{"id":58,"date":"2010-11-09T04:41:56","date_gmt":"2010-11-09T04:41:56","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/webexceptionalism\/?p=58"},"modified":"2010-11-09T19:00:39","modified_gmt":"2010-11-09T19:00:39","slug":"doreen-tu-%e2%80%94-computer-crimes-in-taiwan-october-26-2010","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/webexceptionalism\/2010\/11\/09\/doreen-tu-%e2%80%94-computer-crimes-in-taiwan-october-26-2010\/","title":{"rendered":"Doreen Tu \u2014 Computer Crimes in Taiwan (October 26, 2010)"},"content":{"rendered":"<p>On October 26, 2010 Taiwanese prosecutor and Berkman Fellow Doreen Tu presented on web exceptionalism and the evolving treatment of computer-related criminal offenses in Taiwan.\u00a0 Doreen\u2019s lively and thoughtful presentation offered interesting insights into the practice of law in Taiwan, on a subject of transnational import\u00a0\u2014 as criminal impulses increasingly find their outlet online.<\/p>\n<p><em>[Apologies to all \u2014 and especially Doreen \u2014 for the delay in writing up these notes.\u00a0 Brad A.]<\/em><\/p>\n<p>In 2003 Taiwan amended its Criminal Code to add a new chapter describing computer-related crimes.\u00a0 Prior to these amendments, Taiwan prosecuted computer-related offenses under the existing laws, which for the most part were adequate to reach online conduct of concern to prosecutors.\u00a0 A series of criminal complaints in the early 2000s put this assumption to the test, and ultimately the state determined that it needed computer-specific crimes on the books.<\/p>\n<p>Doreen asked: do we need to define specific \u201ccybercrimes,\u201d or are cybercrimes simply an online manifestation of ordinary criminal conduct, albeit accomplished with different tools (and against different targets)?<\/p>\n<p>For a period of time, the principal \u201ccybercrimes\u201d that had the attention of prosecutors in Taiwan were crimes with obvious \u201chard-copy\u201d analogues that perpetrators had carried over onto the Internet.\u00a0 The existing Criminal Code was appropriately enforced against online instances of fraud, illegal gambling, child pornography and copyright infringement.\u00a0 Efforts to prosecute unauthorized access to or destruction or deletion of electronic data required a further analytical step: the law was required to treat electronic data as \u201cproperty\u201d or \u201cdocuments.\u201d\u00a0 Nonetheless, once this interpretation took hold, the state could bring appropriate charges under the existing laws proscribing vandalism or theft.<\/p>\n<p>Then \u201cLineage\u201d came along to challenge this paradigm.\u00a0 Lineage is a popular online computer game, and Doreen credits it for triggering the 2003 amendments to the Taiwanese Criminal Code.\u00a0 The game originated in South Korea \u2014 we\u2019ve translated the title to mean \u201cLineage,\u201d whereas in Chinese the game\u2019s title means \u201cHeaven.\u201d\u00a0 The game made a splash in Taiwan around 2000.\u00a0 It requires a user ID and password, and through gaming effort players obtain \u201cvirtual property\u201d (<em>e.g.<\/em>, weapons, jewelry) that can be traded among the players.\u00a0 These properties are valuable enough \u2014\u00a0that is, they require enough of an investment of in-game time and effort to acquire \u2014\u00a0that they have real-world value to the players.\u00a0 As a result, websites have appeared to facilitate exchange of Lineage properties.<\/p>\n<p>One especially valuable Lineage resource is the invisibility cloak, about which Doreen tells the following story:<\/p>\n<p>A teenage Lineage player traded for an invisibility cloak.\u00a0 He later entered his user ID and password into Lineage, logged into the game, and found that he did not have it anymore.\u00a0 It had vanished.\u00a0 The player took his complaint to prosecutors.\u00a0 \u201cMy invisibility cloak was stolen,\u201d the youth told the Prosecutor on Duty, a colleague of Doreen\u2019s.\u00a0 The Prosecutor on Duty had no idea what to make of this, but following the investigator\u2019s handbook, he asked appropriate questions, including \u201cWhere did you last have it?\u201d\u00a0 \u201cHeaven,\u201d the complainant answered.\u00a0 This answer did little to relieve the PoD\u2019s confusion.<\/p>\n<p>A cascade of similar complaints to Doreen\u2019s office\u00a0\u2014 each involving lost or stolen Lineage artifacts\u00a0\u2014 followed.\u00a0 A common element emerged: all of the victims had been playing Lineage in the same Internet caf\u00e9.\u00a0 Investigators came to understand that a single perpetrator had infected the machines, managed to obtain the user IDs and passwords Lineage players had entered at the cybercaf\u00e9\u2019s terminals, and, having appropriated the online identities of the users, disposed of their Lineage properties.<\/p>\n<p>Prosecutors struggled to identify appropriate criminal charges for this conduct.\u00a0 The \u201cinvisibility cloak\u201d was an \u201celectromagnetic record,\u201d and therefore a form of property under Taiwanese law.\u00a0 A theft charge would stick, as a legal matter.\u00a0 And yet the government came to realize that the Criminal Code did not describe offenses that would reach the conduct prosecutors wanted to punish\u00a0\u2014 namely, the infection of the caf\u00e9\u2019s computers with malware and the abuse of third-party user authentication information. Infecting a computer with the malware necessary to swipe the ID information would not qualify as \u201cdestruction\u201d of or damage to property sufficient to support a vandalism charge.\u00a0 Likewise, there was no specific criminal charge available under Taiwanese law to punish the unauthorized access to another person\u2019s Lineage account.\u00a0 You could use that unauthorized access that to accomplish theft (as here), or, conceivably to defraud a third party.\u00a0 But the access itself was no crime.<\/p>\n<p>Nor was the Criminal Code written to punish other, more advanced forms of cybercrime, like a distributed denial-of-service attack.<\/p>\n<p>Lawmakers responded with the 2003 amendment introducing Chapter 36 (\u201cOffenses Relating to the Use of Computers\u201d) into the Criminal Code.\u00a0 Doreen displayed translations of Chapter 36\u2019s six articles.\u00a0 I couldn\u2019t type fast enough to transcribe them, but here are two I found <a href=\"http:\/\/taiwanjournal.nat.gov.tw\/site\/tj\/ct.asp?xItem=20435&amp;CtNode=118\" target=\"_blank\">elsewhere on the Net<\/a>:<\/p>\n<p>Article 358: \u201cUnauthorized access to another\u2019s computer or related equipment by means of the use of another&#8217;s confidential account number code, or by circumventing protective measures, or the act of discovering and exploiting loopholes in a computer system shall be punished by up to three years in prison, jail or fines of up to NT$100,000, or both.\u201d<\/p>\n<p>Article 359: \u201cUnauthorized acquisition, deletion, or alteration of the electromagnetic records of other&#8217;s computer or related equipment resulting in damage to the public interest or the interest of an individual person is punishable by up to five years in prison, jail or fines of up to NT$200,000, or both.\u201d<\/p>\n<p>The introduction of Chapter 36 reflects lawmakers\u2019 judgment that the Internet <em>is<\/em> exceptional.\u00a0 It was not enough just to punish the theft of a virtual cloak of invisibility under the existing provisions of law: the manner in which the theft was accomplished, <em>i.e.<\/em>, through the use of computers, cried out for legal treatment.<\/p>\n<p>Doreen considers another, more recent example.\u00a0 In April 2008 &#8220;Bahamut,&#8221; another important online game, with some 2.5 million users, was overcome by a DDOS attack.\u00a0 Bahamut\u2019s principals received the following anonymous message by email the next day, written in simplified Chinese characters (suggesting that the message came from Mainland China):<\/p>\n<p>\u201cSorry for launching the attack yesterday.\u00a0 It revealed the vulnerabilities of your website.\u00a0 We are the unofficial agent of World of Warcraft, and we\u2019d like to know if we can place an advertisement on your website.\u201d<\/p>\n<p>Understanding that the Taiwanese government is not in a position to investigate crimes committed in Mainland China, Bahamut never filed a complaint with the police.\u00a0 Doreen points out that, again, an obvious \u201coffline\u201d crime\u00a0\u2014 blackmail\u00a0\u2014 could be charged on these facts.<\/p>\n<p>Likewise the Zeus Botnet, which resulted in banks loses billions of dollars earlier this year: this was a simple case of fraud, but accomplished online, with computer code, on a massive scale.<\/p>\n<p>Doreen describes the challenges Taiwan faces with respect to Internet crimes.\u00a0 First, the perpetrators of online crimes are easily hidden\u00a0\u2014 and they may conduct criminal enterprises from remote locations, perhaps abroad.\u00a0 Second, online crime is more difficult to investigate.\u00a0 Warrants are difficult to obtain, and there is too little cross-border cooperation.\u00a0 Third, systems are insecure: small and medium-sized companies do not have competent IT managers.<\/p>\n<p>Doreen explains that Taiwan proposes to tackle this last problem legislatively: a new data protection law recently issued, imposing a legal obligation on companies to protect personal data on their servers.\u00a0 Laws like these turn out attention to the most important question we face on this subject: <em>who should share the responsibility to protect cyberspace?<\/em> At the government level, criminal and administrative agencies can take the lead.\u00a0 But can government solve the problem on its own?\u00a0 Consider the \u201cecosystem\u201d of botnet: malware writers and controllers of botnets are criminally liable.\u00a0 Should software companies that generate and release insecure software have some liability?\u00a0 ISPs that use pirated, insecure software?\u00a0 \u201cMules\u201d who provide identity fronts to criminal actors?\u00a0 \u201cVictim\u201d companies that use insecure systems and don\u2019t adequately protect other people\u2019s data?<\/p>\n<p>Doreen stopped to take questions.\u00a0 <em>[My coverage of the ensuing discussion is incomplete, because at a certain point I put aside my computer so that I could participate.\u00a0 But here\u2019s what I have.]<\/em><\/p>\n<p>Q: What did you mean by \u201cmules?\u201d\u00a0 Doreen: the term we use in Chinese translates to \u201chuman head.\u201d\u00a0 Suppose a perpetrator needs someone to manage a bank account to receive the proceeds of online fraud.\u00a0 The perpetrator pays a person to open an account and allow the perpetrator access.\u00a0 The mule himself\/herself often has very little knowledge of who had control of the account.<\/p>\n<p>Q: Do I understand correctly that in Taiwan the state cannot bring charges absent a complaint?\u00a0 Doreen: Yes.\u00a0 It\u2019s common in civil law countries to require a victim to initiate the criminal complaint.\u00a0 The government needs to clear a certain evidentiary threshold to proceed, and a complaint requirement establishes harm as well.\u00a0 Where, as in the Bahamut case, the victim is reluctant to come forward, the complaint requirement can impair investigations.<\/p>\n<p>Q: What\u2019s a good way to handle cross-border criminal activity?\u00a0 How do we balance one nation\u2019s sovereignty concerns with another\u2019s need to enforce the rule of law?\u00a0 Should there be some international institution that conducts\/ manages transnational criminal investigations?\u00a0 There have been efforts to improve international cooperation on evidence collection.<\/p>\n<p>There followed discussion of a recent matter one of the practicing attorney Fellows had handled. \u00a0The case involved fraudulent purchase orders sent to vendors by email; the emails came from an account with a domain name suggesting a false affiliation with a large institutional buyer. \u00a0The domain name had been bought with a stolen credit card: &#8220;whois&#8221; information revealed that the credit card&#8217;s owner, a resident of South Carolina, owned the domain. \u00a0Investigators reviewed the email headers and traced the messages&#8217; origin to Nigeria. \u00a0How do we tackle crimes of this nature?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On October 26, 2010 Taiwanese prosecutor and Berkman Fellow Doreen Tu presented on web exceptionalism and the evolving treatment of computer-related criminal offenses in Taiwan.\u00a0 Doreen\u2019s lively and thoughtful presentation offered interesting insights into the practice of law in Taiwan, on a subject of transnational import\u00a0\u2014 as criminal impulses increasingly find their outlet online. [Apologies [&hellip;]<\/p>\n","protected":false},"author":2478,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-58","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/webexceptionalism\/wp-json\/wp\/v2\/posts\/58","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/webexceptionalism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/webexceptionalism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/webexceptionalism\/wp-json\/wp\/v2\/users\/2478"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/webexceptionalism\/wp-json\/wp\/v2\/comments?post=58"}],"version-history":[{"count":5,"href":"https:\/\/archive.blogs.harvard.edu\/webexceptionalism\/wp-json\/wp\/v2\/posts\/58\/revisions"}],"predecessor-version":[{"id":60,"href":"https:\/\/archive.blogs.harvard.edu\/webexceptionalism\/wp-json\/wp\/v2\/posts\/58\/revisions\/60"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/webexceptionalism\/wp-json\/wp\/v2\/media?parent=58"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/webexceptionalism\/wp-json\/wp\/v2\/categories?post=58"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/webexceptionalism\/wp-json\/wp\/v2\/tags?post=58"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}