April 15 is China’s sixth national security education day.
National security is an important cornerstone for the stability of the country. In the mobile Internet era, network security has become an important part of national security. How to ensure the public to access the Internet safely, effectively identify the infringement of rumor information, and guard the defense line of network security has become an important issue of national concern.
With the commercialization and popularization of 5g, the Internet of things is gradually approaching the reality. At the same time, with the expansion of terminal connection, data storage and utilization scale, mobile security issues are becoming more and more complex, and cyber crime techniques are constantly being renovated, resulting in greater difficulty in technical confrontation.
What are the threats to people’s personal information security in the 5g era? How to deal with it? In the face of the continuing high incidence of network fraud, everyone should take action to improve the awareness of personal information protection. At the same time, relevant enterprises should take action to strengthen risk prevention, assume greater responsibility, and resolutely curb the high incidence of telecom network fraud.
Rampant Telecom fraud: loss per capita over 10000 yuan
With the in-depth application and development of mobile Internet, people are increasingly dependent on mobile phones, and online shopping and mobile payment are becoming more and more popular. Mobile phones have become the “protagonists” of Internet terminals. The personal information and property security problems brought about by the wide application of mobile payment must be attached great importance.
According to the data released by the Ministry of public security, in 2020, the public security department cracked 322000 telecom network fraud cases, arrested 361000 suspect, dissuaded 8.7 million people from being cheated, and recovered a total loss of 187.6 billion yuan. At the same time, homicide cases caused by telecom network fraud also occur from time to time.
According to the report on China’s mobile phone security in 2020 (hereinafter referred to as the report) released by 360 in conjunction with China information and Communication Research Institute, 360 received 2656 reports of mobile phone fraud in 2020. Among them, there were 1340 fraud applications, involving a total amount of 15.202 million yuan and a loss of 11345 yuan per capita.
The report also “graded” the harm of online fraud in terms of per capita loss and the number of reported cases. Financial management, false part-time jobs and identity impersonation are high-risk fraud types; Making friends, gambling and gambling belong to the type of medium risk fraud.
Financial fraud is the type of fraud with the largest number of reports. Financial management accounts for 23.4% of all fraud applications; The second is false part-time fraud (accounting for 18.4%) and dating fraud (accounting for 15.8%). In terms of the total amount involved, the total amount of financial fraud was the highest, reaching 4.829 million yuan, accounting for 31.8%; The second is identity fraud, involving a total amount of 3.932 million yuan, accounting for 25.9%; False part-time jobs ranked third, with a total amount of 2.355 million yuan, accounting for 15.5%.
The report shows that among the Internet fraud reporting users, the post-90s mobile phone fraud victims account for 37.5% of the total number of victims, and are the main audience of criminals engaged in online fraud; The second is after 00, accounting for 28.7%; The post-80s accounted for 24.1%. The Post-70s and post-60s who are more likely to suffer from mobile phone fraud in people’s impression account for less than 10%.
The era of Internet of everything: the “new” of Telecom fraud routine
In recent years, with the development of the mobile Internet, the crime of telecom network fraud has also bred in this situation, resulting in many new deceptions. The traditional means to deal with personal information security problems such as telecom network fraud are facing great challenges.
At the same time, with the increasing popularity of 5g, all kinds of new technologies and applications also usher in the opportunity of outbreak. 5g technology has the characteristics of ultra-high speed, ultra-large connection and ultra-low delay, which will inevitably involve more personal information and even personal sensitive information. How to use data reasonably, legally and in compliance in the 5g era to effectively empower all walks of life while protecting personal information security has become an urgent problem to be solved.
Recently, there are many news about the misuse of “face recognition” technology. At the “315” party this year, many businesses collected users’ face information without permission and were exposed by roll call. At the same time, according to media reports, there have been cases of criminals stealing face information to commit fraud in Guangdong, Hubei and other places.
According to the prediction of GSMA (Global Association for mobile communication systems), 25billion devices will be connected to 5g network and interconnected in 2025. This will make personal information collection more fragmented, personalized and accurate. The data sources and dimensions that users need to protect will also increase. Physiological features such as face and fingerprint will become part of personal information.
At present, the proportion of criminal cases of telecom network fraud is increasing. Among them, network fraud is growing rapidly. Four types of high-frequency network fraud cases, such as loans, Bill swiping, “pig killing plate” and impersonating customer service, account for more than 70%. New fraud techniques are constantly evolving and upgrading with the emergence of new technologies, new applications and new business forms.
Recently, Nanning police reported several typical cases to remind citizens to be vigilant and avoid being cheated. In these cases, the lawless elements pretended to be “Taobao customer service”, “credit officer”, “public security officer” and other identities to defraud the victims of trust and further implement fraud.
In addition, fraud by pretending to be an acquaintance or a leader by telephone, “cancellation of loan account” fraud, express receipt fraud and other criminal techniques are common. Wechat, which is most commonly used in our daily life, has become a high incidence area of fraud.
The police reminded that the common wechat fraud routines include purchasing fraud, “cloning” Avatar fraud, QR code fraud, Bill swiping fraud, like fraud, “love transfer” fraud, etc., which are impossible to prevent.
Take multiple measures to crack down on Telecom fraud
In fact, at present, China has formulated laws and regulations such as the network security law, the provisions on the protection of personal information of Telecom and Internet users, and the provisions on the management of information services for mobile Internet applications, so as to continuously tighten the personal information protection network.
As the competent department of the telecommunications industry, the Ministry of industry and information technology has always attached great importance to the protection of personal user information in the telecommunications and Internet fields, and has taken the initiative to perform its duties in accordance with the law. In accordance with the working mechanism of “discovery, evidence collection, disposal and exposure”, the Ministry has strengthened supervision and inspection, focusing on the infringement of users’ rights and interests by app, which is highly concerned by the society.
Since 2019, the Ministry of industry and information technology has carried out special rectification actions against app infringement on users’ rights and interests for two consecutive years, focusing on four aspects and ten categories of problems, including app illegal collection and use of personal information and deception and misleading users to download. By March, 2021, the company had completed the technical testing of 730000 apps, issued 12 consecutive batches of external circulars, ordered 3046 illegal apps to be rectified, and removed 179 apps that refused to be rectified.
In june2020, the Ministry of industry and information technology issued the notice of the Ministry of industry and information technology on strengthening the business management of call centers, which deployed to further strengthen the remediation of harassing calls, strictly regulate the business behavior of call center enterprises, and eliminate the problems of harassing people by harassing calls. The notice on accelerating the development of 5g issued by the Ministry of industry and information technology also clearly stated that while promoting the development of 5g, efforts should be made to build a 5g security system.
At the same time, relevant enterprises and institutions also actively use new technologies and methods to strengthen the review of illegal and criminal information, participate in the prevention of telecommunications fraud, and help protect users’ personal information.
China Unicom disclosed that it has intercepted 17million fraud or harassment calls and 107million spam messages every month through the big data fraud prevention system.
According to oppo, in 2020, the oppo software store reviewed over 1million times that apps were put on the shelves and updated, intercepted about 350000 risky apps, and insisted on controlling the safety and quality of apps from the source. Meanwhile, oppo has established a full link privacy security protection system of “hardware security, system security, network and communication security, application security and data security”, which has the functions of pseudo base station interception, permission recording, payment protection, privacy surrogate, private safe, website security monitoring, background recording and photographing prevention, etc. In the past year, the oppo security team has intercepted more than 300billion attacks, which is equivalent to resisting 9500 attacks per second, attacking more than 500 black and gray apps, and comprehensively protecting user privacy and data asset security.
At present, most domestic mobile phones have the functions of pseudo base station interception and website security monitoring.
Pay close attention to the joint management, prevention and treatment, and crack down on Telecom fraud
In recent years, China has paid more and more attention to the protection of citizens’ personal information, and various departments have continuously strengthened the crackdown on violations of laws and regulations, and achieved remarkable results.
Of course, the top-level design is just the beginning of personal information protection. To further form a consensus and standardize management in the whole society, it is inseparable from the efforts of law enforcement departments, enterprises and the participation of each user.
Relevant security experts said that when using mobile phones, we should always be highly vigilant about personal information and not give illegal elements and organizations an opportunity. Expert advice:
1. Do not randomly click on suspicious advertisements, text messages, QR codes, and do not easily download and install apps of unknown origin.
2. Don’t easily connect to WiFi without a password. You should see the name of the WiFi hotspot before using it.
3. It is recommended to turn off the wireless connection function and Bluetooth function of your mobile phone when you are not surfing the Internet for a long time.
4. Strictly manage the application permission, and be vigilant about the permission call involving personal private information such as address book, photo album and location.
5. Buy mobile phones through regular channels and choose regular mobile phone after-sales service points to repair, so as to avoid criminals from installing malware through the circulation link.
6. Android phones have many functions such as file encryption and secret file library. It is best to encrypt and save private data, and it is not easy to send private information.
7. Do not hand over the smart phone to others for safekeeping and use. Necessary tests should be carried out after the phone is recovered or repaired.
8. Do not use the mobile phone as a password logbook, and do not store sensitive information such as ID number, address and bank card number in the mobile phone. Once the mobile phone is lost or infected with a virus, it will face the risk of disclosure.
9. When replacing the mobile phone, try to destroy the private files and information in the old mobile phone and restore the factory settings.
10. Once it is found that the mobile phone traffic is abnormal or suspicious applications upload privacy data, it is necessary to timely turn to the regular after-sales service provider.