home *** CD-ROM | disk | FTP | other *** search
Text File | 1994-06-10 | 96.5 KB | 3,144 lines |
- Computer Crime:
-
- Current Practices, Problems and Proposed Solutions
-
- Second Draft
- Brian J. Peretti
-
-
- It would have been surprising if there had been satisfactory
- road traffic legislation before the invention of the wheel, but
- it would also have been surprising if the law on the passage of
- laden donkeys proved entirely satisfactory when applied to
- vehicles.1
-
- I. Introduction
- Within recent years, computer crime has become a
- preoccupation with law enforcement officials. In California, a
- group of West German hackers2 using phone lines and satellite
- hookups, gained unauthorized access into civilian and military
- computers and stole sensitive documents that were sold to the
- Soviet Union.3 A young New York programmer broke into a
- Washington computer to run a program that he could not run from
- his personal computer.4 After Southeastern Bell Stated that a
- document published in an electronic publication5 was valued at
- more than $75,000 the publisher was arrested and brought to trial
- before the discovery that the document could be publicly bought
- from the company for $12.6 The Chaos Computer Club, a Hamburg,
- Germany, club, went into government computers and access
- information and gave it to reporters.7 In May, 1988, the United
- States government launched Operation Sun Devil, which lead to the
- seizure of 23,000 computer disks and 40 computers.8 In
- addition, poor police performance9 has also been blamed on
- computers.
- Since its creation, the computer has become increasing
- important in society.10 The law, as in the past, has not been
- able to evolve as quickly as the rapidly expanding
- technology.11 This lack of movement on the part of governments
- shows a lack of understanding with the area. The need to create
- a comprehensive regulation or code of ethics has become
- increasing necessary.
- Due to the nature of computer systems and their
- transnational connections through telephone lines12, an
- individual state's action will only stop the problems associated
- with computer crime if many states join together. The patchwork
- of legislation that exists covers only a small part of the
- problem. To adequately address computer crime, greater efforts
- must be made within the computer community to discourage
- unauthorized computer access, countries must strengthen and
- co-ordinated their computer related laws, as well as proper
- enforcement mechanism created, computer program copyright laws be
- enhanced and computer systems should be created to allow those
- who wish to explore computer systems which will not disrupt the
- users of computer systems.
- This paper will first set out a definition of computer crime
- and why laws or regulation by the computer community must be
- created. Section II will then discuss the United States law
- concerning computer crime and why it needs to be strengthened.
- Section III will discuss the proposed Israeli computer crime
- bill, Britain's Computer Misuse Act and Ghana's proposed law.
- Section IV will discuss what can be done by both the government
- and computer owners and users to make computer crime less
- possible.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- II. Computer crime
- The definition of what constitutes a computer crime has been
- the subject of much controversy. A computer crime has been
- defined as "any illegal act for which knowledge of computer
- technology is used to commit an offense."13 The typical
- computer criminal has been described as between 15 and 45 years
- old, usually male, no previous contact with law enforcement, goes
- after both government and business, bright, motivated, fears loss
- of status in computer community and views his acts as games.14
- For the purposes of this article, this will be the definition
- used because of its broad reach.
- Estimates regarding how much is lost to computer crime very
- widely15. In the only authoritative study, the loss due to
- computer crime was given at $555,000,000, 930 personnel years
- lost and 153 computer time years lost.16 The amount of total
- incidents for 1988 was 485 resulting in 31 prosecutions17. In
- 1987, there were 335 incidents with 8 prosecutions.18 Security
- spent on prevention of computer crime is becoming more
- commonplace19.
- The most publicized danger to computer systems are
- viruses20 and worms. A virus is a code segment which, when
- executed, replicates itself and infects another program.21
- These viruses may be created anywhere in the world22 and may
- attack anything.23 A virus may be transmitted through a trojan
- horse24 program. A worm exists as a program in its own right
- and may spread over a network via electronic mail25. A virus
- attacks a program while a worm attacks the computer's operating
- system.26 The most notorious computer worm brought the
- Internet computer network to a halt.27
- Computer virus attacks may be overrated.28 It is said
- that the biggest threat to computing includes "not backing up
- your data, not learning the ins and outs of your application
- programs, not putting enough memory in your computer, not
- organizing your hard disk, [and] not upgrading to the latest
- version of your applications.29 These computer programs have
- been compared to the AIDS virus.30 One author has stated that
- the viruses are used to both increase the amount of profits of
- computer program producers and anti-virus computer programs.31
- Computer viruses may also be used to benefit computer
- systems, by either detecting flaws in security measures or
- detecting other viruses.32 Virus are very dangerous, though.
- The effects of a virus called Datacrime, activated on October 13,
- 1989, brought down 35,000 personal computers within the Swiss
- government and several companies in Holland.33
- With the opening up of Eastern Europe, the virus problem is
- expected to increase.34 In Bulgaria, a country which does not
- have any laws against computer viruses, one new virus appears
- week.35 Computer viruses are created in countries like the
- Soviet Union as a way to punish computer pirates because of the
- lack of copyright laws.36
- Perhaps the most dangerous threat to information contained
- in a computer is the "leakage" of radiation from the computer
- monitors.37 With inexpensive equipment38 a person can "read"
- the information off the computer screen and then replicate the
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- information from the screen in a readable manner.39
- The threat of attack on a computer system can also come from
- a hacker. A hacker is a person who breaks into, whether
- maliciously or not, computers or computer systems.40 A hacker
- can, if the system is not adequately secured, cause havoc in the
- computer by either deleting or altering programs or data or
- planting logic bombs or viruses in the computer system.41
- Threats from hackers to plant viruses have been made in the
- past.42 The threat from computer hackers, as with viruses, has
- been said to be overrated.43
- The issues surrounding computers still have not been decided
- by those within the computer community. Whether or not persons
- should be allowed to access computer systems without
- authorization is still a subject of debate within the computing
- community. A West German Computing Club, called The Chaos
- Computing Club, holds the belief that it is not improper to enter
- any system which they can gain access to and to "look" around
- inside of the system as much as they wish.44 They do not,
- however, condone destroying or altering any of the information
- within the system.45 On the other side, represented by
- Clifford Stoll, when individuals break into computer systems they
- disrupt the trust that the computer system is based on.46 This
- breach of trust not only makes operating the system tougher for
- the manager in control of the system, but also will decrease the
- amount of use of the system so less information will be
- transferred within the system.47
- There is also conflicting views as to whether the authors of
- computer viruses should be punished. Marc Rotenberg48 holds
- the belief that a virus should be granted first amendment
- protection in some instances.49 In response to the Internet
- worm, there were 21 editorials that stated that the attack showed
- the need for more security in computers while there were 10
- letters to editors that stated that the creator should be
- applauded rather then punished.50 They argue that this was a
- good way to raise consciousness concerning computer security.51
- Alan Solomon, a consultant who specializes in virus detection and
- eradication, believes that viruses are, at most, an
- inconvenience.52
-
- III.United States Computer Legislation
- The United States government53 and most states54 have
- computer crime laws. In 1979, only six states had such laws.55
- Almost every computer crime will, in addition to violating a
- state and/or federal law, can also be prosecuted under other
- laws.56
- A. Computer Fraud and Abuse Act.
- Congress originally enacted the Counterfeit Access Device
- and Computer Fraud and Abuse Act57 to address the problem of
- computer crime. Understanding that the scope of the original law
- was too narrow,58 in 1986 Congress enacted amendments to the
- Computer Fraud and Misuse Act of 1984.59 The Act essentially
- lists acts that if done with a computer are illegal. The Act
- also makes individuals culpable for attempting to commit a
- computer crime.60
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- In order to commit any of the crimes mentioned in the act,
- the actor must have acted either "intentionally" or "knowingly"
- when committing the act. The law addresses national security
- issues by making a crime of anyone using a computer to obtain
- information and giving the information to foreign countries.61
- The penalty for this crime or its attempt is 10 years for the
- first offense62 and 20 years for subsequent offenses63. If a
- person intentionally accesses a computer either without
- authorization or in excess of his authorization and obtains and
- acquires information in a financial record of an institution or
- information contained in a financial record of an individual64,
- the person will have committed a misdemeanor for the first
- offense65 and a felony for subsequent offenses66. A person
- intentionally accessing a government computer without
- authorization which affects the government's use of that
- computer67 will have committed a misdemeanor for the first
- offense68 and a felony for the second offense.69 Accessing a
- computer with knowledge and intent to defraud and without or
- exceeding authority is a crime if the person obtains anything of
- value other than use is a felony70. Accessing a federal
- interest computer without authorization and either modifying
- medical records or causing $1,000 or more worth of damage within
- a one year period71 is punishable with up to 5 years for the
- first offense72 and 10 years for any subsequent offense.73
- The Act also criminalizes trafficking in passwords.74 A
- person who knowingly and with intent to defraud traffics75 in
- passwords or similar information may be sentenced for up to one
- year for the first offense76 and up to 10 years for subsequent
- offenses77 if the computer is used by or for the Government of
- the United States78 or affects interstate or foreign
- commerce.79
-
- B. Criticisms
- It is important to note that this statute only applies to
- "Federal interest computers" as defined by this section.80 If
- a computer is not this type of computer, then any of the above
- mentioned crimes will not be prosecutable under this section.
- Congress intentionally made the scope of the law narrow.81
- This section has been criticized as not inclusive enough.82
- Individual and corporate computers which do not fall into the
- restrictive definition83 may not receive the protection of the
- statute.
