Common tactics to identify telecom network fraud

Mondo Social Updated on 2024-01-30

Today, with the rapid development of Internet technology, telecom network fraud has also broken through the limitations of time and space and spread widely. The iterative evolution of new "discourses" and new routines of fraud has emerged one after another, showing new characteristics such as intelligence, cross-border, specialization, collectivization, chaining, and precision, which have become the current issues of concern in social governance. How to avoid becoming the next victim is a question that each of us should pay attention to and think about.

Common tactics to identify telecom network fraud

Common means of identifying telecom network fraud are the first line of defense against telecom network fraud. Fraudsters usually take advantage of the victim's desire to avoid harm and credulity to gain the victim's trust and break through the victim's psychological defense. Specifically, the following methods of telecommunication network fraud are more common.

The first is to attract users through a variety of winning lotteries, rebates, and high returns. For example, due to its short rebate cycle and high success rate of drainage, online rebate fraud has gradually become the main drainage method for other complex frauds such as false investment and financial management, loans, and other illegal crimes such as online gambling. Another example is that fraudsters pretend to be investment mentors or financial advisors to deceive victims into trusting them by sending fake news about investment success or "live classes", or deceive victims into trusting them on the grounds that they have special resources or platforms that have loopholes to obtain high financial returns. Another example is that fraudsters pretend to be staff of banks or financial companies, falsely claiming that they can "have no collateral", "no credit investigation" and "fast lending", trick victims into **fake loan apps or log in fake**, and then trick victims into transferring and remitting money on the grounds of charging "handling fees", "security deposits" and "agency fees".

The second is to commit fraud by impersonating and disguising themselves as public officials, relatives and friends, and institutions. For example, fraudsters pretend to be staff of the "Public Security Bureau, Procuratorate, Court, Social Security, Medical Insurance", etc., contact the victim through **, WeChat, QQ, etc., and threaten the victim in the name of suspected money laundering, illegal entry and exit, express drug possession, malicious overdraft or abnormal account, and require the victim to cooperate with the investigation and keep it strictly confidential. Another example is that fraudsters use the information of the victim's leaders, acquaintances, family and friends to "package" social media accounts to deceive the victim's trust, and then ask the victim to transfer money to the designated account on the grounds that it is inconvenient to appear or answer**, and constantly urge the victim to transfer the money as soon as possible under the pretext of time urgency, so as to commit fraud. Another example, fraudsters use pre-designed false identities of "Bai Fumei" and "Gao Fushuai" to deceive the victim's trust through marriage and dating**, and operate the relationship established with the victim for a long time, and then ask the victim for money on the grounds that he needs money urgently in case of an accident and helps the project capital turnover, until the victim realizes that he has been deceived.

The third is to carry out fraud through customer service refunds, false ** and various false preferential information. For example, fraudsters impersonate the customer service of e-commerce platforms or logistics and express delivery companies, falsely claiming that the products purchased by the victim online have quality problems or that the goods sold have been removed from the shelves due to violations, and induce the victim to provide information such as bank cards and mobile phone verification codes on the grounds of "claim refund" or "reactivation of the store". Another example is that fraudsters publish advertisements such as "low-price discounts", "overseas**", "private detectives" and "tracking and positioning" in WeChat groups, Moments, online shopping platforms or other **, inducing victims to transfer and remit money on the grounds of paying "customs duties", "deposits", "transaction taxes" and "handling fees". Another example is that fraudsters induce victims to bypass formal platforms to conduct private transactions on the grounds that private transactions are cheaper and more convenient on the grounds that online game accounts, props, and point cards are advertised on social and game platforms, or free and low-cost access to game props, and participation in ** activities.

In addition, common telecommunication network fraud methods also include: stealing user account passwords and other privacy by pretending to be a bank, e-commerce, etc.; Fraud is carried out by fabricating all kinds of unexpected and disturbing messages; Publishing various fake activities through social tools such as WeChat and Weibo to lure users to participate**; Wait a minute.

Strengthen self-prevention and raise awareness of anti-fraud.

To prevent telecommunications network fraud, the broad masses of the people should be vigilant and strengthen their awareness of security precautions. First, we must overcome the idea of "greed for profit", do not be paralyzed and credulous, and beware of being deceived. In the face of lottery fraud, false high-interest loans or credit card cash-out fraud, it is necessary to analyze and identify the authenticity of the information. Second, we should pay attention to the self-protection of personal information, and do not easily disclose the personal information of ourselves or our family members to others. For scam text messages for emergency help, ** should be carefully checked, and do not easily remit to the designated account of criminals. Third, it is necessary to investigate and corroborate from various sources. For fraud claiming that bank card upgrades, false job recruitment, and marriage matchmaking are to be promptly consulted and checked with relevant local units and industries.

If you receive strange text messages or ** that threaten to harm or report and falsely claim to be anti-money laundering, you should ignore them, and if necessary, you can report and verify them with the local public security organs and other institutions. Also, never buy prohibited items. For the text messages that advertise "selling" special equipment and contraband, ** should be ignored and removed in time, and should not be remitted to purchase. For strange text messages that require remittance before delivery or require advance deposit, deposit, risk collateral, notary fees, and handling fees for shopping, ** must be cautious and carefully screened. For the call claiming to be the public security bureau, procuratorate, court, bank and other official numbers, be sure to corroborate in many ways, do not panic, easily believe, to prevent criminals from using *** and other methods to impersonate ** number.

Once telecommunications network fraud is encountered, relevant evidence should be promptly collected and reported to the public security organs, so that the public security organs can promptly grasp the relevant criminal evidence, carry out investigation of collusion and merger cases, and solve the case in a timely manner, crack down on telecommunications network fraud crimes in accordance with law, and recover the victims' losses to the greatest extent.

Promptly collect relevant evidence and report the case to the public security organs. Once it is discovered that it has been defrauded, it is necessary to keep screenshots of transaction records, audio recordings and other relevant evidence as soon as possible, immediately report the case to the public security organs, and provide detailed fraud and relevant evidence, so as to investigate the criminal responsibility of criminals. The public security organs that meet the criteria for filing a case will investigate and recover the defrauded funds. If the police do not file a case, they can directly contact the court to apply for pre-litigation property preservation, ask the bank to freeze the deposits related to the case, and then file a civil lawsuit for return, and if necessary, they can seek professional legal assistance.

File a claim for infringement damages against a telecom operator. Article 7 of the Consumer Rights and Interests Protection stipulates that consumers have the right not to be harmed in their personal and property safety when receiving services, and Article 19 stipulates that if a business operator discovers that the goods or services provided by it are defective and there is a danger of endangering the personal and property safety of consumers, it shall promptly inform and take relevant measures. As a party providing telecommunications services, telecommunications operators shall provide safe and reliable telecommunications services while charging communication fees to users. Victims may request telecommunications operators to bear corresponding responsibilities through civil litigation procedures to protect their legitimate rights and interests. Seek state assistance as a final guarantee. On the basis of article 34 of the Anti-Telecommunications Network Fraud Law, where victims who have suffered major hardship meet the relevant state requirements for assistance, the relevant parties are to provide assistance in accordance with provisions. The "Opinions of the Supreme People's Court on Strengthening and Regulating the People's Courts' Work on State Judicial Aid" stipulates the specific circumstances under which parties apply for judicial assistance, making judicial aid an integral part of the social security system and ensuring the healthy development of the cause of the Party and the state.

Related Pages