What laws did Ma, a graduate of the National People's Congress, commit?, Imitate Zuckerberg Network | Data | Zuckerberg

Release time:Apr 14, 2024 01:31 AM

On July 3rd, the official Weibo account of the Haidian District Public Security Bureau of the Beijing Municipal Public Security Bureau announced that the Haidian police immediately launched an investigation into the situation of "some student information of Renmin University of China being illegally obtained" upon receiving a report. After investigation, the suspect Ma is suspected of illegally obtaining personal information of some students at the school and other illegal criminal activities. At present, Ma has been criminally detained by the Haidian Public Security Bureau in accordance with the law, and the case is under further investigation.

According to media reports, Ma stole student information from Renmin University mainly to "score" the appearance of students on his website. Many people remember that Facebook founder Zuckerberg had a similar operation during his college years. What laws have been violated by this behavior?

How many crimes can Ma's actions involve?

According to relevant media reports, during his master's degree at Renmin University of China, Ma used professional skills to steal personal information of all students, including photos, names, student numbers, hometowns, birthdays, etc., and built a website to rate the appearance of students at the school. A screenshot from the internet shows that the student has even posted a dynamic on their personal social media account to show off this matter. This update was released in October 2020, but the relevant content on its social media account has now been cleared.

Some netizens have suggested that during his university years, Zuckerberg also stole student information from his alma mater Harvard for image evaluation, but only received disciplinary action from the school. But analysis suggests that Zuckerberg's behavior occurred more than 20 years ago in the United States, when the value and volume of information data could not be compared to today, and the severity of the consequences of information loss could not be compared.

Zhao Hongyu, a senior engineer engaged in network security research and application and the chief engineer of Zhongke Ruiyan Technology Co., Ltd., stated in an interview with China News Service Guoshi Zhitong that using software viruses such as "worms" to invade the network system of Renmin University not only leads to the serious consequence of a large amount of personal information leakage, but also has the possibility of losing control of this Trojan virus. If it causes system paralysis, collapse, and even the leakage of confidential high-tech data and achievements, its harm is unimaginable.

The Criminal Code of our country has a clear definition of such illegal acts. According to current public information, there are three suspected illegal behaviors by Ma in this incident:


1. the use of suspected "worms" and other Trojan tools to steal personal information within the University of the people's system;




2. posting illegally obtained information on the Internet;




3., the personal photos involved in the information are "evaluated".



Xiao Yi, a criminal expert, professor of the Law Department of Capital Normal University, and part-time lawyer of Beijing Guanheng Law Firm, said in an interview with China News Agency Guoshi Express:

The act of illegally obtaining personal information of citizens and making it public online meets the requirements of "illegally obtaining personal information of citizens" and "providing personal information of citizens to others in violation of relevant national regulations", and is in line with the characteristics of the crime of infringing on personal information of citizens;

Invading computer information systems or using other technological means to obtain data stored, processed, or transmitted in the computer information system may result in the crime of illegal intrusion into computer information systems or illegal acquisition of computer information system data.

In general, there is a possibility of multiple offenses being committed due to the same behavior. According to the principle of imaginative competition, a felony is generally chosen, that is, a criminal act that meets the requirements of multiple offenses is determined according to the name of the most serious crime among the constituted offenses.

Xiao Yi also stated that those who intentionally create and spread destructive programs such as computer viruses, which affect the normal operation of computer systems, and have serious consequences - for example, in the process of committing a crime, if the use of viruses or other tools or intentional damage to systems, data, etc. causes serious consequences such as system "paralysis" or important data being tampered with or lost, there is a risk of constituting a more serious crime of damaging computer information systems, that is, imprisonment of not more than five years or criminal detention; Those with particularly serious consequences shall be sentenced to fixed-term imprisonment of not less than five years. This behavior is different from the act of infringing on the personal information of citizens, and generally involves multiple crimes and punishments.

As for whether Ma's evaluation of someone's "appearance" constitutes the crime of insult, Xiao Yi believes that if the complete disclosure of photos and information that can effectively identify the other person is made, and the so-called "evaluation" of someone's appearance is carried out with "defamation", "satire", and "insult" characteristics, resulting in damage to the victim's reputation and other aspects. If the circumstances are serious, in addition to constituting the first two charges mentioned above, there is also a risk of constituting the crime of insult. This is another behavior besides illegally obtaining and providing information, which is likely to result in multiple crimes and punishments.

