No Cop on the Beat: Underenforcement in E-Commerce and Cybercrime Peter P. Swire Ohio State University & Center for American Progress Silicon Flatirons.

Slides:



Advertisements
Similar presentations
Why E-Commerce is Like a Bottle of Tylenol Professor Peter P. Swire Ohio State Law School Conference on New Technologies and International Governance February.
Advertisements

Better Security and Privacy for Home Broadband Peter P. Swire Moritz College of Law The Ohio State University Morrison & Foerster LLP Privacy 2002 Conference.
Elephants and Mice Revisited: Law and Choice of Law on the Internet Professor Peter P. Swire Moritz College of Law Ohio State University Penn Law Review.
The Role of the Federal Government in Privacy Policy Professor Peter P. Swire The Ohio State University Center for American Progress The Privacy Symposium,
No Cop on the Beat: Underenforcement in E-Commerce and Cybercrime Peter P. Swire Ohio State University & Center for American Progress Fordham CLIP Information.
Trustwrap: The Importance of Legal Rules to E-Commerce and Internet Privacy Professor Peter P. Swire Moritz College of Law The Ohio State University Enforcing.
Liability Issues in Anti-Spyware Software Peter P. Swire Ohio State University Center for American Progress Anti-Spyware Coalition Public Workshop January.
Online Profiling and Consumer Choice Peter P. Swire Center for American Progress Ohio State University ATL Hill Briefing April 28, 2008.
Reflections on the White House Privacy Office Peter P. Swire Ohio State University Center for American Progress N.C. State Privacy Day January 29, 2008.
A New Framework for Protecting Consumers on the Internet Peter P. Swire Ohio State University & Center for American Progress Center for American Progress.
The Strategy of Using Security to Protect Privacy Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP Data Protection Commissioner.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Dr. Nimrod Kozlovski How we are becoming the A Paradigm shift in on-line policing.
Oklahoma’s Personal Financial Literacy Passport © Oklahoma State Department of Education. All rights reserved. 1 Teacher Presentation Series 9 Standard.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
“Mortgages, Privacy, and Deidentified Data” Professor Peter Swire Ohio State University Center for American Progress Consumer Financial Protection Bureau.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
Protecting the Security of Your Information Mary Beth Richards Federal Trade Commission May 7, 2008.
“Privacy Institutions in the Federal Government” Professor Peter Swire Ohio State University Center for American Progress Silicon Flatirons February 14,
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
The U.S. Approach to Consumer Protection in the Online World U.S. Presentation FTAA Joint Government Private Sector Committee on Electronic Commerce 13th.
Military Sentinel Presentation November 19, 2008 John Krebs, Attorney Consumer Sentinel Network Program Manager Federal Trade Commission.
Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security.
Identity Theft Andrew Schreiber Alex Demetriou Jessica Ferrell.
Cybersecurity Governance in Ethiopia
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Business Law with UCC Applications,13e Criminal Law and Cybercrimes Chapter 5 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All.
Chapter 6 International crime. In this chapter, you will study the concept of international crime. You will be introduced to the main categories of international.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
A Paradigm Shift in Policing – From Law Enforcement to CyberPolicing Nimrod Kozlovski PORTIA Project CS, Yale University April 2005.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
By: Taylor Budwash.. o Identity Theft is the unorganized gain and use of a true person’s identity and personal information for unlawful purpose.
INTERNET SAFETY & POWERFUL PASSWORDS For Grades 3-5 WOLFTEVER CREEK ELEMENTARY.
Police are not prepared for rising incidence of Identity Fraud By Chris DeVito.
Identity Theft By: Michael Jones and Sarah Trent.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
IDENTITY THEFT Nicholas Michalak. Agenda What is Identity Theft? Background of Identity Theft Legislation Against it Different types and Examples What.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Identity Theft How bad people get good credit. Lindsey Bertugli.
©2015 Experian Information Solutions, Inc. All rights reserved. Experian and the Experian marks used herein are trademarks or registered trademarks of.
Oklahoma’s Personal Financial Literacy Passport
Combating Identity Fraud In A Virtual World
To Know what Cyber crime is
#1 Consumer Fraud Complaint – 5th straight year!
Attribution & the globalization of criminal evidence
CHAPTER 33 Cyberlaw.
When you get caught for Identity Theft
Protecting Yourself from Fraud including Identity Theft
Do I Have a RIGHT?.
Preventing Information Technology Crimes
No Cop on the Beat: Underenforcement in E-Commerce and Cybercrime
American Criminal Justice
Identity Theft Samuel H. Slater.
Presentation transcript:

No Cop on the Beat: Underenforcement in E-Commerce and Cybercrime Peter P. Swire Ohio State University & Center for American Progress Silicon Flatirons February 11, 2008

The Puzzle Policy for the next Administration Policy for the next Administration Today grows from ongoing research about the Internet and consumer protection Today grows from ongoing research about the Internet and consumer protection Old paradigm of mostly local enforcement: Old paradigm of mostly local enforcement: Local enforcement, county & state – a cop on the beat Local enforcement, county & state – a cop on the beat Information is local Information is local Punishment & deterrent effects are local Punishment & deterrent effects are local Evidence is local Evidence is local

What Changes on the Internet? Information problem Information problem Commons problem Commons problem Forensic problem Forensic problem Basic answer: non-local answers needed for non-local problems Basic answer: non-local answers needed for non-local problems More federal – FTC (Cmmr. Leibowitz yesterday) More federal – FTC (Cmmr. Leibowitz yesterday) More federated – networks of state AGs More federated – networks of state AGs

The Information Problem Physical world: a cop on the beat Physical world: a cop on the beat A consumer complaint comes in A consumer complaint comes in Honest Amys Used Cars & Shady Sams Used Cars Honest Amys Used Cars & Shady Sams Used Cars Local enforcers have insight/expertise from previous complaints & use discretion Local enforcers have insight/expertise from previous complaints & use discretion

The Information Problem For online commerce, a complaint comes in to the county consumer protection office For online commerce, a complaint comes in to the county consumer protection office Web site typically far away Web site typically far away The county has a tiny fraction of all consumer problems with the site The county has a tiny fraction of all consumer problems with the site The county has weak information for exercising discretion The county has weak information for exercising discretion Likely result is underenforcement Likely result is underenforcement Underenforcement means less enforcement than we would expect/prefer if purely local Underenforcement means less enforcement than we would expect/prefer if purely local

The Commons Problem No commons problem where bad action and victim are local No commons problem where bad action and victim are local Enforcers get credit for stopping local bad guys Enforcers get credit for stopping local bad guys Local victims are protected Local victims are protected Deterrent effects are local Deterrent effects are local

The Commons Problem Online, enforcement incentives change Online, enforcement incentives change Why should I spend my scarce prosecutorial resources when most of the protection goes to victims outside of my jurisdiction? Why should I spend my scarce prosecutorial resources when most of the protection goes to victims outside of my jurisdiction? Deterrence – Id rather prosecute where strong deterrence locally Deterrence – Id rather prosecute where strong deterrence locally Public choice – Id rather prosecute where mostly local people are protected Public choice – Id rather prosecute where mostly local people are protected Let someone else go after them – a classic commons problem -- underenforcement Let someone else go after them – a classic commons problem -- underenforcement

Forensics Problem This problem has been recognized in the literature This problem has been recognized in the literature Its harder to enforce where the evidence is outside of the locality Its harder to enforce where the evidence is outside of the locality Harder to get cooperation from distant officials Harder to get cooperation from distant officials Harder to trace where you dont have compulsory process or other sources Harder to trace where you dont have compulsory process or other sources Result is underenforcement Result is underenforcement

Responses to Underenforcement Information problem Information problem Information sharing: Consumer Sentinel Information sharing: Consumer Sentinel Commons problem Commons problem Cross-border task forces Cross-border task forces Organize around subject matter – ID theft, spam, etc. Organize around subject matter – ID theft, spam, etc. Forensic problem Forensic problem COE Cybercrime Convention for criminal COE Cybercrime Convention for criminal US SAFE WEB Act for FTC US SAFE WEB Act for FTC

Responses to the Problem More generally, recognize the need to match solutions to the scale of the problems More generally, recognize the need to match solutions to the scale of the problems National (and international), so have national solutions National (and international), so have national solutions FTC role for spam, spyware, and other consumer protectionFTC role for spam, spyware, and other consumer protection FTC staffing still far below 1980 levelsFTC staffing still far below 1980 levels Federated – NAAG and other efforts to match geography with the problems Federated – NAAG and other efforts to match geography with the problems

Some Objections The Internet hasnt really changed anything The Internet hasnt really changed anything Enforcement works better on the Internet Enforcement works better on the Internet We dont really want to enforce the law We dont really want to enforce the law States need to be laboratories of experimentation States need to be laboratories of experimentation The Feds dont do small potatoes The Feds dont do small potatoes

Conclusion The paper highlights the information and commons problems that exist for local enforcement and non-local fraud & crime The paper highlights the information and commons problems that exist for local enforcement and non-local fraud & crime Likely need to shift to federal or federated enforcement Likely need to shift to federal or federated enforcement For whatever level of enforcement we want for each type of law, the next Administration should design strategies that address these problems For whatever level of enforcement we want for each type of law, the next Administration should design strategies that address these problems