Position: Home page » Virtual » Criminal judgment of virtual currency case

Criminal judgment of virtual currency case

Publish: 2021-05-27 01:57:49
1. virtual currency is also converted from RMB
report to the police with evidence in case of fraud

fraud is a criminal case

the police will investigate and screen

in case of fraud, the police will actively solve the case

if the case is solved, the victim's loss will be recovered.
2.

It is not likely that the public security organ will file a case of virtual currency transaction fraud, because the virtual currency transaction fraud generally involves a large number of people, a wide range, a small amount and strong anonymity

it is difficult for the public security organs to collect evidence and arrest, because most of the information of the Chuangshi operation team of the virtual currency scam is not public and there is no way to collect evidence. Maybe the mastermind will become a victim after being arrested

with the popularity of virtual currency, disputes related to it appear frequently. Recently, the people's Court of Futian District in Shenzhen tried a dispute caused by investment in virtual currency. The court reminded that the investment transaction of virtual currency is not protected by law, and investors should keep sober and rational


extended information:

after the judicial organ reviews the criminal cases or civil disputes, it is the beginning stage of litigation activities that the judicial organ decides to list them as litigation cases for investigation or trial. Generally, it includes criminal cases, administrative cases and civil cases

According to the criminal procere law of the people's Republic of China, there are two conditions for filing a case:

1

The criminal responsibility should be investigated according to law. If there are criminal facts, but the law stipulates that criminal responsibility should not be investigated, the case shall not be filed

under any of the following circumstances, no criminal responsibility shall be investigated and no case shall be filed; If the case has been investigated, the case shall be annulled, or no prosecution shall be instituted, or acquitted

(1) if the circumstances are obviously minor and the harm is not great, it is not considered a crime

(2) the time limit for prosecution has expired

(3) exemption from punishment by special amnesty

(4) in the case of criminal law, it is a crime to be told, but it is not told or withdrawn

(5) the defendant has died

(6) other laws and regulations provide for exemption from criminal responsibility

3. 1. Although network virtual currency can not be completely equivalent to money and other traditional property, in specific occasions, the perpetrator can achieve the criminal purpose of illegally obtaining other people's property through the possession of virtual currency. Therefore, the fraud of virtual currency may also endanger the property safety of citizens, legal persons and other organizations, which has considerable social harmfulness and should also be punished as a crime
2, if the public security organs suspect the criminal detention, the procuratorate can not approve the arrest, they should apply for l pending trial. Bail pending trial also goes through the court
the seventy-seventh provision of the criminal procere law stipulates that the people's court, the people's Procuratorate and the public security organ shall not exceed twelve months for the suspect and defendant to be l, and the longest residence shall not exceed six months.
ring the period of l pending trial and residential surveillance, the investigation, prosecution and trial of the case shall not be interrupted. If it is found that criminal responsibility should not be investigated or the term of l pending trial or residential surveillance has expired, the l pending trial or residential surveillance shall be lifted in time. In case of cancellation of l pending trial or residential surveillance, the person who has been led pending trial or residential surveillance and the relevant units shall be informed in time.
4. If the amount of fraud reaches the standard of the crime of fraud, it is a criminal case
according to the interpretation of the Supreme People's court and the Supreme People's Procuratorate on Several Issues concerning the specific application of law in handling criminal cases of fraud, the standard of "large amount" (i.e. filing standard) is to defraud public and private property worth 3000 yuan to 10000 yuan or more. The specific amount of the starting point of punishment is more clearly stipulated in various localities.
5.

According to the news on February 10, 2018, on September 4, 2017, seven ministries and commissions of the people's Republic of China issued the notice on preventing the financing risk of token issuance, which regulates the issuance of tokens. In the notice, the nature of all kinds of tokens and "virtual currency" is clearly defined: it is not issued by the monetary authority, and it has no monetary attributes such as legal compensation and mandatory, It does not have the same legal status as currency and cannot and should not be used as currency in the market. Nevertheless, it is undeniable that all kinds of "virtual currency" still have a certain property value and are part of the property of the holder. So, how to identify the nature of the theft of such tokens

In order to protect the legitimate rights and interests of "virtual token" holders, the author intends to discuss such issues through a relevant news report and relevant cases

stealing bitcoin

recently, a news report said that Haidian police in Beijing cracked a case of destroying computer information system. The suspect Zhong used his administrator's authority to modify the company's computer applications and steal 100 bitcoins. Before he could sell the stolen money, Zhong was arrested by the police. At present, Zhong was detained for the crime of destroying computer information system

it can be seen from the report that the police detained the perpetrator for stealing bitcoin on suspicion of damaging the computer information system. The crime of destroying the computer information system stipulated in Article 286 of the criminal law of our country refers to the act of deleting, modifying, adding or interfering with the functions of the computer information system in violation of the provisions of the state, resulting in the abnormal operation of the computer information system and serious consequences, or deleting, modifying or interfering with the data and application programs stored, processed or transmitted in the computer information system Modifying or adding operations with serious consequences, or deliberately making or spreading destructive programs such as computer viruses, which affect the normal operation of the computer system with serious consequences

