CYRER CRIME AND DIGITAL EVIDENCE MATERIALS AND CASESPDF电子书下载
- 电子书积分:19 积分如何计算积分?
- 作 者:THOMAS K.CLANCY
- 出 版 社:LEXISNEXIS
- 出版年份:2011
- ISBN:
- 页数:661 页
Chapter 1 INTRODUCTION 1
Chapter 2 OBTAINING DIGITAL EVIDENCE: AN INTRODUCTION 7
2.1 ANALYTICAL STRUCTURE OF FOURTH AMENDMENT QUESTIONS 8
1. Applicability 8
2. Satisfaction 11
3. Remedies 11
4. Independent State Grounds 12
2.2 INTRODUCTION TO THE STATUTORY FRAMEWORK 12
2.3 A CASE STUDY: MAJOR STEPS IN A TYPICAL INTERNET INVESTIGATION 13
United States v. Steven C. Perrine 13
Notes 19
Chapter 3 FOURTH AMENDMENT APPLICABILITY: "INSIDE THE BOX" 21
3.1 EXPECTATION OF PRIVACY ANALYSIS 21
1. In General 21
2. The Location of the Computer 21
3. Data on Work Computers—Governmental Employer 22
4. The Supreme Court Avoids the Issue 23
Notes 29
5. Emails on Work Computer 29
Robin Brown-Criscuolo v. Robert K. Wolfe 29
State v. Eric M. Young 32
Notes 34
3.2 PRIVATE SEARCHES AND SEIZURES 35
1. In General 35
2. Who is a Government Agent 35
3. Replication and "Context" Issues: Defining the "Container" 37
Questions and Comments 41
People v. Joseph Michael Wilkinson 44
Notes 47
Chapter 4 COMPETING VIEWS OF THE NATURE OF DIGITAL EVIDENCE SEARCHES 49
4.1 INTRODUCTION 49
4.2 PLAIN VIEW DOCTRINE 50
1. Distinguishing Merely Looking 53
United States v. Artem Bautista David 53
2. "Immediately Apparent" 54
United States v. Devin C. Wilson 54
Notes 56
3. Opening Closed Files: The Document Approach 57
United States v. Montgomery Johns Gray 57
Notes and Questions 60
4. Opening Closed Files: The Special Approach 61
5. Independent State Grounds: Inadvertence and File Names 62
Larry R. Frasier, Jr. v. State 62
Questions 65
4.3 DOCUMENT SEARCHES 65
1. Data Are Forms of Records/Container Analogy 66
United States v. Curtis Robert Williams 69
2. Rejection of the Document Search and Container Analogy: A "Special Approach" 74
United States v. Michael Clay Payton 76
People v. Robert Carratu 81
Notes and Questions 83
Notes and Questions 87
Notes and Questions 89
4.4 LIMITATIONS BASED ON SEARCH EXECUTION PROCEDURES IN WARRANTS 89
1. Supreme Court Opinions on Execution Procedures 89
2. Search Protocols—Digital Evidence Cases 90
a. Rejecting Protocol Requirement 90
United States v. Brent Ray Brooks 90
b. Taint Teams and Special Masters 91
Donald F. Manno v. Christopher J. Christie 91
c. The Special Approach 94
United States v. Comprehensive Drug Testing, Inc 94
Notes 107
Chapter 5 WARRANTS FOR DIGITAL EVIDENCE: PARTICULARITY CLAIMS AND BROAD SEIZURES 109
5.1 IN GENERAL 109
5.2 VARIETIES OF COMPUTER SEARCHES 109
1. Searches for Computer Equipment 110
State v. Kenneth Stapleton 111
Notes 112
2. Searches for Data 113
5.3 GENERAL PRINCIPLES—PARTICULARITY 113
United States v. Loretta Otero 113
Notes 118
1. Items to be Seized: The Container Approach 118
People v. Kelli Marie Balint 118
2. Items to be Seized: The Special Approach 121
5.4 A WARRANT EXERCISE 121
Charter 6 SEARCH EXECUTION ISSUES 129
6.1 INTERMINGLED DOCUMENTS 129
6.2 ON-SITE VS. OFF-SITE SEARCHES 130
6.3 USE OF EXPERTS 134
6.4 DELETED FILES 134
6.5 TIME PERIODS FOR WARRANTS TO BE VALID 135
State v. Keith R. Nadeau 138
Notes 139
Chapter 7 CONSENT SEARCHES; COMPELLING DISCLOSURE OF PASSWORDS 141
