Date: 22 Dec 92 15:31:52 EST
From: Ken Citarella <[email protected]>
Subject: 4--Balancing Computer Crime Statutes and Freedom

       An Illustration of How Computer Crime Statutes Try To
       Balance Competing Interests of Security and Freedom
             -- and Come Up With Interesting Answers

               copyright 1992, Kenneth C. Citarella
               (CompuServe; 70700,3504)

       Computers deserve protection.  If we did not all agree on that
state legislatures and the Congress would not have passed computer
crime statutes.  Exactly how much protection to afford them, however,
is the crux of the problem.  Sometimes resolving that gets confused
with a desire to avoid criminalizing inquisitive and youthful computer
intruders.

       The New York State computer crime statutes illustrate this
confusion.  The basic computer crime in New York is Unauthorized Use
of a Computer, a misdemeanor.  A person commits this crime when he
uses, or causes to be used, a computer without authorization, and the
computer is programmed to prevent unauthorized use.  Thus, the
unauthorized use of any computer in New York which does not have
user-id/password security or some equivalent is arguably lawful under
this statute.  Moreover, under the definition of "uses a computer
without authorization", the unauthorized user must be notified orally,
in writing, or by the computer itself that unauthorized users are not
welcome.

       There are, therefore, two threshold protections that a system
owner must install to have his computer come under the protection of
the New York unauthorized use statute.  First, there must be
protective programming; second, there must a warning to the
prospective intruder.  These obligations do not seem excessive
regarding misuse by an employee or other user with limited access to
the computer in question.  It is difficult to include with everyone's
employment materials a written warning regarding unauthorized use of
the computer, and it is certainly common enough to issue user-ids and
passwords.

       Consider, however, the remote unauthorized user.  If a
business has a computer with an unlisted modem number, has issued
user-ids and passwords to its authorized users, has dial back modems,
and has encrypted log-in procedures,  its computer may still not be
protected by the unauthorized use statute.  Should an intruder locate
the modem number by random demon dialling, guess at a password and
encryption code, and enter the system to install and operate a pirate
bulletin board, it may not be a criminal act.  As long as the intruder
does not access government records, medical records, or corporate
secrets, alter any file or program, or download anything from the
system, there may not be a crime.  As long as the system did not
display a warning that unauthorized users were not welcome, the crime
of unauthorized use cannot occur.  Thus, the legislature has elevated
the display of a few words almost certain to deter no one to far
greater legal importance than actual technical protective steps, all
in the name of not criminalizing our inquisitive youths.  Yet, if
technical security procedures cannot convince them not to intrude upon
a system, what importance can be attached to the displayed warning?
Aren't unlisted phones, passwords, and other standard security
procedures sufficient warning in and of themselves?  Or, is form
really more important than substance?

       It is curious to note that the legislature seized upon notice
as the prerequisite for computer crime law protection.  It is a crime
to enter and drive away with a car without permission, even if the car
door is open, the key in the ignition, and the engine running.  It is
a crime to enter a premises without permission, even if the door is
open, the lights on, and dinner on the table.  In either scenario,
notice is implicit in the intruder's knowledge that he does not belong
there.  The prosecutor must prove the absence of permission at trial,
just as he rightly should in a computer crime case.  But under current
legislation, egregious computer intrusions must go unprosecuted if,
despite extensive technical protection, three little words --
"Authorized Users Only" -- do not appear to warn an intruder not to
enter where he already knows he does not belong.

       If computers are ever to become as integrated into our lives
as cars and homes should they not be afforded the same protection
under the criminal law?

((The author is a Deputy Bureau Chief of the Frauds Bureau in the
District Attorney's Office, Westchester County, New York.  The
opinions expressed herein are purely personal and do not necessarily
reflect the opinions or policies of the District Attorney's Office.))

Downloaded From P-80 International Information Systems 304-744-2253