did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781594601507

Cybercrime : The Investigation, Prosecution and Defense of a Computer-Related Crime

by ; ; ; ;
  • ISBN13:

    9781594601507

  • ISBN10:

    159460150X

  • Edition: 2nd
  • Format: Paperback
  • Copyright: 2006-03-30
  • Publisher: Carolina Academic Pr

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

List Price: $37.00 Save up to $12.39
  • Rent Book $24.61
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-5 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

"In this expanded edition, Clifford again leads a team of nationally known experts in cybercrime (gathered from the diverse fields of academia, private practice, and U.S. government) to unfold the legal mysteries of computer crime. The book explores the variety of crimes that involve computer technology and provides essential details on procedural and tactical issues associated with the prosecution and defense of a cybercrime. Its insightful writing will be of great interest to criminal prosecution and defense attorneys, law enforcement officers, and students of computer or modern criminal law."--BOOK JACKET.

Table of Contents

Introduction
3(10)
Ralph D. Clifford
Defining Cybercrime: A Review of State and Federal Law
13(84)
Susan W. Brenner
Introduction
14(1)
Cybercrimes: New Crimes or Old Wine in New Bottles?
15(4)
Federal Cybercrime Legislation
19(64)
Cybercrimes Where the Computer Is the Target
20(1)
Hacking, Cracking, Fraud, Virus Dissemination and Extortion
20(9)
Unauthorized Access to Stored Electronic Communications
29(1)
Cybercrimes Involving Improper Communications
30(1)
Sending Obscene, Abusive or Harassing Communications
30(2)
Online Stalking, Harassment and Threats
32(2)
Spam
34(6)
Cybercrimes Involving Minors
40(1)
Sexual Exploitation of Children
40(8)
Sending Offensive Material to Minors
48(3)
Transmitting Information about a Minor
51(1)
Cybercrimes Involving Fraud and Other Traditional Misconduct
51(1)
Mail and Wire Fraud
51(3)
Fraud in Connection with Access Devices
54(4)
Transporting Stolen Property
58(1)
Identity Theft
58(4)
Intellectual Property Crimes
62(1)
Copyright Infringement
62(18)
Trademark Infringement
80(2)
Trade Secret Infringement
82(1)
State Cybercrime Legislation
83(11)
Cybercrimes Where the Computer Is the Target
84(1)
Hacking and Cracking
84(2)
Denial of Service Attacks
86(1)
Cybercrimes Involving Improper Communications
86(1)
Cyberstalking
86(1)
State Spam Laws
87(1)
Cybercrimes Involving Minors
88(1)
Cybercrimes Involving Fraud and Other Traditional Misconduct
89(1)
Computer Forgery
89(1)
Computer Fraud and Theft
90(1)
Computer Extortion
91(1)
Identity Theft
91(1)
Cyberterrorism
91(2)
Miscellaneous Cybercrime Offenses
93(1)
Conclusion
94(3)
The Investigation and Prosecution of a Cybercrime
97(90)
Ivan Orton
Introduction to the Scenarios
99(9)
Case 1---Janet Davis
99(1)
Case 2---Mel Howard
100(1)
Domain Hijacking
100(3)
Massive File Deletions
103(1)
Case 3---Allen Worley
104(4)
Tracing E-mail
108(3)
Obtaining Records from Third Party Record Holders
111(12)
Electronic Communications Privacy Act
112(1)
What Does the ECPA Cover?
112(1)
What Does the ECPA Prohibit?
112(1)
When Is a Disclosure to the Government Allowed?
112(1)
Subscriber or Customer Records
112(1)
Contents of Electronic Communications
113(1)
What Is the Remedy for Violation of this Act?
114(1)
Criminal Liability
114(1)
Civil Liability
114(1)
Suppression
114(1)
Good Faith
115(1)
Practical Issues
115(1)
Limitations of Third Party Records
115(1)
Do the Records Exist
115(1)
Are the Records Useful
116(1)
Do the Records Show What They Purport to Show
117(1)
How to Obtain the Records
117(2)
Contact the ISP and Then Serve the Warrant/Subpoena
119(1)
The Case Scenarios
120(1)
Case 1---Janet Davis
120(1)
Case 2---Mel Howard
120(2)
Case 3---Allen Worley
122(1)
Search Warrants
123(51)
Acquisition of Evidence
124(1)
What Crimes?
124(1)
What Computers?
124(1)
Legal Limits on Searches
125(1)
Federal Constitutional Limits
125(1)
Does the Fourth Amendment Apply to the Situation?
125(1)
Is There a Reasonable Expectation of Privacy?
125(1)
Is Government Action Involved?
126(1)
Searches by Non-Forum, State Law Enforcement
126(2)
Searches by Private Citizens
128(1)
Is There a Legal Warrant?
128(1)
The Application for the Warrant Must Demonstrate Probable Cause to Believe That Evidence of a Crime Will Be Found in the Place to Be Searched
128(1)
Evidence of a Crime
128(1)
Will Be Found in the Place to Be Searched
129(2)
Signed by a Neutral and Detached Magistrate
131(2)
Reasonably Precise in Describing the Place to Be Searched and the Items to Be Seized
133(1)
Other Issues Relating to a Valid Warrant
134(1)
Knock and Announce
134(1)
Take Items in Plain View
135(1)
Good Faith
135(1)
Take Computers off Premises to Search
135(2)
Prompt Execution
137(1)
If There Is Not a Legal Warrant Does the Search Fall within the Exceptions to the Warrant Requirement?
137(1)
Consent
137(1)
Who May Consent?
137(1)
Employers
138(1)
Private Employers
138(1)
Public Employers
139(2)
Parent
141(1)
Spouse
141(1)
Co-user
141(1)
Other
142(1)
Must the Consentor Be Advised of His/Her Right to Withhold Consent
143(1)
Consent May Be Limited and May Be Withdrawn
144(1)
Search Incident to Arrest
144(1)
Exigent Circumstances
145(1)
Inventory
146(1)
Stop and Frisk
146(1)
Mobility
146(1)
Plain View
147(1)
State Constitutional Considerations
148(1)
Statutes
148(1)
Privacy Protection Act
149(2)
Suppression
151(1)
Civil Liability
151(1)
Good Faith
152(1)
State Privacy Statutes
152(1)
Court Rules and Magistrate Imposed Restrictions
152(1)
Court Rules---Time within Which Search Must Be Completed
152(3)
Magistrate Imposed Restrictions
155(1)
Analysis of Evidence
155(1)
At the Search Location
155(1)
Who Should Accompany the Officers Executing the Search?
156(1)
Should an Expert Accompany the Officers?
156(1)
Should a Representative of the Victim Accompany the Officers? But What If the Only Expert Is a Representative of the Victim?
157(2)
What Can Be Seized
159(1)
When to Get an Additional Warrant
160(1)
Offsite/Detailed Analysis
160(1)
Make a Forensic Copy
160(1)
Search/Analysis Protocol
161(2)
What Must Be Returned and When
163(1)
Stipulation
163(1)
What If the Computer Owner Is Not the Suspect?
164(1)
Contraband on Computer
164(1)
Obvious Contraband
164(1)
Suspected Stolen Property---No Irreversible Harm in Returning
165(1)
Suspected Stolen Property---Irreversible Harm in Returning
165(1)
Other Types of Contraband---Passwords, Hacking Programs
165(1)
The Case Scenarios
166(1)
Case 1---Janet Davis
166(1)
Case 2---Mel Howard
167(1)
Case 3---Allen Worley
167(7)
The Use of the Seized Material and the Final Results
174(12)
Case 1---Janet Davis
174(1)
Items Found During the Execution of the Writ
174(1)
Davis' Deposition in the Civil Case
175(1)
The Criminal Case
176(1)
Trial
176(1)
The Appeal
177(1)
The Second Trial
177(2)
Case 2---Mel Howard
179(1)
Comparing the History/Log File Data
179(1)
Comparing JPS Logs with the NT Server Logs
179(1)
The Firewall Logs
180(1)
Howard's History Files
181(1)
Gaps in the Evidence
182(1)
Determining Damages
183(1)
Resolution
183(2)
Case 3---Allen Worley
185(1)
Conclusion
186(1)
Defending Cybercrime Cases: Selected Statutes and Defenses
187(56)
Joseph F. Savage, Jr.
Darlene D. Moreau
Dianna Lamb
Introduction
187(2)
Category 1: Unauthorized Access
189(13)
Computer Fraud and Abuse Act
190(1)
Section 1030(a)(5)
191(1)
Provisions
191(1)
Defenses
192(1)
Intent
192(1)
Lack of Damage under CFAA
193(1)
Penalties
193(1)
Section 1030(a)(2)
194(1)
Provisions
194(1)
Penalties
195(1)
Section 1030(a)(7)
195(1)
Provisions
195(1)
Penalties
195(1)
Section 1030(a)(6)
196(1)
Provisions
196(1)
Penalties
196(1)
Section 1030(a)(4)
196(1)
Provisions
196(1)
Defense: Obtain Anything of Value
197(1)
Penalties
198(1)
Section 1030(a)(3)
198(1)
Provisions
198(1)
Penalties
198(1)
Section 1030(a)(1)
198(1)
Provisions
198(1)
Penalties
199(1)
Electronic Communications Privacy Act
199(1)
The Wiretap Statute
199(2)
Stored Wire and Electronic Communications Act
201(1)
Category 2: Cyberfraud
202(3)
Identity Theft
202(2)
Can-Spam Act
204(1)
Category 3: Intellectual Property Crimes
205(19)
The Economic Espionage Act
205(1)
Overview of the Statute
205(3)
Wide Expansion of Trade Secret Prosecution
208(1)
Defending against Liability under the EEA
209(1)
The Prosecutors' Perspective on Defenses
210(1)
Parallel Development
210(1)
Reverse Engineering
210(1)
General Knowledge
211(1)
First Amendment
212(1)
Practical Considerations
213(1)
The Copyright Act
213(1)
Criminal Copyright Infringement and the NET Act
214(1)
Defenses to Criminal Copyright Infringement
215(1)
Willfulness: The Use Was Authorized
215(1)
Invalidate the Copyright
215(1)
No Infringement
216(1)
First Sale Doctrine
217(1)
Fair Use Doctrine
217(1)
Copyright Misuse
218(1)
Pseudo-Copyright Infringement
219(1)
Trafficking in Counterfeit Labels or Computer Program Documentation or Packaging
220(1)
Unauthorized Fixation of and Trafficking in Sound Recordings and Music Videos of Live Performance
220(1)
Digital Millennium Copyright Act
221(1)
Constitutional Challenges to the DMCA
222(1)
Fraudulent Copyright Notice and Removal of Such Notices
222(1)
False Representation in Application to Register Copyright
222(1)
Child Pornography Prevention Act of 1996
223(1)
General Defenses to Cybercrime Allegations
224(17)
Search and Seizure Issues
224(1)
Introduction
224(1)
Federal Statutory Protection
225(1)
ECPA---Interception of Electronic Communications
225(1)
Accessing Stored Electronic Communications
226(1)
Privacy Protection Act
227(1)
The Fourth Amendment
228(3)
Intermingled Documents
231(1)
Plain View Doctrine
231(2)
Consent Searches
233(2)
Privilege
235(2)
Production of Seized Documents
237(1)
Other Defenses
238(1)
Anonymity
238(1)
First Amendment As a Defense to Computer Crime
239(1)
Entrapment
240(1)
Conclusion
241(2)
International Cybercrime: Recent Developments in the Law
243(36)
Miriam F. Miquelon Weismann
Introduction
244(1)
In Search of a Definition
244(3)
Historical Development of International Law
247(3)
Practical Impediments to International Investigation and Enforcement
250(2)
The Council of Europe Convention on Cybercrime
252(15)
General Principles
252(1)
Summary of Treaty Provisions
253(2)
Application and Analysis of Significant Treaty Provisions
255(1)
Four Basic Definitions
255(2)
Procedural Safeguards
257(1)
Methods of Collecting Evidence
258(4)
Crimes
262(2)
Jurisdiction and Extradition
264(3)
Mutual Legal Assistance Treaties (MLATs) and Other International Cooperation Agreements
267(4)
The PATRIOT Act and Other Federal Legislation
271(2)
Continuing Policy Review by the United Nations
273(1)
The Threat of Organized Crime
274(2)
The Problem of Enforcement between Differing Legal Systems
276(1)
Conclusion
277(2)
Index 279

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program