Computer Crime

Only available on StudyMode
  • Download(s) : 140
  • Published : May 9, 2013
Open Document
Text Preview

Richard W. Aldrich INSS Occasional Paper 32 Information Operations Series April 2000 USAF Institute for National Security Studies USAF Academy, Colorado


The views expressed in this paper are those of the authors and do not necessarily reflect the official policy or position of the Department of the Air Force, the Department of Defense, or the U.S. Government. This paper is approved for public release by SAF/PAS; distribution is unlimited. ******* Comments pertaining to this paper are invited; please forward to: Director, USAF Institute for National Security Studies HQ USAFA/DFES 2354 Fairchild Drive, Suite 5L27 USAF Academy, CO 80840 phone: 719-333-2717 fax: 719-333-2716 email: Visit the Institute for National Security Studies home page at



Foreword Executive Summary Introduction World Situation Potential Impact Generally Russia's Draft Resolution Information Terrorism and Computer Crimes Introduction Vulnerability of the United States Impact Overhyped? Definitional Issues Computer Crime 1. OECD Proposed List of Computer Crimes 2. COE Proposed List of Computer Crimes 3. Draft Convention on Computer Crime Information Terrorism Jurisdictional Issues Prescriptive 1. Universal a. International Law b. Domestic Implementation 2. Territorial Jurisdiction a. Subjective (1) The Criminal Act (2) Territorial Limits b. Objective (1) The Act (a) Agency 36 (b) Continuing Act (2) The Intent (3) The effects 3. Passive Personality 4. Nationality 5. Protective Principle 6. Consensual 7. Concurrent Jurisdiction 8. Domestic 9. General Considerations a. Mutual Assistance v vii ix 1 1 3 4 6 6 7 8 8 9 9 11 15 19 27 31 31 31 31 33 34 34 34 35 35 35 36 38 38 39 40 41 41 43 44 44 45

b. Recognition of Judgements c. Extradition d. Evidentiary Problems Enforcement 47 1. Transborder Searches via Electronic Access a. Without Authorization b. Tracing 2. Data Collection and Preservation Constitutional Issues First Amendment Fourth Amendment Fifth Amendment Statutory Concerns Privacy Other What Do Existing Treaties Already Cover Conclusion Endnotes

45 46 46 49 49 49 50 52 52 54 54 56 56 58 58 60 62


We are pleased to publish this thirtieth-second volume in the Occasional Paper series of the US Air Force Institute for National Security Studies (INSS). This paper, along with Occasional Paper 33, Steven Rinaldi's Sharing the Knowledge: Government-Private Sector Partnerships t0 Enhance Information Security, address the context surrounding the question of how the U.S. military responds to the cyber threat facing the American military and society today. Rinaldi examines the issues of partnering and sharing sensitive information across private and governmental sectors as a central requirement of a national risk reduction and management effort in the face of the threat of cyber attack. In this paper, Richard Aldrich examines definitional and jurisdictional issues, Constitutional and statutory concerns, and both the necessity and desirability of an international treaty addressing cyberterrorism and computer crime. Together these two papers provide fresh thinking and critical perspective on a security threat arena that increasingly captivates the headlines. About the Institute INSS is primarily sponsored by the National Security Policy Division, Nuclear and Counterproliferation Directorate, Headquarters US Air Force (HQ USAF/XONP) and the Dean of the Faculty, USAF Academy. Our other sponsors currently include the Air Staff’s Intelligence, Surveillance, and Reconnaissance Directorate (XOI) and the Air Force's 39th Information Operations Squadron; the Secretary of Defense’s Office of Net Assessment (OSD/NA); the Defense Threat Reduction Agency (incorporating the sponsorship of the Defense Special Weapons Agency and the On-Site Inspection...
tracking img