Who is selling our personal information? (Focus on Rule of Law)
2025-04-21
During the investigation, the public security organs found that criminals have formed an industrial chain by infringing on citizens' personal information, with information acquisition, information reselling, and information use being key links. Some criminals illegally obtain citizens' personal information and carry out illegal criminal activities through various means such as implanting Trojan programs and colluding with internal and external personnel, seriously disrupting citizens' daily lives. Information breach of education and training institutions - targeted at the education and training industry, Trojan programs were deployed to illegally obtain internal data. In September last year, a clue emerged that someone had implanted malicious software into the computer of a certain education and training institution, resulting in sensitive data such as company customer information and user information being illegally obtained. The internal surveillance video of the company shows that employee Lu deliberately blocked the company's surveillance cameras while the company was unmanned, and inserted the USB drive he carried into other employees' work computers to obtain data information from the computers. After investigation, this is not the first time that Mr. Lu has committed a crime. The police realized that the case should belong to the case of manually dropping virus Trojan programs, rather than the suspect's confession of simply prying into the privacy of other colleagues, so they immediately conducted a thorough investigation. Lu admitted that his frequent job hopping to online education and training institutions across the country was mainly aimed at implanting Trojan programs into the company's computers and obtaining a large amount of internal company data. After further investigation, the police found that Lu was just one link in the criminal chain, and there were multiple links behind him, including the organizer Yan and professional technicians who provided Trojan viruses. The criminals were distributed in many places. This type of criminal chain is divided into upstream, midstream, and downstream, including Trojan horse makers, organizers who purchase Trojan horse programs and distribute them, and runners who 'poison' people. The investigating police explained that the social harm of this case is great, with a large number of involved gangs, a tight organization, and extremely concealed criminal methods. In this case, the affected enterprises are all engaged in online education and training on the Internet, and basically rely on the Internet to carry out business. However, due to their small size, they lack professional strength in internal security management and network security prevention. At the same time, due to the high turnover of sales staff, it is difficult to detect abnormal computer situations among employees in a timely manner. It is understood that the members of the criminal gang joined the victimized enterprise mainly for the purpose of launching Trojan programs, without creating performance for the related enterprises. They were all centrally housed and managed under the arrangement of Yan, and communicated with each other using anonymous chat tools. This is a typical case of a vicious online criminal gang that illegally obtained internal customer data and commercial data of the enterprise. After investigation, questioning, and evidence collection, the police found that the gang had carried out Trojan horse poisoning on more than 50 enterprises. The successful investigation of this case has effectively deterred practitioners engaged in illegal acquisition and trading of data in the online education and training industry, effectively safeguarded the legitimate interests of relevant enterprises, and ensured the security of citizens' personal information, "said the investigating police officer. E-commerce platform "order decryption" - merchants, "decryption intermediaries", and courier companies are linked to sell personal order information. Recently, netizen Han reported to the public security organs that after purchasing tea in a certain online shopping platform store, his phone number received multiple unfamiliar sales calls and overseas fraud calls, as well as various false shopping information. After receiving the alarm, the public security organs traced the clues and found that there was an organized and professional criminal chain behind the clues that infringed on citizens' personal information. They immediately launched a thorough investigation. A person in charge of an e-commerce company introduced that after the promulgation of laws such as the Personal Information Protection Law and the Data Security Law, in order to better protect consumers' personal privacy, e-commerce platforms and express delivery companies will replace the intermediate information in fields such as recipient, phone number, and shipping address with "*" on the e-commerce merchant page and express delivery waybill to encrypt order information. However, in practical operation, e-commerce platforms usually provide a small amount of "order decryption" quota to meet the normal business needs of merchants. However, some merchants collude with "decryption intermediaries" driven by interests to "decrypt" all "encrypted orders". Order export, order decryption, and settlement can easily obtain encrypted customer order information in just three simple steps. E-commerce merchants use order assistants and order processing software to export 'encrypted orders' in bulk and send them to the' decryption intermediary '. The' decryption intermediary 'then colludes with the courier company's' insider' to decrypt the order information and send it to the e-commerce merchant. Subsequently, the e-commerce merchant will pay the 'decryption intermediary' according to the number of successfully decrypted orders, "said the investigating police officer. In this case, intermediaries such as suspect Li Moumou and Chen Moumou searched for business customers who needed to decrypt order data on the Internet platform. After smelling the "business opportunity", some platform businesses started to have a bad