Research on Electronic Data Forensics Mechanism of Cross-Border Telecommunication Network Fraud
DOI: https://doi.org/10.62517/jel.202614117
Author(s)
Jiaming Cui, Zuxian Zhou, Chuanjie Liu
Affiliation(s)
Beijing Police College, Beijing, China
Abstract
Cross-border telecommunication network fraud crimes are highly dependent on electronic data as the core evidence, but there is a structural contradiction between the easy loss of electronic data and the long period of foreign-related evidence collection procedures, which seriously affects the investigation efficiency and the admissibility of evidence. Based on normative analysis and mechanism analysis, this paper systematically combs the practical difficulties faced by cross-border electronic forensics in legal rules, judicial assistance process and evidence review standards. On this basis, from the three dimensions of rule supply, program operation and technical review, this paper puts forward an integrated governance path with the dual-track program of "emergency preservation-routine assistance" as the core, and combines the hierarchical authorization mechanism, structured process tools and hierarchical review standards to form a grounded, reproducible and auditable evidence collection mechanism. The research shows that the mechanism can effectively alleviate the conflict between the "strong timeliness" of electronic data and the "high procedural cost" of cross-border forensics, and significantly improve the efficiency and admissibility of evidence on the premise of respecting data sovereignty and procedural legitimacy.
Keywords
Cross-Border Telecom Fraud; Electronic Data Forensics; Judicial Assistance; Emergency Security; Admissibility of Evidence; Data Sovereignty
References
[1] Wu Pincai. On evidence preservation and electronic archives data preservation. Archives and Construction, 2023, (11):7-9.
[2] Du Tao. Research on Asymmetric Reciprocity in Cross-border Forensic Judicial Cooperation. Legal Science (northwest university of politics and law Journal), 2023, 41 (01): 183-201. DOI: 10.16290/j.cnki.1674-5205.2023.01.011
[3] Zhang Xiaojun, Zhao Jiahui. Difficulties in the application of the security review exemption system in cross-border data flow and the ways to relieve it. Journal of Xiamen University (Philosophy and Social Sciences Edition), 2025, 75(06):93-106.
[4] Hong Hai, Cai Yu, Wei Lai. Electronic evidence collection and cross-border pursuit in the governance of cross-border telecommunication network fraud. China Prosecutor, 2025, (17):28-30.
[5] Tang Yunyang. Functional expansion of electronic data integrity and its reflection. Global Law Review, 2025, 47(06):167-183.
[6] Wu Hao. Research on electronic evidence collection in international criminal judicial assistance. People's Public Security University of China, 2025. DOI: 10.27634/d.cnki.gzrgu.20010.000000000006
[7] Wang Zhigang, He Qilong. On the system improvement of cross-border investigation to obtain electronic data. Journal of Chongqing University of Posts and Telecommunications (Social Science Edition), 2025, 37(06):59-69.
[8] Wu Xun. Research on the trend and countermeasures of telecommunication network fraud under the background of big data. Journal of Yunnan Police Officer College, 2024, (05):54-59.
[9] Zhuge Chengchen, Wang Qun, Liu Jiayin, et al. Overview of Hash Function Application in Blockchain. Computer Engineering and Application, 1-20 [2026-03-21]. https://link.cnki.net/urlid/11.2127.tp.20027.200200000006
[10]Lv Zhongwei, Li Changchao. The new development and enlightenment of the admissibility of overseas electronic data evidence. Journal of Shenyang University of Technology (Social Science Edition), 2017, 10(03):270-277.