Rethinking Chinese Modes of
Social Control and Cybercrime Prevention
Li Xingan 1
Introduction
As digital technologies has advanced over the past 50-odd years with a force unprecedented in history, governments, businesses and people around the world have been affected immeasurably. The already enormous and exponentially growing capacities for electronic storage, transmission and rapid manipulation of binary data changed the modern landscape virtually overnight. The changes have included substantial benefits. However, such fundamental restructuring in society also results in certain disadvantages, on all levels. Our vulnerability increases with the perceived value of and reliance on the technologies. Increased opportunities for the industrious to be more productive also allow the less-upright new avenues for malevolence.2 If cyberspace is a type of community, a giant neighbourhood made up of networked computer users around the world, then it seems natural that many elements of a traditional society can be found taking shape as bits and bytes. With electronic commerce comes electronic merchants, plugged-in educators provide online education, and doctors meet with patients in offices on-line. It should come as no surprise that there are also cyber criminals committing cybercrimes.3
In China, the wording of Internet is that it is a modern tool in an ancient land.4 It is an environment that takes nerves and offers big returns but also possible catastrophic loses.5 Cybercrime is paid close attention due to its high speed of increase of 30 percent per annum. As late as in 1997, the Criminal Law of P. R. China provides the basis of conviction and punishments. Together with several other laws and regulations, a legal system is being formed to suppress the spread of the so-called new century's pestilence in the cyber space. In some other country, writers doubt that explosion of new and pertinent statutory laws over the past two decades reflects society's attempts to wrestle with an ancient phenomenon in a modern context.6 It remains to be seen whether the current approaches to deter and redress cybercrime will prove successful.7
The invention of computer was a bit later than atom bomb. But atom bomb is born a killing tool, while computer is the extension of human wisdom, created as a help to human beings to realise welfare. They are seemingly different at this point. Outlook on value is, however, always the opinions of those who look at things through coloured spectacles. If something in common have got to be picked, it may be said that the atom bomb is the tool by which someone conquers others, while computer is the tool by which they subjugate themselves. If computer is utilised as the tools of self-subjugation, its essence is realised. Someone nevertheless, uses computer as the tool to conquer others, and conquer society. That should be regarded as the artificial alienation of its essence, when computer in essence degenerates to the extent that it is not different from the atom bomb.
Network is usually thought as that its establishment and popularisation will change the ways of the existence and life of human beings. And those who control and grasp the network are the dominators of the future life of human beings. Those who grasp the information, control the network, will possess the whole world. Thus, a series of social problem, of which the most serious is cybercrime, have an inkling of the matter. Although there are different standards to defining a crime, surprisingly, a framework of common recognition about cybercrime is reached as yet. As the rise of the network, cybercrime surmounts the limits of material and spirit, becoming the phenomenon that attracts the attention and deserves the reprimand by the whole world. At this point, even the creators of the atom bomb would be surprised at the historical effect emerges from the invention of those who made a computer. But today, those who are neither the creators of the first atom bombs nor the inventors of the computer have to confront with cybercrime.
I. Situation of Cybercrimes in China
i. Historical development of cybercrime in China
The first cybercrimes took place in China in mid-1980s, 20 years later than in USA. The banking system became the first victim from which money was embezzled, misappropriated and defrauded. The first period began from midst of 1980s, and ended in the midst of 1990s.
In this period, the forms of cybercrime were simple. Cybercrimes were mainly crimes against property; especially those committed in one's duty. In the meantime, the number of the cases is few, while the harm of the cybercrimes was great. It evoked wide social repercussions. Chinese began to be vigilant: there exists such a kind of monster, called cybercrime.
Central issues drawing public attentions was on one occasion focused on computer viruses, because the "Ping Pong" virus, the first virus that sneaked into the Chinese boundary via technical route, made the computer users, who never set up defences before, turned pale at the mere mention of computer virus. Then the harmfulness of the cybercrime was considerably critical. Computer viruses occupy the system resources, and slow down the operating, break the computer down, damage and delete data. Creating and spreading computer viruses was an important form of cybercrime, which is so difficult to investigate that that the detection rate is rare. Computer viruses have broken down some stock exchanges and supermarkets then. In 1989, viruses of political propaganda emerged. Only then, Chinese government realised that cybercrime is really a "crime" but not a "game".
The second period of cybercrime in China began from 1996 with the spread of network. The Chinese economy is developing rapidly, creating a growing demand for newer and better information technologies. China is becoming more and more open to the outside world, participating in the world trend toward the construction of a global information infrastructure.8 Network, however, was developed somewhat lately. The first e-mail from China to the outside world was sent in 1987. The first Chinese network connected to the outside world was the China Academic Network (CANET), established in 1988.9 The first commercial accounts were established in 1995. At that time, about 15,000 people were online.10 Since then, the Internet has seen explosive growth in China. 1996 witnessed a 4x increase in the number of service providers and a 10x increase in the number of subscribers.11 China has about 20 Internet Service Providers (ISP) and about 100,000 users.12 According to reports from the China Internet Network Information Centre, the number of Internet users in China grew to 45.8 million users by July 2002. Many studies indicate that the number of Net users in China is roughly doubling every year or two. Even if these studies exaggerate the number of users, there are clear indications of rapid Internet growth in China.
ii. Definition of cybercrime
Mimicking real life, crimes and criminals come in all varieties on the Internet,13 ranging from the catastrophic to the merely annoying.14 So, defined broadly, the term "cybercrime" could reasonably include a wide variety of criminal offencses, activities, or issues. The potential scope is even larger when using the frequent companion or substitute term "computer-related crime." As the phrase is evolving into a term of art, the narrower set of meanings has become more prevalent in the literature in the western world. In China, the term is the same from the beginning, pronounced as "Jisuanji Fanzui", i.e., computer crime. But there is never an official term for it. The crimes provided in the criminal law are more complicated.
In the academic circles, a variety of definitions have been introduced from the Western and put forward by themselves since early 1980s, including either the definitions in the broad sense or in the narrow sense. Most of them are derived from the Western harbingers, along with the translation into Chinese and publication in China of books and articles. For example, those definitions of a Western style by the Department of Justice of USA in 1979, stating that a cybercrime is any illegal act for which knowledge of computer technologies is essential for its perpetration, investigation, or prosecution. This definition was too broad and has since been further refined by new or modified state and federal criminal statutes. Another widely cited definition is by OECD. Both of them were brought into the definition in the broad sense when discussed. As for the definition in the narrow sense, one of the most typical examples is taken from the Act of data, Sweden.
The later study saw some rational thinking about the issue, and some definitions came into being which possess the Chinese style. For example, a definition in 1993 read as: "Cybercrime is the crime committed in which the computer system is utilised as a tool or aimed as a target."15
The definitions introduced to China and raised by Chinese scholars have profound academic significance on the one hand; they are regarded as wanting, however, in relationship with the stagnancy of the technological development and the characteristics of cyber space in the Chinese context, on the other hand. That is because that definitions in Criminal Law of P. R. China, 1997 are widely explained and accepted as the only scientific ones. The tradition of explanatory jurisprudence controls and decides the ideas of most of the Chinese jurists.
Anyway, it sounds outdated now to talk about some extra definitions of computer crime in China after the Criminal Law, which provides the computer crime in articles 285, 286 and 287 in the Section I Crimes of Disrupting Public Order, Chapter VI Crimes of Disrupting the Order of Social Administration.
Computer crime is that crime in which computer information systems are the target of crime. A comprehensive definition can be reached as acts of that who violates state regulations and intrudes into computer systems with information concerning state affairs, construction of defense facilities, and sophisticated science and technology; or violates states regulations and deletes, alters, adds, and interferes in computer information systems, causing abnormal operations of the systems and grave consequences; or violates state regulations and deletes, alters, or adds the data or application programs installed in or processed and transmitted by the computer systems, and causes grave consequences; or deliberately creates and propagates computer virus and other programs which sabotage the normal operation of the computer system and cause grave consequences.
According to the Criminal Law, crime in which computer is used as a tool, is no longer regarded as a computer crime. Whoever uses a computer for financial fraud, theft, corruption, misappropriation of public funds, stealing state secrets, or other crimes is not guilty of computer crime but other crimes.
Unfortunately, that is not true when we think that the definition is not of only nominal meaning. In actual fact, cybercrimes emerge in China cover quite wide a range and a large scale. In discussing the problem of cybercrime in China, we should use the term in the sociological or criminological sense but not limited to the narrowly criminal sense. In China, according to the laws and regulations, there are 15 aspects that were criminalised:16
1. Violating relevant state laws and invading computer information systems containing information about state affairs, state defense and the most advanced science and technology of the state;
2. Producing and spreading computer viruses and establishing devastating programs to attack computer systems or communications networks, thus causing damage to such systems or networks;
3. Violating relevant state laws, arbitrarily stopping the operation of computer networks or communications services, thereby interrupting normal operations of such networks or services;
4. Spreading rumours, slander or other information via the Internet for the purpose of overthrowing the state government, overthrowing the socialist system, or breaking up the country and destroying the country's unity;
5. Stealing or leaking state-classified information or military secrets via the Internet;
6. Igniting racial, ethnic hatred and discrimination, and destroying racial and ethnic unity via the Internet;
7. Organising cults or contacting cult members via the Internet to destroy the implementation of state laws and administrative regulations;
8. Engaging in swindles and burglary via the Internet;
9. Selling defective products or making false claims on commodities and services via the Internet;
10. Concocting and spreading false information via the Internet to influence securities trading and futures trading;
11. Establishing pornographic Web sites, Web pages, or providing links to pornographic sites on the Internet to spread such information, including those from books and magazines, motion pictures, video and audio products, and still images;
12. Insulting other people or fabricating stories to slander others via the Internet;
13. Illegally intercepting, changing, or deleting other people's e-mail or other data information, thus infringing upon other people's freedom of communication;
14. Infringing upon other people's rights to intellectual property via the Internet;
15. Damaging other people's business reputation and product reputation via the Internet.
There are still more academically induced categories. Practical crimes that are related to computer are perhaps found everywhere in the criminal law, from crimes against the national security to crimes against economy, from crimes against person to crimes against property, etc. Cybercrimes may be included in every chapter of the Criminal Law of P.R.C., according to their nature. This is determined by the methodology of the Chinese mode of thinking, which is on the same basis as the repealed system of guilty analogy.
