Abstract

This paper uses big data analysis to conduct in-depth analysis and research on the investigation countermeasures of the pig-killing dish telecommunication network fraud. This paper takes the case of “piggy bank” as a perspective, starting from analyzing the concept and characteristics of “piggy bank” type network fraud, analyzing the current phenomenon of this type of network fraud crime, and analyzing the current situation of the relevant laws, to explore the judicial situation regarding this type of network fraud crime, and to explore the problems and dilemmas in the judicial determination of such network fraud crimes, the determination of evidence, the determination of principal and accessory in joint crimes, the determination of crime amount, the determination of attempt and attempt form, and the determination of related crimes. Based on the analysis of the problems, the judicial determination process of “piggyback” network fraud is improved in terms of perfecting the evidence determination process, combining the facts of the whole case to determine the joint crime, accurately characterizing the associated criminal acts, regulating the judicial determination rules of the crime amount, and strictly applying the criteria of the circumstances of attempt and completion. This paper explores the forward shift of investigation work, anticipating telecommunication network fraud crimes in advance or the middle of the matter through active investigation, taking technical countermeasures, especially early warning and dissuasion to avoid the occurrence of telecommunication network fraud crimes, and reversing the unfavorable situation of passive investigation in the past. Finally, it focuses on the strategy and innovation points of the use of network investigation methods in telecom fraud crimes and proposes the investigation method of tracing the money chain and information chain along the line and cross-complementing the two lines at the same time according to the characteristics contained in telecom fraud crimes, relying on multiple groups such as public security, hackers, and network volunteers to jointly combat in a variety of network environments.

Highlights

  • With the information technology revolution sweeping up, the digital economy is growing at a geometric rate, and science and technology have penetrated all human production life and social interaction, and people are not bound to the traditional face-to-face communication at all, but more often choose noncontact information exchange [1]

  • While the Internet is enriching people’s lives, Internet technology is being used by criminals, which makes traditional contact crimes decline and noncontact crimes represented by telecommunication network fraud crimes occur frequently

  • When “lending” became the key target of public security authorities, criminals designed new fraudulent ways according to the new needs of society; the “piggy bank” telecom network fraud came into being. e “piggy bank” type network fraud refers to the perpetrator to “love” “dating” and other means to deceive the victim’s trust, with a variety of reasons to induce the victim into the precontrolled false. e victim is lured into gambling and investing on a false website or platform for various reasons and cheats the victim out of money

Read more

Summary

Introduction

With the information technology revolution sweeping up, the digital economy is growing at a geometric rate, and science and technology have penetrated all human production life and social interaction, and people are not bound to the traditional face-to-face communication at all, but more often choose noncontact information exchange [1]. Due to the rapid spread and continuous renovation of online and noncontact fraud, telecommunications network fraud is no longer just an illegal and criminal act but has become a hot spot of social concern and difficulty in governance. Because the crime is characterized by a variety of criminal acts, concealed criminal means, and a long-lasting crime, the effectiveness of the public security authorities in combating and preventing it is not obvious [5] In such an environment, to effectively curb and prevent the continued high incidence of telecommunication network fraud cases, society has made more efforts to strengthen institutional supervision, enhance technical support, and optimize combat effectiveness. Due to the rapid spread and continuous renovation of network-based and noncontact fraud forms, telecommunication network fraud is no longer just an illegal criminal act but has developed into a hot spot of social concern and a difficult point of governance [6]. How to break the current predicament faced by governance from the perspective of actual combat is a topic worth studying

Related Works
Building a Big Data Analytics Model
Result
Indirect Contact and
Gang Collaboration and Cross-Territory Operations
Low Starting Point, “A
Clear and Fine Division of Labor, High Degree of Organization of Criminal
Broad Victim Base
Big Data Analytics Model
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call