top of page
Article VII:  "Computer & Biological Viruses":
A computer virus is a type of computer program that, when executed, replicates itself by modifying host computer programs and inserts its own code illegally.  If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses.
The virus writes its own code into the host program to carry out attacks. When the program runs, the written virus program is executed first, causing infection and damage to the computer system.  The replication property of viruses can cause sever damage to multiple computer systems.  In fact, a bad Internet computer virus can cause widespread Internet services outages.
"In the natural world, biological variability prevents every new germ from becoming a plague that will wipe out a species.  No two individuals are entirely alike.  Some are susceptible to a disease; others are resistant. The disease spreads through the population, attacking the susceptible ones.  The resistant ones, however, live on to perpetuate the species."
In the computer world, the differences among operating systems are roughly equivalent to biological variability.  The virus that is lethal to Windows can't harm other operating systems.  This is changing.  As today's personal computers transform themselves into "network computers", there is an imperative to have machines of all makes and models run the same programs without modification.  A virus will be able to spread from machine to machine unimpeded by the details of operating system and hardware type.  Therefore, please get your virus checker and utilize it by following the proper procedures.
If you work on an operating system that is known to be prone to viruses, such as Windows and Macintosh, you should obtain and use a good virus checking utility.  McAfee, Norton and Bitdefender are among the world's best virus checking utilities to buy to protect your machines from the cyberattacks online.  User Behavior Analytics (UBA) and Security Information and Event Management (SIEM) can be used to prevent cyberattacks.
Cyberattacks have become increasingly sophisticated and dangerous.  Since the late 1980s cyberattacks have evolved significantly to use innovations in information technology as vectors for committing cybercrimes. In recent years, the scale and robustness of cyberattacks have increased rapidly, as observed by the World Economic Forum in its 2018 report: "Offensive cyber capabilities are developing more rapidly than our ability to deal with hostile incidents".  In fact, cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life, significant bodily harm, financial damage or financial terrorism in order to achieve political, ideological and financial gains illegally. 
In order to reach agreement on how International Law applies to states’ cyber operations, states should put their views on record, where possible giving examples of when they consider that an obligation may be breached, as states such as the UK, Australia, France and the Netherlands have done.  The International Criminal Court (ICC) is an intergovernmental organization and international tribunal seated in The HagueNetherlands. It is the first and only permanent international court with jurisdiction to prosecute individuals for the international crimes of genocidecrimes against humanitywar crimes and the crime of aggression.
The establishment of an international tribunal to judge political leaders accused of international crimes was first proposed during the Paris Peace Conference in 1919 following the First World War by the Commission of Responsibilities.  The issue was addressed again at a conference held in Geneva under the auspices of the League of Nations in 1937, which resulted in the conclusion of the first convention stipulating the establishment of a permanent international court to try acts of International Terrorism. The convention was signed by 13 states, but none ratified it and the convention never entered into force. 
We all should worry about cyberattacks.  In fact, we need to get the convention ratified and enter into force to stop terrorism.  No one is above the law.  The United States Department of Homeland Security (DHS) is playing a leading role in investigating malicious cyber activity, and advancing cybersecurity alongside our national values and principles.   DHS began operations in 2003, formed as a result of the Homeland Security Act of 2002, enacted in response to the September 11th, 2001 attacks of terrorism also know as 9/11.
How DHS is preparing us to stop new terrorist attacks like the October 7th, 2023 terrorist attack also know as 10/7?  It is a valid question to ask and answer to stop future terrorist attacks and damages.
As when it was first enacted in 1917, the Espionage Act still criminalizes the act of spying for or otherwise aiding an enemy of the United States. However, it has since been expanded to punish people who, for any reason, divulge or share classified government information without permission. Even in the most recent administrations, a handful of people have been charged or convicted under the Espionage Act for security violations.
A security violation or infraction is any breach of security regulations, requirements, procedures or guidelines, whether or not a compromise results. No matter how minor, any security infraction must be reported immediately to the security office so that the incident may be evaluated and any appropriate action taken.  An example of a security violation is leaving security resources unsecured, unattended or damaged.

by Naveed A. Khan, Lincoln D. Stein of  Web Security, The Washington Post newspaper, and World Wide Web (WWW) pages; 2/19/2024

bottom of page