7.1 CONSENT—IN GENERAL 141
7.2 CONSENT—SCOPE ISSUES 142
People v. Robert S. Prinzing 142
Notes 148
1. Scope: Does consent to search include forensic exam? 148
United States v. Jonathan Luken 148
2. Cell Phones: Scope of Consent 150
Jermaine L. Smith v. State 150
7.3 THIRD PARTY CONSENT 151
1. Passwords and Encryption 152
United States v. Ray Andrus 153
United States v. Frank Gary Buckner 159
Notes 161
7.4 FIFTH AMENDMENT PRIVILEGE: REQUIRING THE DISCLOSURE OF PASSWORDS, DECRYPTED FILES 161
In Re Grand Jury Subpoena To Sebastien Boucher 162
Notes 165
Chapter 8 CELL PHONES, OTHER MOBILE DIGITAL DEVICES, AND TRADITIONAL FOURTH AMENDMENT DOCTRINE PERMITTING WARRANTLESS SEARCHES 167
8.1 SEARCH INCIDENT TO ARREST 167
1. Basic Principles 167
2. Permissible Objects Sought 168
3. Cell Phone Searches Incident to Arrest 169
State v. Antwaun Smith 169
4. Location of the Search 173
People v. Gregory Diaz 175
Questions 177
5. Scope: Areas Within the Arrestee's "Control" 178
6. Scope: Vehicle Searches Incident to Arrest 179
Arizona v. Rodney Joseph Gant 179
Questions 181
8.2 ADDITIONAL THEORIES TO JUSTIFY A SEARCH AND THE SCOPE OF A PERMISSIBLE SEARCH OF CELL PHONES: VIEWING IMAGES DISPLAYED, BROWSING, ANSWERING CALLS 182
State v. Jermichael James Carroll 182
Notes 187
Chapter 9 SEIZURES OF DIGITAL EVIDENCE 189
9.1 INTANGIBLE PROPERTY AND DIGITAL EVIDENCE 189
9.2 SEIZURES OF DIGITAL EVIDENCE 196
United States v. Howard Wesley Cotterman 197
1. Revocation of Consent After the Mirror Image is Made 198
United States v. Youssef Samir Megahed 198
Notes 199
2. Digital Seizures: Seeking a Workable Definition 199
3. Is There a Need for Special Rules for Digital Evidence? 200
Notes and Questions 202
9.3 THE REASONABLENESS OF WARRANTLESS SEIZURES OF DIGITAL DEVICES 204
1. Warrantless Seizures 204
Commonwealth v. Charles Hinds, Jr. 204
Commonwealth v. Harold Kaupp 205
2. Delays to Obtain a Warrant after a Warrantless Seizure 206
United States v. Peter J. Mitchell 206
People v. Yoshiaki Shinohara 209
Notes 210
Chapter 10 SEARCHES AT THE INTERNATIONAL BORDER 213
10.1 OVERVIEW OF THE INTERNATIONAL BORDER DOCTRINE 213
10.2 LETTERS AS TARGETS 216
10.3 DATA AS TARGETS 218
United States v. Michael Timothy Arnold 219
Notes and Questions 221
10.4 DEFINING THE BORDER 222
Chapter 11 FOURTH AMENDMENT APPLICABILITY TO NETWORKS AND THE INTERNET 225
11.1 INTRODUCTION—"OUTSIDE THE BOX" 225
11.2 VOLUNTARY EXPOSURE/ASSUMPTION OF RISK 225
1. Peer-to-Peer Distribution Schemes 225
United States v. Charles A. Borowy 226
Notes 228
2. Email Received and Chatroom Communications 229
Commonwealth v. Robert D. Proetto 229
Notes 231
People v. David Gariano 231
Notes 233
11.3 INTERNET SURVEILLANCE: TYPES OF INFORMATIONSOUGHT 233
1. Background Principles 233
Michael Lee Smith v. State 233
2. Types of Information Available: Content vs. Non-Content 239
United States v. Mark Stephen Forrester 246
3. An Alternative View—Independent State Grounds 248
State v. Shirley Reid 248
Notes 253
11.4 INFORMATION OBTAINED FROM THIRD PARTIES AND FROM THE CLOUD 253
Notes and Questions 255
Chapter 12 STATUTORY REGULATION OF OBTAINING DATA 257
12.1 INTRODUCTION 257
12.2 THE PEN/TRAP STATUTE, 18 U.S.C. 3121-3127 258
