亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? morris~1.txt

?? 黑客培訓教程
?? TXT
?? 第 1 頁 / 共 3 頁
字號:
 anonymous message from Harvard over the network, instructing programmers how to kill the worm and prevent reinfection.  However, because the network route was clogged, this message did not get through until it was too late.  computers were affected at numerous installations, including leading universities, military sites, and medical research facilities.  The estimated cost of dealing with the worm at each installation ranged from $200 to more than $53,000.  Morris was found guilty, following a jury trial, of violating 18 U.S.C. s 1030(A)(5)(A).  He was sentenced to three years of probation, 400 hours of community service, a fine of $10,050, and the costs of his supervision.                                   DISCUSSION  I. The intent requirement in section 1030(a)(5)(A)  Section 1030(a)(5)(A), covers anyone who   (5) intentionally accesses a Federal interest computer without authorization, and by means of one or more instances of such conduct alters, damages, or destroys information in any such Federal interest computer, or prevents authorized use of any such computer or information, and thereby   (A) causes loss to one or more others of a value aggregating $1,000 or more during any one year period;  ... [emphasis added].  [1] The District Court concluded that the intent requirement applied only to the accessing and not to the resulting damage.  *507 Judge Munson found recourse to legislative history unnecessary because he considered the statute clear and unambiguous.  However, the Court observed that the legislative history supported its reading of section 1030(a)(5)(A).  Morris argues that the Government had to prove not only that he intended the unauthorized access of a federal interest computer, but also that he intended to prevent others from using it, and thus cause a loss.  The adverb "intentionally," he contends, modifies both verb phrases of the section.  The Government urges that since punctuation sets the "accesses" phrase off from the subsequent "damages" phrase, the provision unambiguously shows that "intentionally" modifies only "accesses."  Absent textual ambiguity, the Government asserts that recourse to legislative history is not appropriate. See Burlington N.R. Co. v. Oklahoma Tax Comm'n, 481 U.S. 454, 461, 107 S.Ct. 1855, 1859, 95 L.Ed.2d 404 (1987);  Consumer Product Safety Comm'n v. GTE Sylvania, Inc., 447 U.S. 102, 108, 100 S.Ct. 2051, 2056, 64 L.Ed.2d 766 (1980);  United States v. Holroyd, 732 F.2d 1122, 1125 (2d Cir.1984).  With some statutes, punctuation has been relied upon to indicate that a phrase set off by commas is independent of the language that followed.  See United States v. Ron Pair Enterprises, Inc., 489 U.S. 235, 241, 109 S.Ct. 1026, 1030, 103 L.Ed.2d 290 (1989) (interpreting the Bankruptcy Code).  However, we have been advised that punctuation is not necessarily decisive in construing statutes, see Costanzo v. Tillinghast, 287 U.S. 341, 344, 53 S.Ct. 152, 153, 77 L.Ed. 350 (1932), and with many statutes, a mental state adverb adjacent to initial words has been applied to phrases or clauses appearing later in the statute without regard to the punctuation or structure of the statute.  See Liparota v. United States, 471 U.S. 419, 426-29, 105 S.Ct. 2084, 2088-90, 85 L.Ed.2d 434 (1985) (interpreting food stamps provision);  United States v. Nofziger, 878 F.2d 442, 446-50 (D.C.Cir.) (interpreting government "revolving door" statute), cert. denied, --- U.S. ----, 110 S.Ct. 564, 107 L.Ed.2d 559 (1989);  United States v. Johnson & Towers, Inc., 741 F.2d 662, 667-69 (3d Cir.1984) (interpreting the conservation act), cert. denied, 469 U.S. 1208, 105 S.Ct. 1171, 84 L.Ed.2d 321 (1985).  In the present case, we do not believe the comma after "authorization" renders the text so clear as to preclude review of the legislative history.  The first federal statute dealing with computer crimes was passed in 1984, Pub.L. No. 98-473 (codified at 18 U.S.C. s 1030 (Supp. II 1984)).  The specific provision under which Morris was convicted was added in 1986, Pub.L. No. 99-474, along with some other changes.  The 1986 amendments made several changes relevant to our analysis.  First, the 1986 amendments changed the scienter requirement in section 1030(a)(2) from "knowingly" to "intentionally."  See Pub.L. No. 99-474, section 2(a)(1).  The subsection now covers anyone who   (2) intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains information contained in a financial record of a financial institution, or of a card issuer as defined in section 1602(n) of title 15, or contained in a file of a consumer reporting agency on a consumer, as such terms are defined in the Fair Credit Reporting Act (15 U.S.C. 1681 et seq.).  According to the Senate Judiciary Committee, Congress changed the mental state requirement in section 1030(a)(2) for two reasons.  Congress sought only to proscribe intentional acts of unauthorized access, not "mistaken, inadvertent, or careless" acts of unauthorized access.  S.Rep. No. 99-432, 99th Cong., 2d Sess. 5 (1986), reprinted in 1986 U.S.Code Cong. & Admin.News 2479, 2483 [hereinafter Senate Report].  Also, Congress expressed concern that the "knowingly" standard "might be inappropriate for cases involving computer technology."  Id.  The concern was that a scienter requirement of "knowingly" might encompass the acts of an individual "who inadvertently 'stumble[d] into' someone else's computer file or computer data," especially where such individual was authorized *508 to use a particular computer.  Id. at 6, 1986 U.S.Code Cong. & Admin.News at 2483. The Senate Report concluded that "[t]he substitution of an 'intentional' standard is designed to focus Federal criminal prosecutions on those whose conduct evinces a clear intent to enter, without proper authorization, computer files or data belonging to another."  Id., U.S.Code Cong. & Admin.News at 2484.  Congress retained the "knowingly" standard in other subsections of section 1030.  See 18 U.S.C. s 1030(A)(1), (a)(4).  This use of a mens rea standard to make sure that inadvertent accessing was not covered is also emphasized in the Senate Report's discussion of section 1030(a)(3) and section 1030(a)(5), under which Morris was convicted.  Both subsections were designed to target "outsiders," individuals without authorization to access any federal interest computer.  Senate Report at 10, U.S.Code Cong. & Admin.News at 2488.  The rationale for the mens rea requirement suggests that it modifies only the "accesses" phrase, which was the focus of Congress's concern in strengthening the scienter requirement.  The other relevant change in the 1986 amendments was the introduction of subsection (a)(5) to replace its earlier version, subsection (a)(3) of the 1984 act, 18 U.S.C. s 1030(A)(3) (Supp. II 1984).  