In 2023, procuratorates across the country will prosecute more than 50,000 people for telecommunicat

Mondo Social Updated on 2024-03-03

Economic Observer Network NewsOn March 3, according to the Supreme People's Procuratorate's WeChat*** news, since the implementation of the Anti-Telecom Network Fraud Law on December 1, 2022, procuratorial organs across the country have adhered to the principle of "handling every case with high quality and efficiency", and worked with relevant departments to crack down on telecommunications network fraud in a strict and full-chain manner in accordance with the law, and effectively safeguard the legitimate rights and interests of the people and social harmony and stability. In 2023, procuratorial organs across the country will prosecute more than 50,000 people for telecommunications network fraud, an increase of more than 60% year-on-year, and help more than 140,000 people commit crimes related to information network criminal activities, an increase of more than 10% year-on-year, and use telecommunications networks to cover up and conceal criminal proceeds and criminal proceeds7More than 50,000 people, an increase of 106 year-on-year9%。

The procuratorate found that the current telecommunications network fraud crimes mainly present the following characteristics:

First, from the perspective of criminal patterns, the characteristics of collectivization are becoming more and more prominent. Overseas criminal groups under the guise of "industrial parks" and "science and technology parks" have formed a huge and stable criminal network of fraud by controlling and managing independent fraud gangs. For example, the Supreme People's Procuratorate and the Ministry of Public Security jointly supervised the case of fraud, illegal detention, extortion, and organizing others to illegally cross the border. Huang Moumou gathered Pan Moumou, Zhong Moumou and others to invest in the construction of "Hardware and Building Materials City" in northern Myanmar, successively recruited more than 20 fraud gangs to settle in, and provided office space and accommodation for the fraud gangs, carried out closed management, and guarded the fraud gang personnel with weapons, forming a super large criminal group of more than 1,000 people.

Second, from the perspective of the people involved in the case, they are young, have low education, and have low income, and some of the victim groups should be concerned. Among the persons prosecuted by the procuratorate for telecommunications network fraud, aiding information network criminal activities, as well as related cover-up and concealment of criminal proceeds and proceeds of crime, 31% are under the age of 25, and 76% have a high school degree or less7% and 53% are unemployed7%。Students in school, recent graduates, and minors have gradually become the targets of criminal groups. Three types of victim groups should be paid attention to: minors, criminals in the name of **game point cards, ** star voting and other characteristics of minors, criminals in the name of **game point cards, ** star voting and other characteristics; For the elderly, criminals often defraud the elderly in the name of investing in the pension industry, selling collectibles or health care products, and providing diagnosis and treatment services for the elderly; "Stay-at-home mothers", criminals take advantage of the psychology of "stay-at-home mothers" who have no fixed income and are eager to find part-time jobs on the Internet, and carry out fraud in the name of introducing jobs and charging referral fees and entry fees.

Third, from the perspective of criminal means, new Internet technologies have been widely used. In recent years, the criminal methods of telecommunication network fraud have been constantly renovated, including rebates, false investment and financial management, fake shopping services, fraudulent charging business logistics customer service, false credit fraud, etc., which are endlessly emerging and more deceptive. In the process of committing telecommunication network fraud, criminals often use Internet technologies such as "deep fakes", which not only reduces the cost of crime, but also makes it more hidden. For example, criminals use facial tampering and voice forgery techniques to impersonate the victim's trusted person to send**, synthesize voice calls, etc. to commit fraud. In terms of money laundering methods, at present, funds are mainly transferred through underground banks, "running points" platforms and virtual currency transactions, which are difficult to supervise, and the transfer channels of funds are intertwined, making it difficult to trace back, resulting in greater difficulty in recovering stolen goods and losses.

Procuratorial organs persist in actively performing their duties in accordance with the law, vigorously curbing the continued high incidence of such crimes, and protecting the safety of the people's property.

The first is to punish the crime of telecommunications network fraud in the whole chain. In response to the high incidence of fraud committed by overseas telecommunications network fraud criminal groups against domestic residents, persist in severely cracking down on cross-border telecommunications network fraud in accordance with law, as well as serious violent crimes such as illegal detention and intentional injury derived from it. In conjunction with the Ministry of Public Security, it will jointly supervise and handle 3 batches of 13 major cross-border telecommunications network fraud cases, carry out a special operation to crack down on telecommunications network fraud crimes related to northern Myanmar, and assign and supervise the handling of cases involving more than 40,000 "returnees" in northern Myanmar, and make every effort to crack down on gangs, destroy networks, and cut chains. Strictly punish persons who collaborate in crimes in accordance with law, strengthen the punishment of relevant crimes of illegally crossing national (border) borders, and increase the force of the crackdown on crimes that infringe on citizens' personal information, especially illegally obtaining sensitive information such as faces and voiceprints, and using cutting-edge technologies such as AI to forge faces and voiceprints, and obtain other information. Concentrate on cracking down on professional, corporatized, and cross-border underground banks, focusing on cracking down on gangs that purchase and organize other people's bank cards for money laundering gangs, and squeeze the space for money laundering crimes. In conjunction with the Ministry of Public Security and the Supreme Court, strengthen work cohesion and cooperation, carry out the entire process of recovering stolen goods and recovering losses, and protect the people's lawful rights and interests to the greatest extent.

The second is to coordinate and promote the comprehensive management of telecommunications network fraud. Conscientiously implement the public interest litigation duties entrusted by the Anti-Telecommunications Network Fraud Law, and file and handle more than 160 related public interest litigation cases focusing on the protection of personal information in key industries, the management of "two cards", and the performance of enterprises' anti-fraud obligations. Strengthen online judicial protections for minors' rights and interests, and severely punish those who coerce, instigate, entice, or deceive minors into participating in telecommunications network fraud and related crimes. In conjunction with the Ministry of Public Security, the Ministry of Industry and Information Technology, and other departments, we will jointly interview relevant operators and platform enterprises, supervise and strengthen internal risk prevention and control, and consolidate the main responsibility of enterprises. Focus on the social governance loopholes reflected behind the case, draft and issue procuratorial recommendations for social governance, and coordinate with relevant departments to strengthen governance of litigation sources.

The third is to use data empowerment to promote the quality and efficiency of combat governance. Carry out big data legal supervision, develop relevant legal supervision models, and initially produce the effect of "digital empowerment supervision, supervision and governance promotion". For example, the legal supervision model of abnormal ** cards for school students developed by the Procuratorate of Dongsheng District, Ordos City, Inner Mongolia Autonomous Region, through the comparison and investigation of abnormal ** number data held by school students and not necessary for life, urged relevant departments to destroy 2 criminal dens of illegal trading of ** cards, filed 9 criminal cases, cancelled more than 5,500 abnormal ** cards, and closed more than 1,000 abnormal high-risk ** accounts.

Fourth, it is necessary to create a good social atmosphere for the whole people to fight fraud. Publish to the public the work of the procuratorial organs to combat and govern telecommunications network fraud and related crimes, as well as typical cases, and jointly produce a series of anti-fraud propaganda films with CCTV, demonstrating the determination of the procuratorial organs to severely punish them in accordance with the law, and promoting the creation of a strong atmosphere for the whole people to fight fraud.

Related Pages