1. Application for Internet Communications 259
In the Matter of Application of the United States of America for an Order Authorizing the Installation and Use of a Pen Register and a Trap & Trace Device on E-mail Account 259
2. "Post-Cut-Through Dialed Digits" 260
In the Matter of Applications of the United States of America for Orders (1) Authorizing the Use of Pen Registers and Trap and Trace Devices 260
3. Content Related to Internet Activity 261
In Re Application of the United States of America for an Order Authorizing the Use of a Pen Register and Trap On [xxx] Internet Service Account/user Name 261
4. Remedies under the Pen Register Statute 262
United States v. Mark Stephen Forrester 262
Notes 263
12.3 THE WIRETAP STATUTE, 18 U.S.C. 2510-22 264
1. Definitions 264
2. Wiretap Orders 18 U.S.C. 2518 266
Notes 267
3. Remedies for Violations of the Wiretap Statute 267
4. Exceptions to the general prohibition against wiretapping include: 268
12.4 STORED COMMUNICATIONS ACT 18 U.S.C. 2701-12 269
1. Overview 270
In the Matter of the Application of the United States of America for a Search Warrant for Contents of Electronic Mail and for an Order Directing a Provider of Electronic Communication Services to Not Disclose the Existence of the Search Warrant 270
2. Framework to analyze the SCA 272
Andersen Consulting LLP v. UOP and Bickel & Brewer 273
Jerilyn Quon v. Arch Wireless Operating Co 275
George Theofel v. Alwyn Farey-Jones 279
Ernest Flagg v. City of Detroit 282
Michael Aaron Jayne v. Sprint PCS 289
3. Compelling Disclosure 2703 291
4. SCA Process for Compelled Disclosure: Uncertain Status under the Fourth Amendment 293
Steven Warshak v. United States 293
United States v. Steven Warshak 298
5. Miscellaneous SCA Provisions 304
Notes 305
Chapter 13 OBSCENITY AND CHILD PORNOGRAPHY 307
13.1 OBSCENITY 307
1. The Miller Standard 307
Marvin Miller v. California 307
2. Community Standards 310
United States v. Robert Alan Thomas 310
United States v. Jeffrey A. Kilbride 313
13.2 EVOLUTION OF CHILD PORNOGRAPHY REGULATION AS A SEPARATE CATEGORY OF PROHIBITED SPEECH 319
New York v. Paul Ira Ferber 321
1. Possession of Child Pornography 325
Clyde Osborne v. Ohio 325
2. Virtual Child Pornography 327
John D. Ashcroft v. The Free Speech Coalition 327
3. Pandering 336
United States v. Michael Williams 336
Notes 340
4. Morphed Images 340
United States v. Dale Robert Bach 340
Notes 342
5. Obscene Cartoons Featuring Children 343
United States v. Christopher S. Handley 343
United States v. Dwight Edwin Whorley 345
13.3 ELEMENTS OF CHILD PORNOGRAPHY OFFENSES 347
1. Distribution 347
United States v. Joshua P. Navrestad 347
United States v. William Ralph Dodd 352
Notes 354
2. Possession; Access with Intent to View 354
United States v. Stuart Romm 355
United States v. Brian Bass 359
State v. Benjamin W. Mercer 362
Notes 368
13.4 PROVING AT TRIAL THAT THE IMAGE DEPICTS A REAL CHILD 368
United States v. Tom Vig 368
United States v. Anthony Marchand 370
Notes 376
13.5 COMMON SEARCH AND SEIZURE ISSUES IN CHILD PORNOGRAPHY CASES 377
1. Probable Cause to Believe a Person Possesses Child Pornography 378
a. Subscribers of Child Pornography Web Sites 379
Notes 380
b. Retention Habits of Collectors 380
c. Pedophile Profiles 381
United States v. Edward S. Macomber 381
Notes 384
d. Staleness 384
United States v. William David Burkhart 386
Notes 389
e. Locating the Computer: IP Addresses; Screen Names; Nexus Questions 389
United States v. Javier Perez 390
Notes 391
2. Sufficiency of the Descriptions of Sexual Activity in the Affidavit 393
United States v. Justin Barrett Hill 393
United States v. Richard Genin 394
Notes 400
13.6 SELF-PRODUCED CHILD PORNOGRAPHY AND SEXTING 400
Mary Graw Leary, Self-Produced Child Pornography: The Appropriate Societal Response to Juvenile Self-Sexual Exploitation 400
Maryjo Miller v. Jeff Mitchell in His Official Capacity as District Attorney of Wyoming County, Pennsylvania 404
Notes 409
Chapter 14 POLICING THE INTERNET FOR CRIMES INVOLVING EXPLOITATION OF CHILDREN 411
14.1 TRAVELER CASES 411
United States v. Erik D. Zahursky 412
14.2 USING A COMPUTER TO ENTICE A CHILD; ENTRAPMENT 418
State v. James R. Pischel 418
United States v. Mark Douglas Poehlman 423
Notes 430
14.3 LIABILITY OF SOCIAL NETWORKING SITES 431
Julie Doe Ⅱ, A Minor v. Myspace Incorporated 431
Chapter 15 PROPERTY CRIMES AND COMPUTER MISUSE 439
15.1 INTRODUCTION 439
15.2 TRADITIONAL PROPERTY CRIMES 440
1. Larceny and Theft 441
2. Applying Traditional Views 442
Charles Walter Lurid v. Commonwealth 442
State v. Michael McGraw 445
3. Expanding the Concepts of "Property" and "Taking" 447
State v. Randal Lee Schwartz 447
United States v. Bertram E. Seidlitz 450
Notes 452
Chapter 16 COMPUTER SPECIFIC CRIMES: OBTAINING CONFIDENTIAL INFORMATION, UNAUTHORIZED ACCESS. FRAUD, AND DAMAGE 453
16.1 OVERVIEW: COMPUTER FRAUD AND ABUSE ACT—18 U.S.C. 1030 453
16.2 KEY DEFINITIONS OF THE CFAA 455
1. Protected Computer 455
a. Current Version of "Protected Computer" 455
United States v. Chad A. Powers 456
b. Evolution of the Types of Computers Protected 457
Shurgard Storage Centers, Inc. v. Safeguard Self Storage, Inc. 457
2. Intentional Access 459
a. How to Restrict Access: Code-Based and Contract-Based Restrictions 459
Ef Cultural Travel BV v. Zefer Corporation 460
United States v. Lori Drew 462
United States v. Lori Drew 462
State v. Anthony A. Allen 463
State v. Joseph N. Riley 466
3. Without or in Excess of Authorization 467
a. Agency Theory To Find Lack of Authorization 469
Shurgard Storage Centers, Inc. v. Safeguard Self Storage, Inc 469
b. Rejection of Employee Breach of Duty as Basis 470
Bell Aerospace Services, Inc. v. U.S. Aero Services, Inc 471
c. Non-Intended Use as Basis 473
United States v. Dimetriace Eva-Lavon John 473
d. Websites: Terms of Use and Technical Barriers 475
Facebook, Inc. v. Power Ventures, Inc 475
United States v. Lori Drew 478
Notes 486
16.3 SPECIFIC SUB-SECTIONS OF 1030 486
1. Obtaining Confidential Information 486
Brenda Czech v. Wall Street on Demand, Inc 487
2. Trespassing into a Government Computer 18 U.S.C. 1030(a)(3) 489
3. Accessing to Defraud and Obtain Value 18 U.S.C. 1030(a)(4) 490
United States v. Richard W. Czubinski 492
4. Damaging a Computer or Information 18 U.S.C. 1030(a)(5) 494
United States v. Robert Tappan Morris 498
Notes 501
International Airport Centers v. Jacob Citrin 501
United States v. Allan Carlson 503
United States v. Nicholas Middleton 505
Notes 509
Chapter 17 INTELLECTUAL PROPERTY THEFT 511
17.1 COPYRIGHT 511
1. 17 U.S.C. 506(a) provides: 513
2. Evolution of File Sharing 515
A&M Records, Inc. v. Napster, Inc 515
Sandra Leigh King, While You Were Sleeping 524
Notes 531
3. Illegal "Warez" Organizations and Internet Piracy 531
Notes 534
17.2 THE DIGITAL MILLENIUM COPYRIGHT ACT, 17 U.S.C. 1201-05 534
United States v. Elcom Ltd 536
1. Example of Circumventing Access Controls 537
2. Example of Trafficking 537
Universal City Studios, Inc. v. Eric Corley 537
Notes 543
3. DMCA meets Video Gaming 543
Sandra Leigh King, While You Were Sleeping 543
Chapter 18 SPYWARE, ADWARE, MALWARE; PHISHING; SPAM; AND IDENTITY-RELATED CRIME 547
18.1 SPYWARE, ADWARE, MALWARE 547
People v. Direct Revenue 549
Notes 552
18.2 PHISHING 555
Facebook, Inc. v. Jeremi Fisher 555
Notes 558
18.3 SPAM 558
United States v. Jeffrey A. Kilbride 563
United States v. Michael Steven Twombly 567
Notes 569
18.4 IDENTITY-RELATED CRIME 570
United States v. Vladimir Cabrera 572
Notes 576
Chapter 19 OTHER CRIMES AGAINST PERSONS: CYBERBULLYING, THREATS, STALKING, HARASSMENT, AND DEFAMATION 577
19.1 CYBERBULLYING 578
Questions 579
Notes 583
19.2 THREATS 584
People v. Alan Munn 584
United States v. Abraham Jacob Alkhabaz 586
Notes 595
19.3 STALKING AND HARASSMENT 596
1. The Impact of Technology 596
2. Criminalization of Harassment 601
Susan W. Brenner & Megan Rehberg, "Kiddie Crime"? The Utility of Criminal Law in Controlling Cyberbullying 601
State v. Ellison 603
A.B. v. State 605
Susan W. Brenner & Megan Rehberg, "Kiddie Crime"? The Utility of Criminal Law in Controlling Cyberbullying 608
People v. Darren S. Kochanowski 611
Notes 612
19.4 DEFAMATION 613
Susan W. Brenner & Megan Rehberg, "Kiddie Crime"? The Utility of Criminal Law in Controlling Cyberbullying 613
Thomas Mink v. Susan Knox 614
Notes 620
Chapter 20 SENTENCING 623
20.1 FEDERAL SENTENCING GUIDELINES—ENHANCEMENTS 623
1. Use of Computer 624
United States v. Todd Franklin Lewis 624
2. Special Skills 626
United States v. Kent Aoki Lee 626
Notes 631
20.2 SENTENCING IN CHILD PORNOGRAPHY CASES 631
United States v. Jerry Paull 631
United States v. Justin K. Dorvee 635
20.3 RESTRICTIONS ON INTERNET USE OR USING COMPUTERS 639
United States v. Ronald Scott Paul 639
United States v. Mark Wayne Russell 640
United States v. Arthur William Heckman 643
Notes 646
- 《国王与诸神》(美)黛娜·托马斯(Dana Thomas)著 2019
- 《程序员修炼之道 通向务实的最高境界 第2版》(美)David Thomas(大卫·托马斯),Andrew Hunt(安德鲁·亨特) 2020
- 《Basic writings of Saint Thomas Aquinas = 圣托马斯基本著作 第2卷》Buke Fang; Thomas Aquinas 2019
- 《Basic writings of Saint Thomas Aquinas I = 圣托马斯基本著作》Thomas Aquinas; Fang Buke 2019
- 《HARRIS&HARRIS' THE RADIOLOGY OF EMERGENCY MEDICINE FIFTH EDITION》THOMAS L.POPE 2013
- 《MRI OF THE MUSCULOSKELETAL SYSTEM SIXTH EDITION》THOMAS H.BERQUIST 2013
- 《Cell transplantation for neurological disorders》edited by Thomas B. Freeman,Hakan Widne 1999
- 《商务与经济统计 原书第11版》(美)戴维 R. 安德森(DAVID R.ANDERSON),丹尼斯 J. 斯威尼(DENNIS J. SWEENEY),托马斯 A.威廉斯(THOMAS A.WILLIAMS)著 2013
- 《好莱坞类型电影 公式、电影制作与片厂制度 formulas, fimmaking, and the studio system》Thomas Schatz著;李亚梅译 1999
- 《解读好莱坞:电影的空间与意义》Deborah Thomas著;李达义,曹玉玲译 2004