Reading Extreme Yue 07, do you really think it is the extreme krypton 007 of the intelligent driving version?

Extreme Yue and Extreme Krypton are owned by Geely, and their models are also produced in Geely’s vast SEA architecture. In this case, for many people, it is inevitable that the models of the two brands are positioned similarly. For example, the second model of Extreme Yue recently listed, some people think it is the version of Extreme Krypton 007.

IMG_256

Actually, it’s not! Extreme Yue 07 is different from Extreme Krypton 007 in terms of product positioning and product configuration. So, today, I’ll also give you an interpretation of the extreme yue 07 to see if it’s worth buying. Which configuration version should I choose to buy?

As for this car, I think it has some advantages compared with the more and more homogeneous new energy vehicles, such as "no one has me, no one has me". Among them, one of the great advantages is that it comes from Geely’s vast SEA architecture, so that the stability and drivability of the vehicle can be guaranteed. After all, we know that the vast architecture of SEA is the star architecture of the current new energy vehicle market, and the models built based on this architecture are strong enough to compete in the market. This is true except for Extreme Yue 07, Like Krypton 001, 007, etc.

three

Another big advantage is the advantage in intelligence. The title of "automobile robot" of Yuejie is not for nothing. Like the 07, Yuejie has a 35.6-inch super-large integrated screen, and the brand-new end-to-end perception model has been upgraded in terms of detection ability, tracking ability, mapping ability and scene understanding ability, and the voice assistant SIMO has also been upgraded, as well as the Qualcomm Snapdragon 8295P chip equipped in the whole system, all of which prove its intelligent interaction level to us.

There is also its intelligent driver assistance system, which has also been optimized, adding the curve AEB function, which can stop steadily even if the front car disappears. Extreme Yue 07 is also equipped with ASD Apollo advanced intelligent driving system. It is said that it will be able to drive all over the country before the end of this year, and it is still purely visual perception. This kind of intelligent driving ability is indeed leading enough.

4_ copy

008dtnp0ly1ht3tu3dlhyj33402c0u0y

In terms of batteries, all the high-end versions of Extreme Yue 07 use Kirin batteries from Contemporary Amperex Technology Co., Limited. The battery pack has bullet-proof coated armor from Chinese Academy of Sciences at the bottom, which can withstand 3.5 tons of static pressure. This battery has obvious advantages in safety and fast charging performance. For some users who are worried about battery problems, they can obviously put their hearts in their stomachs.

IMG_256

Having said that, which configuration version of Extreme Yue 07 is worth buying? Personally, I recommend the standard version or long battery life version of Extreme Yue 07. After all, the limited-time preferential price of the two models is 199,900 yuan, and the latter is 219,900 yuan, both of which are within the price range of about 200,000 yuan, and the standard configuration like Extreme Yue 07 is completely enough for our users. Of course, if you are really not short of money and want to experience more extreme speed and passion, the performance version of nearly 300,000 yuan is also a good choice.

Generally speaking, the product strength of Extreme Yue 07 is worthy of recognition. Although the brand voice is not high in the market at present, it is blessed by Geely and Baidu. I believe that it will get better and better in the future market, and Extreme Yue 07 will also be favored by many consumers.

Prospect of the extended range version of Star Era ET: or sell for 209,800 yuan with a wheelbase of 3,000 mm.

The plug-in hybrid market is very hot, which is a recent feature of the domestic market. Because the overall share has improved significantly, there are more and more car companies making efforts in this market, which directly leads to the market becoming more and more "rolled". From the consumer’s point of view, if you are a friend with only one car at home, Kitten suggests starting with hybrid and plug-in hybrid models. If you are mainly traveling in cities for short distances and occasionally running at high speed, extended-range electric is also a good choice. Judging from the current market situation, the popularity of domestic extended-range electric vehicles is not low. Ideal L7, Wenjie M7, etc. are all products of this type.

In the 380th batch of Announcement of Road Motor Vehicle Manufacturers and Products issued by the Ministry of Industry and Information Technology, Chery’s Xingtu brand declared an extended-range electric vehicle, Xingtu ET extended-range version. Prior to this, its pure electric version has been declared, which means that Starway ET will provide two different power models in the future.

According to the group’s plan, Chery will fully launch the new energy market in 2024. Before that, Xingtu brand has launched pure electric and plug-in hybrid models. Although from the technical difficulty and performance, extended-range electric is not as good as plug-in hybrid, but its advantages are simple structure and low cost. Under the condition of fixed cost, the money saved from the power system can be used for interior configuration, which is valued by many new energy vehicle consumers.

From the body size, the extended range version of Star Way ET is close to the level of medium and large SUV, with the length, width and height of 4955mm, 1975mm and 1698mm respectively and the wheelbase of 3000mm;; Compared with the main competitors’ ideal L7 of 5050mm, 1995mm, 1750mm and 3005mm, although slightly inferior, the gap is not very big. In terms of seat layout, it also adopts a five-seat design, and the performance of the rear space can be satisfactory.

As for the power system, the extended range version of Star Era ET uses SQRH4J15B 1.5T four-cylinder engine as the range extender, with the maximum power of 115kw. The data of the motor has not been published yet, but according to the configuration of Star Era ET pure electric version, it should provide two models: single motor and double motor. The power battery is lithium iron phosphate battery, and the manufacturer is Contemporary Amperex Technology Co., Limited. In terms of configuration, although there is not much news released at present, in terms of product positioning, it should not be lower than Xingyue ES.

In terms of price, the extended edition of Star Era ET can use Star Era ES as a pricing reference. Star Era ET is a medium and large SUV, and its price is higher than that of Star Era ES, which is positioned by medium and large cars. The starting price of the latter pure electric version is 198,800 yuan, and Star Era ET may be higher than it. At the same time, the price of the extended-range version will be lower than that of the pure electric version because of its small battery capacity. Therefore, based on various factors, the kitten expects the starting price of the extended-range version of Star Era ET to be 209,800 yuan, but its configuration level will be higher than that of Star Era ES.

Cat heart blue view

In terms of sales performance, although Chery has launched a number of plug-in hybrid models before, their sales performance is average, especially for Star Road brand models. According to the terminal sales data, the total sales volume of the Star Road Chasing Wind Plug-in Hybrid Model in 2023 was only 1,214 vehicles, which was not even as good as the weekly sales volume of many hot-selling cars. Faced with the sales dilemma, Chery’s new energy vehicles are also adjusting their prices, trying to impress consumers with low prices.

Looking forward to the future sales trend of Xingtu ET Extended Range Edition, its main competitors are naturally Ideal L7 and Wenjie M7. The former has a higher price threshold of 319,800 yuan, and the latter also costs 249,800 yuan. Compared with these two models, the core advantage of Xingtu ET Extended Range Edition is that the price threshold is lower, and Chery has accumulated a certain reputation in the market. In the early days of 200,000 yuan, you can buy a big five-seat extended-range electric SUV produced by Chery, which is actually attractive.

Putin: I have never been addicted to power.

  


     On February 14th, Russian President Vladimir Putin held his last annual press conference in the Kremlin. Xinhua News Agency reporter Shen Bohan photo


    The last annual large-scale press conference of Russian President Vladimir Putin was held in the Kremlin yesterday. More than 1300 journalists attended the reception, including about 200 foreign journalists. In nearly five hours, Putin answered 106 questions raised by 80 journalists, involving successors, domestic economy, relations with the West, Kosovo issue, and the US anti-missile system. Since yesterday coincided with Valentine’s Day, a female reporter from Russian Chanson Radio asked Putin at the meeting whether someone had given him a Valentine’s Day gift.


    Putin replied: "No one has had time to give me a Valentine’s Day gift yet, because I have been preparing for the press conference since morning exercise this morning, and I came to this hall before talking to anyone. Of course, my wife has congratulated me on Valentine’s Day, but’ not willing’ to send me a Valentine’s Day gift. " The female reporter frankly wanted to give Putin a Valentine’s Day gift and asked what to do. Putin replied, "Please come here." A reporter from Kostroma asked Putin how his wife reacted when she learned that he would become the prime minister of the government. Putin replied: "She is not happy about it." A female reporter said that a few years ago, Putin’s wife, lyudmila, cried after learning that her husband would become president, because she thought Putin would have no time to enjoy family life.


  Power | Support Medvedev


    When answering a question about the third term of office, Putin said: "I have never had the desire to stay in the third term." He said, "Some people are addicted to cigarettes, some people are addicted to banned drugs, and some people are addicted to money. They say that the worst thing is power addiction. I have never been addicted to anything. " Putin believes that if you are lucky enough to work for the people in the position of national leader, it is a kind of luck in itself. He added that from the first day he took office, he decided that he would not violate the Constitution. Putin said: "I think I have received two gifts from the Russian people and served as two Russian presidents. But I can still work for our people in another position. " Putin stressed that if Medvedev is elected president and he becomes prime minister, there will be no problem in the division of authority between the president and the prime minister. He said that as long as we look at the Russian Constitution, we can see the scope of the functions and powers of the Prime Minister, who is only responsible for the country’s fiscal policy and economic development. He said that there would be no problem in his relationship with Medvedev, whether at work or in private. Putin also pointed out that Medvedev, as a deputy prime minister in charge of social issues, was familiar with government work. Medvedev’s upcoming speech in Krasnoyarsk can be regarded as a supplement to the Russian social and economic development plan for 2020.


    In response to a reporter’s question "Why do you support Medvedev as president?" Putin said: "I believe that he will be a good president, a veritable and efficient leader." Putin said: "I believe in him and trust him. As I said at the United Russia Party Congress, you can proudly and confidently hand over the state management to such people. " Putin also said that he was not prepared to lead the United Russia Party after the expiration of his presidency. He believes that the Russian government’s decision-making is not based on the wishes of a person or a party, but on objective analysis and argumentation. Putin said that Russia’s future ruling foundation should be the general public, not a certain party.


    Political achievements | Regret inflation Putin compared his eight-year tenure to a long time, but he admitted that nothing made him angry during his term of office. He said: "I can’t say that one thing in my work schedule makes me tired: sports, work and some entertainment activities are very tight." I like listening to pop music and classical music. Basically, my eight years of life is like a long trip, which is actually out of my normal personal life track. But if I have to say anything particularly angry during my tenure, I really can’t say it. " Summing up his eight-year presidency, he said: "I didn’t see any major failure. All the scheduled goals have been achieved and all the tasks have been completed. "


    He admitted: "Maybe, some aspects can be done better." He cited, for example, the issue of inflation. He also said: "If we had taken more rapid and targeted actions at that time and used all our strength in this regard, not only mobilizing the economic field, but also mobilizing non-governmental organizations and political groups, then the inflation rate might have been lower." Putin pointed out that one of the main tasks of the government in 2008 and the next few years is to fight inflation. He said: "The problem is also well known. One of the main problems is that we failed to control the growth of inflation, which exceeded the expected 8.5% and reached 11.9%."


    Wealth | Denying that he is rich Putin also said that the western media reports that he has huge wealth are nonsense. In response to a question from a western media reporter about the source of his property, he said: "As for all kinds of rumors about my own property, I have read several relevant reports. This is just nonsense, there is nothing to discuss, it is completely nonsense. " Putin also said that the most important wealth he has is the trust of Russians. "I like to experience life. I am rich because the Russian people have trusted me twice to lead this great country. I think this is my greatest wealth. "

Periodic pressure, good shop to defend for the attack?

Zebra consumes Ren Jianxin

At a time when all industries are seriously involved, no one can win.

On the evening of April 25th, Liangpin Shop, a leisure snack head enterprise, disclosed its annual report for 2023: it realized an operating income of 8.046 billion yuan and a net profit of 180 million yuan. In the case of periodic pressure, the basic disk is generally stabilized.

The first quarterly report of 2024 disclosed on the same day shows that the company’s operating income has returned to the growth track, with a year-on-year increase of 2.79% to 2.451 billion yuan. Because the terminal took the initiative to make profits, the company’s net profit returned to the mother decreased by 57.98% year-on-year to 62.4828 million yuan.

In the last two years, discount snacks have expanded wildly, and the terminal price war has been rolling; Online traffic transfer, a trick can no longer eat all over the sky; Coupled with the return of rational consumption concept. All this makes casual snack players have to re-examine themselves.

Good shops are not hiding anything. Dare to face up to their own problems and have made targeted adjustments one after another. The company does not fight a single-dimensional price war, and insists on actively participating in industry competition through innovation and differentiation, so that the business can return to valuable growth.

Don’t underestimate the difficulties, and don’t underestimate the resilience of this 18-year-old leisure snack leading enterprise.

Tear off the bandage to heal.

The trillion-dollar leisure snack market was not made in one day. Participants in the market should not only be KA, but also brand operators such as good shops and three squirrels, and discount snacks are not destined to be the end of the model.

The continuous innovation of models and channels can stimulate the innovation vitality of the whole industry and jointly expand the market, so that users can finally benefit.

As a leading enterprise in the industry, Liangpin Shop (603719.SH) admits that it is going through a relatively "painful" period. If it is only an explanation for investors, it can be attributed to the impact of discount snacks.

However, looking at the essence through the appearance, the good shop deeply realized that the root cause of the current pressure on the company’s performance is that the brand does not provide users with enough sense of value. Only by facing up to our own problems can we find targeted solutions.

Engaged in the leisure and snack industry for 18 years, the good shop knows that blindly rolling prices and fighting price wars will only affect the benign development of the whole industry.

The competition between enterprises is essentially the competition of supply chain. Only by improving the quality and efficiency of the supply chain can we really provide users with products with high quality and price ratio.

Different from the simple purchasing relationship between discount snacks and suppliers, Liangpin Shop, as a brand, dominates the whole industrial chain and controls the whole process of products from raw material planting and purchasing, product research and development to production and sales.

Therefore, discount snacks and good shops are completely different price logic, and the method of "squeezing water" from the supply chain is also completely different. For good shops, "squeezing water" is by no means an extreme squeeze on suppliers, but through lean management in cost control, production efficiency and commercial efficiency. It can make every supplier in the industrial chain become a participant, contributor and beneficiary of reducing costs and increasing efficiency.

Based on this, in November 2023, Liangpin Store launched the largest price adjustment since its establishment 17 years ago, with an average price reduction of 22% for more than 300 products, with the highest drop of 45%.

How can we reduce the price without degrading the quality?

Taking nuts as an example, in the past, good shops purchased products with specified specifications, and the high grade led to high procurement cost of raw materials. The company made adjustments to this. On the one hand, it incorporated the purchase of bulk nut raw materials into the supplier’s direct mining system, and at the same time changed the acquisition strategy. After the market unified mining, the raw materials were classified.

For example, Hawaiian fruit, the company has built a raw material base and used domestic Hawaiian fruit instead of imported raw materials. At the same time, raw materials with different specifications are used to produce different products such as canned, bagged and comprehensive nuts. By maximizing the use of raw materials, the price of each type of products has dropped by 5 to 10 yuan.

Light sweet dried mango is a very popular product in Liangpin Store. In the past, the company purchased mangoes from abroad and processed them at home, and it was inevitable that there would be a lot of losses when fresh fruits crossed the ocean. In 2023, the company supported suppliers to build factories overseas, and the raw materials were purchased and processed locally, thus reducing the total cost. As a result, the company’s 112g light sweet dried mango dropped from 16.9 yuan to 39.7 yuan/kg in 8.9 yuan, far lower than similar products of well-known Shangchao.

With the continuous deepening of the reform and innovation of the supply chain of each product line and the overall improvement of operating efficiency, the terminal price of products will definitely make users have a more obvious perception.

Gather advantages and seek growth

In the leisure snack industry, Liangpin Shop is the most balanced brand in online and offline development, which is also the biggest difference and advantage between it and competing products in the channel.

In 2023, there were 537 new stores in the four core provinces, and the total number of offline stores at the end of the period reached 3,293, a net increase of 67 over the same period of last year. In the whole year, the revenue from offline channels reached 4.294 billion yuan, up 4.02% year-on-year.

At the 2024 annual meeting of Liangpin Shop, Yang Yinfen, chairman and general manager of the company, particularly emphasized that the store is the most important channel for Liangpin Shop and the main position for brand promotion.

In the future, the improvement of store management and efficiency, updating and model optimization will still be the top priority of good shops. Yang Yinfen emphasized that all channels of the company should be based on the products and prices of stores, and all channels should be close to the products and prices of stores, and resolutely prevent involution from occurring internally.

Many users who often visit good shops have seen obvious changes. With the introduction of new models and new products, the store is younger and has a fireworks atmosphere. For stores in specific scenes, good shops introduce high-frequency consumer goods such as coffee and short-term insurance; Seasonal introduction of innovative sketches such as frozen products, sausages and baked sweet potatoes effectively increased the customer unit price and sales in the quarter.

For the operation of online traffic, good shops get rid of the single money-burning purchase of their peers, and rely on the advantages of their own offline stores to build diversified and unique models such as "city matrix live broadcast", "talent with goods" and "official number live broadcast".

Take a different road

No industry can only have low-end and low price, which can only bring "morbid", and ultimately the users will be damaged. Snacks are closely related to people’s daily life and health, especially so.

Nowadays, users’ consumption behavior is more and more rational, and the requirements for snack products are more demanding, which should be "delicious", "healthy" (light burden), "cost performance" and "emotional value". Only brands and products that can fully meet the needs of users will have long-term survival value.

As a brand owner and industrial chain owner, Liangpin Shop controls the whole chain of raw materials, product research and development, production, etc., and has the advantage of meeting the needs of users.

As early as the second half of 2023, good shops promoted product upgrading with "good raw materials, good formula and good taste" as the anchor point. From wild bamboo shoots with reduced salt and preservatives, non-fried 0 trans fatty acid crisp pancakes, 2.0 version of preserved plum with "nothing added", to toast with 0 preservatives and 60 days shelf life, these seemingly subtle changes all require long-term accumulation of brands to find the optimal solution in taste and health.

As one of the drafting units of General Requirements for Healthy Snacks, Liangpin Shop advocates the concept of "five reductions" (reducing salt, sugar, fat, oil and food additives), focusing on the two research and development directions of making products with pure natural and healthy ingredients and reducing additive products in the production process, so as to make the snack formula simpler and healthier with low burden.

Recently, Shanghai has been the first in China, taking the lead in trying out "nutrition selection" grading label in the beverage industry. ABCD is clearly printed on the packaging of drinks, and it is clear at a glance whether the products are healthy or not.

After the pilot project in Shanghai is completed and the experience is summed up, I believe this model will be further promoted to the whole country and eventually extended to the whole food industry. This is not only the consumer’s demand for a healthy diet, but also the general trend.

In the face of the general trend, enterprises can only take the lead if they plan ahead.

After 18 years of deep cultivation in the leisure snack industry, good shops have witnessed changes in the industry, experienced storms, and developed the physique of differentiated competition.

In 2019, it was tired of the endless price war in the industry. The company decisively jumped out of the Red Sea with low quality and low price competition, set off the banner of high-quality snacks, and embarked on a wave of independent market.

Nowadays, although it is under pressure periodically, the company always insists on high-end unshakable. Return to the initial intention of "the quality of conscience, everyone’s shop", and win users with "quality-price ratio" through the improvement of its own efficiency. Finally, walk out of the good shop’s own path.

Original Sun Honglei became famous and saw his unkempt girlfriend Ding Jiali: Let’s break up.

In 2002, Sun Honglei, who had achieved great success, came home after a busy day and saw his 43-year-old girlfriend, Ding Jiali, cooking unkemptly. He suddenly became disgusted. The more he thought about it, the more angry he became. He threw his clothes at her and said, "I don’t think we are suitable. Let’s break up." On hearing that we were going to break up, Ding Jiali was puzzled: "Why? Aren’t we doing well now? Sun Honglei: "Do you think we are still a good match now?" It is said that behind every successful man, there is a woman who silently supports him, and Sun Honglei is no exception, and there are two women behind him, one is his mother, and the other is the actress Ding Jiali. Sun Honglei was born in a poor family in the northeast. There were six or seven people in the family at that time. At the end of each month, her mother would borrow money from her neighbors to live. And Sun Honglei also works very hard. He knows that his mother is hardworking, and she has to pick up rags to support her family when she comes back from work every day. So Sun Honglei followed her mother to collect junk and sell it after school. Sun Honglei liked break dancing since he was a child, and when he was eighteen, he also took part in a break dancing competition. His wonderful dance surprised the judges and won the first prize.

In this way, with his own efforts, Sun Honglei was admitted to the Central Academy of Drama. In the two years of Chinese opera, Sun Honglei was the most diligent student in the eyes of teachers and students. He was obsessed with acting, so he was called "crazy about drama". But after graduation, Sun Honglei, like most people, only played a supporting role at first, and then there was no improvement for a long time until she met a woman, Ding Jiali. At that time, Sun Honglei and Ding Jiali became attached to each other for their role in the drama Madame Curie, while Sun Honglei was a newcomer, both of whom were from the Northeast, and they hit it off at first sight. At that time, Ding Jiali was already very famous in the entertainment industry, and he was also a first-class actor in the national drama, and won the Golden Rooster Award, the Huabiao Award and other major awards.

At that time, Sun Honglei was still a fledgling newcomer in the entertainment industry. On the other hand, Ding Jiali has been in the entertainment industry for many years, and her resources and fame are incomparable to those of Sun Honglei. But when he saw Ding Jiali, he fell in love at first sight, and even began to pursue it directly. In order to get Ding Jiali’s consent, he was caring and attentive every day, and he also publicly expressed his feelings in the crew. In the face of Sun Honglei’s pursuit, Ding Jiali hesitated. For one thing, she had been hurt twice emotionally, and she dared not open the door of her feelings easily again. Secondly, she knows that she is 11 years older than Sun Honglei. Besides, she broke up and gave birth to a son and a daughter. This kind of love will not be valued. But Sun Honglei didn’t care. Ding Jiali was ill in hospital, so he personally made soup for her and sent it to feed her. Over time, Ding Jiali was moved by this young man, and they began to live together. At that time, Ding Jiali saw Sun Honglei’s acting talent and began to cultivate it. In order to pave the way for Sun Honglei, she spared no effort. And there are rumors that at that time, Ding Jiali put down his dignity and knelt down, begging Zhao Baogang to take good care of his own people, just for her boyfriend to have more scenes. A year later, "Fog Like Rain Like Wind" was broadcasted, and Sun Honglei finally opened his career. After that, his career became more and more prosperous. In 2002, he starred in the movie "Zhou Yu’s Train", with Gong Li.

