网络非法集资犯罪的司法证明规则——以证据端口理论为基础的分析  

The Rules of Judicial Proof of Network-based Illegal Fundraising Crimes:An Analysis Based on the Theory of Evidence Ports

在线阅读下载全文

作  者:刘静坤 Liu Jingkun

机构地区:[1]中国政法大学全面依法治国研究院

出  处:《复印报刊资料(诉讼法学、司法制度)》2023年第12期91-103,共13页Procedural Law And Judicial Systems

摘  要:网络非法集资犯罪通常具有对象涉众性、行为链条性和证据海量性等特征,给司法证明带来了独特的挑战。现行司法解释提出了综合认定、抽样验证、属性推定等规则,但此类规则的理论基础尚待明确,司法适用存在诸多风险。基于网络非法集资犯罪的特殊证据结构,以证据端口理论为基础整合并优化现有的证明规则,有助于理清取证和证明的基本要求,解决该类犯罪的司法证明难题。鉴于综合认定规则的适用标准不够统一,且面临关键证据缺失的风险,有必要优选证据端口全面取证,并结合其他证据端口进行印证分析。现有的抽样验证规则容易与抽样取证混淆,且未能关注抽样对象的内在差异,有必要限定抽样验证的证据端口要求,并明确抽样的证据材料范围。对于资金属性的推定规则,需要明确推定的性质和要素,以及推定规则的适用要求。Network-based illegal fundraising crimes often exhibit characteristics such as involving multiple parties,forming a chain of actions,and generating massive amounts of evidence,which pose unique challenges for judicial proof.Current judicial interpretations propose rules for comprehensive determination,sample verification,attribute inference,etc.However,the theoretical foundation for such rules is yet to be clarified and the judicial application of the rules entails numerous risks.Due to the complex chain of network-based illegal fundraising crimes,a distinctive evidence structure emerges,encompassing such evidence ports as the investment port of investors,the flow port of financial institutions,and the transaction port of fundraisers.Analyzing the evidentiary functions and interrelationships of these evidence ports helps to clarify the fundamental requirements for investigating and proving such crimes.Integrating and optimizing existing proof rules based on the theory of evidence ports aids in addressing the judicial proof challenges posed by these crimes.Given the lack of unified standards in the application of comprehensive determination rules and the risks of key evidence being absent,it becomes necessary to comprehensively collect evidence from the preferred transaction port of fundraisers,while corroborating and verifying such evidence through other evidence ports,including the investment port and flow port.For evidence within the scope of quantitative standards,each should be investigated and verified individually.On this basis,for quantities or amounts that exceed the standard,conclusions drawn from the selected evidence port can be verified through sample validation.Building on comprehensive determination rules,the premise for applying sample validation rules is that qualitative and quantitative conclusions have been drawn from the relevant evidence port.Subsequently,evidence from other ports is used to validate and verify these conclusions.In the process of sample validation,evidence for analysis is not

关 键 词:网络非法集资犯罪 证据端口 抽样验证 属性推定规则 

分 类 号:D924.3[政治法律—刑法学]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象