pls 780 week 9
DESCRIPTION
TRANSCRIPT
![Page 1: Pls 780 week 9](https://reader033.vdocuments.mx/reader033/viewer/2022061112/54571dd9af7959795d8b4ea1/html5/thumbnails/1.jpg)
PLS 780Week 9
![Page 2: Pls 780 week 9](https://reader033.vdocuments.mx/reader033/viewer/2022061112/54571dd9af7959795d8b4ea1/html5/thumbnails/2.jpg)
Security and Cybercrime
• Online crime and computer crime• Cybercrime and law enforcement
![Page 3: Pls 780 week 9](https://reader033.vdocuments.mx/reader033/viewer/2022061112/54571dd9af7959795d8b4ea1/html5/thumbnails/3.jpg)
The problem
• Cybercrime and cybersecurity as a national concern
![Page 4: Pls 780 week 9](https://reader033.vdocuments.mx/reader033/viewer/2022061112/54571dd9af7959795d8b4ea1/html5/thumbnails/4.jpg)
Understanding computer crime: Fraud and ID Theft
• Fraud and identity theft: pharming, spoofing, phishing, malvertising and pretexting
• The FTC records and advises businesses and consumers who have been victims or near victims
![Page 5: Pls 780 week 9](https://reader033.vdocuments.mx/reader033/viewer/2022061112/54571dd9af7959795d8b4ea1/html5/thumbnails/5.jpg)
Understanding computer crime: Privacy invasions
• Spyware• Cookies• Clickstream data analysis• Deep packet inspection• Web bug
![Page 6: Pls 780 week 9](https://reader033.vdocuments.mx/reader033/viewer/2022061112/54571dd9af7959795d8b4ea1/html5/thumbnails/6.jpg)
Understanding computer crime: Cyberbullying, Stalking and harassment
• Increasingly illegal• Societal concerns are clear• What should laws look like?
![Page 7: Pls 780 week 9](https://reader033.vdocuments.mx/reader033/viewer/2022061112/54571dd9af7959795d8b4ea1/html5/thumbnails/7.jpg)
Understanding computer crime: Commercial crimes
• Counterfeit goods• Intellectual property theft• Wrongful registration of a domain name• Hacking to steal trade secrets
![Page 8: Pls 780 week 9](https://reader033.vdocuments.mx/reader033/viewer/2022061112/54571dd9af7959795d8b4ea1/html5/thumbnails/8.jpg)
Capital Records v Thomas-Rasset
• Facts• Issue• Holding• Reasoning• Rule
![Page 9: Pls 780 week 9](https://reader033.vdocuments.mx/reader033/viewer/2022061112/54571dd9af7959795d8b4ea1/html5/thumbnails/9.jpg)
Spam
• Crime against computers, computer systems and users
![Page 10: Pls 780 week 9](https://reader033.vdocuments.mx/reader033/viewer/2022061112/54571dd9af7959795d8b4ea1/html5/thumbnails/10.jpg)
Jaynes v Commonwealth
• Facts• Issue• Holding• Reasoning• Rule
![Page 11: Pls 780 week 9](https://reader033.vdocuments.mx/reader033/viewer/2022061112/54571dd9af7959795d8b4ea1/html5/thumbnails/11.jpg)
Law enforcement and cybercrime
• Technological challenges• Legal challenges
![Page 12: Pls 780 week 9](https://reader033.vdocuments.mx/reader033/viewer/2022061112/54571dd9af7959795d8b4ea1/html5/thumbnails/12.jpg)
US v Wecht
• Facts• Issue• Holding• Reasoning• Rule
![Page 13: Pls 780 week 9](https://reader033.vdocuments.mx/reader033/viewer/2022061112/54571dd9af7959795d8b4ea1/html5/thumbnails/13.jpg)
Operational challenges
• Cybercrime involves complex events with multiplayer conspiracies—difficult to investigate
• Law enforcement is jurisdictionally based• Cybercrime occurs everywhere and nowhere• Different agencies deal with different crimes but
mostly falling under the FBI• Especially ecommerce related crimes
![Page 14: Pls 780 week 9](https://reader033.vdocuments.mx/reader033/viewer/2022061112/54571dd9af7959795d8b4ea1/html5/thumbnails/14.jpg)
FTC v Neovi
• Facts• Issue• Holding• Reasoning• Rule
![Page 15: Pls 780 week 9](https://reader033.vdocuments.mx/reader033/viewer/2022061112/54571dd9af7959795d8b4ea1/html5/thumbnails/15.jpg)
eBay v Digital Point Solutions
• Facts • Issue• Holding • Reasoning• Rule