SlideShare a Scribd company logo
1 of 4
Codifying the Harm of Cybercrime
Injecting zemiology in the US’ Computer Fraud and Abuse Act (CFAA)
and UK’s Computer Misuse Act (CMA).
Gillian Cafiero1
March, 2015
Abstract
This work is a brief reflection on the ‘ambiguous nature of harms in Cyberspace’2. It seeks to evaluate how
harm is coded in cyber-regulations paying particular attention to the political momentum around the UK’s
Computer Misuse Act (CMA) and the US’s Computer Fraud and Abuse Act (CFAA). Its intention is to inject an
element of zemiology into political discourse and advance a codification of cybercrime that can maximize
cyber-prosecutorial effectiveness and enhance the rule of law through transparency and coherence.
© by Tech and Law Center – www.techandlaw.net 1
1 Gillian is an MSc Criminal Justice Policy student at the London School of Economics and Political Science. She is the Editor of the Technology section of
The Beaver, LSESU's official newspaper, and has experience working for several private and public institutions including the United Nations. Her research is
primarily concerned with issues of data protection and cybersecurity.
2 Lessig, L (2013) Aaron's Laws - Law and Justice in a Digital Age https://www.youtube.com/watch?v=9HAw1i4gOU4
The New Year has been marked by a political de-
sire to reform the rules that govern cyberspace.
Last week, the UK’s government passed the Seri-
ous Crime Act 2015, which amends the existing
Computer Misuse Act 1990 (CMA)3. In January,O-
bama’s Administration, introduced a proposal to
amend the Computer Fraud and Abuse Act
(CFAA)4 . The pace of legislative change is wel-
come because the laws that govern cyberspace
are in dire need of reform. However, are the new
legislations taking us in the right direction?
Following Aaron Swartz’s death in 2013, Laurence
Lessing gave a lecture at Harvard Law School
where he emphasized the need to address the
‘ambiguous nature of harms in Cyberspace’5. By
this, he meant the need to distinguish between the
illegal uses of technology that result in serious
harm and those that do not; in other words, he
was calling for the identification of a taxonomy of
harm in cyberspace.
Classifying different degrees of cybercrime accord-
ing to the harm they cause could be a useful exer-
cise for several reasons, for example: it would spur
law enforcement agencies to target their limited
resources more accurately, and it would
strengthen the rule of law by enhancing the trans-
parency and coherence of legislative measures.
The current legal frameworks, particularly the
CFAA and the CMA do not incentivise a classifica-
tion of harm. The controversial reactions to the
conviction of Barrett Brown- the activist/journalist
who was prosecuted for (amongst other things)
sharing links to hacked information- were a recent
demonstration that there is still a strong disso-
nance between the penalties pursued for ‘cyber-
crimes’ and the level of harm that the public per-
ceives them to have caused6.
The changes in the US and the UK show some
promise of including a taxonomy of harm within
cyber-regulation but they fall short of defining key
parameters of it. Obama’s proposal addresses an
evaluation of the harm caused by cybercrimes in
two ways. The first is by setting standards for the
prosecution of contract-based violations of
computer-system access. The current law on the
subject is contradictive; some circuits7 hold that
violations of terms and conditions fall outside the
scope the of CFAA while others consider all viola-
tions of contractual access rights as a violation of
the statute. The reform criminalises violations of
terms of use but limits liability to instances where:
(a) the individual violates a restriction on a gov-
ernment computer; (b) where an individual obtains
information worth more than $5000 from violation
of access rights; and (c) where the individual vio-
lates the access rights in furtherance of a state or
federal felony8. At face value, these measures are
a valid attempt at restricting the impact of the
CFAA to cases where the breach of contractual
access rights has seriously harmful conse-
quences. However, the wording of the legislation
remains fairly open-ended and exposed to broad,
ell-encompassing, prosecutorial interpretation9.
The second way in which Obama’s proposal ad-
dresses the notion of harm in cyberspace relates
to violations of technological access barriers (in
other words, code-based-hacks).The current
CFAA classifies certain types of technological ac-
cess violations as misdemeanours but others as 5-
year-maximum felonies. The proposed reform
would make all violations of technological access
barriers 3-year-felonies, which could be raised up
to a 10-year-felony if enhancements apply. The
underlying assumption is that all unauthorized vio-
lations of technological barriers cause a significant
enough degree of harm to be considered criminal.
However, it is recognized that some deserve sig-
© by Tech and Law Center – www.techandlaw.net! 2
3 Serious Crimes Act 2015 http://www.legislation.gov.uk/ukpga/2015/9/pdfs/ukpga_20150009_en.pdf
4 Kerr, O. (2015)Obama’s Proposed Changes to the Computer Hacking Statute A Deep Dive
http://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/01/14/obamas-proposed-changes-to-the-computer-hacking-statute-a-deep-dive/
5 Lessig, L. (2013)Aaron's Laws - Law and Justice in a Digital Agehttps://www.youtube.com/watch?v=9HAw1i4gOU4
6 Norton, Q. (2015) We Should All Step Back from Security Journalism: I’ll Go First
https://medium.com/message/we-should-all-step-back-from-security-journalism-e474cd67e2fa
7 United States of America v NosalCr 08-0237 (N.D. Cal, Mar 12, 2013)
8 For a more in depth analysis refer to Orin Kerr’s article
http://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/01/14/obamas-proposed-changes-to-the-computer-hacking-statute-a-deep-dive/
9 ibid
nificantly higher penalties than others.
The contrast between (a) the new limitations im-
posed on the prosecution of contract-based hacks,
