Law

Overseas spies steal facial data and carry out espionage activities against me. The Ministry of National Security reminds me

2025-08-06   

According to the WeChat official account of the Ministry of National Security, the Ministry of National Security released a security tip article on August 6: in the wave of the digital era, biometric recognition technology has been rapidly developed and widely used by virtue of accuracy and convenience. Through biometric recognition technology, facial features, fingerprints, irises, body posture, gait and other data can be quickly collected, analyzed, stored and recognized, bringing great convenience to our lives. However, at the same time, the hidden risks of data leakage behind its collection cannot be ignored. The "face changing" crisis behind convenience, as one of the most prominent external features of the human body, contains rich and relatively stable information points, such as the precise position, shape, and size ratio of facial features, as well as unique details such as facial bone contours, skin textures, and wrinkle trends. Thanks to its non-contact and natural intuitive characteristics, facial recognition is widely used in daily life. However, improper storage of relevant data can lead to leakage, which not only endangers personal privacy and property security, but may also pose a threat to national security. There are public cases showing that overseas spy intelligence agencies illegally steal facial information data of key target objects, forge and use it to obtain information, and even further infiltrate sensitive locations where target objects work, carrying out espionage activities and endangering national security. The abuse crisis of the biological "key" fingerprint is the skin texture of the human fingertip epidermis, composed of a series of uneven ridges and valleys, forming a unique overall pattern and containing a large number of highly unique detail features. Fingerprint recognition has been tested in practice and has become a cornerstone technology in the field of identity recognition. There are cases showing that a certain overseas enterprise directly connected its fingerprint payment system to the company's database, but due to a lack of effective management, hackers repeatedly broke into the system, stole information, and caused serious consequences of leakage. The protection crisis of high-precision biometric features is that the iris is a colored circular area that surrounds the pupil and is located between the pupil and the white eye. Its surface is covered with complex texture details such as spots, filaments, coronal structures, stripes, and crypts. These features are highly stable and difficult to replicate, with high precision and uniqueness, and are applied in key areas with high security. They are often the focus of attention by criminals and may be collected and stolen under various pretexts. There are public cases showing that a certain overseas company uses the issuance of cryptocurrency tokens as a gimmick to scan and collect user iris information worldwide, and transfer the data source, posing a threat to personal information security and even national security. Reminder from national security agencies - strict rule of law norms. The promulgation of laws, regulations, and departmental rules such as the Data Security Law of the People's Republic of China, the Cybersecurity Law of the People's Republic of China, the Personal Information Protection Law of the People's Republic of China, the Regulations on Network Data Security Management, and the Measures for the Security Management of Facial Recognition Technology Applications provide institutional guarantees for maintaining the security of China's network data, including the application of facial recognition technology. Citizens and organizations should strictly abide by laws and regulations and effectively improve the level of biometric information protection. ——Strengthen self-protection. In daily life, the principle of "minimum necessity" should be advocated, and biometric information should be provided with caution. When using biometric technologies such as facial recognition, fingerprint recognition, and iris recognition, citizens can request that the data collection personnel or service providers clearly inform them of the storage, processing, and purpose of the data, and inquire in detail about their relevant privacy policies to be vigilant against excessive collection. ——Optimize security strategy. It is recommended to promote multidimensional authentication ideas in core confidential areas, regularly optimize and update biometric authentication information, adopt public protection strategies with multiple biometric information, and improve and strengthen three-dimensional confidentiality and security. While biometric recognition brings convenience to our lives, we should attach great importance to its safety, enhance our awareness of protection, provide personal biometric information cautiously, and eliminate the risk of leakage from the source. If the general public finds any suspicious biological information collection equipment, or any suspicious clue related to the illegal collection of biometric information, they can report to the local national security organ directly through the 12339 national security organ reporting acceptance telephone number, the online reporting platform, the reporting acceptance channel of the official account of the Ministry of National Security. (New Society)

Edit:Wang Shu Ying Responsible editor:Li Jie

Source:CCTV NEWS

Special statement: if the pictures and texts reproduced or quoted on this site infringe your legitimate rights and interests, please contact this site, and this site will correct and delete them in time. For copyright issues and website cooperation, please contact through outlook new era email:lwxsd@liaowanghn.com

Recommended Reading Change it

Links