Position: Home page » Virtual » Xi'an cracked the case of network hacker stealing virtual cur

Xi'an cracked the case of network hacker stealing virtual cur

Publish: 2021-04-15 16:00:10
1. It's broken. You must be careful. As long as you say something online, it's basically deceptive. You can find some information type websites. It's very easy to find blockchain information type websites. You can go online to "blockchain network", and there are at least thousands of information stations like "blockchain XX network" in China. No, let's go online.
2.

learned from the Xi'an Municipal Public Security Bureau's opening branch recently that the "3. 30" network hacker theft virtual currency case was broken down nearly half a year, and 3 suspect suspects were all arrested. The initial investigation found that the gang involved in the case reached 600 million yuan. p>

on March 30, 2018, the economic development branch of Xi'an Public Security Bureau received an alarm from the victim Zhang, claiming that his personal computer was suspected to have been illegally intruded, and a large number of virtual currencies such as bitcoin and Ethereum were looted, with a market value of over 100 million yuan. The Municipal Public Security Bureau quickly set up a special group to carry out the detection work

has been examined by the 3 suspects as hacker. Many illegal gains have been obtained through illegal invasion, control of company's enterprise and personal network system, and the amount of suspect involved has reached 600 million yuan. At present, the case is still under further investigation

3. According to the criminal law of our country, stealing public and private property secretly for the purpose of illegal possession constitutes larceny. Although the form of stealing virtual money or virtual property is different from stealing traditional public and private property, virtual money or property is intangible, but it exists in a special online game environment. It really exists and has the value and circulation characteristics of traditional property. It has the basic property of property, and also has "use value" and "value", It can be regarded as a special conversion form of real money, and its inherent nature fully conforms to the "public and private property" protected by the criminal law. It should also be regarded as the "property" in the sense of criminal law, which should be protected by law. Therefore, stealing other people's virtual property secretly can be convicted and punished according to the provisions of the criminal law on theft. Of course, some experts once advocated that it should be defined as the crime of destroying computer information system, but the judicial circle, especially the court, which has the judicial power of conviction and sentencing, believes that the essence of such behavior is to secretly steal the network virtual property and then possess or resell it to obtain illegal benefits, which is a kind of secret theft of other people's property based on the intention of illegal possession, The criminal responsibility should be investigated for theft. In recent two years, courts in Henan, Beijing, Guangdong, Liaoning and Sichuan have tried to commit such crimes, and have made a guilty verdict on the suspect. In April 2009, Zhang Jin and others used hacker technology to steal online game coins and sell them online for profit. After being tried by Jiulongpo District Court of Chongqing, Zhang Jin was sentenced to 10 years and 6 months' imprisonment for theft.
4. Due to the lack of legal provisions, the handling of the theft of virtual property, which is different from the real theft, is very inconsistent in different places: some public security organs do not file a case, some impose a warning, fine or public security detention on the perpetrator in accordance with the relevant provisions of the regulations on the security protection of computer information systems and the administrative measures for the security protection of computer information network international networking; Some courts have convicted and sentenced the defendant for theft, while others think that this is not in line with the principle of a legally prescribed punishment for a specified crime. Because the virtual property such as q-coin has not been regarded as a property right in law, they have sentenced the defendant to the crime of obstructing the freedom of communication. Different courts have ruled that in online games, many game masters can sell these game coins after earning a lot of game coins. This also includes some network hackers who steal the QQ number and then the QQ coin bound with the QQ number. These people often change the stolen Q currency into game currency, and then change the game currency into Q currency to launder money, and then sell it for cash
case 1 recently, the court of Jinjiang District of Cheng sentenced Yang Xiaolong, a "cyber thief", to eight months' imprisonment for theft. Yang Xiaolong has repeatedly stolen the virtual currency in seven online game recharge accounts of a company in Cheng, and used the virtual currency to buy game cards to sell money, making an illegal profit of more than 1300 yuan

case 2: in a previous case of QQ number theft decided by Shenzhen intermediate people's court, the prosecutor initiated a public prosecution in accordance with the crime of theft. However, the judge held that QQ number has not been regarded as a property right in China's law, so it did not support the determination of theft and sentenced the defendant to the crime of obstructing freedom of communication
in case 3, ring the two periods of September 29, 2004 and August to October, 2004, many players in the online game "Dahua Xiyou II" (Netease operation) found their equipment stolen one after another. On November 9, 2004, Netease reported the case to the Internet Supervision Department of Guangzhou Public Security Bureau, and the police arrested the suspect while concting offline transactions. On December 25, 2005, Tianhe District Court of Guangzhou city declared him guilty of theft and fined him 5000 yuan. The defendant refused and appealed. At the end of March 2006, the second instance of Guangzhou intermediate people's court decided to reject the appeal and maintain the original judgment
in case 4, from March to July 2005, the defendants Zeng and Yang sold the cracked QQ number to others. The two defendants sold more than 160 QQ numbers and got more than 70000 yuan of stolen money. On November 28, 2005, Shenzhen Nanshan procuratorate sued Zeng and Yang for theft to Shenzhen Nanshan District People's court. Nanshan District People's court held a trial on December 9, 2005, and made a judgment on January 13, 2006. The two defendants were sentenced to six months' detention for the crime of infringing freedom of communication
is virtual property protected by law
no matter Tencent q-coin or Sina u-coin, they are just data symbols used to represent certain goods or services provided by an Internet manufacturer. So far, no bank has been involved in the launch of this "network virtual currency". Because there is some competition between manufacturers, their "network virtual currency" system is often independent of each other. Therefore, "network virtual currency" can not circulate in real society like RMB. In addition, the "network virtual currency" is only a kind of delivery voucher, and almost all manufacturers that launch the "network virtual currency" do not provide the service of "network virtual currency" cashing back. The two-way or even multi-directional circulation is the basis of money being able to act as a general equivalent. The characteristic of "one-way circulation" determines that "network virtual currency" cannot act as a general equivalent. Unless we can freely and legally convert this "delivery voucher" into real cash or electronic currency. Therefore, it is only a virtual property, not a real property, and can not be the object of legal protection in China
online virtual property theft, which is characterized by stealing and selling online game accounts of major online game companies, Tencent QQ coins and game equipment, is expanding and upgrading. This not only seriously damages the legitimate rights and interests of users, but also poses a great threat to the normal operation of Internet enterprises. Therefore, the case of network virtual property theft can be classified as theft, the victim can report the situation to the public security department, but there must be two kinds of proof to file a case: one is that the victim must prove that he really owns the virtual property, the other is that there is evidence to prove that his virtual property is really stolen. If two kinds of proof are available, and the suspect is found, he can be convicted. Because, at present, the National People's Congress has not legislated on this, and this kind of case belongs to special theft, that is, this kind of crime can be punished as theft

there are mainly three views on the legal attribute of network virtual property in the theoretical and judicial circles, namely, the theory of property rights, the theory of intellectual property rights and the theory of creditor's rights. Although the network virtual property is different from the general property, but in my opinion, it is intangible property. Article 75 of China's general principles of civil law clearly stipulates that "citizens' personal property includes citizens' lawful income, houses, savings, daily necessities, cultural relics, books and materials, trees, livestock, means of proction and other lawful property that are permitted by law to be owned by citizens."“ "Other legal property" can be interpreted broadly, and network virtual property such as q-coin and virtual weapons can be classified as "other legal property" because of their basic properties. Citizen's property includes both tangible and intangible. Network virtual property should be one of intangible assets. Q-coin can be purchased directly from game developers, or obtained from the virtual currency market, so it has the property of general commodity. But whether it is creditor's rights or property rights, or intellectual property rights, this issue is the root of the current judicial and academic disputes. Virtual property is a kind of property with legal significance, which should be protected by law. As a kind of intangible property, virtual property has its own unique attributes and characteristics, which is different from the traditional tangible property and intangible property. The protection of virtual property should not be included in the category of real right or creditor's right mechanically, so it is necessary to protect it by separate legislation. The acquisition of virtual property needs to pay the corresponding time, energy and money, which has the characteristics of virtual space, tradability, value and time limit. In the network virtual space and time limit, it reflects the property value of virtual property, and shows the actual material interests in real life. It is precisely because of the transaction and value of the virtual property, as well as the paid nature of the acquisition, that the virtual property has the property nature. On the other hand, virtual property can also be possessed, used, benefited and disposed, and become the object of legal relationship. Therefore, virtual property should be protected by property law. Can theft of virtual property be punished as theft? At present, there are many kinds of currencies in the virtual market, such as Tencent Q currency, internet currency, Netease bubble currency, Sina u currency, Warcraft currency, Paradise currency, Shanda counting, etc. Take Q coin as an example, the number of users provided by Tencent is more than 200 million. Instry insiders estimate that the domestic Internet has a virtual money market scale of several billion yuan per year. Although the virtual currency market has a large scale, but the virtual currency stolen, "Filing" still has no legal basis? Virtual currency itself has no other transaction function, so it can be said that virtual currency is not a property right recognized by law. However, with the unlimited issuance of q-coin and the constant limited consumption of virtual procts, it will lead to the relative surplus of q-coin and the inflation of virtual world. At present, it is urgent to standardize the order of the virtual currency market, instead of blindly "Filing" protection, so that the public feel that the virtual currency is equivalent to RMB. When the network virtual property is stolen and cheated, we can also use the criminal law to punish criminals. At present, the court for the crime of network virtual property, some to be punished by theft, some to violate the freedom of communication to be punished. One of the reasons for different approaches is the lack of unified qualitative analysis of network virtual property. If we define the network virtual property as a kind of property, these problems can also be effectively solved. For example, some people steal virtual property or cheat for the purpose of illegal possession. If the amount of theft or fraud reaches the standard of "large amount", their behavior can be defined as theft or fraud. Of course, when the actor steals the network virtual property, his intrusion into the computer system and other means may also violate the crime of destroying the computer information system and other crimes. The combination of means and purpose constitutes an implicated crime, which can be dealt with again. What is q-coin Tencent q-coin is a virtual currency that can be paid uniformly on Tencent website. The face values of q-coin are 1 yuan, 2 yuan, 5 yuan, 10 yuan and 20 yuan respectively. For the q-coin obtained by users using the application method of dialing voice call, the expression form of 1 yuan face value q-coin is a 12 digit number string, and the expression form of 2 yuan, 5 yuan, 10 yuan and 20 yuan q-coin is a 14 digit number string starting with 2, 5, 1 and 8 respectively. The applied q-coin can purchase a series of related services on Tencent website, and input the corresponding q-coin amount according to the corresponding prompt when purchasing. At present, q-coin card can be used to apply for QQ bank number, purchase QQ beautiful number, QQ member service, QQ dating, QQ greeting card and other services. According to Tencent, a series of wonderful personalized value-added services will be launched later. Zhao Yiyong (judge of Zhengzhou high tech Instrial Development Zone, master of law): Disputes between players and thieves and between players and operators caused by the theft of virtual property. Once the virtual property is stolen, it is often difficult for users to find the thief, or it is difficult to provide evidence although they can find it. Therefore, once the virtual property is stolen, they often ask the operator for assistance and provide evidence, and most of them directly resort to the court on the ground that the operator does not fulfill its security obligations. From a technical point of view, game operators have the ability to help players save historical data and prevent data loss; From a legal point of view, game operators are also obliged to save historical data, prevent data loss and reproce game data e to charging players. Because the relationship between users and game operators is a service contract, according to the basic principles of China's "contract law", if the user's loss is caused by the game operators' failure to fulfill their ty of care, or major defects in program technology, then the game operators should bear the liability for breach of contract, including compensation for losses, restitution, and continued performance. If the game operator has no fault and the loss is caused by the infringement of a third party, it should directly claim to the infringer
legislation of virtual property protection suggests that in the absence of legislation on virtual property protection in China, network enterprises should apply the form of instry self-discipline to protect the interests of users. At the same time, we should speed up the formulation of relevant legislation or judicial interpretation. The specific measures include: (1) giving virtual property a legal status from the level of judicial interpretation 2 Add criminal legislation to protect computer data 3 Standardize the order of virtual property transactions, and ensure the security of virtual property transactions. It is suggested that the best way to deal with virtual property is through legal means
5. It's illegal to steal mines. If there is a large number of mines, someone will take charge of you and sincerely help you,
6. 1. Close cgminer client 2, change the miner management currency in f2pool to FTC check sign 3, open cgminer client 3.1, and FTC has been excavated
7.

The theft of 14.5 million bitcoins in Jiangxi Province was solved, which caused heated discussion among netizens on the Internet. We all know that the current era is an Internet era, and it is also an era of rapid development. There are many people who want to earn money through illegal means, which is not worth advocating. We also hope that everyone can learn this lesson, suspects will also face very severe punishment

we also hope that this lesson can arouse a wake-up call for everyone. If everyone is like them, they will certainly face the disaster of imprisonment. At the same time, we need to pay attention to the fact that no matter how powerful the hacking technology is, there will still be many hot spots left. After all, it is the body, which cannot be separated from legal sanctions, I also hope that they can learn from this lesson, be a good person in their future life, and never violate the law and discipline. I hope everyone can pay attention to this

8. " It's only 15 to 20 minutes by car and about 40 minutes by bus
9.

1.

2014, Jiangsu Xuzhou March 19th />

2014 March 19th, Xuzhou police jointly with Tencent thunder operation successfully destroyed a "Gang of mobile phone" under the name of "placing orders", and sent a network of theft to the suspect by multiple mobile phone owners. What's more, 37 suspects were arrested in the two provinces. It disintegrates a complete criminal chain of "horse writing, free killing, horse breeding, money laundering and sharing". There were 261 victims in the case, involving more than 20 million yuan

2. Guangzhou "1101- hacker" bank card theft case in May

2014, Guangzhou police successfully cracked a huge case of using hacker technology to steal the bank card, and arrested 11 suspect. After investigation, the gang stole the databases of several websites by means of network intrusion, and tried to log in the obtained data on other websites. After a large number of collisions and comparisons, it illegally obtained millions of personal information and bank card information of citizens. Finally, it made an illegal profit of more than 14 million yuan by selling information, online theft and other criminal means

3. Zhejiang Huzhou "5. 15" fraud SMS case in May, Zhejiang Huzhou police destroyed a gang of fraulent short messages, and arrested 18 suspect suspects. 15. According to the investigation, since 2012, the organizers of the gang have contacted the swindlers to receive the group SMS business, and then sent the task orders to the next family through telephone, network and other channels. The next family has sent hundreds of millions of network SMS such as winning prizes through the group sender, SIM card, computer and other equipment, making an illegal profit of more than 3 million yuan

4. Chongqing SMS interception Trojan theft case in May 27th, Chongqing police cracked a case of using SMS to intercept Trojan horse to implement cyber theft, and cash the stolen money through shopping platform, shopping, filling telephone bill, buying lottery tickets and so on. The 3 suspect was arrested, and two principal offender was a fresh college student. After investigation, the suspect intercepted the Trojan horse to create a fake dating SMS on the love and marriage website, intercepted the online banking verification code through the victim's mobile phone, then modified the password of the online payment application, and finally "cashed out" on the e-commerce platform with the victim's bank card

5. Yangzhou, Jiangsu, "3. 18" fishing theft suspect

2014 in May 30th, Jiangsu Yangzhou police successfully destroyed a renting gang that rented Korean websites to set up phishing sites, stolen victims' chat accounts and passwords, and arrested 6 suspects in Guangdong and Guangxi. According to the investigation, from January to may 2014, the gang sold 180935 groups of Internet chat accounts and passwords illegally stolen to the downstream network fraud criminals, making a profit of more than 1.57 million yuan

In June 2014, Beijing police successfully destroyed a criminal gang that used phishing websites to steal users' credit card information and made profits through swiping, and arrested 31 suspects, including number theft personnel, air ticket agents, fraudsters, etc., involving more than 520 swiping cases. After investigation, the gang released false information through a website platform, lured netizens to log on to phishing websites, and illegally stole netizens' personal information and credit card information; And then collude with the ticket agent to buy and sell tickets through online fast payment. The criminal gang has formed a complete black instrial chain of stealing citizens' personal information and swiping credit cards, involving more than 3 million yuan

7. Ji'nan, Shandong, "1. 15" air passenger information leakage case in June

2014, Shandong Ji'nan police successfully destroyed a criminal suspect using air passenger information fraud, arrested 13 suspects, found out the source of airline ticket information leakage, plugging the security hole. According to the investigation, the criminal gang defrauded more than 30 passengers, involving more than 700000 yuan, by stealing passengers' personal information, reselling information, carrying out fraud, withdrawing money to share stolen goods and other criminal links

Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750