Computer Crime:

                 Current Practices, Problems and Proposed Solutions

         Second Draft
         Brian J. Peretti


              It would have been surprising if there had been satisfactory
         road traffic legislation before  the invention of the  wheel, but
         it would also have been surprising  if the law on the passage  of
         laden  donkeys  proved  entirely  satisfactory  when  applied  to
         vehicles.1

         I.  Introduction
              Within   recent   years,   computer  crime   has   become  a
         preoccupation with law  enforcement officials.  In  California, a
         group of  West German  hackers2 using  phone lines  and satellite
         hookups, gained  unauthorized access into  civilian and  military
         computers and  stole sensitive documents  that were  sold to  the
         Soviet  Union.3    A  young  New York  programmer  broke  into  a
         Washington computer to  run a program that he could  not run from
         his personal  computer.4  After  Southeastern Bell Stated  that a
         document  published in an  electronic publication5 was  valued at
         more than $75,000 the publisher was arrested and brought to trial
         before the discovery that  the document could be publicly  bought
         from the company  for $12.6  The Chaos Computer  Club, a Hamburg,
         Germany,  club,  went   into  government  computers   and  access
         information and gave it to reporters.7  In May,  1988, the United
         States government launched Operation Sun Devil, which lead to the
         seizure  of  23,000   computer  disks  and  40  computers.8    In
         addition,  poor police  performance9  has  also  been  blamed  on
         computers.
              Since  its  creation,  the computer  has  become  increasing
         important in society.10   The law, as  in the past, has  not been
         able   to  evolve   as   quickly   as   the   rapidly   expanding
         technology.11  This  lack of movement on the  part of governments
         shows a lack  of understanding with the area.  The need to create
         a  comprehensive  regulation   or  code  of  ethics   has  become
         increasing necessary.
              Due   to  the   nature  of   computer   systems  and   their
         transnational   connections   through   telephone   lines12,   an
         individual  state's action will only stop the problems associated
         with computer crime if many  states join together.  The patchwork
         of  legislation that  exists  covers  only a  small  part of  the
         problem.  To  adequately address computer crime,  greater efforts
         must   be  made  within  the  computer  community  to  discourage
         unauthorized computer access, countries must strengthen and
            co-ordinated  their computer related  laws, as well  as proper
         enforcement mechanism created, computer program copyright laws be
         enhanced  and computer systems  should be created  to allow those
         who wish to  explore computer systems which will  not disrupt the
         users of computer systems.
              This paper will first set out a definition of computer crime
         and  why laws  or regulation  by the  computer community  must be
         created.   Section  II will  then discuss  the United  States law
         concerning  computer crime and  why it needs  to be strengthened.
         Section  III will  discuss the  proposed  Israeli computer  crime
         bill, Britain's  Computer Misuse  Act and  Ghana's proposed  law.
         Section IV will  discuss what can be done by  both the government
         and  computer  owners  and  users  to  make  computer  crime less
         possible.














         II.  Computer crime
              The definition of what constitutes a computer crime has been
         the  subject of  much controversy.    A computer  crime has  been
         defined as  "any  illegal act  for  which knowledge  of  computer
         technology  is  used  to  commit  an  offense."13    The  typical
         computer criminal has  been described as between 15  and 45 years
         old, usually male, no previous contact with law enforcement, goes
         after both government and business, bright, motivated, fears loss
         of status  in computer community  and views his acts  as games.14
         For the  purposes of  this article, this  will be  the definition
         used because of its broad reach.
              Estimates regarding how much is lost to computer  crime very
         widely15.   In  the only  authoritative  study, the  loss due  to
         computer crime  was given  at $555,000,000,  930 personnel  years
         lost  and 153 computer  time years lost.16   The  amount of total
         incidents for  1988 was 485  resulting in 31 prosecutions17.   In
         1987,  there were 335  incidents with 8  prosecutions.18 Security
         spent   on  prevention  of   computer  crime  is   becoming  more
         commonplace19.
              The   most  publicized   danger  to  computer   systems  are
         viruses20  and worms.    A virus  is a  code segment  which, when
         executed,  replicates  itself   and  infects  another  program.21
         These  viruses may  be created  anywhere in  the world22  and may
         attack anything.23   A virus may be transmitted  through a trojan
         horse24  program.  A  worm exists as  a program in  its own right
         and  may spread over  a network via  electronic mail25.   A virus
         attacks a program while  a worm attacks the computer's  operating
         system.26      The  most  notorious  computer  worm  brought  the
         Internet computer network to a halt.27
              Computer  virus attacks  may  be overrated.28    It is  said
         that the  biggest threat  to computing includes  "not backing  up
         your  data, not  learning the  ins and  outs of  your application
         programs,  not  putting  enough  memory  in  your  computer,  not
         organizing your  hard  disk, [and]  not upgrading  to the  latest
         version of  your applications.29   These  computer programs  have
         been compared  to the AIDS virus.30   One author has  stated that
         the  viruses are used  to both increase the  amount of profits of
         computer program producers and anti-virus computer programs.31
              Computer  viruses may  also  be  used  to  benefit  computer
         systems,  by either  detecting  flaws  in  security  measures  or
         detecting other  viruses.32   Virus are  very dangerous,  though.
         The effects of a virus called Datacrime, activated on October 13,
         1989, brought  down 35,000  personal computers  within the  Swiss
         government and several companies in Holland.33
              With the opening up of  Eastern Europe, the virus problem is
         expected to  increase.34  In  Bulgaria, a country which  does not
         have any laws  against computer  viruses, one  new virus  appears
         week.35   Computer  viruses  are created  in  countries like  the
         Soviet Union  as a way to punish  computer pirates because of the
         lack of copyright laws.36
              Perhaps  the most dangerous  threat to information contained
         in a  computer is  the "leakage" of  radiation from  the computer
         monitors.37   With inexpensive  equipment38 a  person can  "read"
         the information  off the computer  screen and then  replicate the














         information  from the screen in a readable manner.39
              The threat of attack on a computer system can also come from
         a  hacker.   A  hacker  is  a  person  who breaks  into,  whether
         maliciously  or not, computers  or computer systems.40   A hacker
         can, if the system is not adequately secured, cause havoc  in the
         computer  by either  deleting  or altering  programs  or data  or
         planting  logic  bombs  or  viruses  in  the  computer  system.41
         Threats  from hackers  to plant  viruses  have been  made in  the
         past.42  The  threat from computer hackers, as  with viruses, has
         been said to be overrated.43
              The issues surrounding computers still have not been decided
         by those within  the computer community.  Whether  or not persons
         should  be   allowed   to   access   computer   systems   without
         authorization  is still a subject  of debate within the computing
         community.    A West  German  Computing  Club, called  The  Chaos
         Computing Club, holds the belief that it is not improper to enter
         any system  which they can  gain access to  and to "look"  around
         inside of  the  system as  much as  they wish.44    They do  not,
         however,  condone destroying or  altering any of  the information
         within  the  system.45      On the  other  side,  represented  by
         Clifford Stoll, when individuals break into computer systems they
         disrupt the trust  that the computer system is  based on.46  This
         breach of trust  not only makes operating the  system tougher for
         the manager in control  of the system, but also will decrease the
         amount  of  use  of  the  system  so  less  information  will  be
         transferred within the system.47
              There is also conflicting views as to whether the authors of
         computer  viruses should  be punished.    Marc Rotenberg48  holds
         the  belief  that  a  virus  should be  granted  first  amendment
         protection  in some  instances.49   In  response to  the Internet
         worm, there were 21 editorials that stated that the attack showed
         the  need for  more security  in  computers while  there were  10
         letters  to  editors  that  stated that  the  creator  should  be
         applauded rather  then punished.50   They argue  that this  was a
         good way to  raise consciousness concerning computer  security.51
         Alan Solomon, a consultant who specializes in virus detection and
         eradication,   believes   that   viruses   are,   at   most,   an
         inconvenience.52

         III.United States Computer Legislation
              The  United  States  government53  and  most  states54  have
         computer crime laws.   In 1979, only six states had  such laws.55
         Almost every  computer  crime will,  in addition  to violating  a
         state and/or  federal law,  can  also be  prosecuted under  other
         laws.56
              A.   Computer Fraud and Abuse Act.
              Congress originally  enacted the  Counterfeit Access  Device
         and  Computer Fraud and  Abuse Act57   to address  the problem of
         computer crime.  Understanding that the scope of the original law
         was  too narrow,58  in 1986  Congress enacted  amendments  to the
         Computer Fraud  and Misuse  Act of 1984.59   The  Act essentially
         lists  acts that if  done with a  computer are illegal.   The Act
         also  makes individuals  culpable  for  attempting  to  commit  a
         computer crime.60














              In order to commit any  of the crimes mentioned in  the act,
         the actor must  have acted either "intentionally"  or "knowingly"
         when committing  the act.   The law  addresses national  security
         issues  by making a  crime of anyone  using a  computer to obtain
         information and  giving the  information to  foreign countries.61
         The penalty  for this crime  or its attempt  is 10 years  for the
         first offense62  and 20  years for subsequent  offenses63.   If a
         person   intentionally   accesses  a   computer   either  without
         authorization or in excess  of his authorization and obtains  and
         acquires information in  a financial record of  an institution or
         information contained in  a financial record of  an individual64,
         the person  will  have  committed  a misdemeanor  for  the  first
         offense65 and  a  felony for  subsequent  offenses66.   A  person
         intentionally   accessing    a   government    computer   without
         authorization  which  affects  the   government's  use  of   that
         computer67  will have  committed  a  misdemeanor  for  the  first
         offense68 and  a felony  for the second  offense.69   Accessing a
         computer with  knowledge and  intent to  defraud  and without  or
         exceeding authority is a crime  if the person obtains anything of
         value  other  than  use  is  a felony70.    Accessing  a  federal
         interest computer  without  authorization  and  either  modifying
         medical records or causing $1,000  or more worth of damage within
         a one year  period71 is  punishable with  up to 5  years for  the
         first offense72 and 10 years for any subsequent offense.73
              The Act  also criminalizes  trafficking in  passwords.74   A
         person  who knowingly  and with intent  to defraud  traffics75 in
         passwords or similar  information may be sentenced for  up to one
         year  for the first offense76  and up to  10 years for subsequent
         offenses77 if the  computer is used by  or for the  Government of
         the   United   States78   or   affects   interstate  or   foreign
         commerce.79

