How to build a national security barrier in the digital era

Author:Report Time:2022.09.07

In order to further study and explore the cutting -edge issues in the construction of national security in the digital era, the "Digital Age and National Security" seminar organized by the Shanghai National Security Law Research Center and hosted by the University of Political Science and Law, East China University of Political Science and Law, was held in Shanghai a few days ago. Experts focus on the theme of the meeting to conduct in -depth discussions.

2020_0519_e1843f44j00qakgho000yc000dw0099m.jpg

Big data shaped a new national security situation

Big data redefines the extension of national security connotation and space -time, and has shaped the new situation of national security. Professor Zhao Qingji, director of the Shanghai National Security Law Research Center and Dean of the School of Marxism at East China University of Political Science and Law, pointed out that digital technology has become a legitimate means for national political and military confrontation, and key infrastructure has become an important battlefield for network offense and defense confrontation; network space arms reserve The competition has continued to intensify, and the supply chain attack and network attack operations with national background are increasing day by day. Intelligent, automated, and weaponized network attacks are endless; political robots driven by intelligent algorithm through the spread With deep falsification, security threats are more concealed and complicated.

Deputy Director of the Office of the General State Safety Outlook Research Center and associate researcher of Dong Chunling, the Institute of Modern International Relations Research, pointed out that we need to adhere to the overall development and security, while making full use of data to promote the development of the digital economy, pay close attention to data sovereignty, data export, and data privacy. Wait for security issues; you need to fully understand the great struggle with many new historical characteristics, better maintain data security in the background of the intensity of strategic games in China and the United States; you need to adhere to the thinking of the rule of law, and through a more complete data security legal system, it is a digital economy. Developed escort; need to coordinate its own safety and common security, and better shape the data security of the new era by promoting the "Global Data Security Initiative".

The "Chip and Science Act", which has taken effect recently, is the largest federal investment in the history of science and technology in the history of the United States. Professor Hao Min, director of the Intellectual Property and Science and Technology Security Research Center of the International Relations College, pointed out that the bill will prevent intellectual property threats. The "scientific research security" that is influenced by foreign influence and ensure that the "leading science and technology lead" has increased to the same important height, and the relevant regulations are extremely targeted and full of cold war thinking with competition in China. We must fully attach great importance to, be vigilant, and prevent.

Professor Yu Nanping, School of Political and International Relations at East China Normal University, pointed out that new technological changes can also bring non -symmetrical dimension and deterrent capabilities in the field of traditional security, which has a significant subversive impact on national military security. Therefore, it is necessary to highlight the systemic and compound challenges brought by new technological changes to national security, and to examine national security issues from the perspective of technical ecology and technical standards, and pay attention to the overall competitiveness of the country as a whole in the new technological change. Get.

Network security has become one of the most important challenges

After the end of the Cold War, the emergence of network security issues proposed the construction of national security capabilities in the digital age. Shen Yi, a professor at the Department of International Political Department of Fudan University and director of the International Governance Research Base of the Internet Space, pointed out that the national security capabilities in the digital age not only include the "objective capabilities" of key infrastructure security, but also include influence and even guide information distribution and flow, and then shape a specific audience The ability of national security cognition. The construction process of this ability needs to be effectively avoided into a security predicament. Under the guidance of the overall national security concept, it focuses on the overall goal of building a community of destiny of the global network space in order to effectively advance.

上海国际问题研究院网络空间国际治理研究中心秘书长、研究员鲁传颖指出,网络安全已经不再是简单的互联网技术层面的问题,关键信息基础设施、数据安全、个人信息保护、信息内容安全、 There are endless issues such as cyber crimes. This must not only have a technical solution, but also the top -level design of strategic, legal and institutional levels.

Faced with the network risks of the space system, He Qisong, a professor at the School of Political Science and Public Management of East China University of Political Science and Law, pointed out that in addition to using the best practice and approach to enhance the network space in the space system, the United States has adopted various measures to improve the network security of the space system, such as Space information and risk sharing, network offense and defense technology for the development of space systems, and so on. Based on this, the network security measures of the space system should be strengthened, such as the network security of the overall space system industry supply chain.

The security of the era of navigation digits with the rule of law

In the context of the current international financial politics, tooling and even weapons, and the domestic security perspective, the rule of law of the national security perspective is a major work in the context of the national security perspective. Li Jianwei, deputy director and researcher of the Department of Law of the Shanghai Academy of Social Sciences, suggested that the establishment of a sound national security law for digital currency. Yuan Faqiang, a professor at the International Law School of East China University of Political Science and Law, pointed out that it is necessary to update the outdated concept of the national jurisdiction, combine the characteristics of digital information security, scientifically and comprehensively formulate regional factors in my country's legislative jurisdiction, and provide an effective basis for exercising jurisdiction for law enforcement.

Wang Yong, deputy dean and professor of the School of International Finance and Law of East China University of Political Science and Law, suggested to improve the electronic evidence system that endangers national security criminal cases. First, strengthen the construction of rules and regulations. Secondly, improving the compliance of business processes is mainly to clarify the status of electronic evidence, solve the problem of illegal exclusion of electronic evidence and defecting evidence, solve the problem of cross -border online evidence collection, and solve the problem of technological investigation electronic evidence evidence. Third, strengthen the training of professional and technical personnel. Finally, improve the technical level of electronic evidence evidence. Key information infrastructure is the neural center of social operation and the top priority of national security. my country's National Security Law, Cyber ​​Security Law, and Data Security Law have confirmed the sovereignty and data sovereignty of the network, forming a new type of national interests protected by law. Dangsheng, director and associate professor of the East China University of Political Science and Law Strategy Strategy Research Center, pointed out that the protection of my country's law on the protection of new national interests needs to be further improved: First, the relevant laws need to be further clarified and operable; the other is to improve National security law enforcement capabilities, strengthen administrative protection of new national interests; third, judicial institutions must change their concepts and actively explore judicial protection mechanisms for new national interests in non -traditional security areas.

As a new production factor, the data is continuously stimulating the new momentum of the market. The implementation of corporate data compliance is of great significance to promote the healthy development of my country's digital society and ensure my country's national security. Professor Ni Jianping, director of the Northeast Asia International Development and Cooperation Research Center of Dalian University of Technology, pointed out that it needs to continuously improve the cross -border flow of domestic data from the aspects of legislation and industry supervision, and promulgate the compliance text of cross -border flow of national data as soon as possible; It is necessary to actively participate in regional and global data governance, and to continuously enhance my country's data governance and influence. Experts from the industry have pointed out that building a wind control control system is the primary task of corporate data compliance management. The "Data Security Law" on the corresponding rules involving data security review needs to be landed as soon as possible, especially the review of national security in data security review, especially the review and identification of professional institutions.

Author: Xu Yujie Zhao Qing Temple

Edit: Liu Di

Editor -in -chief: Yang Yiqi

- END -

The "Mobe Camel Bell" edge team is officially established!

The border guard is our own organization's own organization. In the future, we ...

Military Camp Security Publicity Week, they do this--

To strengthen the construction of military camp network civilizationImprove the ne...