How to prevent data information from being stolen?

According to relevant reports, Ma's illegal access to information within the Renmin University network system was completed around 2020 or even earlier, and was only recently exposed on the internet and gained attention.

Zhao Hongyu stated that the promulgation and implementation of three fundamental laws in the field of network data security, namely the Cybersecurity Law, the Data Security Law, and the Personal Information Protection Law, marks a new stage in the development of digital applications and data. As the core of the national basic scientific research field, universities should establish a security guarantee system centered on personal information protection and data.

Zhao Hongyu said that network data processors should fulfill their data security protection obligations on the basis of the network security level protection system, carry out data classification and classification protection work, establish important data protection directories, create a network data security monitoring and early warning system, build accurate network data security management and risk prevention measures, and prevent the misuse of personal information and university data.

One is to accelerate the construction of the data security management capability system, build a "measurement and balance" for data security protection, improve the division of responsibilities of network data security management organizations and various business departments through the establishment of regulations, gradually form a set of data security system such as management methods, normative requirements, and implementation guidelines, strengthen communication and cooperation among various organizations, and improve the comprehensive management level of data security.

The second is to clarify the network data processing activities of important information systems, understand the "data security background", form a data asset protection directory, establish a data asset security protection list, and consolidate the work foundation.

Thirdly, with data assets as the core, we will explore the formation of a network data security risk monitoring and early warning system, and develop the ability to collect, store, use, process, transmit, provide, and disclose important information systems throughout the data lifecycle. This will enable us to monitor the security risks of abnormal operations, unauthorized access, abnormal account usage, abnormal interface calls, as well as the transmission of sensitive personal information and cross-border data flow, in order to prevent and resolve major network data security risks and contain major network data security incidents.

Without cybersecurity, there would be no national security. Zhao Hongyu believes that maintaining cybersecurity not only requires relevant responsible units to further carry out network security protection work such as monitoring, protection, and scientific disposal under the premise of fulfilling their responsibilities in accordance with the law. For the selection and cultivation of high-end network technology talents, it is also necessary to pay attention to both moral integrity and talent.

Two women were stabbed to death and reported to have committed a crime 4 days before the follow-up visit for schizophrenia. Suspect of a bloody murder case in a Hong Kong shopping mall appeared in court today. Male | Last Friday | Murder case
Two women were stabbed to death and reported to have committed a crime 4 days before the follow-up visit for schizophrenia. Suspect of a bloody murder case in a Hong Kong shopping mall appeared in court today. Male | Last Friday | Murder case

According to Hong Kong's Wen Wei Po, a bloody knife stabbing case occurred at Hollywood Square in Diamond Hill last Friday. The police arrested a 39 year old man on suspicion of stabbing two young women, one of whom was stabbed over 30 times. The suspect appeared in the Kwun Tong Magistrates Court this morning. The police at the Kwun Tong Magistrate's Court temporarily charged the suspect with two counts of murder last Sunday. The suspect appeared in court this morning at the Kwun Tong Magistrate's Court. Acting Chief Magistrate Zheng Jihang, after listening to the opinions of both the prosecution and defense, decided to postpone the hearing for two weeks until 9:30 am on June 19th, waiting for two psychiatric expert reports to be obtained. The defense did not object. Zheng Jihang approved the application, and the defendant needs to be temporarily detained at Xiaolan Mental Hospital. When the suspect appeared in court, he wore black framed glasses, a light gray shirt, and camouflage green shorts, and was able to answer the judge's questions normally. accordingly

Secretary of the Provincial Party Committee: The focus of Henan's "summer harvest" has shifted to agricultural machinery in the northern region of Henan Province. | Support | Science | Organization | Province | Northern Henan | Summer Harvest | Rush Harvest
Secretary of the Provincial Party Committee: The focus of Henan's "summer harvest" has shifted to agricultural machinery in the northern region of Henan Province. | Support | Science | Organization | Province | Northern Henan | Summer Harvest | Rush Harvest