              B.   Criticisms
              It is  important to note  that this statute only  applies to
         "Federal interest computers"  as defined by  this section.80   If
         a computer is  not this type of  computer, then any of  the above
         mentioned crimes  will not  be prosecutable  under this  section.
         Congress  intentionally  made the  scope  of the  law  narrow.81
         This  section  has  been criticized  as  not  inclusive enough.82
         Individual and  corporate computers  which do not  fall into  the
         restrictive  definition83 may not  receive the protection  of the
         statute.
              The  problem  of  computer  viruses  are  not  addressed  by
         Act.84  The act  does not punish  those who add information  into
         a computer, even though this may do more harm then just accessing
         information.   The Congress has  attempted to address  this issue
         under two bills85, but neither one has been enacted.
              Unauthorized access where there is no theft or damage to the
         system  is  not  covered.86    For example,  a  person  access  a
         computer  system and looks  at information contained  therein, he
         has not committed a punishable crime under the Act.87
              Questions have also been brought  up concerning many of  the
         undefined terms  within the Act.88  Terms  such as "intentionally
         access" and "affects interstate commerce" are among the terms not














         defined.89   The  need to  clarify  these terms  is important  so
         that an individual will know what action will constitute a crime.


         IV.  Legislation From Around The World
              A.   Israel Proposed Computer Law
              In March 1987, the Israeli Ministry of Justice distributed a
         draft of  a comprehensive  computer bill.90   This bill  covers a
         wide range of  areas concerning computers91.  The  Act first sets
         out  a  list  of  proposed  definitions  for  computer,  program,
         software,  information,  thing and  act.   Each  of  these, while
         short, are concise and attempt  to give a brief but comprehensive
         definition.92
              Chapter 2 sets  out a list of offenses  which, if committed,
         are punishable.93   A authorized  person commits an act  upon any
         computer and knows that the  act will prevent or cause disruption
         of   the   proper   operation   is   subject   to   seven   years
         imprisonment.94   A  person who,  without  authority, commits  an
         act  which precludes  a person  from using  a computer  system or
         deprives a person  of using that  system is  punishable by up  to
         seven years  imprisonment.95  If  a person  prepares or  delivers
         or  operates  software  knowing that  the  software  will produce
         faulty results  and "having  reasonable grounds  to assume",  the
         person  is punishable  for up  to seven  years.96   The  Act also
         addresses those who supply, deliver  or  operates a computer with
         faulty data.97
              Section 5 applies to those who use a computer to  attempt to
         obtain  some "thing"98  or  with  intent  prevents  another  from
         obtaining some "thing".99   A  person who  prevents another  from
         obtaining  a  "thing"  by  the   use  of  software  may  also  be
         punished.100  A  person who deprives a  person of an object  that
         contains  software, data or  information and obtaining  a benefit
         for himself.101   All of  these crimes contain a  prison sentence
         of five years.
              A professional who relies on computer outputs that they know
         which  are false  is also  subject to  punishment.102   The crime
         carries a sentence of five years.103
              This chapter does not apply to  all computers, software data
         or  information.104   It  only applies  to those  computers, data
         or information which  are used, designated to  be used by  or for
         (1) the state  or a corporation that is supplying  service to the
         public105  or   (2)  "business,  industry,   agriculture,  health
         services, or for scientific purposes."106
              Perhaps the most novel provision of this proposed law is the
         section governing the reporting of  the offenses.  Any person who
         is  in  charge  of another  and  has  reason to  believe  that an
         individual has committed an offense under the Act, he must report
         this to police  as soon as possible.107   If the person  does not
         do so, he may be imprisoned for up to one year.
              B.   Analysis
              The Israeli computer  crime bill is more  comprehensive then
         the America bill.  By creating a law which will apply not only to
         government computers, but  also to those of  "business, industry,
         agriculture, health  services  or  for  scientific  purposes,"108














         the  law  essentially  covers all  computers  in  the country.109
         By creating such broad coverage, the law will be able to make the
         users of computers in Israel  more secure in their knowledge that
         their systems are safe.                 B.   Analysis
              The Israeli computer  crime bill is more  comprehensive then
         the America bill.  By creating a law which will apply not only to
         government computers, but  also to those of  "business, industry,
         agriculture,  health  services  or  for scientific  purposes,"110
         the  law  essentially  covers all  computers  in  the country.111
         By creating such broad coverage, the law will be able to make the
         users of computers in Israel  more secure in their knowledge that
         their systems are safe.
              The  most controversial provision in the act is the proposal
         requiring  that individuals that may  know of computer crime must
         report the  crime or  face fines themself.   As  Levenfeld points
         out112,  this  will  mean  that  employers  will have  to  impose
         internal  spy rings  to be  able  to tract  down the  "reasonable
         suspicions" that  individuals have  concerning illegal  activity.
         Shalgi, however, believes  that this is a good  provision in that
         it will allow  computer crime to  come more  to the forefront  so
         that the crime can be more easily combatted.113
              This provision is necessary for the government to understand
         exactly how  large of a problem  computer crime is.   At present,
         statistics on computer  crime are difficult to  determine because
         of the  lack of reporting.114   By  making all persons  who would
         be responsible for  computer security, i.e.  all persons who  use
         computer systems, the  problem will be brought into  the open and
         can be addressed.
              The  proposed law  also sets  out  a defense  for those  who
         violate the  law.  Under   11, if a  person who violates  the law
         makes another know that he did disrupt or alter the data, he will
         not be convicted of the crime. This will allow  those who perform
         such acts to avoid  the punishment of  the law.  Individuals  who
         wish to destroy or alter  such information will have an incentive
         to bring forth their mischievous acts so that when brought before
         the  court they  could say  that  they took  precautions so  that
         individuals would  not rely on  the information.   This provision
         will encourage those who do  such activity to come  forth without
         fear of conviction.
              The ability  of a  court to  not impose  a  punishment on  a
         person  is contained  in section  12.115   This allows  the court
         to abstain from  punishment if the offense  is not grave and  was
         not committed with  malice.  This section, in  effect, will allow
         those who commit computer crime to be able to forgo punishment if
         their acts  were not serious.   This will be  beneficial to those
         who  are  hackers in  the  original  sense  of the  word,116  yet
         still allow for punishment of those individuals who enter systems
         to do harm to it.
              The law  also creates  standards for how  a computer  may be
         seized.  Neither  a computer, nor any  part of it, may  be seized
         without a  court order.117   Although  this seems  to  be a  good
         provision in  its effects  on individual  rights118, the  section
         is not focused  enough.  The  law does not  address the issue  of
         whether  a floppy,  as  opposed to  a  hard disk,  is  part of  a














         computer.  The hard disk  is located inside of a  computer, while
         floppy  disks may be removed from the  computer.  This law should
         address this issue by stating that the floppy disk is also a part
         of a computer in its definitions.119
              This section also does not address what standard may be used
         for the  court order.   Must the officer  only have a  reasonable
         suspicion or  probable cause to  seize the computer?   By stating
         explicitly  in the  statute that the  officer must  have probable
         cause to seize the  computer, an overzealous police officer  will
         not be able to as easily seize the computer.
              C.   The Great Britain Computer Misuse Act
              In response  to computer  program concerning  AIDS that  was
         distributed to doctors in Great Britain and Europe that contained
         a  virus,120  Michael   Colvin,  a  British  MP   introduced  the
         Computer  Misuse  Bill.121   On  August  29, 1990,  the  Computer
         Misuse  Act122  came  into  effect.123    It was  estimated  that
         the losses to  British industry and  government were one  billion
         pounds.124     This  Act   is  designed  to   not  to   create  a
         confidential information  right, but  to rather  protect computer
         system integrity125.
              Prior to enactment,  the English Law Commission  studied the
         problem and laws  regarding computer crime. It stated  that there
         should be three new offenses  to deal with computer misuse:   (1)
         Unauthorized access  to a  computer, (2)  Hacking with  intent to
         commit  a serious crime,  and (3)  Intentional destruction  of or
         alteration  to  computer  programs  or  data.126    The  Computer
         Misuse Act states that  unauthorized access occurs if the  person
         is unauthorized to access the computer, he causes the computer to
         perform any function with intent to  gain access to a program  or
         data  in the  computer and  he knows  that this  is the  case.127
         He does not have to be directed to any particular program or data
         in the computer  he attempted to get on or the data or program he
         wishes to  access.128   If a  person commits  unauthorized access
         with   the  intent  to  commit129  or  help  another  offense,130
         the  person can  be sentenced  on summary  conviction, up  to six
         months  in  prison  and  a   fine,131    or  if  convicted  after
         indictment,  to imprisonment  of  up  to five  years,  a fine  or
         both.132
              If a  person modifies  computer material,133  the person  is
         subject  to  a  fine of  up  to  5 years,  an  unlimited  fine or
         both.134   The  person must  knowingly modify  a  program without
         authorization and must have done so with the intent to impair the
         operation of the computer, to prevent or hinder access, or impair
         the  operation  of  the  program  or  resulting  data.135     The
         modification does  not have to  be permanent.136   A modification
         may be done by  either altering, erasing or adding onto a program
         or data.   By stating  modification broadly, the act  attempts to
         combat  the  placing  of  viruses,   worms  and  logic  bombs  on
         computers.137
              The Act  also  extends  the scope  of  jurisdiction.138    A
         person does  not have  to actually  be in  Great  Britain at  the
         commission  of  the crime.    The  crime  itself must  have  some
         relation   to   Great    Britain.139      The   link    must   be
         "significant".140














