-
Collect relevant evidence, call the police on 110** or report the case to the local public security department.
According to the Criminal Procedure Law of the People's Republic of China:
Article 110: Any unit or individual discovering the facts of a crime or a criminal suspect has the right and obligation to report or report the case to the public security organs, people's procuratorates, or people's courts.
Public security organs, people's procuratorates, or people's courts shall accept reports, accusations, or reports. Where it is not within their own jurisdiction, it shall be transferred to the competent organs for handling, and the informant, accuser, or informant shall be notified; Where emergency measures must be taken that are not within their jurisdiction, they shall first take emergency measures and then transfer them to the competent organs.
Where the offender voluntarily surrenders to the public security organs, people's procuratorates, or people's courts, the provisions of paragraph 3 apply.
Characteristics of communication information fraud in our country.
Communication information fraud mainly refers to the use of telecommunications, the Internet and other information and communication technologies and tools by fraudsters for the purpose of illegal possession, through sending text messages, making phone calls, online chats and other means of communication, to trick and steal victims to remit funds into bank accounts under their control, and to carry out illegal and criminal acts.
At present, China's communication information fraud activities generally present four characteristics:
1. Diversify and precision the means of carrying out fraud. With the continuous increase in China's efforts to crack down on communication information fraud, the fraud methods have been continuously renovated, the methods have become more concealed, and the tricks have been constantly renovated, and communication information fraud has gradually changed from the traditional wide net and induced "collision and fraud" to the precise fraud of "setting up a series of games and accurately setting up tricks".
II. The subject of fraud crimes is showing a trend of regionalization and professionalization. Regional professional criminal gangs formed by gangs of fraudsters in the same region have increasingly become a prominent feature of criminals in communication and information fraud.
III. Fraud organizations are specialized and industrialized. Communication and information fraud has shown a trend of industrialized development, with the internal division of labor becoming more and more detailed and the degree of specialization getting higher and higher, forming an intertwined chain or network of interests.
IV. Cross-border and cross-regional fraud is carried out. With the continuous advancement of China's economic globalization and regional integration, the international exchange of personnel has become more and more convenient, inter-regional communication and logistics payment has become increasingly developed, and cross-border and cross-regional communication and information fraud activities have become the norm.
-
Category 1: **, Internet fraud characteristics.
The suspect communicates with the victim through social software such as text messages, **, and the Internet, and induces the victim to take the initiative to transfer money.
Methods and precautions.
1. Call 110 to call the police as soon as possible, and inform the bank and other relevant information in detail. Now all localities have begun to establish anti-telecom network fraud centers, and the anti-telecom network fraud centers will contact the banking department to quickly freeze the best banks.
It should be noted that ** is now against **, and the funds will be transferred to the subordinate card as quickly as possible, and then withdrawn after multi-layer transfer. Therefore, the alarm speed must be fast, if the funds have been transferred out or withdrawn, then the possibility of the funds can be recovered is very small.
2. The People's Bank of China stipulates that from December 1, 2016, in addition to transferring money to one's own peer account, if an individual transfers money through an ATM or other self-service ATM, the issuing bank shall handle the fund transfer within 24 hours after acceptance, and the individual may apply to the issuing bank to cancel the transfer within 24 hours.
3. Keep relevant evidence, such as transfer vouchers, including: ATM transfer receipts, mobile banking (online banking) transfer screenshots, and bank statements. Relevant credentials for contacting **, including screenshots of call logs, call details, and screenshots of SMS (WeChat, QQ) chat records.
Other evidentiary materials related to the case.
4. Go to the local police station or criminal police team in time to make a record, and provide relevant evidence to **, which are all important bases for ** to carry out investigation work and collude with cases. After the case is cracked, this evidence will also play a very important role in the sentencing of the suspect and the recovery of stolen money.
The Trojan link sent by the suspect induces the victim to click on it, and then automatically obtains the relevant information of the victim through the program, and steals the funds in the victim's bank card or account in the third-party payment platform without the victim's knowledge.
Methods and precautions.
1. Contact the bank to inquire about the flow of funds and obtain the best bank account information.
2. Quickly dial 110 to call the police and quickly freeze the ** bank account.
4. Turn off the mobile phone of the Trojan virus, and flash the phone by yourself or go to the regular store for mobile phone repair.
Note: It's not a factory reset, it's a reflash!
