SlideShare a Scribd company logo
/
Printed by: [email protected] Printing is for personal, private
use only. No part of this book
may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
/
Printed by: [email protected] Printing is for personal, private
use only. No part of this book
may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
/
Printed by: [email protected] Printing is for personal, private
use only. No part of this book
may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
/
Printed by: [email protected] Printing is for personal, private
use only. No part of this book
may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
Computer Forensics and Cyber Crime
CHAPTER
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Avenues for Prosecution and Government Efforts
7
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Learning ObjectivesHave knowledge of traditional statutes that
also apply to current problems with computer crime.Discover
recent federal government legislation on online behavior.Gain
knowledge of investigative tools used by the government to
reduce the risk of modern technology.Develop an awareness of
data mining and the programs imbedded in it.Have an idea of
the international attempt to solve the problem of computer
crime.
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
IntroductionLaw enforcement administrators have faced
traditional challenges, such as:Smaller agencies lacking
resources available, leading to greater reliance on state and
federal agencies, which results in overburdening of those
agenciesHistorically, apathy towards nonviolent crimeGlacially
slow pace of legislative action
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Traditional StatutesThe primary federal law enforcement
provisions, relating to cybercrime exist under Title 18, for
crimes such as:Fraud and Embezzlement Terrorism or
EspionageChild Seduction & ExploitationStalkingKidnapping
(The Hobbs Act)Forgery and
CounterfeitingExtortionRICOAccess Device FraudIllegal
Wiretapping
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Traditional StatutesSupplemental federal criminal law relating
to cybercrime includes:Title 15: Credit card Fraud and Software
Piracy Title 17: Copyright Infringement
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
The Evolution of Computer-Specific Statutes
Computer Fraud and Abuse Act of 1986 (CFAA)Prior version,
the Counterfeit Access Device & computer Fraud & Abuse Act
of 1986 – 18 U.S.C. §1030 (also called the Hacking Statute)
focused narrowly on unauthorized access to a
computer.Considered ineffective: Too vague, overemphasized
access to financial information and government computersOnly
one successful prosecution under original act
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
The Evolution of Computer-Specific Statutes
Computer Fraud and Abuse Act of 1986 (CFAA)Later expansion
applied the Act to computers used in commerce &
communication; applied to all financial recordsTailored it to
apply to intentional, not inadvertent, intrusions
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
The Evolution of Computer-Specific Statutes
Subsequent successful prosecutions included:Kevin Mitnick
(perhaps most famous; theft of programs valued at more than $1
million from Digital Equipment corporation & the illegal
manipulation of MCI service codes) Shadowhawk (breaking and
entering into U.S. Missile Command)Robert Morris (inventor of
the Morris Worm, and son of the former chief scientist at the
National Computer Security Center)
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
The Evolution of Computer-Specific Statutes
National Information Infrastructure Act of 1996
(NIIPA)Focused on loopholes, areas unaddressed by
CFAA:Instances of accidental intrusionOffenses committed via
computerOffenses committed with computer technologyWhen
computer data is not the primary targetAll computers not
involved in commerce but attached to the Internet
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
The Evolution of Computer-Specific StatutesExpanded to
include: Transmitting classified government
informationObtaining information from financial institutions,
private sector computers, and the U.S. governmentAffecting the
government's use of a U.S. department or agency nonpublic
computerFraud related to any of the previous activitiesHacking
& malicious programming, including any unintentional
damagesTrafficking in passwordsExtortion related to any of the
above activities
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Evolving Child Pornography StatutesEfforts at banning child
pornography have included piecemeal legislation, like the
Protection of Children against Sexual Exploitation Act (1977),
and Supreme Court rulings.
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Evolving Child Pornography StatutesNew York v. Ferber
(1982): Child pornography not protected by the First
Amendment's free speech provisionsSubsequent Congressional
action: Child Protection Act (1984) was supplanted by Child
Protection & Obscenity Act (1988); but limited to obscene
materialChild Pornography Protection Act (CPPA) (1996)
applied to virtual images of children, which would include
altered images and cartoons, but this law was struck down by
the U. S. Supreme Court in Ashcroft v. Free Speech Coalition
(2002) as overbroad, covering images that were protected free
speech, since virtual images would be made without having to
victimize children.
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Evolving Child Pornography StatutesResponse: The PROTECT
(Prosecutorial Remedies and Other Tools to End the
Exploitation of children Today) Act, which provided
for:Mandatory life penalty for repeat child sex
offendersCriminal history/background checks for volunteer
organizationsElectronic eavesdropping for cases of child abuse
or kidnapping
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Evolving Child Pornography StatutesForbidding pretrial release
for persons charged with violation of this ActEnded statutes of
limitation on child abduction, abuseAppointment of National
AMBER Alert CoordinatorNo more waiting periods in missing
persons cases for 18-21-year-oldsProhibition against computer-
generated child pornography (which seems contradicted by
Ashcroft, but has not yet been reviewed by the Court)
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Evolving Child Pornography StatutesApplication of the Miller
standard of obscenity to drawings, sculptures, and pictures
depicting minors in obscene situations or engaged in sexual
activitySentencing enhancement for possession and distribution
of child pornographyAuthorization of fines and imprisonment of
up to 30 years for U.S. citizens or residents engaging in illicit
sexual conduct abroad
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Identity Theft and Financial Privacy Statutes
Identity Theft and Assumption Deterrence Act of 1998
(ITADA)Now a crime to possess another’s personal (public or
nonpublic) identifying informationAlso, now unlawful to
"Knowingly transfer or use, without lawful authority, a means
of identification of another person with the intent to commit, or
to aid or abet, any unlawful activity that constitutes a violation
of Federal law, or that constitutes a felony under any applicable
State or local law"
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Identity Theft and Financial Privacy Statutes
Identity Theft and Assumption Deterrence Act of 1998
(ITADA)Identifying information includes:NameSocial Security
numberDate of birthOfficial state or government issued driver’s
license or identification numberAlien registration
numberPassport numberEmployer or taxpayer identification
number
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Identity Theft and Financial Privacy StatutesUnique biometric
data, such as fingerprint, voice print, retina or iris image, or
other unique physical representationUnique electronic
identification number, address, or routing
codeTelecommunication identifying information or access
deviceAlso provided for restitution, attorney's fees, lost time
from work, and denial of creditDesignated the Federal Trade
Commission (FTC) as the repository for consumer complaints
and agents of dissemination
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Identity Theft and Financial Privacy Statutes
The Financial Modernization Act of 1999Contains the Financial
Privacy Rule, which states that financial institutions must
disclose privacy practices and provide for "opt-out" of
disclosure of some personal informationContains the Safeguards
Rule, which states that those businesses have to devise security
ban to protect such informationAddresses pretexting, regarding
financial information used to obtain personal information under
false pretenses
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Identity Theft and Financial Privacy Statutes
Fair and Accurate Credit Transactions Act of 2003
(FACTA)Major provisions include:Free credit reportFraud and
active duty alertsTruncation of credit/debit account numbers (to
address dumpster-diving)Truncation of Social Security
numbersOne-call fraud alerts and enhanced victims' resolution
process
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Identity Theft and Financial Privacy StatutesMandate card
issuers to investigate change of address requests and requests
for new, additional cardsBlocking or elimination of fraudulent
informationFraud alert requirements for consumer reporting
agenciesRequirement of consumer reporting agencies to divulge
consumer credit scoresLimits the comingling of medical and
financial information
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Identity Theft and Financial Privacy StatutesDebt collectors
now obliged to tell third-party employers that debt may be
result of identity theft, provide info on how to resolve disputes,
and provide all info about debt; also, cannot put debt, result of
identity theft, into collectionCivil action available when
violations occur
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Identity Theft and Financial Privacy Statutes
Identity Theft Penalty Enhancement Act of 2004Criminal
penalties for aggravated identity theft, including mandatory
sentences
Identity Theft Enforcement and Restitution Act of
2008Expanded consequences for identity theft
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Identity Theft and Financial Privacy Statutes
Additional Efforts to Protect Personal InformationDrivers
Privacy Protection Act: Prohibits use of Social Security
numbers and other personal information from a motor vehicle
record in any situation not expressly permitted by lawHealth
Insurance Portability & Accountability Act: Restricts health
care organizations from disclosing Social Security numbers and
health information
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Federally Funded Initiatives and Collaborations
The President’s Working Group on Unlawful Conduct on the
Internet brought together the business community, government
