图书介绍

CYRER CRIME AND DIGITAL EVIDENCE MATERIALS AND CASESPDF|Epub|txt|kindle电子书版本网盘下载

CYRER CRIME AND DIGITAL EVIDENCE MATERIALS AND CASES
  • THOMAS K.CLANCY 著
  • 出版社: LEXISNEXIS
  • ISBN:
  • 出版时间:2011
  • 标注页数:661页
  • 文件大小:36MB
  • 文件页数:679页
  • 主题词:

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

CYRER CRIME AND DIGITAL EVIDENCE MATERIALS AND CASESPDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

Chapter 1 INTRODUCTION1

Chapter 2 OBTAINING DIGITAL EVIDENCE: AN INTRODUCTION7

2.1 ANALYTICAL STRUCTURE OF FOURTH AMENDMENT QUESTIONS8

1. Applicability8

2. Satisfaction11

3. Remedies11

4. Independent State Grounds12

2.2 INTRODUCTION TO THE STATUTORY FRAMEWORK12

2.3 A CASE STUDY: MAJOR STEPS IN A TYPICAL INTERNET INVESTIGATION13

United States v. Steven C. Perrine13

Notes19

Chapter 3 FOURTH AMENDMENT APPLICABILITY: "INSIDE THE BOX"21

3.1 EXPECTATION OF PRIVACY ANALYSIS21

1. In General21

2. The Location of the Computer21

3. Data on Work Computers—Governmental Employer22

4. The Supreme Court Avoids the Issue23

Notes29

5. Emails on Work Computer29

Robin Brown-Criscuolo v. Robert K. Wolfe29

State v. Eric M. Young32

Notes34

3.2 PRIVATE SEARCHES AND SEIZURES35

1. In General35

2. Who is a Government Agent35

3. Replication and "Context" Issues: Defining the "Container"37

Questions and Comments41

People v. Joseph Michael Wilkinson44

Notes47

Chapter 4 COMPETING VIEWS OF THE NATURE OF DIGITAL EVIDENCE SEARCHES49

4.1 INTRODUCTION49

4.2 PLAIN VIEW DOCTRINE50

1. Distinguishing Merely Looking53

United States v. Artem Bautista David53

2. "Immediately Apparent"54

United States v. Devin C. Wilson54

Notes56

3. Opening Closed Files: The Document Approach57

United States v. Montgomery Johns Gray57

Notes and Questions60

4. Opening Closed Files: The Special Approach61

5. Independent State Grounds: Inadvertence and File Names62

Larry R. Frasier, Jr. v. State62

Questions65

4.3 DOCUMENT SEARCHES65

1. Data Are Forms of Records/Container Analogy66

United States v. Curtis Robert Williams69

2. Rejection of the Document Search and Container Analogy: A "Special Approach"74

United States v. Michael Clay Payton76

People v. Robert Carratu81

Notes and Questions83

Notes and Questions87

Notes and Questions89

4.4 LIMITATIONS BASED ON SEARCH EXECUTION PROCEDURES IN WARRANTS89

1. Supreme Court Opinions on Execution Procedures89

2. Search Protocols—Digital Evidence Cases90

a. Rejecting Protocol Requirement90

United States v. Brent Ray Brooks90

b. Taint Teams and Special Masters91

Donald F. Manno v. Christopher J. Christie91

c. The Special Approach94

United States v. Comprehensive Drug Testing, Inc94

Notes107

Chapter 5 WARRANTS FOR DIGITAL EVIDENCE: PARTICULARITY CLAIMS AND BROAD SEIZURES109

5.1 IN GENERAL109

5.2 VARIETIES OF COMPUTER SEARCHES109

1. Searches for Computer Equipment110

State v. Kenneth Stapleton111

Notes112

2. Searches for Data113

5.3 GENERAL PRINCIPLES—PARTICULARITY113

United States v. Loretta Otero113

Notes118

1. Items to be Seized: The Container Approach118

People v. Kelli Marie Balint118

2. Items to be Seized: The Special Approach121

5.4 A WARRANT EXERCISE121

Charter 6 SEARCH EXECUTION ISSUES129

6.1 INTERMINGLED DOCUMENTS129

6.2 ON-SITE VS. OFF-SITE SEARCHES130

6.3 USE OF EXPERTS134

6.4 DELETED FILES134

6.5 TIME PERIODS FOR WARRANTS TO BE VALID135

State v. Keith R. Nadeau138

Notes139

Chapter 7 CONSENT SEARCHES; COMPELLING DISCLOSURE OF PASSWORDS141

7.1 CONSENT—IN GENERAL141

7.2 CONSENT—SCOPE ISSUES142

People v. Robert S. Prinzing142

Notes148

1. Scope: Does consent to search include forensic exam?148

United States v. Jonathan Luken148

2. Cell Phones: Scope of Consent150

Jermaine L. Smith v. State150

7.3 THIRD PARTY CONSENT151

1. Passwords and Encryption152

United States v. Ray Andrus153

United States v. Frank Gary Buckner159

Notes161

7.4 FIFTH AMENDMENT PRIVILEGE: REQUIRING THE DISCLOSURE OF PASSWORDS, DECRYPTED FILES161

In Re Grand Jury Subpoena To Sebastien Boucher162

Notes165

Chapter 8 CELL PHONES, OTHER MOBILE DIGITAL DEVICES, AND TRADITIONAL FOURTH AMENDMENT DOCTRINE PERMITTING WARRANTLESS SEARCHES167

8.1 SEARCH INCIDENT TO ARREST167

1. Basic Principles167

2. Permissible Objects Sought168

3. Cell Phone Searches Incident to Arrest169

State v. Antwaun Smith169

4. Location of the Search173

People v. Gregory Diaz175

Questions177

5. Scope: Areas Within the Arrestee's "Control"178

6. Scope: Vehicle Searches Incident to Arrest179

Arizona v. Rodney Joseph Gant179

Questions181

8.2 ADDITIONAL THEORIES TO JUSTIFY A SEARCH AND THE SCOPE OF A PERMISSIBLE SEARCH OF CELL PHONES: VIEWING IMAGES DISPLAYED, BROWSING, ANSWERING CALLS182

