information on hundreds of millions of netizens and the entire economic and social operation.

The first is to strengthen network deterrence. In 2009, the United States took the lead in establishing the Cyber ​​Command. In 2010, it used the “Shenzhen” virus to attack Iran’s nuclear facilities. In 2014, it imposed sanctions on the North Korean network. In 2016, it announced a high-profile cyber war against the “Islamic State”. In 2017, the Trump government publicly announced that it is fully accelerating the deployment of cyber attack capabilities against China and Russia.

It is imperative to build a space security force system for military

The second is to strengthen the integration of the military and the people. For example, the “US National Defense Innovation Experimental Unit” was established in 2015, with offices in Silicon Valley, Boston, and Austin, and a US$100 million military contract with Internet companies. The military and government companies have maintained close cooperation with each other. Eric Schmidt, Google’s former CEO and current parent of Google’s parent company, is the chairman of the “US National Defense Innovation Committee”. Trump appointed Juliani, president of a network security company, as the network security consultant to lead the cybersecurity committee. Former Net Army Commander Rogers said that he would strengthen cooperation with private companies and strive to build a network system capable of integrating network attack and defense capabilities and tactical actions in the next five to ten years.

First, the importance of network security is not enough. China is the main victim of the Internet’s advanced persistent threats. The industries of finance, energy, transportation and education are the “hardest hit areas”. In recent years, e-government and e-commerce have developed at a high speed, but the network security supervision and defense capabilities have been seriously “delayed”. Network security investment accounts for less than 1% of the total funding for informatization construction, which is far from the level of 15% in the US and 10% in Europe. As a result, neither the high-end technology is subject to the status quo, nor the service application is safe and controllable. Cyber ​​attacks, information theft and destruction incidents occur frequently.

Second, the underlying information network and important information systems are prominent. Relevant departments detected 896 information systems in more than 120 units of government agencies, finance, telecommunications, energy, railways and military enterprises, and found 12,000 high-risk vulnerabilities. According to the National Security Information Database, as of October 2017, there were 2,180 websites with backdoors in the territory, 3004 alarm messages in the national government website, and 5,163 websites that were tampered with in the country. The number of hosts corresponding to IP addresses controlled by Trojans or bots was controlled. 840,000.

The third is “no defense” on imported equipment. Imported information equipment is almost in an “undefended” state. Take the chip as an example, not only rely heavily on imports, but also set no threshold, and even allow foreign companies to direct sales, foreign companies directly grasp the information of each machine.

It is imperative to build a space security force system for military

Fourth, security technology is lagging behind. At present, my network security mainly relies on firewalls, anti-virus software and intrusion prevention systems. It does not form a global situational awareness technology capability and emergency response mechanism. In the face of large-scale network attacks, there is no counterattack. Some people describe that “China stands almost naked. Already armed in front of the enemy of the teeth.”

First, a sound and effective network security and data asset management system has not yet been established. The attention of the government departments is mainly local public opinion, and insufficient attention is paid to network security. The supporting legislative process is slow and the national cyber security awareness is weak. Data management “falls by the power”, left a small number of Internet companies to deal with, data leakage is serious, underground black market data transactions.

Second, domestic large-scale Internet companies have “super-national capabilities”. These companies have gathered in the “Internet Territory” to stream people, business, logistics, information flow, capital flow, and maintain a strong and continuous expansion. In terms of data, not only does it have data assets, but it also has super-strong data processing and analysis technology that the government can’t match. The data and analysis results are mostly outside the control of the state. In terms of ideology, a super-distribution platform and a social mobilization platform are formed to grasp the right to formulate media rules. In terms of the economy, mastering the mass industry information has actually become the “super management department” of related industries.

Third, the network giant’s ability to resist cyber attacks is weak. In 2010, the US National Security Agency launched a network attack on Huawei’s “shooting giant”, successfully invading Huawei’s headquarters servers, stealing internal core business and technical data, monitoring executives, and investigating its relationship with the military. Huawei is the head of China’s high-tech giants. Huawei’s failure means that no company in China can defend. China’s network enterprises have become the primary target for the United States to colonize the Internet, steal data, and infiltrate hostile forces.

It is imperative to build a space security force system for military

The strategic goal of the “cyberspace security strength system” is to achieve both offensive and defensive and self-controllable. First, we must have strong national critical infrastructure defense capabilities. It can comprehensively perceive the cyber security posture of key information infrastructures in various fields and industries in the country and identify major security risks in a timely manner. It can control any destructive behavior in short-term, low-frequency, controllable range, and has the ability to resist damage, disaster backup and full recovery when encountering major impacts. Second, we must have the ability of both offensive and defensive network military shock.

It can fully cope with and launch intelligence warfare, physical warfare, political warfare, public opinion war, financial warfare and psychological warfare through cyberspace. Third, we must have a core technology system and infrastructure that can be controlled independently. Breaking through the weak links of integrated circuits, basic software, core components, etc., fundamentally changing the core technology of the core is subject to people’s situation, establishing an independent and controllable network infrastructure platform with China’s independent intellectual property rights, and completely getting rid of the “master-slave” relationship with the US network.

The essence of network security competition is the competition of network technology infrastructure. Intensify the deployment of a number of strategic, long-term, and basic capacity-building major scientific research projects, drawing on the successful practices of “two bombs and one star” and manned space flight, using the advantages of the national system, adopting asymmetric strategies and supernormal means, Step by step to strengthen the short board, the internship of the general secretary of the near-level “we are subject to some problems in some key technologies and equipment must be resolved early”. Deploy a group of state-of-the-art laboratories with larger and more integrated network technologies in the military, research institutes, universities, and enterprises, covering standards, protocols, CPUs, chips, firmware, operating systems, databases, routers, cloud storage systems, etc. Core technologies strive to achieve “local substitution” and disruptive innovation.

It is imperative to build a space security force system for military

The key to the gap between China and the US in terms of network security lies in the fact that the United States has a number of world-class monopolies from the basic layer to the application layer. China’s network core technology is in the private enterprise, and it must be clear that the network enterprise is responsible for maintaining the national network security and serving the major country network. Through government and military procurement, commissioned research and development, scientific research funding support and other means to fully support, the network enterprise scientific research platform will be built into a military-civilian integration innovation platform, creating a world-class network technology enterprise echelon, closely matching the military and political network security needs.

The first is the national team. Choose a group of central enterprises, military enterprises and private enterprise giants with good foundation and complete industrial chain, undertake national cyber security and informatization major project construction, and be responsible for the overall design and integration of network weapons and equipment.

The third is the special team. It undertakes special tasks such as network security awareness, early warning, traceability and counter-measure, and is responsible for network security in industrial, commercial, financial, and transportation segments. The fourth is to establish a network technology industry alliance led by the Ministry of National Defense. Centralized enterprises, military enterprises, and private enterprises from the basic level to the application level are widely involved to open up cooperation channels, and realize the integration and large-scale integration of network security technology.

The first is to establish a system of mutual exchange of military and government enterprise network technology talents. Realize experts in the fields of artificial intelligence, big data, and network security among the military, government departments, and network enterprises.

It is imperative to build a space security force system for military

The second is to build a large-scale, open, and shared national network shooting range, making it a military network weapon equipment development experiment, attack and defense confrontation training exercise, and cyberspace security technology demonstration and verification, information system security testing and network risk assessment. Large base.

The third is to establish a network security emergency response system for military and civilian integration. Focus on responding to threats such as network ideology infiltration, critical infrastructure ambush attacks, and military information system intrusions. Establish a military-civilian integration network security emergency command center, organize personnel from the military, the Ministry of National Defense, the Ministry of Public Security, the Ministry of Security, the national strategic communication system, network enterprises, and key infrastructure. The wartime military and the military jointly coordinate and unified command, and usually exchange The support team provides specialized technical support.

Formally establish the basic military establishment and corresponding arms of the cyberspace forces, set up the network command to oversee the cyber security and cyber warfare command of the whole army, establish “network special warfare troops” within the various services, and establish “cyber warfare headquarters” in each theater command. To undertake intelligence gathering, network warfare, network security technology research and development, network weapons development and other functions.

Drawing on the US approach, the Central Network Office established the “National Cyberspace Security Situational Coordination Coordination Organization”, “Network Security Emergency Response Coordination Group”, “Intelligence Information Coordination Group”, “Network Security Technology R&D Coordination Group”, and “National Key The five infrastructure inter-departmental coordination agencies of the Infrastructure Support Office. It is composed of the main leaders of the participating departments, and the person in charge reports directly to the Central Cyber ​​Security and Informatization Committee.

It is imperative to build a space security force system for military

Focusing on the principles of data development and utilization, ownership, security management, and collection, storage, transmission, processing, exchange, and destruction of all aspects of life cycle protection and other systems, the establishment of state-level government-enterprise coordination, military-civilian integration, cross-sector governance mechanisms.

First, we will promptly introduce the “Big Data National Security Strategy” and the “National Data Law.” The security strategy focuses on big data legislative plans, governance principles, rights divisions, data standards, and government data asset management registrations. Legally form data on personal privacy, trade secrets, and state secrets to establish prevention and control measures, classification systems for security levels, risk assessment, and emergency prevention systems, and clarify legal responsibilities and penalties.

About admin

Leave a Reply

Your email address will not be published. Required fields are marked *