Vērtējums:
Publicēts: 01.12.1996.
Valoda: Angļu
Līmenis: Vidusskolas
Literatūras saraksts: Nav
Atsauces: Nav
  • Eseja 'Common Security Arguments', 1.
  • Eseja 'Common Security Arguments', 2.
  • Eseja 'Common Security Arguments', 3.
  • Eseja 'Common Security Arguments', 4.
  • Eseja 'Common Security Arguments', 5.
Darba fragmentsAizvērt

Section 816 requires Attorney General to establish regional computer forensic laboratories as considers appropriate and providing support to computer forensic laboratories enabling training capabilities and certain forensic provided. Legal system's recent developments may spell ending of hacking, unless otherwise. Lawmakers' acknowledged balancing new terror-fighting tools needed with existing civil liberties but could resulting harsh penalties with Computer Fraud and Abuse Act (CFAA) inclusion; ranging to life imprisonment maximum for unsolicited e-mail (spam) senders and hackers, according to security and legal experts. (Lyman, 2001) Electronic Frontier Foundation's (EFF) legal director stated, as much as we dislike it, computer break-in or Web site defacing doesn't equate with terrorism, as well as equating low-level offenses with highest-level offences as there isn't terrorism link here. (Lyman, 2001) Equating hacking with 9/11 simmers down the terrible feeling of terrorism but fact of hacking and terrorism is linked upset many people.
What Happens If They're Not Caught?

Atlants