”It is no longer a question of a nation protecting its own security, it is a question
of the global community protecting itself.”

Kapil Sipal
Minister for Communication and Information Technology
India (2012)

To
FBI for guiding me to the knowledge of computer crime, and

INTERPOL that let me open up the global combat, and

ITU for searching for a global common ground on cybersecurity,

And

In the Memory of Professor Jon Bing, University of Oslo

© 2020 Cybercrime Research Institute GmbH

Herstellung und Verlag: BoD – Books on Demand GmbH, Norderstedt

ISBN: 9783750459748

Bibliografische Information der Deutschen Nationalbibliothek Die Deutsche Nationalbibliothek verzeichnet diese Publikation in der Deutschen Nationalbibliografie; detaillierte bibliografische Daten sind im Internet über www.dnb.de abrufbar.

PREFACE AND ACKNOWLEDGEMENT

Senator Joseph R. Biden Jr.

Senator Richard G. Lugar:

June 1, 2006

30 years anniversary for the Ribicoff Bill

The Ribicoff Bill was introduced to the 95th Congress, First Session, in May 1977 as S.1766 the ”Federal Computer Systems Protection Act of 1977.”

The Bill was not enacted as law, but this pioneer Bill created an awareness and guidance for national legislations around the world. It was the beginning of a new age for law enforcement and legislations, the computer age.

Senator Biden described it in the closing remarks of his opening statement at the hearing on June 21, 1978 as follows:

”First we turn to the distinguished senior senator from Connecticut who deserves a great deal of credit for hearing those voices in the wilderness and focusing the

Senate´s and this committee´s attention on the crime of the future –computer crime.”

I visited the Senate in 1978 and learned of the Bill and has since been involved with computer crime laws and cybercrime laws, both on national and international level. The Ribicoff Bill was of great importance to all of us working with this subject in the early stage of the legal development, and I suggest that the Bill should deserve a celebration on the 30 years anniversary in 2007.

Best regards

Stein Schjolberg

Chief Judge

Moss tingrett Court

Norway

www.cybercrimelaw.net

My interest in computer crime started in 1976 when I visited USA on a study tour organized by FBI. My visit included also a meeting at the US Department of Justice, where I was introduced to the new phenomenon “computer crime” at a meeting with Nathaniel E. Kossack, Deputy Assistant Attorney General, Criminal Division, US Dept. of Justice. I made a report to the Norwegian Ministry of Justice in November 1976.

I was also associated with Professor Jon Bing, the Norwegian Research Center for Computers and Law, Faculty of Law, University of Oslo, on a research project on computer crime under a grant from the Norwegian Ministry of Justice.

This cooperation resulted in 1977 in seminars in Stockholm, Copenhagen and Oslo, in collaboration with the police and University authorities in the Scandinavian capitals.

Another study tour to the US Department of Justice, US Senate, and many FBI offices around the United States was made in 1978. The Faculty of Law, University of Oslo, published the report.

The round trip to the FBI offices around United States in 1976 and 1978 was organized by Special Agent Dennis Dickson, then Assistant Legal Attache, US Embassy, London, United Kingdom.

I was then invited as a speaker at the 3rd INTERPOL Symposium on International Fraud in Paris and was one of individuals that introduced INTERPOL to computer crime.

I am deeply grateful to all individuals and institutions mentioned above in these pioneer years.

A special thanks for the cooperation and assistance in the recent years is addressed to Professor Solange Ghernaouti, Switzerland, and CEO Graham Butler, United Kingdom. They were members of the global High-Level Experts Group (HLEG), at ITU, Geneva, and from 2013 have joined me as members of the ThinkTank “Peace, Justice and Security in Cyberspace”.

Another special thanks goes to Secretary-General Hamadoun Toure, ITU, that appointed me as the Chairman of HLEG.

A special thanks is also addressed to professor Marco Gercke, Germany, for all his support and assistance.

I am deeply grateful to my wife Aasa, and my sons Kai and Rune that have assisted me in my work throughout the years.

The following book is a brief introduction to the history of the legal framework for combating computer crime, and as it later has been termed “cybercrime”.

Foreword on the Second edition (2016)

In 2016 I celebrate 40 years of research on computer crime and cybercrime from 1976 until 2016. My basic research was developed at the Norwegian Research Center for Computers and Law, Faculty of Law, University of Oslo, and at the SRI International (Stanford Research Institute), Menlo Park, California, USA.

