46-840 ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Lecture 14: Crime.

Slides:



Advertisements
Similar presentations
MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Advertisements

Law Enforcement Implications of House Bill 87 Bill is known as the Illegal Immigration Reform and Enforcement Act of Many different implications.
Criminal Law Chapter 5.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 8 Crimes Twomey Jennings Anderson’s Business Law and the Legal.
Crimes Against Property. Arson  Willful and malicious burning of another person’s property.  It’s a crime to burn a building, even by the owner.
Understanding the impact technology has on you.. Sexting-The act of sending sexually explicit messages or photographs, primarily between mobile phones.
Sexting and Cyber-bullying Legal Issues Deputy Phyllis Applin Livingston County Sheriff’s Office.
Chapter 8 Crimes Twomey, Business Law and the Regulatory Environment (14th Ed.)
Section Obstruction of mail generally Whoever knowingly and willfully obstructs or retards the passage of the mail, or any carrier or conveyance.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Sex, Laws and Videos: 21st Century Sex Crimes Use of Recording Devices, Film, Cell Phones, Computers and the Internet Ginger Kimes Staff Attorney Prosecutor.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
ROBBERY AND EXTORTION M. Reid California Criminal Law Concepts Chapter 15 1.
Hazards of Hacking. Hacking Originally, hacking was used to describe a programmer who was very skilled at his/her profession Often, this person knew programming.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
ECOMMERCE LEGAL ENVIRONMENT SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Lecture 12: Crime.
Intellectual Property Boston College Law School February 13, 2008 Trade Secret – Part 3.
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
TYPES OF VIOLENT CRIMES Miscellaneous. Objectives UNT in partnership with TEA, Copyright ©. All rights reserved. 2 Distinguish the different types of.
TYPES OF VIOLENT CRIMES Miscellaneous. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
CYBERCRIME: THE U.S. APPROACH Craig J. Blakeley The Middle East Cybercrime Forum Beirut, Lebanon February , 2006.
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
CRIMINAL LAW Crime and Punishment. The Basics of Criminal Law Regulates public conduct Sets out duties owed to society Legal action that can ONLY be brought.
Cyber Crimes.
Internet Sex OffendersInternet Sex Offenders  It is humbling to speak about this topic because I have been a prosecutor long enough to remember the days.
Child Exploitation and Obscenity Section What we do... What we do... Assist 93 federal prosecution offices nationwide on child exploitation and child pornography.
Quick! What is a crime?. So, just how much has to be proven in court to find someone guilty of a crime? Burden of Proof The prosecution has the burden.
Bootcamp 2009 Porn, Predators, and the Pressure to Police Jennifer Stisa Granick, Civil Liberties Director.
 Four sources of law: Constitutions Statutes Case law Administrative regulations  Main types of laws include: Civil law Criminal law.
Unethical use of Computers and Networks
CYBER CRIME.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 8 Crimes.
The AIRCRAFT SAFETY ACT of 2000 H.R Wendell H. Ford Aviation Investment and Reform Act for the 21st Century.
Chapter 10: Crimes Against Property
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 6 Criminal Law and Cyber Crimes.
11 CLASS 14 Spyware & Computer Crimes pt. 2 Computers and the Law Randy Canis.
Chapter 5 Our Criminal Laws Lesson 5-1 Criminal Law.
Chapter 5 Crimes. Offenses Against Society When a crime occurs, society, acting through such employees as police and prosecutors, attempts to identify,
Stalking Awareness And Prevention Francis A. Arenas, Esq.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Prentice Hall © PowerPoint Slides to accompany The Legal Environment of Business and Online Commerce 4E, by Henry R. Cheeseman Chapter 7 Business.
Chapter 5 Our Criminal Laws
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Crimes Against Property Two subgroups: 1.Crimes in which property is destroyed 2.Crimes in which the property is stolen or taken against the will of the.
CRIMES Used by permission. For Educational purposes only.
Copyright 2000, Marchany Computer Law Threats and Issues VA Computer Crime Act Randy Marchany VA Tech Computing Center ©Marchany,2001.
Cybercrime What is it, what does it cost, & how is it regulated?
Comprehensive Volume, 18 th Edition Chapter 8: Crimes.
Computer crimes.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
LAW for Business and Personal Use © 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
Chapter 10 – Crimes Against Property. Arson The willful and malicious burning of a person’s property Intentionally burning a building to defraud the insurance.
{ Cyber Bullying. Cyber Bullying is typically referred to as “ a communication or posting by one or more people using cybertechnology or digital media.
Chapter 5 Criminal Law.  What two elements must exist before a person can be convicted of a crime?  Can a corporation be liable for a crime?  What.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Virginia RULES Teens Learn & Live the Law Crimes Against Persons.
Digital Crimes Cell Phone Computer. Malicious Use of a Telephone MCL e Threatening physical harm or damage to a person or property in the course.
Law for Business and Personal Use © Thomson South-Western CHAPTER 4 Criminal Law and Procedure 4-1 Criminal Law 4-2 Criminal Procedure.
Crimes Against Persons
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Chapter 4 Criminal Law and Procedure
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Chapter 4 Criminal Law and Procedure
Laws Against Computer Hacking
Presentation transcript:

ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Lecture 14: Crime

ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Criminal Law Even though there is a victim, the injury is to “society,” so the government prosecutes Unauthorized access Theft of services Alteration/destruction of data Trafficking in passwords Computer fraud Denial of service

ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Identity Theft 18 U.S.C. 1028(a) prohibits “knowingly and without lawful authority”18 U.S.C. 1028(a) producing a real or false identification document transferring a stolen identification document possessing five or more real or false identification documents with intent to use transfers or uses a means of identification of another person with the intent to commit … any unlawful activity that constitutes a violation of Federal law, or … felony under … State or local law Penalty: 15, 20 or 25 years

ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Computer Fraud and Abuse Act  Fraud in connection with access devices. 18 U.S.C. § U.S.C. § 1029 “access device” means any card, plate, code, account number, electronic serial number, mobile identification number, PIN, or other … identifier or other means of account access that can be used … to obtain money, goods, services, or any other thing of value, or … to initiate a transfer of funds Prohibits use or trafficking in counterfeit access devices Penalty: 10, 15 or 20 years Attempt carries same punishment

ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Government Response U.S. Government Identity Theft Site FTC Identity Theft Site Identity Theft and Fraud (Dep’t of Justice)Identity Theft and Fraud Identity Theft Resources (Privacy Rights Clearinghouse)Identity Theft Resources

ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Extortion, 18 U.S.C. § U.S.C. §875 “Whoever, with intent to extort from any person, firm, association, or corporation, any money or other thing of value, transmits in interstate or foreign commerce any communication containing any threat to injure the property or reputation of the addressee or of another or the reputation of a deceased person or any threat to accuse the addressee or any other person of a crime, shall be fined under this title or imprisoned not more than two years, or both.”

ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Pornography Federal statute, 18 U.S.C. §2252: Applies to any person who - (1) knowingly transports, ships, receives or distributes in interstate or foreign commerce by any means including by computer or mails, any visual depiction of a minor engaging in sexually explicit conduct.18 U.S.C. §2252 U.S. v. Hockings, No (9th Cir. 11/21/97): Computer graphic interchange files (GIFs) in binary format fall within the definition of "visual depictions" as contemplated by 18 U.S.C. §§ 2252(a)(1) and (4)(B). The fact that such files require the use of personal computer hardware and software to depict images of child pornography does not put them outside the statute, the court held, analogizing to an earlier case in which undeveloped film was also held to constitute a "visual depiction" under the statute.

ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cyberstalking “It is the intent of this act to clarify that electronic communications are included in the actions that can constitute the crimes of harassment and stalking.” Cal. Penal Code (a) Any person who willfully, maliciously, and repeatedly follows or harasses another person and who makes a credible threat with the intent to place that person in reasonable fear for his or her safety, or the safety of his or her immediate family, is guilty of the crime of stalking, punishable by imprisonment in a county jail for not more than one year or by a fine of not more than one thousand dollars ($1,000), or by both that fine and imprisonment.Cal. Penal Code 646.9

ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cyberstalking Cal. Penal Code §653m. (a) Every person who, with intent to annoy, telephones or makes contact by means of an electronic communication device with another and addresses to or about the other person any obscene language or addresses to the other person any threat to inflict injury to the person or property of the person addressed or any member of his or her family, is guilty of a misdemeanor. Nothing in this subdivision shall apply to telephone calls or electronic contacts made in good faith.Cal. Penal Code §653m

ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Current Cases State of Utah v. Amoroso, 1999 Utah App. LEXIS 213 (Ct. App. Ut. 3/4/99): Utah may criminally prosecute an Illinois corporation for liquor sales to Utah residents over the Internet. Court held that there was criminal personal jurisdiction in Utah since the conduct committed in Illinois caused an unlawful result in Utah. FTC v. Craig Lee Hare (S.D. Fla. 4/98): Action for deceptive trade practices arising from on-line “auction” offering sale of computer products that were never delivered. Defendant barred for life from conducting Internet commerce, pleaded guilty to wire fraud and sentenced to six months home detention, three years probation and ordered to pay restitution of over $22,000.

ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Current Cases U.S. v. Hoke, Magistrate No M (C.D. Cal. 4/14/99): U.S. Attorney's Office sued Gary Hoke of North Carolina for disseminating misinformation on a counterfeit Bloomberg News Service Web page regarding an alleged merger between his employer PairGain Technology, Inc. and ECI Telecom, Ltd. Hoke was traced by IP addresses from Angelfire.com. Hoke pled guilty, sentenced to five months of home detention, five years probation, and restitution of $93,

ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Economic Espionage Act Whoever, intending or knowing that the offense will benefit any foreign government, knowingly - (1) steals, or by fraud, artifice, or deception obtains a trade secret; (2) without authorization copies, downloads, replicates, transmits, or conveys a trade secret; (3) receives, buys, or possesses a trade secret, knowing the same to have been stolen Penalty for organizations: $10 million fine

ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Theft of Trade Secrets, 18 U.S.C. § U.S.C. §1832 Whoever (1) steals, or without authorization appropriates, takes, carries away, or conceals, or by fraud, artifice, or deception obtains a trade secret; (2) without authorization copies, duplicates, downloads, destroys, replicates, transmits, communicates, or conveys a trade secret; or (3) receives, buys, or possesses a trade secret, knowing the same to have been stolen; commits an offense.  Penalty: forfeiture, fine, jail  For organizations, $5,000,000 fine

ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Denial of Access “Whoever willfully, knowingly, and without authorization accesses... any computer, computer system, or computer network; or whoever willfully, knowingly, and without authorization denies or causes the denial of computer system services to an authorized user of such computer system services... commits [a felony].” Fla. Stat. §815.06Fla. Stat. § “Whoever willfully, knowingly, and without authorization modifies or destroys data, programs, or supporting documentation residing or existing internal or external to a computer, computer system, or computer network commits [a felony]. Fla. Stat. §815.04Fla. Stat. §815.04

ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Criminal Jurisdiction When can a state exercise criminal jurisdiction? –Conduct in the state that is an element of the offense –Conduct outside that is an attempt to commit inside –Conduct outside that is conspiracy to commit inside the state + an overt act in the state –Omission to perform a legal duty imposed by the state –Offense is based on a state statute that prohibits conduct outside the state that bears a reasonable relation to a legitimate interest of the state and the actor knows or should know that his conduct is likely to affect that interest. 18 Pa. C.S. § 102

ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Q A &