Ministry of National Defense: The PLA resolutely defends national sovereignty and territorial integrity and does not leave any room for "Taiwan independence" separatist activities.

  Xinhua News Agency, Beijing, March 16 (Reporter Zhang Mimi) When answering a reporter’s question on the recent military-related issues, Tan Kefei, spokesman of the Ministry of National Defense, stressed on the 16th that the Taiwan Province issue is the core of China’s core interests, and the China People’s Liberation Army resolutely defends national sovereignty and territorial integrity, and will never leave any room for any form of "Taiwan independence" separatist activities.

  A reporter asked, it is reported that in recent days, US congressmen and officials of the Ministry of National Defense have repeatedly fled to Taiwan to provoke, and the United States has also approved a new round of arms sales to Taiwan, increased military training with Taiwan, and aggravated tensions in the Taiwan Strait. The head of Taiwan’s defense department said that in view of the tension between the two sides of the strait, Taiwan should be alert to the PLA’s "intrusion" into the area near Taiwan. What is the spokesman’s comment on this?

  Tan Kefei said that Taiwan Province is Taiwan Province of China and Taiwan Province of all China people. At present, the situation in the Taiwan Strait continues to be tense, the root of which lies in the Democratic Progressive Party authorities’ collusion with external forces for "independence" provocation and their insistence on standing on the opposite side of the fundamental interests of the Chinese nation. Compatriots on both sides of the strait are closely related by blood and are close to each other. We are willing to create a broad space for peaceful reunification, but we will never leave any space for any form of "Taiwan independence" separatist activities. It is only natural and natural for the PLA to take relevant military actions in response to the interference of external forces and the "Taiwan independence" separatist activities.

  He emphasized that the Taiwan Province issue is purely an internal affair of China, the core of China’s core interests and the first insurmountable red line of Sino-US relations. China resolutely opposes any form of official exchanges and military ties between the United States and Taiwan, and resolutely opposes the US upgrading its substantive relations with Taiwan in any form. We urge the United States to give up its plot of "controlling China with Taiwan" and stop "cutting sausages" and making breakthroughs on the Taiwan Province issue.

  Tan Kefei said, opposing "independence" and promoting reunification, Taiwan Province is a Chinese angelica. The China People’s Liberation Army (PLA) is ready for any act by the Democratic Progressive Party authorities to split the motherland and any interference and provocation by external forces, and resolutely defends national sovereignty and territorial integrity.

Heavy rainfall in the middle and lower reaches of the Yangtze River continues, and the development of high temperature in South China increases.

  Cctv newsToday and tomorrow (July 1-2), the heavy rainfall in the south is mainly concentrated in Guizhou, northwestern Guangxi and the middle and lower reaches of the Yangtze River. There are heavy rains or heavy rains in some areas, so it is necessary to guard against secondary disasters that may be caused by persistent heavy rainfall. In terms of temperature, the high temperature in the north is temporarily reduced, and the development of high temperature in South China is increasing. Guangzhou, Fuzhou and other places will have continuous high temperature weather.

  Heavy rainfall in the middle and lower reaches of the Yangtze River continues to be thunderstorm in northeast China.

  Since June 26th, heavy rainfall has been frequent in the south. Yesterday, heavy rainfall was mainly concentrated in northern Jiangnan and other places, such as Huaihua, Hunan. From 8: 00 yesterday to 6: 00 today, the local rainfall reached about 280mm. In addition, strong convective weather occurred in many places in the north yesterday, and the local winds in Liaocheng, Jinan, Tai ‘an and other places in Shandong reached more than 12.

  △ Recently, Hunan has been raining continuously, and the ancient city of Fenghuang is surrounded by mist.

  Today and tomorrow, heavy rainfall in the south will mainly occur in Guizhou, northwestern Guangxi and the middle and lower reaches of the Yangtze River. At the same time, the rain in the northeast and north China in the north is also relatively strong.

  According to the forecast of the Central Meteorological Observatory, there will be heavy rainstorms in parts of north-central and western Jiangnan, eastern Jianghan, southwestern Jianghuai, central and southeastern Guizhou, northern Guangxi, western Yunnan, southeastern Xizang, northeastern Inner Mongolia, southwestern Heilongjiang, eastern North China and northern Shandong, among which there will be heavy rainstorms (100-120 mm) in parts of northwestern Jiangxi, southern Anhui, western Zhejiang and northeastern Guangxi.

