国际司法协作
Search documents
柬埔寨已建立由首相洪玛奈领导的国家级打击网络诈骗机制
Xin Jing Bao· 2026-02-21 01:17
新京报讯 据中国驻柬埔寨大使馆援引柬媒消息,2月18日,柬国务大臣兼国家打击网络诈骗委员会秘书 长柴西纳列向26国驻柬使节等通报打击电信诈骗进展,表示打击电诈是柬第七届王国政府持续推进的核 心国家战略,并非阶段性行动。目前,柬方已建立由首相洪玛奈亲自领导的国家级打击网络诈骗机制, 强化跨部门协同执法,提升整治成效。 柬官方数据显示,自2025年6月至2026年初,全国范围内共查处电信诈骗案件200宗,清查涉案地点约 2500处,查扣电脑1万余台、手机3.6万余部,查封违法场所200余处,并依法驱逐涉案外籍人员8000余 名。在高压执法震慑下,已有超21万名外籍人员自行离境。 柬司法部报告显示,过去8个月内,柬法院已对包括陈志犯罪集团在内的500余起网络犯罪案件提起诉 讼,并通过国际司法协作追查跨境犯罪集团资金链条。同时,柬政府正加紧起草《反电信网络诈骗 法》,相关法案已进入跨部门审议阶段,以进一步完善法律体系,持续推进打击行动。 ...
打击“人肉开盒”还需加强源头治理和国际协作
Nan Fang Du Shi Bao· 2025-10-15 23:07
Core Viewpoint - The article highlights the increasing prevalence of personal information infringement cases, particularly the phenomenon known as "human flesh searching," which has led to severe consequences for victims and calls for stricter legal measures and preventive actions against information leaks [1][2][3] Group 1: Legal Actions and Consequences - A recent case in Zhanjiang City resulted in the conviction of three individuals for illegally accessing and profiting from personal information, with penalties including prison sentences and fines totaling 42,466.34 yuan [1] - The court's ruling reflects a growing recognition of the severity of personal information crimes, emphasizing the need for justice to deter potential offenders [2] Group 2: Sources of Information Leakage - The article identifies that many personal information leaks originate from overseas chat groups and social media platforms, where individuals' private data is easily accessible [2][3] - The existence of "social engineering databases" and the transparency of personal records, such as household registration and financial transactions, contribute to the vulnerability of individuals [2] Group 3: Preventive Measures and Recommendations - To effectively combat "human flesh searching," it is essential to implement stringent penalties for offenders while also addressing the root causes of information leaks [2][3] - Strengthening international judicial cooperation is necessary to tackle cross-border information crimes and close loopholes that allow for the exploitation of personal data [3] - Long-term strategies should include establishing robust regulatory frameworks to prevent the occurrence of such incidents in the future [3]