In the Second edition I have updated the book with the global developments in cyberspace issues since 2014, on cybersecurity and cybercrime. The developments of Internet of Things (IoT), criminal conducts in social media, and public-private partnerships for the investigation of cybercrime, are especially important to follow. The very serious terrorist attacks have revealed that law enforcements access to encrypted communications have been a great problem, even with a Court Order.

A Global Convention or Declaration for Cyberspace is clearly needed as a framework on cybersecurity and cybercrime, and as a contribution for peace, security and justice in Cyberspace.

I am deeply grateful to Professor Marco Gercke, Germany, for all his assistance and making this book in a Second edition.

March 2016

Stein Schjolberg

Foreword on the Third edition (2019)

In the Third edition I have updated the book with the global developments in cyberspace issues on cybersecurity and cybercrime since 2016. Many important declarations and statements have been made the last two years. But there have not been any developments on binding global norms and regulations on the United Nations level. Without any consensus, the global situation may be described as polarized.

Today the developments of the global IT companies such as Google, Facebook, Apple, Amazon, and Microsoft, have been so rapid and the impact on the global society the last 6-7 years enormous, without developing any international regulations and guidelines for cyberspace.

It may be argued that the global private IT companies have now been the leading organisations on global Internet governance, instead of United Nations organisations.

The rapid growth of cyberspace has created new developments for online vulnerabilities and cyberattacks on the critical information infrastructures of sovereign States. The global cyberattacks may even constitute a threat to international peace and security and need a response in global regulations and guidelines in a global framework to promote peace, security and justice, prevent conflicts and maintain focus on cooperation among all nations. Dialogues and cooperation between governments on norms and standards in cyberspace must best be achieved through a United Nations framework. Regional and bilateral agreements may not be sufficient.

The principles of State sovereignty must also apply in cyberspace. States enjoy sovereignty over any cyber infrastructure located on their territory and activities associated with that cyber infrastructure.

A proposal for a United Nations Convention or Declaration for Cyberspace may today be described as a search for a common ground.

I am deeply grateful to Professor Marco Gercke, Germany, for his continuesly assistance and making this book in a Third edition.

I made a closing statement in my presentation at United Nations World Summit on the Information Society (WSIS) Forum 2018, Geneva, March 19-23, 2018, as follows:

I pray that USA and China will reopen again their excellent High-level Joint Dialogues, that was held every second time in Beijing and Washington DC, last time in December 2016. And in adition invite Russia to participate in the dialogues.

December 2019

Stein Schjolberg

Index
  1. INTRODUCTION
  2. THE HISTORY OF COMPUTER CRIME AND CYBERCRIME BEFORE 2000
  3. WHAT IS CYBERCRIME?
  4. THE ROAD IN CYBERSPACE TO UNITED NATIONS AFTER 2000
  5. INTERPOL
  6. REGIONAL ORGANISATIONS
  7. THE DEVELOPMENTS OF CYBERCRIME LEGISLATION
  8. ONLINE CHILD SEXUAL ABUSE
  9. POLICE INVESTIGATION ON CYBERCRIME
  10. PUBLIC-PRIVATE PARTNERSHIPS
  11. INFORMATION OPERATIONS
  12. SEARCHING FOR A COMMON GROUND
  13. AN INTERNATIONAL CRIMINAL COURT OR TRIBUNAL FOR CYBERSPACE
  14. A UNITED NATIONS FRAMEWORK FOR SECURITY, PEACE, AND JUSTICE IN CYBERSPACE
1. INTRODUCTION

1.1 A presentation of the book

This book presents the history of computer crime and cybercrime from the very beginning with punch cards, to the current data in the clouds and the Internet of Things (IoT).

Since the first introduction of computer technology to governmental operations and the private sector in the 1970-ties, criminals have also found and exploited weaknesses in the technology.

Individual pioneers, especially in the United States, recommended from the late 1970-ties a need for updating existing criminal laws to include the technological innovations. This book presents the great early efforts by various computer crime experts, when private personal use of computer technology was still in the early stages of the growth curve. Even these early efforts recognized the potential for globalization of some categories of malicious behaviors and recommended that States should come together and to create compatible laws and investigative cooperation.

The text that follows this introduction provides also a brief history of these computer experts and their recommendations.

The first comprehensive initiative on proposals for new computer crime legislation was the Ribicoff Bill in the United States in 1977, presented by Senator Abe Ribicoff. This Bill created awareness around the world as to the potential problems that unauthorized computer usage could cause, and the need to define the scope of the topic in order to adequately address the problems in a comprehensive but flexible way.

