Information Center

Anti fraud and strict prevention of eight acts of "streaking" of personal information are easy to reveal personal information

  

Criminal activities are corporate

In June last year, the State Council approved the establishment of a joint conference system for combating new types of crimes committed by telecommunications networks, consisting of 23 departments and units, including the Ministry of Public Security, the Ministry of Industry and Information Technology and the People's Bank of China. However, the situation of telecom fraud in China is still grim. At the briefing on combating transnational telecommunications network fraud cases held on August 19 this year, the relevant head of the Criminal Investigation Bureau of the Ministry of Public Security introduced that 599000 telecommunications fraud cases occurred in China in 2015, causing economic losses of about 20 billion yuan; In the first half of 2016 alone, there were 287000 telecommunications fraud cases, resulting in losses of more than 8 billion yuan.

It is understood that at present, China's telecommunications fraud is mainly divided into two categories: domestic and overseas. Domestic criminal activities have obvious regional characteristics. Generally, criminals commit fraud against the whole country in the villages and towns where they live; Overseas fraud is mainly carried out through the Internet and telephone, and they set up fraud dens in Southeast Asia and Africa to escape attack.

"I'm responsible for pretending to be a police officer and making phone calls to defraud people of money." Taiwanese Jane came to Kenya in 2014 through a friend's introduction to engage in telecommunications fraud against mainland residents, and was also one of the 77 suspects of telecommunications fraud escorted back from Kenya by the mainland public security authorities in April this year.

According to Mr. Jian, in the criminal dens where he is located, from pretending to be a medical insurance officer to obtain the victim's identity information, to pretending to be a police officer to accept the "report", to pretending to be the head of the Financial Crimes Section to trick the victim to remit money and transfer money, the deception is interlinked, and the "boss" will pay "wages" to members of the criminal gang on a monthly basis according to their "performance".

Chen Shiqu, deputy inspector of the Criminal Investigation Bureau of the Ministry of Public Security, said that telecom fraud is different from traditional crimes. They call themselves "companies", which are well organized and have a clear division of labor. Each person is only responsible for a certain link of criminal activities. Experts believe that telecom fraud, an intelligent crime that is implemented in a remote and non-contact manner, is difficult to solve and recover stolen goods, and has the trend of accelerating its spread to the world. To effectively crack down on it, coordination and cooperation between multiple departments must be further strengthened.

The responsibility of "false quotient" cannot be false

After the Xu Yuyu incident, some media pointed out that the 170 and 171 sections that let Xu Yuyu be cheated were simply "the special sections for cheats".

As early as 2013, in order to further stimulate the vitality of the mobile communication market, the Ministry of Industry and Information Technology opened the mobile communication resale business pilot to the society, and divided the section 170 and 171 for the use of virtual operators. However, industry insiders pointed out that some virtual operators pay more attention to the development of users than the registration of real names, ignore the relevant legal requirements, and sometimes acquiesce in or condone those illegal acts that do not register or deliberately falsely register identity information in order to improve their performance.

In July of this year, the Network Security Administration of the Ministry of Industry and Information Technology organized an unannounced visit on the real name registration of new telephone users of virtual operators. Statistics show that the Ministry of Industry and Information Technology secretly visited 109 marketing outlets of 26 resale enterprises, and found 37 outlets with violations, with a violation rate of 33.9%. Among them, 50 entity marketing outlets were secretly visited, and 13 outlets with violations were found, with a violation rate of 26.0%; 59 network marketing outlets were secretly visited and 24 illegal outlets were found, with a violation rate of 40.7%

The Ministry of Industry and Information Technology said that operators should bear their due responsibilities and obligations in dealing with spam messages and harassment calls. Next, they will strengthen supervision, inspection and punishment for violations. "The implementation of the real name system will be used as a veto for virtual operators to apply for expanding their business scope, increasing code resources and issuing formal business licenses.".

Strictly prevent personal information "streaking"

One day last year, Wang Ting (not her real name), who had just started work, suddenly received a phone call. The other side of the phone not only called her name, but also claimed to be her leader, asking her to "come to the office tomorrow". Wang Ting had just entered the unit and dared not ask who the other party was, so she had to guess a leader's name nervously. Unexpectedly, she "guessed right". The next day, Wang Ting called again to say "money is urgently needed" and asked Wang Ting to transfer the money to the designated account. She remitted the money without even thinking about it, but it was another fraud. After that, Wang Ting reported to the police, but what kept her puzzled was how the cheater knew her personal information?

In Guangdong Maoming E-white, where "I am your leader" telecom fraud is high, the local police handling cases introduced that telecom fraud criminal gangs often set up a "citizen personal information providing group" in their internal division of labor, and they obtained citizen personal information such as identity information, home address, mobile phone address book, etc. through "underground industrial chain" transactions on the Internet, "each of which costs 5 to 80 cents" At the same time, with the continuous enhancement of information theft technology, the interest chain of "source middlemen illegal users" has been formed.

In the face of the phenomenon of "streaking" of personal information to a certain extent, the Standing Committee of the National People's Congress issued the Decision on Strengthening the Protection of Network Information in 2012, and the Ministry of Industry and Information Technology subsequently formulated and issued the Provisions on the Protection of Personal Information of Telecommunications and Internet Users. The Criminal Law Amendment (IX) newly established the "crime of infringing on citizens' personal information". However, experts said that up to now, a special personal information protection law has not been promulgated, and the cost of citizens' legal rights and interests is still high. At the same time, the illegal cost is low, and once obtained, the profit is huge, which is also the reason why this kind of crime has been repeatedly prohibited.

Recently, the executive meeting of the State Council deployed to accelerate the promotion of "Internet+government services". The meeting stressed that it is necessary to strengthen the system and information security protection capabilities, and strengthen the protection of important data involving trade secrets, personal privacy and so on. In addition, some analysts pointed out that the fight against telecommunications fraud urgently needs both system building and law popularization. In addition to filling regulatory loopholes as soon as possible, strengthening coordination and cooperation between departments, it is also urgent to improve the people's ability to identify and prevent telecommunications fraud in a timely manner.

Eight behaviors are easy to disclose personal information

1. Beware of phishing websites when shopping online

Tips: When shopping online, you should first verify whether the domain name of the shopping website is correct, carefully click the payment link sent by the merchant from the instant messaging tool, and beware of phishing websites.

2. Properly dispose of express bill, ticket and other documents

Call: Discarded materials containing personal information, such as express bills and tickets, should be properly kept or deeply destroyed to prevent others from stealing.

3. The purpose of the ID card copy shall be indicated

Advice: When providing the copy of ID card, please indicate "This copy is only for XX use, and invalid for other purposes" and the date. Clear the copier cache after copying.

4. Resume only provides necessary information

Tips: Generally, don't fill in your resume in too much detail, especially your home address, ID card number, etc.

5. Do not disclose personal information on social networks

Tips: Try to avoid disclosing or labeling real identity information on social networks such as microblogs and forums. Even in "point-to-point" chat, make sure that the other party is a familiar person.

6. Be careful to post photos on WeChat

Tips: Although WeChat has a "circle of friends", you should be careful to be reprinted and forwarded when exposing your personal photos, and then be mastered by strangers. It is suggested that photos containing personal information can be shared by setting groups.

7. Carefully participate in online survey activities

Tips: When participating in online survey activities, you should choose a website with reliable reputation, carefully check the truth of the other party, and do not rashly participate in the survey and fill in personal information.

8. Free WiFi is easy to reveal privacy

Tips: When logging in to online banking or Alipay using wireless WiFi, you can access it through a special APP client.