  Tomorrow, there will be moderate to heavy rain in parts of eastern North China, southeastern Huanghuai, Jianghuai, Jianghan, northern Jiangnan, eastern Southwest China and southeastern Xizang. Among them, there will be heavy rain or heavy rain (100 ~ 160 mm) in parts of southern Anhui, northwestern Jiangxi, eastern Hubei, northern Hunan, central Guizhou, eastern Beijing, eastern Hebei and northern Tianjin.

  Meteorologists reminded that heavy rainfall in the middle and lower reaches of the Yangtze River lasts for a long time. The public should guard against landslides, flash floods, urban and rural waterlogging and other disasters that may be caused by persistent heavy rainfall, and make reasonable arrangements for travel, away from areas with high meteorological disaster risks. North China, Northeast China and other places need to guard against the adverse effects of strong convective weather such as thunderstorms and strong winds.

  The high temperature in the north temporarily reduces the high temperature development in many places in South China.

  In terms of temperature, there were still high temperatures in many places in the north yesterday, with a wide range of high temperatures in central Shaanxi, south-central Shanxi, southern Hebei, Henan and western Shandong.

  Affected by frequent rainfall, in the next few days, the temperature in North China, Northeast China and other places will continue to decline, maintaining a level that is flat or low compared with the same period of the previous year. However, in Henan and western Shandong, the high temperature weather will continue to develop after a short period of reduction, and due to the influence of the warm and humid airflow in the north, the relative humidity of the air will increase in the afternoon, from dry heat to sultry. For example, in Zhengzhou, the high temperature will be interrupted today and tomorrow, but the highest temperature will also be 32 ~ 34℃; From the day after tomorrow, there will be continuous high temperature weather.

  In the south, with the subtropical high extending to the west and lifting to the north, the hot weather in Zhejiang, Fujian, Guangdong and other places will also increase from today, and at the same time, the air humidity is high and the weather is very sultry. For example, Guangzhou and Fuzhou will encounter high temperatures one after another from tomorrow; Haikou will not only have a high daytime temperature in the coming week, but also the lowest temperature will reach 27~28℃. From morning heat to night, we must pay attention to heatstroke prevention and cooling.

Emergency management department: the reform of disaster prevention, mitigation and relief system and mechanism has achieved remarkable results

CCTV News:On August 30th, the Propaganda Department of the CPC Central Committee held a series of press conferences on the theme of "Ten Years in China", introducing the reform and development of emergency management in the new era and answering reporters’ questions.

Zhou Xuewen, Vice Minister of Emergency Management Department, said that on the whole, the barrier of disaster prevention is higher, the foundation of disaster reduction is firmer, the mechanism of disaster relief is more sensitive, and the effect of implementing "two persistences and three transformations" is obvious. Embody three new:

First, a new mechanism of integration of prevention, resistance and rescue has been established. In-depth reform of the system and mechanism of disaster prevention, mitigation and relief was promoted. The emergency management department and relevant departments clarified the responsibility relationship between prevention and rescue, condensed into a joint force to the greatest extent, established working mechanisms such as joint risk consultation and judgment, disaster acquisition and sharing, unified command and dispatch, and early warning of impending disasters, and explored and formed a flat emergency organization model. Leading cadres were on duty, and important positions were on duty 24 hours a day. The whole system always maintained a rapid response emergency state, and spared no effort to protect people’s lives and property.

The second is to promote the new level of disaster prevention and fortification. We carried out the first national comprehensive risk survey of natural disasters, found out the hidden dangers of disaster risks and the base number of disaster prevention facilities, accelerated the filling of shortcomings in the disaster prevention and mitigation engineering system, and coordinated the implementation of key projects such as earthquake-resistant reinforcement of housing facilities in earthquake-prone areas, improvement of flood control and drought relief water conservancy, and relocation of geological disasters, and the ability to prevent natural disasters was significantly improved. For example, in 2016 and 2022, there were two earthquakes of magnitude 6.4 and 6.9 in Menyuan, Qinghai Province. The latter one had a higher magnitude, but the number of collapsed houses was only 5% of the previous one, and the effectiveness of seismic strengthening of houses was obvious.

