The "Military Confidentiality Regulations" will come into effect on March 1, 2020. The Regulations have 10 chapters and 61 articles in total. Focus on the security and confidentiality of information network systems, strictly control the confidentiality of intelligent electronic devices, and comprehensively strengthen the confidentiality of important matters in important areas such as major military activities, news propaganda, military-civilian integration, , foreign military cooperation, weapons and equipment...
Keeping secrets is the sacred responsibility of every soldier. Some soldiers lack confidentiality awareness and use the troops' organization, equipment, numbers, strength, and even basic tasks, work goals, training methods, and technical level as topics for conversations in their communications with relatives and friends. If they are not careful, they are prone to losing secrets.
What is even more terrifying is that the families of many soldiers lack the awareness of confidentiality and disseminate the information they hear again, which not only causes leakage, is easy to be exploited, but also endangers relatives and violates the interests of the country.
Part 1: Basic understanding of military confidentiality regulations
If state secrets and military confidentiality regulations are violated, how serious will the consequences be?
Article 432 of the " Criminal Law " in my country stipulates: "If a violation of the laws and regulations on keeping state secrets and intentionally or negligently leaks military secrets, and the circumstances are serious, he shall be sentenced to fixed-term imprisonment of not more than five years or detention; if the circumstances are particularly serious, he shall be sentenced to fixed-term imprisonment of not less than five years but not more than ten years."
Article 92 of the " Discipline Regulations of the People's Liberation Army of China " stipulates: "If a violation of the confidentiality regulations of the state and the army and cause loss of secrets or leakage, and the circumstances are relatively minor, he shall be given a demerit or a serious demerit; if the circumstances are serious or involve top-secret matters, he shall be given a demotion (level) or a demotion (level); if the circumstances are serious, he shall be given a demotion (level) or a demotion (level); if the circumstances are serious, he shall be given a demotion (level) or a demotion (level); if the circumstances are serious, he shall be given a demotion (level) or a demotion (level); if the circumstances are serious, he shall be given a demotion (level) or a demotion (level); if the circumstances are serious, he shall be given a demotion (level) or a demotion (level); if the circumstances are serious, he shall be given a demotion (level) or a demotion (level); if the circumstances are serious, he shall be given a demotion (level) or a demotion (level); if the circumstances are serious, he shall be given a demotion (level) or a demotion (level); if the circumstances are serious, he shall be given a demotion (level) or a demotion (level); if the circumstances are serious, he shall be given a serious punishment; if the circumstances are serious, he shall be given a demotion (level) ”
What kind of behavior is a leaked secret?
(I) Theft, destruction, or betrayal of military secrets;
(II) Theft, destruction, or the sale of military secrets;
(II) The use of military secrets to conduct illegal activities;
(IV) The occurrence of a leak incident, the secret information is not reported or the timely remedial measures are not taken;
(V) The neglects his duties and causes the security of military secrets to endanger the security of military secrets;
(V) Others that violate the confidentiality system endangers the security of military secrets.
If a punishment is to be given in any of the circumstances stipulated in the preceding paragraph, the punishment shall be severe.
So, what information falls within the scope of military secrets?
(I) National defense and armed forces construction plan and its implementation status;
(II) Military deployment, operations and other important military operations plans and implementation status;
(III) Combat readiness exercises, military training plans and implementation status;
(IV) Basic information on military intelligence and its sources, communications, electronic confrontation and other special statuses, the numbers of troops below the army and special units;
(VIV) Organization and organization of armed forces, basic information on tasks, strength, quality, status of troops, and the numbers of troops below the army and special units below the army;
(VI) National defense mobilization plan and its implementation status;
( 7) Development, production, equipment, and replenishment and maintenance capabilities of weapons and equipment, and tactical and technical performance of special military equipment;
(eight) Important projects, achievements and applications of in Military academic and National Defense Science and Technology Research ;
(9) Matters that should not be disclosed in in Military political work ;
(10) Distribution and use of National defense expenses , financing, production, supply and reserve of military materials, etc.;
(11) Protection of military facilities and military facilities;
(12) Relevant situations in military aid, military trade and other foreign military exchanges;
(13) Other matters that need to be kept confidential.
As a military family member, you should do:
1. It is strictly forbidden to post photos of "in military uniforms" or "taken in the military camp";
2. It is prohibited to publish any military-related information about the military location, training camp, exercise, etc.;
3. Do not inquire about the work content of the partner, do not read the other party's work information, and do not take items with military information out of the military camp privately.
4. If you find that there is a violation of the military confidentiality regulations around you, you should supervise and report each other.
Part 2: Code of Confidentiality of the Chinese Army
Computer Network Security Confidentiality Code:
1. Do not use the Internet to engage in activities that endanger the interests of the state and the military
� ml3
7. Do not disclose passwords, keys and security and confidentiality measures to others
8. Do not communicate information on the military network as a soldier
9. Do not copy, retain, lend, or destroy any confidential vector
10. Do not send network and password equipment to the military network for repair
. Part 3: "Crypto War" is by your side
At present, with the rapid development of information network technology, the environment facing confidentiality work is more complex, the technology is more advanced, and the channels are more concealed. To firmly grasp the fundamentals of ideological prevention, we need to always tighten a string in our minds, establish the awareness of "one percent negligence may lead to 100% failure", ensure that confidentiality laws and regulations and work requirements are in mind and put into practice, and do not relax, without any leakage, and meticulously carry out confidentiality work to provide a strong guarantee for being able to fight and win battles. Case 4: The military offensive and defensive war in the smartphone era. The General Political Department of the People's Liberation Army strictly ordered the management of military camp information dissemination many years ago. With the increasing popularity of mobile phones, it is impossible for the military to completely keep this convenient communication tool out. How to prevent mobile phones from leaking military secrets? In an increasingly open world, closed military life must be "down-to-earth". Our army is also thinking: Can mobile phones be converted into combat weapons?
"A mobile phone in a closed state has no ringing, and there is no turning on the screen. The microphone was quietly started, lurking in the next room and listening clearly." At a security education meeting at the end of September 2014, a "eavesdropping" demonstration by communication professionals surprised the cadres at the deputy division level and above in the podium.
In the era of intelligence, it has become easier for military mobile phones to leak secrets: in standby mode, the mobile phone can maintain uninterrupted signal exchange with the communication network, generating electromagnetic spectrum, which is easy to be identified, monitored and tracked; even in a closed mobile phone, technicians holding special instruments can still remotely turn on the mobile phone microphone; during the manufacturing process, special functions may be implanted in mobile phone chip . As long as the battery is inserted, the mobile phone will quietly receive the speech and automatically send it to a specific receiving station through satellite.
Now, the newly revised Household Ordinance has not completely expelled mobile phones from the military camp, but has made quite humane restrictions on the timing, occasions and precautions. In the military camp, it is not realistic to completely reject mobile phones and no longer blindly prohibit them. Our army has also begun to think about how to convert mobile phones into combat power.