              D.   Analysis
              As opposed to  the other statutes,  the Computer Misuse  Act
         does not  attempt to define computer.   This was done  because of
         the fear that any definition given for a  computer may become out
         of date  in a  short period  of time.141   Program  and data  are
         also not defined within the Act.
              Great  Britain's courts are granted large jurisdiction.  The
         act allows for anyone who attempt to commit a crime under the act
         to be punished in  Great Britain.  The act, although  setting out
         that  the  link  must  be significant,142  does  not  attempt  to
         define this word.   By this omission, the  Great Britain's courts
         can expand this  to any act that occurs in a foreign country that
         uses  a British computer  for even a  short period of  time.  The
         defining of the word would  clear up some misconceptions that may
         result from the act.
              Of interest  to note, the Act would  not punish a person who
         distributes disks  tat contain  viruses  on them.   Although  the
         drafter of the  bill said that this was his goal, the law ignores
         this possibility.  An amendment should  be added to the law which
         will punish those who damage data even  if they do not access the
         system.
              E.   Ghana
              In response to the belief  that their existing laws were not
         adequate,  a draft  law  was  proposed by  the  Ghana Law  Reform
         Commission.143   The  bill is  rather  simple as  opposed to  the
         other laws.   It has definitions  for access, computer,  computer
         network,  computer program  and  data.144    To  commit  computer
         related  fraud, the  person must  have an  intent to  defraud and
         either alters, damages destroys data or program stored in or used
         by the computer or obtains information to his own advantage or to
         the  disadvantage  of another  or  uses  a  computer commits  and
         offense.145    The  Act  Also  sets  out  alternatives  for  some
         sections that  may be adopted.   The alternative states  that any
         person  who obtains  access to  a  computer program  or data  and
         attempts to erase  or alter  the program or  data with intent  to
         help his  own interests or damage other person's interest commits
         a crime.146
              Damaging computer data occurs  if any person, by  any means,
         without  authority, willfully  does  damage  to  data  commits  a
         crime.147    The crime  of  unauthorized  use  of a  computer  is
         simply  defined as anyone who knowingly without authority commits
         an  offence.148   Similarly, unauthorized  access  is anyone  who
         knowingly gains access  to a computer, network or  any part there
         of, without authority to  do so.149   The Ghana law also  creates
         a crime for the  knowingly and dishonestly introduction of  false
         data  and the  omission to  introduce, record  or store  data.150
         An  authorized  person  who  willfully  or  intentionally  allows
         information to get  into the hands of an  unauthorized person and
         that person uses the information  to his advantage also commits a
         crime.151
              The penalties  for the  crimes are similar  to those  of the
         Great Britain  law.152  On  summary convictions, a jail  term may
         be given of  up to  two years  or the statutory  maximum fine  or
         both.153   On  conviction  on  indictment, a  prison  term of  no














         more  then  ten  years  or an  unlimited  fine,  or  both may  be
         given.154
              The  jurisdiction that the Ghana courts  have in accord with
         this  jurisdiction is as  large as their  British counterpart.155
         The courts can hear  any case if the accused person  was in Ghana
         at the time  of the act.156   Also,  if the program  or data  was
         stored in or  used with a computer  or computer network  in Ghana
         the person may be tried under the law.157
              F.   Analysis
              The Ghana proposed Computer Crime  Law is in accord with the
         United States, Great  Britain and the proposed Israeli  laws.  By
         setting  out  definitions  for  the  various  terms  used in  the
         law158,  the law  clearly defines  which acts  may be  subject to
         prosecution  under the  law.   Although  simple, the  definitions
         attempt to capture  within the law's grasp  the various different
         acts which could be done with a computer that should be outlawed.
              The most  original section  of  the act  concerns the  newly
         created  crime  of   omission  to  introduce,  record   or  store
         data.159   This  section, however,  will end  up punishing  those
         who work in corporations that are at the lowest level skill-wise.
         The government should, if the  law is enacted, force companies to
         give each employee a sufficient  amount of training on a computer
         so that the  person will be  able to act  in accordance with  the
         law.   The act does provide a safeguard by making the mens rea of
         the crime "negligently or dishonestly"160
              The act also sets out  a crime for an individual who  allows
         information  to get  into the  hands of  another.161   As opposed
         to the other laws, this  section specifically address the problem
         of  where  an  authorized  individual  gives  information  to  an
         outsider.  By  specifically regulating this behavior,  anyone who
         wishes to act according will know that the act is illegal.
              The   crime   of    computer-related   fraud   is    defined
         broadly.162    This  law  effectively makes  any  type  of  fraud
         committed either with a computer or information within a computer
         a crime.   The law  adequately addresses the problems  that might
         occur with a computer in fraud.  A broad definition, however, may
         still let some act seem as though they are not covered  since the
         act is not specific in the area of what constitutes a crime.
              Most significantly,  the act does  not state which  types of
         computers are covered  by the act.163   By not giving a  limit on
         which computers are  covered, the act extends its jurisdiction to
         all  "computer"164  and  "computer  network"165 in  the  country.
         If the  definition of  computer changes, due  in part  to advance
         technology, the law may have to change this section.
         V.   Proposed Solutions
              Computer Crime laws  have come a long way  in addressing the
         problem  of  computer  crime.166   The  ability  to regulate  the
         activity will  decrease the amount  of crime  that is  committed.
         Those who use the computers of the world, however, must  not rely
         totally   on  there   respective  governments   to   combat  this
         problem.167
              The best way to combat computer crime is to not let it occur
         at  all.   Many  computer  systems  have  not been  given  enough
         security by  their system  managers.168  It  is possible  to have














         a totally  secure computer system169,  but it is  impractical and
         slows the  free flow  of information.170   By creating  laws that
         will  protect  the  integrity  of  computer  systems  while  also
         allowing for the ability of our best and brightest to develop and
         learn about computer systems will the nation be able to  keep our
         technological lead in the world.
              In order to combat the problem of unauthorized access, users
         of computer systems must be taught to respect each others privacy
         within the various  systems.  Creating an standard  of ethics for
         those who are  users of computers will  be the best way  since it
         will hold the users to standards that must be met.  Although some
         organizations have attempted to promogate standards regarding the
         ethical   use  of  computer   systems171  no  one   standard  has
         emerged.   Proposed rules  of ethics should  balance the  need of
         individuals to  be able to  learn and discover about  the various
         types of  computer systems, while  at the same time  allowing for
         those  who use those systems  to be secure  in the knowledge that
         the information stored  on the computer will not be read by those
         other then person who should have access to it.
              If  computer crime  laws are  enacted,  industries that  use
         computers should not use the new laws as a  replacement for using
         adequate  security  measures.172    Individuals  or  corporations
         that use computer  have several ways  to protect themselves  from
         unauthorized access.  If the computer can be accessed by a modem,
         the computer  can have a  dial back  feature placed on  the phone
         line so that one a  computer is accessed, the computer will  then
         call back to make sure that the call  is coming from a line which
         is  supposed  to access  the  computer.173    The proper  use  of
         passwords174 are also  an effective  way to  address the  problem
         of unauthorized access. A recent study  has shown that out of 100
         passwords  files, approximately 30 percent were guessed by either
         using the  account name  or a  variation of  it.175    A  program
         has recently been developed that will not allow a user to  select
         an  obvious password.176   Encryption  programs,  similar to  the
         program used on Unix operating system, can scramble a password in
         a non reversible  manner so that if the  encrypted password falls
         into the hands of an individual who is not supposed to access the
         system, the  person will  not  be able  to get  into the  system.
         These systems can also be used so that if a hacker does  get into
         a   computer  system  and   attempts  to  get   information,  the
         information will not be readable.177
              A    problem  that must  be  address  is  the  lack of  laws
         concerning copyright protection of  computer programs in  foreign
         countries.    The  Pakistan Brain178  was  written  to discourage
         copying of a program without authorization.  By creating pirating
         penalties a reason  for the creation of computer  viruses will be
         removed and less viruses will be created.179
              Many in the field argue that computer programs should not be
         copyrighted.180    Copyright protection  should  not  be afforded
         to   computer   programs   since  they   are   only  mathematical
         equations.181   Copyright  protection  should  be  given  to  the
         maker  of  a computer  programmer  only  for  a short  period  of
         time.182
              A novel concept which will both satisfy the computer hackers














