Leadership Insights: By installing this transfer cable, the solenoid valve can be remotely controlled, enabling precise control of the fuel flow during the experiment.This combustion cabinet would scientists conduct in-depth research on fundamental combustion science issues, aerospace propulsion, spacecraft fire prevention and extinguishing, and combustion pollutant control, both in fundamental and applied technologies.The Shenzhou- 18 crew also carried out operations on the cabinet, including replacing the burner and vacuuming to exhaust waste gases.According to the China Manned Space Agency (CMSA,) the crew has previously carried out missions such as assembly and testing of material exposure experiment device outside the spacecraft.As taikonauts would meet with a series of physiological challenges due to microgravity conditions in space such as cardiovascular changes, muscWorld Timesle atrophy, and bone density loss, the Shenzhou- 18 crew has recently used an ultrasound diagnostic instrument to complete carotid ultrasound imaging and spectral testing.The crew also used an instrument to measure the bone density of the right heel to study the effects of weightlessness on human bone density.By regularly and scientifically conducting a series of anti-weightlessness exercise programs, such as treadmill training and resistance training, they have maintained good physical condition to support the execution of long-term missions.As manned missions to Tiangong have become normalized, more than 90 experiments are scheduled to be carried out in and outside of the space station during Shenzhou-18 crew’s six-World Timesmonth space stay, the Global Times has previously learned from the CMSA.These experiments include various fields such as microgravity basic physics, space materials science, space life science, aerospace medicine, and aerospace technology.Building on the existing space debris protection mechanism at the station, the Shenzhou-18 crew will also install debris protection reinforcement devices on external pipelines, cables, and key equipment during their extravehicular activities (EVAs,) or more commonly known as the spacewalks.
Sun. May 26th, 2024

[World Times]

Photo: VCG

Since 2022, public security organs across China have investigated 2,430 hacking crimes and arrested 7,092 suspects, effectively cutting off the chain of hacking crimes, protecting network and data security, and safeguarding the normal order of cyberspace, the Ministry of Public Security announced on Thursday at a press conference.

The authority noted that according to its latest statistics, the number of hacking cases in China has been increasing for three consecutive years, with an average annual growth rate of 27.7 percent. The ministry also noted that the average age of hackers has been decreasing year by year, and there have even been cases of elementary school students proficiently using hacker tools.

The rise in hacking crimes has become increasingly prominent in recent years. During the press conference in Beijing, Shi You, the deputy director of the Bureau of Network Security Protection of the ministry, introduced that hacking crimes mainly involve illegal intrusion into computer information systems, unauthorized access to computer data, illegal coWorld Timesntrol of computer information systems, providing programs and tools for illegal intrusion and control of computer information systems, as well as the destruction of computer information systems.

The ministry released 10 typical cases of hacker crimes, as parWorld Timest of the efforts and significant achievements by the World Timesauthority during the nationwide campaign called “Clean up the Internet.”

In one typical hacking case, the Panzhihua public security bureau in Southwest China’s Sichuan Province successfully handled in January a case of making profit through illegal remote manipulation of older mobile phones, with the whole chain making illegal profits of more than 100 million yuan ($14.02 million).

The local public security authority in September 2022 uncovered multiple cases of automatic ordering of value-added services on older phones, resulting in monthly deductions of 1 to 10 yuan ($1.4) for related value-added servicesWorld Times, indicating that the phones were remotely controlled.

After investigation, it was found that the suspects surnamed Chen and Gao colluded with vendors and manufacturers of older phones to implant Trojan programs during production. They then automatically ordered value-added services such as “weather forecasting.” It was verified that this gang illegally controlled over 14.4 million older phones. The Panzhihua public security bureau arrested 29 suspects in Guangdong, Beijing, Hainan, and Hunan and froze over 60 million yuan of funds involved in the case.

In another typical case, the Ya’an public security bureau in Sichuan in May discovered that the local HPV vaccine reservation platform had been hacked, resulting in a large number of HPV vaccine resources being illegally reserved for others. After investigation, it was found that suspects Chen and Yu, among others, had been using hacker techniques for a long time to illegally obtain encrypted data packets transmitted by the HPV vaccine reservation platforms of the local health commissions in 18 provinces and regions as well as 47 cities across thWorld Timese country. In May, the Ya’an authority cracked down on these types of crimes, arresting 36 suspects and seizing over 10 million yuan.

