The Standing Committee of the 14th National People's Congress (NPC) concluded its 16th session on Friday in Beijing.
At the closing meeting, lawmakers voted to adopt a revised Law on Penalties for Administration of Public Security and a revised Law against Unfair Competition.
President Xi Jinping signed two presidential orders to promulgate the laws.
Zhao Leji, chairman of the NPC Standing Committee, presided over the closing meeting.
The meeting adopted the decision of the NPC Standing Committee on ratifying the Convention on the Establishment of the International Organization for Mediation.
In addition, it approved the central government's final accounts for 2024.
The session voted to remove Miao Hua from his position as a member of the Central Military Commission, while lawmakers also passed a deputy qualification report and other personnel-related bills.
Addressing the closing meeting, Zhao stressed the need to earnestly carry out the education campaign on implementing the Party central leadership's "eight-point decision" on improving work conduct, in a bid to promote high-quality development of the work of people's congresses.
He also urged efforts to practice whole-process people's democracy, consciously accept public oversight, and maintain close ties with the people.
Lawmakers should foster strong awareness of the rule of law, remain loyal to the Constitution, strictly follow legal procedures, and faithfully perform their statutory duties, Zhao said.
Zhao chaired a meeting of the Council of Chairpersons before the closing meeting and presided over a lecture for lawmakers after the closing meeting.
Q: US President Donald Trump announced that the US carried out strikes on three nuclear facilities in Iran—Fordow, Natanz and Esfahan. What's China's comment on this?
A: China strongly condemns the US attacks on Iran and bombing of nuclear facilities under the safeguards of the IAEA. The actions of the US seriously violate the purposes and principles of the UN Charter and international law, and have exacerbated tensions in the Middle East. China calls on the parties to the conflict, Israel in particular, to reach a ceasefire as soon as possible, ensure the safety of civilians, and start dialogue and negotiation. China stands ready to work with the international community to pool efforts together and uphold justice, and work for restoring peace and stability in the Middle East.
Chinese Premier Li Qiang held talks with Singaporean Prime Minister Lawrence Wong, who is on an official visit to China, in Beijing on Monday.
Noting that China and Singapore are friendly neighbors and important partners, Li said that under the strategic guidance of their leaders, the traditional friendship between China and Singapore has been continuously deepened since the establishment of diplomatic relations 35 years ago, with bilateral relations enhanced and practical cooperation achieving fruitful results.
He said that China is willing to work with Singapore to uphold the traditions of mutual respect and trust, equality and mutual benefits, while maintaining close high-level exchange, enhancing strategic communication, and consolidating political mutual trust.
Li said that China stands ready to make full use of its bilateral cooperation mechanism with Singapore, implement their cooperation plan for the joint construction of the Belt and Road Initiative, and expand and strengthen flagship cooperation projects. China is also ready to increase the scale of two-way trade and investment, actively expand cooperation in third-party markets, and foster new cooperative initiatives in areas such as the digital economy, the green economy, artificial intelligence, smart cities and ocean energy.
He called on the two countries to strengthen exchange in education, culture, tourism and media, and to adhere to open regionalism and true multilateralism, actively promote the liberalization and facilitation of trade and investment, and maintain the stability and smooth operations of global industrial and supply chains.
China is willing to work with ASEAN member states, including Singapore, to promote the timely signature and implementation of the upgraded Version 3.0 China-ASEAN Free Trade Area pact, implement the high-quality Regional Comprehensive Economic Partnership Agreement, and accelerate the process of regional economic integration, Li said.
Wong said that Singapore looks forward to maintaining close high-level exchange and cooperation in various fields with China, deepening friendship and mutual trust, and promoting flagship cooperation projects such as the Suzhou Industrial Park. It is also willing to explore cooperation potential in emerging fields such as the digital economy, the green economy, artificial intelligence and biomedicine, and to expand third-party cooperation and enhance people-to-people and cultural exchange.
Wong noted that Singapore is full of confidence in the Chinese economy, and is willing to enhance communication and collaboration with China on regional and multilateral platforms to safeguard free trade and the multilateral trading system.
