CYBERCRIME – WEEK 1 (Lectures 1, 2) DAVID THAW University of Connecticut School of Law.

Slides:



Advertisements
Similar presentations
Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Hazards of Hacking. Hacking Originally, hacking was used to describe a programmer who was very skilled at his/her profession Often, this person knew programming.
Computer Forensics BACS 371
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Technology for Computer Forensics by Alicia Castro.
Computer Forensics What is Computer Forensics? What is the importance of Computer Forensics? What do Computer Forensics specialists do? Applications of.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Cyber Crimes.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
LEFIS General Assembly, Wrocław Sept Continuing education Andrzej Adamski, Nicolaus Copernicus University, Poland.
1 Copyright © 2011 M. E. Kabay, J. Tower-Pierce & P. R. Stephenson. All rights reserved. The U.S.A.P.A.T.R.I.O.T. Act CJ341 – Cyberlaw & Cybercrime Lecture.
Computer Legislation The need for computer laws Go to Contents.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 6 Criminal Law and Cyber Crimes.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
© 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
LESSON 2: Internet, Computer Ethics and Security
Chapter 6 Business Torts and Cyber Considerations.
By Drew Perry and Mike Feldman.  The Defendant will deny accusation but an FBI agent was observing the chat and collected evidence. The FBI agent joined.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
& SELECTED TOPICS: DIGITAL FORENSICS Xinwen Fu, UMass Lowell, USA Center for Cyber Forensics, UMass Lowell.
Activities affecting informational privacy Collection Processing dissemination Monitoring ContractNo-contract questioning AggregationSecondary useExclusion.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
Cybercrime What is it, what does it cost, & how is it regulated?
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Computer crimes.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
Chapter 4: Laws, Regulations, and Compliance
Chapter 5 Criminal Law.  What two elements must exist before a person can be convicted of a crime?  Can a corporation be liable for a crime?  What.
The Place of Cyberlaw in the MSIS Curriculum Ramesh Subramanian Bruce White Quinnipiac University.
Crime-Tort Jeopardy Business Related Crimes Elements of a Crime Classify Defenses Elements of a Tort Types of Torts Civil Procedure $100100$100100$100100$100100$100100$100100$
 Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
© 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
And the additional protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
ESSENTIALS OF THE LEGAL ENVIRONMENT today, 5e
by John Bagby and F. William McCarty
Using Social Media in the University Setting
A Project on CYBER SECURITY
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Computer Crime CJ 520 / CJ October 27, 2010.
Introduction to Computer Forensics
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Introduction to Computer Forensics
Chapter 4 Law, Regulations, and Compliance
Overview of the Budapest Convention on Cybercrime (2001)
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Chapter 12 Technology and Crime: It’s a Double-Edged Sword
Presentation transcript:

CYBERCRIME – WEEK 1 (Lectures 1, 2) DAVID THAW University of Connecticut School of Law

CLASS OVERVIEW Lecture 1: Introduction to Computer Crimes/Computer Misuse Lecture 2: Use of Property Crimes to Punish Computer Misuse Lecture 3: The CFAA (18 U.S.C. § 1030) and “Access” Discussion

LECTURE 1 OVERVIEW Preview of Course Themes: Substantive crimes Investigatory means/methods Jurisdictional issues Background – mine, yours, and getting the most out of the class Casebook hypos Administrivia

COURSE THEMES Substantive Crimes Focus on privacy and economic (property) interests rather than crimes-against-persons Investigatory Means/Methods Physical crimes: witnesses, physical evidence (think CSI) Computer crimes: computer logs, other digital evidence Jurisdiction Physical crimes: traditionally province of the states Computer crimes: (usually) shift to federal prosecution

BACKGROUND Me: Law and Computer Science (Information Security) You: Required: first-year criminal law (that’s it!) Helpful (but definitely not mandatory): Criminal procedure Internet law Intellectual property If you’re just taking the class because it sounds “fun” – great!

CYBERCRIME OVERVIEW What makes a computer crime? Substantive Law: crimes against/involving the use of computers Procedural Law: crimes involving collection of evidence that exists in computerized (electronic) form

CYBERCRIME OVERVIEW Substantive Law Computer Misuse Crimes – intentional interference with proper function of computers Exs: hacking, malware, DDoS Traditional Crimes – traditional crimes committed using/facilitated by computers Exs: Internet fraud, online threats, distribution of child pornography, theft of trade secrets

CYBERCRIME OVERVIEW Procedural Law Fourth Amendment Digital evidence collection when is retrieving evidence from a computer a “search”? Statutory Privacy Law Wiretap Act (1968) Title III of Omnibus Crime Control and Safe Streets Act 1986: Electronic Communications Privacy Act (ECPA) – amended Title III to include data transmission Stored Communications Act (SCA) – Title II of ECPA Pen Register Statute Investigative/Prosecutorial Questions: Jurisdictional  Procedural  Substantive

COMPUTER MISUSE Offenses involving interference with the proper functioning of computing and information systems Why do I say “computing and info. systems”? Forms of computer misuse: Exceeding privileges Interfering with (denying) others’ privileges

DISCUSSION Cases United States v. Seidlitz State v. McGraw Casebook Hypotheticals Fred Felony KillerBee/Bryan Smith Sarah Jones

CASEBOOK HYPO – CRIMES/INVESTIGATION Fred Felony – Jewelry Store “Stick-Up” Jurisdictional? Procedural? Substantive? Fred Felony – Credit Card Theft Jurisdictional? Procedural? Substantive? The answers to these questions often interrelate!

CASEBOOK HYPO – COMPUTER MISUSE KillerBee (Bryan Smith) What “crimes” occurred? Is punishment justified? Utilitarian? Retributive? Damages – is there a “but for” (proximate causation) problem here? Should criminal law consider a proximate causation problem? Differences among targets’ security/damages – do they matter?

CASEBOOK HYPO – COMPUTER MISUSE Sarah Jones What “crimes” occurred? Is punishment justified? Utilitarian? Retributive? Are there (yet) damages? What future damages might exist? Who is more deserving of punishment, Bryan or Sarah?