The whole people are fighting against fraud Why is the wire fraud case so difficult to solve?

Mondo Social Updated on 2024-01-30

Why is there a transfer record after being defrauded, but the police just can't find clues?

Hello, I was defrauded by the telecom network, can I chase the police case?

I've been cheated out of money, can I recover it?

**These messages are received almost every day in the background"Why did I provide a ** bank card,**, information,You just can't catch someone?”

Many people think that telecom network fraud is** to cheat me out of money, I call the police, as long as the police lock the IP according to the remittance account, in fact, you can trace the identity and address of **, and arrest people at the door, but it is not so simpleActuallyThe address is fakeThe identity information is fake, the IP is fakeIt's real to cheat you out of your money

Why is telecom network fraud so difficult to break?The main reasons are:Most of the wire fraud remittance terminals are overseasFrom the perspective of geographical factors, it is very difficult to recover stolen goods or arrest suspects.

provided**number, bank card information, why can't I catch **

There is a big difference between telecom network fraud and traditional crimesTelecom network scams are remote, contactless, and functionalThe ** and bank card information provided by the victim to the public security organ have a common feature: the owner or card owner is not ** himself.

And then there'sIP positioning is difficult, many ** are overseas, and in order to avoid risks, they buy a large amount of identity information online. In the eyes of the masses, real-name system is identification, but in the eyes of fraudsters, real-name system has become one of the best means to avoid risks, because the owner of these identities has nothing to do with fraudsters.

Finally, in the case of wire fraud, the most difficult to break through is actuallyCamouflage at the technical level。Fake advertising information is basically the use of pseudo base stations. A laptop, a piece of software, and a transmitter can send edited text messages to mobile phone users, including links to telecom network fraud. Most of the numbers used to play are overseas numbers, some virtual number segments, or numbers disguised by network number changers. These numbers do not have identity information registration or cannot trace the original number under the camouflage number, especially the camouflage number, which cannot be traced or called back, let alone mobile phone positioning.

Why don't you freeze the money in your account?

Although ** will make an emergency stop payment to the suspect's account as soon as it receives the victim's report. But criminals have specialized "money laundering" gangs, after committing fraud,Fraudulent funds will be distributed across the country in a matter of seconds

The division of labor within the fraud and money laundering group is extremely fine, and it is generally divided into five levels. The first layer is called "Shenglao", which is responsible for typing, sending messages, mailing and other work;The second layer is called the "Receiver" and is responsible for connecting the "Voice" to the next layerThe third layer is called "Brush Guy", as the name suggests, it is responsible for brushing the POS machine and swiping the money to the online settlement centerThe fourth layer is the "card guy", which is responsible for providing various bank cards and transferring them by themselvesThe fifth layer is the "withdrawal boy", which is responsible for withdrawing money, which can be withdrawn by yourself or paid by others to withdraw it.

The five levels have clear responsibilities and strict discipline. The cross-level does not know each other and has no connection, and each level can only be connected with the previous layer, and can only be a single-line connection. In this way, even if the "withdrawal boy" is caught, it is generally difficult to ask who and where the person at the upper level is, let alone catch the upper level, and the highest level is almost risk-free.

And one more important point**The bank card account used is basically not their own bank cardThe information of these bank cards is illegally obtained through the network (such as user information theft, illegal purchase, etc.), so according to the information of the issuer of the fraudulent account, only the card holder is found, not **.

To this end, since October 2020, many provinces and cities across the country have simultaneously carried out the "card breaking" action, and the units and individuals and relevant organizers identified by the public security organs who rent, lend, or purchase bank accounts or payment accounts, as well as units and individuals who have opened bank accounts or payment accounts by impersonating other people's identities or fictitious relationships, have implemented the punitive measures of suspending all non-counter business of their bank accounts and payment accounts for 5 years, and not opening new accounts for them.

**Caught, what about the money I was cheated of?

What do you think is what happens after your money is scammed: I was cheated out of my money and my money was transferred to account A of **. **Transfer the money from account A to account B, account B to account C, and possibly to account Z. I called the police, and the police went straight down the vine and took it directlyDon't the police even want to do that?If you have this kind of thought, you can only say that you are too young.

In fact, this is the case, you have now been cheated of 20,000 yuan, and your 20,000 yuan is mixed with the money that others have been cheated of, such as a total of 200,000. At this time, the 200,000 yuan will be dispersed into 10 accounts, assuming that 10,000 yuan is dispersed to Xiaodan's WeChat, a normal personal account, all kinds of capital transactions are complicated, which 10,000 yuan is**turned and turned to**?And was the 10,000 yuan directly transferred to another account at one time, or was it dispersed into 5 transactions and 10 transactions transferred to different accounts at different times?If there is no way to know which accounts the 10,000 yuan has been transferred to, it is impossible to continue to pass on, and the information is interrupted here.

And I would like to advise youDon't transfer money for someone else, don't do it no matter how much money you give!Don't sell your Alipay*** to others, no matter how expensive it is, it can't be sold!Selling an account is tantamount to selling yourself. It's hard to catch, but it's still easy to find you, after all, you're just an intermediate link, or even the beginning, of money laundering.

How did our information get to **?

At present, the leakage of personal information can basically be said to be the reason why telecommunication network fraud has become a problem for society to solve. **Generally use the way of casting a wide net and fishing more, hundreds of thousands, millions of **, and text message harassment every day, even if only a few are deceived, for **, the "rate of return" is also very high.

* In building and improving the platform for stopping payment of telecommunication network fraud, but the control of telecommunication network fraud is not something that can be easily done by a single department, and requires the responsibility and cooperation of the whole society, and the state is also coordinating with all departments of society and even overseas to crack down on and recover stolen goods.

It's so hard, what should I do?

RememberPrevention is always more effective than arresting people and solving crimes!Whatever the reason, as long as the other person is a stranger, rememberDon't give money if you want it, don't !! if you give moneyDon't click on unfamiliar links !!Don't share screen !!Source: Zhongshan Anti-Fraud Center.

Related Pages