Many opponents. Since then, Sun Honglei’s fame has soared, and more and more plays have come to him, and his resources are getting better and better. His coffee table has also risen from an unknown little actor to a famous actor.

Unexpectedly, Sun Honglei became popular, but her heart changed with it. At that time, Sun Honglei and Gong Li, the famous film winner, had an affair while filming Zhou Yu’s Train. Even when a reporter asked him about Gong Li, he said: Gong Li is really a perfect woman. If she is single, I really want to chase her. Ding Jiali was very angry when she learned about it, but she didn’t want to make it clear, because she was afraid that Sun Honglei would leave her if she said it. Until one day, when Sun Honglei returned home after dinner, he immediately hated Ding Jiali without makeup, so how can he compare with the goddess Gong Li? When Ding Jiali was still holding him, he said with concern: Drink less and go into the house and lie down. Sun Honglei, who was more and more angry, said impatiently, "Let’s break up."

Ding Jiali asked Sun Honglei to give her a statement. The man was so rude that he didn’t even look at her. He just said, "Do you think we deserve each other?"

Ding Jiali silently shed sad tears when she thought of her own efforts, but what she got was a breakup. In this way, I agreed. After the breakup, Ding Jiali was devastated, so sad that she couldn’t take the show any more, and once suffered from depression. After the two broke up, they met in public. Sun Honglei walked straight over and pretended not to know each other, which made Ding Jiali feel chilling. Ding Jiali once said: "I have never been really cared for by a man in my life." This may be the hurdle that she can’t get through in her life. Sun Honglei, on the other hand, turned around and talked about love with Wang Jundi, a musician who was only 24 years old. This girlfriend is nearly 20 years younger than Ding Jiali. Soon Sun Honglei married Wang Jundi, and at the wedding scene, she said to her wife, "I am only good to you in my life", which immediately moved Wang Jundi.

After three years of marriage, Wang Jundi and Sun Honglei gave birth to a child.

A beautiful daughter, he and his wife have a very good relationship, and they often attend various activities together. Nowadays, Sun Honglei has gained a firm foothold in the entertainment circle with its own efforts, and the resources are constant. But without the support of Ding Jiali at the beginning, it must be hard for him to meet this rare opportunity. What do you think?

Editor in charge:

Northwestern Polytechnical University was attacked by American NSA network: the United States gradually infiltrated and stole secrets for a long time.

  Cctv newsOn September 27th, the National Computer Virus Emergency Response Center issued a document "Investigation Report on Northwestern Polytechnical University Attacked by NSA Network (Part II)".  

  On June 22, 2022, Northwestern Polytechnical University issued a "Public Statement" saying that the school was attacked by overseas cyber attacks. The Beilin Branch of the Public Security Bureau of Xi ‘an, Shaanxi Province immediately issued the "Alert Bulletin", which confirmed that a number of trojans and malicious programs originated from abroad were found in the information network of Northwestern Polytechnical University, and the Xi ‘an police have officially filed an investigation.

  China National Computer Virus Emergency Response Center and 360 Company participated in the technical analysis of this case. The technical team has successively extracted Trojan samples from many information systems and Internet terminals of Northwestern Polytechnical University, comprehensively used existing domestic data resources and analysis methods, and got the full support of partners in some countries in Europe and Southeast Asia, which completely restored the overall overview, technical characteristics, attack weapons, attack paths and attack sources of related attacks. It is preliminarily determined that the related attack activities originated from the "Office of Specific Invasion Operations" of the National Security Agency (NSA) (namely, the Office of Tailored Access Operation, hereinafter referred to as "TAO").

  This series of research reports will publish the important details of some specific attacks in thousands of cyber attacks launched by TAO against Northwestern Polytechnical University, and provide useful cases for countries around the world to effectively discover and prevent TAO’s subsequent cyber attacks.

  First, the process of TAO attack infiltrating Northwestern Polytechnical University

  TAO’s cyber attacks launched by other countries are highly targeted, adopting semi-automatic attack flow, single-point breakthrough, gradual infiltration and long-term stealing.

  (A) a single breakthrough, cascading infiltration, control of the network of Northwestern Polytechnical University

  After long-term careful preparation, TAO used the "acid fox" platform to carry out man-in-the-middle hijacking attacks on the internal hosts and servers of Northwestern Polytechnical University, deployed "anger jet" remote control weapons, and controlled several key servers. By using the way of Trojan horse cascade control penetration, it deeply penetrated into the internal network of Northwestern Polytechnical University, successively controlled the core network equipment, servers and terminals of the operation and maintenance network and office network, and obtained the control rights of some important network node equipment such as routers and switches in Northwestern Polytechnical University, stole the authentication data, and further implemented penetration expansion, and finally achieved the hidden control of the internal network of Northwestern Polytechnical University.

  (2) Concealed residence, "legal" monitoring and stealing core operation and maintenance data.

  TAO uses the cover weapon "Precision Surgeon" and the remote control Trojan NOPEN to realize the overall "invisibility" of the process, files and operation behavior, and secretly control the operation and maintenance management server of Northwestern Polytechnical University for a long time. At the same time, it adopts the way of replacing three original system files and three types of system logs to eliminate the trace and avoid the traceability. TAO has stolen several network device configuration files from the server. Using the stolen configuration files, TAO remotely "legally" monitored a number of network devices and Internet users, providing data support for the subsequent expansion and penetration of these targets.

  (3) Collecting authentication data, building channels and infiltrating infrastructure.

  By stealing key sensitive data such as account passwords, operation records and system logs of remote business management of operation and maintenance technicians in Northwestern Polytechnical University, TAO has mastered a number of account passwords of network boundary devices, access rights of business devices, configuration information of routers and other devices, and information of FTP server documents. According to the characteristics of TAO attack link, penetration mode and Trojan horse samples, it is found that TAO illegally attacked infrastructure operators in China, and a "legal" channel for remote access to the core data network of infrastructure operators was constructed, which realized the penetration control of infrastructure in China.

  (four) control of important business systems, the implementation of user data theft

  TAO entered the China infrastructure operator’s network as a "legitimate" by mastering the account passwords of Cisco PIX firewall, Tianrongxin firewall and other equipment, and then implemented intranet penetration and expansion, respectively controlled the service quality monitoring system and SMS gateway server of the relevant operators, and used the weapon tools specifically aimed at the operator’s equipment such as "Magic School" to query a group of sensitive identity personnel in China, and packaged and encrypted the user information and sent it back to the headquarters of the National Security Agency.

  Second, stealing sensitive information from Northwestern Polytechnical University and China operators.

  (1) Stealing key sensitive data such as passwords and operation records of remote business management accounts of Northwestern Polytechnical University.

  TAO secretly sniffed and stole the remote maintenance management information of the operation and maintenance management personnel of Northwestern Polytechnical University for a long time by installing the sniffing tool "drinking tea" in the operation and maintenance management server of Northwestern Polytechnical University, including the account password of network boundary equipment, access rights of business equipment, router and other equipment configuration information.

