Joke Collection Website - Blessing messages - What types of telecom fraud include?
What types of telecom fraud include?
On April 7th, 20 1 1, the Supreme Court announced the Interpretation of the Supreme People's Court and the Supreme People's Procuratorate on Several Issues Concerning the Specific Application of Laws in Handling Criminal Cases of Fraud. According to the explanation, the specific circumstances of fraud crimes that can be severely punished are clarified:
By sending short messages, making phone calls or publishing false information through the Internet, radio and television, newspapers and magazines, etc. , fraud is not specific to most people; Defrauding disaster relief, emergency rescue, flood control, special care, poverty alleviation, immigration, relief and medical funds and materials; Fraud in the name of disaster relief fund-raising; Defrauding the disabled, the elderly or the disabled of their property; Causing the victim to commit suicide, mental disorder or other serious consequences. The characteristics of telecom fraud crime are the rapid spread and development of criminal activities. Criminals often take advantage of people's psychology of seeking advantages and avoiding disadvantages, and release false information to the masses in a package by fabricating false telephone calls and text messages. In a very short time, the scope of publication is very wide, and the scope of infringement is very large, so the scope of loss is also very wide. The means of information fraud are updated quickly. From the perspective of fraud excuses, it has developed from the initial winning fraud and consumption information to kidnapping, extortion, telephone arrears, car tax refund and so on. Criminals can always come up with all kinds of tricks. When gangs commit crimes, criminal gangs with very strong anti-detection ability generally adopt long-distance non-contact fraud. The internal organization of criminal gangs is very strict. Some are responsible for buying mobile phones, some are responsible for opening bank accounts, some are responsible for making phone calls, and some are responsible for transferring money. Transnational cross-border crimes are more prominent. Some criminals publish false information in China to deceive people abroad, while others often publish short messages abroad to deceive people in China. There are also collusion and chain crimes at home and abroad, which are very hidden and difficult to crack down on. The difference between telecom fraud and online fraud is that both are fraudulent activities.
Telecom fraud and online fraud are both crimes of fraud. However, the specific circumstances of the two are different, among which telecom fraud includes online fraud.
The common type of telecom fraud is the characteristic of impersonating identity, which means cheating by impersonating leaders, relatives and friends, institutions and other identities. Types of fraud by impersonating relatives and friends, financial aid/bursary fraud, telephone fraud by impersonating public security law, medical insurance/social security fraud, etc. Shopping features are fraudulent through various false preferential information, customer service refunds, and fake online stores. Fake purchasing fraud, refund fraud, low-priced shopping fraud, false love delivery, praise fraud and other types. The characteristics of inducement attract users to cheat with all kinds of attractive winning information, rewards and high salaries. Winning fraud types, high-paying recruitment fraud, heavy money to buy children fraud, QR code fraud, etc. Fictional features commit fraud by fabricating all kinds of breaking news that scares users. Types of fictional car accident fraud, fictional kidnapping fraud, fictional surgery fraud and fictional distress fraud. The characteristics of daily consumption are aimed at all kinds of payments and consumption in daily life. The types of fraud are SMS fraud, telephone arrears fraud, TV arrears fraud, shopping tax rebate fraud and so on. Phishing Trojan virus is characterized by stealing user account passwords and other privacy through disguised websites, such as banks and e-commerce. Pseudo base station fraud, phishing website fraud and other types. Other new illegal school newsletter short message link fraud criminals send fraudulent short messages with links in the name of "school newsletter". Once they click on the link to enter, the mobile phone will be implanted with a Trojan horse program and there is a risk that the bank card will be stolen. The criminals who copied the mobile phone card sent a mass message, claiming that they could copy the mobile phone card and monitor the phone call information. Many people take the initiative to contact the suspect because of personal needs, and then they are defrauded by the other party in the name of buying duplicate cards and prepayments. Fictitious sexual service fraud criminals leave their phone numbers and provide sexual services online. After the victim contacted them, he said that he had to pay money before he could provide services at home. The victim found that he was cheated after calling the designated account. WIFI criminals in public places set up free WiFi fishing. When these free networks are connected, hackers can steal all kinds of information in the mobile phone and extort money from the owner by transmitting traffic data. How to recover money from telecom fraud? When freezing money through telephone banking, call the customer service phone of the bank to which the fraudulent account belongs, enter the fraudulent account according to the voice prompt, and then repeatedly enter the wrong password for three times to freeze the fraudulent account until 24: 00 on the same day. If the payment is frozen through online banking, you can log on to the website of the bank where the fraudulent account belongs, enter the "online banking" interface, enter the fraudulent account, and then repeatedly enter the wrong password for three times to freeze the fraudulent account until 24: 00 that day. If it is an inter-bank transfer, you can go directly to the business hall of the transfer bank and ask for an emergency interception of the transfer funds. 5 1 Dongshibian Xiao reminds: Because the customer service operation process takes too long, the success rate of stopping payment is low. The police suggest calling customer service to stop payment and calling the police at the same time, so that the police can stop payment urgently through the operation of the telecom fraud investigation platform of the Ministry of Public Security.
