Requirements to Ensure Correct Application of Criminal Law on the Crime of Using Computer Networks, Telecommunications Networks, and Electronic Means to Commit Acts of Appropriation

- Regarding identifying sources of evidence and collecting evidence:

Circular 10/2012/TTLT-BCA-BQP-BTP-BTT&TT-VKSNDTC-TANDTC

dated September 10, 2012 of the Ministry of Public Security, Ministry of National Defense, Ministry of Justice, Ministry of Information and Communications, Supreme People's Procuracy, Supreme People's Court stipulates that "Electronic data is information contained in electronic media. Electronic data can be considered evidence". Thus, electronic data obtained on computer networks, the internet... is a source of evidence (electronic evidence). The provision that electronic evidence is evidence is consistent with the current situation of investigating and handling crimes using high technology.

According to the provisions of the 2015 Criminal Procedure Code, sources of evidence and electronic data are regulated in Articles 87, 88, 89 and 107 of the Criminal Procedure Code. In addition, Clause 3, Article 223 of the Criminal Procedure Code mentions the secret collection of electronic data as a special investigative measure. However, there is currently no sub-law document providing detailed guidance on this issue.

In addition, Article 107 of the Criminal Procedure Code also stipulates the contents of inspection, evaluation, preservation, and sealing of evidence as electronic data... However, electronic evidence has differences compared to other evidence as well as the detection, preservation, evaluation and use of this type of evidence is very difficult. When discovered, criminals can quickly delete or edit to destroy it, making it very difficult to collect and restore evidence. In addition, criminals often use nicknames and email addresses (email boxes) to communicate, and only after a long time the crime is discovered. At that time, recovering data in emails as well as identifying the person who created the email is very difficult. In many cases, data cannot be recovered and only based on statements for processing. Therefore, it is necessary to have a process for collecting, backing up, restoring, and encrypting data to ensure the integrity and maintain the value of evidence, and the responsibility of individuals collecting and preserving evidence.

Maybe you are interested!

- Regarding identification of the victim:

Article 4 of Circular 10/2012/TTLT dated September 10, 2012 stipulates: “In the process of investigating criminal cases of crimes in the field of information technology and telecommunications, the prosecuting agencies must apply verification measures and take statements from victims according to the provisions of law. In case of objective reasons,

Requirements to Ensure Correct Application of Criminal Law on the Crime of Using Computer Networks, Telecommunications Networks, and Electronic Means to Commit Acts of Appropriation

The victim cannot be identified (because the victim lives abroad; the specific victim cannot be identified or the full name and real address of the victim cannot be identified because the offender and the victim do not have direct contact with each other but only through the Internet or telecommunications network; the victim does not cooperate because they do not want to reveal their identity, the amount of damage is not much...), but based on the collected documents and evidence, there is a basis to determine that the suspect or defendant has committed a crime, then the failure to identify the victim or the failure to identify the full number of victims does not affect the determination of the nature of the case and the initiation of investigation, prosecution and trial is legally justified".

When applying Circular 10/2012, there are different perceptions and viewpoints among city-level prosecution agencies, as well as between superior and subordinate prosecution agencies.

A typical example is the case of "Using computer networks, telecommunications networks, and electronic means to commit acts of property appropriation" by Cletus Chimaobi Hillary and Okonkwo Mathias Ugochukwu. Chimaobi and Ugochukwu colluded with a number of subjects to hack into email addresses to obtain all information on the purchase and sale of goods between Hoa Sen Group Joint Stock Company (Vietnam) and KHP Roofing Company (Malaysia); between Sao Vang Rubber Joint Stock Company (Vietnam) and M/S Rashel Tyre House Company (Bangladesh), then forged requests for 02 foreign companies to pay for goods into designated accounts, appropriating 31,535 USD. During the investigation, 02 foreign companies refused to participate in the proceedings, so at the first instance trial, the People's Court of Ho Chi Minh City did not include the above 02 companies in the proceedings, and declared the confiscation of the amount to the state budget.

31,535 USD. However, the judgment was overturned by the appellate court because the Court of First Instance did not determine the legal status of the two companies and confiscated the amount of 31,535 USD, which was not in accordance with the law.

Thus, the awareness and viewpoints on identifying victims according to Circular 10/2012 among the prosecution agencies at two levels are not consistent.

In addition, the specific nature of crimes using computer networks, telecommunications networks, and electronic means to commit property appropriation has many victims.

During the investigation, the Investigation Agency verified, summoned, and published a newspaper search for them, but for some reason they did not come. However, when the case was brought to trial, the victims submitted a request to be considered for participation in the proceedings, leading to the case having to return the file for further investigation, causing a waste of time and prolongation.

- Regarding identifying the criminal:

This is a relatively difficult problem in crimes using computer networks, telecommunications networks, and electronic means to commit property appropriation in Ho Chi Minh City, because most of the subjects often use fake information, steal user information such as: stealing identity cards to open bank accounts for transactions. At the same time, criminals often use social networks such as Zalo, Facebook, Viber... to commit crimes, while some social networks have servers located abroad, managed by foreign agencies, so extracting data and encrypting information will encounter many difficulties in the investigation, prosecution, and trial of criminals.