- The problem of computer viruses are not addressed by
- Act.84 The act does not punish those who add information into
- a computer, even though this may do more harm then just accessing
- information. The Congress has attempted to address this issue
- under two bills85, but neither one has been enacted.
- Unauthorized access where there is no theft or damage to the
- system is not covered.86 For example, a person access a
- computer system and looks at information contained therein, he
- has not committed a punishable crime under the Act.87
- Questions have also been brought up concerning many of the
- undefined terms within the Act.88 Terms such as "intentionally
- access" and "affects interstate commerce" are among the terms not
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- defined.89 The need to clarify these terms is important so
- that an individual will know what action will constitute a crime.
-
-
- IV. Legislation From Around The World
- A. Israel Proposed Computer Law
- In March 1987, the Israeli Ministry of Justice distributed a
- draft of a comprehensive computer bill.90 This bill covers a
- wide range of areas concerning computers91. The Act first sets
- out a list of proposed definitions for computer, program,
- software, information, thing and act. Each of these, while
- short, are concise and attempt to give a brief but comprehensive
- definition.92
- Chapter 2 sets out a list of offenses which, if committed,
- are punishable.93 A authorized person commits an act upon any
- computer and knows that the act will prevent or cause disruption
- of the proper operation is subject to seven years
- imprisonment.94 A person who, without authority, commits an
- act which precludes a person from using a computer system or
- deprives a person of using that system is punishable by up to
- seven years imprisonment.95 If a person prepares or delivers
- or operates software knowing that the software will produce
- faulty results and "having reasonable grounds to assume", the
- person is punishable for up to seven years.96 The Act also
- addresses those who supply, deliver or operates a computer with
- faulty data.97
- Section 5 applies to those who use a computer to attempt to
- obtain some "thing"98 or with intent prevents another from
- obtaining some "thing".99 A person who prevents another from
- obtaining a "thing" by the use of software may also be
- punished.100 A person who deprives a person of an object that
- contains software, data or information and obtaining a benefit
- for himself.101 All of these crimes contain a prison sentence
- of five years.
- A professional who relies on computer outputs that they know
- which are false is also subject to punishment.102 The crime
- carries a sentence of five years.103
- This chapter does not apply to all computers, software data
- or information.104 It only applies to those computers, data
- or information which are used, designated to be used by or for
- (1) the state or a corporation that is supplying service to the
- public105 or (2) "business, industry, agriculture, health
- services, or for scientific purposes."106
- Perhaps the most novel provision of this proposed law is the
- section governing the reporting of the offenses. Any person who
- is in charge of another and has reason to believe that an
- individual has committed an offense under the Act, he must report
- this to police as soon as possible.107 If the person does not
- do so, he may be imprisoned for up to one year.
- B. Analysis
- The Israeli computer crime bill is more comprehensive then
- the America bill. By creating a law which will apply not only to
- government computers, but also to those of "business, industry,
- agriculture, health services or for scientific purposes,"108
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- the law essentially covers all computers in the country.109
- By creating such broad coverage, the law will be able to make the
- users of computers in Israel more secure in their knowledge that
- their systems are safe. B. Analysis
- The Israeli computer crime bill is more comprehensive then
- the America bill. By creating a law which will apply not only to
- government computers, but also to those of "business, industry,
- agriculture, health services or for scientific purposes,"110
- the law essentially covers all computers in the country.111
- By creating such broad coverage, the law will be able to make the
- users of computers in Israel more secure in their knowledge that
- their systems are safe.
- The most controversial provision in the act is the proposal
- requiring that individuals that may know of computer crime must
- report the crime or face fines themself. As Levenfeld points
- out112, this will mean that employers will have to impose
- internal spy rings to be able to tract down the "reasonable
- suspicions" that individuals have concerning illegal activity.
- Shalgi, however, believes that this is a good provision in that
- it will allow computer crime to come more to the forefront so
- that the crime can be more easily combatted.113
- This provision is necessary for the government to understand
- exactly how large of a problem computer crime is. At present,
- statistics on computer crime are difficult to determine because
- of the lack of reporting.114 By making all persons who would
- be responsible for computer security, i.e. all persons who use
- computer systems, the problem will be brought into the open and
- can be addressed.
- The proposed law also sets out a defense for those who
- violate the law. Under 11, if a person who violates the law
- makes another know that he did disrupt or alter the data, he will
- not be convicted of the crime. This will allow those who perform
- such acts to avoid the punishment of the law. Individuals who
- wish to destroy or alter such information will have an incentive
- to bring forth their mischievous acts so that when brought before
- the court they could say that they took precautions so that
- individuals would not rely on the information. This provision
- will encourage those who do such activity to come forth without
- fear of conviction.
- The ability of a court to not impose a punishment on a
- person is contained in section 12.115 This allows the court
- to abstain from punishment if the offense is not grave and was
- not committed with malice. This section, in effect, will allow
- those who commit computer crime to be able to forgo punishment if
- their acts were not serious. This will be beneficial to those
- who are hackers in the original sense of the word,116 yet
- still allow for punishment of those individuals who enter systems
- to do harm to it.
- The law also creates standards for how a computer may be
- seized. Neither a computer, nor any part of it, may be seized
- without a court order.117 Although this seems to be a good
- provision in its effects on individual rights118, the section
- is not focused enough. The law does not address the issue of
- whether a floppy, as opposed to a hard disk, is part of a
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- computer. The hard disk is located inside of a computer, while
- floppy disks may be removed from the computer. This law should
- address this issue by stating that the floppy disk is also a part
- of a computer in its definitions.119
- This section also does not address what standard may be used
- for the court order. Must the officer only have a reasonable
- suspicion or probable cause to seize the computer? By stating
- explicitly in the statute that the officer must have probable
- cause to seize the computer, an overzealous police officer will
- not be able to as easily seize the computer.
- C. The Great Britain Computer Misuse Act
- In response to computer program concerning AIDS that was
- distributed to doctors in Great Britain and Europe that contained
- a virus,120 Michael Colvin, a British MP introduced the
- Computer Misuse Bill.121 On August 29, 1990, the Computer
- Misuse Act122 came into effect.123 It was estimated that
- the losses to British industry and government were one billion
- pounds.124 This Act is designed to not to create a
- confidential information right, but to rather protect computer
- system integrity125.
- Prior to enactment, the English Law Commission studied the
- problem and laws regarding computer crime. It stated that there
- should be three new offenses to deal with computer misuse: (1)
- Unauthorized access to a computer, (2) Hacking with intent to
- commit a serious crime, and (3) Intentional destruction of or
- alteration to computer programs or data.126 The Computer
- Misuse Act states that unauthorized access occurs if the person
- is unauthorized to access the computer, he causes the computer to
- perform any function with intent to gain access to a program or
- data in the computer and he knows that this is the case.127
- He does not have to be directed to any particular program or data
- in the computer he attempted to get on or the data or program he
- wishes to access.128 If a person commits unauthorized access
- with the intent to commit129 or help another offense,130
- the person can be sentenced on summary conviction, up to six
- months in prison and a fine,131 or if convicted after
- indictment, to imprisonment of up to five years, a fine or
- both.132
- If a person modifies computer material,133 the person is
- subject to a fine of up to 5 years, an unlimited fine or
- both.134 The person must knowingly modify a program without
- authorization and must have done so with the intent to impair the
- operation of the computer, to prevent or hinder access, or impair
- the operation of the program or resulting data.135 The
- modification does not have to be permanent.136 A modification
- may be done by either altering, erasing or adding onto a program
- or data. By stating modification broadly, the act attempts to
- combat the placing of viruses, worms and logic bombs on
- computers.137
- The Act also extends the scope of jurisdiction.138 A
- person does not have to actually be in Great Britain at the
- commission of the crime. The crime itself must have some
- relation to Great Britain.139 The link must be
- "significant".140
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- D. Analysis
- As opposed to the other statutes, the Computer Misuse Act
- does not attempt to define computer. This was done because of
- the fear that any definition given for a computer may become out
- of date in a short period of time.141 Program and data are
- also not defined within the Act.
- Great Britain's courts are granted large jurisdiction. The
- act allows for anyone who attempt to commit a crime under the act
- to be punished in Great Britain. The act, although setting out
- that the link must be significant,142 does not attempt to
- define this word. By this omission, the Great Britain's courts
- can expand this to any act that occurs in a foreign country that
- uses a British computer for even a short period of time. The
- defining of the word would clear up some misconceptions that may
- result from the act.
- Of interest to note, the Act would not punish a person who
- distributes disks tat contain viruses on them. Although the
- drafter of the bill said that this was his goal, the law ignores
- this possibility. An amendment should be added to the law which
- will punish those who damage data even if they do not access the
- system.