This book then introduces an overview over the pioneer States that followed the recommendations in the 1980-ties.

The pioneer period of individuals and States may be considered as ended with the introduction of the first recommendations from the regional organizations in 1989. But INTERPOL was the first international organization that initiated information and discussions on computer crime in 1980/81 and it was followed up by the OECD guidelines on judicial measures.

The first comprehensive recommendation was presented in 1989 by The Council of Europe Recommendation on Computer-related crime. From then on the regional international organizations took the lead, and presented the guidelines that the States were recommended to follow.

The book presents the guidelines for computer crime legislation from the regional organizations in the 1990-ties and later on.

From the year 2000 the global organization of United Nations participated in the developments, also as leading organizations in the development, through United Nations organizations such as the International Telecommunication Union (ITU) in Geneva, and the United Nations Office for Drug and Crime (UNODC) in Vienna.

Cyberspace1 as the fifth common space, after land, sea, air and outer space, is in great need for coordination, cooperation and legal measures among all nations. It is necessary to make the international community aware of the need for a global response to the urgent and increasing cyber threats. The international guidelines from 2000 and thereafter introduced the term ”cybercrime”.

Today the technological development of social media, such as Google, Facebook, YouTube, Twitter, and more, have been so rapid and the impact on society so fast and enormous, that codes of ethics, and public sentiments of justice implemented in criminal legislations, have not kept pace. Conducts in social media need a better protection by criminal laws. But with the reluctance in developing similar responses in international laws or guidelines, we must ask ourselves if we once again may be in a similar situation as the US Senator Ribicoff focused on in 1977:

Our committee investigation revealed that the Government has been hampered in its ability to prosecute computer crime. The reason is that our laws, primarily as embodied in title 18, have not kept current with the rapidly growing and changing computer technology.

Consequently, while prosecutors could, and often did, win convictions in crime by computer cases, they were forced to base their charges on laws that written for purpose other than computer crime.

Prosecutors were forced to “shoe horn” their cases into already existing laws – when it is more appropriate for them to have a statute relating directly to computer abuses.

Governments, private industry and the global society are relying upon continuous availability and integrity of information and communications infrastructures. Maintaining the confidentiality, integrity, and availability of the cyber networks and the data they carry, increases the trust the global community place in the information and communication infrastructures. Only through developing compatible standards and laws can such innovation continue to grow. How we shape standards and legal norms of conduct today will affect the future growth in technology and innovations.

Cyber attacks against critical information infrastructures of sovereign States, must necessitate a response for global solutions. I assume that most of the judges and lawyers around the world from a professional judicial point of view, agree with the former US prosecutor Benjamin B. Ferencz in his statement:

There can be no peace without justice, no justice without law and no meaningful law without a Court to decide what is just and lawful under any given circumstances.

The problem of establishing International Courts or Tribunals is thus a political or geo-political decision, and not a professional judicial question.

1.2 The development of the Internet

Internet as we know it today has its background in a Network called “ARPANET” in 1968 when the first experimental network was built. A research group at the Network Information Center (NIC) in the United States electronically connected their computer to another computer at the University of California in Los Angeles (UCLA) and started the ARPANET.2

On October 29, 1969, two programmers in California, 400 miles apart, successfully sent a message between the two different institutions, University of California, Los Angeles (UCLA) and Stanford Research Institute (SRI). UCLA and SRI became the two first functional nodes of the ARPANET.

The development of (Advanced Research Projects Agency Network) ARPANET was described by FBI at the hearing in United States Congress in 19943 as a government experiment. The research project linked researchers with remote computer centers, allowing them to share hardware and software resources such as computer disk space (storage), databases, and computing power.

The original ARPANET was began by the U.S. Department of Defense Advanced Research Projects Agency (ARPA)4 as a US military program, which was designed to enable computers operated by the military, defense contractors, and universities conducting defense-related research to communicate with one another by redundant channels even if some portions of the Network were damaged in a war.5 The original ARPANET was then split into two networks the ARPANET and the MILNET, a military network. These two networks were allowed the exchange of information to continue.

The international development of ARPANET was established in 1973, when Norway6 and United Kingdom became the two first functional international nodes.

Cooperative decentralized networks such as UUCP, a worldwide UNIX communications network, and USENET, users network, were introduced in the late 1970-ties initially serving the University community and later commercial organizations. In the beginning of 1980-ties, networks such as the computer science network (CSNET) and BITNET were developed serving network capabilities to the academic and research communities. Special connections were then developed to allow exchange of information between various communities. The National Science Foundation Network (NSFNET) was introduced in 1986, and linked researchers across United States with five supercomputer centers. NSFNET expanded the following year including more networks that were linked to more universities and research centers, and started to replace ARPANET that was closed down in March 1990. In 1994 it was expanded worldwide and made up of around 30.000 interconnected computer networks.

