Académique Documents
Professionnel Documents
Culture Documents
____________________________________________________________
Page 2
gtmhhlaw-1
Yes, we are saying that the recreational hacker who just
likes to play
around with other people’s computers is not the guy to be
afraid of. It’s
far more likely to be some guy in a suit who is an employee
of his victim.
But you would never know it from the media, would you?
SECTION 1029
Section 1029 prohibits fraud and related activity that is
made possible by
counterfeit access devices such as PINs, credit cards,
account numbers, and
various types of electronic identifiers. The nine areas of
criminal
activity covered by Section 1029 are listed below. All
*require* that the
offense involved interstate or foreign commerce.
Page 10
gtmhhlaw-1
This means that even if you can prove you harmed the
computer by accident,
you still may go to prison.
A common way to break this part of the law comes from the
desire to boast.
When one hacker finds a way to slip into another person’s
computer, it can
be really tempting to give out a password to someone else.
Pretty soon
dozens of clueless newbies are carelessly messing around the
victim
computer. They also boast. Before you know it you are in
deep crud.
National defense X
1030(a)(2) Foreign relations X
Restricted atomic energy X
Financial records of X
banks, other financial
institutions
Financial records of
card issuers
X
Information on consumers
in files of a consumer
reporting agency
X
Non-bank financial
institutions
X
1030(a)(3) Government computers
National defense X
Foreign relations X
Restricted data X
White House
X
All other government
computers
X
1030(a)(4) Federal interest computers:
Intent to defraud
X
Page 15