Professional Documents
Culture Documents
Overview
Computer Crime
Computer Crime
4th Amendment
Computer Fraud and Abuse Act of
1986
Electronic Communications Privacy
Act of 1986
Case Law
15 USC 1644
18 USC 1029
18 USC 1030
18 USC 1343
18 USC 1361-2
Actual Crimes
Source:
http://www.usdoj.gov/criminal/cybercrime/compcrim
e.html
Actual Crimes
Source:
http://www.usdoj.gov/criminal/cybercrime/
compcrime.html
Sample Cases
http://www.daviddfriedman.com/Academic/Course_Pages/
21st_century_issues/21st_century_law/computer_crime_le
gal_01.htm
http://www.law.emory.edu/11circuit/june2000/9912723.opn.html
http://www.usdoj.gov/criminal/cybercrime/cccases.html
http://www.usdoj.gov/criminal/cybercrime/garciaArrest.ht
m
http://www.usdoj.gov/criminal/cybercrime/jiangIndict.htm
http://www.usdoj.gov/criminal/cybercrime/schellersent.ht
m
http://www.usdoj.gov/criminal/cybercrime/usamay2001_2.
htm
Electronic Communications
Privacy Act
Overview of ECPA
Radio Paging
Customer Records
References
http://www.digitalcentury.com/encycl
o/update/ecpa.html
http://floridalawfirm.com/privacy.html
Some Perspective
On September 11, 2001, more
Americans were murdered than
American battle deaths in the war of
1812
American battle deaths at Pearl
Harbor
American battle deaths in the Indian
Wars
American battle deaths in the
Mexican War
American battle deaths in Vietnam
prior to 1966
Union battle deaths at Bull Run
Police officers killed in the line of
duty since 1984
Source: Federal Law Enforcement Training Center
Glynco, Georgia
9.
10.
Computer Crime
Computer Crime
Computer Crime
Counterfeiting
Biological Weapons
This is punishable by a fine, and 10 years in prison
Money Laundering
This crime is punishable by 5 years in prison
For Federal employees, the crime is punishable by
a fine 3 times the value received, and 15 years in
prison, ( 329)
Increased Penalties
Information Sharing
The act:
1. Foreign and national intelleigence
surveillance can exchange information (
504)
2. Regional information sharing between
federal, state, and local law enforcement (
701)
3. Attorney general can apply to a court for
disclosure of educational records to
prosecute a terrorist act
4. Act also provides immunity for people who
in good faith disclose these documents) (
507, 508)
Privacy Implications
Privacy Implications
Related Cases
Related Cases
Related Cases
References
http://www.epic.org/privacy/terrorism/hr31
62.html
http://archive.aclu.org/congress/l110101a.
html
http://notablecases.vaed.uscourts.gov/1:01
-cr-00455/docs/68092/0.pdf
http://www.cise.ufl.edu/~nfarring/carnivore
http://www.cga.state.ct.us/2001/rpt/olr/ht
m
http://www.cise.ufl.edu/~nfarring/carnivore
Computer Privacy
Privacy
What is privacy?
How is it determined?
Constitutional Search
Privacy
Wireless internet
Credit cards
Topical Relevance
US Mail
Telephone conversation
Library borrowing
Bank records
Student records
Etc.
Plethora of Laws
FERPA
Student records
Most basic act for access, use, disclosure,
interception and privacy of electronic
communications
Plethora of Laws
Medical records
protects consumers personal financial information held
by financial institutions.
Plethora of Laws
Sarbanes-Oxley
accounting fraud
securities-law violations
Basel II
Plethora of Laws
CAN-SPAM Act
Patriot Act
Security scanners like Spybot and Zone Labs can detect and
remove such intrusive cookies
Try a free scan on your computer and see what you get:
http://download.zonelabs.com/bin/free/cm/index4.html
Surfing Dangers
http://www.eweek.com/article2/0,1759,1618052,00.asp
http://www.mozilla.org/products/firefox/
ISO/IEC 17799
Understanding and
Implementng ISO/IEC 17799
http://www.iso17799-made-easy.com/
Patriot Act
Patriot Act 2
Copyright
Trademark
Search Warrants
Search Warrants
Search Warrants
Subpoenas
Court Orders
Chain of Custody
Chain of Custody
Video
Summary
References