No Cop on the Beat: Underenforcement in E-Commerce and Cybercrime Peter P. Swire Ohio State University & Center for American Progress Fordham CLIP Information.

Slides:



Advertisements
Similar presentations
Why E-Commerce is Like a Bottle of Tylenol Professor Peter P. Swire Ohio State Law School Conference on New Technologies and International Governance February.
Advertisements

Elephants and Mice Revisited: Law and Choice of Law on the Internet Professor Peter P. Swire Moritz College of Law Ohio State University Penn Law Review.
Trustwrap: The Importance of Legal Rules to E-Commerce and Internet Privacy Professor Peter P. Swire Moritz College of Law The Ohio State University Enforcing.
Liability Issues in Anti-Spyware Software Peter P. Swire Ohio State University Center for American Progress Anti-Spyware Coalition Public Workshop January.
No Cop on the Beat: Underenforcement in E-Commerce and Cybercrime Peter P. Swire Ohio State University & Center for American Progress Silicon Flatirons.
Online Profiling and Consumer Choice Peter P. Swire Center for American Progress Ohio State University ATL Hill Briefing April 28, 2008.
Reflections on the White House Privacy Office Peter P. Swire Ohio State University Center for American Progress N.C. State Privacy Day January 29, 2008.
Lessons for Biometrics from SSNs & Identity Fraud Peter P. Swire Ohio State University National Academy of Sciences March 15, 2005.
The Need for Government-Wide Privacy Policy Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP DHS Privacy Advisory Committee.
A New Framework for Protecting Consumers on the Internet Peter P. Swire Ohio State University & Center for American Progress Center for American Progress.
Protecting Society by Protecting Information Reducing Crime by Better Information Sharing Adam Shostack
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Dr. Nimrod Kozlovski How we are becoming the A Paradigm shift in on-line policing.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Oklahoma’s Personal Financial Literacy Passport © Oklahoma State Department of Education. All rights reserved. 1 Teacher Presentation Series 9 Standard.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
“Mortgages, Privacy, and Deidentified Data” Professor Peter Swire Ohio State University Center for American Progress Consumer Financial Protection Bureau.
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Protecting the Security of Your Information Mary Beth Richards Federal Trade Commission May 7, 2008.
“Privacy Institutions in the Federal Government” Professor Peter Swire Ohio State University Center for American Progress Silicon Flatirons February 14,
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
The U.S. Approach to Consumer Protection in the Online World U.S. Presentation FTAA Joint Government Private Sector Committee on Electronic Commerce 13th.
Military Sentinel Presentation November 19, 2008 John Krebs, Attorney Consumer Sentinel Network Program Manager Federal Trade Commission.
Brian Kelly, CISSP, CISM, MSIA Information Security Officer Director of Information Security and Network Operations “Quinnipiac University Information.
Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
Cybersecurity Governance in Ethiopia
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Business Law with UCC Applications,13e Criminal Law and Cybercrimes Chapter 5 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All.
Chapter 6 International crime. In this chapter, you will study the concept of international crime. You will be introduced to the main categories of international.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
A Paradigm Shift in Policing – From Law Enforcement to CyberPolicing Nimrod Kozlovski PORTIA Project CS, Yale University April 2005.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
State and Local Government FEDERALISM. Public Policy If people do not agree on the solution to a public problem, issues arise. An issue is a point of.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
SEARCH SEARCH, The National Consortium for Justice Information and Statistics
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Welcome to Unit Nine CJ230 Identity Theft Prof. Hulvat.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Identity Theft How bad people get good credit. Lindsey Bertugli.
©2015 Experian Information Solutions, Inc. All rights reserved. Experian and the Experian marks used herein are trademarks or registered trademarks of.
Add video notes to lecture
To Know what Cyber crime is
#1 Consumer Fraud Complaint – 5th straight year!
Attribution & the globalization of criminal evidence
ALL ABOUT THE FTC By: Brandon Baldwin.
A Gift of Fire Third edition Sara Baase
Trafficking in Persons (TIP)
Protecting Yourself from Fraud including Identity Theft
Preventing Information Technology Crimes
No Cop on the Beat: Underenforcement in E-Commerce and Cybercrime
Counterfeiting and Intellectual property theft in Medicines World Bank Symposium March 10, 2005 Washington DC Frederick Razzaghi Director of Technical.
Identity Theft Samuel H. Slater.
Presentation transcript:

No Cop on the Beat: Underenforcement in E-Commerce and Cybercrime Peter P. Swire Ohio State University & Center for American Progress Fordham CLIP Information Society Symposium May 30, 2008

Coming This Monday A new report: The ID Divide: Addressing the Challenges of Identification and Authentication in American Society A new report: The ID Divide: Addressing the Challenges of Identification and Authentication in American Society Available on Monday at Available on Monday at How to handle these issues across national/homeland security; immigration; voting; e-health; computer security; privacy; civil liberties. How to handle these issues across national/homeland security; immigration; voting; e-health; computer security; privacy; civil liberties.

Todays Discussion Data breaches, but also broader issues of enforcement across geographic jurisdictions -- law review article in materials Data breaches, but also broader issues of enforcement across geographic jurisdictions -- law review article in materials E.g., consumer protection & crime online E.g., consumer protection & crime online Old paradigm of mostly local enforcement: Old paradigm of mostly local enforcement: Local enforcement, county & state – a cop on the beat Local enforcement, county & state – a cop on the beat Information is local Information is local Punishment & deterrent effects are local Punishment & deterrent effects are local Evidence is local Evidence is local

What Changes on the Internet? Information problem Information problem Commons problem Commons problem Forensic problem Forensic problem Basic answer: non-local answers needed for non-local problems Basic answer: non-local answers needed for non-local problems More federal – FTC More federal – FTC More federated – networks of state AGs More federated – networks of state AGs

The Information Problem Physical world: a cop on the beat Physical world: a cop on the beat A consumer complaint comes in A consumer complaint comes in Honest Amys Used Cars & Shady Sams Used Cars Honest Amys Used Cars & Shady Sams Used Cars Local enforcers have insight/expertise from previous complaints & use discretion Local enforcers have insight/expertise from previous complaints & use discretion

The Information Problem For online commerce or data breach, a complaint comes in to the county consumer protection office or state AG office For online commerce or data breach, a complaint comes in to the county consumer protection office or state AG office Web site typically far away Web site typically far away The county/state has a tiny fraction of all consumer problems with the site The county/state has a tiny fraction of all consumer problems with the site The county/state has weak information for exercising discretion The county/state has weak information for exercising discretion Likely result is underenforcement Likely result is underenforcement Underenforcement means less enforcement than we would expect/prefer if purely local Underenforcement means less enforcement than we would expect/prefer if purely local

The Commons Problem No commons problem where bad action and victim are local No commons problem where bad action and victim are local Enforcers get credit for stopping local bad guys Enforcers get credit for stopping local bad guys Local victims are protected Local victims are protected Deterrent effects are local Deterrent effects are local

The Commons Problem Online, enforcement incentives change Online, enforcement incentives change Why should I spend my scarce prosecutorial resources when most of the protection goes to victims outside of my jurisdiction? Why should I spend my scarce prosecutorial resources when most of the protection goes to victims outside of my jurisdiction? Deterrence – Id rather prosecute where strong deterrence locally Deterrence – Id rather prosecute where strong deterrence locally Public choice – Id rather prosecute where mostly local people are protected Public choice – Id rather prosecute where mostly local people are protected Let someone else go after them – a classic commons problem -- underenforcement Let someone else go after them – a classic commons problem -- underenforcement

Forensics Problem This problem has been recognized in the literature This problem has been recognized in the literature Its harder to enforce where the evidence is outside of the locality Its harder to enforce where the evidence is outside of the locality Harder to get cooperation from distant officials Harder to get cooperation from distant officials Harder to trace where you dont have compulsory process or other sources Harder to trace where you dont have compulsory process or other sources Result is underenforcement Result is underenforcement

Responses to Underenforcement Information problem Information problem Information sharing: Consumer Sentinel Information sharing: Consumer Sentinel Commons problem Commons problem Cross-border task forces Cross-border task forces Organize around subject matter – data breach, ID theft, spam, etc. Organize around subject matter – data breach, ID theft, spam, etc. Forensic problem Forensic problem COE Cybercrime Convention for criminal COE Cybercrime Convention for criminal US SAFE WEB Act for FTC US SAFE WEB Act for FTC

Responses to the Problem More generally, recognize the need to match solutions to the scale of the problems More generally, recognize the need to match solutions to the scale of the problems National (and international), so have national solutions National (and international), so have national solutions FTC role for data breach (Choicepoint), spam, spyware, and other consumer protectionFTC role for data breach (Choicepoint), spam, spyware, and other consumer protection FTC staffing still far below 1980 levelsFTC staffing still far below 1980 levels Federated – NAAG and other efforts to match geography with the problems Federated – NAAG and other efforts to match geography with the problems

Some Objections Law review article addresses these: Law review article addresses these: The Internet hasnt really changed anything The Internet hasnt really changed anything Enforcement works better on the Internet Enforcement works better on the Internet We dont really want to enforce the law We dont really want to enforce the law States need to be laboratories of experimentation States need to be laboratories of experimentation The Feds dont do small potatoes The Feds dont do small potatoes

Conclusion The paper highlights the information and commons problems that exist for local enforcement and non-local fraud & crime The paper highlights the information and commons problems that exist for local enforcement and non-local fraud & crime Likely need to shift to federal or federated enforcement Likely need to shift to federal or federated enforcement For whatever level of enforcement we want for each type of law, the next Administration should design strategies that address these problems For whatever level of enforcement we want for each type of law, the next Administration should design strategies that address these problems