Skip to main contentdfsdf

John Powell's List: Digital law protects

  • Digital law protects against viruses and trojan horses

    Digital law as it pertains to viruses and trojan horses.

  • Oct 09, 13

    Laws against creating viruses can lead to years in prison and expensive fines.

    • Melissa Virus Author SentencedProgrammer gets 20 months in prison and $5000 fine for unleashing  fastest virus of its time
    • Smith faced up to five years in prison. He was also fined $5000 by U.S.  District Judge

    2 more annotations...

      • Home > crack
           
         
         

        crack

         
         
         
            
        •   
        •   
        •   
        •   <!--li><fb:like layout="button_count" show_faces="true" width="90"></fb:like></li--> 
        •    
        •   
        •  <!-- Place this tag in your head or just before your close body tag -->  <!-- Place this tag where you want the +1 button to render --> 
           
        •   
        • E-mail this Term
        •   <!-- AddThis Button BEGIN --> <!--li><a class="addthis_button" href="http://www.addthis.com/bookmark.php?v=250&username=xa-4c06a3e335aae892"><img src="http://s7.addthis.com/static/btn/v2/lg-share-en.gif" width="125" height="16" alt="Bookmark and Share" style="border:0"/></a></li--> <!-- AddThis Button END -->  
         
         
         
         

          (1) To break into a computer system. The term was coined in the mid-80s by hackers who wanted to differentiate themselves from individuals whose sole purpose is to sneak through security systems. Whereas crackers sole aim is to break into secure systems, hackers are more interested in gaining knowledge about computer systems and possibly using this knowledge for playful pranks. Although hackers still argue that there's a big difference between what they do and what crackers do, the mass media has failed to understand the distinction, so the two terms -- hack and crack -- are often used interchangeably.

        (2) To copy commercial software illegally by breaking (cracking) the various copy-protection and registration techniques being used.

  • Oct 09, 13

    Webopedia, a .com site defines the term "hacker" and clarifies the pejoratve use as the description commonly misused for a "cracker".

      • Home > hacker
           
         
         

        hacker

         
         
         
            
        •   
        •   
        •   
        •   <!--li><fb:like layout="button_count" show_faces="true" width="90"></fb:like></li--> 
        •    
        •   
        •  <!-- Place this tag in your head or just before your close body tag -->  <!-- Place this tag where you want the +1 button to render --> 
           
        •   
        • E-mail this Term
        •   <!-- AddThis Button BEGIN --> <!--li><a class="addthis_button" href="http://www.addthis.com/bookmark.php?v=250&username=xa-4c06a3e335aae892"><img src="http://s7.addthis.com/static/btn/v2/lg-share-en.gif" width="125" height="16" alt="Bookmark and Share" style="border:0"/></a></li--> <!-- AddThis Button END -->  
         
         
         
         

         

        A slang term for a computer enthusiast, i.e., a person who enjoys learning programming languages and computer systems and can often be considered an expert on the subject(s). Among professional programmers, depending on how it used, the term can be either complimentary or derogatory, although it is developing an increasingly derogatory connotation.

         

        The pejorative sense of hacker is becoming more prominent largely because the popular press has coopted the term to refer to individuals who gain unauthorized access to computer systems for the purpose of stealing and corrupting data. Hackers, themselves, maintain that the proper term for such individuals is cracker.

  • Oct 09, 13

    The Indiana university technology service knowledge base quotes webster's definition of viruses and trojan horses

      • According to Webster's Collegiate Dictionary, a computer virus is "a computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files, and that usually performs a malicious action (such as destroying data)". Computer viruses are never naturally occurring; they are always man-made. Once created and released, however, their spread is not directly under human control.

          
           
        •  Macro viruses: A macro is a piece of code that can be embedded in a data file. A macro virus is thus a virus that exists as a macro attached to a data file. In most respects, macro viruses are like all other viruses. The main difference is that they are attached to data files (i.e., documents) rather than executable programs.   

          Document-based viruses are, and will likely continue to be, more prevalent than any other type of virus.

            
        •  
        •  Worms: Worms are very similar to viruses in that they are computer programs that replicate functional copies of themselves (usually to other computer systems via network connections) and often, but not always, contain some functionality that will interfere with the normal use of a computer or a program. Unlike viruses, however, worms exist as separate entities; they do not attach themselves to other files or programs. Because of their similarity to viruses, worms also are often referred to as viruses.

           
        •  
        •  Trojan horses: A Trojan horse is a program that does something undocumented which the programmer intended, but that users would not accept if they knew about it. By some definitions, a virus is a particular case of a Trojan horse, namely, one which is able to spread to other programs (i.e., it turns them into Trojans too). According to others, a virus that does not do any deliberate damage (other than merely replicating) is not a Trojan. Finally, despite the definitions, many people use the term "Trojan" to refer only to a non-replicating malicious program
  • Digital law protects against identity theft

    Digital law as it pertains to stealing identity.

