1. Trang chủ
  2. » Ngoại Ngữ

Cybercrime Criminal Threats F - Susan W. Brenner

296 189 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 296
Dung lượng 1,17 MB

Nội dung

Cybercrime Criminal Threats from Cyberspace Susan W Brenner Crime, Media, and Popular Culture Frankie Y Bailey and Steven Chermak, Series Editors Cybercrime Recent Titles in Crime, Media, and Popular Culture Media Representations of September 11 Steven Chermak, Frankie Y Bailey, and Michelle Brown, editors Black Demons: The Media’s Depiction of the African American Male Criminal Stereotype Dennis Rome Famous American Crimes and Trials, Volumes 1–5 Frankie Y Bailey and Steven Chermak, editors Killer Priest: The Crimes, Trial, and Execution of Father Hans Schmidt Mark Gado Cybercrime Criminal Threats from Cyberspace Susan W Brenner Crime, Media, and Popular Culture Frankie Y Bailey and Steven Chermak, Series Editors Copyright 2010 by Susan W Brenner All rights reserved No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, except for the inclusion of brief quotations in a review, without prior permission in writing from the publisher Library of Congress Cataloging-in-Publication Data Brenner, Susan W., 1947– Cybercrime : criminal threats from cyberspace / Susan W Brenner p cm — (Crime, media, and popular culture) Includes bibliographical references and index ISBN 978–0–313–36546–1 (hard copy : alk paper) — ISBN 978–0–313–36547–8 (ebook) Computer crimes Computer networks—Law and legislation I Title HV6773.B75 2010 364.16´8—dc22 2009048693 ISBN: 978–0–313–36546–1 EISBN: 978–0–313–36547–8 14 13 12 11 10 This book is also available on the World Wide Web as an eBook Visit www.abc-clio.com for details Praeger An Imprint of ABC-CLIO, LLC ABC-CLIO, LLC 130 Cremona Drive, P.O Box 1911 Santa Barbara, California 93116-1911 This book is printed on acid-free paper Manufactured in the United States of America Contents Series Foreword vii Chapter Twenty-First Century Twilight Zone: Stalking a Town Chapter From Mainframes to Metaverse: The Origins and Evolution of Cybercrime Chapter Three Categories of Cybercrime 39 Chapter Target Cybercrimes: Hacking, Malware, and Distributed Denial of Service Attacks 49 Chapter Tool Cybercrimes: Fraud, Harassment Murder? 73 Chapter Cyber-CSI: Computer Crime Scene 103 Chapter Beyond War Games: Who Are the Cybercriminals? 121 Chapter Cyber-Law and Order: Investigating and Prosecuting Cybercrime 135 vi • Contents Chapter U.S Law Enforcement: Agencies and Challenges 149 Chapter 10 Global Law Enforcement: Few Agencies, Even More Challenges 163 Chapter 11 Privacy versus Security: Which Trumps? 177 Chapter 12 New Ways to Fight Cybercrime 207 Notes 221 Index 271 Series Foreword This book is an outstanding contribution to the interdisciplinary series on Crime, Media, and Popular Culture from Praeger Publishers Because of the pervasiveness of media in our lives and the salience of crime and criminal justice issues, we feel it is especially important to provide a home for scholars who are engaged in innovative and thoughtful research on important crime and mass media issues It seemed essential to include a book in the series that examined the dynamic nature of cybercrime Many of us have a limited knowledge of the crimes that occur in the world of computers and the Internet, known as ‘‘cybercrimes’’ because they occur in ‘‘cyberspace.’’ These crimes run the gambit from scams and fraud to stalking and even terrorism These crimes have the potential for extraordinary impact on the lives of individuals and on society as a whole Although many people fear street crimes involving face-to-face interactions with violent strangers, they are unaware of the predatory possibilities of an e-mail solicitation Cybercrime is not an altogether new breed of crime As Professor Brenner explains in this book, the crimes carried out by this new breed of criminal often reflect emotions as old as humankind These emotions include greed, obsession, or a desire for revenge What is new is the space in which the crimes are played out The cybercriminal and his or her victim may be only miles apart or a world away from each other Scam artists on another continent can seduce those inclined to avarice into parting with their money An viii • Series Foreword obsessed acquaintance can go into cyberspace and stalk the