Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.

Slides:



Advertisements
Similar presentations
Northside I.S.D. Acceptable Use Policy
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 8 Crimes Twomey Jennings Anderson’s Business Law and the Legal.
ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Lecture 14: Crime.
Chapter 8 Crimes Twomey, Business Law and the Regulatory Environment (14th Ed.)
International Theft of Trade Secret: A Case Study Presented by: Nenette Day.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Computer Forensics. Overview Computer Crime Laws Computer Crime Laws Policy and Procedure Policy and Procedure Search Warrants Search Warrants Case Law.
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
Cyber Crimes: Online Ticketing Fraud By: Erin Dobbs, Blaine Skrainka, Nick Worth, Kyle Stamper, Suzy Kiska.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Computer Crime Erik Krohn. Computer Crime Computer crime is defined well by the following: Any criminal activity involving the copy of, use of, removal.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Computer Programming I
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
The AIRCRAFT SAFETY ACT of 2000 H.R Wendell H. Ford Aviation Investment and Reform Act for the 21st Century.
Lesson 5-Legal Issues in Information Security. Overview U.S. criminal law. State laws. Laws of other countries. Issues with prosecution. Civil issues.
Chapter 9 Enhancing Information/Computer Security.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Prentice Hall © PowerPoint Slides to accompany The Legal Environment of Business and Online Commerce 4E, by Henry R. Cheeseman Chapter 7 Business.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Crimes Against Property Two subgroups: 1.Crimes in which property is destroyed 2.Crimes in which the property is stolen or taken against the will of the.
CRIMES Used by permission. For Educational purposes only.
Copyright 2000, Marchany Computer Law Threats and Issues VA Computer Crime Act Randy Marchany VA Tech Computing Center ©Marchany,2001.
Cybercrime What is it, what does it cost, & how is it regulated?
Comprehensive Volume, 18 th Edition Chapter 8: Crimes.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Its Legal, Ethical & Global Environment 6 th Ed. Its Legal, Ethical & Global Environment 6 th Ed. B U S I N E S S MARIANNE M. JENNINGS Copyright ©2003.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Chapter 10 – Crimes Against Property. Arson The willful and malicious burning of a person’s property Intentionally burning a building to defraud the insurance.
Chapter 4: Laws, Regulations, and Compliance
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
International Cooperation against CYBERCRIME IGF-UA Mykola Danyliuk Deputy Chief of Division for Combating Cybercrime Ministry of Interior of Ukraine Division.
18 USC § 1030 Computer Fraud and Abuse Act
Hacking: public policy
Chapter 10 Cyberlaw, Social Media, and Privacy
Cyber Laws in Pakistan.
Lesson # 7 A Practical Guide to Computer Forensics Investigations
Crimes against Property
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Update on the Computer Fraud and Abuse Act
Chapter 4 Law, Regulations, and Compliance
Cyber Laws in Pakistan Hassan Khalil.
Computer Programming I
Ethical Use of Computers
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Laws Against Computer Hacking
Chapter 12 Technology and Crime: It’s a Double-Edged Sword
Presentation transcript:

Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU

2 Overview Computer Crime Laws Policy and Procedure Search Warrants Case Law Intellectual Property Protection Privacy Ethics

3 Computer Crime What is Computer Crime? –Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of another, manipulation or theft of stored or on-line data, or sabotage of equipment and data. –Criminal activity can also comprise the use of computers to commit other kinds of crime: harrassment, scams, hate crimes, fomenting terrorism, etc

4 Computer Crime What is a Computer Crime? –Stealing trade secrets from a competitor –Extortion –Use of a packet sniffer to watch instant messaging conversations

5 Federal Computer Crime Laws 4 th Amendment Computer Fraud and Abuse Act of 1986 Electronic Communications Privacy Act of 1986

6 Federal Computer Crime Laws Electronic Espionage Act of 1996 Communications Decency Act 1996 Child Pornography Prevention Act Digital Millennium Copyright Act of 1998 COPPA - Children's Online Privacy Protection Act HIPAA - Health Insurance Portability And Accountability Act Access Device Fraud USA Patriot Act

7 State Computer Crime Laws Computer crime laws are state-specific

8 Case Law What is case law? –“Created” by the rulings of judges on court cases Importance of case law? –Very few laws governing current and emerging technologies –Precedents set by case law often become legislative law

Computer Fraud and Abuse Act

10 Computer Fraud and Abuse Act 15 USC § Fraudulent use of credit cards; penalties 18 USC § Fraud and related activity in connection with access devices 18 USC § Fraud and related activity in connection with computers 18 USC § Fraud by wire, radio, or television 18 USC § Prohibits malicious mischief

11 15 USC §1644 Use, attempt or conspiracy to use card in transaction affecting interstate or foreign commerce Transporting, attempting or conspiring to transport card in interstate commerce Use of interstate commerce to sell or transport card Furnishing of money, etc., through use of card

12 Crimes and Penalties Whoever in a transaction affecting interstate or foreign commerce furnishes money, property, services, (>$1,000) shall be fined not more than $10,000 or imprisoned not more than ten years, or both

13 18 USC §1029 Counterfeit access devices Telecommunications instrument modified to obtain unauthorized use of telecommunications services. Fraudulent transactions using credit cards Use of scanning receiver

14 Crimes and Penalties Forfeiture to the United States of any personal property used or intended to be used to commit the offense Fine under this title or imprisonment for not more than 20 years, or both.

15 18 USC §1030 Accesses a computer without authorization to obtain restricted data. Without authorization accesses Federal computers Conduct fraud and obtains anything of value on such computers Traffics in passwords or similar information

16 Crimes and Penalties The United States Secret Service has authority to investigate offenses Forfeiture of any personal property used or intended to be used to commit the offense Fine under this title or imprisonment for not more than 20 years, or both.

17 18 USC §1343 Fraud by means of wire, radio, or television communication in interstate or foreign commerce, Transmission of digital or analog data in such fraud

18 Crimes and Penalties Fine under this title or imprisonment not more than five years, or both. If the violation affects a financial institution, fine of $1,000,000 or imprisonment of 30 years, or both

19 18 USC § Prohibiting malicious mischief Computer hacking/website defacement

20 Actual Crimes Many cases have been prosecuted under the computer crime statute, 18 U.S.C. § 1030 (unauthorized access). A few recent sample press releases from actual cases are available via links below: Kevin Mitnick Sentenced to Nearly Four Years in Prison; Computer Hacker Ordered to Pay Restitution to Victim Companies Whose Systems Were Compromised (August 9, 1999) Source:

21 Actual Crimes Former Chief Computer Network Program Designer Arraigned for Alleged $10 Million Computer "Bomb" Juvenile Computer Hacker Cuts off FAA Tower At Regional Airport -- First Federal Charges Brought Against a Juvenile for Computer Crime Source: html html

22 Sample Cases tury_issues/21st_century_law/computer_crime_legal_01.htm tury_issues/21st_century_law/computer_crime_legal_01.htm

23 References US Department of Labor / Office of Administrative Law Judges - Supoena Form Cyberlaw: Problems of Policy and Jurisprudence in the Information Age – Patricia L. Bellia, Paul Schiff Berman, David G. Post, Thomson/West th Amendment IEEE Code of Ethics de.xml&xsl=generic.xsl de.xml&xsl=generic.xsl COPS.org Code of Ethics Court Order