Application of Blockchain Technology in Cross-Border Telecommunications Network Fraud to Ensure China’s Judicial Justice

https://doi.org/10.29303/ius.v12i3.1554

Authors

  • Chen Siqi Universiti Kebangsaan Malaysia (UKM), Malaysia
  • Ramalinggam Rajamanickam Universiti Kebangsaan Malaysia
  • Nazura Abdul Manap Universitas Kebangsaan Malaysia
  • Zamre Mohd Zahir Universitas Kebangsaan Malaysia

Keywords:

Blockchain Technology, Cross-border telecommunications network fraud, Decentralization, Electronic Data, Electronic Evidence

Abstract

Cross-border telecommunication fraud involves criminals abroad using network technology to remotely defraud Chinese citizens. China is currently facing more severe problems in combating cross-border telecommunications network fraud, including the easy destruction of electronic evidence during the process of collecting and storing evidence, low investigation efficiency in cross-border judicial cooperation, and the difficulty in tracing stolen money involved in cases located abroad. In order to combat crime and achieve judicial justice, investigators need to use the latest science and technology to improve case handling efficiency, and blockchain technology is exactly what they are paying attention to. Blockchain technology, as an emerging technology, has the characteristics of decentralization and non-tampering, and has unique advantages in the acquisition, storage and circulation of data. Therefore, this article aims to explore the necessity and feasibility of applying blockchain technology to combat cross-border telecommunication network fraud. This article adopts qualitative approaches to analyze the current Chinese legal provisions and research literature on the field of cross-border telecommunication network fraud, and provides a comprehensive understanding of blockchain technology. This article proposes leveraging the characteristics of blockchain technology to prevent telecommunication network fraud by establishing a personal information protection mechanism and a suspicious fund flow supervision mechanism through blockchain technology. Furthermore, the efficiency of investigation can be improved by establishing an internal communication and cooperation mechanism. The authenticity and integrity of evidence can be ensured by establishing blockchain forensics and evidence storage system.

Downloads

Download data is not yet available.

References

Ba, Shusong, Wei Wei, and Haifeng Bai. “From Data Driven to Embedded Supervision: Prospects of Financial Supervision Based on Blockchain.” Journal of Shandong University(Philosophy and Social Sciences), no. 4 (2020): 161–73.

Badhani, Neelam, and Sachin Sharma. “Blockchain-Based Financial Enterprises Credit Value Information System Using Federated AI.” In 2023 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS), 1–7. IEEE, 2023. https://doi.org/10.1109/ICBDS58040.2023.10346298.

Balatska, Valeriia, and Ivan Opirskyy. “ENSURING THE CONFIDENTIALITY OF PERSONAL DATA AND SUPPORTING CYBER SECURITY WITH THE HELP OF BLOCKCHAIN.” Cybersecurity: Education, Science, Technique 4, no. 20 (2023): 6–19. https://doi.org/10.28925/2663-4023.2023.20.619.

Brīvers, Aleksandrs. “UNDERSTANDING OF ELECTRONIC EVIDENCE, ITS ACQUISITION AND STRENGTHENING IN CRIMINAL PROCEEDINGS.” INDIVIDUAL. SOCIETY. STATE. Proceedings of the International Student and Teacher Scientific and Practical Conference, January 11, 2023, 156–62. https://doi.org/10.17770/iss2021.6913.

Chen, Longxi. “Research on China’s International Investigative Co-Operation.” Doctoral dissertation, East China University of Political Science and Law, 2011.

Chen, Peixin. “Cloud Forensics Solution Based on Blockchain.” Network Security Technology & Application, no. 3 (2024): 124–26. https://doi.org/10.3969/j.issn.1009-6833.2024.03.046.

