Product classification

聯系電話(huà)
4Home > News Center > Company news >
Loction:Home > News Center > Company news >

5. Communication chaos: why is user information leaked?


 

According to the data, in the first half of the year, the total number of spam messages nationwide was 19.9 billion, and 7 spam messages were received per capita per month; the total number of harassment calls was 39.2 billion, and the average number of harassment calls received was 14 per month. Since September 1, according to the requirements of the Ministry of industry and information technology, the full implementation of the so-called "strictest real name system in the history of mobile phones" has played an important role in curbing the "long-standing difficulty" of telecommunication harassment?
This is an era of no privacy. This is an era of cell phones ringing.
"I filled in a membership card information sheet near the shopping center, and the next day I received a harassment message, consulting the invoice agent." "When I filled out the questionnaire, I used a pseudonym, so after reading the text message, I was very sure that personal information was leaked after filling in the information sheet," Ms. Huang told the 21st century economic report
Not only that, Ms. Huang's friends have been harassed by the phone, and the experience is even more bizarre. "He was just browsing the web without inputting any personal information. As a result, companies related to the website sent him text messages and called him."
Compared with the above two, Ms. Wang's nature of Telecom harassment is even worse, which has constituted fraud. According to reports, Ms. Wang bought a ticket from Guangzhou to Beijing at the official flagship store of Hainan Airlines in Ali in August this year. Unexpectedly, she received a short message one day before the flight took off, informing her of the cancellation of the flight. She needed to call back the 400 phone number prompted by the SMS to change the ticket. The fee for the change was 20 yuan.
"At that time, I was working outside and didn't pay special attention to whether the SMS number belonged to the official. After calling back, the other party knew exactly my name, flight information and ID card number, which made me believe deeply. " Ms. Wang told the 21st century economic reporter. Subsequently, the other party asked Ms. Wang to pay 20 yuan to the designated account number. It was not until Ms. Wang verified the information with the official that she had been cheated.
More worrisome is that similar Telecom harassment is not an individual case, but a common phenomenon. Recently, a mobile phone guard released the report on China's Internet mobile security in the first half of 2015 (hereinafter referred to as the "report") to conduct systematic and professional research and Analysis on six major mobile security issues, such as spam messages and harassment calls. According to the report, as of June 2015, the total number of spam messages in China was 19.9 billion, and 7 spam messages were received per capita per month; the total number of harassment calls was 39.2 billion, and the number of harassing calls received per capita was 4 times per month.
Since September 1, according to the requirements of the Ministry of industry and information technology, known as the "strictest real name system in the history of mobile phones", the operators will stop the users who fail to complete the registration of real name system in time. What is the effect of the introduction of real name system on curbing Telecom harassment? What kind of industry does Telecom harassment constitute? What are the obstacles in the legislation, law enforcement and supervision of Telecom harassment? In the face of Telecom harassment, where should users go?
One question: why is user information leaked?
In fact, with the rapid development of Internet and mobile Internet and the increasing number of Internet users, more than half of Internet users' personal identity information and personal online activity information have been leaked.
In July this year, the 12321 reporting center of China Internet Association (hereinafter referred to as 12321 Reporting Center) released the investigation report 2015 on the protection of the rights and interests of Chinese netizens. According to the report, 78.2% of Internet users' personal identity information has been leaked, including their name, mobile phone number, home address, ID card number, etc.; 63.4% of Internet users' personal online activity information has been leaked, including call records, online shopping records, website browsing traces, etc.; 49.9% of Internet users' personal communication information (instant messaging records, mobile phone messages, etc.) has been leaked.
"At present, the black industry chain (hereinafter referred to as the black industry) has become a market of hundreds of billions, and telecommunication harassment fraud is one of them." Li Ming, who has been engaged in enterprise security for many years, told the 21st century economic report that "a complete industrial chain has been formed in a series of links from data acquisition, data trafficking to harassment."
According to Li Ming, the current market price of real-time data (similar to user information of railway stations and airlines) ranges from 10-20 yuan / piece. Enterprise data can be sold for hundreds of thousands to millions of Yuan depending on its value. There are people calling out to sell data in the QQ group of "black products".
Driven by huge interests, "black industry" practitioners are numerous, and telecom harassment fraud has also formed a set of highly procedural division of labor to avoid investigation and evidence collection. Among them, there are many possibilities of information leakage: the enterprise user data system is invaded by hackers; enterprise "insiders" sell user data; there are malicious software, viruses, Trojans stealing information in users' mobile phones; malicious WiFi intercepts information by ambushing Users may not be aware of the situation, personal information has already been read.
In view of the above-mentioned "flight cancellation" cases, the reporter respectively verified the data system security with ALI travel and Hainan Airlines. Ali travel related personnel told reporters that its data system has been tested by the Security Department of the public security department, while Hainan Airlines said that the company has its own risk prevention in strengthening ticket purchasing channels, and independent security inspection and verification is conducted by a third party company.
"No matter how secure the system is, no matter how strict the management is, as long as interests are driven, people with inquiry authority may have transactions with lawbreakers." Li Ming pointed out, "but it is really difficult to determine which link came out

[返回]