State v. Jermichael James Carroll182

Notes187

Chapter 9 SEIZURES OF DIGITAL EVIDENCE189

9.1 INTANGIBLE PROPERTY AND DIGITAL EVIDENCE189

9.2 SEIZURES OF DIGITAL EVIDENCE196

United States v. Howard Wesley Cotterman197

1. Revocation of Consent After the Mirror Image is Made198

United States v. Youssef Samir Megahed198

Notes199

2. Digital Seizures: Seeking a Workable Definition199

3. Is There a Need for Special Rules for Digital Evidence?200

Notes and Questions202

9.3 THE REASONABLENESS OF WARRANTLESS SEIZURES OF DIGITAL DEVICES204

1. Warrantless Seizures204

Commonwealth v. Charles Hinds, Jr.204

Commonwealth v. Harold Kaupp205

2. Delays to Obtain a Warrant after a Warrantless Seizure206

United States v. Peter J. Mitchell206

People v. Yoshiaki Shinohara209

Notes210

Chapter 10 SEARCHES AT THE INTERNATIONAL BORDER213

10.1 OVERVIEW OF THE INTERNATIONAL BORDER DOCTRINE213

10.2 LETTERS AS TARGETS216

10.3 DATA AS TARGETS218

United States v. Michael Timothy Arnold219

Notes and Questions221

10.4 DEFINING THE BORDER222

Chapter 11 FOURTH AMENDMENT APPLICABILITY TO NETWORKS AND THE INTERNET225

11.1 INTRODUCTION—"OUTSIDE THE BOX"225

11.2 VOLUNTARY EXPOSURE/ASSUMPTION OF RISK225

1. Peer-to-Peer Distribution Schemes225

United States v. Charles A. Borowy226

Notes228

2. Email Received and Chatroom Communications229

Commonwealth v. Robert D. Proetto229

Notes231

People v. David Gariano231

Notes233

11.3 INTERNET SURVEILLANCE: TYPES OF INFORMATIONSOUGHT233

1. Background Principles233

Michael Lee Smith v. State233

2. Types of Information Available: Content vs. Non-Content239

United States v. Mark Stephen Forrester246

3. An Alternative View—Independent State Grounds248

State v. Shirley Reid248

Notes253

11.4 INFORMATION OBTAINED FROM THIRD PARTIES AND FROM THE CLOUD253

Notes and Questions255

Chapter 12 STATUTORY REGULATION OF OBTAINING DATA257

12.1 INTRODUCTION257

12.2 THE PEN/TRAP STATUTE, 18 U.S.C. 3121-3127258

1. Application for Internet Communications259

In the Matter of Application of the United States of America for an Order Authorizing the Installation and Use of a Pen Register and a Trap & Trace Device on E-mail Account259

2. "Post-Cut-Through Dialed Digits"260

In the Matter of Applications of the United States of America for Orders (1) Authorizing the Use of Pen Registers and Trap and Trace Devices260

3. Content Related to Internet Activity261

In Re Application of the United States of America for an Order Authorizing the Use of a Pen Register and Trap On [xxx] Internet Service Account/user Name261

4. Remedies under the Pen Register Statute262

United States v. Mark Stephen Forrester262

Notes263

12.3 THE WIRETAP STATUTE, 18 U.S.C. 2510-22264

1. Definitions264

2. Wiretap Orders 18 U.S.C. 2518266

Notes267

3. Remedies for Violations of the Wiretap Statute267

4. Exceptions to the general prohibition against wiretapping include:268

12.4 STORED COMMUNICATIONS ACT 18 U.S.C. 2701-12269

1. Overview270

In the Matter of the Application of the United States of America for a Search Warrant for Contents of Electronic Mail and for an Order Directing a Provider of Electronic Communication Services to Not Disclose the Existence of the Search Warrant270

