Presentation is loading. Please wait.

Presentation is loading. Please wait.

“The act of gaining unauthorized access to computer systems (cracking) should not be criminalized assuming that there is no damage.” Dan Garrison Megan.

Similar presentations


Presentation on theme: "“The act of gaining unauthorized access to computer systems (cracking) should not be criminalized assuming that there is no damage.” Dan Garrison Megan."— Presentation transcript:

1 “The act of gaining unauthorized access to computer systems (cracking) should not be criminalized assuming that there is no damage.” Dan Garrison Megan Kuhfeld Nicholas Kurtzman Kristin Cobb Marina Kukso Rob Dodson

2 Definitions “Damage” shall be defined as any political, emotional, physical, or financial harm that comes as a result of intentional or unintentional causes. “Damage” shall be defined as any political, emotional, physical, or financial harm that comes as a result of intentional or unintentional causes. “Unauthorized access” refers to any use of the information on a computer system without the consent and/or knowledge of the administrator of the system. “Unauthorized access” refers to any use of the information on a computer system without the consent and/or knowledge of the administrator of the system.

3 US Law The National Information Infrastructure Protection Act of 1996, the main law governing crimes committed through computers, does not prohibit unauthorized access to computer systems if no financial, health, or national security damage occurs as an intentional or unintentional result of the unauthorized access. We maintain that if there are no damages that can be proven by the owners of the cracked computer system then there is no reason for the cracker to be punished through the law because the cracker has committed no crime. The National Information Infrastructure Protection Act of 1996, the main law governing crimes committed through computers, does not prohibit unauthorized access to computer systems if no financial, health, or national security damage occurs as an intentional or unintentional result of the unauthorized access. We maintain that if there are no damages that can be proven by the owners of the cracked computer system then there is no reason for the cracker to be punished through the law because the cracker has committed no crime.

4 Implication 1: “The intent of the criminal and the extent of the malice has always played a crucial role in our system of criminal justice.” – Wayner “The intent of the criminal and the extent of the malice has always played a crucial role in our system of criminal justice.” – Wayner White Hat – Works with authorization of companies to explore and alert them of vulnerabilities White Hat – Works with authorization of companies to explore and alert them of vulnerabilities Gray Hat – Accesses system without proper authorization and alerts company of holes that could be exploited by malicious hackers Gray Hat – Accesses system without proper authorization and alerts company of holes that could be exploited by malicious hackers Black Hat – Accesses system without proper authorization and then alters/steals information for personal gain Black Hat – Accesses system without proper authorization and then alters/steals information for personal gain

5 Implication 2: Government’s unauthorized access is important for maintaining national security. Government’s unauthorized access is important for maintaining national security. Searching through people’s computers can give the government information as to people’s conspiracies to commit crimes. Searching through people’s computers can give the government information as to people’s conspiracies to commit crimes. This can save lives, financial assets, and emotional harm for the general public. This can save lives, financial assets, and emotional harm for the general public.

6 Implication 3: Sharing of intellectual property will allow for an accelerated development of the arts and sciences. Sharing of intellectual property will allow for an accelerated development of the arts and sciences. The idea behind patenting and copyrighting is to further the arts and the sciences. The idea behind patenting and copyrighting is to further the arts and the sciences. If people gain unauthorized access to other systems, find designs for products or software and help them with it. This would allow for more technology to come out into the market quicker and as long as the profits are split fairly no one loses. If people gain unauthorized access to other systems, find designs for products or software and help them with it. This would allow for more technology to come out into the market quicker and as long as the profits are split fairly no one loses. Otherwise, if the information is stolen then that would be in violation of intellectual property and damage will have been done. Therefore, this would be illegal according to the CFAA which states obtaining information from a computer through unauthorized access is illegal. In the case above no damage is done, this law prevents damage that could be done by stealing information. Otherwise, if the information is stolen then that would be in violation of intellectual property and damage will have been done. Therefore, this would be illegal according to the CFAA which states obtaining information from a computer through unauthorized access is illegal. In the case above no damage is done, this law prevents damage that could be done by stealing information.

7 Privacy Issues The consensus in the legal system (laws and court cases) is that a citizen has no reasonable expectation for privacy regarding information on their computer. The consensus in the legal system (laws and court cases) is that a citizen has no reasonable expectation for privacy regarding information on their computer. Former Cisco Systems, Inc. Accountants Sentenced for Unauthorized Access to Computer Systems to Illegally Issue Almost $8 Million in Cisco Stock to Themselves Former Cisco Systems, Inc. Accountants Sentenced for Unauthorized Access to Computer Systems to Illegally Issue Almost $8 Million in Cisco Stock to Themselves http://www.usdoj.gov/criminal/cybercrime/Osowski_TangSent.htm http://www.usdoj.gov/criminal/cybercrime/Osowski_TangSent.htm http://www.usdoj.gov/criminal/cybercrime/Osowski_TangSent.htm Jurors cleared Levine of 13 counts of unauthorized access of a protected computer, one conspiracy count and one count of money-laundering Jurors cleared Levine of 13 counts of unauthorized access of a protected computer, one conspiracy count and one count of money-laundering http://web.lexis- nexis.com/universe/document?_m=8c437c7f6b2ab8b95cc2598199de4a0f&_docnum=25&wchp=dGL bVtz-zSkVA&_md5=b2eee306042a9ab5602c2b032dc60824 http://web.lexis- nexis.com/universe/document?_m=8c437c7f6b2ab8b95cc2598199de4a0f&_docnum=25&wchp=dGL bVtz-zSkVA&_md5=b2eee306042a9ab5602c2b032dc60824


Download ppt "“The act of gaining unauthorized access to computer systems (cracking) should not be criminalized assuming that there is no damage.” Dan Garrison Megan."

Similar presentations


Ads by Google