当前位置:首页 > technology > Communication service > news > Can not blame the operator completely The most stringent name system can not eliminate telecommunications fraud

Can not blame the operator completely The most stringent name system can not eliminate telecommunications fraud

2016-05-27 09:50:12 Author: Ma Chiu Source:Flying ElephantComment:0  Click:


Recently, news about telecommunication fraud has often been pushed into news headlines. In fact, not only users, but also operators and banking institutions have been involved in the news.
In response to this repeated problem, the Ministry of Industry and Information Technology recently issued a notice requiring all basic telecom companies to ensure that the real-name rate of all telephone users of the enterprise before December 31, 2016 exceeds 95%, and that all telephone users can achieve real-name registration before June 30, 2017. , Overdue users who have not completed registration will be shut down. This is called "the strictest telephone real-name system in history."
At the same time, the Ministry of Industry and Information Technology has also stipulated three verification methods, namely: support for business hall network verification, "identity positive and negative + hand-held positive" network authentication, and three real-name verification methods for image or video online remote verification.
Is the real-name system really able to completely deal with telecom fraud?
Industry experts believe that real-name system is only an important part of curbing telecom fraud, but it cannot completely curb telecom fraud.
Telecom fraud cannot blame operators
Telecommunication fraud refers to criminals making false information, setting up scams, implementing remote and non-contact frauds to victims, and inducing criminals to make money or transfer money to criminals through telephone, internet, and short message. A phone call, or a text message, allows people to "click" to transfer money.
Unbelievable, but many real-life cases are shocking, and many victims sued the operator to court.
Because of voices, 90% of telecommunication frauds are currently implemented through telephone numbers change, and telecom operators are fully capable of intercepting these calls. In terms of legal obligations, the “Telecommunication Regulations” clearly stipulates that telecom operators should Telecommunications users are provided with fast, accurate, safe, convenient and affordable telecommunications services. If the user is harassed by a fake telephone number, the operator is obliged to take responsibility for it.
However, operators have also expressed their misery. “The replacement of stolen bank cards should not be a simple matter for the accountability of telecom operators. Instead, it should be comprehensively analyzed from the public security, banking, and operator links to improve the reliability of payment links as much as possible. Under the condition of ensuring payment convenience, the loopholes in the payment link will be blocked. Here, the bank and online banking that directly involve the money should shoulder sufficient responsibilities, said the insider of the operator.
Similar to what this operator said, an industry insider believes: “Operators provide communication services and charge for communication services. If it is necessary to assume the role of financial services’ gatekeeper”, it is recommended that the Ministry of Industry and Information Technology re-demarcate the service scope of operators and Adjust communication tariffs according to the corresponding responsibilities."
In other words, users, banks, and telecom operators all have responsibilities.
Real-name system does not completely curb telecom fraud
Against the increasing telecommunications fraud, the Ministry of Industry and Information Technology has finally introduced the strictest name system. However, the real name system does not fundamentally solve the problem of telecommunication fraud.
As we all know, telecommunications fraud has formed an industrial chain. "It is impossible to rely on the real name system to completely contain telecommunications fraud." The industry's senior expert Xiang Ligang said, "If you can do a real name system well, you can have a certain effect on the management of telecommunications fraud. Of course, only In the real name system, it is impossible to solve all telecommunication frauds, and cooperation with the management of pseudo base stations, the management of overseas fraudulent calls, and the real-name system can play a good role in the control of telecommunication fraud, and real-name system is very important. If the ring of real-name system is not resolved, it will be difficult for other parties to do a good job."
"If you want to completely curb telecommunication network fraud by real-name system, you can't do it. To fight against real-name system, you must cooperate in many ways. In addition to real-name system, you can also take strict measures to check the access of Internet telephony, and strictly check the connection of overseas calls. Incoming, short message interceptor and sender tracking, bank payment link interception, pseudo base station strike, etc.” Independent telecommunications analysts also hold the same view.
Ma Jihua, an industry expert, said: “There are still a few people who do not have a real name system, and the number of fraudulent calls has not decreased. As long as non-real-name telephone users exist, it is difficult to guarantee the effect of controlling telecom fraud. From this perspective, the full implementation of the telephone Real name system is also a good thing."
“In the long run, the real name system is definitely a good thing for operators. It makes management easier. At the same time, the implementation of real name system will lower the user’s rate of off-grid, as well as the value of big data. But on the real name system, The operator or the Ministry of Industry and Information Technology is not doing well and must cooperate with other parties in the joint promotion.” Ma Jihua added.
Original title: Telecom fraud can not blame the operator The most stringent name system can not eliminate telecommunications fraud from the root
share to: Collection

Topics