entities, and civil liberty/nonprofit advocacy organizations to
evaluate:Sufficiency of existing federal lawsWhether new
technologies legal authorities needed to investigate and/or
prosecute Internet crimeWhether education and “empowerment
tools” can minimize the risks associated with this behavior
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Federally Funded Initiatives and Collaborations
Resulting approaches:Regulation of Internet criminal activity,
in same way as with traditional criminal lawRecognition of
array of special needs, challenges to investigate, prosecute via
tool development, enhanced training and interagency (and
international) cooperationDevelopment of curricula re
cyberethics, other support for private sector leaders to use
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Federally Funded Initiatives and CollaborationsPresidential
Decision Directive 63 (PDD 63) (1998) led to creation of
National Infrastructure Protection Center's (NIPC) Infragard,
intended to bring local leaders, corporate executives, and law
enforcement together to discuss potential threats.
The Innocent Images initiative was designed investigate adults'
interstate travel to meet minors for illicit purposes.
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Law Enforcement Operations and Tools in the United States
Packet Sniffers and Key LoggersDragonware software suite
(made up of Carnivore, Packeteer, Coolminer) intended to
reconstruct the Web-surfing trail of someone under
investigation.This was packet-sniffing software, where
communication on the Internet broken down into packets,
transmitted, then reassembled at the destination.
CyberKnight project used the Magic Lantern key logger to
record keystrokes and mouse clicks for unscrambling encrypted
files
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Law Enforcement Operations and Tools in the United States
Data Mining Uses statistical models, algorithms, and/or
artificial intelligence to analyze large data sets, with analysis
parameters looking at:Association of connected eventsSequence
of path analysis, of eventsClassification of new patterns
Clustering of groups of previously unknown factsForecasting
future activities
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Law Enforcement Operations and Tools in the United
StatesExamples of data mining used to identify potential
terrorists:Terrorism information Awareness Program (TIA) and
Secure FlightComputer-Assisted Passenger Prescreening System
(CAPPS II)Multi-State Anti-Terrorism Information Exchange
Pilot Project (MATRIX)Automated Targeting System
(ATS)Terrorist Surveillance Program
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Law Enforcement Operations and Tools in the United States
Collaborations and Professional AssociationsCreation of
federal, state, or local interagency task forcesCyberScience
Laboratory: Collaboration between New York Electronic Crimes
Task Force and National Institute of Justice's Office of Science
and Technology, for sharing forensic knowledgeHigh Tech
Computer Investigators Association (HTCIA): Nonprofit
organization that involves training and information
dissemination
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
International EffortsOECD and the Select Committee of Experts
on Computer-Related Crime of the Council of EuropeThe first
comprehensive effort (1983-1985) to harmonize criminal law to
deal with computer-related economic crimeGenerated two lists
of suggestions:
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
International EffortsRecommended behaviors that needed to be
made illegal: The alteration of computer data or computer
programsThe practice of computer espionageThe unauthorized
use of a computerThe unauthorized use of a protected computer
program
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
International EffortsMandatory offenses for all countries to
have:Computer fraudComputer forgeryDamage to computer data
or computer programsComputer sabotageUnauthorized
accessUnauthorized interceptionUnauthorized reproduction of a
protected computer programUnauthorized reproduction of a
topography (which relates to semiconductor design)
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
International Efforts
Council of Europe’s (CoE) Cybercrime Conventions (1996)
created four categories of computer-related criminal offenses:
Financial Action Task Force, created at G-7 Summit (1989),
from concern how money laundering used to support terrorist
financingRecommendations focused on law enforcement
systems and prosecution of offenses, regulations and financial
systems, and international cooperation.
Interpol & emphasis of aiding law enforcement agencies
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
International EffortsVirtual Global Task Force (VGT) (2003), a
collaboration of the Australian High Tech Centre, the UK’s
Child Exploitation and Online Protection Centre, the RCMP, the
U.S. Department of Homeland Security, and Interpol
Aim to deliver low-cost, high-impact initiatives that deter
pedophiles and prevent the online exploitation of children
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
International EffortsUnited Nations’ Convention against
Transnational Organized Crime (UNCATOC) (2000).
Association of Southeast Asian Nations' (ASEAN) shared
interest in training, criminal legislation and international
collaboration
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
ConclusionsRecognition of problems has increased
exponentially, with still much work needed
Continue to use traditional statutes, pending enactment of
technology specific legislation, due to encouragement of
policymakers and administrators
While international cooperation has increased, competitive
issues about sovereignty hinders the continuing efforts
Computer Forensics and Cyber Crime
CHAPTER
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Avenues for Prosecution and Government Efforts
7
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Learning ObjectivesHave knowledge of traditional statutes that
also apply to current problems with computer crime.Discover
recent federal government legislation on online behavior.Gain
knowledge of investigative tools used by the government to
reduce the risk of modern technology.Develop an awareness of
data mining and the programs imbedded in it.Have an idea of
the international attempt to solve the problem of computer
crime.
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
IntroductionLaw enforcement administrators have faced
traditional challenges, such as:Smaller agencies lacking
resources available, leading to greater reliance on state and
federal agencies, which results in overburdening of those
agenciesHistorically, apathy towards nonviolent crimeGlacially
slow pace of legislative action
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Traditional StatutesThe primary federal law enforcement
provisions, relating to cybercrime exist under Title 18, for
crimes such as:Fraud and Embezzlement Terrorism or
EspionageChild Seduction & ExploitationStalkingKidnapping
(The Hobbs Act)Forgery and
CounterfeitingExtortionRICOAccess Device FraudIllegal
Wiretapping
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Traditional StatutesSupplemental federal criminal law relating
to cybercrime includes:Title 15: Credit card Fraud and Software
Piracy Title 17: Copyright Infringement
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
The Evolution of Computer-Specific Statutes
Computer Fraud and Abuse Act of 1986 (CFAA)Prior version,
the Counterfeit Access Device & computer Fraud & Abuse Act
of 1986 – 18 U.S.C. §1030 (also called the Hacking Statute)
focused narrowly on unauthorized access to a
computer.Considered ineffective: Too vague, overemphasized
access to financial information and government computersOnly
one successful prosecution under original act
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
The Evolution of Computer-Specific Statutes
Computer Fraud and Abuse Act of 1986 (CFAA)Later expansion
applied the Act to computers used in commerce &
communication; applied to all financial recordsTailored it to
apply to intentional, not inadvertent, intrusions
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
The Evolution of Computer-Specific Statutes
Subsequent successful prosecutions included:Kevin Mitnick
(perhaps most famous; theft of programs valued at more than $1
million from Digital Equipment corporation & the illegal
manipulation of MCI service codes) Shadowhawk (breaking and
entering into U.S. Missile Command)Robert Morris (inventor of
the Morris Worm, and son of the former chief scientist at the
National Computer Security Center)
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
The Evolution of Computer-Specific Statutes
National Information Infrastructure Act of 1996
(NIIPA)Focused on loopholes, areas unaddressed by
CFAA:Instances of accidental intrusionOffenses committed via
computerOffenses committed with computer technologyWhen
computer data is not the primary targetAll computers not
involved in commerce but attached to the Internet
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
The Evolution of Computer-Specific StatutesExpanded to
include: Transmitting classified government
informationObtaining information from financial institutions,
private sector computers, and the U.S. governmentAffecting the
government's use of a U.S. department or agency nonpublic
computerFraud related to any of the previous activitiesHacking
& malicious programming, including any unintentional
damagesTrafficking in passwordsExtortion related to any of the
above activities
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Evolving Child Pornography StatutesEfforts at banning child
pornography have included piecemeal legislation, like the
Protection of Children against Sexual Exploitation Act (1977),
and Supreme Court rulings.
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Evolving Child Pornography StatutesNew York v. Ferber
(1982): Child pornography not protected by the First
Amendment's free speech provisionsSubsequent Congressional
action: Child Protection Act (1984) was supplanted by Child
Protection & Obscenity Act (1988); but limited to obscene
materialChild Pornography Protection Act (CPPA) (1996)
applied to virtual images of children, which would include
altered images and cartoons, but this law was struck down by
the U. S. Supreme Court in Ashcroft v. Free Speech Coalition
(2002) as overbroad, covering images that were protected free
speech, since virtual images would be made without having to
victimize children.
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Evolving Child Pornography StatutesResponse: The PROTECT
(Prosecutorial Remedies and Other Tools to End the
Exploitation of children Today) Act, which provided
for:Mandatory life penalty for repeat child sex
offendersCriminal history/background checks for volunteer
organizationsElectronic eavesdropping for cases of child abuse
