Solving Cyber Risk by Andrew Coburn & Éireann Leverett & Gordon Woo

Solving Cyber Risk by Andrew Coburn & Éireann Leverett & Gordon Woo

Author:Andrew Coburn & Éireann Leverett & Gordon Woo
Language: eng
Format: epub
ISBN: 9781119490920
Publisher: Wiley
Published: 2018-12-18T00:00:00+00:00


7.2.2 The Origins of US Legislation

The legend of the computer whiz kid is part of hacking folklore, and has also had an influence on the development of US legislation on cyber crime. In the 1983 Hollywood movie War Games, a teenage computer-games enthusiast, who does not believe any system is totally secure, breaks into a US military supercomputer programmed to predict possible outcomes of nuclear war, and almost starts a world war. For a kid, this was just playing around; for policy makers on Capitol Hill, this was a crime. This near-disaster scenario was cited the following year in a House Committee Report to a comprehensive crime bill, which ensured that computer crimes did not go unpunished. Emerging from this bill was the 1986 Computer Fraud and Abuse Act, which prohibits unauthorized computer access, interference, and obtaining data. The Electronic Communications Privacy Act of 1986 extended government restrictions on wiretaps from telephone calls to include transmissions of electronic data by computer.

The passage of these two bills in the same year reflects the fundamental duality of cyber risk. Hacking skills can be used for offense as well as defense. A teenager can hack into the Pentagon computer system. Later on, as a mature adult, he could work for the National Security Agency (NSA), hacking on behalf of the US government. Indeed, the opportunity for authorized hacking is one of the attractions in working for the NSA. With all types of espionage, real world and cyber, what is authorized in the tradecraft of spying may not necessarily be fully compliant with US law, let alone the law of the country being spied upon. This explains why espionage is invariably denied, or not commented upon if the evidence is overwhelming.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Deep Learning with Python by François Chollet(12589)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7789)
Grails in Action by Glen Smith Peter Ledbrook(7705)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6423)
Kotlin in Action by Dmitry Jemerov(5073)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3843)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3090)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Art Of Deception by Kevin Mitnick(2613)
Drugs Unlimited by Mike Power(2474)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2347)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2317)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2266)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2246)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2197)
JavaScript by Example by S Dani Akash(2140)
DarkMarket by Misha Glenny(2086)
Wireless Hacking 101 by Karina Astudillo(2080)
Full-Stack React Projects by Shama Hoque(1993)