logobeta
본 영문본은 리걸엔진의 AI 번역 엔진으로 번역되었습니다. 수정이 필요한 부분이 있는 경우 피드백 부탁드립니다.
텍스트 조절
arrow
arrow
(영문) 부산지방법원 2014.05.26 2014고단953
절도등
Text

A defendant shall be punished by imprisonment for four months.

However, the execution of the above punishment shall be suspended for one year from the date this judgment becomes final and conclusive.

Reasons

Punishment of the crime

On January 9, 2014, the Defendant was sentenced to a suspended sentence of one year in the Busan District Court for fraud by using computers, etc., and was sentenced to a suspended sentence of two years on the 17th of the same month.

The Defendant, while living together while making soup without a certain occupation, stolen another's mobile phone device available for access to the Internet game, and then arbitrarily purchased the game items, etc. and raised money for living expenses or entertainment expenses.

1. At around 18:00 on May 20, 2013, the Defendant stolen the amount of KRW 700,000 on the part of the victim’s smartphone market value owned by the victim who was in the calculation unit using the gaps in which the victim’s surveillance was neglected, at the D restaurant operated by the victim C in Suwon-gu, Busan.

2. The Defendant had access to a stolen smartphone with “E”, which was an Internet display box, and had arbitrarily downloaded the F’s game using a stolen smartphone at a place where the location of the same day is unknown, and had access to the said game by entering his ID and password into the said game.

After the game was carried out, the Defendant entered the certification number shown on the screen in purchasing various game money equivalent to 5,00 won which can be purchased for the game, and made it settled at the mobile phone fee.

From May 22, 2013 to May 22, 2013, the Defendant acquired financial benefits equivalent to KRW 686,700,000 in total by inputting information without authority into the victim’s cell phone machine, the data processing unit, as shown in the attached crime list, including obtaining pecuniary benefits by accessing the Internet with the stolen cell phone machine and inputting information without authority.

Summary of Evidence

1. Defendant's legal statement;

1. Statement to C by the police;

1. Details of transactions;

1. Previous convictions in judgment: criminal records and references;

arrow