or kidnapping
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Evolving Child Pornography StatutesForbidding pretrial release
for persons charged with violation of this ActEnded statutes of
limitation on child abduction, abuseAppointment of National
AMBER Alert CoordinatorNo more waiting periods in missing
persons cases for 18-21-year-oldsProhibition against computer-
generated child pornography (which seems contradicted by
Ashcroft, but has not yet been reviewed by the Court)
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Evolving Child Pornography StatutesApplication of the Miller
standard of obscenity to drawings, sculptures, and pictures
depicting minors in obscene situations or engaged in sexual
activitySentencing enhancement for possession and distribution
of child pornographyAuthorization of fines and imprisonment of
up to 30 years for U.S. citizens or residents engaging in illicit
sexual conduct abroad
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Identity Theft and Financial Privacy Statutes
Identity Theft and Assumption Deterrence Act of 1998
(ITADA)Now a crime to possess another’s personal (public or
nonpublic) identifying informationAlso, now unlawful to
"Knowingly transfer or use, without lawful authority, a means
of identification of another person with the intent to commit, or
to aid or abet, any unlawful activity that constitutes a violation
of Federal law, or that constitutes a felony under any applicable
State or local law"
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Identity Theft and Financial Privacy Statutes
Identity Theft and Assumption Deterrence Act of 1998
(ITADA)Identifying information includes:NameSocial Security
numberDate of birthOfficial state or government issued driver’s
license or identification numberAlien registration
numberPassport numberEmployer or taxpayer identification
number
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Identity Theft and Financial Privacy StatutesUnique biometric
data, such as fingerprint, voice print, retina or iris image, or
other unique physical representationUnique electronic
identification number, address, or routing
codeTelecommunication identifying information or access
deviceAlso provided for restitution, attorney's fees, lost time
from work, and denial of creditDesignated the Federal Trade
Commission (FTC) as the repository for consumer complaints
and agents of dissemination
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Identity Theft and Financial Privacy Statutes
The Financial Modernization Act of 1999Contains the Financial
Privacy Rule, which states that financial institutions must
disclose privacy practices and provide for "opt-out" of
disclosure of some personal informationContains the Safeguards
Rule, which states that those businesses have to devise security
ban to protect such informationAddresses pretexting, regarding
financial information used to obtain personal information under
false pretenses
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Identity Theft and Financial Privacy Statutes
Fair and Accurate Credit Transactions Act of 2003
(FACTA)Major provisions include:Free credit reportFraud and
active duty alertsTruncation of credit/debit account numbers (to
address dumpster-diving)Truncation of Social Security
numbersOne-call fraud alerts and enhanced victims' resolution
process
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Identity Theft and Financial Privacy StatutesMandate card
issuers to investigate change of address requests and requests
for new, additional cardsBlocking or elimination of fraudulent
informationFraud alert requirements for consumer reporting
agenciesRequirement of consumer reporting agencies to divulge
consumer credit scoresLimits the comingling of medical and
financial information
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Identity Theft and Financial Privacy StatutesDebt collectors
now obliged to tell third-party employers that debt may be
result of identity theft, provide info on how to resolve disputes,
and provide all info about debt; also, cannot put debt, result of
identity theft, into collectionCivil action available when
violations occur
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Identity Theft and Financial Privacy Statutes
Identity Theft Penalty Enhancement Act of 2004Criminal
penalties for aggravated identity theft, including mandatory
sentences
Identity Theft Enforcement and Restitution Act of
2008Expanded consequences for identity theft
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Identity Theft and Financial Privacy Statutes
Additional Efforts to Protect Personal InformationDrivers
Privacy Protection Act: Prohibits use of Social Security
numbers and other personal information from a motor vehicle
record in any situation not expressly permitted by lawHealth
Insurance Portability & Accountability Act: Restricts health
care organizations from disclosing Social Security numbers and
health information
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Federally Funded Initiatives and Collaborations
The President’s Working Group on Unlawful Conduct on the
Internet brought together the business community, government
entities, and civil liberty/nonprofit advocacy organizations to
evaluate:Sufficiency of existing federal lawsWhether new
technologies legal authorities needed to investigate and/or
prosecute Internet crimeWhether education and “empowerment
tools” can minimize the risks associated with this behavior
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Federally Funded Initiatives and Collaborations
Resulting approaches:Regulation of Internet criminal activity,
in same way as with traditional criminal lawRecognition of
array of special needs, challenges to investigate, prosecute via
tool development, enhanced training and interagency (and
international) cooperationDevelopment of curricula re
cyberethics, other support for private sector leaders to use
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Federally Funded Initiatives and CollaborationsPresidential
Decision Directive 63 (PDD 63) (1998) led to creation of
National Infrastructure Protection Center's (NIPC) Infragard,
intended to bring local leaders, corporate executives, and law
enforcement together to discuss potential threats.
The Innocent Images initiative was designed investigate adults'
interstate travel to meet minors for illicit purposes.
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Law Enforcement Operations and Tools in the United States
Packet Sniffers and Key LoggersDragonware software suite
(made up of Carnivore, Packeteer, Coolminer) intended to
reconstruct the Web-surfing trail of someone under
investigation.This was packet-sniffing software, where
communication on the Internet broken down into packets,
transmitted, then reassembled at the destination.
CyberKnight project used the Magic Lantern key logger to
record keystrokes and mouse clicks for unscrambling encrypted
files
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Law Enforcement Operations and Tools in the United States
Data Mining Uses statistical models, algorithms, and/or
artificial intelligence to analyze large data sets, with analysis
parameters looking at:Association of connected eventsSequence
of path analysis, of eventsClassification of new patterns
Clustering of groups of previously unknown factsForecasting
future activities
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Law Enforcement Operations and Tools in the United
StatesExamples of data mining used to identify potential
terrorists:Terrorism information Awareness Program (TIA) and
Secure FlightComputer-Assisted Passenger Prescreening System
(CAPPS II)Multi-State Anti-Terrorism Information Exchange
Pilot Project (MATRIX)Automated Targeting System
(ATS)Terrorist Surveillance Program
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Law Enforcement Operations and Tools in the United States
Collaborations and Professional AssociationsCreation of
federal, state, or local interagency task forcesCyberScience
Laboratory: Collaboration between New York Electronic Crimes
Task Force and National Institute of Justice's Office of Science
and Technology, for sharing forensic knowledgeHigh Tech
Computer Investigators Association (HTCIA): Nonprofit
organization that involves training and information
dissemination
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
International EffortsOECD and the Select Committee of Experts
on Computer-Related Crime of the Council of EuropeThe first
comprehensive effort (1983-1985) to harmonize criminal law to
deal with computer-related economic crimeGenerated two lists
of suggestions:
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
International EffortsRecommended behaviors that needed to be
made illegal: The alteration of computer data or computer
programsThe practice of computer espionageThe unauthorized
use of a computerThe unauthorized use of a protected computer
program
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
International EffortsMandatory offenses for all countries to
have:Computer fraudComputer forgeryDamage to computer data
or computer programsComputer sabotageUnauthorized
accessUnauthorized interceptionUnauthorized reproduction of a
protected computer programUnauthorized reproduction of a
topography (which relates to semiconductor design)
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
International Efforts
Council of Europe’s (CoE) Cybercrime Conventions (1996)
created four categories of computer-related criminal offenses:
Financial Action Task Force, created at G-7 Summit (1989),
from concern how money laundering used to support terrorist
financingRecommendations focused on law enforcement
systems and prosecution of offenses, regulations and financial
systems, and international cooperation.
Interpol & emphasis of aiding law enforcement agencies
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
International EffortsVirtual Global Task Force (VGT) (2003), a
collaboration of the Australian High Tech Centre, the UK’s
Child Exploitation and Online Protection Centre, the RCMP, the
U.S. Department of Homeland Security, and Interpol
Aim to deliver low-cost, high-impact initiatives that deter
pedophiles and prevent the online exploitation of children
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
International EffortsUnited Nations’ Convention against
Transnational Organized Crime (UNCATOC) (2000).
Association of Southeast Asian Nations' (ASEAN) shared
interest in training, criminal legislation and international
collaboration
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
ConclusionsRecognition of problems has increased
exponentially, with still much work needed
Continue to use traditional statutes, pending enactment of
technology specific legislation, due to encouragement of
policymakers and administrators
While international cooperation has increased, competitive
issues about sovereignty hinders the continuing efforts

