标签归档 西安耍耍论坛

Face recognition black production: a set of real-life authentication videos is 100 yuan.

"A set of 100 yuan, including photos of the front and back of the ID card, photos of holding the ID card and videos of nodding, shaking your head and opening your mouth." On some social platforms and websites, many sellers clearly priced the face recognition video, and also guaranteed that the verification video sold could pass the verification process of most APP platforms.

threemoon30SolsticefourmoonfiveOn the day, the Beijing News reporter found that most of these underground black goods transactions were hidden inQQIn the group and overseas websites, among themQQGroup names mostly include keywords such as "face-crossing" and "recognition technology", so as to facilitate buyers to retrieve relevant information.


existAPPIn the black production of platform face verification, a set of verification videos with a price of 100 yuan belongs to "high quality" products, because the dynamic verification videos recorded by real people are used, and the verification pass rate is high. There is also a low-cost face authentication method, that is, using dynamic software to make face photos into "dynamic videos" and cooperating with "plug-in" software for verification.


"A low-cost set costs only a few dollars, and if the demand is large, it can even be as low as0.5Yuan a set. "A seller said that the success rate of face dynamic verification mainly depends on the degree of detail in the dynamic processing of photos, but the video recorded by real people can definitely do it.100%Yes.


Regarding the sale of face recognition information, Zhao Zhanling, a lawyer of Beijing Yunjia Law Firm, said that according to the Civil Code, citizens have civil rights to personal information, and illegally collecting and selling other people’s information without their consent would constitute civil infringement. The facial feature information of a person is the information that can directly identify the true identity of a specific natural person, which belongs to the category of personal information. It is suspected of violating the law to buy and sell personal information without the consent of the user.

In QQ group, searching for the keyword "face recognition" will lead to many groups selling black goods. screenshot

"keep pace with the times" black goods trading


When registering for face verification in Weibo, Ms. Zhang was reminded that her ID card information had been registered, but she had not downloaded and used Weibo before.


Ms. Zhang consulted micro-blogging service and learned that if you sweep your face and register for Weibo, you will be prompted."This ID card has been bound to other accounts" or "ID card usage exceeds the limit" because the ID card has been bound to other accounts. At present, an ID number can be bound.2Weibo account, when the number of accounts bound with ID number reaches the upper limit, the current ID number can no longer be used for verification.


"My information must have been leaked." Ms. Zhang said that she usually pays more attention to the protection of personal information. The ID card has not been used anywhere except for going to school, getting a bank card, calling card, staying in a hotel and buying a ticket.


Ms. Zhang’ s experience is not unique. Many netizens have posted that they are registering in Weibo.QQ, WeChat official account, etc., found that personal identity information was stolen.


With the increase in the number of personal information being fraudulently used, network-related feedback and complaints have also increased, followed by majorAPPThe security verification upgrade of the platform takes dynamic face recognition as the security verification method. existAPPIn the iteration of platform security verification and upgrade, practitioners of this black industrial chain are also taking advantage of loopholes to "study" how to solve this "dilemma". With the development of Internet real-name registration system, this black goods interest chain has been upgraded from collecting and selling names and ID numbers to collecting and selling hand-held ID photos, face videos and photo dynamic processing software.


A black seller who sells personal information in the dark net introduced a set of photos of the front and back of ID cards, photos of holding ID cards and videos of people nodding and shaking their heads.100Yuan, a large quantity can be discounted, if you buy it at one time.100Set, the price can be lowered to10A set of yuan, "if the quantity is small, it is really not cheap, and the cost of collecting this information is also high."


Then, the other party sent two videos of opening mouth, blinking, nodding and shaking head recorded by others, saying"These are videos recorded by real people, verifying most of them.APPNo problem, it is higher than the dynamic video pass rate of photo processing. "

In a QQ group of more than 1,700 people, new people join every day to buy face recognition verification technology. screenshot


Most of the live verification videos come from "online part-time job"


A number of black sellers said that their development included borrowing money and making money on foot.APPThe information it sells comes from users downloading and registering these.APPCollected at the time, "most of these people are factory workers, and some network part-time workers."


However, these networks brush up part-time workers and don’t know what they are doing.APPWhen authenticating the list, it will reveal privacy.


Ms. Bai, from Shanxi, told the Beijing News reporter that she started to do some online part-time jobs such as brushing bills six months ago. Sometimes when the amount of brushing bills is limited, she will do some.APPA list of certifications.


Ms. Bai said that these orders need to scan the QR code provided by the other party to download.APPThen carry out real-name authentication. Most of the real-name authentication processes will allow uploading photos of the front and back of the ID card and face recognition, and then the registration will be successful. A list is probablyfiveYuan Dynasty (1206-1368)-15Yuan, some certification requirements are complicated and the price will be higher.


In the part-time billing, some only need to upload their names and ID numbers, so that each billthreeYuan, the price of face recognition may be more than ten yuan. Ms. Bai said, yesAPPIn face authentication, it will be easier to blink and shake your head a little, or the face will be closer.


"I didn’t expect anyone to collect personal information in this way, and I have never heard of anyone collecting dynamic videos of face recognition." Ms. Bai said that she just started to pick this up.APPWhen I registered the list, I hesitated when I encountered the verification of identity and face information, but later I felt that everyone in the group was taking orders, and I didn’t hear anyone say anything was wrong, so I started to do so.


The data leakage caused by part-time billing certification should be considered a minority. There have been media reports, there are80%The disclosure of personal information data is caused by employees within the enterprise.


Many black vendors also recognize this statement. Some vendors revealed that most of the photos of hand-held ID cards circulating in the market today were leaked during the brutal development of microfinance platforms and companies, and some of them were collected from various industries. This kind of information transaction and use will not be found under normal circumstances."At that time, many people borrowed money and didn’t pay it back. The platform took out this information and sold it. It was quite expensive at first, and now it is cheaper to resell it layer by layer."


In addition, today’s daily useAPPFace information needs to be recognized and collected on occasions such as entering and leaving stores, and some people collect information in the name of face recognition technology development and system testing.


In the network, the Beijing News reporter noticed that someone posted information about recruiting information collectors. The job content is to collect ID cards and face information in the countryside, and edible oil, pots and other commodities can be given as gifts.

A face recognition verification data package sold by a black manufacturer, including software and tutorials. screenshot


"Four-piece set" of black production circle


Compared with real-life video recording, it is cheaper to dynamically process the face in the photo to form a verification video through software.


threemoon31On the day, the Beijing News reporter passedQQGroup search by conditions, enter keywords such as "face" and "recognition technology" in the search box, and there will be many correlations.QQGroup. Reporters joined at random.sixindividualQQGroups find that members in these groups are from100Yu ren Dao1700The rest of the people wait, and new members join from time to time.


QQIn the group, from time to time, some people publish information about selling micro-signals and face-changing software, and at the same time, some people are consulting how to dynamically process the people in the photos and verify them through face recognition.


In addition, after the Beijing News reporter joined the group as a person who needed to buy face authentication technology and software,threeWithin an hour, many black information sellers added friends to reporters to understand the needs.


These black sellers said that they sell software such as photo matting and dynamic processing to make the characters in the photos open their mouths, blink, shake their heads left and right and nod up and down. After that, open it through a specific mobile phone."Plug-in" for face recognition, "We generally use it to verify WeChat,QQThere are more momos, and other software can also verify faces. "


threemoon31A merchant engaged in the sale of black goods was in hisQQSpace release news said that due to the upgrade of WeChat security verification, it has been unable to pass face recognition verification for the time being, and I am studying ways.fourmoonthreeThe merchant said that he had overcome the new security verification and could take orders.


In addition, these merchants also sell positive and negative photos of ID cards, photos of hand-held ID cards and photos with faces, which are commonly known in the black production circle as"Four-piece set", the price of each set is in0.5YuanzhithreeYuan is not equal.


When asked about the source of these photos, merchants began to be cautious during the chat. Finally, the Beijing News reporter said that there was a large demand for four-piece information, and a seller said that someone was specially responsible for collecting it, and he bought it from others and then sold it.

Personal information sold by black sellers, including ID numbers and photos. screenshot

Open "plug-in" software for face recognition


Whether it’s real-life video recording or photo dynamic processing, after completionAPPThe important tools for face dynamic verification are mobile phones and plug-in software.


The Beijing News reporter learned from asking black sellers that they spent money on second-hand trading platforms.200You can buy a second-hand brand with more than one yuan.R9Mobile phone, and then insert the brush package into the mobile phone.


partAPPIn the process of face recognition and verification, the screen will turn into red, yellow and blue to verify the brightness of the face, but the verification can also be completed by using relevant plug-in software.


"The purpose of brushing the mobile phone is to gain more rights to operate the mobile phone." For the principle of face recognition verification after photo dynamic processing, two black sellers said that whenAPPWhen you need to verify the face through the camera, cover the camera with your hand, and the "plug-in" of the mobile phone will start. By modifying the relevant data and settings, the dynamic face video prepared in advance will be imported into.APP, the authentication is completed.


"The pass rate of live-action videos is definitely high. The photo processing depends on talent. There is no guarantee that you can pass every verification. It depends on whether the dynamic video of your face is detailed. If the first verification fails, it will be verified several times, and it may pass later. " A black seller said that stealing other people’s informationAPPAccount registration and verification is illegal, and the state has cracked down hard, so I only sell software and teaching, and I won’t directly operate it.


According to the tip of the black seller, the Beijing News reporter spent500Yu Yuan bought an Android phone and a set of dynamic processing software and teaching, which were attached by the black seller.30Set of photos of the front and back of the ID card and the photo of the hand-held ID card.


In the actual experience process, according to the seller of black products, use a brand that has been brushed.R9Mobile phone, save the processed face dynamic video on this mobile phone and open it.APPIf you cover the camera with objects and make the camera in a black screen state, you can successfully pass the security verification.


The Beijing News reporter used this method and passed the face recognition on the platforms of exploration and Zhaopin recruitment.


The customer service staff told the Beijing News reporter that if personal identity information is found to be stolen, it can only be reflected to the platform after the user finds it. After that, the user needs to provide his identity information to the platform for review. After the review is passed, the platform will ban the authenticated account. They will give feedback on the vulnerability of face recognition authentication on the exploration platform.


The customer service staff of Zhaopin, Momo and other platforms all said that there is no good response to false face recognition at present, and the situation will be fed back later.

A black vendor sells real-life face recognition videos and bids for a set of 150 yuan. screenshot

Lawyer: It is illegal to sell face information privately.


There are many cases in which personal information is illegally used after being sold.


On the China refereeing document online, a criminal judgment about face recognition verification shows that from2018yearsevenSince January, defendants Zhang, Yu and others have used their personal identity information to register Alipay accounts for the purpose of making profits, and used software to make photos of citizens’ heads into citizens.3DAvatar, so as to pass Alipay face recognition authentication.


In this way, you can get the corresponding red envelope rewards (including the red envelope for inviting newcomers, the red envelope for general consumption, the red envelope for flowers, etc.) provided by Alipay for inviting new Alipay users, and each newly registered Alipay can at least get it.28Yuan income. As of the time of the incident, the gang illegally collected nearly2000Ten thousand pieces of citizenship information, using the personal identity information of others, successfully registered at least547A real-name Alipay account that has passed face recognition authentication, making a profit.fourTen thousand yuan.


Zhao Zhanling, a lawyer of Beijing Yunjia Law Firm, said that facial feature information of a person can directly identify the true identity of a specific natural person, which belongs to the category of personal information. It is illegal or even criminal to buy and sell personal information without the consent of the user.


According to the provisions of the Civil Code, citizens enjoy civil rights to personal information, and illegally collecting and selling other people’s information without their consent will constitute civil infringement. In addition, the Criminal Law Amendment IX stipulates the crime of infringing citizens’ personal information. Buying and selling highly sensitive personal information reaches a certain amount, which meets the criteria for filing a case stipulated in the judicial interpretation of the two courts. In this process, both the buyer and the seller are suspected of violating citizens’ personal information.


After the personal information of a natural person is illegally bought and sold by others, it is used for some illegal or even criminal acts, so he does not bear legal responsibility for it. However, proof is needed to prove that personal information was illegally obtained and stolen by others. There are many criminal cases concerning personal information, and public security organs arrest a large number of criminal suspects who infringe citizens’ personal information every year.



Beijing News reporter Liu Mingyang

Editor gan Hao

Proofread Junyan Zhang

Do you know that Mao Zedong has "three noes" when he talks and writes articles?

The general root of bad writing style mainly lies in formalism and bureaucracy. We should vigorously advocate the atmosphere of studying problems and create a relaxed environment that encourages telling the truth and advocating telling new words.

Effectively correct bad writing style and speaking style.

When talking about writing articles, Mr. Lu Xun once put forward "eight rules", one of which is: "Don’t write hard when you can’t write". Nowadays, some leading cadres are not only arty and boastful, but also have nothing to talk about, ramble and groan.

In some places and units, in some meetings, the department leaders talked about the leaders in charge, the leaders in charge talked about the chief officials, and those who have two chief officials should talk about both, and all relevant leaders should show their faces and make a sound; For work guidance, let alone go deep into the fields, listen to all kinds of opinions, and even rush to talk about opinions, make comments and make demands before the wheels roll and read them through the glass; Many experiences show that there is no secret trick, that is, to grasp and roll up the sleeves according to laws and regulations, but we must "dig" out some new ideas and "dig" out some new practices; During the discussion, some people didn’t have so many real feelings, insights and practical strategies, and some participants even "filled seats" temporarily, but they also "others said that they couldn’t help talking" … This kind of speech was made without rice, and it was just for posing and brushing the sense of existence, just like "so-and-so’s visit here".

"Hard writing" means "hard writing" and "hard speaking" means "hard speaking". Comrade Mao Zedong believes that speeches and compositions should not only be "shorter and shorter", but also be "softer and softer". However, some comrades now love the "table of contents" in their speeches and compositions. No matter what they write or say, everything is "unwritten". The big one, two, three sets the small one, two, three, and the content is all-encompassing, and everything is essential, but nothing is thorough. Some pursue the idea of neat confrontation, and even strive for similar words in paragraphs. They are full of conceptual words and four or six sentences, trying to dig out the word and the word, and don’t want to "matter" and "reason". When "water" is squeezed, nothing is left. As the saying goes, "When you grind the grain, you should grind the rice, and when you speak, you should make sense.". If you don’t talk about "reason" or "reason", you can’t even convince yourself.

Leading cadres can "talk hard", but the audience will not "listen hard". Although some people at the meeting arrived, they were absent-minded; It seems to be listening, but in fact the right ear goes in and the left ear goes out; Some meeting "regulars" simply put the materials into loose-leaf books so that they can "get it done" during the meeting. There are even some video conferences, which require all subordinates at all levels to participate at every turn. The superiors will open at different levels and the subordinates will accompany them at different levels, several times a week and several hours at a time. Who has counted this kind of "empty account"? If the audience refuses to listen, it is equal to through flow! Apart from those who listened to the meeting, they also suffered from those who wrote the manuscript. It is no exaggeration to say that the speech they delivered word by word is "a word of gold". What benefits can be produced in the end, no one can tell.

Leading cadres are "public servants" and the masses are masters. If a leading cadre thinks "what kind of person I am" in his bones, his master and servant are upside down and arrogant, it is inevitable that "I will talk if I want to, and you have to listen if you don’t listen". Leading cadres talk nonsense, preach empty words, and speak without words, just like Lenin criticized "a pile of useless garbage" to fill other people’s minds. Since you want to talk, talk something new, or don’t talk. The leading group of Chinese People’s Political Consultative Conference government organs once asked Deng Xiaoping to make an opening speech at the Fourth Session of the Fifth CPPCC, and he explicitly instructed: "No opening speech" because "there is nothing to say". We have to do the same. If we want to talk about it, we must talk about our own experiences and thoughts. To do this, we must study theory, go deep into practice, investigate and study, ponder over it repeatedly, and make careful preparations. We are not afraid of cooking oil with a light, and we will not hesitate to make a thorough study, and then we will speak it out or write it out.

?

?

Baidu hemophilia post bar was sold and questioned to see if the websites and forums in various countries were linked to money.

