Traditional Culture Encyclopedia - Traditional festivals - Making use of "high-tech" criminal tools to commit crimes.
Making use of "high-tech" criminal tools to commit crimes.
One is to use a copy of the ID card to commit crimes. For example, in June 2006, 5438+ 10, a city public security bureau cracked a loan fraud case. During his tenure as the director of the credit union, the criminal suspect took advantage of his position to violate the loan regulations and fraudulently used copies of other people's ID cards to obtain more than 300 individual small-scale farmers' loans for Liu and other four people, totaling more than 20 million yuan. The investigation found that the real holder of the ID card did not know that his ID card was fraudulently used by others.
The second is to use forged business licenses, government approvals and other copies to commit crimes. At the beginning of 2003, the defendant Hu and others falsely reported the registered capital of150,000 yuan, registered "XX Gezhouba Huaqiang Cement Co., Ltd." in a county industrial and commercial bureau of Henan Province, and obtained a copy of the business license. After the expiration of the business license, they used scanning means to forge the business license to defraud the government for approval, and repeatedly committed contract fraud, with a huge amount, and were sentenced to fixed-term imprisonment by the local court according to law.
The third is the crime of using VAT invoices. VAT invoices are subject to the tax deduction system of "how much is levied and deducted". If taxpayers don't pay taxes according to law at all, but simply rely on fictional facts to deduct taxes by votes, it is equivalent to swallowing taxes from the state treasury. The Economic Information Daily once reported that during the short period from 1994 to 1 month, more than 100 ticket scalpers were seized in Chengdu, Beijing, Shenzhen, Fujian and other places, 3,000 Yu Ben fake invoices and several fake official seals were confiscated, and hundreds of thousands of yuan of illegal money were collected. One is to use SMS to commit crimes. At present, there are 300 million to 400 million mobile phone users in China, and hundreds of billions of text messages are sent every year. Criminals often defraud the other party of "postage" and "personal income tax on prizes" in the name of fictional facts such as "winning prizes" and "low-priced mail-order confiscated goods" or selling black cars, fake tickets and guns. According to the investigation, in April and May, 2004, the police in Fujian Province cracked a total of 55 such cases/kloc-0 and arrested 47 suspects/kloc-0.
The second is to use the camera phone to commit crimes. According to the Associated Press reported in May 2004, a man named Jack was accused of voyeurism for taking pictures under a woman's skirt with a camera phone. The man was released after paying $250 million bail. Florida Daily also reported on the incident that thieves used camera phones to steal other people's bank passwords in front of ATMs from June 5438 to February 2004. "Paparazzi" secretly photographed other people's personal privacy, and then posted it online, infringing on the legitimate rights and interests of others.
The third is to use the telephone voice changer to commit crimes. According to the report of Xiamen Daily in June, 2003, the advertisement promoting the telephone voice changer said that "as long as the voice changer is connected to the telephone or mobile phone, the voice can be adjusted at will". Although the advertisement also points out that it is forbidden to abuse, insult others or engage in extortion and other illegal acts, the voice changer has become a criminal tool: a company relies on the telephone and the Internet to conduct cross-regional transactions, and some people use the voice changer to impersonate customers to disrupt transactions and intercept funds. Computer crime refers to the behavior that the actor endangers the security of computer information system through computer operation and other behaviors that seriously endanger society, and should be punished. Compared with traditional crimes, computer network crimes have the following characteristics: a, the crime cost is low, and it spreads rapidly and widely; B, high concealment of criminal means; C, criminal behavior has serious social harm; D, the intelligence of crime is getting higher and higher; E, the subject of crime tends to be younger, the perpetrators are mainly teenagers, and the age is getting lower and lower, and the proportion of teenagers among criminals is getting higher and higher; F the proportion of financial crimes committed through the internet is increasing. This kind of crime is the most complicated:
The first is "online game crime". That is to say, criminals take "phishing" means such as setting up false websites and sending emails containing false information, or use computer viruses and hacking techniques to steal e-commerce accounts and passwords of relevant units and netizens, engage in illegal and criminal activities such as online fraud and theft, or use netizens' weak awareness of prevention, greed for petty gains, or use online games and game equipment to commit fraud and other crimes. For example, on June 5438+ 10, 2005, a fraud case occurred in Anhui province in the name of selling CET-4 and CET-6 English test questions and graduate students online.
