CYBERCRIME – WEEK 1 (Lectures 1, 2) DAVID THAW University of Connecticut School of Law
CLASS OVERVIEW Lecture 1: Introduction to Computer Crimes/Computer Misuse Lecture 2: Use of Property Crimes to Punish Computer Misuse Lecture 3: The CFAA (18 U.S.C. § 1030) and “Access” Discussion
LECTURE 1 OVERVIEW Preview of Course Themes: Substantive crimes Investigatory means/methods Jurisdictional issues Background – mine, yours, and getting the most out of the class Casebook hypos Administrivia
COURSE THEMES Substantive Crimes Focus on privacy and economic (property) interests rather than crimes-against-persons Investigatory Means/Methods Physical crimes: witnesses, physical evidence (think CSI) Computer crimes: computer logs, other digital evidence Jurisdiction Physical crimes: traditionally province of the states Computer crimes: (usually) shift to federal prosecution
BACKGROUND Me: Law and Computer Science (Information Security) You: Required: first-year criminal law (that’s it!) Helpful (but definitely not mandatory): Criminal procedure Internet law Intellectual property If you’re just taking the class because it sounds “fun” – great!
CYBERCRIME OVERVIEW What makes a computer crime? Substantive Law: crimes against/involving the use of computers Procedural Law: crimes involving collection of evidence that exists in computerized (electronic) form
CYBERCRIME OVERVIEW Substantive Law Computer Misuse Crimes – intentional interference with proper function of computers Exs: hacking, malware, DDoS Traditional Crimes – traditional crimes committed using/facilitated by computers Exs: Internet fraud, online threats, distribution of child pornography, theft of trade secrets
CYBERCRIME OVERVIEW Procedural Law Fourth Amendment Digital evidence collection when is retrieving evidence from a computer a “search”? Statutory Privacy Law Wiretap Act (1968) Title III of Omnibus Crime Control and Safe Streets Act 1986: Electronic Communications Privacy Act (ECPA) – amended Title III to include data transmission Stored Communications Act (SCA) – Title II of ECPA Pen Register Statute Investigative/Prosecutorial Questions: Jurisdictional Procedural Substantive
COMPUTER MISUSE Offenses involving interference with the proper functioning of computing and information systems Why do I say “computing and info. systems”? Forms of computer misuse: Exceeding privileges Interfering with (denying) others’ privileges
DISCUSSION Cases United States v. Seidlitz State v. McGraw Casebook Hypotheticals Fred Felony KillerBee/Bryan Smith Sarah Jones
CASEBOOK HYPO – CRIMES/INVESTIGATION Fred Felony – Jewelry Store “Stick-Up” Jurisdictional? Procedural? Substantive? Fred Felony – Credit Card Theft Jurisdictional? Procedural? Substantive? The answers to these questions often interrelate!
CASEBOOK HYPO – COMPUTER MISUSE KillerBee (Bryan Smith) What “crimes” occurred? Is punishment justified? Utilitarian? Retributive? Damages – is there a “but for” (proximate causation) problem here? Should criminal law consider a proximate causation problem? Differences among targets’ security/damages – do they matter?
CASEBOOK HYPO – COMPUTER MISUSE Sarah Jones What “crimes” occurred? Is punishment justified? Utilitarian? Retributive? Are there (yet) damages? What future damages might exist? Who is more deserving of punishment, Bryan or Sarah?