iii. Phenomenon and situation of cybercrime in China
In the field of network, China is an up-and-coming youngster. Now, the network in China is developing with irresistible force. As for whether it will be confronted with a bottleneck at a certain extent, that's the topic of other interests. The momentum now is inevitably embodied with the gradients of exaggerations, and has the factor of network bubble. I do not share the common ideas with those who are unrealistically optimistic, because people in the vast rural areas restricted by financial conditions in the process of possessing computer and accessing to the network. It, however, began to take shape. Under these circumstances, network poses problems in Chinese society and Chinese legal system in many ways. Cybercrime and the network are closely associated with each other. The more popularised the network, the higher possibility, probability and the rate of occurrence of cybercrime. If the crime in the society also abides by the rule of saturation, the increase of the crime will to some extent be a portion of the total crimes, but not aggrandise independently sine die. Other crimes will decrease.
The group of potential criminals, opportunities for crime and the situation of crime are basically stable; cybercrime is like traditional crime, deserves punishment and prevention, but not hatred and extermination. The social history has already provided us with instances for possible reference. Chinese legislature and government should treat and handle the problem of cybercrime in a ordinary state of mind, keeping calm and reasonable, but not being flustered, confused, as if faced with a formidable enemy, has fleeing army's suspicion of danger at the slightest sound, all grass and trees are mistaken for enemy troops.
Making a comprehensive survey to the developing tendency of crime in the main countries in the world in recent years, in the context of rapid expansion of the network, the total sum of crime does not increase, otherwise, it decreases, for example, in the USA, UK, Canada, German, France, the Netherlands, Denmark, Ireland, etc (In some other countries, increased). This further shows that the resources of crime, including criminal human resources, within a country and all over the world are as limited as that of economy.
In the past, the more there were those who were busy running about to commit crimes, the less those who sat there to commit crimes by way of cudgelling their brains to evolve an idea. While the more there are those who commit crimes by the means of manipulating the keyboards, utilising digits, compiling programmes, practising deception, devising strategies within a command tent, determining the victory in the battle field of one thousand km far away from, the less there are those who commit crimes by means of running about, taking greater and more risks. With the right know-how, somebody can achieve a lot more in a lot shorter period of time [on the Web] with no physical danger. Most advanced Internet criminals have everything to gain and almost nothing to lose, if they can be clever enough to cover their electronic tracks. Judging by the small number of arrests each year, most Internet criminals are indeed clever enough to avoid detection.17
The change of investments of crimes, is a factor affecting the quota of various categories of crimes in the situation of crime in a country. Macroscopically, the relationship between the fields of criminal investment and that of the capital investment is complicated. Sometimes they will deviate from each other; sometimes they will partly overlap, sometimes they will completely coincide.
For example, in the late 1970s, at the beginning of the policy of reformation and opening to the outer world was carried out in China, violent crimes appeared prominently. It is just the first mode of the relationship.
Thereafter, since 1980s, the economic crimes cause a temporary clamour. It is just the second mode of the relationship.
From late 1990s, besides the organised crime and so forth that attracts common attention, cybercrime is getting rampant. It is just the third mode of the relationship. Now, it is in the period when the fields of criminal investment and that of the capital investment coincide. Here, the so-called investment, should be regarded as supplementary investment. The increase of the criminal investment, the increase of the capital investment, the process of the increase synchronises.
Therefore, corresponding relationship of investment accumulation arises. With the help of the term "criminal investment", some problem could be solved: one is that of criminal resources that could be used in the society, one is that of criminal investment and criminal product, one is that of the saturation of crime, one is that of the tendency of the crime.
Network may play an active role in the control of crime. One who uses the network, consumes time, energy and intellect. Cybercrime requires relevant computer knowledge. To grasp the knowledge, it again need the study process. The success of cybercrime is not so easy as theft, robbery, fraud, embezzlement and the like in the past time. If more and more people, spend more and more time using network, more and more people spend more and more time committing crimes that are more difficult to succeed, then, the power that the social control need will change to the management of the network. The mode of social control also changes.
The problem is that the process of the change is stagnant. Furthermore, in the change, someone could not understand it but be surprised at it in their intrinsic notions. They become the most wide followers of those who exaggerate the cybercrimes. They are just those bureaucrats who sit in the offices eyeing covetously others and want to teach them a lesson, but not technicians with kind and pleasant countenance. The exaggeration by the media misleads the bureaucrats to take the legislative and judicial modes under the guidance of principle of heavy penalty. This is a vicious circle. Conversely, the media report that, look at the justice, killing a computer criminal by shooting. They reap the fees of more advertisements without lifting a finger. This is just the modernised version of a Chinese ancient allusion: "When the snipe and the clam grapple, the fisherman profits."