The second is to use pinhole cameras to commit crimes. At first, digital cameras were mostly used for instant video conversation by netizens or relatives and friends through the network, and there were many varieties. According to the introduction of "Introduction to Peeping Devices", there are many kinds of peeping devices, among which pinhole camera is the most lethal and concealed one, and it is known as "peeping weapon". This kind of equipment is very popular and has been made public ... People with this hobby dare to try their best to sneak shots of other people's daily life and privacy, and even commit illegal and criminal acts.
The third is to use QQ to commit crimes. In August, 2005, the public security organ of Tengzhou City, Zaozhuang destroyed a four-person theft gang and arrested two suspects, Lu and Liao. Unexpectedly, the contact information of the gang before committing the crime turned out to be QQ, a well-known online chat tool for netizens. According to two people's accounts, four people contacted and committed crimes many times through QQ, and stole many electric cars, bicycles and motorcycles in the urban area.
The fourth is to use the virtual game stored value card to commit crimes. According to the E-commerce Times, the virtual game stored-value card has become the latest money laundering tool on the Internet. Criminals often publish small advertisements in the media in advance to defraud the victim's credit card account, and use this account to directly register and buy "virtual currency" from online commerce companies, and then use these virtual currencies to buy online games, and then sell these games at low prices through the Internet to get cash. At this point, the game stored-value card has completed the task of selling stolen goods and laundering money for gangsters.
The fifth is to use computer viruses to commit crimes. Symantec, a well-known information technology security company, recently released an Internet security threat report, saying that the writers of computer virus programs aim at "authentication theft" to make money, that is, criminals try to cache user information in computers, or take "phishing" attacks, that is, send a large number of fake spam, fake emails and fake websites, steal or defraud users' credit card numbers and bank passwords, and use viruses as tools for financial crimes.
The sixth is to sell crime tools through the Internet. If we just type the word "bug" into a search engine, we can find nearly 800 pages, more than 550,000 pieces and more than 400,000 pieces of sales information in 0.00 1 second. Click on a message and you can see that "special goods" including bugs, locators, credit card replicators, universal lock openers, pens that disappear regularly are publicly sold through links or emails. It seems that many related websites openly sell "criminal tools" through online "practice kiosks" ... In the first case, children are used as criminal tools to commit crimes. Criminals frequently commit crimes such as theft, pickpocketing, robbery and looting against passers-by in busy roads and public places by means of coaxing, seduction and instigation, taking advantage of the characteristics of children's short stature, flexible action and easy training and the victim's neglect of prevention. This new type of crime has strong concealment, the behind-the-scenes manipulator and commander are not easy to be found, and it has a bad influence on social security.
The second situation is to use beggars as criminal tools to commit crimes. This kind of crime is basically similar to the first case.
The third situation is the use of "human bombs" to commit crimes. After the "9. 1 1" incident, terrorists are always ready to "defend the dignity of the motherland with flesh and blood" and use people's bodies to carry bombs and detonate them at designated places to achieve the goal of blowing up the target.
The fourth case is the crime of using the human body to carry drugs. Drug traffickers gradually take drugs or drug-making materials out of the country by sewing bound clothes, sticking them on the body surface and swallowing them, stuffing them through the anus and then discharging them.
The fifth situation is that men commit rape. The crime of male rape is often manifested by criminals taking coercive measures such as beating and forcibly having sex with women.
The sixth situation is that women commit rape. This crime is that women help men commit rape.
- Related articles
- I'm not sure if I'm going to be able to do that.
- What is a tea pet?
- Cultivation of innovative practical ability of college students of traditional Chinese medicine
- The origin of the custom of eating jiaozi in New Year.
- Ching Ming Clay Work
- Inventory of non-woven environmental protection bag production enterprises
- Top ten Liaocheng food list
- How to control the humidity in the greenhouse?
- What is the meaning of semi-oily smoke ink block?
- What are the traditional virtues of oriental women?