         quest  for  knowledge  through  examining  computer  systems  and
         protect the integrity of computer systems is to create a computer
         systems for  the use  of hackers alone.183   This  computer would
         not be connected  to other computer systems, but  can be accessed
         through  a modem.184   If  created,  accounts would  be given  to
         all  interested computer  enthusiasts.  Those  participating will
         not  be  prosecuted  for  exploring  unauthorized  areas  of  the
         system.185     Since   other  computer   systems   will  not   be
         accessible through  this system, any activity on this system will
         not endanger  the information on  other systems.186   By allowing
         this to be done, a major problem will be solved, the inability to
         afford to  buy a mainframe system,  while a person  will still be
         able to learn about different types of systems.
              If any  laws are to  be made, they should  make "knowing"187
         or  "intentionally"188   unauthorized access  into  a computer  a
         crime.   By making  the intent of  the crime be  knowing, it will
         allow those who accidently connect to a computer system that they
         think is theirs but is not to be excused from punishment.
              The law must also be done in a way that will allow it to  be
         enforced  across  national  boundaries.   A  computer  hacker can
         access  computers from across the world  without ever leaving his
         home  country.189   If these  laws  can only  be enforced  within
         the home country, then a person can, in theory, go into a country
         of whose computers that  he would never want to access and access
         into other computers without fear of punishment.190
              An international  convention should  be convened  to address
         this problem.  Since the  problem is of international concern and
         the crimes do occur across  the boarders of countries, by setting
         standards by the international  community concerning the  conduct
         of computer users, the hodgepodge  of computer crime laws will be
         eradicated in favor  of a common international standard.   As the
         boundaries in Western  Europe disappear in anticipation  of 1992,
         international access is sure to accelerate.
              Colleges,  Universities  and  high  schools  must  institute
         programs  designed to address  proper computer use.191   Although
         not all  computer users are  not trained in school,  teaching the
         ethical use of computers will  allow users to understand the need
         for security  on systems.   These programs  will also  show users
         that  computer  crime  is  dangerous  to  society.192    Problems
         concerning computer  crime  should be  publicized  so as  not  to
         mystify the crime.193
              The  United  States  and other  countries  must  create more
         Computer  Emergency Response Teams  (CERT).   These teams  are to
         coordinate   community   responses   to   emergency   situations,
         coordinate responsibility for fixing hole in computer systems and
         serve  as a  focal  point  for  discussions  concerning  computer
         systems.194    These  groups regularly  post  notices  concerning
         computer  viruses or  other  dangers  in  the  Internet  computer
         system.  The scope of these groups should be expanded so they may
         be  a  focal point  of the  needs  and desires  of those  who use
         computers.  If  they are used to gather information as a clearing
         house  type  operation,  the  spread  of  information  concerning
         computer  systems  and problems  with  the systems  will  be more
         adequately addressed.














         IV.  Conclusion
              Computer crime is a growing problem.  With the advent of the
         computer and a more computer literate public, crimes committed by
         computers will  increase.   To effectively  address the  problem,
         laws  must be  created to  outlaw activity  which is  designed to
         further illegitimate  ends.  These  laws have moved in  the right
         direction concerning what should be  outlaws so as to balance the
         needs of computer users against those of the computer owners.  To
         enforce these  laws, governments must realize that the problem of
         computer crime is not only of local concern.
              Educational programs and standards of ethics must be created
         from within the computer users community.  Corporations which use
         computers  must educate their  employees to reduce  the fear that
         one  might  have  when  addressing  a  computer  security  issue.
         Copyright laws must  be strengthened in countries  that either do
         not have  or have weak copyright laws so  that the need to create
         viruses to protect an individual's or corporation's work will  no
         longer be necessary.
              To  satisfy users  curiosity  with  computers, a  non-secure
         computer system should be created.   This system will allow those
         who wish  to explore a  system in order to  understand the system
         may.    Those   individuals  can  do  so  without   the  fear  of
         prosecution.
              Only by directly addressing the causes of computer crime and
         drafting standards and  laws to address the unique  area will the
         problem of computer crime be adequately addressed.  Light must be
         shined on  the area so individuals will  realize that fear of the
         machines  is not justified.   Only by  doing so may  we enter the
         21st century realizing the full potential of computers.







































                                     Appendix A
         Ghana Computer Crime Law (Proposed)
         Computer Crime Law
         Computer Crime Law
         In  pursuance   of  the  Provisional   National  Defense  Council
         (Establishment) Proclamation 1981, this Law is hereby made:
         1.   Any person who, with intent to defraud,
              (a)  alters, damages, destroys or otherwise manipulates data
         or program stored in or used in connection with a computer, or
              (b)  obtains  by any means, information stored in a computer
         and uses it to his advantage or to another  person's advantage to
         the disadvantage of any other person, or
              (c)  uses a computer
         commits an offense.
         Charge:   Computer-related fraud.
         ALTERNATIVE:
              (1)  A  person commits  an offense  if  that person  obtains
                   access to a computer program or data, whether stored in
                   or used in connection with a  computer or to a part  of
                   such program  or data to  erase or otherwise  alter the
                   program or data with the intention-
                   1.   (a)  of procuring  an  advantage  for  himself  or
                        another person: or
                        (b)  of damaging another person's interests.

         2.   Any  person who, by  any means, without  authority, wilfully
              destroys, damages,  injures, alters  or renders  ineffective
              data stored in or used in connection with a computer commits
              an offense.
         Charge:   Damaging Computer data.

         3.   Any person who, without authority, knowingly uses a computer
              commits and offense.
         Charge:   Unauthorized use of a computer.

         4.   Any person who, without authority, knowingly gains access to
              a computer, computer network, or any part thereof commits an
              offense.
         Charge:   Unauthorized access to a computer.

         5.   Any  person  who,   knowingly  and  dishonestly  introduces,
              records  or  stores, or  causes  to be  recorded,  stored or
              introduced into a computer or computer network by any means,
              false or misleading information as data commits an offense.
         Charge:   Insertion of false information as data.

         ALTERNATIVE:
              (5)  A person commits an offense if, not having authority to
                   obtain  access to a  computer program or  data, whether
                   stored in or used in  connection with a computer, or to
                   a  part  of such  program  or  data,  he  obtains  such
                   unauthorized  access   and  damages   another  person's
                   interests by recklessly adding to, erasing or otherwise
                   altering the program or the data.















         6.   Any person under  a contractual or other  duty to introduce,
              record or store authorised data into a computer network, who
              negligently  or dishonestly  fails to  introduce, record  or
              store, commits an offense.
         Charge:   Omission to introduce, record or store data.

         ALTERNATIVE
              (6)  Any  person  under  a  contractual  or  other  duty  to
                   introduce,  record or  store data  into  a computer  or
                   computer network  who negligently or  dishonestly fails
                   to introduce, record or store, commits an offense.

         7.   Any  authorised person who willfully or intentionally allows
              information  from a  computer to  get into  the hands  of an
              unauthorised  person   who  uses  such  information  to  his
              advantage commits an offense.
         Charge:   Allowing unauthorised person to use computer data.

         8.   A  person guilty  of  an  offense under  this  Law shall  be
              liable:-
              (a)  on summary conviction,  to imprisonment for a  term not
                   exceeding  two years  or to  a  fine not  exceeding the
                   statutory maximum or both; or
              (b)  on conviction on indictment, to imprisonment for a term
                   not  exceeding ten years  or to  an unlimited  fine, or
                   both.

         9.   A  court in  Ghana  shall  have  jurisdiction  to  entertain
              proceedings for  an offense under  this Law, if at  the time
              the offense was committed:-
              (a)  the accused was in Ghana; or
              (b)  the program  or  the  data in  relation  to  which  the
                   offence  was committed  was stored  in or  used with  a
                                                          or  used with
                   computer or computer network in Ghana.
                               computer network in Ghana.

         10.  In this Law, unless the context otherwise requires:-
              "access"  includes  to  log unto,  instruct,  store  data or
              programs  in, retrieve data  or programs from,  or otherwise
              communicate  with a  computer, or  gain  access to  (whether
              directly or with the aid of any device) any data or program.
              "computer"   includes  any   device  which  is   capable  of
              performing logical,  arithmetical, classifactory,  mnemonic,
              storage  or  other  like  functions  by  means  of  optical,
              electronic or magnetic signals.
              "Computer network"  includes the  interconnection of  two or
              more computers, whether geographically separated or in close
              proximity or  the interconnection  of communication  systems
              with a computer through terminals, whether remote or local.
              "Computer program" includes  an instruction or statement  or
              series  of instructions or  statements capable of  causing a
              computer to indicate, perform, or achieve any function.
              "data"  includes  a  representation   in  any  form  whether
              tangible or intangible that is capable of being stored in or
              retrieved by a computer.














                                      ENDNOTES
                                      ENDNOTES
         1.   Financial Times Limited (London) April, 1990.

         2.   See, infra, endnote 36 and accompanying text.
                   infra

         3.   Stoll, The Cuckoo's Egg (1990).  [hereinafter Stoll].
                     The Cuckoo's Egg

         4.   Lyons, 13 Are  Charged in Theft of Data  from Computers, New


         York Times, August 17, 1990, B2, col. 3.

         5.   Although   there  is  no   set  definition  of   a  computer


         publication,  it is created  and published solely  on a computer.


         Peretti,  Computer Publications  and the  First Amendment  (1990)


         (available  at Princeton  University FTP  site  and The  American


         University Journal of International Law and Policy Office).

         6.   Dorothy  Denning,  The   United  States  v.   Craig  Neidorf


         (available  at The American  University Journal  of International


         Law and Policy office).

         7.   Schares,  A  German  Hackers'  Club that  Promotes  Creative


         Chaos, Business Week, Aug. 1, 1988, 71.

         8.   Barlow, Crime and  Puzzlement: In advance of the  Law on the


         Electronic Frontier, Whole Earth Review, Sept. 22, 1990, 44.

         9.   Kopetman, Computer  Gave Them  Bum Rap,  Los Angeles  Times,
                                                       Los Angeles  Times


         Jan. 10, 1991, at B1, col. 2.

         10.  See, J. Thomas McEwen, Dedicated Computer Crime Units (19--)
              See,


















         (stating how  important computers  have become  to society).   In


         1978 there were 5,000 desktop computers in the United States.  S.


         Rep. No.  432, 99th  Cong., 2d Sess.  2, reprinted in,  1986 U.S.
                                                  reprinted in


         Code Cong. &  Admin. News 2479, 2479.   By 1986, this  number had


         increased to about 5 million.  Id.
                                        Id.

         11.  See, S. 2476, Floor Statement by Senator Patrick Leahy.

         12.   See,  Stoll  at  ___ (stating  that  all countries,  except


         Albania, are connected via computer systems).

