Please do three no's, Ministry of Public Security: Beware of the "Six Routines" for Obtaining Personal Information Citizen | Personal Information | Six Major Methods

Release time:Apr 14, 2024 17:02 PM

On August 10th, Huang Xiaosu, the second level director of police technology at the Ministry of Public Security, announced that there are six methods to prevent criminals from obtaining personal information data, including information fraud, theft, insider leakage, illegal collection, resale, and alteration.

In May of this year, the police in Ningbo, Zhejiang discovered that Li and others had established a certain online media company and contacted "internet celebrities" to sell "internet celebrity teaching materials" at low prices on a live streaming page of a certain platform as bait, deceiving users into shopping and providing personal information of citizens, and selling the information to downstream fraud gangs. The fraud gang also takes advantage of the victim's urgent desire to become an "internet celebrity" to make money by selling fake live training courses. At present, the police have captured 12 suspect and defeated the downstream live training fraud gang.

The police in Xuancheng, Anhui have also solved such cases. A company disguises itself as a legitimate lending company and publishes advertisements on search engines, online short video platforms, and other platforms to attract individuals with loan needs to fill out personal information of citizens, and then sell the relevant information to the lending company in the borrower's hometown through agents for profit.

Huang Xiaosu, the second level director of police technology at the Ministry of Public Security, introduced that criminals mainly use six methods to obtain personal information data, including "fraudulently obtaining information, stealing information, insider leakage, illegal collection, reselling information, and altering information"

Using methods such as "local promotion" and impersonation to obtain personal information from citizens, such as scanning QR codes to give gifts, assisting in activating electronic medical insurance cards in rural areas, impersonating e-commerce customer service, and impersonating police officers to obtain personal information.

Stealing personal information of citizens both online and offline, such as using hacking techniques such as Trojan viruses, phishing websites, infiltration tools, and web crawlers to steal personal information of citizens. Or steal personal information of citizens offline through illegal entry or other means.

Illegally disclosing personal information of citizens through the convenience of their positions, such as internal staff of operators, express delivery companies, automotive 4S stores, real estate and other enterprises and institutions leaking personal information of citizens.

Illegal collection of personal information of citizens, such as supply chain manufacturers using their products to illegally collect personal information of citizens, such as apps, set-top boxes, mobile phones, smartwatches, etc.

Buying or exchanging personal information of citizens, such as using part-time jobs to buy ID cards, bank cards, facial recognition and other information from idle individuals in society, or engaging in illegal exchange of internal data by practitioners in industries such as finance, education, and real estate.

Processing and altering personal information of citizens, such as colliding different data sources such as identity information and shopping information, adding new tags to form new data sources, or using AI technology to generate dynamic facial recognition information from photos.

In response to this, the police insist on cracking down on governance, while strengthening publicity and guidance, reminding the general public to achieve the "three nots": first, not littering, properly storing and disposing of documents, express orders, takeout orders, etc. that record personal information; Second, it is not allowed to distribute personal information randomly on the Internet platform or for others to use, especially personal ID number, phone number, home address, bank card number, etc; Thirdly, do not randomly click or download links to unknown websites, QR codes, free WiFi hotspots, etc. Do not click the "agree" button on app mobile software to obtain device permissions, and install protective software on computers and mobile phones to prevent malicious Trojans and programs from stealing personal information.

Network operators should obtain personal information of citizens through legal and compliant channels, and also adhere to the "three no's": first, they should not collect information indiscriminately, clearly state the purpose, method, and scope of collecting and using information, and obtain the consent of the recipient; The second is to avoid disorderly storage, comply with the network security level protection system in accordance with the law, centrally and uniformly store and prevent information leakage, damage, and loss; The third is to avoid misuse, adopt hierarchical classification management for data, and not disclose, sell or illegally provide personal information of citizens to others. For those who violate laws and regulations, the police will impose administrative penalties, and those with serious circumstances will be held criminally responsible.

Two women were stabbed to death and reported to have committed a crime 4 days before the follow-up visit for schizophrenia. Suspect of a bloody murder case in a Hong Kong shopping mall appeared in court today. Male | Last Friday | Murder case
Two women were stabbed to death and reported to have committed a crime 4 days before the follow-up visit for schizophrenia. Suspect of a bloody murder case in a Hong Kong shopping mall appeared in court today. Male | Last Friday | Murder case

According to Hong Kong's Wen Wei Po, a bloody knife stabbing case occurred at Hollywood Square in Diamond Hill last Friday. The police arrested a 39 year old man on suspicion of stabbing two young women, one of whom was stabbed over 30 times. The suspect appeared in the Kwun Tong Magistrates Court this morning. The police at the Kwun Tong Magistrate's Court temporarily charged the suspect with two counts of murder last Sunday. The suspect appeared in court this morning at the Kwun Tong Magistrate's Court. Acting Chief Magistrate Zheng Jihang, after listening to the opinions of both the prosecution and defense, decided to postpone the hearing for two weeks until 9:30 am on June 19th, waiting for two psychiatric expert reports to be obtained. The defense did not object. Zheng Jihang approved the application, and the defendant needs to be temporarily detained at Xiaolan Mental Hospital. When the suspect appeared in court, he wore black framed glasses, a light gray shirt, and camouflage green shorts, and was able to answer the judge's questions normally. accordingly

