SlideShare a Scribd company logo
1 of 2
EXTRATERRITORIAL JURISDICTION
& CYBERCRIME
ccording to Brenner (2011) The United States Patriot Act has added a
subsection which allows the U.S. government to exert extraterritorial
jurisdiction to prosecute cybercrimes outside the jurisdiction of the
United States if certain criteria are met. (p.68).
. the offense is committed by anyone accessing a device controlled by
financial institutions or other entities within U.S. jurisdiction
. the individual transports or is in the possession of an article used to
commit the offense within U.S. jurisdiction
18 USC 1028
8 USC 1028 includes offenses such as fraud & related offenses that involve
identification documents, authentication features, and information
xamples of offenses that violate 18 USC 1028 include but are not limited to:
Credit card skimming
Identity theft/fraud

More Related Content

What's hot

Patriot act summary
Patriot act summaryPatriot act summary
Patriot act summarysevans-idaho
 
Final presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot ActFinal presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot Actgbsmith5
 
Information & technology Act, 2000.
Information & technology Act, 2000.Information & technology Act, 2000.
Information & technology Act, 2000.Vaishnavi Meghe
 
What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?Bivas Chatterjee
 
Overview of the Egyptian Personal Data Protection Law
Overview of the Egyptian Personal Data Protection LawOverview of the Egyptian Personal Data Protection Law
Overview of the Egyptian Personal Data Protection LawFatmaAkram2
 
Right to Iinformation Law in India : An overview
Right to Iinformation Law in India : An overviewRight to Iinformation Law in India : An overview
Right to Iinformation Law in India : An overviewAdv Rajasekharan
 
IIAC Young Agents - Protecting Your Insureds\' Private Information
IIAC Young Agents - Protecting Your Insureds\' Private InformationIIAC Young Agents - Protecting Your Insureds\' Private Information
IIAC Young Agents - Protecting Your Insureds\' Private InformationJason Hoeppner
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 
Can the law control Digital Leviathan?
Can the law control Digital Leviathan?Can the law control Digital Leviathan?
Can the law control Digital Leviathan?blogzilla
 
Freedom of Information and Data Protection
Freedom of Information and Data ProtectionFreedom of Information and Data Protection
Freedom of Information and Data ProtectionEquiGov Institute
 
The patriot act
The patriot actThe patriot act
The patriot actpalita Px
 
Comprehensive Immigration Reform Takes Off
Comprehensive Immigration Reform Takes OffComprehensive Immigration Reform Takes Off
Comprehensive Immigration Reform Takes OffPatton Boggs LLP
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Loveneet presentation
Loveneet presentationLoveneet presentation
Loveneet presentationLoveneet LaVi
 
International principles on the application of human rights to communications...
International principles on the application of human rights to communications...International principles on the application of human rights to communications...
International principles on the application of human rights to communications...Rupinder K Gill
 

What's hot (20)

USA Patriot Act
USA Patriot ActUSA Patriot Act
USA Patriot Act
 
Patriot act summary
Patriot act summaryPatriot act summary
Patriot act summary
 
Final presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot ActFinal presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot Act
 
Right to Information Act
Right to Information ActRight to Information Act
Right to Information Act
 
Information & technology Act, 2000.
Information & technology Act, 2000.Information & technology Act, 2000.
Information & technology Act, 2000.
 
What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?
 
Right to information act 2005
Right to information act 2005Right to information act 2005
Right to information act 2005
 
Overview of the Egyptian Personal Data Protection Law
Overview of the Egyptian Personal Data Protection LawOverview of the Egyptian Personal Data Protection Law
Overview of the Egyptian Personal Data Protection Law
 
RTI Act 2005.
RTI Act 2005.RTI Act 2005.
RTI Act 2005.
 
