Joke Collection Website - Blessing messages - How to establish safety awareness
How to establish safety awareness
(2) using SMS fraud. The suspect sent a short message, which read "Your mobile phone number won the prize, please contact a certain number". When the main telephone contacts the criminal suspect, the criminal suspect often asks the victim to deposit a certain amount of cash in the designated account on the grounds of paying notarization fees and taxes in advance. When the victim saves money and asks for a refund of the bonus, the suspect often asks the victim to save money under other excuses. When the victim found out, the money had been deposited in the criminal's account and it was difficult to recover it. A classmate of a university suddenly received a short message on his mobile phone: Congratulations on winning the lottery with your mobile phone number. The prize is a notebook computer worth 20,000 yuan. Please come to our company to collect it before a certain day or contact us by phone. The students believed it and did it according to the content of the message. As a result, the money was "empty" and the other party cheated him of 8000 yuan in cash. (3) fraudulent use of identity. One day in June 5438+February 2003, a group of criminals fled to a university and found a girl who was going back to the dormitory. She pretended to be a student of a department of Peking University. When she came to Chongqing for a socio-economic survey, she was separated from the teacher who led the team. Now she is penniless and used this as an excuse to borrow money from the girl. In order to gain the trust of the deceived, he also took the initiative to show the forged student ID card, ID card, mailing address and mobile phone number to the girl, and promised that the girl would return the borrowed money as soon as she returned to school, pretending to record the girl's address in detail. The girl believed it, so she took out all her living expenses of 3000 yuan for a semester from the bank and lent them to these students of Peking University. After more than 20 days, she didn't see the other party, only to know that she had been cheated. (4) fraud. The criminal suspect used the relatives, friends and close friends of the victim to trick the victim into sending money to the designated account for the purpose of fraud. Or on the premise of knowing the victim's family information in advance, the criminal suspect forced the victim to turn off the phone by frequently making harassing calls, and then the criminal suspect lured the victim to remit money to the designated account on the grounds that his relatives and friends and close friends had an accident in the field, were seriously ill, were unable to speak in a coma, and had their wallets stolen. On August 27th, 2004, Chen Mou, a college student, received a phone call saying that her mobile phone was connected to someone else's mobile phone and needed to be turned off for three hours. Chen shuts down immediately. At 0: 40 in the morning/kloc-0, Chen Mou received a phone call from her mother, telling her that a person who claimed to be the head of the department called home and said that Chen Mou was in urgent need of 90,000 yuan for hospital rescue in case of a car accident. Chen Mou's mother couldn't call her children at that time, that is, she wired 9 yuan money according to the bank account she provided. After learning that she was cheated, Chen Mou's mother immediately reported the case to the local police, but it was too late. The suspect has withdrawn 90,000 yuan from the bank. (5) Bank card fraud. Under the cover of the student status of a foreign university, he lied that there was something wrong with the magnetic stripe of the bank card, and wanted to borrow his classmate's bank card to let his "family" remit money. He called his "family" or "friend" with his classmate's mobile phone (usually, he asked his classmate to take out his mobile phone card, and the fraudster used the prepared mobile phone card), so that the deceived classmate could read his bank card number to the fraudster's "family" or "friend" to defraud the card number. Then let the deceived students remember the password of the bank card when inquiring about the balance on the card, or learn the birthday of the deceived students and the information that may be used as the password through conversation, and then exchange the bank card of the deceived students with other cards and take away the money on the classmate card. (6) online shopping fraud. On June 5438+ 10, 2007, a college student saw on the Internet that the mobile phone auctioned by a company's website was obviously lower than the price of similar products in the market, so he contacted the company and immediately remitted it to 1500 yuan according to the account provided by contact Wang of the company. The next day, the other party called him and said that he had accidentally misremembered the price of his mobile phone and asked him to remit it from 350 yuan again. This classmate believed it and started to remit money from 350 yuan. The other party promised that they had sent the express mail and would arrive in three days. Who knows, this classmate didn't see the shadow of the mobile phone until now, until the other party's mobile phone could no longer be connected, and he realized that he had been cheated. (7) Online dating was cheated. In 2004, a girl from a school met a man on the Internet and became familiar with him after several meetings. One day, the man said that today was his birthday, so he invited the girl to his residence (renting a house) to spend the birthday with his two friends. They went to the market to buy chicken, duck and fish, and went home to cook their own birthday meals. One of the young people bought some wine and drinks. At dinner, three men drink white wine and beer, and girls drink coke. The girl felt something was wrong just after drinking a few mouthfuls, and soon she was confused. Three men helped her to bed to rest. When the girl woke up, it was already dark. The three men disappeared and they were naked. In their panic, they found themselves violated and were at a loss. Later, accompanied by classmates, they called the police. After a week's investigation by the police and the school, the criminals who used the internet to commit crimes were arrested. (8) Part-time deception: In June 2007, Chen Mou, a senior student of a university, saw the information of a "XX network marketing company" recruiting part-time jobs on the part-time website of a university student, went to the company for an interview according to the online address, and successfully became a salesman of the company. Sales varieties are "forest campus" e cartoon, gold card, silver card and diamond. Soon, the student sold more than 30 membership cards among the freshmen in our college. Three months later, the student who handled the card found himself cheated, reported it to the security office and helped the security office find Chen Mou, a classmate who sold the card. Through investigation, Chen Mou said: I gave all my money to the company, and now the person in charge of the company has been unable to contact, and has not been paid, so I have been cheated. (9) The money is not lost, and the fraud is shared equally: criminals generally form fraud partners with more than three people. They carefully planned in advance and chose to find targets in places such as banks, post offices or hospitals where people are easy to carry a lot of cash. Liars generally choose middle-aged and elderly people, and most of them are women. First, they monitor people who deposit and withdraw a lot of cash in the bank, and then follow them to the roadside or near the bus station or set a trap on a quiet road. Generally speaking, the whole fraud process is divided into six steps: namely, "drop, pick up, divide, entangle, adjust and slip". Specific description: Suspect A "drops money" before finding the crime target in advance, and suspect B "picks up money". Suspect b showed the victim a thick stack of banknotes, most of which were neatly cut paper, counterfeit money or mingbi, except for two real money on the front and back. Liars will say that they just found it, and use "half meeting" as bait to trick the victim into going to a remote place to "share money" with him. When dividing the money, the suspect A came to ask who found the money, and then insisted that the victim found the money and made an "unreasonable entanglement". The theory that victims are forced to withdraw their deposits or are found is difficult to explain at present. At this point, when the criminal suspect C appeared as a "middleman or witness" and mediated from it, C took advantage of the chaos to switch the victim's money and then fled with his accomplices. In the course of the dispute, once the deception was discovered by the victim, the victim was not fooled, so the gang simply rummaged through the bag, thus taking the opportunity to grab money, and even more directly grabbed the bag. Some criminals also wrapped several hundred-dollar bills in white paper, tied them into a bundle, deliberately put them in a conspicuous place for you to find, and then offered to divide the money on the grounds that "everyone has a share". The "paper money" you found belongs to you, while your cash and jewelry belong to criminals. In addition to dividing the money, criminals will also defraud the parties by mortgage, winning prizes and promising high interest returns. (65438+ 2 is to set up recruitment points in the name of well-known enterprises for fraud. Once the victim pays the registration fee and deposit, the liar disappears; Third, young women eager to find jobs are waiting for opportunities to cheat money and cheat color. (1 1) Goods-borrowing fraud: Criminals take advantage of friends, classmates and other identities to befriend the victim, then warmly invite the victim to eat, drink or entertain, and propose to borrow mobile phones, vehicles and other things for emergency when they meet, or borrow money with forged house ownership certificates as collateral, and never return. Most of these swindlers are one person, and they often choose taxi drivers, netizens, soldiers and students to cheat. Some scammers said that his mobile phone was dead or forgot to bring it, so you could borrow it to answer the phone. When you lent it to him out of kindness, he left under the pretext that it was inconvenient to talk in front of you and there was no signal in the room, disappeared from your sight and never came back. (12) Other frauds: In April 2009, criminals pretended to be bank staff and went to a university to inquire about the financial situation of students on the grounds of investigating the holding and use of students' bank cards. After learning that students have not used bank cards for a long time, it is suggested that students cancel unused bank cards and ask students to fill out a questionnaire (name, home address, parents' name, telephone number, bank, password, etc.). ). After filling out the form, he lied that he voluntarily cancelled the account for the convenience of the students. 1 The account opening fee for the card can be refunded. 10 yuan. Many students have no doubt at all and give their bank cards to each other 10 yuan in cash. After taking away the student's bank card, the criminals pretended to be a student counselor and called the parents of the students, falsely claiming that the students were in urgent need of money during school or in a car accident, and asked the parents to deposit the money into their children's bank card in time for fraud. This kind of deception happened frequently in neighboring universities last semester. Precautionary measures: if personnel are found to conduct various investigations, sales promotion, sales agency, part-time recruitment, etc. For the students in the college, we must not trust them easily and report to the security department in time. 2. Ways to prevent being deceived (1) Don't listen to the sweet words of strangers; (2) Don't tell strangers your bank card number, name and personal information at will. In general, it is best not to lend your communication tools to strangers. (3) Don't tell anyone (especially strangers) your home phone number, mobile phone number or other contact information at will; (4) Don't leave your detailed contact information and personal basic information on the Internet easily to prevent theft; (5) In order to gain your trust, the other party will provide some forged documents (ID card, student ID card, etc.). ). At this time, you should carefully distinguish their authenticity and prevent being deceived; (6) Don't believe the "winning" information sent by mobile phones. The best way is to ignore it. (7) There is no pie in the sky, and your family refuses to sell it! Don't buy things sold at home easily, such as pens, notebooks, photo albums, pens, cosmetics, shampoo, sports shoes, or notebook computers and other stationery. It is very likely to cheat by means of fake and inferior products or shortage of quantity. (8) Online shopping to see if it is officially registered. Check the contact information they left. Generally, they cheat in violation of regulations, and they will leave a way out for themselves. The contact address is either fake or vague, and the contact numbers are mostly mobile phones and mobile PHS. Can you trust the credibility of a businessman who doesn't even dare to give you a fixed place and a fixed telephone? If it is an individual business, check whether there is any restraint mechanism (such as Alipay adopted by Taobao), because the industrial and commercial departments have little restraint on individual business behavior. Check whether there is any bad record. A formal enterprise should be able to search a lot of relevant information on the Internet. Including introduction, news, etc. , and the information of the complaints investigated. When you open a shop in Taobao or Yi Bei, you will get a credit evaluation. Look carefully at the evaluation of customers who have already made a deal. Check whether there is a price trap, and the temptation of interest is always the beginning of being cheated. Reasonable profit is the basis of the seller's survival. If the quotation is much lower than the ordinary quotation, or even half price, it must be a trap. Any customs detains goods, parallel imports, customs clearance goods, etc. It is impossible to have such a low price. If you don't believe me, you can visit more regular shops. (9) it is indispensable to prevent people. You can treat your netizens sincerely, but you should still be vigilant. The network is also the epitome of the real world. Pay attention to protect yourself online! Even on the beautiful grassland, there will be wandering wolves. Be wary of people you don't know very well, especially when they borrow things. Never let property leave your sight, and be more careful when lending valuables. (10) Be careful when doing part-time jobs. Students do part-time jobs as far as possible through the organization to the talent market, college students meet with supply and demand, which is the main channel. Carefully verify the legal procedures, reputation and projects of those units that recruit part-time employees, especially online marketing companies, and don't rush to seek the truth. (1 1) If you want to find a job, you should go to a legal and formal labor agency market. Never listen to small advertisements in the street. The so-called "high-paying recruitment" advertisement is not only illegal, but also full of scams. Do not believe! These swindlers don't ask you to pay a lot of money every time they speak, but all kinds of fabricated reasons are really true, which not only deceive rural job seekers and laborers, but also make residents who are not alert fall for it. If the victim is alert early, the loss can be reduced; If you wake up late, you may be cheated of everything. For some intermediaries that are not inspired by industrial and commercial registration, don't pay the registration fee and mortgage easily, because it is likely that people will go to the building. Therefore, residents must go to regular employment agencies to find jobs and stay away from street advertisements. Fourth, how to prevent violent injury and financial infringement cases? 1, to guard against our own crimes, we should all be alert to five kinds of psychology: (1) curiosity. Curiosity is the nature of minors. However, due to our shallow social experience and poor ability to judge right and wrong, in the absence of benign induction, it is easy to follow one's inclinations and go astray. The main types of crimes caused by curiosity are: drug abuse, pornography, violence, cyber crime and so on. (2) rebellious psychology. Physiologically speaking, minors are in a period of strong rebellious psychology. There are three main factors that can easily induce rebellious psychology: first, parents' improper education is too strict, too doting or the education method is simple and rude, which makes children unbearable; Second, parents are eager for their children to have a successful career, which leads to children's resistance because of the pressure of study; Third, the school excessively pursues the enrollment rate, only pays attention to the education of top students, and it is easy for students with poor grades to give up on themselves, resulting in the psychology of breaking the jar. In this case, parents and schools should examine their own educational methods; But as minors, we should have a correct understanding of the requirements of parents and schools. Everyone knows what it means to dream long. But have you ever thought about being a dragon from the standpoint of your parents? Ma Jiajue understood "Poor Descendants of the Wind" before his execution, but it was too late. So I suggest that when students lie in bed at night, they might as well think about their parents' difficulties. (3) blind obedience psychology. This is mainly manifested in some * * * joint crimes, and some minors are completely instigated, induced and coerced by the principal offender, blindly obeying and unconsciously participating in the crime. There are also some minors who blindly imitate the forms of gang activities in martial arts novels and movies and gang up to commit criminal activities. I've said this before, so I won't say it again. (4) Comparative psychology. Some minors covet vanity, pay attention to food and clothing, covet leisure and hate labor, which has become one of the important reasons for juvenile property crimes such as theft, robbery and extortion. (5) Revenge psychology. Minors have unstable mentality, weak control and strong revenge, and can't bear some grievances. When they encounter some things, they are prone to jealousy and revenge, which makes their behavior beyond the scope of law and morality. The case of Ma Jiajue fully proves this point. Old people always say to us, "To lose is to take advantage. What can I do if I lose? " I understand this sentence as two meanings. On the one hand, this sentence tells us to learn to be tolerant. On the other hand, this sentence also warns us not to haggle over losses, but to think about revenge. The final result of revenge is often both sides lose. Therefore, we should learn to be tolerant. Having suffered a loss once, we keep the lesson in mind and won't suffer the same loss again. By doing this, we have learned experience, and the loss has become an advantage. In addition, correctly understand the network, the computer is a tool, not a toy. Network is the most advanced modern tool, but also the most chaotic carrier. The court of Conghua City, Guangdong Province made a statistical analysis of juvenile delinquency cases tried in our hospital from June to May, 2008. It was found that within four months, the court concluded 2/kloc-0 cases involving 30 people, of which 15 cases involved 22 people, accounting for 7 1.4% of the total cases and 73.4% of the people involved. Internet has become the main factor inducing juvenile delinquency. 2. How to protect yourself when you encounter illegal crimes on your way to and from school (1)? You'd better go with your classmates. When traveling, you must tell your parents, teachers or people around you who you are with, where you are going and what you are doing. Remember, don't walk alone in a dark, remote and desolate place. When you walk at night, you must hold your head high. Even if you are afraid, you should be full of energy, so that those who try to attack you are discouraged. When you find someone following you all the time, you don't have to be afraid. You can go to busy streets, shopping malls and other places as soon as possible and try to get rid of the stalkers. You can also run to a crowded place nearby and call the police for help. If you are at the school gate, call home and let an adult pick you up. The key is to be alert and think more when you are alone. Walk as little as possible in remote areas at night, go hand in hand, walk on roads with many people and big street lights, and don't go to sparsely populated and remote places, sheltered from rain and dark places, deep forests and grass. Don't rest in parks and green belts at night, let alone go to dimly lit and remote places; Don't go in or out of electronic game rooms, Internet cafes, billiards rooms, video projection rooms, dance halls and other places. (2) If you receive an anonymous letter or phone call, there is absolutely no need to panic. Otherwise, it is precisely the other party's deception and the other party's plan. You should calm down and think about it. Who might be the caller? What is the reason? Think again, who had any conflicts with before or recently, who was rejected because of his own request, or who was offended intentionally or unintentionally. After analysis, we can at least judge the caller in a relatively narrow circle and know fairly well. When you have difficulty in analyzing these things yourself, you should inform your parents, teachers or classmates in time so that everyone can analyze them together. Don't waste too much time and energy by meditating alone. You can also report the case to the police station through the school, and the judicial department will trace and deal with those anonymous letters and telephone calls that are often serious. Remember, even if you can't find out who the anonymous person really is, you should be optimistic and don't be depressed. (3) In case of robbery, you should take protecting your own life safety as the first principle, and don't care too much about property. Don't fight recklessly unless you have to, so as not to cause greater losses. Call for help at critical times and call the police in time. When calling the police, it is necessary to concisely and accurately report the location, time, number of bad guys, case and other contents of the case to the public security department, so that the public security department can send personnel to deal with it in time and leave a contact number. If you are in danger of meeting bad people, call 1 10, pay attention to concealment and speak quietly. Of course, calling the police is a major event related to public security management. Don't make random phone calls or make jokes about this. Usually, a bag should be slung over your shoulder. Don't leave it on the side of the road to prevent bad guys from robbing you. The key to the house should be placed in a place where it is not easy to be found, nor in a schoolbag or satchel. Even if you are robbed, you can still enter the house. (4) Be cautious when dealing with people. Don't make friends with "gangsters" who don't have proper jobs, idle around and make trouble everywhere. Don't expect these people to act as umbrellas and "big brothers". Careless friends will get you into the abyss of sin. Don't be alone with single adults, don't go into strangers' rooms, and don't accept small gifts or drinks, food, etc. From strangers. Be especially wary of those who often exaggerate your beauty, flatter your ability, pester you with everything, or be vulgar in words and deeds. When walking on the road, you should also be wary of strangers. If someone gets off and asks for directions, you should keep a certain distance from him and then answer. Never ride with strangers. When riding, get as close as possible to the driver and conductor. Students, the law is a double-edged sword. It will protect us and punish us when we go off track. What I want to talk to you today is to improve legal awareness and prevent crimes, not because you want to commit crimes in the future, but to remind you how to avoid legal disputes and avoid being punished by law because of our negligence and mistakes. The more students should grasp their own life trajectory. Finally, I hope that my explanation today will help to improve everyone's legal awareness.
- Previous article:What's wrong with the vivo phone not sending information?
- Next article:On his wife's birthday congratulations
- Related articles
- Where is the Shanghai epidemic?
- How to deal with the simple and practical tutorial of cat plane consignment? Look here!
- Telephone number of epidemic prevention stations in all districts of Shijiazhuang
- Where is the backup and recovery of vivo mobile phone?
- How does Apple set up SMS?
- Would you be angry if you send a text message to a friend and the other party doesnĄ¯t reply promptly?
- The ringtone of Xiaomi's mobile phone suddenly becomes smaller. Is the volume turned up or down? What happened?
- The last message sent by a man, the words of concern, and the last message sent to you.
- Can qq chat records be evidence of cheating?
- The credit for redemption in the dark