전자금융거래법위반등
A defendant shall be punished by imprisonment for not less than one year and six months.
The evidence No. 1658 No. 2, 2658, seized by the District Public Prosecutor's Office, No. 2017.
Punishment of the crime
Except as otherwise expressly provided for in any other Act, no person of the 2017 Highest 3134 shall keep, deliver or distribute any access medium with the intent of using it for a crime or keep, deliver or distribute any access medium with the knowledge that it will be used for a crime, unless otherwise provided for in any other Act.
Nevertheless, around 19:00 on April 25, 2017, the Defendant agreed to receive 20,000 won per unit from a person who was unable to perform his/her name at the Inter-dong-dong-dong-dong-dong-dong-dong-dong-dong-dong-dong-dong-dong-dong-dong-dong-dong-dong 43 and 20,00 won per unit, and kept the physical card in order to receive and deliver the same by transfer from the national bank account (D), the Agricultural Bank account (E), and the F's new bank account (G), the national bank account (H), and the Agricultural Bank account (I), respectively, in awareness that it would be used for the crime.
On January 15, 2017, the Defendant: (a) opened a top door of the victim L, which was parked on the road in JJ in Gyeonggi-si, Gyeonggi-si; and (b) cut off a vehicle 7.20,000 won in total of the market value of the victim L owned in the cargo vehicle; (c) cut off the 20,000 won of the victim L, which was parked on the road; and (d) O, the victim N, who was parked at the same place, opened a top door of the cargo vehicle; (d) opened a 7.20,000 won in total of the market value of the victim L owned in the cargo vehicle; and (e) cut off the O, the victim N, who was parked on the cargo vehicle, owned by the victim N, with a 1,00,000 won in total of the market value of the victim N in the cargo vehicle.
An employee of telecommunications fraud in the name of the 2017 Highest 4432, who produces and disseminates malicious codes to identify the financial transaction information of many unspecified people, and changes the financial information of others, such as a certified certificate and password, using the financial transaction information acquired thereby, in advance.