- E. Ghana
- In response to the belief that their existing laws were not
- adequate, a draft law was proposed by the Ghana Law Reform
- Commission.143 The bill is rather simple as opposed to the
- other laws. It has definitions for access, computer, computer
- network, computer program and data.144 To commit computer
- related fraud, the person must have an intent to defraud and
- either alters, damages destroys data or program stored in or used
- by the computer or obtains information to his own advantage or to
- the disadvantage of another or uses a computer commits and
- offense.145 The Act Also sets out alternatives for some
- sections that may be adopted. The alternative states that any
- person who obtains access to a computer program or data and
- attempts to erase or alter the program or data with intent to
- help his own interests or damage other person's interest commits
- a crime.146
- Damaging computer data occurs if any person, by any means,
- without authority, willfully does damage to data commits a
- crime.147 The crime of unauthorized use of a computer is
- simply defined as anyone who knowingly without authority commits
- an offence.148 Similarly, unauthorized access is anyone who
- knowingly gains access to a computer, network or any part there
- of, without authority to do so.149 The Ghana law also creates
- a crime for the knowingly and dishonestly introduction of false
- data and the omission to introduce, record or store data.150
- An authorized person who willfully or intentionally allows
- information to get into the hands of an unauthorized person and
- that person uses the information to his advantage also commits a
- crime.151
- The penalties for the crimes are similar to those of the
- Great Britain law.152 On summary convictions, a jail term may
- be given of up to two years or the statutory maximum fine or
- both.153 On conviction on indictment, a prison term of no
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- more then ten years or an unlimited fine, or both may be
- given.154
- The jurisdiction that the Ghana courts have in accord with
- this jurisdiction is as large as their British counterpart.155
- The courts can hear any case if the accused person was in Ghana
- at the time of the act.156 Also, if the program or data was
- stored in or used with a computer or computer network in Ghana
- the person may be tried under the law.157
- F. Analysis
- The Ghana proposed Computer Crime Law is in accord with the
- United States, Great Britain and the proposed Israeli laws. By
- setting out definitions for the various terms used in the
- law158, the law clearly defines which acts may be subject to
- prosecution under the law. Although simple, the definitions
- attempt to capture within the law's grasp the various different
- acts which could be done with a computer that should be outlawed.
- The most original section of the act concerns the newly
- created crime of omission to introduce, record or store
- data.159 This section, however, will end up punishing those
- who work in corporations that are at the lowest level skill-wise.
- The government should, if the law is enacted, force companies to
- give each employee a sufficient amount of training on a computer
- so that the person will be able to act in accordance with the
- law. The act does provide a safeguard by making the mens rea of
- the crime "negligently or dishonestly"160
- The act also sets out a crime for an individual who allows
- information to get into the hands of another.161 As opposed
- to the other laws, this section specifically address the problem
- of where an authorized individual gives information to an
- outsider. By specifically regulating this behavior, anyone who
- wishes to act according will know that the act is illegal.
- The crime of computer-related fraud is defined
- broadly.162 This law effectively makes any type of fraud
- committed either with a computer or information within a computer
- a crime. The law adequately addresses the problems that might
- occur with a computer in fraud. A broad definition, however, may
- still let some act seem as though they are not covered since the
- act is not specific in the area of what constitutes a crime.
- Most significantly, the act does not state which types of
- computers are covered by the act.163 By not giving a limit on
- which computers are covered, the act extends its jurisdiction to
- all "computer"164 and "computer network"165 in the country.
- If the definition of computer changes, due in part to advance
- technology, the law may have to change this section.
- V. Proposed Solutions
- Computer Crime laws have come a long way in addressing the
- problem of computer crime.166 The ability to regulate the
- activity will decrease the amount of crime that is committed.
- Those who use the computers of the world, however, must not rely
- totally on there respective governments to combat this
- problem.167
- The best way to combat computer crime is to not let it occur
- at all. Many computer systems have not been given enough
- security by their system managers.168 It is possible to have
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- a totally secure computer system169, but it is impractical and
- slows the free flow of information.170 By creating laws that
- will protect the integrity of computer systems while also
- allowing for the ability of our best and brightest to develop and
- learn about computer systems will the nation be able to keep our
- technological lead in the world.
- In order to combat the problem of unauthorized access, users
- of computer systems must be taught to respect each others privacy
- within the various systems. Creating an standard of ethics for
- those who are users of computers will be the best way since it
- will hold the users to standards that must be met. Although some
- organizations have attempted to promogate standards regarding the
- ethical use of computer systems171 no one standard has
- emerged. Proposed rules of ethics should balance the need of
- individuals to be able to learn and discover about the various
- types of computer systems, while at the same time allowing for
- those who use those systems to be secure in the knowledge that
- the information stored on the computer will not be read by those
- other then person who should have access to it.
- If computer crime laws are enacted, industries that use
- computers should not use the new laws as a replacement for using
- adequate security measures.172 Individuals or corporations
- that use computer have several ways to protect themselves from
- unauthorized access. If the computer can be accessed by a modem,
- the computer can have a dial back feature placed on the phone
- line so that one a computer is accessed, the computer will then
- call back to make sure that the call is coming from a line which
- is supposed to access the computer.173 The proper use of
- passwords174 are also an effective way to address the problem
- of unauthorized access. A recent study has shown that out of 100
- passwords files, approximately 30 percent were guessed by either
- using the account name or a variation of it.175 A program
- has recently been developed that will not allow a user to select
- an obvious password.176 Encryption programs, similar to the
- program used on Unix operating system, can scramble a password in
- a non reversible manner so that if the encrypted password falls
- into the hands of an individual who is not supposed to access the
- system, the person will not be able to get into the system.
- These systems can also be used so that if a hacker does get into
- a computer system and attempts to get information, the
- information will not be readable.177
- A problem that must be address is the lack of laws
- concerning copyright protection of computer programs in foreign
- countries. The Pakistan Brain178 was written to discourage
- copying of a program without authorization. By creating pirating
- penalties a reason for the creation of computer viruses will be
- removed and less viruses will be created.179
- Many in the field argue that computer programs should not be
- copyrighted.180 Copyright protection should not be afforded
- to computer programs since they are only mathematical
- equations.181 Copyright protection should be given to the
- maker of a computer programmer only for a short period of
- time.182
- A novel concept which will both satisfy the computer hackers
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- quest for knowledge through examining computer systems and
- protect the integrity of computer systems is to create a computer
- systems for the use of hackers alone.183 This computer would
- not be connected to other computer systems, but can be accessed
- through a modem.184 If created, accounts would be given to
- all interested computer enthusiasts. Those participating will
- not be prosecuted for exploring unauthorized areas of the
- system.185 Since other computer systems will not be
- accessible through this system, any activity on this system will
- not endanger the information on other systems.186 By allowing
- this to be done, a major problem will be solved, the inability to
- afford to buy a mainframe system, while a person will still be
- able to learn about different types of systems.
- If any laws are to be made, they should make "knowing"187
- or "intentionally"188 unauthorized access into a computer a
- crime. By making the intent of the crime be knowing, it will
- allow those who accidently connect to a computer system that they
- think is theirs but is not to be excused from punishment.
- The law must also be done in a way that will allow it to be
- enforced across national boundaries. A computer hacker can
- access computers from across the world without ever leaving his
- home country.189 If these laws can only be enforced within
- the home country, then a person can, in theory, go into a country
- of whose computers that he would never want to access and access
- into other computers without fear of punishment.190
- An international convention should be convened to address
- this problem. Since the problem is of international concern and
- the crimes do occur across the boarders of countries, by setting
- standards by the international community concerning the conduct
- of computer users, the hodgepodge of computer crime laws will be
- eradicated in favor of a common international standard. As the
- boundaries in Western Europe disappear in anticipation of 1992,
- international access is sure to accelerate.
- Colleges, Universities and high schools must institute
- programs designed to address proper computer use.191 Although
- not all computer users are not trained in school, teaching the
- ethical use of computers will allow users to understand the need
- for security on systems. These programs will also show users
- that computer crime is dangerous to society.192 Problems
- concerning computer crime should be publicized so as not to
- mystify the crime.193
- The United States and other countries must create more
- Computer Emergency Response Teams (CERT). These teams are to
- coordinate community responses to emergency situations,
- coordinate responsibility for fixing hole in computer systems and
- serve as a focal point for discussions concerning computer
- systems.194 These groups regularly post notices concerning
- computer viruses or other dangers in the Internet computer
- system. The scope of these groups should be expanded so they may
- be a focal point of the needs and desires of those who use
- computers. If they are used to gather information as a clearing
- house type operation, the spread of information concerning
- computer systems and problems with the systems will be more
- adequately addressed.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- IV. Conclusion
- Computer crime is a growing problem. With the advent of the
- computer and a more computer literate public, crimes committed by
- computers will increase. To effectively address the problem,
- laws must be created to outlaw activity which is designed to
- further illegitimate ends. These laws have moved in the right
- direction concerning what should be outlaws so as to balance the
- needs of computer users against those of the computer owners. To
- enforce these laws, governments must realize that the problem of
- computer crime is not only of local concern.
- Educational programs and standards of ethics must be created
- from within the computer users community. Corporations which use
- computers must educate their employees to reduce the fear that
- one might have when addressing a computer security issue.
- Copyright laws must be strengthened in countries that either do
- not have or have weak copyright laws so that the need to create
- viruses to protect an individual's or corporation's work will no
- longer be necessary.
- To satisfy users curiosity with computers, a non-secure
- computer system should be created. This system will allow those
- who wish to explore a system in order to understand the system
- may. Those individuals can do so without the fear of
- prosecution.