Right to Iinformation Law in India : An overview
Right to Iinformation Law in India : An overviewRight to Iinformation Law in India : An overview
Right to Iinformation Law in India : An overview
 
IIAC Young Agents - Protecting Your Insureds\' Private Information
IIAC Young Agents - Protecting Your Insureds\' Private InformationIIAC Young Agents - Protecting Your Insureds\' Private Information
IIAC Young Agents - Protecting Your Insureds\' Private Information
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Can the law control Digital Leviathan?
Can the law control Digital Leviathan?Can the law control Digital Leviathan?
Can the law control Digital Leviathan?
 
Freedom of Information and Data Protection
Freedom of Information and Data ProtectionFreedom of Information and Data Protection
Freedom of Information and Data Protection
 
The patriot act
The patriot actThe patriot act
The patriot act
 
Comprehensive Immigration Reform Takes Off
Comprehensive Immigration Reform Takes OffComprehensive Immigration Reform Takes Off
Comprehensive Immigration Reform Takes Off
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Loveneet presentation
Loveneet presentationLoveneet presentation
Loveneet presentation
 
Official secrets act
Official secrets actOfficial secrets act
Official secrets act
 
International principles on the application of human rights to communications...
International principles on the application of human rights to communications...International principles on the application of human rights to communications...
International principles on the application of human rights to communications...
 

Viewers also liked

The Momentum of the Olympics
The Momentum of the OlympicsThe Momentum of the Olympics
The Momentum of the OlympicsAvaya Inc.
 
Pub id=557 fichas salsamentaria
Pub id=557 fichas salsamentariaPub id=557 fichas salsamentaria
Pub id=557 fichas salsamentariasena
 
SAP Process Integration 7 4 otimizado para SAP HANA
SAP Process Integration 7 4 otimizado para SAP HANASAP Process Integration 7 4 otimizado para SAP HANA
SAP Process Integration 7 4 otimizado para SAP HANABlend IT Consultoria
 
Dez sugestoes
Dez sugestoesDez sugestoes
Dez sugestoesPelo Siro
 
Reif Honors Thesis Revised
Reif Honors Thesis RevisedReif Honors Thesis Revised
Reif Honors Thesis RevisedJessica Reif
 
Pakej ke bandung | Pakej Percutian ke Bandung
Pakej ke bandung | Pakej Percutian ke BandungPakej ke bandung | Pakej Percutian ke Bandung
Pakej ke bandung | Pakej Percutian ke BandungBandung Trips
 
Les reponses du cadre juridique et institutionel par rapport aux besoins en m...
Les reponses du cadre juridique et institutionel par rapport aux besoins en m...Les reponses du cadre juridique et institutionel par rapport aux besoins en m...
Les reponses du cadre juridique et institutionel par rapport aux besoins en m...ExternalEvents
 
Amen ra's sura.vol.3.cardstocc
Amen ra's sura.vol.3.cardstoccAmen ra's sura.vol.3.cardstocc
Amen ra's sura.vol.3.cardstoccMurad Wysinger
 
De que arvore_voce_caiu
De que arvore_voce_caiuDe que arvore_voce_caiu
De que arvore_voce_caiuPelo Siro
 
Workforce Planning Strategy Map
Workforce Planning Strategy MapWorkforce Planning Strategy Map
Workforce Planning Strategy MapJoe Cimbak
 

Viewers also liked (15)

The Momentum of the Olympics
The Momentum of the OlympicsThe Momentum of the Olympics
The Momentum of the Olympics
 
Pub id=557 fichas salsamentaria
Pub id=557 fichas salsamentariaPub id=557 fichas salsamentaria
Pub id=557 fichas salsamentaria
 
SAP Process Integration 7 4 otimizado para SAP HANA
SAP Process Integration 7 4 otimizado para SAP HANASAP Process Integration 7 4 otimizado para SAP HANA
SAP Process Integration 7 4 otimizado para SAP HANA
 
Dez sugestoes
Dez sugestoesDez sugestoes
Dez sugestoes
 
Reif Honors Thesis Revised
Reif Honors Thesis RevisedReif Honors Thesis Revised
Reif Honors Thesis Revised
 
