Prevention of telecommunications fraud
Telecom fraud is a new type of intelligent fraud crime. Different from
traditional face-to-face fraud, an important feature of telecom fraud is non-
contact. In the whole process of committing crimes, criminals do not have direct
contact with the victim, and there is no traditional crime scene. The method is
concealed and socially harmful. Through the analysis of telecom fraud cases
detected by public security organs, several methods and prevention methods of
telecom fraud are listed to prevent more people from being deceived:
First, use similar websites for online shopping. Fraud. Some people are too
lazy to enter the URL, so they search the websites they need in the search engine.
It is possible to enter a phishing website set up by criminals in advance, such as:
WWW.TAOBA0.COM . If you don't carefully observe, it is difficult to find the input.
The difference between the letter "O" and the number "0" of the URL is sometimes
entered into the website of the horse because of such carelessness, so that the
criminals can take advantage of it.
Second, when shopping online, you should look for a large, regular, trustworthy
shopping site. Don't easily believe that cheap items such as mobile phones,
computers, airline tickets, etc., especially those that are of high value but are
sold at very low prices, are basically tricking you into logging into their
websites, or after you send money, one step. Steps to lure you to continue to send
money and scam. Winning information fraud. The suspect used the psychology of the
speculator to get rich, and sent false winning information through the media, text
messages, telephone calls, scratch cards, letters and other media, and then
defrauded the money on the grounds of collecting fees, deposits, postage, taxes and
fees.
Third, mobile phone text messages for fraud, and now often receive text
messages of mobile phone numbers that you do not know. Such as: eavesdropping on
the other party's phone, selling used cars cheaply, and even pretending to be a
bank or your relatives and friends to send you money. In this case, the ultimate
goal of criminals is to let you believe them and send them money. The easy way is
to contact your friends and family to verify the situation.
Fourth, regular use of computers and viruses to detect and kill Trojans. Criminals
use the virus to obtain the user's passwords such as chat tools, website login
passwords, scams for people you are familiar with, and may intercept your video
footage, use your videos to video with your family and friends, deceive them to
send money, or Steal your QQ number and scam friends in QQ. For such fraud cases,
don't believe it easily, get in touch with your family and friends, and then decide
how to operate.
5. Pretending to be a fraud of a staff member of a state agency. Criminals use
cyber-telephone arbitrary display technology to pretend to be fraudulent by state
agency staff. Criminals use various methods to pretend to be special identities
such as police, Ministry of Education staff, procuratorates, courts, etc., using
fraudulent use of funds such as the Ministry of Education�s refund of education
funds, bank card accounts, or insecurity. In this case, we must contact the public
security organs in the jurisdiction, and we must not be convinced of their
rhetoric. It is absolutely impossible for the staff of the state organs to let you
transfer the money to a bank account.
6. Copy bank card fraud. ATMs should pay attention to blocking passwords when
withdrawing money. Criminals sometimes use special equipment to read magnetic card
information, and use a secretly installed surveillance camera to record the
password you entered, and then steal the cash from the card through the copied bank
card. .
Seven, defrauding phone bill fraud. Sometimes, when you receive a phone call
that you don't know, the criminals only make a loud call by dialing a "one-click"
call (a strange phone that hangs up quickly). Or send a text message "Your friend
13��������� to order a XX song for you to express his thoughts and wishes. Please
call 9����.� Calling back to the phone may result in high phone bills or
customizing a certain SMS service, resulting in loss of property for mobile phone
users. For this type of phone, don't reply easily.
Eight, "Guess who I am" fraud. The criminals pretend to be the acquaintance of
the victim. On the phone, let the victim guess who he is. When the victim reports
the name of an acquaintance, he will admit it, then lie that he will visit the
victim in the near future and then seek scams.
Nine, "swipe card consumption" fraud. The criminals reminded the mobile phone
user through SMS, saying that the user's bank card has just spent a certain amount
of money on a certain card. If the user has any questions, he can call the XXXX
number to consult and provide the relevant telephone number transfer service. After
the user calls back, his associates are fraudulent in the name of the Counterfeit
Bank Customer Service Center and the Financial Crime Investigation Section of the
Public Security Bureau (Procuratorate).
Ten, "remit money to save emergency" fraud. After the criminals have mastered
the information of the victim's family members through online chat, telephone
dating, and close-up, they first deceive the victim's mobile phone by repeated
harassment or other means, and use the victim's mobile phone to shut down the
victim during the shutdown period. The family members called and lied that the
hospitalized person or the car accident was being rescued. He even lied that he was
kidnapped and asked for money to be sent to the designated account for emergency.
The prevention method of telecom fraud: not being confused, acting cautiously,
not greedy for small profits, not convinced of inexplicable information, in
addition to public security organs to take further effective measures to
effectively prevent and control fraud cases, the masses must also continue to
improve Self-defense awareness.
Judging from the cases of telecommunications fraud cases that have occurred,
the majority of the victims are middle-aged and elderly, and there are many high-
level intellectuals and white-collar workers with high academic qualifications and
lack of social experience. The scammers often catch people's psychology of avoiding
harm, being honest and kind. To this end, the police prompt: When answering a call
from a "classmate", "friend", "relative" or a department staff, you must first
verify and then take action; pay attention to the source of the received text
message, involving funds transfer It is best to contact the payee first, and then
implement online transfer after further confirmation; do not easily disclose
personal and family information; especially remind students and friends who lack
social experience, and more parents and other After making friends and friends,
make decisions and don't be arrogant.
Despite the endless stream of scams, especially the telecommunication fraud,
the scams are constantly changing, but as long as people do not panic, act
cautiously, do not covet small profits, and do not believe in all kinds of
inexplicable information, they can effectively avoid Their property has been
illegally infringed.
sponsor link