logobeta
본 영문본은 리걸엔진의 AI 번역 엔진으로 번역되었습니다. 수정이 필요한 부분이 있는 경우 피드백 부탁드립니다.
텍스트 조절
arrow
arrow
(영문) 창원지방법원 2016.08.18 2016고단1585
공갈등
Text

Defendant

A Imprisonment of two years, Defendant B’s imprisonment of one year and six months, Defendant C’s imprisonment of one year, Defendant D, E, and F, respectively.

Reasons

Punishment of the crime

[2016 Highest 1585 : Defendants, M, and N have accessed many unspecified men by using mobile phone-based display method, let them download a file containing a malicious code, etc., and let the other man do self-defense, and then have the other man do so, they spread the video to the people of the men by video recording it.

By intimidation, one person raised to commit a crime of "Physical Camping" in order to take money back.

The Defendants, M, and N are in charge of planning, implementation, organization, and management of all the crimes, including cooking staff and staff through education on the crime, the recruitment of staff and staff, the distribution of earnings from the crime, the distribution of meetings, etc. on October 2015, M is in charge of a malicious program used for committing the crime of "Physical Camping", a hard-recording file, video recording program, and a large passbook to be used for committing the crime, around December 27, 2015, and the management of lighting staff and earnings from using computers, etc., and Defendant A takes charge of planning, implementation, organization, and management of the crime, and the role of gathering staff and staff through the law of crime, the recruitment of largephones, and the distribution of profits from the crime, Defendant B takes charge of intimidation’s “intition” through the victim’s contact, Defendant C takes charge of the victim’s obscenity’s obscenity’s obscenity’s obscenity’s obscenity’s obscenity’s obscenity’s obscenity, and Defendant C takes charge of the victim’s 2.

1. Joint crimes committed by the Defendants

(a) Any person who violates the Act on Promotion of Utilization of Information and Communications Network and Information Protection, Etc. (violation, etc. of Information and Communications Network) shall damage, destroy, alter, forge, or interfere with the operation of an information system, data, program, etc. without any justifiable ground (hereinafter referred to

arrow