object of his or her desire Another can seek revenge by assuming the identity of the victim to post photos on a porn site or leave angry or embarrassing messages about the victim on a another site And it can all be done while the cybercriminal sits at his or her computer Cybercrime raises issues of privacy, or rather, the increasing loss of privacy The use of the computer for legitimate activities—from banking and social networking to searches for employment—is a commonplace, almost takenfor-granted aspect of modern life However, the information that we send into cyberspace makes us vulnerable to cybercrime The details of our identities and our activities, once shared online, become accessible to those who would steal and misuse the information From the beginning, as Professor Brenner discusses, cyberspace attracted ‘‘hackers,’’ a breed of outlaw computer whizzes who attacked sites, such as federal agencies, to prove that it could be done These young outlaws sometimes were recruited to develop ways of protecting the sites they had penetrated In recent years, for professional criminals who hack into sites, it has been done for the money that can be made from crimes such as corporate extortion The lack of a sufficient number of law enforcement and security experts trained in detecting and eradicating cybercrime means that organizations and agencies remain at risk from cyberattacks The goal for agencies such as the Federal Bureau of Investigation (FBI) is to reduce, if not eliminate, this risk by capturing the criminals However, the techniques that have been developed to prevent computer intrusions frequently lag behind the ability of cybercriminals to develop a new virus or to carry on their activities beyond the reach of the U.S government The increased risk post-9/11 of a terrorist attack launched in cyberspace is no longer the stuff of science fiction At the same time, there are some issues, such as invasion of privacy of suspects or the censorship of free speech concerns, with which we must deal At what point would such concerns be suspended in pursuit of the cybercriminal? In this book, Professor Brenner provides an accessible and informative exploration of the history of cybercrime, the various categories of cybercrime, and the law enforcement response Drawing on true cases of cybercrime and fictional depictions in popular culture, Professor Brenner tells us what we need to know about the new world created by the expansion of computer technology As she illustrates, although there are reasons for concern about Index abduction, to apprehend international cybercriminals, 147–148, 255n65, 256n67 admissibility of evidence, 109–118 Africa, malware and, 63 ‘‘aggravated hacking,’’ 50 Alba, Louis, 197 Alkahabaz, Abraham Jacob, 89–90 Alvi, Amjad Farooq, 20–21 Alvi, Basit Farooq, 20–21 American Law Institute, Model Penal Code, 78–79, 98–99 American Protective League, 216 antivirus scam, 127, 128 antivirus software, 64 AO Saturn, 43 APEC See Asia Pacific Economic Cooperation Apple II computers, 15; viruses for, 20 apprehension and prosecution, 145–148: cross-border crimes, 141; cyberstalking, 131–132; deterrent effects of being caught, 67–68; for embezzlement, 11; evidence, 141–145; extradition, 53, 145–146; fleeing across state lines, 151, 152; for fraud, 12, 44; for hacking, 23– 25, 26–27, 52–53; Invita case, 136–139, 147; for malware, 22, 32–33, 34–35, 66; for ‘‘phone phreaking,’’14, 23; Port of Houston attack, 104–109; provisional arrest, 249n57; Rome Labs case, 26, 139–141, 144; of SMAK case, 28–29; for unauthorized access to a computer, 101 See also cybercrime law; evidence; investigation; prosecution Arario, Carlos, 43 Arkansas, hacking statutes, 51 armed robbery, 45 ARPANET, 15, 225n44, 225n46, 227n93 arresting suspects See apprehension and prosecution Articles of Confederation (U.S.), 150 Ashley, Paul, 70, 71 Asia Pacific Economic Cooperation (APEC), 174 assault, 244–245n123 assembly, freedom of, 118, 119 assistant U.S attorneys (AUSAs), 154–155 ATF See Bureau of Alcohol, Tobacco and Firearms attempts, criminalization of, 89 attorney general, 154 AUSAs See assistant U.S attorneys 272 aut dedere aut judicare, 146 authenticity of evidence, 109–113 Baker, Jake, 89–90 Baldwin, Chaka, 116–118 banks, ‘‘insider’’ hacking, 50, 56–63, 123–126 Baron, Christopher, 87–88, 