Northwestern Polytechnical University was attacked by American NSA network: the United States gradually infiltrated and stole secrets for a long time.

  Cctv newsOn September 27th, the National Computer Virus Emergency Response Center issued a document "Investigation Report on Northwestern Polytechnical University Attacked by NSA Network (Part II)".  

  On June 22, 2022, Northwestern Polytechnical University issued a "Public Statement" saying that the school was attacked by overseas cyber attacks. The Beilin Branch of the Public Security Bureau of Xi ‘an, Shaanxi Province immediately issued the "Alert Bulletin", which confirmed that a number of trojans and malicious programs originated from abroad were found in the information network of Northwestern Polytechnical University, and the Xi ‘an police have officially filed an investigation.

  China National Computer Virus Emergency Response Center and 360 Company participated in the technical analysis of this case. The technical team has successively extracted Trojan samples from many information systems and Internet terminals of Northwestern Polytechnical University, comprehensively used existing domestic data resources and analysis methods, and got the full support of partners in some countries in Europe and Southeast Asia, which completely restored the overall overview, technical characteristics, attack weapons, attack paths and attack sources of related attacks. It is preliminarily determined that the related attack activities originated from the "Office of Specific Invasion Operations" of the National Security Agency (NSA) (namely, the Office of Tailored Access Operation, hereinafter referred to as "TAO").

  This series of research reports will publish the important details of some specific attacks in thousands of cyber attacks launched by TAO against Northwestern Polytechnical University, and provide useful cases for countries around the world to effectively discover and prevent TAO’s subsequent cyber attacks.

  First, the process of TAO attack infiltrating Northwestern Polytechnical University

  TAO’s cyber attacks launched by other countries are highly targeted, adopting semi-automatic attack flow, single-point breakthrough, gradual infiltration and long-term stealing.

  (A) a single breakthrough, cascading infiltration, control of the network of Northwestern Polytechnical University

  After long-term careful preparation, TAO used the "acid fox" platform to carry out man-in-the-middle hijacking attacks on the internal hosts and servers of Northwestern Polytechnical University, deployed "anger jet" remote control weapons, and controlled several key servers. By using the way of Trojan horse cascade control penetration, it deeply penetrated into the internal network of Northwestern Polytechnical University, successively controlled the core network equipment, servers and terminals of the operation and maintenance network and office network, and obtained the control rights of some important network node equipment such as routers and switches in Northwestern Polytechnical University, stole the authentication data, and further implemented penetration expansion, and finally achieved the hidden control of the internal network of Northwestern Polytechnical University.

  (2) Concealed residence, "legal" monitoring and stealing core operation and maintenance data.

  TAO uses the cover weapon "Precision Surgeon" and the remote control Trojan NOPEN to realize the overall "invisibility" of the process, files and operation behavior, and secretly control the operation and maintenance management server of Northwestern Polytechnical University for a long time. At the same time, it adopts the way of replacing three original system files and three types of system logs to eliminate the trace and avoid the traceability. TAO has stolen several network device configuration files from the server. Using the stolen configuration files, TAO remotely "legally" monitored a number of network devices and Internet users, providing data support for the subsequent expansion and penetration of these targets.

  (3) Collecting authentication data, building channels and infiltrating infrastructure.

  By stealing key sensitive data such as account passwords, operation records and system logs of remote business management of operation and maintenance technicians in Northwestern Polytechnical University, TAO has mastered a number of account passwords of network boundary devices, access rights of business devices, configuration information of routers and other devices, and information of FTP server documents. According to the characteristics of TAO attack link, penetration mode and Trojan horse samples, it is found that TAO illegally attacked infrastructure operators in China, and a "legal" channel for remote access to the core data network of infrastructure operators was constructed, which realized the penetration control of infrastructure in China.

  (four) control of important business systems, the implementation of user data theft

  TAO entered the China infrastructure operator’s network as a "legitimate" by mastering the account passwords of Cisco PIX firewall, Tianrongxin firewall and other equipment, and then implemented intranet penetration and expansion, respectively controlled the service quality monitoring system and SMS gateway server of the relevant operators, and used the weapon tools specifically aimed at the operator’s equipment such as "Magic School" to query a group of sensitive identity personnel in China, and packaged and encrypted the user information and sent it back to the headquarters of the National Security Agency.

  Second, stealing sensitive information from Northwestern Polytechnical University and China operators.

  (1) Stealing key sensitive data such as passwords and operation records of remote business management accounts of Northwestern Polytechnical University.

  TAO secretly sniffed and stole the remote maintenance management information of the operation and maintenance management personnel of Northwestern Polytechnical University for a long time by installing the sniffing tool "drinking tea" in the operation and maintenance management server of Northwestern Polytechnical University, including the account password of network boundary equipment, access rights of business equipment, router and other equipment configuration information.

  The types of network devices that are sniffed include fixed Internet access network devices (routers, authentication servers, etc.), core network devices (core routers, switches, firewalls, etc.), and also important devices of communication infrastructure operators (data service platforms, etc.), including account numbers, passwords, device configurations, network configurations and other information.

  1. Steal the account password and configuration information of the core network equipment of Xigong University.

  At 6: 52 on December 11th, 20××× Beijing time, TAO used the proxy server (IP: 130.54 .××××××) located in Kyoto University of Japan as an attack springboard, illegally invaded the "telnet" management server of the operation and maintenance network of Northwestern Polytechnical University, uploaded and installed the NOPEN Trojan, and then controlled its intranet monitoring and management server in cascade. Both of the above servers had been installed with "tea drinking" sniffing in advance. TAO remotely controls the Trojan to retrieve and download the compressed and encrypted monitoring record file, and then clears the trace and exits. Stealing data includes the management account number, password, device configuration, network configuration and other information of routers and core network devices (core routers, switches, firewalls).

  2. Stealing the account password and configuration information of the access network authentication device for many times.

  (1) At 0: 28 on May 30th, 20××× Beijing time, TAO took the proxy server (IP: 210.135××××××) located in Japan as an attack springboard, illegally invaded the "telnet" management server of the operation and maintenance network of Northwestern Polytechnical University, uploaded and installed the NOPEN Trojan, and then controlled its intranet monitoring and management server in cascade. Both servers had been installed with "drinking tea" in advance. The stolen data includes the account number, password and configuration information of the access network authentication device.

  (2) At 1: 12 on July 4th, 20××× Beijing time, TAO used the proxy server (IP: 141.57 ××××××) located in Leipzig Institute of Technology, Economics and Culture as an attack springboard, illegally invaded the "telnet" management server of the operation and maintenance network of Northwestern Polytechnical University, uploaded and installed the NOPEN Trojan tool, and cascade controlled its internal network monitoring and management server and other three servers. These four servers were in advance.

  (3) At 10: 35 on October 11th, 20 ××× Beijing time, TAO used the proxy server (IP: 210.115 ×××××××) located at Gangwon National University in Seoul, South Korea as an attack springboard to illegally invade the monitoring and management server of the operation and maintenance network of Northwestern Polytechnical University, upload and install the NOPEN Trojan tool, and then cascade control its internal network backup server, authentication server and other four servers.

