IYIR for HTML

Total Page:16

File Type:pdf, Size:1020Kb

IYIR for HTML INFOSEC Year in Review 1997 M. E. Kabay, PhD, CISSP Assoc. Prof. Information Assurance Dept. of Computer Information Systems, Division of Business Norwich University [email protected] Copyright © 2003 M. E. Kabay. All rights reserved. Page 1 INFOSEC Year in Review 1997 11 Breaches of confidentiality Category 11 Breaches of confidentiality 1997-02-23 medical data confidentiality PA News In Sheffield, England, a hospital handed over 50,000 confidential gynecological records to a data processing firm that hired people off the street and set them to work transcribing the unprotected data. The scandal resulted in withdrawal of the contract, but thousands of records were exposed to a wide variety of people with no background checking to ascertain their reliability. Category 11 Breaches of confidentiality 1997-04-08 QA operations security confidentiality AP, Reuters The General Accounting Office lambasted the IRS for improper operations security, saying that the IRS "misplaced" 6,000 computer tapes and cartridges. Sen. John Glenn (D-OH), who released the report, also introduced a bill to define criminal penalties against IRS employees who snoop into taxpayer records without cause. Glenn said that out of 1,515 cases of unauthorized browsing identified in the 1994 and 1995 fiscal years at the IRS, only 23 employees were fired for the activity. Category 11 Breaches of confidentiality 1997-04-30 medical confidentiality AIDS database UPI Greg Wentz was found guilty of anonymously mailing a list of 4,000 names of people with AIDS to two Florida newspapers. It turned out that he was acting vindictively to punish his ex-lover, William Calvert III. Calvert was also charged with a misdemeanor for misusing the list, which he obtained at work in the Pinellas County Health Department. Wentz faces up to 60 days in jail and up to $500 in fines. Copyright © 2003 M. E. Kabay. All rights reserved. Page 2 INFOSEC Year in Review 1997 11.1 Data leakage Category 11.1 Data leakage 1997-07-02 medical informatics telemedicine Australian A report by Trudy Harris in _The Australian_ reviewed risks of telemedicine, a technology of great value in Australia because of great distances and sparse population. Risks included interception of unencrypted medical information, modification of critical parameters for patient care, and unauthorized access to confidential patient records. Category 11.1 Data leakage 1997-07-10 hacker password attack Wall Street Journal Mark Abene, a security expert formerly known to the underground as Phiber Optik, launched a command to check a client's password files — and ended up broadcasting the instruction to thousands of computers worldwide. Many of the computers obligingly sent him their password files. Abene explained that the command was sent out because of a misconfigured system and that he had no intention of generating a flood of password files into his mailbox. Jared Sandberg, Staff Reporter for the The Wall Street Journal, wrote, "A less ethical hacker could have used the purloined passwords to tap into other people's Internet accounts, possibly reading their e-mail or even impersonating them online." Mr Abene was a member of the Masters of Deception gang and was sentenced to a year in federal prison for breaking into telephone company systems. The accident occurred while he was on parole. Category 11.1 Data leakage 1997-07-19 confidentiality error Telecomworldwire A firm of accountants received passwords and other confidential codes from British Inland Revenue. Government spokesmen claimed it was an isolated incident. [How exactly did they know that it was an isolated incident?] Category 11.1 Data leakage 1997-08-07 privacy journalists Internet Reuters; RISKS 19 28 The ICSA's David Kennedy reported on a problem in Hong Kong, where Reuters described a slip that revealed personal details about hundreds of journalists at the end of June. Passport and identity-card details were revealed on the government Website for a couple of days. DK commented, "I suppose that's one way to get the media interested in privacy matters." Category 11.1 Data leakage 1997-08-15 privacy credit reports database AP, EDUPAGE Experian Inc. (formerly TRW Information Systems & Services), a major credit information bureau, discontinued its online access to customers' credit reports after a mere two days when at least four people received reports about other people. Copyright © 2003 M. E. Kabay. All rights reserved. Page 3 INFOSEC Year in Review 1997 11.2 Unauthorized disclosure Category 11.2 Unauthorized disclosure 1997-08-28 privacy Web EDUPAGE According to an independent group that monitors government activities, US federal Web sites are failing to protect user privacy. OMB Watch said, "There is no government-wide policy regarding privacy concerns on federal Web sites... Agencies collect personal information about visitors to their Web sites, but fail to tell them why that information is being collected and what it is being used for." After the report, three agencies that were collecting cookies files stopped doing so. Category 11.2 Unauthorized disclosure 1997-09-08 SSN privacy RISKS, EPIC Alert, AP 19 37 In September, six months after its ill-fated implementation of online access to the Personal Earnings and Benefits Estimate Statement (PEBES) service, the Social Security Administration announced its revised system. The most important change was that sensitive data such as the detailed earnings report would be available only by snail-mail; in addition, the system would impose a strict limit on the amount of information available online to any one requestor. Privacy advocates such as Marc Rotenberg of the Electronic Privacy Information Center (EPIC) congratulated the SSA on the improvements and praised it for consulting with the public. Copyright © 2003 M. E. Kabay. All rights reserved. Page 4 INFOSEC Year in Review 1997 11.3 Data theft Category 11.3 Data theft 1997-07-10 Web vandalism hackers credit card AP In early July, 2397 customers of the ESPN Sportszone and nba.com received anonymous letters containing the last eight digits of their own credit cards. Both Web sites were sited on the Starwave hosting service. The message said, "You are the victim of a careless abuse of privacy and security. This is one of the worst implementations of security we've seen." The perpetrators claimed to be "an anonymous organization seeking to make the Internet a safe place for the consumer to do business." Although none of the credit card numbers seemed to have been used fraudulently, Starwave managers warned customers to get new credit card numbers as a precaution. Copyright © 2003 M. E. Kabay. All rights reserved. Page 5 INFOSEC Year in Review 1997 12.1 Wiretapping Category 12.1 Wiretapping 1997-01-16 wiretaps law enforcement rules proposal EDUPAGE EDUPAGE reports: >The Federal Bureau of Investigation has released for public comment a new proposal for facilitating tapping of digital phone calls by law enforcement officials armed with court orders. Under the new proposal, which is significantly more modest than what the Bureau had asked for in a earlier plan, law enforcement officials would operate under a formula in which (for example) 523 phone lines could be monitored simultaneously in a place such as Manhattan. Privacy advocates oppose the FBI's plan as an unacceptable expansion of electronic surveillance. (New York Times 15 Jan 97 A8)< Category 12.1 Wiretapping 1997-02-18 wiretapping infowar court investigation Reuters In France, the equivalent of the supreme court examined the legality of an inquiry into illegal wiretapping allegedly carried out by a government anti-terrorism unit. The unit was active in the administration of the late François Mitterand. Category 12.1 Wiretapping 1997-05-29 wiretapping eavesdropping privacy telephones government investigation Reuters Government officials in Lebanon acknowledged for the first time that cellular phones and land lines were being systematically y tapped and the findings being distributed within the government. A parliamentary committee was formed to investigate the situation. Category 12.1 Wiretapping 1997-08-08 FBI wiretap warrant surveillance Internet phone Inter@ctive Week Online Law enforcement agencies have long been able to obtain a tap-and-trace authorization from any local U.S. attorney. However, to be able to install a wiretap that would allow monitoring of conversations requires police to obtain authorization from a judge. As phone companies move towards sending speech over the Internet, tap-and-trace orders can actually provide full access to conversations being sent over the Net. Civil libertarians are concerned about a possible abuse of privacy; the Center for Democracy and Technology (CDT) and the Electronic Frontier Foundation (EFF) have both expressed concerns to the Federal Communications Commission. The ACLU is also concerned about the FBI's new wiretap policy. Category 12.1 Wiretapping 1997-08-16 wiretap bug phone eavesdropping UPI A Dallas Schools Superintendant, Yvonne Gonzalez, caused anger among some employees by pursuing an investigation of corruption in the system. In mid-August, she was shocked to find possible evidence of a temporary bug on her phone — a couple of soldered wires. No other evidence of wire-tapping was found. Copyright © 2003 M. E. Kabay. All rights reserved. Page 6 INFOSEC Year in Review 1997 12.2 Interception Category 12.2 Interception 1997-02-06 cellular eavesdropping scanners AP Rep. Billy Tauzin, a Congressman from Louisiana, demonstrated to the House Commerce Telecommunications Subcommittee that an off-the-shelf police-frequency scanner can be modified to capture cellular phone calls in two minutes using a soldering iron and a two-inch wire. He then showed on the spot that the modified scanner could pick up a conversation between a cell- phone user and a regular telephone. The subcommittee is studying proposals to toughen enforcement of the law sponsored in 1992 by Rep.