97, 98, 99 Barrow, Clyde, 156, 259n64 battery, 244–245n123 Bell, Jaysen, 110 Bevan, Matthew, 27, 140 blackmail: cybercrime law, 80, 81–83; defined, 80; Kentucky statute, 240n45; of online casinos, 69 blackouts (wartime), 218, 269n33 Blaster worm, 65–67 Bonnie and Clyde, 156, 172–173, 175, 259n64 botherders, 42, 64 botnets, 42, 64 bots, 41–42 Boucher, Sebastien, 200–203 Bowater, Alexis, 130 Brain Computer Services (India), 21 Brandeis, Justice Louis, 185–186, 188, 205 Brazil, malware and, 63 Brown v State, 268n22 Brunner, John, 21 Bureau of Alcohol, Tobacco and Firearms (ATF), 152, 153 burglary, cybercriminals as burglars, 50 Caffrey, Aaron, 104–109 California, stalking statute, 92 Canada, Convention on Cybercrime, 209 ‘‘Captain Crunch’’ (hacker), 13, 14, 225n53 casinos: extortion of, 68–70; hacking of, 73–75, 239n4 CCIPS See Computer Crime and Intellectual Property Section chain of custody, evidence, 111–112 Chaudhry, Babir Majid, 82–83 chief prosecutors, 154 child pornography, 112, 247n29, 247n33 China, malware and, 63, 66 • Index CHIP Program See Computer Hacking and Intellectual Property (CHIP) Program circumstantial evidence, 60–61 Citibank theft case, 43–44, 76 civilian strike-back, 212–214 civil rules, 164–165, 169 Clabaugh, Hinton, 159 Clark, Anthony Scott, 70 Cline, James, 93–94 code approach, 62 Code Red worm, 35 Cohen, Fred, 20 Colorado, hacking statute, 65 comity, 142 Commerce Clause (U.S.), 151 common law, 180–181, 199 Commonwealth v McFadden, 58 ‘‘computer contaminant,’’ defined, 64–65 computer crime: on mainframes, 10–13; theft using computers, 43–44, 76–80; unauthorized access to computers, 51, 101 See also cybercrime Computer Crime and Intellectual Property Section (CCIPS), 155 computer extortion, 68–70, 80–81, 223n12 See also extortion and blackmail Computer Fraud and Abuse Act, 22 computer-generated evidence, 115–116 Computer Hacking and Intellectual Property (CHIP) Program, 155 computer incidental cybercrime, 45–47, 103–119 Computer Misuse Act (United Kingdom), 51, 53, 140 computers: computer incidental cybercrime, 45–47, 103–119; use restrictions on, 50; used for theft, 43–44, 76–80; used for unauthorized purpose, 57, 101 computer worms See worms Concept virus, 30, 31 content data, 190 contract approach, 61–63 Convention on Cybercrime, 173, 208– 211, 268n16 conviction, 247n23 Index Cookie Monster hack program, 15, 224n41 Council of Europe, 144, 173, 209 counterfeiting, in U.S Constitution, 150, 151 counties, 258n48 county attorneys, 154 county prosecutors, 190 Court of High Commission, 199 Court of Star Chamber, 199, 263n16 Cowell, Aaron, 114–115 crime: characteristics of, 167–168; defined, 9; as extraordinary, 169; havens, 209–210 crimes against the law of nations, in U.S Constitution, 150, 151, 257n17 criminal homicide, 98–99 criminal justice system (U.S.), 135–156; about, 178; challenges of, 155–156; conviction, 247n23; history of, 149– 153; privacy and, 177–205; prosecution, 154–155; state law vs federal law, 178– 179; twentieth-century expansion of, 151–152; U.S Constitution and, 149– 151 See also apprehension and prosecution; cybercrime law (U.S.); evidence; investigation; prosecution criminal rules, nature of, 165, 169 criminal statutes See cybercrime law criminal trespass, defined, 40, 51 crossing state lines, 151, 152 Cryptologic, 239n4 Curtis, Agent, 201, 203 cyberattacks, retaliatory strike, 213 cybercrime: about, 36–37; categories of, 39–47; defenses against, 208–220; defined, 10; history (1950–1990), 10– 22; history (1990–2009), 23–37; law enforcement model and, 170–172, 208; one-to-many victimization in, 170; prevention of, 217–218; profiles of cybercriminals, 121–133; real-world crime vs., 167–168, 261n18; United Nations on, 174; victim self-help, 212–214 See also computer incidental cybercrime; target cybercrimes; tool cybercrimes cybercrime law (international): abduction of suspects, 147–148, 255n65, 256n67; • 273 arresting suspects, 145–148; enforcement, 163–176; on exceeding authorized access, 56; executive agreement, 143– 144; extradition, 53, 145–146; global policing, 173–176, 208–211; on hacking, 51, 56; informal cooperation, 144–145; letters rogatory, 141, 142–143; on malware, 34–35; mutual legal assistance treaties (MLATs), 143; Philippines, 34–35; United Kingdom, 51 cybercrime law (U.S.): about, 49; admissibility of