The third is to promote new breakthroughs in comprehensive support capabilities. The investment in science, technology, materials and equipment for disaster prevention, mitigation and relief has gradually increased, and the support capacity has been significantly strengthened. Six national regional emergency rescue centers started construction, and the layout of "a game of chess" was basically formed; Nearly 3 billion yuan of central emergency materials storage tasks have been completed, and the material support capacity to meet the peak demand of major disasters has been further improved. A number of heavy equipment such as UAV emergency communication, large-scale drainage vehicles and underwater robots have been installed one after another, and modern technology and equipment have been greatly improved.

According to statistics, from 2018 to 2021, the average number of people who died and disappeared due to disasters, the number of houses collapsed and the proportion of direct economic losses in GDP in China decreased by 51.6%, 73% and 44% respectively compared with the average in the five years before the reform, and the reform of disaster prevention, mitigation and relief system and mechanism showed results.

The means of committing cyber crimes are constantly innovating. How to hold the "seven inches"

  With the popularization and application of Internet of Things, big data, cloud computing and other new generation network technologies, illegal activities have become unprecedented concealment and transnational, and the problems faced by China are also challenges faced by the whole world.

  To prevent and crack down on increasingly complex cyber crimes, it is necessary to constantly improve cyber legislation and provide new normative support and more effective institutional support in the process of dealing with cyber crimes; It is necessary to achieve comprehensive coordination and linkage integration in a larger scope; It is necessary to further promote the basic information construction, make full use of big data technology and information technology to improve the intelligent level of prevention and control, and build a national network security center.

  At the international level, it is necessary to emphasize the export of China Rules and China’s experience, and actively promote the new convention system of cybercrime under the framework of the United Nations, so as to enhance China’s right to international discourse and normative participation in the field of new cybercrime governance.

  □ Our reporter Du Xiao

  In recent years, cyber crime has attracted more and more attention. At the Central Political and Legal Work Conference held in January this year, Meng Jianzhu, member of the Political Bureau of the Communist Party of China (CPC) Central Committee and secretary of the Central Political and Legal Committee, pointed out that at present, China’s cyber crimes have accounted for one-third of the total crimes, and the growth rate is over 30% every year.

  At the recently held 5th China Internet Security Conference (ISC2017) with the theme of "Everything changes into people is the measure of security", industry insiders and relevant experts made a detailed analysis of the current factors affecting network security and the characteristics of cyber crimes, and put forward a series of countermeasures.

  Disclosure of security vulnerabilities should comply with the law.

  In the first half of this year, the ransomware WannaCry spread all over the world. The reason why this happens is precisely because WannaCry exploited the vulnerability of Microsoft operating system.

  At the ISC2017 Cyber Security Rule of Law Forum, Huang Daoli, director and associate researcher of the Cyber Security Law Research Center of the Third Institute of the Ministry of Public Security, introduced the situation related to security vulnerabilities.

  "From some related incidents at home and abroad, it can be seen that security vulnerabilities have become the core elements that cause system insecurity. There are many problems surrounding security vulnerabilities, including their generation. We believe that the disclosure of security vulnerabilities has become the central link of network security risk control. " Huang Daoli said.

  Security vulnerabilities focus on how to disclose them. Huang Daoli introduced several cases:

  Last year, WOOYUI (a safety feedback platform between manufacturers and security researchers) "White Hat" disclosed a loophole in a dating website, which triggered a criminal case.

  The WannaCry incident that has attracted much attention.

  A large website issued a public statement to a "white hat" who publicly disclosed the details of security vulnerabilities without authorization.

  "A security breach is an unintentional defect. There is no definition of security vulnerability in domestic and foreign laws. Now Article 25 of China’s Cyber Security Law continues to identify the internal vulnerability risk attribute of security vulnerability, and identifies security vulnerability as one of the security risks. However, security vulnerabilities are only considered as a kind of risk, and vulnerability information also belongs to network security information. Article 26 of the Cyber Security Law ranks vulnerable network information in the first place. " Huang Daoli said.

  According to Huang Daoli, there are several ways to deal with security vulnerabilities after they are discovered: no disclosure, confidentiality after discovery, no report, no report to manufacturers, and no disclosure to the public; Security disclosure, where the vulnerability discoverer discloses the security vulnerability to an unspecified public; Responsible disclosure, security vulnerabilities are reported to the manufacturer, and after the solution is complete, the manufacturer will announce the vulnerabilities and send them to users; Collaborative disclosure, stakeholders share vulnerability information and work together.

