Revealing the secret of Guangzhou network police: a compound talent who understands psychology, a doctor with high IQ.
The network police detachment of Guangzhou Public Security Bureau was established in 2002. Since 13, people know little about this low-key police force.
Lv Tao, deputy detachment leader of the network police detachment of Guangzhou Public Security Bureau, can be said to be in line with most people's imagination of the network police: tall and powerful, the standard of the police; Wearing glasses and speaking politely is like people's first impression of science and technology men.
But feelings often can't represent the whole reality. As the spokesman of the network police detachment of Guangzhou Public Security Bureau, Lu Tao once explained at a press conference that the network police are not a group of technical houses sitting in front of the office computer. In many cases, according to the needs of cases, network police often go to the front line to assist in handling cases.
Fan, the squadron leader of the second squadron of the fifth brigade of the network police detachment of Guangzhou Public Security Bureau, is a criminal policeman. Now? Transformation? As a network policeman, he still has to go to the front line to handle cases from time to time. At 20 1 1? Net cleaning operation? He and his colleagues have traveled all over Guangxi, Jiangxi, Hunan and other provinces and cities. At that time, he had a persistent high fever and a stomachache. In the pursuit of a fugitive, regardless of the danger that the other party may resist arrest with a murder weapon, go forward and arrest him.
Someone asked Fan why the cyber police are so desperate. The cyber police are not policemen. How can the police retreat at this time?
Internet police are all technical control? No, no, no, it is better to be a compound talent who understands psychology.
? Are there many unique skills for cyber police to fight? Hacker?
Faced with such a problem, Lu Tao always smiles. There are indeed many highly skilled and intelligent people among his colleagues? Doctor? .
In 2007, a criminal organization spread harmful information through the Internet, and the public security department launched a nationwide crackdown. Guangzhou police arrested a leading member of the organization in Panyu. Where's the suspect? Very intelligent? Encrypt and save your own criminal evidence, organizational structure, members and other information, and the password length is unimaginable. If you rely on the computer program at that time to decrypt it, it is difficult to get the result in a short time. Fortunately, there are some in the Guangzhou network police team? Doctor? Using the knowledge of personal computer technology and social engineering, I fought for a week and successfully cracked the password.
Speaking of the stunts of Guangzhou network police, technical skills are of course indispensable, including corresponding network technology, hacking technology, hacking vulnerability mining and familiarity with basic network communication protocols.
But most of the technical stunts are used in personal hard battles. According to the current network security situation, we need more compound talents, such as case investigation ability and social life experience? Lu Tao explained that more often, network police need to find out the criminal thinking of criminal suspects. The technical requirements in this respect are not high, but it is necessary to find out how criminal suspects conduct online transactions.
? Most of the evidence of cyber crime is non-contact crime, that is, sitting at home can get things done without panic? , the old network police? Brother Xin? Zhang feels that it is precisely because of this feature that many criminals can take measures calmly. Once they find that the police come to the door, they just need to destroy the hard disk and other evidence that stores their criminal information. You can even smash the hard disk in front of you, and the network police will give up all efforts? .
To be an excellent network policeman, it is not enough to have skills. Understanding is very important? Netizen? Psychology.
Brother Xin, who has been working in the post of computer security supervision since 1997, has rich experience in this field. Brother Xin's daily job is to patrol, but what he patrols is not the streets, but the wider network world. Combating online rumors is one of the main responsibilities of Singo and his colleagues.
On Sina Weibo, Tencent Weibo, WeChat official account and Baidu Post Bar? Guangzhou network police patrol law enforcement? Account, found the official account of WeChat WeChat on the day of launch? Panyu Tong? In order to suck powder, the rumor that young women were dug up and abandoned in the circle of friends was circulated in Yu District and other places. In response to all kinds of rumors circulating on the Internet, Xin Ge and his network police colleagues not only asked the relevant platforms to delete the rumors, but also tracked down the intention of the other party to release false information, so as to find the key clues to solve the case.
Lu Tao said that being a cyber policeman also needs passion. ? Passion is the love of career, the support in the face of heavy work pressure, and the source of work motivation. ? However, it is impossible to have lofty ideals without real materials, so technical ability is the foundation. Apart from computer technology, what basic skills does the network police have? Psychology, law, case investigation ability and social experience. , but also to understand the criminal object? Tricky? .
? Hacker? Both? Hard bones-indomitable people
No, no,no. It's not as bad as you think, okay? Black?