Recommended publications
  • Ethical Hacking
    International Journal of Scientific & Engineering Research, Volume 8, Issue 4, April-2017 ISSN 2229-5518 92 Ethical Hacking N.Vinodh Kumar, J.Arun Kumar ABSTRACT Ethical hacking and ethical hacker are terms used to describe hacking performed by a company or individual to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. This information is then used by the organization to improve the system security, in an effort to minimize or eliminate any potential attacks. Types of hacking; Website Hacking, Network Hacking, Email Hacking, Ethical Hacking Password Hacking, Computer Hacking. Hackers type; White hat hackers, Black hat hackers, Grey hat hackers, miscellaneous hackers, Red hat hacker. Keywords- Ethical hacking, Website hacking, Network hacking —————————— —————————— Security Strategy for Predictive Systems' Global Integrity consulting practice, ethical hacking has continued to grow ETHICAL HACKING in an otherwise lackluster IT industry, and is becoming increasingly common outside the government and Ethical hacking is one of the certified any hacking to the technology sectors where it began. Many large companies, computer to important files to hacking. Hacking refers to an such as IBM, maintain employee teams of ethical hackers. array of activities which are done to intrude some one else’s personal information space so as to use it for malicious, FAMOUS HACKERS IN HISTORY unwanted purposes.Hacking is a term used to refer to activities aimed at exploiting security flaws to obtain IAN MURPHY critical information for gaining access to secured networks. KEVIN MITNICK JOHAN HELSINGUIS WEBSITE HACKING LINUS TORVALDS MARK ABENE Hacking a website means taking control from the website ROBERT MORRIES owner to a person who hackers the website.
    [Show full text]
  • Ethical Hacking
    International Journal of Scientific and Research Publications, Volume 5, Issue 6, June 2015 1 ISSN 2250-3153 Ethical Hacking Susidharthaka Satapathy , Dr.Rasmi Ranjan Patra CSA, CPGS, OUAT, Bhubaneswar, Odisha, India Abstract- In today's world where the information damaged the target system nor steal the information, they communication technique has brought the world together there is evaluate target system security and report back to the owner one of the increase growing areas is security of network ,which about the threats found. certainly generate discussion of ETHICAL HACKING . The main reason behind the discussion of ethical hacking is insecurity of the network i.e. hacking. The need of ethical hacking is to IV. FATHER OF HACKING protect the system from the damage caused by the hackers. The In 1971, John Draper , aka captain crunch, was one of the main reason behind the study of ethical hacking is to evaluate best known early phone hacker & one of the few who can be target system security & report back to owner. This paper helps called one of the father's of hacking. to generate a brief idea of ethical hacking & all its aspects. Index Terms- Hacker, security, firewall, automated, hacked, V. IS HACKING NECESSARY crackers Hacking is not what we think , It is an art of exploring the threats in a system . Today it sounds something with negative I. INTRODUCTION shade , but it is not exactly that many professionals hack system so as to learn the deficiencies in them and to overcome from it he increasingly growth of internet has given an entrance and try to improve the system security.
    [Show full text]
  • Paradise Lost , Book III, Line 18
    _Paradise Lost_, book III, line 18 %%%%%%%%%%%%%%%%%%%%%%%% ++++++++++Hacker's Encyclopedia++++++++ ===========by Logik Bomb (FOA)======== <http://www.xmission.com/~ryder/hack.html> ---------------(1997- Revised Second Edition)-------- ##################V2.5################## %%%%%%%%%%%%%%%%%%%%%%%% "[W]atch where you go once you have entered here, and to whom you turn! Do not be misled by that wide and easy passage!" And my Guide [said] to him: "That is not your concern; it is his fate to enter every door. This has been willed where what is willed must be, and is not yours to question. Say no more." -Dante Alighieri _The Inferno_, 1321 Translated by John Ciardi Acknowledgments ---------------------------- Dedicated to all those who disseminate information, forbidden or otherwise. Also, I should note that a few of these entries are taken from "A Complete List of Hacker Slang and Other Things," Version 1C, by Casual, Bloodwing and Crusader; this doc started out as an unofficial update. However, I've updated, altered, expanded, re-written and otherwise torn apart the original document, so I'd be surprised if you could find any vestiges of the original file left. I think the list is very informative; it came out in 1990, though, which makes it somewhat outdated. I also got a lot of information from the works listed in my bibliography, (it's at the end, after all the quotes) as well as many miscellaneous back issues of such e-zines as _Cheap Truth _, _40Hex_, the _LOD/H Technical Journals_ and _Phrack Magazine_; and print magazines such as _Internet Underground_, _Macworld_, _Mondo 2000_, _Newsweek_, _2600: The Hacker Quarterly_, _U.S. News & World Report_, _Time_, and _Wired_; in addition to various people I've consulted.
    [Show full text]
  • Tangled Web : Tales of Digital Crime from the Shadows of Cyberspace
    TANGLED WEB Tales of Digital Crime from the Shadows of Cyberspace RICHARD POWER A Division of Macmillan USA 201 West 103rd Street, Indianapolis, Indiana 46290 Tangled Web: Tales of Digital Crime Associate Publisher from the Shadows of Cyberspace Tracy Dunkelberger Copyright 2000 by Que Corporation Acquisitions Editor All rights reserved. No part of this book shall be reproduced, stored in a Kathryn Purdum retrieval system, or transmitted by any means, electronic, mechanical, pho- Development Editor tocopying, recording, or otherwise, without written permission from the Hugh Vandivier publisher. No patent liability is assumed with respect to the use of the infor- mation contained herein. Although every precaution has been taken in the Managing Editor preparation of this book, the publisher and author assume no responsibility Thomas Hayes for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein. Project Editor International Standard Book Number: 0-7897-2443-x Tonya Simpson Library of Congress Catalog Card Number: 00-106209 Copy Editor Printed in the United States of America Michael Dietsch First Printing: September 2000 Indexer 02 01 00 4 3 2 Erika Millen Trademarks Proofreader Benjamin Berg All terms mentioned in this book that are known to be trademarks or ser- vice marks have been appropriately capitalized. Que Corporation cannot Team Coordinator attest to the accuracy of this information. Use of a term in this book should Vicki Harding not be regarded as affecting the validity of any trademark or service mark. Design Manager Warning and Disclaimer Sandra Schroeder Every effort has been made to make this book as complete and as accurate Cover Designer as possible, but no warranty or fitness is implied.
    [Show full text]
  • Editorial Sommaire
    www.grasco.eu Parution trimestrielle www.larevuedugrasco.eu N°8— Février 2014 gratuite EDITORIAL SOMMAIRE EDITO1 Vers une directive « investigations fi- INTERVIEW : nancières » pour lutter contre le déve- EMILE PEREZ, DIRECTEUR DE LA COOPÉRATION INTER- NATIONALE4 loppement de l’économie criminelle ? . JACQUES BARROT, MEMBRE DU CONSEIL CONSTITU- TIONNEL, ANCIEN VICE-PRÉSIDENT DE LA COMMISSION EUROPÉENNE, CHARGÉ DE JUSTICE, LIBERTÉ ET SÉCU- RITÉ8 e CEIFAC accueillera, à Strasbourg, sa seconde promotion, RAPPORTS : DESSINER LE MINISTÈRE PUBLIC DE DEMAIN, À PROPOS du 17 mars au 4 avril 2013, formée de 30 représentants des DU RAPPORT NADAL, PAR MYRIAM QUÉMÉNER9 autorités de justice/police-gendarmerie/Douanes et Rensei- L CONSTATS ET PRÉCONISATIONS : gnement des Etats membres de l’Union européenne. DU RAPPORT NORA-MINC À LA LUTTE CONTRE LA CYBERCRIMINALITÉ, PAR ANNE SOUVIRA11 Créé eu sein de l’Université de Strasbourg dans le cadre d’un parte- PHÉNOMÉNOLOGIE DE LA CRIMINOLOGIE ORGANISÉE : nariat européen, le CEIFAC vise à promouvoir, au sein des Etats LES ESCROQUERIES AUX FAUX ORDRES DE VIREMENT, membres, le développement des investigations financières et de PAR PHILIPPE PETITPREZ16 FINANCE ET CRIME : PUISSANCES, HYBRIDATIONS, l’analyse financière dans le but de mieux lutter contre le dévelop- CONVERGENCES, PAR JEAN-FRANÇOIS GAYRAUD22 pement de l’infiltration de l’économie par des flux d’argent illicite. BLANCHIMENT D’ARGENT, UN NOUVEAU FLÉAU POUR Elles doivent également permettre de déjouer les fraudes finan- LES PARIS SPORTIFS, PAR CHRISTIAN KALB ET PIM VERSCHUUREN25 cières de grande envergure considérées comme étant en partie res- LA PRODUCTION ET LE TRAFIC DE CANNABIS DANS LE ponsables de la crise économique actuelle et qui menacent de dé- SUD DES BALKANS, PAR CYRILLE BAUMGARTNER31 stabiliser les systèmes financiers à l’échelle internationale.
    [Show full text]
  • Introduction
    Introduction Toward a Radical Criminology of Hackers In the expansive Rio Hotel and Casino in Las Vegas, I stood in line for around an hour and a half to pay for my badge for admittance into DEF CON 21, one of the largest hacker conventions in the world. The wad of cash in my hand felt heavier than it should have as I approached the badge vendor. DEF CON is an extravagant affair and attendees pay for it (though, from my own readings, the conference administrators work to keep the costs reduced). The line slowly trickled down the ramp into the hotel con- vention area where the badge booths were arranged. As I laid eyes on the convention, my jaw dropped. It was packed. Attendees were already mov- ing hurriedly throughout the place, engaged in energetic conversations. Black t- shirts— a kind of hacker uniform— were everywhere. Las Vegas- and gambling- themed décor lined the walls and floors. Already, I could see a line forming at the DEF CON merchandise booth. Miles, a hacker I had gotten to know throughout my research, mentioned that if I wanted some of the “swag” or “loot” (the conference merchandise), I should go ahead and get in line, a potential three- to four-hour wait. Seemingly, everyone wanted to purchase merchandise to provide some evidence they were in attendance. Wait too long and the loot runs out. After winding through the serpentine line of conference attendees wait- ing for admittance, I approached the badge vendors and (dearly) departed with almost $200. Stepping into the convention area, I felt that loss in the pit of my stomach.
    [Show full text]
  • Basics of Ethical Hacking – Manthan M. Desai
    Hacking For Beginners – Manthan Desai 2010 Legal Disclaimer Any proceedings and or activities related to the material contained within this book are exclusively your liability. The misuse and mistreat of the information in this book can consequence in unlawful charges brought against the persons in question. The authors and review analyzers will not be held responsible in the event any unlawful charges brought against any individuals by misusing the information in this book to break the law. This book contains material and resources that can be potentially destructive or dangerous. If you do not fully comprehend something on this book, don‘t study this book. Please refer to the laws and acts of your state/region/ province/zone/territory or country before accessing, using, or in any other way utilizing these resources. These materials and resources are for educational and research purposes only. Do not attempt to violate the law with anything enclosed here within. If this is your intention, then leave now. While using this book and reading various hacking tutorials, you agree to follow the below mentioned terms and conditions: 1. All the information provided in this book is for educational purposes only. The book author is no way responsible for any misuse of the information. 2. "Hacking for Beginners” is just a term that represents the name of the book and is not a book that provides any illegal information. “Hacking for Beginners” is a book related to Computer Security and not a book that promotes hacking/cracking/software piracy. 3. This book is totally meant for providing information on "Computer Security”, "Computer Programming” and other related topics and is no way related towards the terms "CRACKING” or "HACKING” (Unethical).
    [Show full text]
  • What Are Kernel-Mode Rootkits?
    www.it-ebooks.info Hacking Exposed™ Malware & Rootkits Reviews “Accessible but not dumbed-down, this latest addition to the Hacking Exposed series is a stellar example of why this series remains one of the best-selling security franchises out there. System administrators and Average Joe computer users alike need to come to grips with the sophistication and stealth of modern malware, and this book calmly and clearly explains the threat.” —Brian Krebs, Reporter for The Washington Post and author of the Security Fix Blog “A harrowing guide to where the bad guys hide, and how you can find them.” —Dan Kaminsky, Director of Penetration Testing, IOActive, Inc. “The authors tackle malware, a deep and diverse issue in computer security, with common terms and relevant examples. Malware is a cold deadly tool in hacking; the authors address it openly, showing its capabilities with direct technical insight. The result is a good read that moves quickly, filling in the gaps even for the knowledgeable reader.” —Christopher Jordan, VP, Threat Intelligence, McAfee; Principal Investigator to DHS Botnet Research “Remember the end-of-semester review sessions where the instructor would go over everything from the whole term in just enough detail so you would understand all the key points, but also leave you with enough references to dig deeper where you wanted? Hacking Exposed Malware & Rootkits resembles this! A top-notch reference for novices and security professionals alike, this book provides just enough detail to explain the topics being presented, but not too much to dissuade those new to security.” —LTC Ron Dodge, U.S.
    [Show full text]
  • Infosec Year in Review -- 1999
    InfoSec Year In Review -- 1999 M. E. Kabay, PhD, CISSP. Security Leader, INFOSEC Group, AtomicTangerine Inc. Category 11 Breaches of confidentiality Date 1999-01-29 Keyword data leakage privacy confidentiality control Web Source, Vol, No. RISKS 20 18 The Canadian consumer-tracking service Air Miles inadvertently left 50,000 records of applicants for its loyalty program publicly accessible on their Web site for an undetermined length of time. The Web site was offline as of 21 January until the problem was fixed. Date 1999-02-03 Keyword data leakage Web script QA vulnerability confidentiality Source, Vol, No. WIRED via PointCast An error in the configuration or programming of the F. A. O. Schwarz Web site resulted paradoxically in weakening the security of transactions deliberately completed by FAX instead of through SSL. Customers who declined to send their credit-card numbers via SSL ended up having their personal details — address and so forth — stored in a Web page that could be accessed by anyone entering a URL with an appropriate (even if randomly chosen) numerical component. Date 1999-02-10 Keyword e-commerce credit card personal information password privacy Source, Vol, No. RISKS 20 20 Prof. Ross Anderson of Cambridge University analyzed requirements on the AMAZON.COM online bookstore for credit card number, password, and personal details such as phone number. He identified several risks: (1) merchant retention of credit card numbers poses a far higher risk of capture than of capture in transit; (2) adding a password increases the likelihood of compromise because so many naïve users choose bad passwords and then write them down; (3) even the British site for Amazon contravenes European rules on protecting consumer privacy; (3) such practices make it easier for banks to reject their clients' claims of fraudulent use of their credit-card numbers.
