sofsovereignnations,originatinganattackfromalmostanycomputerintheworld,passingitacrossmultiplenationalboundaries,ordesigningattacksthatappeartobeoriginatingfromforeignsources.Suchtechniquesdramaticallyincreaseboththetechnicalandlegalcomplexitiesofinvestigatingandprosecutingcybercrimes.22 Usingsoftwaretoolsinstalledonacomputerinaremotelocation,hackerscanbreakintocomputersystemstostealdata,plantvirusesorTrojanhorses,orworksmischiefofalessserioussortbychangingusernamesorpasswords.23 Corporations,likegovernments,lovetospyontheenemy.Networkedsystemsprovidenewopportunitiesforthis,ashackers-for-hireretrieveinformationaboutproductdevelopmentandmarketingstrategies,rarelyleavingbehindanyevidenceofthetheft.24 PiracyinChinaistherevoltandattackagainstthesoftwareimperialism.InthewebsitesmanagedbyChinese,severalofnewandoldsoftwarecanbedownloadedeasily.Somewebsites,aswellasforestoutlaws,aredevotedtothiskindofcharities,similartoprovidingrelieftothepoor.Theseacts,thoughbelongtodevianceandcrime,producersofsoftwareshouldalsoself-examinationintheaspectofpricemonopoly.Usersofpersonalcomputercouldnotaffordfortheexpensivesoftware,andthusthemarketofpiracyactsasasolutiontosatisfytheseusers. Thekeencompetitionbetweenthesoftwareproducersvirtuallyencouragesthepiracy.Forexample,agreatportionofthemarketofpersonalcomputerinChinaisundercontrolofMicrosoft,whosesoftwareispreinstalled.UsersinChinaknowonlyMicrosoft,cangetonlyMicrosoft,canoperateonlyMicrosoft,andcanchooseonlyMicrosoftcontinuously.That’stheprospect.Eventhatfreesoftwarecannotgivefullplaytotheiradvantagesofprice.Thepiracybringssoftwareproducersnotsomuchlossbutsavetheirexpensesofadvertisements.AnyproducersoftheplatformsdonothopetoseethattherisinggiantLinuxswallowstheChinesemarket.Intheframeworkoftheexistinglegalsystem,whichregardspiracyasacrime,andtheproducersremainhighprices,LinuxisascompetentasMicrosoftis. iv.Networkasaplace TheInternethaserodedtheprotectionprovidedbynationallawsagainstsuchactivitiesaspornography.TheInternetisaglobalsystem.Wecannowbeattackedbycriminalswhodonotneedtocometothisterritory.Lotsofpolicingarrangementshavetheirrootsinthefactthatvictimandoffenderaregeographicallyco-located.Itisadifferentworldnow,andifyoucandoyourbusinesslegitimatelyfromhomeviatheelectronicmedium,whycan’tthatbusinessnotbecriminalbusiness?Wehavetomoveourselvesintothisnewworld.Itisagreatchallengeforus.25 Now,muchofthemoney,assets,statesecretandpersonalprivacyaretransformedintocomputerdataandstoredincomputers,orcirculatethroughthenetwork.Meanwhile,networkisalsobecomingaspacetoexhibitpornography,oragamblinghouse.Networkdoesnothavetheabilityofvaluejudgement,hasnoculture,hasnolegalconsciousness,buttheinformationbeingstoredandactivitiestakingplaceinithavenatures,eitherprotectedorreprimandedbylaws.Furthermore,theplaceofnetworkistrans-regional,trans-national,wherethereisnotaunifiedlegalsystem,andbecomesazoneaswellastheHolySea.Manyaggressionstakeplaceattheterminals.Manyharmsalsotakeplaceattheterminals.Itseemsthatonlyterminalshavesomethingtodowithcrimes. Factually,thisisacontradictorybroughtaboutbythespecialcharacteristicoftheplaceofnetwork.InChina,pornographyisonecrimethatisclearlyillegal,bothonandofftheInternet.Andviewingpornographywebsitesisillegal,too.Otherwiseinsomeothercountriesatleasttostorethesepicturesinthenetworkislegal.ItisbeyondthereachofthepowerofChineselaws.Theproblemofconflictofcriminaljurisdiction,butnotconflictofciviljurisdiction,haveneverbeenputforwardasaserioustopicastoday. Adifferentvoice,however,advocatesthathecriminallawhasnobusinesshere.Forthenetworkhavenoborders,andtheautonomousspaceofhyperperfectillusionandflawlesslyrecombinantcultureistooslipperyforanystatute.26Control--thecontrolweneed--isnotfinallyalegalproblematall.Itisasocial,moral,andtechnologicalproblem.27 v.Networkasatarget Networkinacertainsensecanberegardedasnetworkassets,includingtangibleassetsandintangibleassets,bothhardwareandsoftware;bothintra-nationalassetsandinternationalassets.Networkassetsisakindofcombinativeassets,existsinthecyberspace.Furthermore,networkassetsisnotstatic,butexistsintheprocessofproduction,whichconstitutesamodeofproductionmanagement,forexample,theactivitiesthatcanbeincludedinthefieldofelectroniccommerce.Itsexistenceisvulnerable,easytosufferfromvariousofartificialattacks,someofwhichbelongtothetraditionalcrimes,forexample,cuttingofftheelectricitysupply,destroyingthecables,movingtheantennausedinsatellitecommunications;andmoretraditionalcrimes,forexample,bombingsonbuildingshousingcomputerequipment,arson,andtheftanddestructionofcomputerequipment.28Nowadays,theyarenotregardedascybercrimes.Thecybercrimesagainstthenetworkaremainlythosethatutilisethecomputertechnologiesbutnotothertechnologies,ofwhichthemosttypicalarecomputerviruses,aswellasothermaliciouscomputerprogrammes,whichareusedtodoharmtocomputersandnetwork.Therehavebeenalreadyalonglistofinstancesofseriousviruses,whichtheCIH,Melissa,ILoveYou,etcstandfirston. On10October,2002,itwasreportedthatviruseshaveinfectedatleast80percentofChina’scomputers,highlightingthevulnerabilityofoneoftheworld’sbiggestPCandInternetmarkets.ThesurveyconductedbytheNationalComputerVirusEmergencyResponseCentresaidthatonly16percentofcomputerusersthisyearreportedtheywerefreefromanyvirusattack,whilelastyearnearlyoneinthreeuserssaidtheysufferednocomputerinfections,halfoftheinfectedmachineshadsuffereddatalosses,problemsbrowsingtheWeb,orotherdamage.29 AndDenialofService(DoS)AttackstothefamouswebsitesincludingYahoo!tookplacein2001,usedtheharmfulprogrammesotherthanviruses.Theseattacksbrokethenetworkdown,madethewebsitesshutdown,broketheelectroniccommerce,broughtgreatdirectlossesinmanagementandindirectlossesinthecredential. III.PolicyofcontrollingthenetworkinChina Itwascriticisedthatintotalitarianorauthoritariansystems,thestateintrudesintoeverydomainofthecivilsocietyandleviesstrictconstraintsonthepresswithoutdeliveringacorrespondinglevelofinducements.Outr 上一页 [1] [2] [3] [4] [5] [6] [7] 下一页
Tags:
|