NCSA Mosaic, or Mosaic,7 was the web browser that laid the foundation of popularizing the World Wide Web. It was developed at the National Center for Supercomputing Applications (NCSA) in the United States,8 and the browser was released in 1993. Mosaic was also the first browser to display images inline with text instead of displaying images in a separate window.

Netscape Navigator9 was developed by Netscape Communications Corp in the United States and released in December 1994. It became the dominant web browser until 2000, when Microsoft’s Internet Explorer became the dominant web browser. The development of Netscape Navigator was stopped in December 2007 but became the basis for Mozilla Firefox. The Internet was in the 1990-ties commonly called “The Information Superhighway.”

United States Supreme Court made the following evaluation of the Internet in a Court opinion in 1997:10

The dramatic expansion of this new marketplace of ideas contradicts the factual basis of this contention. The record demonstrates that the growth of the Internet has been and continues to be phenomenal. As a matter of constitutional tradition, in the absence of evidence to the contrary, we presume that governmental regulation of the content of speech is more likely to interfere with the free exchange of ideas than to encourage it. The interest in encouraging freedom of expression in a democratic society outweighs any theoretical but unproven benefit of censorship.


1 Although now ubiquitous in usage, the term cyberspace used to denote both the social and physical networks that make up the Internet as a unique space distinct from non-networked world, did not enter in the English lexicon until 1982. The term was coined by the Canadian science-fiction author William Gibson in his 1982 short story “Burning Chrome” but was ultimately launched into popular usage by his 1984 novel “Neuromancer” and the word became identified with online computer networks, see Wikipedia and Professor Lawrence Lessig, Stanford Law School, Stanford University, USA: ”Code and Other Laws of Cyberspace”, page 5 (2000), and howtogeek.com

2 SRI Alumni Association, December 2009, April 2012 Newsletter page 4.

3 Testimony by Thomas T. Kubic, Chief Financial Crimes Section, FBI, before the Subcommittee on Science, on March 22, 1994.

4 ARPA was established by President Eisenhower in 1957. Researchers at MIT and Stanford Research Institute (SRI) were the main researchers on this project.

5 See: Justice Stevens delivered the opinion of the Court in United States Supreme Court Case No. 96-511, June 26, 1997.

6 NORSAR (Norwegian Seismic Array) was the first international node and established the connection further to the next node at University College London, UK, see http://www.fulbrightalumni.no/andr-rnes/

7 See http://en.wikipedia.org/wiki/Mosaic_(web_browser)

8 The University of Illinois, United States.

9 See http://en.wikipedia.org/wiki/Netscape_Navigator

10 See Justice Stevens opinion of the Court in United States Supreme Court Case No. 96-511, June 26, 1997, Page 18.

2. THE HISTORY OF COMPUTER CRIME AND CYBERCRIME BEFORE 2000

Computers were introduced to the global societies in the early 1950ties. In the beginning the computers complexity limited their availability, but by and large they become less expensive in addition to a continuously improved reliability and capacity. Especially a dramatic technological evolution occurred, creating the big mainframe computers and minicomputers.

The Society for Worldwide International Funds Transfers (SWIFT) was introduced to the international banking systems in 1978 and was immediately regarded as the most secure commercial global computer networks.

As computers developed, so did also crimes assosiated with their use. Mankind will always have to live with criminal activity, and as a result of the conversion to computer usage, new methods of perpetrating crime occurred. The term computer crime or computer-related crime was used as a description of this new phenomenon.

Computer crime became also a subject for researchers, as well as investigative efforts for law enforcement and legislative initiatives. In a Hearing before the US Senate in 1978, the FBI testified that they had conducted investigation in approximately 50 cases, mostly alteration of computer data input, theft of computer services, theft of data and alteration of data, as computer programs for either financial gain or destructive intent. But most computer crimes were investigated and prosecuted at the State level.

As with other technology development in the 1970ties, the development of computer technology was evaluated with regard to penal legislation. The existing provisions in the Criminal Codes were not written with computers in mind, and the main challenge was the applicability of these provisions on automated data processing and to what extent. The processing and storing of data by means of electronic impulses represented invisible and intangible values for governments, private industry, and individuals that clearly should be protected by criminal law. If the existing provisions in the Penal Codes were insufficient, it was decided that new solutions should be developed.