evidence, 109–118; American Law Institute Model Penal Code, 78–79, 98–99; authenticity of evidence, 109–113; on blackmail, 80, 81–83; chain of custody, 111–112; on data theft, 76–78, 86; deterrent effects of being caught, 67; Distributed Denial of Service (DDoS) attacks, 68–71, 104– 109; on exceeding authorized access, 59– 60; on extortion and blackmail, 80–83; Federal Rules of Evidence, 109, 113; on fraud, 83–88; on hacking, 40, 50–63; hearsay evidence, 113–118; on malware, 40, 63–68; on murder, 100–102, 245n128; privacy vs security, 177–205; on stalking and harassment, 92–96, 97, 100; on suicide, 98–100; on theft of information, 77; on theft of services, 78, 224n28; on threats, 88–91; on tool cybercrimes, 73–102; on unauthorized access to computers, 51, 101 See also apprehension and prosecution; evidence; investigation; prosecution cybercrime treaty, 144 cybercriminals: fraudsters, 126–128; hackers, 121–123; insiders, 123–126; stalkers, 128–132 cyber-extortion See extortion and blackmail cyber-murder See murder cyberstalking See stalking damage, from hacking, 55–56 D’Andrea, Kendra, 194–195 ‘‘Dark Dante’’ (hacker), 18–19 ‘‘Datastream Cowboy,’’ 26–27, 140, 144 274 data theft, 76–78, 86 DDoS attacks See Distributed Denial of Service (DDoS) attacks DEA See Drug Enforcement Administration death, use of cyberspace to cause, 98–102, 245n128 de Guzman, Onel, 34, 35 Delaware: harassment statute, 93; theft statutes, 78 Dellapenta, Gary, 131–132 delusional fixation stalking, 130 Department of Justice (U.S.) See United States Department of Justice digital evidence, 114–118, 157–158 digital property, theft of, 76–78 direct evidence, 60 Distributed Denial of Service (DDoS) attacks, 41–42; extortion of online casinos and, 68–70; law and, 68–71, 268n24; Port of Houston attack, 104– 109, 246n3; retaliatory strike, 213; strike-back techniques, 211–214 district attorneys, 154 Draper, John, 13, 14 Drew, Lori, 100 drop site, 64 Drug Enforcement Administration (DEA), 152, 153 Dyer Act (U.S.), 151, 152 eavesdropping, 183 See also wiretapping Echouafni, Jay, 70–71 electronic sanctions, 211 Elk Cloner (virus), 20 e-mail: encryption of, 190–192, 198, 265n68, 265n69; privacy of, 189–194, 204, 265n68, 265n69, 266n70, 266n73, 266n77; stored, 192–194, 266n77 embezzlement: insider hacking, 125; mainframe crime, 11–12, 223n15 en banc procedure, 193–194 encryption, of e-mail, 190–192, 198, 265n68, 265n69 English common law, 199 Equity Funding Corporation of America, computer fraud at, 12 • Index Esquire, ‘‘phone phreaking’’ article, 14 Europe, global policing initiatives, 144, 173–176 Europol, 262n34 evidence: admissibility of, 109–118; authenticity of, 109–113; chain of custody, 111–112; circumstantial evidence, 60–61; computer-generated evidence, 115–116; digital evidence, 114–118, 157–158; direct evidence, 60; Federal Rules of Evidence, 109, 113; hearsay, 113–118; mutual legal assistance treaties (MLATs), 143; state statutes on, 109; transnational cybercrime, 141–148 See also apprehension and prosecution; cybercrime law; investigation; prosecution ‘‘exceeding authorized access’’ crimes, 50, 56–63 executive agreement, 143–144 Ex parte Jackson, 182–183, 190, 193 ex-partner stalking, 129 expectation of privacy, password protection and, 195–196 exploit code, 65 extortion and blackmail: cybercrime law, 80–83, 223n12; defined, 80; Invita case, 136–139, 147; of online casinos, 68–70 extradite to prosecute principle, 147 extradition, 53, 145–146 fake antivirus site, 127 Federal Bureau of Investigation (FBI), 152, 153 Federal Emergency Management Agency (FEMA), phone hacking of, 30 federal justice system See apprehension and prosecution; criminal justice system (U.S.); cybercrime law; evidence; investigation; prosecution federal magistrate judges, 267n105 federal officers, 258n43 federal prosecutors, 154 Federal Rules of Evidence, 109, 113 Felter, Stanley, 112 Fifth Amendment: about, 199; Index self-incrimination, 118, 119, 179, 180, 199–203 financial information, privacy of, 190 financial institutions, ‘‘insider’’ hacking, 50, 56–63, 123–126 First Amendment rights, 91, 118, 119 Fisher, Mark, 87, 97, 99 Fisher v United States, 201–202 flash worm, 35 fleeing across state lines, 151, 152 Florida, on digital evidence, 116 414s (hackers), 15–16 419 fraud, 83–85 Fourth Amendment: Brandeis on, 186; computer