  Beijing, January 17 (Reporter Zhang Mianmian, Liu Le) According to the Voice of China News and Newspaper Summary, the National Internet Information Office recently interviewed the person in charge of Baidu for the prominent problems such as illegal information and chaotic commercial operation and management of Baidu Post Bar, and Baidu issued a statement again yesterday for comprehensive rectification.16-01-17 news and newspaper abstracts > > >

  Jiang Jun, spokesman of the Web Office, said that the China Internet Illegal and Bad Information Reporting Center recently received a large number of reports about Baidu Post Bar. After verification, it is found that some post bars contain illegal and illegal information such as political harm, obscenity and pornography, false advertisements, bloody violence, insult and slander, and disclosure of personal privacy, which seriously affects the physical and mental health of teenagers:

  Jiang Jun: The incident of "Baidu betrayed hemophilia" triggered condemnation from netizens. In addition, Baidu still has some harmful information problems, such as some search results are not objective and fair, and Baidu news hype exaggerates violence and terror, which undermines the normal order of network communication, harms public interests, infringes on the rights and interests of netizens and causes adverse social impact.

  In response, the National Internet Information Office ordered Baidu to take immediate and effective measures for rectification:

  Jiang Jun: At the same time, Baidu is required to strengthen its main responsibility, fulfill its social responsibility, strengthen internal management and self-discipline, and improve the information security management mechanism. At the same time, we also require the Beijing Internet Information Office to punish Baidu according to the principle of territorial management.

  On the 16th, Baidu once again made a statement about "hemophilia bar", saying that "this incident exposed our negligence in the commercial operation and management of Post Bar and neglected the voice of its friends" and "we are reviewing the internal decision-making and approval process, eliminating problems from the source and comprehensively rectifying them".

  The National Internet Information Office said that it will further focus on strengthening the daily supervision and management of online news information dissemination and various interactive platforms to promote the healthy and orderly development of the Internet news information service industry. Netizens are welcome to continue to supervise and report illegal and bad information on the Internet, and jointly promote a clearer cyberspace.

  (china national radio has launched a news hotline 4008000088. Call the hotline and you will get the news clues in your hands as soon as possible. We will send reporters to investigate the incident, report the facts and uncover the truth at the first time. )

After 1995, the "Ji Hua Township" Rap sang the lion-awakening culture.

  Young people like to Rap, so in the ancestral temple, what sparks can be generated by singing Foshan lion-awakening culture with rap? A few days ago, an original Chinese-style hip-hop rap MV named "Ji Hua Township" became popular among the friends of Foshan university students.

  It is a group of students from Foshan University of Science and Technology who produced this MV. They are not majors in music and photography, but with the pursuit of their dreams, it took them about 20 days to complete their works from arrangement and lyrics, filming and post-production.

  What’s the story behind the MV? Just follow the footsteps of reporters and have a look.

  The lyrics of Foshan’s ancient songs are used to express homesickness.

  This year, more than 600 works from Foshan were selected in the Guangdong Rural Micro-Video Competition sponsored by the Propaganda Department of the Provincial Party Committee and the Guangdong Learning Platform, a "learning power", ranking first in the province. Among many works on Lingnan culture, beautiful scenery and food, Ji Hua Township is a hit.

  "Gold-plated eyes and silver teeth, wearing a lion with pawed hoofs and boots, waking up the lion and playing gongs and drums, watching me climb over the air and show my fists and feet … …” Turn on the video, and a Rap with a strong sense of rhythm runs through the song "Ji Hua Township". Several young people used a few figures to show the blood and rhythm of Foshan lion dance culture. In the MV, there are also "Foshan Images" everywhere.

  It is a group of students from Foshan University of Science and Technology who made this MV.

  When talking about the inspiration of the MV name "Ji Hua Township", Liu Hudong, a MV planner who is quite interested in history and culture, explained, "Foshan, formerly known as Ji Hua Township, has ‘ Originated in Jin, it was named after Tang ’ The allusion. " Taking this ancient name, they hope to reflect young people’s yearning for Foshan’s traditional culture. Although the name itself does not show how fashionable it is, they have integrated the trend elements through content and expression.

  A melodious flute started the MV, and the beautiful guzheng sounded. Three girls dressed in Hanfu danced, honked or plucked the strings, and immediately brought their thoughts back to the ancient hometown of Ji Hua. When the camera flashed, two young people dressed in hip-hop costumes sang Foshan culture as if they were traveling back to the old times, with a handsome posture.

  The lyrics of "Ji Hua Township" are full of Foshan elements, including the familiar place names "Zhangcha Street", "Ancestral Temple" and "Shiwanchang", as well as elements such as Cantonese opera stage, Foshan copper chiseled paper, grey sculpture and traditional musical instruments. In addition, the MV scene also carefully selected the ancestral temple, Tongji Bridge, Kuixingge, Nanfeng ancient stove and so on.

  Carrying a guzheng, wearing a coat and singing in the scorching sun at Kuixing Pavilion.

  From recording, shooting to post-editing, the whole MV took only about ten days to complete. When you open the MV, if you look closely, you can find that although the MV is shot in places with many tourists, such as the ancestral temple and Nanfeng ancient stove, there are few pedestrians walking through the picture. Liu Hudong unveiled this secret: after the planner stepped on the spot in advance, he found that there were fewer people in the morning, noon and working days. "In order to shoot ‘ Clean ’ In the shot, we got up at 4 o’clock in the morning, solved the breakfast on the roadside, took props and photographic equipment and rode on the bicycle and went straight to the ancestral temple. " While recalling, Liu Hudong pointed to the MV on the mobile phone and introduced, "This shot just captured the sun at 7 o’clock in the morning, and the light poured down from the door of the ancestral temple, which was very beautiful." When shooting, citizens and tourists pass by from time to time, and some people even stop with interest to watch them sing and shoot with their cameras.

  What moved the creative team was that the scenic spot managers and the non-legacy team were very cooperative and provided a lot of help and support after learning that this class of college students came to publicize and carry forward Lingnan culture.

  Getting up early to shoot is not the ultimate challenge in shooting. There is a scene in the MV in which a girl dressed in ancient costume plucks a zither in Kuixing Pavilion in Guicheng. At that time, the team members carried the guzheng to Kuixingge without saying anything. Not only that, the shooting was in the middle of October, and the temperature was high. Wu Yiyuan, the lead singer, still had a lingering fear of the hot weather at that time. "Wearing summer clothes such as short sleeves will make the characters photographed thinner, so we chose to wear a coat to make the lead singer’s image more layered. So we shot in the hot sun, sweating while shooting, and making up our makeup. "

  Exploding melody makes people love visiting historical sites and singing homesickness.

  Why do you want to sing hometown by rap? Wu Yueming, the MV planner and person in charge, said that he had previously paid attention to the Guangdong rural micro-video contest. "At that time, I thought, why not combine the team’s expertise? We should create what we are good at. "

  Wu Yueming’s team refers to his Siye Cultural Media Studio. This studio was formed by the merger of 444real Music Team and Shadow Photography Team of Buddhist Academy. In order to achieve good results, Wu Yueming invited the well-known music singers Wu Yiyuan and Lin Zhifeng to compose and write lyrics. The two singers finished writing music before the end of the 11 th holiday this year. With a good song, the team members used their spare time to start an orderly production. In private, the team often observes and studies the original music works of bands from other universities in Guangdong. Wu Yueming said, "There are bands in many colleges and universities, but most of the works are campus life. Some of them choose free songs on the Internet, which lacks originality. Some rap is too flashy and is not conducive to singing." To this end, they created catchy rap clips that the public liked. After listening to the music, many students said that the melody was constantly swirling in their minds, which was too burning. According to reports, Liu Hudong and Wu Yueming always go to various scenes to step on the spot after confirming that traditional cultures such as lion dance and paper-cutting can be added to the video.

  During the filming of the MV, these young college students also visited a number of cultural sites and intangible cultural heritage museums and had a dialogue with a number of cultural craftsmen.

  The younger generation regards the role model as a team to apply for entrepreneurship.

  After the publication of the work, the Foshan Propaganda Department specially contacted the school and praised the creative team of Ji Hua Township.

  Dong Lijun, a teacher of lines and pronunciation in the music department of Foshan University of Science and Technology, said with emotion after watching the work, "The MV" Ji Hua Township "is fashionable, melodious and easy to sing. The lyrics write out the unique understanding of young Foshan people on Lingnan traditional culture, and the language is very contemporary, which naturally blends tradition and trend and shows the fresh vitality of Lingnan traditional culture."

