Presentation is loading. Please wait.

Presentation is loading. Please wait.

CYBERCRIME – WEEK 1 (Lectures 1, 2) DAVID THAW University of Connecticut School of Law.

Similar presentations


Presentation on theme: "CYBERCRIME – WEEK 1 (Lectures 1, 2) DAVID THAW University of Connecticut School of Law."— Presentation transcript:

1 CYBERCRIME – WEEK 1 (Lectures 1, 2) DAVID THAW University of Connecticut School of Law

2 CLASS OVERVIEW Lecture 1: Introduction to Computer Crimes/Computer Misuse Lecture 2: Use of Property Crimes to Punish Computer Misuse Lecture 3: The CFAA (18 U.S.C. § 1030) and “Access” Discussion

3 LECTURE 1 OVERVIEW Preview of Course Themes: Substantive crimes Investigatory means/methods Jurisdictional issues Background – mine, yours, and getting the most out of the class Casebook hypos Administrivia

4 COURSE THEMES Substantive Crimes Focus on privacy and economic (property) interests rather than crimes-against-persons Investigatory Means/Methods Physical crimes: witnesses, physical evidence (think CSI) Computer crimes: computer logs, other digital evidence Jurisdiction Physical crimes: traditionally province of the states Computer crimes: (usually) shift to federal prosecution

5 BACKGROUND Me: Law and Computer Science (Information Security) You: Required: first-year criminal law (that’s it!) Helpful (but definitely not mandatory): Criminal procedure Internet law Intellectual property If you’re just taking the class because it sounds “fun” – great!

6 CYBERCRIME OVERVIEW What makes a computer crime? Substantive Law: crimes against/involving the use of computers Procedural Law: crimes involving collection of evidence that exists in computerized (electronic) form

7 CYBERCRIME OVERVIEW Substantive Law Computer Misuse Crimes – intentional interference with proper function of computers Exs: hacking, malware, DDoS Traditional Crimes – traditional crimes committed using/facilitated by computers Exs: Internet fraud, online threats, distribution of child pornography, theft of trade secrets

8 CYBERCRIME OVERVIEW Procedural Law Fourth Amendment Digital evidence collection when is retrieving evidence from a computer a “search”? Statutory Privacy Law Wiretap Act (1968) Title III of Omnibus Crime Control and Safe Streets Act 1986: Electronic Communications Privacy Act (ECPA) – amended Title III to include data transmission Stored Communications Act (SCA) – Title II of ECPA Pen Register Statute Investigative/Prosecutorial Questions: Jurisdictional  Procedural  Substantive

9 COMPUTER MISUSE Offenses involving interference with the proper functioning of computing and information systems Why do I say “computing and info. systems”? Forms of computer misuse: Exceeding privileges Interfering with (denying) others’ privileges

10 DISCUSSION Cases United States v. Seidlitz State v. McGraw Casebook Hypotheticals Fred Felony KillerBee/Bryan Smith Sarah Jones

11 CASEBOOK HYPO – CRIMES/INVESTIGATION Fred Felony – Jewelry Store “Stick-Up” Jurisdictional? Procedural? Substantive? Fred Felony – Credit Card Theft Jurisdictional? Procedural? Substantive? The answers to these questions often interrelate!

12 CASEBOOK HYPO – COMPUTER MISUSE KillerBee (Bryan Smith) What “crimes” occurred? Is punishment justified? Utilitarian? Retributive? Damages – is there a “but for” (proximate causation) problem here? Should criminal law consider a proximate causation problem? Differences among targets’ security/damages – do they matter?

13 CASEBOOK HYPO – COMPUTER MISUSE Sarah Jones What “crimes” occurred? Is punishment justified? Utilitarian? Retributive? Are there (yet) damages? What future damages might exist? Who is more deserving of punishment, Bryan or Sarah?


Download ppt "CYBERCRIME – WEEK 1 (Lectures 1, 2) DAVID THAW University of Connecticut School of Law."

Similar presentations


Ads by Google