Cyber Laws

Cyber Crime

Criminal activity in cyberspace.

Remember — All tools can be used maliciously.

Computer Fraud and Abuse Act (CFAA)

Prohibits unauthorized access to certain protected computers of interest to the federal government.

On “Without Authorization” — Because it isn’t always an outsider without authorization committing crime (stereotypical hacker). Sometimes it is someone authorized exceeding their authorization.

Summary of Penalties

ImportantSeven crimes can be prosecuted by the CFAA.

TODO

OffenseSectionSentence
Obtaining National Security Information
Accessing a Comuter and Obtaining Information
Trespassing in a Government Computer
Accessig na Computer to Defraud and Obtain Value
Intentionally Damaging by Knowing Transmission
Recklessly Damaging by Intentional Accesss
Negligently Causing Damange and Loss By Intentional Access
Trafficking in Passwords
???

Wiretap Act

Electronic communicates should be handled by the government in the same way telephone communication is handled.

History

Remember — This applies to any person, not just law enforcement.

Exceptions

  1. Consent of Party: If the interceptor is party to the communication, or one of the parties consents.
  2. Provider Exception: Telecom providers can intercept/disclose/use “information necessary to deliver services”.
  3. Good Faith: There are three “Good Faith” defenses:
    1. Warrant, court order, subpoena, and legislative or statutory authorization.
    2. Request of an investigative or law enforcement officer.
    3. Good faith determination that the act permitted the behavior in question.

Penalties

Other Network Crime Statues

Unlawful Access to Stored Communications

Protects data, email, and voicemail from unauthorized access.

USA-PATRIOT ACT

Greatly expanded government powers in response to the September 11 attacks to allow mass monitoring of civilians.

On Title II: Allows interception of wire/oral/electronic communications to get evidence for (1) specified chemical weapons or terrorism offenses; and (2) computer fraud and abuse. Among other things, allows for:

Also relaxes requirements for permission to surveil, and expands scope of subpoenas of electronic data.

Sunset and FREEDOM ACT:

Taxonomy of Cyber Crime

Classic

TODO Article notes (read articles linked on Canvas).

Fraud (Crimes of Deception)

Content and Substance-Oriented

“The easy, bad, and scary.”

Child Exploitation and Child Pornography

All sexually explicit content is subject to federal regulation.

Remember — Never investigate something yourself, report immediately to NCMEC or FBI.

Warez / Piracy

Pirated copies of proprietary commercial software, typically distributed over the internet after any copyright protection mechanisms have been disabled.

In the same vein as property theft, copyright infringement, piracy, illegal sports streaming, etc.

Digital Evidence and Crime

Digital Evidence: Information stored or transmitted in binary form than is associated with electronic crimes, and it used to prosecute all types of crimes.

???