  (4) At 2: 46 on October 19th, 20××× Beijing time, TAO used the proxy server (IP: 143.248 .×××××××) of the Institute of Advanced Science and Technology in Daejeon, South Korea as an attack springboard, illegally invaded the "telnet" management server of the operation and maintenance network of Northwestern Polytechnical University, and controlled its intranet supervision server and other two servers in cascade. All three servers had been installed with "tea drinking" in advance.

  (2) Stealing configuration files and log files of network equipment operation and maintenance in Northwestern Polytechnical University.

  The National Security Agency’s "Specific Invasion Action Office" (TAO) has long attacked and invaded the network operation and maintenance management server of Northwestern Polytechnical University, secretly stealing the configuration files and log files of network equipment operation and maintenance.

  1. Steal the network operation log file of Northwestern Polytechnical University.

  At 3: 41 on March 2, 20×× Beijing time, TAO illegally invaded and controlled a network operation and maintenance management server of Northwestern Polytechnical University through a proxy server (IP: 210.135 ××××××) located in Japan. At 3: 49, TAO moved horizontally from the operation and maintenance management server to another operation and maintenance monitoring server, searched the log files with specific character strings as keywords and stole a batch of system operation log files and backup files of system daily self-inspection reports.

  2. Steal the regular task configuration script of Northwestern Polytechnical University server.

  At 10: 41 on October 11th, 20××× Beijing time, TAO invaded and controlled an intranet server of Northwestern Polytechnical University through a proxy server located in Korea (IP: 210.115 ××××××). At 10: 48, after two lateral moves, TAO invaded another intranet server, accessed the regular task configuration scripts in a specific directory, and retrieved 14 configuration files for regular tasks. Subsequently, these 14 files were stolen at one time, which can be used to perform regular cleaning, backup, power check and other operations.

  3. Steal the information file of the server system of Northwestern Polytechnical University.

  At 1: 27 on June 6, 20 ××× Beijing time, TAO invaded and controlled an intranet server of Northwestern Polytechnical University through a proxy server located in Korea (IP: 222.122 ××××××). At 2: 04, after two horizontal moves, TAO invaded another intranet server, accessed the system files under the directory /var/, and stole 60 commonly used system information files. The contents of the stolen system information files included system release version, user password hash, user rights, local domain name resolution configuration, etc.

  (C) Infiltration control of China infrastructure core equipment.

  The Office of Specific Invasion Operations (TAO) of the National Security Agency of the United States used the password of the stolen network equipment account to enter the service network of an infrastructure operator in China as a "legitimate" identity, control the related service quality monitoring system, and steal the user’s private data.

  1. Steal the privacy data of users in China.

  At 22: 53 Beijing time on March 7, 20 ×××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××

  At 15: 02 on the same day, TAO saved the queried user data in the directory of the attacked server/var/tmp/.2e434fd8aaee73e1/ERF/out/f/,and then packaged it and sent it back to the attack springboard. Subsequently, the attack traces such as infiltration tools and user data uploaded during the process of stealing secrets were quickly removed by special tools.

  The Office of Specific Invasion Operations (TAO) of the National Security Agency of the United States used the same method to attack and control another China infrastructure business server at 23: 22 on January 10th, 8: 41 on January 29th, 22: 00 on March 28th and 23: 58 on June 6th, respectively, and illegally queried, exported and stole the user information of many identity-sensitive personnel in batches.

  2. Infiltrate and control the global telecommunications infrastructure

  According to the analysis, the Office of Specific Invasion Operations (TAO) of the National Security Agency (NSA) used the same combination of weapons and tools to "legally" control the telecommunications infrastructure networks in no less than 80 countries around the world. The technical team cooperated with the partners in Europe and Southeast Asian countries, successfully extracted and fixed the samples of the above weapons and tools, and successfully completed the technical analysis, which is planned to be released to the public in due course to help the world jointly resist and prevent the network penetration attack of NSA.

  Third, TAO exposed his identity during the attack.

  In the process of cyber attack on Northwestern Polytechnical University, the Office of Specific Invasion Operations (TAO) of the National Security Agency exposed many technical loopholes and made many operational mistakes. Relevant evidence further proves that the behind-the-scenes action of cyber attack on Northwestern Polytechnical University is the NSA of the United States. Here are some examples:

  (1) The attack time completely conforms to the law of work and rest time in the United States.

  The National Security Agency’s Office of Specific Invasion Operations (TAO) must use manual operation when using the tipoff activation command and remotely controlling the NOPEN Trojan. From the attack time of these two tools, the actual working time of the network attacker can be analyzed.

  First of all, according to the big data analysis of related cyber attacks, 98% of cyber attacks on Northwestern Polytechnical University are concentrated between 21: 00 and 4: 00 am Beijing time, which corresponds to 9: 00 to 16: 00 EST, and belongs to the domestic working time in the United States. Secondly, there was no cyber attack on Northwestern Polytechnical University on all Saturdays and Sundays in the United States. Thirdly, by analyzing the unique holidays in the United States, it is found that the "Memorial Day" in the United States has three days off, and the "Independence Day" in the United States has one day off. During these four days, the attacker did not carry out any attack and theft. Fourth, after a long period of close tracking of the attacks, it was found that all cyber attacks were silent during the Christmas period. Judging from the above working hours and holiday arrangements, those who attack and steal secrets against Northwestern Polytechnical University are unscrupulous and undisguised in their activities according to the schedule of working days in the United States.

  (B) Language behavior habits are closely related to the United States.

  During the long-term tracking and reverse osmosis of network attackers, the technical team found that the attackers have the following language characteristics: first, the attackers have the habit of using American English; Second, the internet devices associated with the attackers are all equipped with English operating systems and various English-language applications; Third, the attacker uses the American keyboard for input.

  (3) The working path of exposing the mistakes in weapon operation

  At 5: 36 (Beijing time) on May 16th, 20 ×××, the cyber attackers attacked Northwestern Polytechnical University again by using the springboard machine (IP:222.122.××.××) located in South Korea. When trying to invade and control a network device after the third-level infiltration of the intranet of Northwestern Polytechnical University, there was a human error when running the upload PY script tool, and the specified parameters were not modified. After the script is executed, an error message is returned, which reveals the working directory and corresponding file name of the attacker’s online terminal. From this, it can be known that the system environment of the Trojan control terminal is Linux system, and the corresponding directory name "/etc/autoutils" is the special name of TAO’s network attack weapon tool directory.

  The error message is as follows:

  Quantifier follows nothing in regex; marked by <– HERE in m/* <– HERE .log/ at https://news.cctv.com/2022/09/etc/autoutils line 4569

  (D) A large number of weapons are highly homologous to the exposed NSA weapons genes.

  Of the 41 different cyber attack weapons used in the attack on the secrets of Northwestern Polytechnical University, 16 tools are completely consistent with the TAO weapons exposed by the "shadow broker"; Although 23 tools are not exactly the same as those exposed by the "shadow broker", their genetic similarity is as high as 97%, and they belong to the same type of weapons, but their related configurations are different; The other two tools can’t correspond to the "Shadow Broker" exposure tool, but they need to be used together with other cyber attack weapons tools of TAO, so these weapons and tools obviously have homology and belong to TAO.

  (E) Some cyber attacks occurred before the exposure of "shadow brokers".

  The comprehensive analysis of the technical team found that in the tens of thousands of cyber attacks against targets in China, especially the thousands of cyber attacks launched against Northwestern Polytechnical University, some weapons used in the attack process were implanted with Trojan horses before the "shadow broker" exposed NSA weapons and equipment. According to NSA’s behavior habits, the above weapons and tools are likely to be used by TAO employees themselves.

  Fourth, TAO network attacks the IP list of weapon platform of Northwestern Polytechnical University

  During the technical analysis and traceability investigation, the technical team found a number of IP addresses of servers hosting related weapons and equipment used by TAO in the network invasion of Northwestern Polytechnical University. Examples are as follows:

  V. IP list of springboard used by TAO network to attack Northwestern Polytechnical University

  After continuous attack, the research team successfully locked the target node, multi-stage springboard, main control platform, encrypted tunnel, attack weapon and original terminal that launched the attack on Northwestern Polytechnical University, found the identity clues of the attacker, and successfully identified the true identities of 13 attackers.

News of FAW-Volkswagen CC price reduction in Yuncheng area, the latest offer is 202,900! Limited time special offer

[car home Yuncheng Preferential Promotion Channel] At present, preferential activities in Yuncheng area are under way. Consumers can seize the opportunity to enjoy a discount of up to 22,000 yuan, and the lowest starting price is 202,900 yuan. If you want to know more details of the discount and strive for a higher discount, please click "Check the car price" in the quotation form.

运城地区一汽-大众CC降价消息,最新报价20.29万!限时特惠

The appearance design of FAW-Volkswagen CC is full of dynamic and modern feeling. The front face adopts family-style design language, and the air intake grille adopts unique chrome decoration, which blends with the sharp headlights on both sides to create a strong visual impact. The lines of the vehicle are smooth, and the waistline on the side of the vehicle outlines a dynamic outline. With large-size wheels, it shows the perfect combination of movement and elegance. The overall style is fashionable and exquisite, which meets the high requirements of modern consumers for automobile appearance.

运城地区一汽-大众CC降价消息,最新报价20.29万!限时特惠

The body size of FAW-Volkswagen CC is 4865*1870*1459mm, the wheelbase is 2841mm, the front tread is 1586mm and the rear tread is 1572 mm.. The vehicle is streamlined, elegant and dynamic, with 18-inch wheels and 245/45 R18 tires, showing a unique sports style.

运城地区一汽-大众CC降价消息,最新报价20.29万!限时特惠

The interior design of FAW-Volkswagen CC is simple and fashionable, and a large number of leather materials and Alcantara are used to mix and match, which improves the texture and comfort of the interior. The steering wheel is made of genuine leather, with delicate feel, and supports manual adjustment up and down and back and forth, which can meet the needs of different drivers. The size of the central control screen is 9.2 inches, which is easy to operate. The built-in multimedia system, navigation, telephone and air conditioner can all be operated through the voice recognition control system. In addition, the car is also equipped with USB and Type-C interfaces to facilitate passengers to connect devices. The front seats support heating function, which can provide a comfortable riding experience for drivers and passengers. In terms of seat adjustment, the main and auxiliary seats support front and rear adjustment, backrest adjustment, height adjustment and lumbar support adjustment to meet the needs of different passengers. The rear seats can be tilted in proportion, which increases the flexibility of storage space.

运城地区一汽-大众CC降价消息,最新报价20.29万!限时特惠

FAW-Volkswagen CC is equipped with a 2.0T turbocharged engine with a maximum power of 137kW(186 HP) and a peak torque of 320 N m. With the 7-speed wet dual-clutch gearbox, it provides abundant power and smooth shifting experience for the vehicle.

The owner of car home said that he had owned a hatchback for four times, namely, the MG3 1.5MT, the Mazda 3 Angkor Sela 2.0 hatchback and the Volkswagen ID3. He was purely attracted by the appearance of the hatchback, and the sliding back design of FAW-Volkswagen CC undoubtedly satisfied his preference for the appearance of the hatchback.

Net legend Rui Automobile will submit an IPO application in 2024.

  [car home Information] According to Bloomberg News, IDG Capital is considering buying some shares of Chery Holding Group Co., Ltd. from existing shareholders at a price of RMB 7 billion. Chery Automobile Co., Ltd., a subsidiary of Chery Holding Group Co., Ltd., is planning to submit an initial public offering (IPO) application as soon as 2024, and may seek a valuation of 150 billion yuan. Some media have verified this rumor with Chery Holdings and Chery Automobile, and have not received a response yet.

  IDG Capital, which was reportedly planning to buy shares in Chery Holding Group, took the lead in developing venture capital business in China since 1993. It is the earliest private equity investment institution rooted in China, focusing on science and technology, advanced manufacturing/new energy, consumption, health and other fields.

Chery Automobile Tiggo 8 2024 Glory Edition 230TCI Automatic Excellence Edition 5 seats

  From January to November this year, Chery Automobile sold a total of 1,665,600 vehicles, up 47.8% year-on-year, exceeding last year’s total. Among them, more than 210,000 cars were sold in November, once again hitting a record high. In the first three quarters of this year, Chery Automobile’s operating income was 213.02 billion yuan, up 47.4% year-on-year, also exceeding last year’s total.

  At present, Chery Automobile is focusing on the transformation of new energy vehicles. In April this year, Chery disclosed its new energy strategy, and plans to invest more than 100 billion yuan in the next five years for scientific research and development of Sanpower, intelligent driving and ecology to realize the transformation from an automobile manufacturing company to a global technology company; In October, Yin Tongyue, Chairman of Chery Holdings, said that in 2024, it will definitely enter the national head in the ranking of new energy industry, "it will not be so polite as this year".

  And this so-called "head", Chery’s goal is to rank among the top five new energy sources of its own brand. In this regard, Chery plans to launch 39 new products of new energy vehicles in the next two years. In the fourth quarter of this year alone, Chery has released or listed a number of new energy vehicles, such as iCAR 03, Star Road Star Era ES, (|) and Chery Fengyun A8. (Text/Observer Network, compiled/car home Xing Yueyang)

Musk, who is about to be 53 years old, is said to be the father of 12 babies and still calls for "more children"

In a few days, Musk will celebrate his 53rd birthday, and there is evidence that he may be the father of 12 babies. Over the years, Musk has been contributing to the increase of the world’s population, and he has constantly called on human beings to have more children.

