Wireless Operational Security

C.2 Security Risks and Legal Protections Recap

Federal statutes address crimes against federal institutions, interstate crimes, and acts against the security of the country, such as terrorism. Because of the nature of computer networks, interstate commerce and federal telecommunications laws are often used to prosecute hackers. Early on, laws written for telephone fraud were applied to computer crime; more recently, computer-specific crime laws, as well as new sentencing guidelines for computer criminals, have been enacted. Practitioners should be familiar with the laws of whatever state or country in which their organizations operate . They should also know exactly what evidence and documentation will be required to make a case against an alleged intruder. From a compliance and enforcement standpoint, at a minimum, a practitioner in the United States should be aware of the following regulatory requirements as wireless networks are designed and managed:

As an example of the variances that exist, let's look at the Texas Computer Crimes Act, which is not substantially different from that of any other state. Therein, it states that "a person commits an offense if the person knowingly accesses a computer system without the effective consent of the owner." The offense is a felony if the person's intent is to obtain a benefit from the action. A computer system is defined by this statute as a "data processing device that functions by the manipulation of electronic or magnetic impulses" and access is defined as a person "making use of" data or information obtained from such access. A strict interpretation of this definition would mean that simply looking at someone's digital watch without permission could be a felonious act.

Категории