{"id":32515,"date":"2025-04-07T11:10:06","date_gmt":"2025-04-07T03:10:06","guid":{"rendered":"https:\/\/www.1ai.net\/?p=32515"},"modified":"2025-04-07T11:10:06","modified_gmt":"2025-04-07T03:10:06","slug":"%e9%9d%9e%e6%b3%95%e8%8e%b7%e5%8f%96%e5%ad%a6%e7%94%9f%e4%bf%a1%e6%81%af%e5%b9%b6%e7%94%a8-ai-%e6%8a%80%e6%9c%af%e5%8f%91%e9%80%81%e9%aa%9a%e6%89%b0%e7%9f%ad%e4%bf%a1%ef%bc%8c%e5%9c%a8%e6%a0%a1","status":"publish","type":"post","link":"https:\/\/www.1ai.net\/en\/32515.html","title":{"rendered":"College student arrested for illegally obtaining student information and using AI technology to send harassing text messages"},"content":{"rendered":"<p>April 7, 1<a href=\"https:\/\/www.1ai.net\/en\/tag\/ai\" title=\"[View articles tagged with [AI]]\" target=\"_blank\" >AI<\/a>From the Ministry of Public Security's Internet Security Bureau WeChat public number was informed that, at a time when the Internet is highly popularized, the<a href=\"https:\/\/www.1ai.net\/en\/tag\/%e5%a4%a7%e5%ad%a6%e7%94%9f\" title=\"[Sees articles with tags]\" target=\"_blank\" >College Students<\/a>As an active group in the cyber world, they should be the purveyors of cyber civilization, however, there are very few students who, due to their weak legal awareness, have fallen into the<a href=\"https:\/\/www.1ai.net\/en\/tag\/%e7%bd%91%e7%bb%9c%e7%8a%af%e7%bd%aa\" title=\"[Sees articles with [cyber crime] labels]\" target=\"_blank\" >cybercrime<\/a>of the abyss.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-32516\" title=\"ba522564j00subvfn0016d000v900kdp\" src=\"https:\/\/www.1ai.net\/wp-content\/uploads\/2025\/04\/ba522564j00subvfn0016d000v900kdp.jpg\" alt=\"ba522564j00subvfn0016d000v900kdp\" width=\"1125\" height=\"733\" \/><\/p>\n<p>Recently, the public security network security department detected a case of illegal access to computer information system data.<strong>The suspects illegally obtained more than 20,000 pieces of students' personal information and then used AI technology to send it to more than 2,000 of them.<a href=\"https:\/\/www.1ai.net\/en\/tag\/%e9%aa%9a%e6%89%b0%e7%9f%ad%e4%bf%a1\" title=\"[Sees articles with [disturbing text message] labels]\" target=\"_blank\" >nuisance SMS<\/a>.<\/strong><\/p>\n<p>The suspect, Hu, a college student, illegally hacked into a school system and obtained more than 20,000 pieces of personal information about the school's students.<\/p>\n<p>In order to seek excitement and show off his skills, Hu, through the technical loopholes that existed in a small program previously discovered, used AI to write a program in which the stolen cell phone numbers of more than a thousand students to register accounts in bulk on the small program.<strong>After the SMS verification code will be tampered with obscene content sent to the students themselves, to their SMS harassment.<\/strong><\/p>\n<p>At present, the suspect confessed to the crime of illegally obtaining computer information system data, and the case is being further investigated.<\/p>","protected":false},"excerpt":{"rendered":"<p>ON 7 APRIL, 1AI WAS INFORMED BY THE WEB SECURITY DEPARTMENT OF THE MINISTRY OF PUBLIC SECURITY (SAN) MICRO-NOVEL PUBLIC NODE THAT, AT A TIME OF HIGH INTERNET PENETRATION, UNIVERSITY STUDENTS, AS ACTIVE MEMBERS OF THE INTERNET WORLD, WERE SUPPOSED TO BE PROPAGATORS OF CYBER-CIVILIZATION, YET VERY FEW STUDENTS WERE CAUGHT IN THE ABYSS OF CYBERCRIME BECAUSE OF THEIR LOW LEGAL AWARENESS. IN RECENT DAYS, THE PUBLIC SECURITY NETWORK SECURITY DEPARTMENT HAS DETECTED A CASE OF ILLEGAL ACCESS TO COMPUTER INFORMATION SYSTEM DATA, IN WHICH SUSPECTS ILLEGALLY OBTAINED MORE THAN 20,000 STUDENT PERSONAL INFORMATION AND SUBSEQUENTLY SENT HARASSMENT TEXT MESSAGES TO MORE THAN 2,000 STUDENTS USING AI TECHNOLOGY. THE SUSPECT WAS A UNIVERSITY STUDENT WHO ILLEGALLY INVADED A SCHOOL SYSTEM AND OBTAINED MORE THAN 20,000 PERSONAL INFORMATION ABOUT THE SCHOOL ' S STUDENTS. IN SEARCH OF STIMULATION AND FLAUNTING TECHNOLOGY, HU CHII FOUND A TECHNICAL LOOPHOLE IN A SMALL PROGRAM BEFORE GOING THROUGH, USING THE AI WRITING PROGRAM TO USE IT<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[148,146],"tags":[411,1188,5983,6196],"collection":[],"class_list":["post-32515","post","type-post","status-publish","format-standard","hentry","category-headline","category-news","tag-ai","tag-1188","tag-5983","tag-6196"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/posts\/32515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/comments?post=32515"}],"version-history":[{"count":0,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/posts\/32515\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/media?parent=32515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/categories?post=32515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/tags?post=32515"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/www.1ai.net\/en\/wp-json\/wp\/v2\/collection?post=32515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}