Tuesday, March 25, 2008

Computer Crime

KEEP IT FOR YOUR KNOWLEDGE




Computer Crime:

Current Practices, Problems and Proposed Solutions

Second Draft
Brian J. Peretti


It would have been surprising if there had been

satisfactory
road traffic legislation before the invention of the

wheel, but
it would also have been surprising if the law on the

passage of
laden donkeys proved entirely satisfactory when

applied to
vehicles.1

I. Introduction
Within recent years, computer crime has

become a
preoccupation with law enforcement officials. In

California, a
group of West German hackers2 using phone lines and

satellite
hookups, gained unauthorized access into civilian and

military
computers and stole sensitive documents that were sold to

the
Soviet Union.3 A young New York programmer broke

into a
Washington computer to run a program that he could not run

from
his personal computer.4 After Southeastern Bell Stated

that a
document published in an electronic publication5 was

valued at
more than $75,000 the publisher was arrested and brought to

trial
before the discovery that the document could be publicly

bought
from the company for $12.6 The Chaos Computer Club, a

Hamburg,
Germany, club, went into government computers and

access
information and gave it to reporters.7 In May, 1988, the

United
States government launched Operation Sun Devil, which lead

to the
seizure of 23,000 computer disks and 40 computers.8

In
addition, poor police performance9 has also been

blamed on
computers.
Since its creation, the computer has become

increasing
important in society.10 The law, as in the past, has not

been
able to evolve as quickly as the rapidly

expanding
technology.11 This lack of movement on the part of

governments
shows a lack of understanding with the area. The need to

create
a comprehensive regulation or code of ethics has

become
increasing necessary.
Due to the nature of computer systems and

their
transnational connections through telephone lines12,

an
individual state's action will only stop the problems

associated
with computer crime if many states join together. The

patchwork
of legislation that exists covers only a small part of

the
problem. To adequately address computer crime, greater

efforts
must be made within the computer community to

discourage
unauthorized computer access, countries must strengthen and
co-ordinated their computer related laws, as well as

proper
enforcement mechanism created, computer program copyright

laws be
enhanced and computer systems should be created to allow

those
who wish to explore computer systems which will not

disrupt the
users of computer systems.
This paper will first set out a definition of computer

crime
and why laws or regulation by the computer community

must be
created. Section II will then discuss the United

States law
concerning computer crime and why it needs to be

strengthened.
Section III will discuss the proposed Israeli computer

crime
bill, Britain's Computer Misuse Act and Ghana's proposed

law.
Section IV will discuss what can be done by both the

government
and computer owners and users to make computer crime

less
possible.


II. Computer crime

The definition of what constitutes a computer crime has

been
the subject of much controversy. A computer crime has

been
defined as "any illegal act for which knowledge of

computer
technology is used to commit an offense."13 The

typical
computer criminal has been described as between 15 and 45

years
old, usually male, no previous contact with law enforcement,

goes
after both government and business, bright, motivated, fears

loss
of status in computer community and views his acts as

games.14
For the purposes of this article, this will be the

definition
used because of its broad reach.
Estimates regarding how much is lost to computer crime

very
widely15. In the only authoritative study, the loss

due to
computer crime was given at $555,000,000, 930 personnel

years
lost and 153 computer time years lost.16 The amount of

total
incidents for 1988 was 485 resulting in 31 prosecutions17.

In
1987, there were 335 incidents with 8 prosecutions.18

Security
spent on prevention of computer crime is becoming

more
commonplace19.
The most publicized danger to computer systems

are
viruses20 and worms. A virus is a code segment which,

when
executed, replicates itself and infects another

program.21
These viruses may be created anywhere in the world22

and may
attack anything.23 A virus may be transmitted through a

trojan
horse24 program. A worm exists as a program in its own

right
and may spread over a network via electronic mail25. A

virus
attacks a program while a worm attacks the computer's

operating
system.26 The most notorious computer worm brought

the
Internet computer network to a halt.27
Computer virus attacks may be overrated.28 It is

said
that the biggest threat to computing includes "not

backing up
your data, not learning the ins and outs of your

application
programs, not putting enough memory in your computer,

not
organizing your hard disk, [and] not upgrading to the

latest
version of your applications.29 These computer programs

have
been compared to the AIDS virus.30 One author has stated

that
the viruses are used to both increase the amount of

profits of
computer program producers and anti-virus computer

programs.31
Computer viruses may also be used to benefit

computer
systems, by either detecting flaws in security

measures or
detecting other viruses.32 Virus are very dangerous,

though.
The effects of a virus called Datacrime, activated on

October 13,
1989, brought down 35,000 personal computers within the

Swiss
government and several companies in Holland.33
With the opening up of Eastern Europe, the virus

problem is
expected to increase.34 In Bulgaria, a country which

does not
have any laws against computer viruses, one new virus

appears
week.35 Computer viruses are created in countries like

the
Soviet Union as a way to punish computer pirates because

of the
lack of copyright laws.36
Perhaps the most dangerous threat to information

contained
in a computer is the "leakage" of radiation from the

computer
monitors.37 With inexpensive equipment38 a person can

"read"
the information off the computer screen and then

replicate the


information from the screen in a readable manner.39
The threat of attack on a computer system can also come

from
a hacker. A hacker is a person who breaks into,

whether
maliciously or not, computers or computer systems.40 A

hacker
can, if the system is not adequately secured, cause havoc

in the
computer by either deleting or altering programs or

data or
planting logic bombs or viruses in the computer

system.41
Threats from hackers to plant viruses have been made in

the
past.42 The threat from computer hackers, as with

viruses, has
been said to be overrated.43
The issues surrounding computers still have not been

decided
by those within the computer community. Whether or not

persons
should be allowed to access computer systems

without
authorization is still a subject of debate within the

computing
community. A West German Computing Club, called The

Chaos
Computing Club, holds the belief that it is not improper to

enter
any system which they can gain access to and to "look"

around
inside of the system as much as they wish.44 They do

not,
however, condone destroying or altering any of the

information
within the system.45 On the other side,

represented by
Clifford Stoll, when individuals break into computer systems

they
disrupt the trust that the computer system is based on.46

This
breach of trust not only makes operating the system

tougher for
the manager in control of the system, but also will

decrease the
amount of use of the system so less information

will be
transferred within the system.47
There is also conflicting views as to whether the

authors of
computer viruses should be punished. Marc Rotenberg48

holds
the belief that a virus should be granted first

amendment
protection in some instances.49 In response to the

Internet
worm, there were 21 editorials that stated that the attack

showed
the need for more security in computers while there

were 10
letters to editors that stated that the creator

should be
applauded rather then punished.50 They argue that this

was a
good way to raise consciousness concerning computer

security.51
Alan Solomon, a consultant who specializes in virus

detection and
eradication, believes that viruses are, at most,

an
inconvenience.52

III.United States Computer Legislation
The United States government53 and most states54

have
computer crime laws. In 1979, only six states had such

laws.55
Almost every computer crime will, in addition to

violating a
state and/or federal law, can also be prosecuted under

other
laws.56
A. Computer Fraud and Abuse Act.
Congress originally enacted the Counterfeit Access

Device
and Computer Fraud and Abuse Act57 to address the

problem of
computer crime. Understanding that the scope of the

original law
was too narrow,58 in 1986 Congress enacted amendments

to the
Computer Fraud and Misuse Act of 1984.59 The Act

essentially
lists acts that if done with a computer are illegal.

The Act
also makes individuals culpable for attempting to

commit a
computer crime.60




In order to commit any of the crimes mentioned in the

act,
the actor must have acted either "intentionally" or

"knowingly"
when committing the act. The law addresses national

security
issues by making a crime of anyone using a computer to

obtain
information and giving the information to foreign

countries.61
The penalty for this crime or its attempt is 10 years

for the
first offense62 and 20 years for subsequent offenses63.