Secretary of the Provincial Party Committee: The focus of Henan's "summer harvest" has shifted to agricultural machinery in the northern region of Henan Province. | Support | Science | Organization | Province | Northern Henan | Summer Harvest | Rush Harvest
Secretary of the Provincial Party Committee: The focus of Henan's "summer harvest" has shifted to agricultural machinery in the northern region of Henan Province. | Support | Science | Organization | Province | Northern Henan | Summer Harvest | Rush Harvest

Currently, the highly anticipated summer harvest work in Henan has shifted its focus to the northern region of Henan. According to the Henan Daily client, on June 4th, Lou Yangsheng, Secretary of the Henan Provincial Party Committee, presided over a special video scheduling meeting on the "Three Summers" work in the province, listened to the situation report, analyzed and judged the situation, and arranged and deployed the next steps of work. Governor Wang Kai made specific arrangements. On the evening of May 31, 2023, in Xiafutou Village, Xuliang Town, Boai County, Jiaozuo, Henan Province, villagers braved light rain in the wheat fields to harvest wheat. Visual China Map Lou Yangsheng pointed out that the current summer harvest battle in the province has entered the decisive stage. Doing a good job in summer harvest in northern Henan Province is related to the summer grain yield and seed safety. We should focus on seizing opportunities and make every effort to organize the wheat harvesting work in the northern Henan region, minimize losses, and protect the interests of farmers to the greatest extent possible. Accurate forecasting is essential

Xinhua All Media+| Welcome home! What innovative technologies are protecting the return journey of Shenzhou 15? Spaceship | Shenzhou | Technology
Xinhua All Media+| Welcome home! What innovative technologies are protecting the return journey of Shenzhou 15? Spaceship | Shenzhou | Technology

On June 4th, the return capsule of the Shenzhou-15 manned spacecraft successfully landed at the Dongfeng landing site. Astronauts Fei Junlong, Deng Qingming, and Zhang Lu all safely and smoothly exited the spacecraft, and the Shenzhou-15 manned flight mission was a complete success. What innovative technologies are there to safeguard the return journey of Shenzhou 15 in this mission? On June 4th, the return capsule of the Shenzhou-15 manned spacecraft successfully landed at the Dongfeng landing site. Xinhua News Agency reporter Lian Zhen photographed that "the sky and the ground" ensure the high-precision return of spacecraft. For the Shenzhou series spacecraft, the return and re-entry GNC technology is directly related to the life safety of astronauts. Taking the success of this return mission as a symbol, China has comprehensively upgraded its GNC system since the Shenzhou-12 manned spacecraft, which features autonomous rapid rendezvous and docking, autonomous adaptive prediction and re-entry return guidance, and has completed a comprehensive update and replacement

The Chinese naval fleet has arrived! Assembly | Navy | Chinese Fleet
The Chinese naval fleet has arrived! Assembly | Navy | Chinese Fleet

At noon today, a Chinese naval fleet consisting of Zhanjiang and Xuchang ships arrived at the assembly area of the "Comodo-2023" multinational maritime joint exercise. It is understood that the assembly anchorage for this exercise is 3 nautical miles long and 1.5 nautical miles wide, capable of anchoring up to 50 ships. Naval vessels from various countries participating in the exercise will also arrive at the anchorage today to complete the assembly of the "Komodo 2023" multinational maritime joint exercise, which is held every two years by the Indonesian Navy. This year is already the fourth edition of the exercise. The exercise will be held from June 5th to 8th in the city of Jakarta, South Sulawesi Province, Indonesia, including the port and sea phases. In the coming days, participating navies from various countries will participate in ship reading style search and rescue exercises, maritime interception and damage management exercises, aerial exercises, and other course objectives exercises

New comment: Donkey like "morale" limit pulls US debt "bomb" fuse hard to dismantle US | debt | morale
New comment: Donkey like "morale" limit pulls US debt "bomb" fuse hard to dismantle US | debt | morale

On the evening of June 1st, the US Senate passed a bill on the federal government's debt ceiling and budget, and the flame of the US debt bomb was temporarily extinguished at the last moment. The two parties in the United States have staged an extreme tug of war over the US debt bomb. Some experts believe that the US debt crisis is the result of the reckless politics promoted by the US dollar hegemony, and the underlying cause of this crisis is the highly polarized political system of the US. Since the end of World War II, the US Congress has adjusted the debt ceiling more than a hundred times. The recurring debt crisis will not only have a catastrophic impact on the US economy and people's livelihoods, but also continuously erode the value of US dollar assets such as government credit and US bonds, bringing significant and far-reaching impacts to the global economic landscape. 【