Currently, the highly anticipated summer harvest work in Henan has shifted its focus to the northern region of Henan. According to the Henan Daily client, on June 4th, Lou Yangsheng, Secretary of the Henan Provincial Party Committee, presided over a special video scheduling meeting on the "Three Summers" work in the province, listened to the situation report, analyzed and judged the situation, and arranged and deployed the next steps of work. Governor Wang Kai made specific arrangements. On the evening of May 31, 2023, in Xiafutou Village, Xuliang Town, Boai County, Jiaozuo, Henan Province, villagers braved light rain in the wheat fields to harvest wheat. Visual China Map Lou Yangsheng pointed out that the current summer harvest battle in the province has entered the decisive stage. Doing a good job in summer harvest in northern Henan Province is related to the summer grain yield and seed safety. We should focus on seizing opportunities and make every effort to organize the wheat harvesting work in the northern Henan region, minimize losses, and protect the interests of farmers to the greatest extent possible. Accurate forecasting is essential

Xinhua All Media+| Welcome home! What innovative technologies are protecting the return journey of Shenzhou 15? Spaceship | Shenzhou | Technology
Xinhua All Media+| Welcome home! What innovative technologies are protecting the return journey of Shenzhou 15? Spaceship | Shenzhou | Technology

On June 4th, the return capsule of the Shenzhou-15 manned spacecraft successfully landed at the Dongfeng landing site. Astronauts Fei Junlong, Deng Qingming, and Zhang Lu all safely and smoothly exited the spacecraft, and the Shenzhou-15 manned flight mission was a complete success. What innovative technologies are there to safeguard the return journey of Shenzhou 15 in this mission? On June 4th, the return capsule of the Shenzhou-15 manned spacecraft successfully landed at the Dongfeng landing site. Xinhua News Agency reporter Lian Zhen photographed that "the sky and the ground" ensure the high-precision return of spacecraft. For the Shenzhou series spacecraft, the return and re-entry GNC technology is directly related to the life safety of astronauts. Taking the success of this return mission as a symbol, China has comprehensively upgraded its GNC system since the Shenzhou-12 manned spacecraft, which features autonomous rapid rendezvous and docking, autonomous adaptive prediction and re-entry return guidance, and has completed a comprehensive update and replacement

The Chinese naval fleet has arrived! Assembly | Navy | Chinese Fleet
The Chinese naval fleet has arrived! Assembly | Navy | Chinese Fleet

At noon today, a Chinese naval fleet consisting of Zhanjiang and Xuchang ships arrived at the assembly area of the "Comodo-2023" multinational maritime joint exercise. It is understood that the assembly anchorage for this exercise is 3 nautical miles long and 1.5 nautical miles wide, capable of anchoring up to 50 ships. Naval vessels from various countries participating in the exercise will also arrive at the anchorage today to complete the assembly of the "Komodo 2023" multinational maritime joint exercise, which is held every two years by the Indonesian Navy. This year is already the fourth edition of the exercise. The exercise will be held from June 5th to 8th in the city of Jakarta, South Sulawesi Province, Indonesia, including the port and sea phases. In the coming days, participating navies from various countries will participate in ship reading style search and rescue exercises, maritime interception and damage management exercises, aerial exercises, and other course objectives exercises

New comment: Donkey like "morale" limit pulls US debt "bomb" fuse hard to dismantle US | debt | morale
New comment: Donkey like "morale" limit pulls US debt "bomb" fuse hard to dismantle US | debt | morale

On the evening of June 1st, the US Senate passed a bill on the federal government's debt ceiling and budget, and the flame of the US debt bomb was temporarily extinguished at the last moment. The two parties in the United States have staged an extreme tug of war over the US debt bomb. Some experts believe that the US debt crisis is the result of the reckless politics promoted by the US dollar hegemony, and the underlying cause of this crisis is the highly polarized political system of the US. Since the end of World War II, the US Congress has adjusted the debt ceiling more than a hundred times. The recurring debt crisis will not only have a catastrophic impact on the US economy and people's livelihoods, but also continuously erode the value of US dollar assets such as government credit and US bonds, bringing significant and far-reaching impacts to the global economic landscape. 【