5. Change the passwords of mobile bank accounts and social banking accounts in the mobile phone of the Trojan virus.
6. Go to the local police station or criminal police team to make a record.
1. Contact the bank to inquire about the flow of funds and obtain the best bank account information.
2. Quickly dial 110 to call the police and quickly freeze the ** bank account.
4. Turn off the mobile phone of the Trojan virus, and flash the phone by yourself or go to the regular store for mobile phone repair.
Note: It's not a factory reset, it's a reflash!
Note: It's not a factory reset, it's a reflash!
5. Change the passwords of mobile bank accounts and social banking accounts in the mobile phone of the Trojan virus.
6. Go to the local police station or criminal police team to make a record.
-
There are 1 ways to be deceived by the Internet, you can call the police, 2You can go to the 110 Legal Advice website to check.
-
Immediately change the previous information and password to prevent being used.
-
Call the police in time and let the police deal with it. Then call the ** bank in time to deal with it.
-
Summary. Hello, sorry to keep you waiting.
If you encounter mobile phone fraud, you should call 110 to report to the police or directly call the public security organ to report to the police, and provide relevant evidence materials to the defrauded, and ** will conduct public security management or criminal investigation based on the evidence.
Public Security Administration Punishment Law
Article 49.
Those who steal, defraud, rob, snatch, extort, or intentionally damage public or private property are to be detained for between 5 and 10 days, and may be concurrently fined up to 500 RMB; where the circumstances are more serious, they are to be detained for between 10 and 15 days, and may be concurrently fined up to 1,000 RMB.
Article 266 of the Criminal Law: Fraud.
where public or private property is defrauded, and the amount is relatively large, a sentence of up to three years imprisonment, short-term detention or controlled release is to be given, and/or a fine; where the amount is huge or there are other serious circumstances, a sentence of between 3 and 10 years imprisonment and a concurrent fine is to be given; where the amount is especially huge or there are other especially serious circumstances, a sentence of 10 or more years imprisonment or indefinite imprisonment is to be given, and a concurrent fine or confiscation of property. Where this Law provides otherwise, follow those provisions.
What to do if you are scammed on your phone.
Hello If you have waited for a long time and encountered mobile phone fraud, you should call 110 to call the police or directly call the public security organ to report to the police, and provide relevant evidence to **, ** will conduct public security management imitation or criminal investigation according to its evidence. Article 49 of the "Public Security Administration Punishment Law" Anyone who steals, defrauds, robs, snatches, extorts or intentionally damages public or private property shall be detained for not less than five days but not more than 10 days, and may be concurrently fined up to 500 yuan; where the circumstances are more serious, they are to be detained for between 10 and 15 days, and may be concurrently fined up to 1,000 RMB. Article 266 of the Criminal Law: Where the crime of fraud defrauds public or private property, and the amount is relatively large, a sentence of up to three years imprisonment, short-term detention or controlled release is to be given, and/or a fine; where the amount is huge or there are other serious circumstances, a sentence of between 3 and 10 years imprisonment and a concurrent fine is to be given; where the amount is especially huge or there are other especially serious circumstances, a sentence of 10 or more years imprisonment or indefinite imprisonment is to be given, and a concurrent fine or confiscation of property.
Where this Law provides otherwise, follow those provisions.
Hope it can help you and have a happy life!
-
Summary. 1. First of all, keep the evidence of being deceived. Such as:
Correspondence records, chat records, transfer or remittance records, etc. 2. If the amount defrauded by an individual exceeds 2,000 yuan or more, it is recommended to call 110 to report to the police or to the nearest police station. If the amount of money defrauded by an individual is less than 2,000 yuan, such as how many are defrauded.
10. A report of several hundred yuan will not be filed. It is also recommended to report the case to the police station and provide valid evidence. When the number of victims and the amount of money involved reach a certain amount, a case will also be opened for investigation.
It is strongly recommended that the victim do not admit that he is unlucky, but bring the evidence to the nearby police station to make a report record. 3. Improve anti-fraud awareness. Do not trust others and send money or money directly to strangers without using third-party platforms.
What to do if you are scammed on your phone.
1. First of all, keep the evidence of being deceived. Such as: Xianpei communication records, chat records, transfer or remittance records, etc.
2. If the amount defrauded by an individual exceeds 2,000 yuan or more, it is recommended to call 110 to report to the police or to the nearest police station. If the amount of money defrauded by an individual is less than 2,000 yuan, such as how many are defrauded.
10. A report of several hundred yuan will not be filed. It is also recommended to report the case to the police station and provide valid evidence. When the number of victims and the amount of money involved reach a certain amount, a case will also be opened for investigation.