It was also emphasized that this problem must be solved in view of the international application of automatic data processing.

Even from the early years on a large amount of detected cases were not reported. Victims, such as governmental institutions, private industry, and individuals were reluctant to report computer crimes, fearing bad publicity, or loss of confidence, or more criminal attacks.

2.1 The Pioneers

The founder and father of the knowledge of computer crime, is by many observers considered to be Donn B. Parker, USA.

Donn B. Parker was involved in the most exhaustive research of computer crime and security from the early 1970ties.11 The research compiled by the end of 1970ties more than 1000 reported cases from around the world. He served as a Senior Computer Security Consultant at the SRI International (Stanford Research Institute), Menlo Park, California, and was the main author of the first basic federal manual for law enforcement in USA: “Computer Crime – Criminal Justice Resource Manual on Computer Crime” (1979).12

This Manual soon became an encyclopedia also for law enforcement outside USA.

Attorney Susan Hubell Nycum was working together with Donn B. Parker on projects and provided a paper on legal issues relating to computer abuses for the US Senate Committee on Government Operations in the Committees study of Computer Security in Federal Programs (1976-77). Susan Nycum published also an article for the American Bar Association Journal on the legal issues for computer crime in 1975.

Another researcher was Edward H. Coughran. He was the Director of the Computer Center, University of California, San Diego, and organized at the university a Symposium on Computer Abuse for Prosecuting Attorneys in 1976.13 He developed the Symposium with the stimulation and cooperation of the US Attorney in San Diego.

Professor Brandt Allen, Colgate Darden Graduate School of Business Administration, University of Virginia, presented a paper on “The Computer Thief” at a Seminar in 1974.14 He presented also a paper on “Embezzler ´s guide to the computer” in Harvard Business Review (July-August 1975).

Other authors in USA that contributed in the combat against computer crime in the early days were August Bequai15, Jay J. Becker (BloomBecker)16, and Thomas Whiteside.17

Ulrich Sieber, University of Freiburg, Germany, became the first academician expert on computer crime outside USA in the 1970ties.18 He assisted many international organizations, such as the OECD from 1983 and United Nations.

In Australia, Justice M.D. Kirby, Chairman of the Australian Law Reform Commission, was leading the development and emphasized “computer crime and the need for new laws and procedures to deal with anti-social conduct involving misuse of information technology.”19

K. E. Brown, a detective chief inspector at the Victoria police in Melbourne was also early involved in the combat against computer crime.20

In the Netherlands, H. W. K. Kaspersen, also an academician, was in 198621 an expert on computer crime, and became later the “father” of the Council of Europe Convention on cybercrime, through his initiative in 1997.

In Canada, Donald K. Piragoff was the leading expert, and published an article in 1986 on Combatting Computer Crime with Criminal Laws.22

In Norway, Stein Schjolberg began to work on computer crime from 1976 when he was introduced to computer crime by FBI. He then introduced INTERPOL to computer crime in 1979 and organized a global seminar together with INTERPOL in 1981.

2.2 The Pioneer Bill – The Ribicoff Bill, United States Senate

The United States General Accounting Office (GAO) issued in April and May 1976 three reports on problems associated with computer technology in Federal programs. 23

The first report of April 23, 1976, was entitled “Improvements Needed in Managing Automated Decision-making By Computers Throughout The Federal Government.”

The second report also of April 23, 1976, was titled “Computer-Related Crimes in Federal Programs”.

The third report of May 10, 1976, was titled “Managers Need to Provide Better Protection For Federal Automatic Data Processing.”

The reports were delivered to Senator Abe Ribicoff, as the Chairman of the Senate Government Operations Committee. Senator Ribicoff announced on May 10, 1976, that the Committee staff would begin a preliminary investigation concerning issues raised in the GAO reports. On June 21, 1976, the Senate Government Operations Committee published a 447-page committee print containing the three reports, entitled “Problems Associated with Computer Technology In Federal Programs and Private Industry.”

A staff study of Computer Security in Federal Programs by the U.S. Senate Government Operations Committee was then published in February 1977, and this study was the world’s first comprehensive initiative on computer crime. The staff study addressed several problems associated with computer programs and obtained information on computer security practices and problems from several individuals and federal agencies.

Attorney August Bequai provided information on the role of the computer in white-collar crime.24

Attorney Susan Hubell Nycum presented a paper on the legal aspects of computer abuse based on a project at the Stanford Research Institute (SRI), Menlo Park, California.25 The SRI project was headed by Donn B. Parker and had identified 420 cases of computer abuse.

