<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Gang &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/gang/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Sat, 19 Jun 2021 10:13:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>Mexico sells drug lord&#8217;s mansion to buy COVID-19 vaccine</title>
		<link>https://en.spress.net/mexico-sells-drug-lords-mansion-to-buy-covid-19-vaccine/</link>
		
		<dc:creator><![CDATA[Hoàng Trang/Báo Tin tức]]></dc:creator>
		<pubDate>Sat, 19 Jun 2021 10:13:13 +0000</pubDate>
				<category><![CDATA[Architecture]]></category>
		<category><![CDATA[Amado Carrillo Fuentes]]></category>
		<category><![CDATA[Andres Manuel Lopez Obrador]]></category>
		<category><![CDATA[Bathtub]]></category>
		<category><![CDATA[buy]]></category>
		<category><![CDATA[Commandeer]]></category>
		<category><![CDATA[COVID19]]></category>
		<category><![CDATA[Drug]]></category>
		<category><![CDATA[Drug lord]]></category>
		<category><![CDATA[Estadio Azteca]]></category>
		<category><![CDATA[Extradition]]></category>
		<category><![CDATA[Gang]]></category>
		<category><![CDATA[INSIDER]]></category>
		<category><![CDATA[Lords]]></category>
		<category><![CDATA[Lottery]]></category>
		<category><![CDATA[Mansion]]></category>
		<category><![CDATA[Mexican government]]></category>
		<category><![CDATA[Mexico]]></category>
		<category><![CDATA[Notorious]]></category>
		<category><![CDATA[Rao]]></category>
		<category><![CDATA[sells]]></category>
		<category><![CDATA[State Government of Sinaloa]]></category>
		<category><![CDATA[State of Jalisco]]></category>
		<category><![CDATA[The name of the oligarch]]></category>
		<category><![CDATA[US Federal Court]]></category>
		<category><![CDATA[vaccine]]></category>
		<category><![CDATA[Vaccines for COVID 19]]></category>
		<category><![CDATA[Villa]]></category>
		<guid isPermaLink="false">https://en.spress.net/mexico-sells-drug-lords-mansion-to-buy-covid-19-vaccine/</guid>

					<description><![CDATA[The multimillion-dollar mansions of notorious drug lords Joaquín &#8216;El Chapo&#8217; Guzmán and Amado Carrillo Fuentes will be put up for sale to buy a COVID-19 vaccine for Mexicans. Joaquin &#8220;El Chapo&#8221; Guzmán, center, is extradited to the US in 2017. Photo: AP Insider reports that the Mexican government has just announced that it will hold [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The multimillion-dollar mansions of notorious drug lords Joaquín &#8216;El Chapo&#8217; Guzmán and Amado Carrillo Fuentes will be put up for sale to buy a COVID-19 vaccine for Mexicans.</strong><br />
<span id="more-25461"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_294_39179124/5f3feab8e5fa0ca455eb.jpg" width="625" height="312"> </p>
<p> <em> Joaquin &#8220;El Chapo&#8221; Guzmán, center, is extradited to the US in 2017. Photo: AP</em> Insider reports that the Mexican government has just announced that it will hold a &#8220;super lottery&#8221; on September 15 with 22 prizes with a total value of up to 12.5 million USD, including foreclosed villas. revenue from the two drug lords mentioned above. President Andres Manuel Lopez Obrador said the proceeds from the lottery program will be used to buy COVID-19 vaccines, medicines and award some scholarships. According to Indep, the villa of Carrillo Fuentes &#8211; leader of the Juarez drug cartel &#8211; located in the Jardines del Pedregal area near the capital Mexico City is valued at nearly $ 4 million. Foreclosed on more than 20 years ago, the property measures nearly 10,000 square feet and has an indoor swimming pool, nine bedrooms, several saunas, a wine cellar and a banquet hall. According to Indep, the mansion of the late boss Fuentes is still fully furnished. Meanwhile, the mansion of the &#8220;dwarf&#8221; Joaqín Guzmán, who was once in charge of the notorious Sinaloa cartel, is located in the city of Culiacán, capital of the state of Sinaloa on the West Coast of Mexico. This is where Guzmán escaped from the police in February 2014 by running through a secret tunnel hidden under the bathtub. Joaqín Guzmán&#8217;s house has two bedrooms, a living room, a dining room, a garage and a front garden. It is valued at $200,000, which is quite a bit higher than the real estate market in Sinaloa. In the previous sale of Indep, no one bought the two houses mentioned above. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_294_39179124/615dd1dade9837c66e89.jpg" width="625" height="388"> <em> Estadio Azteca Stadium. Photo: Reuters</em> This COVID-19 vaccine fundraiser also includes a luxury football room at the Estadio Azteca stadium in the capital. This room can accommodate 20 people, one bathroom and four parking spaces. In 1986, this is where then President Miguel de la Madrid presented the World Cup trophy to Diego Maradona. This room is valued at 1 million USD, valid until 2065. In 2019, Mexico once put up six other Guzmán homes for sale, but only three were sold for a total of $227,844. One of them is the steel-reinforced house where Guzmán took refuge after his first escape in 2001. The Mexican government once held a similar lottery in September 2020 with the top prize being the presidential jet. However, there were no buyers for this $130 million Boeing 787 Dreamliner. <strong> The luxury houses of drug lords</strong> Joaqín Guzmán is one of the most prominent drug lords in Mexico. He was extradited in 2017 and convicted by a US federal court in 2019 on 10 counts. Guzmán is serving a life sentence in a super-security prison in the US. In 2009, Forbes magazine ranked Guzmán at number 701 on its list of the world&#8217;s billionaires, with a net worth of $1 billion. In the city of Culiacan alone, Guzmán owns six houses. Most of them are real estate for the middle class and have in common that there is an underground passage under the bathtub for him to escape. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_294_39179124/c519699e66dc8f82d6cd.jpg" width="625" height="416"> <em> A Mexican soldier inspects the tunnel connecting Guzmán&#8217;s home bath to the city&#8217;s sewer system in Culiacan. Photo: Reuters</em> “El Chapo” is also the owner of an apartment on the most famous beach in Sinaloa. He also built a picturesque farmhouse for his mother, Consuelo Loera, in the town of Badiraguato in the mountains of Sinaloa. This farmhouse has four bedrooms, a large kitchen and a small chapel in the back. After a revenge attack between rival gangs in 2016, Ms. Loera left this abandoned ranch. The name Carrillo Fuentes is also known as &#8220;The Lord of the Sky&#8221; because of the way he used planes to smuggle tons of drugs into the US territory. He died in 1997 while undergoing facial transformation surgery.</p>
<p>Many of Carrillo Fuentes&#8217; assets suffered the same fate as Guzmán&#8217;s today. Fuentes&#8217; more luxurious residences &#8211; including a 2,000-square-foot apartment and 6,000-acre ranch &#8211; are located in Argentina, where he lived for a year before his death. In 2018, Argentina sold three of his properties for a total of $14 million. He still has several other properties in Mexico, including an Arab-style mansion in Hermosillo and a luxury mansion in the state of Jalisco.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25461</post-id>	</item>
		<item>
		<title>6 malicious Android apps users need to remove urgently from their phones</title>
		<link>https://en.spress.net/6-malicious-android-apps-users-need-to-remove-urgently-from-their-phones/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Wed, 09 Jun 2021 23:57:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[Bitdefender]]></category>
		<category><![CDATA[Careful]]></category>
		<category><![CDATA[Emergency]]></category>
		<category><![CDATA[FAKE]]></category>
		<category><![CDATA[Gang]]></category>
		<category><![CDATA[Google Android]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Impersonation]]></category>
		<category><![CDATA[Keyloggers]]></category>
		<category><![CDATA[malicious]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[phone]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Remove]]></category>
		<category><![CDATA[Spread]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Third party]]></category>
		<category><![CDATA[Toxic]]></category>
		<category><![CDATA[Urgently]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Virus removal]]></category>
		<guid isPermaLink="false">https://en.spress.net/6-malicious-android-apps-users-need-to-remove-urgently-from-their-phones/</guid>

					<description><![CDATA[In case your phone has 1 of the 6 applications below, quickly remove them immediately. Security researchers at Bitdefender recently said that the hacker gang used fake versions of famous Android apps to spread malware. (Artwork: Presse-citron) Specifically, the Teabot (or Anatsa) malware, which can allow hackers to take over the victim&#8217;s Android device completely; [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In case your phone has 1 of the 6 applications below, quickly remove them immediately.</strong><br />
<span id="more-21921"></span> Security researchers at Bitdefender recently said that the hacker gang used fake versions of famous Android apps to spread malware.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_329_39085621/880527933cd1d58f8cc0.jpg" width="625" height="415"> <em> (Artwork: Presse-citron)</em> Specifically, the Teabot (or Anatsa) malware, which can allow hackers to take over the victim&#8217;s Android device completely; steal their banking and other important personal information through tools like keyloggers. The analysis report from Bitdefender researchers said that Teabot malware can perform attacks through Android Accessibility Services, view private messages, steal banking information, steal authentication codes. of Google,&#8230; and even take full remote control of the victim&#8217;s devices. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_329_39085621/eb8fa8e1b7a35efd07b2.jpg" width="625" height="416"> <em> (Artwork: Unsplash)</em> Distributing malware directly from app stores would be difficult, so hackers use the method of impersonating top-rated apps distributed on third-party websites. . According to research by Bitdefender, fake Android apps include antivirus, media player, health, etc. To deceive users, the fake app&#8217;s name and logo will be copied. copy almost or exactly like the real application. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_329_39085621/732d887b9a3973672a28.jpg" width="625" height="468"> <em> (Artwork: Panda Security)</em> Here are 6 malicious apps impersonating famous apps to scam users. If you are using Android devices, please check all the applications on the device. In case your phone has 1 of the 6 applications below, quickly remove them immediately. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_329_39085621/08f4f0a2e2e00bbe52f1.jpg" width="625" height="441"> <em> The main app icon (right) and the fake app (left) have some differences in the 5th and 6th apps. (Image: Bitdefender)</em> Bitdefender emphasizes that the campaign against these malicious applications is still active. For this reason, Android users need to be careful about downloading apps, especially apps from third parties, that aren&#8217;t part of the Google app market; Don&#8217;t click on strange links and always look carefully at the permission requests of Android apps.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21921</post-id>	</item>
		<item>
		<title>How do criminals turn crypto into cash?</title>
		<link>https://en.spress.net/how-do-criminals-turn-crypto-into-cash/</link>
		
		<dc:creator><![CDATA[Linh Đỗ]]></dc:creator>
		<pubDate>Thu, 03 Jun 2021 11:18:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[Bitcoin Fog]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[cash]]></category>
		<category><![CDATA[CHAINLYSIS]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Convert]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[criminals]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[ELLIPTIC]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Exchanges]]></category>
		<category><![CDATA[Gang]]></category>
		<category><![CDATA[HYDRA]]></category>
		<category><![CDATA[Incognito]]></category>