idea. The merchant bundled and sent encrypted order information to Li, Chen, and others, and then forwarded it to data decryption personnel such as Hu, illegally obtaining customer personal information in the order. "This is a typical 'order decryption' type crime of infringing citizens' personal information." The police handling the case introduced that 18 suspect were arrested in this case, involving more than 3 million yuan. False recruitment on job search websites - impersonating employment companies to induce the download of fraudulent apps, deceiving and reselling job seeker information. In June last year, a certain online recruitment platform reported to the public security organs that Ms. Tian, a job seeker on the platform, complained that the contact person registered as "the first branch of a certain technology limited company" on the platform used teaching how to make money as bait to cheat 2400 yuan by brushing orders. After analysis, we found that the technology limited company impersonated a legitimate enterprise, uploaded false business licenses and office environment videos on the platform, and illegally obtained the names and phone numbers of hundreds of job seekers by posting false positions. "said the person in charge of the security department of the online recruitment platform. Once the job seeker provides their resume to the technology company, the criminal gang will add the job seeker's WeChat the next day, recommend anchor ranking jobs to them, and redirect them to a certain office app. After successful drainage, the fraud gang will continue to induce victims to download fraudulent apps and engage in brushing fraud against them. The public security organs dug deep along the line and discovered a criminal gang that ranges from producing and selling fake business licenses to reselling personal information for job seekers, and then helping electronic fraud gangs carry out precise fraud. After investigation, the gang has initially formed a black industry chain of producing and selling fake business licenses, illegally registering companies on various platforms, and defrauding and reselling job seeker information, "said the investigating police officer. According to investigations, criminal gangs illegally obtained the contact information of nearly a thousand job seekers across the country. In addition, the gang used legitimate enterprise information to register on seven online recruitment platforms, causing the companies that were impersonated to be unable to register for recruitment on the platforms, blocking the online channels for job seekers to join related companies, and causing serious damage to the order of the job search and recruitment market. After the case was solved, the public security organs reported the information of thousands of fake business licenses sold by the gang to multiple recruitment platforms for verification and cancellation, and promptly cut off the black and gray production chain. In recent years, the public security organs have attached great importance to the protection of citizens' personal information, and have always maintained a high-pressure crackdown on crimes that infringe on citizens' personal information. They have deeply promoted the "Clean Net" series of special actions, and have solved more than 7000 related cases in 2024 alone. The public security organs remind personal information processors to strictly fulfill their legal responsibilities and obligations, improve the norms and technical measures of personal information protection system, and maintain the security of citizens' personal information; The public should properly safeguard, store, and use personal information. If any clues of personal information leakage are discovered, they should promptly report to the public security organs and relevant departments to protect their legitimate rights and interests. Attention to link protection of personal information: To prevent personal information leakage and fraud, the police in Tai'an, Shandong remind us to strengthen our awareness of prevention from the following five aspects, so that criminals have no opportunity to take advantage of them. Special calls should be noted: those starting with "00" or "+" are often fraudulent calls from overseas. If there are no overseas relatives or friends, it is likely a fraudulent call; Phone numbers starting with 400 are usually enterprise numbers that can only be answered but not called out; Display unknown phone numbers and do not show the location of the identity. It is recommended to hang up directly for such numbers. Keep the express documents well: express documents, train tickets, withdrawal vouchers, credit card bills, etc. often contain personal information such as ID number and mobile phone number, which can easily lead to information disclosure if they are discarded at will. If it is really necessary to discard them, you can first use a marker to smear and cover the content containing personal information. Be cautious when using WiFi: WiFi in some public places may be phishing traps set up by criminals, which can easily leak personal information. When using infrequently used public WiFi, try not to log in to online banking or shopping accounts. Login password change frequently: It is best to change the payment password for online banking and shopping regularly. Different passwords should be set for different accounts, and special punctuation marks should be added to the password as much as possible. Not lending identity documents: Renting or lending identity cards or bank cards to others can bring huge legal risks to oneself. Lending your ID card may lead to others using your personal information for illegal activities. Bank cards contain your personal financial information, and if this information is leaked to others, it may lead to risks such as card theft and fund transfer.
Edit:Fu Yu Responsible editor:Chi Hua
Source:people.cn
Special statement: if the pictures and texts reproduced or quoted on this site infringe your legitimate rights and interests, please contact this site, and this site will correct and delete them in time. For copyright issues and website cooperation, please contact through outlook new era email:lwxsd@liaowanghn.com