The predecessor subsection covered anyone who   knowingly accesses a computer without authorization, or having accessed a computer with authorization, uses the opportunity such access provides for purposes to which such authorization does not extend, and by means of such conduct knowingly uses, modifies, destroys, or discloses information in, or prevents authorized use of, such computer, if such computer is operated for or on behalf of the Government of United States and such conduct affects such operation.  The 1986 version changed the mental state requirement from "knowingly" to "intentionally," and did not repeat it after the "accesses" phrase, as had the 1984 version.  By contrast, other subsections of section 1030 have retained "dual intent" language, placing the scienter requirement at the beginning of both the "accesses" phrase and the "damages" phrase.  See, e.g., 18 U.S.C. s 1030(A)(1).  Morris notes the careful attention that Congress gave to selecting the scienter requirement for current subsections (a)(2) and (a)(5).  Then, relying primarily on comments in the Senate and House reports, Morris argues that the "intentionally" requirement of section 1030(a)(5)(A) describes both the conduct of accessing and damaging.  As he notes, the Senate Report said that "[t]he new subsection 1030(a)(5) to be created by the bill is designed to penalize those who intentionally alter, damage, or destroy certain computerized data belonging to another."  Senate Report at 10, U.S.Code Cong. & Admin.News at 2488.  The House Judiciary Committee stated that "the bill proposes a new section (18 U.S.C. 1030(A)(5)) which can be characterized as a 'malicious damage' felony violation involving a Federal interest computer.  We have included an 'intentional' standard for this felony and coverage is extended only to outside trespassers with a $1,000 threshold damage level."  H.R.Rep. No. 99-612, 99th Cong.2d Sess. at 7 (1986).  A member of the Judiciary Committee also referred to the section 1030(a)(5) offense as a "malicious damage" felony during the floor debate.  132 Cong.Rec. H3275, 3276 (daily ed. June 3, 1986) (remarks of Rep. Hughes).  The Government's argument that the scienter requirement in section 1030(a)(5)(A) applies only to the "accesses" phrase is premised primarily upon the difference between subsection (a)(5)(A) and its predecessor in the 1984 statute.  The decision to state the scienter requirement only once in subsection (a)(5)(A), along with the decision to change it from "knowingly" to "intentionally," are claimed to evince a clear intent upon the part of Congress to apply the scienter requirement only to the "accesses" phrase, though making that requirement more difficult to satisfy.  This reading would carry out the Congressional objective of protecting the individual who "inadvertently 'stumble[s] into' someone else's computer file."  Senate Report at 6, U.S.Code Cong. & Admin.News at 2483.  *509 The Government also suggests that the fact that other subsections of section 1030 continue to repeat the scienter requirement before both phrases of a subsection is evidence that Congress selectively decided within the various subsections of section 1030 where the scienter requirement was and was not intended to apply.  Morris responds with a plausible explanation as to why certain other provisions of section 1030 retain dual intent language.  