08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

the computer attacker’s identity, law enforcement’s ability to characterize<br />

intent, and the laws of the country concerned. In the US, for example, there are<br />

specific laws that govern what a government agency can and cannot do when<br />

attacked. That law grows fuzzier when the military is involved since the latter’s<br />

activities are guided by the 1878 Posse Comitatus Act that prohibits the military<br />

from taking on a law enforcement function or from executing civil laws.<br />

John Brinkerhoff, an expert on the Posse Comitatus Act, noted that the<br />

real intent of Posse Comitatus was “that it restored to the president the sole<br />

authority for authorizing the use of armed force to enforce the laws of the<br />

US.” 543 This apparently means that the president could authorize the armed<br />

forces to protect ITSELF from information attacks and to actively seek and<br />

destroy the perpetrators. More important for the Information Age, Brinkerhoff<br />

added that a new law is required, one that sets the conditions for the use of the<br />

armed forces in the homeland security and modern (Information Age) context.<br />

The National Guard, which has state troops under the control of a state<br />

governor, does not fall under the act.<br />

A US Department of Justice site (http://www.usdof.gov/criminal/<br />

cybercrime) lists US federal computer intrusion laws. Recent legislation<br />

includes two actions: the USA Patriot Act of 2001 and field guidance on new<br />

authorities relating to computer crime and electronic evidence enacted in the<br />

USA Patriot Act. The Patriot Act is designed to unite and strengthen the US by<br />

providing the appropriate tools required to intercept and obstruct terrorism. It<br />

establishes a counterterrorism fund in the Treasury, amends federal criminal<br />

code to authorize enhanced surveillance procedures (to include computer fraud<br />

and abuse), provides guidelines for investigating money laundering concerns,<br />

removes obstacles to investigating terrorism (granting the FBI authority to<br />

investigate fraud and computer related activity for specific cases), and<br />

strengthens criminal laws against terrorism, among other issues. 544<br />

The second new authority, Field Guidance on New Authorities that<br />

Relate to Computer Crime and Electronic Evidence Enacted in the USA Patriot<br />

Act of 2001, provides authority to do several things. This includes intercepting<br />

voice communications in computer hacking investigations, allowing law<br />

enforcement to trace communications on the Internet and other computer<br />

networks within the pen register and trap and trace statute (“pen/trap” statue),<br />

intercepting communications of computer trespassers, writing nationwide<br />

543 John Brinkerhoff, “Inside IT,” Homeland and Security and Information Technology<br />

insert to Defense News, p. 18.<br />

544 See http://thomas.loc.gov/cgibin/bdquery/z?d107:HR03162:@@@L&summ2=m&.<br />

330

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!