In the author's opinion, this crime is one of the crimes of impairing social management order in Chapter 6 of the criminal law, that is, the legal interest protected by this crime is actually the public order of our society, not the property interests of the digital currency holders, which in fact denies the property value of digital currency, It is only protected as a data or system function in a computer system. The author thinks that there is some irrationality in this way

first of all, in the notice on the prevention of bitcoin risk issued in 2013, it is mentioned that bitcoin is not a real currency because it is not issued by the monetary authority and does not have such monetary attributes as legal compensation and compulsion. Bitcoin has four main characteristics: no centralized issuers, limited amount, no geographical restrictions and anonymity. Because it belongs to a specific virtual commodity in nature The notice also clearly mentioned that bitcoin does not have the same legal status as currency and should not be used as currency in the market. However, as a virtual commodity, the property value behind bitcoin cannot be ignored

Secondly, Article 127 of the general provisions of the civil law, which came into effect on October 1 last year, stipulates that if the law has provisions on the protection of data and network virtual property, such provisions shall prevail. Although only the protection of the network virtual property has made the principle provisions, but it can not be denied that this shows our country's attitude towards the protection of the network virtual property. Although there is no special law for the protection of data and network virtual property in China, from the perspective of the general provisions of civil law, it is predicted that there will be relevant legislation in the future

finally, from the relevant cases, we can also see the recognition of the property attribute of virtual currency such as bitcoin in China's judicial practice. In April and may 2013, Liu premeditated to set up a bitcoin trading platform, so he recruited Jin and Huang (both sentenced) to jointly set up a "bitcoin" trading platform. During this period, Liu, Huang, Jin, Jin and the defendant he, in addition to other acts of directly stealing customers' funds, also frequently cashed RMB by selling customers' bitcoins, and transferred 120 bitcoins from the website. Finally, the court convicted and punished the defendant for fraud, and the bitcoin transferred by the defendant was also included in the property loss of the victim. Therefore, from the judicial cases, we can also get the recognition of the property attributes of virtual currency such as bitcoin

based on the above reasons, the author thinks that it may be unreasonable to regulate the theft of virtual currency only as the crime of damaging computer information system. We should face up to the hidden property value and consider the application of the crime of infringing property in China's criminal law. Only in this way can we effectively protect the legitimate rights and property of digital currency holders in China


6.

learned from the Xi'an Municipal Public Security Bureau's opening branch recently that the "3. 30" network hacker theft virtual currency case was broken down nearly half a year, and 3 suspect suspects were all arrested. The initial investigation found that the gang involved in the case reached 600 million yuan. p>

on March 30, 2018, the economic development branch of Xi'an Public Security Bureau received an alarm from the victim Zhang, claiming that his personal computer was suspected to have been illegally intruded, and a large number of virtual currencies such as bitcoin and Ethereum were looted, with a market value of over 100 million yuan. The Municipal Public Security Bureau quickly set up a special group to carry out the detection work

has been examined by the 3 suspects as hacker. Many illegal gains have been obtained through illegal invasion, control of company's enterprise and personal network system, and the amount of suspect involved has reached 600 million yuan. At present, the case is still under further investigation

7. Article 6 of the opinions of the Supreme People's Court on the people's court's trial of loan cases stipulates: "the interest rate of private loan can be appropriately higher than the bank's interest rate, and the people's courts of various regions can grasp it according to the actual situation of their own regions, but the maximum interest rate shall not exceed four times of the bank's similar loan interest rate (including the interest rate principal). If it exceeds this limit, the interest of the excess part shall not be protected. " Therefore, if the loan interest rate agreed by the parties is too high, the court can not support the interest rate agreed by the parties, nor can it calculate and pay the interest at one or four times of the same loan interest rate announced by the people's Bank of China for the same period. Instead, the judge exercises the discretion to determine the interest rate in combination with the local economic situation and the people's living standard. However, according to Article 9 of several opinions of the Supreme People's Court on the people's court's trial of loan cases, "in the case of regular interest free loan between citizens, the lender requires the borrower to pay the overe interest, or the irregular interest free loan fails to be paid after being urged; If the lender requests to pay the interest after the demand, it may calculate the interest with reference to the interest rate of the similar loan of the bank. Generally, it is more appropriate for the determined interest rate to be one time higher than the interest rate of the similar loan of the same period announced by the people's Bank of China, but it must not be more than four times. Therefore, in the trial practice, it is not appropriate to regard the excessive interest agreement as usury and not support the interest request of the parties, and to calculate and pay the interest at one or four times of the interest rate of similar loans in the same period announced by the people's Bank of China. Page 1 of 1
8. Both coin security and fire coin are virtual currency platforms and head platforms. At the same time to provide users with trading, information, mining and other proct services. However, many coin security projects do not have fire coin, they are two platforms.
9. If the virtual currency on the network also has the property attribute (such as it needs to spend a certain amount of RMB to buy or pay a certain amount of labor to get it), it can also be regarded as property. If the virtual currency with property attribute is damaged and reaches a large amount of standard, it can be filed.
10. Cheng police smashed the super large virtual currency; Pig killing dish & quot; How does a fraud Gang cheat< p> Recently, Cheng police beat down the virtual currency fraud Gang, which sounded the alarm for people and made people aware of the power of the current telecom fraud. Let's explore how the telecom fraud is implemented

the technical content of crime means is constantly improving, the crime means are constantly renovated, the telecommunication fraud means follow up the development of science and technology, and the technical content is higher and higher. In the past, we used to mail letters and send fraulent short messages through SMS group senders, but now we use multi-agent or wireless Internet technology to maintain fraulent web pages, use foreign servers to use VoIP network phones, and use & lt; Touzhuan & quot; Technology arbitrarily set the caller ID number, deception is stronger, the ability of anti investigation is also higher. On the other hand, all kinds of scams by criminal syndicates keep up with the hot spots in the society, and the renovation is extremely fast, which makes it impossible to prevent

Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750