  In the creative process, the team members hold the original intention of promoting Foshan traditional culture and devote themselves wholeheartedly to the video shooting process without compensation. To this end, the creative team believes that this is a like-minded work created by students across colleges, majors and grades. After reading "Ji Hua Township", many Buddhist college students were surprised that their brothers and sisters could make such excellent works and follow their example.

  A few days ago, Siye Studio declared the school’s entrepreneurial project, hoping to create a number of new media works integrating video production and music creation. For this group of entrepreneurial "little rookies", teacher Hong, the instructor of the college, said that the school business incubation base (Business Valley) has been transformed, combining business training, business incubation, business guidance and business services, and constantly refining and standardizing the management service process, which will provide a good workspace, cyberspace, social space and resource sharing space for Siye Studio.

  Reporter’s Notes: Traditional Culture+New Media College Students’ Entrepreneurial Road

  By chance, the author clicked on the voting page of "Guangdong rural micro-video". In the massive documentary, a MV work of college students in Foshan attracted the author’s attention.

  Foshan culture is endowed with Chinese Style melody and brisk and cool rap style, supplemented by rhythmic and rhythmic shooting pictures. The author decided to "get to know" this amazing student team.

  The student cadres of the school sent a circle of friends to find people that night and quickly found the main creative team. After several conversations with team members online and offline, the author discovered that this video was actually made by a group of students in their spare time in the past 20 days, and they were not students majoring in music and photography, but from management and design. They used all the props and contacts that could be mobilized, and hired classmates as actors and makeup artists. The whole work was filmed at a cost of only a few hundred yuan … … The four years of college have provided them with a space to display their talents and develop their interests, let them meet like-minded partners, and given them the strength to pursue their dreams bravely.

  One and a half years after graduation, the author re-entered the school as a media person and found that the campus is still the most vibrant space: the post-1997 and post-1998 students have strong enthusiasm and pride in their hometown traditional culture, which they call "national tide"; Facing the development of new media industry, I can talk about Kan Kan anytime and anywhere; I will also talk proudly about my goals and ideals … … At the same time, schools and teachers not only preach and teach, but also always pay attention to students’ practical ability and employment development, and provide entrepreneurial support to protect the future of graduates. (Text/Guangzhou Daily All-Media Reporter Mai Yiwen and Feng Jiamin Pictures provided by respondents)

  Lyrics excerpts

  I live in Ji Hua Township,

  Shiwanchang, ancestral temple in Zhangcha Street,

  The plan can’t keep up with the rapid change,

  I stepped on my mobike in Ji Hua Road,

  Okay, hang on, take a closer look, no guesses,

  Eating and walking in the street, playing with slippers,

  At the age of 18, I started a new brand.

  I know this about Foshan what I like… …

Tank 300 configuration comparison! The entry configuration is good!

(|) was officially launched not long ago. Since the Great Wall WEY released this car, the attention of Tank 300 has been increasing. After all, in the current off-road market, it is really not easy to have a car that the people can afford, the configuration can keep up, and the off-road performance can be hard-core. Presumably, everyone has a basic understanding of the tank 300. In this issue, we will compare the three configurations released by the tank 300 to see which configuration is more suitable for you.

Home of the car

Before introducing the configuration differences, let’s make a simple understanding of the platform of Tank 300. Tank platform has five characteristics: globalization, intelligence, modularization, high reliability and high flexibility. It is a professional off-road platform that WEY brand spent 20 billion yuan and took 5 years to build. Its biggest advantage is that it has the most powerful power combination at the same level, hard-core off-road ability and intelligent off-road mode. As the first product of the tank platform-Tank 300, it can be said that it has enjoyed all the favor.

Home of the car

Tank 300 has launched three models: Explorer, Challenger and Conqueror. As a vehicle with both off-road and urban driving, let’s compare their comfort configurations first.

Home of the car

Home of the car

To tell the truth, the dual 10.25-inch screen equipped in the basic version is enough, but in the challenger version, it has been further upgraded. Automatic single-zone air conditioning has also been upgraded to dual-zone air conditioning, and skylights, ambient lights, front seat heating and lumbar support massage in the main driver’s seat have been added. Among the top models, the upgrade of the seat to NAPPA leather seat is more outstanding, and the Infinity brand audio is added, which can bring better hearing enjoyment to your journey.

Home of the car

The entry of tank 300 is high, not just talk. LED headlights, keyless entry, one-button start and other functions are all standard in the whole system. If you have higher requirements for urban driving experience, you can increase 20,000 to buy mid-range models, such as ACC adaptive cruise, lane departure warning and lane keeping auxiliary functions. As for the top version of the traffic jam assistance and intelligent dodge function, it depends on whether you have these additional functional requirements.

Home of the car

In terms of safety configuration, all the necessary safety configurations in the basic model have been given. Side airbags, anti-collision radar, 360 panoramic system and transparent chassis have been added to the challenger model.

Home of the car

As can be seen from the above table, only from the basic model, the standard off-road configuration is rich enough. Equipped with an electronically controlled part-time 4wd system with central locking function, it supports nine driving modes such as two-wheel drive standard (2H), four-wheel drive standard (4H), four-wheel drive snow (4H), 4L (standard, bumpy road, sediment, mountain and rock) and expert function. In addition, two highlight configurations, such as tank turning and crawling mode, are given to everyone in the basic version.

Home of the car

Another advantage of tank 300 is that there is no strict vehicle type restriction for optional configuration. The lowest model can also be freely equipped with the corresponding off-road configuration.

Home of the car

Home of the car

For pure off-road enthusiasts, Xiao Bian is more recommended to start with the Explorer basic model, and the complex electronic system configuration often represents a higher failure rate. Especially in extreme environments such as wading, extreme cold, high temperature and sandstorm, it is economical and hard to choose the lowest vehicle type, spend 14,000 yuan on the front and rear axle differential lock and put on AT tires.

Home of the car

If you pay more attention to the road driving texture and comfort experience, then the challenger in the match is your best choice. The difference of 20,000 yuan adds a lot of driver assistance configuration, multimedia and security configuration, which is more cost-effective. As for the top model of conqueror, it depends on your requirements for luxury experience.

The above is a brief introduction to the configuration of three models of Tank 300. If you are interested in this car, you may wish to click the [Get Bottom Price] button in the picture above to have a test drive in the offline 4S shop.

Stick to the essence! Test drive the Land Rover 07 Defender

  It would be quite unfair to try to place () in a class relevant to its competitors: like the Caterham Seven, Bristol Blenheim or Morgan Convertible, it is a survivor from another era, an anachronistic car whose rationality makes no sense at all, yet somehow fascinating. The Defender’s history goes back to the original I Series in 1948, and virtually all its parts have been replaced, but the basic principles have not changed. This is an OurHours four-wheel drive car suitable for heavy-duty tasks, not for the casual lifestyle of the Academy route.



『展示越野特性的07款路虎卫士Defender』


  These 2007 updates are the most authentic overhauls in many years. They bring an all-new 2.4-liter diesel engine and 6-speed manual transmission, plus an improved cooling and ventilation system, a higher engine cap to accommodate the engine, a new overall dashboard and new seats. There are also 14 different body styles to choose from: 90-inch, 110-inch and 130-inch with hard roof, station wagon, four-door double-row (crew cab) or pickup models, with up to 7 seats, and can also be converted into an ambulance, lifeboat carrier or other special needs.