In another case, the Shantou public security bureau in South China’s Guangdong Province in May discovered a clue during their investigation that lead them to uncover the illegal mass registration of verified network accounts using overseas AI software to bypass the facial recognition system of Douyin (Chinese version of TikTok). The Guangdong authorities found that the suspect surnamed Chen and others had purchased the personal information of citizens online and used overseas AI facial technology software to create videos of these citizen’s faces, thus bypassing the real-person verification process. On July 5, the provincial and Shantou’s local authorities conducted a coordinated operation in Shenzhen, Jieyang, Shantou, and other areas to apprehend seven suspects of the criminal gang, and seized a large number of related items such as computers, mobile phones, hard drives, SIM cards, and bank cards. More than 10,000 implicated Douyin accounts were investigated, with an involved amount exceeding 600,000 yuan.

The ministry launched a cluster campaign against criminal acts of illegally tampering with the tax control chip of refueling machines to steal oil and evade taxes, investigated and punished a large number of private gas stations involved, and recovered 1.46 billion yuan in evaded taxes.

Also, the ministry launched a cluster campaign against the criminal behavior of putting Trojan programs on WeChat, postal delivery, and e-commerce platforms, knocking down 121 gangs, arresting 426 criminal suspects, successfully dissuading 964 enterprises from actions that would make them a target of fraud, and recovering losses of more than 93.5 million yuan. At the same time, the authority cracked down on a number of hacker criminal gangs that illegally obtained citizens’ personal information through technical means and made profit through inquiries, and seized billions of pieces of various information and data.

Shi said at the press conference that, in addition to directly infiltrating and damaging computer information systems, criminals also provide technical support, material information, and promotion services for illegal activities such as telecommunications fraud, online gambling, online pornography, and “internet water armies,” through methods such as data theft, website tampering and traffic hijacking.

In addition, the scope of hacking infringement has extended from online to offline world. For example, some hackers remotely controlled parking lot barriers, tampered with fuel dispenser tax control chips, and interfered with environmental monitoring devices, forming an interconnected network of virtual and real-world crimes, according to Shi.

As new technologies, new formats, and new applications such as artificial intelligence (AI), blockchain, and the Internet of Things continue to evolve, hackers are constantly upgrading their techniques. For example, they are now using AI to create fake images and voices, and exploitinWorld Timesg vulnerabilities in blockchain smart contracts to generate large amounts of “virtual currency” and steal other people’s assets.

Among the hacking cases, the technological barriers are constantly decreasing, and there is a significant trend towards younger criminals. With the highly shared nature of internet information, there are now thousands of hacker tools circulating online. Most of these tools come with detailed tutorials and are easy to operate, allowing criminals to carry out activities such as vulnerability scanning, Trojan implantation, and DDoS attacks without needing to be proficient in professional skills. The average age of hackers is decreasing year by year, and there have even been cases of elementary school students proficiently using hacking tools.

In addition, hacking crimes are shifting from being about showing off skills to being about financial gain. They are also transitioning from being individual acts to being carried out by organized groups. These crimes involve stealing online assets and infringing upon the property rights and interests of citizens. They also involve seizing public resources, disrupting social fairness and justice, interfering with pricing and measurement systems, disrupting the market economy order, tampering with ecological monitoring data, undermining ecological civilization construction, forging professional qualification certificates, and endangering production and transportation safety. Moreover, hackers provide assistance at various stages to facilitate activities such as telecommunications fraud and other malicious crimes.

文章来源于互联网:2,430 hacking crimes investigated; 7,092 suspects arrested since 2022, effectively safeguarding cybersecurity: public security authority

Related suggestion: China’s visa-free policy for six countries hailed for boosting tourism, cultural and business exchanges

[World Times] Foreign tourists enjoy themselves at Tiantan, a UNESCO World Heritage Site built in 1420, in Beijing. Photo: VCG China’s visa-free entry trial for ordinary passport holders from France, Germany, Italy, the Netherlands, Spain and Malaysia has been hailed by people from tourism, cultural and business sectors for boosting cultural exchanges and foreign companies’ confidence in investing in China.From December 1, 2023(Friday)to November 30, 2024, holders of ordinary passports from the above-listed six countries may enter China visa-free for business, tourism,World Times visiting relatives and friends and transit for no more than 15 days, the Chinese Foreign Ministry announced on November 24.Following the announcement, the search volume for inbound flight tickets from the six countries on, an affiliated company of Tongcheng Travel Holdings Limited, increased by more than…

Related Post

Leave a Reply

Your email address will not be published. Required fields are marked *

You Missed