| |
| |
Introduction: The Nature and Scope of Cybercrime | |
| |
| |
What Is Cybercrime? | |
| |
| |
Cybercrime Distinguished from Computer Crime, Digital Crime, High-Tech Crime | |
| |
| |
Trends Related to Cybercrime | |
| |
| |
About This Book | |
| |
| |
Endnotes | |
| |
| |
About the Author | |
| |
| |
| |
Cybercrimes Against the Digital Infrastructure and Computer Systems | |
| |
| |
| |
Crimes Involving the Use of Computers | |
| |
| |
Introduction | |
| |
| |
Federal Laws Governing Computer Crimes-Historical Development | |
| |
| |
Federal Laws Governing Computer Crime-18 USC � 1030 | |
| |
| |
Case Applications | |
| |
| |
New York's Computer Crime Law | |
| |
| |
Key Words and Phrases | |
| |
| |
Review Problems | |
| |
| |
Weblinks | |
| |
| |
Endnotes | |
| |
| |
| |
Information Warfare and Cyberterrorism | |
| |
| |
What Is Information Warfare? | |
| |
| |
Brown Commission | |
| |
| |
Brain C. Lewis | |
| |
| |
Martin C. Libicki | |
| |
| |
Dorothy Denning | |
| |
| |
What Is Cyberterrorism? | |
| |
| |
Laws Regulating Information Warfare and Cyberterrorism | |
| |
| |
Federal Laws | |
| |
| |
18 USC � 2332b: Acts of Terrorism Transcending National Boundaries | |
| |
| |
18 USC � 1030: Fraud and Related Activity in Connection with Computers | |
| |
| |
18 USC � 1831: Economic Espionage | |
| |
| |
State Laws | |
| |
| |
Key Words or Phrases | |
| |
| |
Review Problems | |
| |
| |
Weblinks | |
| |
| |
Endnotes | |
| |
| |
| |
Cybercrimes Against Individuals | |
| |
| |
| |
Crimes against Morality | |
| |
| |
Introduction | |
| |
| |
Obscenity Crimes | |
| |
| |
18 USC � 1462 | |
| |
| |
18 USC � 1465 | |
| |
| |
18 USC � 1466 | |
| |
| |
18 USC � 1466A | |
| |
| |
18 USC � 1470 | |
| |
| |
Case Law Pertaining to Online Obscenity Crimes | |
| |
| |
Child Pornography Legislation | |
| |
| |
Legislative History | |
| |
| |
Current Child Pornography Laws | |
| |
| |
18 USC � 2251: Sexual Exploitation of Children | |
| |
| |
18 USC � 2252: Certain Activities Relating to Material Involving the Sexual Exploitation of Minors | |
| |
| |
18 USC � 2252A: Certain Activities Relating to Material Constituting or Containing Child Pornography | |
| |
| |
18 USC � 2425: Use of Interstate Facilities to Transmit Information about a Minor | |
| |
| |
Case Law Pertaining to Online Child Pornography | |
| |
| |
Online Gambling | |
| |
| |
Federal Law | |
| |
| |
The Unlawful Internet Gambling Act-31 USC �� 5361-5367 | |
| |
| |
The Wire Act-18 USC � 1084 | |
| |
| |
The Travel Act-18 USC � 1952 | |
| |
| |
The Paraphernalia Act-18 USC � 1953 | |
| |
| |
18 USC � 1955 | |
| |
| |
State Gambling Laws | |
| |
| |
Indiana | |
| |
| |
New York | |
| |
| |
Key Words and Phrases | |
| |
| |
Review Problems | |
| |
| |
Weblinks | |
| |
| |
Endnotes | |
| |
| |
| |
Crimes Threatening or Resulting in Physical or Mental Harm | |
| |
| |
Introduction | |
| |
| |
Sexual Predator Crimes | |
| |
| |
18 USC � 2425: Use of Interstate Facilities to Transmit Information about a Minor | |
| |
| |
Cyberstalking and Cyberharassment Legislation | |
| |
| |
Federal Statutes | |
| |
| |
18 USC � 2261 A: Stalking | |
| |
| |
18 USC � 875: Interstate Communications | |
| |
| |
47 USC � 223: Obscene or Harassing Telephone Calls in the District of Columbia or in Interstate or Foreign Communications | |
| |
| |
Cases on Cyberstalking and Cyberharassment | |
| |
| |
Judicial Interpretations of Federal Law | |
| |
| |
Key Words and Phrases | |
| |
| |
Review Problems | |
| |
| |
Weblinks | |
| |
| |
| |
Internet Frauds | |
| |
| |
Introduction | |
| |
| |
Auction Fraud | |
| |
| |
Ponzi and Pyramid Schemes | |
| |
| |
Access Device Fraud | |
| |
| |
What Is an Access Device? | |
| |
| |
How Is an Access Device Fraud Committed? | |
| |
| |
Electronic Fund Transfer Fraud | |
| |
| |
Identity Theft and Fraud | |
| |
| |
Identity Theft | |
| |
| |
The Federal Identity Theft Crimes | |
| |
| |
18 USC � 1028 | |