  "The above situations have always existed." Huang Daoli said that the traditional disclosure of security vulnerabilities is based on responsible disclosure. The next stage is the modern vulnerability disclosure policy with collaborative disclosure as the trend.

  "We have a basic point of view. Based on the dual nature of security vulnerabilities, on the one hand, it is harmful, because the rapid spread of the Internet is magnified, and illegal disclosure to users will affect public safety and even national security; On the other hand, we can control network security risks through the use of security vulnerabilities and provide important technical support for law enforcement activities. " Huang Daoli said that the discovery, disclosure and repair of security vulnerabilities are the basic work of network security. All stakeholders around security vulnerabilities should shoulder their due legal responsibilities, including social responsibilities, and jointly promote the orderly and legal development of the Internet.

  The investigation of online financial crimes is very knowledgeable.

  Campus loan and training loan … … In recent years, network financial crime has become the most common form of network crime, and its harm is also relatively great.

  At the ISC2017 Cyber Crime Investigation and Talent Training Forum, Sun Xiaodong, director and associate professor of the Cyber Crime Investigation Teaching and Research Section of China Criminal Police College, legal adviser of Liaoning Provincial Government and special instructor of Dalian Public Security Bureau, introduced the situation of cracking down on cyber financial crimes.

  "The online financial crime we are talking about today is a broad concept, that is, in the network environment, the forms of crime derived from various channels such as online investment and financial management, trading, settlement and payment; It is not a kind of crime or a crime stipulated in the criminal law, but a kind of common and popular overall crime form among law enforcement agencies. " Sun Xiaodong said that no matter what the form of online financial crimes is, in nature, it is nothing more than pyramid schemes, fraud, illegal fund-raising and illegal business operations.

  According to Sun Xiaodong, there are generally two lines to crack down on online financial crimes, data and funds. "The so-called data includes criminal suspects pushing the information involved to unspecified victims by telephone, text messages, social software, websites, etc. After the victims are fooled, the criminal suspects obtain benefits through third-party transfer and virtual transactions. For example, in terms of information, we will pay attention to IP addresses and virtual identities. The channel of capital benefits depends on the information related to bank accounts, including third-party payment information and transaction details. "

  "In terms of investigation, inquiry is the first step, and successful inquiry often becomes a prerequisite for determining the success of a case. Why is it very important to ask about network-related cases? Because the victim of this kind of case is willing to cooperate with you subjectively, but his subjective description may be lacking or even ambiguous because they don’t understand the network knowledge and the details of the case. This requires our case handlers to fully understand the grasp of the case and grasp the key points to make a breakthrough. " Sun Xiaodong said.

  Compared with traditional cases, the information related to Internet cases is often more complicated.

  "Internet cases are rarely single cases, and they are all multiple cases. As long as the information is sent, it is very important to find the source of the information and the first person involved by tracing back to the source. In addition, it is the website of the company. Many victims, including our grassroots case handlers, sometimes misunderstand in the process of understanding the relevant information. The victim said that he would make an investment in a certain website. In fact, this website is only the carrier of propaganda information, and the real trading platform is on an independent server. Because the victim doesn’t understand it and can’t describe it accurately, we need to do a lot of work at this time. We need to inquire about the company’s website, introduce the platform trading model through the website, and then find the key information or evidence a little bit. " Sun Xiaodong said.

  Once the investigation is carried out, it mainly starts from four aspects: website, funds, personnel and transactions.

  According to Sun Xiaodong, in terms of personnel, it generally includes telephone operators, customer service, network management and platform administrators. "General platform administrator, with transaction data management authority, is the technical core of the gang, sometimes called trader. Besides the simplest operators and platform administrators, how can keyboard players and platform administrators be found? In fact, different cases have different forms of expression, and we have different ideas when investigating. "

  Sun Xiaodong believes that the details of transactions and funds may prompt the nature of the case in some cases, and some interesting phenomena may be found after reading more cases. "When we investigated the fund accounts involved, we found that different cases showed different characteristics. For example, a stakeholder-type financial investment case may publicize P2P to the outside world, but you may find that investors’ funds have not flowed out in its preset way after pouring into this platform, but have formed a large pool of funds, which may be a case of illegally absorbing public deposits. If returned in a certain proportion, it may be suspected of pyramid schemes. Therefore, funds can sometimes help us analyze certain cases. "

  "Under the guidance of investigation thinking, we should rationally choose investigation techniques and strengthen the awareness of evidence. Investigation itself belongs to an empirical discipline rather than a classic discipline, and investigators should constantly sum up experiences and lessons and analyze their own shortcomings in their work. At the same time, the development of the network is changing with each passing day. As investigators, we should constantly learn and update our business capabilities. " Sun Xiaodong said.