		<category><![CDATA[King Law Firm]]></category>
		<category><![CDATA[Michael Phillips]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Tom Robinson]]></category>
		<category><![CDATA[turn]]></category>
		<category><![CDATA[Turn into]]></category>
		<category><![CDATA[VMWARE]]></category>
		<guid isPermaLink="false">https://en.spress.net/how-do-criminals-turn-crypto-into-cash/</guid>

					<description><![CDATA[In the world of cybercrime, cryptocurrency is the preferred form of payment. But ultimately, criminals still need to convert electronic assets into cash. According to the Financial Times When it comes to converting cryptocurrencies into cash, criminals often go to the Treasure Men group. To contact this group, simply go to the Hydra dark web. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In the world of cybercrime, cryptocurrency is the preferred form of payment. But ultimately, criminals still need to convert electronic assets into cash.</strong><br />
<span id="more-20294"></span> According to the <em> Financial Times</em> When it comes to converting cryptocurrencies into cash, criminals often go to the Treasure Men group. To contact this group, simply go to the Hydra dark web. It is the largest online marketplace on the dark web by revenue.</p>
<p> &#8220;This group leaves cash in specific places &#8211; behind a bush or under a bus seat &#8211; for criminals to get. They send specific location instructions. This is a whole new profession.&#8221; <em> Financial Times</em> quoted Dr. Tom Robinson, founder of Elliptic organization specializing in analyzing cryptocurrency transactions. The dark web site Hydra (Russian) offers a variety of methods for criminals to exchange cryptocurrency for cash, for example exchanging Bitcoins for gift certificates, debit cards or iTunes vouchers. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_31_119_39022986/7fddf4c8e38a0ad4539b.jpg" width="625" height="413"> <em> Special software is required to access the Hydra dark web. Photo: ZDNet. </em> <strong> Anonymous but still leaving traces</strong> According to experts, the ability to store cryptocurrency without providing an identity makes this currency especially attractive to many criminal gangs, especially hackers specializing in breaking into networks of businesses. and demand ransom. Statistics from research firm Chainalysis show that in 2020, businesses and organizations paid at least $350 million in cryptocurrency ransoms to a number of hacker groups, including DarkSide, the group that attacked the pipeline system. Colonial Pipeline earlier this month. But while anonymous, cryptocurrency transactions are recorded on an immutable blockchain system, leaving a clear trail for anyone with any knowledge of the technology. A number of investigative firms have been established to assist national authorities in tracking various criminal gangs by analyzing the flow of cryptocurrency transactions. Chainalysis (headquartered in New York, USA) is one such company. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_31_119_39022986/70cce6d9f19b18c5418a.jpg" width="625" height="315"> <em> Binance cryptocurrency exchange. In 2011-2019, cryptocurrency exchanges supported the conversion to cash of about 60-80% of Bitcoin transactions by criminal groups. Photo: Binance. </em> Chainalysis raised $100 million in its initial public offering, reaching a valuation of over $2 billion. There are also Elliptic (headquartered in London, UK) and CipherTrace, a company supported by the US government. Chainalysis said that in 2020, some illegal organizations receive about 5 billion USD and transfer 5 billion USD to other organizations. This represents almost 1% of all global crypto flows. Initially, the criminals only withdrew funds through major cryptocurrency exchanges. Elliptic estimates that between 2011 and 2019, cryptocurrency exchanges supported the conversion of about 60-80% of Bitcoin transactions by illegal organizations into cash. <strong> Take advantage of crypto ATMs</strong> Since last year, exchanges have been concerned about the tightening of regulations by many governments, so they have begun to apply anti-money laundering (AML) and customer identity verification (KYC) processes. This change pushes criminals to unlicensed exchanges. Still, expert Michael Phillips of online insurance company Resilience said that unlicensed exchanges have low liquidity, making it difficult for criminals to convert crypto to fiat. &#8220;The goal is to make it more expensive for criminals to convert money,&#8221; he explained. However, criminals still have a way around. Research by Chainalysis shows that some intermediaries are quietly assisting gangs in conducting many illegal money conversion transactions. Meanwhile, small-scale transactions still flow through more than 11,600 crypto ATMs worldwide without any control, or through gambling sites that accept crypto payments. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_31_119_39022986/98e80cfd1bbff2e1abae.jpg" width="625" height="351"> <em> Criminals can use crypto ATMs to get cash. Photo: EPA. </em> Faced with that situation, crypto security companies use the technology of analyzing blockchain transactions and intelligence to determine which crypto wallets belong to criminal gangs. At the same time, they provide an overview of the global crypto crime ecosystem. As a result, companies discovered that many hacker groups lease ransomware to criminal networks. Kimberly Grauer, director of research at Chainalysis, said hackers also pay support services to other criminal groups in cryptocurrency. Thus, a criminal cryptocurrency ecosystem has been formed on a global scale. &#8220;We were able to see the ransom transactions, how the gangs split the money and how that money went to groups in the system,&#8221; Grauer said. <strong> The tricks are getting more and more sophisticated</strong> However, cybercriminals are increasingly using a variety of high-tech tools to obscure the traces of cryptocurrency transactions. Some criminals use &#8220;chain-hopping&#8221; &#8211; repeatedly switching between different cryptocurrencies &#8211; to avoid the eyes of security