Chang Chi-yuan (張啟元) last month hacked Taiwan High Speed Rail Corp’s (台灣高鐵) online ticketing system, tweaking the refund process to return NT$200,000, police said yesterday.
Chang used his cellphone to purchase a NT$40 ticket from Nangang Station to Taipei Railway Station, then immediately requested a refund, police said.
A company employee noticed the abnormal refund amount and reported the incident to the Taipei office of the Ministry of Justice Investigation Bureau, police said.
Photo courtesy of Ministry of Justice Investigation Bureau
An affidavit on Wednesday said that Chang admitted to making the changes and seeking the altered refund, but added that he hacked the system to prove that it was vulnerable.
“Had I received the NT$200,000, I would have returned it to the company,” the affidavit read.
Chang was released on bail of NT$100,000 after the office charged him with alleged breaches of the Criminal Code, police said.
Chang is a self-proclaimed “white hat” hacker, a computer security expert who specializes in testing systems for vulnerabilities.
Chang last year reportedly hacked the Apple Pay system and purchased 502 iPhones for NT$1, while in 2013 he drew the attention of Facebook after using a loophole to delete posts by Facebook creator Mark Zuckerberg.
In 2015, Chang was sued by a local bus operator after infiltrating its online system and buying a ticket for NT$1. While Chang returned the ticket and warned the company of the weakness in its system, the company pressed charges.
Chang was sentenced to 60 days in prison, which was commuted to a NT$60,000 fine.
Chang yesterday wrote on Facebook that he despaired of being Taiwanese after his most recent run-in with law enforcement.
He said that he did not want to admit to being Taiwanese.
“I have already given up on Taiwan,” he wrote.
The nation’s fastest supercomputer, Nano 4 (晶創26), is scheduled to be launched in the third quarter, and would be used to train large language models in finance and national defense sectors, the National Center for High-Performance Computing (NCHC) said. The supercomputer, which would operate at about 86.05 petaflops, is being tested at a new cloud computing center in the Southern Taiwan Science Park in Tainan. The exterior of the server cabinet features chip circuitry patterns overlaid with a map of Taiwan, highlighting the nation’s central position in the semiconductor industry. The center also houses Taiwania 2, Taiwania 3, Forerunner 1 and
FIRST TRIAL: Ko’s lawyers sought reduced bail and other concessions, as did other defendants, but the bail judge denied their requests, citing the severity of the sentences Former Taipei mayor Ko Wen-je (柯文哲) was yesterday sentenced to 17 years in prison and had his civil rights suspended for six years over corruption, embezzlement and other charges. Taipei prosecutors in December last year asked the Taipei District Court for a combined 28-year, six-month sentence for the four cases against Ko, who founded the Taiwan People’s Party (TPP). The cases were linked to the Core Pacific City (京華城購物中心) redevelopment project and the mismanagement of political donations. Other defendants convicted on separate charges included Chinese Nationalist Party (KMT) Taipei City Councilor Angela Ying (應曉薇), who was handed a 15-year, six-month sentence; Core Pacific
J-6 REMODEL: The converted drones are part of Beijing’s expanding mix of airpower weapons, including bombers with stand-off missiles and UAV swarms, the report said China has stationed obsolete supersonic fighters converted to attack drones at six air bases close to the Taiwan Strait, a report published this month by the Arlington, Virginia-based Mitchell Institute for Aerospace Studies said. Satellite imagery of the airfields from the institute’s “China Airpower Tracker” shows what appear to be lines of stubby, swept-winged aircraft matching the shape of J-6 fighters that first flew with the Chinese People’s Liberation Army (PLA) Air Force in the 1960s. Since their conversion to drones, the aircraft have been identified at five bases in China’s Fujian Province and one in Guangdong Province, the report said. J.
China used fake LinkedIn profiles to harvest sensitive data from NATO and EU institutions by soliciting information from staff, a European security source said on Friday. The operation, allegedly orchestrated by the Chinese Ministry of State Security, targeted dozens of employees at the military alliance or EU organizations through fictitious accounts, the source said, confirming reports in French and Belgian media. Posing as recruiters on the online professional networking platform, Chinese spies would initially request paid reports before later soliciting non-public or even classified information. One particularly active fake profile used the name “Kevin Zhang,” claiming to be the head