论文部分内容阅读
目前,在我国围剿网络黄潮的专项斗争中,广大司法人员面对电子证据取证艰难的巨大挑战,创造了有效的“权宜之计”——将电子证据转化为其他证据使用。例如,侦查人员通过网络监控或群众举报获得色情网站线索后,不能将网络监控或网络勘查收集到的电子证据直接用于司法证明,通常要实施传统的现场勘查,同步制作勘验、检查笔录;或者讯问犯罪嫌疑人,力求突破口供;或者通过做网站技术人员和网站会员等知情人员的思想工作,获得证人证辞……这些“转化型”证据虽然能够用于定案,但毕竟属于派生或辗转得来的材料,证据效果显然逊色得多。那么,司法人员为什么不直接将收集、固定所得的色情数码资料、淫秽网页数据、电子聊天记录、电子公告牌记录与电子邮件记录等作为控诉证据呢?除了观念因素,主要原因是我国电子证据立法(或电子证据规则)的缺失。古语有云:“它山之石,可以攻玉”。本文将以信息技术发达、立法相对先进的美国为例,遴选及评述其打击网络色情犯罪的三个著名案例以飨读者,并初步探讨我国的应对之策。
At present, in the special campaign of our country to hunt down the yellow wave of the Internet, the vast number of judicial personnel have faced the tremendous challenge of obtaining evidence of evidence in electronic form and created an effective “expedient measure” to transform electronic evidence into other evidences for use. For example, investigators can not directly use the electronic evidence collected by network monitoring or network surveys for judicial identification after they have obtained clues to pornographic websites through internet monitoring or mass reporting. They usually conduct traditional on-the-spot surveys and simultaneously produce expeditions and check transcripts. Or to interrogate the suspects, and strive to break through confessions; or by doing the ideological work of the site technicians and web site members and other witnesses, access to witness testimony ...... Although these “conversion” evidence can be used to determine the case, but after all, belong to the derivative or removed Obtained material, the evidence is obviously less effective. So, why do not judicial officials directly collect and fix pornographic digital materials, obscene webpage data, electronic chat records, electronic bulletin board records and e-mail records as the evidence of accusation? Apart from the ideological factors, the main reason is that China’s electronic evidence legislation (Or rules of electronic evidence) is missing. As the old saying goes: “It’s a mountain of stone, you can attack jade.” Taking the United States with advanced information technology and relatively advanced legislation as an example, this article selects and comments on three famous cases of cracking down cybercrime crimes on the basis of readers’ comments and probes into our countermeasures.