Www.AllianceLawGroup.com CYBERCRIME: THE U.S. APPROACH Craig J. Blakeley The Middle East Cybercrime Forum Beirut, Lebanon February 23 - 24, 2006.

Slides:



Advertisements
Similar presentations
Virginia State Bar Annual Meeting Corporate Counsel Section Update on Do Not Call & Spam Michael Goodman Federal Trade Commission
Advertisements

© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
Confidentiality and HIPAA
ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Lecture 14: Crime.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Criminal Law and Cyber Crime
An Overview of the Law on Spam Anti-Spam Research Group San Francisco, CA March 20, 2003 Jon Praed Internet Law Group
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
Copyright © 2009 by Pearson Prentice Hall. All rights reserved. PowerPoint Slides to Accompany CONTEMPORARY BUSINESS AND ONLINE COMMERCE LAW 6 th Edition.
INTERNET and CODE OF CONDUCT
1 Unsolicited Electronic Messages Ordinance An Overview of Implementation and Enforcement 28 May 2007.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
The U.S. Approach to Consumer Protection in the Online World U.S. Presentation FTAA Joint Government Private Sector Committee on Electronic Commerce 13th.
Digital Citizenship By: Miranda Scorver.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
CYBER CRIME.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
Dimensions of E – Commerce Security
Data Protection Act AS Module Heathcote Ch. 12.
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Federal Trade Commission FTC & Spam. Federal Trade Commission CAN-SPAM Act of 2003 (“Controlling the Assault of Non-Solicited Pornography.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
CRIMES Used by permission. For Educational purposes only.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Copyright 2000, Marchany Computer Law Threats and Issues VA Computer Crime Act Randy Marchany VA Tech Computing Center ©Marchany,2001.
Cybercrime What is it, what does it cost, & how is it regulated?
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Computer crimes.
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Dr. Roger Ward.  It is a source of Congressional power to regulate interstate commerce is the Commerce Clause in Article I, Section 8.  According to.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Issues for Computer Users, Electronic Devices, Computer and Safety.
E-C OMMERCE : T HE E -C ONSUMER AND THE ATTACKS AGAINST THE PERSONAL DATA Nomikou Eirini Attorney at Law, Piraeus Bar Association Master Degree in Web.
Chapter 15 Internet Law and E-Commerce
Hacking: public policy
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
Data Protection Legislation
Update on the Computer Fraud and Abuse Act
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

CYBERCRIME: THE U.S. APPROACH Craig J. Blakeley The Middle East Cybercrime Forum Beirut, Lebanon February , 2006

Cybercrime What is it? Why should it be of concern to the Middle East? Are existing penal laws adequate to deal with it? (Is there something unique or different about cyber crime that requires new laws to specifically address these issues?) U.S. laws Lessons for the Middle East

Cybercrime: What is it? Use of a computer/Internet to do something that would be a crime in any case. Analogy: Murder is the taking of a human life without justification whether done with a rock, a sword, a gun electricity, poison, etc. The crime is defined in terms of the end result -- not how that result was brought about. Fraud (credit card or identity theft) Child Pornography Intellectual Property Violations Stalking

Cybercrime: What is it? Use of a computer/Internet to commit a “traditional” crime in a different way or to dramatically increase the impact of a “traditional” crime. Fraud (credit card or identity theft) “Phishing” -- obtaining identity information or credit card numbers by masquerading as a legitimate business representative (such as a Web site or through ) Child Pornography & Intellectual Property Violations Internet can be used to distribute on a worldwide basis & can be used to hide geographic location of crime

Cyber Crime: What is it? Use of a computer/Internet to commit a “traditional” crime in a different way or to dramatically increase the impact of a “traditional” crime. (cont.) Cyberstalking -- Use of or other electronic communication by computer to threaten, harass, or put an individual in fear of harm.

Cyber Crime: What is it? Use of a computer/Internet to do something that we want to prohibit (i.e., make criminal) but which action (crime) would not be possible without a computer/Internet. Analogy: Drunk driving would not be a crime (i.e., would not be possible) without an automobile. Computer viruses Spam Hacking Denial of Service Attacks

Cybercrime: Why Should It Be Of Concern in the Middle East? Pervasive Nature and Growing Importance of the Internet and Computers Economic Importance of Computers & the Internet (Information & Communications Technology -- “ICT”) Cyber crime can remove or destroy substantial amounts of economic value from the Internet, thus increasing costs, consuming resources, discouraging new investment, or causing a loss of confidence in the Internet

Cybercrime: Why Should It Be Of Concern in the Middle East? Cybercrime: Why Should It Be Of Concern in the Middle East? (cont.) Cyber-criminals will locate in areas with weak or no laws concerning cybercrime (e.g., the Middle East)

Are Traditional Penal Laws Adequate? Credit Card Fraud (for example): Under existing law a fraudulent transaction does not lose its fraudulent (i.e., criminal) nature just because it takes place online rather than through a paper transaction. However, the impact may be significantly greater when it takes place online. Hacking, Denial of Service Attacks, Viruses etc.: Existing Laws are insufficient. There is not a physical entry or taking. And even if laws could be interpreted to cover such activity (a dubious proposition), the deterrence effect of a law of uncertain application would be very low.

Risks in the Absence of a Specific Law Example: The Love Bug Virus Originated with a student in the Philippines in 2000 Spread via with the subject of “I Love You” and an attachment reading “LOVE-LETTER-FOR-YOU” The virus overwrote important files and sent a copy of the and virus to everyone in the computer’s address book Net result was an estimated $10 billion (U.S.) in economic damages worldwide Perpetrator could not be prosecuted in the Philippines because there was no law that prohibited this conduct (e-commerce law was under consideration but had not yet been adopted)

Cybercrime Law in the U.S. U.S. has a “federal” system with both a national government and 50 state governments, as well as the District of Columbia Criminal law (in the noncomputer context) is a mixture of federal and state law The same is true with respect to laws addressing Cybercrime

Cybercrime Law in the U.S. U.S. Computer Fraud and Abuse Act CAN-Spam Act Electronic Communications Privacy Act of 1986 No Electronic Theft Act Identity Theft and Assumption Deterrence Act FTC Act State Laws

Federal Law U.S. Computer Fraud and Abuse Act Addressed to Crimes Against Computers Applies to “protected computers” Computers used by financial institutions or the U.S. Government and Computers used in “interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States”

Federal Law U.S. Computer Fraud and Abuse Act (cont.) Prohibits: Intentionally accessing a computer without authorization to obtain information contained in a financial record of a financial institution or credited care company or contained in the file of a consumer reporting agency on a consumer; from any department or agency of the U.S. Government; or from any “protected computer” if the conduct involves interstate or foreign communication “Knowingly and with intent to defraud,” accessing a protected computer without authorization, and through such conduct furthering the intended fraud (unless the purpose of the fraud and what is obtained is

Federal Law U.S. Computer Fraud and Abuse Act (Prohibitions cont.) only the use of the computer and the value of what is obtained is not more than $5,000 in any one-year period) Knowingly cause transmission of a program, information, code or command (i.e., a virus or or other malware) and, as a result, intentionally cause damage to a protected computer or intentionally access a protected computer and cause damage to it if such damage includes a loss by one or more persons aggregating at least $5,000 in any one year, physical injury to any person, any threat to public health or safety (or certain other specified harms)

Federal Law U.S. Computer Fraud and Abuse Act (Prohibitions cont.) Knowingly and with intent to defraud, traffic in any password or similar information through which a computer may be accessed without authorization if such trafficking affects interstate or foreign commerce or the computer is used by or for the U.S. Government Transmit in interstate or foreign commerce any communication containing any threat to cause damage to a protected computer with intent to extort from any person any money or other thing of value Also prohibits accessing without authorization certain U.S. Government computers and obtaining certain “classified information”

Federal Law U.S. Computer Fraud and Abuse Act Penalties Fines of up to $250,000 and imprisonment of up to 20 years (up to a life term if death results) Injured persons have a “private right of action” to bring lawsuits for damages and equitable relief (e.g, injunctions)

Federal Law CAN-Spam Act Approved in 2003; took effect on January 1, 2004 Designed to prevent proposed California law from taking effect Calif. Law would have required affirmative consumer consent -- “opt-in” -- prior to receiving Spam Permits sending of Spam to consumers unless they “opt out” Prohibits state laws dealing with Spam, except those that prohibit false or deceptive

Federal Law CAN-Spam Act; Specific Provisions Covers whose primary purpose is advertising or promoting a commercial product or service that facilitates an agreed-upon transaction or updates a customers in an existing business relationship is not covered by the law (except with respect to accuracy of header information)

Federal Law CAN-Spam Act; Specific Provisions (cont.) All commercial and “transactional or relationship ” must have accurate header information (“From,” “To,” and routing information) Commercial must contain: Accurate subject lines Sender’s valid physical postal address Identification as advertisement Opt-out method (using address or other internet-based mechanism for recipients that must be valid for 30 days after the is sent; opt-out requests must be honored within 10 business days after receipt

Federal Law CAN-Spam Act; Specific Provisions (cont.) Other practices of commercial ers are prohibited: “Harvesting” addresses Generating addresses using a “dictionary” attack Using scripts other automated ways of registering for multiple or user accounts to send commercial Relaying s through a computer or network without permission

Federal Law CAN-Spam Act Penalties (apply both to those who actually send the offending s and to those who hire them) “Routine Violations” -- Fines of up to $11,000 (U.S.) per violation (ban of false or misleading header information, prohibition of deceptive subject lines, provision of required op-out mechanism, identification of commercial s as advertisements and inclusion of sender’s valid physical postal address) Additional fines are imposed upon those who use harvesting, “dictionary” attacks, automated scripts to send commercial , relay s through a computer or network without permission

Federal Law CAN-Spam Act Penalties (cont.) More egregious violations -- Imprisonment of years, fines, and forfeiture of an property acquired from the proceeds of such misconduct (using third party computers without authorization to send multiple commercial messages (i.e. spam), using computers to relay or retransmit multiple spam messages with the intent to deceive or mislead as to the origin of the messages, falsification of header information in multiple spam messages, falsification of the identity of the actual registrant for five or more accounts

Federal Law CAN-Spam Act Penalties (cont.) or two or more domain names and the use of such accounts or names to send multiple commercial messages, falsification of the identity of five or more IP addresses and the use of such addresses to send commercial messages)

Federal Law CAN-Spam Act Enforceable by: U.S. Federal Trade Commission and Department of Justice (criminal provisions) State attorneys general and other relevant state agencies (for citizens of their states) Internet Service Providers Important Exception: Not enforceable by individual consumers or businesses

Other Relevant Federal Laws Electronic Communications Privacy Act of 1986 Prohibits the interception, disclosure, and use of certain wire, oral and electronic communications affecting interstate (i.e., between more than one state in the U.S.) or foreign commerce Fines and/or prison terms of up to five years may be imposed

Other Relevant Federal Laws No Electronic Theft Act Makes it a federal crime to reproduce, distribute, or share copies of electronic copyrighted works such as songs, movies, games, or software programs, even if the person copying or distributing the material acts without commercial purpose and/or receives no private financial gain Penalties of up to 5 years in prison and $250,000 (U.S.) in fines may be imposed

Other Relevant Federal Laws Identity Theft and Assumption Deterrence Act Makes it a federal crime to knowingly transfer or use, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law Penalties of up to 5 years in prison may be imposed

Other Relevant Federal Laws FTC Act Prohibits renders unfair or deceptive acts or practices in or affecting commerce (including such actions on the Internet) FTC is empowered to adopt rules prohibiting such acts and to issue “cease and desist” orders Civil penalties of up to $10,000 per violation may be imposed for violations of FTC rules concerning unfair or deceptive practices or or of “cease and desist” orders forbidding such practices

State Laws In addition to federal laws, individual states have adopted laws that cover cybercrime in a number of ways. These include: General computer crime statutes Computer tampering Computer trespass Unauthorized use of a computer Interruption of computer services Computer fraud Spam-related offenses (e.g., falsification of routing and heading information) Unlawful use of encryption Cyberstalking Offenses against computer users Theft of confidential data from computer systems

State Law Examples Virginia Computer Crimes Act Prohibits: Use of computer for identity theft, harassment, invasion of privacy, transmit spam with false or misleading electronic mail transmission information or routing information Without authorization, altering, disabling, or or erasing computer data, using computer to cause physical injury Enforcement Provides for criminal penalties and also permits lawsuits for damages by aggrieved parties

State Law Examples Virginia Computer Crimes Act (cont.) Broad jurisdictional provision. Law defines using a computer or computer network within Virginia as conferring jurisdiction in Virginia. Given that the bulk of U.S. (and perhaps the world’s) Internet traffic passes through Virginia, this gives Virginia broad authority.

State Law Examples California Database Protection Act Applies to any person, agency, or company doing business in California NOTE: “Doing business” may mean as little as marketing to California residents or having a contract with a California company Requires disclosure to California residents of any security breaches where unencrypted personal information about them has been disclosed.

LESSONS FROM THE U.S. EXPERIENCE Specific laws are required to address misconduct that are unique to computers or the Internet Laws of national application are, by themselves, in sufficient to deal with cybercrime, which is international in scope Laws of extraterritorial application and/or international cooperation are required to deal to with threats from outside a specific country

TH ANK YOU! Craig J. Blakeley Alliance Law Group LLC 7700 Leesburg Pike, Suite 410 Tysons Corner, VA