- Only by directly addressing the causes of computer crime and
- drafting standards and laws to address the unique area will the
- problem of computer crime be adequately addressed. Light must be
- shined on the area so individuals will realize that fear of the
- machines is not justified. Only by doing so may we enter the
- 21st century realizing the full potential of computers.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Appendix A
- Ghana Computer Crime Law (Proposed)
- Computer Crime Law
- Computer Crime Law
- In pursuance of the Provisional National Defense Council
- (Establishment) Proclamation 1981, this Law is hereby made:
- 1. Any person who, with intent to defraud,
- (a) alters, damages, destroys or otherwise manipulates data
- or program stored in or used in connection with a computer, or
- (b) obtains by any means, information stored in a computer
- and uses it to his advantage or to another person's advantage to
- the disadvantage of any other person, or
- (c) uses a computer
- commits an offense.
- Charge: Computer-related fraud.
- ALTERNATIVE:
- (1) A person commits an offense if that person obtains
- access to a computer program or data, whether stored in
- or used in connection with a computer or to a part of
- such program or data to erase or otherwise alter the
- program or data with the intention-
- 1. (a) of procuring an advantage for himself or
- another person: or
- (b) of damaging another person's interests.
-
- 2. Any person who, by any means, without authority, wilfully
- destroys, damages, injures, alters or renders ineffective
- data stored in or used in connection with a computer commits
- an offense.
- Charge: Damaging Computer data.
-
- 3. Any person who, without authority, knowingly uses a computer
- commits and offense.
- Charge: Unauthorized use of a computer.
-
- 4. Any person who, without authority, knowingly gains access to
- a computer, computer network, or any part thereof commits an
- offense.
- Charge: Unauthorized access to a computer.
-
- 5. Any person who, knowingly and dishonestly introduces,
- records or stores, or causes to be recorded, stored or
- introduced into a computer or computer network by any means,
- false or misleading information as data commits an offense.
- Charge: Insertion of false information as data.
-
- ALTERNATIVE:
- (5) A person commits an offense if, not having authority to
- obtain access to a computer program or data, whether
- stored in or used in connection with a computer, or to
- a part of such program or data, he obtains such
- unauthorized access and damages another person's
- interests by recklessly adding to, erasing or otherwise
- altering the program or the data.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 6. Any person under a contractual or other duty to introduce,
- record or store authorised data into a computer network, who
- negligently or dishonestly fails to introduce, record or
- store, commits an offense.
- Charge: Omission to introduce, record or store data.
-
- ALTERNATIVE
- (6) Any person under a contractual or other duty to
- introduce, record or store data into a computer or
- computer network who negligently or dishonestly fails
- to introduce, record or store, commits an offense.
-
- 7. Any authorised person who willfully or intentionally allows
- information from a computer to get into the hands of an
- unauthorised person who uses such information to his
- advantage commits an offense.
- Charge: Allowing unauthorised person to use computer data.
-
- 8. A person guilty of an offense under this Law shall be
- liable:-
- (a) on summary conviction, to imprisonment for a term not
- exceeding two years or to a fine not exceeding the
- statutory maximum or both; or
- (b) on conviction on indictment, to imprisonment for a term
- not exceeding ten years or to an unlimited fine, or
- both.
-
- 9. A court in Ghana shall have jurisdiction to entertain
- proceedings for an offense under this Law, if at the time
- the offense was committed:-
- (a) the accused was in Ghana; or
- (b) the program or the data in relation to which the
- offence was committed was stored in or used with a
- or used with
- computer or computer network in Ghana.
- computer network in Ghana.
-
- 10. In this Law, unless the context otherwise requires:-
- "access" includes to log unto, instruct, store data or
- programs in, retrieve data or programs from, or otherwise
- communicate with a computer, or gain access to (whether
- directly or with the aid of any device) any data or program.
- "computer" includes any device which is capable of
- performing logical, arithmetical, classifactory, mnemonic,
- storage or other like functions by means of optical,
- electronic or magnetic signals.
- "Computer network" includes the interconnection of two or
- more computers, whether geographically separated or in close
- proximity or the interconnection of communication systems
- with a computer through terminals, whether remote or local.
- "Computer program" includes an instruction or statement or
- series of instructions or statements capable of causing a
- computer to indicate, perform, or achieve any function.
- "data" includes a representation in any form whether
- tangible or intangible that is capable of being stored in or
- retrieved by a computer.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- ENDNOTES
- ENDNOTES
- 1. Financial Times Limited (London) April, 1990.
-
- 2. See, infra, endnote 36 and accompanying text.
- infra
-
- 3. Stoll, The Cuckoo's Egg (1990). [hereinafter Stoll].
- The Cuckoo's Egg
-
- 4. Lyons, 13 Are Charged in Theft of Data from Computers, New
-
-
- York Times, August 17, 1990, B2, col. 3.
-
- 5. Although there is no set definition of a computer
-
-
- publication, it is created and published solely on a computer.
-
-
- Peretti, Computer Publications and the First Amendment (1990)
-
-
- (available at Princeton University FTP site and The American
-
-
- University Journal of International Law and Policy Office).
-
- 6. Dorothy Denning, The United States v. Craig Neidorf
-
-
- (available at The American University Journal of International
-
-
- Law and Policy office).
-
- 7. Schares, A German Hackers' Club that Promotes Creative
-
-
- Chaos, Business Week, Aug. 1, 1988, 71.
-
- 8. Barlow, Crime and Puzzlement: In advance of the Law on the
-
-
- Electronic Frontier, Whole Earth Review, Sept. 22, 1990, 44.
-
- 9. Kopetman, Computer Gave Them Bum Rap, Los Angeles Times,
- Los Angeles Times
-
-
- Jan. 10, 1991, at B1, col. 2.
-
- 10. See, J. Thomas McEwen, Dedicated Computer Crime Units (19--)
- See,
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- (stating how important computers have become to society). In
-
-
- 1978 there were 5,000 desktop computers in the United States. S.
-
-
- Rep. No. 432, 99th Cong., 2d Sess. 2, reprinted in, 1986 U.S.
- reprinted in
-
-
- Code Cong. & Admin. News 2479, 2479. By 1986, this number had
-
-
- increased to about 5 million. Id.
- Id.
-
- 11. See, S. 2476, Floor Statement by Senator Patrick Leahy.
-
- 12. See, Stoll at ___ (stating that all countries, except
-
-
- Albania, are connected via computer systems).
-
- 13. McEwen, Dedicated Computer Crime Units 1 (19--). Another
- _______________________________
-
-
- definition used is the definition of computer crime was "any
-
-
- illegal act for which knowledge of computer technology is
-
-
- essential for successful investigation and prosecution". Parker,
-
-
- Computer Crime: Criminal Justice Resource Manual, (1989).
- _________________________________________________
-
- 14. Conly, Organizing for Computer Crime Investigation and
-
-
- Prosecution, 6-7 (19--).
-
- 15. For instance, the estimated cost of the Internet Worm, a
-
-
- computer program created by Robert Morris, Jr. which shut down
-
-
- the Internet computer system, varies from $97,000,000 (John
-
-
- McAfee, Chairman, Computer Virus Industry Association) to
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- $100,000 (Clifford Stoll's low bound estimate). Commitment to
-
-
- Security, 34 (1989). It is difficult to determine exactly the
-
-
- cost of such crime because it is difficult to determine what
-
-
- should be included. The estimated downtime of a computer due to
-
-
- such activity could be used to determine the cost. This may be
-
-
- flawed, however, since it will not take into account how much of
-
-
- the down time actually would have been used. Electronic Mail
-
-
- Letter from Richard Stallman to Brian J. Peretti (Dec. 3, 1990)
-
-
- (concerning computer crime).
-
- 16. Commitment to Security, 34. The average facility,
-
-
- consisting of 1,224 microcomputers, 96 minicomputers and 10
-
-
- mainframe computers, lost $109,000, 365 personnel hours and 26
-
-
- hours computer time loss per year. Id.
- Id.
-
- 17. Id. at 23. 6 percent of incidents resulted in prosecutions.
- Id.
-
-
- Id.
- Id.
-
- 18. Id.
- Id.
-
- 19. Only 1.5 percent of respondents to a National Center for
-
-
- Computer Crime Data used Anti-virus products in 1985. By 1988
-
-
- this figure rose to 22 percent. By 1991, 53 percent of the
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- respondents stated that they would be using anti-virus software
-
-
- by 1991. According to a Price Waterhouse survey in Great
-
-
- Britain, in 1985 26 percent installations spent nothing on
-
-
- security. Authers, Crime as a Business Risk- Security/ A
- Crime as a Business Risk- Security/ A
-
-
- Management as Well as a Technical Problem, Financial Times
- Management as Well as a Technical Problem
-
-
- (London), November 7, 1990. By 1990 this figure had shrunk to 4
-
-
- percent and is expected to decline to 0 by 1995. Id. The amount
- Id.
-
-
- spent on security for new systems has increased from 5 percent in
-
-
- 1985 to 9 percent by 1990. Id.
- Id.
-
-
- In Japan, less than 10 percent of groups that rely heavily
-
-
- on computers have taken measures to prevent virus attacks.
-
-
- Computer Users Fail to Protected Against Viruses. Although Japan
- Computer Users Fail to Protected Against Viruses.
-
-
- does not have a computer crime law, there is a movement to make
-
-
- such a law. Computer Body Calls for Jail Sentences for Hackers,
- Computer Body Calls for Jail Sentences for Hackers
-
-
- Kyodo News Service, Nov. 15, 1990 (available from the Nexis
-
-
- library). The Japan Information Processing Development
-
-
- Association has stated that the new law should make the crime
-
-
- punishable of either one year of hard labor or a fine. Id.
- Id.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 20. The terms was first applied in 1984. Commitment to Security,
-
-
- 34 (1989).
-
- 21. Ring, Computer Viruses; Once Revered as Hackers, Technopaths
-
-
- Threaten Security of Computer-Dependant Society, Computergram,
-
-
- July 7, 1989. Some of these viruses are extremely small, e.g.
-
-
- Tiny, which is 163 bytes, may be the smallest. Friday 13th Virus
-
-
- Alert, The Times (London), July 12, 1990.
-
- 22. Graggs, Foreign Virus Strains Emerge as Latest Threat to
- Foreign Virus Strains Emerge as Latest Threat to
-
-
- U.S. PCs, Infoworld, Feb. 4, 1991, 18. Viruses have appeared
- U.S. PCs
-
-
- from Bulgaria, Germany, Australia, China and Taiwan. Id. Some new
- Id.
-
-
- viruses include Armageddon, from Greece which attacks through
-
-
- modems and then dials to a talking clock in Crete, Liberty, from
-
-
- Indonesia, Bulgaria 50, which is thought to have come from a
-
-
- "laboratory" in Sofia, Victor, thought to originate in the
-
-
- U.S.S.R., the Joker, from Poland, which tells the user that the
-
-
- computer needs a hamburger, and Saturday the 14th, presumed to
-
-
- have been developed in South Africa, which destroys a computer's
-
-
- file allocation table. Id.
- Id.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Some viruses also carry a message when they are activated.
-
-
- A virus that is though to have been developed by students at
-
-
- Wellington, New Zealand, tells the user that they have been
-
-
- "stoned" and requests that marijuana should be legalized. Id.
- Id.
-
-
- Approximately 80 or 90 of the 300 viruses counted for the
-
-
- IBM personal computer originated in Bulgaria according to Morton
-
-
- Swimmer of Germany's Hamburg University Virus Test Center.
-
-
-
-
- 23. A report in La Liberation, a French newspaper, stated that
- La Liberation
-
-
- computer viruses could be planted in French EXOCET missiles to
-
-
- misguide them when fired. La Liberation, Jan. 10, 1991,
-
-
- reprinted in Klaus Brunnstein, Risks-Forum, vol. 10, iss. 78,
- reprinted in
-
-
- Jan. 22 1991 (available at American Journal of International Law
-
-
- and Policy Office).
-
- 24. A "trojan horse" is a program that does not seem to be
-
-
- infected, however, when used in a computer, the virus is then
-
-
- transferred the uninfected machine. On trojan horse destroyed
-
-
- 168,000 files in Texas. Commitment to Security, 34 (1989).
-
- 25. Ring, Computer Viruses; Once Revered as Hackers, Technopaths
- Computer Viruses; Once Revered as Hackers, Technopaths
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Threaten Security of Computer-Dependent Society, ComputerGram,
- Threaten Security of Computer-Dependent Society
-
-
- July 7, 1989.
-
- 26. Highland, One Wild Computer "Worm" Really Isn't a Federal
- One Wild Computer "Worm" Really Isn't a Federal
-
-
- Case, Newsday, Jan. 23, 1990, 51.
- Case
-
- 27. Stoll, at 346. The amount of computers that were actually
-
-
- infected by the worm is still the subject of debate. Mr. Stoll
-
-
- estimates that 2,000 computers where infected, while the most
-
-
- commonly cited number is 6,000. Commitment to Security, 34
-
-
- (1989). The 6,000 estimate was based on an Massachusetts
-
-
- Institute of Technology estimate that 10 percent of the machines
-
-
- at the school were infected and was then inferred to the total
-
-
- number of machines across the country that were affected.
-
-
- General Accounting Office, Computer Security: Virus Highlights
-
-
- Need for Improved Internet Management, 17 (1989). This number
-
-
- may be inaccurate because not all locations had the same amount
-
-
- of vulnerable machines. Id.
- Id.
-
- 28. For the first eight months of 1988, there were 800
-
-
- incidents concerning computer viruses. Commitment to Security,
-
-
- 34. The Computer Virus Industry Association reported that 96
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- percent of these reported infections were incorrectly identified
-
-
- as viruses. Id.
- Id.
-
- 29. Robinson, Virus Protection for Network Users, Washington
-
-
- Post, Washington Business, p.44, Feb. 11, 1991.
-
- 30. Ross, Hacking Away at the Counterculture, 3 (1990)
-
-
- (available at the American University Journal of International
-
-
- Law and Policy). On Saturday Night Live, during the news update
-
-
- segment, Dennis Miller stated, in comparing a computer viruses to
-
-
- the AIDS virus, "Remember, when you connect with another
-
-
- computer, you're connecting to every computer that computer has
-
-
- ever been connected to." Id.
- Id.
-
- 31. Id. at 8-9.
- Id.
-
- 32. Computer Virus Legislation, Hearing on H.R. 55 and H.R. 287
-
-
- before the Subcomm. on Criminal Justice of the House Comm. on the
-
-
- Judiciary, 100th Cong., 1st Sess. 49 (1989) (statement of Marc
-
-
- Rotenberg, Director, Computer Professionals for Social
-
-
- Responsibility). In Israel, Hebrew University used a computer
-
-
- virus to detect and destroy a virus that would have destroyed
-
-
- data files. Id.
- Id.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 33. Computergram International, October 14, 1990.
-
- 34.
-
- 35. Watts, Fears of Computer Virus Attack from East Europe grow,
- Fears of Computer Virus Attack from East Europe grow
-
-
- The Independent, November 24, 1990, p.6. On a trip to Bulgaria,
-
-
- a British computer consultant returned with 100 viruses that do
-
-
- not exist in the West. Id.
- Id.
-
- 36. Id.
-
- 37. McGourty, When a Hacker Cracks the Code, The Daily Telegraph
- When a Hacker Cracks the Code
-
-
- (London), October 22, 1990, p. 31.
-
- 38. The equipment would cost about 50 (British) pounds. Id.
- Id.
-
- 39. Id. A British company, has stated that they have developed
- Id.
-
-
- a glass that will reduce this problem. Tieman, Spy-Proof Glass
-
-
- to Beat the Hackers, The (London) Times, Jan 17, 1991.
-
-
- A more recent problem concerns the ability of computer
-
-
- hackers to access into fax machines and either change or reroute
-
-
- information from the machine. Becket, Espionage fears mounting as
- Espionage fears mounting as
-
-
- hackers tap into faxes, The Daily Telegraph (London), December 1,
- hackers tap into faxes
-
-
- 1990, p. 23. This problem can be circumvented by the use of
-
-
- encryption devices or passwords on the machine. Id.
- Id.
-
- 40. Stoll at 9. The word itself originally had two meanings.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- People originally called themselves hackers were software wizards
-
-
- who thoroughly knew computer systems. Id. In U.S. v. Riggs, 739
- U.S. v. Riggs
-
-
- F. Supp. 414, 423 (N.D. Ill. 1990) the court defined hackers as
-
-
- "individuals involved with the unauthorized access of computer
-
-
- systems by various means." The New Hacker's Dictionary defines
-
-
- hackers as "A person who enjoys learning the details of
-
-
- programming systems and how to stretch their capabilities, as
-
-
- opposed to most users who prefer to learn only the minimum
-
-
- necessary." New Hacker's Dictionary, to be published Spring,
-
-
- 1991.
-
-
- Hacker has also been used in a non-evil sense with the word
-
-
- "cracker" taking the disreputable part of the word. In this
-
-
- light, hacker means "computer enthusiasts who `take delight in
-
-
- experimenting with system hardware, software and communication
-
-
- systems." and cracker meaning "a hacker who specializes in
-
-
- gaining illegal access to a system." One Wild Computer `Worm'
- One Wild Computer `Worm'
-
-
- Really Isn't a Federal Case, Newsday, January 23, 1990, p.51.
- Really Isn't a Federal Case
-
-
- The typical hacker has been described as "a juvenile with a home
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- computer who uses computerized bulletin board systems for a
-
-
- variety of illegal purposes. Conly, Organizing for Computer
-
-
- Crime Investigation and Prosecution, 8 (19--).
-
-
-
-
- 41. Sulski, How to Thwart Potential Saboteur, Chicago Tribune,
- How to Thwart Potential Saboteur
-
-
- November 18, 1990, p.18.
-
- 42. Computerworld, December 3, 1990, p. 122. Kryptik, a hacker
-
-
- group, was stated as having planned to plant a virus in a
-
-
- telephone network on December 5, 1990. Id. It is unclear,
- Id.
-
-
- however, if the virus actually was planted. Id.
- Id.
-
- 43. Sulski, How to Thwart Potential Saboteur, Chicago Tribune,
- How to Thwart Potential Saboteur
-
-
- November 18, 1990, p.18. Computer security experts state that
-
-
- the risk of having hacker break into your system is less than
-
-
- being burglarized or having a power outage due to lightning. Id.
- Id.
-
-
- Errant opinion poll results have also been blamed on the work of
-
-
- hackers. Holdsworth, Hackers May Have Attacked TV Poll
- Hackers May Have Attacked TV Poll
-
-
- Computers-MP, Press Association Newsfile, May 4, 1990.
- Computers-MP
-
- 44. Stoll, 312.
-
- 45. Id. This view is also shared by the editors of 2600, The
- Id.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Hackers Quarterly. It is also held by these persons that a
-
-
- service is done to the computing community because those who
-
-
- break in to computer systems show the operators that their system
-
-
- is not strong enough and that it should be made stronger.
-
- 46. Stoll, at 354.
-
- 47. Mr. Stoll's computer was broken into by an Australian
-
-
- hacker who said he did so to show that Mr. Stoll's security was
-
-
- not good and that hackers are good because they show where
-
-
- security problems are in computer networks. Id. at 353-54. He
- Id.
-
-
- rejected such arguments. Id.
- Id.
-
- 48. Director, Computer Professionals for Social Responsibility
-
- 49. Computer Virus Legislation, Hearing on H.R. 55 and H.R. 287
-
-
- before the Subcomm. on Criminal Justice of the House Comm. on the
-
-
- Judiciary, 100th Cong., 1st Sess. 26-27 (1989) (statement of Marc
-
-
- Rotenberg, Director, Computer Professionals for Social
-
-
- Responsibility). The Aldus peace virus, which displayed a message
-
-
- calling for peace and then disappeared without damaging the
-
-
- system itself, is an example of a virus which he believes should
-
-
- be protected. Id.
- Id.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 50. Commitment to Security, 34.
-
- 51. Stoll, 349.
-
- 52. "I can never understand why people think it is all right to
-
-
- run out of computer paper but not all right to be infected with a
-
-
- virus. The disruption is the same and it takes about the same
-
-
- amount of time to put matters right." Cane, Hygiene See Off
- Hygiene See Off
-
-
- Computer Viruses, Financial Times (London) October 14, 1989,
- Computer Viruses
-
-
- Section I, p. 24.
-
- 53. 18 U.S.C. 1030 (1988).
-
- 54. Ala. Code 13A-8-100 et.seq. (1990); Alaska Stat.
- Ala. Code Alaska Stat.
-
-
- 11.46.200(a)(3), 11.46.484(a)(5), 11.46.740, 11.46.985, 11.46.990
-
-
- (1990); Ariz. Rev. Stat. Ann. 13-2301(E), 13-2316 (1990); Cal.
- Ariz. Rev. Stat. Ann. Cal.
-
-
- Penal Code 502 (West 1990); Colo. Rev. Stat. 18-5.5-101 et.
- Penal Code Colo. Rev. Stat.
-
-
- seq. (1990); Conn. Gen. Stat 53a-250 et. seq., 52-570b (1990);
- Conn. Gen. Stat
-
-
- Del. Code Ann. tit. 11, 931 et seq. (1990); Fla. Stat.
- Del. Code Ann. Fla. Stat.
-
-
- 815.01 et seq. (1990); Ga. Code Ann. 16-9-90 et seq (1990);
- Ga. Code Ann.
-
-
- Haw. Rev. Stat. 708-890 et seq. (1990); Idaho Code 18-2201,
- Haw. Rev. Stat. Idaho Code
-
-
- 2202 (1990); Ill. Ann. Stat. 15-1, 16-9 (1990); Ind. Code
- Ill. Ann. Stat Ind. Code
-
-
- 35-43-1-4, 35-43-2-3 (1990); Iowa Code 716A.1 et. seq.
- Iowa Code
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- (1990); Kan. Stat. Ann. 21-3755 (1990); Ky. Rev. Stat. Ann.
- Kan. Stat. Ann. Ky. Rev. Stat. Ann.
-
-
- 434.840 et. seq. (1990); La. Rev. Stat. Ann. 14(D) 71.1 et
- La. Rev. Stat. Ann
-
-
- seq. (1990); Me. Rev. Stat. Ann. chap. 15, tit. 17-A, 357
- Me. Rev. Stat. Ann.
-
-
- (1990); Md. Crim. Law Code Ann. Article 27 45A, 146 (1990);
- Md. Crim. Law Code Ann.
-
-
- Mass. Gen. L. ch 266, 30 (1990) see infra; Mich. Comp. Laws
- Mass. Gen. L. Mich. Comp. Laws
-
-
- 28.529(1) et seq. (1990); Minn. Stat. 609.87 et seq. (1990);
- Minn. Stat.
-
-
- Miss. Code Ann. 97-45-1 et seq (1990); Mo. Rev. Stat. 569.093
- Miss. Code Ann. Mo. Rev. Stat.
-
-
- et seq. (1990); Mont. Code Ann. 45-2-101, 45-6-310,45-6-311
- Mont. Code Ann.
-
-
- (1990); Neb. Rev. Stat. art. 13(p), 28-1343 et seq (1990); Nev.
- Neb. Rev. Stat. Nev.
-
-
- Rev. Stat. 205.473 et seq. (1990); N.H. Rev. Stat. Ann.
- Rev. Stat. N.H. Rev. Stat. Ann.
-
-
- 638.16 et seq. (1990); N.J. Rev. Stat. 2C:20-1, 2C:20-23 et.
- N.J. Rev. Stat.
-
-
- seq., 2A:38A-1 et seq. (1990); N.M. Stat. Ann. 30-16A-1 et
- N.M. Stat. Ann.
-
-
- seq. (1990); N.Y. Penal Law 155.00, 156.00 et seq, 165.15(10),
- N.Y. Penal Law
-
-
- 170.00, 175.00 (1990); N.C. Gen. Stat. 14-453 et seq (1990);
- N.C. Gen. Stat.
-
-
- N.D. Cent. Code 12.1-06.1.01(3), 12.1-06.1-08 (1990); Ohio Rev.
- N.D. Cent. Code Ohio Rev.
-
-
- Code Ann. 2901.01, 2913.01, 1913.04, 1913.81 (Anderson 1990);
- Code Ann.
-
-
- Okla. Stat. tit. 21, 1951 et seq. (1990); Or. Rev. Stat.
- Okla. Stat Or. Rev. Stat.
-
-
- 164.125, 164.377 (1990); Pa. Cons. Stat. 1933 (1990); R.I.
- Pa. Cons. Stat. R.I.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Gen. Laws 11-52-1 et seq (1990); S.C. Code Ann. 16-16-10 et
- Gen. Laws S.C. Code Ann.
-
-
- seq (Law. Co-op 1990); S.D. Codified Laws Ann. 43-43B-1 et seq.
- S.D. Codified Laws Ann.
-
-
- (1990); Tenn. Code Ann. 39-3-1401 et seq (1990); Texas Code
- Tenn. Code Ann. Texas Code
-
-
- Ann. tit 7 33.01 et seq. (Vernon 1990); 19 Utah Laws 76-6-
- Ann. Utah Laws
-
-
- 701 et seq.; Va. Code Ann. 18.2-152.1 et seq. (1990); Wash.
- Va. Code Ann. Wash.
-
-
- Rev. Code Ann. 9A.48.100, 9A.52.010, 9A.52.110 et seq. (1990);
- Rev. Code Ann.
-
-
- Wis. Stat. 943.70 (1990); Wyo. Stat. 6-3-501 et seq. (1990).
- Wis. Stat. Wyo. Stat.
-
- 55. Parker, Computer Crime: Criminal Justice Resource Manual,
-
-
- 129 (1979).
-
- 56. McEwen, Dedicated Computer Crime Units, 60 (1989). These
-
-
- other laws include embezzlement, larceny, fraud, wire fraud and
-
-
- mail fraud. Id. at 60.
- ___
-
- 57. Pub. L. No. 98-473, 2102(a), 98 Stat. 1837, 2190 (codified
-
-
- at 18 U.S.C. 1030).
-
- 58. S. Rep. No. 432, 99th Cong., 2d Sess., 1986 U.S. 2,
-
-
- reprinted in, 1986 Cong. & Admin. News 2479, 2479.
- reprinted in
-
- 59. Pub. L. No. 99-474, 2, 100 Stat. 1213 (amending 18 U.S.C.
-
-
- 1030).
-
- 60. 18 U.S.C. 1030(b).
-
- 61. 18 U.S.C. 1030(a)(1). The person must act knowingly to
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- access a computer either without authorization or exceeding the
-
-
- authorization given and obtain information with the intent or
-
-
- reason to believe that the information will either injure the
-
-
- United States of American or give an advantage to a foreign
-
-
- nation. As seen by the placement of this section, it is clear
-
-
- that the Congress was particularity aware of the dangers that
-
-
- computer might have to the national security of the United
-
-
- States. This section parallels 18 U.S.C. 793, the federal
-
-
- espionage statute.
-
- 62. 1030(c)(1)(A).
-
- 63. 1030(c)(1)(B).
-
- 64. As defined by the Fair Credit Reporting Act, 15 U.S.C. 1681
-
-
- et seq.
-
- 65. 1030(c)(2)(A).
-
- 66. 1030(c)(2)(B). The penalty is up to 10 years in prison.
-
- 67. 18 U.S.C. 1030(a)(2).
-
- 68. 18 U.S.C. 1030(c)(2)(B).
-
- 69. 18 U.S.C. 1030(c)(2)(B).
-
- 70. The punishments that may be handed out are up to 5 years for
-
-
- the first offense and 10 years for any subsequent offense.
-
- 71. 18 U.S.C. 1030(a)(5).
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 72. 18 U.S.C. 1030(c)(3)(A).
-
- 73. 18 U.S.C. 1030(c)(3)(B).
-
- 74. 18 U.S.C. 1030(a)(6).
-
- 75. As defined by 18 U.S.C. 1029.
-
- 76. 18 U.S.C. 1030(c)(2)(A).
-
- 77. 18 U.S.C. 1030(c)(2)(B).
-
- 78. 18 U.S.C. 1030(a)(6)(B).
-
- 79. 18 U.S.C. 1030(a)(6)(B).
-
- 80. These computers include computers used exclusively for the
-
-
- United States government or a financial institution or if not
-
-
- exclusively by the government one which the conduct of the
-
-
- computer affects the government's or the institution's operation,
-
-
- 18 U.S.C. 1030(e)(2)(A), the computer is one of two or more
-
-
- computers that commit the offense, 18 U.S.C. 1030(e)(2)(A).
-
-
- Financial institution is defined in 18 U.S.C. 1030(e)(4) and
-
-
- includes and institution whose deposits are insured by the
-
-
- Federal Deposit Insurance Corporation, 1030(e)(4)(A), the Federal
-
-
- Reserve or one of its members, 1030(e)(4)(B), a credit union
-
-
- insured by the National Credit Union Administration,
-
-
- 1030(e)(4)(C), a Federal home loan bank system member,
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 1030(e)(4)(D), institutions under the Farm Credit Act of 1971,
-
-
- 1030(e)(4)(F), a broker-dealer registered pursuant to 15 of the
-
-
- Securities Exchange Act of 1934, 1030(e)(4)(F), or a Securities
-
-
- Investor Protection Corporation, 1030(e)(4)(G).
-
- 81. S. Rep. No. 432, 99th Cong., 2d Sess. 4, reprinted in, 1986
- reprinted in
-
-
- U.S. Code Cong. & Admin. News 2479, 2481.
-
- 82. Note, Computer Crime and The Computer Fraud and Abuse Act of
-
-
- 1986, X Computer/Law Journal 71, 79, (1990).
-
- 83. 18 U.S.C. 1030 (e)(2) states:
-
-
- As used in this section-
-
-
- (2) The term "Federal interest computer" means a computer-
-
-
- (A) exclusively for the use of a financial institution
-
-
- or the United States Government, or, in the case of a computer
-
-
- not exclusively for such use, used by or for a financial
-
-
- institution or the United States Government and the conduct
-
-
- constituting the offense affects the use of the financial
-
-
- institution's operation or the Government's operation of such
-
-
- computer; or
-
-
- (B) which is one of two or more computer used in the
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- committing the offense, not all of which are located in the same
-
-
- state.
-
- 84. "[T]here is not statute specifically addressing viruses."
-
-
- 135 Cong. Rec. E2124 (daily ed. June 14, 1989) (letter of Rep.
- Cong. Rec. E2124
-
-
- Herger (quoting FBI Director William Sessions)).
-
- 85. H.R. 287 and H.R. 55.
-
- 86. "Existing criminal statues are not specific on the question
-
-
- of whether unauthorized access is a crime where no theft or
-
-
- damage occurs . . ." 135 Cong. Rec. E2124 (daily ed. June 14,
- Cong. Rec.
-
-
- 1989) (letter of Rep. Herger (quoting FBI Director William
-
-
- Sessions)).
-
- 87. Prosecution could occur under a trespass law. It may not be
-
-
- applicable, however, since trespass is a property based crime and
-
-
- courts have not recognized information in the same manner as real
-
-
- property.
-
- 88. Note, Computer Crime and The Computer Fraud and Abuse Act of
-
-
- 1986, X Computer/Law Journal 71, 80 (1990).
-
- 89. Id.
- Id.
-
- 90. Shalgi, Computer-ware: Protection and Evidence, An Israeli
- Computer-ware: Protection and Evidence, An Israeli
-
-
- Draft Bill, IX Computer/Law J. 299, 299 (1989) [hereinafter
- Draft Bill Computer/Law J.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Shalgi]. This proposed bill has not progressed much since it was
-
-
- proposed and is at the stage prior to an official "bill". Letter
-
-
- from Barry Levenfeld to Brian J. Peretti (December 13, 1990)
-
-
- (concerning Israel's legislature progress on the comprehensive
-
-
- computer law). This paper will use the Shalgi English
-
-
- translation of the law.
-
- 91. Chapter 2 concerns Offenses and Accessing Computers, Chapter
-
-
- 3, Damages, Chapter 4, Rights of Software Creators and Chapter 5,
-
-
- Evidence. Levenfeld, Israel Considers Comprehensive Computer Law,
- Israel Considers Comprehensive Computer Law,
-
-
- Int'l Computer L Advisor 4 (March 1988). The topics covered in
- Int'l Computer L Advisor
-
-
- Chapters 2 through 5 are beyond the scope of this paper.
-
- 92.
-
- 93. Shagli, at 311.
-
- 94. Chapter 2, 2, Shagli at 311.
-
- 95. Chapter 2, 3(a), Shagli at 311. An employee is exempt if
-
-
- he commits this act when it was due to a strike concerning a
-
-
- labor dispute. Chapter 2, 3(b), Shagli at 311.
-
- 96. Chapter 2, 4(a).
-
- 97. Chapter 2, 4(b), Shagli at 311.
-
- 98. As defined by Chapter 1, 1.
-
- 99. Chapter 2, 5, Shagli at 311.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 100. Chapter 2, 6, Shagli at 312.
-
- 101. Chapter 2, 7, Shagli at 312.
-
- 102. Chapter 2, 9, Shagli at 312.
-
- 103. Id.
- Id.
-
- 104. Chapter 2, 10, Shagli at 312.
-
- 105. By not stating that this also applies to individuals or
-
-
- others (non-corporations) who are attempting to supply services
-
-
- to the public, some important services that may be offered to the
-
-
- public may not be done. Levenfeld, 8, translates the word
-
-
- corporation as entities which may solve the problem.
-
- 106. Shalgi, 312. Levenfeld, 5, states that since this section
-
-
- is so broad the only possible areas that are not covered are
-
-
- personal and academic uses.
-
- 107. Chapter 2, 14, Shagli at 313.
-
- 108. Section 5.
-
- 109. Levenfeld, 4-5. Perhaps the only computers not covered
-
-
- would be those used for personal or academic uses exclusively.
-
-
- Id. at 5.
- Id.
-
- 110. Section 5.
-
- 111. Levenfeld, 4-5. Perhaps the only computers not covered
-
-
- would be those used for personal or academic uses exclusively.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Id. at 5.
- Id.
-
- 112. Levenfeld at 4.
-
- 113. Shalgi, 305.
-
- 114. See, Computers at Risk, Safe Computing in the Information
-
-
- Age, 36 (1991) (discussing the need for a repository to gather
-
-
- computer crime information).
-
- 115. Chapter 2, 12, Shagli at 313.
-
- 116. New Hacker's Dictionary.
-
- 117. Chapter 2, 13, Shagli at 313. The law states that if the
-
-
- owner of the computer is not given in his presence, the order is
-
-
- only good for twenty-four hours. Id.
- Id.
-
- 118. Shagli, at 304. Under Israeli law, an object that may be
-
-
- proof of an offense may be seized without a court order. Id. The
- Id.
-
-
- law will bring the seizure of computers in accord with the United
-
-
- States Constitution's sixth Amendment.
-
- 119. Chapter 1, 1, Shagli at 310.
-
- 120. Alexander, Suspect Arrested in AIDS Disk Fraud Case,
- Suspect Arrested in AIDS Disk Fraud Case
-
-
- Computerworld, Feb. 5, 1990, 8.
-
- 121. Colvin, Lock up the Keyboard Criminal, Telecommunications
-
-
- PLC (England), June 1990.
-
- 122. Computer Misuse Act, 1990, ch. 18.
-
- 123. In the five years prior to the adoption of the Act, there
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- were 270 cases of computer misuse in Britain of which only six
-
-
- were brought to court and only 3 resulting convictions. Fagan,
-
-
- Technology: EC urged to strengthen laws on computer crime, The
- Technology: EC urged to strengthen laws on computer crime
-
-
- Independent (London), February 13, 1990, p. 19.
-
- 124. Id.
- Id.
-
- 125. Davies, Cracking down on the computer hackers, Fin. Times
- Cracking down on the computer hackers
-
-
- (London), October 4, 1990.
-
- 126. Law Commission No. 186, Cm 819.
-
- 127. Computer Misuse Act, 1990, ch. 18, 1.
-
- 128. The penalty for this type of behavior is up to six months in
-
-
- prison, 2000 pounds or both.
-
- 129. Computer Misuse Act, 1990, ch. 18, 2(1)(a).
-
- 130. Computer Misuse Act, 1990, ch. 18, 2(1)(b).
-
- 131. Computer Misuse Act, 1990, ch. 18, 2(5)(a).
-
- 132. Computer Misuse Act, 1990, ch. 18, 2(5)(b).
-
- 133. Computer Misuse Act, 1990, ch. 18, 3(1).
-
- 134. Computer Misuse Act, 1990, ch. 18, 3(7).
-
- 135. Computer Misuse Act, 1990, ch. 18, 3(2).
-
- 136. Computer Misuse Act, 1990, ch. 18, 3(5).
-
- 137. Id. Colvin, Lock up the Keyboard Criminal ,
- Id.
-
-
- Telecommunications PLC (England), June 1990.
-
- 138. Computer Misuse Act, 1990, ch. 18, 4.
-
- 139. Computer Misuse Act, 1990, ch. 18, 4(1).
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 140. 5(2) states that a significant link under 1 can be (a) the
-
-
- person was in Great Britain at the time in which he caused the
-
-
- computer to act in a certain way or (b) the computer he attempted
-
-
- to get access to was in Great Britain. 5(3) states that a
-
-
- significant link under 3 can be (a) that the person was Great
-
-
- Britain at the time when he did the act or (b) the modification
-
-
- took place in Great Britain. However, this may not an exhaustive
-
-
- list.
-
- 141. Davies, Cracking down on the computer hackers, Fin. Times
- Cracking down on the computer hackers
-
-
- (London), October 4, 1990.
-
- 142. Computer Misuse Act, 1990, ch. 18, 5.
-
- 143. Although proposed on February 14, 1989, the proposed bill
-
-
- has not yet become law.
-
- 144. Appendix A, 10.
-
- 145. Appendix A, 1.
-
- 146. Appendix A, 1, alternative.
-
- 147. Appendix A, 2.
-
- 148. Appendix A, 3.
-
- 149. Appendix A, 4.
-
- 150. Appendix A, 5.
-
- 151. Appendix A, 7.
-
- 152. The Ghana Law Reform Commission states that they created
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- their proposed law from the Scottish Law Commission and the Law
-
-
- Reform Commission of Tasmania, Australia reports on computer
-
-
- crime.
-
- 153. Appendix A, 9(a).
-
- 154. Appendix A, 8(b).
-
- 155. See, infra, endnote __ and accompanying text.
- infra
-
- 156. Appendix A, 9(a).
-
- 157. Appendix A, 9(b).
-
- 158. Appendix A, 10.
-
- 159. Appendix A, 6.
-
- 160. Id.
- Id.
-
- 161. Appendix A, 7.
-
- 162. Appendix A, 1.
-
- 163. Appendix A, 10.
-
- 164. Id.
- Id.
-
- 165. Id.
- Id.
-
- 166. The first computer crime law in the United States was
-
-
- enacted in 1979.
-
- 167. S. Rep. No. 432, 99th Cong., 2d Sess. 3, reprinted in 1986
- reprinted in
-
-
- U.S. Code Cong. & Admin. News 2479, 2481.
-
- 168. By increasing security, the ease with which one can enter
-
-
- the system will become more difficult. Some systems, believing
-
-
- that if such unauthorized access does occur that no sensitive
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- information will be stolen, opt to have less security then other
-
-
- systems. In actuality, by one system not having enough security,
-
-
- the entire network can be put at danger when a mischievous user
-
-
- wishes to break into a users account which may be accessed by
-
-
- that system. See Stoll, 353-54 (stating an Australian hacker
-
-
- broke into Mr. Stoll's computer account because a connected
-
-
- computer's system manager did not wish to have a high level of
-
-
- security.
-
- 169. Stoll, 32. Many military computers and sensitive
-
-
- scientific computers operate in a secure environment. This is
-
-
- created by not allowing the computer system to have any telephone
-
-
- links to the outside world (i.e. outside of the building.
-
- 170. By having a secure system, information at the computer site
-
-
- can only be removed by a person walking into the computer center,
-
-
- copying the information and then walking out with it. This is
-
-
- both burdensome (it is much easier to access the computer from
-
-
- one's home or office) and cumbersome (since a person will have to
-
-
- walk around with reels of data that will later be put back into
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- the system.
-
- 171. Computer Virus Legislation, Hearing on H.R. 55 and H.R. 287
-
-
- before the Subcomm. on Criminal Justice of the House Comm. on the
-
-
- Judiciary, 100th Cong., 1st Sess. 44, n. 27 (1989) (statement of
-
-
- Marc Rotenberg, Director, Computer Professionals for Social
-
-
- Responsibility).
-
-
-
-
- 172. Colvin, Lock up the Keyboard Criminal, Telecommunications
- Lock up the Keyboard Criminal
-
-
- PLC (England), June 1990, p. 38. Michael Colvin, the author of
-
-
- Great Britain's Computer Misuse Act stated that the passage of
-
-
- the bill should not be looked at that the computer owner should
-
-
- not have security measures on their computers. Id. The bill, he
- Id.
-
-
- states, was made only to compliment, not substitute, the users
-
-
- security measures. Id. In West Germany, the severity of the
- Id.
-
-
- punishment for hacking depends on the effort that was required to
-
-
- commit the offense. Fagan, Technology: EC urged to Strengthen
- Technology: EC urged to Strengthen
-
-
- Laws on Computer Crime, The Independent, Feb. 13, 1990, 19.
- Laws on Computer Crime
-
- 173. McGourty, When a hacker cracks the code, The Daily
- When a hacker cracks the code
-
-
- Telegraph, October 22, 1990, p. 31.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 174. A Password is a word that is either given to the user by
-
-
- the system or selected by the user to prevent others from
-
-
- accessing his computer or account within the computer. This
-
-
- words, groups of letters or symbols are supposed to be kept
-
-
- secret so as to not let other who are not authorized to access
-
-
- the system have access to it.
-
-
-
-
- 175. Donn Seeley, A Tour of the Worm, Department of Computer
- _____________________
-
-
- Science, University of Utah, Nov. 1988, reprinted in General
- reprinted in
-
-
- Accounting Office, Computer Security: Virus Highlights Need for
-
-
- Improved Internet Management, 20 (1989).
-
- 176. Authers, Armed with a secret weapon, Financial (London)
-
-
- Times, Feb. 5, 1991, Section I, 16.
-
- 177. Id.
-
- 178. For a discussion of this virus, see, Branscomb, Rogue
- see Rogue
-
-
- Computer Programs and Computer Rogues: Tailoring the Punishment
- Computer Programs and Computer Rogues: Tailoring the Punishment
-
-
- to Fit the Crime, 16 Rutgers Computer & Tech. L.J. 1, 14-16
- to Fit the Crime _______________________________
-
-
- (1990) (discussing the applicability of state and federal law to
-
-
- computer viruses).
-
-
-
- 179. Jim Thomas, publisher of the Computer Underground digest
-
-
- argues that computer pirates actually buy more programs then the
-
-
- average computer program buyer. Letter from Jim Thomas to Brian
-
-
- J. Peretti ( (discussing computer pirating of software)
-
- 180. See, GNU Manifesto (available at American University Journal
-
-
- of International Law and Policy). See also, Stallman, GNU EMACS
- See also,
-
-
- General Public License, (Feb. 11, 1988) (available at American
-
-
- University Journal of International Law and Policy).
-
- 181. The GNU Manifesto (available at the American University
-
-
- Journal of International Law and Policy).
-
- 182. The author proposes that such copyright protection last for
-
-
- only two years. By granting the creator such protection for a
-
-
- short period of time, he will be able to recover the expenses
-
-
- that he put into the writing of the program.
-
-
- If this type of protection is granted, it should be
-
-
- understood that the creator of the program has a copyright to the
-
-
- sourcecode of the program for that period. If he updates the
-
-
- program after the two year period, the updated code will be
-
-
- protected, but the original code will not be granted the
- protection. In this manner, an author cannot attempt to give
-
-
- copyright protection to a program after the copyright has
-
-
- expired.
-
- 183. Electronic letter from Brian J. Peretti to Dorothy Denning
-
-
- (Nov. 13, 1990) (concerning computer crime).
-
- 184. This will be a semi-secure system.
-
- 185. The system, of course, will have a system manager who will
-
-
- create the accounts for the users. His account will be off
-
-
- limits to those who wish to use the system. At the same time,
-
-
- individuals will be encouraged to attempt to break into the
-
-
- manager's account and tell him how it was done in order to
-
-
- improve security for this and other systems.
-
- 186. The problem still exists that information learned through
-
-
- the use of this system may allow those who use the system to
-
-
- break into other computer systems. This problem can be corrected
-
-
- by having the system manager and the users communicate problems
-
-
- with the system so that they may be corrected on other systems.
-
- 187. United States v. United States Gypsum Co., 438 U.S. 422, 425
-
-
- (1978).
-
- 188. S. Rep. No. 432, 99th Cong., 2d Sess. 6, reprinted in 1986
- reprinted in
- U.S. Code Cong. & Admin. News 2479, 2484.
-
- 189. Stoll, The Cuckoo's Egg.
-
- 190. The countries which a person can go to could be any country
-
-
- in the world, except Albania, since they are the only country
-
-
- whose computers are not connected to outside computers. Stoll.
-
- 191. A school in Red Bank, New Jersey, has instituted a "computer
-
-
- responsibility training". Weintraub, Teaching Computer Ethics in
- Teaching Computer Ethics in
-
-
- the Schools, The School Administrator 8, 9 (apr. 1986).
- the Schools, ________________________
-
- 192. S. Rep. No. 432, 99th Cong., 2d Sess. 3, reprinted in 1986
- reprinted in
-
-
- U.S. Code Cong. & Admin. News 2479, 2481.
-
- 193. Electronic Mail Letter from Rop Gonggrijp to Brian J.
-
-
- Peretti (Jan. 25, 1991) (concerning computer viruses). "We have
-
-
- to watch that we keep telling people how virusses work, because
-
-
- that is the only solution to the problem: mystifying the whole
-
-
- thing ans just hunting down "computer terrorists" is useless and
-
-
- (as proven in the US and Germany) leads to a questionable style
-
-
- of government in the field of information technology..." Id.
- Id.
-
- 194. General Accounting Office, Computer Security: Virus
-
-
- Highlights Need for Improved Internet Management, 25 (1989).
-