If a
person intentionally accesses a computer either

without
authorization or in excess of his authorization and obtains

and
acquires information in a financial record of an

institution or
information contained in a financial record of an

individual64,
the person will have committed a misdemeanor for the

first
offense65 and a felony for subsequent offenses66. A

person
intentionally accessing a government computer

without
authorization which affects the government's use of

that
computer67 will have committed a misdemeanor for the

first
offense68 and a felony for the second offense.69

Accessing a
computer with knowledge and intent to defraud and

without or
exceeding authority is a crime if the person obtains

anything of
value other than use is a felony70. Accessing a

federal
interest computer without authorization and either

modifying
medical records or causing $1,000 or more worth of damage

within
a one year period71 is punishable with up to 5 years for

the
first offense72 and 10 years for any subsequent offense.73
The Act also criminalizes trafficking in

passwords.74 A
person who knowingly and with intent to defraud

traffics75 in
passwords or similar information may be sentenced for up

to one
year for the first offense76 and up to 10 years for

subsequent
offenses77 if the computer is used by or for the

Government of
the United States78 or affects interstate or

foreign
commerce.79

B. Criticisms
It is important to note that this statute only

applies to
"Federal interest computers" as defined by this section.80

If
a computer is not this type of computer, then any of the

above
mentioned crimes will not be prosecutable under this

section.
Congress intentionally made the scope of the law

narrow.81
This section has been criticized as not inclusive

enough.82
Individual and corporate computers which do not fall into

the
restrictive definition83 may not receive the protection

of the
statute.
The problem of computer viruses are not

addressed by
Act.84 The act does not punish those who add information

into
a computer, even though this may do more harm then just

accessing
information. The Congress has attempted to address this

issue
under two bills85, but neither one has been enacted.
Unauthorized access where there is no theft or damage

to the
system is not covered.86 For example, a person

access a
computer system and looks at information contained

therein, he
has not committed a punishable crime under the Act.87
Questions have also been brought up concerning many of

the
undefined terms within the Act.88 Terms such as

"intentionally
access" and "affects interstate commerce" are among the

terms not


defined.89 The need to clarify these terms is

important so
that an individual will know what action will constitute a

crime.


IV. Legislation From Around The World
A. Israel Proposed Computer Law
In March 1987, the Israeli Ministry of Justice

distributed a
draft of a comprehensive computer bill.90 This bill

covers a
wide range of areas concerning computers91. The Act first

sets
out a list of proposed definitions for computer,

program,
software, information, thing and act. Each of these,

while
short, are concise and attempt to give a brief but

comprehensive
definition.92
Chapter 2 sets out a list of offenses which, if

committed,
are punishable.93 A authorized person commits an act

upon any
computer and knows that the act will prevent or cause

disruption
of the proper operation is subject to seven

years
imprisonment.94 A person who, without authority,

commits an
act which precludes a person from using a computer

system or
deprives a person of using that system is punishable by

up to
seven years imprisonment.95 If a person prepares or

delivers
or operates software knowing that the software will

produce
faulty results and "having reasonable grounds to assume",

the
person is punishable for up to seven years.96 The Act

also
addresses those who supply, deliver or operates a computer

with
faulty data.97
Section 5 applies to those who use a computer to

attempt to
obtain some "thing"98 or with intent prevents another

from
obtaining some "thing".99 A person who prevents another

from
obtaining a "thing" by the use of software may

also be
punished.100 A person who deprives a person of an object

that
contains software, data or information and obtaining a

benefit
for himself.101 All of these crimes contain a prison

sentence
of five years.
A professional who relies on computer outputs that they

know
which are false is also subject to punishment.102 The

crime
carries a sentence of five years.103
This chapter does not apply to all computers, software

data
or information.104 It only applies to those computers,

data
or information which are used, designated to be used by

or for
(1) the state or a corporation that is supplying service

to the
public105 or (2) "business, industry, agriculture,

health
services, or for scientific purposes."106
Perhaps the most novel provision of this proposed law

is the
section governing the reporting of the offenses. Any

person who
is in charge of another and has reason to believe

that an
individual has committed an offense under the Act, he must

report
this to police as soon as possible.107 If the person

does not
do so, he may be imprisoned for up to one year.
B. Analysis
The Israeli computer crime bill is more comprehensive

then
the America bill. By creating a law which will apply not

only to
government computers, but also to those of "business,

industry,
agriculture, health services or for scientific

purposes,"108



the law essentially covers all computers in the

country.109
By creating such broad coverage, the law will be able to

make the
users of computers in Israel more secure in their knowledge

that
their systems are safe. B. Analysis
The Israeli computer crime bill is more comprehensive

then
the America bill. By creating a law which will apply not

only to
government computers, but also to those of "business,

industry,
agriculture, health services or for scientific

purposes,"110
the law essentially covers all computers in the

country.111
By creating such broad coverage, the law will be able to

make the
users of computers in Israel more secure in their knowledge

that
their systems are safe.
The most controversial provision in the act is the

proposal
requiring that individuals that may know of computer crime

must
report the crime or face fines themself. As Levenfeld

points
out112, this will mean that employers will have to

impose
internal spy rings to be able to tract down the

"reasonable
suspicions" that individuals have concerning illegal

activity.
Shalgi, however, believes that this is a good provision in

that
it will allow computer crime to come more to the

forefront so
that the crime can be more easily combatted.113
This provision is necessary for the government to

understand
exactly how large of a problem computer crime is. At

present,
statistics on computer crime are difficult to determine

because
of the lack of reporting.114 By making all persons who

would
be responsible for computer security, i.e. all persons who

use
computer systems, the problem will be brought into the

open and
can be addressed.
The proposed law also sets out a defense for those

who
violate the law. Under 11, if a person who violates

the law
makes another know that he did disrupt or alter the data, he

will
not be convicted of the crime. This will allow those who

perform
such acts to avoid the punishment of the law. Individuals

who
wish to destroy or alter such information will have an

incentive
to bring forth their mischievous acts so that when brought

before
the court they could say that they took precautions so

that
individuals would not rely on the information. This

provision
will encourage those who do such activity to come forth

without
fear of conviction.
The ability of a court to not impose a punishment

on a
person is contained in section 12.115 This allows the

court
to abstain from punishment if the offense is not grave and

was
not committed with malice. This section, in effect, will

allow
those who commit computer crime to be able to forgo

punishment if
their acts were not serious. This will be beneficial to

those
who are hackers in the original sense of the word,116

yet
still allow for punishment of those individuals who enter

systems
to do harm to it.
The law also creates standards for how a computer

may be
seized. Neither a computer, nor any part of it, may be

seized
without a court order.117 Although this seems to be a

good
provision in its effects on individual rights118, the

section
is not focused enough. The law does not address the

issue of
whether a floppy, as opposed to a hard disk, is part

of a


computer. The hard disk is located inside of a computer,

while
floppy disks may be removed from the computer. This law

should
address this issue by stating that the floppy disk is also a

part
of a computer in its definitions.119
This section also does not address what standard may be

used
for the court order. Must the officer only have a

reasonable
suspicion or probable cause to seize the computer? By

stating
explicitly in the statute that the officer must have

probable
cause to seize the computer, an overzealous police officer

will
not be able to as easily seize the computer.
C. The Great Britain Computer Misuse Act
In response to computer program concerning AIDS that

was
distributed to doctors in Great Britain and Europe that

contained
a virus,120 Michael Colvin, a British MP introduced

the
Computer Misuse Bill.121 On August 29, 1990, the

Computer
Misuse Act122 came into effect.123 It was estimated

that
the losses to British industry and government were one

billion
pounds.124 This Act is designed to not to

create a
confidential information right, but to rather protect

computer
system integrity125.
Prior to enactment, the English Law Commission

studied the
problem and laws regarding computer crime. It stated that

there
should be three new offenses to deal with computer misuse:

(1)
Unauthorized access to a computer, (2) Hacking with

intent to
commit a serious crime, and (3) Intentional destruction

of or
alteration to computer programs or data.126 The

Computer
Misuse Act states that unauthorized access occurs if the

person
is unauthorized to access the computer, he causes the

computer to
perform any function with intent to gain access to a

program or
data in the computer and he knows that this is the

case.127
He does not have to be directed to any particular program or

data
in the computer he attempted to get on or the data or

program he
wishes to access.128 If a person commits unauthorized

access
with the intent to commit129 or help another

offense,130
the person can be sentenced on summary conviction, up

to six
months in prison and a fine,131 or if convicted

after
indictment, to imprisonment of up to five years, a

fine or
both.132
If a person modifies computer material,133 the

person is
subject to a fine of up to 5 years, an unlimited

fine or
both.134 The person must knowingly modify a program

without
authorization and must have done so with the intent to

impair the
operation of the computer, to prevent or hinder access, or

impair
the operation of the program or resulting data.135

The
modification does not have to be permanent.136 A

modification
may be done by either altering, erasing or adding onto a

program
or data. By stating modification broadly, the act

attempts to
combat the placing of viruses, worms and logic

bombs on
computers.137
The Act also extends the scope of jurisdiction.138

A
person does not have to actually be in Great Britain at

the
commission of the crime. The crime itself must have

some
relation to Great Britain.139 The link must

be
"significant".140


D. Analysis


As opposed to the other statutes, the Computer Misuse Act
does not attempt to define computer. This was done

because of
the fear that any definition given for a computer may

become out
of date in a short period of time.141 Program and data

are
also not defined within the Act.
Great Britain's courts are granted large jurisdiction.