and (b) the proposal for the universal criminalisa-
tion of code-based hacks, warrants some consid-
eration. In my view, the distinction between code
based violations and contract based violations is
somewhat abstract. Ultimately both are violations
of words10, be they in a terms and conditions
document or in a code script. Both types of viola-
tions can result in equally grave consequences
and both can have little to no impact. Therefore,
drafting the rules that govern these two types of
access violations in such different waysappears to
be a drive away from a harm-based legislation of
cyberspace.
In the UK, a similar trend is taking place. The Seri-
ous Crimes Act 2015, which was introduced last
week, adds a new clause to the Computer Misuse
Act 1990 (CMA) designed to deal with cybercrimes
that cause ‘serious’ harms. The new section (s.
3ZA) covers “unauthorised acts causing, or creat-
ing risk of, serious damage”. The aggravated of-
fences carry a 14-year maximum prison term,
while in the current CMA offences carry a max-10-
year imprisonment term11. Fundamentally, the at-
tempt to differentiate instances where cyber-
attacks have grave consequences is laudable.
However,the wording of the new section is rather
broad, and risks opening the floodgates for prose-
cutions of all violations of computer systems as
serious offences12.
According to the new legislation a computer crime
is serious, if it causes damage of a material kind.
Damage of “a material kind” is that which affects
“human welfare”, “the environment”, “the
economy”and/or “national security”. Interestingly,
the definition of human welfare in the Act includes
the “disruption of a system of communication”13;
presumably this refers to an assumption that,
where any system of communication is disrupted,
material damage is rendered to human welfare.In
my view, all unauthorized access to computer sys-
tems, regardless of the harm that it causes, could
be considered a “disruption of a system of com-
munication”. This is because any unauthorized
access is a violation, on some level, of what Prof.
Andrew Murray of the LSE calls identity “proxi-
es”14. These proxies, things like user rights, pass-
words or IP addresses, are the foundation of trust
in cyberspace and violating them, by implication, is
a disruption of our prized cyber-communication.
While all system access violations cause “disrup-
tion to a system of communication”, I am not per-
suaded that they all impact “human welfare” in the
way the term is commonly understood. It is my
understanding that, the association of human wel-
fare with any “disruption to a system of communi-
cation” in the Serious Crimes Act, creates a broad-
brush penalty that departs from a nuanced taxon-
omy of the harms that cybercrimes can cause.
Thelegislative reforms undertaken in the US and
the UK fall short of resolving the ambiguity of the
role of harm in cyber-regulation. Perhaps more
importantly though, they start a motion of change
that can be built on to develop a cyber-regulatory
sphere that is attuned to the harms caused by cy-
bercrimes. To do this, the question that we as a
cyber-society need to address is:how can we inject
our cyber-regulatory reforms witha taxonomy of
harm that will deliver a better prosecutorial model?
Several scholars have put forth the notion of a
public interest defence for offences like those out-
lined in the CFAA and the CMA. The lawyers and
academics that promote this concept, like Greg
Callus, create a parallel between violating cyber-
legislation and violating data protection legisla-
tion15. Their arguments are based on the notion
that the violation of both these types of legislation
can lead to the discovery of information that is ul-
timately beneficial to the general public. Where
this is the case, they argue, the violations of cyber-
regulations should be defensible through public
interest in the same way that data protection viola-
tions can be protected.
I think the ground for a public interest defence to
cybercrimes should be handled cautiously. Firstly,
cybercrime usually happens on an international
scale and I am not persuaded that any human-
indeed judges, lawyers and prosecutors- can
overcome the challenges of assessing a universal
“public interest”. Secondly, I am conscious that
prosecutors already face enormous challenges
when trying to investigate cybercrimes that, of-
ten,have serious consequencesfor individuals,
companies or nations. My concern is that including
a public interest defence in the CFAA and the CMA
might discourage investigations into cybercrime
even when serious harm is being incurred. Finally,
I am conscious that the inconsistency with which
the “public interest defence” has been applied in
© by Tech and Law Center – www.techandlaw.net! 3
10 Lessig, L. (2013)Aaron's Laws - Law and Justice in a Digital Age https://www.youtube.com/watch?v=9HAw1i4gOU4
11 Serious Crime Act 2015 http://www.legislation.gov.uk/ukpga/2015/9/pdfs/ukpga_20150009_en.pdf
12 The IT Law Community (2014) Computer Misuse Amendments http://www.scl.org/site.aspx?i=ne37488
13 2(3)(d) Serious Crimes Act 2015 (Part. II) http://www.legislation.gov.uk/ukpga/2015/9/pdfs/ukpga_20150009_en.pdf
14 Murray, D (2013) Information Technology Law. OUP: Oxford. p.390
15 Callus, G. (2012) A Typo in the Constitution http://gregcallus.tumblr.com/post/20539847136/theres-no-public-interest-defence-to-computer
other areas of the law, like data protection, would
be detrimental to rendering cyber-regulation more
transparent and coherent.
While I have yet to understand how a functional
taxonomy of cybercrime harms can be structured, I
am entirely convinced that there is an urgent need
for it to be created. Only once we attempt to map
the degrees of harm in cyberspace will we witness
cyber-prosecutorial resources engaged efficiently,
a strong rule of (cyber)law and a fair distribution of
penalties across cybercrimes. To this end, I urge
you all to consider cyber-harm and share your vi-
sion of it.
© by Tech and Law Center – www.techandlaw.net! 4