         13.   McEwen, Dedicated Computer  Crime Units 1 (19--).   Another
                       _______________________________


         definition used  is  the definition  of computer  crime was  "any


         illegal  act  for  which  knowledge  of  computer  technology  is


         essential for successful investigation and prosecution".  Parker,


         Computer Crime:  Criminal Justice Resource Manual, (1989).
         _________________________________________________

         14.  Conly,  Organizing  for  Computer  Crime  Investigation  and


         Prosecution, 6-7 (19--).

         15.  For instance,  the estimated  cost of  the Internet Worm,  a


         computer program created  by Robert Morris,  Jr. which shut  down


         the  Internet  computer  system, varies  from  $97,000,000  (John


         McAfee,  Chairman,  Computer   Virus  Industry  Association)   to


















         $100,000  (Clifford Stoll's low  bound estimate).   Commitment to


         Security, 34  (1989).  It  is difficult to determine  exactly the


         cost  of such  crime because  it is  difficult to  determine what


         should be included.  The estimated downtime of a  computer due to


         such activity  could be used to determine the  cost.  This may be


         flawed, however, since it will not take into account how  much of


         the down  time actually  would have been  used.   Electronic Mail


         Letter from Richard  Stallman to Brian J. Peretti  (Dec. 3, 1990)


         (concerning computer crime).

         16.  Commitment   to  Security,   34.    The   average  facility,


         consisting  of  1,224  microcomputers,  96  minicomputers and  10


         mainframe  computers, lost $109,000,  365 personnel hours  and 26


         hours computer time loss per year. Id.
                                            Id.

         17.  Id. at 23. 6 percent of  incidents resulted in prosecutions.
              Id.


         Id.
         Id.

         18.  Id.
              Id.

         19.    Only 1.5 percent of  respondents to a National  Center for


         Computer Crime Data used Anti-virus  products in 1985.   By  1988


         this figure  rose to  22 percent.   By  1991, 53  percent of  the

















         respondents stated that  they would be using  anti-virus software


         by  1991.   According  to  a  Price  Waterhouse survey  in  Great


         Britain,  in 1985  26  percent  installations  spent  nothing  on


         security.   Authers,  Crime  as  a  Business  Risk-  Security/  A
                               Crime  as  a  Business  Risk-  Security/  A


         Management  as Well  as  a  Technical  Problem,  Financial  Times
         Management  as Well  as  a  Technical  Problem


         (London), November 7, 1990.  By 1990 this figure had shrunk  to 4


         percent and is  expected to decline to 0 by 1995. Id.  The amount
                                                           Id.


         spent on security for new systems has increased from 5 percent in


         1985 to 9 percent by 1990. Id.
                                    Id.


              In Japan, less  than 10 percent of groups  that rely heavily


         on  computers have  taken  measures  to  prevent  virus  attacks.


         Computer  Users Fail to Protected Against Viruses. Although Japan
         Computer  Users Fail to Protected Against Viruses.


         does not  have a computer crime law, there  is a movement to make


         such a law.   Computer Body Calls for Jail Sentences for Hackers,
                       Computer Body Calls for Jail Sentences for Hackers


         Kyodo News  Service,  Nov. 15,  1990  (available from  the  Nexis


         library).     The   Japan   Information  Processing   Development


         Association has  stated that  the new law  should make  the crime


         punishable of either one year of hard labor or a fine. Id.
                                                                Id.
















         20.  The terms was first applied in 1984. Commitment to Security,


         34 (1989).

         21.  Ring, Computer Viruses; Once Revered as Hackers, Technopaths


         Threaten  Security of  Computer-Dependant Society,  Computergram,


         July 7,  1989.  Some of  these viruses are  extremely small, e.g.


         Tiny, which is 163 bytes, may be the smallest.  Friday 13th Virus


         Alert, The Times (London), July 12, 1990.

         22.  Graggs, Foreign  Virus Strains  Emerge as  Latest Threat  to
                      Foreign  Virus Strains  Emerge as  Latest Threat  to


         U.S. PCs,  Infoworld, Feb.  4, 1991, 18.   Viruses  have appeared
         U.S. PCs


         from Bulgaria, Germany, Australia, China and Taiwan. Id. Some new
                                                              Id.


         viruses  include Armageddon,  from Greece  which  attacks through


         modems and then dials to a talking clock in  Crete, Liberty, from


         Indonesia,  Bulgaria 50,  which is  thought to  have come  from a


         "laboratory"  in Sofia,  Victor,  thought  to  originate  in  the


         U.S.S.R., the Joker,  from Poland, which tells the  user that the


         computer needs a  hamburger, and Saturday  the 14th, presumed  to


         have been developed in South Africa,  which destroys a computer's


         file allocation table. Id.
                                Id.


















              Some viruses also  carry a message when  they are activated.


         A  virus that is  though to  have been  developed by  students at


         Wellington, New  Zealand,  tells the  user  that they  have  been


         "stoned" and requests that marijuana should be legalized.  Id.
                                                                    Id.


              Approximately 80  or 90 of  the 300 viruses counted  for the


         IBM  personal computer originated in Bulgaria according to Morton


         Swimmer of Germany's Hamburg University Virus Test Center.




         23.  A report in  La Liberation, a French  newspaper, stated that
                           La Liberation


         computer viruses  could be planted  in French EXOCET  missiles to


         misguide  them  when  fired.    La  Liberation,  Jan.  10,  1991,


         reprinted in  Klaus Brunnstein,  Risks-Forum, vol.  10, iss.  78,
         reprinted in


         Jan. 22  1991 (available at American Journal of International Law


         and Policy Office).

         24.  A  "trojan horse"  is a  program that  does not  seem to  be


         infected, however,  when used  in a computer,  the virus  is then


         transferred  the uninfected machine.   On trojan  horse destroyed


         168,000 files in Texas.  Commitment to Security, 34 (1989).

         25.  Ring, Computer Viruses; Once Revered as Hackers, Technopaths
                    Computer Viruses; Once Revered as Hackers, Technopaths
















         Threaten  Security of  Computer-Dependent Society,  ComputerGram,
         Threaten  Security of  Computer-Dependent Society


         July 7, 1989.

         26.  Highland, One Wild  Computer "Worm" Really Isn't  a  Federal
                        One Wild  Computer "Worm" Really Isn't  a  Federal


         Case, Newsday, Jan. 23, 1990, 51.
         Case

         27.  Stoll, at 346.   The amount of computers  that were actually


         infected by the worm  is still the subject of debate.   Mr. Stoll


         estimates that  2,000 computers  where infected,  while the  most


         commonly  cited  number is  6,000.   Commitment  to  Security, 34


         (1989).    The 6,000  estimate  was  based  on  an  Massachusetts


         Institute of Technology estimate that 10 percent of the  machines


         at the school  were infected and was  then inferred to  the total


         number  of  machines  across  the  country  that  were  affected.


         General Accounting  Office, Computer  Security: Virus  Highlights


         Need for Improved  Internet Management, 17  (1989).  This  number


         may be inaccurate  because not all locations had  the same amount


         of vulnerable machines. Id.
                                 Id.

         28.       For the  first  eight months  of  1988, there  were 800


         incidents  concerning computer  viruses. Commitment  to Security,


         34.  The Computer  Virus Industry  Association  reported that  96
















         percent of  these reported infections were incorrectly identified


         as viruses. Id.
                     Id.

         29.   Robinson, Virus Protection  for Network Users,   Washington


         Post, Washington Business, p.44, Feb. 11, 1991.

         30.  Ross,  Hacking   Away  at  the   Counterculture,  3   (1990)


         (available at the  American University  Journal of  International


         Law  and Policy).  On Saturday Night Live, during the news update


         segment, Dennis Miller stated, in comparing a computer viruses to


         the   AIDS  virus,  "Remember,  when  you  connect  with  another


         computer, you're connecting  to every computer that  computer has


         ever been connected to."  Id.
                                   Id.

         31.  Id. at 8-9.
              Id.

         32.  Computer Virus Legislation, Hearing on  H.R. 55 and H.R. 287


         before the Subcomm. on Criminal Justice of the House Comm. on the


         Judiciary, 100th  Cong., 1st Sess.  49 (1989) (statement  of Marc


         Rotenberg,   Director,   Computer    Professionals   for   Social


         Responsibility).   In Israel,  Hebrew University used  a computer


         virus to  detect and  destroy a virus  that would  have destroyed


         data files. Id.
                     Id.

















         33.  Computergram International, October 14, 1990.

         34.

         35.  Watts, Fears of Computer Virus Attack from East Europe grow,
                     Fears of Computer Virus Attack from East Europe grow


         The Independent, November 24, 1990, p.6.   On a trip to Bulgaria,


         a British computer consultant  returned with 100 viruses  that do


         not exist in the West. Id.
                                Id.

         36.  Id.

         37.  McGourty, When a Hacker Cracks the Code, The Daily Telegraph
                        When a Hacker Cracks the Code


         (London), October 22, 1990, p. 31.

         38.  The equipment would cost about 50 (British) pounds. Id.
                                                                  Id.

         39.  Id.   A British company, has stated that they have developed
              Id.


         a glass that  will reduce this problem.   Tieman, Spy-Proof Glass


         to Beat the Hackers, The (London) Times, Jan 17, 1991.


              A  more  recent  problem concerns  the  ability  of computer


         hackers to access into fax  machines and either change or reroute


         information from the machine. Becket, Espionage fears mounting as
                                               Espionage fears mounting as


         hackers tap into faxes, The Daily Telegraph (London), December 1,
         hackers tap into faxes


         1990,  p. 23.  This problem  can be  circumvented by  the  use of


         encryption devices or passwords on the machine.  Id.
                                                          Id.

