按Enter到主內容區
:::

電信詐欺犯罪模式與防制對策之研究─以通訊網路匯流為核心

  • 發布日期:
  • 最後更新日期:109-05-13
  • 資料點閱次數:373

中文摘要:

 

綜觀世界罕見的電信(話)詐欺犯罪類型,源自臺灣地區,蔓延至東北亞(南韓、日本)、中國大陸,甚至於在2009年兩岸簽署「海峽兩岸共同打擊犯罪及司法互助協議」,兩岸警方陸續展開打擊此類犯罪合作後,成效豐碩,但是卻產生犯罪轉移現象,將電信詐騙機房(窩點)移至東南亞國家(泰國、越南、菲律賓、柬埔寨),於2014年開始又出現在南亞(斯里南卡)、中亞(土耳其)、北非(埃及)等地,被害對象也從兩岸人民轉移至華裔較多的澳洲、加拿大與美國等地,究其原因莫過於網路無國界、電信網路匯流(ICT Convergence)、通訊經過網際網路快速傳遞交換等特性,已經從區域性擴展至兩岸竄流,成為跨境犯罪。
本研究的假設是探討前端(或有研究文獻稱之為「第一次中介物」)電信詐騙機房的電信詐騙話務路由著手,尋求有效防制對策。研究方法採以質性與量化並重方式,以臺灣地區司法警察(刑事警察局各外勤大隊、各縣市政府警察局)實務機關自2009年開始,與大陸地區各省公安廳共同破獲電信詐欺案件等官方資料為立意抽樣之樣本,以及刑事警察局165反詐騙諮詢專線統計資料(包括:整體受理案件統計、被害人筆錄、話務進線類型…等)等官方資料分析。電信詐騙集團(窩點)主嫌與具有實務經驗的專家進行質性訪談。最後,臺灣地區刑事警察局各外勤大隊、各縣市政府警察局專責偵辦新型態詐欺犯罪專責隊及科偵組等為抽樣對象,實施問卷調查,以期彙整出針對電信詐欺犯罪偵查與預防的實務經驗與困境,形成有效防制對策。
研究發現:(一)通訊網路匯流的電信詐欺犯罪特性,電信詐騙機房是跨境詐欺犯罪成功關鍵,詐騙話務路由隨著匯流後呈現IP化、雲端虛擬化、跳台層轉化、委外分工細膩化、通訊多元化(Wi-Fi機房、4G+ Wi-Fi機房及洗錢機房)等情形,且有逐漸出現智慧型手機通訊軟體LINE詐騙新手法。(二)整個電信詐騙機房架設關鍵在於系統商協助技術支援。(三)兩岸合作共同打擊跨境電信詐欺犯罪各項專案具有壓制犯罪成效,但是2014年後呈現「犯罪飽和」現象。(四)犯罪者及被害者與各種詐欺犯罪手法具有一定關聯性。(五)受試的反詐騙專責刑事警察人員皆認為:2014年元月份新修正「通訊保障及監察法」對於電信詐欺犯罪偵查有一定程度影響,電信網路匯流趨勢造成電信詐欺犯罪衝擊,增加警政署刑事警察局「165反詐騙諮詢專線」再升級及跨國境司法互助具有偵查與預防效能,制定通訊與網路匯流管制政策法律才能具體有效遏止跨境電信詐欺犯罪。
本文針對電信詐欺犯罪的偵查與預防對策建議:(一)法律層面,建議比照美國立法例,將制定通訊協助執法補充「通訊傳播匯流五法草案」與「通訊保障及監察法」的不足之處。(二)科技層面,推行「建構詐騙感知i165資料庫」,利用大數據觀念,以CDR通聯攔阻電信詐騙話務、立法強制設立NGN國際電話交換中心攔截境外的詐騙電話;研發新科技;強化數位鑑識。(三)商業解決層面,要求系統商販售關鍵器材採「實名制」登記。(四)兩岸與第三國、國際司法互助方案。(五)偵查與預防並重,偵查面建議將科偵組法制化及強化科技偵查器材與技術;預防面採公共衛生三層預防模式。

 

英文摘要:

 

Looking at the world's rare Telecoms type of fraud, from Taiwan, then spread to Northeast Asia (South Korea, Japan), China, and even signed a "cross-strait common fight against crime and mutual legal assistance agreement" in 2009 the two sides, both sides after police began to expand cooperation to combat such crimes, although great achievements, but to produce transfer phenomenon of crime, telecommunications fraud Office (dens) to the Southeast Asian countries (Thailand, Vietnam, Philippines, Cambodia), and even appeared in the beginning of 2014 South Asia (Sri Lanka), Central Asia (Turkey), North Africa (Egypt), etc., the victim also transferred from the object to the Chinese people on both sides are more of Australia, Canada and the United States, reason than the network without borders telecommunications network bus (ICT Convergence), communication through the internet fast transfer characteristic exchange, has expanded from a regional to cross-strait channeling, become cross-border crime.
Hypothesis of this study was to investigate the front end (or literature called "first intermediary") telecommunications fraud traffic routing telecommunications fraud working room, to find effective prevention and control countermeasures. Qualitative research methods adopted to try and quantify the way to Taiwan, the Judicial Police (Criminal Police Brigade of each field, county municipal police) Substantive authorities since 2009, and the mainland provinces of Public Security jointly cracked telecommunications fraud cases, etc. official data for the sample of purposive sampling, as well as 165 criminal Police anti-Fraud Helpline statistics (including: overall statistics accepted the case, the victim record, the line type of traffic ... etc.), official data analysis. Telecommunications fraud syndicate (dens) chief suspect and experts with practical experience of qualitative interviews. Finally, for each field in Taiwan Criminal Police Brigade, county and city governments dedicated police crime investigation new patterns of fraud and dedicated team Division Investigation Unit as the sampling target, implement questionnaire to archive and prevention against telecommunications fraud a criminal investigation practical experience and dilemma, to form an effective control strategy of.
The study found that telecommunications fraud crime characteristics (Ⅰ) communication network convergence, cross-border telecommunications fraud crimes room is the key to success, traffic routing and with fraud after the bus showing IP, cloud virtualization platform layer transformation, outsourcing delicate division of, diversified communications (Wi-Fi room, 4G + Wi-Fi room and laundering room) and other circumstances, and there is the gradual emergence of the smart phone messaging software LINE fraud new tricks. (Ⅱ) the entire telecommunications fraud room key is that the system set up to assist the technical support provider. (Ⅲ) the cross-strait cooperation in combating cross-border telecommunications fraud crime suppression effect of the project has, but in 2014 after showing "criminal saturation" phenomenon. (Ⅳ) the offender and the victim with a variety of scams modus operandi has some relevance. (V) Anti-Fraud dedicated criminal police officers are the subject of thought: new amended in January 2014, "communications security and Surveillance Act" have an impact to a certain extent for telecommunications fraud criminal investigation, a global telecommunications network convergence trend caused by the impact of telecommunications fraud crime, inter-ministerial "Prevention telecommunications fraud Technical Advisory Panel," National Police Criminal Police "165 Anti-Fraud Information Line" and cross-border mutual legal assistance in the investigation and prevention effectiveness have developed ICT policies and laws to specific regulatory convergence to effectively curb cross-border telecommunications fraud crime.
This article Investigation and Prevention Countermeasures against telecommunications fraud a crime, (Ⅰ) the legal level, the proposed legislation will assist the National cf. his criminal investigation procedures Supplementary "National Communications Law (Draft)" deficiencies and "telecommunications security supervision and law" in . (Ⅱ) science and technology level, the implementation of "Construction Fraud perception i165 repository", the use of Big Data concept to CDR Communications arresting wire fraud traffic, legislation to force the establishment of NGN international telephone switching centers to intercept outside telephone fraud; the development of new science and technology; strengthening digit forensics. (Ⅲ) the level of business solutions require system operators to sell key mining equipment "real name" registration. (Ⅳ) the two sides with third countries and international judicial mutual assistance program. (V) the level of both the investigation and prevention, detection surface, it is recommended legalization Division Investigation Unit and strengthen scientific and technological investigative equipment and technologies; the prevention side, picking three public health prevention mode.

 

資料來源: https://hdl.handle.net/11296/3rr4m5

回頁首