Font Size: a A A

Research On The Prevention And Control Of "Pig-butchering Scam" Telecom Network Fraud Crime

Posted on:2024-07-02Degree:MasterType:Thesis
Country:ChinaCandidate:Y M ZhangFull Text:PDF
GTID:2556307043451674Subject:Law
Abstract/Summary:PDF Full Text Request
With the development of Internet technology,telecom network fraud also emerged.During the ten years,the forms of telecom network fraud are constantly update and various deceptions APPeared.The most representative fraud is called "Pig-butchering scam".The telecom network fraud of "Pig-butchering scam" is aim at specific groups,which gain the trust of the victim to conduct via the network or other modes,At present,this fraud is one of the most serious telecom network fraud crimes,which has the characteristics of long duration,large amount of moneyinvolved and generation of a large number of black products,resulting in serious infringement of people’s life and property safety.This affects the Internet security order,social harmony and stability becoming a major social cancer.Based on the characteristics of "Pig-butchering scam" rapid evolution,this paper firstly starts to study the most popular and most harmful form of "Pig-butchering scam" fraud,then introduces the origin and development process of "Pig-butchering scam".With the empirical research,case study method,this paper analyzed the internal structure of telecom network fraud crime "Pig-butchering scam",involved personnel,legal regulation and so on.Subsequently,analysis of the cause and the investigation of "Pig-butchering scam" existence predicament were proposed,eventually targeted practical prevention and control measures are put forward to response the new type of telecommunications network fraud "Pig-butchering scam"."Pig-butchering scam" telecom network fraud has non-contact and concealment,criminal groups have a strong sense of anti-reconnaissance,and most of the cross-border fraud.This leads to the fight against "Pig-butchering scam" telecom network fraud exists many difficulties.By means of empirical analysis,case analysis and literature research,this paper starts from 38 cases of "Pig-butchering scam",analyzes the "Pig-butchering scam" telecom network fraud from inside to outside,studies the internal structure and criminal characteristics of the "Pig-butchering scam" group,and then analyzes the causes of "Pig-butchering scam" telecom network fraud.Then summarize and sort out the difficulties in combating the "Pig-butchering scam" telecom network fraud,and finally put forward targeted prevention and control measures,and strive to achieve active discovery,systematic investigation and overall crackdown on the "Pig-butchering scam" telecom network fraud cases.
Keywords/Search Tags:Internet fraud, “Pig-butchering scam”, counterme asures of control
PDF Full Text Request
Related items