         40.  Stoll  at 9.  The  word itself originally had  two meanings.

















         People originally called themselves hackers were software wizards


         who thoroughly knew computer systems.  Id.  In U.S. v. Riggs, 739
                                                        U.S. v. Riggs


         F. Supp. 414, 423 (N.D. Ill.  1990) the court defined hackers  as


         "individuals involved  with the  unauthorized access  of computer


         systems by various  means."  The New Hacker's  Dictionary defines


         hackers  as  "A  person  who  enjoys  learning   the  details  of


         programming systems  and how  to stretch  their capabilities,  as


         opposed  to most  users  who  prefer to  learn  only the  minimum


         necessary."    New  Hacker's Dictionary, to  be published Spring,


         1991.


              Hacker has also been used in a  non-evil sense with the word


         "cracker"  taking the  disreputable part  of the  word.   In this


         light,  hacker means "computer  enthusiasts who `take  delight in


         experimenting  with system  hardware, software  and communication


         systems."  and cracker  meaning  "a  hacker  who  specializes  in


         gaining illegal  access to a  system."  One Wild  Computer `Worm'
                                                 One Wild  Computer `Worm'


         Really Isn't  a Federal  Case, Newsday, January  23, 1990,  p.51.
         Really Isn't  a Federal  Case


         The typical hacker has been described  as "a juvenile with a home
















         computer  who  uses  computerized bulletin  board  systems  for a


         variety  of illegal  purposes.   Conly,  Organizing for  Computer


         Crime Investigation and Prosecution, 8 (19--).




         41.   Sulski, How to Thwart  Potential Saboteur, Chicago Tribune,
                       How to Thwart  Potential Saboteur


         November 18, 1990, p.18.

         42.  Computerworld, December 3,  1990, p. 122. Kryptik,  a hacker


         group,  was  stated as  having  planned  to plant  a  virus  in a


         telephone  network on  December  5,  1990. Id.    It is  unclear,
                                                    Id.


         however, if the virus actually was planted. Id.
                                                     Id.

         43.  Sulski, How to  Thwart Potential Saboteur, Chicago  Tribune,
                      How to  Thwart Potential Saboteur


         November  18, 1990, p.18.   Computer security  experts state that


         the  risk of  having hacker break  into your system  is less than


         being burglarized or having a power outage due to lightning.  Id.
                                                                       Id.


         Errant opinion poll  results have also been blamed on the work of


         hackers.    Holdsworth,   Hackers  May  Have  Attacked   TV  Poll
                                   Hackers  May  Have  Attacked   TV  Poll


         Computers-MP,  Press Association Newsfile, May 4, 1990.
         Computers-MP

         44.  Stoll, 312.

         45.  Id.  This  view is also shared  by the editors of  2600, The
              Id.


















         Hackers  Quarterly.   It is  also held  by  these persons  that a


         service  is done  to the  computing  community because  those who


         break in to computer systems show the operators that their system


         is not strong enough and that it should be made stronger.

         46.  Stoll, at 354.

         47.   Mr.  Stoll's computer  was broken  into by   an  Australian


         hacker who said he  did so to show that Mr.  Stoll's security was


         not  good and  that  hackers  are good  because  they show  where


         security problems are in computer  networks.  Id. at 353-54.   He
                                                       Id.


         rejected such arguments. Id.
                                  Id.

         48.  Director, Computer Professionals for Social Responsibility

         49.  Computer Virus Legislation, Hearing  on H.R. 55 and H.R. 287


         before the Subcomm. on Criminal Justice of the House Comm. on the


         Judiciary, 100th Cong., 1st Sess. 26-27 (1989) (statement of Marc


         Rotenberg,   Director,   Computer    Professionals   for   Social


         Responsibility). The Aldus peace virus, which displayed a message


         calling  for  peace  and then  disappeared  without  damaging the


         system itself, is an example of a virus  which he believes should


         be protected.  Id.
                        Id.

















         50.  Commitment to Security, 34.

         51.  Stoll, 349.

         52.  "I can never understand why people think it is  all right to


         run out of computer paper but not all right to be infected with a


         virus.  The  disruption is the same  and it takes about  the same


         amount of  time to  put matters  right."   Cane, Hygiene  See Off
                                                          Hygiene  See Off


         Computer  Viruses, Financial  Times  (London)  October 14,  1989,
         Computer  Viruses


         Section I, p. 24.

         53.  18 U.S.C. 1030 (1988).

         54.      Ala. Code    13A-8-100  et.seq. (1990); Alaska  Stat.
                  Ala. Code                               Alaska  Stat.


         11.46.200(a)(3), 11.46.484(a)(5), 11.46.740, 11.46.985, 11.46.990


         (1990);  Ariz. Rev. Stat. Ann.   13-2301(E), 13-2316 (1990); Cal.
                  Ariz. Rev. Stat. Ann.                               Cal.


         Penal Code    502 (West 1990); Colo. Rev.  Stat.   18-5.5-101 et.
         Penal Code                     Colo. Rev.  Stat.


         seq. (1990); Conn. Gen. Stat    53a-250 et. seq., 52-570b (1990);
                      Conn. Gen. Stat


         Del. Code  Ann. tit.  11,     931 et  seq. (1990);  Fla. Stat.
         Del. Code  Ann.                                     Fla. Stat.


         815.01 et seq.  (1990); Ga. Code  Ann.    16-9-90 et seq  (1990);
                                 Ga. Code  Ann.


         Haw. Rev. Stat.    708-890 et seq. (1990); Idaho Code    18-2201,
         Haw. Rev. Stat.                            Idaho Code


         2202  (1990); Ill.  Ann. Stat.     15-1,  16-9 (1990);  Ind. Code
                       Ill.  Ann. Stat                           Ind. Code


           35-43-1-4,  35-43-2-3  (1990);  Iowa Code      716A.1  et. seq.
                                           Iowa Code

















         (1990); Kan.  Stat. Ann.   21-3755 (1990); Ky. Rev. Stat. Ann.
                 Kan.  Stat. Ann.                   Ky. Rev. Stat. Ann.


         434.840  et. seq. (1990);  La. Rev. Stat.  Ann. 14(D)     71.1 et
                                    La. Rev. Stat.  Ann


         seq.  (1990); Me.  Rev.  Stat.  Ann. chap.  15,  tit. 17-A,   357
                       Me.  Rev.  Stat.  Ann.


         (1990); Md.  Crim. Law  Code Ann. Article  27   45A,  146 (1990);
                 Md.  Crim. Law  Code Ann.


         Mass. Gen. L. ch 266,   30 (1990) see infra; Mich. Comp.  Laws
         Mass. Gen. L.                                Mich. Comp.  Laws


         28.529(1)  et seq. (1990);  Minn. Stat.   609.87  et seq. (1990);
                                     Minn. Stat.


         Miss. Code Ann.   97-45-1 et seq (1990); Mo. Rev. Stat.   569.093
         Miss. Code Ann.                          Mo. Rev. Stat.


         et  seq. (1990);  Mont. Code  Ann.    45-2-101, 45-6-310,45-6-311
                           Mont. Code  Ann.


         (1990); Neb. Rev. Stat. art. 13(p),   28-1343 et seq (1990); Nev.
                 Neb. Rev. Stat.                                      Nev.


         Rev.  Stat.    205.473  et  seq. (1990);  N.H.  Rev.  Stat.  Ann.
         Rev.  Stat.                               N.H.  Rev.  Stat.  Ann.


           638.16  et seq. (1990); N.J. Rev. Stat.   2C:20-1, 2C:20-23 et.
                                   N.J. Rev. Stat.


         seq., 2A:38A-1  et seq.  (1990); N.M. Stat.  Ann.     30-16A-1 et
                                          N.M. Stat.  Ann.


         seq. (1990); N.Y. Penal Law    155.00, 156.00 et seq, 165.15(10),
                      N.Y. Penal Law


         170.00,  175.00 (1990); N.C.  Gen. Stat.   14-453  et seq (1990);
                                 N.C.  Gen. Stat.


         N.D. Cent. Code 12.1-06.1.01(3),  12.1-06.1-08 (1990); Ohio  Rev.
         N.D. Cent. Code                                        Ohio  Rev.


         Code  Ann.    2901.01, 2913.01, 1913.04, 1913.81 (Anderson 1990);
         Code  Ann.


         Okla. Stat. tit.  21,    1951 et  seq. (1990); Or. Rev.  Stat.
         Okla. Stat                                     Or. Rev.  Stat.


         164.125, 164.377  (1990);   Pa.  Cons. Stat.   1933  (1990); R.I.
                                     Pa.  Cons. Stat.                 R.I.
















         Gen. Laws    11-52-1 et seq (1990); S.C. Code Ann.    16-16-10 et
         Gen. Laws                           S.C. Code Ann.


         seq (Law. Co-op 1990); S.D. Codified Laws Ann.   43-43B-1 et seq.
                                S.D. Codified Laws Ann.


         (1990);  Tenn. Code Ann.    39-3-1401 et  seq (1990);  Texas Code
                  Tenn. Code Ann.                               Texas Code


         Ann. tit 7   33.01 et seq. (Vernon 1990); 19   Utah Laws    76-6-
         Ann.                                           Utah Laws


         701 et  seq.; Va.  Code Ann.   18.2-152.1  et seq.  (1990); Wash.
                       Va.  Code Ann.                                Wash.


         Rev.  Code Ann.   9A.48.100, 9A.52.010, 9A.52.110 et seq. (1990);
         Rev.  Code Ann.


         Wis. Stat.   943.70 (1990); Wyo. Stat.   6-3-501 et seq. (1990).
         Wis. Stat.                  Wyo. Stat.

         55.   Parker, Computer Crime:   Criminal Justice Resource Manual,


         129 (1979).

         56.   McEwen, Dedicated Computer  Crime Units, 60 (1989).   These


         other laws include  embezzlement, larceny, fraud, wire  fraud and


         mail fraud.  Id. at 60.
                      ___

         57.  Pub. L. No. 98-473,   2102(a), 98 Stat. 1837, 2190 (codified


         at 18 U.S.C.   1030).