  The types of network devices that are sniffed include fixed Internet access network devices (routers, authentication servers, etc.), core network devices (core routers, switches, firewalls, etc.), and also important devices of communication infrastructure operators (data service platforms, etc.), including account numbers, passwords, device configurations, network configurations and other information.

  1. Steal the account password and configuration information of the core network equipment of Xigong University.

  At 6: 52 on December 11th, 20××× Beijing time, TAO used the proxy server (IP: 130.54 .××××××) located in Kyoto University of Japan as an attack springboard, illegally invaded the "telnet" management server of the operation and maintenance network of Northwestern Polytechnical University, uploaded and installed the NOPEN Trojan, and then controlled its intranet monitoring and management server in cascade. Both of the above servers had been installed with "tea drinking" sniffing in advance. TAO remotely controls the Trojan to retrieve and download the compressed and encrypted monitoring record file, and then clears the trace and exits. Stealing data includes the management account number, password, device configuration, network configuration and other information of routers and core network devices (core routers, switches, firewalls).

  2. Stealing the account password and configuration information of the access network authentication device for many times.

  (1) At 0: 28 on May 30th, 20××× Beijing time, TAO took the proxy server (IP: 210.135××××××) located in Japan as an attack springboard, illegally invaded the "telnet" management server of the operation and maintenance network of Northwestern Polytechnical University, uploaded and installed the NOPEN Trojan, and then controlled its intranet monitoring and management server in cascade. Both servers had been installed with "drinking tea" in advance. The stolen data includes the account number, password and configuration information of the access network authentication device.

  (2) At 1: 12 on July 4th, 20××× Beijing time, TAO used the proxy server (IP: 141.57 ××××××) located in Leipzig Institute of Technology, Economics and Culture as an attack springboard, illegally invaded the "telnet" management server of the operation and maintenance network of Northwestern Polytechnical University, uploaded and installed the NOPEN Trojan tool, and cascade controlled its internal network monitoring and management server and other three servers. These four servers were in advance.

  (3) At 10: 35 on October 11th, 20 ××× Beijing time, TAO used the proxy server (IP: 210.115 ×××××××) located at Gangwon National University in Seoul, South Korea as an attack springboard to illegally invade the monitoring and management server of the operation and maintenance network of Northwestern Polytechnical University, upload and install the NOPEN Trojan tool, and then cascade control its internal network backup server, authentication server and other four servers.

  (4) At 2: 46 on October 19th, 20××× Beijing time, TAO used the proxy server (IP: 143.248 .×××××××) of the Institute of Advanced Science and Technology in Daejeon, South Korea as an attack springboard, illegally invaded the "telnet" management server of the operation and maintenance network of Northwestern Polytechnical University, and controlled its intranet supervision server and other two servers in cascade. All three servers had been installed with "tea drinking" in advance.

  (2) Stealing configuration files and log files of network equipment operation and maintenance in Northwestern Polytechnical University.

  The National Security Agency’s "Specific Invasion Action Office" (TAO) has long attacked and invaded the network operation and maintenance management server of Northwestern Polytechnical University, secretly stealing the configuration files and log files of network equipment operation and maintenance.

  1. Steal the network operation log file of Northwestern Polytechnical University.

  At 3: 41 on March 2, 20×× Beijing time, TAO illegally invaded and controlled a network operation and maintenance management server of Northwestern Polytechnical University through a proxy server (IP: 210.135 ××××××) located in Japan. At 3: 49, TAO moved horizontally from the operation and maintenance management server to another operation and maintenance monitoring server, searched the log files with specific character strings as keywords and stole a batch of system operation log files and backup files of system daily self-inspection reports.

  2. Steal the regular task configuration script of Northwestern Polytechnical University server.

  At 10: 41 on October 11th, 20××× Beijing time, TAO invaded and controlled an intranet server of Northwestern Polytechnical University through a proxy server located in Korea (IP: 210.115 ××××××). At 10: 48, after two lateral moves, TAO invaded another intranet server, accessed the regular task configuration scripts in a specific directory, and retrieved 14 configuration files for regular tasks. Subsequently, these 14 files were stolen at one time, which can be used to perform regular cleaning, backup, power check and other operations.

  3. Steal the information file of the server system of Northwestern Polytechnical University.

  At 1: 27 on June 6, 20 ××× Beijing time, TAO invaded and controlled an intranet server of Northwestern Polytechnical University through a proxy server located in Korea (IP: 222.122 ××××××). At 2: 04, after two horizontal moves, TAO invaded another intranet server, accessed the system files under the directory /var/, and stole 60 commonly used system information files. The contents of the stolen system information files included system release version, user password hash, user rights, local domain name resolution configuration, etc.

  (C) Infiltration control of China infrastructure core equipment.

  The Office of Specific Invasion Operations (TAO) of the National Security Agency of the United States used the password of the stolen network equipment account to enter the service network of an infrastructure operator in China as a "legitimate" identity, control the related service quality monitoring system, and steal the user’s private data.

  1. Steal the privacy data of users in China.

  At 22: 53 Beijing time on March 7, 20 ×××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××

  At 15: 02 on the same day, TAO saved the queried user data in the directory of the attacked server/var/tmp/.2e434fd8aaee73e1/ERF/out/f/,and then packaged it and sent it back to the attack springboard. Subsequently, the attack traces such as infiltration tools and user data uploaded during the process of stealing secrets were quickly removed by special tools.

  The Office of Specific Invasion Operations (TAO) of the National Security Agency of the United States used the same method to attack and control another China infrastructure business server at 23: 22 on January 10th, 8: 41 on January 29th, 22: 00 on March 28th and 23: 58 on June 6th, respectively, and illegally queried, exported and stole the user information of many identity-sensitive personnel in batches.

  2. Infiltrate and control the global telecommunications infrastructure

  According to the analysis, the Office of Specific Invasion Operations (TAO) of the National Security Agency (NSA) used the same combination of weapons and tools to "legally" control the telecommunications infrastructure networks in no less than 80 countries around the world. The technical team cooperated with the partners in Europe and Southeast Asian countries, successfully extracted and fixed the samples of the above weapons and tools, and successfully completed the technical analysis, which is planned to be released to the public in due course to help the world jointly resist and prevent the network penetration attack of NSA.

  Third, TAO exposed his identity during the attack.

  In the process of cyber attack on Northwestern Polytechnical University, the Office of Specific Invasion Operations (TAO) of the National Security Agency exposed many technical loopholes and made many operational mistakes. Relevant evidence further proves that the behind-the-scenes action of cyber attack on Northwestern Polytechnical University is the NSA of the United States. Here are some examples:

  (1) The attack time completely conforms to the law of work and rest time in the United States.

  The National Security Agency’s Office of Specific Invasion Operations (TAO) must use manual operation when using the tipoff activation command and remotely controlling the NOPEN Trojan. From the attack time of these two tools, the actual working time of the network attacker can be analyzed.