More Related Content

Similar to Printed by [email protected] Printing is for personal, p.docx

Computer crimes
Computer crimesComputer crimes
Computer crimes
essay-writing-help.us
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
Soreingam Ragui
 
It legislation
It legislationIt legislation
It legislation
doogstone
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Paul Senthil
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
Sec Wars Episode 3
Sec Wars Episode 3Sec Wars Episode 3
Sec Wars Episode 3
Ikuo Takahashi
 
Cyber law media law & ethic
Cyber law media law & ethicCyber law media law & ethic
Cyber law media law & ethic
Syed Ali Hassan
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Volonino ppt 01
Volonino ppt 01Volonino ppt 01
Volonino ppt 01
lbadeniji
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
tamiuthomas
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
tamiuthomas
 
Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003
Peter Timusk
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Mukul Kumar
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
Farjana Akter
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Cybercrime
CybercrimeCybercrime
Cybercrime
promit
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
DrSamsonChepuri1
 

Similar to Printed by [email protected] Printing is for personal, p.docx (17)

Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
It legislation
It legislationIt legislation
It legislation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Sec Wars Episode 3
Sec Wars Episode 3Sec Wars Episode 3
Sec Wars Episode 3
 
Cyber law media law & ethic
Cyber law media law & ethicCyber law media law & ethic
Cyber law media law & ethic
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
Volonino ppt 01
Volonino ppt 01Volonino ppt 01
Volonino ppt 01
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
 

More from anitramcroberts

Propose recommendations to create an age diverse workforce.W.docx
Propose recommendations to create an age diverse workforce.W.docxPropose recommendations to create an age diverse workforce.W.docx
Propose recommendations to create an age diverse workforce.W.docx
anitramcroberts
 
Prosecuting Cybercrime  The Jurisdictional ProblemIn this discuss.docx
Prosecuting Cybercrime  The Jurisdictional ProblemIn this discuss.docxProsecuting Cybercrime  The Jurisdictional ProblemIn this discuss.docx
Prosecuting Cybercrime  The Jurisdictional ProblemIn this discuss.docx
anitramcroberts
 
PromptTopic Joseph is scheduled to have hip replacement surgery .docx
PromptTopic Joseph is scheduled to have hip replacement surgery .docxPromptTopic Joseph is scheduled to have hip replacement surgery .docx
PromptTopic Joseph is scheduled to have hip replacement surgery .docx
anitramcroberts
 
Property TaxThe property tax has been criticized as an unfair ba.docx
Property TaxThe property tax has been criticized as an unfair ba.docxProperty TaxThe property tax has been criticized as an unfair ba.docx
Property TaxThe property tax has been criticized as an unfair ba.docx
anitramcroberts
 
Prosecutors and VictimsWrite a 2 page paper.  Address the follow.docx
Prosecutors and VictimsWrite a 2 page paper.  Address the follow.docxProsecutors and VictimsWrite a 2 page paper.  Address the follow.docx
Prosecutors and VictimsWrite a 2 page paper.  Address the follow.docx
anitramcroberts
 
Prompt Discuss the recent public policy decisions made in Texas wit.docx
Prompt Discuss the recent public policy decisions made in Texas wit.docxPrompt Discuss the recent public policy decisions made in Texas wit.docx
Prompt Discuss the recent public policy decisions made in Texas wit.docx
anitramcroberts
 
Properties of LifeChapter 1 of the text highlights the nine proper.docx
Properties of LifeChapter 1 of the text highlights the nine proper.docxProperties of LifeChapter 1 of the text highlights the nine proper.docx
Properties of LifeChapter 1 of the text highlights the nine proper.docx
anitramcroberts
 
Proofread and complete your manual that includes the following ite.docx
Proofread and complete your manual that includes the following ite.docxProofread and complete your manual that includes the following ite.docx
Proofread and complete your manual that includes the following ite.docx
anitramcroberts
 
Proof Reading and adding 5 pages to chapter 2The pre-thesis .docx
Proof Reading and adding 5 pages to chapter 2The pre-thesis .docxProof Reading and adding 5 pages to chapter 2The pre-thesis .docx
Proof Reading and adding 5 pages to chapter 2The pre-thesis .docx
anitramcroberts
 
prompt:Leadership Culture - Describe the leadership culture in ope.docx
prompt:Leadership Culture - Describe the leadership culture in ope.docxprompt:Leadership Culture - Describe the leadership culture in ope.docx
prompt:Leadership Culture - Describe the leadership culture in ope.docx
anitramcroberts
 
Prompt  These two poems are companion pieces from a collection by.docx
Prompt  These two poems are companion pieces from a collection by.docxPrompt  These two poems are companion pieces from a collection by.docx
Prompt  These two poems are companion pieces from a collection by.docx
anitramcroberts
 
PromptTopic Robert was quite active when he first started colleg.docx
PromptTopic Robert was quite active when he first started colleg.docxPromptTopic Robert was quite active when he first started colleg.docx
PromptTopic Robert was quite active when he first started colleg.docx
anitramcroberts
 
PromptTopic Outline the flow of blood through the heart.  Explai.docx
PromptTopic Outline the flow of blood through the heart.  Explai.docxPromptTopic Outline the flow of blood through the heart.  Explai.docx
PromptTopic Outline the flow of blood through the heart.  Explai.docx
anitramcroberts
 
PromptTopic Deborah has 2 preschool-age children and one school-.docx
PromptTopic Deborah has 2 preschool-age children and one school-.docxPromptTopic Deborah has 2 preschool-age children and one school-.docx
PromptTopic Deborah has 2 preschool-age children and one school-.docx
anitramcroberts
 
PROMPTAnalyze from Amreeka the scene you found most powerfu.docx
PROMPTAnalyze from Amreeka the scene you found most powerfu.docxPROMPTAnalyze from Amreeka the scene you found most powerfu.docx
PROMPTAnalyze from Amreeka the scene you found most powerfu.docx
anitramcroberts
 
Prompt What makes a poem good or bad  Use Chapter 17 to identi.docx
Prompt What makes a poem good or bad  Use Chapter 17 to identi.docxPrompt What makes a poem good or bad  Use Chapter 17 to identi.docx
Prompt What makes a poem good or bad  Use Chapter 17 to identi.docx
anitramcroberts
 
PromptTopic Anton grew up in France and has come to America for .docx
PromptTopic Anton grew up in France and has come to America for .docxPromptTopic Anton grew up in France and has come to America for .docx
PromptTopic Anton grew up in France and has come to America for .docx
anitramcroberts
 
Prompt #1 Examples of Inductive InferencePrepare To prepare to.docx
Prompt #1 Examples of Inductive InferencePrepare To prepare to.docxPrompt #1 Examples of Inductive InferencePrepare To prepare to.docx
Prompt #1 Examples of Inductive InferencePrepare To prepare to.docx
anitramcroberts
 
Project This project requires you to identify and analyze le.docx
Project This project requires you to identify and analyze le.docxProject This project requires you to identify and analyze le.docx
Project This project requires you to identify and analyze le.docx
anitramcroberts
 
ProjectUsing the information you learned from your assessments and.docx
ProjectUsing the information you learned from your assessments and.docxProjectUsing the information you learned from your assessments and.docx
ProjectUsing the information you learned from your assessments and.docx
anitramcroberts
 

More from anitramcroberts (20)

Propose recommendations to create an age diverse workforce.W.docx
Propose recommendations to create an age diverse workforce.W.docxPropose recommendations to create an age diverse workforce.W.docx
Propose recommendations to create an age diverse workforce.W.docx
 
Prosecuting Cybercrime  The Jurisdictional ProblemIn this discuss.docx
Prosecuting Cybercrime  The Jurisdictional ProblemIn this discuss.docxProsecuting Cybercrime  The Jurisdictional ProblemIn this discuss.docx
Prosecuting Cybercrime  The Jurisdictional ProblemIn this discuss.docx
 
PromptTopic Joseph is scheduled to have hip replacement surgery .docx
PromptTopic Joseph is scheduled to have hip replacement surgery .docxPromptTopic Joseph is scheduled to have hip replacement surgery .docx
PromptTopic Joseph is scheduled to have hip replacement surgery .docx
 
Property TaxThe property tax has been criticized as an unfair ba.docx
Property TaxThe property tax has been criticized as an unfair ba.docxProperty TaxThe property tax has been criticized as an unfair ba.docx
Property TaxThe property tax has been criticized as an unfair ba.docx
 
Prosecutors and VictimsWrite a 2 page paper.  Address the follow.docx
Prosecutors and VictimsWrite a 2 page paper.  Address the follow.docxProsecutors and VictimsWrite a 2 page paper.  Address the follow.docx
Prosecutors and VictimsWrite a 2 page paper.  Address the follow.docx
 
Prompt Discuss the recent public policy decisions made in Texas wit.docx
Prompt Discuss the recent public policy decisions made in Texas wit.docxPrompt Discuss the recent public policy decisions made in Texas wit.docx
Prompt Discuss the recent public policy decisions made in Texas wit.docx
 
Properties of LifeChapter 1 of the text highlights the nine proper.docx
Properties of LifeChapter 1 of the text highlights the nine proper.docxProperties of LifeChapter 1 of the text highlights the nine proper.docx
Properties of LifeChapter 1 of the text highlights the nine proper.docx
 
Proofread and complete your manual that includes the following ite.docx
Proofread and complete your manual that includes the following ite.docxProofread and complete your manual that includes the following ite.docx
Proofread and complete your manual that includes the following ite.docx
 
Proof Reading and adding 5 pages to chapter 2The pre-thesis .docx
Proof Reading and adding 5 pages to chapter 2The pre-thesis .docxProof Reading and adding 5 pages to chapter 2The pre-thesis .docx
Proof Reading and adding 5 pages to chapter 2The pre-thesis .docx
 
prompt:Leadership Culture - Describe the leadership culture in ope.docx
prompt:Leadership Culture - Describe the leadership culture in ope.docxprompt:Leadership Culture - Describe the leadership culture in ope.docx
prompt:Leadership Culture - Describe the leadership culture in ope.docx
 
Prompt  These two poems are companion pieces from a collection by.docx
Prompt  These two poems are companion pieces from a collection by.docxPrompt  These two poems are companion pieces from a collection by.docx
Prompt  These two poems are companion pieces from a collection by.docx
 
PromptTopic Robert was quite active when he first started colleg.docx
PromptTopic Robert was quite active when he first started colleg.docxPromptTopic Robert was quite active when he first started colleg.docx
PromptTopic Robert was quite active when he first started colleg.docx
 
PromptTopic Outline the flow of blood through the heart.  Explai.docx
PromptTopic Outline the flow of blood through the heart.  Explai.docxPromptTopic Outline the flow of blood through the heart.  Explai.docx
PromptTopic Outline the flow of blood through the heart.  Explai.docx
 
PromptTopic Deborah has 2 preschool-age children and one school-.docx
PromptTopic Deborah has 2 preschool-age children and one school-.docxPromptTopic Deborah has 2 preschool-age children and one school-.docx
PromptTopic Deborah has 2 preschool-age children and one school-.docx
 
PROMPTAnalyze from Amreeka the scene you found most powerfu.docx
PROMPTAnalyze from Amreeka the scene you found most powerfu.docxPROMPTAnalyze from Amreeka the scene you found most powerfu.docx
PROMPTAnalyze from Amreeka the scene you found most powerfu.docx
 
Prompt What makes a poem good or bad  Use Chapter 17 to identi.docx
Prompt What makes a poem good or bad  Use Chapter 17 to identi.docxPrompt What makes a poem good or bad  Use Chapter 17 to identi.docx
Prompt What makes a poem good or bad  Use Chapter 17 to identi.docx
 
PromptTopic Anton grew up in France and has come to America for .docx
PromptTopic Anton grew up in France and has come to America for .docxPromptTopic Anton grew up in France and has come to America for .docx
PromptTopic Anton grew up in France and has come to America for .docx
 
Prompt #1 Examples of Inductive InferencePrepare To prepare to.docx
Prompt #1 Examples of Inductive InferencePrepare To prepare to.docxPrompt #1 Examples of Inductive InferencePrepare To prepare to.docx
Prompt #1 Examples of Inductive InferencePrepare To prepare to.docx
 
Project This project requires you to identify and analyze le.docx
Project This project requires you to identify and analyze le.docxProject This project requires you to identify and analyze le.docx
Project This project requires you to identify and analyze le.docx
 
ProjectUsing the information you learned from your assessments and.docx
ProjectUsing the information you learned from your assessments and.docxProjectUsing the information you learned from your assessments and.docx
ProjectUsing the information you learned from your assessments and.docx
 

Recently uploaded

IGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdfIGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
Amin Marwan
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
Chevonnese Chevers Whyte, MBA, B.Sc.
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 

Recently uploaded (20)

IGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdfIGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 

Printed by [email protected] Printing is for personal, p.docx

  • 1. / Printed by: [email protected] Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. / Printed by: [email protected] Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. / Printed by: [email protected] Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. / Printed by: [email protected] Printing is for personal, private use only. No part of this book
  • 2. may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. Computer Forensics and Cyber Crime CHAPTER Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Avenues for Prosecution and Government Efforts 7 Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Learning ObjectivesHave knowledge of traditional statutes that also apply to current problems with computer crime.Discover recent federal government legislation on online behavior.Gain knowledge of investigative tools used by the government to reduce the risk of modern technology.Develop an awareness of data mining and the programs imbedded in it.Have an idea of the international attempt to solve the problem of computer crime. Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc.
  • 3. All Rights Reserved IntroductionLaw enforcement administrators have faced traditional challenges, such as:Smaller agencies lacking resources available, leading to greater reliance on state and federal agencies, which results in overburdening of those agenciesHistorically, apathy towards nonviolent crimeGlacially slow pace of legislative action Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Traditional StatutesThe primary federal law enforcement provisions, relating to cybercrime exist under Title 18, for crimes such as:Fraud and Embezzlement Terrorism or EspionageChild Seduction & ExploitationStalkingKidnapping (The Hobbs Act)Forgery and CounterfeitingExtortionRICOAccess Device FraudIllegal Wiretapping Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Traditional StatutesSupplemental federal criminal law relating to cybercrime includes:Title 15: Credit card Fraud and Software Piracy Title 17: Copyright Infringement Computer Forensics and Cyber Crime, 3rd ed.
  • 4. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved The Evolution of Computer-Specific Statutes Computer Fraud and Abuse Act of 1986 (CFAA)Prior version, the Counterfeit Access Device & computer Fraud & Abuse Act of 1986 – 18 U.S.C. §1030 (also called the Hacking Statute) focused narrowly on unauthorized access to a computer.Considered ineffective: Too vague, overemphasized access to financial information and government computersOnly one successful prosecution under original act Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved The Evolution of Computer-Specific Statutes Computer Fraud and Abuse Act of 1986 (CFAA)Later expansion applied the Act to computers used in commerce & communication; applied to all financial recordsTailored it to apply to intentional, not inadvertent, intrusions Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved The Evolution of Computer-Specific Statutes Subsequent successful prosecutions included:Kevin Mitnick (perhaps most famous; theft of programs valued at more than $1 million from Digital Equipment corporation & the illegal manipulation of MCI service codes) Shadowhawk (breaking and
  • 5. entering into U.S. Missile Command)Robert Morris (inventor of the Morris Worm, and son of the former chief scientist at the National Computer Security Center) Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved The Evolution of Computer-Specific Statutes National Information Infrastructure Act of 1996 (NIIPA)Focused on loopholes, areas unaddressed by CFAA:Instances of accidental intrusionOffenses committed via computerOffenses committed with computer technologyWhen computer data is not the primary targetAll computers not involved in commerce but attached to the Internet Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved The Evolution of Computer-Specific StatutesExpanded to include: Transmitting classified government informationObtaining information from financial institutions, private sector computers, and the U.S. governmentAffecting the government's use of a U.S. department or agency nonpublic computerFraud related to any of the previous activitiesHacking & malicious programming, including any unintentional damagesTrafficking in passwordsExtortion related to any of the above activities Computer Forensics and Cyber Crime, 3rd ed.
  • 6. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Evolving Child Pornography StatutesEfforts at banning child pornography have included piecemeal legislation, like the Protection of Children against Sexual Exploitation Act (1977), and Supreme Court rulings. Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Evolving Child Pornography StatutesNew York v. Ferber (1982): Child pornography not protected by the First Amendment's free speech provisionsSubsequent Congressional action: Child Protection Act (1984) was supplanted by Child Protection & Obscenity Act (1988); but limited to obscene materialChild Pornography Protection Act (CPPA) (1996) applied to virtual images of children, which would include altered images and cartoons, but this law was struck down by the U. S. Supreme Court in Ashcroft v. Free Speech Coalition (2002) as overbroad, covering images that were protected free speech, since virtual images would be made without having to victimize children. Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Evolving Child Pornography StatutesResponse: The PROTECT (Prosecutorial Remedies and Other Tools to End the
  • 7. Exploitation of children Today) Act, which provided for:Mandatory life penalty for repeat child sex offendersCriminal history/background checks for volunteer organizationsElectronic eavesdropping for cases of child abuse or kidnapping Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Evolving Child Pornography StatutesForbidding pretrial release for persons charged with violation of this ActEnded statutes of limitation on child abduction, abuseAppointment of National AMBER Alert CoordinatorNo more waiting periods in missing persons cases for 18-21-year-oldsProhibition against computer- generated child pornography (which seems contradicted by Ashcroft, but has not yet been reviewed by the Court) Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Evolving Child Pornography StatutesApplication of the Miller standard of obscenity to drawings, sculptures, and pictures depicting minors in obscene situations or engaged in sexual activitySentencing enhancement for possession and distribution of child pornographyAuthorization of fines and imprisonment of up to 30 years for U.S. citizens or residents engaging in illicit sexual conduct abroad Computer Forensics and Cyber Crime, 3rd ed.
  • 8. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Identity Theft and Financial Privacy Statutes Identity Theft and Assumption Deterrence Act of 1998 (ITADA)Now a crime to possess another’s personal (public or nonpublic) identifying informationAlso, now unlawful to "Knowingly transfer or use, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law" Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Identity Theft and Financial Privacy Statutes Identity Theft and Assumption Deterrence Act of 1998 (ITADA)Identifying information includes:NameSocial Security numberDate of birthOfficial state or government issued driver’s license or identification numberAlien registration numberPassport numberEmployer or taxpayer identification number Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Identity Theft and Financial Privacy StatutesUnique biometric data, such as fingerprint, voice print, retina or iris image, or
  • 9. other unique physical representationUnique electronic identification number, address, or routing codeTelecommunication identifying information or access deviceAlso provided for restitution, attorney's fees, lost time from work, and denial of creditDesignated the Federal Trade Commission (FTC) as the repository for consumer complaints and agents of dissemination Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Identity Theft and Financial Privacy Statutes The Financial Modernization Act of 1999Contains the Financial Privacy Rule, which states that financial institutions must disclose privacy practices and provide for "opt-out" of disclosure of some personal informationContains the Safeguards Rule, which states that those businesses have to devise security ban to protect such informationAddresses pretexting, regarding financial information used to obtain personal information under false pretenses Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Identity Theft and Financial Privacy Statutes Fair and Accurate Credit Transactions Act of 2003 (FACTA)Major provisions include:Free credit reportFraud and active duty alertsTruncation of credit/debit account numbers (to address dumpster-diving)Truncation of Social Security numbersOne-call fraud alerts and enhanced victims' resolution
  • 10. process Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Identity Theft and Financial Privacy StatutesMandate card issuers to investigate change of address requests and requests for new, additional cardsBlocking or elimination of fraudulent informationFraud alert requirements for consumer reporting agenciesRequirement of consumer reporting agencies to divulge consumer credit scoresLimits the comingling of medical and financial information Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Identity Theft and Financial Privacy StatutesDebt collectors now obliged to tell third-party employers that debt may be result of identity theft, provide info on how to resolve disputes, and provide all info about debt; also, cannot put debt, result of identity theft, into collectionCivil action available when violations occur Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Identity Theft and Financial Privacy Statutes
  • 11. Identity Theft Penalty Enhancement Act of 2004Criminal penalties for aggravated identity theft, including mandatory sentences Identity Theft Enforcement and Restitution Act of 2008Expanded consequences for identity theft Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Identity Theft and Financial Privacy Statutes Additional Efforts to Protect Personal InformationDrivers Privacy Protection Act: Prohibits use of Social Security numbers and other personal information from a motor vehicle record in any situation not expressly permitted by lawHealth Insurance Portability & Accountability Act: Restricts health care organizations from disclosing Social Security numbers and health information Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Federally Funded Initiatives and Collaborations The President’s Working Group on Unlawful Conduct on the Internet brought together the business community, government entities, and civil liberty/nonprofit advocacy organizations to evaluate:Sufficiency of existing federal lawsWhether new technologies legal authorities needed to investigate and/or prosecute Internet crimeWhether education and “empowerment
