Joke Collection Website - Blessing messages - Will the mobile phone be peeped from a distance (your mobile phone may be remotely controlled)?

Will the mobile phone be peeped from a distance (your mobile phone may be remotely controlled)?

Will the mobile phone be peeped from a distance (your mobile phone may be remotely controlled)?

The mobile phone is remote control, not alarmist! Public Daily Guan Lanjun learned from Shandong Mobile that with the deepening of the crackdown on telecommunication network fraud, the living space of traditional fraud means is getting smaller and smaller, and fraudsters begin to update their means and tools, making telecommunication network fraud more confusing. At present, cat pool devices such as GoIP are widely used by fraudsters for new telecommunication network fraud due to their flexible deployment. One? Cat pond? The device can support multiple telephone numbers to talk at the same time, and support the functions of mass short message, remote control, card machine separation and so on. This is a convenient office equipment, but it has become a criminal? Brush code? Channel. In July of 20021year, the relevant state departments successively issued "? Cats fighting? Special work plan ""? Cats fighting? The Implementation Guide for Basic Telecommunications Enterprises and other documents require telecom operators to carry out special cleaning and rectification work on card cluster equipment such as Cat Pool, GOIP and Duokabao, which are involved in fraud.

According to the deployment of the Ministry of Industry and Information Technology, Shandong Mobile has carried out in-depth activities to crack down on telecommunication network fraud and actively implemented it? Card breaking action 2.0? Hit the cat? And other special actions, equipped with elite forces, under the unified command of provinces and cities to set up anti-fraud classes and? Hit the cat? Special classes, closely cooperate with the anti-fraud special classes of higher-level leading units, discuss governance strategies, share research experience, and cooperate with public security organs to carry out joint strikes. Up to now, Shandong Mobile has established nine anti-fraud identification models covering communication behavior, equipment characteristics, authentication characteristics and network traffic characteristics, and has been continuously optimized and improved in practical applications.

In April, 20021year, Shandong Mobile sent experts to assist the provincial anti-fraud center to carry out a special crackdown in Jining. Through the investigation and study of the equipment seized on the spot, technicians successfully logged into the equipment background and extracted relevant key data on the spot, thus destroying the criminal den in one fell swoop. Within a week, they cooperated with the police to successfully crack 6 dens and arrested the suspect 1 1 person.

On July 10, after checking the early warning clues, it was found that the GoIP equipment of Acropolis and Kuiwen was frequently turned on and off, which was suspected to be stuck. Shandong Mobile technicians report relevant information to the local anti-fraud center in time. According to this clue, on July 12, the public security organs arrested the suspect, seized GoIP equipment 1 set, 3 telephone treasures, and more than 20 mobile phone cards, and arrested his gang through line expansion, and * * * seized 4 Romanbao equipment1set and more than 20 mobile phone cards.

It is reported that since the beginning of this year, Shandong Mobile has assisted the public security organs to destroy 59 Maotang dens such as GOIP, arrested 170 suspects and seized various types of GoIP equipment 1 12, effectively curbing the high incidence of GoIP dens. In addition to doing a good job in Shandong Mobile in the future? Hit the cat? Besides work, will we move on? Card breaking action 2.0? And other work, give full play to the advantages of enterprise information security technology, in-depth study of the characteristics and laws of card cluster equipment, further strengthen pre-prevention, interception and traceability afterwards, actively cooperate with public security organs to crack down on criminal activities, and earnestly safeguard the legitimate interests and property safety of the people.