The another effect of exaggeration of the media, is that it itself pass on the criminal skill. The potential criminals get known the cybercrime, get the ability to commit it from being ignorant of it and being unable to do, undergoing a process of learning from the propaganda of the media. From the point of view of the prevention of the crime in the modern society, media sometimes become the most reprimandable spreaders of crime. In the aspect of cybercrime, media play a role adding fuel to the flames, and enlightening the benighted. Some of them wear the legal veil, with the protection of freedom of press, make irresponsible remarks. Hereby I do not advocate to limit freedom of press, but freedom of press should benefit to the existence and development of the civilised society, but not do harm to it.
In brief, I tend to draw a conclusion that the network beneficial to the social control, and to negate the exaggeration of the media-cybercrime is not as serious as murder and arson. And The number of people who are currently walking around on the streets with bad intentions and the capability [to commit crime] far exceeds the number of people who can do the same on the Web.18
In fact, in 2001, the number of cybercrime cases in China topped 4,500, reflecting a 70 percent increase. The crimes influenced the spreading of pornography, fund embezzling and sending of computer viruses. Among the total millions of criminal cases, it may be said that they are only rarity of rarities. People pay serious attention to them is because that they are related with the high technology. Exaggerating the cybercrime is the product of the media, including websites. Some media are convenient to exaggerate, willing to exaggerate-exaggerating make a furore effect, increase ratio of clicking their websites and bargaining counters in attracting advertisements, from which they can make more money. Thus the effect of the exaggeration appear to the world that the situation of cybercrime in China is desperately serious. In fact, it is only a kind of crime of a new face, after a sober survey.
II. Roles of network in cybercrime and challenge to China
i. Network as a tool
A network is a collection of terminals, computers, servers, and components which allows for the easy flow of data and use of resources between one another.19 It is what is different from the conventional tools, means and implements. It is wide inter connected without the limits of time and boundary of space. With it, hackers intrude into the territories that do not belong to them: others' computer, websites, E-mail boxes and the like, where others' data, secrets, privacy and electronic property are stored. And the term "others" might vary from organisations to individuals. Among these hackers, those who have ever blasphemed the Chinese government is still at large.
On October 26th, 1998, the Chinese government proudly announced the official opening of the official China Human Rights web site. Within a day of the government's announcement, Bronc Buster, from the cracker group Legions of the Underground, hacked his way into the site, leaving this message in place of the original site contents, saying that: "Chinas people have no rights at all, never mind human rights. I really can't believe our government deals with them. They censor, murder, torture, maim, and do everything we take for granite left the earth with the middle ages. The Chinese communist government is made out a gang of 100+ year old thugs and bullies who hide in seclusion. This pitiful effort of trying to change the hearts and minds of the world is a joke!"
The hacked site was, surprisingly, left online for nearly 36 hours and then replaced without comment from the China Human Rights site or any other official state spokesperson.
This is only one of the incidents by the hackers, who used the Network as a tool to commit their attack.
ii. Network as a medium
As a form of media, network has its advantages that the press and broadcasting do not. It surpasses the limits of time and space, languages and traffic, and law. Various of political incite, libel, rumour and superstition rush up in a crowd, mislead the public, go even farther than traditional media. Especially in countries that the images of the governments are vulnerable, usually will suffer severe setbacks from the propaganda, which that China is confronted with reveal as the websites managed by those who advocate the independence of Taiwan, Tibet, East Turkistan and Southern Mongolia; by Falungong, exiles of June 4 Tiananmen incident, human rights groups, members of democratic movements, and other dissidents; by international anti-China forces. These websites are always publish their opinion, put forward proofs that are harmful to the government but beneficial to them.
Someone said that the "Fast-growing Internet is China's new 'Democracy Wall' ".20 The development of the network is testing Chinese politics.
A survey on impact of Internet on value orientations revealed that Communism has become the least popular value orientation among Chinese audiences, whereas Post-materialism has already been adopted by a significant portion (about a quarter) of the populace. Compared with similar surveys in the 1980s, this represents both a sharp departures from the past and an unfolding path into the future. Although Materialism has become the prevalent value orientation among the Chinese populace, there is reason to believe that it will gradually fade out from its dominance and shift to Post-materialism. For example, there is an almost imperceptible decline in Post-materialism and increase in Materialism along the age dimension, with Post-materialism being more popular than Materialism among the youngest cohort. All things considered, there are at least three areas that can be pursued along this line of research in the future: (a) cross-validating the measurement of the three value orientations, (b) monitoring the dynamic process of the rise and fall among the value orientations, and (c) exploring the consequences of the value orientations.21
The Internet poses more serious problem to the Chinese government that: 1) While the government can exert some control over the information posted online by blocking sites and enforcing censorship regulations, state control over the Internet is diminishing. 2) A wealth of information can be found online from foreign sites and other sources that directly contradict the party's spin on local events and crises. 3) Dissident material online can easily be distributed via e-mail. The government has already shut down several pro-democracy sites, but new ones rapidly take their place. 4) The Internet has created a shift in communication that allows people to speak en masse. Hostility towards the government can grow and pool. 5)The Internet is a powerful tool for organising and empowering forces that offer alternative ideologies to the Chinese Communist Party, such as the Falun Gong. 6) The Internet contributes to the economic independence of the people of China. The entrepreneurial, individualistic spirit that the growth of Internet commerce engenders would seem to contradict Communist principles.
Libel, rumour and superstition are also prevailing. Chinese government has already been aware of that the people will be involved in the vast expanse of the "anti-revolutionary" information and gradually change the situation that the CCP unifying the whole country under its dictatorship.
iii. Network as a route
Cyber criminals can defy the conventional jurisdictional realms of sovereign nations, originating an attack from almost any computer in the world, passing it across multiple national boundaries, or designing attacks that appear to be originating from foreign sources. Such techniques dramatically increase both the technical and legal complexities of investigating and prosecuting cybercrimes.22
Using software tools installed on a computer in a remote location, hackers can break into computer systems to steal data, plant viruses or Trojan horses, or works mischief of a less serious sort by changing user names or passwords.23
Corporations, like governments, love to spy on the enemy. Networked systems provide new opportunities for this, as hackers-for-hire retrieve information about product development and marketing strategies, rarely leaving behind any evidence of the theft.24
Piracy in China is the "revolt and attack against the software imperialism". In the websites managed by Chinese, several of new and old software can be downloaded easily. Some websites, as well as forest outlaws, are devoted to this kind of "charities", similar to providing relief to the poor. These acts, though belong to deviance and crime, producers of software should also self-examination in the aspect of price monopoly. Users of personal computer could not afford for the expensive software, and thus the market of piracy acts as a solution to satisfy these users.
The keen competition between the software producers virtually encourages the piracy. For example, a great portion of the market of personal computer in China is under control of Microsoft, whose software is preinstalled. Users in China know only Microsoft, can get only Microsoft, can operate only Microsoft, and can choose only Microsoft continuously. That's the prospect. Even that free software can not give full play to their advantages of price. The piracy brings software producers not so much loss but save their expenses of advertisements. Any producers of the platforms do not hope to see that the rising giant Linux swallows the Chinese market. In the framework of the existing legal system, which regards piracy as a crime, and the producers remain high prices, Linux is as competent as Microsoft is.
iv. Network as a place
The Internet has eroded the protection provided by national laws against such activities as pornography. The Internet is a global system. We can now be attacked by criminals who do not need to come to this territory. Lots of policing arrangements have their roots in the fact that victim and offender are geographically co-located. It is a different world now, and if you can do your business legitimately from home via the electronic medium, why can't that business not be criminal business? We have to move ourselves into this new world. It is a great challenge for us.25
Now, much of the money, assets, state secret and personal privacy are transformed into computer data and stored in computers, or circulate through the network. Meanwhile, network is also becoming a space to exhibit pornography, or a gambling house. Network does not have the ability of value judgement, has no culture, has no legal consciousness, but the information being stored and activities taking place in it have natures, either protected or reprimanded by laws. Furthermore, the "place" of network is trans-regional, trans-national, where there is not a unified legal system, and becomes a zone as well as the Holy Sea. Many aggressions take place at the terminals. Many harms also take place at the terminals. It seems that only terminals have something to do with crimes.
Factually, this is a contradictory brought about by the special characteristic of the "place" of network. In China, pornography is one crime that is clearly illegal, both on and off the Internet. And viewing pornography websites is illegal, too. Otherwise in some other countries at least to store these pictures in the network is legal. It is beyond the reach of the power of Chinese laws. The problem of conflict of criminal jurisdiction, but not "conflict of civil jurisdiction", have never been put forward as a serious topic as today.
A different voice, however, advocates that he criminal law has no business here. For the network have no borders, and the autonomous space of hyper perfect illusion and flawlessly recombinant culture is too slippery for any statute.26 Control -- the control we need -- is not finally a legal problem at all. It is a social, moral, and technological problem.27
v. Network as a target
Network in a certain sense can be regarded as network assets, including tangible assets and intangible assets, both hardware and software; both intra-national assets and international assets. Network assets is a kind of combinative assets, exists in the cyber space. Furthermore, network assets is not static, but exists in the process of production, which constitutes a mode of production management, for example, the activities that can be included in the field of electronic commerce. Its existence is vulnerable, easy to suffer from various of artificial attacks, some of which belong to the traditional crimes, for example, cutting off the electricity supply, destroying the cables, moving the antenna used in satellite communications; and more traditional crimes, for example, bombings on buildings housing computer equipment, arson, and theft and destruction of computer equipment.28 Nowadays, they are not regarded as cybercrimes. The cybercrimes against the network are mainly those that utilise the computer technologies but not other technologies, of which the most typical are computer viruses, as well as other malicious computer programmes, which are used to do harm to computers and network. There have been already a long list of instances of serious viruses, which the CIH, Melissa, I Love You, etc stand first on.
On 10 October, 2002, it was reported that viruses have infected at least 80 percent of China's computers, highlighting the vulnerability of one of the world's biggest PC and Internet markets. The survey conducted by the National Computer Virus Emergency Response Centre said that only 16 percent of computer users this year reported they were free from any virus attack, while last year nearly one in three users said they suffered no computer infections, half of the infected machines had suffered data losses, problems browsing the Web, or other damage.29
And " Denial of Service (DoS) Attacks" to the famous websites including "Yahoo!" took place in 2001, used the harmful programmes other than viruses. These attacks broke the network down, made the websites shut down, broke the electronic commerce, brought great direct losses in management and indirect losses in the credential.
