08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

search warrants for email, and deterring and preventing cyberterrorism. The<br />

latter provision raises the maximum penalty for hackers that damage protected<br />

computers (and eliminates minimums); states that hackers need only show<br />

intent to cause damage, not a particular consequence or degree of damage;<br />

provides for the aggregation of damage caused by a hacker’s entire course of<br />

conduct; creates a new offense for damaging computers used for national<br />

security and criminal justice; expands the definition of “protected computer” to<br />

include computers in foreign countries; counts prior state convictions of<br />

computer crime as “prior offenses”; and defines computer “loss.” In addition,<br />

the guidance develops and supports cybersecurity forensic capabilities. 545<br />

US federal criminal code related to computer crime includes the<br />

following:<br />

• 18 USC. 1029, Fraud and Related Activity in Connection with<br />

Access Devices<br />

• 18 USC. 1030, Fraud and Related Activity in Connection with<br />

Computers<br />

• 18 USC. 1362, Communicationlines, Stations, or Systems<br />

• 18 USC. 2511, Interception and Disclosure of Wire, Oral, or<br />

Electronic Communications Prohibited<br />

• 18 USC. 2701, Unlawful Access to Stored Communications<br />

• 18 USC. 2702, Disclosure of Contents<br />

• 18 USC. 2703, Requirements for Governmental Access.<br />

Formatted: Bulle<br />

In peacetime, not only nation-states but the United Nations may have<br />

some power in the computer area. For example, the UN Security Council<br />

(UNSC) may have limited power to authorize computer actions by countries<br />

electronically attacked by other nations. Chapter VII provides the UNSC with<br />

the power to authorize the “use of coercive measures, including military force,<br />

to maintain or restore international peace and security, where it determines a<br />

threat to the peace exists, or a breach of the peace, or act of aggression has<br />

occurred.” 546 A computer network attack (CNA) causing widespread damage,<br />

economic disruption, and loss of life might precipitate such a response from the<br />

UNSC. The intent of the offender and the consequences of the offending action<br />

would be examined. The UN Charter’s Article 51 also includes the doctrines of<br />

anticipatory self-defense and self-defense in neutral territory as reasons for<br />

545 See http://www.cybercrime.gov/PatriotAct.htm.<br />

546 LTC Jordan, “Information Operations,” Handout from the International and<br />

Operational Law Department of the Judge Advocate General’s School, Charlottesville,<br />

Virginia, p. 46.<br />

331

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!