Cybercrime and the Law
Challenges, Issues, and Outcomes
Publication Year: 2012
Published by: Northeastern University Press
Title Page, Copyright
Introduction: Twenty-First-Century Bonnie and Clyde
The legal, practical, and political issues implicated by cybercrime and other cyberthreats have received a great deal of attention in specialized publications, most of which are directed at corporate or government professionals who work in this area. I continue to be amazed at the extent to...
The term “hacker” and much of what would become hacker culture emerged at the Massachusetts Institute of Technology’s (MIT) Artificial Intelligence Laboratory in the late 1950s. At the time, the only computers were mainframes — behemoths one interacted with via a cumbersome...
2. Malware and DDOs Attacks
Not all cybercrimes are physically carried out by a human being — a cybercriminal. Unlike traditional crimes, certain types of cybercrime can be automated, that is, they can be carried out by computer code that has been created and designed to attack a computer system. This chapter examines...
3. Cybercrimes against Property
Instead of being the target of a cybercrime, a computer can be a tool that is used to commit a cyberanalogue of a traditional crime, such as theft or fraud. In tool cybercrimes, the computer’s role is analogous to either the gun used to rob a bank or the implements a burglar uses to break into a...
4. Cybercrimes against Persons
There are so many ways people can use cyberspace to injure each other it would be impossible to catalog them all in one chapter. Instead, this chapter uses some of the more common, and more egregious, online crimes against persons to illustrate the legal issues that arise in this context. It...
5. Cyber CSI: The Evidentiary Challenges of Digital Crime Scenes
This chapter examines the challenges cybercrime investigations create for law and law enforcement. These challenges arise because cybercrime investigations target conduct in the virtual world of cyberspace, where evidence is amorphous and ephemeral and the lines between public and...
6. Cybercrime Investigations and Privacy
An effective law enforcement reaction is essential to discourage enough prospective offenders from committing crimes that a society will be able to maintain the level of internal order it needs to survive and prosper. Modern law enforcement is, in part, predicated on the premise that potential...
7. Transnational Investigation of Cybercrime
As earlier chapters noted, cybercrime creates many new challenges for law enforcement. Those chapters dealt with challenges that arise under U.S. law and the structure of U.S. law enforcement; they therefore focused primarily on cases in which the commission of the cybercrime occurred...
8. Mutating Cyberthreats: Crime, Terrorism, and War
Crime, terrorism, and war and the distinctions between each are reasonably well defined and reasonably stable in the physical world. The definitional clarity and empirical stability of the real-world threat categories is a function of two factors: One is that the categories evolved as pragmatic...
A professional who works in online finance made the above comment at a meeting of Infragard, an FBI initiative that brings civilian professionals and FBI agents together to collaborate in the battle against cybercrime. His comment reflects the frustration many — if not most — of those who...
Page Count: 248
Publication Year: 2012
OCLC Number: 816818663
MUSE Marc Record: Download for Cybercrime and the Law