  First of all, according to the big data analysis of related cyber attacks, 98% of cyber attacks on Northwestern Polytechnical University are concentrated between 21: 00 and 4: 00 am Beijing time, which corresponds to 9: 00 to 16: 00 EST, and belongs to the domestic working time in the United States. Secondly, there was no cyber attack on Northwestern Polytechnical University on all Saturdays and Sundays in the United States. Thirdly, by analyzing the unique holidays in the United States, it is found that the "Memorial Day" in the United States has three days off, and the "Independence Day" in the United States has one day off. During these four days, the attacker did not carry out any attack and theft. Fourth, after a long period of close tracking of the attacks, it was found that all cyber attacks were silent during the Christmas period. Judging from the above working hours and holiday arrangements, those who attack and steal secrets against Northwestern Polytechnical University are unscrupulous and undisguised in their activities according to the schedule of working days in the United States.

  (B) Language behavior habits are closely related to the United States.

  During the long-term tracking and reverse osmosis of network attackers, the technical team found that the attackers have the following language characteristics: first, the attackers have the habit of using American English; Second, the internet devices associated with the attackers are all equipped with English operating systems and various English-language applications; Third, the attacker uses the American keyboard for input.

  (3) The working path of exposing the mistakes in weapon operation

  At 5: 36 (Beijing time) on May 16th, 20 ×××, the cyber attackers attacked Northwestern Polytechnical University again by using the springboard machine (IP:222.122.××.××) located in South Korea. When trying to invade and control a network device after the third-level infiltration of the intranet of Northwestern Polytechnical University, there was a human error when running the upload PY script tool, and the specified parameters were not modified. After the script is executed, an error message is returned, which reveals the working directory and corresponding file name of the attacker’s online terminal. From this, it can be known that the system environment of the Trojan control terminal is Linux system, and the corresponding directory name "/etc/autoutils" is the special name of TAO’s network attack weapon tool directory.

  The error message is as follows:

  Quantifier follows nothing in regex; marked by <– HERE in m/* <– HERE .log/ at https://news.cctv.com/2022/09/etc/autoutils line 4569

  (D) A large number of weapons are highly homologous to the exposed NSA weapons genes.

  Of the 41 different cyber attack weapons used in the attack on the secrets of Northwestern Polytechnical University, 16 tools are completely consistent with the TAO weapons exposed by the "shadow broker"; Although 23 tools are not exactly the same as those exposed by the "shadow broker", their genetic similarity is as high as 97%, and they belong to the same type of weapons, but their related configurations are different; The other two tools can’t correspond to the "Shadow Broker" exposure tool, but they need to be used together with other cyber attack weapons tools of TAO, so these weapons and tools obviously have homology and belong to TAO.

  (E) Some cyber attacks occurred before the exposure of "shadow brokers".

  The comprehensive analysis of the technical team found that in the tens of thousands of cyber attacks against targets in China, especially the thousands of cyber attacks launched against Northwestern Polytechnical University, some weapons used in the attack process were implanted with Trojan horses before the "shadow broker" exposed NSA weapons and equipment. According to NSA’s behavior habits, the above weapons and tools are likely to be used by TAO employees themselves.

  Fourth, TAO network attacks the IP list of weapon platform of Northwestern Polytechnical University

  During the technical analysis and traceability investigation, the technical team found a number of IP addresses of servers hosting related weapons and equipment used by TAO in the network invasion of Northwestern Polytechnical University. Examples are as follows:

  V. IP list of springboard used by TAO network to attack Northwestern Polytechnical University

  After continuous attack, the research team successfully locked the target node, multi-stage springboard, main control platform, encrypted tunnel, attack weapon and original terminal that launched the attack on Northwestern Polytechnical University, found the identity clues of the attacker, and successfully identified the true identities of 13 attackers.

Ministry of Public Security: In 2021, more than 6.2 million Internet Navy accounts will be shut down.

CCTV News:On January 14th, the Ministry of Public Security held a press conference to inform about the work measures and achievements of deploying public security organs across the country to carry out the "Net 2021" special action.

At the meeting, Sun Jinfeng, political commissar of the Network Security Bureau of the Ministry of Public Security, introduced that in recent years, various traditional crimes have accelerated to spread to the Internet, and cybercrime has become one of the major risks that endanger China’s data security, economic security and social security. In order to severely crack down on network crimes, ensure the healthy development of the digital economy and protect the legitimate rights and interests of the people, in 2021, the Party Committee of the Ministry of Public Security deployed a "net net" special campaign nationwide for the fourth consecutive year. In accordance with the unified deployment of the Ministry of Public Security, local public security organs have carefully organized and arranged, adhered to the strategy of "full-chain crackdown and ecological governance", focused on highlighting illegal crimes and network chaos on the Internet, in order to open the way, promote management by fighting, and promote governance by management. In the whole year, more than 62,000 cases were investigated, with a year-on-year increase of 10.7%; More than 103,000 criminal suspects were arrested, a year-on-year increase of 28.7%; More than 27,000 illegal Internet enterprises and units have been punished by administrative punishment, which has effectively maintained the security of cyberspace and the stability of online order, and effectively enhanced the people’s online security, sense of acquisition and happiness.

First, crack down on crimes against citizens’ personal information in accordance with the law. In recent years, technologies such as big data and cloud computing have not only promoted network interconnection and convergence, but also increased the risk of information leakage. In this regard, China promulgated the Data Security Law and the Personal Information Protection Law, which provided a strong legal support for the protection of personal information security. Public security organs throughout the country insist on putting the people in the highest position in their hearts, holding high the sword of law, always maintaining a high-pressure and severe crackdown on crimes against citizens’ personal information, focusing on the new trend of crimes of selling citizens’ personal information online, keeping a close eye on hidden parts such as "dark nets" and making every effort to carry out investigations. In 2021, more than 9,800 cases of infringing citizens’ personal information were investigated and more than 17,000 suspects were arrested.

The second is to severely punish hacking crimes according to law. In recent years, driven by high interests, some people steal data for profit through intelligent and covert attacks, threatening the security of enterprises and personal data, and even threatening the security of key information infrastructure. In this regard, the public security organs insisted on taking the initiative, focusing on judging and fighting in groups. In 2021, they arrested 3,309 people who carried out hacking activities and provided them with tools, money laundering and other services, and eradicated 341 gangs that produced and sold Trojan viruses and developed attack software platforms, which effectively guaranteed the security of important information systems and networks and effectively protected citizens’ personal information.

The third is to crack down on eavesdropping and stealing photos in accordance with the law. In recent years, some lawless elements illegally produce special equipment for eavesdropping and stealing photos, and sell and spread them online, which is deeply hated by the people. In this regard, the public security organs organized a special crackdown and rectification campaign. In 2021, a total of 783 criminal suspects were arrested for secretly installing eavesdropping and photo stealing equipment, 13 dens for manufacturing and selling special equipment for eavesdropping and photo stealing were destroyed, and more than 4,100 related equipment and parts were seized. More than 34,000 illegal eavesdropping and photo stealing products were removed from the e-commerce platform.

The fourth is to severely crack down on illegal crimes such as illegal black public relations and "network water army" according to law. In recent years, with the rise of "flow economy" and "fan economy", the "network water army" has gradually evolved from the initial simple posting "irrigation" to the implementation of paid post deletion, false comments, disinformation and drainage, and extortion by fake news media, misleading the public and seriously disrupting online order. In this regard, the public security organs organized and launched a special campaign to crack down on the "network water army". In 2021, more than 200 related cases were investigated, more than 2,000 criminal suspects were arrested, more than 6.2 million accounts and 1,200 websites of the "network water army" were shut down according to law, 170,000 network groups were dissolved, and a large number of forged press cards, official seals and business licenses were seized, effectively purifying the network environment.

