45-848 ECOMMERCE LEGAL ENVIRONMENT SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Lecture 12: Crime.

Slides:



Advertisements
Similar presentations
Northside I.S.D. Acceptable Use Policy
Advertisements

Criminal Law Chapter 5.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 8 Crimes Twomey Jennings Anderson’s Business Law and the Legal.
Criminal Law and Procedure
ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Lecture 14: Crime.
Chapter 8 Crimes Twomey, Business Law and the Regulatory Environment (14th Ed.)
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
Nigel, Lochie, Anika and Martin. As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law.
Hazards of Hacking. Hacking Originally, hacking was used to describe a programmer who was very skilled at his/her profession Often, this person knew programming.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
INTERNET and CODE OF CONDUCT
TYPES OF VIOLENT CRIMES Miscellaneous. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
1 INTRODUCTION to CRIMINAL LAW Learning Domain 5.
CYBERCRIME: THE U.S. APPROACH Craig J. Blakeley The Middle East Cybercrime Forum Beirut, Lebanon February , 2006.
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
Spam and The Computer Fraud and Abuse Act Richard Warner.
Cyber crime & Security Prepared by : Rughani Zarana.
Quick! What is a crime?. So, just how much has to be proven in court to find someone guilty of a crime? Burden of Proof The prosecution has the burden.
Computer Crime Confucius say: "Cracker who gets busted doing one of these crimes, will spend long time in jail house soup."
 Four sources of law: Constitutions Statutes Case law Administrative regulations  Main types of laws include: Civil law Criminal law.
Unethical use of Computers and Networks
U.S. Copyright Enforcement Benjamin Hardman Attorney / Advisor Office of Intellectual Property Policy & Enforcement, USPTO.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 8 Crimes.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
CHAPTER FIVE CRIMINAL LAW MUSOLINOSUNY CRIMINAL & BUSINESS LAW.
Chapter 5 Our Criminal Laws Lesson 5-1 Criminal Law.
Chapter 5.  It creates the three branches of government  Executive  Legislative  Judicial  It allocates powers to these branches  It protects individual.
Stalking Awareness And Prevention Francis A. Arenas, Esq.
Prentice Hall © PowerPoint Slides to accompany The Legal Environment of Business and Online Commerce 4E, by Henry R. Cheeseman Chapter 7 Business.
Chapter 5 Our Criminal Laws
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
1.A guilty state of mind: means that the prohibited act was done intentionally, knowingly, or willingly. 2.When lawyers discuss the requirement for a.
CRIMES Used by permission. For Educational purposes only.
Copyright 2000, Marchany Computer Law Threats and Issues VA Computer Crime Act Randy Marchany VA Tech Computing Center ©Marchany,2001.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Cybercrime What is it, what does it cost, & how is it regulated?
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
LAW OF COMPUTER TECHNOLOGY FALL 2015 COPYRIGHT © 2015 MICHAEL I. SHAMOS Apple v. Samsung News All claims of Apple’s patent 7,844,915 (scroll v. gesture)
Comprehensive Volume, 18 th Edition Chapter 8: Crimes.
Computer crimes.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
Chapter 10 – Crimes Against Property. Arson The willful and malicious burning of a person’s property Intentionally burning a building to defraud the insurance.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Civil Law An overview of Tort Law – the largest branch of civil law Highlight the differences between tort law and criminal law How torts developed historically.
Business- Related Crimes Crime Classification Elements of a Crime The Investigation
Virginia RULES Teens Learn & Live the Law Crimes Against Persons.
Law for Business and Personal Use © Thomson South-Western CHAPTER 4 Criminal Law and Procedure 4-1 Criminal Law 4-2 Criminal Procedure.
CHAPTER Computer Crime: Pornography, Fraud, Hacking, and Gambling Computer Crime: Pornography, Fraud, Hacking, and Gambling 22.
18 USC § 1030 Computer Fraud and Abuse Act
Crimes Against Persons
The Criminal Law And Business
COMPUTER CRIME.
Update on the Computer Fraud and Abuse Act
Forensic and Investigative Accounting
Computer Crime Michael I. Shamos, Ph.D., J.D.
Ethical Use of Computers
Connections Abuse Prevention Plan 2018.
Chapter 4 Criminal Law and Procedure
Laws Against Computer Hacking
Presentation transcript:

ECOMMERCE LEGAL ENVIRONMENT SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Lecture 12: Crime

ECOMMERCE LEGAL ENVIRONMENT SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Criminal Law Even though there is a victim, the injury is to “society,” so the government prosecutes: Unauthorized access Theft of services Denial of service Alteration/destruction of data Trafficking in passwords Computer fraud Password trafficking bombing, spamming Video piracy, software piracy Gambling

ECOMMERCE LEGAL ENVIRONMENT SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Criminal Jurisdiction When can a state exercise criminal jurisdiction? –Conduct in the state that is an element of the offense –Conduct outside that is an attempt to commit inside –Conduct outside that is conspiracy to commit inside the state + an overt act in the state –Omission to perform a legal duty imposed by the state –Offense is based on a state statute that prohibits conduct outside the state that bears a reasonable relation to a legitimate interest of the state and the actor knows or should know that his conduct is likely to affect that interest. 18 Pa. C.S. § 102

ECOMMERCE LEGAL ENVIRONMENT SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Strict Construction Problem: criminal statutes are “strictly construed.” If the act is not expressly made criminal by statute, it is not criminal (exception: “common law crimes,” like murder) The words of a criminal statute are not expanded to cover related or analogous behavior.

ECOMMERCE LEGAL ENVIRONMENT SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Commonwealth v. Lund Lund was charged with the theft of keys, computer cards, computer printouts and using computer time without authority at Virginia Polytechnic Institute (VPI) Statutes reads: “Any person who: … commits simple larceny not from the person of another of goods and chattels of the value of $100 or more, shall be deemed guilty of grand larceny …" Lund was found guilty at trial He appealed on the grounds that computer time is not “goods” or “chattels” Virginia Supreme Court agreed. 232 N.E.2d 745 (Va. 1977)232 N.E.2d 745 “The phrase "goods and chattels" cannot be interpreted to include computer time and services in light of the often repeated mandate that criminal statutes must be strictly construed.”

ECOMMERCE LEGAL ENVIRONMENT SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS What’s a Commonwealth? Commonwealth means “free state,” not controlled by a king (Oliver Cromwell, 1649); in the U.S., synonymous with “state.” Among the U.S. states, 4 are called Commonwealths: –Pennsylvania –Massachusetts –Virginia –Kentucky The first three were among the original 13 colonies when the U.S. was formed Kentucky was part of Virginia but split in 1792 as the 15th state Also, “a political unit having local autonomy but voluntarily united with the U.S.” Puerto Rico, Northern Marianas Islands.

ECOMMERCE LEGAL ENVIRONMENT SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Computer Fraud and Abuse Act Prohibits certain acts against “protected computers” that affect interstate commerce. 18 U.S.C. § U.S.C. § 1030 ''protected computer'' means a computer - –exclusively for the use of a financial institution or the United States Government … ; or –which is used in interstate or foreign commerce or communication including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States Provides for a civil action (private lawsuit) by anyone injured by a violation

ECOMMERCE LEGAL ENVIRONMENT SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Computer Fraud and Abuse Act intentionally accessing a computer without authorization or exceeding authorized access, to obtain –information in a financial record of a financial institution, or of a card issuer or consumer reporting agency on a consumer –information from any department or agency of the United States; or –information from any protected computer if the conduct involved an interstate or foreign communication knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and … obtains anything of value

ECOMMERCE LEGAL ENVIRONMENT SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Computer Fraud and Abuse Act  Fraud in connection with access devices. 18 U.S.C. § U.S.C. § 1029 “access device” means any card, plate, code, account number, electronic serial number, mobile identification number, PIN, or other … identifier or other means of account access that can be used … to obtain money, goods, services, or any other thing of value, or that can be used to initiate a transfer of funds Prohibits use or trafficking in counterfeit access devices trafficking in passwords

ECOMMERCE LEGAL ENVIRONMENT SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Computer Fraud and Abuse Act knowingly transmitting a program, information, code, or command, and … intentionally causing damage without authorization, to a protected computer intentionally accessing a protected computer without authorization, and … causing damage 'damage' means any impairment to the integrity or availability of data, a program, a system, or information (covers denial of service) extortion by threat to a computer crimes investigated by FBI and Secret Service PA: “Unlawful use of computer” 18 Pa.C.S. § Pa.C.S. § 3933

ECOMMERCE LEGAL ENVIRONMENT SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS AOL, Inc. v. LCGM, Inc. LCGM is a porno site LCGM became an AOL customer and harvested addresses from AOL chat rooms LCGM spammed users through AOL (300,000 s per day) Bulk s violate AOL’s Terms of Service LCGM was sued for violating the Computer Fraud and Abuse Act Held, LCGM’s use of AOL was unauthorized; LCGM obtained value (use of AOL mailing services) and information ( addresses) 46 F.Supp F.Supp. 444 (E.D. Va. 1998)

ECOMMERCE LEGAL ENVIRONMENT SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS No Electronic Theft Act Any person who infringes a copyright willfully either –for purposes of commercial advantage or private financial gain, or –by the reproduction or distribution, including by electronic means, during any 180-day period, of 1 or more copies or phonorecords of 1 or more copyrighted works, which have a total retail value of more than $1, U.S.C U.S.C. 506 First offense, less than 10 copies: 1 year + $100,000 First offense, 10 or more copies: 5 years + $250,000 Second offense, 10 or more: 10 years + $250,000 “financial gain” includes receipt, or expectation of receipt, of anything of value, including the receipt of other copyrighted works.

ECOMMERCE LEGAL ENVIRONMENT SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS People ex rel. Vacco v. World Interactive Gaming Corp. et al. “ex rel.” (ex relatione, upon relation) means “acting through.” Vacco was the NY Attorney General no lottery or … book-making, or any other kind of gambling, … except pari-mutuel betting on horse races as may be prescribed by the legislature … shall hereafter be authorized or allowed within this state. NY Const. Art. 1, Sec. 9 World Interactive Gaming Corp. (WIGC) is a Delaware corp. with offices in NY. Golden Chips Casino, Inc. (GCC) is an Antigua corp. wholly owned by WIGC. GCC operated an Internet casino using servers in Antigua. GCC advertised in the US; ads were seen in NY

ECOMMERCE LEGAL ENVIRONMENT SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Antigua

ECOMMERCE LEGAL ENVIRONMENT SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS People ex rel. Vacco v. World Interactive Gaming Corp. et al. Users had to enter a home address; GCC checked for Nevada Users transferred money to a bank in Antigua. They could gamble. Gambling is legal in Antigua. New Yorkers could gamble by lying about their address NY Attorney General sought an injunction against WIGC, GCC to stop their activities GCC argued Held, NY has jurisdiction. When New Yorkers transfer money to GCC, they are gambling in NY. Doesn’t matter where GCC is. Injunction issued 714 N.Y.S.2d N.Y.S.2d 844 (N.Y.Sup. 1999)

ECOMMERCE LEGAL ENVIRONMENT SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Cyberstalking “It is the intent of this act to clarify that electronic communications are included in the actions that can constitute the crimes of harassment and stalking.” Cal. Penal Code (a) Any person who willfully, maliciously, and repeatedly follows or harasses another person and who makes a credible threat with the intent to place that person in reasonable fear for his or her safety, or the safety of his or her immediate family, is guilty of the crime of stalking, punishable by imprisonment in a county jail for not more than one year or by a fine of not more than one thousand dollars ($1,000), or by both that fine and imprisonment.Cal. Penal Code 646.9

ECOMMERCE LEGAL ENVIRONMENT SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Threatening Cal. Penal Code §653m. (a) Every person who, with intent to annoy, telephones or makes contact by means of an electronic communication device with another and addresses to or about the other person any obscene language or addresses to the other person any threat to inflict injury to the person or property of the person addressed or any member of his or her family, is guilty of a misdemeanor. Nothing in this subdivision shall apply to telephone calls or electronic contacts made in good faith.Cal. Penal Code §653m

ECOMMERCE LEGAL ENVIRONMENT SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Other eCommerce Crimes Securities fraud Money laundering, FINCEN, USA Patriot Act Auctions Pyramid schemes Justice Dept Computer Crime and Intellectual Property SectionSection How to report cybercrimereport

ECOMMERCE LEGAL ENVIRONMENT SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Council of Europe Convention on Cybercrime Signed by the US on Nov. 23, 2001; not yet ratified by the US Senate Requires signatories to make certain acts illegal Provides for –jurisdiction –cooperation –extradition –24/7 information network –compel ISPs to record traffic data

ECOMMERCE LEGAL ENVIRONMENT SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Crimes Under the Convention Unauthorized access Interception of data, including “electronic emissions” Data interference System interference Misuse or possession of devices, including programs, for committing offenses Computer forgery Computer fraud Child pornography Copyright infringement

ECOMMERCE LEGAL ENVIRONMENT SPRING 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS Q A &