More Related Content

What's hot

Chapter 12 - Computer Forensics
Chapter 12 - Computer ForensicsChapter 12 - Computer Forensics
Chapter 12 - Computer ForensicsAttaporn Ninsuwan
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillTeeth Maestro
 
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIADEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIABenedict Ishabakaki
 
Who Has Your Back 2014: Protecting Your Data From Government Requests
Who Has Your Back 2014: Protecting Your Data From Government RequestsWho Has Your Back 2014: Protecting Your Data From Government Requests
Who Has Your Back 2014: Protecting Your Data From Government Requests- Mark - Fullbright
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...Ben Griffith
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...- Mark - Fullbright
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast- Mark - Fullbright
 
Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryMD Alauddin
 
Practical Guide to GDPR 2017
Practical Guide to GDPR 2017Practical Guide to GDPR 2017
Practical Guide to GDPR 2017Dryden Geary
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
Pleading: Social Media in California: Policing Workers Online
Pleading: Social Media in California: Policing Workers OnlinePleading: Social Media in California: Policing Workers Online
Pleading: Social Media in California: Policing Workers OnlineAllen Matkins
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
 
Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...jonneiditz
 
Bauer Heather Software Piracy
Bauer Heather Software PiracyBauer Heather Software Piracy
Bauer Heather Software PiracyHeather Bauer
 

What's hot (20)

IT_Cutter_Publication
IT_Cutter_PublicationIT_Cutter_Publication
IT_Cutter_Publication
 
Chapter 12 - Computer Forensics
Chapter 12 - Computer ForensicsChapter 12 - Computer Forensics
Chapter 12 - Computer Forensics
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime Bill
 
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIADEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
DEFAMATION IN SOCIAL MEDIA (CYBER DEFAMATION) LEGAL PERSPECTIVE IN TANZANIA
 
Who Has Your Back 2014: Protecting Your Data From Government Requests
Who Has Your Back 2014: Protecting Your Data From Government RequestsWho Has Your Back 2014: Protecting Your Data From Government Requests
Who Has Your Back 2014: Protecting Your Data From Government Requests
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
 
Theory Cyberspace
Theory CyberspaceTheory Cyberspace
Theory Cyberspace
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st century
 
Practical Guide to GDPR 2017
Practical Guide to GDPR 2017Practical Guide to GDPR 2017
Practical Guide to GDPR 2017
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 
Pleading: Social Media in California: Policing Workers Online
Pleading: Social Media in California: Policing Workers OnlinePleading: Social Media in California: Policing Workers Online
Pleading: Social Media in California: Policing Workers Online
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...
 
Bauer Heather Software Piracy
Bauer Heather Software PiracyBauer Heather Software Piracy
Bauer Heather Software Piracy
 

Viewers also liked

data storage security technique for cloud computing
data storage security technique for cloud computingdata storage security technique for cloud computing
data storage security technique for cloud computinghasimshah
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud ComputingMartin Bioh
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself Alert Logic
 
Cloud Computing security Challenges for Defense Forces
Cloud Computing security Challenges for Defense ForcesCloud Computing security Challenges for Defense Forces
Cloud Computing security Challenges for Defense Forcescommandersaini
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptYogi Dadhich
 
Ensuring data storage security in cloud computing
Ensuring data storage security in cloud computingEnsuring data storage security in cloud computing
Ensuring data storage security in cloud computingUday Wankar
 
Are you using mail policies effectively to secure your mail
Are you using mail policies effectively to secure your mail Are you using mail policies effectively to secure your mail
Are you using mail policies effectively to secure your mail Mithi SkyConnect
 
Cloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTSCloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTSAnchises Moraes
 
Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011commandersaini
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptAmex Ka
 
4 approaches to securing documents and email attachment assets
4 approaches to securing documents and email attachment assets4 approaches to securing documents and email attachment assets
4 approaches to securing documents and email attachment assetsMithi SkyConnect
 
Email phising and spoofing hurting your business
Email phising and spoofing hurting your businessEmail phising and spoofing hurting your business
Email phising and spoofing hurting your businessMithi SkyConnect
 
Cloud computing
Cloud computingCloud computing
Cloud computinggk28
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computingSonali Jain
 
Cloud computing(ppt)
Cloud computing(ppt)Cloud computing(ppt)
Cloud computing(ppt)priyas211420
 
Assignment of trademarks
Assignment of trademarksAssignment of trademarks
Assignment of trademarksAltacit Global
 

Viewers also liked (20)

CS III.1 T. Jorgensen
CS III.1   T. JorgensenCS III.1   T. Jorgensen
CS III.1 T. Jorgensen
 
data storage security technique for cloud computing
data storage security technique for cloud computingdata storage security technique for cloud computing
data storage security technique for cloud computing
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
Cloud Computing security Challenges for Defense Forces
Cloud Computing security Challenges for Defense ForcesCloud Computing security Challenges for Defense Forces
Cloud Computing security Challenges for Defense Forces
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Ensuring data storage security in cloud computing
Ensuring data storage security in cloud computingEnsuring data storage security in cloud computing
Ensuring data storage security in cloud computing
 
Are you using mail policies effectively to secure your mail
Are you using mail policies effectively to secure your mail Are you using mail policies effectively to secure your mail
Are you using mail policies effectively to secure your mail
 
Telenor
TelenorTelenor
Telenor
 
Cloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTSCloud computing - Risks and Mitigation - GTS
Cloud computing - Risks and Mitigation - GTS
 
From byod to cyod
From byod to cyodFrom byod to cyod
From byod to cyod
 
Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
4 approaches to securing documents and email attachment assets
4 approaches to securing documents and email attachment assets4 approaches to securing documents and email attachment assets
4 approaches to securing documents and email attachment assets
 
Email phising and spoofing hurting your business
Email phising and spoofing hurting your businessEmail phising and spoofing hurting your business
Email phising and spoofing hurting your business
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
Cloud computing(ppt)
Cloud computing(ppt)Cloud computing(ppt)
Cloud computing(ppt)
 
Assignment of trademarks
Assignment of trademarksAssignment of trademarks
Assignment of trademarks
 

Similar to Codifying Cybercrime Harm

Revamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse ActRevamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse ActDavid Sweigert
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Faridah Husin
 
Cyber Law
Cyber LawCyber Law
Cyber Lawihah
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxursabrooks36447
 
The CFAA and Aarons Law
The CFAA and Aarons LawThe CFAA and Aarons Law
The CFAA and Aarons LawThomas Jones
 
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docxbriancrawford30935
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxgertrudebellgrove
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxadkinspaige22
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxpoulterbarbara
 