companies. In addition, they use a “privacy cryptocurrency” like Monero, which has a high degree of anonymity. Another tool commonly used by criminals is a “mixer,” a third-party service that mixes illegal cryptocurrencies with clean money, before pushing them back onto the market. In April, the US Department of Justice arrested a Swedish citizen of Russian origin, who specialized in operating a &#8220;mixing&#8221; service called Bitcoin Fog. During the past 10 years, this guy has transferred a total of 335 million USD in Bitcoin. Governments need to modernize confiscation and asset freezing processes to make it easier to confiscate cryptocurrencies from exchanges. <strong> Tom Kellerman, director of cybersecurity strategy at VMware V</strong> “It is possible to untangle mixed cryptocurrencies. However, that requires high technology and a lot of processing and data power,” said Katherine Kirkpatrick, director of law firm King &#038; Spalding. According to Elliptic, the popular 2020 coin mixers are highly anonymous &#8220;personal wallets&#8221;. They supported 12% of Bitcoin wash transactions last year. Tom Kellerman, director of cybersecurity strategy at VMware and a member of the US Secret Service&#8217;s advisory board, said that governments need to modernize the process of confiscating and freezing assets for law enforcement. easily confiscate cryptocurrencies from exchanges. In the past, blockchain security experts have floated the idea of ​​sharing a &#8220;blacklist&#8221; of crypto wallets used by criminals with exchanges, analytics firms, and governments. “Now is the right time to consider that initiative.” <em> he </em> Kemba Walden of Microsoft&#8217;s Digital Crimes Unit.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20294</post-id>	</item>
		<item>
		<title>&#8216;Hot&#8217; human trafficking across the US &#8211; Mexico border</title>
		<link>https://en.spress.net/hot-human-trafficking-across-the-us-mexico-border/</link>
		
		<dc:creator><![CDATA[Mai Khuê (Tổng hợp)]]></dc:creator>
		<pubDate>Thu, 13 May 2021 13:16:16 +0000</pubDate>
				<category><![CDATA[Science]]></category>
		<category><![CDATA[Across]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[Border]]></category>
		<category><![CDATA[Cartel]]></category>
		<category><![CDATA[Central America]]></category>
		<category><![CDATA[Ciudad Júarez]]></category>
		<category><![CDATA[Cross over]]></category>
		<category><![CDATA[El Paso]]></category>
		<category><![CDATA[El salvador]]></category>
		<category><![CDATA[Gang]]></category>
		<category><![CDATA[hot]]></category>
		<category><![CDATA[human]]></category>
		<category><![CDATA[Mexico]]></category>
		<category><![CDATA[Migrate]]></category>
		<category><![CDATA[Minors]]></category>
		<category><![CDATA[Mirror]]></category>
		<category><![CDATA[Organized crime]]></category>
		<category><![CDATA[Sedan]]></category>
		<category><![CDATA[Smuggle]]></category>
		<category><![CDATA[Texas]]></category>
		<category><![CDATA[The wall]]></category>
		<category><![CDATA[Trafficking]]></category>
		<guid isPermaLink="false">https://en.spress.net/hot-human-trafficking-across-the-us-mexico-border/</guid>

					<description><![CDATA[A blue sedan is running along the highway north of Mexico until the sun comes out. A 200 foot long steel pole is fastened to the side mirror. It could only be the number of workers under construction but not having the proper transport truck for the job. But this car is running along the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A blue sedan is running along the highway north of Mexico until the sun comes out. A 200 foot long steel pole is fastened to the side mirror.</strong><br />
<span id="more-13791"></span> It could only be the number of workers under construction but not having the proper transport truck for the job. But this car is running along the border wall in Ciudad Júarez, a city located south of the US-Mexico border, parallel to El Paso of Texas, USA on the other side. This is the area of ​​the smuggling of people across the US &#8211; Mexico border.</p>
<p> Two smugglers are sitting in the car with two migrants &#8211; who want to illegally cross into the US in the back seat. The target group will use that steel pole as a temporary ladder to lift two people who want to cross the wall and enter the United States. Each week, tens of thousands of people migrate to the United States, mostly unaccompanied minors. The increase in the number of migrants once again overwhelms the unprepared immigration system of the United States, which has faced over the years but has not yet addressed its dilemma &#8211; shortages. Equipment facilities, overcrowded refugee zones &#8230; That&#8217;s the consequence of a flourishing illegal trafficking activity again in this area. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_99_38796325/bea1fab0e7f20eac57e3.jpg" width="625" height="350"> <em> The border wall at the US-Mexico border separates El Paso, Texas and Ciudad Júarez, Mexico.</em> <strong> Bringing smuggled migrants &#8211; a lucrative &#8220;business&#8221; industry</strong> The two smugglers mentioned above are brothers. They are the guys who specialize in bringing people into America with the help of his brother&#8217;s 14-year-old son. There is very little data available to accurately quantify the number of migrants who use the services of smugglers to take the journey they think will change their lives. But most experts agree that many have used a smuggler for at least part of their journey, in ways that can vary from taking a taxi between towns to a full package. migrate. According to a 2018 report by the United Nations Office on Drugs and Crime estimated that more than 800,000 migrants from around the world illegally crossed into Mexico and since then, smuggled or attempted to find your way into the US each year, based on a review of data from 2014 and 2015. Only a small fraction of migrants avoid being arrested before reaching their final destination in the United States, despite the hefty fees paid to make the trip. According to the report, costs can range from a few hundred dollars to tens of thousands of dollars depending on a number of factors, largely based on the total distance of the journey and how many borders need to be crossed. This amount can leave migrants penniless, many of them migrating in the first place due to extreme poverty in their country of origin. The UN report estimates that business attempting to bring people into Mexico and the United States illegally is worth about $ 4 billion a year, according to data from 2014 and 2015. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_99_38796325/57c211d30c91e5cfbc80.jpg" width="625" height="350"> <em> A woman and three young children race toward a wall on the US-Mexico border in Ciudad Júarez, Mexico. </em> <strong> Locations of cartel bosses</strong> According to investigative documents, a large portion of the money spent on smuggling will fall into the hands of organized crime, especially in Mexico. Victor Manjarrez, former Head of Border Patrol in El Paso, Texas, said: “Human smuggling is a multimillion-dollar industry and I would venture to guess it was moving toward an industry. billion USD. Manjarrez says organized crime groups have used the money to create sophisticated smuggling networks that, in some cases, operate across the country. &#8220;It&#8217;s almost like a Fortune 500 company tackling their supply chain,&#8221; he said. It is a ruthless business, people migrate as commodities, not people, and they are certainly exploited. &#8221; One of the brothers interviewed by CNN, the Ciudad Júarez smuggler said he was recruited for the job after moving to his home on the border. &#8220;Some people asked me if I wanted to join, and I said yes. That&#8217;s why I&#8217;m here.&#8221; In this case, the &#8220;guys&#8221; he alluded to were members of the Júarez gang &#8211; one of Mexico&#8217;s oldest and most powerful organized crime groups &#8211; whose smugglers said they worked on duty. continued. The two brothers told CNN, each migrant must pay $ 2,000 to cross the border here. The smugglers then receive a salary, or commission for their work. It&#8217;s a system that operates across the US-Mexico border. Traffickers who operate in these areas almost always operate in one of two ways &#8211; working directly for the gang in charge of that individual or working independently but paying the gang a tax to get it. the right to transit the above smuggling line. &#8220;Most smugglers engage in complex activities either get to know each other due to kinship or friendship, or have entered into ad hoc partnerships with larger, well-resourced groups. more &#8220;, according to a 2018 United Nations report. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_99_38796325/e640a751ba13534d0a02.jpg" width="625" height="352"> <em> US President Joe Biden has stopped building the US &#8211; Mexico border wall.</em> <strong> Go north</strong> Tens of thousands of migrants have fled their homeland in Central America for a multitude of reasons, poverty and corruption continue to rage in countries like Honduras, and food insecurity is on the rise. like Guatemala, and gang violence continues to pervade El Salvador. Two major Category 4 hurricanes also hit the region late last year, destroying social infrastructure, and the COVID-19 pandemic continuing to devastate troubled regional economies. Stories of rape and abuse often occur in migrant areas along the border. Psychologist Claudia Grisel Villalobos Esparza, who works at Nohemí Álvarez Quillay, a shelter for unaccompanied minors in Ciudad Júarez, said. The families of the smugglers, led by the two brothers, told CNN they have heard of so many cases of abuse. They even brought up smugglers who, a few weeks earlier, had released two children across a border wall not far from their home &#8211; a case that caused a stir in America. While it is not possible to verify how they treat migrants, even if they treat migrants well, it is not for the sake of migrants. According to experts such as the psychologist at Ciudad Júarez, each time they are compensated for their work, these employees help maintain a system of kidnappings, rape, extortion, and even Murderous lice are rampant. While extensive data quantifying the specific threats migrants face smugglers is not available, the Human Rights First report released last month reported at least 492 attacks. public and abduction of asylum seekers. A 2017 report by Medicins San Frontieres found that nearly a third of the women migrating from Mexico interviewed had experienced some form of sexual abuse on their journey north, nearly 70% of all. interviewed had experienced violence in some form. <strong> The last stage of the journey</strong> CNN chose to document the smuggler&#8217;s progress to shed light on what&#8217;s happening along the daily border as the immigration debate is taking place within the United States. Returning to the blue sedan incident, after plunging from a side street, it stopped a few hundred meters on the road in front of us. The two men stepped out and went to get the makeshift ladder, which is the iron bar tied to the side mirror. The smugglers were looking for a good spot to try and cross, then they told us, a site where the US Border Patrol would be too far away to catch them. About 10 minutes drive, the sedan stops along a stretch of highway. One of the smugglers got out of the car with two migrants, one of whom grabbed a makeshift ladder, the border wall about 500 meters away. A quick dash off the road and the trio entered the sandy desert that was the hallmark of this arid landscape. The group of people forward, dragging the metal ladder, behind the exhausted gasp of migrants is the sound of the smuggler&#8217;s occasional instruction: &#8220;Get lower!