The Staff of the Senate Government Operations Committee made a conclusion and proposals on the legislative issues as follows:26

There is ample evidence to suggest that much of the computer-related criminal activity has involved, or will involve in the future, government computer systems. Accordingly, consideration should be given to the feasibility of these legislative remedies:

First, legislation should be considered which would prohibit unauthorized use of computers owned by, operated for, under contract with, on behalf of or in conjunction with the U.S. Government.

Second, legislation should be considered to expand the wire fraud jurisdiction to reach any use of the facilities of wire communications, regardless of whether the actual signal travels interstate.

Third, legislation should be considered to clarify definitional guidelines as to whether checks, securities, and other negotiable instruments issued by computers in both the public and private sectors are forgeries if issued on the basis of improper or fraudulent data.

Senator Ribicoff introduced on June 27, 1977 to the Senate the “Federal Computer Systems Protection Act of 1977”, the so-called “Ribicoff Bill”. This Bill was the first proposal for Federal computer crime legislation in the U.S. and the world that would specifically prohibit misuse of computers.

The Bill was inserted in the Congressional Record as follows:27

By Mr. Ribicoff (for himself,

Mr. Percy, Mr. Jackson, Mr.

Metcalf, Mr. Kennedy, Mr.

Thurmond, Mr. Griffin, Mr.

Domenici, and Mr. Heinz):

S. 1766. A bill to amend title 18, United States Code, to make a crime the use, for fraudulent or other illegal purposes, of any computer owned by the United States, certain financial institutions, and entities affecting interstate commerce; to the Committee on the Judiciary.”

Senator Ribicoff made an introduction, and stated also from the yearlong study conducted by the Senate Government Affairs Committee as follows:

“Our committee investigation revealed that the Government has been hampered in its ability to prosecute computer crime. The reason is that our laws, primarily as embodied in title 18, have not kept current with the rapidly growing and changing computer technology.

Consequently, while prosecutors could, and often did, win convictions in crime by computer cases, they were forced to base their charges on laws that written for purpose other than computer crime.

Prosecutors were forced to “shoe horn” their cases into already existing laws – when it is more appropriate for them to have a statute relating directly to computer abuses.

……….

Mr. President, I ask unanimous consent that the text of the bill be inserted in the Record at this point.

Without any objection, the bill was printed in the Record, as follows:

S. 1766

Be it enacted by the Senate and house of Representatives of the United States of America in Congress assembled, that this Act may be cited the “Federal Computer Systems Protection Act of 1977”

Sec. 2. The Congress finds that-

…………..

Sec. 3 (a) Chapter 47 of title 18. United States Code, is amended by adding at the end thereof the following new section:

§ 1028, Computer Fraud

Whoever directly or indirectly accesses or causes to be accessed any computer, computer system, computer network, or any part thereof which, in whole or in part, operates in interstate commerce or is owned by, under contract to, or operated for, on behalf of, or in conjunction with, any financial institution, the United States Government, or any branch, department, or agency thereof, or any entity operating in or affecting interstate commerce, for the purpose of (1) devising or executing any scheme or artifice to defraud, or (2) obtaining money, property, or services by means of false or fraudulent pretenses, representations, or promises, shall be fined not more than $50,000, or imprisoned not more than 15 years, or both.

Whoever, intentionally and without authorization, directly or indirectly accesses, alters, damages, or destroys any computer, computer system, or computer network described in subsection (a), or any computer software, program, or data contained in such computer, computer system, or computer network, shall be fined not more than $50,000, or imprisoned not more than 15 years, or both.

The bill was referred to the Criminal Laws and Procedures Subcommittee of the Senate Judiciary Committee. In the House of Representatives a similar bill H.R. 8421 was introduced by the Representatives Charles Rose, North Carolina and Robert F. Drinan, Massachusetts, and referred to the House Judiciary Committee.28

The Department of Justice responded to the bill29, including as follows:

We would like to assure you of our complete cooperation in providing whatever assistance is necessary to aid the Congress in its discussion and debate of this bill. Its passage will create a new and valuable weapon in the fight against white collar crime.

The hearing of the Criminal Law and Procedures Subcommittee were held on June 21, 1978, and Senator Joseph Biden was the Chairman of the Subcommittee.

In his opening statement as the Chairman, Senator Joe Biden, said: It has been a sobering experience for me, to plunge into the elusive question of computer fraud as my maiden initiative as Chairman of this subcommittee.

