Date: July 28, 1991
From: "The Moderataors" <
[email protected]>
Subject: File 4-- "Computer Crime" paper by Brian Peretti available
Brian J. Peretti has finished the latest draft of his paper:
"Computer Crime: Current Practices, Problems and Proposed Solutions".
Here is a brief excerpt from the introduction. The complete paper is
available in the CuD ftp sites.
++++++++++++++++++
Within recent years, computer crime has become a
preoccupation with law enforcement officials. In California, a
group of West German hackers using phone lines and satellite
hookups, gained unauthorized access into civilian and military
computers and stole sensitive documents that were sold to the
Soviet Union. A young New York programmer broke into a
Washington computer to run a program that he could not run from his
personal computer. After Southeastern Bell Stated that a document
published in an electronic publication was valued at more than
$75,000 the publisher was arrested and brought to trial before the
discovery that the document could be publicly bought from the
company for $12.6 The Chaos Computer Club, a Hamburg, Germany,
club, went into government computers and access information
and gave it to reporters. In May, 1988, the United States government
launched Operation Sun Devil, which lead to the seizure of 23,000
computer disks and 40 computers. In addition, poor police
performance has also been blamed on computers.
Since its creation, the computer has become increasing important
in society. The law, as in the past, has not been able to evolve
as quickly as the rapidly expanding technology. This lack
of movement on the part of governments shows a lack of understanding
with the area. The need to create a comprehensive regulation or
code of ethics has become increasing necessary.
Due to the nature of computer systems and their
transnational connections through telephone lines, an
individual state's action will only stop the problems associated with
computer crime if many states join together. The patchwork of
legislation that exists covers only a small part of the problem.
To adequately address computer crime, greater efforts must be
made within the computer community to discourage unauthorized
computer access, countries must strengthen and
co-ordinated their computer related laws, as well as proper
enforcement mechanism created, computer program copyright laws be
enhanced and computer systems should be created to allow those who
wish to explore computer systems which will not disrupt the users of
computer systems.
This paper will first set out a definition of computer crime and why
laws or regulation by the computer community must be created.
Section II will then discuss the United States law concerning
computer crime and why it needs to be strengthened. Section III
will discuss the proposed Israeli computer crime bill, Britain's
Computer Misuse Act and Ghana's proposed law. Section IV will
discuss what can be done by both the government and computer owners
and users to make computer crime less possible.
<The rest is available from the CuD ftp archives>
------------------------------