&#8221; He screamed at one point when a Border Patrol truck drove across the border. Halfway through the wall, the group took a break, and we only had about 30 seconds to talk to the migrants. They are Ecuadorian, one man and woman, 18 and 20 years old, with nothing but clothes on their backs and two bottles of water. They have paid smugglers thousands of dollars to get there, and they hope to find work in South Texas. But the only way they could do it was to get past the wall. After gazing intently at a small bush, looking for any signs of law enforcement, the smuggler signaled it was time to push the final wall. Crouching in a low run, they made the final distance in about a minute. The 18-year-old then lifts the ladder and the smuggler helps him hook one end to the end of the fence, the ladder curves over the wall like a candy. The young man threw both bottles of water over the fence and immediately took the ladder, shaking hands quickly until it reached the top of the 15-20 feet high wall. He quickly lowered himself to the other side, dropped into what looked like an unused construction site, and then it was the young woman&#8217;s turn. Just a little slower, she did the same thing. They both passed through the desert on the other side and the traffickers were back on the highway. To the two migrants, there seems to be little plan on what to do next, confused and overwhelmed, both running towards an uncertain future. There is only a bit of desert on that side of the wall. Yes, they have made it to America, but far from the end of their journey, they obviously have a lot left to answer: Where are they going? What will they do? How will they make money? What if they are caught by immigration? These are questions that we cannot answer. For smugglers, those are immaterial queries &#8211; very simple in fact. They don&#8217;t know what happened to them on the other side and don&#8217;t really want to know. Their job is to get them over the wall and that&#8217;s it.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13791</post-id>	</item>
		<item>
		<title>Hacker claimed holding hands of Apple secret, asking for $ 50 million in ransom</title>
		<link>https://en.spress.net/hacker-claimed-holding-hands-of-apple-secret-asking-for-50-million-in-ransom/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Mon, 26 Apr 2021 15:52:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple Silicon]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[claimed]]></category>
		<category><![CDATA[Gang]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[hands]]></category>
		<category><![CDATA[Hold in hand]]></category>
		<category><![CDATA[holding]]></category>
		<category><![CDATA[J314]]></category>
		<category><![CDATA[J316]]></category>
		<category><![CDATA[J374]]></category>
		<category><![CDATA[J375]]></category>
		<category><![CDATA[M1X]]></category>
		<category><![CDATA[MacBook]]></category>
		<category><![CDATA[MacBook Air]]></category>
		<category><![CDATA[Macbook Pro]]></category>
		<category><![CDATA[Macbook Pro 2021]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[Quanta Computer]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[secret]]></category>
		<category><![CDATA[Technical drawings]]></category>
		<category><![CDATA[The Record]]></category>
		<guid isPermaLink="false">https://en.spress.net/hacker-claimed-holding-hands-of-apple-secret-asking-for-50-million-in-ransom/</guid>

					<description><![CDATA[Hacker gang REvil asked Apple to liquidate before May 1. If they don&#8217;t, they will reveal more data after each day of transaction delay. 9to5Mac reported, the hacker gang behind the ransomware REvil claims to have in hand confidential data about the technical information of Apple products. These guys are asking Apple to pay a [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Hacker gang REvil asked Apple to liquidate before May 1. If they don&#8217;t, they will reveal more data after each day of transaction delay.</strong><br />
<span id="more-9050"></span> 9to5Mac reported, the hacker gang behind the ransomware REvil claims to have in hand confidential data about the technical information of Apple products. These guys are asking Apple to pay a ransom if they don&#8217;t want the information to be released.</p>
<p> According to The Record, the hacker gang got this information after a data attack Quanta Computer, one of Apple&#8217;s main MacBook manufacturing partners. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_22_329_38601254/6a0cca46ef04065a5f15.jpg" width="625" height="481"> <em> Several internal technical design drawings for Apple devices such as the MacBook and Apple Watch have been announced by REvil. (Photo: CryptoInsane)</em> The hacker gang behind the ransomware REvil claims to have in-house technical blueprints for Apple devices like the MacBook and Apple Watch, which Quanta Computer uses to assemble products. The hacker group asked Quanta Computer to pay 50 million USD to keep the data confidential. However, due to the unsuccessful agreement, the hacker group asked Apple to pay this ransom. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_22_329_38601254/e4774a3d6f7f8621df6e.jpg" width="625" height="482"> <em> The technical drawings of the MacBook Air and MacBook Pro revealed by the hacker group. (Photo: CryptoInsane)</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_22_329_38601254/59d7f29dd7df3e8167ce.jpg" width="625" height="479"> <em> (Photo: CryptoInsane)</em> To prove it, the hacker group has posted a few screenshots showing technical drawings of the MacBook Air and MacBook Pro and included with the liquidity request before May 1. If Apple doesn&#8217;t respond, they&#8217;ll reveal more data after each day of transaction delay. According to Estrategia &#038; Negocios, on the REvil website (where the gang publishes stolen data to threaten companies to comply with ransom demands), the hacker group said: &#8220;To not have to wait for these Apple&#8217;s next presentation, we, the REvil team, will make information about the company&#8217;s next upcoming products available to many. Tim Cook can thank Quanta. On our side, we have shown goodwill. Quanta has made it clear to us that they are not interested in customer and employee data, giving permission to publish and sell all the data we have. &#8221; <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_22_329_38601254/0643d309f64b1f15465a.jpg" width="625" height="406"> <em> MacBook Pro 2021 image revealed by hacker group. (Photo: 9to5Mac)</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_22_329_38601254/7ee8a8a28de064be3df1.jpg" width="625" height="481"> <em> (Photo: CryptoInsane)</em> 9to5Mac said that in some leaked images there are technical information of two unreleased MacBook Pro models, codenamed J314 and J316. Products equipped with Apple Silicon chip, MagSafe charging port, HDMI and SD card slot. These information are true to what analyst Ming-Chi Kuo revealed in January. According to Bloomberg, the codename J316 is the 16-inch MacBook Pro, while the J314 is the 14-inch version. In the image also appears codenamed J374 and J375, which are said to be the Mac mini with the new M1X processor chip. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_22_329_38601254/0f41de0bfb4912174b58.jpg" width="625" height="314"> <em> (Photo: CryptoInsane)</em> The hacker gang also said that they are &#8220;negotiating to sell a large amount of confidential drawings, GB of personal data with some major brands&#8221;. This means, Apple is likely not the only data attack victim. At the moment, representatives from Apple and Quanta Computer said they are reviewing the matter.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9050</post-id>	</item>
		<item>
		<title>Original Xiao Gang: In the future, residential assets will no longer only be real estate, and the stock market should become a carrier of wealth appreciation</title>
		<link>https://en.spress.net/original-xiao-gang-in-the-future-residential-assets-will-no-longer-only-be-real-estate-and-the-stock-market-should-become-a-carrier-of-wealth-appreciation/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Mon, 19 Apr 2021 13:21:08 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[appreciation]]></category>
		<category><![CDATA[assets]]></category>
		<category><![CDATA[carrier]]></category>
		<category><![CDATA[estate]]></category>
		<category><![CDATA[future]]></category>
		<category><![CDATA[Gang]]></category>
		<category><![CDATA[longer]]></category>
		<category><![CDATA[market]]></category>
		<category><![CDATA[Original]]></category>
		<category><![CDATA[real]]></category>
		<category><![CDATA[Real estate]]></category>
		<category><![CDATA[Residential]]></category>
		<category><![CDATA[Stock]]></category>
		<category><![CDATA[wealth]]></category>
		<category><![CDATA[Xiao]]></category>
		<guid isPermaLink="false">https://en.spress.net/original-xiao-gang-in-the-future-residential-assets-will-no-longer-only-be-real-estate-and-the-stock-market-should-become-a-carrier-of-wealth-appreciation/</guid>

					<description><![CDATA[Xiao Gang, member of the National Committee of the Chinese People&#8217;s Political Consultative Conference and former chairman of the China Securities Regulatory Commission Produced &#124; Sohu Think Tank Edit &#124; Yuan Changyou Xiao Gang, a member of the National Committee of the Chinese People&#8217;s Political Consultative Conference and former chairman of the China Securities Regulatory [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" src="https://p7.itc.cn/images01/20210323/46de58ae1dff472db9f0251418c466cb.jpeg" max-width="600"> <strong>Xiao Gang, member of the National Committee of the Chinese People&#8217;s Political Consultative Conference and former chairman of the China Securities Regulatory Commission</strong></p>
<p><span id="more-4910"></span> Produced | Sohu Think Tank</p>
<p>Edit | Yuan Changyou</p>
<p>Xiao Gang, a member of the National Committee of the Chinese People&#8217;s Political Consultative Conference and former chairman of the China Securities Regulatory Commission, recently stated in the &#8220;National Wealth Lecture Hall&#8221; program that in the future, the proportion of financial assets in residents&#8217; wealth will become higher and higher, and the capital market should become a carrier of wealth appreciation.</p>
<p>Xiao Gang said that in the past we mainly relied on indirect financing and used bank leverage to mobilize savings to support technological innovation and manufacturing investment. However, in the historical stage of building an innovative country, the development of direct financing, especially equity financing, has become an inevitable trend. The next step in the reform of the financial market should focus on expanding the role of direct financing, especially equity financing, in supporting technological innovation and industrial transformation and upgrading.</p>
<p>&#8220;Science and technology innovation requires a large scale of investment, a long investment cycle, and high investment risk. Many innovations ultimately fail. In this case, the use of bank credit may put a heavy burden on innovation entities. Bank borrowing is corporate debt and needs to repay the principal and interest, which will inhibit the enthusiasm of innovation entities. Direct financing, especially equity financing, fits the characteristics of innovation well.&#8221;</p>
<p>The development of the equity investment market requires reforms in many aspects. First of all, Xiao Gang said that many private equity investment funds currently invest in mid- to late-stage projects, while technological innovation often requires strong support for early-stage projects, which requires more long-term and patient capital. Therefore, it is necessary to introduce more incentive policies to attract capital investment in early-stage, technological projects to promote technological innovation.</p>
<p>Second, he said that the current comprehensive reform of the exchange market has achieved obvious results, but further reforms are needed to expand the proportion of equity financing. For example, the NEEQ has achieved initial results in last year&#8217;s reforms. It mainly serves private and innovative small and medium-sized enterprises. The development potential after the reform is worth looking forward to.</p>
<p>Regarding the over-the-counter trading and over-the-counter markets of securities companies, Xiao Gang emphasized that in the past we paid more attention to on-exchange and standardized trading, but in fact, there are over-the-counter markets that need to be standardized. “In the past, there were many problems in the OTC market, such as non-standardization, information asymmetry and opacity, lack of trust mechanisms, etc. However, with the help of financial technology, such as blockchain, big data, artificial intelligence and other technologies, it was combined with OTC transactions. It may make up for the shortcomings in the over-the-counter market in the past.&#8221;</p>