『展示越野特性的07款路虎卫士Defender』


  价格从18,465英镑起,在这个范围内从一个车型到另一个车型平均每种增加400英镑。


  路虎很有理由为Defender被全世界的救援单位、高山救援队和冒险家使用而感到自豪。然而,包括联合国在内的很多组织更愿意选择或(LANDCRUISER),它们能提供更高的可靠性以及更大舒适性。



『展示越野特性的07款路虎卫士Defender』


  在大多数的可靠性与消费者满意度调查中,路虎得到的分数都不理想,虽然一般耐用的Defender是它比较出色的表演者之一,主要是因为它很少会因为复杂的电子和电动系统而出错。开发于英国达格南、组装于南威尔士Bridgend,而且特别适应卫士要面对的艰苦的行车条件以及质量多变的燃料,新的福特发动机应该比有问题的旧式Td5更具可靠性。



『展示越野特性的07款路虎卫士Defender』


  以越野车和多用途车辆受到了没有瑕疵的信任。“遗产”在汽车制造业中是个很被唾骂的名词,但卫士是为数不多能够坚持这一名词的权利的车。它也是一个古怪的无阶级“人士”:虽然通常会与搜救和紧急派遣相联系,但卫士也是一位真正的工人阶级工具,尤其是以皮卡车的形式,有绿色长筒靴、斜纹软呢帽、灯芯绒裤子和黑色拉布拉多猎狗可随意选择,但在中它的确显得不协调。



『展示越野特性的07款路虎卫士Defender』


  对卫士的爬山能力、艰难的穿过泥泞、涉渡河流(深500毫米)或穿越沙漠的能力是没有怀疑的,不过,当涉及到路面行车,它就真的显现出了它的年龄。新型变速箱是在旧款5档变速箱基础上一个巨大的改进—你会有更多的希望明确的找到一个档位,而且制动也变得更敏锐了,但转向角很大,所以它不是能最轻松对付狭小位置的车。离合器操作起来比较容易,长途旅行中不会让腿酸疼,但是,高/低传动比传动箱仍旧是个像猪一样愚蠢的东西,除非你能掌握使用它的技巧。


Shandong has detected 15,500 cases of electric fraud and related crimes this year and arrested 30,800 suspects.

  The newspaper reported on December 13th that the Information Office of Shandong Provincial Government held a press conference today to introduce the situation of cracking down on telecommunication network crimes and protecting the legitimate rights and interests of the people in Shandong. Since the beginning of this year, the province’s political and legal organs have continuously pushed forward the work of cracking down on telecommunication network fraud and related crimes, detecting 15,500 cases of electric fraud and related crimes, arresting 30,800 criminal suspects, avoiding the loss of 2.88 billion yuan for the masses, and achieving a double decline in the number of cases and losses in the province.

  Intercepted 20.947 million fraudulent calls and 21.561 million fraudulent text messages.

  Our province strengthens the integrated operations of provinces, cities and counties, digs gold owners, shovels dens, fights back, and cleans up black production, and continues to launch a fierce offensive against electric fraud crimes and black ash industries. Further improve the supervision mechanism for listing major cases, promote breakthroughs in cases with a million yuan or more, and arrest 2,447 criminal suspects. Organized and carried out special actions such as "Yun Jian", "Cut off the card", "Cut off the flow", "Pull out the nails" and "Summer Action", cracked a large number of important cases, prosecuted more than 25,200 suspects and sentenced 5,243 people. A dynamic identification model of fraud-related information was established, and a centralized battle against telecommunication network fraud was launched. 598 criminal dens were destroyed, 6,935 suspects were arrested, and 5.452 million yuan was seized and frozen.

  Construct "beforehand — In the matter — After the event, the closed-loop prevention and control system will strengthen the ability to find, dispose and intercept capital flow, communication flow and network flow, promote the financial and communication departments to continuously optimize technical countermeasures, improve the emergency disposal mechanism of funds involved, intercept 20.947 million fraudulent calls and 21.561 million fraudulent text messages, and block 14.2213 million fraudulent apps and websites, so as to prevent the occurrence of cases to the maximum extent and reduce the losses of the masses. The early warning objects were dissuaded and reminded by classification, of which 1.479 million were dissuaded in depth, and the success rate of dissuasion reached 99.8%. The cases of students, the elderly and financial personnel being cheated in the province decreased by 17.7%, 13.3% and 26% respectively.

  Keep a close eye on industry governance and ecological governance, improve the "full chain governance" mechanism, and eradicate the breeding ground for crime from the source. We continued to optimize the dynamic management and control mechanism of the "two cards" (telephone cards and bank cards) involved in the case, established low, medium and high risk assessment grades, and carried out disposal work by classification. The "two cards" involved in the case decreased by 15.9% year-on-year, which was 7.2 percentage points higher than the national average. It is the first in the country to share the characteristic data of black and gray terminal equipment, base stations and traffic behaviors involved in the case, carry out dynamic identification around the whole life cycle of fraudulent phone cards, and automatically screen and shut down more than 2.579 million fraudulent phone cards. Strictly implement the network user real-name registration system, establish a monitoring and early warning mechanism for network accounts, implement the authentication of real identity information according to law, and shut down 67,000 fraudulent QQ and micro-signals.

  In the next step, our province will carry out a three-year campaign to crack down on telecommunication network fraud and illegal crimes. Focus on promoting the "cut-off" action and continuously carry out the work of returning overseas electric fraudsters. Accelerate the optimization and upgrading of the telecommunication network fraud prevention platform, improve the early warning and alarm response mechanism, and minimize the occurrence of cases. Promote the establishment and improvement of a joint disciplinary system; Accelerate the construction of cross-industry collaborative governance system, promote the data interaction of telecommunications, finance, Internet and other industries and departments, optimize the function of the "two cards" dynamic management and control platform, improve the sharing mechanism of black and gray samples, and enhance the governance capacity and level of "capital chain".

  From January to November, the courts in the whole province tried 8349 cases of the crime of helping the letter with related crimes.

  From January to November, the provincial courts concluded 1,319 first-instance cases of telecommunication network fraud and sentenced 2,185 defendants. We tried 8349 cases of related crimes helping information network criminal activities, and sentenced 10750 defendants. 3,794 cases of crimes committed by concealing and concealing were tried, and 5,778 defendants were sentenced.

  It is worth noting that ordinary people should pay attention to and prevent telecommunication network fraud, not only to avoid becoming victims, but also to avoid becoming accomplices or even criminals because of their weak legal awareness. For example, ordinary people may commit crimes related to telecommunication network fraud, such as helping information network criminal activities, covering up and concealing what they have sinned.

  The crime of helping information network criminal activities, referred to as the crime of helping the letter, has grown very rapidly in recent years, and has become the second most criminal case in our province after the crime of dangerous driving from the perspective of trial. This kind of case is mainly about the actor renting or selling his "two cards" to others for use, and earning commissions after collecting money for telecommunication network fraudsters. Two cards mainly refer to mobile phone cards and bank cards. In this kind of crimes, defendants aged 18-35 account for about 80%, of which 18-25 accounts for one third, and most of them have no stable occupation and economic sources. Therefore, we should be careful not to covet petty profits, not to illegally buy, sell or rent "two cards", accurately identify electronic fraud, and resolutely refuse to participate in fraud.

  In the face of new types of fraud such as AI face changing, how to take precautions?

  What’s the new change of new crimes in telecommunication network recently? First, it is more confusing. For example, counterfeit videos made with AI technology. Second, the means of committing crimes are more complicated. Cross-platform features have become increasingly prominent, and fraud has become more subtle. Third, it is more difficult to strike. The division of fraud crimes is more detailed, and cross-border attacks, evidence review, and recovery are facing practical difficulties. Since the beginning of this year, the province’s procuratorial organs have fully performed their criminal procuratorial duties, persisted in cracking down strictly according to law, approved the arrest of 1,144 people for telecommunication network fraud, prosecuted 2,049 people, approved the arrest of 1,022 people for helping information network criminal activities, and prosecuted 9,679 people.

  How to take precautions? Do "three noes" in daily work and life. One is not credulous. Don’t trust calls of unknown origin, such as impersonating public security law, customer service, leaders, relatives and friends. It is necessary to verify the identity of the other party through official consultation, personal phone call and face-to-face confirmation. Even if they have been contacted by video or voice, they should be verified by other means. The second is not to click. Don’t click on any unknown web link, don’t scan any unknown QR code, and don’t install any unknown APP software. The third is not to transfer money. Don’t send money or transfer money to strangers, especially don’t join strange QQ groups, WeChat groups and share screens at will, and don’t enter account passwords according to the instructions of people in the group.

  With the increasing crackdown in China, telecommunication network fraud gangs have moved overseas, confusing the masses under the guise of overseas high-paying recruitment. Remind everyone, especially the youth group, to choose a formal labor service company carefully and sign a standardized contract when going abroad to work, and don’t be blinded by high salary. For those who fall into the wrong path and fall into illegal and criminal activities because of a moment of confusion, they should immediately pull back from the brink and take the initiative to surrender.

