laitimes

News at 8 o'clock to see | smugglers into northern Myanmar: coerced into telecommunications fraud, escape need to pay a ransom

author:Beijing News
News at 8 o'clock to see | smugglers into northern Myanmar: coerced into telecommunications fraud, escape need to pay a ransom

See you at 8 o'clock in the news, a little more insight. Meet you on time every morning at 8 o'clock in the morning and look out into the bigger world.

Watching live broadcasts with goods, travel live broadcasts, and shop visits live every day, have you ever thought that you can watch live broadcasts in space? Maybe something unexpected is about to happen.

Today, it is the second day that Shenzhou 12 astronauts Nie Haisheng, Liu Boming, and Tang Hongbo entered the Tianhe core module. In addition to completing the installation of the water tank and sorting out the sleeping area, the astronaut crew also enters the cargo spacecraft and transports the items brought by the cargo spacecraft to the core cabin.

News at 8 o'clock to see | smugglers into northern Myanmar: coerced into telecommunications fraud, escape need to pay a ransom

Footage inside the core cabin shows that the cargo is neatly packed and fixed in the cabin, up and down, left and right. At the end of May, the "courier brother" Tianzhou-2 sent the first space supply to the Core Module of the Chinese space station Tianhe, transporting more than 160 "packages" in one go, with a total weight of nearly 7 tons. Seeing this scene, netizens shouted that the three astronauts "live out of the box".

While lamenting that the core cabin is fully equipped, some netizens are curious about the nearly 7-ton "package", how do the three astronauts manage it?

In this regard, Hou Yongqing, deputy chief designer of the manned space station system of the Fifth Academy of Aerospace Science and Technology Group, introduced a design "Easter egg": all the goods in the cabin have two-dimensional codes, and astronauts only need to scan the two-dimensional code to transmit the goods to the material management system to ensure the efficient management of the goods in the cabin.

Today they also install wireless Wi-Fi devices.

Sun Jun, chief mission division of the space station of the Beijing Aerospace Flight Control Center, introduced that our net in the sky and the net on the ground are connected. With Wi-Fi, astronauts can communicate smoothly and video calls with people on the ground, and even their families. Netizens said that set a complex password to prevent someone from rubbing the net! Read the full >>>

feed? Hello, you have a credit card to spend overseas, please...

feed? Hello, your bank card involves a case, has been filed by the public security organs, please...

There are countless ways of such telecommunications fraud, which have made many ordinary people recruited, which is really hateful.

Telecommunications fraud has always been the focus of attention from the public security organs. With the heavy blow to telecommunications fraud at home, a large number of telecommunications fraud gangs have now mostly moved abroad, and in the past five years, northern Myanmar has gradually become the preferred shelter for these fraud gangs.

News at 8 o'clock to see | smugglers into northern Myanmar: coerced into telecommunications fraud, escape need to pay a ransom

In early June, this reporter interviewed Li Lei, Liu Hao, and Xie Yong, three returnees from northern Myanmar, in Dangyang, Hubei Province. In October 2020, the three went to northern Myanmar to seek wealth. According to the three people's accounts, as soon as they arrived in northern Myanmar, they lost their personal freedom, not only did not earn money, but they were also coerced into illegal activities such as telecommunications fraud, and finally they were able to escape after paying a "ransom". When Li Lei and Xie Yong smuggled back to China, they were intercepted by the Yunnan border guards. In March 2021, Liu Hao turned himself in at the border police station.

How to verify the authenticity of the information stated by the returnees in northern Myanmar, the police officers of the Herong Town Police Station in Danyang City revealed to Yang that in northern Myanmar engaged in legal work, mobile phones will retain a large amount of information about living and working in northern Myanmar, such as pictures, contacts, work unit certificates, etc. If the returnees cannot provide any verifiable information, "basically doing illegal things in northern Myanmar."

Xiang Yang said that after the interrogation and collection of information at the local police station, the cases of returnees from northern Myanmar will be transferred to the Dangyang Municipal Public Security Bureau. Tang Guocheng, deputy head of the criminal investigation brigade of the Danyang Municipal Public Security Bureau, revealed that in May 2021, the Danyang Municipal Public Security Bureau had already filed a criminal case against Liu Hao and others suspected of committing the crime of sneaking across the national border. Among the dozens of returnees from northern Myanmar in Dangyang, most of the returnees from northern Myanmar ended with administrative punishment and filed a criminal case, which is the first case.

Tang Guocheng believes that the difficulty in verifying the returnees in northern Myanmar is to verify whether the returnees are suspected of committing crimes. "In fact, many people are either scamming or gambling abroad, but after they return to China, they will hide their participation in crimes, and mobile phones, computers and other crime tools will not be brought back." Because of the crossing of the border, it is very difficult to collect evidence. Read more >>>

Just as smuggling is illegal, so is the disclosure of someone else's privacy. In modern society, in order to protect privacy and prevent external intrusions, it is already difficult, and the more difficult thing is to guard against "internal ghosts" at the same time.

