Icitdw Essay, Research Paper
Computer crimes seem to be an increasing problem in today’s society. The main aspect concerning these offenses is information gained or lost. As our government tries to take control of the information that travels through the digital world, and across networks such as the InterNet, they also seem to be taking away certain rights and privileges that come with these technological advancements. These services open a whole new doorway to communications as we know it. They offer freedom of expression, and at the same time, freedom of privacy in the highest possible form. Can the government reduce computer crimes, and still allow people the right to freedom of expression and privacy?INFORMATION CONTROL IN THE DIGITIZED WORLD In the past decade, computer technology has expanded at an incredibly fast rate, and the information stored on these computers has been increasing even faster. The amount of money, military intelligence, and personal information stored on computers has increased far beyond expectations. Governments, the military, and the economy could not operate without the use of computers. Banks transfer trillions of dollars every day over inter-linking networks, and more than one billion pieces of electronic mail are passed through the world’s networks daily. It is the age of the computer network, the largest of which is known as the InterNet. A complex web of communications inter-linking millions of computers together — and this number is at least doubling every year. The computer was originally designed as a scientific and mathematical tool, to aid in performing intense and precise calculations. However, from the large, sixty square foot ENIAC (Electronical Numerical Integrator and Calculator) of 1946, to the three square foot IBM PC of today, their uses have mutated and expanded far beyond this boundary. Their almost infinite capacity and lightning speed, which is increasing annually, and their low cost, which is decreasing annually, has allowed computers to stabilize at a more personal level, yet retain their position in mathematical and scientific research1 . They are now being used in almost every aspect of life, as we know it, today. The greatest effect of computers on life at this present time seems to be the InterNet. What we know now as the InterNet began in 1969 as a network then named ArpaNet. ArpaNet, under control by the pentagon’s Defense Advanced Research Projects Agency, was first introduced as an answer to a problem concerning the government question of how they would communicate during war. They needed a network with no central authority, unlike those subsequent to this project. A main computer controlling the network would definitely be an immediate target for enemies. The first test node of ArpaNet was installed at UCLA in the Fall of 1969. By December of the same year, three more nodes were added, and within two years, there was a total of fifteen nodes within the system. However, by this time, something seemed to be changing concerning the information traveling across the nodes. By 1971, government employees began to obtain their own personal mail addresses, and the main traffic over the net shifted from scientific information to personal mail and gossip. Mailing lists were used to send mass quantities of mail to hundreds of people, and the first newsgroup was created for discussing views and opinions in the science fiction world. The networks decentralized structure made the addition of more machines, and the use of different types of machines very simple. As computer technology increased, interest in ArpaNet seemed only to expand. In 1977, a new method of transmission was put into effect, called TCP/IP. The transmission control protocol (TCP) would convert messages into smaller packets of information at their source, then reassemble them at their destination, while the InterNet protocol (IP) would control the addressing of these packets to assure their transmission to their correct destinations. This newer method of transmission was much more efficient then the previous network control protocol (NCP), and became very popular. Corporations such as IBM and DEC began to develop TCP/IP software for numerous different platforms, and the demand for such software grew rapidly. This availability of software allowed more corporations and businesses to join the network very easily, and by 1985, ArpaNet was only a tiny portion of the newly created InterNet. Other smaller networks are also very widely used today, such as FidoNet. These networks serve the same purpose as the InterNet, but are on a much smaller scale, as they have less efficient means of transferring message packets. They are more localized, in the sense that the information travels much more slowly when further distances are involved. However, the ease of access to these networks and various computers has allowed computer crimes to increase to a much higher scale. These computers and networks store and transfer one thing — information. The problem occurs when we want to determine the value of such information. Information lacks physical properties, and this intangible aspect of data creates problems when developing laws to protect it. The structure of our current legal system has, to this point, been based on ascertainable limits. Physical properties have always been at its main core2 . In the past, this information, or data, has been ‘converted’ into tangible form to accommodate our system. A prime example is the patent, which is written out on paper. Today, however, it is becoming much more difficult to ‘convert’ this data into a physical form, as the quantity is increasing so rapidly, and this quantity of information is being stored in a virtual, digitized space3 . It is very important to realize and emphasize that computers and networks store and transfer only information, and that most all of this information can be altered, in some way, undetectably. For example, when a file is stored in the popular DOS environment (and also in environments such as Windows, OS/2, and in similar ways, UNIX), it is also stored with the date, time, size, and four attributes — read-only, system, hidden, and archive. One may consider checking the date at which the document, or information stored on the computer, was saved to determine if it was modified. However, this is also digital information, and easily changed to whatever date or time the operator prefers. One may also consider the attributes stored with the file. If a file is flagged as ‘read-only,’ then perhaps it cannot be overwritten. This is surely the case — however, this attribute is easily turned off and on, as it is also information in a digitized sense, and therefore very easily changed. This is the same case when a file is ‘hidden’. It may very well be hidden to the novice user, but it is easily seen to anyone who has even a slight knowledge of the commands of the system. One may also consider moving this information to a floppy disk in order to preserve its originality; but we are once again giving it a physical aspect, which we earlier addressed as being a close to impossible task when involved with the amount of information involved in this area today. Digital information is infinitely mutable, and the information that protects this information is infinitely mutable4 . In order to understand how to control this information, we must first understand what information and it’s value — especially that of a digital nature — is. One cannot specifically define information in a whole. In today’s society, ‘knowledge is power’ seems to be a common phrase, and a quite true one. It would be even more true to
say ‘knowledge can be power.’ It’s how we use this knowledge tha
Addison-Wesley, Bernard. How the Internet Came to Be. New York: Vinton Cerf, 1993. Communications Decency Act. Enacted by the U.S. Congress on February 1, 1996. Computer Fraud and Abuse Statute. Section 1030: Fraud and related activity in connectionwith computers. Denning, Dorothy. “Concerning Hackers Who Break into Computer Systems”. Speech presentedat the 13th National Computer Security Conference, Washington, DC, 1990. Gates, Bill. The Road Ahead. New York: Penguin Books USA, inc, 1995. The Gatsby. “A Hackers Guide to the Internet”. Phrack. Issue 33, File 7; 15 September1991. Icove, David, Karl Seger, and William VonStorch. Fighting Computer Crime. USA: O’ReillyBooks, 1996. Time Life Books. Revolution in Science. Virginia: Time Life Books, inc., 1987. Wallich, Paul. “A Rouge’s Routing.” Scientific American. May 1995, pp. 31.