Hidden in the internet
Wearing an "invisible" mask
A computer with a string of code
A "fully functional" one
Telecom network fraud apps came into being
On the surface is mobile phone software
In fact, it is a tool for telecom network fraud
recently
Dong'anshan Police Station of Qianshan Public Security Bureau
Ms. Wang, a resident of the jurisdiction
Suddenly received one
A call claiming to be from an insurance customer service
The customer service is in an extremely sincere tone
Introduce to Ms. Wang
One of the policies she had purchased was about to expire
If not dealt with in a timely manner, there will be property damage
Faced with this situation
Ms. Wang was skeptical
Under the guidance of customer service
I downloaded an app recommended by the other party
Through this app
The other party can remotely manipulate Ms. Wang's mobile phone
Real-time voice calls are also available
With the so-called "help" of the other side
Ms. Wang remitted more than 10,000 yuan to her
Vanished
Afterwards
Ms. Wang realized that she might have been scammed
went to the police station as soon as possible
According to the situation mentioned by Ms. Wang
The Donganshan Police Station quickly judged
Ms. Wang was the victim of a telecommunications network fraud
And the first time to unite the criminal investigation brigade of the sub-bureau
Jointly carry out case investigation and handling work
With the assistance of the forensic technical detachment of the Municipal Bureau
Police of the Criminal Investigation Brigade of the Sub-Bureau
Take the APP provided by Ms. Wang as a breakthrough
The scam APP is the breakthrough
After a lot of work
Finally figured out the software developer
Su's identity information
subsequently
The sub-bureau quickly activated the multi-police coordination mechanism
Organize police forces to continue the investigation around Su
After it was determined that Su was hiding in Hebei Province
quickly went south to capture Su
"This case involved a lot of specialized software programming knowledge. In order to improve the chain of evidence, our case-handling police will supplement the programming knowledge. ”
In the course of handling the case
The police took the initiative to overcome the knowledge gap
Dig deep into the criminal methods behind Su
Finally, the chain of evidence will be sorted out and improved
In the face of a large body of evidence
Suspect Su
Develop a telecommunications network fraud app against them
And confessed to the act of profiting from it
presently
Suspect Su
Criminal coercive measures have been taken
Further investigation is ongoing
Afterwards
Ms. Wang came to the branch on purpose
There will be a thank you note and a pennant
It was sent to the police
to express your heartfelt gratitude