III. Policy of controlling the network in China
It was criticised that in totalitarian or authoritarian systems, the state intrudes into every domain of the civil society and levies strict constraints on the press without delivering a corresponding level of inducements. Outright press control is imposed. A repressed press tends to exist on state subsidy and have little autonomy, especially in the political sphere. Under these circumstances, the mainstream media in general will serve as the mouthpieces of the governing elite, legitimating the status quo, demoting democracy and blocking out dissenting voices. There is little room for the survival of an alternative media. If there is one, it is usually run as the propaganda tool of an underground democratic movement.30 In China, there is no denial that the civil society may continue to grow, intensifying the frictions between the ideological and economic logic and other kinds of social tensions. It should be increasingly difficult for the ruling party to cope with such contradictions without a more equitable redistribution of political power.31
i. Cyber police
In order to control network, i.e., to control users and ISPs, China established cyber police armed with computer technologies. From then on, Chinese network is actually under the state of terror. Users are always goes online with great care for fear that they should be shadowed by the police, listed in the blacklist, and kept apart and investigated, or arrested.
In actual fact, the actual controlling ability of the troops is weak. Once a study revealed that Internet surveillance in China was hampered by an inefficient computer police force, out-dated computer protection equipment imported in the 1980s and the slow development of computer protection products.32 On the one hand, in some cities, the establishment of the cyber police became the pretext to employ unemployed relatives of the police leaders, softening the term. On the other hand, the network itself lacks of controllability. Notwithstanding, the cyber police is becoming stronger and stronger in knowledge and technologies, experiences and judgements. More and more websites may be checked and blockaded, more and more users may be shadowed and arrested. According to the laws and regulations on the basis of which the cyber police acts, they have business to produce the initial effect.
The cyber police can benefit a lot from the business of network control, for example, employment, promotion, money award, deducting a percentage from the fines. All these have never been written in any laws or regulations.
ii. Blockade
Once upon a time, blockade have been known by Chinese scholars as a general term in International Law. It is limited to be used in cyberspace in some countries. These countries are good at developing technologies, compiling programmes and assembly products for the purpose of blockading some websites, while in other countries, these are of no use whatsoever. The term "blockade" covers wide scope of meaning. For example, cancellation of users' accounts, shutting down the cyber-cafes, is of the same category of blockade.
Among the method of blockade, the shutting down of cyber-cafes is warmly welcomed by the police, who can benefit from it by ways of transferring the computers under their control, or accepting bribes from the owners of the cyber-cafes.
A typical example on control of online speech is that the control of BBS. The Qiangguo ("Qiangguo" means "to make China strong") BBS is the largest BBS in the Chinese language on political issues. It belongs to People's Daily, the China Communist Party official newspaper. Regulation relative to the BBS are strict. No postings are allowed against laws and policies of the Chinese government, with controls by both software and human intervention. The rate of censorship was probably more than 1.5% in 2000. Some subscribers have protested these controls but this sort of regulation will continue in the near future and only diminish slowly over time.33
There are two ways in which postings may be censored. The first step involves software that automatically checks the content of the posting. The second step involves censoring directly by the Webmaster.
Punishments for offending subscribers are classified into three degrees. The first and lightest is public criticism by the Webmaster. The second and main punishment is the deletion of a specific posting. The third and most serious punishment is to block the IP address and register name of a specific individual.
iii. Joint liability
In the aspect of the system of responsibility of controlling the network, a system of joint liability has been initially established, either macroscopically or microscopically, either in the central government or in the local governments. Related ministries and commissions, related basis units, are all trussed up by the responsibilities and liabilities. If careless, they can be involved in criminal cases as well as causing administrative liability. These responsibility and liability, are regulated in almost all the laws and regulations concerning the control of network.
Article 8 of the State Secrets Protection Regulations for Computer Information Systems on the Internet (1 January 2000) stipulates that the principle of 'responsibility is borne by the person who placed it on the network' is the basis for regulating the revelation of state secrets on the Internet. This does not, however, exempt each ISPs' obligation to monitor. Under Article 10, ISPs, BBS, chat rooms or network news group organisers are required to set up their own management mechanisms to assist in ensuring that no state secrets are transmitted on the Internet by their users.
Anyway, this kind of joint liability is nearer to the personal liability that those in the cases of someone breaching the birth plan. But if the criminal flees, the liability will be transferred to a certain scapegoat. This has indefinitability. Chinese Criminal Code provided the liability for neglecting of duty for government functionaries in Chapter 8, Part II.
That's why there has already been a "Public Pledge on Self-Discipline for China Internet Industry" in August 2002. More than 300 Internet service providers, Web portals, companies, universities and government agencies have signed the voluntary content control agreement. Signatories promise to purge porn, scrap subversive content and otherwise hit the delete button on any postings that might offend the Chinese government, which doesn't define its terms, expecting signatories to know what's subversive. The agreement expressly includes a promise to watch content coming in from the rest of the world for this sort of thing.34
iv. Emphasis on politics
In the world, there is not a government of a country that takes politics more seriously than Chinese government; there is not a people in a country concern themselves with politics more than Chinese people. In China, the centre of the politics is the leadership of the Chinese Communist Party.
The Party always cherished illusions that the people study " Marxism-Leninism, Mao Zedong Thought, Deng Xiaoping Theory and the important thought of Three Represents" when they are online. But things do not always turn out the way the Party wishes. There is very few who studying them online, while there are more and more people than ever expressing their "anti-revolutionary", "liberalisational", "splittist" tendency, and the like complaints and discontent.
"Chinese people" is not a term that tallies with the Chinese territory. All over the world, there are Chinese who own various political views inherited from each historical periods, from the old adherent of the past dynasties to the June 4 students in exile, from Dalai Lahma to Falun Teacher. China is connected with several of political shock waves.. The voices of Chinese people spread from Chinese native land to the abroad, from the equator to the two poles of the earth.
Although the policies of China have taken a big stride toward democracy and freedom within the 25 years when it carried out reformation and opening to the outside world, it still cannot be in harmony with the various views. In particular, Chinese government has never publicly admitted that it made any of its policy under any outer pressure or in accommodation to the views of any political groups. Under such circumstances, Chinese government has never admitted these groups into it, while it ordinarily acts independently.
In consideration of this, the circumstances that people express their grievances online are becoming the turbulent waves. To muzzle public opinion is not easy as before, only if the network be controlled. Now it is an unprecedented historical stage. The stage ended when someone was placed under surveillance of his/her relatives, colleagues or neibours, and members of his/her family were instigated to struggle and break off relations with each other. The new form was introduced both to control and anti-control.
Conclusion
Chinese politics, Chinese economy and the development of science and technology in China, form subtle relations. The authority hope to control science and technology as well as economy firmly, and control the society, including network, by the same means. This is the continuation of the conventional mode.
1 Li Xingan, B. LL. (Inner Mongolia University), M. LL. (China University of Political Science and Law), associate professor at the Law School, Inner Mongolia University. He is now student of Doctor of Laws at Institute for Law and Informatics, University of Lapland, Finland.
2 Bruce T. Fraser, Welcome to Computer Crime Research Resources [online].
3 Crime on the Internet, Jones Telecommunications and Multimedia Encyclopaedia [online]. <88digitalcentury88/encyclo/update/crime.html>(visited December 5, 2002).
4 Sunergy Beijing, The Internet in China: A Modern Tool in an Ancient Land [online]. November 19, 1997, <88sun88/sunergy/archives/beijing.html>(visited December 5, 2002).
5 Christopher W. Runckel, The Internet in China - cutting through the hype [online]. <88business-in-asia88/internet_report.html>(visited December 5, 2002).
6 Bruce T. Fraser, Welcome to Computer Crime Research Resources [online].
7 Bruce T. Fraser, Welcome to Computer Crime Research Resources [online].
8 Asian Technology Information Program (ATIP) Report, The Internet in China [online]. <88cs.arizona.edu/japan/www/atip/public/atip.reports.98/atip98.090.html>(visited December 5, 2002).
9 Asian Technology Information Program (ATIP) Report, The Internet in China [online]. <88cs.arizona.edu/japan/www/atip/public/atip.reports.98/atip98.090.html>(visited December 5, 2002).
10 Center for Asia-Pacific Policy, CAPP Seminar Examines the Internet in China [online]. <88rand88/natsec_area/products/chinainternet.html>(visited December 5, 2002).
11 Asian Technology Information Program (ATIP) Report, The Internet in China [online]. <88cs.arizona.edu/japan/www/atip/public/atip.reports.98/atip98.090.html>(visited December 5, 2002).
12 Internet in China - I [online]. <88welcome-to-china88/trend/cyber/68p.htm>(visited December 5, 2002).
13 Crime on the Internet, Jones Telecommunications and Multimedia Encyclopaedia [online]. <88digitalcentury88/encyclo/update/crime.html>(visited December 5, 2002).
14 David Icove, Karl Seger & William VonStorch, Computer Crime--A Crimefighter's Handbook, 1st Edition August 1995
15 Li Xingan, A Study On Several Issues of Computer Crime, degree thesis of Master of Laws, China University of Political Science and Law, December 1993.
16 ChinaOnline [online]. <88chinaonline88/issues/internet_policy>, October, 2002(visited December 5, 2002).
17 Teri Robinson, Does Crime Pay More on the Internet? [online]. August 28, 2002. <88newsfactor88/perl/story/19192.html>(visited December 5, 2002).
18 Teri Robinson, Does Crime Pay More on the Internet? [online]. August 28, 2002. <88newsfactor88/perl/story/19192.html>(visited December 5, 2002).
19 Learnthat88 All Free Technical Word Definitions [online]. <88learnthat88/define/n/network.shtml>(visited December 5, 2002).
20 Catharin Dalpino, Fast-growing Internet is China's new 'Democracy Wall'--Economic growth triggers unfettered communication, CNN[online].
21 Jonathan J. H. Zhu and Zhou He, Information Accessibility, User Sophistication, and Source Credibility: The Impact of the Internet on Value Orientations in Mainland China, Journal of Computer-Mediated Communication, January 2002, Volume 7(2) [online]. <88ascusc88/jcmc/vol7/issue2/china.html>(visited December 5, 2002).
22 McConnel International Report, Cybercrime . . . and Punishment? Archaic Laws Threaten Global Information, [online]. December 2000 <88mcconnellinternational88/services/CyberCrime.htm>(visited December 5, 2002).
23 Crime on the Internet, Jones Telecommunications and Multimedia Encyclopaedia [online]. <88digitalcentury88/encyclo/update/crime.html>(visited December 5, 2002).
24 Crime on the Internet, Jones Telecommunications and Multimedia Encyclopaedia [online]. <88digitalcentury88/encyclo/update/crime.html>(visited December 5, 2002).
25 Life of Crimes, Part 5, BBC News [online]. January 2001.
26 Curtis E.A. Karnow, Landels, Ripley & Diamond, Recombinant Culture: Crime In The Digital Network [online]. July 1994. <88cpsr88/cpsr/privacy/crime/karnow.html>(visited December 5, 2002).
27 Curtis E.A. Karnow, Landels, Ripley & Diamond, Recombinant Culture: Crime In The Digital Network [online]. July 1994 . <88cpsr88/cpsr/privacy/crime/karnow.html>(visited December 5, 2002).
28 These were regarded as computer crimes in books published several years ago. For example, David Icove, Karl Seger & William Von Storch, Computer Crime--A Crime fighter's Handbook, 1st Edition August 1995
29 Viruses infect 80 percent of China's computers [online]. Reuters, October 9, 2002.
30 Joseph Man Chan, Media, democracy and globalisation: A comparative perspective, Media Development, Issue 1, 2002 [online]. <88wacc88.uk/publications/md/md2002-1/chan.html>(visited December 5, 2002).
31 Joseph Man Chan, Media, democracy and globalisation: A comparative perspective, Media Development, Issue 1, 2002 [online]. <88wacc88.uk/publications/md/md2002-1/chan.html>(visited December 5, 2002).
32 China's Cyber-police lag behind Internet Hackers [online]. November 14, 1998. <88infowar88/hacker/hack_111498f_l.shtml>(visited December 5, 2002).
33 Wenzhao Tao, Censorship and Protest: The Regulation of BBS in China, People Daily, First Monday, Volume 6, Number 1 [online]. January 2001,
34 Internet content self-censorship pact takes effect in China, Pacific Business News [online]. August 1, 2002
作者:李兴安,法学学士(内蒙古大学法学院),法学硕士(中国政法大学)。内蒙古
大学法学院副教授,日本国九州大学访问研究员(2000-2001),芬兰拉普兰大学专题
研究员(2002-2006)。
高中各年级课程推荐
|
||||
年级
|
学期
|
课程名称
|
课程试听
|
|
高一 |
高一(上)、(下)同步复习
|
语文 | ||
英语 | ||||
数学 | ||||
数学(期中串讲) | ||||
数学(期末串讲) | ||||
数学拔高 | ||||
物理 | ||||
化学 | ||||
生物(一) | ||||
地理 | ||||
历史 | ||||
政治 | ||||
高中专项突破课
|
语文写作 | |||
英语阅读理解 | ||||
英语写作 | ||||
英语完形填空 | ||||
物理功和能量 | ||||
高二 |
高二(上)、(下)同步复习
|
语文 | ||
英语 | ||||
数学(理) | ||||
数学拔高(理) | ||||
数学(文) | ||||
数学拔高(文) | ||||
物理 | ||||
数学(期中串讲) | ||||
数学(期末串讲)(理) | ||||
数学(期末串讲)(文) | ||||
化学 | ||||
生物(一) | ||||
生物(二) | ||||
生物(三) | ||||
地理 | ||||
历史 | ||||
政治 | ||||
高三 |
高考第一轮复习
|
语文 | ||
英语 | ||||
数学(理) | ||||
数学拔高(理) | ||||
数学(文) | ||||
数学拔高(文) | ||||
物理 | ||||
物理拔高 | ||||
化学 | ||||
生物 | ||||
地理 | ||||
政治 | ||||
历史(韩校版) | ||||
历史(李晓风版) | ||||
高考第二轮复习
|
数学(理) | |||
数学(文) | ||||
英语 | ||||
物理 | ||||
化学 | ||||
地理 | ||||
高考第三轮冲刺串讲
|
语数英串讲(理) | |||
语数英串讲(文) | ||||
物化生串讲 | ||||
史地政串讲 | ||||
高考试题精讲
|
数学(理) | |||
英语 | ||||
化学 | ||||
物理 | ||||
2021高考研究2021高考策略(理) | ||||
2021高考研究2021高考策略(文) | ||||
Copyright © 2005-2020 Ttshopping.Net. All Rights Reserved . |
云南省公安厅:53010303502006 滇ICP备16003680号-9
本网大部分资源来源于会员上传,除本网组织的资源外,版权归原作者所有,如有侵犯版权,请立刻和本网联系并提供证据,本网将在三个工作日内改正。