Computer Crime: Current Practices, Problems and Proposed Solutions Second Draft Brian J. Peretti It would have been surprising if there had been satisfactory road traffic legislation before the invention of the wheel, but it would also have been surprising if the law on the passage of laden donkeys proved entirely satisfactory when applied to vehicles.1 I. Introduction Within recent years, computer crime has become a preoccupation with law enforcement officials. In California, a group of West German hackers2 using phone lines and satellite hookups, gained unauthorized access into civilian and military computers and stole sensitive documents that were sold to the Soviet Union.3 A young New York programmer broke into a Washington computer to run a program that he could not run from his personal computer.4 After Southeastern Bell Stated that a document published in an electronic publication5 was valued at more than $75,000 the publisher was arrested and brought to trial before the discovery that the document could be publicly bought from the company for $12.6 The Chaos Computer Club, a Hamburg, Germany, club, went into government computers and access information and gave it to reporters.7 In May, 1988, the United States government launched Operation Sun Devil, which lead to the seizure of 23,000 computer disks and 40 computers.8 In addition, poor police performance9 has also been blamed on computers. Since its creation, the computer has become increasing important in society.10 The law, as in the past, has not been able to evolve as quickly as the rapidly expanding technology.11 This lack of movement on the part of governments shows a lack of understanding with the area. The need to create a comprehensive regulation or code of ethics has become increasing necessary. Due to the nature of computer systems and their transnational connections through telephone lines12, an individual state's action will only stop the problems associated with computer crime if many states join together. The patchwork of legislation that exists covers only a small part of the problem. To adequately address computer crime, greater efforts must be made within the computer community to discourage unauthorized computer access, countries must strengthen and co-ordinated their computer related laws, as well as proper enforcement mechanism created, computer program copyright laws be enhanced and computer systems should be created to allow those who wish to explore computer systems which will not disrupt the users of computer systems. This paper will first set out a definition of computer crime and why laws or regulation by the computer community must be created. Section II will then discuss the United States law concerning computer crime and why it needs to be strengthened. Section III will discuss the proposed Israeli computer crime bill, Britain's Computer Misuse Act and Ghana's proposed law. Section IV will discuss what can be done by both the government and computer owners and users to make computer crime less possible. II. Computer crime The definition of what constitutes a computer crime has been the subject of much controversy. A computer crime has been defined as "any illegal act for which knowledge of computer technology is used to commit an offense."13 The typical computer criminal has been described as between 15 and 45 years old, usually male, no previous contact with law enforcement, goes after both government and business, bright, motivated, fears loss of status in computer community and views his acts as games.14 For the purposes of this article, this will be the definition used because of its broad reach. Estimates regarding how much is lost to computer crime very widely15. In the only authoritative study, the loss due to computer crime was given at $555,000,000, 930 personnel years lost and 153 computer time years lost.16 The amount of total incidents for 1988 was 485 resulting in 31 prosecutions17. In 1987, there were 335 incidents with 8 prosecutions.18 Security spent on prevention of computer crime is becoming more commonplace19. The most publicized danger to computer systems are viruses20 and worms. A virus is a code segment which, when executed, replicates itself and infects another program.21 These viruses may be created anywhere in the world22 and may attack anything.23 A virus may be transmitted through a trojan horse24 program. A worm exists as a program in its own right and may spread over a network via electronic mail25. A virus attacks a program while a worm attacks the computer's operating system.26 The most notorious computer worm brought the Internet computer network to a halt.27 Computer virus attacks may be overrated.28 It is said that the biggest threat to computing includes "not backing up your data, not learning the ins and outs of your application programs, not putting enough memory in your computer, not organizing your hard disk, [and] not upgrading to the latest version of your applications.29 These computer programs have been compared to the AIDS virus.30 One author has stated that the viruses are used to both increase the amount of profits of computer program producers and anti-virus computer programs.31 Computer viruses may also be used to benefit computer systems, by either detecting flaws in security measures or detecting other viruses.32 Virus are very dangerous, though. The effects of a virus called Datacrime, activated on October 13, 1989, brought down 35,000 personal computers within the Swiss government and several companies in Holland.33 With the opening up of Eastern Europe, the virus problem is expected to increase.34 In Bulgaria, a country which does not have any laws against computer viruses, one new virus appears week.35 Computer viruses are created in countries like the Soviet Union as a way to punish computer pirates because of the lack of copyright laws.36 Perhaps the most dangerous threat to information contained in a computer is the "leakage" of radiation from the computer monitors.37 With inexpensive equipment38 a person can "read" the information off the computer screen and then replicate the information from the screen in a readable manner.39 The threat of attack on a computer system can also come from a hacker. A hacker is a person who breaks into, whether maliciously or not, computers or computer systems.40 A hacker can, if the system is not adequately secured, cause havoc in the computer by either deleting or altering programs or data or planting logic bombs or viruses in the computer system.41 Threats from hackers to plant viruses have been made in the past.42 The threat from computer hackers, as with viruses, has been said to be overrated.43 The issues surrounding computers still have not been decided by those within the computer community. Whether or not persons should be allowed to access computer systems without authorization is still a subject of debate within the computing community. A West German Computing Club, called The Chaos Computing Club, holds the belief that it is not improper to enter any system which they can gain access to and to "look" around inside of the system as much as they wish.44 They do not, however, condone destroying or altering any of the information within the system.45 On the other side, represented by Clifford Stoll, when individuals break into computer systems they disrupt the trust that the computer system is based on.46 This breach of trust not only makes operating the system tougher for the manager in control of the system, but also will decrease the amount of use of the system so less information will be transferred within the system.47 There is also conflicting views as to whether the authors of computer viruses should be punished. Marc Rotenberg48 holds the belief that a virus should be granted first amendment protection in some instances.49 In response to the Internet worm, there were 21 editorials that stated that the attack showed the need for more security in computers while there were 10 letters to editors that stated that the creator should be applauded rather then punished.50 They argue that this was a good way to raise consciousness concerning computer security.51 Alan Solomon, a consultant who specializes in virus detection and eradication, believes that viruses are, at most, an inconvenience.52 III.United States Computer Legislation The United States government53 and most states54 have computer crime laws. In 1979, only six states had such laws.55 Almost every computer crime will, in addition to violating a state and/or federal law, can also be prosecuted under other laws.56 A. Computer Fraud and Abuse Act. Congress originally enacted the Counterfeit Access Device and Computer Fraud and Abuse Act57 to address the problem of computer crime. Understanding that the scope of the original law was too narrow,58 in 1986 Congress enacted amendments to the Computer Fraud and Misuse Act of 1984.59 The Act essentially lists acts that if done with a computer are illegal. The Act also makes individuals culpable for attempting to commit a computer crime.60 In order to commit any of the crimes mentioned in the act, the actor must have acted either "intentionally" or "knowingly" when committing the act. The law addresses national security issues by making a crime of anyone using a computer to obtain information and giving the information to foreign countries.61 The penalty for this crime or its attempt is 10 years for the first offense62 and 20 years for subsequent offenses63. If a person intentionally accesses a computer either without authorization or in excess of his authorization and obtains and acquires information in a financial record of an institution or information contained in a financial record of an individual64, the person will have committed a misdemeanor for the first offense65 and a felony for subsequent offenses66. A person intentionally accessing a government computer without authorization which affects the government's use of that computer67 will have committed a misdemeanor for the first offense68 and a felony for the second offense.69 Accessing a computer with knowledge and intent to defraud and without or exceeding authority is a crime if the person obtains anything of value other than use is a felony70. Accessing a federal interest computer without authorization and either modifying medical records or causing $1,000 or more worth of damage within a one year period71 is punishable with up to 5 years for the first offense72 and 10 years for any subsequent offense.73 The Act also criminalizes trafficking in passwords.74 A person who knowingly and with intent to defraud traffics75 in passwords or similar information may be sentenced for up to one year for the first offense76 and up to 10 years for subsequent offenses77 if the computer is used by or for the Government of the United States78 or affects interstate or foreign commerce.79 B. Criticisms It is important to note that this statute only applies to "Federal interest computers" as defined by this section.80 If a computer is not this type of computer, then any of the above mentioned crimes will not be prosecutable under this section. Congress intentionally made the scope of the law narrow.81 This section has been criticized as not inclusive enough.82 Individual and corporate computers which do not fall into the restrictive definition83 may not receive the protection of the statute. The problem of computer viruses are not addressed by Act.84 The act does not punish those who add information into a computer, even though this may do more harm then just accessing information. The Congress has attempted to address this issue under two bills85, but neither one has been enacted. Unauthorized access where there is no theft or damage to the system is not covered.86 For example, a person access a computer system and looks at information contained therein, he has not committed a punishable crime under the Act.87 Questions have also been brought up concerning many of the undefined terms within the Act.88 Terms such as "intentionally access" and "affects interstate commerce" are among the terms not defined.89 The need to clarify these terms is important so that an individual will know what action will constitute a crime. IV. Legislation From Around The World A. Israel Proposed Computer Law In March 1987, the Israeli Ministry of Justice distributed a draft of a comprehensive computer bill.90 This bill covers a wide range of areas concerning computers91. The Act first sets out a list of proposed definitions for computer, program, software, information, thing and act. Each of these, while short, are concise and attempt to give a brief but comprehensive definition.92 Chapter 2 sets out a list of offenses which, if committed, are punishable.93 A authorized person commits an act upon any computer and knows that the act will prevent or cause disruption of the proper operation is subject to seven years imprisonment.94 A person who, without authority, commits an act which precludes a person from using a computer system or deprives a person of using that system is punishable by up to seven years imprisonment.95 If a person prepares or delivers or operates software knowing that the software will produce faulty results and "having reasonable grounds to assume", the person is punishable for up to seven years.96 The Act also addresses those who supply, deliver or operates a computer with faulty data.97 Section 5 applies to those who use a computer to attempt to obtain some "thing"98 or with intent prevents another from obtaining some "thing".99 A person who prevents another from obtaining a "thing" by the use of software may also be punished.100 A person who deprives a person of an object that contains software, data or information and obtaining a benefit for himself.101 All of these crimes contain a prison sentence of five years. A professional who relies on computer outputs that they know which are false is also subject to punishment.102 The crime carries a sentence of five years.103 This chapter does not apply to all computers, software data or information.104 It only applies to those computers, data or information which are used, designated to be used by or for (1) the state or a corporation that is supplying service to the public105 or (2) "business, industry, agriculture, health services, or for scientific purposes."106 Perhaps the most novel provision of this proposed law is the section governing the reporting of the offenses. Any person who is in charge of another and has reason to believe that an individual has committed an offense under the Act, he must report this to police as soon as possible.107 If the person does not do so, he may be imprisoned for up to one year. B. Analysis The Israeli computer crime bill is more comprehensive then the America bill. By creating a law which will apply not only to government computers, but also to those of "business, industry, agriculture, health services or for scientific purposes,"108 the law essentially covers all computers in the country.109 By creating such broad coverage, the law will be able to make the users of computers in Israel more secure in their knowledge that their systems are safe. B. Analysis The Israeli computer crime bill is more comprehensive then the America bill. By creating a law which will apply not only to government computers, but also to those of "business, industry, agriculture, health services or for scientific purposes,"110 the law essentially covers all computers in the country.111 By creating such broad coverage, the law will be able to make the users of computers in Israel more secure in their knowledge that their systems are safe. The most controversial provision in the act is the proposal requiring that individuals that may know of computer crime must report the crime or face fines themself. As Levenfeld points out112, this will mean that employers will have to impose internal spy rings to be able to tract down the "reasonable suspicions" that individuals have concerning illegal activity. Shalgi, however, believes that this is a good provision in that it will allow computer crime to come more to the forefront so that the crime can be more easily combatted.113 This provision is necessary for the government to understand exactly how large of a problem computer crime is. At present, statistics on computer crime are difficult to determine because of the lack of reporting.114 By making all persons who would be responsible for computer security, i.e. all persons who use computer systems, the problem will be brought into the open and can be addressed. The proposed law also sets out a defense for those who violate the law. Under 11, if a person who violates the law makes another know that he did disrupt or alter the data, he will not be convicted of the crime. This will allow those who perform such acts to avoid the punishment of the law. Individuals who wish to destroy or alter such information will have an incentive to bring forth their mischievous acts so that when brought before the court they could say that they took precautions so that individuals would not rely on the information. This provision will encourage those who do such activity to come forth without fear of conviction. The ability of a court to not impose a punishment on a person is contained in section 12.115 This allows the court to abstain from punishment if the offense is not grave and was not committed with malice. This section, in effect, will allow those who commit computer crime to be able to forgo punishment if their acts were not serious. This will be beneficial to those who are hackers in the original sense of the word,116 yet still allow for punishment of those individuals who enter systems to do harm to it. The law also creates standards for how a computer may be seized. Neither a computer, nor any part of it, may be seized without a court order.117 Although this seems to be a good provision in its effects on individual rights118, the section is not focused enough. The law does not address the issue of whether a floppy, as opposed to a hard disk, is part of a computer. The hard disk is located inside of a computer, while floppy disks may be removed from the computer. This law should address this issue by stating that the floppy disk is also a part of a computer in its definitions.119 This section also does not