| |
| |
18 USC � 1028A | |
| |
| |
State Identity Theft Laws | |
| |
| |
Cyberlaundering | |
| |
| |
Other Fraudulent Schemes | |
| |
| |
Key Words and Phrases | |
| |
| |
Review Problems | |
| |
| |
Weblinks | |
| |
| |
Endnotes | |
| |
| |
| |
Crimes Against Information Assets, and Data Privacy | |
| |
| |
| |
Data Privacy Crimes | |
| |
| |
Introduction | |
| |
| |
The Fair Credit Reporting Act (FCRA) | |
| |
| |
The Fair and Accurate Credit Transactions Act (FACTA) | |
| |
| |
The Gramm-Leach-Bliley Act (GLBA) | |
| |
| |
The Health Insurance Portability and Accountability Act (HIPAA) | |
| |
| |
After the Breach: Is There a Duty to Notify the Consumer That the Security of Their Data Has Been Compromised? | |
| |
| |
Key Words and Phrases | |
| |
| |
Review Problems | |
| |
| |
Weblinks | |
| |
| |
Endnotes | |
| |
| |
| |
Intellectual Property Fraud | |
| |
| |
Introduction | |
| |
| |
Criminal Copyright Infringement | |
| |
| |
Software Piracy | |
| |
| |
Key Words and Phrases | |
| |
| |
Review Problems | |
| |
| |
Weblinks | |
| |
| |
| |
Investigation and Enforcement of Cybercrimes | |
| |
| |
| |
Search and Seizure: Beginning Principles | |
| |
| |
Introduction | |
| |
| |
Constitutional Principles | |
| |
| |
The Fourth Amendment | |
| |
| |
Reasonable Expectation of Privacy | |
| |
| |
Workplace Searches | |
| |
| |
Protection from Government Activity | |
| |
| |
The Mere Evidence Rule | |
| |
| |
Searches with and without a Warrant | |
| |
| |
Consent | |
| |
| |
Plain View | |
| |
| |
Exigent Circumstances | |
| |
| |
Incident to a Lawful Arrest | |
| |
| |
Inventory Search | |
| |
| |
Border Search | |
| |
| |
Administrative Searches | |
| |
| |
Automobile Exception | |
| |
| |
Special Needs Exception | |
| |
| |
Key Words and Phrases | |
| |
| |
Review Problems | |
| |
| |
Weblinks | |
| |
| |
Endnotes | |
| |
| |
| |
Search and Seizure: Electronic Evidence | |
| |
| |
Introduction | |
| |
| |
Conducting the Search or Seizure | |
| |
| |
Searches and Seizures without a Warrant | |
| |
| |
Key Words and Phrases | |
| |
| |
Review Problems | |
| |
| |
Weblinks | |
| |
| |
| |
Wiretapping and Eavesdropping | |
| |
| |
Introduction | |
| |
| |
Statutes and Regulations | |
| |
| |
Case Law | |
| |
| |
Key Words and Phrases | |
| |
| |
Review Problems | |
| |
| |
Weblinks | |
| |
| |
| |
Access to Stored Communications | |
| |
| |
Introduction | |
| |
| |
Case Law | |
| |
| |
Key Words and Phrases | |
| |
| |
Review Problems | |
| |
| |
Weblinks | |
| |
| |
| |
Pen Register, Trap and Trace, and GPS Devices | |
| |
| |
Introduction | |
| |
| |
Pen Register and Trap and Trace Devices | |
| |
| |
Global Positioning Systems(GPSs) | |
| |
| |
RFID Technology | |
| |
| |
Key Words and Phrases | |
| |
| |
Review Problems | |
| |
| |
Weblinks | |
| |
| |
| |
Digital Evidence and Forensic Analysis | |
| |
| |
Introduction | |
| |
| |
Nature of Evidence | |
| |
| |
Admissibility of Evidence | |
| |
| |
Preservation of Evidence | |
| |
| |
Chain of Custody | |
| |
| |
Admissibility of Digital Evidence | |
| |
| |
The Frye Test | |
| |
| |
Frye Plus | |
| |
| |
Daubert Test | |
| |
| |
Expert Opinion Evidence | |
| |
| |
Rules Requiring the Exclusion of Evidence | |
| |
| |
Hearsay Rule | |
| |
| |
Exceptions to the Rule | |
| |
| |
Best Evidence Rule | |
| |
| |
Key Words and Phrases | |
| |
| |
Review Problems | |
| |
| |
Weblinks | |
| |
| |
| |
International Issues Involving the Investigation and Prosecution of Cybercrime | |
| |
| |
Introduction | |
| |
| |
Jurisdiction | |
| |
| |
Extraterritorial Application of Criminal Laws | |
| |
| |
International Enforcement and Cooperation | |
| |
| |
Letters Rogatory | |
| |
| |
Mutual Legal Assistance Treaty | |
| |
| |
Extradition Treaty | |
| |
| |
Council of Europe Convention on Cybercrime | |
| |
| |
Key Words and Phrases | |
| |
| |
Review Problems | |
| |
| |
Weblinks | |
| |
| |
References | |
| |
| |
Index | |