Text
Defendant
A Imprisonment with prison labor for three years and for eight months, respectively.
Defendant 1 through 57 of seized evidence.
Reasons
Punishment of the crime
Defendant
A, E, F, G, H, I, etc. (each designated number of days on the same day) and the above F, using a forged credit card program, and Defendant A interfered with or opened a credit card merchant to use a forged credit card, and the above H, H, and I interfered with the nominal owner of the credit card merchant to use the forged credit card, and the above G, H, and I shared in advance to share the role of opening a credit card merchant to use a forged credit card under their own name upon request from the above E and share the role of opening a credit card merchant to use a forged credit card under their own name, and then conspired to have the profits by receiving the credit card payment by using the forged credit card under the "Act on the Number of tined Credit Card tin".
1. Defendant A
A. Defendant 1) conspired with the above E and F, etc. in accordance with the aforementioned prior conspiracy, and forged the credit card under the name of “K” in the following manner: (a) with the intent to use the Defendant’s work for the Defendant at the early 1st of July 2015, 2015, in collusion with the said E and F, and with the intent to use it for the JF store in force; (b) with the cellular phone, with a credit card forgery program being implemented; and (c) with a credit card to connect it with the card box; and (d) with a pre-fluor by entering the credit card information purchased from the hacker into the card slip and passing the credit card on the card magic part; and (e) by inputting the above credit card information on the card 18th of the first bank in the name of China, as shown in
2) On July 2015, Defendant 1 conspired with the above E, F, etc. in collusion with the above prior mothers, with the intent to use the Defendant’s work for J member stores, Co., Ltd., the J member stores working for the Defendant in the first place below Canada on July 2015. After implementing a credit card forgery program on the mobile phone, connected it with the carder, and then, connected with the carder, input the personal information purchased from the piracy into the carder, pass through the credit card, and credit card on the Mafic part of the card.