  In addition, there are cases in our province where criminals use express delivery, online car rental and freight cars to transport cash, gold or other valuables that can be easily realized, and implement "online fraud+offline withdrawal". Call on the majority of couriers and drivers of online car freight cars to be vigilant, and report to the public security organs immediately in case of suspicious circumstances such as transporting valuables or unknown parcels, frequently changing delivery locations, and abnormal behavior of the recipients.

Rulu, the original 41-year-old "no one dares to marry", once again made the entertainment circle sit up and take notice.

All the information in this article comes from reliable sources, and will be repeated at the end of the article.

Shallow text

Edit | Shallow

The 20-year-old beautiful girl "Mu Wanqing" is in sharp contrast with the 28-year-old arrogant "Hua Fei".

Rulu has been in the entertainment circle for more than 30 years, and she has played many classic roles.

Even Tamia Liu, who holds the Magnolia Golden Eagle Award, will feel lack of confidence when confronting Rulu.

"I must admit that her acting skills are better than mine."

Even director Zheng Xiaolong, who has experienced countless actors’ elegant demeanour, also praised her unparalleled acting skills.

She is the best actress in the TV series Empresses in the Palace.

However, this highly acclaimed actor has become an exception in the entertainment industry.

Her friends broke up with her and her boyfriend left her.

So far, 41-year-old Rulu is still struggling alone.

No close friends and partners.

Why is Rulu so evaluated by netizens? What is the truth?

Being outspoken leads to trouble.

"Rulu is a bit silly. He doesn’t know when he has offended others."

Tamia Liu accurately pointed out the problem of Rulu, and a sad experience of the past also emerged.

Although the two had met in "Eight Dragons".

However, it was not until 2015 that we filmed Ode to Joy that we became real friends.

Off-stage, they are close sisters.

Tamia Liu’s husband received the same treatment outside the play, which made him jealous.

Why don’t you take me with you when you travel?

"What did you do?"

Although the husband is shouting "need attention".

Tamia Liu continued to "show love" with Rulu as if nothing had happened.

Today is a couple’s backpack, and tomorrow you need to send 999 roses.

The sisters are like a couple immersed in love, which makes others envy them very much.

Onlookers also formed "Taoxin CP" with great interest to cheer for their sisterhood.

As time went on, Tamia Liu became more aware of Rulu’s temper.

"She lacks emotional intelligence and often annoys people with one sentence."

Hear good sisters say this, Rulu not only not angry, but also agreed.

"She and I just make up for each other. My emotional intelligence is low and her IQ is high. Her emotional intelligence is high and her IQ is low."

The true sisterhood is mutual tolerance and understanding, which is really touching.

However, no one expected that this deep sisterhood was destroyed by Rulu himself.

In 2017, a famous entertainment reporter named Zhuo Wei exposed a secret on the Internet.

Name an actress’s misconduct and her personal morality.

Because Zhuo Wei mentioned that Tamia Liu was a married actress, netizens on the Internet started discussions and had different opinions.

This matter is just the self-entertainment of netizens. If it is not handled, it will pass.

Rulu’s answer, however, caused an exaggerated response to this matter.

Perhaps to counter Zhuo Wei’s malicious attacks, Rulu angrily reprimanded him on social platforms.

If she shows up, isn’t it obvious to prove that she is the person who has no silver here?

Although it is not clearly pointed out, you are speculating yourself.

Being victimized by "pig teammates", Tamia Liu felt speechless.

She stopped paying attention to Rulu’s movements on social platforms and completely cut off contact with her.

Even if they have to be separated because of work needs.

They are like strangers, ignoring each other.

In fact, it’s not the first time that Rulu has offended others by speaking freely.

In 2012, when Empresses in the Palace carried out propaganda, Rulu made Sun Li furious, which frequently caused the dissatisfaction of "Niangniang".

After Sun Li introduced herself, Rulu began to pose as a "Hua Fei".

"Rude woman, before I spoke, you spoke first."

After Sun Li’s victory in the game, Rulu also put down the "malicious words".

"That woman is really better than me."

Although Rulu was attracted by the role, he was occasionally criticized.

Sun Li was obviously very angry about this.

I don’t know if you mean me or Zhen Xuan.

It has been more than 30 years since Rulu debuted, but I don’t know how many people have been offended by "low emotional intelligence".

Lost a lot of resources.

However, Rulu’s "true temperament" brought good luck, but it also set her on another bright road.

Firmly self

"No one dares to mess with Rulu. She is not a big mouth to mess with."

Han Hong’s statement is correct. Rulu is famous for his boldness in the circle.

Chen Jianbin mentioned that she was getting old, but she said ironically that it was to match him.

Zheng Xiaolong said that she was not fit to play the role of "Hua Fei", so she went directly to Zheng Xiaolong to ask questions.

"Why don’t you let me play? How do you know that I am not strong enough? "

It is Rulu’s "indifferent" attitude that makes the corner of "Hua Fei" so colorful.

Rulu is very straightforward. She dares to express herself and fight for her rights.

In 2014, Han Hong organized a group of stars to participate in a love activity.

Because many stars want to use Han Hong’s fame or reputation to promote it, they will join this activity.

They usually pretend to go back, but Rulu is different.

Rulu always carries boxes himself when distributing medicines.

In the second year of activities, Rulu appeared again.

She dressed simply and did her job dutifully like an ordinary volunteer.

Rulu was the only one at the scene who knelt down with Han Hong to thank the devotees.

Continue to provide funds and efforts, year after year.

She called Rulu a good brother and treated Rulu as a relative.

For other stars, they will definitely disclose the news of their activities so that everyone knows.

However, Rulu remained silent about the activities.

I help others to participate in activities, not out of personal fame and fortune.

Rulu is famous for his pure style of doing things, but also for his honest and upright character.

Since 2009, she has been in public contact with Ye Zuxin, and during the whole love period, she has never had an affair with any actor.

Although in 2015, his breakup with her was so regrettable, when Ye Zuxin was in the tide of public concern;

Rulu immediately issued a voice of support.

"He is a reliable person, definitely not like the’ heart breaker’ that netizens said."

Jiang Xin is really a "decent person" because he did such a bad job as an ex-girlfriend.

Do what you want to do and say what you want to say.

Even though she received many cold eyes in this circle, she still stuck to her original intention.

Jiang Xin is full of confidence because her acting skills are her greatest backing.

An actor’s duty

In Empresses in the Palace, Rulu is considered to be the most capable actress.

Rulu’s acting shows her ability to beat many powerful actresses such as Sun Li and Ada Choi.

Her "Hua Fei" not only won the recognition of the director, but also was irreplaceable in the hearts of the audience.

"For the first time, I have a feeling of not being disgusted with a villain."

When "Hua Fei" hit the wall, the audience felt distressed because of Rulu’s interpretation, and felt aggrieved about the experience of the villain "Hua Fei".

Rulu played many classic roles, except "Hua Fei".

Before The Legend of the Sword and the Chivalrous Man was broadcast in 2005, she played two roles in it, which was a great success and therefore became the focus of attention.

"Nvyuan" is a thousand-year-old fox demon, who selflessly gave everything for love.

The girl "Jiang Waner" is also a ignorant person.

In the same year, she played the role of Four Princesses in the movie "The Seven Fairies with Joy" and became the childhood idol of countless people.

At that time, Rulu was only 22 years old, and he was able to perform various roles.

Rulu graduated from Henan Art Vocational College, and her background may not be as good as that of other professional actors.

However, there is no denying her acting talent.

In the TV series Ode to Joy, Fan Shengmei is a self-reliant and complicated character.

The simple and tenacious image of "Tao Yuling" in The Stalker is unforgettable.

Rulu played one authentic role after another.

When Flame was broadcast on August 13th, she once again played "Xinyuekui", the source of mysterious power.

Although some viewers thought the styling was strange, no one doubted her acting skills.

Rulu can’t choose his own role, but he has been playing the role of an actor.

"Every role is very important, and I will go all out to treat every scene."

tag

In the hypocritical social circle, Rulu’s "low EQ" seems out of place.

However, some people in the world like her outspoken personality and appreciate her sincere personality.

With acting skills, Rulu believes that no matter where she goes, she will be appreciated by the audience.

