?? computer chrime - current practices, problems and proposed so.txt
字號:
have been developed in South Africa, which destroys a computer's file allocation table. Id. Id. Some viruses also carry a message when they are activated. A virus that is though to have been developed by students at Wellington, New Zealand, tells the user that they have been "stoned" and requests that marijuana should be legalized. Id. Id. Approximately 80 or 90 of the 300 viruses counted for the IBM personal computer originated in Bulgaria according to Morton Swimmer of Germany's Hamburg University Virus Test Center. 23. A report in La Liberation, a French newspaper, stated that La Liberation computer viruses could be planted in French EXOCET missiles to misguide them when fired. La Liberation, Jan. 10, 1991, reprinted in Klaus Brunnstein, Risks-Forum, vol. 10, iss. 78, reprinted in Jan. 22 1991 (available at American Journal of International Law and Policy Office). 24. A "trojan horse" is a program that does not seem to be infected, however, when used in a computer, the virus is then transferred the uninfected machine. On trojan horse destroyed 168,000 files in Texas. Commitment to Security, 34 (1989). 25. Ring, Computer Viruses; Once Revered as Hackers, Technopaths Computer Viruses; Once Revered as Hackers, Technopaths Threaten Security of Computer-Dependent Society, ComputerGram, Threaten Security of Computer-Dependent Society July 7, 1989. 26. Highland, One Wild Computer "Worm" Really Isn't a Federal One Wild Computer "Worm" Really Isn't a Federal Case, Newsday, Jan. 23, 1990, 51. Case 27. Stoll, at 346. The amount of computers that were actually infected by the worm is still the subject of debate. Mr. Stoll estimates that 2,000 computers where infected, while the most commonly cited number is 6,000. Commitment to Security, 34 (1989). The 6,000 estimate was based on an Massachusetts Institute of Technology estimate that 10 percent of the machines at the school were infected and was then inferred to the total number of machines across the country that were affected. General Accounting Office, Computer Security: Virus Highlights Need for Improved Internet Management, 17 (1989). This number may be inaccurate because not all locations had the same amount of vulnerable machines. Id. Id. 28. For the first eight months of 1988, there were 800 incidents concerning computer viruses. Commitment to Security, 34. The Computer Virus Industry Association reported that 96 percent of these reported infections were incorrectly identified as viruses. Id. Id. 29. Robinson, Virus Protection for Network Users, Washington Post, Washington Business, p.44, Feb. 11, 1991. 30. Ross, Hacking Away at the Counterculture, 3 (1990) (available at the American University Journal of International Law and Policy). On Saturday Night Live, during the news update segment, Dennis Miller stated, in comparing a computer viruses to the AIDS virus, "Remember, when you connect with another computer, you're connecting to every computer that computer has ever been connected to." Id. Id. 31. Id. at 8-9. Id. 32. Computer Virus Legislation, Hearing on H.R. 55 and H.R. 287 before the Subcomm. on Criminal Justice of the House Comm. on the Judiciary, 100th Cong., 1st Sess. 49 (1989) (statement of Marc Rotenberg, Director, Computer Professionals for Social Responsibility). In Israel, Hebrew University used a computer virus to detect and destroy a virus that would have destroyed data files. Id. Id. 33. Computergram International, October 14, 1990. 34. 35. Watts, Fears of Computer Virus Attack from East Europe grow, Fears of Computer Virus Attack from East Europe grow The Independent, November 24, 1990, p.6. On a trip to Bulgaria, a British computer consultant returned with 100 viruses that do not exist in the West. Id. Id. 36. Id. 37. McGourty, When a Hacker Cracks the Code, The Daily Telegraph When a Hacker Cracks the Code (London), October 22, 1990, p. 31. 38. The equipment would cost about 50 (British) pounds. Id. Id. 39. Id. A British company, has stated that they have developed Id. a glass that will reduce this problem. Tieman, Spy-Proof Glass to Beat the Hackers, The (London) Times, Jan 17, 1991. A more recent problem concerns the ability of computer hackers to access into fax machines and either change or reroute information from the machine. Becket, Espionage fears mounting as Espionage fears mounting as hackers tap into faxes, The Daily Telegraph (London), December 1, hackers tap into faxes 1990, p. 23. This problem can be circumvented by the use of encryption devices or passwords on the machine. Id. Id. 40. Stoll at 9. The word itself originally had two meanings. People originally called themselves hackers were software wizards who thoroughly knew computer systems. Id. In U.S. v. Riggs, 739 U.S. v. Riggs F. Supp. 414, 423 (N.D. Ill. 1990) the court defined hackers as "individuals involved with the unauthorized access of comp
?? 快捷鍵說明
復制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -