Category
🗞
NewsTranscript
00:00 [Thai News]
00:02 [Thai News]
00:04 [Thai News]
00:06 [Thai News]
00:08 of the citizens. It led to the channel. It made the cyber thieves get into our personal information. More and more citizens are falling victim to cyber thieves. It has caused damage to the economic system.
00:22 million baht. Now, we will talk to the Bank of Thailand about the regulations on how to prevent or solve problems in the matter of cyber thieves. We will open it up in a circle.
00:36 And with us today is Pinyo Tripatcharaporn, the director of the National Bank of Thailand's General Financial Risk Management Team.
00:46 Hello Pinyo. Hello. Hello, Khun Arthiwin. Hello, Khun Vasudha.
00:49 What is the impact of the national bank's financial crisis in the defense of Thai citizens in the cyber threat?
01:01 Yes, I must say that if we talk about cyber threat, we must talk about the way to use or conduct electronic transactions.
01:10 It cannot be ignored that we must do it through mobile phones.
01:14 The current national bank's financial crisis will focus on how to prevent the occurrence of trust in the use of mobile phones or mobile banking safely.
01:23 Starting from the first level, we will see that today, in the process of mobile banking, people can only use one mobile phone to protect themselves from being used by others.
01:35 So, it means that you can use one device. After that, it will be a measure to protect the device itself.
01:42 The bank will notice that if we look at the bank's application, there will be a constant notification to update the new version.
01:48 It will be part of the security system to prevent the application from collecting money or damaging the citizens.
01:59 After that, it will be another measure, such as the scanner itself.
02:04 Because in the process of financial crisis, in addition to having one mobile phone, there must be six pins.
02:10 The main reason is that the pin will recommend that you use a safe pin. Do not use the same pin as other applications because you may be stolen.
02:19 And finally, before scanning, if you do more than 50,000 baht, there will be a security measure to scan the face for another level.
02:26 In addition to announcing the warning to the public, should there be other measures to be added, such as a more intense penalty?
02:34 Now, the penalty, as the Department of Defense has already released, the Department of Defense and the Department of Technology have a clear and intense penalty.
02:45 In this case, there is a penalty of 3 years for opening or selling a horse account.
02:51 And the penalty is 300,000 baht. It is a fairly severe penalty.
02:56 We said that the penalty should be enough, right?
03:01 Yes, yes, yes. The penalty is to use the law to catch the criminal and bring him to justice.
03:11 Mr. Phinyo, we must admit that there are many types of cyberspace. But which one has the most people coming in to learn?
03:21 If it is a cyberspace that has the most number of victims, the first level is the type of buying things that are not available or buying online.
03:36 That is the number of victims. But if we talk about the number of victims, the highest number of victims, it is the type of investment.
03:44 Which is the number one right now.
03:46 And if the people are now victims of cybercrime or cyber thieves, what are the recommendations of the Bank of Thailand to help people solve this problem?
03:58 The first level is that the method of fraud is different.
04:02 If we are deceived into a case where there is a fake application installation, our mobile phone is suddenly frozen.
04:07 And there is a notification from the bank that there is money going out, we must be aware and stop connecting to the criminal.
04:16 Which is easy to do. It may be to turn off the mobile phone signal.
04:20 It may be to remove the SIM card or activate the flight mode or airplane mode to cut the connection.
04:26 After that, we will notify the police or contact the officers to stop the crime.
04:34 According to the situation, the bank can forward the information and stop the crime.
04:41 By being able to stop the crime temporarily, not more than 72 hours.
04:44 So that means that if the victim is found, he can call twice.
04:48 If it's an easy number, call 1441.
04:51 Or the AOC officer to contact the bank to stop the crime.
04:56 Or if it's 1441, there may be a difficult time to contact, you can call the bank's hotline directly.
05:04 Because now every bank has a hotline 24x7 that can receive and stop the crime immediately.
05:12 About fraud, which is currently the most expensive.
05:17 What is the model?
05:19 We must have a point of view that this is definitely a fraud.
05:23 How do we see it?
05:26 In fact, it is easy to observe.
05:28 What really benefits.
05:30 It is easy to notice that suddenly they give 20-30% of the profit.
05:34 Invested a few thousand baht, got money in return.
05:37 As a defendant, it means that it was definitely deceived.
05:40 This can be easily noticed.
05:42 In addition, in the case of fraud, most of them may use a technology called DeFake.
05:47 DeFake means that it may be the face of a famous person.
05:51 Maybe it's a celebrity or a famous investor.
05:55 And then deceive to talk to us.
05:57 It can be easily noticed that if it is a famous person, is he the real owner?
06:03 It may be a way of seeing, saying that it is a real person.