    [Show full text]
  • Index Images Download 2006 News Crack Serial Warez Full 12 Contact
    index images download 2006 news crack serial warez full 12 contact about search spacer privacy 11 logo blog new 10 cgi-bin faq rss home img default 2005 products sitemap archives 1 09 links 01 08 06 2 07 login articles support 05 keygen article 04 03 help events archive 02 register en forum software downloads 3 security 13 category 4 content 14 main 15 press media templates services icons resources info profile 16 2004 18 docs contactus files features html 20 21 5 22 page 6 misc 19 partners 24 terms 2007 23 17 i 27 top 26 9 legal 30 banners xml 29 28 7 tools projects 25 0 user feed themes linux forums jobs business 8 video email books banner reviews view graphics research feedback pdf print ads modules 2003 company blank pub games copyright common site comments people aboutus product sports logos buttons english story image uploads 31 subscribe blogs atom gallery newsletter stats careers music pages publications technology calendar stories photos papers community data history arrow submit www s web library wiki header education go internet b in advertise spam a nav mail users Images members topics disclaimer store clear feeds c awards 2002 Default general pics dir signup solutions map News public doc de weblog index2 shop contacts fr homepage travel button pixel list viewtopic documents overview tips adclick contact_us movies wp-content catalog us p staff hardware wireless global screenshots apps online version directory mobile other advertising tech welcome admin t policy faqs link 2001 training releases space member static join health
    [Show full text]
  • Applying the Computer Fraud and Abuse Act to the Internet Jo-Ann M
    Santa Clara High Technology Law Journal Volume 12 | Issue 2 Article 5 January 1996 Controlling Cyberspace: Applying the Computer Fraud and Abuse Act to the Internet Jo-Ann M. Adams Follow this and additional works at: http://digitalcommons.law.scu.edu/chtlj Part of the Law Commons Recommended Citation Jo-Ann M. Adams, Controlling Cyberspace: Applying the Computer Fraud and Abuse Act to the Internet, 12 Santa Clara High Tech. L.J. 403 (1996). Available at: http://digitalcommons.law.scu.edu/chtlj/vol12/iss2/5 This Comment is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara High Technology Law Journal by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. COMMENTS CONTROLLING CYBERSPACE: APPLYING THE COMPUTER FRAUD AND ABUSE ACT TO THE INTERNET* Jo-Ann M. Adamst TABLE OF CONTENTS INTRODUCTION .............................................. 404 I. THE INTERNET ...................................... 405 A. The Development of the Internet ................. 405 B. The Internet Today .............................. 406 C. Anarchy on the Internet ......................... 408 D. Crimes on the Internet .......................... 409 1. Computer crimes ............................ 409 2. Fraud ....................................... 411 3. Noncomputer Crime ......................... 412 E. Struggle within the Anarchy: Combatting Crime versus Individual Freedom ....................... 416 1. Combating Crime ........................... 416 2. Individual Freedom ......................... 417 F. The Need for Legislation ........................ 419 H-. THE COMPUTER FRAUD AND ABUSE ACT (18 U.S.C. § 1030) ............................................. 420 A. The Computer Fraud and Abuse Act of 1984 ..... 420 B. Criticism of the 1984 Act ........................ 422 C. The Computer Fraud and Abuse Act of 1986 ....
    [Show full text]
  • Is Computer Hacking a Crime." First Appeared in Harper's Magazine (March 1990: 45-55, 57
    Hackers (roundtable) "Is Computer Hacking a Crime." first appeared in Harper's Magazine (March 1990: 45-55, 57. Though the editors' introduction to the roundtable is informative, it does not tell enough. Throughout the discussion, if the reader is aware 0f what has taken place following it, is a great concern for what Bruce Sterling refers to as the "hacker crackdown" (in his book 0f the same title) on the hackers. A truncated version of the crackdown story goes like this: There was much concern shown by John Perry Harlow and hackers across the country about the number of federal crackdowns, and in December 1989 they were invited by Harper's Magazine to discuss the issue on the WELL. Such hackers (crackers?) as "Phiber Optik" and "Acid Phreak" made their appearance to discuss such questions as whether there is a "hacker ethic" and whether hacking is a crime. Shortly thereafter, 0n January 24, 1990, the federal government and New York State police raided the homes of Phiber Optik, Acid Phreak, and another hacker. Optik (Mark Abene) was not charged in this raid until a year later and then only with a mis- demeanor. The raids escalated: March 1, 1991, has come to be known as the day of the "Steve Jackson Games" raid in Austin, Texas, and then, on May 7 through 9, came the "Operation Sundevil" raids all across the country. These raids make up the hacker crackdown, in June of the same year, they led to the creation of the EFF by Barlow and Mitchell Kapor. The image of the computer hacker drifted into public awareness in the mid-seventies, when reports of Chinese-food consuming geniuses working compulsively at keyboards began to issue from MIT.
    [Show full text]