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...Vishni Ganepola
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0drennanmicah
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0alisondakintxt
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Joe Orlando
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Cameron Brown
 
Delivering an Oral StatementYou will need to deliver an oral sta.docx
Delivering an Oral StatementYou will need to deliver an oral sta.docxDelivering an Oral StatementYou will need to deliver an oral sta.docx
Delivering an Oral StatementYou will need to deliver an oral sta.docxcuddietheresa
 
Statements Made in Opposition to SESTA
Statements Made in Opposition to SESTAStatements Made in Opposition to SESTA
Statements Made in Opposition to SESTAInternet Law Center
 

Similar to Codifying Cybercrime Harm (20)

Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
 
Cyber law and cyber-crime
Cyber law and cyber-crimeCyber law and cyber-crime
Cyber law and cyber-crime
 
Revamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse ActRevamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse Act
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docx
 
The CFAA and Aarons Law
The CFAA and Aarons LawThe CFAA and Aarons Law
The CFAA and Aarons Law
 
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
 
Cyber Crimes.pdf
Cyber Crimes.pdfCyber Crimes.pdf
Cyber Crimes.pdf
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
Delivering an Oral StatementYou will need to deliver an oral sta.docx
Delivering an Oral StatementYou will need to deliver an oral sta.docxDelivering an Oral StatementYou will need to deliver an oral sta.docx
Delivering an Oral StatementYou will need to deliver an oral sta.docx
 
Statements Made in Opposition to SESTA
Statements Made in Opposition to SESTAStatements Made in Opposition to SESTA
Statements Made in Opposition to SESTA
 

More from Tech and Law Center

One step further in the surveillance society the case of predictive policing
One step further in the surveillance society the case of predictive policingOne step further in the surveillance society the case of predictive policing
One step further in the surveillance society the case of predictive policingTech and Law Center
 
2015.11.06. Luca Melette_Mobile threats evolution
2015.11.06. Luca Melette_Mobile threats evolution2015.11.06. Luca Melette_Mobile threats evolution
2015.11.06. Luca Melette_Mobile threats evolutionTech and Law Center
 
Andrea Molino: Applicazione delle tecnologie ICT al settore Agricolo
Andrea Molino: Applicazione delle tecnologie ICT al settore AgricoloAndrea Molino: Applicazione delle tecnologie ICT al settore Agricolo
Andrea Molino: Applicazione delle tecnologie ICT al settore AgricoloTech and Law Center
 
Emanuela Pala: Internet of Things & Smart Agriculture
Emanuela Pala: Internet of Things & Smart Agriculture Emanuela Pala: Internet of Things & Smart Agriculture
Emanuela Pala: Internet of Things & Smart Agriculture Tech and Law Center
 
Tommaso De Gregorio: Growing Hazelnuts
Tommaso De Gregorio: Growing Hazelnuts Tommaso De Gregorio: Growing Hazelnuts
Tommaso De Gregorio: Growing Hazelnuts Tech and Law Center
 
Cybersecurity & Digital Forensics / Dronitaly - 25 Ottobre 2014
Cybersecurity & Digital Forensics / Dronitaly - 25 Ottobre 2014Cybersecurity & Digital Forensics / Dronitaly - 25 Ottobre 2014
Cybersecurity & Digital Forensics / Dronitaly - 25 Ottobre 2014Tech and Law Center
 
Giuseppe Vaciago: From Crime to privacy-oriented crime prevention in the Big ...
Giuseppe Vaciago: From Crime to privacy-oriented crime prevention in the Big ...Giuseppe Vaciago: From Crime to privacy-oriented crime prevention in the Big ...
Giuseppe Vaciago: From Crime to privacy-oriented crime prevention in the Big ...Tech and Law Center
 
SECURITY OF THE DIGITAL NATIVES - Italian version
SECURITY OF THE DIGITAL NATIVES - Italian versionSECURITY OF THE DIGITAL NATIVES - Italian version
SECURITY OF THE DIGITAL NATIVES - Italian versionTech and Law Center
 
SECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English versionSECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English versionTech and Law Center
 
Android malware overview, status and dilemmas
Android malware  overview, status and dilemmasAndroid malware  overview, status and dilemmas
Android malware overview, status and dilemmasTech and Law Center
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)Tech and Law Center
 
The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityThe Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityTech and Law Center
 
Legal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe VaciagoLegal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe VaciagoTech and Law Center
 

More from Tech and Law Center (15)

One step further in the surveillance society the case of predictive policing
One step further in the surveillance society the case of predictive policingOne step further in the surveillance society the case of predictive policing
One step further in the surveillance society the case of predictive policing
 
2015.11.06. Luca Melette_Mobile threats evolution
2015.11.06. Luca Melette_Mobile threats evolution2015.11.06. Luca Melette_Mobile threats evolution
2015.11.06. Luca Melette_Mobile threats evolution
 
Andrea Molino: Applicazione delle tecnologie ICT al settore Agricolo
Andrea Molino: Applicazione delle tecnologie ICT al settore AgricoloAndrea Molino: Applicazione delle tecnologie ICT al settore Agricolo
Andrea Molino: Applicazione delle tecnologie ICT al settore Agricolo
 
Emanuela Pala: Internet of Things & Smart Agriculture
Emanuela Pala: Internet of Things & Smart Agriculture Emanuela Pala: Internet of Things & Smart Agriculture
Emanuela Pala: Internet of Things & Smart Agriculture
 
Tommaso De Gregorio: Growing Hazelnuts
Tommaso De Gregorio: Growing Hazelnuts Tommaso De Gregorio: Growing Hazelnuts
Tommaso De Gregorio: Growing Hazelnuts
 
Smart intelligence
Smart intelligenceSmart intelligence
Smart intelligence
 
Cybersecurity & Digital Forensics / Dronitaly - 25 Ottobre 2014
Cybersecurity & Digital Forensics / Dronitaly - 25 Ottobre 2014Cybersecurity & Digital Forensics / Dronitaly - 25 Ottobre 2014
Cybersecurity & Digital Forensics / Dronitaly - 25 Ottobre 2014
 
Giuseppe Vaciago: From Crime to privacy-oriented crime prevention in the Big ...
Giuseppe Vaciago: From Crime to privacy-oriented crime prevention in the Big ...Giuseppe Vaciago: From Crime to privacy-oriented crime prevention in the Big ...
Giuseppe Vaciago: From Crime to privacy-oriented crime prevention in the Big ...
 
SECURITY OF THE DIGITAL NATIVES - Italian version
SECURITY OF THE DIGITAL NATIVES - Italian versionSECURITY OF THE DIGITAL NATIVES - Italian version
SECURITY OF THE DIGITAL NATIVES - Italian version
 
SECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English versionSECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English version
 
Android malware overview, status and dilemmas
Android malware  overview, status and dilemmasAndroid malware  overview, status and dilemmas
Android malware overview, status and dilemmas
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
 
The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityThe Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the Singularity
 
Legal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe VaciagoLegal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe Vaciago
 

Recently uploaded

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 

Recently uploaded (20)

