To evade police crackdowns
Some fraudsters
hide abroad to commit fraud
But the phone call the victim received
Most of them show that they are from China
How do scammers do it?
In fact, many scam calls
are made through “GOIP” and “VOIP” \”The equipment dialed
Domestic criminals set up these two devices for their own selfish interests
To provide convenience for overseas fraudsters
November On the 9th, the Criminal Police Brigade of the Qingyuan Branch of the Ji\’an Municipal Public Security Bureau destroyed a den that used \”VOIP\” equipment to help commit telecommunications network fraud crimes, and arrested three suspects, including Huang, Liu, and Wang.
Recently, the Criminal Police Brigade learned a clue during work: a man was suspected of illegally setting up VOIP equipment in a rental house, and there was a major risk of committing telecommunications network fraud. suspicion. After multiple investigations, a criminal gang that built VOIP voice gateway equipment for overseas telecom fraud groups gradually surfaced. Through analysis and judgment, the criminal police brigade quickly launched arrest work after grasping the gang\’s movement trajectory and hiding place. On the evening of November 9, the police quickly attacked and arrested three suspects, Huang, Liu, and Wang, in an apartment in a community in Qingyuan District. They confiscated a VOIP device, a landline phone, and a router on the spot.
After investigation, the criminal suspect Huang used the convenience of Liu\’s company to open 16 fixed phone numbers in Qingyuan District. , and then illegally set up VOIP equipment in a rented house in a community to provide voice services to overseas telecom fraud groups.There have been many telecom fraud cases involving foreign police, involving a fraud amount of more than 300,000 yuan. Three people made illegal profits of more than 80,000 yuan by setting up VOIP equipment.
Currently, the three suspects have been subject to criminal compulsory measures in accordance with the law, and the case is under further investigation.
What are \”GOIP\” and \”VOIP\” devices?
\”GOIP\” refers to a virtual dialing device. It can switch mobile phone numbers from abroad to dial the victim\’s phone. It has unattended, two-way calling and can call back. features and can hide the location of fraudsters. One such device can operate hundreds of mobile phone SIM cards at the same time. Fraudsters can achieve \”human-machine separation\” by remotely controlling dialing and evading public security agencies.
\”VOIP\” is voice transmission based on IP (English: Voice over internet Protocol, abbreviated as VOIP). It is a voice call technology that communicates via the Internet. Fraudsters implement fraud by setting up VOIP equipment and remote dialing on remote networks to hide their true location.
It is a crime to use GOIP and VOIP to engage in telecommunications network fraud. According to the \”Penalty Amendment (9)\”, knowing that others are using information networks to commit crimes, and providing Internet access, server hosting, and network services for their crimes The act of providing technical support such as storage and communication transmission, or providing assistance in advertising, promotion, payment and settlement, etc., is a crime of assisting information network criminal activities. If the circumstances are serious, he shall be sentenced to fixed-term imprisonment of not more than three years or criminal detention, and shall also or solely be fined.
How to prevent “GOIP\” \”VOIP\” crime?
The types of fraud committed by using GOIP and VOIP are mostly shopping refund fraud, impersonating public security fraud, loan account cancellation fraud, agency credit card fraud, etc. In our daily lives, We must constantly enhance our awareness of prevention!
01
Do not be gullible and do not call back calls from strangers who call themselves “customer service” If you receive calls from unknown sources such as company staff, public prosecutors and law enforcement personnel, you should call official channels for verification.
02
Do not disclose your ID number to strangers , bank card account number, mobile phone verification code and other personal information, and you cannot remit money or transfer money to strangers. Be sure to double-check the other party\’s account and identity information.
03
Beware of Trojan viruses and phishing links, do not click on suspicious website links, and be careful of scanning QR codes from unknown sources. Link to free WIFI
In addition, do not use your mobile phone card, QQ number,
本站内容及图片来自网络,版权归原作者所有,内容仅供读者参考,不承担相关法律责任,如有侵犯请联系我们:609448834