Essay on Dealing with the Cyberthreat: The United States and China

1795 Words 8 Pages
Cybercrime is an ever-increasing problem in the global community. The threat can come from any country and attacks often have multiple origins. Complicating the problem is the fact that no two nations have the same laws against cybercrime. Cooperation is difficult because a law enforcement entity from one country cannot pursue a case across borders without consent (Greenberg, 2007). For instance, the distribution of child pornography, which is a serious offense in the United States, is not illegal in China (Internet, 2010).
Every country has its own way to deal with threats against its information systems. Some have been working for years to strengthen their defenses against attack through legislation and law enforcement while others are
…show more content…
An entity that illegally alters or causes the disruption of a computer network or system is defined as one that “…deletes, alters, adds, and interferes in computer information systems, causing abnormal operations of the systems and grave consequences…” The Article continues by defining one who alters the applications on a system as one who “…deletes, alters, or adds the data or application programs installed in or processed and transmitted by the computer systems, and causes grave consequences…” Finally, Article 286 makes the creation and spread of computer viruses illegal by defining the offender as one who “…deliberately creates and propagates computer virus and other programs which sabotage the normal operation of the computer system and cause grave consequences…(Criminal, n.d.)” Article 287 serves as a catch-all for other computer crimes. It makes it illegal to use a computer to steal state secrets or commit financial crime by defining the criminal as one who “…uses a computer for financial fraud, theft, corruption, misappropriation of public funds, stealing state secrets, or other crimes...(Criminal, n.d.)” In 2008, the Ministry of Industry and Information Technology (MIIT) was formed to address the growing concern of malicious software in China. In 2009, the MIIT enacted three new regulations to combat the threat. First, state-run

Related Documents