9 Comments

Woah I looked at SB 6417, must be a typo as it lead to a good fortune cookie of HB 2678:

1 AN ACT Relating to modifying cybercrime provisions; and amending

RCW 9A.90.030 and 9A.90.080.2

3 BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF WASHINGTON:

4 Sec. 1. RCW 9A.90.030 and 2016 c 164 s 3 are each amended to

read as follows:5

6 The definitions in this section apply throughout this chapter

unless the context clearly requires otherwise.7

8 (1) "Access" means to gain entry to, instruct, communicate with,

9 store data in, retrieve data from, or otherwise make use of any

10 resources of electronic data, data network, or data system, including

via electronic means.11

12 (2) "Cybercrime" includes crimes of this chapter.

13 (3) "Data" means a digital representation of information,

14 knowledge, facts, concepts, data software, data programs, or

15 instructions that are being prepared or have been prepared in a

16 formalized manner and are intended for use in a data network, data

program, data services, or data system.17

18 (4) "Data network" means any system that provides digital

19 communications between one or more data systems or other digital

20 input/output devices including, but not limited to, display

21 terminals, remote systems, mobile devices, and printers.

H-4439.1

SUBSTITUTE HOUSE BILL 2678

State of Washington 65th Legislature 2018 Regular Session

By House Public Safety (originally sponsored by Representatives

Tarleton, Hudgins, Jinkins, Ortiz-Self, and Irwin)

READ FIRST TIME 02/02/18.

p. 1 SHB 2678

1 (5) "Data program" means an ordered set of electronic data

2 representing coded instructions or statements that when executed by a

3 computer causes the device to process electronic data.

4 (6) "Data services" includes data processing, storage functions,

5 internet services, email services, electronic message services, web

6 site access, internet-based electronic gaming services, and other

7 similar system, network, or internet-based services.

8 (7) "Data system" means an electronic device or collection of

9 electronic devices, including support devices one or more of which

10 contain data programs, input data, and output data, and that performs

11 functions including, but not limited to, logic, arithmetic, data

12 storage and retrieval, communication, and control. This term does not

13 include calculators that are not programmable and incapable of being

used in conjunction with external files.14

15 (8) "Identifying information" means information that, alone or in

16 combination, is linked or linkable to a trusted entity that would be

17 reasonably expected to request or provide credentials to access a

18 targeted data system or network. It includes, but is not limited to,

19 recognizable names, addresses, telephone numbers, logos, HTML links,

20 email addresses, registered domain names, reserved IP addresses,

21 usernames, social media profiles, cryptographic keys, and biometric

identifiers.22

23 (9) "Malware" means any set of data instructions that are

24 designed, installed, or used, without authorization and with

25 malicious intent, to disrupt computer operations, monitor computer

26 use, gather information about a person or organization, gather

27 sensitive information, or gain access to private computer systems.

28 "Malware" does not include software that installs security updates,

29 removes malware, or causes unintentional harm due to some deficiency.

30 It includes, but is not limited to, a group of data instructions

31 commonly called viruses or worms, that are self-replicating or self32 propagating and are designed to infect other data programs or data,

33 consume data resources, modify, destroy, record, or transmit data, or

34 in some other fashion usurp the normal operation of the data, data

system, or data network.35

36 (10) "White hat security research" means accessing a data

37 program, service, or system solely for purposes of good faith

38 testing, investigation, identification, and/or correction of a

39 security flaw or vulnerability, where such activity is carried out,

p. 2 SHB 2678

1 and where the information derived from the activity is used,

primarily to promote security or safety.2

3 (11) "Without authorization" means to knowingly circumvent

4 technological access barriers to a data system in order to obtain

5 information without the express or implied permission of the owner,

6 where such technological access measures are specifically designed to

7 exclude or prevent unauthorized individuals from obtaining such

8 information, but does not include white hat security research or

9 circumventing a technological measure that does not effectively

10 control access to a computer. The term "without the express or

11 implied permission" does not include access in violation of a duty,

12 agreement, or contractual obligation, such as an acceptable use

13 policy or terms of service agreement, with an internet service

14 provider, internet web site, or employer. The term "circumvent

15 technological access barriers" may include unauthorized elevation of

16 privileges, such as allowing a normal user to execute code as

17 administrator, or allowing a remote person without any privileges to

run code.18

19 Sec. 2. RCW 9A.90.080 and 2016 c 164 s 8 are each amended to

read as follows:20

21 (1) A person is guilty of electronic data tampering in the first

22 degree if he or she maliciously and without authorization:

23 (a)(i) Alters data as it transmits between two data systems over

an open or unsecure network; or24

25 (ii) Introduces any malware into any electronic data, data

system, or data network; and26

27 (b)(i) Doing so is for the purpose of devising or executing any

28 scheme to defraud, deceive, stalk, or extort, or commit any other

29 crime in violation of a state law not included in this chapter, or of

30 wrongfully controlling, gaining access to, or obtaining money,

property, or electronic data; or31

32 (ii) The electronic data, data system, or data network is

33 maintained by a ((governmental [government])) government agency.

34 (2) Electronic data tampering in the first degree is a class C

felony.35

--- END ---

p. 3 SHB 2678

OK in summary this is the catch all to the rigging of elections by cybercrime aka Dominion & King Co OmniBallot utilizes AWS Object Lock (=Amazon= fire bells fire bells) to ensure immutable document (ballot) storage. Sure you betcha!

Expand full comment

So we can boil it down at least in part to a corrupt judiciary. No surprise here.

I have designated my property in King Co. as a US Constitutional zone. Where all your rights are recognized as per the original Constitution of the United States of America. So yes this year once again we will celebrate the 4th of July with fireworks of every type available.

Expand full comment

Thank you for all the research you’re doing!! I know that takes hours and hours…God bless you!!!

Expand full comment

Thank you so much for your persistent investigating. It does not go un noticed!

Expand full comment

That sounds great J especially for a newby like me… 😎

Expand full comment

Thank you so much for all your research and willingness to organize and keep us informed.

Expand full comment

Funny that Wyman ended up working for "Let's Go Brandon"! So many RINO's!!!

Expand full comment

I'm also going to look into July 2004 with SB 6417! Way to go J!! Thank you once again.

Expand full comment