Laws Against Computer Hacking

Slides:



Advertisements
Similar presentations
The Digital Millennium Copyright Act and Liability for Hosting and Linking Mark D. Robins Nixon Peabody LLP.
Advertisements

Do the anti-circumvention provisions of the Digital Millennium Copyright (DMCA) Act further or harm public interests?
The Digital Millennium Copyright Act Questions and Critical Observations Max Vilimpoc Washington Internship for Students of Engineering.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
Real Life and in the Virtual World Presented by: Jessica Antes Jennifer Conley Richard Morris Stephanie Schossow Zonia Yee MIS 304 Professor Fang Fang.
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
Cybercrime and Cyberrelated Crimes Home. Background Cybercrime before networked computers Cybercrime before networked computers Hacker: now a pejorative.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
Security, Privacy, and Ethics Online Computer Crimes.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
The DMCA after 1000 days; an ISP’s perspective David Bowie Operations Security.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
General Awareness Training
General Purpose Packages
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
NEW SOLUTIONS FOR A DIGITAL WORLD Angela Teal LIBM 6320 FALL 2011.
Controlling Access to Copyrighted Works Digital Millennium Copyright Act.
COPYRIGHT LAW 2004 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Unethical use of Computers and Networks
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
COPYRIGHT LAW 2003 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Copyrights on the internet vincent yee. Digital Millennium Copyright Act October 28, 1998, President Clinton signed the Act into law.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Digital Audio. Analog versus Digital Analog Sound waves “similar” or “copy” Electrical impedance creates noise Digital Sound encoded in binary form Sampled.
CRIMES Used by permission. For Educational purposes only.
Chap1: Is there a Security Problem in Computing?.
Lecture on Internet Issues and Laws. Topics What is Open source ? What is Open source ? What are the Copyright Issues? What are the Copyright Issues?
CONTROLLING INFORMATION SYSTEMS
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Chapter 10 – Crimes Against Property. Arson The willful and malicious burning of a person’s property Intentionally burning a building to defraud the insurance.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cyber Law And Ethics And Ethics.
The Section 1201 Rulemaking Jonathan Band Jonathan Band PLLC
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
18 USC § 1030 Computer Fraud and Abuse Act
Hacking: public policy
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
A Project on CYBER SECURITY
Network security threats
Legal and Ethical Issues in Computer Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Chapter 11 crime and security in the networked economy
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
COMPUTER CRIME.
Update on the Computer Fraud and Abuse Act
A Gift of Fire Third edition Sara Baase
Societal Issues in Computing (COMP466)
Protecting Yourself from Fraud including Identity Theft
HOW DO I KEEP MY COMPUTER SAFE?
Faculty of Science IT Department By Raz Dara MA.
Forensic and Investigative Accounting
Lesson 2- Protecting Yourself Online
The Legalities of Technicalities task 4
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Laws Against Computer Hacking By Doug Lee

Overview The term Hacking Good example of a hacker Computer Fraud and Abuse Act of 1986 Digital Millennium Copyright Act of 1998 Exemptions from the Law

The term “Hacking” Typing? Or Criminal Activity? “In the past decade, however, "hacker" has come to describe those people with a hands-on interest in computer security and circumventing such security. “

Kevin Mitnick a.k.a Condor FBI’s number one most wanted Nickname “The Lost Boy of Cyberspace” Captured February 1995 25 counts of federal computer and wire fraud

The Computer Fraud and Abuse Act of 1986 Why signed into law? Three offenses Misdemeanor trafficking in computer passwords Felony unauthorized access in federal interest computers Felony “malicious damage”

Federal interest Computer Defintion of Federal Interest Computer "exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government, and the conduct constituting the offense affects such use, or which is one of two or more computers used in committing the offense, not all of which are located in the same State.“ Examples: Banks, Federal Reserve, Depart of Defense etc…..

Felonies Unauthorized Access with intention to commit fraudulent theft Address "malicious damage” Victim loss of $1000 or more Except medical cases Five years for first felony Ten years for the second felony

Misdemeanor Intent to commit fraud affecting interstate commerce computer passwords are revealed Message boards Disposes passwords to another person

Examples Herbert Zin a.k.a “shadowhawk” Robert Morris First violator Broke into AT&T, Department of Defense Sentenced nine months and $10,000 fine Robert Morris Launched worm virus Three years probation, 400 hours community service, $10,000

Digital Millennium Copyright Act of 1998 Signed on October 28,1998 by President Clinton Divides into Five Titles WIPO Copyright and Performances and Phonograms Treaties Implementation Act of 1998 Online Copyright Infringement Liability Limitation Act Computer Maintenance Competition Assurance Act Miscellaneous Provisions Vessel Hall Design Protection Act

Security Testing security testing means “ accessing a computer, computer system, or computer network, solely for the purpose of good faith testing, investigating, or correcting, a security flaw or vulnerability, with the authorization of the owner or operator of such computer, computer system, or computer network” Security testing Information used To promote the security Does not infringe the violation of privacy or breach of security Vulnerabilities must be told to developer Ex. HP threatens to sue researchers Tru64 operating system

Encryption Research the term `encryption research' means activities necessary to identify and analyze flaws and vulnerabilities of encryption technologies applied to copyrighted works exemptions Act of good faith to get authorization Information obtained Used to advance the state of knowledge or development of encryption technology legitimate course of study, employment or training Ex. Dmitry Sklyarov

Computer Maintenance Competition Assurance Act Allows a person to make a copy Only for maintenance purposes After fixed, must be destroyed

Online Copyright Infringement Liability Limitation Act Transitory Communications System Caching Storage of Information on Systems or networks at the direction of users Information Location Tools

Other uses of the DMCA restricts code that "is primarily designed or produced for the purpose of circumventing protection" of copyrighted works crime to circumvent anti-piracy measures built in software Outlaws code-cracking devices

Conclusions Are the laws too broad in Computing? Need more provisions? Security testing Researching Do the laws really help prevent hacking? Reasons for hacking Theft of services e.g. America online Take valuable files e.g. credit card numbers Vengence or hate Thrill and Excitement Recognition

Recognition “All the hackers out there figure if they can hack Kevin Mitnick's site, they're the king of the hill.” -- Kevin Mitnick