Previously, according to media reports, an Internet giant company was sold to a competitor in a key city for 20,000 yuan, which aroused the attention of the industry. The article revealed that the source of data leakage of Internet giant companies is the "insiders" who hold data permissions.

News at 8 o'clock to see | smugglers into northern Myanmar: coerced into telecommunications fraud, escape need to pay a ransom

The Beijing News shell financial reporter combed the information leakage incident and found that in addition to the mutual "digging bottom" between competitors, the source of many public information leakage incidents is not external hacking intrusion, but "city gate fire", unintentionally or deliberately leaked by insiders. In addition, due to the requirements of the epidemic for remote offices, the past intranet security model of "getting account passwords without defense" has become more and more unsuitable for the current requirements of enterprises and individuals for data security and privacy protection.

The "toc" business of directly selling personal information to black and gray production is not uncommon. The Beijing News shell financial reporter once found that many bank customers and car owner information were publicly sold at a price of 1 to 3 yuan on the black and gray production platform, and when asked about the source of information, many sellers said that they "collected" it in their work.

In the risk control notices that many Internet manufacturers disclose every year, it is not uncommon to steal trade secrets and dismiss employees. In order to cope with this situation, many companies have increased their risk control level.

Against this backdrop, the concept of Zero Trust security, proposed in 2010 by John Kindwig, principal analyst at the research institute Forrester, has resurfaced. Zero Trust is neither a technology nor a product, but a security concept, and "continuous verification, never trust" is its basic idea. Zero Trust assumes that any access subject (people/devices/applications) inside and outside the network boundary is not trusted until it is authenticated, and requires dynamic access trust based on continuous authentication and authorization, which is essentially identity-centric access control.

According to reports, many employees of Internet companies have found that their supervision has become increasingly strict. Employees who have just entered Alibaba, ByteDance, and Kuaishou are often surprised: if they do not turn off their computers when they leave their seats, they will be called to "talk" by the risk control department and even fined. Didi's old employees found that the single amount of information that was once free to view across departments has now been strictly superimposed on permissions; Old employees of Kuaishou and Tencent found that data documents cannot be downloaded at will, let alone transmitted; Alibaba's old employees have found that the approval of data viewing is more stringent.

Shell financial reporters found that the government, financial institutions, operators and other industries with relatively high security requirements, as well as education, medical care and other industries involving the privacy of sensitive people, have a relatively higher demand for zero-trust security architecture. How to deploy Zero Trust more easily has become a problem that many enterprises are considering. Read the full >>>

A feast for fans is taking place at the European Cup, have you stayed up late to cheer on your favorite team or stars!

The Dutch player Dumfries, yes, is Dumfries, the name is so awkward that the editor read it three times to read it correctly. How did he become the all-powerful warrior of this Orange Legion?

News at 8 o'clock to see | smugglers into northern Myanmar: coerced into telecommunications fraud, escape need to pay a ransom

In March 2014, Dumfries, who was not yet 18 years old, also played for the U19 team of amateur club Ballendrecht. After being summoned by Aruba, the autonomous state of the Kingdom of the Netherlands, he embarked on a flight across the Atlantic Without hesitation. In that friendly match between Aruba and Guam, starting Dumfries opened the scoring with a sharp long-range shot.

At the age of 18, he was fortunate to be appreciated by his hometown team Spartan Rotterdam and signed his first professional contract. In February 2015, Dumfries made his adult debut against Emmen. That season, Sparta Rotterdam rose to the Dutch First Division as league champions, and Dumfries, who made three appearances, received the "Golden Bull Award", which symbolized the best talent in the Dutch Second Division.

At the age of 19, Dumfries completed his dream of being selected for the Dutch team, completing 50% of the Dutch U21 national youth team, officially including Dumfries. In October 2018, Koeman, who employed all his eclectic staff, called Dumfries to the national team for the first time. In just 4 years, Dumfries's "boastful haikou" has come true with lightning speed.

In the two group matches of this European Cup, the Orange Army No. 22 is the most eye-catching one, one person plays the three roles of right-back, right forward and right winger, Dumfries is like an indefatigable Forrest Gump, walking through the entire right road, running with long legs, almost becoming a scene of the Orange Army.

As for the next goal, the Dunfer Lisbon man said, "I want to go to the Premier League as soon as possible, the football atmosphere in England is the best, look at the Top Six of the Premier League, they show top performance every weekend. ”

Today, Dumfries, who has scored consecutive goals, is one of the biggest discoveries of this European Championship, and the clubs that come to inquire have also raised their bids in an all-round way. The once lonely and nameless "Guam Killer" has finally entered the house at the golden age of 26. Read the full >>>

Edited by Ai Zheng liu zhe proofread by Lu Qian

Read on