Those subsections use two different mens rea standards;  therefore it is necessary to refer to the scienter requirement twice in the subsection.  For example, section 1030(a)(1) covers anyone who   (1) knowingly accesses a computer without authorization or exceeds authorized access, and by means of such conduct obtains information that has been determined by the United States Government pursuant to an Executive order or statute to require protection against unauthorized disclosure for reasons of national defense or foreign relations, or any restricted data ... with the intent or reason to believe that such information so obtained is to be used to the injury of the United States, or to the advantage of any foreign nation.  Since Congress sought in subsection (a)(1) to have the "knowingly" standard

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美xxxx老人做受| 国内精品伊人久久久久影院对白| 精品一二三四区| 日韩欧美的一区| 国内精品国产成人国产三级粉色| 国产欧美日韩亚州综合| 成人av在线播放网站| 亚洲蜜臀av乱码久久精品蜜桃| 欧美日韩在线播放一区| 日韩高清不卡一区| 国产喂奶挤奶一区二区三区| 成人天堂资源www在线| 亚洲一区二区五区| 欧美一级片在线观看| 国产a区久久久| 亚洲狠狠爱一区二区三区| 日韩欧美国产一区在线观看| 国产不卡视频一区| 亚洲一二三区视频在线观看| 精品1区2区在线观看| 91在线小视频| 日韩国产在线一| 国产欧美视频在线观看| 欧美日韩在线播放| 国产91丝袜在线播放| 亚洲综合免费观看高清完整版在线| 欧美一级欧美一级在线播放| www.亚洲人| 日韩电影网1区2区| 国产精品不卡在线| 日韩欧美中文字幕一区| 91视频在线观看免费| 久热成人在线视频| 亚洲精品国产一区二区三区四区在线| 日韩女优av电影| 色就色 综合激情| 国产成人久久精品77777最新版本 国产成人鲁色资源国产91色综 | **性色生活片久久毛片| 欧美一二三在线| 色综合天天视频在线观看| 久久99精品国产麻豆婷婷| 夜夜操天天操亚洲| 中文在线资源观看网站视频免费不卡| 欧美巨大另类极品videosbest | 久久久久久电影| 欧美日本在线播放| 色哟哟一区二区在线观看 | 国产拍揄自揄精品视频麻豆| 欧美日本乱大交xxxxx| 99riav久久精品riav| 韩国成人精品a∨在线观看| 亚洲国产成人91porn| 欧美激情资源网| 精品乱码亚洲一区二区不卡| 国产精品久久久久一区二区三区 | 亚洲国产精品成人综合 | 国产日韩欧美在线一区| 制服丝袜亚洲精品中文字幕| 色综合av在线| 成人激情免费网站| 久久66热偷产精品| 人人狠狠综合久久亚洲| 日韩精品一二三| 亚洲在线视频网站| 亚洲欧美日韩国产手机在线 | 这里是久久伊人| 欧美日韩国产高清一区二区三区 | 久久久久久久综合日本| 亚洲视频资源在线| 欧洲色大大久久| 成人免费观看男女羞羞视频| 性做久久久久久久免费看| 精品乱码亚洲一区二区不卡| 成人av网站大全| 欧美日韩在线电影| 久久av资源网| 亚洲午夜一区二区三区| 国产精品久久久久久久久快鸭| 欧美精品日日鲁夜夜添| 色噜噜夜夜夜综合网| 国模冰冰炮一区二区| 日本在线不卡视频| 麻豆专区一区二区三区四区五区| 日精品一区二区三区| 日韩精品成人一区二区三区| 男女男精品视频网| 韩国午夜理伦三级不卡影院| 国产风韵犹存在线视精品| 国产成人免费9x9x人网站视频| 国产精品亚洲视频| 成人做爰69片免费看网站| 成人av资源在线观看| 91国产免费观看| 欧美一区二区在线观看| 久久久天堂av| 亚洲欧美激情视频在线观看一区二区三区| 亚洲激情一二三区| 日韩电影免费在线| 国产激情精品久久久第一区二区 | 福利视频网站一区二区三区| 白白色 亚洲乱淫| 欧美日韩一区小说| 久久夜色精品国产噜噜av| 国产精品久久久久久久久晋中| 一区二区三区中文字幕电影| 蜜桃视频一区二区| 成人av资源在线观看| 欧美日韩国产bt| 国产清纯在线一区二区www| 亚洲另类春色校园小说| 七七婷婷婷婷精品国产| 国产69精品一区二区亚洲孕妇| 91久久精品一区二区二区| 日韩美一区二区三区| 亚洲欧洲国产日本综合| 免费av网站大全久久| 成人一区二区三区中文字幕| 欧美日韩一区二区电影| 国产欧美1区2区3区| 亚洲成人综合视频| 丰满岳乱妇一区二区三区| 欧美精品欧美精品系列| 国产精品久久久久久一区二区三区 | 国产精品18久久久久久久网站| 一本一本大道香蕉久在线精品| 欧美一级生活片| 亚洲精品久久久蜜桃| 国产在线播放一区三区四| 欧美午夜视频网站| 国产精品美女久久久久av爽李琼| 偷拍亚洲欧洲综合| 97久久久精品综合88久久| 精品国产91洋老外米糕| 亚洲成人免费看| av在线不卡电影| 国产亚洲1区2区3区| 欧美午夜宅男影院| 国产精品国产三级国产普通话三级| 午夜精品久久久久久不卡8050| 成人精品在线视频观看| 精品成人免费观看| 日韩va亚洲va欧美va久久| 色一情一乱一乱一91av| 国产视频视频一区| 国产真实精品久久二三区| 欧美绝品在线观看成人午夜影视| 亚洲日本护士毛茸茸| 成人毛片在线观看| 欧美韩日一区二区三区| 麻豆精品国产传媒mv男同| 欧美伦理影视网| 亚洲综合色区另类av| 日本韩国欧美三级| 中文字幕一区二区三区不卡在线| 国产成人精品www牛牛影视| 欧美v亚洲v综合ⅴ国产v| 日韩二区三区四区| 欧美久久久久中文字幕| 天天色综合成人网| 欧美精品一二三| 日日夜夜精品免费视频| 欧美日韩精品一区二区三区蜜桃 | 美女国产一区二区| 91麻豆精品久久久久蜜臀| 午夜国产精品影院在线观看| 日本高清不卡aⅴ免费网站| 亚洲视频在线观看三级| 99久久99精品久久久久久| 亚洲欧美日韩一区二区| 99re热视频精品| 一区二区三区不卡在线观看| 欧美三级三级三级| 日韩电影在线一区二区三区| 欧美不卡一区二区三区| 国产美女一区二区| 亚洲国产精华液网站w| 99久久99久久精品免费观看| 亚洲视频一区在线观看| 欧美三区在线观看| 日韩1区2区3区| 精品少妇一区二区三区视频免付费| 久久99在线观看| 久久久精品影视| 99re免费视频精品全部| 亚洲国产一区二区三区| 日韩欧美亚洲另类制服综合在线| 久久国产剧场电影| 国产精品欧美久久久久一区二区| 91在线免费播放| 丝袜亚洲另类丝袜在线| 精品国产百合女同互慰| 成人综合婷婷国产精品久久 | 中文字幕第一区二区| 99精品视频一区二区| 午夜影院在线观看欧美| 亚洲精品在线观看视频| 91蝌蚪porny成人天涯| 日本va欧美va精品发布| 国产精品素人一区二区| 在线视频国内自拍亚洲视频|