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 

Codifying Cybercrime Harm

  • 1. Codifying the Harm of Cybercrime Injecting zemiology in the US’ Computer Fraud and Abuse Act (CFAA) and UK’s Computer Misuse Act (CMA). Gillian Cafiero1 March, 2015 Abstract This work is a brief reflection on the ‘ambiguous nature of harms in Cyberspace’2. It seeks to evaluate how harm is coded in cyber-regulations paying particular attention to the political momentum around the UK’s Computer Misuse Act (CMA) and the US’s Computer Fraud and Abuse Act (CFAA). Its intention is to inject an element of zemiology into political discourse and advance a codification of cybercrime that can maximize cyber-prosecutorial effectiveness and enhance the rule of law through transparency and coherence. © by Tech and Law Center – www.techandlaw.net 1 1 Gillian is an MSc Criminal Justice Policy student at the London School of Economics and Political Science. She is the Editor of the Technology section of The Beaver, LSESU's official newspaper, and has experience working for several private and public institutions including the United Nations. Her research is primarily concerned with issues of data protection and cybersecurity. 2 Lessig, L (2013) Aaron's Laws - Law and Justice in a Digital Age https://www.youtube.com/watch?v=9HAw1i4gOU4
  • 2. The New Year has been marked by a political de- sire to reform the rules that govern cyberspace. Last week, the UK’s government passed the Seri- ous Crime Act 2015, which amends the existing Computer Misuse Act 1990 (CMA)3. In January,O- bama’s Administration, introduced a proposal to amend the Computer Fraud and Abuse Act (CFAA)4 . The pace of legislative change is wel- come because the laws that govern cyberspace are in dire need of reform. However, are the new legislations taking us in the right direction? Following Aaron Swartz’s death in 2013, Laurence Lessing gave a lecture at Harvard Law School where he emphasized the need to address the ‘ambiguous nature of harms in Cyberspace’5. By this, he meant the need to distinguish between the illegal uses of technology that result in serious harm and those that do not; in other words, he was calling for the identification of a taxonomy of harm in cyberspace. Classifying different degrees of cybercrime accord- ing to the harm they cause could be a useful exer- cise for several reasons, for example: it would spur law enforcement agencies to target their limited resources more accurately, and it would strengthen the rule of law by enhancing the trans- parency and coherence of legislative measures. The current legal frameworks, particularly the CFAA and the CMA do not incentivise a classifica- tion of harm. The controversial reactions to the conviction of Barrett Brown- the activist/journalist who was prosecuted for (amongst other things) sharing links to hacked information- were a recent demonstration that there is still a strong disso- nance between the penalties pursued for ‘cyber- crimes’ and the level of harm that the public per- ceives them to have caused6. The changes in the US and the UK show some promise of including a taxonomy of harm within cyber-regulation but they fall short of defining key parameters of it. Obama’s proposal addresses an evaluation of the harm caused by cybercrimes in two ways. The first is by setting standards for the prosecution of contract-based violations of computer-system access. The current law on the subject is contradictive; some circuits7 hold that violations of terms and conditions fall outside the scope the of CFAA while others consider all viola- tions of contractual access rights as a violation of the statute. The reform criminalises violations of terms of use but limits liability to instances where: (a) the individual violates a restriction on a gov- ernment computer; (b) where an individual obtains information worth more than $5000 from violation of access rights; and (c) where the individual vio- lates the access rights in furtherance of a state or federal felony8. At face value, these measures are a valid attempt at restricting the impact of the CFAA to cases where the breach of contractual access rights has seriously harmful conse- quences. However, the wording of the legislation remains fairly open-ended and exposed to broad, ell-encompassing, prosecutorial interpretation9. The second way in which Obama’s proposal ad- dresses the notion of harm in cyberspace relates to violations of technological access barriers (in other words, code-based-hacks).The current CFAA classifies certain types of technological ac- cess violations as misdemeanours but others as 5- year-maximum felonies. The proposed reform would make all violations of technological access barriers 3-year-felonies, which could be raised up to a 10-year-felony if enhancements apply. The underlying assumption is that all unauthorized vio- lations of technological barriers cause a significant enough degree of harm to be considered criminal. However, it is recognized that some deserve sig- © by Tech and Law Center – www.techandlaw.net! 2 3 Serious Crimes Act 2015 http://www.legislation.gov.uk/ukpga/2015/9/pdfs/ukpga_20150009_en.pdf 4 Kerr, O. (2015)Obama’s Proposed Changes to the Computer Hacking Statute A Deep Dive http://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/01/14/obamas-proposed-changes-to-the-computer-hacking-statute-a-deep-dive/ 5 Lessig, L. (2013)Aaron's Laws - Law and Justice in a Digital Agehttps://www.youtube.com/watch?v=9HAw1i4gOU4 6 Norton, Q. (2015) We Should All Step Back from Security Journalism: I’ll Go First https://medium.com/message/we-should-all-step-back-from-security-journalism-e474cd67e2fa 7 United States of America v NosalCr 08-0237 (N.D. Cal, Mar 12, 2013) 8 For a more in depth analysis refer to Orin Kerr’s article http://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/01/14/obamas-proposed-changes-to-the-computer-hacking-statute-a-deep-dive/ 9 ibid