- Regarding determining the amount of money appropriated and damage:

In some cases of using computer networks, telecommunications networks, and electronic means to commit property appropriation in Ho Chi Minh City, the subjects used the trick of creating websites or advertising on the Internet to sell cheap electronic products, installment payments, or other products that did not exist... to appropriate money to buy goods. Many victims transferred deposits and purchased goods, but when the Investigation Agency discovered the crime, their background could not be determined or the Investigation Agency could contact them but they did not cooperate and refused to make a statement. While the criminals all admitted that all the money in the accounts created by these subjects and defrauded buyers was fraudulent money, however, when the trial, the Court relied on the number of victims who filed complaints to determine the amount of money appropriated.

A typical case is: Phung Dinh Tan and his accomplices falsely advertised the sale of electronic goods on the website to lure customers to transfer money to buy goods into an account created by Tan in another person's name, in order to avoid responsibility. After transferring money, the victims did not receive the goods or received poor quality goods. The total amount of money transferred by the victims to the accounts was 706,065,7000 VND. Too

During the investigation, 14 people filed complaints about the appropriation of 259,800,000 VND. Tan and his accomplices admitted that all the money generated in the accounts created by Tan was fraudulent money, so the Ho Chi Minh City People's Procuracy prosecuted Tan and his accomplices for appropriating 706,065,700 VND. During the trial, the Ho Chi Minh City People's Court again based on the number of complainants and determined that Tan and his accomplices had appropriated 259,800,000 VND.

- Difficulties in handling criminals who are foreigners:

Recent trial practices in Ho Chi Minh City have shown that in a number of cases, subjects used computer networks, telecommunications networks, and electronic devices to commit organized property appropriation, in which the main criminals in the cases were foreigners residing abroad and colluding closely with domestic subjects to commit the crime. Therefore, during the investigation, prosecution, and trial, many difficulties were encountered in verifying background and applying legal regulations to foreigners.

A typical case is: Daniel Chiedozie Nwachukwu (Nigerian) committed a crime in Vietnam under the direction of a person calling himself White, who is living in Cambodia.

Daniel Chiedozie Nwachukwu only communicated with White via WhatsApp. Under White's direction, Daniel Chiedozie Nwachukwu met Vu Thi Ngoc Han for the first time and received 47,700 USD. Then, Daniel Chiedozie Nwachukwu delivered the above amount to another Nigerian compatriot (identity and background unknown) at Quynh Trang Hotel and was paid 200 USD. The second time, on October 12, 2017, Daniel Chiedozie Nwachukwu continued to meet Ms. Han to receive 1,200,000,000 VND and was discovered, recorded and arrested by the authorities.

Vu Thi Ngoc Han stated: around August 2017, through the social network Tango, Ms. Han met a person who claimed to be William Elvis David (David), an American citizen, working in Cambodia. David promised to marry her and asked Ms. Han to open an account at BIDV Bank to facilitate applying for a visa to the US later, so Han believed him and followed suit. By the end of September 2017, David asked Han to receive 48,450 USD transferred from Hong Kong and

delivered to Charles, David's friend currently in Vietnam. The first delivery was successful. On October 11, 2017, David continued to ask Ms. Han to receive 1,200,000,000 VND to deliver to Charles. On November 12, 2017, when Ms. Han was delivering money to Charles (exactly Daniel Chiedozie Nwachukwu), she was discovered by the authorities.

The People's Court of Ho Chi Minh City has declared the defendant Daniel Chiedozie Nwachukwu guilty of "The crime of using the Internet to commit property appropriation". However, it is not possible to identify the subject named White according to the testimony of Daniel Chiedozie Nwachukwu or William Elvis David according to the testimony of Vu Thi Ngoc Han (contacted via the social network Tango). This is one of the difficulties that the Ho Chi Minh City prosecution agency has encountered in the process of investigating, prosecuting and trying cases related to this crime.

- Difficulty in handling cases arising from virtual assets and money

virtual:

In the digital age, all commercial and consumer transactions

can all be done at home using devices connected to the Internet. Therefore, virtual assets, virtual currencies (cryptocurrencies, digital currencies) were born as a means of transaction with very high liquidity and very convenient to exchange, buy, sell and pay worldwide. Currently, the use of virtual currencies as a means of payment is not recognized and protected by Vietnamese law. However, a survey of the current situation in Ho Chi Minh City shows that although the legal framework is still rudimentary, virtual assets and virtual currencies are being traded widely, many people participate but mainly for speculative purposes, many organizations and individuals have set up virtual currency mining machines, and many scams related to virtual currencies have occurred in the area, causing disorder and insecurity in society. Therefore, although virtual currencies have great value, they are not currently considered protected assets by law, so the use of computer networks and the Internet to appropriate virtual currencies is not handled. This is a newly arising legal issue related to crimes using computer networks, telecommunications networks, and electronic means to commit acts of appropriating virtual currency assets. There needs to be specific legal corridors on this issue in the near future.

2.4.3. Causes of difficulties and problems

- Firstly, there is no document guiding the application of Article 290 of the Penal Code.