The young man described how to finish the task and showed his achievements. He emphasized the importance of social responsibility and advocated positive values. Please note that the description and pictures are all from the Internet, and their purpose is to convey positive social energy and avoid vulgar or immoral content. If copyright or character infringement is involved, please contact us in time and we will delete the content immediately! If there is any doubt about the content, please contact us and tell us that it needs to be deleted or changed.

Source of this article

Personal information about Rulu in Baidu Encyclopedia

Rulu said that she is not "Fung Wong-Nui" and has never felt that life is hard. 」

Editor in charge:

Revealing the Secret of Personal Information Selling Chain: Express Warehouse Bank employees become accomplices.

  If you want other people’s personal information such as loan records, express address and real-time positioning of mobile phones, as long as you ask for it in the QQ group, someone will respond. Buyers can get these accurate and private personal information after transferring transactions through WeChat. In May this year, the police in Heze, Shandong Province cracked a customized case of selling personal information, arrested 29 suspects, including 2 bank employees, 1 employee of a courier company and 1 employee of a telecommunications company, and found out that the funds involved were more than 5 million yuan, and the personal information of the trading citizens totaled more than 2 million pieces.

  □facts of a legal case

  Trading personal information in QQ group

  "The initial clue was found in the QQ group, with a dozen QQ groups and the largest number of people reaching 2,000." According to the police investigating the case, there are buyers and sellers of personal information in these QQ groups, and there are many middlemen. "As long as someone puts forward a demand, someone in the group will respond, and the two sides will talk privately to make a transaction." The police investigation found that a man named "Maitreya Buddha" was a middleman who traded more, so the police began to investigate from him.

  "Middlemen are two-way dealers. They are in contact with many data sources, and information is usually increased by multiple middlemen." A price list of personal information seized by the police from "Maitreya Buddha" shows that flight records, personal bank flow (details) and mobile phone positioning information can be inquired, and the price ranges from several hundred yuan to several thousand yuan.

  The police investigation found that the real identity of "Maitreya Buddha" is Ma, who lives in Dongming County, Heze City and uses mobile QQ and WeChat to contact business. By collecting Ma’s bank transaction records, the police found that his family was a person named "Tiantian".

  Where did the data of "Everyday" come from? With the deepening of the investigation, a huge trading network with a data source and multiple middlemen has gradually surfaced.

  The courier company is in charge of the mole.

  Zhang Renju, a policeman handling the case of the Netan detachment of Heze City Public Security Bureau, said that "Tiantian" is a well-known middleman in the circle who buys and sells personal information, and is well known by people in the circle because it can provide a variety of complete sets of personal information.

  "This is a black industrial chain formed by the source of internal ghosts, middlemen and illegal users." Zhang Renju introduced that most of the suspects at the source used their work to find out the personal information of citizens and then sold it to middlemen. After repeated price increases and reselling, this information flowed into the hands of suspects who committed crimes such as fraud and cyber theft.

  The police investigating the case said that "Everyday" has been in the circle for three years and has contacted many data sources. Starting from "Everyday", the police seized seven data sources, including two employees of the bank, one employee of the courier company and one employee of the telecommunications company.

  "The credit information that was resold flowed out from two bank employees." According to the police handling the case, the investigation found that the credit information flowed out from two employees of Zhujiang Village Bank in Xinyang City, Henan Province, Zhen and Zhang. Express information flowed from Wang, a warehouse manager at SF Express Shanghai Station, and the mobile phone location information was because Chen Mou, an employee of best tone Company, sold the query password.

  According to the police handling the case, internal employees of financial institutions can inquire about personal credit information. In addition to the credit information, the suspect provided others with a screenshot showing that the bank "ghost" inquired and sold bank customer information such as personal asset scale, credit rating and bank account balance through its banking system. Best tone has an inquiry and location service, and the suspect Chen Mou has the password, and he sold it to others. Ma’s price list shows that "Unicom positioning: 270 yuan/time, telecom positioning: 450 yuan/time, mobile positioning: 580 yuan/time".

  On May 13th, the police of the task force began to make arrests, and moved to 13 provinces and cities including Beijing, Guangxi, Guangdong and Sichuan to carry out centralized arrests of the suspects involved. After more than three months of work, the data source and middlemen were caught in the net. In the end, 29 suspects, including Lou and Ma, were arrested and a number of criminal chains that violated citizens’ personal information were destroyed.

  Bank employees sell credit information

  The 24-year-old Zhen was originally the account manager of Zhujiang Village Bank in Xinyang City, responsible for the loan business, and his girlfriend Zou was also arrested. Zou just graduated from college in July this year and is responsible for soliciting business. Zhenmou can obtain credit report and depositor information in the credit information system and banking system, and each piece of information can be sold at prices ranging from 20 yuan to 40 yuan.

  I am in charge of the loan business, so I am the only employee in the department who can check the credit information system. Zou said that Zou knew his work business and found him to help check some people’s credit information. "She said that a friend is doing small loans and wanted to help check some customers’ loans. I didn’t expect to check more and more later."

  After Zou left the bank, Zou also asked him to help check the credit information, and Zou found his colleague Zhang to help. Zou said that they used the work gap to check this information. According to the regulations of the bank, they could not check it until they got the authorization from the customer, but none of the information checked by Zou was authorized. According to the police, Zou and Zhang inquired about more than 2,000 credit information before and after, and each earned tens of yuan.

  "A man named Niu Niu added me after he learned about my WeChat from a friend. He said he wanted to find Lao Lai, gave me his mobile phone number and asked me to check the express address, and gave me 30 yuan each." Wang is 25 years old and used to be a warehouse manager at SF Express Shanghai Station. Wang said that he has been working in the express delivery industry for five or six years, knowing that it is against the company’s regulations to check express delivery information for others, but he does not know that it is illegal to do so.

  □press sb for an interview

  What are the problems exposed by the insider selling personal information?

  According to the relevant person in charge of the Network Security Bureau of the Ministry of Public Security (hereinafter referred to as the "Network Security Bureau"), at present, it seems that enterprises, institutions or individuals who have mastered citizens’ personal information have a weak awareness of protecting citizens’ personal information. The internal control responsibility system of enterprises is not perfect, which makes citizens’ personal information easy to be stolen. "In recent years, so many cases of ghosts leaking information in the industry have been cracked, and the responsibility of unit leaders is rarely investigated."

  Citizens’ personal information exists in the form of data, which is mostly stored in relevant systems or platforms. How to protect its security and correct use requires more systems such as auditing. Whoever inquires and copies this information should have corresponding records. However, the current situation is that although some enterprises have an audit system, they fail to do it in place. After some accounts are abnormal, the unit cannot report the case in time. After discovering the network security incident, it is worried that it will not be reported.

  Will the disclosure of personal information encourage telecom fraud?

  The relevant person in charge of the Network Security Bureau said that the disclosure of citizens’ personal information contributed to the crime of telecom fraud and played an ill role. After the disclosure of citizens’ personal information, it provides more accurate conditions for telecom fraud criminals, "increasing the credibility of fraud and providing conditions for the success of fraud".

  Furthermore, after criminals have obtained citizens’ personal information, especially their understanding of citizens’ property, they have expanded the losses of telecom fraud and provided support for defrauding ordinary people of more money. "With the enhancement of people’s awareness of prevention, fraudsters will find ways to obtain more information and enhance the credibility of fraud reasons."

  Why are personal information trafficking cases repeatedly banned?

  According to the person in charge of the Network Security Bureau, the current social and economic life is very active, and there are legitimate and illegal demands for citizens’ personal information. In terms of source control, there is a lack of laws and regulations to protect citizens’ personal information, and there is no clearer legal constraint on units and individuals who collect and master citizens’ personal information; In terms of legal application, the judicial interpretation of the crime of infringing citizens’ personal information has not yet been promulgated, and in some aspects, there is no more clear support for cracking down on criminals who infringe citizens’ personal information, resulting in some criminals not being punished as they should; Crimes against citizens’ personal information are mostly committed through Internet contact, which is a cross-regional crime. Criminals have a strong awareness of anti-investigation, and it is difficult to obtain evidence, which leads to a relatively high cost of handling cases.

  □interlinkage

  Combating crimes against citizens’ personal information

  More than 3,300 people were arrested nationwide in five months.

  The reporter learned from the Ministry of Public Security that since April this year, the Ministry of Public Security deployed public security organs across the country to launch a special campaign to crack down on crimes of infringing citizens’ personal information. Up to now, the network security department of public security organs across the country has cracked more than 1,200 criminal cases and arrested more than 3,300 suspects, including more than 270 insiders in banking, education, telecommunications, express delivery, securities, e-commerce websites and other industries, and more than 90 cyber hackers, and seized more than 29 billion pieces of information.

  Jinghua Times reporter Zhang Sijia

Putin called on Russia and the United States to restart bilateral cooperation in the field of information security, and the United States refused and involved China.

  [Global Times special correspondent Li Yong Liu Yupeng Wei Hui] What card is Putin playing? With the approaching of the American election, the accusation of "Russian interference in the election" is getting louder and louder in the United States. Under this background, Russian President Vladimir Putin unexpectedly put forward a proposal of "attacking from defense" on the 25th — — Call for an agreement with the United States to "restart" the relationship between the two countries in the field of information security and not interfere in each other’s internal affairs such as the election process.

  Some American media described the proposal as a "cyber truce", arguing that Russia’s move was on the one hand to prove its innocence, and on the other hand to prepare for the "post-Trump era" in which Biden might win the election. However, this well-intentioned proposal was quickly rejected by Washington, and a spokesman for the US National Security Council said that the proposal "may be to create further divisions in the United States." This result is expected by Russian analysts. In the eyes of Russian media, the United States has gone further than anyone else in conducting information warfare and interfering in elections, and has more means than anyone else. How can it be willing to "tie itself up"?

  The United States quickly refused, and China "lay a gun."

  "One of the main strategic challenges of our time is the risk of large-scale confrontation in the digital field, and the special responsibility for preventing such conflicts falls on key participants in the field of international information security." According to Reuters, the Kremlin issued Putin’s statement on 25th, calling on the United States and Russia to reach an agreement to ensure that they will not interfere in each other’s elections through the Internet. The statement said that Russia and the United States need to promise each other not to interfere in each other’s internal affairs, including the election process, by means of information technology and high technology.

  According to the report, Putin suggested that the two countries reach an agreement to prevent major events in cyberspace. The agreement is similar to the Agreement between the United States and the Soviet Union on the Prevention of Accidents on the High Seas and Over the Sea signed in 1972 at the height of the Cold War. RIA Novosti said on the 26th that Putin called on the two countries to resume comprehensive inter-departmental dialogue on key issues to ensure international information security, and to keep the communication channels between the competent departments of the two countries unimpeded and effective in reducing nuclear dangers and computer accidents. Putin finally pointed out: "I propose to all countries, including the United States, to conclude a global agreement, and all countries make political commitments not to use information and communication technologies to attack each other first."

  "Unexpected and somewhat mysterious," Buzzfeed News Network described Putin’s statement. The New York Times reported Putin’s proposal with the title "Putin wants a truce on the Internet, but denies Russian interference". The article emphasizes that apart from soothing language, the statement does not imply that Moscow is prepared to make any specific concessions.

  Such a constructive proposal was quickly rebuffed by the United States, and China was once again "lying down". The New York Times said that US National Security Council spokesman John Uliott responded to Putin’s proposal: "When Russia, China, Iran and other countries try to undermine our election process, it is difficult for us to take such remarks seriously." Uliot also said: "This proposal may be to further create division in the United States." Buzzfeed News Network said that the White House understood Putin’s call for Russia and the United States not to interfere in elections, and made its own response: Russia should stop interfering first. A senior White House official said: "The starting point of good consultations is that Russia will stop its ongoing interference in the US election."

  The response of the United States is expected for Russia. Russian newspaper Izvestia reported on the 26th that Chepa, vice chairman of the International Affairs Committee of the Russian State Duma, said that Russia has repeatedly proposed to the United States to strengthen cooperation in all directions. Unfortunately, the United States has always rejected this. Even if the American political circles still have no positive views on Putin’s initiative, it will be more difficult for the United States to accuse Russia of interfering in its general election, because Russia has extended its own hands and called for cooperation. Lozansky, president of American University Moscow, said that some political elites in the United States are firmly opposed to improving relations with Russia. Trump may want to cooperate, but any positive signal is not good for his campaign.

  Russia prepares for the "post-Trump era"

  Why did Russia put forward such a proposal when it knew that it might encounter a rebuff? In the opinion of public opinion, this is a tactic adopted by Moscow in the current situation. Originally, the accusation of "Russian interference in the 2016 presidential election" has been going on in the United States, and with the approaching of the new election polling day on November 3, the new accusation of Russian interference in the US election is once again rampant.

  The New York Times said that with less than six weeks to go before the US presidential election, Biden, a former vice president who bluntly criticized the Kremlin, may enter the White House. Putin’s appeal at this time, at least to some extent, is to show a more friendly face in response to the recent statement of American officials that "Russia has secretly increased its efforts to weaken Biden." Christopher Babers, director of the Federal Bureau of Investigation (FBI), warned last week that Russia is actively carrying out actions against Biden and spreading false information. According to Washington post, the US Central Intelligence Agency (CIA) assessed in August that Putin and his senior aides "know and may guide Russian influence actions" to weaken Trump’s opponent Biden in the 2020 general election.

  "Putin is ready for a future without Trump," Bloomberg said. People close to the Russian leadership said that although few people think that if Trump is re-elected, relations between the two countries will have improved prospects, Biden’s election will be bad news for Russia. Kremlin analysts are stepping up the deduction for Biden’s election as president. According to informed sources, Russia is increasingly worried about the prospect of the White House without Trump, and is trying to determine what this means for sensitive issues from nuclear weapons to energy exports and sanctions.

  According to reports, Moscow’s fascination with Trump has faded. Russian officials said that no matter who is in the White House, the "Russian phobia" in the American system will not change. However, the two candidates have different attitudes towards Russia. Trump said last week that China and postal voting are more threatening than Russia; Biden, on the other hand, said that he would make Moscow pay the price for interfering in the election and regard Russia as an opponent.

  Russia has always firmly denied the allegations of interference in the general election. "Russian Intervention 2.0", Sputnik said that although no substantial evidence of Russian intervention in the 2016 US election process could be found before, some US officials began to claim that Moscow once again used "a series of measures" to intervene in the 2020 election and "vilify" Democratic presidential candidate Biden. In recent weeks, American officials have stepped up their accusations. The Kremlin denied this, calling it "nonsense". Russian Foreign Minister Sergei Lavrov stressed in his statement on 25th that, as we have repeatedly pointed out, the statement about Russia’s intervention in American elections is groundless. "We are in favor of professional and constructive discussion on all existing issues and propositions at the negotiating table".

  "Frozen soil covers US-Russia relations"

  "If the United States is worried that Russia and other countries will interfere in the general election, then it should sign an information non-aggression agreement as proposed by Putin." Sputnik quoted Shatilov, a professor at the University of Finance and Economics of the Russian Federal Government, as saying on 26th that we saw how the United States carried out active information publicity activities for other countries, but at the same time accused other countries, especially Russia, of interfering in its elections. The United States has been launching an information war all over the world, never considering ethics. It has allocated huge sums of money from its budget to carry out information publicity activities in Russia, Belarus and other countries. It is impossible for the US government to give up this tool of interfering in other countries, so it will find reasons to reject the Russian proposal. Russia’s "Today’s Economy" said that no matter what the outcome of the US election in November is, the United States will accuse other countries of interfering in the election.

  "Frozen soil covers US-Russian relations", and the article in "Asia Times Online" on 25th vividly describes the situation of US-Russian relations — — Even with a president like Trump, it is difficult to change. In addition to the quarrel about "interference in the general election", the article refers to the recent poisoning incident of Russian opposition figure Navalny, saying that a group composed of senators from both parties in the United States proposed to impose further sanctions on Russian officials.

  "The relationship between Russia and the West has further deteriorated in recent weeks." The New York Times said that Lukoyanov, a Moscow foreign policy analyst who advises the Kremlin, said that the cybersecurity proposal highlights that Putin’s mood is much more relaxed now than it was at the height of the Ukrainian crisis five years ago. However, he said that the United States has a deep-rooted distrust of Russia, and he does not expect Washington to take the proposal seriously. If Biden is elected president, relations between the two countries may deteriorate further.