In the eyes of ordinary netizens, hackers? It is quite mysterious to come and go without a trace in the virtual world. However, judging from the many cybercrime cases disclosed by Guangzhou Internet Police in recent years, many networks? Hacker? The academic background is not high, and the criminal technical means are not clever, but they are very confusing.
Fan Huayao, a network policeman with many years of criminal investigation experience, is called a network detective? Sharp knife? . Few people know that he took the lead in detecting the code name of the Ministry of Public Security. 1 10 1- hacker? Extra-large bank card fraud case, 10086 mobile integral exchange fraud case and other extra-large network cases.
Fan talked about a case that impressed him the most in his career as a cyber policeman. Is that so? 1 10 1- hacker? Extraordinary bank card fraud case. In 20 14, his network police detachment received this major fraud case involving eight state-owned banks, amounting to14.98 million yuan. The survey found that a secondary school graduate didn't have a job and just wanted to do it? Hacker? Young people have mastered more than 8 million pieces of bank card information through unwise means.
? At that time, a forum administrator leaked user data, and he had more than 3 million mailboxes and password data? Later, after data integration, more than 70,000 pieces of useful bank card information were finally screened out and illegally profited. Fan said that in the whole process of committing the crime, the suspect did not have superb skills? Hacker? Technology, even procedures, are written by hiring people. And this child under 18, even 18' s birthday was spent in prison? .
For example, in the first half of 20 15, nearly 500 Apple mobile phones were stolen. Fan and his colleagues found through online investigation that the suspect was not as simple as stealing a mobile phone.
? Mainly mobile phones over 5S. If you don't crack the password and sell the mobile phone into parts, it may not be worth 1000 yuan. But it's worth more than 5000 if you crack it and sell it again? . Therefore, the suspect came up with a set of ways to cross the sea. First, he copied Apple official website and sent an email or text message to the owner 20 days after stealing the mobile phone, saying that someone tried to reactivate the lost mobile phone and asked to go. Official website? Re-enter the ID and password. Once the owner is deceived by a fake website, the stolen mobile phone will be unlocked and the criminal suspect will completely remove the contents of the mobile phone.
The 22-year-old suspect in this case was finally arrested in Baoji, Shaanxi. Previously, through the Q Q group, the suspect claimed that he could unlock the high-end mobile phone, so as to get to know the sales staff and unlock the mobile phone for resale.
Fan and his colleagues agree that cyber crimes tend to be low-educated and younger. They always want to do it? Hacker? Like a hero, maybe by some people? Hacker? The influence of the film? . Limited by their low knowledge, many criminals only master low-end technology, but spend a lot of time in other aspects. Most of the content, such as social engineering, is not technically high, but it is very confusing? Huang Zhiming, deputy head of the 3rd Brigade of Guangzhou Cyber Police Detachment, thinks that netizens aged 14 and 15 are particularly vulnerable? Hacker? Attracted by mysterious colors.
Huang Zhiming was impressed by a case. There is a huge loophole in a third-party payment platform, and the money in many user accounts has been transferred away. Huang Zhiming led the network police to investigate and analyze, and found that it originated from a low-tech loophole: criminals used the default password to try to log in to other mailboxes after registering their accounts. ? Without technical means, just try one by one? It turns out that the default passwords are the same after registration. Once the user does not change the password after registration, criminals can log in to the account.
sketch
More than 80% graduated from science and engineering
The network police detachment of Guangzhou Public Security Bureau was established in June 2002. The ratio of male to female policemen is about 2: 65,438+0. At present, police officers with graduate education or above account for about 20% of the total number. More than 80% are science and engineering majors, and most of them graduated from computer, mathematics, software, criminal investigation and public security management. At first, the network police detachment took the science and technology department as the team, and then transferred police force from criminal investigation, traffic police and other departments and sub-bureaus, and entered the network police detachment after corresponding computer assessment.
There are six categories of responsibilities.
1. Carry out online illegal information inspection and disposal, such as online public inspection and warning law enforcement.
2. Supervise the Internet service business premises (commonly known as? Internet cafe? Implement the consumer real-name registration system and safety protection technical measures.
3. Supervise Internet access service units, information service units and other relevant users to implement the information audit system, and establish and improve the security protection management system.
4. Supervise, inspect and guide the security protection of local computer information systems, and enhance the awareness of information network security protection of all units.
5. Track and investigate illegal and criminal cases against computer information networks such as hacking, destroying or invading computer information systems.
6. Responsible for assisting in cracking down on all kinds of illegal and criminal activities related to the Internet.
;