lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <OFBDA2E62E.43701E49-ON86256E4B.00612DA4-86256E4B.0061886C@kohls.com>
From: Bart.Lansing at kohls.com (Bart.Lansing@...ls.com)
Subject: Israeli Judge has Enlighted Outlook onHacking





Mark's Link translates (roughly) as:

Harder approach computer criminality

2 March 2004

Minister Donner has a number of legal measures prepared through which a
harder approach of computer criminality possible becomes.  As become
computerkrakers further at ties gelegd.  This appeared from a bill of the
member of government that for advice to single authorities has been
steered, below which the Public Ministry and the Council for the
Jurisdiction.

The stricter legislation is a consequence of the Cybercrime Treaty that in
November 2001 has been closed computer criminality internationally on to
take.  That treaty has as target protection to offer against do wrong that
narrow agreements its with the existence of computer networks and
electronic information.  In the past decades is the risk increased that
global developed computer networks become uses punishable facts to
commit.,.  Also can prove by criminal behavior through these networks be
raised and transferred.  Therefore common international criminal
administration is necessary.  This administration consists not only of
reinforcement of the international cooperation, but also from the
realization of fitting legislation.

The netherlands satisfies already for a very large part at the requirements
of the Cybercrime Treaty.  The in consultation given bill rounds off the
implementatie off.  That lifted knit through the existing legislation from
to with single punishment definitions, and with the introduction of new
competences for the location.

>From now on each becomes intentional and weather law body penetrate into in
a computer (system) punishable.  This means a widening of the present
punishable position of computer peace fracture, because now that yet
specific requirements before talks stolen be can be by punishable behavior.
As must for instance the protection of a computer have been cracked, a
technical intervention have been done or by a false identity want to be
made entry to get.  In the proposal of Donner its that specific
requirements no longer necessarily.  For guiltiness can the already
sufficient are as someone without permission (weather law body) a computer
(system) penetrates into information to get hold of that not for him meant
is.  The change is of interest for the approach of computerkrakers.

Also the one becomes punishable that intentional and weather law body the
entry till or the use of a computer system disturbs through it gegevens to
to steer.  It must go round serious forms of nuisance for the user.  As
exist programs (viruses) that the use of computer systems impossibly make
or considerably slow down.  Likewise serious forms of spam become be
disturbed punishable as through that communication positions of a system.

Minister Donner want further particular preparations trade of typical
computer criminal offence, as computer peace fracture and the unlawfully
tap of information, punishable put.  The concerned the sale, the making or
it on hand have of suitable 'technical aids' with which a computer criminal
offence committed becomes.  Besides is the furrow a condemnation crucial
that demonstrated becomes that conscious acted is, consequently with the
intention to a criminal offence to commit.  Under technical aids as well
the data bearers become understand (floppy's and cd's) as the gegevens
self.  An example of the last one is a computer program that a computer
system disorganize can.

Next to expansion of punishable position of single offences, contain the
bill also propose competences of justice and police on to fit.  Of
interest, the introduction of the so-called bevriezingsbevel is.  This puts
the officer of justice in state an internetprovider to order particular
gegevens temporarily available to hold' in expectation of a definitive
decision over the verse twich of the gegevens for the benefit of the
location.  Also the possible for computer offences temporary custody
becomes to claim and specific compulsion means (inbeslagname and tap)
closed to fit.

>>SHORT STORY:  Penetration without permission=Bad<<


Bart Lansing
Manager, Desktop Services
Kohl's IT


full-disclosure-admin@...ts.netsys.com wrote on 03/02/2004 05:48:23 AM:

> On Mon, 2004-03-01 at 22:26, Gregory A. Gilliss wrote:
> > http://www.theregister.co.uk/content/55/35938.html
>
> I'm affraid the dutch minister of Justice has a different idea...
> http://www.justitie.
>
nl/pers/persberichten/archief/archief_2004/020304Hardere_aanpak_computercriminaliteit.

> asp
>
> They want to make it illegal to own and/or use 'technical tools' that
> can be used to 'break into systems'.... with a rather wide definition of
> 'breaking in'.
>
> This way every Unix system (and windows) will be illegal... well done
> mister Donner.
>
> Mark
>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html


CONFIDENTIALITY NOTICE: 
This is a transmission from Kohl's Department Stores, Inc.
and may contain information which is confidential and proprietary.
If you are not the addressee, any disclosure, copying or distribution or use of the contents of this message is expressly prohibited.
If you have received this transmission in error, please destroy it and notify us immediately at 262-703-7000.

CAUTION:
Internet and e-mail communications are Kohl's property and Kohl's reserves the right to retrieve and read any message created, sent and received.  Kohl's reserves the right to monitor messages by authorized Kohl's Associates at any time
without any further consent.


Powered by blists - more mailing lists