Senator Biden made also a reference in the statement about the initiative from Senator Abe Ribikoff as follows:

First we turn to the distinguished senior senator from Connecticut who deserves a great deal of credit for hearing those voices in the wilderness and focusing the Senate´s and this committee´s attention on the crime of the future – computer fraud.

Senator Ribicoff made his presentation and said, still valid today:

Our committee investigation revealed that the Government has been hampered in its ability to prosecute computer crime. The reason is that our laws, primarily as embodied in title 18, have not kept current with the rapidly growing and changing computer technology. Consequently, while prosecutors could, and often did, win convictions in crime by computer cases, they were forced to base their charges on laws that were written for purposes other than computer crime. Prosecutors are forced to “shoe horn” their cases into already existing laws, when it is more appropriate for them to have a statute relating directly to computer abuses. This Bill will provide the needed corrective action.30

Senator Charles H. Percy made a testimony in the hearing and stated, also still valid today:

More and more, we see the need for our laws to reflect the phenomenal growth in modern technology. As our society becomes more specialized, so, also does its crime. We in the Congress must ensure that our criminal laws keep pace with these changes; particularly when crime becomes “computerized.

The FBI concluded the statement before the Subcommittee as follows:

In summary, we can fully support this legislation as an outstanding investigative tool. However, there is great concern for the breath of the proposed bill, and it must be recognized that virtually any crime associated on or with a computer will be a federal violation.31

The Bill was not adopted, but this pioneer proposal raised awareness and guidance around the world as to the potential problems that unauthorized computer usage could cause, and the need to define the scope of the topic in order to adequately address the problems in a comprehensive but flexible way.

The Bill was not adopted by the Congress because it was too broad, and it was debated whether a federal computer crime statute should be enacted or whether the States should adopt their own computer crime statutes.32

The Bill was reintroduced with some amendments by Senator Ribicoff in 1979, as the “Federal Computer Systems Protection Act of 1979”, S. 240 and H.R. 6192.

S. 240 was unanimously approved by the Senate Subcommittee on Criminal Law on November 6, 1979, but once again it was not adopted in the Senate. S. 240 was criticized as overbroad in expanding federal jurisdiction over computer crimes.

A Bill was again reintroduced in 1981, this time by Congressman Bill Nelson, Ninth Congressional District, Florida, in the House of Representatives, as H.R. 3970. But it was not adopted.

The Bill was reintroduced in 1984 as the “Counterfeit Access Device and Computer Fraud and Abuse Act of 1984”, was adopted as the first federal computer legislation in the United States. Codified at 18 U.S.C. §§ 1029-1030, criminalizing only unauthorized access to computers of financial institutions, or of the government, or involving national security information.

The statute was not fully revised and another amendment were made in 1986, and the Computer Fraud and Abuse Act of 1986 was adopted and signed into law by the President on October 16, 1986.

18 U.S.C § 1029 covers fraud and related activity in connection with access devices, and § 1030 covers fraud and related activity in connection with computers.

The statute was once again amended in 1994 by the Computer Abuse Amendments Act of 1994, and in 1996 by the National Information Infrastructure Protection Act of 1996.

2.3 Other pioneer countries - first national laws that included computer crime

The pioneer countries are considered to be countries that have adopted criminal legislation including and covering computer crime, ahead of the Council of Europe Recommendation of 1989.

The Data Protection Acts, that provided certain safeguards for the individual against an invasion of privacy, did not in most countries include protection against ordinary criminal activities involving data, although they usually contained some limited penal provisions emphasizing offences against requirements in regulations, and unlawful disclosure of personal data.

2.3.1 Sweden

Sweden is considered to be the first country to introduce computer crime legislation when the Data Protection Act33 was adopted in April 2, 1973. This Act protected personal data, and Article § 21 included protection of criminal activities against all kind of data, as follows:

Any person who without authorization secures access to a recording for electronic data processing, or alters or deletes or adds to such recording, shall be sentenced for data trespass to pay a fine or to imprisonment not exceeding two years, unless the offence is punishable in the Penal Code. As recording is also regarded information being transferred via an electronic or similar aid to be used for electronic data processing.

Attempt and preparation shall be punished as stated in Chapter 23 of the Criminal Code, unless the completed crime would have been regarded as a petty. (Unofficial translation)

In addition, the Criminal Code was amended in 1986 extending the Article on fraud to include unauthorized manipulation of information processing. Adjustments were also made to Articles on unauthorized use and infringement of data.

2.3.2 Germany

The Federal Republic of Germany adopted new provisions in the Penal Code in 1980 based on a proposal from a Law Commission in the late 1970ties:34

Section 263 A - Computer fraud

Whoever, with a view to procuring himself or a third person any unlawful property advantage, causes prejudice to the property of another by influencing the result of a property-related data processing activity through the use of false data, or the distortion or suppression of true data, or by affecting the program flow, shall be sentenced to imprisonment not exceeding five years or to a fine, unless the offence is punishable under Sec. 263.

Section 269 - Alteration of stored data

Anybody who, with a view to defrauding in legal transactions, alters, without proper authority any data stored electronically, magnetically or otherwise invisibly, which, when processed in legal transactions, are destined to be used as evidence of legally relevant matters of fact, or uses any such data thus altered, shall be sentenced to imprisonment not exceeding five years or to a fine.

Section 270:

Any fraudulent manipulation of a computer system constitutes fraud.

When the Second Act to suppress Economic Crime was introduced, amendments of the Penal Code of May 15, 1986, was also included as follows: STGB § 202a Ausspahen von Daten – Data Espionage

  1. Whoever, without authorization, obtains data for himself or another which was not intended for him and was specially protected against unauthorized access, shall be punished with imprisonment for not more than three years or a fine.
  2. Within the meaning of subsection (1), data shall only be those, which stored or transmitted electronically or magnetically or otherwise in a not immediately perceivable manner.

STGB § 303a Datenveranderung – Alteration of Data

  1. Whoever unlawfully deletes, suppresses, renders unusable or alters data (Section 202a subsection (2)), shall be punished with imprisonment for not more than two years or a fine.
  2. An attempt shall be punishable.

STGB § 303b Computersabotage – Computer Sabotage

  1. Whoever interferes with data processing, which is of substantial significance to the business or enterprise of another or a public authority by:
    1. committing an act under Section 303a subsection (1); or
    2. destroying, damaging, rendering unusable, removing or altering a data processing system or a data carrier, shall be punished with imprisonment for not more than five years or a fine.
  2. An attempt shall be punishable.

2.3.3 United Kingdom

United Kingdom had no special legislation on computer crime. But the Theft Act of 1968 had a definition on property:

Property” includes money and all other property, real or personal, including things in action and other intangible property (Section 4.1).

The Theft Act had no special definition of “document”, but the Civil Evidence Act of 1968 included a definition of “document” as:35

any disc, tape, soundtrack or other device in which sound or other data (not being visual images) are embodied so as to be capable, with or without the aid of some other equipment, or being reproduced therefrom.

The Counterfeit and Forgery Act36 was then adopted in 1981, and included computer criminals that enters false information or alters any computer disc or tape with the intent to defraud, and defined forged instrument as:

8. (1)(d) any disc, tape, sound track or other device on or in which information is recorded or stored by mechanical, electronic or other means.

The Law Society of Scotland presented in a Report of July 1984 a recommendation for two new offences, relating to the obtaining of unauthorized access to a program or data stored in a computer, resulting in proposals of the Scottish Law Commission in July 1987.37

The Law Commission of England and Wales summarized the technical background in 1988.38 And made recommendations for the creation of three new substantive offences of computer misuse in a Report presented to the Parliament in October 1989,39 which resulted in The Computer Misuse Act 1990.

A decision by the House of Lords in: Gold and Schifren (1988) made it obvious that a prosecution of hackers for forgery under the Forgery and Counterfeiting Act 1981 was an attempt to force the facts to fit an inappropriate statute.

2.3.4 Canada

Canada introduced on December 19, 1984 a Government Bill C-18. The Bill was passed by the House of Commons and the Senate, and received Royal Assent on June 20, 1985, as the Criminal Law Amendment Act, 1985.40 Especially shall be mentioned:

S. 342.1 (1) Everyone who, fraudulently and without color of wright,

  1. obtains, directly or indirectly, any computer service,
  2. by means of an electro-magnetic, acoustic, mechanical or other device, intercepts or causes to be intercepted, directly or indirectly, any function of a computer system, or
  3. uses or causes to be used, directly or indirectly, a computer system with intent to commit an offence under paragraph (a) or (b) or an offence under section 430 in relation to data or a computer system, is guilty of an indictable offence and liable to imprisonment for a term not exceeding ten years, or is guilty of an offence punishable on summary conviction.

2.3.5 Denmark

Denmark adopted on June 6, 1985, amendments to the Penal Code, for example as follows: