图书介绍
CYRER CRIME AND DIGITAL EVIDENCE MATERIALS AND CASESPDF|Epub|txt|kindle电子书版本网盘下载
![CYRER CRIME AND DIGITAL EVIDENCE MATERIALS AND CASES](https://www.shukui.net/cover/2/33951868.jpg)
- THOMAS K.CLANCY 著
- 出版社: LEXISNEXIS
- ISBN:
- 出版时间:2011
- 标注页数:661页
- 文件大小:36MB
- 文件页数:679页
- 主题词:
PDF下载
下载说明
CYRER CRIME AND DIGITAL EVIDENCE MATERIALS AND CASESPDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
Chapter 1 INTRODUCTION1
Chapter 2 OBTAINING DIGITAL EVIDENCE: AN INTRODUCTION7
2.1 ANALYTICAL STRUCTURE OF FOURTH AMENDMENT QUESTIONS8
1. Applicability8
2. Satisfaction11
3. Remedies11
4. Independent State Grounds12
2.2 INTRODUCTION TO THE STATUTORY FRAMEWORK12
2.3 A CASE STUDY: MAJOR STEPS IN A TYPICAL INTERNET INVESTIGATION13
United States v. Steven C. Perrine13
Notes19
Chapter 3 FOURTH AMENDMENT APPLICABILITY: "INSIDE THE BOX"21
3.1 EXPECTATION OF PRIVACY ANALYSIS21
1. In General21
2. The Location of the Computer21
3. Data on Work Computers—Governmental Employer22
4. The Supreme Court Avoids the Issue23
Notes29
5. Emails on Work Computer29
Robin Brown-Criscuolo v. Robert K. Wolfe29
State v. Eric M. Young32
Notes34
3.2 PRIVATE SEARCHES AND SEIZURES35
1. In General35
2. Who is a Government Agent35
3. Replication and "Context" Issues: Defining the "Container"37
Questions and Comments41
People v. Joseph Michael Wilkinson44
Notes47
Chapter 4 COMPETING VIEWS OF THE NATURE OF DIGITAL EVIDENCE SEARCHES49
4.1 INTRODUCTION49
4.2 PLAIN VIEW DOCTRINE50
1. Distinguishing Merely Looking53
United States v. Artem Bautista David53
2. "Immediately Apparent"54
United States v. Devin C. Wilson54
Notes56
3. Opening Closed Files: The Document Approach57
United States v. Montgomery Johns Gray57
Notes and Questions60
4. Opening Closed Files: The Special Approach61
5. Independent State Grounds: Inadvertence and File Names62
Larry R. Frasier, Jr. v. State62
Questions65
4.3 DOCUMENT SEARCHES65
1. Data Are Forms of Records/Container Analogy66
United States v. Curtis Robert Williams69
2. Rejection of the Document Search and Container Analogy: A "Special Approach"74
United States v. Michael Clay Payton76
People v. Robert Carratu81
Notes and Questions83
Notes and Questions87
Notes and Questions89
4.4 LIMITATIONS BASED ON SEARCH EXECUTION PROCEDURES IN WARRANTS89
1. Supreme Court Opinions on Execution Procedures89
2. Search Protocols—Digital Evidence Cases90
a. Rejecting Protocol Requirement90
United States v. Brent Ray Brooks90
b. Taint Teams and Special Masters91
Donald F. Manno v. Christopher J. Christie91
c. The Special Approach94
United States v. Comprehensive Drug Testing, Inc94
Notes107
Chapter 5 WARRANTS FOR DIGITAL EVIDENCE: PARTICULARITY CLAIMS AND BROAD SEIZURES109
5.1 IN GENERAL109
5.2 VARIETIES OF COMPUTER SEARCHES109
1. Searches for Computer Equipment110
State v. Kenneth Stapleton111
Notes112
2. Searches for Data113
5.3 GENERAL PRINCIPLES—PARTICULARITY113
United States v. Loretta Otero113
Notes118
1. Items to be Seized: The Container Approach118
People v. Kelli Marie Balint118
2. Items to be Seized: The Special Approach121
5.4 A WARRANT EXERCISE121
Charter 6 SEARCH EXECUTION ISSUES129
6.1 INTERMINGLED DOCUMENTS129
6.2 ON-SITE VS. OFF-SITE SEARCHES130
6.3 USE OF EXPERTS134
6.4 DELETED FILES134
6.5 TIME PERIODS FOR WARRANTS TO BE VALID135
State v. Keith R. Nadeau138
Notes139
Chapter 7 CONSENT SEARCHES; COMPELLING DISCLOSURE OF PASSWORDS141
7.1 CONSENT—IN GENERAL141
7.2 CONSENT—SCOPE ISSUES142
People v. Robert S. Prinzing142
Notes148
1. Scope: Does consent to search include forensic exam?148
United States v. Jonathan Luken148
2. Cell Phones: Scope of Consent150
Jermaine L. Smith v. State150
7.3 THIRD PARTY CONSENT151
1. Passwords and Encryption152
United States v. Ray Andrus153
United States v. Frank Gary Buckner159
Notes161
7.4 FIFTH AMENDMENT PRIVILEGE: REQUIRING THE DISCLOSURE OF PASSWORDS, DECRYPTED FILES161
In Re Grand Jury Subpoena To Sebastien Boucher162
Notes165
Chapter 8 CELL PHONES, OTHER MOBILE DIGITAL DEVICES, AND TRADITIONAL FOURTH AMENDMENT DOCTRINE PERMITTING WARRANTLESS SEARCHES167
8.1 SEARCH INCIDENT TO ARREST167
1. Basic Principles167
2. Permissible Objects Sought168
3. Cell Phone Searches Incident to Arrest169
State v. Antwaun Smith169
4. Location of the Search173
People v. Gregory Diaz175
Questions177
5. Scope: Areas Within the Arrestee's "Control"178
6. Scope: Vehicle Searches Incident to Arrest179
Arizona v. Rodney Joseph Gant179
Questions181
8.2 ADDITIONAL THEORIES TO JUSTIFY A SEARCH AND THE SCOPE OF A PERMISSIBLE SEARCH OF CELL PHONES: VIEWING IMAGES DISPLAYED, BROWSING, ANSWERING CALLS182
State v. Jermichael James Carroll182
Notes187
Chapter 9 SEIZURES OF DIGITAL EVIDENCE189
9.1 INTANGIBLE PROPERTY AND DIGITAL EVIDENCE189
9.2 SEIZURES OF DIGITAL EVIDENCE196
United States v. Howard Wesley Cotterman197
1. Revocation of Consent After the Mirror Image is Made198
United States v. Youssef Samir Megahed198
Notes199
2. Digital Seizures: Seeking a Workable Definition199
3. Is There a Need for Special Rules for Digital Evidence?200
Notes and Questions202
9.3 THE REASONABLENESS OF WARRANTLESS SEIZURES OF DIGITAL DEVICES204
1. Warrantless Seizures204
Commonwealth v. Charles Hinds, Jr.204
Commonwealth v. Harold Kaupp205
2. Delays to Obtain a Warrant after a Warrantless Seizure206
United States v. Peter J. Mitchell206
People v. Yoshiaki Shinohara209
Notes210
Chapter 10 SEARCHES AT THE INTERNATIONAL BORDER213
10.1 OVERVIEW OF THE INTERNATIONAL BORDER DOCTRINE213
10.2 LETTERS AS TARGETS216
10.3 DATA AS TARGETS218
United States v. Michael Timothy Arnold219
Notes and Questions221
10.4 DEFINING THE BORDER222
Chapter 11 FOURTH AMENDMENT APPLICABILITY TO NETWORKS AND THE INTERNET225
11.1 INTRODUCTION—"OUTSIDE THE BOX"225
11.2 VOLUNTARY EXPOSURE/ASSUMPTION OF RISK225
1. Peer-to-Peer Distribution Schemes225
United States v. Charles A. Borowy226
Notes228
2. Email Received and Chatroom Communications229
Commonwealth v. Robert D. Proetto229
Notes231
People v. David Gariano231
Notes233
11.3 INTERNET SURVEILLANCE: TYPES OF INFORMATIONSOUGHT233
1. Background Principles233
Michael Lee Smith v. State233
2. Types of Information Available: Content vs. Non-Content239
United States v. Mark Stephen Forrester246
3. An Alternative View—Independent State Grounds248
State v. Shirley Reid248
Notes253
11.4 INFORMATION OBTAINED FROM THIRD PARTIES AND FROM THE CLOUD253
Notes and Questions255
Chapter 12 STATUTORY REGULATION OF OBTAINING DATA257
12.1 INTRODUCTION257
12.2 THE PEN/TRAP STATUTE, 18 U.S.C. 3121-3127258
1. Application for Internet Communications259
In the Matter of Application of the United States of America for an Order Authorizing the Installation and Use of a Pen Register and a Trap & Trace Device on E-mail Account259
2. "Post-Cut-Through Dialed Digits"260
In the Matter of Applications of the United States of America for Orders (1) Authorizing the Use of Pen Registers and Trap and Trace Devices260
3. Content Related to Internet Activity261
In Re Application of the United States of America for an Order Authorizing the Use of a Pen Register and Trap On [xxx] Internet Service Account/user Name261
4. Remedies under the Pen Register Statute262
United States v. Mark Stephen Forrester262
Notes263
12.3 THE WIRETAP STATUTE, 18 U.S.C. 2510-22264
1. Definitions264
2. Wiretap Orders 18 U.S.C. 2518266
Notes267
3. Remedies for Violations of the Wiretap Statute267
4. Exceptions to the general prohibition against wiretapping include:268
12.4 STORED COMMUNICATIONS ACT 18 U.S.C. 2701-12269
1. Overview270
In the Matter of the Application of the United States of America for a Search Warrant for Contents of Electronic Mail and for an Order Directing a Provider of Electronic Communication Services to Not Disclose the Existence of the Search Warrant270
2. Framework to analyze the SCA272
Andersen Consulting LLP v. UOP and Bickel & Brewer273
Jerilyn Quon v. Arch Wireless Operating Co275
George Theofel v. Alwyn Farey-Jones279
Ernest Flagg v. City of Detroit282
Michael Aaron Jayne v. Sprint PCS289
3. Compelling Disclosure 2703291
4. SCA Process for Compelled Disclosure: Uncertain Status under the Fourth Amendment293
Steven Warshak v. United States293
United States v. Steven Warshak298
5. Miscellaneous SCA Provisions304
Notes305
Chapter 13 OBSCENITY AND CHILD PORNOGRAPHY307
13.1 OBSCENITY307
1. The Miller Standard307
Marvin Miller v. California307
2. Community Standards310
United States v. Robert Alan Thomas310
United States v. Jeffrey A. Kilbride313
13.2 EVOLUTION OF CHILD PORNOGRAPHY REGULATION AS A SEPARATE CATEGORY OF PROHIBITED SPEECH319
New York v. Paul Ira Ferber321
1. Possession of Child Pornography325
Clyde Osborne v. Ohio325
2. Virtual Child Pornography327
John D. Ashcroft v. The Free Speech Coalition327
3. Pandering336
United States v. Michael Williams336
Notes340
4. Morphed Images340
United States v. Dale Robert Bach340
Notes342
5. Obscene Cartoons Featuring Children343
United States v. Christopher S. Handley343
United States v. Dwight Edwin Whorley345
13.3 ELEMENTS OF CHILD PORNOGRAPHY OFFENSES347
1. Distribution347
United States v. Joshua P. Navrestad347
United States v. William Ralph Dodd352
Notes354
2. Possession; Access with Intent to View354
United States v. Stuart Romm355
United States v. Brian Bass359
State v. Benjamin W. Mercer362
Notes368
13.4 PROVING AT TRIAL THAT THE IMAGE DEPICTS A REAL CHILD368
United States v. Tom Vig368
United States v. Anthony Marchand370
Notes376
13.5 COMMON SEARCH AND SEIZURE ISSUES IN CHILD PORNOGRAPHY CASES377
1. Probable Cause to Believe a Person Possesses Child Pornography378
a. Subscribers of Child Pornography Web Sites379
Notes380
b. Retention Habits of Collectors380
c. Pedophile Profiles381
United States v. Edward S. Macomber381
Notes384
d. Staleness384
United States v. William David Burkhart386
Notes389
e. Locating the Computer: IP Addresses; Screen Names; Nexus Questions389
United States v. Javier Perez390
Notes391
2. Sufficiency of the Descriptions of Sexual Activity in the Affidavit393
United States v. Justin Barrett Hill393
United States v. Richard Genin394
Notes400
13.6 SELF-PRODUCED CHILD PORNOGRAPHY AND SEXTING400
Mary Graw Leary, Self-Produced Child Pornography: The Appropriate Societal Response to Juvenile Self-Sexual Exploitation400
Maryjo Miller v. Jeff Mitchell in His Official Capacity as District Attorney of Wyoming County, Pennsylvania404
Notes409
Chapter 14 POLICING THE INTERNET FOR CRIMES INVOLVING EXPLOITATION OF CHILDREN411
14.1 TRAVELER CASES411
United States v. Erik D. Zahursky412
14.2 USING A COMPUTER TO ENTICE A CHILD; ENTRAPMENT418
State v. James R. Pischel418
United States v. Mark Douglas Poehlman423
Notes430
14.3 LIABILITY OF SOCIAL NETWORKING SITES431
Julie Doe Ⅱ, A Minor v. Myspace Incorporated431
Chapter 15 PROPERTY CRIMES AND COMPUTER MISUSE439
15.1 INTRODUCTION439
15.2 TRADITIONAL PROPERTY CRIMES440
1. Larceny and Theft441
2. Applying Traditional Views442
Charles Walter Lurid v. Commonwealth442
State v. Michael McGraw445
3. Expanding the Concepts of "Property" and "Taking"447
State v. Randal Lee Schwartz447
United States v. Bertram E. Seidlitz450
Notes452
Chapter 16 COMPUTER SPECIFIC CRIMES: OBTAINING CONFIDENTIAL INFORMATION, UNAUTHORIZED ACCESS. FRAUD, AND DAMAGE453
16.1 OVERVIEW: COMPUTER FRAUD AND ABUSE ACT—18 U.S.C. 1030453
16.2 KEY DEFINITIONS OF THE CFAA455
1. Protected Computer455
a. Current Version of "Protected Computer"455
United States v. Chad A. Powers456
b. Evolution of the Types of Computers Protected457
Shurgard Storage Centers, Inc. v. Safeguard Self Storage, Inc.457
2. Intentional Access459
a. How to Restrict Access: Code-Based and Contract-Based Restrictions459
Ef Cultural Travel BV v. Zefer Corporation460
United States v. Lori Drew462
United States v. Lori Drew462
State v. Anthony A. Allen463
State v. Joseph N. Riley466
3. Without or in Excess of Authorization467
a. Agency Theory To Find Lack of Authorization469
Shurgard Storage Centers, Inc. v. Safeguard Self Storage, Inc469
b. Rejection of Employee Breach of Duty as Basis470
Bell Aerospace Services, Inc. v. U.S. Aero Services, Inc471
c. Non-Intended Use as Basis473
United States v. Dimetriace Eva-Lavon John473
d. Websites: Terms of Use and Technical Barriers475
Facebook, Inc. v. Power Ventures, Inc475
United States v. Lori Drew478
Notes486
16.3 SPECIFIC SUB-SECTIONS OF 1030486
1. Obtaining Confidential Information486
Brenda Czech v. Wall Street on Demand, Inc487
2. Trespassing into a Government Computer 18 U.S.C. 1030(a)(3)489
3. Accessing to Defraud and Obtain Value 18 U.S.C. 1030(a)(4)490
United States v. Richard W. Czubinski492
4. Damaging a Computer or Information 18 U.S.C. 1030(a)(5)494
United States v. Robert Tappan Morris498
Notes501
International Airport Centers v. Jacob Citrin501
United States v. Allan Carlson503
United States v. Nicholas Middleton505
Notes509
Chapter 17 INTELLECTUAL PROPERTY THEFT511
17.1 COPYRIGHT511
1. 17 U.S.C. 506(a) provides:513
2. Evolution of File Sharing515
A&M Records, Inc. v. Napster, Inc515
Sandra Leigh King, While You Were Sleeping524
Notes531
3. Illegal "Warez" Organizations and Internet Piracy531
Notes534
17.2 THE DIGITAL MILLENIUM COPYRIGHT ACT, 17 U.S.C. 1201-05534
United States v. Elcom Ltd536
1. Example of Circumventing Access Controls537
2. Example of Trafficking537
Universal City Studios, Inc. v. Eric Corley537
Notes543
3. DMCA meets Video Gaming543
Sandra Leigh King, While You Were Sleeping543
Chapter 18 SPYWARE, ADWARE, MALWARE; PHISHING; SPAM; AND IDENTITY-RELATED CRIME547
18.1 SPYWARE, ADWARE, MALWARE547
People v. Direct Revenue549
Notes552
18.2 PHISHING555
Facebook, Inc. v. Jeremi Fisher555
Notes558
18.3 SPAM558
United States v. Jeffrey A. Kilbride563
United States v. Michael Steven Twombly567
Notes569
18.4 IDENTITY-RELATED CRIME570
United States v. Vladimir Cabrera572
Notes576
Chapter 19 OTHER CRIMES AGAINST PERSONS: CYBERBULLYING, THREATS, STALKING, HARASSMENT, AND DEFAMATION577
19.1 CYBERBULLYING578
Questions579
Notes583
19.2 THREATS584
People v. Alan Munn584
United States v. Abraham Jacob Alkhabaz586
Notes595
19.3 STALKING AND HARASSMENT596
1. The Impact of Technology596
2. Criminalization of Harassment601
Susan W. Brenner & Megan Rehberg, "Kiddie Crime"? The Utility of Criminal Law in Controlling Cyberbullying601
State v. Ellison603
A.B. v. State605
Susan W. Brenner & Megan Rehberg, "Kiddie Crime"? The Utility of Criminal Law in Controlling Cyberbullying608
People v. Darren S. Kochanowski611
Notes612
19.4 DEFAMATION613
Susan W. Brenner & Megan Rehberg, "Kiddie Crime"? The Utility of Criminal Law in Controlling Cyberbullying613
Thomas Mink v. Susan Knox614
Notes620
Chapter 20 SENTENCING623
20.1 FEDERAL SENTENCING GUIDELINES—ENHANCEMENTS623
1. Use of Computer624
United States v. Todd Franklin Lewis624
2. Special Skills626
United States v. Kent Aoki Lee626
Notes631
20.2 SENTENCING IN CHILD PORNOGRAPHY CASES631
United States v. Jerry Paull631
United States v. Justin K. Dorvee635
20.3 RESTRICTIONS ON INTERNET USE OR USING COMPUTERS639
United States v. Ronald Scott Paul639
United States v. Mark Wayne Russell640
United States v. Arthur William Heckman643
Notes646