■ Impersonating social security, health insurance, banking, telecommunications and other staff. In the name of social security card, medical insurance card, bank card consumption, deduction of annual fee, password leakage, cable TV arrears, telephone arrears, in the name of their own information leakage, being used by others to engage in crime, in order to give the bank card upgraded, capital verification to prove innocence, to provide the so-called security account, luring the victim to remit the funds to the account designated by the suspect.
■Posing as public prosecutors, law enforcement and postal workers. The court has a subpoena, drugs in the mailbag, suspected of crime, money laundering, etc., to subpoena, arrest, as well as the freezing of deposits in the name of the victim to intimidate, to the proof of innocence of the capital test, to provide a safe account for the verification of the capital, luring the victim will be the funds remitted to the account specified by the suspects.
■Fraud by selling cheap airplane and train tickets and contraband goods. Suspects to sell cheap smuggled cars, plane tickets, train tickets and firearms and ammunition, Ecstasy, bugging equipment and other prohibited items, the use of cheap and curious psychology, luring the victim to call to consult, and then to pay the deposit, shipping costs, etc. to carry out fraud.
■Posing as an acquaintance to commit fraud. Suspects posing as the victim's acquaintances or leaders, on the phone to let the victim guess who he is, when the victim reported the name of an acquaintance that is recognized, lied that will come to visit the victim. The next day, and then call to make up for gambling, prostitution, drugs and other public security organs were seized, or a car accident, sick and other urgent need for money as a reason to borrow money from the victim and inform the remittance account, to achieve the purpose of fraud.
■ The use of jackpot fraud. The way is mainly divided into three. ① pre-printed in large quantities of beautifully fake winning scratch cards, sent by mail or hired delivery; ② sent by cell phone text messages; ③ sent through the Internet. Once the victim and the suspect contact prize redemption, the other side that the first remittance "personal income tax", "notary fees", "transfer fees" and other reasons to require the victim to remit, to achieve fraudulent The purpose.
■Use of unsecured loans for fraud. Suspects to "my company in the city for the shortage of funds to provide loans, interest rate of 3% per month, no guarantee, please call the manager of so-and-so", some enterprises and individuals in urgent need of working capital, unsecured loans to lure hooks, the suspects to prepaid interest in the name of fraud.
■ The use of false advertising information fraud. The suspects send out enticing false advertisements in various forms to engage in fraudulent activities.
■ The use of high-paying recruitment fraud. The suspects sent information through the group to recruit high-paying "Mr. PR", "special escort" as a front, that the victim has passed the interview, to the designated account remittance of a certain training, clothing and other costs can work. The company's website is a great place to find out more about the company's services, and it's a great place to learn more about the company.
■ Fictitious car, housing, education tax rebate fraud. The information content of the State Administration of Taxation on the automobile, housing, education tax policy adjustments, your car, housing, children can go to school for tax rebates. Once the victim and the suspect contact, often in the case of the unknown, the other party under various pretexts to lure to the ATM machine to implement the English interface transfer operation, the deposit will be sent to the suspect designated account.
■Using bank card spending for fraud. Suspects through the cell phone text message to remind cell phone users, said the user bank card has just been in a certain place (such as a certain department store, a certain hotel) card consumption of so-and-so so-and-so yuan, etc., if there is any doubt, you can call so-and-so so-and-so consulting, and to provide the relevant telephone number forwarding service. After the victim called back, the suspect pretended to be a bank customer service center and the Public Security Bureau of the Financial Crimes Investigation Section of the name of the bank card was copied and stolen, the use of the victim's panic mentality, the victim was asked to go to the bank's ATM machine to enter the operation of the English interface, the so-called upgrading, encryption operations, and gradually introduce the victim into the "transfer trap
■Posing as a triad extortion to implement fraud. Unlawful elements posing as the "Northeast Triad", "killer" and other names to cell phone users to call, send text messages to seek revenge on behalf of others, to break your legs, want you to life and other threatening tone, so that the victim is afraid, and then put forward I see you as a good person, righteousness, take the money to eliminate disasters and so on forcing the victim to its designated account. The victim is forced to send money to the account specified by the victim.
■ Fictitious kidnapping, car accident fraud. Suspects falsely claimed that the victim's loved ones were kidnapped or car accident, and an accomplice in the side pretending that the victim's loved ones crying out for help, asking for ransom, the victim was panicked and deceived.
■Use of remittance information for fraud. Suspects in the name of the victim's children, landlords, debtors, business customers to send: my original bank card is lost, waiting for money urgently, please quickly remit to the account number so-and-so so-and-so", the victim did not screen, the result was cheated.
■ The use of false lottery information fraud. Suspects to provide lottery insider in the name of taking the form of fraudulent membership fees to engage in fraud.
■Using false stock information to commit fraud. Suspects in the name of a securities company through the Internet, telephone, SMS and other ways to disseminate false stock insider information and trends, and even produce false web pages to provide funds to speculate on dividends or on behalf of the speculation in the name of the stock, to deceive the shareholders will be transferred to their accounts to implement fraud.
■ QQ chat posing as a friend borrowing fraud. Suspects through the planting of Trojan horses and other hacking means, theft of other people QQ, beforehand on the intention and QQ user video chat, access to the user's video information, in the implementation of fraud play the pre-recorded video of the use of people to gain trust. The user's QQ friends to send a request for borrowing information, respectively, fraud.
■ Fictitious heavy gold for children, matchmaking and other fraud. Suspects to post small advertisements, text messages, in small newspapers and other media published beautiful rich woman recruiting, heavy money for children, marriage introduction and other false information, in the name of payment of notary fees, interview fees, introduction fees, buy flower baskets, etc., so that the victim to the account provided by remittance, to achieve the purpose of fraud.
■Superstition fraud. Suspects are generally outsiders and locals play the role of doctors, monks, fairy children, etc., in the morning market, building groups of morning exercise to identify single elderly women, deceiving the victim, saying that their homes have disasters, close relatives have difficulties, with a variety of frightening claims to break the psychological defense of the victim, so that the victim to come up with the money to "eliminate disasters" or to do "legal affairs", waiting for the opportunity to transfer the implementation of fraud.
■ luring the victim to install the so-called "crime wanted tracking system", "online inventory system" "to protect the account security" and other software to wash away the "suspicion of crime". The "crime suspicion". Through customized TeamViewer remote control software, once downloaded and used in accordance with the instructions of the fraudster, the computer will fall into the "broiler", criminals can take advantage of the opportunity to hijack the Internet banking, remote control of the computer to transfer operations, to achieve the purpose of fraud.