06:07 Or it's a way of using a computer.
06:09 Another point is the point of transferring money.
06:11 When we transfer money, we may have to check the account holder a little.
06:16 Because when we transfer money, we will see who we transfer to.
06:20 If the name of the account is not the same as the person in front of the person we are talking to,
06:24 it can be noticed that it is definitely a fraud.
06:27 Is it true that there is a shared story in the social world that only received a call from a cyber thief?
06:34 If the conversation is not only a short time, it can be withdrawn from the account linked to the bank app on the phone.
06:41 It's not true. This is 100% guaranteed that it won't happen.
06:47 I must say that making a program through the bank app must have at least two main components.
06:53 The first is the mobile phone that I mentioned earlier.
06:56 It must be a mobile phone that has been registered with the bank.
06:59 The mobile phone is in the hands of the account holder.
07:03 The second is that after having a mobile phone, it must open the bank application.
07:07 When the bank application is opened, there must be a pin that we set up.
07:11 There are 6 main pins. This pin is the number that the account holder knows.
07:15 When we have a mobile phone number, we can transfer money.
07:19 But if the transfer is more than 50,000 baht, we must scan the face again.
07:23 These are the 3 main steps that are used to prove yourself and make a money transfer.
07:28 So calling and receiving calls cannot be transferred.
07:31 There are still many SMS cases.
07:37 Have you ever talked to the mobile phone bank?
07:41 SMS has two parts.
07:45 If it is a SMS sent from the bank or from the money transfer,
07:51 we have a clear regulation that the bank or the money transfer
07:55 does not link via SMS or email.
08:00 If there is a SMS sent by the bank and there is a link, it means that it is not from the bank.
08:06 This is a point of note that it does not click.
08:10 SMS from the telecommunications service provider or mobile phone provider
08:16 We have a direct communication.
08:18 We will say that there is an attempt to try to get the name close to the bank,
08:22 try to get the name close to other organizations that will send private information or send fake messages to customers.
08:28 This is the same as the telecommunications service provider or the mobile phone provider.
08:35 This is the same as the telecommunications service provider or the mobile phone provider.
08:38 This is the same as the telecommunications service provider or the mobile phone provider.
08:39 This is the same as the telecommunications service provider or the mobile phone provider.
08:40 This is the same as the telecommunications service provider or the mobile phone provider.
08:41 This is the same as the telecommunications service provider or the mobile phone provider.
08:42 This is the same as the telecommunications service provider or the mobile phone provider.
08:43 This is the same as the telecommunications service provider or the mobile phone provider.
08:44 This is the same as the telecommunications service provider or the mobile phone provider.
08:45 This is the same as the telecommunications service provider or the mobile phone provider.
08:46 This is the same as the telecommunications service provider or the mobile phone provider.
08:47 This is the same as the telecommunications service provider or the mobile phone provider.
09:10 This is the same as the telecommunications service provider or the mobile phone provider.
09:17 This is the same as the telecommunications service provider or the mobile phone provider.
09:18 This is the same as the telecommunications service provider or the mobile phone provider.
09:19 This is the same as the telecommunications service provider or the mobile phone provider.
09:20 This is the same as the telecommunications service provider or the mobile phone provider.
09:21 This is the same as the telecommunications service provider or the mobile phone provider.
09:22 This is the same as the telecommunications service provider or the mobile phone provider.
09:23 This is the same as the telecommunications service provider or the mobile phone provider.
09:24 This is the same as the telecommunications service provider or the mobile phone provider.
09:25 This is the same as the telecommunications service provider or the mobile phone provider.
09:26 This is the same as the telecommunications service provider or the mobile phone provider.
09:27 This is the same as the telecommunications service provider or the mobile phone provider.
09:52 This is the same as the telecommunications service provider or the mobile phone provider.
09:57 This is the same as the telecommunications service provider or the mobile phone provider.
09:58 This is the same as the telecommunications service provider or the mobile phone provider.
09:59 This is the same as the telecommunications service provider or the mobile phone provider.
10:00 This is the same as the telecommunications service provider or the mobile phone provider.
10:01 This is the same as the telecommunications service provider or the mobile phone provider.
10:02 This is the same as the telecommunications service provider or the mobile phone provider.
10:03 This is the same as the telecommunications service provider or the mobile phone provider.
10:04 This is the same as the telecommunications service provider or the mobile phone provider.
10:05 This is the same as the telecommunications service provider or the mobile phone provider.
10:06 This is the same as the telecommunications service provider or the mobile phone provider.
10:07 This is the same as the telecommunications service provider or the mobile phone provider.
10:33 This is the same as the telecommunications service provider or the mobile phone provider.