D, Subiramaniyan S, Mohamed Fayas M P, Selva Bharathi S M, Sasikala K, R. Reshma, and S. P. Sasirekha. “A Novel Decentralized Product Verification Using Blockchain Technology.” In 2023 7th International Conference on Trends in Electronics and Informatics (ICOEI), 642–46. IEEE, 2023. https://doi.org/10.1109/ICOEI56765.2023.10125833.

Dubey, Rameshwar, Angappa Gunasekaran, David J. Bryde, Yogesh K. Dwivedi, and Thanos Papadopoulos. “Blockchain Technology for Enhancing Swift-Trust, Collaboration and Resilience within a Humanitarian Supply Chain Setting.” International Journal of Production Research 58, no. 11 (June 2, 2020): 3381–98. https://doi.org/10.1080/00207543.2020.1722860.

Flora, Henny Saida. “Criminal Sanctions toward False Criminal Actors through the Internet.” The International Journal of Humanities & Social Studies 7, no. 9 (September 30, 2019). https://doi.org/10.24940/theijhss/2019/v7/i9/HS1909-081.

Gupta, Suyash, and Mohammad Sadoghi. “Blockchain Transaction Processing.” In Encyclopedia of Big Data Technologies, 366–76. Cham: Springer International Publishing, 2019. https://doi.org/10.1007/978-3-319-77525-8_333.

Hou, Zhi, Jie Yang, Xiangjun Feng, and Xiaomei Liu. “Research on the Dilemma View and Practical Response of Crime of Telecommunication Network Fraud——Take 137 Cases as Breakthrough.” Tianjin Legal Science 34, no. 2 (August 16, 2018): 83–89.

Huang, Zicheng. “Research on International Co-Operation in Combating Transnational Telecommunication Network Fraud Offences in the Lancang Subregion.” Network Security Technology & Application, no. 2 (2022): 160–62. https://doi.org/10.3969/j.issn.1009-6833.2022.02.094.

Jiang, Xiaotian, and Man Liu. “Interview with Zhang Xiaojin, Director of the Fourth Procuratorial Department of the Supreme People’s Procuratorate: The Cross-Borderisation of Wire Fraud Crimes, with a Focus on Criminal Syndicates and the Masterminds behind Them.” Southern Metropolis Daily, May 4, 2024. https://www.spp.gov.cn/spp/zdgz/202403/t20240304_647113.shtml.

Kang, Xinjian. “Research on the Investigation and Prevention of Cross-Border Telecom Fraud in Yunnan Border Area in the Era of Big Data.” The Journal of Yunnan Police College, no. 1 (2020): 92–97. https://doi.org/10.3969/j.issn.1672-6057.2020.01.017.

Kang, Zehua. “Research on the Application of Blockchain in Smart Policing.” Legal and Economy, no. 7 (September 15, 2020): 160–62. https://doi.org/10.3969/j.issn.1005-0183.2020.07.066.

Karambe, Anand. “Blockchain-Based Approach for Tracking Global Criminals.” INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 06 (June 12, 2023). https://doi.org/10.55041/IJSREM19377.

———. “Blockchain-Based Approach for Tracking Global Criminals.” INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 06 (June 12, 2023). https://doi.org/10.55041/IJSREM19377.

Khramtcov, Evgenii. “Optimization of Criminal Procedure Legislation in the Field of Evidence in Criminal Cases on Crimes against Property Committed Using Information and Telecommunication Technologies.” Legal Science and Practice: Journal of Nizhny Novgorod Academy of the Ministry of Internal Affairs of Russia 2022, no. 2 (July 6, 2022): 239–43. https://doi.org/10.36511/2078-5356-2022-2-239-243.

Li, Xinmin. “Research on the Development and Countermeasures of Cross-Border Crime of Telecom and Online Fraud.” Journal of Western, no. 1 (2024): 78–81.

Liu, AiJiao. “The Strategy of Fighting for the Telecommunications Fraud with I Iternational Police Cooperation.” In Proceedings of the 2016 4th International Conference on Management, Education, Information and Control (MEICI 2016). Paris, France: Atlantis Press, 2016. https://doi.org/10.2991/meici-16.2016.19.