  • 12. tools” can minimize the risks associated with this behavior Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Federally Funded Initiatives and Collaborations Resulting approaches:Regulation of Internet criminal activity, in same way as with traditional criminal lawRecognition of array of special needs, challenges to investigate, prosecute via tool development, enhanced training and interagency (and international) cooperationDevelopment of curricula re cyberethics, other support for private sector leaders to use Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Federally Funded Initiatives and CollaborationsPresidential Decision Directive 63 (PDD 63) (1998) led to creation of National Infrastructure Protection Center's (NIPC) Infragard, intended to bring local leaders, corporate executives, and law enforcement together to discuss potential threats. The Innocent Images initiative was designed investigate adults' interstate travel to meet minors for illicit purposes. Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved
  • 13. Law Enforcement Operations and Tools in the United States Packet Sniffers and Key LoggersDragonware software suite (made up of Carnivore, Packeteer, Coolminer) intended to reconstruct the Web-surfing trail of someone under investigation.This was packet-sniffing software, where communication on the Internet broken down into packets, transmitted, then reassembled at the destination. CyberKnight project used the Magic Lantern key logger to record keystrokes and mouse clicks for unscrambling encrypted files Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Law Enforcement Operations and Tools in the United States Data Mining Uses statistical models, algorithms, and/or artificial intelligence to analyze large data sets, with analysis parameters looking at:Association of connected eventsSequence of path analysis, of eventsClassification of new patterns Clustering of groups of previously unknown factsForecasting future activities Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Law Enforcement Operations and Tools in the United StatesExamples of data mining used to identify potential terrorists:Terrorism information Awareness Program (TIA) and Secure FlightComputer-Assisted Passenger Prescreening System (CAPPS II)Multi-State Anti-Terrorism Information Exchange
  • 14. Pilot Project (MATRIX)Automated Targeting System (ATS)Terrorist Surveillance Program Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Law Enforcement Operations and Tools in the United States Collaborations and Professional AssociationsCreation of federal, state, or local interagency task forcesCyberScience Laboratory: Collaboration between New York Electronic Crimes Task Force and National Institute of Justice's Office of Science and Technology, for sharing forensic knowledgeHigh Tech Computer Investigators Association (HTCIA): Nonprofit organization that involves training and information dissemination Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved International EffortsOECD and the Select Committee of Experts on Computer-Related Crime of the Council of EuropeThe first comprehensive effort (1983-1985) to harmonize criminal law to deal with computer-related economic crimeGenerated two lists of suggestions: Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved
  • 15. International EffortsRecommended behaviors that needed to be made illegal: The alteration of computer data or computer programsThe practice of computer espionageThe unauthorized use of a computerThe unauthorized use of a protected computer program Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved International EffortsMandatory offenses for all countries to have:Computer fraudComputer forgeryDamage to computer data or computer programsComputer sabotageUnauthorized accessUnauthorized interceptionUnauthorized reproduction of a protected computer programUnauthorized reproduction of a topography (which relates to semiconductor design) Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved International Efforts Council of Europe’s (CoE) Cybercrime Conventions (1996) created four categories of computer-related criminal offenses: Financial Action Task Force, created at G-7 Summit (1989), from concern how money laundering used to support terrorist financingRecommendations focused on law enforcement systems and prosecution of offenses, regulations and financial systems, and international cooperation. Interpol & emphasis of aiding law enforcement agencies
  • 16. Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved International EffortsVirtual Global Task Force (VGT) (2003), a collaboration of the Australian High Tech Centre, the UK’s Child Exploitation and Online Protection Centre, the RCMP, the U.S. Department of Homeland Security, and Interpol Aim to deliver low-cost, high-impact initiatives that deter pedophiles and prevent the online exploitation of children Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved International EffortsUnited Nations’ Convention against Transnational Organized Crime (UNCATOC) (2000). Association of Southeast Asian Nations' (ASEAN) shared interest in training, criminal legislation and international collaboration Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved ConclusionsRecognition of problems has increased exponentially, with still much work needed Continue to use traditional statutes, pending enactment of technology specific legislation, due to encouragement of policymakers and administrators
  • 17. While international cooperation has increased, competitive issues about sovereignty hinders the continuing efforts Computer Forensics and Cyber Crime CHAPTER Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Avenues for Prosecution and Government Efforts 7 Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Learning ObjectivesHave knowledge of traditional statutes that also apply to current problems with computer crime.Discover recent federal government legislation on online behavior.Gain knowledge of investigative tools used by the government to reduce the risk of modern technology.Develop an awareness of data mining and the programs imbedded in it.Have an idea of the international attempt to solve the problem of computer crime. Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc.
  • 18. All Rights Reserved IntroductionLaw enforcement administrators have faced traditional challenges, such as:Smaller agencies lacking resources available, leading to greater reliance on state and federal agencies, which results in overburdening of those agenciesHistorically, apathy towards nonviolent crimeGlacially slow pace of legislative action Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Traditional StatutesThe primary federal law enforcement provisions, relating to cybercrime exist under Title 18, for crimes such as:Fraud and Embezzlement Terrorism or EspionageChild Seduction & ExploitationStalkingKidnapping (The Hobbs Act)Forgery and CounterfeitingExtortionRICOAccess Device FraudIllegal Wiretapping Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Traditional StatutesSupplemental federal criminal law relating to cybercrime includes:Title 15: Credit card Fraud and Software Piracy Title 17: Copyright Infringement Computer Forensics and Cyber Crime, 3rd ed.
  • 19. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved The Evolution of Computer-Specific Statutes Computer Fraud and Abuse Act of 1986 (CFAA)Prior version, the Counterfeit Access Device & computer Fraud & Abuse Act of 1986 – 18 U.S.C. §1030 (also called the Hacking Statute) focused narrowly on unauthorized access to a computer.Considered ineffective: Too vague, overemphasized access to financial information and government computersOnly one successful prosecution under original act Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved The Evolution of Computer-Specific Statutes Computer Fraud and Abuse Act of 1986 (CFAA)Later expansion applied the Act to computers used in commerce & communication; applied to all financial recordsTailored it to apply to intentional, not inadvertent, intrusions Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved The Evolution of Computer-Specific Statutes Subsequent successful prosecutions included:Kevin Mitnick (perhaps most famous; theft of programs valued at more than $1 million from Digital Equipment corporation & the illegal manipulation of MCI service codes) Shadowhawk (breaking and
  • 20. entering into U.S. Missile Command)Robert Morris (inventor of the Morris Worm, and son of the former chief scientist at the National Computer Security Center) Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved The Evolution of Computer-Specific Statutes National Information Infrastructure Act of 1996 (NIIPA)Focused on loopholes, areas unaddressed by CFAA:Instances of accidental intrusionOffenses committed via computerOffenses committed with computer technologyWhen computer data is not the primary targetAll computers not involved in commerce but attached to the Internet Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved The Evolution of Computer-Specific StatutesExpanded to include: Transmitting classified government informationObtaining information from financial institutions, private sector computers, and the U.S. governmentAffecting the government's use of a U.S. department or agency nonpublic computerFraud related to any of the previous activitiesHacking & malicious programming, including any unintentional damagesTrafficking in passwordsExtortion related to any of the above activities Computer Forensics and Cyber Crime, 3rd ed.
  • 21. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Evolving Child Pornography StatutesEfforts at banning child pornography have included piecemeal legislation, like the Protection of Children against Sexual Exploitation Act (1977), and Supreme Court rulings. Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Evolving Child Pornography StatutesNew York v. Ferber (1982): Child pornography not protected by the First Amendment's free speech provisionsSubsequent Congressional action: Child Protection Act (1984) was supplanted by Child Protection & Obscenity Act (1988); but limited to obscene materialChild Pornography Protection Act (CPPA) (1996) applied to virtual images of children, which would include altered images and cartoons, but this law was struck down by the U. S. Supreme Court in Ashcroft v. Free Speech Coalition (2002) as overbroad, covering images that were protected free speech, since virtual images would be made without having to victimize children. Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Evolving Child Pornography StatutesResponse: The PROTECT (Prosecutorial Remedies and Other Tools to End the
  • 22. Exploitation of children Today) Act, which provided for:Mandatory life penalty for repeat child sex offendersCriminal history/background checks for volunteer organizationsElectronic eavesdropping for cases of child abuse or kidnapping Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Evolving Child Pornography StatutesForbidding pretrial release for persons charged with violation of this ActEnded statutes of limitation on child abduction, abuseAppointment of National AMBER Alert CoordinatorNo more waiting periods in missing persons cases for 18-21-year-oldsProhibition against computer- generated child pornography (which seems contradicted by Ashcroft, but has not yet been reviewed by the Court) Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Evolving Child Pornography StatutesApplication of the Miller standard of obscenity to drawings, sculptures, and pictures depicting minors in obscene situations or engaged in sexual activitySentencing enhancement for possession and distribution of child pornographyAuthorization of fines and imprisonment of up to 30 years for U.S. citizens or residents engaging in illicit sexual conduct abroad Computer Forensics and Cyber Crime, 3rd ed.
  • 23. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Identity Theft and Financial Privacy Statutes Identity Theft and Assumption Deterrence Act of 1998 (ITADA)Now a crime to possess another’s personal (public or nonpublic) identifying informationAlso, now unlawful to "Knowingly transfer or use, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law" Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Identity Theft and Financial Privacy Statutes Identity Theft and Assumption Deterrence Act of 1998 (ITADA)Identifying information includes:NameSocial Security numberDate of birthOfficial state or government issued driver’s license or identification numberAlien registration numberPassport numberEmployer or taxpayer identification number Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Identity Theft and Financial Privacy StatutesUnique biometric data, such as fingerprint, voice print, retina or iris image, or
  • 24. other unique physical representationUnique electronic identification number, address, or routing codeTelecommunication identifying information or access deviceAlso provided for restitution, attorney's fees, lost time from work, and denial of creditDesignated the Federal Trade Commission (FTC) as the repository for consumer complaints and agents of dissemination Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Identity Theft and Financial Privacy Statutes The Financial Modernization Act of 1999Contains the Financial Privacy Rule, which states that financial institutions must disclose privacy practices and provide for "opt-out" of disclosure of some personal informationContains the Safeguards Rule, which states that those businesses have to devise security ban to protect such informationAddresses pretexting, regarding financial information used to obtain personal information under false pretenses Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Identity Theft and Financial Privacy Statutes Fair and Accurate Credit Transactions Act of 2003 (FACTA)Major provisions include:Free credit reportFraud and active duty alertsTruncation of credit/debit account numbers (to address dumpster-diving)Truncation of Social Security numbersOne-call fraud alerts and enhanced victims' resolution
  • 25. process Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Identity Theft and Financial Privacy StatutesMandate card issuers to investigate change of address requests and requests for new, additional cardsBlocking or elimination of fraudulent informationFraud alert requirements for consumer reporting agenciesRequirement of consumer reporting agencies to divulge consumer credit scoresLimits the comingling of medical and financial information Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Identity Theft and Financial Privacy StatutesDebt collectors now obliged to tell third-party employers that debt may be result of identity theft, provide info on how to resolve disputes, and provide all info about debt; also, cannot put debt, result of identity theft, into collectionCivil action available when violations occur Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Identity Theft and Financial Privacy Statutes
  • 26. Identity Theft Penalty Enhancement Act of 2004Criminal penalties for aggravated identity theft, including mandatory sentences Identity Theft Enforcement and Restitution Act of 2008Expanded consequences for identity theft Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Identity Theft and Financial Privacy Statutes Additional Efforts to Protect Personal InformationDrivers Privacy Protection Act: Prohibits use of Social Security numbers and other personal information from a motor vehicle record in any situation not expressly permitted by lawHealth Insurance Portability & Accountability Act: Restricts health care organizations from disclosing Social Security numbers and health information Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Federally Funded Initiatives and Collaborations The President’s Working Group on Unlawful Conduct on the Internet brought together the business community, government entities, and civil liberty/nonprofit advocacy organizations to evaluate:Sufficiency of existing federal lawsWhether new technologies legal authorities needed to investigate and/or prosecute Internet crimeWhether education and “empowerment
  • 27. tools” can minimize the risks associated with this behavior Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Federally Funded Initiatives and Collaborations Resulting approaches:Regulation of Internet criminal activity, in same way as with traditional criminal lawRecognition of array of special needs, challenges to investigate, prosecute via tool development, enhanced training and interagency (and international) cooperationDevelopment of curricula re cyberethics, other support for private sector leaders to use Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Federally Funded Initiatives and CollaborationsPresidential Decision Directive 63 (PDD 63) (1998) led to creation of National Infrastructure Protection Center's (NIPC) Infragard, intended to bring local leaders, corporate executives, and law enforcement together to discuss potential threats. The Innocent Images initiative was designed investigate adults' interstate travel to meet minors for illicit purposes. Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved
  • 28. Law Enforcement Operations and Tools in the United States Packet Sniffers and Key LoggersDragonware software suite (made up of Carnivore, Packeteer, Coolminer) intended to reconstruct the Web-surfing trail of someone under investigation.This was packet-sniffing software, where communication on the Internet broken down into packets, transmitted, then reassembled at the destination. CyberKnight project used the Magic Lantern key logger to record keystrokes and mouse clicks for unscrambling encrypted files Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Law Enforcement Operations and Tools in the United States Data Mining Uses statistical models, algorithms, and/or artificial intelligence to analyze large data sets, with analysis parameters looking at:Association of connected eventsSequence of path analysis, of eventsClassification of new patterns Clustering of groups of previously unknown factsForecasting future activities Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Law Enforcement Operations and Tools in the United StatesExamples of data mining used to identify potential terrorists:Terrorism information Awareness Program (TIA) and Secure FlightComputer-Assisted Passenger Prescreening System (CAPPS II)Multi-State Anti-Terrorism Information Exchange
  • 29. Pilot Project (MATRIX)Automated Targeting System (ATS)Terrorist Surveillance Program Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Law Enforcement Operations and Tools in the United States Collaborations and Professional AssociationsCreation of federal, state, or local interagency task forcesCyberScience Laboratory: Collaboration between New York Electronic Crimes Task Force and National Institute of Justice's Office of Science and Technology, for sharing forensic knowledgeHigh Tech Computer Investigators Association (HTCIA): Nonprofit organization that involves training and information dissemination Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved International EffortsOECD and the Select Committee of Experts on Computer-Related Crime of the Council of EuropeThe first comprehensive effort (1983-1985) to harmonize criminal law to deal with computer-related economic crimeGenerated two lists of suggestions: Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved
  • 30. International EffortsRecommended behaviors that needed to be made illegal: The alteration of computer data or computer programsThe practice of computer espionageThe unauthorized use of a computerThe unauthorized use of a protected computer program Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved International EffortsMandatory offenses for all countries to have:Computer fraudComputer forgeryDamage to computer data or computer programsComputer sabotageUnauthorized accessUnauthorized interceptionUnauthorized reproduction of a protected computer programUnauthorized reproduction of a topography (which relates to semiconductor design) Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved International Efforts Council of Europe’s (CoE) Cybercrime Conventions (1996) created four categories of computer-related criminal offenses: Financial Action Task Force, created at G-7 Summit (1989), from concern how money laundering used to support terrorist financingRecommendations focused on law enforcement systems and prosecution of offenses, regulations and financial systems, and international cooperation. Interpol & emphasis of aiding law enforcement agencies
  • 31. Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved International EffortsVirtual Global Task Force (VGT) (2003), a collaboration of the Australian High Tech Centre, the UK’s Child Exploitation and Online Protection Centre, the RCMP, the U.S. Department of Homeland Security, and Interpol Aim to deliver low-cost, high-impact initiatives that deter pedophiles and prevent the online exploitation of children Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved International EffortsUnited Nations’ Convention against Transnational Organized Crime (UNCATOC) (2000). Association of Southeast Asian Nations' (ASEAN) shared interest in training, criminal legislation and international collaboration Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved ConclusionsRecognition of problems has increased exponentially, with still much work needed Continue to use traditional statutes, pending enactment of technology specific legislation, due to encouragement of policymakers and administrators
  • 32. While international cooperation has increased, competitive issues about sovereignty hinders the continuing efforts