logobeta
본 영문본은 리걸엔진의 AI 번역 엔진으로 번역되었습니다. 수정이 필요한 부분이 있는 경우 피드백 부탁드립니다.
텍스트 조절
arrow
arrow
(영문) 서울중앙지방법원 2018.09.20 2018고단3630
컴퓨터등사용사기등
Text

Defendant

A Imprisonment for three years, Defendant B and C, and Defendant D shall be punished by imprisonment for one year, by eight months, and by imprisonment for Defendant E.

Reasons

Punishment of the crime

[criminal record] Defendant B was sentenced to two years of suspension of execution on April 21, 2017 by the Changwon District Court on October 28, 2016 and was sentenced to two years of suspension of execution on April 21, 2017. Defendant C was sentenced to two years of suspension of execution on May 17, 2017 due to a violation of the Electronic Financial Transactions Act, and was sentenced to two years of suspension of execution on May 25, 2017. Defendant D was sentenced to two years of suspension of execution on May 25, 201, and was sentenced to twelve years of imprisonment on November 14, 2002 as a murder for the remaining crime of murder at the Youngwon District Court Youngwon Branch branch on the part of Youngwon District Court on August 19, 2015.

[Criminal facts]

1. Fraud by Defendant A’s computer, etc.;

A. The name and non-scambling of the outline of the crime and the role sharing (F) together with G, H, etc. (hereinafter referred to as “the name and non-scambling, etc.”), means the total liability for operating a workplace, such as scam and scaming, etc. in Thailand, the Philippines, and China, and the mobile phone hacking via a mobile phone small payment system where I, etc. purchases goods and cancel the purchase of goods by the mobile phone small payment system, knowing that I, etc., a domestic social scam business, is operating as a system that can refund the settlement name and refund account due to different names, and then join the said I’s website by using the personal information of the victims illegally acquired, and then the scam “scam” refers to the scam (Sm) and the scaming (phishing) and the scaming mobile phone hacking using the text of the smartphone that can connect the Internet.

If the address of the web site of the message sent by the hacker is charactered, the malicious code will be subconcepted, and the hacker will operate the smartphone of the victim by remotely.

By taking advantage of the victim's mobile phone certification number, etc., the victim purchased goods through the settlement of mobile phone small amount, and received refund from the registered victims and other persons to the refund account under the name of another person, and the money is the account opened in the J, etc., which is a bitco exchange for money laundering.

arrow