New iterations of new mobile communications and Internet technologies such as big data, artificial intelligence, and webcasting are the objective background for the high incidence of telecom fraud cases, but there are many other reasons besides this.
Based on trial practice, we have summarized the reasons for the high incidence of telecom fraud cases, which mainly include five aspects:
1. A large amount of personal information has been leaked or even bought and sold, becoming an important means for criminals to screen potential fraud targets;
2. Some local industrial and commercial registration authorities and banking institutions do not strictly control applications for company registration and bank account opening;
3. The development of Internet technology has also made it difficult to investigate and combat online telecommunications fraud;
4. Criminals rely on technical means and have strong anti-investigation capabilities;
5. Victims are prone to fall into traps carefully designed by criminals due to their own greed, poor psychological endurance, poor identification skills and other weaknesses.
Combining the above crime characteristics, causes and trial experience, this article summarizes the following countermeasures and suggestions to prevent telecommunications network fraud crimes. Let’s take a look at this “Anti-Fraud Guide”!
Keep these anti-fraud tips in mind and don’t let scammers take advantage of you!
1. Keep personal information properly
The leakage and trafficking of personal information have become an important part of the black industry chain of fraud crimes. Since many telecommunications network fraud methods require obtaining the victim's private information as a prerequisite and necessary step, ordinary people must protect their personal information at the first level and prevent privacy leakage from the source. This is crucial to avoid property losses.
Response methods: ① Protect personal identity information. Do not provide important information such as ID number, work unit, home address, position, etc. to strangers unless necessary. Do not save ID photos or numbers on your phone.
② Keep personal account information well. Be careful to verify the authenticity of the domain name before entering important information such as account number, mobile phone number, payment password, etc. on relevant websites. Do not click on suspicious links, do not connect to wireless networks of unknown origin, do not scan QR codes obtained through informal channels, and beware of phishing traps. .
2. Never sell bank cards or mobile phone cards. Never think that it is not a crime if you are not directly involved in fraud. If you know that others are using information networks to commit fraud, but still sell bank cards and mobile phone cards to provide convenience to others, you are suspected of constituting an illegal crime, and if the circumstances are serious, you will be held criminally responsible.
Countermeasures: The general public should remain vigilant, do not trust others, do not seek small profits, and never sell, transfer, rent, sublet, lend or purchase bank cards or payment accounts (WeChat, Alipay, etc.) to avoid providing " Tools of crime." Otherwise, all non-counter business of bank accounts and payment accounts will be suspended within 5 years. It will also leave a stain on personal credit report and affect loan processing and other services.
3. Improve financial security awareness. Victims’ lack of financial knowledge or weak risk awareness is the direct reason why most telecommunications network frauds ultimately succeed. Therefore, improving the awareness of financial products and services and the ability to protect themselves is the core of the public’s prevention of fraud and loss. Countermeasures.
Response methods: ① Pay close attention to media reports and fraud cases exposed on the Internet, understand the recent modus operandi, and remind family and friends to be more vigilant.
② You should carefully read and keep in mind the safety reminder information pushed by telecom operators through SMS, as well as the risk prevention points released by the public security organs from time to time through websites and public accounts.
Although telecom network fraud is pervasive and difficult to distinguish between true and false, as long as the public remains vigilant, develops good payment habits, and controls the last step of external transfers and remittances, capital losses can still be effectively avoided.