{"id":29105,"date":"2008-12-03T23:02:36","date_gmt":"2008-12-04T06:02:36","guid":{"rendered":"http:\/\/chinadigitaltimes.net\/?p=29105"},"modified":"2009-01-30T11:56:00","modified_gmt":"2009-01-30T18:56:00","slug":"where-are-internet-police-being-trained-tr","status":"publish","type":"post","link":"https:\/\/chinadigitaltimes.net\/2008\/12\/where-are-internet-police-being-trained-tr\/","title":{"rendered":"Where Are Chinese (And Bangladeshi) Internet Police Being Trained?"},"content":{"rendered":"
<\/a><\/p>\n Where Are Chinese Internet Police Being Trained? This inetcop.com.cn website has the answer. \nOn July 30, 2004, the Ministry of Public Security formally passed and authorized the establishment of a “National Internet Police Training Program,” which would rely on the company’s technological skills, educational resources, and experimental environment to provide training and related services in the field of Internet supervision for the Department of Secure Internet Public Information to the Ministry of Public Security.<\/p>\n Up to December 2005, the training bases not only completed more than a dozen national skill-based training assignments, they have also set up 70 extra beginning, intermediate, and advanced training classes relating to the monitoring of Internet security and investigation of computers for certification. This has provided skill-based training for the more than 3,000 policemen at the Ministry of Public Security. Furthermore, in November 2005, the Ministry of Public Security for the first time undertook a foreign aid project and effectively completed its assignment to provide training on the investigation of computers for certification to the Bangladesh police<\/strong>. This was its first step in internationalizing these training programs. <\/p>\n Contact Phone Number: 0592-3929988 \u5168\u56fd\u7f51\u7edc\u8b66\u5bdf\u57f9\u8bad\u57fa\u5730<\/p>\n 2004\u5e747\u670830\u65e5\uff0c\u516c\u5b89\u90e8\u6b63\u5f0f\u6279\u6587\uff0c\u6388\u6743\u7b79\u5efa\u6210\u7acb\u201c\u5168\u56fd\u7f51\u7edc\u8b66\u5bdf\u57f9\u8bad\u57fa\u5730\u201d\uff0c\u4f9d\u6258\u516c\u53f8\u7684\u6280\u672f\u529b\u91cf\u3001\u6559\u5b66\u8d44\u6e90\u548c\u8bd5\u9a8c\u73af\u5883\uff0c\u4e3a\u516c\u5b89\u673a\u5173\u516c\u5171\u4fe1\u606f\u7f51\u7edc\u5b89\u5168\u76d1\u5bdf\u90e8\u95e8\u6c11\u8b66\u63d0\u4f9b\u7f51\u7edc\u76d1\u5bdf\u65b9\u9762\u7684\u57f9\u8bad\u548c\u76f8\u5173\u670d\u52a1\u3002 \u8054\u7cfb\u7535\u8bdd\uff1a0592-3929988 =====<\/p>\n Also on the front page of the same website<\/a>:<\/p>\n \nIn November 2008, [the company] once again hosted an international conference of the Ministry of Public Security, and successfully accomplished the large scale training program “China and ASEAN<\/a> Internet Crimes Investigation Research and Training Class.” It is another solid step towards internationalization of the training base. <\/strong><\/p><\/blockquote>\n 2008\u5e7411\u6708\uff0c\u518d\u6b21\u627f\u529e\u516c\u5b89\u90e8\u6d89\u5916\u4f1a\u8bae\uff0c\u5706\u6ee1\u5b8c\u6210\u4e86\u201c\u4e2d\u56fd\u4e0e\u4e1c\u76df\u7f51\u7edc\u72af\u7f6a\u4fa6\u67e5\u7814\u4fee\u73ed\u201d\u7684\u5927\u578b\u57f9\u8bad\u4efb\u52a1\uff0c\u4e3a\u57f9\u8bad\u57fa\u5730\u8d70\u5411\u56fd\u9645\u5316\u4e0d\u65ad\u8fc8\u51fa\u575a\u5b9e\u7684\u6b65\u4f10\u3002 \nThe “National Internet Police Training Base” has obtained permission for its establishment!<\/p>\n On July 30, 2004, we submitted the report on “Instructions for Setting Up Training Bases for the Eleventh Office of the Ministry of Public Security” (United States and Asia Corp. Signature [2004] No. 1) This concludes the matter. The full text of the reply is as follows.<\/p><\/blockquote>\n
\nThe following is from the Xiamen Meiah Pico IT CO., Ltd.<\/a> website, translated by CDT’s Lucy Lin:<\/p>\n
\nFax: 0592-2519335
\nE-mail: training@inetcop.com.cn
\nAddress: Xiamen Meiah Pico IT CO., Ltd., Xiamen Software Park Phase II, 12 Guanri Rd. Xiamen City, Fujian Province, China<\/p>\n
\n \u81f32005\u5e7412\u6708\uff0c\u57f9\u8bad\u57fa\u5730\u4e0d\u4ec5\u5b8c\u6210\u4e86\u5341\u51e0\u6b21\u7684\u5168\u56fd\u6027\u6280\u672f\u57f9\u8bad\u4efb\u52a1\uff0c\u5f00\u529e\u4e8670\u4f59\u671f\u6709\u5173\u7f51\u7edc\u5b89\u5168\u76d1\u63a7\u548c\u8ba1\u7b97\u673a\u52d8\u67e5\u53d6\u8bc1\u7684\u521d\u3001\u4e2d\u3001\u9ad8\u7ea7\u57f9\u8bad\u73ed\uff0c\u4e3a\u5168\u56fd3000\u4eba\u6b21\u7684\u516c\u5b89\u5e72\u8b66\u63d0\u4f9b\u4e86\u76f8\u5173\u7684\u6280\u672f\u6280\u80fd\u57f9\u8bad\u3002\u5e76\u4e8e2005\u5e7411\u6708\uff0c\u9996\u6b21\u627f\u529e\u516c\u5b89\u90e8\u5bf9\u5916\u63f4\u52a9\u9879\u76ee\uff0c\u5b8c\u6ee1\u5b8c\u6210\u4e3a\u5b5f\u52a0\u62c9\u8b66\u65b9\u63d0\u4f9b\u8ba1\u7b97\u673a\u53d6\u8bc1\u57f9\u8bad\u7684\u4efb\u52a1\uff0c\u8fc8\u51fa\u4e86\u8d70\u5411\u56fd\u9645\u5316\u7684\u7b2c\u4e00\u6b65\u3002<\/p>\n
\n\u4f20\u771f\uff1a 0592-2519335
\n\u90ae\u4ef6\uff1a training@inetcop.com.cn
\n\u5730\u5740\uff1a \u4e2d\u56fd\u798f\u5efa\u7701\u53a6\u95e8\u5e02\u8f6f\u4ef6\u56ed\u4e8c\u671f\u89c2\u65e5\u8def12\u53f7\u7f8e\u4e9a\u67cf\u79d1\u5927\u53a6<\/p><\/blockquote>\n
\n=====
\nThe same site also posted the following, to prove that their work has been officially recognized:<\/p>\n