How to judge telecom fraud? The minimum sentence of telecom fraud is fixed-term imprisonment of less than three years, and the maximum sentence is life imprisonment. According to the criminal law, whoever swindles public or private property in a relatively large amount shall be sentenced to fixed-term imprisonment of not more than three years, criminal detention or public surveillance, and shall also or only be fined.
Precautions to prevent telecom fraud: pay attention to avoid the disclosure of personal data. Try not to operate unfamiliar financial services on ATM machines, and handle them directly at the counter. Don't believe lies such as "bank accounts involve crimes". Don't trust strange phone calls and text messages. When you receive a phone call or text message suspected of fraud, you should pay attention to verifying the identity of the other party. Especially when the other party requests remittance to the designated account, don't remit money easily. You should inform your family as soon as possible to discuss the solution or consult the public security organ. Don't covet small profits. Don't be tempted by criminals or illegal text messages because you are greedy for small profits. Don't disclose your identity information, deposits, bank cards, etc. under any circumstances. Give it to each other. It is illegal to refuse to lend identity documents, rent bank accounts and lend bank cards and accounts. At the same time, criminals may be allowed to engage in illegal activities in your name, resulting in personal credit damage and personal information disclosure. Avoid posting sensitive information on the Internet. Posting information on social platforms may inadvertently "sun" air tickets, passports, etc. , thereby revealing identity information, or using the Location function to disclose location information. If you don't throw away the express bill, express bill, train ticket, withdrawal bill, credit card statement and other bills at will, there will often be information such as name, mobile phone number and consumption record. It is easy to lead to information leakage. Recommended reading 0 1 What should I do if I am cheated online? The top ten common online fraud methods are revealed to teach you to easily prevent online fraud. From WeChat Tea Girl to Joe on the live broadcast platform, it is not uncommon to use mobile phones and the Internet for various types of online fraud. ...
What are the common ways of mobile phone fraud? Tell your family quickly. In real life, many people will encounter mobile phone fraud. For example, if you meet a stranger in the street and borrow your mobile phone, it is likely that criminals will hold your hand. ...
What are the common online fraud methods? How to protect personal privacy in the network age? With the rapid development of the Internet and the industry, some criminals use mobile phones and the Internet for various types of fraud. ...
How to recover money from online part-time fraud? Many people who have free time will use the internet to do part-time jobs to earn extra money, but there are also many lawless elements, so they use the internet to enter. ...
- Related articles
- Sapphire wedding blessing information
- I received a small win card loan for no reason today. The account was registered successfully, and then you received that you have entered the fast application channel. Please complete the information
- How to check the performance of the stock?
- 22 April Fool's Day Red Packet Blessing
- Alibaba Cloud Cloud Platform Automatic Alarm SMS
- English love information
- Pretend you are a real man. Chinese translation of Alex G.
- Is the cloud chain message sent by a real person?
- Why is my mobile phone suspended by SMS?
- How does Huawei's mobile phone airdrop photos in the air?