Liu, Cheng-Yong, Tian-Yu Dong, and Ling-Xing Meng. “Cross-Border Credit Information Sharing Mechanism and Legal Countermeasures Based on Blockchain 3.0.” Mobile Information Systems 2022 (July 1, 2022): 1–12. https://doi.org/10.1155/2022/6972647.

Liu, Pinxin. Dianzi Zhengjufa. 1st ed. Beijing: China Renmin University Press, 2021.

———. “On the Institutional Value of Electronic Data’s Storage and Authentication Based on Blockchain.” Archives Science Bulletin, no. 1 (2020): 21–30.

Lou, Yongtao, and Tang Xiang. “The Prevention, Control and Reflection of Telecom Network Fraud Crime in the Big-Data Age.” Journal of Chongqing University of Technology(Social Science), no. 3 (2020): 121–28.

Ma, Zhonghong. “The Difficulties and Countermeasures about the Investigation of the New Network Crimes Taking Telecommunications Fraud as the Representativesed——Research Based on W Survey.” Journal of People’s Public Security University of China: Social Sciences Edition, no. 3 (2018): 78–86.

Mikhaylov, Alexander, and Richard Frank. “Cards, Money and Two Hacking Forums: An Analysis of Online Money Laundering Schemes.” In 2016 European Intelligence and Security Informatics Conference (EISIC), 80–83. IEEE, 2016. https://doi.org/10.1109/EISIC.2016.021.

Pan, Fei, and Chang Liu. “Governance and Prevention of Telecommunication Network Frauds.” Journal of Guangxi Police College 32, no. 5 (2019): 48–52. https://doi.org/10.19736/j.cnki.gxjcxyxb.2019.0509.

Petrović, Dragana B. “PRIVACY AND PROTECTION OF PERSONAL DATA – CRIMINAL LAW ASPECT.” Strani Pravni Život 66, no. 4 (January 26, 2023): 469–89. https://doi.org/10.56461/SPZ_22407KJ.

Pham, Van-Duy, Canh-Tuan Tran, Thang Nguyen, Tien-Thao Nguyen, Ba-Lam Do, Thanh-Chung Dao, and Binh Minh Nguyen. “B-Box - A Decentralized Storage System Using IPFS, Attributed-Based Encryption, and Blockchain.” In 2020 RIVF International Conference on Computing and Communication Technologies (RIVF), 1–6. IEEE, 2020. https://doi.org/10.1109/RIVF48685.2020.9140747.

Puluhulawa, Fenty Usman, Jufryanto Puluhulawa, and Moh. Gufran Katili. “Legal Weak Protection of Personal Data in the 4.0 Industrial Revolution Era.” Jambura Law Review 2, no. 2 (June 20, 2020): 182–200. https://doi.org/10.33756/jlr.v2i2.6847.

Qiu, Shuxiang, and Haobo Jin. “Synthetic Investigative Intelligence Management with the Application of Blockchain Technology.” Journal of Zhejiang Police College, no. 4 (2018): 28–34. https://doi.org/10.3969/j.issn.1674-3040.2018.04.005.

Russkevich, E. A. “Personal Data in the Mechanism of Criminal Law Protection.” Proceedings of Southwest State University. Series: History and Law 13, no. 5 (December 5, 2023): 75–86. https://doi.org/10.21869/2223-1501-2023-13-5-75-86.

Saito, Kenji, and Hiroyuki Yamada. “What’s So Different about Blockchain? — Blockchain Is a Probabilistic State Machine.” In 2016 IEEE 36th International Conference on Distributed Computing Systems Workshops (ICDCSW), 168–75. IEEE, 2016. https://doi.org/10.1109/ICDCSW.2016.28.

Stephen, Remya, and Aneena Alex. “A Review on BlockChain Security.” IOP Conference Series: Materials Science and Engineering 396 (August 29, 2018): 012030. https://doi.org/10.1088/1757-899X/396/1/012030.

Susilawati, Ika Yuliana. “PERAMPASAN ASET HASIL TINDAK PIDANA KORUPSI DI LUAR NEGERI MELALUI BANTUAN TIMBAL BALIK (MUTUAL LEGAL ASSISTANCE).” Jurnal IUS Kajian Hukum Dan Keadilan 4, no. 2 (2016): 138–51. https://doi.org/10.12345/ius.v4i2.281.

Tanković, Ana Čuić, Marina Perišić Prodan, and Dragan Benazić. “Consumer Segments in Blockchain Technology Adoption.” South East European Journal of Economics and Business 18, no. 2 (December 1, 2023): 162–72. https://doi.org/10.2478/jeb-2023-0025.

Wanhua, Luo. “Research and Application of Blockchain Technology in Transportation Administrative Law Enforcement.” In 2020 IEEE 5th Information Technology and Mechatronics Engineering Conference (ITOEC), 766–70. IEEE, 2020. https://doi.org/10.1109/ITOEC49072.2020.9141836.

Wood, David. “A Future History of International Blockchain Standards.” The Journal of the British Blockchain Association 1, no. 1 (July 4, 2018): 1–10. https://doi.org/10.31585/jbba-1-1-(11)2018.

Wright, Craig S. “Bitcoin: A Peer-to-Peer Electronic Cash System.” SSRN Electronic Journal, 2008. https://doi.org/10.2139/ssrn.3440802.

Wu, Chengjie, and Wen Chen. “Discussion on Difficult Issues in Telecommunication Network Fraud Cases.” Journal of Law Application, no. 21 (2017): 40–50.

Wu, Zhiting, and Shiyong Zhi. “Characteristics of Telecom Network Fraud Crime and Prevention and Control Measures.” Journal of Hebei University of Economics and Business(Comprehensive Edition) 21, no. 2 (2021): 77–81. https://doi.org/10.3969/j.issn.1673-1573.2021.02.013.

Xiao, Tongyu. “Discussion on the Investigation Dilemma and Countermeasures of Telecommunication Fraud Cases.” Network Security Technology & Application, no. 1 (2023): 131–33. https://doi.org/10.3969/j.issn.1009-6833.2023.01.064.

Xie, Ling. “Research on Information Investigation of Telecom Network Fraud.” Journal of People’s Public Security University of China(Science and Technology) 26, no. 3 (2020): 85–93. https://doi.org/10.3969/j.issn.1007-1784.2020.03.013.

Xiong, Jun, and Li Li. “The Trial-Centred Perspective of Telecommunication Network Fraud Crime Investigation and Evidence Collection Path.” Legal System and Society, no. 31 (2020): 23–24. https://doi.org/10.19387/j.cnki.1009-0592.2020.11.012.

Yang, Liu. “On the Forensics of Cross-Border Telecom Network Fraud Crime--Taking Southeast Asian Countries as the Object of Analysis.” Journal of Political Science and Law, no. 6 (2023): 5–11.

Zheng, Zibin, Shaoan Xie, Hong Ning Dai, Xiangping Chen, and Huaimin Wang. “Blockchain Challenges and Opportunities: A Survey.” International Journal of Web and Grid Services 14, no. 4 (2018): 352–75. https://doi.org/10.1504/IJWGS.2018.095647.

Published

2024-12-29

How to Cite

Chen Siqi, Ramalinggam Rajamanickam, Nazura Abdul Manap, & Zamre Mohd Zahir. (2024). Application of Blockchain Technology in Cross-Border Telecommunications Network Fraud to Ensure China’s Judicial Justice. Jurnal IUS Kajian Hukum Dan Keadilan, 12(3), 472–486. https://doi.org/10.29303/ius.v12i3.1554