NLSUI OPAC header image
Amazon cover image
Image from Amazon.com

The law of cybercrimes and their investigations / George Curtis.

By: Publication details: Boca Raton : CRC Press, c2012.Description: xv, 398 p. ; 27 cmISBN:
  • 9781439858318 (hbk.)
Subject(s): DDC classification:
  • 343.09945 CUR 22
LOC classification:
  • KF9350 .C87 2012
Other classification:
  • LAW026000 | LAW041000
Contents:
Table of Contents Section I: Cybercrimes against the Digital Infrastructure and Computer Systems Crimes Involving the Use of Computers Introduction Federal Laws Governing Computer Crimes—Historical Development Federal Laws Governing Computer Crime—18 USC § 1030 Case Applications New York’s Computer Crime Law Key Words and Phrases Review Problems Weblinks Endnotes Information Warfare and Cyberterrorism What Is Information Warfare? Brown Commission Brian C. Lewis Martin C. Libicki Dorothy Denning What Is Cyberterrorism? Laws Regulating Information Warfare and Cyberterrorism Federal Laws State Laws Key Words or Phrases Review Problems Weblinks Endnotes Section II: Cybercrimes against Individuals Crimes against Morality Introduction Obscenity Crimes 18 USC § 1462 18 USC § 1465 18 USC § 1466 18 USC § 1466A 18 USC § 1470 Case Law Pertaining to Online Obscenity Crimes Child Pornography Legislation Legislative History Current Child Pornography Laws 18 USC § 2251: Sexual Exploitation of Children 18 USC § 2252: Certain Activities Relating to Material Involving the Sexual Exploitation of Minors 18 USC § 2252A: Certain Activities Relating to Material Constituting or Containing Child Pornography 18 USC § 2425: Use of Interstate Facilities to Transmit Case Law Pertaining to Online Child Pornography Online Gambling Federal Law State Gambling Laws Key Words and Phrases Review Problems Weblinks Endnotes Crimes Threatening or Resulting in Physical or Mental Harm Introduction Sexual Predator Crimes 18 USC § 2425: Use of Interstate Facilities to Transmit Information about a Minor Cyberstalking and Cyberharassment Legislation Federal Statutes Cases on Cyberstalking and Cyberharassment Judicial Interpretations of Federal Law Key Words and Phrases Review Problems Weblinks Internet Frauds Introduction Auction Fraud Ponzi and Pyramid Schemes Access Device Fraud What Is an Access Device? How Is an Access Device Fraud Committed? Electronic Fund Transfer Fraud Identity Theft and Fraud Identity Theft The Federal Identity Theft Crimes State Identity Theft Laws Cyberlaundering Other Fraudulent Schemes Key Words and Phrases Review Problems Weblinks Endnotes Section III: Crimes against Information Assets, and Data Privacy Data Privacy Crimes Introduction The Fair Credit Reporting Act (FCRA) The Fair and Accurate Credit Transactions Act (FACTA) The Gramm-Leach-Bliley Act (GLBA) The Health Insurance Portability and Accountability Act (HIPAA) After the Breach: Is There a Duty to Notify the Consumer That the Security of Their Data Has Been Compromised? Key Words and Phrases Review Problems Weblinks Endnotes Intellectual Property Fraud Introduction Criminal Copyright Infringement Software Piracy Key Words and Phrases Review Problems Weblinks Section IV: Investigation and Enforcement of Cybercrimes Search and Seizure: Beginning Principles Introduction Constitutional Principles The Fourth Amendment Reasonable Expectation of Privacy Workplace Searches Protection from Government Activity The Mere Evidence Rule Searches with and without a Warrant Consent Plain View Exigent Circumstances Incident to a Lawful Arrest Inventory Search Border Search Administrative Searches Automobile Exception Special Needs Exception Key Words and Phrases Review Problems Weblinks Endnotes Search and Seizure: Electronic Evidence Introduction Conducting the Search or Seizure Searches and Seizures without a Warrant Key Words and Phrases Review Problems Weblinks Wiretapping and Eavesdropping Introduction Statutes and Regulations Case Law Key Words and Phrases Review Problems Weblinks Access to Stored Communications Introduction Case Law Key Words and Phrases Review Problems Weblinks Pen Register, Trap and Trace, and GPS Devices Introduction Pen Register and Trap and Trace Devices Global Positioning Systems (GPSs) RFID Technology Key Words and Phrases Review Problems Weblinks Digital Evidence and Forensic Analysis Introduction Nature of Evidence Admissibility of Evidence Preservation of Evidence Chain of Custody Admissibility of Digital Evidence The Frye Test Frye Plus Daubert Test Expert Opinion Evidence Rules Requiring the Exclusion of Evidence Hearsay Rule Best Evidence Rule Key Words and Phrases Review Problems Weblinks International Issues Involving the Investigation and Prosecution of Cybercrime Introduction Jurisdiction Extraterritorial Application of Criminal Laws International Enforcement and Cooperation Letters Rogatory Mutual Legal Assistance Treaty Extradition Treaty Council of Europe Convention on Cybercrime Key Words and Phrases Review Problems Weblinks References Index.
Summary: "Presenting a broad-based analysis, this volume explores the many aspects of cybercrime as well as its investigation and prosecution. It begins with an overview of the use of computers and other digital devices to commit traditional computer crimes. Next, it examines cybercrimes against individuals, including those involving obscenity, child pornography, sexual predator conduct, online gambling, and cyberstalking. It also explores identify theft and fraud, data privacy crimes, and ponzi schemes. The book includes a section on the investigation of cybercrimes and covers the applicable laws. Each chapter includes key words and phrases, review problems, and weblinks for further study"-- Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
BOOKs BOOKs National Law School 343.09945 CUR (Browse shelf(Opens below)) Available 27591

Includes bibliographical references (p. 375) and index.

Table of Contents
Section I: Cybercrimes against the Digital Infrastructure and Computer Systems
Crimes Involving the Use of Computers
Introduction
Federal Laws Governing Computer Crimes—Historical Development
Federal Laws Governing Computer Crime—18 USC § 1030
Case Applications
New York’s Computer Crime Law
Key Words and Phrases
Review Problems
Weblinks
Endnotes

Information Warfare and Cyberterrorism
What Is Information Warfare?
Brown Commission
Brian C. Lewis
Martin C. Libicki
Dorothy Denning
What Is Cyberterrorism?
Laws Regulating Information Warfare and Cyberterrorism
Federal Laws
State Laws
Key Words or Phrases
Review Problems
Weblinks
Endnotes

Section II: Cybercrimes against Individuals Crimes against Morality
Introduction
Obscenity Crimes
18 USC § 1462
18 USC § 1465
18 USC § 1466
18 USC § 1466A
18 USC § 1470
Case Law Pertaining to Online Obscenity Crimes
Child Pornography Legislation
Legislative History
Current Child Pornography Laws
18 USC § 2251: Sexual Exploitation of Children
18 USC § 2252: Certain Activities Relating to Material Involving the Sexual Exploitation of Minors
18 USC § 2252A: Certain Activities Relating to Material Constituting or Containing Child Pornography
18 USC § 2425: Use of Interstate Facilities to Transmit
Case Law Pertaining to Online Child Pornography
Online Gambling
Federal Law
State Gambling Laws
Key Words and Phrases
Review Problems
Weblinks
Endnotes

Crimes Threatening or Resulting in Physical or Mental Harm
Introduction
Sexual Predator Crimes
18 USC § 2425: Use of Interstate Facilities to Transmit Information about
a Minor
Cyberstalking and Cyberharassment Legislation
Federal Statutes
Cases on Cyberstalking and Cyberharassment
Judicial Interpretations of Federal Law
Key Words and Phrases
Review Problems
Weblinks

Internet Frauds
Introduction
Auction Fraud
Ponzi and Pyramid Schemes
Access Device Fraud
What Is an Access Device?
How Is an Access Device Fraud Committed?
Electronic Fund Transfer Fraud
Identity Theft and Fraud
Identity Theft
The Federal Identity Theft Crimes
State Identity Theft Laws
Cyberlaundering
Other Fraudulent Schemes
Key Words and Phrases
Review Problems
Weblinks
Endnotes

Section III: Crimes against Information Assets, and Data Privacy

Data Privacy Crimes
Introduction
The Fair Credit Reporting Act (FCRA)
The Fair and Accurate Credit Transactions Act (FACTA)
The Gramm-Leach-Bliley Act (GLBA)
The Health Insurance Portability and Accountability Act (HIPAA)
After the Breach: Is There a Duty to Notify the Consumer That the Security
of Their Data Has Been Compromised?
Key Words and Phrases
Review Problems
Weblinks
Endnotes

Intellectual Property Fraud
Introduction
Criminal Copyright Infringement
Software Piracy
Key Words and Phrases
Review Problems
Weblinks

Section IV: Investigation and Enforcement of Cybercrimes

Search and Seizure: Beginning Principles
Introduction
Constitutional Principles
The Fourth Amendment
Reasonable Expectation of Privacy
Workplace Searches
Protection from Government Activity
The Mere Evidence Rule
Searches with and without a Warrant
Consent
Plain View
Exigent Circumstances
Incident to a Lawful Arrest
Inventory Search
Border Search
Administrative Searches
Automobile Exception
Special Needs Exception
Key Words and Phrases
Review Problems
Weblinks
Endnotes

Search and Seizure: Electronic Evidence
Introduction
Conducting the Search or Seizure
Searches and Seizures without a Warrant
Key Words and Phrases
Review Problems
Weblinks

Wiretapping and Eavesdropping
Introduction
Statutes and Regulations
Case Law
Key Words and Phrases
Review Problems
Weblinks

Access to Stored Communications
Introduction
Case Law
Key Words and Phrases
Review Problems
Weblinks

Pen Register, Trap and Trace, and GPS Devices
Introduction
Pen Register and Trap and Trace Devices
Global Positioning Systems (GPSs)
RFID Technology
Key Words and Phrases
Review Problems
Weblinks

Digital Evidence and Forensic Analysis
Introduction
Nature of Evidence
Admissibility of Evidence
Preservation of Evidence
Chain of Custody
Admissibility of Digital Evidence
The Frye Test
Frye Plus
Daubert Test
Expert Opinion Evidence
Rules Requiring the Exclusion of Evidence
Hearsay Rule
Best Evidence Rule
Key Words and Phrases
Review Problems
Weblinks

International Issues Involving the Investigation and Prosecution of Cybercrime
Introduction
Jurisdiction
Extraterritorial Application of Criminal Laws
International Enforcement and Cooperation
Letters Rogatory
Mutual Legal Assistance Treaty
Extradition Treaty
Council of Europe Convention on Cybercrime
Key Words and Phrases
Review Problems
Weblinks

References

Index.

"Presenting a broad-based analysis, this volume explores the many aspects of cybercrime as well as its investigation and prosecution. It begins with an overview of the use of computers and other digital devices to commit traditional computer crimes. Next, it examines cybercrimes against individuals, including those involving obscenity, child pornography, sexual predator conduct, online gambling, and cyberstalking. It also explores identify theft and fraud, data privacy crimes, and ponzi schemes. The book includes a section on the investigation of cybercrimes and covers the applicable laws. Each chapter includes key words and phrases, review problems, and weblinks for further study"-- Provided by publisher.

There are no comments on this title.

to post a comment.