  Playing digital games on spot trading platform

  In online financial crimes, spot trading platform cases are more prominent.

  At the ISC2017 Cybercrime Investigation and Talent Training Forum, Wu Yubao, vice president of the School of Information Technology of Nanjing Forest Police College with rich practical experience, introduced the investigation of such cases.

  "For this kind of case, we met a lot in the past ten years. Many people may receive such a phone call asking if they are interested in investing in oil, silver, garlic, ginger, Chinese medicine and so on. Some people will say that the stock market is not good, the price is always falling and they can’t make money. Investing in their platform can make two-way transactions, and the price of goods can make money, and the price of goods can also make money. Of course, many people may hang up the phone, but some people have fallen into the trap, causing huge economic losses to the family. " Wu Yubao said.

  According to Wu Yubao, once customers participate in this platform, they will open corresponding virtual accounts on the platform, which corresponds to each customer. After the account is opened, participants in these platform transactions will transfer the funds in personal accounts, such as bank accounts, online banking or third-party payment accounts, to the platform, which is called deposit operation. Personal funds are transferred to the fund pool established by the platform sponsor through the deposit operation. After the deposit, the platform and the fund pool are linked, and the platform will display the figures equivalent to the funds in the customer account. What the victim sees is not his own money, but a number. In fact, the victim’s money has been out of his control and transferred to the fund pool, and the controller of this fund pool is the platform sponsor. Every time you deposit money, the total amount of funds will change.

  "After all customers have completed the deposit, the platform sponsor will organize a so-called investment instructor to tell everyone that today’s market is very good and can be invested. Then, customers will buy and sell during the operation, and there will be handling fees and storage fees. If you hold a list, you will still charge storage fees, extension fees, etc. overnight if you don’t open your position today. The money is taken away by the platform. If the customer fails to invest, for example, it is predicted that the price of gold will rise tomorrow, but as a result, the price of gold will fall tomorrow, and the customer will have some losses. All these will lead to a little deduction of the trading platform customers’ funds, and what customers see is that their own money will gradually decrease. If the customer thinks that the investment failed and lost money, and there is some money left in the account, and wants to get the money back quickly, he can make a gold move, but he can only get the remaining small amount displayed on the platform. Who has the balance of the fund pool? It is in the hands of the platform sponsor. " Wu Yubao said.

  There are several key problems in similar cases. First, is there any physical delivery?

  "I haven’t seen a platform that can provide physical delivery in handling cases. This is a typical violation. I just play digital games with everyone on the platform and there is almost no physical delivery." Wu Yubao said.

  Have the funds in the fund pool entered the market activities?

  "All the victims’ funds are in the fund pool ‘ Sleep ’ , funds are not really involved in market activities. For example, helping people buy lottery tickets on their behalf, this person has not really entered the lottery market after receiving your money, but put the money into his pocket, just telling you that you have not won the prize. " Wu Yubao said.

  The other is the organizational form of the transaction.

  "The transaction organization form is actually a centralized transaction in the platform, and it is not scattered. For example, a subject matter, 500 kg of ginger or 2 tons of Chinese herbal medicines is a decentralized transaction in reality, and this platform is generally a centralized quotation method. So what is the transaction method? There are generally two kinds of platforms, one is matchmaking and the other is market maker. The understanding of matching transactions and market makers is very helpful for us to investigate cases. We must have a deep understanding of the platform trading mode and operation mode, otherwise there will be great resistance in the investigation process. " Wu Yubao analyzed.

  Wu Yubao also believes that in the process of handling such cases, there are several issues that need attention: with the illegal sale of citizen information, all spot trading platforms will call specific people; In the process of handling, sometimes a gang will be caught by tracing the source. This gang is only one group in the platform, and it is a group crime; There is a phenomenon of "black eating black". Once, a platform reported that the money in the cash pool was transferred away. In fact, it was a "hacker" who attacked the trading platform and put the funds in the cash pool into his account. This is a phenomenon of "black eating black".

  Improve the governance mechanism system of cyber crime

  Cybercrime is becoming more and more complex, which challenges the current model of combating governance.

  Jin Bo, assistant to the director of the Third Research Institute of the Ministry of Public Security and chief scientist, believes that cyber crime has new characteristics compared with traditional crimes, such as the intelligence of the subject of cyber crime, high level of specialization of personnel, hidden behavior without leaving traces, and diverse means of committing crimes. Communication can form transnational cyber crimes across regions, and the cost of cyber crimes is very low, and the consequences are difficult to control and predict. At the same time, cyber crime technology develops with the development of Internet technology and is constantly innovating. These factors lead to the complexity of cyber crime, which brings great difficulties to the investigation and evidence collection of public security organs. In addition, with the full penetration of network society and real society, traditional criminal activities are becoming more and more networked, especially violent terror and organized crime, and their planning, organization, contact and incitement are all carried out online.

  At the ISC2017 Cyber Security Rule of Law Forum, the Report on Global Cyber Security Situation and Countermeasures from the Legal Perspective issued by 360 Company holds that with the development and popularization of information technology, especially the development of Internet technology, a borderless cyberspace has gradually formed around the world, and every country is a member of this space, facing common risks and challenges, and most of the actual cyber security incidents have transnational characteristics. Therefore, the international community needs to think about how to strengthen the protection of network security around the world, and more need to determine the rules of behavior in cyberspace, so as to better prevent all kinds of network attacks.

  "At present, the hottest topic in the field of cyber security governance is cyber crime governance." Wu Shen Kuo, associate professor of Beijing Normal University and secretary-general of internet society of china Research Center, said at ISC2017 Sub-forum on Cybersecurity and Rule of Law that especially with the popularization and application of new generation network technologies such as Internet of Things, big data and cloud computing, illegal acts have become unprecedented concealment and transnational, and the problems faced by China are also challenges faced by the whole world.

  Wu Shen Kuo introduced the relevant measures of the international community. For example, within the scope of the European Union, Europol established EC3 organization, and the Lisbon condition in EU legislation determined that the field of computer crime had direct legislative authority, which provided ideas for the harmonization of regional legislation.

  "We need to break through the old cognitive thinking and practical mode of crime governance. In this process, it is necessary to put criminal means under the overall planning to realize the governance of crime source, and we should have a new concept of comprehensive governance. Efforts should also be made to speed up the improvement of network legislation and provide new normative support and more effective institutional support in the process of dealing with cyber crimes. It is necessary to effectively overcome the shortcomings of the mechanism of fragmented law enforcement and achieve comprehensive coordination and linkage integration in a wider range. Adhere to the guidance of intelligence information, vigorously promote the information operation mechanism integrating intelligence information with command and action, and at the same time further promote the construction of basic informatization, make full use of big data technology and informatization means to improve the intelligent level of crime prevention and control, and build a national network security center. " Shen Kuo Wu said.

  Wu Shen Kuo believes that it is necessary to emphasize the export of the China Rules and China’s experience at the international level, and it is worth noting that the system of the new cybercrime convention should be actively promoted under the framework of the United Nations, so as to enhance China’s international voice and normative participation right in the new cybercrime governance field.

  Cartography/Gao Yue  

  interlinkage    

  Article 27 of the Network Security Law of the People’s Republic of China stipulates that no individual or organization may engage in activities that endanger network security, such as illegally invading other people’s networks, interfering with the normal functions of other people’s networks, and stealing network data; It is not allowed to provide programs and tools specially used to engage in activities that endanger network security, such as invading the network, interfering with the normal functions and protective measures of the network, and stealing network data; Knowing that others are engaged in activities that endanger network security, they may not provide technical support, advertising promotion, payment and settlement, etc.

  Article 40 of the Network Security Law stipulates that network operators should keep the user information they collect strictly confidential and establish and improve the user information protection system.

  Article 42 of the Network Security Law stipulates that network operators shall not disclose, tamper with or destroy the personal information they collect; Personal information shall not be provided to others without the consent of the person being collected. However, unless a specific individual cannot be identified after processing and cannot be recovered.

  Network operators should take technical measures and other necessary measures to ensure the safety of personal information collected by them and prevent information from being leaked, damaged or lost. When personal information is leaked, damaged or lost, it shall immediately take remedial measures, inform users in time according to regulations and report to relevant competent departments.

  Article 46 of the Cyber Security Law stipulates that any individual or organization shall be responsible for its use of the Internet, and shall not set up websites or communication groups for committing fraud, teaching criminal methods, making or selling prohibited items, controlled items and other illegal and criminal activities, and shall not use the Internet to publish information related to committing fraud, making or selling prohibited items, controlled items and other illegal and criminal activities.

The first day in science and technology innovation board: the average increase was as high as 140%, and the total turnover exceeded 48 billion.

At 9: 30am on July 22nd, the first batch of 25 science and technology innovation board stocks were listed on the Shanghai Stock Exchange, and science and technology innovation board officially opened. Xinhua news agency

  Huaxi Dushi Bao-cover journalist Zhao Yaru Xiong Yingying

  Twenty-five new shares in science and technology innovation board started trading with the code "688". As of the close of July 22nd, none of the 25 "688s" broke, and the average increase was as high as 140%, with a total turnover of over 48 billion.

  Apart from the surge, what are the highlights of science and technology innovation board’s first day?

  Aspect 1

  The average increase across the board was as high as 140%

  "It should be said that the increase on the first day still exceeded our expectations." A brokerage official said about science and technology innovation board’s performance on the first day.

  Previously, the agency predicted the first day’s increase in science and technology innovation board, and it was generally believed that the first day was a disaster, but it was difficult to exceed 100%. CITIC Securities predicts that the average turnover rate of new shares in science and technology innovation board will be 35%-65% on the first day, and the turnover will be 13 billion-24 billion, with an average increase of less than 20%. Everbright Securities, under the optimistic assumption, estimates that the increase range of 25 science and technology innovation board new shares is 20%-65%.

  But the fact is, on the first day of science and technology innovation board, 25 stocks rose sharply across the board, with 16 stocks with an increase of more than 100%, with Anji Technology with the highest increase of 400% and Xinguang Optoelectronics with the lowest increase of 84.22%. The average increase is as high as 140%, even higher than the average increase of 106% on the first day of the GEM.

  Aspect 2

  Frequent stoppages: Shanghai Stock Exchange issued 29 announcements of stoppages.

  According to the Shanghai Stock Exchange and the characteristics of science and technology innovation board enterprises, the existing temporary suspension mechanism of A shares has been optimized in two aspects. First, the trigger threshold of temporary suspension has been relaxed from 10% and 20% to 30% and 60% respectively to avoid frequent suspension on the first day of listing; The second is to shorten the duration of the two suspensions to 10 minutes.

  On the first day of listing, there were frequent stoppages in science and technology innovation board, and the Shanghai Stock Exchange issued a total of 29 announcements of stoppages throughout the day. Hangke Technology is the first stock in the session that triggered the temporary stop. After the opening, it rose by more than 30% to trigger the temporary stop mechanism. Within five minutes of the opening, seven stocks, including N Ruichuang, N Tianzhun, N Zhongwei, N Jiaokong, N Hanchuan, N Hongruan and N Jiayuan, were temporarily suspended due to their decline exceeding the opening price by 30%.

  Aspect 3

  "Making wealth" keeps the richest couple worth 18.6 billion.

  Under the surge, it is followed by the myth of "making wealth" of new shares. Of the 25 enterprises in science and technology innovation board, 17 are natural persons. By the close of the 22nd, Chen Wenyuan and Jess Zhang, the actual controllers of Huaxing Yuanchuang, together held about 336 million shares of Huaxing Yuanchuang. According to the closing price of 55.5 yuan, the market value of the shares held by Chen Wenyuan and his wife was about 18.6 billion yuan, making them the richest people in science and technology innovation board.

  Ranked second are Cao Ji and Cao Zheng, the actual controllers of Hangke Technology. Together, they hold about 278 million shares of the company, with a stock market value of about 15.1 billion yuan based on the closing price on the 22nd. The actual controllers of ArcSoft Technology, Hui Deng and Liuhong Yang, have a market value of 9.064 billion yuan, ranking third.

  Aspect 4

  The turnover rate is amazing. The turnover rate of 24 stocks is over 70%

  Science and technology innovation board’s turnover on the first day totaled about 48.5 billion, and the turnover rate of individual stocks was amazing.

  Previously, some institutions predicted that science and technology innovation board’s turnover rate on the first day might be between 35% and 60%, but in fact, 24 of the 25 stocks had turnover rates exceeding 70% and 6 had turnover rates exceeding 80%. Anji Technology, which had the highest increase, also had the highest turnover rate, reaching 86.19%. This means that the vast majority of the winners have chosen to take profits on the first day.

  A high-net-worth investor told Huaxi Dushi Bao and the cover journalist that he won three new shares in science and technology innovation board this time, and all of them were sold on Monday morning, and he did not intend to enter the market again in the short term. "The recent new income is not as good as before, but science and technology innovation board is still a sure-fire. I shouldn’t be involved in science and technology innovation board trading in the near future. I feel too ‘ this morning’s trend. Crazy ’ Well, there is no price increase or decrease in the first five trading days, and I am worried that the stock price will sit down in the next few days ‘ Roller coaster ’ 。”

  According to the China Securities Journal, a large Public Offering of Fund person said that due to the high opening price and relatively obvious overestimation, all of them have now made profits. If you want to buy in the future, it is recommended to select the target after the valuation enters a reasonable range. In addition, a large-scale private placement in China also said that the winning bid has increased greatly at present and will be sold at the right opportunity.

  Aspect 5

  Huge turnover, 25 stocks

  "sell" 20% of the Shanghai stock exchange.

  After high turnover rate, it is high turnover. As of the close of the first day, the total turnover of 25 stocks in science and technology innovation board exceeded 48 billion, while the turnover in Shanghai stock market was 204.2 billion yuan. In other words, the number of science and technology innovation board stocks, which accounts for about 2%, accounts for nearly 20% of the turnover.

  Yang Delong, chief economist of Qianhai Open Source Fund, said that the transaction volume in science and technology innovation board today exceeded 48 billion, far exceeding the previous market expectations. The 25 new shares listed and traded on the first day were small, with more than 3 million investors opening accounts, which belonged to the situation of more funds and less stocks, so the stock price rose sharply. After four trading days, it is expected that the price will still fluctuate greatly. On the 22nd, the fluctuation of the market is mainly upward, but in the later trading day, there may be a large downward fluctuation in intraday or closing. For investors, it is easy to lose money in short-term operations if you are not sure about the volatile market. Therefore, investors are advised not to excessively participate in short-term speculation, but to choose really good companies for allocation with a long-term perspective.

  | Expert comments |

  Science and technology innovation board opens the market to draw blood A shares?

  Expert: It will not cause long-term capital diversion.

  On July 22nd, the three major A-share stock indexes fluctuated lower in the afternoon. At the close, the Shanghai Composite Index fell 1.28%, fell below the 2900 mark, the Shenzhen Component Index fell 1.15%, and the Growth Enterprise Market Index fell 1.69%. The plates are generally floating green.

  At the same time, the turnover of 25 stocks in science and technology innovation board exceeded 48 billion yuan. Anji Technology rose by 400%, and the turnover of China Tonghao ranked first with nearly 10 billion yuan.

  In this regard, there have been many comments in the market, saying that science and technology innovation board will exert pressure on A-shares through blood-drawing effect after the opening of the market.

  Yang Delong, chief economist of Qianhai Open Source Fund, said that there was a certain adjustment in the main board and small and medium-sized board on the 22nd, and many people were worried that science and technology innovation board’s opening of the market would attract a large amount of capital, which would have a certain diversion effect on the funds of the main board and small and medium-sized enterprises. However, he believes that this diversion of funds is short-term and will not cause long-term diversion. "In the long run, science and technology innovation board is an important supplement to the main board and small and medium-sized enterprises, and they all belong to an important part of China’s multi-level capital market. Investors can choose their own stocks or funds to invest according to their risk preferences and investment ability. "

  Fan Bo, general manager of bedrock Capital Investment Department, believes that whether the A-share market can take the technology bull or not also needs to make a mid-term judgment on valuation, liquidity and corporate profit. science and technology innovation board will drive the A-share market to welcome the technology bull market, but it is more regarded as a driving point.

  In his view: First, science and technology innovation board’s launch positioning is clear, which is a key link to improve and perfect the basic system of A-shares, laying an institutional foundation for the long-term healthy development of A-shares and benefiting the A-share market in the long run; Second, the establishment of science and technology innovation board will bring positive feedback to the A-share main board, that is, science and technology innovation board enterprises will support the development of entity enterprises after financing, and the valuation of A-share benchmarking companies will also increase accordingly; Third, the current technology stocks are at a low level. According to the latest performance forecast of the interim report, there are many leading companies and white horse stocks with certain performance growth and invisible champions with a market value of 10-50 billion, such as some companies in the PCB industry chain.