08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Cybercrime is a more accurate definition than computer crime. It<br />

evolved after the term “cyberspace” was made popular by the media. Although<br />

it did not fully define cybercrime, the Council of Europe discussed this issue<br />

and began developing a common language for dealing with such criminal<br />

activities. Throughout the documents from the Council of Europe, the terms<br />

“computer-related crime,” “cyber-space offenses,” and cybercrime are used<br />

interchangeably. Representatives noted<br />

The integration of telecommunication and information systems,<br />

enabling the storage and transmission, regardless of distance, of all<br />

kinds of communication, opens a whole range of new possibilities.<br />

These developments were boosted by the emergence of information<br />

super-highways and networks, including the Internet, through which<br />

virtually anybody will be able to have access to any electronic<br />

information service irrespective of where in the world he is located. By<br />

connecting to communication and information services users create a<br />

kind of common space, called ‘cyber space’. 541<br />

The Council went on to define “cyber-space offenses” as those offenses<br />

committed against the integrity, availability, and confidentiality of computer<br />

systems and telecommunications networks. Examples include illegal money<br />

transactions, offering illegal services, violation of copyright, and issues that<br />

violate human dignity and the protection of minors.<br />

The US government has no formal definition for cybercrime or<br />

computer crime. It does, however, have statutes that give examples (instead of<br />

definitions) of what is punishable under US federal code. The US statutes will<br />

be discussed in more detail later. What follows is a listing of types of<br />

cybercrimes as defined by US federal code.<br />

(1) Data Manipulation for Reasons of Theft, Fraud, or Sabotage<br />

Computer data by its nature is very volatile. The data on a computer<br />

system is stored electronically on some type of digital media. As the saying<br />

goes, it is all 1s and 0s. The manipulation of that data and the ability to know<br />

what has been changed depends on a variety of factors. Like other crimes, the<br />

criminal has to have motive, access, and capability to commit the crime of data<br />

manipulation. A disgruntled employee for a software company could install<br />

code into a commercial software package to make the program unmanageable<br />

at some point in the future and accomplish “date” manipulation. A bank worker<br />

Formatted: Bulle<br />

541 William Gibson, Neuromancer, 1984<br />

305

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!