The
act allows for anyone who attempt to commit a crime under

the act
to be punished in Great Britain. The act, although

setting out
that the link must be significant,142 does not

attempt to
define this word. By this omission, the Great Britain's

courts
can expand this to any act that occurs in a foreign country

that
uses a British computer for even a short period of time.

The
defining of the word would clear up some misconceptions

that may
result from the act.
Of interest to note, the Act would not punish a

person who
distributes disks tat contain viruses on them. Although

the
drafter of the bill said that this was his goal, the law

ignores
this possibility. An amendment should be added to the law

which
will punish those who damage data even if they do not

access the
system.
E. Ghana
In response to the belief that their existing laws

were not
adequate, a draft law was proposed by the Ghana Law

Reform
Commission.143 The bill is rather simple as opposed to

the
other laws. It has definitions for access, computer,

computer
network, computer program and data.144 To commit

computer
related fraud, the person must have an intent to

defraud and
either alters, damages destroys data or program stored in or

used
by the computer or obtains information to his own advantage

or to
the disadvantage of another or uses a computer commits

and
offense.145 The Act Also sets out alternatives for

some
sections that may be adopted. The alternative states

that any
person who obtains access to a computer program or data

and
attempts to erase or alter the program or data with

intent to
help his own interests or damage other person's interest

commits
a crime.146
Damaging computer data occurs if any person, by any

means,
without authority, willfully does damage to data

commits a
crime.147 The crime of unauthorized use of a

computer is
simply defined as anyone who knowingly without authority

commits
an offence.148 Similarly, unauthorized access is anyone

who
knowingly gains access to a computer, network or any part

there
of, without authority to do so.149 The Ghana law also

creates
a crime for the knowingly and dishonestly introduction of

false
data and the omission to introduce, record or store

data.150
An authorized person who willfully or intentionally

allows
information to get into the hands of an unauthorized

person and
that person uses the information to his advantage also

commits a
crime.151
The penalties for the crimes are similar to those

of the
Great Britain law.152 On summary convictions, a jail

term may
be given of up to two years or the statutory maximum

fine or
both.153 On conviction on indictment, a prison term

of no


more then ten years or an unlimited fine, or both

may be
given.154
The jurisdiction that the Ghana courts have in accord

with
this jurisdiction is as large as their British

counterpart.155
The courts can hear any case if the accused person was in

Ghana
at the time of the act.156 Also, if the program or data

was
stored in or used with a computer or computer network in

Ghana
the person may be tried under the law.157
F. Analysis
The Ghana proposed Computer Crime Law is in accord

with the
United States, Great Britain and the proposed Israeli

laws. By
setting out definitions for the various terms used in

the
law158, the law clearly defines which acts may be

subject to
prosecution under the law. Although simple, the

definitions
attempt to capture within the law's grasp the various

different
acts which could be done with a computer that should be

outlawed.
The most original section of the act concerns the

newly
created crime of omission to introduce, record or

store
data.159 This section, however, will end up punishing

those
who work in corporations that are at the lowest level

skill-wise.
The government should, if the law is enacted, force

companies to
give each employee a sufficient amount of training on a

computer
so that the person will be able to act in accordance with

the
law. The act does provide a safeguard by making the mens

rea of
the crime "negligently or dishonestly"160
The act also sets out a crime for an individual who

allows
information to get into the hands of another.161 As

opposed
to the other laws, this section specifically address the

problem
of where an authorized individual gives information

to an
outsider. By specifically regulating this behavior,

anyone who
wishes to act according will know that the act is illegal.
The crime of computer-related fraud is

defined
broadly.162 This law effectively makes any type of

fraud
committed either with a computer or information within a

computer
a crime. The law adequately addresses the problems that

might
occur with a computer in fraud. A broad definition,

however, may
still let some act seem as though they are not covered

since the
act is not specific in the area of what constitutes a crime.
Most significantly, the act does not state which

types of
computers are covered by the act.163 By not giving a

limit on
which computers are covered, the act extends its

jurisdiction to
all "computer"164 and "computer network"165 in the

country.
If the definition of computer changes, due in part to

advance
technology, the law may have to change this section.
V. Proposed Solutions
Computer Crime laws have come a long way in

addressing the
problem of computer crime.166 The ability to regulate

the
activity will decrease the amount of crime that is

committed.
Those who use the computers of the world, however, must not

rely
totally on there respective governments to combat

this
problem.167
The best way to combat computer crime is to not let it

occur
at all. Many computer systems have not been given

enough
security by their system managers.168 It is possible to

have



a totally secure computer system169, but it is

impractical and
slows the free flow of information.170 By creating laws

that
will protect the integrity of computer systems while

also
allowing for the ability of our best and brightest to

develop and
learn about computer systems will the nation be able to

keep our
technological lead in the world.
In order to combat the problem of unauthorized access,

users
of computer systems must be taught to respect each others

privacy
within the various systems. Creating an standard of

ethics for
those who are users of computers will be the best way

since it
will hold the users to standards that must be met. Although

some
organizations have attempted to promogate standards

regarding the
ethical use of computer systems171 no one standard

has
emerged. Proposed rules of ethics should balance the

need of
individuals to be able to learn and discover about the

various
types of computer systems, while at the same time

allowing for
those who use those systems to be secure in the knowledge

that
the information stored on the computer will not be read by

those
other then person who should have access to it.
If computer crime laws are enacted, industries that

use
computers should not use the new laws as a replacement for

using
adequate security measures.172 Individuals or

corporations
that use computer have several ways to protect themselves

from
unauthorized access. If the computer can be accessed by a

modem,
the computer can have a dial back feature placed on the

phone
line so that one a computer is accessed, the computer will

then
call back to make sure that the call is coming from a line

which
is supposed to access the computer.173 The proper

use of
passwords174 are also an effective way to address the

problem
of unauthorized access. A recent study has shown that out

of 100
passwords files, approximately 30 percent were guessed by

either
using the account name or a variation of it.175 A

program
has recently been developed that will not allow a user to

select
an obvious password.176 Encryption programs, similar to

the
program used on Unix operating system, can scramble a

password in
a non reversible manner so that if the encrypted password

falls
into the hands of an individual who is not supposed to

access the
system, the person will not be able to get into the

system.
These systems can also be used so that if a hacker does get

into
a computer system and attempts to get information,

the
information will not be readable.177
A problem that must be address is the lack of

laws
concerning copyright protection of computer programs in

foreign
countries. The Pakistan Brain178 was written to

discourage
copying of a program without authorization. By creating

pirating
penalties a reason for the creation of computer viruses

will be
removed and less viruses will be created.179
Many in the field argue that computer programs should

not be
copyrighted.180 Copyright protection should not be

afforded
to computer programs since they are only

mathematical
equations.181 Copyright protection should be given to

the
maker of a computer programmer only for a short

period of
time.182
A novel concept which will both satisfy the computer

hackers



quest for knowledge through examining computer systems

and
protect the integrity of computer systems is to create a

computer
systems for the use of hackers alone.183 This computer

would
not be connected to other computer systems, but can be

accessed
through a modem.184 If created, accounts would be

given to
all interested computer enthusiasts. Those participating

will
not be prosecuted for exploring unauthorized areas of

the
system.185 Since other computer systems will not

be
accessible through this system, any activity on this system

will
not endanger the information on other systems.186 By

allowing
this to be done, a major problem will be solved, the

inability to
afford to buy a mainframe system, while a person will

still be
able to learn about different types of systems.
If any laws are to be made, they should make

"knowing"187
or "intentionally"188 unauthorized access into a

computer a
crime. By making the intent of the crime be knowing, it

will
allow those who accidently connect to a computer system that

they
think is theirs but is not to be excused from punishment.
The law must also be done in a way that will allow it

to be
enforced across national boundaries. A computer

hacker can
access computers from across the world without ever

leaving his
home country.189 If these laws can only be enforced

within
the home country, then a person can, in theory, go into a

country
of whose computers that he would never want to access and

access
into other computers without fear of punishment.190
An international convention should be convened to

address
this problem. Since the problem is of international

concern and
the crimes do occur across the boarders of countries, by

setting
standards by the international community concerning the

conduct
of computer users, the hodgepodge of computer crime laws

will be
eradicated in favor of a common international standard.