Fifth, crack down on cheating and illegal crimes in online organization exams according to law. Examination order is related to social fairness and justice and the vital interests of the broad masses of the people. In recent years, some illegal personnel organized cheating in exams and sold cheating equipment through the Internet, which undermined the fairness and justice of exams and infringed on the legitimate interests of candidates. To this end, the public security organs kept a close eye on all kinds of national examinations and organized special campaigns to crack down on "exam-aid". In 2021, more than 430 cases were investigated, more than 1,700 criminal suspects were arrested, more than 7,100 cheating candidates were investigated, and more than 4,600 pieces of cheating equipment were collected, creating a good environment for fair competition for the majority of candidates.

The sixth is to carry out in-depth "seedling protection" actions for young people. Protecting the physical and mental health of teenagers is related to the national hope and the future of the country. Guided by "purifying cyberspace and safeguarding healthy growth", the public security organs have further promoted the "seedling protection" action. In 2021, more than 300 criminal suspects were arrested for producing and selling obscene articles for teenagers, and 16 pornographic websites involving teenagers were eradicated; More than 12,000 key websites and apps, such as arranging and checking online education and games, 852 enterprises that violate laws and regulations by administrative punishment, and 2,609 enterprises that have been rectified within a time limit; Clean up more than 400,000 pornographic and vulgar literary works and more than 1.04 million pieces of illegal and harmful information to protect the physical and mental health of young people.

The seventh is to carry out in-depth early warning, prevention and crackdown on online crimes. In recent years, some strangers have used the Internet to meet and commit crimes, endangering people’s lives and property. In this regard, the public security organs insist on grasping the early and grasping the small, actively build a violent crime prevention mechanism, and provide real-time early warning for cross-regional network-related crimes. Since 2021, 232 vicious cases such as injury, kidnapping and robbery have been successfully prevented, and 327 suspects have been arrested, which has effectively cracked down on such crimes.

Eighth, carry out the "four breaks" action of key materials of cybercrime in depth. "Black card, black number, black line and black equipment" are the four key materials for the implementation of cyber crimes, and have become an important support for all kinds of cyber criminal gangs to avoid regulatory attacks. In this regard, the public security organs launched a "four-off" campaign in an all-round way, focusing on key targets such as card merchants, number merchants, and coding and receiving platforms. In 2021, more than 13,000 such cases were investigated, more than 31,000 criminal suspects were arrested, more than 3 million black mobile phone cards were cleared, more than 10 million network black numbers were shut down, 63 coding receiving platforms were destroyed, and "cat pools" were seized.

Nine is to carry out in-depth "four treatments" of the key black products of cybercrime. Illegal "payment and settlement", "advertising promotion", "website building facilities" and "technical support" are four key black industries supporting cyber crime. In order to effectively cut off the network interest chain, the public security organs focused on these four types of black industries and further promoted the "four treatments" action. In 2021, more than 6,000 illegal payment and settlement gangs were destroyed and more than 73,000 criminal suspects were arrested. At the same time, efforts were made to identify, block and clean up the illegal information of these four types of black industries, and more than 440,000 pieces of illegal information were inspected and disposed of, effectively preventing the spread of related criminal activities.

The tenth is to carry out the "four management" action of ecological management of key basic resources in depth. "Internet TV, online games and online information publishing platform" are the key parts of illegal and harmful information breeding on the Internet. In this regard, the public security organs took the "four-management" action as the starting point, and carried out ecological management for four key basic resources, namely, "Internet TV, online games, online information publishing platforms" and "dynamic IP agents". In 2021, more than 48,000 administrative law enforcement inspections were carried out, and 3,651 illegal website platforms were punished. Together with relevant departments, 11 online games with prominent gambling and obscene information were investigated and dealt with according to law.

In the next step, the national public security organs will adhere to the guidance of the Supreme Leader’s Socialism with Chinese characteristics Thought in the new era, adhere to the overall concept of national security, adhere to the people-centered, adhere to the management of the network according to law, and always maintain a high-pressure strike-hard situation against all kinds of network crimes, thoroughly rectify the network black ash production and network chaos, continuously purify the network ecology, make every effort to create a clean and tidy network environment, strive to safeguard the legitimate rights and interests of the broad masses in cyberspace, earnestly fulfill the mission and tasks of the new era, and greet the party with excellent results.

Mercedes-Benz EQE sparrow is small and complete, and its appearance is eye-catching.

In the competition with the same class models, it is worth mentioning in terms of space performance. Not much to say, let’s take a look.

Let’s take a look at the appearance of Mercedes-Benz EQE first. The front shape of Mercedes-Benz EQE looks cold and domineering. The headlights are young and individual, and many interesting details can be seen from them. The car is equipped with LED daytime running lights, automatic opening and closing, adaptive far and near light, automatic steering, delayed closing and so on. Coming to the side of the car body, the size of the car body is 4969 mm * 1906 mm * 1514 mm. The car adopts dynamic lines, and the side gives people a very avant-garde feeling. With large-sized thick-walled tires, smooth lines run through the whole side of the car. In the rear part, the rear and the front echo each other from a distance, and the taillights present a full design style with a tough shape.

Sitting in the car, Mercedes-Benz EQE interior design is simple and generous, and the whole looks very cute. The steering wheel of the car is well designed, made of genuine leather, and the visual effect is good. Let’s take a look at the central control, with a 12.8-inch central control screen, which makes the interior style impressive and looks clean and refreshing. Let’s take a look at the dashboard and seats again. The dashboard of this car presents a cold design style and looks very simple. The car adopts imitation leather seats, which are wide and thick and comfortable.

Mercedes-Benz EQE is equipped with a motor with a total power of 215KW and a total torque of 556N.m It has good acceleration, excellent cruising range and good power performance.

The car is equipped with car networking, driving mode selection, remote control key, interior atmosphere light, traction control (ASR/TCS, etc.) and other configurations, which are rich in functions and greatly enhance its convenience of use.

The model class introduced today is the most considered class when many people buy their first car, mainly because the size of this class is moderate and the price is reasonable. If you like this car, don’t hurry to learn more about it!

Jinhua, Zhejiang: Please comment on the semi-annual report of procuratorial work on the spot on behalf of members.

What are the deputies concerned about?

Jinhua, Zhejiang: Please comment on the semi-annual report of procuratorial work on the spot on behalf of members.

Deputy Yu Xuewen

Representative Huang Meimei

Representative Fang Qing

Commissioner Liu Huaying.

Representative Wu Yuexiao

"The semi-annual report is very bright! I am very satisfied with Jinhua’s procuratorial work! " "The work of less arrest and cautious prosecution highlights the judicial temperature and maintains social harmony and stability, which is worthy of praise!" "The unchecked work should also increase publicity!" "Intellectual property protection should be good at leveraging!"……On August 2, the Procuratorate of Jinhua City, Zhejiang Province held a press conference. In addition to media reporters, the press conference also invited representatives of the national, provincial and municipal people’s congresses and members of Jinhua CPPCC. After listening to the briefing on the work of the hospital in the first half of the year, five deputies made comments and suggestions respectively.

Less arrest, more caution and more caution.

In order to strictly implement the criminal policy of less arrest and cautious prosecution and cautious detention, in mid-March this year, Jinhua City Procuratorate and the public security organs jointly issued the Guiding Opinions on Reducing Criminal Compulsory Measures in Custody (Trial), clarifying the application scope, standards and scales of compulsory measures, and establishing relevant supporting mechanisms to reduce coercive measures in custody. After the guidance was issued, the pretrial detention rate in the first half of the city decreased by 12.92% year-on-year, and showed a downward trend month by month.

"It is not only an expression of the modesty of the law, but also an effective measure to develop the’ Fengqiao experience’ in the new era. Procuratorial organs should standardize the use of the right not to approve arrest and the right not to appeal, and also perform their supervisory functions, strengthen supervision over this work, and strive to ensure fairness and justice." Yu Xuewen, deputy to the National People’s Congress, director of the village committee of Qingkeng Village, Liucheng She Town, Wuyi County, Zhejiang Province, and chairman of Zhejiang Gengxiang Organic Tea Industry (Base) Development Co., Ltd., took the lead in expressing his views on this highlight.

"It is the judicial policy of the country to arrest juvenile criminal suspects with less caution, which reflects the judicial temperature. Let the minors and parents involved in the crime understand this!" Combined with her case of participating in the procuratorial organs’ assistance and education for minors involved in crimes, Huang Meimei, a deputy to the National People’s Congress and an employee of the comprehensive department of Daoming Optics Co., Ltd., suggested that when carrying out the procuratorial work for minors, the word "caution" should be emphasized, and it is neither possible to arrest them at once nor to let them go at once. We should really make good use of this policy to save minors involved in crimes, but also prevent "deep love" from being abused.

"Help me 885"

"In terms of technology, combined with the key areas and key issues involved in the unchecked work, it is necessary to better achieve the smooth flow and feedback of front desk services and report reception and background clues; In terms of mechanism construction, it is necessary to implement the "two numbers and one yard" mechanism linked by multiple departments; In terms of publicity, in addition to being rolled out on campus, it should be extended to hospitals, education and training institutions, township streets and other places that are in close contact with minors, and the mandatory reporting system should be fully implemented to ensure all-round protection of minors. " Focusing on the procuratorial work of minors, Fang Qing, deputy of Zhejiang Provincial People’s Congress, vice chairman of Jinhua Municipal Committee of the Chinese Revolutionary Committee and principal of Jinhua jindong district Experimental Primary School, put forward three suggestions in one breath.

"Two numbers and one yard" refers to the special number of "88908585" minors’ protection telephone, "Help me 885" WeChat official account and the two-dimensional code for minors’ protection. It is the "885 Jinhua minors’ protection linkage platform" created by Jinhua Municipal Bureau of Letters and Calls, Women’s Federation, Education Bureau and Civil Affairs Bureau. The platform creates a "six-in-one" minor protection pattern of family, school, society, network, government and justice, and provides services such as legal publicity, legal consultation, family education guidance, complaints and reports, and assistance for children in distress, covering all aspects of minor work. Since it was put into operation in mid-April, "Help Me 885" WeChat official account has attracted nearly 70,000 users’ attention, and has received and sorted out more than 20 case clues.

"The procuratorial organs have put a lot of effort into the construction of this platform." "With the implementation of the’ two laws’ for minors, the protection of minors needs the joint efforts of the whole society." "We must constantly optimize and upgrade the platform, strengthen linkage, and let more people participate."……The deputies spoke in succession.

Protect the legitimate rights and interests of enterprises

Corporate protection has also become the focus of the deputies. Yu Xuewen suggested that the procuratorial organs should strengthen the legal supervision of enterprise-related cases and give full play to the functions of protest to protect the legitimate rights and interests of enterprises.

Liu Huaying, a member of Jinhua CPPCC and a partner of Guofeng Law Firm, suggested strengthening the protection of intellectual property rights in an all-round way, advising the court to apply restraining orders and occupational bans to defendants who have infringed on intellectual property rights for a long time, paying continuous attention to the new situation of intellectual property crimes committed by relying on the Internet, continuing to participate in social governance and extending procuratorial functions.

Ding Chengyi, director of the Political Department of Jinhua City Procuratorate, said that since the beginning of this year, the institute has made every effort to ensure the construction of a national innovative city, and actively escorted the development of major projects such as Jinyi Free Trade Zone and China-Europe (Yixin Europe) trains, especially strengthened the protection of intellectual property rights of enterprises, such as sinking a platform for protecting intellectual property rights, building a closed-loop judicial protection chain for intellectual property rights, and carrying out a series of activities such as escorting private entrepreneurs to develop the private economy.

Wu Yuexiao, member of the Judicial Supervision Committee of the Standing Committee of Jinhua Municipal People’s Congress and general manager of Jinzi Ham Co., Ltd., pointed out that while protecting the development of private economy, procuratorial organs should strengthen supervision and management of rights protection, protect the legitimate rights and interests of vulnerable groups and promote social harmony and stability. According to reports, in the first half of this year, Jinhua City Procuratorate safeguarded the legitimate rights and interests of vulnerable groups, launched a special campaign to help solve the problem of wage arrears, and actively communicated with the municipal social security department to obtain more than 1,400 clues about wage arrears.

The press conference also informed the city’s procuratorial organs of "doing a good job in mass letters and visits and responding to mass letters and visits": in the first half of this year, the city’s procuratorial organs accepted a total of 2,186 mass letters and visits, all of which met the requirements for reply were procedural within 7 days and 100% response to the handling process or results within 3 months, while strengthening leadership package and resolving accumulated cases. The deputies pointed out that major, difficult and complicated letters and visits should be followed up properly after the visit, and more ways should be used to explain the law, such as leadership interviews, joint visits by departments, and public hearings. It is necessary to establish an all-weather rapid response mechanism based on the 12309 procuratorial service center platform.

(Reporter Fan Yuehong &ensp; Correspondent Liu Chuanxi)

It makes sense that the star-studded car purchase manual sells well.

The mainstream car has a moderate size, which can meet all needs well, and the price of the mainstream car is also reasonable, so it is right to buy it! Domestic cars have always been concerned, and today is one of them. Now let’s follow Xiaobian to see what it has done.

Let’s take a look at the appearance of Starway Chasing the Wind. The front face of Starway Chasing the Wind presents a simple design style and is equipped with a layered air intake grille, which looks sporty. Headlights are very in line with the aesthetics of consumers, and the overall look has a certain sense of hierarchy. The car is equipped with LED daytime running lights, delayed shutdown and so on. Coming to the side of the car, the size of the car body is 4538MM*1848MM*1699MM, and the car adopts fashionable and simple lines, which gives people a very calm feeling. With large-sized thick-walled tires, it gives people a very deep feeling. In terms of the rear end, the tail line of Starway Chasing the Wind is comfortable, and the taillights give people a very soft feeling. The layout of the exhaust pipe uses a bilateral double-out shape, which is neat and vivid.

Sitting in the car, the interior adopts a full design, which is very simple and generous. The steering wheel of the car is very simple in shape and made of leather, giving a good grip experience. From the central control point of view, the car decoration has a steady touch-control LCD central control screen, which makes the interior style impressive and gives people a feeling full of exquisiteness. Let’s take a look at the dashboard and seats again, which are very eye-catching. The car adopts imitation leather seats, which are wrapped in place and have good overall comfort.

Starway Chasing Wind matches CVT gearbox, with an acceleration time of 9.7s per 100 kilometers, which has good power performance and is completely OK for daily use.

The car is equipped with remote control key, rear wiper, interior ambience light, traction control (ASR/TCS, etc.), CarPlay support and other configurations, and the configuration performance is quite good, giving drivers and passengers a comfortable car experience.

Summary of the full text: Many people buy SUVs because of its stronger passability. The car is practical and fully equipped, and it is a good helper for home travel.