CCTV 315 Exposure Intelligent Harassment Telephone Industry Chain, China Science and Technology Zhilian Shooting

category:Internet
 CCTV 315 Exposure Intelligent Harassment Telephone Industry Chain, China Science and Technology Zhilian Shooting


According to CCTV Finance and Economics, big data is collected by products developed by Soundtooth Technology Co., Ltd. When the wireless LAN of the users mobile phone is open, it will send a signal to look for wireless network around. When the probe box finds this signal, it can quickly identify the MAC address of the users mobile phone, convert it into IMEI number, and then convert it into mobile phone number. Some companies put such small boxes in shopping malls, supermarkets, convenience stores, office buildings and other places. Without the knowledge of users, they collect personal information. Data are also used in real estate, automobile finance, training and education industries. The party said that high-tech products themselves serve users, but they are used by some illegal enterprises as tools to harass users, pointing to technological crimes, and high-tech should be used in areas beneficial to the people. Source of this article: Liable Editor of Netease Science and Technology Report: Qiao Junjing_NBJ11279

According to CCTV Finance and Economics, big data is collected by products developed by Soundtooth Technology Co., Ltd. When the wireless LAN of the users mobile phone is open, it will send a signal to look for wireless network around. When the probe box finds this signal, it can quickly identify the MAC address of the users mobile phone, convert it into IMEI number, and then convert it into mobile phone number.

Some companies put such small boxes in shopping malls, supermarkets, convenience stores, office buildings and other places. Without the knowledge of users, they collect personal information. Data are also used in real estate, automobile finance, training and education industries.

The party said that high-tech products themselves serve users, but they are used by some illegal enterprises as tools to harass users, pointing to technological crimes, and high-tech should be used in areas beneficial to the people. (Ke Ke)