As the
boundaries in Western Europe disappear in anticipation of

1992,
international access is sure to accelerate.
Colleges, Universities and high schools must

institute
programs designed to address proper computer use.191

Although
not all computer users are not trained in school,

teaching the
ethical use of computers will allow users to understand the

need
for security on systems. These programs will also show

users
that computer crime is dangerous to society.192

Problems
concerning computer crime should be publicized so as

not to
mystify the crime.193
The United States and other countries must create

more
Computer Emergency Response Teams (CERT). These teams

are to
coordinate community responses to emergency

situations,
coordinate responsibility for fixing hole in computer

systems and
serve as a focal point for discussions concerning

computer
systems.194 These groups regularly post notices

concerning
computer viruses or other dangers in the Internet

computer
system. The scope of these groups should be expanded so

they may
be a focal point of the needs and desires of those

who use
computers. If they are used to gather information as a

clearing
house type operation, the spread of information

concerning
computer systems and problems with the systems will be

more
adequately addressed.


IV. Conclusion
Computer crime is a growing problem. With the advent

of the
computer and a more computer literate public, crimes

committed by
computers will increase. To effectively address the

problem,
laws must be created to outlaw activity which is

designed to
further illegitimate ends. These laws have moved in the

right
direction concerning what should be outlaws so as to

balance the
needs of computer users against those of the computer

owners. To
enforce these laws, governments must realize that the

problem of
computer crime is not only of local concern.
Educational programs and standards of ethics must be

created
from within the computer users community. Corporations

which use
computers must educate their employees to reduce the fear

that
one might have when addressing a computer security

issue.
Copyright laws must be strengthened in countries that

either do
not have or have weak copyright laws so that the need to

create
viruses to protect an individual's or corporation's work

will no
longer be necessary.
To satisfy users curiosity with computers, a

non-secure
computer system should be created. This system will allow

those
who wish to explore a system in order to understand the

system
may. Those individuals can do so without the

fear of
prosecution.
Only by directly addressing the causes of computer

crime and
drafting standards and laws to address the unique area

will the
problem of computer crime be adequately addressed. Light

must be
shined on the area so individuals will realize that fear

of the
machines is not justified. Only by doing so may we

enter the
21st century realizing the full potential of computers.


Appendix A
Ghana Computer Crime Law (Proposed)
Computer Crime Law
Computer Crime Law
In pursuance of the Provisional National Defense

Council
(Establishment) Proclamation 1981, this Law is hereby made:
1. Any person who, with intent to defraud,
(a) alters, damages, destroys or otherwise manipulates

data
or program stored in or used in connection with a computer,

or
(b) obtains by any means, information stored in a

computer
and uses it to his advantage or to another person's

advantage to
the disadvantage of any other person, or
(c) uses a computer
commits an offense.
Charge: Computer-related fraud.
ALTERNATIVE:
(1) A person commits an offense if that person

obtains
access to a computer program or data, whether

stored in
or used in connection with a computer or to a

part of
such program or data to erase or otherwise

alter the
program or data with the intention-
1. (a) of procuring an advantage for

himself or
another person: or
(b) of damaging another person's interests.

2. Any person who, by any means, without authority,

wilfully
destroys, damages, injures, alters or renders

ineffective
data stored in or used in connection with a computer

commits
an offense.
Charge: Damaging Computer data.

3. Any person who, without authority, knowingly uses a

computer
commits and offense.
Charge: Unauthorized use of a computer.

4. Any person who, without authority, knowingly gains

access to
a computer, computer network, or any part thereof

commits an
offense.
Charge: Unauthorized access to a computer.

5. Any person who, knowingly and dishonestly

introduces,
records or stores, or causes to be recorded,

stored or
introduced into a computer or computer network by any

means,
false or misleading information as data commits an

offense.
Charge: Insertion of false information as data.

ALTERNATIVE:
(5) A person commits an offense if, not having

authority to
obtain access to a computer program or data,

whether
stored in or used in connection with a computer,

or to
a part of such program or data, he obtains

such
unauthorized access and damages another

person's
interests by recklessly adding to, erasing or

otherwise
altering the program or the data.



6. Any person under a contractual or other duty to

introduce,
record or store authorised data into a computer

network, who
negligently or dishonestly fails to introduce,

record or
store, commits an offense.
Charge: Omission to introduce, record or store data.

ALTERNATIVE
(6) Any person under a contractual or other

duty to
introduce, record or store data into a

computer or
computer network who negligently or dishonestly

fails
to introduce, record or store, commits an offense.

7. Any authorised person who willfully or intentionally

allows
information from a computer to get into the hands

of an
unauthorised person who uses such information to

his
advantage commits an offense.
Charge: Allowing unauthorised person to use computer data.

8. A person guilty of an offense under this Law

shall be
liable:-
(a) on summary conviction, to imprisonment for a

term not
exceeding two years or to a fine not

exceeding the
statutory maximum or both; or
(b) on conviction on indictment, to imprisonment for a

term
not exceeding ten years or to an unlimited

fine, or
both.

9. A court in Ghana shall have jurisdiction to

entertain
proceedings for an offense under this Law, if at the

time
the offense was committed:-
(a) the accused was in Ghana; or
(b) the program or the data in relation to which

the
offence was committed was stored in or used

with a
or used

with
computer or computer network in Ghana.
computer network in Ghana.

10. In this Law, unless the context otherwise requires:-
"access" includes to log unto, instruct, store

data or
programs in, retrieve data or programs from, or

otherwise
communicate with a computer, or gain access to

(whether
directly or with the aid of any device) any data or

program.
"computer" includes any device which is

capable of
performing logical, arithmetical, classifactory,

mnemonic,
storage or other like functions by means of

optical,
electronic or magnetic signals.
"Computer network" includes the interconnection of

two or
more computers, whether geographically separated or in

close
proximity or the interconnection of communication

systems
with a computer through terminals, whether remote or

local.
"Computer program" includes an instruction or

statement or
series of instructions or statements capable of

causing a
computer to indicate, perform, or achieve any function.
"data" includes a representation in any form

whether
tangible or intangible that is capable of being stored

in or
retrieved by a computer.



ENDNOTES
1. Financial Times Limited (London) April, 1990.

2. See, infra, endnote 36 and accompanying text.
infra

3. Stoll, The Cuckoo's Egg (1990). [hereinafter Stoll].
The Cuckoo's Egg

4. Lyons, 13 Are Charged in Theft of Data from

Computers, New


York Times, August 17, 1990, B2, col. 3.

5. Although there is no set definition of a

computer


publication, it is created and published solely on a

computer.


Peretti, Computer Publications and the First Amendment

(1990)


(available at Princeton University FTP site and The

American


University Journal of International Law and Policy Office).

6. Dorothy Denning, The United States v. Craig

Neidorf


(available at The American University Journal of

International


Law and Policy office).

7. Schares, A German Hackers' Club that Promotes

Creative


Chaos, Business Week, Aug. 1, 1988, 71.

8. Barlow, Crime and Puzzlement: In advance of the Law

on the


Electronic Frontier, Whole Earth Review, Sept. 22, 1990, 44.

9. Kopetman, Computer Gave Them Bum Rap, Los Angeles

Times,
Los Angeles

Times


Jan. 10, 1991, at B1, col. 2.

10. See, J. Thomas McEwen, Dedicated Computer Crime Units

(19--)
See,




(stating how important computers have become to society).

In


1978 there were 5,000 desktop computers in the United

States. S.


Rep. No. 432, 99th Cong., 2d Sess. 2, reprinted in, 1986

U.S.
reprinted in


Code Cong. & Admin. News 2479, 2479. By 1986, this

number had


increased to about 5 million. Id.
Id.

11. See, S. 2476, Floor Statement by Senator Patrick Leahy.

12. See, Stoll at ___ (stating that all countries,

except


Albania, are connected via computer systems).

13. McEwen, Dedicated Computer Crime Units 1 (19--).

Another
_______________________________


definition used is the definition of computer crime was

"any


illegal act for which knowledge of computer

technology is


essential for successful investigation and prosecution".

Parker,


Computer Crime: Criminal Justice Resource Manual, (1989).
_________________________________________________

14. Conly, Organizing for Computer Crime Investigation

and


Prosecution, 6-7 (19--).

15. For instance, the estimated cost of the Internet

Worm, a


computer program created by Robert Morris, Jr. which shut

down


the Internet computer system, varies from $97,000,000

(John


McAfee, Chairman, Computer Virus Industry Association)

to

$100,000 (Clifford Stoll's low bound estimate).

