Lowest detection rate
One of the attributes of the Internet is its penetration around the corner and across the world. Quick-thinking opportunists were soon ready to seize on this new tool of dissemination.
If we listed the various ways in which the Internet has "flown off the handle" over the past few years, it would become clearly apparent that the fraud, destruction, gambling, incitement to crime, and infringement of copyrights of the "brick-and-mortar" world have long since spread to cyberspace. Such cases include: a threat to US president Bill Clinton's life; the spread of rumors claiming that a certain brand of sanitary napkins was infested with bug eggs; the claim by a university student on a BBS bulletin board that his professor was plagiarizing student reports, resulting in a lawsuit for slander; a scam in which online shoppers paid for CD drives but received Oolong tea instead; the dissemination of pornographic images; the sale of pirated software; and the sale of illegal drugs over the Internet.
Last August, a big scandal marred Central Police University's recruitment of two-year technical program students. Kuo Chen-yuan, director of CPU's Department of Computer Science, was suspected of taking bribes from students, then going into the computer system and revising the students' test scores. The Taoyuan public prosecutors' office, in charge of the investigation, focused on Kuo Chen-yuan as the suspect, but Kuo quickly deleted all the information from the office's PCs and disappeared. The police were able to track down Kuo's personal notebook computer, but Kuo, being a computer expert, had taken precautions, adding password protection to his files when he saved the list of student names and bribes taken. Temporarily stymied, the Taoyuan prosecutors sought the assistance of the CIB to crack the code. In view of the gravity of the Central Police University scandal and the large number of people involved, prosecutors, citing anti-corruption criminal codes, sought a life sentence for Kuo Chen-yuan.
After nearly a year in the courts, the Taoyuan District Court sentenced Kuo to life imprisonment and permanent deprivation of civic rights. The other defendants, 63 in all, received sentences ranging from 18 months to 16 years.
While expediting criminal conduct, the Internet makes collection of evidence difficult. These characteristics, combined with the medium's technical nature, conspire to make Internet-related crimes the hardest to break. According to Lee Hsiang-chen, 80% of all successful prosecutions of Internet-related crimes come about only after civilians lodge complaints and provide the information necessary to solve cases.
The diversity of cyber-crimes seems to mirror the rapid development which is a defining feature of the Internet. Classified by type of case, the CIB's Computer Crime Unit estimates that the majority of cases it handles involve software piracy or pornographic websites. Especially given the Ministry of Education's advocacy of Internet literacy among elementary and middle school students, many people worry that the Internet is too full of embarrassing, lewd images which can corrupt young hearts and minds.
Evil always a step ahead
In one case, for example, the CIB arrested a Taipei County man operating the "Forbidden Paradise" website, where paying members used access codes to view and download lewd pictures taken from overseas sites. The CIB has also stamped out pornographic CD-ROM trading rings operated via e-mail, and prosecuted people for openly providing or soliciting sex partners via the Internet.
Although the CIB's "trophies" include the shutdown of a large pornographic website that had attracted over one million visits, most elected officials and women's groups still feel that not enough effort has gone into thwarting such conduct. After all, they say, if sufficient resources have gone into crackdowns, why has the number of porn sites on the Internet actually grown?
When you plug the Chinese word for "pornography" into a search engine, you can always turn up a host of pornographic websites. It seems as if such sites just come back with a vengeance. Efforts to crack down on the sale of pirated software over the Internet have been similarly thwarted.
The Computer Crime Unit faces a major dilemma in trying to decide how much of its resources should be devoted to crackdowns on Internet sites offering pornography and pirated software.
"In order to get around the police, many pornographic websites have moved overseas. We have approached scholars and experts for tips on how to look for pornographic sites set up abroad, but the answers only pointed to the difficulty of doing so," relates Chang Wei-ping.
The simplicity of setting up a website these days makes detection all the more difficult. Chang Wei-ping notes that in the past the person signing up for Internet access had to make the application for himself, and the ISP certification process is fairly strict. These days, however, given the intensity of competition among ISPs (Taiwan now has over 100 such companies of all sizes), many operators offer free access and e-mail accounts, and when Chang's people check users' registration details when following leads, "We find that some people are registered as the 'Office of the President' under the name 'Lee Teng-hui.' In practically eight out of 10 cases we can't trace the individual concerned, and 90% of the personal information on file might be false."
Not a "lawless" realm
Even in cases where "lawbreakers" or "troublemakers" are caught, how does one decide whom to fine? How much should they be fined? And according to what laws should they be prosecuted? Opinion is also divided widely over whether laws should be amended or new legislation introduced with Internet crime expressly in mind. Still, given the lawlessness of the Web, with people skirting on the borders of unlawful activity, authorities have begun to place more emphasis on enforcement.
Previously, ROC law did not allow for punishment of those that used others' accounts, or stole or destroyed others' files, via the Internet. However, after investigation by relevant agencies, nine new articles were added to the Penal Code in October 1997 concerning computer-related crime, including the offenses of "disclosing secrets of others obtained or held by the use of computer equipment," and "interfering with the stored computer data of others."
Nevertheless, there are many questions about how to apply the new laws. Such an issue arose in the case of Chen Ying-hao, who had written a computer virus.
On April 26 of this year, a computer virus known as "Chernobyl" ("CIH" for short) broke out across the Internet, crashing hundreds of thousands of computers across the globe and damaging computer records. Investigations by police in Taiwan and abroad subsequently verified that the virus originated in Taiwan.
Several days later, the Computer Crime Unit followed leads to Chen Ying-hao, a young man currently serving in the military, who admitted that he had written the virus last year while still attending university. However, Chen claimed that he was motivated by pure research, and that the virus had spread to infect a wide area only after repeated dissemination by others.
According to Article 352 of the Criminal Code, violators who "interfere with the stored computer data of others, to the harm of the public or others," may be incarcerated for up to three years with or without forced labor, or fined up to NT$10,000. If it were determined that Chen Ying-hao had maliciously disseminated the virus, he could be sentenced to time in jail. However, many creators of computer viruses are computer jocks, most of whom write viruses to show off their computer acumen. As Chen Ying-hao likely belongs to this ilk, and since under the article in question a prosecution can only be brought if a complaint is made, it has thus far not been possible to charge Chen, for lack of sufficient evidence. Prosecutors are currently reviewing the case.
Every crime leaves a trail
The case of Yang Chien-min, convicted of posting ads for the "Godfather of Arms" website, stirred considerable controversy over what grounds the conviction should stand upon.
The focus of contention was that Yang Chien-min was not the operator behind the "Godfather of Arms" site, but had simply registered the site with a certain Chinese-language search engine; meanwhile the real "Godfather" remained beyond the law's reach. The second issue of contention concerned the possible guilt by association of his ISP.
"The controversy shouldn't have anything to do with us (the police). We are only responsible for investigating and securing an arrest. Whether the prosecutors seek a prosecution is up to them to decide," says Lee Hsiang-chen.
Hsieh Ming-kuan, a district attorney at the Taipei public prosecutors' office, points out that in the case of a pornographic website showing exposed genitals, the Web host can remove the offending material of its own volition. Hsieh believes that putting ISPs in charge of controls would save the most trouble and effort. Further, if Chinese-language search engines could reduce the likelihood of related "hits," the circulation rate of such sites could be reduced. "Still, law enforcement agencies can't just do what they want, but must be able to stand their legal ground. The problem is that attitudes toward the Internet are constantly changing, so that if law enforcement agencies come down too hard they run the risk of criticism for 'interfering with freedom of information.'"
Another district attorney relates that Internet crime work includes assisting judges in establishing lines of questioning, as many judges are unfamiliar with the world of cyberspace. In some cases involving highly computer-literate suspects, even what questions to ask can be unclear.
"With conventional crime, the motivation is either profit or sex; with computer-related crime, the sticky part is that often there is no clear motive," says Liu Ta-chwan, technical advisor to the CIB and head of the Internet section of National Chiao Tung University's Computer Center. Liu notes that computers enjoy a high-tech image, appearing to remove people one level from misdeeds perpetrated via computer. For example, writing a computer virus that leads to computer crashes requires the passing of the virus among several hundred computers. Given the indirect nature of the harm, the people at the root of it sometimes fail to see how they have done anything wrong.
Still, lack of criminal intent merely reduces criminal responsibility, and there is no way around incontrovertible evidence.
Internet technology has created a fast-moving, chaotic world for humanity in the fin de siecle. In considering lawless conduct, we must keep in mind that it is not computers but rather people who get out of line, and that it is the human mind, not technology, that is so difficult to handle.