[Case] In early February 2023, the defendants Chen, Jing, Huang, Luo and others discussed and jointly invested by the defendants Huang, Luo and others, and agreed to steal USTD coins (Tether) by using contract codes. At about 15:00 on March 20, 2023, the defendants Chen, Jing, Huang, and Luo went to the company of the victim Hu in a community in Lianshui County. Huang and Jing met with the victim Hu to scan the code. Chen was responsible for the background operation, and Luo was responsible for driving. Through the pre-purchased contract code, a total of 57,307.11 USTD coins were stolen from the victim Hu, with a value of RMB 393,665.461434. After the above-mentioned defendants traded some of the USTD coins, they illegally obtained more than RMB 240,000. 1. Stealing virtual currency constitutes the crime of theft The "Notice on Further Preventing and Dealing with the Risks of Virtual Currency Trading Speculation" issued on September 15, 2021 clearly stipulates that virtual currency does not have the same legal status as legal tender, and virtual currency-related business activities are illegal financial activities, and the losses caused by them shall be borne by themselves. However, the author believes that whether it is protected by law is not necessarily related to whether it has property attributes. The relevant regulations only deny its legal tender status, but do not deny the property attributes of virtual currency. 2. Stealing virtual currency constitutes the crime of illegally obtaining computer system dataThe first provision of Article 3 of the Data Security Law, which came into effect on September 1, 2021, defines "data" as "any record of information in electronic or other form". Virtual currency is generated and exists in computer networks. In terms of technical attributes, it is a string of digital combinations that exists in electronic form, and has the criminal law attributes of computer information system data. In this case, the defendant illegally stole the victim's Tether currency, and the contract code used was actually a means for the defendant to obtain administrative rights to the server through illegal means, invade the computer information system to obtain electronic data, and then transfer the possession of Tether currency. Therefore, virtual currency has data characteristics, and the illegal theft of virtual currency constitutes the crime of illegally obtaining computer system data. III. Determination of the Amount of Stolen Virtual CurrencyAfter determining that the theft of virtual currency is an imaginary competition of the crime of illegally obtaining computer system data and the crime of theft, the question of how to calculate the value of the virtual currency involved is faced. The author believes that since the price of virtual currency changes at any time, in practice, it should be objectively determined based on the principles of fairness, rationality and convenience. Since virtual currency is property, the illegal possession of other people's virtual currency constitutes a property crime, and the amount of loss of the victim is used as the amount involved in the case, which conforms to the basic principle of calculating the amount of property crime. However, due to the supply and demand relationship and artificial speculation of virtual currency, its price will show a large appreciation or depreciation change. Therefore, it is more reasonable to calculate the amount of virtual currency involved as the time when the defendant committed the crime rather than when the victim purchased the virtual currency. When calculating in this case, the exchange rate conversion price of the virtual currency on the overseas trading platform at the time of the crime should be used as the calculation basis. |
<<: 8 key indicators tell you: Where is this cycle going? What will happen after $100,000?
>>: XRP case concluded: a new technological revolution begins
U.S. presidential candidate Rand Paul made an app...
People with these palmistry features are more ble...
MSRise, a company headquartered in Singapore, has...
How to interpret the downward bending marriage li...
According to new insights from Fidelity Digital A...
One can tell how your career will be like by look...
How to read the love line of a girl from her palm...
Birthmarks are also called "maternal spots&q...
Just as the domestic regulatory turmoil has subsi...
1. Look at the love affair outside the wall from ...
Speaking of big mouth, the first person we think ...
If a woman has the potential to bring bad luck to...
The influence of a person's spirit on his app...
Looking at the age of marriage through the marria...
We all know that it is normal to have moles anywh...