Commitment to


Security, 34 (1989). It is difficult to determine

exactly the


cost of such crime because it is difficult to determine

what


should be included. The estimated downtime of a computer

due to


such activity could be used to determine the cost. This

may be


flawed, however, since it will not take into account how

much of


the down time actually would have been used. Electronic

Mail


Letter from Richard Stallman to Brian J. Peretti (Dec. 3,

1990)


(concerning computer crime).

16. Commitment to Security, 34. The average

facility,


consisting of 1,224 microcomputers, 96 minicomputers

and 10


mainframe computers, lost $109,000, 365 personnel hours

and 26


hours computer time loss per year. Id.
Id.

17. Id. at 23. 6 percent of incidents resulted in

prosecutions.
Id.


Id.
Id.

18. Id.
Id.

19. Only 1.5 percent of respondents to a National

Center for


Computer Crime Data used Anti-virus products in 1985. By

1988


this figure rose to 22 percent. By 1991, 53 percent of

the


respondents stated that they would be using anti-virus

software


by 1991. According to a Price Waterhouse survey in

Great


Britain, in 1985 26 percent installations spent

nothing on


security. Authers, Crime as a Business Risk-

Security/ A
Crime as a Business Risk-

Security/ A


Management as Well as a Technical Problem, Financial

Times
Management as Well as a Technical Problem


(London), November 7, 1990. By 1990 this figure had shrunk

to 4


percent and is expected to decline to 0 by 1995. Id. The

amount
Id.


spent on security for new systems has increased from 5

percent in


1985 to 9 percent by 1990. Id.
Id.


In Japan, less than 10 percent of groups that rely

heavily


on computers have taken measures to prevent virus

attacks.


Computer Users Fail to Protected Against Viruses. Although

Japan
Computer Users Fail to Protected Against Viruses.


does not have a computer crime law, there is a movement to

make


such a law. Computer Body Calls for Jail Sentences for

Hackers,
Computer Body Calls for Jail Sentences for

Hackers


Kyodo News Service, Nov. 15, 1990 (available from the

Nexis


library). The Japan Information Processing

Development


Association has stated that the new law should make the

crime


punishable of either one year of hard labor or a fine. Id.
Id.


20. The terms was first applied in 1984. Commitment to

Security,


34 (1989).

21. Ring, Computer Viruses; Once Revered as Hackers,

Technopaths


Threaten Security of Computer-Dependant Society,

Computergram,


July 7, 1989. Some of these viruses are extremely small,

e.g.


Tiny, which is 163 bytes, may be the smallest. Friday 13th

Virus


Alert, The Times (London), July 12, 1990.

22. Graggs, Foreign Virus Strains Emerge as Latest

Threat to
Foreign Virus Strains Emerge as Latest

Threat to


U.S. PCs, Infoworld, Feb. 4, 1991, 18. Viruses have

appeared
U.S. PCs


from Bulgaria, Germany, Australia, China and Taiwan. Id.

Some new
Id.


viruses include Armageddon, from Greece which attacks

through


modems and then dials to a talking clock in Crete, Liberty,

from


Indonesia, Bulgaria 50, which is thought to have come

from a


"laboratory" in Sofia, Victor, thought to originate in

the


U.S.S.R., the Joker, from Poland, which tells the user

that the


computer needs a hamburger, and Saturday the 14th,

presumed to


have been developed in South Africa, which destroys a

computer's


file allocation table. Id.


Some viruses also carry a message when they are

activated.


A virus that is though to have been developed by

students at


Wellington, New Zealand, tells the user that they have

been


"stoned" and requests that marijuana should be legalized.

Id.


Id.


Approximately 80 or 90 of the 300 viruses counted

for the


IBM personal computer originated in Bulgaria according to

Morton


Swimmer of Germany's Hamburg University Virus Test Center.




23. A report in La Liberation, a French newspaper, stated

that
La Liberation


computer viruses could be planted in French EXOCET

missiles to


misguide them when fired. La Liberation, Jan. 10,

1991,


reprinted in Klaus Brunnstein, Risks-Forum, vol. 10, iss.

78,
reprinted in


Jan. 22 1991 (available at American Journal of

International Law


and Policy Office).

24. A "trojan horse" is a program that does not seem

to be


infected, however, when used in a computer, the virus is

then


transferred the uninfected machine. On trojan horse

destroyed


168,000 files in Texas. Commitment to Security, 34 (1989).

25. Ring, Computer Viruses; Once Revered as Hackers,

Technopaths
Computer Viruses; Once Revered as Hackers,

Technopaths


Threaten Security of Computer-Dependent Society,

ComputerGram,
Threaten Security of Computer-Dependent Society


July 7, 1989.

26. Highland, One Wild Computer "Worm" Really Isn't a

Federal
One Wild Computer "Worm" Really Isn't a

Federal


Case, Newsday, Jan. 23, 1990, 51.
Case

27. Stoll, at 346. The amount of computers that were

actually


infected by the worm is still the subject of debate. Mr.

Stoll


estimates that 2,000 computers where infected, while the

most


commonly cited number is 6,000. Commitment to

Security, 34


(1989). The 6,000 estimate was based on an

Massachusetts


Institute of Technology estimate that 10 percent of the

machines


at the school were infected and was then inferred to the

total


number of machines across the country that were

affected.


General Accounting Office, Computer Security: Virus

Highlights


Need for Improved Internet Management, 17 (1989). This

number


may be inaccurate because not all locations had the same

amount


of vulnerable machines. Id.
Id.

28. For the first eight months of 1988, there

were 800


incidents concerning computer viruses. Commitment to

Security,


34. The Computer Virus Industry Association reported

that 96


percent of these reported infections were incorrectly

identified


as viruses. Id.
Id.

29. Robinson, Virus Protection for Network Users,

Washington


Post, Washington Business, p.44, Feb. 11, 1991.

30. Ross, Hacking Away at the Counterculture, 3

(1990)


(available at the American University Journal of

International


Law and Policy). On Saturday Night Live, during the news

update


segment, Dennis Miller stated, in comparing a computer

viruses to


the AIDS virus, "Remember, when you connect with

another


computer, you're connecting to every computer that

computer has


ever been connected to." Id.
Id.

31. Id. at 8-9.
Id.

32. Computer Virus Legislation, Hearing on H.R. 55 and

H.R. 287


before the Subcomm. on Criminal Justice of the House Comm.

on the


Judiciary, 100th Cong., 1st Sess. 49 (1989) (statement of

Marc


Rotenberg, Director, Computer Professionals for

Social


Responsibility). In Israel, Hebrew University used a

computer


virus to detect and destroy a virus that would have

destroyed


data files. Id.


33. Computergram International, October 14, 1990.

34.

35. Watts, Fears of Computer Virus Attack from East Europe

grow,
Fears of Computer Virus Attack from East Europe

grow


The Independent, November 24, 1990, p.6. On a trip to

Bulgaria,


a British computer consultant returned with 100 viruses

that do


not exist in the West. Id.
Id.

36. Id.

37. McGourty, When a Hacker Cracks the Code, The Daily

Telegraph
When a Hacker Cracks the Code


(London), October 22, 1990, p. 31.

38. The equipment would cost about 50 (British) pounds. Id.
Id.

39. Id. A British company, has stated that they have

developed
Id.


a glass that will reduce this problem. Tieman, Spy-Proof

Glass


to Beat the Hackers, The (London) Times, Jan 17, 1991.


A more recent problem concerns the ability of

computer


hackers to access into fax machines and either change or

reroute


information from the machine. Becket, Espionage fears

mounting as
Espionage fears

mounting as


hackers tap into faxes, The Daily Telegraph (London),

December 1,
hackers tap into faxes


1990, p. 23. This problem can be circumvented by the

use of


encryption devices or passwords on the machine. Id.
Id.

40. Stoll at 9. The word itself originally had two

meanings.


People originally called themselves hackers were software

wizards


who thoroughly knew computer systems. Id. In U.S. v.

Riggs, 739
U.S. v. Riggs


F. Supp. 414, 423 (N.D. Ill. 1990) the court defined

hackers as


"individuals involved with the unauthorized access of

computer


systems by various means." The New Hacker's Dictionary

defines


hackers as "A person who enjoys learning the

details of


programming systems and how to stretch their

capabilities, as


opposed to most users who prefer to learn only the

minimum


necessary." New Hacker's Dictionary, to be published

Spring,


1991.


Hacker has also been used in a non-evil sense with the

word


"cracker" taking the disreputable part of the word. In

this


light, hacker means "computer enthusiasts who `take

delight in


experimenting with system hardware, software and

communication


systems." and cracker meaning "a hacker who

specializes in


gaining illegal access to a system." One Wild Computer

`Worm'
One Wild Computer

`Worm'


Really Isn't a Federal Case, Newsday, January 23, 1990,

p.51.
Really Isn't a Federal Case


The typical hacker has been described as "a juvenile with a

home

computer who uses computerized bulletin board systems

for a


variety of illegal purposes. Conly, Organizing for

Computer


Crime Investigation and Prosecution, 8 (19--).




41. Sulski, How to Thwart Potential Saboteur, Chicago

Tribune,
How to Thwart Potential Saboteur


November 18, 1990, p.18.

42. Computerworld, December 3, 1990, p. 122. Kryptik, a

hacker


group, was stated as having planned to plant a virus

in a


telephone network on December 5, 1990. Id. It is

unclear,
Id.


however, if the virus actually was planted. Id.
Id.

43. Sulski, How to Thwart Potential Saboteur, Chicago

Tribune,
How to Thwart Potential Saboteur


November 18, 1990, p.18. Computer security experts state

that


the risk of having hacker break into your system is less

than


being burglarized or having a power outage due to lightning.

Id.


Id.


Errant opinion poll results have also been blamed on the

work of


hackers. Holdsworth, Hackers May Have Attacked TV

Poll
Hackers May Have Attacked TV

Poll


Computers-MP, Press Association Newsfile, May 4, 1990.
Computers-MP

44. Stoll, 312.

45. Id. This view is also shared by the editors of

2600, The
Id.


Hackers Quarterly. It is also held by these persons

that a


service is done to the computing community because

those who


break in to computer systems show the operators that their

system


is not strong enough and that it should be made stronger.

46. Stoll, at 354.

47. Mr. Stoll's computer was broken into by an

Australian


hacker who said he did so to show that Mr. Stoll's

security was


not good and that hackers are good because they show

where


security problems are in computer networks. Id. at 353-54.

He
Id.


rejected such arguments. Id.
Id.

48. Director, Computer Professionals for Social

Responsibility

49. Computer Virus Legislation, Hearing on H.R. 55 and

H.R. 287


before the Subcomm. on Criminal Justice of the House Comm.

on the


Judiciary, 100th Cong., 1st Sess. 26-27 (1989) (statement of

Marc


Rotenberg, Director, Computer Professionals for

Social


Responsibility). The Aldus peace virus, which displayed a

message


calling for peace and then disappeared without

damaging the


system itself, is an example of a virus which he believes

should


be protected. Id.

50. Commitment to Security, 34.

51. Stoll, 349.

52. "I can never understand why people think it is all

right to


run out of computer paper but not all right to be infected

with a


virus. The disruption is the same and it takes about the

same


amount of time to put matters right." Cane, Hygiene

See Off
Hygiene

See Off


Computer Viruses, Financial Times (London) October 14,

1989,
Computer Viruses


Section I, p. 24.

53. 18 U.S.C. 1030 (1988).

54. Ala. Code 13A-8-100 et.seq. (1990); Alaska

Stat.
Ala. Code Alaska

Stat.


11.46.200(a)(3), 11.46.484(a)(5), 11.46.740, 11.46.985,

11.46.990


(1990); Ariz. Rev. Stat. Ann. 13-2301(E), 13-2316 (1990);

Cal.
Ariz. Rev. Stat. Ann.

Cal.


Penal Code 502 (West 1990); Colo. Rev. Stat.

18-5.5-101 et.
Penal Code Colo. Rev. Stat.


seq. (1990); Conn. Gen. Stat 53a-250 et. seq., 52-570b

(1990);
Conn. Gen. Stat


Del. Code Ann. tit. 11, 931 et seq. (1990); Fla.

Stat.
Del. Code Ann. Fla.

Stat.


815.01 et seq. (1990); Ga. Code Ann. 16-9-90 et seq

(1990);
Ga. Code Ann.


Haw. Rev. Stat. 708-890 et seq. (1990); Idaho Code

18-2201,
Haw. Rev. Stat. Idaho Code


2202 (1990); Ill. Ann. Stat. 15-1, 16-9 (1990); Ind.

Code
Ill. Ann. Stat Ind.

Code


35-43-1-4, 35-43-2-3 (1990); Iowa Code 716A.1 et.

seq.
Iowa Code


(1990); Kan. Stat. Ann. 21-3755 (1990); Ky. Rev. Stat.

Ann.
Kan. Stat. Ann. Ky. Rev. Stat.

Ann.


434.840 et. seq. (1990); La. Rev. Stat. Ann. 14(D)

71.1 et
La. Rev. Stat. Ann


seq. (1990); Me. Rev. Stat. Ann. chap. 15, tit. 17-A,

357
Me. Rev. Stat. Ann.


(1990); Md. Crim. Law Code Ann. Article 27 45A, 146

(1990);
Md. Crim. Law Code Ann.


Mass. Gen. L. ch 266, 30 (1990) see infra; Mich. Comp.

Laws
Mass. Gen. L. Mich. Comp.

Laws


28.529(1) et seq. (1990); Minn. Stat. 609.87 et seq.

(1990);
Minn. Stat.


Miss. Code Ann. 97-45-1 et seq (1990); Mo. Rev. Stat.

569.093
Miss. Code Ann. Mo. Rev. Stat.


et seq. (1990); Mont. Code Ann. 45-2-101,

45-6-310,45-6-311
Mont. Code Ann.


(1990); Neb. Rev. Stat. art. 13(p), 28-1343 et seq (1990);

Nev.
Neb. Rev. Stat.

Nev.


Rev. Stat. 205.473 et seq. (1990); N.H. Rev. Stat.

Ann.
Rev. Stat. N.H. Rev. Stat.

Ann.


638.16 et seq. (1990); N.J. Rev. Stat. 2C:20-1,

2C:20-23 et.
N.J. Rev. Stat.


seq., 2A:38A-1 et seq. (1990); N.M. Stat. Ann.

30-16A-1 et
N.M. Stat. Ann.


seq. (1990); N.Y. Penal Law 155.00, 156.00 et seq,

165.15(10),
N.Y. Penal Law


170.00, 175.00 (1990); N.C. Gen. Stat. 14-453 et seq

(1990);
N.C. Gen. Stat.


N.D. Cent. Code 12.1-06.1.01(3), 12.1-06.1-08 (1990); Ohio

Rev.
N.D. Cent. Code Ohio

Rev.


Code Ann. 2901.01, 2913.01, 1913.04, 1913.81 (Anderson

1990);
Code Ann.


Okla. Stat. tit. 21, 1951 et seq. (1990); Or. Rev.

Stat.
Okla. Stat Or. Rev.

Stat.


164.125, 164.377 (1990); Pa. Cons. Stat. 1933 (1990);

R.I.
Pa. Cons. Stat.

R.I.


Gen. Laws 11-52-1 et seq (1990); S.C. Code Ann.

16-16-10 et
Gen. Laws S.C. Code Ann.


seq (Law. Co-op 1990); S.D. Codified Laws Ann. 43-43B-1 et

seq.
S.D. Codified Laws Ann.


(1990); Tenn. Code Ann. 39-3-1401 et seq (1990); Texas

Code
Tenn. Code Ann. Texas

Code


Ann. tit 7 33.01 et seq. (Vernon 1990); 19 Utah Laws

76-6-
Ann. Utah Laws


701 et seq.; Va. Code Ann. 18.2-152.1 et seq. (1990);

Wash.
Va. Code Ann.

Wash.


Rev. Code Ann. 9A.48.100, 9A.52.010, 9A.52.110 et seq.

(1990);
Rev. Code Ann.


Wis. Stat. 943.70 (1990); Wyo. Stat. 6-3-501 et seq.

(1990).
Wis. Stat. Wyo. Stat.

55. Parker, Computer Crime: Criminal Justice Resource

Manual,


129 (1979).

56. McEwen, Dedicated Computer Crime Units, 60 (1989).

These


other laws include embezzlement, larceny, fraud, wire

fraud and


mail fraud. Id. at 60.
___

57. Pub. L. No. 98-473, 2102(a), 98 Stat. 1837, 2190

(codified


at 18 U.S.C. 1030).

58. S. Rep. No. 432, 99th Cong., 2d Sess., 1986

U.S. 2,


reprinted in, 1986 Cong. & Admin. News 2479, 2479.
reprinted in

59. Pub. L. No. 99-474, 2, 100 Stat. 1213 (amending 18

U.S.C.


1030).

60. 18 U.S.C. 1030(b).