technology and, 189–199; on e-mail privacy, 189–194; on search and seizure, 118, 119, 179, 180–183; on warrants, 204; on Web posting privacy, 194–196, 204; on Web transactions, 196–199 fraud: about fraudsters, 126–128; computer crime as, 12; cybercrime law, 83–88; defined, 42; 419 fraud, 83–85; hacking of online casinos, 74–75; identity theft, 85–88; using telephone, 42–43 freedom of assembly, 118, 119 freedom of speech, 91, 118, 119 Fugarino v State, 59–66 Fugitive Felon Act (U.S.), 151 G8 States (Group of 8), on cybercrime, 174 Gala Coral, 69 Gammima.AG, 36 Gembe, Axel, 70, 71 Georgia, hacking statute, 59, 60 global cybercrime See cybercrime law (international); transnational cybercrime global law enforcement, 173–176, 208–211 global policing, 173–176 Godin, Cori, 85–87 Gonda, Arthur, 89, 90 Gorshkov, Vasiliy, 137 Great Hacker Wars (1990–1991), 17 ‘‘grey hat’’ hackers, 226n58 Haager, J.H., 159 • 275 ‘‘hack-back’’ techniques (‘‘hacking back’’), 268n12 hackers, 121–123; sport hackers, 27, 121 hacking: about hackers, 121–123; ‘‘aggravated hacking,’’ 50; attitude toward, 53–56; burglary, 50; criminal trespass and, 40; ‘‘exceeding authorized access’’ crimes, 50, 56–63; ‘‘grey hat’’ hackers, 226n58; history (in 1990s), 14– 20, 23–29; impact of, 52, 55–56; ‘‘insider’’ hacking, 50, 56–63, 123–126; laws on, 50–63; of online casinos, 74– 75; ‘‘outsider’’ hacking, 51–56, 60; ‘‘phone phreaking’’ and, 13–14, 23, 29– 30, 223n26; for profit, 28–29; ‘‘simple’’ hacking, 50; sport hackers, 27; as theft, 74; as trespass, 40, 50 ‘‘hacking back’’ (‘‘hack-back’’ techniques), 268n12 harassment: criminalization of, 92; cybercrime law, 92–96, 97, 100 See also stalking ‘‘hard’’ harm vs ‘‘soft’’ harm, 88 Harlan, Justice John, 187, 188 harm: in computer crime, 45, 73; crimes involving psychological harm, 88–98; from hacking, 52, 55, 56; ‘‘hard’’ harm vs ‘‘soft’’ harm, 88 havens, 209–210 Hawthorne Brooke School (MA), cyberterrorism in, 5–7, 221n3 hearsay evidence, 113–118 Heileman, James, 57 Hess, Markus, 16 Hobbs Act, 81 Hunold, Christian, 5–7, 37, 221n3, 222n4 IBM PCs, viruses for, 21 ICE See United States Immigration and Customs Enforcement identity crimes See identity theft; imposture identity theft, 85–88 impersonation, 98 imposture, 97 inchoate crime, 89, 92 India, malware and, 63 276 Indiana, harassment statute, 96 infatuation stalking, 129 ‘‘insider’’ hacking, 50, 56–63, 123–126 Intel Supercomputer Systems Division (SSD), data theft from, 76–78 international cybercrime See transnational cybercrime International Space Station, virus on computers, 36 International Telecommunications Union (ITU), 174 Internet relay chat (IRC), 246n9 ‘‘Internet time,’’ 230n144 INTERPOL, 174–175 interstate commerce, 242n75 investigation, 155; challenges of, 104–119; digital evidence, 114–118, 157–158; by federal agencies, 152–153; history of U.S criminal justice system, 149–153; international cases, 135–141 See also apprehension and prosecution; cybercrime law; evidence; prosecution Invita case, 136–139, 147 Iowa, on hearsay evidence, 114 IP address, 104 IRC See Internet relay chat Irizarry v United States, 90 ITU See International Telecommunications Union Ivanov, Alexey, 137 Jackson case, 182–183, 190, 193 Japan, Convention on Cybercrime, 209 Justice Department (U.S.) See United States Department of Justice JusticeFiles.org, 90–91 Kansas, blackmail statutes, 82 Katona, Thomas, 84 Katz, Charles, 186–187, 188, 191, 193, 194, 195, 204 Kentucky, blackmail statute, 240n45 Khan, Omar, 122 kidnapping: to apprehend international cybercriminals, 147–148; Lindbergh Act, 151 Kim, Sungkook, 82 • Index Korean Atomic Research Institute, hacking of, 26 Korolkov, Evgeni and Erina, 43–44 Kuji, 26, 27, 140, 144 law enforcement, 135–156; challenges of, 155–156; global initiatives, 173–176; increased number of officers, 214–215; professional policing model, 167, 171; strike-back techniques, 211–214; wiretapping for, 183–189 See also apprehension and prosecution; cybercrime law; evidence; investigation; policing; prosecution law enforcement model: cybercrime and, 170–172, 208; defined, 167–170; new approaches to, 215–219 law enforcement officers, 154, 157–159 League of Arab States, 174 leeching, 239n20 Legion of Doom, 17, 226n61 legislation See also cybercrime law letters rogatory, 141, 142–143 Levin, Vladimir, 43, 44, 76 libel, seditious, 263n21 Lightman, David, 122 Ligon, Joelle, 129 Lilburne, John, 199 Lindbergh Act (U.S.), 151 London Metropolitan Police, 166–167 lotteries, U.S mail for, 257n19 ‘‘Love Bug’’ virus, 33–34 macro virus, 30 mail fraud scams, 128 mainframe crimes, 10–13, 54–55, 222n7 mainframes, history of, 10, 222n3 malware: about, 227n90; business aspects of, 63–64; history of, 35–36; laws on, 63–68; legality of creating, 64, 68; ransomware, 232n168; vandalism laws and, 40–41 See also viruses; worms malware writers, 64, 65, 66, 68 Marshall, Justice John, 189, 198 Massachusetts, child pornography, 222n4 Massachusetts Institute of Technology Artificial Intelligence Laboratory, 14–15 Index Masters of Deception, 17 MATRIX project, 198 McCord, Michelle, 116–118 McDonough, Patricia, 187–188 McFadden, Gina, 58–60, 62 McGuire, Melanie and William, 46 McIntyer v State, 268n22 McKinnon, Gary, 51–53, 55, 146, 147 Megazoid, 44 Meier, Megan, 99–100 Melissa virus, 31–32 mens rea, 60 Metropolitan Police (London), 166–167 Mexico, malware and, 63 Michigan, stalking statute, 93, 243n100 MicroPatent, extortion attempt against, 80–81 Microsoft Corp., 66, 237n69, 237n70 ‘‘mirror port,’’ 197 Missouri: child pornography, 222n4; stalking statute, 92–93, 243n100 Mitnick, Kevin, 23–26 MLATs See mutual legal assistance treaties Model Penal Code, 78–79, 98–99 Moning, Matthew, 56–57, 61 Moore, Robert, 29, 30, 229n133 Morris, Robert, 21–22, 22, 228n102 Morris worm, 21–22, 228n98, 105 motor vehicles, as tool of law enforcement, 159 Mr X case, 94–96, 97, 244n116 murder, cybercrime law, 100–102, 245n128 mutual legal assistance treaties (MLATs), 143 NASA: hacking and, 52, 53; virus on computers, 36 National Prohibition Act, 184 National Stolen Property Act (U.S.), 151 The Net (movie), 26 New Jersey, hacking prosecution in, 52, 53 Nigerian fraud scam, 83–85 Nimda virus, 35 nonsexual physical injury, 98 Norman, Dawn, 58–60 • 277 OAS See Organization of American States OECD See Organisation for Economic Co-operation and Development Olmstead, Roy ‘‘Big Boy,’’ 184–186, 204 one-to-many victimization, in cybercrime, 170 online casinos: extortion of, 68–70; hacking of, 73–75, 239n4 online fraud See fraud online monitoring, 196 online scams, 127–128 online stalking See stalking operating systems, 233n7 Orbit Communication Corp., 70–71 order, in society, 163–164, 207–208 Oregon, data theft case, 76–78 Organisation for Economic Co-operation and Development (OECD), 173 Organization of American States (OAS), 174 ‘‘outsider’’ hacking, 51–56, 60 pacemaker, lack of security protection for, 101–102 packet sniffer, 28 Palin, Sarah, hacking of, 249n5 Parmelee, Allan, 93 Parson, Jeffrey Lee, 65, 66 password protection, expectation of privacy and, 195–196 password sniffer programs, 26, 27, 36, 139 password theft, ‘‘Love Bug’’ virus, 33, 34 patterns, as characteristics of crime, 168, 261n22 Peel, Sir Robert, 166 Pena, Edwin, 29–30, 229n133 perpetrator, in crime, 167 personal property, 232n4 persons, crimes against, 88–102 Pervading Animal (virus), 20, 227n3 Philippines, computer crime laws in, 34–35 phone See telephone ‘‘phone phreaking,’’ 13–14, 23, 29–30, 223n26 ‘‘phreaking.’’ See ‘‘phone phreaking’’ 278 physical constraints, as characteristic of crime, 168 physical harm, cybercrimes involving, 98–102 PIERS database, 57 Pike, Officer, 200–201 piracy, in U.S Constitution, 150, 151 police: equipped for cybercrime, 159–160; training for digital evidence, 158, 259n66 police departments: dealing with digital evidence, 157–159; hacking incidents against, 56–57, 58–60 policing: global policing, 173–176; history of, 165–167; increased number of officers, 214–215; privacy and, 177–205; professional policing mode, 167, 171 Port of Houston attack, 104–109, 246n3 Poulsen, Kevin, 18–19, 20, 226n69, 226n73, 227n84 privacy: constitutional guarantees of, 118– 119; of e-mail, 189–194, 204, 265n68, 265n69, 266n70, 266n73, 266n77; security vs., 177–205; U.S Constitution on, 118, 119, 177, 179, 180; U.S mail and, 182–183, 190, 265n69; of Web postings, 194–196, 204; of Web transactions, 196–199; wiretapping and, 183–189 professional policing model, 167, 171 Prohibition, Olmstead case, 184–186 property, crimes against, 75–88 prosecute locally, 146–147 prosecution: challenges of, 104–119, 155; federal prosecutions, 154; Trojan horse defense, 106–109, 247n29, 247n33; U.S Department of Justice, 154–155 See also apprehension and prosecution; cybercrime law; evidence; investigation prosecutors, 154–155, 159, 160 protection racket, 70 provisional arrest, 249n57 proximity, characteristic of crime, 167 Pryce, Richard, 27, 140 psychological harm, cybercrimes involving, 88–98 • Index ransomware, 232n168 rape, 98 Rapid Satellite, 70, 71 RBN See Russian Business Network real property, 232n4 real-world crime, characteristics of, 167– 168, 261n18 Reidenberg, Joel, 211 retaliatory strike, 213 Ribicoff, Abraham, 12, 223n17 Rome Air Development Center (NY), attacks on, 26, 139–141 Russia: on abduction, 256n67; as ad hoc cybercrime haven, 210; Convention on Cybercrime, 209; Invita case, 136–139, 147; malware and, 63 Russian Business Network (RBN), 69–70 Russian mafia, 44 Rymer, Dominic, 101 sadistic stalking, 131 Salgado, Carlos Felipe, Jr., 28–29 Sasser worm, 35 SCA See Stored Communications Act scale, characteristic of crime, 167 scams, 127–128 Schaeffer, Rebecca, 92 The Shockwave Rider (Brunner), 21 search and seizure, 118, 119, 180–183 search warrants, Fourth Amendment and, 204 Secret Service (U.S.), 152, 153 security, privacy vs., 177–205 seditious libel, 263n21 self-incrimination, 118, 119 serial crime, 167 Sheehan, William, 90, 91 Shimomura, Tsutomu, 24 ‘‘simple’’ hacking vs ‘‘aggravated hacking,’’ 50 Skrenta, Rich, 20 Slammer (worm), 35 SMAK case, 28–29 Smith, Alexander Eric, 78 Smith, David L., 32–33, 36, 230n146, 231n152 Index Smith, Michael Lee, 187–188, 193, 197, 198, 205 ‘‘Smith, Val,’’ 11, 223n13 Sneakers (movie), 14 society: order in, 163–164, 207–208; policing in, 165–167 SODDI defense, 106–108 ‘‘soft’’ harm vs ‘‘hard’’ harm, 88 South Africa, Convention on Cybercrime, 209 Spears, Janelia, 84 speech: First Amendment rights, 91; freedom of, 91, 118, 119 sport hackers, 27, 121 Stafford v State, 268n22 stalking: about stalkers, 128–132; cybercrime law, 92–96, 97, 100; types of, 128–132 See also harassment Star Chamber, 199, 263n16 state cybercrime statutes: about, 49, 88; admissibility of evidence, 109; malware prosecutions, 236n62 See also and under individual state names; cybercrime law (U.S.) state law: privacy statutes, 179–180; vs federal law, 178–179 states: criminal justice systems, history of, 150, 151; state law vs federal law, 178–179 state’s attorneys, 154 states’ rights, U.S Constitution, 178 State v Baron, 87–88, 97, 98, 99 State v Bell, 110 State v Moning, 56–57, 61 State v Parmelee, 93 State v Schwartz, 76 Stationers’ Company, 263n16 statutes See cybercrime law stolen property statutes, 151 Stored Communications Act (SCA), 192–193 stored e-mail, 192–194, 266n77 strike-back techniques, 211–214 subpoena, Fifth Amendment response to, 200 suicide, cybercrime law, 98–100 Sutton, Willie, 29 • 279 Swanson v Livingston County, 251n47 Sweden, 243n86 t33kid, 65 target cybercrimes, 39–42, 49 See also Distributed Denial of Service (DDoS) attacks; hacking; malware ‘‘telephone hacking,’’ 29 telephones: ‘‘phone phreaking,’’ 13–14, 23, 29–30, 223n26; privacy of phone calls, 192, 203; theft of services, 225n56; wiretapping, 183–189 Tenth Amendment, 178 Tereshchuk, Myron, 80–81 theft: armed robbery, 45; computers used for, 43–44, 76–80; data theft, 76–78, 86; defined, 42, 45, 78; of digital property, 76–78; extortion, 68–70, 80– 81, 223n12; hacking and, 74; identity theft as form of, 86; of information, 77; of services, 14, 78; zero-sum theft, 76, 77 theft of services, 14, 78, 224n28, 225n56 Thomas, Steven, 116 Thomas v State, 116–118 threats, cybercrime law, 88–91 Three Days of the Condor (movie), 23 Title III, 191–192, 266n73 tool cybercrimes, 42–44; against persons, 88–102; against property, 75–88; causing physical harm, 98–102; causing psychological harm, 88–98; extortion and blackmail, 68–70, 80–83, 223n12; 419 fraud, 83–85; fraud, 83–88; hacking casinos, 73–75, 239n4; identity theft, 85–88; murder, 100–102, 245n128; stalking and harassment, 92– 96, 97, 100; suicide, 98–100; theft, 76– 80; threats, 88–91 Townsend (MA), cyberterrorism in, 5–7, 221n3 traffic data, 190 transnational cybercrime: abduction of suspects, 147–148, 255n65, 256n67; about, 172; arresting suspects, 145–148; evidence, 141–148; executive agreement, 143–144; global law enforcement, 280 173–176, 208–211; informal cooperation, 144–145; Invita case, 136–139, 147; letters rogatory, 141, 142–143; mutual legal assistance treaties (MLATs), 143; Rome Labs case, 26, 139–141, 144 See also cybercrime law (international) treason, in U.S Constitution, 150, 151 trespass: defined, 40, 51; hacking and, 40, 50 Trojan horse defense, 106–109, 247n29, 247n33 Turner, Renee, 93–94 tything system, 166 UFOs, McKinnon on, 52 Ukraine, fraud operation based in, 126– 127, 251n31 unauthorized access to computers, 51, 101 unauthorized purpose, 57 United Kingdom: Computer Misuse Act, 51, 53, 140; conviction, 247n23; extradition, 146; history of policing, 166; McKinnon hacking case, 53; Port of Houston attack, 104–109, 246n3; stalking case in, 130–131 United Nations: Convention on Cybercrime, 209; on cybercrime, 174 United States: about, 178; Articles of Confederation, 150; Commerce Clause, 151; Convention on Cybercrime, 209; criminal justice system in, 149–153; federal agencies, 152–153; hacking of government computers, 26, 52, 139– 141 See also apprehension and prosecution; cybercrime law (U.S.); evidence; investigation; prosecution United States Constitution: First amendment, 91, 118, 119; Fourth Amendment, 118, 119, 179, 180–183, 189–199; Fifth Amendment, 118, 119, 179, 180, 199–203; Tenth Amendment, 178; Eighteenth Amendment, 184; about, 178; amending, 180; crimes specified in, 150–151; on freedom of assembly, 118, 119; on freedom of • Index speech, 91, 118, 119; history of, 150– 151; on privacy, 118–119, 177, 179, 180; on self-incrimination, 118, 119; on unreasonable search and seizure, 118, 119, 182–183 United States Department of Justice, 154– 155; Computer Crime and Intellectual Property Section (CCIPS), 155; Computer Hacking and Intellectual Property (CHIP) Program, 155; Convention on Cybercrime, 209; prosecutors, 154 United States Immigration and Customs Enforcement (ICE), 152–153 United States Secret Service, 152, 153 United States v Abraham Jacob Alkhabaz a.k.a Jake Baker, 89–90 United States v D’Andrea, 194–195 United States v Forrester, 197 United States v Jackson, 110–111 United States v Jacobsen, 195 UNIVAC mainframes, 10, 20 unreasonable search and seizure, 118, 119, 180–183 U.S attorneys, 154 U.S Constitution, crimes against the law of nations, 150, 151, 257n17 use restrictions, on computers, 50 U.S mail: for lotteries, 257n19; privacy, 182–183, 190, 191, 265n68 ‘‘vampire’’ worm, 21 vandalism, malware and, 40 VicodinES, 32 victimization: in cybercrime, 170; in real-world crime, 167–168, 169 Virginia, hacking prosecution in, 52, 53 viruses: about, 20–21, 236n61; history of, 30–31; macro virus, 30 Walker, John, 20 Walker, Lee, 70, 71 wardialing, 225n53 War Games (movie), 14, 16–17, 25, 26, 28, 53, 122 warrants, Fourth Amendment and, 204 Warshak, Steven, 192–194 Index Washington, computer trespass statute, 233n5 WeaKnees, 70, 71 Web postings, privacy of, 194–196, 204 Web transactions, privacy of, 196–199 Where Wizards Stay Up Late: The Origins of the Internet (Hafner and Lyon), 225n44 Willie Sutton effect, 29, 35, 83, 127, 128, 172 wire fraud, ‘‘phone phreaking’’ and, 14 wireless freeloading, 78, 79–80 wireless piggybacking, 239n20 wiretapping, 183–189 • 281 Wisconsin: identity theft statute, 87–88; impersonation statute, 98 worms: defined, 21, 31; ‘‘vampire’’ worm, 21 Wyss, John, 112–113 Xerox, benign worms developed by, 21 XFocus, 65 Yontz, Lawrence, 57–58 Zepp, Natalie, 116–118 zero-sum theft, 76, 77 ‘‘zombies,’’ 41 About the Author SUSAN W BRENNER is the NCR Distinguished Professor of Law and Technology at the University of Dayton School of Law She has published numerous articles on cybercrime and has spoken at cybercrime conferences around the world ... www.abc-clio.com for details Praeger An Imprint of ABC-CLIO, LLC ABC-CLIO, LLC 130 Cremona Drive, P.O Box 1911 Santa Barbara, California 9311 6-1 911 This book is printed on acid-free paper Manufactured... neighbor was a 19-year-old paraplegic from Smithville, Missouri: Christian Hunold.3 Hunold’s mother was the chief financial officer for a local school district; his father was a retired high-school teacher... ever—and 22 of its officers and employees were convicted of federal criminal charges.20 While embezzlement and fraud were the most common crimes, employees found other ways to profit from their

Ngày đăng: 31/05/2017, 15:05

TỪ KHÓA LIÊN QUAN

w