  • 3. nificantly higher penalties than others. The contrast between (a) the new limitations im- posed on the prosecution of contract-based hacks, and (b) the proposal for the universal criminalisa- tion of code-based hacks, warrants some consid- eration. In my view, the distinction between code based violations and contract based violations is somewhat abstract. Ultimately both are violations of words10, be they in a terms and conditions document or in a code script. Both types of viola- tions can result in equally grave consequences and both can have little to no impact. Therefore, drafting the rules that govern these two types of access violations in such different waysappears to be a drive away from a harm-based legislation of cyberspace. In the UK, a similar trend is taking place. The Seri- ous Crimes Act 2015, which was introduced last week, adds a new clause to the Computer Misuse Act 1990 (CMA) designed to deal with cybercrimes that cause ‘serious’ harms. The new section (s. 3ZA) covers “unauthorised acts causing, or creat- ing risk of, serious damage”. The aggravated of- fences carry a 14-year maximum prison term, while in the current CMA offences carry a max-10- year imprisonment term11. Fundamentally, the at- tempt to differentiate instances where cyber- attacks have grave consequences is laudable. However,the wording of the new section is rather broad, and risks opening the floodgates for prose- cutions of all violations of computer systems as serious offences12. According to the new legislation a computer crime is serious, if it causes damage of a material kind. Damage of “a material kind” is that which affects “human welfare”, “the environment”, “the economy”and/or “national security”. Interestingly, the definition of human welfare in the Act includes the “disruption of a system of communication”13; presumably this refers to an assumption that, where any system of communication is disrupted, material damage is rendered to human welfare.In my view, all unauthorized access to computer sys- tems, regardless of the harm that it causes, could be considered a “disruption of a system of com- munication”. This is because any unauthorized access is a violation, on some level, of what Prof. Andrew Murray of the LSE calls identity “proxi- es”14. These proxies, things like user rights, pass- words or IP addresses, are the foundation of trust in cyberspace and violating them, by implication, is a disruption of our prized cyber-communication. While all system access violations cause “disrup- tion to a system of communication”, I am not per- suaded that they all impact “human welfare” in the way the term is commonly understood. It is my understanding that, the association of human wel- fare with any “disruption to a system of communi- cation” in the Serious Crimes Act, creates a broad- brush penalty that departs from a nuanced taxon- omy of the harms that cybercrimes can cause. Thelegislative reforms undertaken in the US and the UK fall short of resolving the ambiguity of the role of harm in cyber-regulation. Perhaps more importantly though, they start a motion of change that can be built on to develop a cyber-regulatory sphere that is attuned to the harms caused by cy- bercrimes. To do this, the question that we as a cyber-society need to address is:how can we inject our cyber-regulatory reforms witha taxonomy of harm that will deliver a better prosecutorial model? Several scholars have put forth the notion of a public interest defence for offences like those out- lined in the CFAA and the CMA. The lawyers and academics that promote this concept, like Greg Callus, create a parallel between violating cyber- legislation and violating data protection legisla- tion15. Their arguments are based on the notion that the violation of both these types of legislation can lead to the discovery of information that is ul- timately beneficial to the general public. Where this is the case, they argue, the violations of cyber- regulations should be defensible through public interest in the same way that data protection viola- tions can be protected. I think the ground for a public interest defence to cybercrimes should be handled cautiously. Firstly, cybercrime usually happens on an international scale and I am not persuaded that any human- indeed judges, lawyers and prosecutors- can overcome the challenges of assessing a universal “public interest”. Secondly, I am conscious that prosecutors already face enormous challenges when trying to investigate cybercrimes that, of- ten,have serious consequencesfor individuals, companies or nations. My concern is that including a public interest defence in the CFAA and the CMA might discourage investigations into cybercrime even when serious harm is being incurred. Finally, I am conscious that the inconsistency with which the “public interest defence” has been applied in © by Tech and Law Center – www.techandlaw.net! 3 10 Lessig, L. (2013)Aaron's Laws - Law and Justice in a Digital Age https://www.youtube.com/watch?v=9HAw1i4gOU4 11 Serious Crime Act 2015 http://www.legislation.gov.uk/ukpga/2015/9/pdfs/ukpga_20150009_en.pdf 12 The IT Law Community (2014) Computer Misuse Amendments http://www.scl.org/site.aspx?i=ne37488 13 2(3)(d) Serious Crimes Act 2015 (Part. II) http://www.legislation.gov.uk/ukpga/2015/9/pdfs/ukpga_20150009_en.pdf 14 Murray, D (2013) Information Technology Law. OUP: Oxford. p.390 15 Callus, G. (2012) A Typo in the Constitution http://gregcallus.tumblr.com/post/20539847136/theres-no-public-interest-defence-to-computer
  • 4. other areas of the law, like data protection, would be detrimental to rendering cyber-regulation more transparent and coherent. While I have yet to understand how a functional taxonomy of cybercrime harms can be structured, I am entirely convinced that there is an urgent need for it to be created. Only once we attempt to map the degrees of harm in cyberspace will we witness cyber-prosecutorial resources engaged efficiently, a strong rule of (cyber)law and a fair distribution of penalties across cybercrimes. To this end, I urge you all to consider cyber-harm and share your vi- sion of it. © by Tech and Law Center – www.techandlaw.net! 4