From 2002 to 2010, telecommunications fraud was rampant, but the technical content was generally not high. The most common method of fraud was to lure cakes. The technology at this time basically plays a role in communication in fraud. In this stage, deception is the main method, technology is supplemented, the plot is simple and straightforward, the method is simple and rude, and it is basically a point-to-point fraud process. 2. Big data can also accurately defraud Internet fraud completed its evolution in 2012. Let's look at two sets of data. Between 2010 and July 2012, the number of online fraud incidents increased by 300%. In addition, according to the rough statistics of the Ministry of Public Security of China, the average annual growth rate of telecom fraud in mainland China has been over 70% since 2011.
The average amount of fraud is 10 billion yuan every year, and in 2015, it soared to more than 20 billion yuan, which shows the prosperity of the fraud industry. Around 2012, fraud was upgraded from point-to-point bombing to pipeline fraud. At the same time, the presence of traffic platforms and technical methods in fraud crimes became stronger and stronger. Fraud has job title email list also moved from casting a net to precision. Different from the traditional "subpoena", "winner", "come to my office" and other net-casting scams, there are more and more cases of precise fraud at this stage. In the fraudulent text messages, bring your name, also know your basic information, and attach a link to sign a business that may actually open a business through a certain business. It’s hard to tell if it’s true or false.
When you click on the link, you fall into a trap. Many of these links are phishing websites. With the popularity of the Internet, computers and smartphones, online fraud has begun to show an upward trend. Criminals conduct fraud through phishing websites, fake base stations, etc. Eric Doerr, a senior officer at Microsoft's Account Systems program, said: "Criminals have become increasingly adept at stealing long lists of usernames and passwords from servers and then replaying them on other major account systems." passwords, they would misuse the information beyond the original account that was compromised." Telecom fraud has gradually developed from the initial lottery winning and SMS winning, and gradually developed into dozens of types such as impersonating the public security law or customer service, brushing orders, killing pigs, and agency credit card loans. In the current informational background, criminal suspects will make different fraud schemes for different types, identities and occupations.