2. Framework to analyze the SCA272

Andersen Consulting LLP v. UOP and Bickel & Brewer273

Jerilyn Quon v. Arch Wireless Operating Co275

George Theofel v. Alwyn Farey-Jones279

Ernest Flagg v. City of Detroit282

Michael Aaron Jayne v. Sprint PCS289

3. Compelling Disclosure 2703291

4. SCA Process for Compelled Disclosure: Uncertain Status under the Fourth Amendment293

Steven Warshak v. United States293

United States v. Steven Warshak298

5. Miscellaneous SCA Provisions304

Notes305

Chapter 13 OBSCENITY AND CHILD PORNOGRAPHY307

13.1 OBSCENITY307

1. The Miller Standard307

Marvin Miller v. California307

2. Community Standards310

United States v. Robert Alan Thomas310

United States v. Jeffrey A. Kilbride313

13.2 EVOLUTION OF CHILD PORNOGRAPHY REGULATION AS A SEPARATE CATEGORY OF PROHIBITED SPEECH319

New York v. Paul Ira Ferber321

1. Possession of Child Pornography325

Clyde Osborne v. Ohio325

2. Virtual Child Pornography327

John D. Ashcroft v. The Free Speech Coalition327

3. Pandering336

United States v. Michael Williams336

Notes340

4. Morphed Images340

United States v. Dale Robert Bach340

Notes342

5. Obscene Cartoons Featuring Children343

United States v. Christopher S. Handley343

United States v. Dwight Edwin Whorley345

13.3 ELEMENTS OF CHILD PORNOGRAPHY OFFENSES347

1. Distribution347

United States v. Joshua P. Navrestad347

United States v. William Ralph Dodd352

Notes354

2. Possession; Access with Intent to View354

United States v. Stuart Romm355

United States v. Brian Bass359

State v. Benjamin W. Mercer362

Notes368

13.4 PROVING AT TRIAL THAT THE IMAGE DEPICTS A REAL CHILD368

United States v. Tom Vig368

United States v. Anthony Marchand370

Notes376

13.5 COMMON SEARCH AND SEIZURE ISSUES IN CHILD PORNOGRAPHY CASES377

1. Probable Cause to Believe a Person Possesses Child Pornography378

a. Subscribers of Child Pornography Web Sites379

Notes380

b. Retention Habits of Collectors380

c. Pedophile Profiles381

United States v. Edward S. Macomber381

Notes384

d. Staleness384

United States v. William David Burkhart386

Notes389

e. Locating the Computer: IP Addresses; Screen Names; Nexus Questions389

United States v. Javier Perez390

Notes391

2. Sufficiency of the Descriptions of Sexual Activity in the Affidavit393

United States v. Justin Barrett Hill393

United States v. Richard Genin394

Notes400

13.6 SELF-PRODUCED CHILD PORNOGRAPHY AND SEXTING400

Mary Graw Leary, Self-Produced Child Pornography: The Appropriate Societal Response to Juvenile Self-Sexual Exploitation400

Maryjo Miller v. Jeff Mitchell in His Official Capacity as District Attorney of Wyoming County, Pennsylvania404

Notes409

Chapter 14 POLICING THE INTERNET FOR CRIMES INVOLVING EXPLOITATION OF CHILDREN411

14.1 TRAVELER CASES411

United States v. Erik D. Zahursky412

14.2 USING A COMPUTER TO ENTICE A CHILD; ENTRAPMENT418

State v. James R. Pischel418

United States v. Mark Douglas Poehlman423

Notes430

14.3 LIABILITY OF SOCIAL NETWORKING SITES431

Julie Doe Ⅱ, A Minor v. Myspace Incorporated431

Chapter 15 PROPERTY CRIMES AND COMPUTER MISUSE439

15.1 INTRODUCTION439

15.2 TRADITIONAL PROPERTY CRIMES440

1. Larceny and Theft441

2. Applying Traditional Views442

Charles Walter Lurid v. Commonwealth442

State v. Michael McGraw445

3. Expanding the Concepts of "Property" and "Taking"447

State v. Randal Lee Schwartz447

United States v. Bertram E. Seidlitz450

Notes452

Chapter 16 COMPUTER SPECIFIC CRIMES: OBTAINING CONFIDENTIAL INFORMATION, UNAUTHORIZED ACCESS. FRAUD, AND DAMAGE453

16.1 OVERVIEW: COMPUTER FRAUD AND ABUSE ACT—18 U.S.C. 1030453

16.2 KEY DEFINITIONS OF THE CFAA455

1. Protected Computer455

a. Current Version of "Protected Computer"455

United States v. Chad A. Powers456

b. Evolution of the Types of Computers Protected457

Shurgard Storage Centers, Inc. v. Safeguard Self Storage, Inc.457

2. Intentional Access459

a. How to Restrict Access: Code-Based and Contract-Based Restrictions459

Ef Cultural Travel BV v. Zefer Corporation460

United States v. Lori Drew462

United States v. Lori Drew462

State v. Anthony A. Allen463

State v. Joseph N. Riley466

3. Without or in Excess of Authorization467

a. Agency Theory To Find Lack of Authorization469

Shurgard Storage Centers, Inc. v. Safeguard Self Storage, Inc469

b. Rejection of Employee Breach of Duty as Basis470

Bell Aerospace Services, Inc. v. U.S. Aero Services, Inc471

c. Non-Intended Use as Basis473

United States v. Dimetriace Eva-Lavon John473

d. Websites: Terms of Use and Technical Barriers475

Facebook, Inc. v. Power Ventures, Inc475

United States v. Lori Drew478

Notes486

16.3 SPECIFIC SUB-SECTIONS OF 1030486

1. Obtaining Confidential Information486

Brenda Czech v. Wall Street on Demand, Inc487

2. Trespassing into a Government Computer 18 U.S.C. 1030(a)(3)489

3. Accessing to Defraud and Obtain Value 18 U.S.C. 1030(a)(4)490

United States v. Richard W. Czubinski492

4. Damaging a Computer or Information 18 U.S.C. 1030(a)(5)494

United States v. Robert Tappan Morris498

Notes501

International Airport Centers v. Jacob Citrin501

United States v. Allan Carlson503

United States v. Nicholas Middleton505

Notes509

Chapter 17 INTELLECTUAL PROPERTY THEFT511

17.1 COPYRIGHT511

1. 17 U.S.C. 506(a) provides:513

2. Evolution of File Sharing515

A&M Records, Inc. v. Napster, Inc515

Sandra Leigh King, While You Were Sleeping524

Notes531

3. Illegal "Warez" Organizations and Internet Piracy531

Notes534

17.2 THE DIGITAL MILLENIUM COPYRIGHT ACT, 17 U.S.C. 1201-05534

United States v. Elcom Ltd536

1. Example of Circumventing Access Controls537

2. Example of Trafficking537

Universal City Studios, Inc. v. Eric Corley537

Notes543

3. DMCA meets Video Gaming543

Sandra Leigh King, While You Were Sleeping543

Chapter 18 SPYWARE, ADWARE, MALWARE; PHISHING; SPAM; AND IDENTITY-RELATED CRIME547

18.1 SPYWARE, ADWARE, MALWARE547

People v. Direct Revenue549

Notes552

18.2 PHISHING555

Facebook, Inc. v. Jeremi Fisher555

Notes558

18.3 SPAM558

United States v. Jeffrey A. Kilbride563

United States v. Michael Steven Twombly567

Notes569

18.4 IDENTITY-RELATED CRIME570

United States v. Vladimir Cabrera572

Notes576

Chapter 19 OTHER CRIMES AGAINST PERSONS: CYBERBULLYING, THREATS, STALKING, HARASSMENT, AND DEFAMATION577

19.1 CYBERBULLYING578

Questions579

Notes583

19.2 THREATS584

People v. Alan Munn584

United States v. Abraham Jacob Alkhabaz586

Notes595

19.3 STALKING AND HARASSMENT596

1. The Impact of Technology596

2. Criminalization of Harassment601

Susan W. Brenner & Megan Rehberg, "Kiddie Crime"? The Utility of Criminal Law in Controlling Cyberbullying601

State v. Ellison603

A.B. v. State605

Susan W. Brenner & Megan Rehberg, "Kiddie Crime"? The Utility of Criminal Law in Controlling Cyberbullying608

People v. Darren S. Kochanowski611

Notes612

19.4 DEFAMATION613

Susan W. Brenner & Megan Rehberg, "Kiddie Crime"? The Utility of Criminal Law in Controlling Cyberbullying613

Thomas Mink v. Susan Knox614

Notes620

Chapter 20 SENTENCING623

20.1 FEDERAL SENTENCING GUIDELINES—ENHANCEMENTS623

1. Use of Computer624

United States v. Todd Franklin Lewis624

2. Special Skills626

United States v. Kent Aoki Lee626

Notes631

20.2 SENTENCING IN CHILD PORNOGRAPHY CASES631

United States v. Jerry Paull631

United States v. Justin K. Dorvee635

20.3 RESTRICTIONS ON INTERNET USE OR USING COMPUTERS639

United States v. Ronald Scott Paul639

United States v. Mark Wayne Russell640

United States v. Arthur William Heckman643

Notes646

热门推荐