Beruflich Dokumente
Kultur Dokumente
1
2 1 CLASSIFICATION
to commit an act of unlawful violence to a particular in- FBI and many go unreported in order to keep the victim’s
dividual or group”.[16] name out of the public domain. Perpetrators typically use
a distributed denial-of-service attack.[17]
The chief teller at the Park Avenue branch of New York’s pedophile ring Dreamboard. The website had approx-
Union Dime Savings Bank embezzled over $1.5 million imately 600 members, and may have distributed up to
from hundreds of accounts.[22] 123 terabytes of child pornography (roughly equivalent
A hacking group called MOD (Masters of Deception), to 16,000 DVDs). To date this is the single largest U.S.
allegedly stole passwords and technical data from Pacific prosecution of an international child
[25]
pornography ring;
Bell, Nynex, and other telephone companies as well 52 arrests were made worldwide.
as several big credit agencies and two major universi- On March 1, 2011 at Lassiter High School, two students
ties. The damage caused was extensive, one company, were accused of impersonation of a staff member via cy-
Southwestern Bell suffered losses of $370,000 alone.[22] bercrime, but both claimed they were uninvolved. The
In 1983, a nineteen-year-old UCLA student used his PC offense was made a felony in the Cobb County School
to break into a Defense Department international com- District two months after the impersonation had hap-
munications system.[22] pened. Shortly afterwards, the head of the LHS School
Board said “The teacher just wouldn't do this at all”. The
Between 1995 and 1998 the Newscorp satellite pay to case ended on May 9, and no evidence was found.
view encrypted SKY-TV service was hacked several
times during an on-going technological arms race be- April 23, 2013 saw the Associated Press’ Twitter ac-
tween a pan-European hacking group and Newscorp. The count’s hacking to release a hoax tweet about fictional
in the White House that left President Obama
original motivation of the hackers was to watch Star Trek attacks [26]
re-runs in Germany; which was something which News- injured. This erroneous tweet resulted in a brief plunge
corp did not have the copyright to allow.[23] of 130 points from the Dow Jones Industrial Average, re-
moval of $136 billion from S&P 500 index,[27] and the
On 26 March 1999, the Melissa worm infected a docu- temporary suspension of their Twitter account. The Dow
ment on a victim’s computer, then automatically sent that Jones later restored its session gains.
document and a copy of the virus spread via e-mail to
other people.
In February 2000, an individual going by the alias of 3 Combating Computer Crime
MafiaBoy began a series denial-of-service attacks against
high profile websites, including Yahoo!, Amazon.com, A computer can be a source of evidence. Even where
Dell, Inc., E*TRADE, eBay, and CNN. About fifty com- a computer is not directly used for criminal purposes, it
puters at Stanford University, and also computers at the may contain records of value to criminal investigators in
University of California at Santa Barbara, were amongst the form of a logfile. In most countries Internet Service
the zombie computers sending pings in DDoS attacks. Providers are required, by law, to keep their logfiles for
On 3 August 2000, Canadian federal prosecutors charged a predetermined amount of time. For example; a Eu-
MafiaBoy with 54 counts of illegal access to computers, ropean wide directive[28] (applicable to all EU member
plus a total of ten counts of mischief to data for his at- states) states that all E-mail traffic should be retained for
tacks. a minimum of 12 months.
The Russian Business Network (RBN) was registered as Penalties for computer related crimes in New York State
an internet site in 2006. Initially, much of its activity was can range from a fine and a short period of jail time for
legitimate. But apparently the founders soon discovered a Class A misdemeanor such as unauthorized use of a
that it was more profitable to host illegitimate activities computer up to computer tampering in the first degree
and started hiring its services to criminals. The RBN which is a Class C felony and can carry 3 to 15 years in
has been described by VeriSign as “the baddest of the prison.[29][30]
bad”.[24] It offers web hosting services and internet ac-
cess to all kinds of criminal and objectionable activities,
with an individual activities earning up to $150 million in
one year. It specialized in and in some cases monopolized 4 See also
personal identity theft for resale. It is the originator of
MPack and an alleged operator of the now defunct Storm
botnet.
On 2 March 2010, Spanish investigators arrested 3 in in-
fection of over 13 million computers around the world. • Computer trespass
The “botnet” of infected computers included PCs inside • Cyber-
more than half of the Fortune 1000 companies and more
than 40 major banks, according to investigators. • Cyber bullying
In August 2010 the international investigation Operation
• Cyber defamation law
Delego, operating under the aegis of the Department
of Homeland Security, shut down the international • Cyberheist
5
• Cyber terrorism [6] “Cyber Warfare And The Crime Of Aggression: The
Need For Individual Accountability On Tomorrow’S Bat-
• Economic and Industrial Espionage tlefield”. Law.duke.edu. Retrieved 2011-11-10.
• Federal Bureau of Investigation (FBI) [7] “Cyber crime costs global economy $445 billion a year:
report”. Reuters. 2014-06-09. Retrieved 2014-06-17.
• Hacking
[8] See, e.g., Telephone Consumer Protection Act of 1991,
• Immigration and Customs Enforcement (ICE) Do-Not-Call Implementation Act of 2003, CAN-SPAM
Act of 2003.
• Internet homicide
[9] https://en.wikipedia.org/wiki/Phishing
• Internet stalking
[10] “Save browsing”. google.
• Internet suicide [11] “Cyber Crime definition”.
• Internet War [12] “2011 U.S. Sentencing Guidelines Manual §
2G1.3(b)(3)".
• INTERPOL
[13] “United States of America v. Neil Scott Kramer”. Re-
• Legal aspects of computing trieved 2013-10-23.
[17] http://www.ere-security.ca/PDF/Cyberextortion%
• Penetration test
20by%20DoS,%20Risk%20Magazine%20June%
• Personal Jurisdiction over International Defendants 202006.pdf
in US Courts [18] http://www.carlisle.army.mil/DIME/documents/War%
20is%20War%20Issue%20Paper%20Final2.pdf
• Police National E-Crime Unit
[19] Salvador Rodriguez (June 6, 2012). “Like LinkedIn,
• Protected computer eHarmony is hacked; 1.5 million passwords stolen”. Los
Angeles Times.
• Techno-thriller
[20] Rick Rothacker (Oct 12, 2012). “Cyber attacks against
• United States Secret Service Wells Fargo “significant,” handled well: CFO”. Reuters.
• White collar crime [21] DAVID K. LI (January 17, 2012). “Zappos cyber attack”.
New York Post.
[28] Data Retention (EC Directive) Regulations SI 2007/2199 • Robertson, J. (2010, March 2). Authorities bust 3 in
infection of 13m computers. Retrieved March 26,
[29] Kenniff, Raiser. “New York Internet Crimes Laws”. 2010, from Boston News: Boston.com
[30] Computer fraud charges in New York. May 2011. Bukh • Walden, I. (2007) Computer Crimes and Digital In-
Law Firm, PC - 14 Wall St, New York NY 10005 - (212)
vestigations, Oxford: Oxford University Press.
729-1632. New York computer fraud lawyer
• Rolón, Darío N. Control, vigilancia y respuesta pe-
nal en el ciberespacio, Latin American’s New Secu-
6 Further reading rity Thinking, Clacso, 2014, pp. 167/182
• Balkin, J., Grimmelmann, J., Katz, E., Kozlovski, • Wall, D.S. (2007) Cybercrimes: The transformation
N., Wagman, S. & Zarsky, T. (2006) (eds) Cyber- of crime in the information age, Cambridge: Polity.
crime: Digital Cops in a Networked Environment,
• Williams, M. (2006) Virtually Criminal: Crime, De-
New York University Press, New York.
viance and Regulation Online, Routledge, London.
• Brenner, S. (2007) Law in an Era of Smart Technol- • Yar, M. (2006) Cybercrime and Society, London:
ogy, Oxford: Oxford University Press Sage.
• Csonka P. (2000) Internet Crime; the Draft council
of Europe convention on cyber-crime: A response
to the challenge of crime in the age of the internet? 7 External links
Computer Law & Security Report Vol.16 no.5.
• Centre for Cyber Victim Counselling (CCVC)
• Easttom C. (2010) Computer Crime Investigation
and the Law • The American Society of Digital Forensics & eDis-
covery - Cybercrime Information
• Fafinski, S. (2009) Computer Misuse: Response, reg-
ulation and the law Cullompton: Willan • A Guide to Computer Crime from le-
gal.practitioner.com
• Glenny, Misha, DarkMarket : cyberthieves, cyber-
cops, and you, New York, NY : Alfred A. Knopf, • International Journal of Cyber Criminology
2011. ISBN 978-0-307-59293-4
• Virtual Forum Against Cybercrime
• Grabosky, P. (2006) Electronic Crime, New Jersey: • High Technology Crime Investigation Association
Prentice Hall
• Computer Crime Research Center
• Halder, D., & Jaishankar, K. (2011) Cyber crime
and the Victimization of Women: Laws, Rights, and • CyberCrime Asia Research Center - Information
Regulations. Hershey, PA, USA: IGI Global. ISBN about computer crime, Internet fraud and CyberT-
978-1-60960-830-9 errorism in Asia
• Jaishankar, K. (Ed.) (2011). Cyber Criminology: • Information and Research Center for Cybercrime
Exploring Internet Crimes and Criminal behavior. Germany
Boca Raton, FL, USA: CRC Press, Taylor and Fran-
cis Group.
7.1 Government resources
• McQuade, S. (2006) Understanding and Managing
Cybercrime, Boston: Allyn & Bacon. • Cybercrime.gov from the United States Department
of Justice
• McQuade, S. (ed) (2009) The Encyclopedia of Cy-
bercrime, Westport, CT: Greenwood Press. • National Institute of Justice Electronic Crime Pro-
gram from the United States Department of Justice
• Parker D (1983) Fighting Computer Crime, U.S.:
Charles Scribner’s Sons. • FBI Cyber Investigations home page
• Pattavina, A. (ed) Information Technology and the • US Secret Service Computer Fraud
Criminal Justice System, Thousand Oaks, CA: Sage. • Australian High Tech Crime Centre
• Paul Taylor. Hackers: Crime in the Digital Sublime
(November 3, 1999 ed.). Routledge; 1 edition. p.
200. ISBN 0-415-18072-4.
7
8.2 Images
• File:Scale_of_justice_2.svg Source: http://upload.wikimedia.org/wikipedia/commons/0/0e/Scale_of_justice_2.svg License: Public do-
main Contributors: Own work Original artist: DTR
• File:U.S._Navy_Cyber_Defense_Operations_Command_monitor.jpg Source: http://upload.wikimedia.org/wikipedia/commons/d/
d6/U.S._Navy_Cyber_Defense_Operations_Command_monitor.jpg License: Public domain Contributors: http://www.navy.mil/
management/photodb/photos/081203-N-2147L-390.jpg Original artist: Mass Communications Specialist 1st Class Corey Lewis , U.S.
Navy
• File:Wikibooks-logo-en-noslogan.svg Source: http://upload.wikimedia.org/wikipedia/commons/d/df/Wikibooks-logo-en-noslogan.
svg License: CC-BY-SA-3.0 Contributors: Own work Original artist: User:Bastique, User:Ramac et al.