To provide a clear precedence and statement of acceptable use and action for protection of electronic data and property.
Cyberspace is the Wild West. Law and Order is reasonably established in some areas, but for the most part you can only depend on the occasional Sheriff or Ranger
As was the case in the early years of the Wild West, there isn’t a whole lot of coordination between law enforcement, the government and the citizenry.
The number of successfully prosecuted cybercrime cases is very small indeed, when compared to the number of reported incidents.
We don’t see every incident, and even when incidents are discovered, they are not always reported.
Law enforcement, the government, and the regulating agencies are desperately trying to get a handle on these cases.
But the fact of the matter is that we have a serious lack of expertise and experience across the board,
There just aren’t enough people skilled and experienced enough to make a serious dent in the numbers, or to develop an underlying framework that makes law enforcement and prosecution of cybercrime easier.
Frameworks containing effective international agreements, laws and political policy to address cybercrime are still being developed, at a politicians pace.
Meanwhile, your data, your identity, and your way of life is being attacked, and believe me, it is also being compromised.
The argument to forbid people from striking back at cyber criminals is that to do so is an offensive act, and not a defensive one, striking back should be considered a weapon and not a shield.
Just looking at the success rate of cyber-attacks alone will dissuade anyone from the notion that a “good defense” is enough to stave off a cyber-attacker.
Even the US military, with the highest defense budget in the world, cannot prevent all attacks from being successful.
In very practical terms this tells us that we cannot count on being secure when we are only allowed to defend ourselves; something is clearly missing.
Data: Computer files contained within my network, on storage media I own, and electronic data packets generated or originating within a network I own, and any fragment or incomplete portion thereof
This data need not have originated in my network or be an original work in order to be my property if I have legally acquired rights to use, view, read, or modify this data.
Network: A collection of physical or virtual devices that provide electronic generation and transmission of data.
Computer: A single component of a network, physical or virtual, whose purpose is to generate, store, transmit or protect data.
My home network and computer is my property, and is an extension of my home.
This also applies to any network or computer outside of my home that I own, rent, lease, borrow, or otherwise have permission from the owner to use.
My data (that is: computer files contained within my network, on storage media I own, and electronic data packets generated or originating within a network I own, and any fragment or incomplete portion thereof) is my property, and is subject to intellectual property rights and other rights I am entitled to as if it were physical property.
I will transmit my data across public networks in an encrypted state, when I have permission and contracts from those network providers through the owners acceptable use policy.
That acceptable use policy does not include capturing, rerouting, intercepting, modifying, or tampering with my data.
I will make an effort to protect my data through encryption, and no entity private or public, may attempt to decrypt, view, read, capture, reroute, intercept, modify, or tamper with my data as it is transmitted on public networks.
Any attempt to do so is considered theft, and will be prosecuted as such.
Any physical intrusion into my home may be met with deadly or lethal force, I am not limited to simple security measures of locking the doors and windows and hoping no one breaks in.
Likewise, any uninvited or unwelcome intrusion by any party into my home network or other network that is my property may be met with equally sufficient force to stop the attack, and neutralize the attacker.
I am not limited to practicing simple security measures of securing the network and its devices, but I may actively seek out an intruder in order to identify them, attribute the attack to them, determine damage and data loss, and recover damages.