Joke Collection Website - Public benefit messages - Which department takes the lead in the fight against telecommunication network fraud? * * * There are 5 articles in Chapter 7 of the Anti-Telecommunication Network Fraud Law, including 18 articles in

Which department takes the lead in the fight against telecommunication network fraud? * * * There are 5 articles in Chapter 7 of the Anti-Telecommunication Network Fraud Law, including 18 articles in

Which department takes the lead in the fight against telecommunication network fraud? * * * There are 5 articles in Chapter 7 of the Anti-Telecommunication Network Fraud Law, including 18 articles involving public security organs. < /p > The first chapter General Provisions < /p > Public security organs take the lead in the fight against telecommunication network fraud < /p >, and relevant departments such as finance, telecommunications, network information and market supervision perform supervision according to their duties. (Paragraph 3 of Article 6) < /p > Chapter II Telecommunication Governance < /p > Telecommunication business operators and Internet service providers take technical measures to identify and block illegal devices and software from accessing the network, and report to < /p > public security organs and relevant industry authorities < /p >. < /p > (Paragraph 2 of Article 14) < /p > Chapter III Financial Governance < /p > The People's Bank of China has established a unified anti-money laundering monitoring system across banking financial institutions and non-bank payment institutions, and < /p > together with the public security department of the State Council < /p > has improved the anti-money laundering suspicious transaction reporting system that is suitable for the characteristics of the capital flow of telecommunication network fraud crimes. (Paragraph 2 of Article 18) < /p > The public security department of the State Council shall, jointly with relevant departments, establish and improve the system of immediate inquiry, emergency payment stop, quick freezing, timely unfreezing and return of funds involved in telecommunication network fraud, and clarify relevant conditions, procedures and relief measures. If the public security organ decides to take the above measures according to law, banking financial institutions and non-bank payment institutions shall cooperate. < /p > (Article 2) < /p > Chapter IV Internet Governance < /p > Internet service providers shall < /p > verify the relevant Internet accounts registered with the phone cards involved and the abnormal phone cards involved in fraud according to the requirements of public security organs and telecommunications authorities, and take measures to correct within a time limit, restrict functions, suspend use, close accounts and prohibit re-registration according to the risk situation. (Paragraph 2 of Article 22) < /p > Public security, < /p > telecommunications, internet information and other departments, telecommunications business operators and Internet service providers should strengthen the key monitoring and timely disposal of fraudulent applications downloaded and disseminated by means other than the distribution platform. (Paragraph 3 of Article 23) < /p > If the public security organ obtains evidence in accordance with the law in handling telecommunication network fraud cases, the Internet service provider shall provide technical support and assistance in time. < /p > if an internet service provider discovers clues and risk information about fraud-related crimes when monitoring fraud-related information and activities in accordance with the provisions of this law, it shall < /p > transfer them to public security, finance, telecommunications, internet information and other departments according to the type and degree of fraud-related risks < /p > in accordance with relevant state regulations. The relevant departments shall establish and improve the feedback mechanism, and inform the transfer unit of the relevant information in a timely manner. (Article 26) < /p > Chapter V Comprehensive Measures

8. The public security organs shall establish and improve the working mechanism for combating and controlling telecommunication network fraud, strengthen the construction of specialized teams and professional technology, and all police types and local public security organs shall cooperate closely to effectively punish telecommunication network fraud activities according to law. The public security organ shall file a case for investigation in accordance with the provisions of the Criminal Procedure Law of the People's Republic of China when it receives a report of telecommunication network fraud or discovers telecommunication network fraud. < /p > (Article 27)