Currently, the Crime of using computer networks, telecommunications networks, and electronic means to commit acts of property appropriation (Article 290 of the Penal Code) has many points different from the provisions of Article 226b of the 1999 Penal Code, leading to inconsistent application of the provisions on this crime. These problems have been pointed out by the Thesis in the above sections through comments and evaluations of cases.

- Second, criminals are often people who are proficient in computer technology, have qualifications and experience in the field of information technology. This type of crime is mainly committed through social networks, the Internet... but most of the investigators, prosecutors, and judges in Ho Chi Minh City currently have certain limitations or do not meet the requirements for knowledge in the field of information technology, have not been trained, and have not been professionally trained to fight this type of crime, so they have difficulty in handling crimes.

- Third, Crimes using computer networks, telecommunications networks, and electronic means to commit acts of property appropriation are carried out with modern criminal tools and means, so the criminal methods are very sophisticated and difficult to detect, while equipment and technical means serving the work of detecting, investigating, and appraising this type of crime have not kept up with the rapid changes of modern technology.

- Fourth, the state management of information technology, telecommunications, e-commerce, computer networks, securities transactions, banking transactions, etc. in Ho Chi Minh City still reveals certain loopholes and shortcomings. In particular, the safety and security of many agencies, businesses and individuals are still lacking, many banks are often lenient in implementing policies on account opening procedures for individual customers, the inspection and approval process is still limited in principle, not ensuring quality and efficiency, customers only need an ID card to open a transaction card account.

- Fifth, the coordination relationship in the activities of examining and evaluating evidence of judicial agencies still has many shortcomings. For large and complicated cases in terms of criminal forms, most of the evidence in the fight against crime is often stored in computer data, so it is necessary to coordinate with specialized agencies in high technology in encoding data and converting data so that it can be read and viewed. However, the coordination relationship between agencies conducting proceedings in the city in the past has not been smooth and tight, which is also one of the causes of difficulties in the investigation, prosecution and trial of cases.

- Second, the issue of judicial assistance and judicial entrustment has very limited results, many judicial entrustment cases are prolonged or have no results. In many cases, the crime is committed on the territory of Vietnam, the offender is a foreigner and committed outside the territory of Vietnam, so investigation, handling, judicial entrustment and judicial assistance face many difficulties.


Chapter 2 Summary

In Chapter 2 of the thesis, the author has presented an overview of the crime situation using computer networks, telecommunications networks, and electronic means to commit acts of property appropriation in Ho Chi Minh City, thereby showing that this type of crime in the city tends to increase every year and with the nature, level, and scale of criminal activities becoming increasingly sophisticated, organized, and difficult to detect. At the same time, the author has also presented the practical application of the law in determining the crime according to Article 290 of the Penal Code through the analysis of typical cases, thereby seeing the shortcomings in the application of the law between the agencies conducting the proceedings at all levels in the area. In addition, the author of the thesis also surveyed, researched, studied, and presented the advantages, difficulties, and obstacles in the practical trial of crimes according to the provisions of Article 290 of the Penal Code and the causes leading to the shortcomings and limitations in the investigation, prosecution, and trial of this crime. This is an important basis for the author of the thesis to propose specific solutions to contribute to improving the effectiveness of law enforcement in the practice of trial of this crime in Ho Chi Minh City in the following years in chapter 3.

Chapter 3

REQUIREMENTS AND SOLUTIONS TO ENSURE PROPER APPLICATION OF CRIMINAL LAW ON CRIMES OF USING COMPUTER NETWORKS, TELECOMMUNICATIONS NETWORKS,

ELECTRONIC MEANS OF PROPERTY APPROPRIATION


3.1. Requirements to ensure correct application of criminal law on the crime of using computer networks, telecommunications networks, and electronic means to commit acts of property appropriation

Because this type of crime has a wide operating environment, a wide scope of impact, and huge consequences, the person assigned to conduct the proceedings must have a certain level of experience, skills, and qualifications. All procedural activities right from the initial investigation stage are meaningful and important, the results of these activities support and contribute to the procedural activities in the next stage, all procedural acts and activities always ensure the requirement of linking prosecution with investigation activities, inspection, and close supervision of trial activities. The results of the investigation activities must have a clear and specific purpose and meaning such as indictment or exoneration, avoiding rambling and lack of focus. Therefore, to ensure the correct application of criminal law on the crime of using computer networks, telecommunications networks, and electronic means to commit acts of property appropriation, the agencies conducting the proceedings must ensure the following requirements:

- In terms of investigation: Investigators need to correctly and objectively determine the actual circumstances of the case, based on the collection and verification of evidence and relevant documents to put forward appropriate hypotheses and draw accurate conclusions about the content of the case and the criminal acts of the accused. On that basis, choose the correct corresponding criminal law norms to accurately and fully compare the signs of constituting the crime prescribed in that norm with the circumstances of the acts performed in reality, on that basis, draw a well-founded conclusion about the consistency between the actual acts performed and the criminal acts prescribed in the article or clause of the corresponding law.

Comment


Agree Privacy Policy *