beta
(영문) 대구지방법원 서부지원 2016.03.10 2015고단2043

컴퓨터등사용사기

Text

The defendant shall be exempted from punishment.

Reasons

Punishment of the crime

【Criminal Records of Crimes】 On January 15, 2016, the Defendant was sentenced to imprisonment for one year and six months with prison labor for the use of computers, etc. in the Daegu District Court Kimcheon support, and the said judgment became final and conclusive on February 3, 2016.

【On May 24, 2015, the Defendant: (a) installed a hacking program on a computer with unspecified persons, and acquired financial information from a large number of unspecified persons, along with C, and then received and divided money by entering the acquired financial information into the computer or any other information processing device; and (b) deposited money into the bank account (E) with D nameless persons; (c) the Defendant: (d) opened a bank account with D nameless persons; and (d) directly withdrawn money with D nameless persons; and (e) collected money from D nameless persons.

The above name winners installed hacking programs at the victim F’s computer at the same place on the same day, in an irregular manner, and caused the victim to open a pop-up shop in the Internet site requiring the installation of access sets and the entry of a security card number, and caused the victim to have the pop-up shop connected the above pop-up shop, and then allowed the victim to enter financial information, such as the account number, password, security card number, etc. of the G account in the name of the husband, and then transferred 720,000 won from the G bank account in the name of the G to the above bank account in the name of D.

After the transfer of money as above, the Defendant was in possession of the money through Kwikset Services from his name in advance.

D The Postal Card of the name bank account of the Korean bank account of the name C was drawn to C, and C withdrawn cash using the above Postal Card.

Accordingly, the defendant, in collusion with name-free boxes or C, input information without authority in a computer or any other information processing device.