address what standard may be used for the court order. Must the officer only have a reasonable suspicion or probable cause to seize the computer? By stating explicitly in the statute that the officer must have probable cause to seize the computer, an overzealous police officer will not be able to as easily seize the computer. C. The Great Britain Computer Misuse Act In response to computer program concerning AIDS that was distributed to doctors in Great Britain and Europe that contained a virus,120 Michael Colvin, a British MP introduced the Computer Misuse Bill.121 On August 29, 1990, the Computer Misuse Act122 came into effect.123 It was estimated that the losses to British industry and government were one billion pounds.124 This Act is designed to not to create a confidential information right, but to rather protect computer system integrity125. Prior to enactment, the English Law Commission studied the problem and laws regarding computer crime. It stated that there should be three new offenses to deal with computer misuse: (1) Unauthorized access to a computer, (2) Hacking with intent to commit a serious crime, and (3) Intentional destruction of or alteration to computer programs or data.126 The Computer Misuse Act states that unauthorized access occurs if the person is unauthorized to access the computer, he causes the computer to perform any function with intent to gain access to a program or data in the computer and he knows that this is the case.127 He does not have to be directed to any particular program or data in the computer he attempted to get on or the data or program he wishes to access.128 If a person commits unauthorized access with the intent to commit129 or help another offense,130 the person can be sentenced on summary conviction, up to six months in prison and a fine,131 or if convicted after indictment, to imprisonment of up to five years, a fine or both.132 If a person modifies computer material,133 the person is subject to a fine of up to 5 years, an unlimited fine or both.134 The person must knowingly modify a program without authorization and must have done so with the intent to impair the operation of the computer, to prevent or hinder access, or impair the operation of the program or resulting data.135 The modification does not have to be permanent.136 A modification may be done by either altering, erasing or adding onto a program or data. By stating modification broadly, the act attempts to combat the placing of viruses, worms and logic bombs on computers.137 The Act also extends the scope of jurisdiction.138 A person does not have to actually be in Great Britain at the commission of the crime. The crime itself must have some relation to Great Britain.139 The link must be "significant".140 D. Analysis As opposed to the other statutes, the Computer Misuse Act does not attempt to define computer. This was done because of the fear that any definition given for a computer may become out of date in a short period of time.141 Program and data are also not defined within the Act. Great Britain's courts are granted large jurisdiction. The act allows for anyone who attempt to commit a crime under the act to be punished in Great Britain. The act, although setting out that the link must be significant,142 does not attempt to define this word. By this omission, the Great Britain's courts can expand this to any act that occurs in a foreign country that uses a British computer for even a short period of time. The defining of the word would clear up some misconceptions that may result from the act. Of interest to note, the Act would not punish a person who distributes disks tat contain viruses on them. Although the drafter of the bill said that this was his goal, the law ignores this possibility. An amendment should be added to the law which will punish those who damage data even if they do not access the system. E. Ghana In response to the belief that their existing laws were not adequate, a draft law was proposed by the Ghana Law Reform Commission.143 The bill is rather simple as opposed to the other laws. It has definitions for access, computer, computer network, computer program and data.144 To commit computer related fraud, the person must have an intent to defraud and either alters, damages destroys data or program stored in or used by the computer or obtains information to his own advantage or to the disadvantage of another or uses a computer commits and offense.145 The Act Also sets out alternatives for some sections that may be adopted. The alternative states that any person who obtains access to a computer program or data and attempts to erase or alter the program or data with intent to help his own interests or damage other person's interest commits a crime.146 Damaging computer data occurs if any person, by any means, without authority, willfully does damage to data commits a crime.147 The crime of unauthorized use of a computer is simply defined as anyone who knowingly without authority commits an offence.148 Similarly, unauthorized access is anyone who knowingly gains access to a computer, network or any part there of, without authority to do so.149 The Ghana law also creates a crime for the knowingly and dishonestly introduction of false data and the omission to introduce, record or store data.150 An authorized person who willfully or intentionally allows information to get into the hands of an unauthorized person and that person uses the information to his advantage also commits a crime.151 The penalties for the crimes are similar to those of the Great Britain law.152 On summary convictions, a jail term may be given of up to two years or the statutory maximum fine or both.153 On conviction on indictment, a prison term of no more then ten years or an unlimited fine, or both may be given.154 The jurisdiction that the Ghana courts have in accord with this jurisdiction is as large as their British counterpart.155 The courts can hear any case if the accused person was in Ghana at the time of the act.156 Also, if the program or data was stored in or used with a computer or computer network in Ghana the person may be tried under the law.157 F. Analysis The Ghana proposed Computer Crime Law is in accord with the United States, Great Britain and the proposed Israeli laws. By setting out definitions for the various terms used in the law158, the law clearly defines which acts may be subject to prosecution under the law. Although simple, the definitions attempt to capture within the law's grasp the various different acts which could be done with a computer that should be outlawed. The most original section of the act concerns the newly created crime of omission to introduce, record or store data.159 This section, however, will end up punishing those who work in corporations that are at the lowest level skill-wise. The government should, if the law is enacted, force companies to give each employee a sufficient amount of training on a computer so that the person will be able to act in accordance with the law. The act does provide a safeguard by making the mens rea of the crime "negligently or dishonestly"160 The act also sets out a crime for an individual who allows information to get into the hands of another.161 As opposed to the other laws, this section specifically address the problem of where an authorized individual gives information to an outsider. By specifically regulating this behavior, anyone who wishes to act according will know that the act is illegal. The crime of computer-related fraud is defined broadly.162 This law effectively makes any type of fraud committed either with a computer or information within a computer a crime. The law adequately addresses the problems that might occur with a computer in fraud. A broad definition, however, may still let some act seem as though they are not covered since the act is not specific in the area of what constitutes a crime. Most significantly, the act does not state which types of computers are covered by the act.163 By not giving a limit on which computers are covered, the act extends its jurisdiction to all "computer"164 and "computer network"165 in the country. If the definition of computer changes, due in part to advance technology, the law may have to change this section. V. Proposed Solutions Computer Crime laws have come a long way in addressing the problem of computer crime.166 The ability to regulate the activity will decrease the amount of crime that is committed. Those who use the computers of the world, however, must not rely totally on there respective governments to combat this problem.167 The best way to combat computer crime is to not let it occur at all. Many computer systems have not been given enough security by their system managers.168 It is possible to have a totally secure computer system169, but it is impractical and slows the free flow of information.170 By creating laws that will protect the integrity of computer systems while also allowing for the ability of our best and brightest to develop and learn about computer systems will the nation be able to keep our technological lead in the world. In order to combat the problem of unauthorized access, users of computer systems must be taught to respect each others privacy within the various systems. Creating an standard of ethics for those who are users of computers will be the best way since it will hold the users to standards that must be met. Although some organizations have attempted to promogate standards regarding the ethical use of computer systems171 no one standard has emerged. Proposed rules of ethics should balance the need of individuals to be able to learn and discover about the various types of computer systems, while at the same time allowing for those who use those systems to be secure in the knowledge that the information stored on the computer will not be read by those other then person who should have access to it. If computer crime laws are enacted, industries that use computers should not use the new laws as a replacement for using adequate security measures.172 Individuals or corporations that use computer have several ways to protect themselves from unauthorized access. If the computer can be accessed by a modem, the computer can have a dial back feature placed on the phone line so that one a computer is accessed, the computer will then call back to make sure that the call is coming from a line which is supposed to access the computer.173 The proper use of passwords174 are also an effective way to address the problem of unauthorized access. A recent study has shown that out of 100 passwords files, approximately 30 percent were guessed by either using the account name or a variation of it.175 A program has recently been developed that will not allow a user to select an obvious password.176 Encryption programs, similar to the program used on Unix operating system, can scramble a password in a non reversible manner so that if the encrypted password falls into the hands of an individual who is not supposed to access the system, the person will not be able to get into the system. These systems can also be used so that if a hacker does get into a computer system and attempts to get information, the information will not be readable.177 A problem that must be address is the lack of laws concerning copyright protection of computer programs in foreign countries. The Pakistan Brain178 was written to discourage copying of a program without authorization. By creating pirating penalties a reason for the creation of computer viruses will be removed and less viruses will be created.179 Many in the field argue that computer programs should not be copyrighted.180 Copyright protection should not be afforded to computer programs since they are only mathematical equations.181 Copyright protection should be given to the maker of a computer programmer only for a short period of time.182 A novel concept which will both satisfy the computer hackers quest for knowledge through examining computer systems and protect the integrity of computer systems is to create a computer systems for the use of hackers alone.183 This computer would not be connected to other computer systems, but can be accessed through a modem.184 If created, accounts would be given to all interested computer enthusiasts. Those participating will not be prosecuted for exploring unauthorized areas of the system.185 Since other computer systems will not be accessible through this system, any activity on this system will not endanger the information on other systems.186 By allowing this to be done, a major problem will be solved, the inability to afford to buy a mainframe system, while a person will still be able to learn about different types of systems. If any laws are to be made, they should make "knowing"187 or "intentionally"188 unauthorized access into a computer a crime. By making the intent of the crime be knowing, it will allow those who accidently connect to a computer system that they think is theirs but is not to be excused from punishment. The law must also be done in a way that will allow it to be enforced across national boundaries. A computer hacker can access computers from across the world without ever leaving his home country.189 If these laws can only be enforced within the home country, then a person can, in theory, go into a country of whose computers that he would never want to access and access into other computers without fear of punishment.190 An international convention should be convened to address this problem. Since the problem is of international concern and the crimes do occur across the boarders of countries, by setting standards by the international community concerning the conduct of computer users, the hodgepodge of computer crime laws will be eradicated in favor of a common international standard. As the boundaries in Western Europe disappear in anticipation of 1992, international access is sure to accelerate. Colleges, Universities and high schools must institute programs designed to address proper computer use.191 Although not all computer users are not trained in school, teaching the ethical use of computers will allow users to understand the need for security on systems. These programs will also show users that computer crime is dangerous to society.192 Problems concerning computer crime should be publicized so as not to mystify the crime.193 The United States and other countries must create more Computer Emergency Response Teams (CERT). These teams are to coordinate community responses to emergency situations, coordinate responsibility for fixing hole in computer systems and serve as a focal point for discussions concerning computer systems.194 These groups regularly post notices concerning computer viruses or other dangers in the Internet computer system. The scope of these groups should be expanded so they may be a focal point of the needs and desires of those who use computers. If they are used to gather information as a clearing house type operation, the spread of information concerning computer systems and problems with the systems will be more adequately addressed. IV. Conclusion Computer crime is a growing problem. With the advent of the computer and a more computer literate public, crimes committed by computers will increase. To effectively address the problem, laws must be created to outlaw activity which is designed to further illegitimate ends. These laws have moved in the right direction concerning what should be outlaws so as to balance the needs of computer users against those of the computer owners. To enforce these laws, governments must realize that the problem of computer crime is not only of local concern. Educational programs and standards of ethics must be created from within the computer users community. Corporations which use computers must educate their employees to reduce the fear that one might have when addressing a computer security issue. Copyright laws must be strengthened in countries that either do not have or have weak copyright laws so that the need to create viruses to protect an individual's or corporation's work will no longer be necessary. To satisfy users curiosity with computers, a non-secure computer system should be created. This system will allow those who wish to explore a system in order to understand the system may. Those individuals can do so without the fear of prosecution. Only by directly addressing the causes of computer crime and drafting standards and laws to address the unique area will the problem of computer crime be adequately addressed. Light must be shined on the area so individuals will realize that fear of the machines is not justified. Only by doing so may we enter the 21st century realizing the full potential of computers. Appendix A Ghana Computer Crime Law (Proposed) Computer Crime Law Computer Crime Law In pursuance of the Provisional National Defense Council (Establishment) Proclamation 1981, this Law is hereby made: 1. Any person who, with intent to defraud, (a) alters, damages, destroys or otherwise manipulates data or program stored in or used in connection with a computer, or (b) obtains by any means, information stored in a computer and uses it to his advantage or to another person's advantage to the disadvantage of any other person, or (c) uses a computer commits an offense. Charge: Computer-related fraud. ALTERNATIVE: (1) A person commits an offense if that person obtains access to a computer program or data, whether stored in or used in connection with a computer or to a part of such program or data to erase or otherwise alter the program or data with the intention- 1. (a) of procuring an advantage for himself or another person: or (b) of damaging another person's interests. 2. Any person who, by any means, without authority, wilfully destroys, damages, injures, alters or renders ineffective data stored in or used in connection with a computer commits an offense. Charge: Damaging Computer data. 3. Any person who, without authority, knowingly uses a computer commits and offense. Charge: Unauthorized use of a computer. 4. Any person who, without authority, knowingly gains access to a computer, computer network, or any part thereof commits an offense. Charge: Unauthorized access to a computer. 