         58.  S.  Rep.  No.  432,  99th  Cong., 2d  Sess.,  1986  U.S.  2,


         reprinted in, 1986 Cong. & Admin. News 2479, 2479.
         reprinted in

         59.  Pub. L. No. 99-474,   2, 100 Stat. 1213 (amending 18  U.S.C.


           1030).

         60.  18 U.S.C.   1030(b).

         61.  18 U.S.C.   1030(a)(1).   The person  must act  knowingly to

















         access a computer  either without authorization or  exceeding the


         authorization given  and obtain  information with  the intent  or


         reason  to believe that  the information  will either  injure the


         United  States of  American or  give  an advantage  to a  foreign


         nation.  As  seen by the placement  of this section, it  is clear


         that  the Congress was  particularity aware  of the  dangers that


         computer  might  have to  the  national  security of  the  United


         States.   This  section parallels  18  U.S.C.  793,  the  federal


         espionage statute.

         62.  1030(c)(1)(A).

         63.  1030(c)(1)(B).

         64.  As defined by the Fair  Credit Reporting Act, 15 U.S.C. 1681


         et seq.

         65.  1030(c)(2)(A).

         66.  1030(c)(2)(B).  The penalty is up to 10 years in prison.

         67.  18 U.S.C.   1030(a)(2).

         68.  18 U.S.C.   1030(c)(2)(B).

         69.  18 U.S.C.   1030(c)(2)(B).

         70.  The punishments that may be handed out are up to 5 years for


         the first offense and 10 years for any subsequent offense.

         71.  18 U.S.C.  1030(a)(5).

















         72.  18 U.S.C.   1030(c)(3)(A).

         73.  18 U.S.C.   1030(c)(3)(B).

         74.  18 U.S.C.   1030(a)(6).

         75.  As defined by 18 U.S.C.   1029.

         76.  18 U.S.C.  1030(c)(2)(A).

         77.  18 U.S.C.   1030(c)(2)(B).

         78.  18 U.S.C.   1030(a)(6)(B).

         79.  18 U.S.C.   1030(a)(6)(B).

         80.  These computers  include computers used exclusively  for the


         United States government  or a  financial institution  or if  not


         exclusively by  the  government  one which  the  conduct  of  the


         computer affects the government's or the institution's operation,


         18  U.S.C. 1030(e)(2)(A),  the computer  is  one of  two or  more


         computers  that  commit  the  offense,  18  U.S.C. 1030(e)(2)(A).


         Financial  institution is  defined in  18  U.S.C. 1030(e)(4)  and


         includes  and institution  whose  deposits  are  insured  by  the


         Federal Deposit Insurance Corporation, 1030(e)(4)(A), the Federal


         Reserve or  one of  its  members, 1030(e)(4)(B),  a credit  union


         insured   by   the   National    Credit   Union   Administration,


         1030(e)(4)(C),   a  Federal   home  loan   bank   system  member,


















         1030(e)(4)(D),  institutions under the  Farm Credit Act  of 1971,


         1030(e)(4)(F), a broker-dealer registered pursuant to   15 of the


         Securities Exchange Act  of 1934, 1030(e)(4)(F), or  a Securities


         Investor Protection Corporation, 1030(e)(4)(G).

         81.  S. Rep.  No. 432, 99th Cong., 2d Sess. 4, reprinted in, 1986
                                                        reprinted in


         U.S. Code Cong. & Admin. News 2479, 2481.

         82.  Note, Computer Crime and The Computer Fraud and Abuse Act of


         1986, X Computer/Law Journal 71, 79, (1990).

         83.  18 U.S.C.   1030 (e)(2) states:


              As used in this section-


              (2)  The term "Federal interest computer" means a computer-


                   (A)  exclusively for the use of a financial institution


         or the  United States Government, or,  in the case  of a computer


         not  exclusively  for  such  use,  used by  or  for  a  financial


         institution  or  the  United States  Government  and  the conduct


         constituting  the  offense  affects  the  use  of  the  financial


         institution's  operation or  the  Government's operation  of such


         computer; or


                   (B)  which is one  of two or more computer  used in the
















         committing the  offense, not all of which are located in the same


         state.

         84.  "[T]here is  not statute  specifically addressing  viruses."


         135 Cong. Rec.  E2124 (daily ed. June  14, 1989) (letter of  Rep.
             Cong. Rec.  E2124


         Herger (quoting FBI Director William Sessions)).

         85.  H.R. 287 and H.R. 55.

         86.  "Existing  criminal statues are not specific on the question


         of  whether unauthorized  access is  a  crime where  no theft  or


         damage  occurs . .  ." 135 Cong.  Rec. E2124 (daily  ed. June 14,
                                    Cong.  Rec.


         1989)  (letter of  Rep.  Herger  (quoting  FBI  Director  William


         Sessions)).

         87.  Prosecution could occur under a trespass law.  It may not be


         applicable, however, since trespass is a property based crime and


         courts have not recognized information in the same manner as real


         property.

         88.  Note, Computer Crime and The Computer Fraud and Abuse Act of


         1986, X Computer/Law Journal 71, 80 (1990).

         89.  Id.
              Id.

         90.  Shalgi,  Computer-ware: Protection and Evidence,  An Israeli
                       Computer-ware: Protection and Evidence,  An Israeli


         Draft  Bill,  IX  Computer/Law J.  299,  299  (1989) [hereinafter
         Draft  Bill       Computer/Law J.

















         Shalgi].  This proposed bill has not progressed much since it was


         proposed and is at the stage prior to an official "bill".  Letter


         from Barry  Levenfeld  to Brian  J. Peretti  (December 13,  1990)


         (concerning  Israel's legislature  progress on  the comprehensive


         computer  law).     This  paper  will  use  the   Shalgi  English


         translation of the law.

         91.  Chapter 2 concerns Offenses and Accessing Computers, Chapter


         3, Damages, Chapter 4, Rights of Software Creators and Chapter 5,


         Evidence. Levenfeld, Israel Considers Comprehensive Computer Law,
                              Israel Considers Comprehensive Computer Law,


          Int'l Computer L Advisor 4 (March 1988).  The topics  covered in
          Int'l Computer L Advisor


         Chapters 2 through 5 are beyond the scope of this paper.

         92.

         93.  Shagli, at 311.

         94.  Chapter 2,   2, Shagli at 311.

         95.  Chapter 2,   3(a), Shagli at 311.   An employee is exempt if


         he commits this  act when  it was  due to a  strike concerning  a


         labor dispute. Chapter 2,  3(b), Shagli at 311.

         96.  Chapter 2,   4(a).

         97.  Chapter 2,   4(b), Shagli at 311.

         98.  As defined by Chapter 1,   1.

         99.  Chapter 2,   5, Shagli at 311.
















         100. Chapter 2,   6, Shagli at 312.

         101. Chapter 2,   7, Shagli at 312.

         102. Chapter 2,   9, Shagli at 312.

         103. Id.
              Id.

         104. Chapter 2,   10, Shagli at 312.

         105. By  not  stating that  this also  applies to  individuals or


         others (non-corporations) who  are attempting to supply  services


         to the public, some important services that may be offered to the


         public  may not  be  done.   Levenfeld,  8,  translates the  word


         corporation as entities which may solve the problem.

         106. Shalgi, 312.  Levenfeld, 5,  states that since this  section


         is  so broad  the only  possible areas that  are not  covered are


         personal and academic uses.

         107. Chapter 2,   14, Shagli at 313.

         108.  Section 5.

         109. Levenfeld,  4-5.   Perhaps the  only  computers not  covered


         would  be those used  for personal or  academic uses exclusively.


         Id. at 5.
         Id.

         110.  Section 5.

         111. Levenfeld,  4-5.   Perhaps the  only  computers not  covered


         would be those  used for personal  or academic uses  exclusively.


















         Id. at 5.
         Id.

         112. Levenfeld at 4.

         113. Shalgi, 305.

         114. See,  Computers at Risk,  Safe Computing in  the Information


         Age, 36  (1991) (discussing the  need for a repository  to gather


         computer crime information).

         115. Chapter 2,   12, Shagli at 313.

         116. New Hacker's Dictionary.

         117. Chapter 2,    13, Shagli at 313.  The law states that if the


         owner of the computer is not given in his presence, the  order is


         only good for twenty-four hours.  Id.
                                           Id.

         118. Shagli, at 304.   Under Israeli  law, an object that  may be


         proof of an  offense may be seized without a court order. Id. The
                                                                   Id.


         law will bring the seizure of computers in accord with the United


         States Constitution's sixth Amendment.

         119. Chapter 1,   1, Shagli at 310.

         120. Alexander,  Suspect  Arrested  in   AIDS  Disk  Fraud  Case,
                          Suspect  Arrested  in   AIDS  Disk  Fraud  Case


         Computerworld, Feb. 5, 1990, 8.

         121.  Colvin,  Lock up the Keyboard  Criminal, Telecommunications


         PLC (England), June 1990.

         122. Computer Misuse Act, 1990, ch. 18.

         123.   In the five years prior to the  adoption of the Act, there
















         were 270  cases of computer misuse  in Britain of  which only six


         were brought to court and only 3 resulting   convictions.  Fagan,


         Technology:  EC urged to  strengthen laws on  computer crime, The
         Technology:  EC urged to  strengthen laws on  computer crime


         Independent (London), February 13, 1990, p. 19.

         124. Id.
              Id.

         125. Davies,  Cracking down on  the computer hackers,  Fin. Times
                       Cracking down on  the computer hackers


         (London), October 4, 1990.

         126. Law Commission No. 186, Cm 819.

         127. Computer Misuse Act, 1990, ch. 18,   1.

         128. The penalty for this type of behavior is up to six months in


         prison, 2000 pounds or both.