The Guangzhou Municipal Public Security Bureau's Tianhe District Branch on Tuesday released a police report stating that a tech company in Guangzhou, South China's Guangdong Province, was targeted by overseas hackers in a cyberattack, prompting the police to initiate an investigation. The police revealed that the attack has a clear political background and shows distinct signs of cyber warfare. The Global Times will continue to follow the progress of the investigation on the case.
According to the police report, the backend system of the self-service devices of the tech company was subjected to a cyberattack, resulting in the illegal upload of multiple attack programs that maliciously disrupted the normal operation of the system. Upon receiving the report, the public security authorities promptly launched an investigation, extracting relevant samples and legally securing electronic evidence. Through technical analysis of the attack methods and related malicious code samples, it has been preliminarily determined that the incident was a cyberattack initiated by an overseas hacker organization.
According to a relevant person in charge from the Guangzhou Municipal Public Security Bureau's Tianhe District Branch, the attackers used technical means to bypass the company's network protection devices, illegally accessing the backend system of the self-service devices. They conducted lateral movement to infiltrate and control multiple network devices, illegally uploading several attack programs, which affected the company's official website and some business systems, leading to several hours of network service interruption and causing significant losses, with some user privacy information potentially leaked.
Following the incident, the company immediately activated its emergency response plan, attempting to restore the system at the earliest opportunity and reporting the case to the local public security authorities. The authorities took the matter seriously, extracting relevant attack program samples, comprehensively securing related evidence, and organizing a professional technical team to conduct technical tracing.
The relevant person in charge disclosed that this cyberattack represents a large-scale organized and premeditated operation by an overseas hacker organization, exhibiting clear signs of cyber warfare. It is not something that an ordinary individual hacker could accomplish. "Preliminary tracing has revealed that this hacker organization has been using open-source tools to conduct network asset scanning and probing against our important departments, sensitive industries, and tech companies, broadly searching for attack targets. They exploit weak points in the network defenses of targeted units and seek opportunities to invade and control target systems, stealing and damaging important data, and disrupting the normal operations of relevant institutions."
Additionally, the technical team's analysis indicates that the attacker's methods and related technical proficiency were relatively low-level, exposing a significant number of digital traces during the attack. Public security authorities are currently conducting technical analysis and investigative work based on these leads.
The Guangzhou Municipal Public Security Bureau's Tianhe District Branch stated that this cyberattack not only violated the legitimate rights and interests of the enterprise, but also posed a serious threat to China's cyberspace order and public interest.
A cybersecurity expert told the Global Times that the attack had a clear political background, was highly targeted, and constituted an Advanced Persistent Threat (APT) operation. He further analyzed that judging from the official announcement, the overall level of the attack was not particularly sophisticated, falling within the second or third tier of APT groups' capabilities. Currently, when it comes to cyberattacks at this level, China-from regulatory authorities to major cybersecurity firms-has already developed effective response capabilities in threat detection, tracing, and countermeasures. "We can conduct in-depth analysis of the attack process and samples, and in some cases, can pinpoint the source of the threat," the expert said.
The police have reminded the public that any individual or organization encountering activities that endanger cybersecurity has the right to report them to the local cybersecurity department of the public security authorities in accordance with Article 14 of the Cybersecurity Law of the People's Republic of China. The authorities will resolutely crack down on such illegal activities in accordance with the law.
In recent years, following reports of cyberattacks launched by overseas hacker groups against China, public security authorities have promptly launched investigations and ultimately identified the foreign perpetrators. The most notable cases include the cyberattack against Northwestern Polytechnical University in Northwest China's Shaanxi Province and the cyberattack on the Wuhan Earthquake Monitoring Center.
In this regard, the expert stated that China's technical capabilities, industrial strength, and operational mechanisms in building APT attack response capabilities have been continuously evolving. The expert outlined a timeline tracking the progress of domestic cybersecurity firms in analysis and attribution capabilities from passively responding to attacks like Stuxnet around 2010, to proactively detecting certain attack activities after 2013, and to achieving breakthroughs in tracing attacks back to individual hacker after 2016.