logobeta
본 영문본은 리걸엔진의 AI 번역 엔진으로 번역되었습니다. 수정이 필요한 부분이 있는 경우 피드백 부탁드립니다.
텍스트 조절
arrow
arrow
(영문) 인천지방법원 2016.01.19 2015고단4351
컴퓨터등사용사기
Text

A defendant shall be punished by imprisonment for one year.

Seized evidence 2 or 3 shall be confiscated.

Reasons

Punishment of the crime

The Defendant, along with members of the Financial Services Commission, conspired to transfer money to the account requested by an investigation agency by misrepresenting himself/herself via telephone or Internet, or to commit financial fraud by receiving money through Internet banking, etc. using illegally acquired personal information. The Defendant’s role as a general manager of the Financial Services Commission’s name in ordering the solicitation and delivery of the passbook, withdrawal of the amount of damage, and transfer to China, etc. The Defendant is responsible for the management of the Defendant’s withdrawal of cash from the cash withdrawal to C, and C is responsible for monitoring as to whether to escape from cash withdrawal and delivering the amount of damage received by the Defendant to the entire Chinese book, and then in order to acquire money from the victims by fraud.

According to the above public offering, the name influencing person of the Bosing Fraud Group, using the phone used by the Defendant’s Bosing Fraud Group, transferred KRW 23 million to G’s agricultural bank account in the name of the victim from the agricultural bank account in the name of the victim at around July 7, 2015, with the false statement that “The name influcing is the investigator and prosecutor of the Seoul Central District Public Prosecutor’s Office, and the personal account was used in the case in relation to the case of the Escopic.” by accessing the Fsite, using the No.C. number, password, and OTP number of the victim who was discovered from the victim’s damage.

Accordingly, the defendant acquired financial benefits of 23 million won by making the victim D's information input without authority in collusion with the members of the phishing fraud group, and by making the data processed without authority in the data processing device such as computer.

Summary of Evidence

1...

arrow