It is strongly recommended that the victim do not admit that he is unlucky, but bring the evidence to the nearby police station to make a report record. 3. Improve the awareness of anti-deception. Do not trust others and send money or money directly to strangers without going through third-party platforms.
I bought a shouting mobile phone on Xianyu, only paid 0.01 yuan, and the rest of the money was paid through the pure infiltration shed WeChat, and now the seller has closed the transaction and cannot have a conversation, how can I get the money back.
There must be that transfer record in your WeChat, and you can find him by emptying the transfer record. You have to keep the evidence and then go to the police station to report it. The police station can help you investigate the blind.
It is the courier of the sweep***.
That's a bit hard, pro.
If you transfer it to him, you can still find it, but if you transfer it to someone else, it's very difficult.
There was the courier's number, but the courier transferred it to the courier owner.
I suggest you try to call the police, because if you check it yourself, many people will not help you with it. If the police Fan Qin were to investigate, many people would assist the police to obtain more accurate and extensive clues. Tong sedan chair reed.
The police can check the courier first, and then go to check the courier's boss like this. Follow up step by step.
Ok thanks.
2,000 yuan of hard-earned money, they are so hateful.
The main reason is that it is forbidden to conduct a transaction on other software on the Xianyu platform.
I don't dare to use this phone for fear that there will be a problem.
Now we can only call the police with the mentality that you can try. Maybe I can get you back 2,000 dollars.
Regarding the question of mobile phones, you can directly take your mobile phone to any mobile phone store for a check-up.
to ensure the security of your phone. There are no viruses and malware and the like that.
-
If they are deceived on the Internet, the parties should first keep the evidence and immediately report the case to the public security organs, submit relevant evidence to the public security organs, and inform the public security organs of the basic facts; After filing and investigating, the public security organs transfer the case to the procuratorate for review and prosecution; If the procuratorate finds that the crime is constituted, it shall initiate a lawsuit with the court.
[Legal Basis].Article 3 of the Criminal Procedure Law of the People's Republic of China.
The public security organs are responsible for the investigation, detention, execution of arrest, and preliminary trial of criminal cases. The people's procuratorate is responsible for the prosecution, approval of arrest, investigation of cases directly accepted by the procuratorate, and initiation of public prosecutions. The people's courts are responsible for trials.
Except as specifically provided by law, no other organ, group or individual has the right to exercise these powers.
People's courts, people's procuratorates, and public security organs conducting criminal proceedings must strictly abide by the relevant provisions of this Law and other laws.
-
If you are deceived online, as a victim, you can immediately report the case to the local public security organ's Internet supervision department through the Internet or by calling **, or report the case to the public security organ through text messages, WeChat, letters, etc. 1. If you are deceived online, you can report it in writing or orally. As for the evidence, ** will investigate.
2. Although the detection rate of online fraud is relatively low, it is mostly due to the lack of clues. Therefore, the deceived person should report to the police in time after being deceived, that is, the case cannot be solved for the time being, and it also provides information for ** to crack down on illegal and criminal acts. 3. One of the reasons why online fraud is rampant at present is that the deceived person is unwilling to report the case because the amount of money is too small and the face is dull, thus conniving at illegal and criminal acts.
Believe it or not, depending on your personal point of view, as long as you feel realistic and in which direction to work towards to make it a reality, that's fine. If the person you like also likes you and is willing to work with you to make it a real problem, then why not? If you like someone, you should pay and sincerely work hard to do whatever you can for the person you like, as long as you work hard to do it, even if there is no result in the future, at least it is a good memory. >>>More
Lisa didn't know about it beforehand, and the key problem was that Lisa was too trusting and over-reliant on the broker, so it was a matter of minutes to be scammed.
Founded in March 2003, the Computer Network and Information Security Technology Research Center of Harbin Institute of Technology has a bachelor's degree in information security, a master's degree in computer science and technology, a doctoral program in computer system architecture and a postdoctoral mobile workstation. >>>More
Internet speed limits. Generally, it refers to the speed limit of uploading and ** when you use a computer and mobile phone to surf the Internet, the speed limit is to limit your bandwidth transmission rate, the upstream rate is the rate at which you access the browser, and the downstream rate refers to the ** rate. >>>More
If a white lie makes you feel cheated, it is only a temporary unacceptable but you will be very happy If the malicious lie deceives you, whether it is to people or things, you must be careful to face it, and carefully consider what you should do next.