9

. When handling telecommunication network fraud cases, the public security organ shall simultaneously verify the sources of personal information used in the crime and investigate the responsibilities of relevant personnel and units according to law. < /p > (Paragraph 2 of Article 29) < /p > No unit or individual may illegally buy, sell, lease or lend telephone cards, Internet of Things cards, telecommunication lines, short message ports, bank accounts, payment accounts, Internet accounts, etc., and may not provide real name verification assistance; It is not allowed to open the above-mentioned cards, accounts, account numbers, etc. by impersonating other people's identities or fictional agency relationships. < /p > Units, individuals and related organizers who commit the acts mentioned in the preceding paragraph, and those who have been criminally punished for engaging in telecommunication network fraud or related crimes, which have been identified by the public security organs at or above the municipal level with districts < /p >, can be recorded in the credit records in accordance with the relevant provisions of the state, and measures such as restricting their functions such as cards, accounts and account numbers, stopping off-counter business, suspending new business, and restricting network access can be taken. If there is any objection to the above identification and measures, a complaint may be filed, and the relevant departments shall establish and improve the complaint channels, credit repair and relief systems. The specific measures shall be formulated by the public security department of the State Council in conjunction with the relevant competent departments. (Article 31) < /p > The public security department of the State Council, < /p > the financial management department, the competent telecommunications department and the national network information department should be responsible for the construction of counter-measures in their own industries, promote the sharing of sample information data related to telecommunication network fraud, strengthen the cross-verification of fraudulent user information, and establish a mechanism for monitoring, identifying, dynamically blocking and disposing of fraudulent abnormal information and activities. (Paragraph 2 of Article 32) < /p > The public security organ shall, jointly with < /p > the departments of finance, telecommunications and network information, organize banking financial institutions, non-bank payment institutions, telecom operators and Internet service providers to establish an early warning and dissuasion system, and take corresponding dissuasion measures in a timely manner for potential victims discovered by early warning. For telecommunication network fraud cases, we should strengthen the recovery of losses, improve the fund disposal system involved, and return the legitimate property of the victims in time. If the victims who have suffered great difficulties in life meet the relevant national conditions for assistance, the relevant parties shall provide assistance in accordance with the regulations. (Article 34) < /p > Upon the decision or approval of the State Council's anti-telecommunication network fraud mechanism, < /p > public security < /p >, finance, telecommunications and other departments may take necessary temporary risk prevention measures in accordance with relevant state regulations in specific areas where telecommunication network fraud activities are serious. (Article 35) < /p > If a person who goes to an area with serious telecommunication network fraud activities is suspected of major telecommunication network fraud activities when leaving the country, the immigration management agency may decide not to allow him to leave the country. For those who have been criminally punished for engaging in telecommunication network fraud, the public security organs at or above the municipal level can decide not to leave the country within six months to three years from the date of completion of punishment according to the crime situation and the need to prevent recidivism, and notify the immigration management agencies to implement it. < /p > (Article 36) < /p > The the State Council Public Security Department < /p > and other foreign departments have strengthened international law enforcement and judicial cooperation, established effective cooperation mechanisms with relevant countries, regions and international organizations, and enhanced the level of cooperation in information exchange, investigation and evidence collection, investigation and arrest, recovery and loss recovery through international police cooperation, so as to effectively combat and curb cross-border telecommunication network fraud activities. (Article 37) < /p > Chapter VI Legal Liability < /p > Whoever organizes, plans, implements, participates in or provides assistance to telecommunication network fraud activities, which constitutes a crime, shall be investigated for criminal responsibility according to law. < /p > If the acts mentioned in the preceding paragraph do not constitute a crime, the public security organ shall detain them for more than 1 days and less than 15 days; If the illegal income is confiscated, a fine of not less than one time but not more than ten times shall be imposed. If there is no illegal income or the illegal income is less than 1, yuan, a fine of not more than 1, yuan shall be imposed. < /p > (Article 38) < /p > Those who violate the provisions of Article 14 and Article 25, paragraph 1 of this Law, < /p > If the illegal income is confiscated, the public security organ or the relevant competent department shall impose a fine of not less than one time but not more than ten times the illegal income, and if there is no illegal income or the illegal income is less than 5, yuan, a fine of not more than 5, yuan shall be imposed; If the circumstances are serious, the public security organ shall impose a detention of not more than fifteen days. < /p > (Article 42) < /p > Article 14, paragraph 1 No unit or individual may illegally manufacture, trade, provide or use the following equipment and software: < /p > (1) Telephone cards are inserted into equipment in batches; < /p > (2) Equipment and software with the functions of changing calling number, virtual dialing, illegal Internet telephone access to public telecommunication network, etc. < /p > (3) Automatic batch account number and network address switching system, which receives platforms for SMS verification and voice verification in batches;

(

4) Other equipment and software used to commit telecommunication network fraud and other illegal crimes. < /p > Article 25, paragraph 1, No unit or individual may provide the following support or assistance for others to commit telecommunication network fraud: < /p > (1) Selling or providing personal information; < /p > (2) helping others to launder money through virtual currency transactions; < /p > (3) Other acts of providing support or assistance for telecommunication network fraud. < /p > In case of violation of the provisions of the first paragraph of Article 31 of this Law, < /p > the illegal income shall be confiscated, and the public security organ shall impose a fine of not less than one time but not more than ten times the illegal income; if there is no illegal income or the illegal income is less than 2, yuan, a fine of not more than 2, yuan shall be imposed; If the circumstances are serious, he shall be detained for not more than fifteen days. < /p > (Article 44) < /p > Paragraph 1 of Article 31 No unit or individual may illegally buy, sell, lease or lend telephone cards, Internet of Things cards, telecommunication lines, short message ports, bank accounts, payment accounts, Internet accounts, etc., and may not provide real name verification assistance; It is not allowed to open the above-mentioned cards, accounts, account numbers, etc. by impersonating other people's identities or fictional agency relationships.