Cyber Crime and Jurisdiction By Zach Archer COCS 380.

Slides:



Advertisements
Similar presentations
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Prosecuting Intellectual Property Cases Arnold H. Huftalen Assistant U.S. Attorney U.S. Department of Justice
Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.
Cyber Crime By: Benjamin Lewis, Alex Lesko, Patricia Di Pietro, & Gabbrielle Cadieux.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Chapter 14 Crime and Justice in the New Millennium
Mohd Taufik Abdullah Department of Computer Science
Pornography and the Internet Amanda Gillespie Donna Jones EDCI 564.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
Military Sentinel Presentation November 19, 2008 John Krebs, Attorney Consumer Sentinel Network Program Manager Federal Trade Commission.
What is Social Networking? Social networking sites provide teens and young adults with a virtual environment where they share stories, pictures, videos,
Zahid Kinnare Cyberspace Social Media and Networking.
9/11 attacks radically changed Federal Law Enforcement Attacks highlighted a lack of coordination among Federal agencies 2002 President Bush created: The.
UNIT 1 – LAW ENFORCEMENT Crime and Punishment. Criminal Justice  The purpose of Criminal Justice  To control crime  To prevent crime  To provide and.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Ideal Jobs FBI. Field Criminal Justice Criminal Justice is study of the law and is mostly of thinking of the Criminal mind. Jobs: Local law Enforcement:
Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective.
Warm up? What kinds of services do you think the government should be responsible for?
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
FBI and Cyber Crime FBI’s cyber mission: Stop those behind most serious computer intrusions and the spread of malicious code To identify and thwart online.
Security and Ethics Privacy Employment Health Crime Working
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Objectives SWBAT Identify the various procedures in the enactment, implementation, and enforcement of law SWBAT compare responsibilities, jurisdictions,
Should media copyright laws be more strictly enforced? Compose and copyright CD, Produce instrumentals, Film Music Video By: La’Vell Williams.
Software Piracy By: B. Kaniecki.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Police are not prepared for rising incidence of Identity Fraud By Chris DeVito.
1. 1.To discover ethical issues in electronic media and the Internet. 2.To identify different areas of Internet crime. 3.To assess where one should go.
Computer crimes.
MORE MONEY FOR CYBER- SECURITY?. CYBER SECURITY: A TICKING TIME BOMB? Richie Sabu G/T Independent Research Howard High School Mr. Brian Price, Advisor.
Ned Einsig III.  Domestic Intelligence & Security Service of the United States  Prime Federal Law Enforcement Organization  Jurisdiction on over 200.
Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.
State and Federal Court Systems. Dual Court System There are separate state and federal court systems Federal courts deal with matters of federal law.
Crime lab development  Once started, development of crime labs around the country was rapid.  There was a lack of national and regional planning and.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Welcome C&E Students Grab your handout and settle in Roll Call Question: What would your “last meal” be? Bell Work: What are the steps in a criminal justice.
By : Syed Shabi Ul Hassan. What is Cyber Crime?  Crimes that have been made possible by computers.  Such as Identity Theft, Bullying, Hacking, Internet.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
Federalism in Law Enforcement Intro to LPSCS 1. Federal and State Law Enforcement Agencies County State Federal Municipal Different Governments Different.
Issues for Computer Users, Electronic Devices, Computer and Safety.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Computer Crimes Justin A. Sarvey. Overview Define computer crime Define computer crime Examples of computer crime Examples of computer crime Statistics.
By: Arjun Vachhani.  What is Cybercrime  What is Cybercrime Law  Cybercrime in Our Lives  Case 1: Albert Gonzalez  Case 2:Phishers  Statistics 
By: Micah Stevens Identity Theft in the World Today.
© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber.
Federal Law Enforcement!
Computer Security Fundamentals
Chapter 9: Internet Law, Social Media, and Privacy
UNIT IV – Legislative and Executive Branches
A Project on CYBER SECURITY
Issues In media studies: Cyberbullying
Warm Up – Last Meals row-prisoners-last-meals.
Assalamualaikum Today, I am going to give a presentation on
Crime Lab Agencies.
Ethical Use of Computers
Crime Lab Agencies.
Warm Up – April 2 Answer the following question on a post it:
Presentation transcript:

Cyber Crime and Jurisdiction By Zach Archer COCS 380

Road map  Cyber crimes  What is jurisdiction  How the internet affects jurisdiction  What are some cases

What is a cyber crime  Cyber crime encompasses any criminal act dealing with computers and networks  Spam  Fraud  Piracy  Cyber terrorism  Drug trafficking

Video  iueQm5A iueQm5A

Some stats  Top crime Non-delivery  Identity theft  Credit card and auction fraud

Cyber crimes and you  Download music anyone?  $2,500 or more is a federal crime  5 years in jail and $250,000 in fines  RIAA (Recording Industry Association)  Watchdogs of millions users

Who investigates domestic computer crimes  FBI  The U.S. Secret Service  U.S. Immigration and Customs Enforcement  U.S. Postal Inspection Service  The Bureau of Alcohol, Tobacco, Firearms and Explosives

Main FBI Objective  The FBI’s exclusive jurisdiction is over internet harassment  Cyber bullying  Stalking

FBI also deals with  The FBI also shares jurisdiction of many other crimes such as….  Hacking  Password trafficking  Child pornography  Internet Bomb Threats  Trafficking of explosive or firearms over the internet

What is jurisdiction  Jurisdiction is the right, power, or authority to administer justice by hearing and determining controversies  Subject matter jurisdiction  Personal jurisdiction  Domestic jurisdiction

The Problem now  The problem we as a country are having now is where does this jurisdiction fall when crimes over the internet happen?  What court will hear the case

Some Cases and Outcomes  Zippo Manufacturing v. Zippo.com  John Wagner v. Glenda Miskin  Calder v. Jones  Tamburo v. Dworkin

Zippo Manufacturing v. Zippo.com  Zippo lighters wanted to have website  Zippo.com offered access to USENET and based in California  Zippo.com said the courts had no jurisdiction  Three prong test

John Wagner v. Glenda Miskin  Wagner professor at University of North Dakota and Miskin a student  Violation of stalking and harassing  Miskin said no jurisdiction

Calder v. Jones  Actress Shirley Jones was slandered by the National enquirer  Calder editor said no jurisdiction  First amendment

Tamburo v. Dworkin  Tamburo operated a dog-breeding software that pulled info from the web  No jurisdiction  Court dismissed case

Closing thoughts  What a cyber crime is  What jurisdiction is  How it is a problem  Some ways it has played out already

References  Gil, Paul. “How Do Music Pirates Get Caught”. about.com. New York Times Company. (nd). Web. 26 Feb  “Cyber Crime”. Webopedia. IT Business Edge. (n.d). Web. 26 Feb  “Jurisdiction”. Dictionary.com. Dictionary.com. (n.d). Web. 26 Feb  “Recently U.S. Cases Involving Internet Jurisdiction Over Non-resident Defendants”. DWW.com. E-Tips. (n.d). Web. 26 Feb  Walker, James. “Different Types of Cyber Crime”. EHow.com. Demand Media. (n.d). Web. 26 Feb  “The Law”. RIAA.com. RIAA. (n.d). Web. 28 Feb  “Web Crime Complaints Drop YOY, Up in Decade”. Marketingcharts.com. Watershed Publishing. (n.d). Web. 28 Feb. 2012

Question???