5. Any person who, knowingly and dishonestly introduces, records or stores, or causes to be recorded, stored or introduced into a computer or computer network by any means, false or misleading information as data commits an offense. Charge: Insertion of false information as data. ALTERNATIVE: (5) A person commits an offense if, not having authority to obtain access to a computer program or data, whether stored in or used in connection with a computer, or to a part of such program or data, he obtains such unauthorized access and damages another person's interests by recklessly adding to, erasing or otherwise altering the program or the data. 6. Any person under a contractual or other duty to introduce, record or store authorised data into a computer network, who negligently or dishonestly fails to introduce, record or store, commits an offense. Charge: Omission to introduce, record or store data. ALTERNATIVE (6) Any person under a contractual or other duty to introduce, record or store data into a computer or computer network who negligently or dishonestly fails to introduce, record or store, commits an offense. 7. Any authorised person who willfully or intentionally allows information from a computer to get into the hands of an unauthorised person who uses such information to his advantage commits an offense. Charge: Allowing unauthorised person to use computer data. 8. A person guilty of an offense under this Law shall be liable:- (a) on summary conviction, to imprisonment for a term not exceeding two years or to a fine not exceeding the statutory maximum or both; or (b) on conviction on indictment, to imprisonment for a term not exceeding ten years or to an unlimited fine, or both. 9. A court in Ghana shall have jurisdiction to entertain proceedings for an offense under this Law, if at the time the offense was committed:- (a) the accused was in Ghana; or (b) the program or the data in relation to which the offence was committed was stored in or used with a or used with computer or computer network in Ghana. computer network in Ghana. 10. In this Law, unless the context otherwise requires:- "access" includes to log unto, instruct, store data or programs in, retrieve data or programs from, or otherwise communicate with a computer, or gain access to (whether directly or with the aid of any device) any data or program. "computer" includes any device which is capable of performing logical, arithmetical, classifactory, mnemonic, storage or other like functions by means of optical, electronic or magnetic signals. "Computer network" includes the interconnection of two or more computers, whether geographically separated or in close proximity or the interconnection of communication systems with a computer through terminals, whether remote or local. "Computer program" includes an instruction or statement or series of instructions or statements capable of causing a computer to indicate, perform, or achieve any function. "data" includes a representation in any form whether tangible or intangible that is capable of being stored in or retrieved by a computer. ENDNOTES ENDNOTES 1. Financial Times Limited (London) April, 1990. 2. See, infra, endnote 36 and accompanying text. infra 3. Stoll, The Cuckoo's Egg (1990). [hereinafter Stoll]. The Cuckoo's Egg 4. Lyons, 13 Are Charged in Theft of Data from Computers, New York Times, August 17, 1990, B2, col. 3. 5. Although there is no set definition of a computer publication, it is created and published solely on a computer. Peretti, Computer Publications and the First Amendment (1990) (available at Princeton University FTP site and The American University Journal of International Law and Policy Office). 6. Dorothy Denning, The United States v. Craig Neidorf (available at The American University Journal of International Law and Policy office). 7. Schares, A German Hackers' Club that Promotes Creative Chaos, Business Week, Aug. 1, 1988, 71. 8. Barlow, Crime and Puzzlement: In advance of the Law on the Electronic Frontier, Whole Earth Review, Sept. 22, 1990, 44. 9. Kopetman, Computer Gave Them Bum Rap, Los Angeles Times, Los Angeles Times Jan. 10, 1991, at B1, col. 2. 10. See, J. Thomas McEwen, Dedicated Computer Crime Units (19--) See, (stating how important computers have become to society). In 1978 there were 5,000 desktop computers in the United States. S. Rep. No. 432, 99th Cong., 2d Sess. 2, reprinted in, 1986 U.S. reprinted in Code Cong. & Admin. News 2479, 2479. By 1986, this number had increased to about 5 million. Id. Id. 11. See, S. 2476, Floor Statement by Senator Patrick Leahy. 12. See, Stoll at ___ (stating that all countries, except Albania, are connected via computer systems). 13. McEwen, Dedicated Computer Crime Units 1 (19--). Another _______________________________ definition used is the definition of computer crime was "any illegal act for which knowledge of computer technology is essential for successful investigation and prosecution". Parker, Computer Crime: Criminal Justice Resource Manual, (1989). _________________________________________________ 14. Conly, Organizing for Computer Crime Investigation and Prosecution, 6-7 (19--). 15. For instance, the estimated cost of the Internet Worm, a computer program created by Robert Morris, Jr. which shut down the Internet computer system, varies from $97,000,000 (John McAfee, Chairman, Computer Virus Industry Association) to $100,000 (Clifford Stoll's low bound estimate). Commitment to Security, 34 (1989). It is difficult to determine exactly the cost of such crime because it is difficult to determine what should be included. The estimated downtime of a computer due to such activity could be used to determine the cost. This may be flawed, however, since it will not take into account how much of the down time actually would have been used. Electronic Mail Letter from Richard Stallman to Brian J. Peretti (Dec. 3, 1990) (concerning computer crime). 16. Commitment to Security, 34. The average facility, consisting of 1,224 microcomputers, 96 minicomputers and 10 mainframe computers, lost $109,000, 365 personnel hours and 26 hours computer time loss per year. Id. Id. 17. Id. at 23. 6 percent of incidents resulted in prosecutions. Id. Id. Id. 18. Id. Id. 19. Only 1.5 percent of respondents to a National Center for Computer Crime Data used Anti-virus products in 1985. By 1988 this figure rose to 22 percent. By 1991, 53 percent of the respondents stated that they would be using anti-virus software by 1991. According to a Price Waterhouse survey in Great Britain, in 1985 26 percent installations spent nothing on security. Authers, Crime as a Business Risk- Security/ A Crime as a Business Risk- Security/ A Management as Well as a Technical Problem, Financial Times Management as Well as a Technical Problem (London), November 7, 1990. By 1990 this figure had shrunk to 4 percent and is expected to decline to 0 by 1995. Id. The amount Id. spent on security for new systems has increased from 5 percent in 1985 to 9 percent by 1990. Id. Id. In Japan, less than 10 percent of groups that rely heavily on computers have taken measures to prevent virus attacks. Computer Users Fail to Protected Against Viruses. Although Japan Computer Users Fail to Protected Against Viruses. does not have a computer crime law, there is a movement to make such a law. Computer Body Calls for Jail Sentences for Hackers, Computer Body Calls for Jail Sentences for Hackers Kyodo News Service, Nov. 15, 1990 (available from the Nexis library). The Japan Information Processing Development Association has stated that the new law should make the crime punishable of either one year of hard labor or a fine. Id. Id. 20. The terms was first applied in 1984. Commitment to Security, 34 (1989). 21. Ring, Computer Viruses; Once Revered as Hackers, Technopaths Threaten Security of Computer-Dependant Society, Computergram, July 7, 1989. Some of these viruses are extremely small, e.g. Tiny, which is 163 bytes, may be the smallest. Friday 13th Virus Alert, The Times (London), July 12, 1990. 22. Graggs, Foreign Virus Strains Emerge as Latest Threat to Foreign Virus Strains Emerge as Latest Threat to U.S. PCs, Infoworld, Feb. 4, 1991, 18. Viruses have appeared U.S. PCs from Bulgaria, Germany, Australia, China and Taiwan. Id. Some new Id. viruses include Armageddon, from Greece which attacks through modems and then dials to a talking clock in Crete, Liberty, from Indonesia, Bulgaria 50, which is thought to have come from a "laboratory" in Sofia, Victor, thought to originate in the U.S.S.R., the Joker, from Poland, which tells the user that the computer needs a hamburger, and Saturday the 14th, presumed to have been developed in South Africa, which destroys a computer's file allocation table. Id. Id. Some viruses also carry a message when they are activated. A virus that is though to have been developed by students at Wellington, New Zealand, tells the user that they have been "stoned" and requests that marijuana should be legalized. Id. Id. Approximately 80 or 90 of the 300 viruses counted for the IBM personal computer originated in Bulgaria according to Morton Swimmer of Germany's Hamburg University Virus Test Center. 23. A report in La Liberation, a French newspaper, stated that La Liberation computer viruses could be planted in French EXOCET missiles to misguide them when fired. La Liberation, Jan. 10, 1991, reprinted in Klaus Brunnstein, Risks-Forum, vol. 10, iss. 78, reprinted in Jan. 22 1991 (available at American Journal of International Law and Policy Office). 24. A "trojan horse" is a program that does not seem to be infected, however, when used in a computer, the virus is then transferred the uninfected machine. On trojan horse destroyed 168,000 files in Texas. Commitment to Security, 34 (1989). 25. Ring, Computer Viruses; Once Revered as Hackers, Technopaths Computer Viruses; Once Revered as Hackers, Technopaths Threaten Security of Computer-Dependent Society, ComputerGram, Threaten Security of Computer-Dependent Society July 7, 1989. 26. Highland, One Wild Computer "Worm" Really Isn't a Federal One Wild Computer "Worm" Really Isn't a Federal Case, Newsday, Jan. 23, 1990, 51. Case 27. Stoll, at 346. The amount of computers that were actually infected by the worm is still the subject of debate. Mr. Stoll estimates that 2,000 computers where infected, while the most commonly cited number is 6,000. Commitment to Security, 34 (1989). The 6,000 estimate was based on an Massachusetts Institute of Technology estimate that 10 percent of the machines at the school were infected and was then inferred to the total number of machines across the country that were affected. General Accounting Office, Computer Security: Virus Highlights Need for Improved Internet Management, 17 (1989). This number may be inaccurate because not all locations had the same amount of vulnerable machines. Id. Id. 28. For the first eight months of 1988, there were 800 incidents concerning computer viruses. Commitment to Security, 34. The Computer Virus Industry Association reported that 96 percent of these reported infections were incorrectly identified as viruses. Id. Id. 29. Robinson, Virus Protection for Network Users, Washington Post, Washington Business, p.44, Feb. 11, 1991. 30. Ross, Hacking Away at the Counterculture, 3 (1990) (available at the American University Journal of International Law and Policy). On Saturday Night Live, during the news update segment, Dennis Miller stated, in comparing a computer viruses to the AIDS virus, "Remember, when you connect with another computer, you're connecting to every computer that computer has ever been connected to." Id. Id. 31. Id. at 8-9. Id. 32. Computer Virus Legislation, Hearing on H.R. 55 and H.R. 287 before the Subcomm. on Criminal Justice of the House Comm. on the Judiciary, 100th Cong., 1st Sess. 49 (1989) (statement of Marc Rotenberg, Director, Computer Professionals for Social Responsibility). In Israel, Hebrew University used a computer virus to detect and destroy a virus that would have destroyed data files. Id. Id. 33. Computergram International, October 14, 1990. 34. 35. Watts, Fears of Computer Virus Attack from East Europe grow, Fears of Computer Virus Attack from East Europe grow The Independent, November 24, 1990, p.6. On a trip to Bulgaria, a British computer consultant returned with 100 viruses that do not exist in the West. Id. Id. 36. Id. 37. McGourty, When a Hacker Cracks the Code, The Daily Telegraph When a Hacker Cracks the Code (London), October 22, 1990, p. 31. 38. The equipment would cost about 50 (British) pounds. Id. Id. 39. Id. A British company, has stated that they have developed Id. a glass that will reduce this problem. Tieman, Spy-Proof Glass to Beat the Hackers, The (London) Times, Jan 17, 1991. A more recent problem concerns the ability of computer hackers to access into fax machines and either change or reroute information from the machine. Becket, Espionage fears mounting as Espionage fears mounting as hackers tap into faxes, The Daily Telegraph (London), December 1, hackers tap into faxes 1990, p. 23. This problem can be circumvented by the use of encryption devices or passwords on the machine. Id. Id. 40. Stoll at 9. The word itself originally had two meanings. People originally called themselves hackers were software wizards who thoroughly knew computer systems. Id. In U.S. v. Riggs, 739 U.S. v. Riggs F. Supp. 414, 423 (N.D. Ill. 1990) the court defined hackers as "individuals involved with the unauthorized access of computer systems by various means." The New Hacker's Dictionary defines hackers as "A person who enjoys learning the details of programming systems and how to stretch their capabilities, as opposed to most users who prefer to learn only the minimum necessary." New Hacker's Dictionary, to be published Spring, 1991. Hacker has also been used in a non-evil sense with the word "cracker" taking the disreputable part of the word. In this light, hacker means "computer enthusiasts who `take delight in experimenting with system hardware, software and communication systems." and cracker meaning "a hacker who specializes in gaining illegal access to a system." One Wild Computer `Worm' One Wild Computer `Worm' Really Isn't a Federal Case, Newsday, January 23, 1990, p.51. Really Isn't a Federal Case The typical hacker has been described as "a juvenile with a home computer who uses computerized bulletin board systems for a variety of illegal purposes. Conly, Organizing for Computer Crime Investigation and Prosecution, 8 (19--). 41. Sulski, How to Thwart Potential Saboteur, Chicago Tribune, How to Thwart Potential Saboteur November 18, 1990, p.18. 42. Computerworld, December 3, 1990, p. 122. Kryptik, a hacker group, was stated as having planned to plant a virus in a telephone network on December 5, 1990. Id. It is unclear, Id. however, if the virus actually was planted. Id. Id. 43. Sulski, How to Thwart Potential Saboteur, Chicago Tribune, How to Thwart Potential Saboteur November 18, 1990, p.18. Computer security experts state that the risk of having hacker break into your system is less than being burglarized or having a power outage due to lightning. Id. Id. Errant opinion poll results have also been blamed on the work of hackers. Holdsworth, Hackers May Have Attacked TV Poll Hackers May Have Attacked TV Poll Computers-MP, Press Association Newsfile, May 4, 1990. Computers-MP 44. Stoll, 312. 45. Id. This view is also shared by the editors of 2600, The Id. Hackers Quarterly. It is also held by these persons that a service is done to the computing community because those who break in to computer systems show the operators that their system is not strong enough and that it should be made stronger. 46. Stoll, at 354. 47. Mr. Stoll's computer was broken into by an Australian hacker who said he did so to show that Mr. Stoll's security was not good and that hackers are good because they show where security problems are in computer networks. Id. at 353-54. He Id. rejected such arguments. Id. Id. 48. Director, Computer Professionals for Social Responsibility 49. Computer Virus Legislation, Hearing on H.R. 55 and H.R. 287 before the Subcomm. on Criminal Justice of the House Comm. on the Judiciary, 100th Cong., 1st Sess. 26-27 (1989) (statement of Marc Rotenberg, Director, Computer Professionals for Social Responsibility). The Aldus peace virus, which displayed a message calling for peace and then disappeared without damaging the system itself, is an example of a virus which he believes should be protected. Id. Id. 50. Commitment to Security, 34. 51. Stoll, 349. 52. "I can never understand why people think it is all right to run out of computer paper but not all right to be infected with a virus. The disruption is the same and it takes about the same amount of time to put matters right." Cane, Hygiene See Off Hygiene See Off Computer Viruses, Financial Times (London) October 14, 1989, Computer Viruses Section I, p. 24. 53. 18 U.S.C. 1030 (1988). 54. Ala. Code 13A-8-100 et.seq. (1990); Alaska Stat. Ala. Code Alaska Stat. 11.46.200(a)(3), 11.46.484(a)(5), 11.46.740, 11.46.985, 11.46.990 (1990); Ariz. Rev. Stat. Ann. 13-2301(E), 13-2316 (1990); Cal. Ariz. Rev. Stat. Ann. Cal. Penal Code 502 (West 1990); Colo. Rev. Stat. 18-5.5-101 et. Penal Code Colo. Rev. Stat. seq. (1990); Conn. Gen. Stat 53a-250 et. seq., 52-570b (1990); Conn. Gen. Stat Del. Code Ann. tit. 11, 931 et seq. (1990); Fla. Stat. Del. Code Ann. Fla. Stat. 815.01 et seq. (1990); Ga. Code Ann. 16-9-90 et seq (1990); Ga. Code Ann. Haw. Rev. Stat. 708-890 et seq. (1990); Idaho Code 18-2201, Haw. Rev. Stat. Idaho Code 2202 (1990); Ill. Ann. Stat. 15-1, 16-9 (1990); Ind. Code Ill. Ann. Stat Ind. Code 35-43-1-4, 35-43-2-3 (1990); Iowa Code 716A.1 et. seq. Iowa Code (1990); Kan. Stat. Ann. 21-3755 (1990); Ky. Rev. Stat. Ann. Kan. Stat. Ann. Ky. Rev. Stat. Ann. 434.840 et. seq. (1990); La. Rev. Stat. Ann. 14(D) 71.1 et La. Rev. Stat. Ann seq. (1990); Me. Rev. Stat. Ann. chap. 15, tit. 17-A, 357 Me. Rev. Stat. Ann. (1990); Md. Crim. Law Code Ann. Article 27 45A, 146 (1990); Md. Crim. Law Code Ann. Mass. Gen. L. ch 266, 30 (1990) see infra; Mich. Comp. Laws Mass. Gen. L. Mich. Comp. Laws 28.529(1) et seq. (1990); Minn. Stat. 609.87 et seq. (1990); Minn. Stat. Miss. Code Ann. 97-45-1 et seq (1990); Mo. Rev. Stat. 569.093 Miss. Code Ann. Mo. Rev. Stat. et seq. (1990); Mont. Code Ann. 45-2-101, 45-6-310,45-6-311 Mont. Code Ann. (1990); Neb. Rev. Stat. art. 13(p), 28-1343 et seq (1990); Nev. Neb. Rev. Stat. Nev. Rev. Stat. 205.473 et seq. (1990); N.H. Rev. Stat. Ann. Rev. Stat. N.H. Rev. Stat. Ann. 638.16 et seq. (1990); N.J. Rev. Stat. 2C:20-1, 2C:20-23 et. N.J. Rev. Stat. seq., 2A:38A-1 et seq. (1990); N.M. Stat. Ann. 30-16A-1 et N.M. Stat. Ann. seq. (1990); N.Y. Penal Law 155.00, 156.00 et seq, 165.15(10), N.Y. Penal Law 170.00, 175.00 (1990); N.C. Gen. Stat. 14-453 et seq (1990); N.C. Gen. Stat. N.D. Cent. Code 12.1-06.1.01(3), 12.1-06.1-08 (1990); Ohio Rev. N.D. Cent. Code Ohio Rev. Code Ann. 2901.01, 2913.01, 1913.04, 1913.81 (Anderson 1990); Code Ann. Okla. Stat. tit. 21, 1951 et seq. (1990); Or. Rev. Stat. Okla. Stat Or. Rev. Stat. 164.125, 164.377 (1990); Pa. Cons. Stat. 1933 (1990); R.I. Pa. Cons. Stat. R.I. Gen. Laws 11-52-1 et seq (1990); S.C. Code Ann. 16-16-10 et Gen. Laws S.C. Code Ann. seq (Law. Co-op 1990); S.D. Codified Laws Ann. 43-43B-1 et seq. S.D. Codified Laws Ann. (1990); Tenn. Code Ann. 39-3-1401 et seq (1990); Texas Code Tenn. Code Ann. Texas Code Ann. tit 7 33.01 et seq. (Vernon 1990); 19 Utah Laws 76-6- Ann. Utah Laws 701 et seq.; Va. Code Ann. 18.2-152.1 et seq. (1990); Wash. Va. Code Ann. Wash. Rev. Code Ann. 9A.48.100, 9A.52.010, 9A.52.110 et seq. (1990); Rev. Code Ann. Wis. Stat. 943.70 (1990); Wyo. Stat. 6-3-501 et seq. (1990). Wis. Stat. Wyo. Stat. 55. Parker, Computer Crime: Criminal Justice Resource Manual, 129 (1979). 56. McEwen, Dedicated Computer Crime Units, 60 (1989). These other laws include embezzlement, larceny, fraud, wire fraud and mail fraud. Id. at 60. ___ 57. Pub. L. No. 98-473, 2102(a), 98 Stat. 1837, 2190 (codified at 18 U.S.C. 1030). 58. S. Rep. No. 432, 99th Cong., 2d Sess., 1986 U.S. 2, reprinted in, 1986 Cong. & Admin. News 2479, 2479. reprinted in 59. Pub. L. No. 99-474, 2, 100 Stat. 1213 (amending 18 U.S.C. 1030). 60. 18 U.S.C. 1030(b). 61. 18 U.S.C. 1030(a)(1). The person must act knowingly to access a computer either without authorization or exceeding the authorization given and obtain information with the intent or reason to believe that the information will either injure the United States of American or give an advantage to a foreign nation. As seen by the placement of this section, it is clear that the Congress was particularity aware of the dangers that computer might have to the national security of the United States. This section parallels 18 U.S.C. 793, the federal espionage statute. 62. 1030(c)(1)(A). 63. 1030(c)(1)(B). 64. As defined by the Fair Credit Reporting Act, 15 U.S.C. 1681 et seq. 65. 1030(c)(2)(A). 66. 1030(c)(2)(B). The penalty is up to 10 years in prison. 67. 18 U.S.C. 1030(a)(2). 68. 18 U.S.C. 1030(c)(2)(B). 69. 18 U.S.C. 1030(c)(2)(B). 70. The punishments that may be handed out are up to 5 years for the first offense and 10 years for any subsequent offense. 71. 18 U.S.C. 1030(a)(5). 72. 18 U.S.C. 1030(c)(3)(A). 73. 18 U.S.C. 1030(c)(3)(B). 74. 18 U.S.C. 1030(a)(6). 75. As defined by 18 U.S.C. 1029. 76. 18 U.S.C. 1030(c)(2)(A). 77. 18 U.S.C. 1030(c)(2)(B). 78. 18 U.S.C. 1030(a)(6)(B). 79. 18 U.S.C. 1030(a)(6)(B). 80. These computers include computers used exclusively for the United States government or a financial institution or if not exclusively by the government one which the conduct of the computer affects the government's or the institution's operation, 18 U.S.C. 1030(e)(2)(A), the computer is one of two or more computers that commit the offense, 18 U.S.C. 1030(e)(2)(A). Financial institution is defined in 18 U.S.C. 1030(e)(4) and includes and institution whose deposits are insured by the Federal Deposit Insurance Corporation, 1030(e)(4)(A), the Federal Reserve or one of its members, 1030(e)(4)(B), a credit union insured by the National Credit Union Administration, 1030(e)(4)(C), a Federal home loan bank system member, 1030(e)(4)(D), institutions under the Farm Credit Act of 1971, 1030(e)(4)(F), a broker-dealer registered pursuant to 15 of the Securities Exchange Act of 1934, 1030(e)(4)(F), or a Securities Investor Protection Corporation, 1030(e)(4)(G). 81. S. Rep. No. 432, 99th Cong., 2d Sess. 4, reprinted in, 1986 reprinted in U.S. Code Cong. & Admin. News 2479, 2481. 82. Note, Computer Crime and The Computer Fraud and Abuse Act of 1986, X Computer/Law Journal 71, 79, (1990). 83. 18 U.S.C. 1030 (e)(2) states: As used in this section- (2) The term "Federal interest computer" means a computer- (A) exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects the use of the financial institution's operation or the Government's operation of such computer; or (B) which is one of two or more computer used in the committing the offense, not all of which are located in the same state. 84. "[T]here is not statute specifically addressing viruses." 135 Cong. Rec. E2124 (daily ed. June 14, 1989) (letter of Rep. Cong. Rec. E2124 Herger (quoting FBI Director William Sessions)). 85. H.R. 287 and H.R. 55. 86. "Existing criminal statues are not specific on the question of whether unauthorized access is a crime where no theft or damage occurs . . ." 135 Cong. Rec. E2124 (daily ed. June 14, Cong. Rec. 1989) (letter of Rep. Herger (quoting FBI Director William Sessions)). 87. Prosecution could occur under a trespass law. It may not be applicable, however, since trespass is a property based crime and courts have not recognized information in the same manner as real property. 88. Note, Computer Crime and The Computer Fraud and Abuse Act of 1986, X Computer/Law Journal 71, 80 (1990). 89. Id. Id. 90. Shalgi, Computer-ware: Protection and Evidence, An Israeli Computer-ware: Protection and Evidence, An Israeli Draft Bill, IX Computer/Law J. 299, 299 (1989) [hereinafter Draft Bill Computer/Law J. Shalgi]. This proposed bill has not progressed much since it was proposed and is at the stage prior to an official "bill". Letter from Barry Levenfeld to Brian J. Peretti (December 13, 1990) (concerning Israel's legislature progress on the comprehensive computer law). This paper will use the Shalgi English translation of the law. 91. Chapter 2 concerns Offenses and Accessing Computers, Chapter 3, Damages, Chapter 4, Rights of Software Creators and Chapter 5, Evidence. Levenfeld, Israel Considers Comprehensive Computer Law, Israel Considers Comprehensive Computer Law, Int'l Computer L Advisor 4 (March 1988). The topics covered in Int'l Computer L Advisor Chapters 2 through 5 are beyond the scope of this paper. 92. 93. Shagli, at 311. 94. Chapter 2, 2, Shagli at 311. 95. Chapter 2, 3(a), Shagli at 311. An employee is exempt if he commits this act when it was due to a strike concerning a labor dispute. Chapter 2, 3(b), Shagli at 311. 96. Chapter 2, 4(a). 97. Chapter 2, 4(b), Shagli at 311. 98. As defined by Chapter 1, 1. 99. Chapter 2, 5, Shagli at 311. 100. Chapter 2, 6, Shagli at 312. 101. Chapter 2, 7, Shagli at 312. 102. Chapter 2, 9, Shagli at 312. 103. Id. Id. 104. Chapter 2, 10, Shagli at 312. 105. By not stating that this also applies to individuals or others (non-corporations) who are attempting to supply services to the public, some important services that may be offered to the public may not be done. Levenfeld, 8, translates the word corporation as entities which may solve the problem. 106. Shalgi, 312. Levenfeld, 5, states that since this section is so broad the only possible areas that are not covered are personal and academic uses. 107. Chapter 2, 14, Shagli at 313. 108. Section 5. 109. Levenfeld, 4-5. Perhaps the only computers not covered would be those used for personal or academic uses exclusively. Id. at 5. Id. 110. Section 5. 111. Levenfeld, 4-5. Perhaps the only computers not covered would be those used for personal or academic uses exclusively. Id. at 5. Id. 112. Levenfeld at 4. 113. Shalgi, 305. 114. See, Computers at Risk, Safe Computing in the Information Age, 36 (1991) (discussing the need for a repository to gather computer crime information). 115. Chapter 2, 12, Shagli at 313. 116. New Hacker's Dictionary. 117. Chapter 2, 13, Shagli at 313. The law states that if the owner of the computer is not given in his presence, the order is only good for twenty-four hours. Id. Id. 118. Shagli, at 304. Under Israeli law, an object that may be proof of an offense may be seized without a court order. Id. The Id. law will bring the seizure of computers in accord with the United States Constitution's sixth Amendment. 119. Chapter 1, 1, Shagli at 310. 120. Alexander, Suspect Arrested in AIDS Disk Fraud Case, Suspect Arrested in AIDS Disk Fraud Case Computerworld, Feb. 5, 1990, 8. 121. Colvin, Lock up the Keyboard Criminal, Telecommunications PLC (England), June 1990. 122. Computer Misuse Act, 1990, ch. 18. 123. In the five years prior to the adoption of the Act, there were 270 cases of computer misuse in Britain of which only six were brought to court and only 3 resulting convictions. Fagan, Technology: EC urged to strengthen laws on computer crime, The Technology: EC urged to strengthen laws on computer crime Independent (London), February 13, 1990, p. 19. 124. Id. Id. 125. Davies, Cracking down on the computer hackers, Fin. Times Cracking down on the computer hackers (London), October 4, 1990. 