Rakesh
RakeshRakesh
Rakesh
 
kyms resume
kyms resumekyms resume
kyms resume
 
MBB ACCREDITATION
MBB ACCREDITATIONMBB ACCREDITATION
MBB ACCREDITATION
 
Pakej ke bandung | Pakej Percutian ke Bandung
Pakej ke bandung | Pakej Percutian ke BandungPakej ke bandung | Pakej Percutian ke Bandung
Pakej ke bandung | Pakej Percutian ke Bandung
 
Egg inoculation
Egg inoculationEgg inoculation
Egg inoculation
 
Les reponses du cadre juridique et institutionel par rapport aux besoins en m...
Les reponses du cadre juridique et institutionel par rapport aux besoins en m...Les reponses du cadre juridique et institutionel par rapport aux besoins en m...
Les reponses du cadre juridique et institutionel par rapport aux besoins en m...
 
Historia de la musica
Historia de la musicaHistoria de la musica
Historia de la musica
 
Amen ra's sura.vol.3.cardstocc
Amen ra's sura.vol.3.cardstoccAmen ra's sura.vol.3.cardstocc
Amen ra's sura.vol.3.cardstocc
 
De que arvore_voce_caiu
De que arvore_voce_caiuDe que arvore_voce_caiu
De que arvore_voce_caiu
 
Workforce Planning Strategy Map
Workforce Planning Strategy MapWorkforce Planning Strategy Map
Workforce Planning Strategy Map
 

Similar to Jurisdiction slides

Ch 9 White Collar and Organized Crime
Ch 9 White Collar and Organized CrimeCh 9 White Collar and Organized Crime
Ch 9 White Collar and Organized Crimerharrisonaz
 
Note du procureur général du ministère de la Justice américain
Note du procureur général du ministère de la Justice américainNote du procureur général du ministère de la Justice américain
Note du procureur général du ministère de la Justice américainLaLibre
 
Executive Order Lecture by Cynthia Farina
Executive Order Lecture by Cynthia FarinaExecutive Order Lecture by Cynthia Farina
Executive Order Lecture by Cynthia Farinanslscornell
 
The CFAA and Aarons Law
The CFAA and Aarons LawThe CFAA and Aarons Law
The CFAA and Aarons LawThomas Jones
 
Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacych samaram
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkMatt Siltala
 
Forfeiture and Restitution Presentation
Forfeiture and Restitution PresentationForfeiture and Restitution Presentation
Forfeiture and Restitution PresentationHope C Lefeber LLC
 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeLoeb Smith Attorneys
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GOllieShoresna
 
How the Patriot Act Works by Ed Grabianowski Browse th.docx
How the Patriot Act Works by Ed Grabianowski Browse th.docxHow the Patriot Act Works by Ed Grabianowski Browse th.docx
How the Patriot Act Works by Ed Grabianowski Browse th.docxwellesleyterresa
 
Kurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+PaperKurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+PaperMatthew Kurnava
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacEvonCanales257
 
Introduction to National Security Law
Introduction to National Security LawIntroduction to National Security Law
Introduction to National Security LawJoseph V. Moreno
 
NEW US SENATE BILL COULD BE A THREAT TO BITCOIN INNOVATION
NEW US SENATE BILL COULD BE A THREAT TO BITCOIN INNOVATIONNEW US SENATE BILL COULD BE A THREAT TO BITCOIN INNOVATION
NEW US SENATE BILL COULD BE A THREAT TO BITCOIN INNOVATIONSteven Rhyner
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisistamiuthomas
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisistamiuthomas
 
Legislative Update - TIP Monthly Call
Legislative Update - TIP Monthly CallLegislative Update - TIP Monthly Call
Legislative Update - TIP Monthly CallInternet Law Center
 
APA Medicare Fraud Regulations_Structures_Details
APA Medicare Fraud Regulations_Structures_DetailsAPA Medicare Fraud Regulations_Structures_Details
APA Medicare Fraud Regulations_Structures_DetailsLori Ranzino-Renda, CIS
 
Privacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal LawPrivacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal LawCharles Mudd
 
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
RESEARCH  - STUDIES IN CONSTITUTIONAL LAWRESEARCH  - STUDIES IN CONSTITUTIONAL LAW
RESEARCH - STUDIES IN CONSTITUTIONAL LAWChirine Haddad ?
 

Similar to Jurisdiction slides (20)

Ch 9 White Collar and Organized Crime
Ch 9 White Collar and Organized CrimeCh 9 White Collar and Organized Crime
Ch 9 White Collar and Organized Crime
 
Note du procureur général du ministère de la Justice américain
Note du procureur général du ministère de la Justice américainNote du procureur général du ministère de la Justice américain
Note du procureur général du ministère de la Justice américain
 
Executive Order Lecture by Cynthia Farina
Executive Order Lecture by Cynthia FarinaExecutive Order Lecture by Cynthia Farina
Executive Order Lecture by Cynthia Farina
 
The CFAA and Aarons Law
The CFAA and Aarons LawThe CFAA and Aarons Law
The CFAA and Aarons Law
 
Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacy
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David Mink
 
Forfeiture and Restitution Presentation
Forfeiture and Restitution PresentationForfeiture and Restitution Presentation
Forfeiture and Restitution Presentation
 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia G
 
How the Patriot Act Works by Ed Grabianowski Browse th.docx
How the Patriot Act Works by Ed Grabianowski Browse th.docxHow the Patriot Act Works by Ed Grabianowski Browse th.docx
How the Patriot Act Works by Ed Grabianowski Browse th.docx
 
Kurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+PaperKurnava_Law+Ethics+and+Cybersecurity_Research+Paper
Kurnava_Law+Ethics+and+Cybersecurity_Research+Paper
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through Blac
 
Introduction to National Security Law
Introduction to National Security LawIntroduction to National Security Law
Introduction to National Security Law
 
NEW US SENATE BILL COULD BE A THREAT TO BITCOIN INNOVATION
NEW US SENATE BILL COULD BE A THREAT TO BITCOIN INNOVATIONNEW US SENATE BILL COULD BE A THREAT TO BITCOIN INNOVATION
NEW US SENATE BILL COULD BE A THREAT TO BITCOIN INNOVATION
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Legislative Update - TIP Monthly Call
Legislative Update - TIP Monthly CallLegislative Update - TIP Monthly Call
Legislative Update - TIP Monthly Call
 
APA Medicare Fraud Regulations_Structures_Details
APA Medicare Fraud Regulations_Structures_DetailsAPA Medicare Fraud Regulations_Structures_Details
APA Medicare Fraud Regulations_Structures_Details
 
Privacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal LawPrivacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal Law
 
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
RESEARCH  - STUDIES IN CONSTITUTIONAL LAWRESEARCH  - STUDIES IN CONSTITUTIONAL LAW
RESEARCH - STUDIES IN CONSTITUTIONAL LAW
 

Jurisdiction slides

  • 1. EXTRATERRITORIAL JURISDICTION & CYBERCRIME ccording to Brenner (2011) The United States Patriot Act has added a subsection which allows the U.S. government to exert extraterritorial jurisdiction to prosecute cybercrimes outside the jurisdiction of the United States if certain criteria are met. (p.68). . the offense is committed by anyone accessing a device controlled by financial institutions or other entities within U.S. jurisdiction . the individual transports or is in the possession of an article used to commit the offense within U.S. jurisdiction
  • 2. 18 USC 1028 8 USC 1028 includes offenses such as fraud & related offenses that involve identification documents, authentication features, and information xamples of offenses that violate 18 USC 1028 include but are not limited to: Credit card skimming Identity theft/fraud