Bloomberg recently quoted people familiar with the matter as saying that earlier this year, the third child of American billionaire Musk and the female executive of the brain-computer interface technology company "Neural Connection" was born. According to media statistics, Musk has become the father of at least 12 children during his interaction with many women.

Neither Musk nor Chiris responded to this news.

Musk was born in South Africa on June 28th, 1971. According to media reports, the world’s richest man has been associated with at least four women.

Musk has had three marriages. In 2000, Musk got married for the first time. His wife, Justin Wilson, is a Canadian writer. Their marriage lasted eight years, during which they gave birth to six sons. Alexander, the first child, died unexpectedly at the age of 10 weeks, and then the couple gave birth to twins (Griffin Musk and Xavier Musk) and triplets (Kai, Saxon, Damia) in vitro, all boys.

In 2008, after the divorce, Musk shared the custody of the children with Justin Wilson.

Musk’s remaining two marriages are only related to one woman. In 2010, Musk married westworld actress talulah riley, and they divorced in 2012. In July 2013, the two remarried. In March 2016, the two divorced again.

There were no children in this marriage. Since then, Musk has never stepped into marriage, but the pace of having children has never stopped.

In May 2020, Musk gave birth to a son named X with Canadian singer Grimes. After they broke up, in 2022, Grimes gave birth to Musk’s daughter, nicknamed Y, through surrogacy.

During this period, Musk and Hivon Chiris also gave birth to two children. Chiris is a female executive of Musk’s "neural connection". A court document shows that Musk gave birth to twins with Chiris in November 2021. It is reported that the child was born in a test tube.

In 2023, walter isaacson, a biographer of Musk, confirmed that Musk and Grimes had a third child that had not been reported before. The child’s age has not been made public, and he is nicknamed Tau.

Earlier this year, Musk was exposed and quietly gave birth to a child with Chiris.

It is not clear how many children Musk has. According to public reports, there are 11 children who are still alive.

Musk had previously expressed concern about the decline in fertility rate around the world, especially in developed countries. In June this year, Musk said that the country was "going extinct" and called on everyone to have more children and avoid "population collapse". In addition, the Musk Foundation secretly subsidizes the American civil society organization "Encouraging Birth Movement", which is committed to encouraging birth at the economic and political levels.

Musk’s "population crisis theory" is not recognized by academic circles. According to the prediction of the United Nations, the world population will exceed the peak of 10 billion by 2100. It is generally believed in academic circles that after the world population reaches its peak, it will maintain a stable trend or decrease slowly, and there will be no so-called "population crisis" on the earth in the short term.

(Jimu News Comprehensive Global Times, The Paper)

Ministry of Public Security: In 2021, more than 6.2 million Internet Navy accounts will be shut down.

CCTV News:On January 14th, the Ministry of Public Security held a press conference to inform about the work measures and achievements of deploying public security organs across the country to carry out the "Net 2021" special action.

At the meeting, Sun Jinfeng, political commissar of the Network Security Bureau of the Ministry of Public Security, introduced that in recent years, various traditional crimes have accelerated to spread to the Internet, and cybercrime has become one of the major risks that endanger China’s data security, economic security and social security. In order to severely crack down on network crimes, ensure the healthy development of the digital economy and protect the legitimate rights and interests of the people, in 2021, the Party Committee of the Ministry of Public Security deployed a "net net" special campaign nationwide for the fourth consecutive year. In accordance with the unified deployment of the Ministry of Public Security, local public security organs have carefully organized and arranged, adhered to the strategy of "full-chain crackdown and ecological governance", focused on highlighting illegal crimes and network chaos on the Internet, in order to open the way, promote management by fighting, and promote governance by management. In the whole year, more than 62,000 cases were investigated, with a year-on-year increase of 10.7%; More than 103,000 criminal suspects were arrested, a year-on-year increase of 28.7%; More than 27,000 illegal Internet enterprises and units have been punished by administrative punishment, which has effectively maintained the security of cyberspace and the stability of online order, and effectively enhanced the people’s online security, sense of acquisition and happiness.

First, crack down on crimes against citizens’ personal information in accordance with the law. In recent years, technologies such as big data and cloud computing have not only promoted network interconnection and convergence, but also increased the risk of information leakage. In this regard, China promulgated the Data Security Law and the Personal Information Protection Law, which provided a strong legal support for the protection of personal information security. Public security organs throughout the country insist on putting the people in the highest position in their hearts, holding high the sword of law, always maintaining a high-pressure and severe crackdown on crimes against citizens’ personal information, focusing on the new trend of crimes of selling citizens’ personal information online, keeping a close eye on hidden parts such as "dark nets" and making every effort to carry out investigations. In 2021, more than 9,800 cases of infringing citizens’ personal information were investigated and more than 17,000 suspects were arrested.

The second is to severely punish hacking crimes according to law. In recent years, driven by high interests, some people steal data for profit through intelligent and covert attacks, threatening the security of enterprises and personal data, and even threatening the security of key information infrastructure. In this regard, the public security organs insisted on taking the initiative, focusing on judging and fighting in groups. In 2021, they arrested 3,309 people who carried out hacking activities and provided them with tools, money laundering and other services, and eradicated 341 gangs that produced and sold Trojan viruses and developed attack software platforms, which effectively guaranteed the security of important information systems and networks and effectively protected citizens’ personal information.

The third is to crack down on eavesdropping and stealing photos in accordance with the law. In recent years, some lawless elements illegally produce special equipment for eavesdropping and stealing photos, and sell and spread them online, which is deeply hated by the people. In this regard, the public security organs organized a special crackdown and rectification campaign. In 2021, a total of 783 criminal suspects were arrested for secretly installing eavesdropping and photo stealing equipment, 13 dens for manufacturing and selling special equipment for eavesdropping and photo stealing were destroyed, and more than 4,100 related equipment and parts were seized. More than 34,000 illegal eavesdropping and photo stealing products were removed from the e-commerce platform.

The fourth is to severely crack down on illegal crimes such as illegal black public relations and "network water army" according to law. In recent years, with the rise of "flow economy" and "fan economy", the "network water army" has gradually evolved from the initial simple posting "irrigation" to the implementation of paid post deletion, false comments, disinformation and drainage, and extortion by fake news media, misleading the public and seriously disrupting online order. In this regard, the public security organs organized and launched a special campaign to crack down on the "network water army". In 2021, more than 200 related cases were investigated, more than 2,000 criminal suspects were arrested, more than 6.2 million accounts and 1,200 websites of the "network water army" were shut down according to law, 170,000 network groups were dissolved, and a large number of forged press cards, official seals and business licenses were seized, effectively purifying the network environment.

Fifth, crack down on cheating and illegal crimes in online organization exams according to law. Examination order is related to social fairness and justice and the vital interests of the broad masses of the people. In recent years, some illegal personnel organized cheating in exams and sold cheating equipment through the Internet, which undermined the fairness and justice of exams and infringed on the legitimate interests of candidates. To this end, the public security organs kept a close eye on all kinds of national examinations and organized special campaigns to crack down on "exam-aid". In 2021, more than 430 cases were investigated, more than 1,700 criminal suspects were arrested, more than 7,100 cheating candidates were investigated, and more than 4,600 pieces of cheating equipment were collected, creating a good environment for fair competition for the majority of candidates.

The sixth is to carry out in-depth "seedling protection" actions for young people. Protecting the physical and mental health of teenagers is related to the national hope and the future of the country. Guided by "purifying cyberspace and safeguarding healthy growth", the public security organs have further promoted the "seedling protection" action. In 2021, more than 300 criminal suspects were arrested for producing and selling obscene articles for teenagers, and 16 pornographic websites involving teenagers were eradicated; More than 12,000 key websites and apps, such as arranging and checking online education and games, 852 enterprises that violate laws and regulations by administrative punishment, and 2,609 enterprises that have been rectified within a time limit; Clean up more than 400,000 pornographic and vulgar literary works and more than 1.04 million pieces of illegal and harmful information to protect the physical and mental health of young people.

The seventh is to carry out in-depth early warning, prevention and crackdown on online crimes. In recent years, some strangers have used the Internet to meet and commit crimes, endangering people’s lives and property. In this regard, the public security organs insist on grasping the early and grasping the small, actively build a violent crime prevention mechanism, and provide real-time early warning for cross-regional network-related crimes. Since 2021, 232 vicious cases such as injury, kidnapping and robbery have been successfully prevented, and 327 suspects have been arrested, which has effectively cracked down on such crimes.

Eighth, carry out the "four breaks" action of key materials of cybercrime in depth. "Black card, black number, black line and black equipment" are the four key materials for the implementation of cyber crimes, and have become an important support for all kinds of cyber criminal gangs to avoid regulatory attacks. In this regard, the public security organs launched a "four-off" campaign in an all-round way, focusing on key targets such as card merchants, number merchants, and coding and receiving platforms. In 2021, more than 13,000 such cases were investigated, more than 31,000 criminal suspects were arrested, more than 3 million black mobile phone cards were cleared, more than 10 million network black numbers were shut down, 63 coding receiving platforms were destroyed, and "cat pools" were seized.

Nine is to carry out in-depth "four treatments" of the key black products of cybercrime. Illegal "payment and settlement", "advertising promotion", "website building facilities" and "technical support" are four key black industries supporting cyber crime. In order to effectively cut off the network interest chain, the public security organs focused on these four types of black industries and further promoted the "four treatments" action. In 2021, more than 6,000 illegal payment and settlement gangs were destroyed and more than 73,000 criminal suspects were arrested. At the same time, efforts were made to identify, block and clean up the illegal information of these four types of black industries, and more than 440,000 pieces of illegal information were inspected and disposed of, effectively preventing the spread of related criminal activities.

The tenth is to carry out the "four management" action of ecological management of key basic resources in depth. "Internet TV, online games and online information publishing platform" are the key parts of illegal and harmful information breeding on the Internet. In this regard, the public security organs took the "four-management" action as the starting point, and carried out ecological management for four key basic resources, namely, "Internet TV, online games, online information publishing platforms" and "dynamic IP agents". In 2021, more than 48,000 administrative law enforcement inspections were carried out, and 3,651 illegal website platforms were punished. Together with relevant departments, 11 online games with prominent gambling and obscene information were investigated and dealt with according to law.

In the next step, the national public security organs will adhere to the guidance of the Supreme Leader’s Socialism with Chinese characteristics Thought in the new era, adhere to the overall concept of national security, adhere to the people-centered, adhere to the management of the network according to law, and always maintain a high-pressure strike-hard situation against all kinds of network crimes, thoroughly rectify the network black ash production and network chaos, continuously purify the network ecology, make every effort to create a clean and tidy network environment, strive to safeguard the legitimate rights and interests of the broad masses in cyberspace, earnestly fulfill the mission and tasks of the new era, and greet the party with excellent results.

Many people came to see the exhibition of Huang Yongyu’s poems and illustrations!

  Huang Yongyu Poetry and Illustration Exhibition

  Have you received an invitation from Mr. Huang Lao for Valentine’s Day this year? The old man said, "I’m sorry for the harassment." Thank you for visiting the guests. It’s very expensive to come so far. " However, it seems that everyone is not afraid of spending shoes, so they came to the Literature Museum to see the exhibition early on the opening day!

  Flatfish photo

  Just quietly looking at the exhibition, looking at the painting, reading the poem.

  No one announced it, but Mr. Huang Lao himself was not afraid to waste his shoes!

  Flatfish photo

  Everyone was so excited when they met Huang Lao that they all took out their mobile phones to take pictures.

  Huang Lao also carefully read everyone’s messages!

  Children who skip class should be careful to be seen by the teacher!

  Deputy curator Ji Lei (second from right) explains to Huang Yongyu.

  Ji Lei, deputy curator of the Museum of Modern Literature, introduced the design of the exhibition to Mr. Huang Lao. The curator asked, old man, you look really energetic. Are you wearing new clothes? Mr. Huang Lao said that this was bought in Berlin many years ago!

  How clearly the old gentleman remembers! The curator also recalled the past when the old man read poetry, and Huang Lao was happy.

  Wang Xue (first from right), a staff member of the exhibition department, explains to Huang Yongyu.

  Wang Xue introduced the exhibitor’s love for the exhibition to Mr. Huang Yongyu. She said, "What touched everyone most was the poem" Not Dreams "about children, and everyone would shed tears after reading it." Mr. Huang Yongyu stared at this poem for a long time and said, "This poem was written that night when I was 95 years old and watching mobile news. I was in a hurry. Why didn’t I save it?" Wang Xue said deeply, "We all feel your anxiety." Mr. Huang Lao’s eyes are also a little moist.

  After the exhibition, Mr. Huang Lao chatted with Mr. Wang Lang, Wang Zengqi’s eldest son. Mr. Huang Lao recalled the interesting things he had with Mr. Wang Zengqi. At that time, he was teaching in Minhang County Middle School in Shanghai, and Wang Zengqi was teaching in Shanghai Zhiyuan Middle School. Their mutual friend Huang Shang has a higher income, and they often go to Huang Shang for a windfall. Walking on Si Ma Road after dinner, two aunts suddenly rushed out and grabbed Huang Yongyu’s arms, crying out for help, help me. Huang Yongyu struggled for a while, two people let go. Huang Shang laughed and asked him what the two men said. Huang Yongyu blamed them for not being rescued in time, so he said, they asked if the letter written to you two had been received.

  Everyone laughed at this.

  Huang Yongyu and Wang Lang.

  Zhang Xinge and Wang Shi (first from the right), the staff of the Literature Museum, asked Huang Lao to sign the Collection of Complete Works of Huang Yongyu.

  Huang Yongyu chatting in the lounge (Phoenix Art Shooting)

  Ji Lei, deputy curator, told us about the process of holding the exhibition in an interview. It turned out that at the end of last year, Ji Xiaoqin, editor of Writers Publishing House, told her friend Ji Lei that she would help Huang Lao to write a collection of poems, which Huang Lao wrote himself from 1947 to the present, and was called "A Collection of Laughs". After getting the book, curator Ji Lei saw that Huang Lao had a picture for each of his poems, and he was more interested. He discussed with the editor whether he could hold an exhibition of poems and illustrations for Huang Lao, which was rare in the past. The two hit it off and went to visit Mr. Huang Lao, who was very happy and supportive. Huang Lao said that he had never held an exhibition in the literature museum!

  The curator said: "After three months of preparation, it was finally launched. The Museum of Literature has a tradition of holding exhibitions for writers. Since its establishment in 1985, it has collected nearly 900,000 pieces of writers’ collections, including writers’ books, periodicals, manuscripts, letters, diaries, audio and video, paintings and calligraphy. Mr. Bing Xin donated her collection of more than 50 famous calligraphy and paintings to the Literature Museum, which held not only literary exhibitions on special topics, but also calligraphy and painting exhibitions for writers. We naturally held an exhibition of poems and illustrations for Mr. Huang Yongyu, because our exhibition hall was not very large, so we chose 58 poems and illustrations from Huang Lao’s poems, and Huang Lao also provided his manuscripts. Through Huang Lao’s poems and paintings, we can learn a lot from Huang Lao, understand his life context, and appreciate Huang Lao’s open-minded and optimistic life purport. I believe that everyone will definitely gain something when they see this exhibition. "

  Since the opening of the exhibition, major media have reported it in succession.

  CCTV News Channel "News Live Room" reported the exhibition of Huang Yongyu’s poems and illustrations on April 2nd. Li Jingze, director of the Museum of Modern Literature, thinks that it is an interesting cultural landscape that Mr. Huang Yongyu paints his own poems, and two different art forms reflect each other. After reading the exhibition, I can feel Huang’s shining childlike innocence. He always thinks and expresses with childlike innocence like a child. I’m writing and drawing.

  Li Jingze, director of the Museum of Modern Literature, was interviewed.

  CCTV Variety Channel made an in-depth report on the exhibition on April 3rd. Li Jingze, director of the Museum of Modern Literature, said: "Welcome friends to the site to feel the breath of the Museum of Modern Literature, literature and beautiful spring!"

  China Art Broadcasting has made an audio guide for the exhibition, so friends who can’t visit the exhibition can listen to it.

  China International Television also introduced the exhibition in detail and spread it to international friends.

  At the same time, the enthusiasm of the audience is also extremely high. Stop quietly in the exhibition hall, or take photos as a souvenir, or feel fresh and interesting, or meditate.

  The audience is immersed in the art of poetry and painting, photo by Zhang Xinge..

  One day, we also caught the actor Mr. Pu Cunxin in the exhibition hall. Photo by Zhao Yujia.

  Teachers from the Party Committee of the National Bureau of Statistics came here to carry out the theme Party Day activities. Photo by Qu Yafeng.

  The letterhead on the message board is also full, expressing respect and love for Mr. Huang Lao.

  There are more netizens who have made dynamic punching cards after watching the exhibition, and fixed this exhibition full of childlike innocence and interest in the spring of 22 years.

  Don’t hesitate to watch the push, put on your shoes and punch in before the closing of the exhibition! Remember to pay attention to China Modern Literature Museum’s WeChat WeChat official account reservation in advance and enter from the East Gate.

Mercedes-Benz EQE sparrow is small and complete, and its appearance is eye-catching.

In the competition with the same class models, it is worth mentioning in terms of space performance. Not much to say, let’s take a look.

Let’s take a look at the appearance of Mercedes-Benz EQE first. The front shape of Mercedes-Benz EQE looks cold and domineering. The headlights are young and individual, and many interesting details can be seen from them. The car is equipped with LED daytime running lights, automatic opening and closing, adaptive far and near light, automatic steering, delayed closing and so on. Coming to the side of the car body, the size of the car body is 4969 mm * 1906 mm * 1514 mm. The car adopts dynamic lines, and the side gives people a very avant-garde feeling. With large-sized thick-walled tires, smooth lines run through the whole side of the car. In the rear part, the rear and the front echo each other from a distance, and the taillights present a full design style with a tough shape.

Sitting in the car, Mercedes-Benz EQE interior design is simple and generous, and the whole looks very cute. The steering wheel of the car is well designed, made of genuine leather, and the visual effect is good. Let’s take a look at the central control, with a 12.8-inch central control screen, which makes the interior style impressive and looks clean and refreshing. Let’s take a look at the dashboard and seats again. The dashboard of this car presents a cold design style and looks very simple. The car adopts imitation leather seats, which are wide and thick and comfortable.

Mercedes-Benz EQE is equipped with a motor with a total power of 215KW and a total torque of 556N.m It has good acceleration, excellent cruising range and good power performance.

The car is equipped with car networking, driving mode selection, remote control key, interior atmosphere light, traction control (ASR/TCS, etc.) and other configurations, which are rich in functions and greatly enhance its convenience of use.

The model class introduced today is the most considered class when many people buy their first car, mainly because the size of this class is moderate and the price is reasonable. If you like this car, don’t hurry to learn more about it!

Looking forward to the future, inheriting and developing, and opening up a new situation of Wushu

  In 2016, China Wushu Research Institute celebrated its 30th anniversary and held a symposium on the 30th anniversary, which was an important milestone in the development history of Chinese Wushu.
    In the 30-year Development History of China Wushu Research Institute published at the end of last year, Zhang Qiuping, director of Wushu Sports Management Center of State Sports General Administration, chairman of Chinese Wushu Association and president of Wushu Research Institute of State Sports General Administration, prefaced the new book, reviewed the glorious course and achievements of Wushu development in China, remembered the contributions and efforts made by the majority of Wushu workers, looked forward to the future, inherited and developed, and opened up a new situation for the development of innovative Wushu.

