按Enter到主內容區
:::

電信詐欺犯罪運作歷程及其查緝因應策略之研究

  • 發布日期:
  • 最後更新日期:109-05-13
  • 資料點閱次數:330

中文摘要:

 

自開放第二類電信服務後,詐欺集團開始利用網路節費系統竄改網路電話的來電顯示,經由境外進線的跨國發話模式來傳送詐欺話務,增加話務溯源的挑戰性和偵查作為的困難度。研究者利用文獻探討法及深度訪談法作為主要的研究方法,採用現象學內容分析做基礎性的研究,訪談對象的取樣係運用「立意」抽樣及「滾雪球」抽樣。研究者先從電信詐欺犯罪成員的觀點,選取犯罪者或具電信技術背景之核心工程人員4名作為研究對象,瞭解電信詐欺犯罪成員之背景與募集、數位匯流技術學習與犯罪行為之準備、詐欺集團成員分工方式與犯罪工具之選用、電信詐欺犯罪之機會成本與中止或續行因素;次從偵辦電信詐欺犯罪執法人員的觀點,選取外勤偵查人員和專業技術幕僚8名作為研究對象,探討目前電信詐欺犯罪的通訊路由組合、偵查人員執行通訊監察、話務溯源與個化分析之困境等查緝跨境電信詐欺犯罪之挑戰等問題;再從電信監理機關和電信業者的觀點,選取電信事業主管機關3名和第一/二類電信業者5名作為研究對象,論述行政檢查機制與電信業者管理問題對防制詐欺措施之影響、通信紀錄調閱機制與資料保留問題對刑案偵辦之衝擊、法律規範義務與業者角色衝突對犯罪偵查造成之影響。

此外,電信產業開放競爭後,部份第二類電信業者和網路加值服務業者基於營收考量,間接淪為協助詐欺集團傳送異常話務之共犯。再加上國家通訊傳播委員會囿於電信監理的人力配置和業務負擔落差,無法有效實施行政檢查機制,使詐欺犯罪得以實施。

有關研究者之發現與建議,茲就犯罪行為人、執法機關、電信監理機關等不同面向,分述如後:

一、犯罪行為人方面
研究者發現,犯罪成員基於諸多因素衡量的理性抉擇下,均認為從事電信詐欺犯罪係值回票價之行為,多無中止實施詐欺犯罪之意。因此,關於犯罪行為人的控制/移除策略,研究者從理性選擇理論支派的觀點,以克拉克和科恩的情境犯罪預防策略,依此建議如下:(一)落實犯罪預防宣導,提高全民防詐警覺來增加犯罪阻力。(二)建立身份查證機制和詐欺警示系統,即時通報警察機關來增加犯罪風險。(三)加重詐欺犯罪刑度,增加實施犯罪成本來減少犯罪誘因。(四)淨化媒體報導內容,避免犯罪學習效應來減少犯罪刺激。



二、執法機關方面
研究者發現,犯罪集團應用數位匯流原理,利用網路即時通訊軟體傳遞語音訊息和文字訊息,透過不同通訊路由的排列組合傳送詐欺話務,增加執法人員在通訊監察接取點辨識、話務溯源和個化分析的難度。因此,研究者建議如下:(一)建立跨境攔阻標準作業程序,有效阻斷非法資金流動;擴大跨境警務合作概念,推動全球治理的合作機制來提升執法能量。(二)建構專家偵測系統,偵測攔阻異常話務;發展話務溯源機制,改善個化分析技術;全面輔導第二類電信,建置通訊監察設備來強化偵查技術。(三)養成教育培育專業以提升整體偵查能量;納編電信專業同仁以即時傳遞正確情資來培育專業人才。

三、電信監理機關方面
研究者發現,自從電信產業開放競爭後,第二類電信業者和網路加值服務業者如雨後春筍般的蓬勃發展,部份電信業者基於營收考量,未過濾客源承攬詐欺話務,間接淪為協助詐欺集團傳送異常話務之共犯。因此,研究者將電信監理機關之建議分為短、中、長期等作法,依此建議如下:(一)結合政府部門力量擴大跨境電信監理,找出犯罪高危險群,針對真正的犯罪行為人予以干預,進行矯治與輔導,以避免其再犯。(二)改善行政檢查機制及提高第二類電信監理密度,針對潛在性犯罪人予以早日辨識,以避免犯罪之發生。(三)強化IDC機房電信監理,律定網路業務主管機關並推動網路資料保留專法,針對提供犯罪機會及促使犯罪發生之物理與社會環境因素予以改善,以減少犯罪之發生。

 

英文摘要:

 

Fraudulent organizations have begun to utilize the money saving system on the Internet to change Caller ID and to send fraud calls by offshore calling model, since NCC granted to license Type II telecommunications operators that provided services, and it really does increase the challenge of IP location and the difficulties of investigation. This dissertation was based on the phenomenological content analysis and used the literature review and in-depth interviews to conduct the research. Through purposive sampling and snowball sampling, the scopes of interviewees were chosen from 4 types of groups, which are: criminals, field agents and technical staff members, NCC officers, Type I telecommunications operators and Type II telecommunications operators. Firstly, from criminals' point of view, to analyze the criminal process, to discuss the factors to stop them from committing crime; secondly, from field agents and technical staff members' point of view, to analyze the investigative process of conducting the electronic surveillance, to discuss the difficulties of IP location and the challenge of transnational telecommunications fraud crime-fighting; thirdly, from NCC officers and telecommunications operators' point of view, to analyze the problems of supervising telecommunications mechanism, to discuss the conflicts between obeying legal rules and carrying on telecommunications business.

Since NCC granted to license Type II telecommunications operators that provided services, manpower shortage and work overloaded makes NCC could not conduct the supervising telecommunications mechanism efficiently, what is more, for the reason of profit-making, some Type II telecommunications operators and Internet value-added services providers have become accomplices to help fraudulent organizations sending fraud calls.

The findings and suggestions are divided into three sections as following:

I. For the criminal process
This dissertation shows that the criminal do believe commit a crime is worthwhile based on Rational Choice Theory. Therefore, suggestions to suppress the criminal process are as following: (I) to increase the effort by conducting crime prevention propaganda; (II) to increase the risks by building ID checking mechanism and real-time warning system; (III) to reduce the rewards by rising the criminal charge; (IV) to reduce provocations by purifying society through the mass media.

II. For the investigative strategies
This dissertation shows that fraudulent organizations choose to use the real-time communication software to send fraud calls; it increases the difficulties of identifying the access points and IP location. Therefore, suggestions to improve the investigative strategies are as following: (I) to enhance the energy of law enforcement by promoting transnational police co-operation mechanism; (II) to strengthen the investigative techniques by building detection expert system and developing IP location mechanism; (III) to execute the on-job training by cultivating and incorporating the right man in the right place.

III. For the supervising telecommunications mechanism
This dissertation shows that Type II telecommunications operators and Internet value-added services providers are springing up since NCC granted to license Type II telecommunications operators that provided services, for the reason of running a business, some telecommunications operators choose to stay in the gray area and have gradually become accomplices to help fraudulent organizations sending fraud calls. Therefore, suggestions to strengthen the supervising telecommunications mechanism are as following: (I) to integrate the government departments to enlarge the supervising telecommunications; (II) to strengthen the frequency of Type II telecommunications operators and improving the supervising telecommunications mechanism; (III) to regulate the Internet industry competent authority and prompting the data retention legislation.

 

資料來源: https://hdl.handle.net/11296/xbsezv

回頁首