         129. Computer Misuse Act, 1990, ch. 18,   2(1)(a).

         130. Computer Misuse Act, 1990, ch. 18,   2(1)(b).

         131. Computer Misuse Act, 1990, ch. 18,   2(5)(a).

         132. Computer Misuse Act, 1990, ch. 18,   2(5)(b).

         133. Computer Misuse Act, 1990, ch. 18,   3(1).

         134. Computer Misuse Act, 1990, ch. 18,   3(7).

         135. Computer Misuse Act, 1990, ch. 18,   3(2).

         136. Computer Misuse Act, 1990, ch. 18,   3(5).

         137. Id.      Colvin,   Lock   up   the   Keyboard   Criminal   ,
              Id.


         Telecommunications PLC (England), June 1990.

         138. Computer Misuse Act, 1990, ch. 18,   4.

         139. Computer Misuse Act, 1990, ch. 18,   4(1).

















         140.  5(2) states that a significant link under  1 can be (a) the


         person was in  Great Britain at the  time in which he  caused the


         computer to act in a certain way or (b) the computer he attempted


         to  get access  to  was in  Great  Britain.  5(3)  states that  a


         significant link under  3  can be (a) that  the person was  Great


         Britain at  the time when he did the  act or (b) the modification


         took place in Great Britain.  However, this may not an exhaustive


         list.

         141. Davies,  Cracking down on  the computer hackers,  Fin. Times
                       Cracking down on  the computer hackers


         (London), October 4, 1990.

         142. Computer Misuse Act, 1990, ch. 18,   5.

         143. Although  proposed on February  14, 1989, the  proposed bill


         has not yet become law.

         144. Appendix A,   10.

         145. Appendix A,   1.

         146. Appendix A,   1, alternative.

         147. Appendix A,   2.

         148. Appendix A,   3.

         149. Appendix A,   4.

         150. Appendix A,   5.

         151. Appendix A,   7.

         152. The Ghana  Law Reform  Commission states  that they  created
















         their proposed law  from the Scottish Law Commission  and the Law


         Reform  Commission of  Tasmania,  Australia reports  on  computer


         crime.

         153. Appendix A,   9(a).

         154. Appendix A,   8(b).

         155. See, infra, endnote __ and accompanying text.
                   infra

         156. Appendix A,   9(a).

         157. Appendix A,   9(b).

         158. Appendix A,   10.

         159. Appendix A,   6.

         160. Id.
              Id.

         161. Appendix A,   7.

         162. Appendix A,   1.

         163. Appendix A,   10.

         164. Id.
              Id.

         165. Id.
              Id.

         166. The  first computer  crime  law  in  the United  States  was


         enacted in 1979.

         167. S. Rep. No. 432, 99th Cong.,  2d Sess. 3, reprinted in  1986
                                                        reprinted in


         U.S. Code Cong. & Admin. News 2479, 2481.

         168. By increasing  security, the ease  with which one  can enter


         the  system will become more difficult.   Some systems, believing


         that if  such unauthorized  access does  occur that  no sensitive

















         information will be stolen, opt  to have less security then other


         systems.  In actuality, by one system not having enough security,


         the entire network can be put  at danger when a mischievous  user


         wishes to  break into a  users account which  may be  accessed by


         that system.    See  Stoll, 353-54 (stating an  Australian hacker


         broke  into  Mr.  Stoll's computer  account  because  a connected


         computer's system  manager did not wish  to have a high  level of


         security.

         169.    Stoll,  32.     Many  military  computers  and  sensitive


         scientific computers  operate in a  secure environment.   This is


         created by not allowing the computer system to have any telephone


         links to the outside world (i.e. outside of the building.

         170.  By having a secure system, information at the computer site


         can only be removed by a person walking into the computer center,


         copying the  information and then walking  out with it.   This is


         both burdensome  (it is much  easier to access the  computer from


         one's home or office) and cumbersome (since a person will have to


         walk around with reels  of data that will later be  put back into


















         the system.

         171. Computer Virus Legislation, Hearing on H.R. 55 and  H.R. 287


         before the Subcomm. on Criminal Justice of the House Comm. on the


         Judiciary, 100th Cong., 1st Sess.  44, n. 27 (1989) (statement of


         Marc  Rotenberg,  Director,  Computer  Professionals  for  Social


         Responsibility).




         172.  Colvin,  Lock up the Keyboard  Criminal, Telecommunications
                        Lock up the Keyboard  Criminal


         PLC (England), June 1990, p.  38.  Michael Colvin, the  author of


         Great Britain's Computer  Misuse Act stated  that the passage  of


         the bill should not be looked  at that the computer owner  should


         not have security  measures on their computers. Id.  The bill, he
                                                         Id.


         states, was made  only to compliment,  not substitute, the  users


         security  measures.  Id. In  West  Germany, the  severity  of the
                              Id.


         punishment for hacking depends on the effort that was required to


         commit the offense.   Fagan, Technology:  EC urged to  Strengthen
                                      Technology:  EC urged to  Strengthen


         Laws on Computer Crime, The Independent, Feb. 13, 1990, 19.
         Laws on Computer Crime

         173.    McGourty,  When  a  hacker cracks  the  code,  The  Daily
                            When  a  hacker cracks  the  code


         Telegraph, October 22, 1990, p. 31.
















         174.  A  Password is a word that  is either given to  the user by


         the  system  or selected  by  the  user  to prevent  others  from


         accessing his  computer  or account  within the  computer.   This


         words,  groups of  letters or  symbols  are supposed  to be  kept


         secret so as  to not let other  who are not authorized  to access


         the system have access to it.




         175. Donn  Seeley, A  Tour  of the  Worm, Department  of Computer
                            _____________________


         Science,  University of  Utah, Nov.  1988,  reprinted in  General
                                                     reprinted in


         Accounting Office, Computer  Security: Virus Highlights  Need for


         Improved Internet Management, 20 (1989).

         176. Authers,  Armed with  a  secret weapon,  Financial  (London)


         Times, Feb. 5, 1991, Section I, 16.

         177.  Id.

         178. For  a discussion  of  this  virus,  see,  Branscomb,  Rogue
                                                   see               Rogue


         Computer  Programs and Computer Rogues:  Tailoring the Punishment
         Computer  Programs and Computer Rogues:  Tailoring the Punishment


         to  Fit the  Crime, 16  Rutgers Computer  &  Tech. L.J.  1, 14-16
         to  Fit the  Crime      _______________________________


         (1990) (discussing the applicability of state and federal  law to


         computer viruses).



         179.   Jim Thomas, publisher  of the Computer  Underground digest


         argues  that computer pirates actually buy more programs then the


         average computer program buyer.   Letter from Jim Thomas to Brian


         J. Peretti (  (discussing computer pirating of software)

         180. See, GNU Manifesto (available at American University Journal


         of International Law and Policy).   See also, Stallman, GNU EMACS
                                             See also,


         General  Public License, (Feb.  11, 1988) (available  at American


         University Journal of International Law and Policy).

         181. The GNU  Manifesto  (available at  the  American  University


         Journal of International Law and Policy).

         182. The  author proposes that such copyright protection last for


         only two years.   By granting the  creator such protection for  a


         short period of  time, he will be  able to  recover  the expenses


         that he put into the writing of the program.


              If   this  type of  protection   is  granted,  it should  be


         understood that the creator of the program has a copyright to the


         sourcecode of the  program for  that period.   If he updates  the


         program  after the  two year  period,  the updated  code will  be


         protected,  but  the  original  code  will  not  be  granted  the
         protection.   In this  manner, an author  cannot attempt  to give


         copyright  protection  to  a  program  after  the  copyright  has


         expired.

         183. Electronic letter from  Brian J. Peretti to  Dorothy Denning


         (Nov. 13, 1990) (concerning computer crime).

         184. This will be a semi-secure system.

         185. The system, of  course, will have a system  manager who will


         create  the accounts  for the  users.   His account  will be  off


         limits  to those who wish  to use the system.   At the same time,


         individuals will  be  encouraged to  attempt  to break  into  the


         manager's  account and  tell  him how  it  was done  in  order to


         improve security for this and other systems.

         186. The problem  still exists  that information  learned through


         the  use of  this system may  allow those  who use the  system to


         break into other computer systems.  This problem can be corrected


         by having the  system manager and the  users communicate problems


         with the system so that they may be corrected on other systems.

         187. United States v. United States Gypsum Co., 438 U.S. 422, 425


         (1978).

         188. S. Rep. No.  432, 99th Cong., 2d Sess. 6,  reprinted in 1986
                                                         reprinted in
         U.S. Code Cong. & Admin. News 2479, 2484.

         189.  Stoll, The Cuckoo's Egg.

         190.  The countries which a person can go to could be any country


         in the  world, except  Albania, since they  are the  only country


         whose computers are not connected to outside computers.  Stoll.

         191. A school in Red Bank, New Jersey, has instituted a "computer


         responsibility training".  Weintraub, Teaching Computer Ethics in
                                               Teaching Computer Ethics in


         the Schools, The School Administrator 8, 9 (apr. 1986).
         the Schools, ________________________

         192. S.  Rep. No. 432, 99th Cong.,  2d Sess. 3, reprinted in 1986
                                                         reprinted in


         U.S. Code Cong. & Admin. News 2479, 2481.

         193. Electronic  Mail Letter  from  Rop  Gonggrijp  to  Brian  J.


         Peretti (Jan. 25, 1991) (concerning computer  viruses).  "We have


         to watch that  we keep telling people how  virusses work, because


         that  is the only solution to the  problem:  mystifying the whole


         thing ans just hunting down "computer  terrorists" is useless and


         (as proven in  the US and Germany) leads to  a questionable style


         of government in the field of information technology..." Id.
                                                                  Id.

         194. General  Accounting   Office,  Computer  Security:     Virus


         Highlights Need for Improved Internet Management, 25 (1989).