西南石油大学学报(社会科学版) ›› 2019, Vol. 21 ›› Issue (6): 76-83.DOI: 10.11885/j.issn.1674-5094.2019.09.02.01

• 政治与法律 • 上一篇    下一篇

流量劫持的刑法规制思考——以第102号指导性案例为视角

陈禹衡   

  1. 东南大学法学院, 江苏 南京 211189
  • 收稿日期:2019-09-02 出版日期:2019-11-01 发布日期:2019-11-01
  • 作者简介:陈禹衡(1994-),男(汉族),江苏淮安人,博士研究生,研究方向:刑法学。

Thoughts on the Criminal Law Regulation of Traffic Hijacking——From the Perspectiveof Guiding Case No. 102

CHENG Yuheng   

  1. School of Law, Southeast University, Nanjing Jiangsu, 211189, China
  • Received:2019-09-02 Online:2019-11-01 Published:2019-11-01

摘要: 随着网络时代的高速发展,流量劫持已经成为危害广泛的网络安全问题。以前的司法审判倾向于将流量劫持定性为不正当竞争行为,但第102号指导性案例的发布则释放出趋于刑法规制的信号。流量劫持主要包括DNS劫持、CDN劫持、网关劫持、客户端劫持,特点是高度隐蔽性、证据收集难度大、行为性质有争议。流量劫持的犯罪客体有虚拟财产说、计算机信息系统管理秩序说、计算机信息系统安全说。在司法实践中,对流量劫持规制模式的选择,需要依据硬性流量劫持和软性流量劫持予以区分,同时以第102号指导性案例为指引,通过刑法予以规制,坚决遏制流量劫持这一“技术越界”行为,利用刑法的强制力保障计算机信息系统的安全与稳定。

关键词: 流量劫持, 指导性案例, 计算机信息系统安全, 技术越界, 虚拟财产

Abstract: With the rapid development of the internet era, traffic hijacking has become an extensive threat to network security. Traffic hijacking used to be defined as unfair competition in judicial practice, but Guiding Case No. 102 signals that traffic hijacking should be adjudged to be a criminal crime. Traffic hijacking like DNS hijacking, CDN hijacking, BGP hijacking, and client-side hijacking is of controversial nature. As it is done covertly, it is difficult to collect evidence. The criminal objects of traffic hijacking are defined as virtual assets, the management order of computer information system, and computer information system security. In judicial practice, legal regulation on traffic hijacking needs to be differentiated based on hard traffic hijacking and soft traffic hijacking. According to Guiding Case No. 102, the "technical transgression" behavior should be regulated by the criminal law so as to curb hijacking and to ensure the security and stability of computer information systems.

Key words: traffic hijacking, guiding case, computer information system security, technical transgression, virtual assets

中图分类号: