Bill Text: IL SB3203 | 2017-2018 | 100th General Assembly | Introduced
Bill Title: Amends the Criminal Code of 2012. Creates the offense of cyber terrorism. Provides that a person commits the offense when he or she: (1) with the intent to intimidate or coerce a civilian population, influence the policy of a unit of government by intimidation or coercion, or affect the conduct of a unit of government, commits any of the offenses defined in the computer crimes provisions of the Code; or (2) with the intent to intimidate or coerce a civilian population, influence the policy of a unit of government by intimidation or coercion, or affect the conduct of a unit of government, commits a denial of service attack against any computer network administered or operated by a local, State, or federal government entity; any utility, including electricity or water; or a financial institution. Provides that a violation is a Class 1 felony. Defines "denial of service attack".
Spectrum: Partisan Bill (Democrat 1-0)
Status: (Failed) 2019-01-09 - Session Sine Die [SB3203 Detail]
Download: Illinois-2017-SB3203-Introduced.html
| |||||||||||||||||||||||||||
| |||||||||||||||||||||||||||
| |||||||||||||||||||||||||||
| |||||||||||||||||||||||||||
| |||||||||||||||||||||||||||
1 | AN ACT concerning criminal law.
| ||||||||||||||||||||||||||
2 | Be it enacted by the People of the State of Illinois,
| ||||||||||||||||||||||||||
3 | represented in the General Assembly:
| ||||||||||||||||||||||||||
4 | Section 5. The Criminal Code of 2012 is amended by changing | ||||||||||||||||||||||||||
5 | Section 17-55 and by adding Section 17-52.6 as follows:
| ||||||||||||||||||||||||||
6 | (720 ILCS 5/17-52.6 new) | ||||||||||||||||||||||||||
7 | Sec. 17-52.6. Cyber terrorism. | ||||||||||||||||||||||||||
8 | (a) A person commits cyber terrorism when he or
she: | ||||||||||||||||||||||||||
9 | (1) with the intent to intimidate or coerce a civilian | ||||||||||||||||||||||||||
10 | population,
influence the policy of a unit of government by | ||||||||||||||||||||||||||
11 | intimidation or coercion, or affect the conduct of a unit | ||||||||||||||||||||||||||
12 | of government, commits any of the
offenses defined in | ||||||||||||||||||||||||||
13 | Sections 17-50 through 17-53 of this Code;
or | ||||||||||||||||||||||||||
14 | (2) with the intent to intimidate or coerce a civilian | ||||||||||||||||||||||||||
15 | population,
influence the policy of a unit of government by | ||||||||||||||||||||||||||
16 | intimidation or coercion, or affect the conduct of a unit | ||||||||||||||||||||||||||
17 | of government, commits a denial of
service attack against | ||||||||||||||||||||||||||
18 | any computer network administered or operated by
a local, | ||||||||||||||||||||||||||
19 | State, or federal government entity; any utility, | ||||||||||||||||||||||||||
20 | including electricity or water; or a financial | ||||||||||||||||||||||||||
21 | institution. | ||||||||||||||||||||||||||
22 | (b) Sentence. Cyber terrorism is a Class 1 felony.
|
| |||||||
| |||||||
1 | (720 ILCS 5/17-55) | ||||||
2 | Sec. 17-55. Definitions. For the purposes of Sections 17-50 | ||||||
3 | through 17-53: | ||||||
4 | In addition to its meaning as defined in Section 15-1 of | ||||||
5 | this Code,
"property" means: (1) electronic impulses;
(2) | ||||||
6 | electronically produced data; (3) confidential, copyrighted, | ||||||
7 | or proprietary
information; (4) private identification codes | ||||||
8 | or numbers which permit access to
a computer by authorized | ||||||
9 | computer users or generate billings to consumers
for purchase | ||||||
10 | of goods and services, including but not limited to credit
card | ||||||
11 | transactions and telecommunications services or permit | ||||||
12 | electronic fund
transfers; (5) software or programs in either | ||||||
13 | machine or human readable
form; or (6) any other tangible or | ||||||
14 | intangible item relating to a computer
or any part thereof. | ||||||
15 | "Access" means to use, instruct, communicate with, store | ||||||
16 | data
in, retrieve or intercept data from, or otherwise utilize | ||||||
17 | any services
of, a computer, a network, or data. | ||||||
18 | "Denial of service attack" means
preventing authorized | ||||||
19 | access to computer resources or delaying time-critical | ||||||
20 | computer operations by inundating or otherwise overloading a
| ||||||
21 | computer network, or attempting to inundate or otherwise | ||||||
22 | overload a
computer service. | ||||||
23 | "Services" includes but is not limited to computer time, | ||||||
24 | data
manipulation, or storage functions. | ||||||
25 | "Vital services or operations" means those services or | ||||||
26 | operations
required to provide, operate, maintain, and repair |
| |||||||
| |||||||
1 | network cabling,
transmission, distribution, or computer | ||||||
2 | facilities necessary to ensure or
protect the public health, | ||||||
3 | safety, or welfare. Those services or operations include, but | ||||||
4 | are not limited to, services provided by medical
personnel or | ||||||
5 | institutions, fire departments, emergency services agencies,
| ||||||
6 | national defense contractors, armed forces or militia | ||||||
7 | personnel, private
and public utility companies, or law | ||||||
8 | enforcement agencies.
| ||||||
9 | (Source: P.A. 96-1551, eff. 7-1-11 .)
|