Joke Collection Website - Public benefit messages - What information did you learn from the telecom fraud newsletter?

What information did you learn from the telecom fraud newsletter?

Telecom fraud refers to the criminal behavior that criminals fabricate false information and set up scams by telephone, internet, SMS, etc., and implement remote and non-contact fraud on the victims to induce the victims to remit or transfer money to the criminals.

Since 2000, with the rapid development of China's financial and communication industries, the crime of false information fraud has spread rapidly in China. With the help of mobile phones, fixed telephones, internet and modern online banking technology, non-contact fraud crimes have developed rapidly and caused great losses to the people. Telecom fraud originated in Taiwan Province Province, also known as "Taiwan Province-style fraud", which has been prevalent in East Asia and Southeast Asia since 2000 and has gradually spread to Chinese mainland in recent years. With the continuous spread of criminal means, more and more lawless elements in the mainland are also imitating their means to commit crimes. In addition to Fujian, some lawless elements from individual cities and counties in Hunan, Hubei, Guangdong, Hainan and Hebei also joined the fraud team.

Since 2009, telecom fraud cases have been high in some areas of China. This crime is based on the original modus operandi. The perpetrator pretended to be a staff member of the Telecommunications Bureau, the Public Security Bureau and other units, using arbitrary number display software, VoIP and other technologies, and was suspected of an economic crime on the grounds that the victim's telephone arrears had been stolen by others, threatening to confiscate all the bank deposits of the victim and defrauding the victim to transfer money. In 2008 alone, citizens in Beijing, Shanghai, Guangdong, Fujian and other places lost nearly 600 million yuan due to telecom fraud.

Characteristics of crime

First, criminal activities spread widely and developed rapidly. Criminals often take advantage of people's psychology of seeking advantages and avoiding disadvantages, and release false information to the masses by fabricating false telephone calls and text messages. In a very short time, the scope of publication is very wide, and the scope of infringement is very large, so the scope of loss is also very wide.

Second, the information fraud means of telecom fraud has been refurbished very quickly. At first, sending short messages in groups has developed into arbitrary number-displaying software and number-displaying radio stations on the Internet, which has become a highly intelligent fraud means. Deceptions are constantly being refurbished, and the frequency of renovation is high. Sometimes even a month or two will produce new tricks, which are hard to prevent.

Third, gangs commit crimes and have strong anti-investigation ability. Criminal gangs generally adopt long-distance and non-contact fraud. The internal organization of criminal gangs is very strict. They adopt enterprise operation and have a fine division of labor. Some people are responsible for buying mobile phones, opening bank accounts, making phone calls and transferring money. The division of labor is very fine, and the next process does not know the situation of the previous process. This has also brought great difficulties to the public security organs.

Fourth, transnational cross-border crimes are more prominent. Some criminals publish false information in China to deceive overseas personnel, and some often publish short messages abroad to deceive domestic personnel. There are also collusion and chain crimes at home and abroad, which are very hidden and difficult to crack down on.

Infringement group

The groups infringed by telecom fraud have extensive characteristics and are not specific. They cast nets all over the sky and concentrate on calling or texting a certain number or area for a certain period of time. The victims include all social strata, including ordinary people, business owners, civil servants and school teachers. All walks of life may become victims of telecom fraud, which spreads widely and has a bad social impact. The survey shows that women account for more than 70%, and middle-aged and elderly people account for more than 70%, especially middle-aged and elderly women.

Break through the bottleneck

A question that many people are confused about. The swindler left his phone number and account number, so it's not over. In fact, it is far from being as simple as ordinary good people think. Because telecom fraud is very different from traditional crimes, unlike ordinary theft, robbery and murder, there are crime scenes, traces of physical evidence, knives, guns or clues at the scene, while telecom fraud is remote and non-contact. You have never seen a liar cheated. There are indeed fraudulent phone calls and account numbers involved in the cases left to the public security organs, but these phone calls and account numbers have one common feature, they are all fake, and none of them are true. These mobile phone numbers are anonymous. Most of the landline numbers displayed are also network virtual phone. It is supposed that there should be a calling number when making a call, but there are other bundled numbers in the number one and number 400 phones, and even some arbitrary number display software can display false phone numbers, and sometimes even the phone numbers of banks and public security bureaus. In fact, they are all fake, and they are all set manually by criminals. You can cheat the victim and escape the attack of the public security organs. Some even transmit through domestic and overseas service providers and servers.

Bank account numbers and bank cards are also used by criminals to spend in bulk on other people's accounts. Some criminals can even collect hundreds of accounts and sell them to fraud groups. At that time, they will spend tens of dollars to buy a migrant worker's ID card and open one or two hundred bank cards at a time. The public security organ traced the identity card of a migrant worker. In addition, criminals set up multi-level accounts, transfer money quickly through banks, and finally withdraw money from ATMs distributed all over the country.

I often meet criminals, sometimes defrauding two or three million yuan, then transferring to other places in a few minutes, and being swept away quickly. Therefore, the public security organs need to invest a lot of police force and funds to investigate such a case, and need to send a large number of task forces to run around the world, looking for banks everywhere, and looking for communication departments to check the telephone and account numbers with legal procedures everywhere. Any mistake in any link will affect the investigation work. It can be said that solving such cases is far from being as simple as ordinary laymen and people who are not sensible. In fact, the work is very complicated, and it takes a lot of effort to solve such a case.

Anti-fraud consciousness

Numerous fraud cases uncovered by public security organs have the same rule. No matter what rhetoric fraudsters use, no matter how they renovate, they will eventually fall on one point, that is, criminals want the victim's bank card, password and account number. No matter what deception it is, it will eventually fall to this point, because he just wants money. Therefore, we should also remind the netizens and the masses that in their daily work and life, we should never trust phone calls and text messages of unknown origin, and never reveal our identity and bank card information easily. If in doubt, you should call the public security organs in time, even if you ask, understand and verify from your relatives, friends, journalists and more knowledgeable people.

Teach you specific skills to prevent cheating.

The first secret of fraud prevention

First, the telephones of telecommunications, banking and public security systems all have their own platforms. The liar said that it is actually impossible for me to transfer you to the public security bureau and the bank, because they are different systems and platforms, so it is impossible to transfer them directly. Don't trust him.

The second secret of anti-fraud

Telecom fraud Second, no unit has set up such a secure account at present. The so-called security accounts are all set by scammers. So please pay attention.

The third secret of anti-fraud

Third, when the tax department and the financial department refund the tax to consumers, they will make announcements through authoritative departments such as telecommunications and newspapers, and will never call to say that I want to refund your money. These are all lies.