  • Oct 09, 13

    White Paper submitted for 6.805/law of cyberspace. written by Professor Hal Abelson and Lawrence Lessig. Dec. 1998 This is a .edu  site.

    • Currently there is no generic system for identification in cyberspace. It is not possible to absolutely identify an entity or to accurately tell whether an object has a specific characteristic. Digital environments have inherent differences from real space which causes this discrepancy, and when implementing an identity system for cyberspace one needs to consider more than just the architectural nature of the system - any system chosen will have social repercussions which need to be also taken into account.
    • Scott Charney and Kent Alexander outline the several ways in which computers can be involved in crime. In all cases a harm is committed which would be considered a crime in the real world, except that a computer is involved in some way. The scenarios involve computers A and B. In the first case, data on computer A is stolen, erased, or damaged. In the second case, computer B is used to commit a crime: this can be either a traditional crime, or a crime involving a victim computer, "A," as in the first case. The third case is one in which a computer is not a target or source of a crime, but contains evidence that a crime was committed, or was used in planning the crime.

    6 more annotations...

  • Oct 09, 13

    The national conference of state legislation's list of individual states and their criminal penalties and restitution provision. This site is a .org. It lists Heater Morton of Denver as the NCSL staff contact.The site was last updated on July 23rd, 2012.

    • Identity theft occurs when someone uses another person's personally identifying information, like a person's name, Social Security number, or credit card number or other financial information, without permission, to commit fraud or other crimes.
      • “Digital identity“ is the sum of all digitally 
        available information about an individual. It is 
        becoming increasingly complete and traceable, 
        driven by the exponential growth of available 
        data and the big data capabilities to process it

      •  “Digital identity“ is the sum of all digitally 
        available information about an individual. It is 
        becoming increasingly complete and traceable, 
        driven by the exponential growth of available 
        data and the big data capabilities to process it.

  • Digital law protects against Pirating software

    Digital law as it pertains to software piracy.

  • Oct 09, 13

    U.S. maximum criminal penalties for infringment are up to $250.00.00 and jail term of up to 5 years.

    3 more annotations...

    • BSA administers anti-piracy enforcement programs in over 60 countries worldwide, helping its members protect their intellectual property and drive innovation by taking legal action against commercial end-user license infringement.
  • Oct 09, 13

    Farlex provides the free dictionary. It is a .com that provides dictionary, legal dictionary, medical dictionary, thesaurus, acronyms, idioms, encyclopedia, and wikipedia encyclopedia. The Legal section defines Consumer software privacy. archives date back as far as June 2005.

    • Consumer Software Piracy

      The unauthorized use, possession, downloading, duplication, distribution, or sale of copyrighted computer software.

      Copyright infringement is a serious problem for the computer software industry. Programs can be copied easily on a personal computer, thus making detecting and prosecuting infringements of software copyrights extremely difficult. By estimates of the Software Publisher's Association, nearly 25 percent of all software in use in the United States is pirated (acquired through unlawful copying), and domestic and international losses ran to $10.9 billion in 2001 alone. The growth of computer networks, especially the Internet, presents further problems by providing the means for the almost effortless transmission of data. In the 1990s, Congress strengthened protections for software, and aggressive litigation by the computer industry targeted corporations, individuals, and counterfeiters in an effort to clamp down on this massive theft. Yet during the early 2000s, law enforcement remained difficult as software pirates turned to new technologies to share files illegally.

      The Copyright Act (17 U.S.C.A. §§ 1 et seq.) gives exclusive rights to the authors of computer software. Their work is a type of Intellectual Property, which the law treats differently from tangible property. Software companies own their copyrighted programs even after selling them to consumers

  • Digital law protects against hacking systems and networks

    Digital law as it pertains to system and network hacking.

  • Oct 09, 13

    The Washington post reports on an individual cyber crime in which the suspect is caught and convicted. The government still questions rather or not current laws and punishment are fitting of cyber crimes and it questions what qualifies as a digital crime. The post is a long standing .com. It has long preserved archives. The Washington post article was written by Jerry Markon.

    • The hacker, Andrew Auernheimer, was convicted and sentenced last month to more than three years in prison for obtaining about 120,000 e-mail addresses of iPad users from AT&T’s Web site
    • and giving them to the Web site Gawker

    1 more annotation...