126. Law Commission No. 186, Cm 819. 127. Computer Misuse Act, 1990, ch. 18, 1. 128. The penalty for this type of behavior is up to six months in prison, 2000 pounds or both. 129. Computer Misuse Act, 1990, ch. 18, 2(1)(a). 130. Computer Misuse Act, 1990, ch. 18, 2(1)(b). 131. Computer Misuse Act, 1990, ch. 18, 2(5)(a). 132. Computer Misuse Act, 1990, ch. 18, 2(5)(b). 133. Computer Misuse Act, 1990, ch. 18, 3(1). 134. Computer Misuse Act, 1990, ch. 18, 3(7). 135. Computer Misuse Act, 1990, ch. 18, 3(2). 136. Computer Misuse Act, 1990, ch. 18, 3(5). 137. Id. Colvin, Lock up the Keyboard Criminal , Id. Telecommunications PLC (England), June 1990. 138. Computer Misuse Act, 1990, ch. 18, 4. 139. Computer Misuse Act, 1990, ch. 18, 4(1). 140. 5(2) states that a significant link under 1 can be (a) the person was in Great Britain at the time in which he caused the computer to act in a certain way or (b) the computer he attempted to get access to was in Great Britain. 5(3) states that a significant link under 3 can be (a) that the person was Great Britain at the time when he did the act or (b) the modification took place in Great Britain. However, this may not an exhaustive list. 141. Davies, Cracking down on the computer hackers, Fin. Times Cracking down on the computer hackers (London), October 4, 1990. 142. Computer Misuse Act, 1990, ch. 18, 5. 143. Although proposed on February 14, 1989, the proposed bill has not yet become law. 144. Appendix A, 10. 145. Appendix A, 1. 146. Appendix A, 1, alternative. 147. Appendix A, 2. 148. Appendix A, 3. 149. Appendix A, 4. 150. Appendix A, 5. 151. Appendix A, 7. 152. The Ghana Law Reform Commission states that they created their proposed law from the Scottish Law Commission and the Law Reform Commission of Tasmania, Australia reports on computer crime. 153. Appendix A, 9(a). 154. Appendix A, 8(b). 155. See, infra, endnote __ and accompanying text. infra 156. Appendix A, 9(a). 157. Appendix A, 9(b). 158. Appendix A, 10. 159. Appendix A, 6. 160. Id. Id. 161. Appendix A, 7. 162. Appendix A, 1. 163. Appendix A, 10. 164. Id. Id. 165. Id. Id. 166. The first computer crime law in the United States was enacted in 1979. 167. S. Rep. No. 432, 99th Cong., 2d Sess. 3, reprinted in 1986 reprinted in U.S. Code Cong. & Admin. News 2479, 2481. 168. By increasing security, the ease with which one can enter the system will become more difficult. Some systems, believing that if such unauthorized access does occur that no sensitive information will be stolen, opt to have less security then other systems. In actuality, by one system not having enough security, the entire network can be put at danger when a mischievous user wishes to break into a users account which may be accessed by that system. See Stoll, 353-54 (stating an Australian hacker broke into Mr. Stoll's computer account because a connected computer's system manager did not wish to have a high level of security. 169. Stoll, 32. Many military computers and sensitive scientific computers operate in a secure environment. This is created by not allowing the computer system to have any telephone links to the outside world (i.e. outside of the building. 170. By having a secure system, information at the computer site can only be removed by a person walking into the computer center, copying the information and then walking out with it. This is both burdensome (it is much easier to access the computer from one's home or office) and cumbersome (since a person will have to walk around with reels of data that will later be put back into the system. 171. Computer Virus Legislation, Hearing on H.R. 55 and H.R. 287 before the Subcomm. on Criminal Justice of the House Comm. on the Judiciary, 100th Cong., 1st Sess. 44, n. 27 (1989) (statement of Marc Rotenberg, Director, Computer Professionals for Social Responsibility). 172. Colvin, Lock up the Keyboard Criminal, Telecommunications Lock up the Keyboard Criminal PLC (England), June 1990, p. 38. Michael Colvin, the author of Great Britain's Computer Misuse Act stated that the passage of the bill should not be looked at that the computer owner should not have security measures on their computers. Id. The bill, he Id. states, was made only to compliment, not substitute, the users security measures. Id. In West Germany, the severity of the Id. punishment for hacking depends on the effort that was required to commit the offense. Fagan, Technology: EC urged to Strengthen Technology: EC urged to Strengthen Laws on Computer Crime, The Independent, Feb. 13, 1990, 19. Laws on Computer Crime 173. McGourty, When a hacker cracks the code, The Daily When a hacker cracks the code Telegraph, October 22, 1990, p. 31. 174. A Password is a word that is either given to the user by the system or selected by the user to prevent others from accessing his computer or account within the computer. This words, groups of letters or symbols are supposed to be kept secret so as to not let other who are not authorized to access the system have access to it. 175. Donn Seeley, A Tour of the Worm, Department of Computer _____________________ Science, University of Utah, Nov. 1988, reprinted in General reprinted in Accounting Office, Computer Security: Virus Highlights Need for Improved Internet Management, 20 (1989). 176. Authers, Armed with a secret weapon, Financial (London) Times, Feb. 5, 1991, Section I, 16. 177. Id. 178. For a discussion of this virus, see, Branscomb, Rogue see Rogue Computer Programs and Computer Rogues: Tailoring the Punishment Computer Programs and Computer Rogues: Tailoring the Punishment to Fit the Crime, 16 Rutgers Computer & Tech. L.J. 1, 14-16 to Fit the Crime _______________________________ (1990) (discussing the applicability of state and federal law to computer viruses). 179. Jim Thomas, publisher of the Computer Underground digest argues that computer pirates actually buy more programs then the average computer program buyer. Letter from Jim Thomas to Brian J. Peretti ( (discussing computer pirating of software) 180. See, GNU Manifesto (available at American University Journal of International Law and Policy). See also, Stallman, GNU EMACS See also, General Public License, (Feb. 11, 1988) (available at American University Journal of International Law and Policy). 181. The GNU Manifesto (available at the American University Journal of International Law and Policy). 182. The author proposes that such copyright protection last for only two years. By granting the creator such protection for a short period of time, he will be able to recover the expenses that he put into the writing of the program. If this type of protection is granted, it should be understood that the creator of the program has a copyright to the sourcecode of the program for that period. If he updates the program after the two year period, the updated code will be protected, but the original code will not be granted the protection. In this manner, an author cannot attempt to give copyright protection to a program after the copyright has expired. 183. Electronic letter from Brian J. Peretti to Dorothy Denning (Nov. 13, 1990) (concerning computer crime). 184. This will be a semi-secure system. 185. The system, of course, will have a system manager who will create the accounts for the users. His account will be off limits to those who wish to use the system. At the same time, individuals will be encouraged to attempt to break into the manager's account and tell him how it was done in order to improve security for this and other systems. 186. The problem still exists that information learned through the use of this system may allow those who use the system to break into other computer systems. This problem can be corrected by having the system manager and the users communicate problems with the system so that they may be corrected on other systems. 187. United States v. United States Gypsum Co., 438 U.S. 422, 425 (1978). 188. S. Rep. No. 432, 99th Cong., 2d Sess. 6, reprinted in 1986 reprinted in U.S. Code Cong. & Admin. News 2479, 2484. 189. Stoll, The Cuckoo's Egg. 190. The countries which a person can go to could be any country in the world, except Albania, since they are the only country whose computers are not connected to outside computers. Stoll. 191. A school in Red Bank, New Jersey, has instituted a "computer responsibility training". Weintraub, Teaching Computer Ethics in Teaching Computer Ethics in the Schools, The School Administrator 8, 9 (apr. 1986). the Schools, ________________________ 192. S. Rep. No. 432, 99th Cong., 2d Sess. 3, reprinted in 1986 reprinted in U.S. Code Cong. & Admin. News 2479, 2481. 193. Electronic Mail Letter from Rop Gonggrijp to Brian J. Peretti (Jan. 25, 1991) (concerning computer viruses). "We have to watch that we keep telling people how virusses work, because that is the only solution to the problem: mystifying the whole thing ans just hunting down "computer terrorists" is useless and (as proven in the US and Germany) leads to a questionable style of government in the field of information technology..." Id. Id. 194. General Accounting Office, Computer Security: Virus Highlights Need for Improved Internet Management, 25 (1989).