Font Size: a A A

Of Telecommunications Fraud

Posted on:2014-07-01Degree:MasterType:Thesis
Country:ChinaCandidate:L LinFull Text:PDF
GTID:2266330392962576Subject:Law
Abstract/Summary:PDF Full Text Request
With the development of science and technology as well as the reforms andopening to the outside world, the types and means of crime nowadays appear to berenovating unceasingly and the high-tech crimes are occurring frequently. Thenumber of crime against property, defrauding victims of their money throughphone calls, texting and internet transaction is increasing recently in bigger andbigger sums, accompanied with some new characteristics such as transnationalnature of the crimes. This all led to difficulty in cracking cases for the publicsecurity department. Although the public security department has beenintensifying the power to suppress these types of crimes in response to the rapidexpansion of the telecom fraud cases, and special enforcement actions have beenpromulgated, it still did not stop the criminals’ rampage under the lure of majorprofits. People suffered a great deal from these crimes and it is obvious that it hasgrave social harm too. Thus combating and preventing telecom fraud at source is apractical problem to be solved urgently. This thesis explores and analyzes thetypes, features and difficulties that the Public Safety Department is facing duringdetection of telecom fraud cases in practical work, and puts forward a certainamount of suggestions for prevention which is hoped to play an active role infighting telecom fraud, raising detection rate and prevent such crimes with allwalks of society.The preface sets forth the current situation of telecom crimes, gives thebackground of the topic selection, defines the concept, clarifies the legislativebasis of telecom fraud crime and explains practical significance of launching ananti-fraud study towards this specific type of crime. This thesis is comprised offour chapters. The author discussed in the first chapter the common forms andcauses of telecom fraud crimes based on her experience working at110emergencyservice and advice from coworkers at the frontline. She also differentiateddifferent forms of telecom frauds and illustrated with examples, analyzed thecausation of the long-lasting nature of the crime to provide foundation for furtherstudy. The second chapter describes the features of the crime. It developed adeeper and more thorough understanding of the crime by expounding on theprofessionalism, collectivization, technicalization, intelligentization anddiversification of the subject of crime as well as the lack of regulation andsupervision of the government. The third chapter not only pointed out the focus and difficulty of detection, but also led to the discussion of the measures that canbe taken. The concealed nature of the crime and the lack of time requirement aswell as the rise of the transnational telecom crimes and the time consuming natureof the proof procure procedure, make it even harder to tackle the crime. The fourthchapter proposed possible solutions and suggestions of prevention for solving thesocial supervision and investigation problems. Specifically, enhance the telecomfraud awareness, improve the legislation, strengthen supervision over such crimesand establish regional and international cooperation in police affairs are keymeasures.
Keywords/Search Tags:Telecom Fraud, Detection, Prevention, Mechanism
PDF Full Text Request
Related items