I believe that many people have been harassed by fraudulent calls and text messages. For example, after the college entrance examination, a large number of text messages such as "college entrance examination subsidy", "hacking change", and "recommended" have appeared. If you accidentally click on it, your cell phone will be infected with a virus. In the first half of this year, a mobile security app flagged 160,000 fraudulent calls and intercepted 100,000 fraudulent text messages every day. And this is just the statistics of a security vendor, the overall risk and the resulting harm may be even more shocking.
It should be said that after persistent crackdowns in recent years, the results are obvious: In 2017, public security organs nationwide established 537,000 telecommunications network fraud cases, a decrease of 6.1% year-on-year, and 78,000 cases were cracked, a year-on-year increase of 55.2%. According to statistics from an Internet security vendor, in the first quarter of this year, the number of fraudulent calls dropped by 77.9% year-on-year, the number of fraudulent SMS messages dropped by 75.3% year-on-year, and the amount of telecommunications network fraud cases fell by 28.3% year-on-year.
However, with the further popularization and use of mobile Internet, telecommunications network fraud methods are also "renovated". New types of fraud cases wear the "invisible cloak" of the Internet, which is more deceptive and concealed. For example, combining Trojan horse viruses with conventional methods of telecommunications network fraud, using the risks of wireless broadband and a series of Trojan horse virus "family" to commit crimes. The specialization and precision of fraud tactics have also been greatly improved, from the traditional wide-spreading and inducing "scam" to the precise fraud of "serial setting and precise tactics". In traditional telecom fraud cases, middle-aged and elderly people are often a high-risk group. However, new data shows that most of the victims of online frauds such as fake part-time jobs, financial management, shopping, etc. are urban people under the age of 40. These new changes require timely updates of prevention and combat technology and richer methods.
Containing new types of telecommunications fraud requires a multi-pronged approach to provide comprehensive network security protection. On the one hand, government departments and enterprises must form a joint force to use big data analysis, cloud computing, etc. to carry out a comprehensive attack. Public security departments and banks are also strengthening cooperation in the "last mile" to reduce the loss of victims; on the other hand, they should also fight well. "Vaccination" is the most economical and effective tactic to improve the public's identification ability and safety awareness.
For example, an Internet security company initiated the "Guardian Plan" project, and combined with public security departments and many online and offline companies to provide users with privacy guidelines and anti-Internet fraud manuals, as well as an entrance to inquire and report fraud. Another example is that the first domestic anti-new-type fraud-themed TV series "Nowhere to Hide" is currently under preparation. This TV series supported and directed by the Ministry of Public Security and the Propaganda Department of the Fujian Provincial Party Committee will tell the frontline anti-new-type fraud public security officers. The story, exposing the details of a variety of new fraud methods and the inside story of the industry chain, is expected to become a vivid teaching material that explains the profound things in a simple way. These more closely related forms of publicity and promotion will be novel and effective anti-fraud science and education methods.
Although it is a chronic disease, I am afraid of precise and effective treatment. To eradicate telecommunications network fraud, a joint collaboration model led by the government, industry alliances, and public participation is indispensable. Technology upgrades, knowledge popularization, and brain-inspired propaganda methods are also effective supplements. In this way, even if telecommunications fraud wears a "cloak of invisibility", there will be nowhere to hide.
Nanning Goodman Technology Co.,Ltd , https://www.goodmentech.com