  • Oct 09, 13

    The National conference of state legislature provides a list of state laws pertaining to computer hacking. It also defines hacking as Hacking is breaking into computer systems, frequently with intentions to alter or modify existing settings. Sometimes malicious in nature, these break-ins may cause damage or disruption to computer systems or networks. People with malevolent intent are often referred to as "crackers"--as in "cracking" into computers.
    "Unauthorized access" entails approaching, trespassing within, communicating with, storing data in, retrieving data from, or otherwise intercepting and changing computer resources without consent. These laws relate to either or both, or any other actions that interfere with computers, systems, programs or networks. 

    • Hacking is breaking into computer systems, frequently with intentions to alter or modify existing settings. Sometimes malicious in nature, these break-ins may cause damage or disruption to computer systems or networks. People with malevolent intent are often referred to as "crackers"--as in "cracking" into computers. 

        "Unauthorized access" entails approaching, trespassing within, communicating with, storing data in, retrieving data from, or otherwise intercepting and changing computer resources without consent. These laws relate to either or both, or any other actions that interfere with computers, systems, programs or networks. 

    • Intellectual Property Theft and Supply Chain Risks

       

      Intellectual property rights violations, including theft of trade secrets, digital piracy, and trafficking counterfeit goods, also represent high cyber criminal threats, resulting in losses of billions of dollars in profits annually. These threats also pose significant risk to U.S. public health and safety via counterfeit pharmaceuticals, electrical components, aircraft parts, and automobile parts.

       

      Cyber crime that manipulates the supply chain could pose a threat to national security interests and U.S. consumers. Poorly manufactured computer chips or chips that have been salvaged and repackaged infringe on intellectual property rights and could fail at critical times, posing a serious health and safety threat to U.S. citizens. Malware could be embedded on the chips to exfiltrate information from computers and result in the theft of personally identifiable information (PII) that could then be used in future cyber crimes. As the quality of counterfeit goods increases, U.S. consumers may be challenged to tell the difference between authentic and fraudulent goods.

       

      Operation Cisco Raider is a joint initiative between the U.S. and Canada that targets the illegal distribution of counterfeit network hardware manufactured by private entities in China. The use of counterfeit network components can lead to exploitation of cyber infrastructure vulnerabilities and even network failure. Since 2006, Operation Cisco Raider has seized over 3,500 network components amounting to $3.5 million of Cisco retail products. Ten individuals have been convicted as a result of the joint initiative.

    • As the subcommittee knows, we face significant challenges in our efforts to combat cyber crime. In the current technological environment, there are numerous threats to private sector networks, and the current Internet environment can make it extremely difficult to determine attribution.

       

      We are optimistic that by strengthening relationships with our domestic and international counterparts, the FBI will continue to succeed in identifying and neutralizing cyber criminals, thereby protecting U.S. businesses and critical infrastructure from grave harm.

       

      To bolster our efforts, we will continue to share information with government agencies and private industry consistent with applicable laws and policies. We will continue to engage in strategy discussions with other government agencies and the private sector to ensure that American ingenuity will lead to new solutions and better security. We will continue to build a skilled workforce to operate in this challenging environment.

       

      We look forward to working with the subcommittee and Congress as a whole to determine a successful course forward for the nation that allows us to reap the positive economic and social benefits of the Internet while minimizing the risk posed by those who would use it for nefarious purposes.

  • Digital law protects against file theft

    Digital law as it pertains to use of file stealing/sharing

  • Oct 09, 13

    This source cites specific laws and state codes. The intent of the site is to state legal facts on the subject of music.

    • Copyright law protects the value of creative work. When you make unauthorized copies of someone’s creative work, you are taking something of value from the owner without his or her permission.  Most likely, you’ve seen the FBI warning about unauthorized copying at the beginning of a movie DVD.  Though you may not find these messages on all compact discs or music you’ve downloaded from the Internet, the same laws apply.  Federal law provides severe civil and criminal penalties for the unauthorized reproduction, distribution, rental or digital transmission of copyrighted sound recordings. (Title 17, United States Code, Sections 501 and 506).
    • governed by the copyright laws. Therefore, unauthorized uploading and unauthorized downloading are unauthorized uses governed by the copyright laws . . . ."
      Ohio v. Perry, 83 Ohio St. 3d 41, 697 N.E.2d 624 (Ohio 1998).

    4 more annotations...

  • Oct 09, 13

    digital millennium copyright act of 1998

      • high light functionality problematic on this page

  • Oct 09, 13

    Carnegie Mellon utilizes and educates on the matter of digital law and copyright. The site is a .edu. 

    • Carnegie Mellon University raises awareness about copyright law and takes appropriate action in support of enforcement as required by policy and law
    • In addition, the policy prohibits the duplication of software for multiple uses, meeting the Digital Millennium Copyright Act (DMCA) requirements
1 - 20 of 21 Next ›
20 items/page
List Comments (0)