61. 18 U.S.C. 1030(a)(1). The person must act

knowingly to

access a computer either without authorization or

exceeding the


authorization given and obtain information with the

intent or


reason to believe that the information will either

injure the


United States of American or give an advantage to a

foreign


nation. As seen by the placement of this section, it is

clear


that the Congress was particularity aware of the dangers

that


computer might have to the national security of the

United


States. This section parallels 18 U.S.C. 793, the

federal


espionage statute.

62. 1030(c)(1)(A).

63. 1030(c)(1)(B).

64. As defined by the Fair Credit Reporting Act, 15 U.S.C.

1681


et seq.

65. 1030(c)(2)(A).

66. 1030(c)(2)(B). The penalty is up to 10 years in

prison.

67. 18 U.S.C. 1030(a)(2).

68. 18 U.S.C. 1030(c)(2)(B).

69. 18 U.S.C. 1030(c)(2)(B).

70. The punishments that may be handed out are up to 5

years for


the first offense and 10 years for any subsequent offense.

71. 18 U.S.C. 1030(a)(5).

72. 18 U.S.C. 1030(c)(3)(A).

73. 18 U.S.C. 1030(c)(3)(B).

74. 18 U.S.C. 1030(a)(6).

75. As defined by 18 U.S.C. 1029.

76. 18 U.S.C. 1030(c)(2)(A).

77. 18 U.S.C. 1030(c)(2)(B).

78. 18 U.S.C. 1030(a)(6)(B).

79. 18 U.S.C. 1030(a)(6)(B).

80. These computers include computers used exclusively

for the


United States government or a financial institution or if

not


exclusively by the government one which the conduct of

the


computer affects the government's or the institution's

operation,


18 U.S.C. 1030(e)(2)(A), the computer is one of two or

more


computers that commit the offense, 18 U.S.C.

1030(e)(2)(A).


Financial institution is defined in 18 U.S.C. 1030(e)(4)

and


includes and institution whose deposits are insured by

the


Federal Deposit Insurance Corporation, 1030(e)(4)(A), the

Federal


Reserve or one of its members, 1030(e)(4)(B), a credit

union


insured by the National Credit Union

Administration,


1030(e)(4)(C), a Federal home loan bank system

member,



1030(e)(4)(D), institutions under the Farm Credit Act of

1971,


1030(e)(4)(F), a broker-dealer registered pursuant to 15

of the


Securities Exchange Act of 1934, 1030(e)(4)(F), or a

Securities


Investor Protection Corporation, 1030(e)(4)(G).

81. S. Rep. No. 432, 99th Cong., 2d Sess. 4, reprinted in,

1986
reprinted in


U.S. Code Cong. & Admin. News 2479, 2481.

82. Note, Computer Crime and The Computer Fraud and Abuse

Act of


1986, X Computer/Law Journal 71, 79, (1990).

83. 18 U.S.C. 1030 (e)(2) states:


As used in this section-


(2) The term "Federal interest computer" means a

computer-


(A) exclusively for the use of a financial

institution


or the United States Government, or, in the case of a

computer


not exclusively for such use, used by or for a

financial


institution or the United States Government and the

conduct


constituting the offense affects the use of the

financial


institution's operation or the Government's operation of

such


computer; or


(B) which is one of two or more computer used

in the

committing the offense, not all of which are located in the

same


state.

84. "[T]here is not statute specifically addressing

viruses."


135 Cong. Rec. E2124 (daily ed. June 14, 1989) (letter of

Rep.
Cong. Rec. E2124


Herger (quoting FBI Director William Sessions)).

85. H.R. 287 and H.R. 55.

86. "Existing criminal statues are not specific on the

question


of whether unauthorized access is a crime where no

theft or


damage occurs . . ." 135 Cong. Rec. E2124 (daily ed.

June 14,
Cong. Rec.


1989) (letter of Rep. Herger (quoting FBI Director

William


Sessions)).

87. Prosecution could occur under a trespass law. It may

not be


applicable, however, since trespass is a property based

crime and


courts have not recognized information in the same manner as

real


property.

88. Note, Computer Crime and The Computer Fraud and Abuse

Act of


1986, X Computer/Law Journal 71, 80 (1990).

89. Id.
Id.

90. Shalgi, Computer-ware: Protection and Evidence, An

Israeli
Computer-ware: Protection and Evidence, An

Israeli


Draft Bill, IX Computer/Law J. 299, 299 (1989)

[hereinafter
Draft Bill Computer/Law J.


Shalgi]. This proposed bill has not progressed much since

it was


proposed and is at the stage prior to an official "bill".

Letter


from Barry Levenfeld to Brian J. Peretti (December 13,

1990)


(concerning Israel's legislature progress on the

comprehensive


computer law). This paper will use the Shalgi

English


translation of the law.

91. Chapter 2 concerns Offenses and Accessing Computers,

Chapter


3, Damages, Chapter 4, Rights of Software Creators and

Chapter 5,


Evidence. Levenfeld, Israel Considers Comprehensive Computer

Law,
Israel Considers Comprehensive Computer

Law,


Int'l Computer L Advisor 4 (March 1988). The topics

covered in
Int'l Computer L Advisor


Chapters 2 through 5 are beyond the scope of this paper.

92.

93. Shagli, at 311.

94. Chapter 2, 2, Shagli at 311.

95. Chapter 2, 3(a), Shagli at 311. An employee is

exempt if


he commits this act when it was due to a strike

concerning a


labor dispute. Chapter 2, 3(b), Shagli at 311.

96. Chapter 2, 4(a).

97. Chapter 2, 4(b), Shagli at 311.

98. As defined by Chapter 1, 1.

99. Chapter 2, 5, Shagli at 311.

100. Chapter 2, 6, Shagli at 312.

101. Chapter 2, 7, Shagli at 312.

102. Chapter 2, 9, Shagli at 312.

103. Id.
Id.

104. Chapter 2, 10, Shagli at 312.

105. By not stating that this also applies to

individuals or


others (non-corporations) who are attempting to supply

services


to the public, some important services that may be offered

to the


public may not be done. Levenfeld, 8, translates the

word


corporation as entities which may solve the problem.

106. Shalgi, 312. Levenfeld, 5, states that since this

section


is so broad the only possible areas that are not

covered are


personal and academic uses.

107. Chapter 2, 14, Shagli at 313.

108. Section 5.

109. Levenfeld, 4-5. Perhaps the only computers not

covered


would be those used for personal or academic uses

exclusively.


Id. at 5.
Id.

110. Section 5.

111. Levenfeld, 4-5. Perhaps the only computers not

covered


would be those used for personal or academic uses

exclusively.

Id. at 5.
Id.

112. Levenfeld at 4.

113. Shalgi, 305.

114. See, Computers at Risk, Safe Computing in the

Information


Age, 36 (1991) (discussing the need for a repository to

gather


computer crime information).

115. Chapter 2, 12, Shagli at 313.

116. New Hacker's Dictionary.

117. Chapter 2, 13, Shagli at 313. The law states that

if the


owner of the computer is not given in his presence, the

order is


only good for twenty-four hours. Id.
Id.

118. Shagli, at 304. Under Israeli law, an object that

may be


proof of an offense may be seized without a court order.

Id. The


Id.


law will bring the seizure of computers in accord with the

United


States Constitution's sixth Amendment.

119. Chapter 1, 1, Shagli at 310.

120. Alexander, Suspect Arrested in AIDS Disk Fraud

Case,
Suspect Arrested in AIDS Disk Fraud

Case


Computerworld, Feb. 5, 1990, 8.

121. Colvin, Lock up the Keyboard Criminal,

Telecommunications


PLC (England), June 1990.

122. Computer Misuse Act, 1990, ch. 18.

123. In the five years prior to the adoption of the Act,

there
















were 270 cases of computer misuse in Britain of which

only six


were brought to court and only 3 resulting convictions.

Fagan,


Technology: EC urged to strengthen laws on computer

crime, The
Technology: EC urged to strengthen laws on computer crime


Independent (London), February 13, 1990, p. 19.

124. Id.
Id.

125. Davies, Cracking down on the computer hackers, Fin.

Times
Cracking down on the computer hackers


(London), October 4, 1990.

126. Law Commission No. 186, Cm 819.

127. Computer Misuse Act, 1990, ch. 18, 1.

128. The penalty for this type of behavior is up to six

months in


prison, 2000 pounds or both.

129. Computer Misuse Act, 1990, ch. 18, 2(1)(a).

130. Computer Misuse Act, 1990, ch. 18, 2(1)(b).

131. Computer Misuse Act, 1990, ch. 18, 2(5)(a).

132. Computer Misuse Act, 1990, ch. 18, 2(5)(b).

133. Computer Misuse Act, 1990, ch. 18, 3(1).

134. Computer Misuse Act, 1990, ch. 18, 3(7).

135. Computer Misuse Act, 1990, ch. 18, 3(2).

136. Computer Misuse Act, 1990, ch. 18, 3(5).

137. Id. Colvin, Lock up the Keyboard

Criminal ,
Id.


Telecommunications PLC (England), June 1990.

138. Computer Misuse Act, 1990, ch. 18, 4.

139. Computer Misuse Act, 1990, ch. 18, 4(1).


140. 5(2) states that a significant link under 1 can be

(a) the


person was in Great Britain at the time in which he

caused the


computer to act in a certain way or (b) the computer he

attempted


to get access to was in Great Britain. 5(3) states

that a


significant link under 3 can be (a) that the person was

Great


Britain at the time when he did the act or (b) the

modification


took place in Great Britain. However, this may not an

exhaustive


list.

141. Davies, Cracking down on the computer hackers, Fin.

Times
Cracking down on the computer hackers


(London), October 4, 1990.

142. Computer Misuse Act, 1990, ch. 18, 5.

143. Although proposed on February 14, 1989, the proposed

bill


has not yet become law.

144. Appendix A, 10.

145. Appendix A, 1.

146. Appendix A, 1, alternative.

147. Appendix A, 2.

148. Appendix A, 3.

149. Appendix A, 4.

150. Appendix A, 5.

151. Appendix A, 7.

152. The Ghana Law Reform Commission states that they

created


their proposed law from the Scottish Law Commission and

the Law


Reform Commission of Tasmania, Australia reports on

computer


crime.

153. Appendix A, 9(a).

154. Appendix A, 8(b).

155. See, infra, endnote __ and accompanying text.
infra

156. Appendix A, 9(a).

157. Appendix A, 9(b).

158. Appendix A, 10.

159. Appendix A, 6.

160. Id.
Id.

161. Appendix A, 7.

162. Appendix A, 1.

163. Appendix A, 10.

164. Id.
Id.

165. Id.
Id.

166. The first computer crime law in the United States

was


enacted in 1979.

167. S. Rep. No. 432, 99th Cong., 2d Sess. 3, reprinted in

1986
reprinted in


U.S. Code Cong. & Admin. News 2479, 2481.

168. By increasing security, the ease with which one can

enter


the system will become more difficult. Some systems,

believing


that if such unauthorized access does occur that no

sensitive


information will be stolen, opt to have less security then

other


systems. In actuality, by one system not having enough

security,


the entire network can be put at danger when a mischievous

user


wishes to break into a users account which may be

accessed by


that system. See Stoll, 353-54 (stating an Australian

hacker


broke into Mr. Stoll's computer account because a

connected


computer's system manager did not wish to have a high

level of


security.

169. Stoll, 32. Many military computers and

sensitive


scientific computers operate in a secure environment.

This is


created by not allowing the computer system to have any

telephone


links to the outside world (i.e. outside of the building.

170. By having a secure system, information at the computer

site


can only be removed by a person walking into the computer

center,


copying the information and then walking out with it.

This is


both burdensome (it is much easier to access the computer

from


one's home or office) and cumbersome (since a person will

have to


walk around with reels of data that will later be put back

into

the system.

171. Computer Virus Legislation, Hearing on H.R. 55 and

H.R. 287


before the Subcomm. on Criminal Justice of the House Comm.

on the


Judiciary, 100th Cong., 1st Sess. 44, n. 27 (1989)

(statement of


Marc Rotenberg, Director, Computer Professionals for

Social


Responsibility).




172. Colvin, Lock up the Keyboard Criminal,

Telecommunications
Lock up the Keyboard Criminal


PLC (England), June 1990, p. 38. Michael Colvin, the

author of


Great Britain's Computer Misuse Act stated that the

passage of


the bill should not be looked at that the computer owner

should


not have security measures on their computers. Id. The

bill, he
Id.


states, was made only to compliment, not substitute, the

users


security measures. Id. In West Germany, the severity

of the
Id.


punishment for hacking depends on the effort that was

required to


commit the offense. Fagan, Technology: EC urged to

Strengthen
Technology: EC urged to

Strengthen


Laws on Computer Crime, The Independent, Feb. 13, 1990, 19.
Laws on Computer Crime

173. McGourty, When a hacker cracks the code, The

Daily
When a hacker cracks the code


Telegraph, October 22, 1990, p. 31.



174. A Password is a word that is either given to the

user by


the system or selected by the user to prevent others

from


accessing his computer or account within the computer.

This


words, groups of letters or symbols are supposed to be

kept


secret so as to not let other who are not authorized to

access


the system have access to it.




175. Donn Seeley, A Tour of the Worm, Department of

Computer
_____________________


Science, University of Utah, Nov. 1988, reprinted in

General
reprinted in


Accounting Office, Computer Security: Virus Highlights

Need for


Improved Internet Management, 20 (1989).

176. Authers, Armed with a secret weapon, Financial

(London)


Times, Feb. 5, 1991, Section I, 16.

177. Id.

178. For a discussion of this virus, see, Branscomb,

Rogue
see

Rogue


Computer Programs and Computer Rogues: Tailoring the

Punishment
Computer Programs and Computer Rogues: Tailoring the

Punishment


to Fit the Crime, 16 Rutgers Computer & Tech. L.J.

1, 14-16
to Fit the Crime _______________________________


(1990) (discussing the applicability of state and federal

law to


computer viruses).



179. Jim Thomas, publisher of the Computer Underground

digest


argues that computer pirates actually buy more programs

then the


average computer program buyer. Letter from Jim Thomas to

Brian


J. Peretti ( (discussing computer pirating of software)

180. See, GNU Manifesto (available at American University

Journal


of International Law and Policy). See also, Stallman, GNU

EMACS
See also,


General Public License, (Feb. 11, 1988) (available at

American


University Journal of International Law and Policy).

181. The GNU Manifesto (available at the American

University


Journal of International Law and Policy).

182. The author proposes that such copyright protection

last for


only two years. By granting the creator such protection

for a


short period of time, he will be able to recover the

expenses


that he put into the writing of the program.


If this type of protection is granted, it

should be


understood that the creator of the program has a copyright

to the


sourcecode of the program for that period. If he updates

the


program after the two year period, the updated code

will be


protected, but the original code will not be granted

the
protection. In this manner, an author cannot attempt to

give


copyright protection to a program after the copyright

has


expired.

183. Electronic letter from Brian J. Peretti to Dorothy

Denning


(Nov. 13, 1990) (concerning computer crime).

184. This will be a semi-secure system.

185. The system, of course, will have a system manager who

will


create the accounts for the users. His account will be

off


limits to those who wish to use the system. At the same

time,


individuals will be encouraged to attempt to break into

the


manager's account and tell him how it was done in

order to


improve security for this and other systems.

186. The problem still exists that information learned

through


the use of this system may allow those who use the

system to


break into other computer systems. This problem can be

corrected


by having the system manager and the users communicate

problems


with the system so that they may be corrected on other

systems.

187. United States v. United States Gypsum Co., 438 U.S.

422, 425


(1978).

188. S. Rep. No. 432, 99th Cong., 2d Sess. 6, reprinted in

1986
reprinted in
U.S. Code Cong. & Admin. News 2479, 2484.

189. Stoll, The Cuckoo's Egg.

190. The countries which a person can go to could be any

country


in the world, except Albania, since they are the only

country


whose computers are not connected to outside computers.

Stoll.

191. A school in Red Bank, New Jersey, has instituted a

"computer


responsibility training". Weintraub, Teaching Computer

Ethics in
Teaching Computer

Ethics in


the Schools, The School Administrator 8, 9 (apr. 1986).
the Schools, ________________________

192. S. Rep. No. 432, 99th Cong., 2d Sess. 3, reprinted in

1986
reprinted in


U.S. Code Cong. & Admin. News 2479, 2481.

193. Electronic Mail Letter from Rop Gonggrijp to

Brian J.


Peretti (Jan. 25, 1991) (concerning computer viruses). "We

have


to watch that we keep telling people how virusses work,

because


that is the only solution to the problem: mystifying the

whole


thing ans just hunting down "computer terrorists" is

useless and


(as proven in the US and Germany) leads to a questionable

style


of government in the field of information technology..." Id.
Id.

194. General Accounting Office, Computer Security:

Virus


Highlights Need for Improved Internet Management, 25 (1989).

0 Comments: