CategoriesNews Operation Guide Scenes To Be Used

Military camp wireless WiFi cover can cause leakage, arousing high concern

wifi signal jammer

In mid-February 2019, a consultant from an organ of the Guangzhou Military Region went to a subordinate unit to conduct confidential reflection. When he checked the network settings of a laptop in his office building, he noticed WiFi signals popping up every now and then. He hurriedly opened the network settings interface and found that the computer’s “Automatically connect to wireless network” option was turned off, and the WiFi signal was weak and did not fluctuate, so he was a little relieved. He immediately told the security personnel to close all computers with wireless network cards in the office building, and to detect and analyze the source of WiFi signals in the office and camp.

It turned out that the department was located in a bustling part of the city. Fortunately, the other party has a password. If there is no password, the computer with wireless network card in the camp can connect automatically. He then went to the walls around the camp to further check for wireless signals. A total of 3 WiFi signals marked with group usernames were detected near residential areas, but the signal strength was weak and did not cover the camp area. Subsequently, the ministry removed or blocked the wireless Internet access function of all computers in the office area to prevent leaks from the source.

The WiFi signal covered the barracks, arousing the high attention of the army party committee. The Confidentiality Committee immediately convened a situation analysis meeting to conduct special research and in-depth analysis of the various achievements brought by wireless network development to military information security. Subsequently, they took the case as a novel teaching material, organized and launched a special education on “the hidden dangers of computer wireless networking”, and invited confidentiality experts to stop the demonstration of “secrecy” on the spot. At the demonstration site, experts used laptops to build a WiFi network and operated public software to successfully connect to the target computer.

In mid-March, the ministry’s secrecy committee conducted a security inspection. The reporter saw at the scene that they added wireless network signal detection on the basis of traditional confidential document inventory and equipment inspection. Inspectors hold Wi-Fi detectors to detect Wi-Fi signals in offices and camps. According to the staff of the Military Affairs Section, the wireless network detectors they use are more sensitive than mobile phones and laptops, and have the function of ranging. After detecting a wireless signal, they can quickly determine the source and distance of the signal. In addition, in secret rooms, conference rooms and other secret-related places, they also installed WiFi signal jammers, which can effectively block the wireless network signal and prevent confidential information from leaking through the wireless network.

In addition, the army has also specially formulated and promulgated the “Regulations on the Management of Wireless Networks in Barracks”, which stipulates that all classified computers shall not be equipped with wireless network cards or closed wireless Internet access functions, so as to eliminate the source of hidden dangers; test before it can be put into use.