Brilliant 30 years
   

  In the Preface, Zhang Qiuping pointed out that Wushu is a cultural treasure of the Chinese nation, which has been passed down for thousands of years. It is an important part of Chinese traditional sports and culture, with rich connotations and diverse functions, and plays an irreplaceable role in general sports. Practicing martial arts can not only enhance physical fitness, but also become an important way and carrier to spread and publicize China and enhance the soft power of national culture. It is also an important means to carry forward national spirit, unite national feelings and enhance national identity and cultural identity.
    After the founding of People’s Republic of China (PRC), the Party and the government attached great importance to the development of Wushu. In 1953, the State Sports Commission specially set up a national sports research society. He Long, then director of the State Sports Commission, put forward the working principle of "exploring, sorting out, improving, carrying forward and developing Wushu", which has important historical guiding significance for the development of Wushu.
    After the National Wushu Work Conference in December, 1982, an unprecedented scale of Wushu heritage excavation and arrangement was carried out in China, and fruitful results were achieved. Taking this as an opportunity, with the approval of the State Science and Technology Commission and the Ministry of Personnel in 1985, the Wushu Research Institute of the State Sports Commission was formally established in Beijing Capital Gymnasium in March, 1986, with Xu Cai, then deputy director of the State Sports Commission, as the first president, opening the Wushu cause.
    Zhang Qiuping pointed out that in the past 30 years, the development of Wushu has made brilliant achievements: social Wushu activities have flourished, the competitive Wushu system has been improved day by day, the channels for international promotion and exchange have been continuously broadened, Wushu scientific research and academic activities have achieved fruitful results, and Wushu work for young people and schools has been steadily promoted; New breakthroughs have been made in Wushu industry and professional competitions. Wushu’s cultural function, sports function, social function, fitness function, educational function and market function have all been unprecedentedly displayed and developed. The 30 years since the establishment of Wushu Research Institute is the 30 years of rapid development of Wushu and the 30 years of its glory.

Scientific research and academic achievements are fruitful.
   

  Over the past 30 years, China’s competitive Wushu system has been gradually improved. In terms of Wushu competition system and rules, in addition to routine events, Sanda, short soldiers, pushers, skill and other competition events have been further developed, further improving the Wushu competition system and forming a competition system with parallel development of Wushu routines and Sanda. According to the development law of Wushu events and the requirements of the development of the times, the competition rules and judging laws have been constantly revised and improved, which has made the Wushu competition rules more perfect and standardized, leading the development direction of competitive Wushu.
    Over the past 30 years, social Wushu activities have flourished. Actively promoting the extensive development of Wushu national fitness activities is one of the foothold and goals of Wushu work. By holding mass Wushu events, various Wushu cultural festivals, exchange competitions, expositions and open competitions are deeply welcomed by traditional Wushu lovers at home and abroad, and China has formed various types of international and domestic competition brands; Remarkable achievements have been made in the "six advances" of Wushu, and the "hometown of Wushu" has become the inheritance and demonstration area for the development of social Wushu. Activities such as "Journey to the West of Wushu Frontier" and "Walking to the Grassroots" have effectively promoted the vigorous development of social Wushu activities.
    At the same time, the work of Wushu between teenagers and schools has been steadily advanced. Teenagers are the main body of inheriting national culture and the future of the motherland. Popularizing Wushu in primary and secondary schools is the need of the development of quality education, and it is also the need of Wushu inheritance and development. With regard to the training of Wushu reserve talents, a platform of youth training competition system has been initially formed, which is mainly composed of the National Youth Championship, the National Wushu School Competition and the National Traditional Sports School League, and basically covers the young people practicing Wushu in junior sports schools, private Wushu schools and ordinary primary and secondary schools.
    In addition, martial arts research and academic activities have also achieved fruitful results. Since its establishment, Wushu Research Institute has been undertaking the work of Wushu scientific research, academic exchange, publication of academic monographs, school Wushu education, member management, and Grade evaluation. Over the years, the Wushu Research Institute has organized national experts and scholars to edit and publish martial arts theoretical works and reference books such as China Wushu Boxing Record, China Wushu History, China Wushu Dictionary, China Wushu Encyclopedia, Grade Series Course of Chinese Wushu, and Wushu Series Aerobics for Primary and Secondary Schools. In cooperation with China Sports Newspaper Corporation, the academic journal "Chinese Wushu Research" was founded, and a platform for academic exchange of Wushu was established, which has gradually become an authoritative academic journal of Wushu.
    In recent years, with the courage of deepening reform, the project has intensified the development of sports events and made continuous innovations. The martial arts industry and professional sports events have achieved initial results, and a number of high-end brand sports events have emerged to meet the needs of the times. Such as Sanda King Competition, China Kungfu Sanda Championship, Sanda Super League, Sanda Chinese-foreign Competition, Wushu Routine Wang Zhongwang Championship, National Wushu Dui Grand Prix and other events. In addition, the development of expansion projects such as Muay Thai, free fighting and ultimate fighting has gradually matured and achieved excellent results.

Give full play to the role of Wushu
   

  Zhang Qiuping emphasized that the achievements and progress made in the development of Wushu in the 30 years since the establishment of Wushu Research Institute are attributed to the cordial care of the CPC Central Committee and the State Council, the great attention and correct leadership of the State Sports General Administration, and the hard work and unremitting efforts of all comrades in the national Wushu community.
    He pointed out that the "Thirteenth Five-Year Plan" period is a decisive stage for China to build a well-off society in an all-round way, a crucial period for realizing the grand goal of "two hundred years" and the Chinese nation’s great rejuvenation of the Chinese dream, and also a strategic opportunity period for building a "healthy China" and promoting the great development of sports. The Central Committee of the Communist Party of China’s Proposal on Formulating the Thirteenth Five-Year Plan for National Economic and Social Development, adopted by the Fifth Plenary Session of the 18th CPC Central Committee, puts forward a new goal of promoting the construction of a "healthy China", which is an inevitable requirement for realizing the Chinese dream of great rejuvenation, and reflects the great importance attached by the CPC Central Committee to improving people’s health.
    Zhang Qiuping emphasized that Wushu, as a traditional sport of the Chinese nation, has the functions of physical fitness, self-defense and self-cultivation, which can effectively improve people’s health and quality of life, and is increasingly becoming an important choice for people’s fitness. Therefore, we should firmly establish the development concept of innovation, coordination, green, openness and sharing, and give full play to the role of Wushu in the construction of "healthy China".
    He said that 2016 is the first year of the 13th Five-Year Plan and the first year of the implementation of the Five-Year Plan for the Development of Wushu in China (2016-2020). We should unify our thinking, pay close attention to implementation and ensure that the goals and tasks set out in the Plan are implemented. Coordinate the international and domestic situations and strengthen international promotion, cooperation and exchanges; Promote the reform of Wushu competition system and standardize the unified technical system at home and abroad; Widely carry out social Wushu activities and provide rich and colorful activities; Pay attention to media propaganda, carry forward Wushu culture, and promote Wushu work for teenagers and schools; Pay attention to the cultivation and construction of Wushu scientific research team, implement the strategy of scientific and technological innovation, strengthen the inheritance and protection of traditional Wushu, cultivate the market of Wushu industry, increase the supply of Wushu products, help the national strategy of national fitness and serve the construction of "healthy China".
    Zhang Qiuping pointed out that Wushu has gradually developed into a sports event which not only integrates the traditional culture of China, but also embodies the national characteristics, has a unique style and conforms to the laws of modern sports. We have established an efficient organization, formed a systematic competition system, gradually improved the theory and discipline system, and have a strong mass base, which has won wide recognition and favor from people all over the world. Facing the historical opportunities and challenges in the new era, the vast number of Wushu workers and enthusiasts are working hard and exploring constantly, and the development of Wushu will surely have a new leap.

[Print this page]
[Close window]

Linfen BMW i4 price reduction information, with a discount of 115,000! There are plenty of cars.

[car home Linfen Preferential Promotion Channel] Linfen is carrying out large-scale preferential activities, with the highest preferential range reaching 115,000. At present, the minimum starting price is 324,900. Interested consumers may wish to click "Check the car price" in the quotation form and strive for higher discounts.

临汾宝马i4降价信息,优惠11.5万!现车充足

The design of BMW i4 is full of modernity and futurity. The front face adopts the classic double kidney air intake grille design, but unlike the traditional fuel vehicle, it adopts a closed design, which reduces the air resistance. There are sharp headlight groups on both sides of the grille, and LED light source is used inside, which has a unique beam effect. The whole body line is smooth, showing a combination of dynamic and elegant. The waistline on the side of the car body extends from the front to the rear, which enhances the visual effect of the car body. On the whole, the exterior design of BMW i4 not only retains the classic elements of BMW, but also incorporates many novel design concepts, which fully embodies its unique charm as an electric vehicle.

BMW i4 shows a smooth and dynamic shape in the side lines, with a body size of 4785*1852*1455mm and a wheelbase of 2856mm, giving it a spacious and comfortable interior space. The front and rear wheel tracks are 1601mm and 1630mm respectively, which ensures the stability and handling of the vehicle. In terms of tires, the front wheel is 245/45 R18, and the rear wheel is 255/45 R18. With the unique rim style, the overall sense of movement of the vehicle is improved.

临汾宝马i4降价信息,优惠11.5万!现车充足

The interior design of BMW i4 is full of sense of technology and luxury. The central control screen has a size of 14.9 inches, and provides a voice recognition control system for multimedia system, navigation, telephone and air conditioning, which is convenient to operate. The steering wheel is made of leather and has the function of manual adjustment up and down and back and forth, ensuring that the driver can easily find the most comfortable position. The car is also equipped with multiple USB and Type-C interfaces, as well as the wireless charging function of the front mobile phone, which meets the needs of modern drivers. In terms of seats, the main and auxiliary seats not only support a variety of adjustment methods, but also have a heating function, providing passengers with a comfortable riding experience. In addition, the driver’s seat also has an electric memory function, which is convenient for users who often drive. The rear seats can be laid down in proportion, which increases the flexibility and storage space in the car.

临汾宝马i4降价信息,优惠11.5万!现车充足

The BMW i4 is equipped with an excellent motor with a maximum power of 250 kW and a maximum torque of 430 Nm, which can provide drivers with strong power and excellent driving experience.

Car home car owners spoke highly of the BMW i4, with special emphasis on its excellent sound insulation effect, strong power and king-like design. He even praised the volcanic red interior and thought that its design was not lost to Mercedes-Benz’s sister.

Learn every day | Give further play to the advantages and functions of the United front in the process of Chinese modernization.

"People’s hearts are against each other, and strength contrast is the key to the success or failure of the cause of the party and the people, and it is the biggest politics." From "revolutionary United front" to "patriotic United front" and then to "the most extensive patriotic United front in the new era", the United front has been one of the Communist Party of China (CPC)’s important magic weapons in various historical periods of China’s revolution, construction and reform.

Since the 18th National Congress of the Communist Party of China, the role of the United front has been continuously highlighted, and the political efficiency has changed with events, advanced with the times and changed with the times, which has created favorable conditions for the continuous development of the cause of the party and the people. According to incomplete statistics, as of June, 2021, in the face of the sudden COVID-19 epidemic, more than 60,000 medical workers from democratic parties and without party affiliation have joined the front line in fighting the epidemic. The central committees of democratic parties and personages without party affiliation have submitted nearly 4,000 opinions and suggestions to the Central Committee of the Communist Party of China, the State Council and relevant departments, and the members of democratic parties, the people they contacted and personages without party affiliation have donated more than 5.1 billion yuan, which fully embodies the responsibility of Socialism with Chinese characteristics’s participating parties at a critical moment and highlights China’s new type.

Undoubtedly, "the greater the change, the more we must develop the United front and carry out the United front work well." The United front is the Communist Party of China (CPC)’s political advantage and strategic policy to unite people’s hearts and gather strength, and it is also an important magic weapon to build a socialist modern country in an all-round way and realize the great rejuvenation of the Chinese nation. At the new historical starting point, we should further give play to the advantages and functions of the United front in the process of Chinese modernization.

Grasp the most distinctive features of the United front with a more firm and conscious attitude.Upholding the party’s leadership is the most fundamental and core issue of the United front. To do a good job in the United front work in the process of Chinese modernization, we must grasp the laws, adhere to the principles and pay attention to the methods. The most fundamental thing is to uphold the leadership of the party, and the policies and measures adopted should be conducive to upholding and consolidating the party’s leading position and ruling position. In order to give full play to the obvious institutional advantages of the United front, solve the problems of people’s heart and strength, strengthen the position and role of the party in the concentric circle, and further consolidate the good situation of the United front, we must uphold and strengthen the centralized and unified leadership of the party over the United front work.

Handle the connotation of the United front with a more pragmatic attitude.In the process of Chinese modernization, it is necessary to further understand and distinguish who is the basic power of governance, who is the ally, who is the friend, who is the enemy, and who is the enemy and friend. At the same time, it is necessary to accurately grasp the unity of principle and flexibility and correctly handle the relationship between "one" and "many". Among them, "one" means the consistency of Socialism with Chinese characteristics, that is, the goal is consistent, the banner is consistent, and the road is consistent; "Multi" refers to the diversification of interest structure, group structure, lifestyle and value concept.

Build the discourse system of the United front with a more active attitude.The party has left many United front discourses with truth, persuasiveness and vitality in the course of a hundred years’ struggle, and we should persist in creatively inheriting and transforming them; At the same time, the excellent traditional culture of the Chinese nation is deeply rooted in the practice of the people of China and China. To realize the popularization of the United front discourse system and convey the voice of China well, we must show the nationality of the discourse. "We should have the most say in interpreting China’s practice and constructing China Theory." We must persist in building our original United front discourse system and play our own notes in the development of the times.

"If you can use all your strength, you will be invincible in the world; If you can use all wisdom, you will be fearless of saints. " Today, the United front led by the Communist Party of China (CPC) has developed into a broad alliance of all socialist workers, builders of socialist cause, patriots who support socialism, the reunification of the motherland and patriots who are committed to the great rejuvenation of the Chinese nation.

The Party’s Report to the 20th CPC National Congress embodies the consensus of the whole Party, the whole army and the people of all nationalities in China on the Supreme Leader’s Socialism with Chinese characteristics Thought in the new era and the great practice of Socialism with Chinese characteristics in the new era. The Communist Party of China (CPC) will surely unite more Chinese people’s consensus at home and abroad in the process of promoting Chinese modernization, and strive to achieve the greatest unity.

(Ye Zipeng, a researcher at the United Front Research Center of the Central Party School)

(Central Radio and Television General Station CCTV Network)