<p>Xiao Gang believes that the current share of financial assets in residents&#8217; wealth is still low. With the reform and development of the equity investment market, the proportion of financial assets in the wealth of residents will become higher and higher in the future, and there will be a trend of &#8220;financialization of wealth&#8221;. Resident assets will no longer consist of real estate, but will have more financial instruments. In the future, the capital market should provide richer products and become a carrier for the appreciation of residents&#8217; wealth, so that investors can obtain more property income.</p>
<p>[Sohu Think Tank: Gather the wisdom of scholars and entrepreneurs to get the pulse of economic trends. If you are interested in contributing or contacting on-site reports, interviews, and program cooperation matters, please send an email to zhikucaijing@sohu.com]</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4910</post-id>	</item>
		<item>
		<title>The truck carrying the pig, crushed the tourist car, the father jumped the back seat to escape</title>
		<link>https://en.spress.net/the-truck-carrying-the-pig-crushed-the-tourist-car-the-father-jumped-the-back-seat-to-escape/</link>
		
		<dc:creator><![CDATA[Hương Chi]]></dc:creator>
		<pubDate>Mon, 19 Apr 2021 03:21:06 +0000</pubDate>
				<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[Back seat]]></category>
		<category><![CDATA[car]]></category>
		<category><![CDATA[carrying]]></category>
		<category><![CDATA[Collision]]></category>
		<category><![CDATA[Crush]]></category>
		<category><![CDATA[crushed]]></category>
		<category><![CDATA[Dad]]></category>
		<category><![CDATA[Dance]]></category>
		<category><![CDATA[escape]]></category>
		<category><![CDATA[Escape death]]></category>
		<category><![CDATA[Father]]></category>
		<category><![CDATA[Father and son]]></category>
		<category><![CDATA[Flip]]></category>
		<category><![CDATA[Gang]]></category>
		<category><![CDATA[Hiep An]]></category>
		<category><![CDATA[jumped]]></category>
		<category><![CDATA[Middle of the street]]></category>
		<category><![CDATA[Nguyen Chi Thanh Street]]></category>
		<category><![CDATA[Out of stock]]></category>
		<category><![CDATA[Override]]></category>
		<category><![CDATA[Pig]]></category>
		<category><![CDATA[Quick hand]]></category>
		<category><![CDATA[Scatter]]></category>
		<category><![CDATA[Seat]]></category>
		<category><![CDATA[Suoi Gioi toll station]]></category>
		<category><![CDATA[tourist]]></category>
		<category><![CDATA[Tourist car]]></category>
		<category><![CDATA[truck]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-truck-carrying-the-pig-crushed-the-tourist-car-the-father-jumped-the-back-seat-to-escape/</guid>

					<description><![CDATA[The truck loaded with pigs collided with the tourist car. Then, the truck overturned in the middle of the road and crushed another passenger car traveling in the same direction behind. The tour bus driver quickly hugged his child from the front row and jumped back before being crushed by the truck, so both father [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The truck loaded with pigs collided with the tourist car. Then, the truck overturned in the middle of the road and crushed another passenger car traveling in the same direction behind. The tour bus driver quickly hugged his child from the front row and jumped back before being crushed by the truck, so both father and son escaped death narrowly.</strong><br />
<span id="more-4616"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_19_20_38568660/a2f0bb2c9f6e76302f7f.jpg" width="625" height="468"> </p>
<p> The continuous accident between a truck and two passenger cars occurred around 22:30 pm on April 18 on Nguyen Chi Thanh Street, near Suoi Giua toll station, Hiep An ward, Thu Dau Mot city, Binh Duong. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_19_20_38568660/523b57e773a59afbc3b4.jpg" width="625" height="468"> <em> The scene of the accident</em> At that time, the truck with the Supervisory Board: 60C &#8211; 169.86 was loaded with pigs moving on Highway 13. When the car turned about 100m from Nguyen Chi Thanh, there was a collision with a passenger car carrying the Supervisory Board: 61A &#8211; 058.75 and then suddenly turned sideways. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_19_20_38568660/1cdb1a073e45d71b8e54.jpg" width="625" height="468"> <em> The tourist car was crushed</em> The truck then crushed another passenger car bearing the IC: 61A &#8211; 696.83 moving in the same direction. The man operating a sea tourist car 61A &#8211; 696.83 when he saw the truck tilted, immediately the baby boy in the upper row jumped into the back seat and luckily both father and son escaped death. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_19_20_38568660/19631ebf3afdd3a38aec.jpg" width="625" height="468"> <em> Pigs on the truck scattering in the middle of the road</em> At the scene, the truck flipped across the middle of the road. The sea tourist car 61A &#8211; 696.83 the first part was crushed. Meanwhile, the tourist car carried the IC: 61A 058.75 cardboard stuck to the truck. Hundreds of pigs on the truck ran away in panic, scattered in the middle of the road. The people assisted the driver to take the pig to a point near the accident scene. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_19_20_38568660/e38ce350c7122e4c7703.jpg" width="625" height="447"> <em> Many pigs died after the accident</em> The accident was serious in between 3 vehicles, but fortunately there was no death. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_19_20_38568660/ad73acaf88ed61b338fc.jpg" width="625" height="468"> <em> The father jumped to the back seat with his son so he escaped death</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4616</post-id>	</item>
	</channel>
</rss>