当前位置:首页 > 外文
CYRER CRIME AND DIGITAL EVIDENCE MATERIALS AND CASES
CYRER CRIME AND DIGITAL EVIDENCE MATERIALS AND CASES

CYRER CRIME AND DIGITAL EVIDENCE MATERIALS AND CASESPDF电子书下载

外文

  • 电子书积分:19 积分如何计算积分?
  • 作 者:THOMAS K.CLANCY
  • 出 版 社:LEXISNEXIS
  • 出版年份:2011
  • ISBN:
  • 页数:661 页
图书介绍:
《CYRER CRIME AND DIGITAL EVIDENCE MATERIALS AND CASES》目录
标签:

Chapter 1 INTRODUCTION 1

Chapter 2 OBTAINING DIGITAL EVIDENCE: AN INTRODUCTION 7

2.1 ANALYTICAL STRUCTURE OF FOURTH AMENDMENT QUESTIONS 8

1. Applicability 8

2. Satisfaction 11

3. Remedies 11

4. Independent State Grounds 12

2.2 INTRODUCTION TO THE STATUTORY FRAMEWORK 12

2.3 A CASE STUDY: MAJOR STEPS IN A TYPICAL INTERNET INVESTIGATION 13

United States v. Steven C. Perrine 13

Notes 19

Chapter 3 FOURTH AMENDMENT APPLICABILITY: "INSIDE THE BOX" 21

3.1 EXPECTATION OF PRIVACY ANALYSIS 21

1. In General 21

2. The Location of the Computer 21

3. Data on Work Computers—Governmental Employer 22

4. The Supreme Court Avoids the Issue 23

Notes 29

5. Emails on Work Computer 29

Robin Brown-Criscuolo v. Robert K. Wolfe 29

State v. Eric M. Young 32

Notes 34

3.2 PRIVATE SEARCHES AND SEIZURES 35

1. In General 35

2. Who is a Government Agent 35

3. Replication and "Context" Issues: Defining the "Container" 37

Questions and Comments 41

People v. Joseph Michael Wilkinson 44

Notes 47

Chapter 4 COMPETING VIEWS OF THE NATURE OF DIGITAL EVIDENCE SEARCHES 49

4.1 INTRODUCTION 49

4.2 PLAIN VIEW DOCTRINE 50

1. Distinguishing Merely Looking 53

United States v. Artem Bautista David 53

2. "Immediately Apparent" 54

United States v. Devin C. Wilson 54

Notes 56

3. Opening Closed Files: The Document Approach 57

United States v. Montgomery Johns Gray 57

Notes and Questions 60

4. Opening Closed Files: The Special Approach 61

5. Independent State Grounds: Inadvertence and File Names 62

Larry R. Frasier, Jr. v. State 62

Questions 65

4.3 DOCUMENT SEARCHES 65

1. Data Are Forms of Records/Container Analogy 66

United States v. Curtis Robert Williams 69

2. Rejection of the Document Search and Container Analogy: A "Special Approach" 74

United States v. Michael Clay Payton 76

People v. Robert Carratu 81

Notes and Questions 83

Notes and Questions 87

Notes and Questions 89

4.4 LIMITATIONS BASED ON SEARCH EXECUTION PROCEDURES IN WARRANTS 89

1. Supreme Court Opinions on Execution Procedures 89

2. Search Protocols—Digital Evidence Cases 90

a. Rejecting Protocol Requirement 90

United States v. Brent Ray Brooks 90

b. Taint Teams and Special Masters 91

Donald F. Manno v. Christopher J. Christie 91

c. The Special Approach 94

United States v. Comprehensive Drug Testing, Inc 94

Notes 107

Chapter 5 WARRANTS FOR DIGITAL EVIDENCE: PARTICULARITY CLAIMS AND BROAD SEIZURES 109

5.1 IN GENERAL 109

5.2 VARIETIES OF COMPUTER SEARCHES 109

1. Searches for Computer Equipment 110

State v. Kenneth Stapleton 111

Notes 112

2. Searches for Data 113

5.3 GENERAL PRINCIPLES—PARTICULARITY 113

United States v. Loretta Otero 113

Notes 118

1. Items to be Seized: The Container Approach 118

People v. Kelli Marie Balint 118

2. Items to be Seized: The Special Approach 121

5.4 A WARRANT EXERCISE 121

Charter 6 SEARCH EXECUTION ISSUES 129

6.1 INTERMINGLED DOCUMENTS 129

6.2 ON-SITE VS. OFF-SITE SEARCHES 130

6.3 USE OF EXPERTS 134

6.4 DELETED FILES 134

6.5 TIME PERIODS FOR WARRANTS TO BE VALID 135

State v. Keith R. Nadeau 138

Notes 139

Chapter 7 CONSENT SEARCHES; COMPELLING DISCLOSURE OF PASSWORDS 141

7.1 CONSENT—IN GENERAL 141

7.2 CONSENT—SCOPE ISSUES 142

People v. Robert S. Prinzing 142

Notes 148

1. Scope: Does consent to search include forensic exam? 148

United States v. Jonathan Luken 148

2. Cell Phones: Scope of Consent 150

Jermaine L. Smith v. State 150

7.3 THIRD PARTY CONSENT 151

1. Passwords and Encryption 152

United States v. Ray Andrus 153

United States v. Frank Gary Buckner 159

Notes 161

7.4 FIFTH AMENDMENT PRIVILEGE: REQUIRING THE DISCLOSURE OF PASSWORDS, DECRYPTED FILES 161

In Re Grand Jury Subpoena To Sebastien Boucher 162

Notes 165

Chapter 8 CELL PHONES, OTHER MOBILE DIGITAL DEVICES, AND TRADITIONAL FOURTH AMENDMENT DOCTRINE PERMITTING WARRANTLESS SEARCHES 167

8.1 SEARCH INCIDENT TO ARREST 167

1. Basic Principles 167

2. Permissible Objects Sought 168

3. Cell Phone Searches Incident to Arrest 169

State v. Antwaun Smith 169

4. Location of the Search 173

People v. Gregory Diaz 175

Questions 177

5. Scope: Areas Within the Arrestee's "Control" 178

6. Scope: Vehicle Searches Incident to Arrest 179

Arizona v. Rodney Joseph Gant 179

Questions 181

8.2 ADDITIONAL THEORIES TO JUSTIFY A SEARCH AND THE SCOPE OF A PERMISSIBLE SEARCH OF CELL PHONES: VIEWING IMAGES DISPLAYED, BROWSING, ANSWERING CALLS 182

State v. Jermichael James Carroll 182

Notes 187

Chapter 9 SEIZURES OF DIGITAL EVIDENCE 189

9.1 INTANGIBLE PROPERTY AND DIGITAL EVIDENCE 189

9.2 SEIZURES OF DIGITAL EVIDENCE 196

United States v. Howard Wesley Cotterman 197

1. Revocation of Consent After the Mirror Image is Made 198

United States v. Youssef Samir Megahed 198

Notes 199

2. Digital Seizures: Seeking a Workable Definition 199

3. Is There a Need for Special Rules for Digital Evidence? 200

Notes and Questions 202

9.3 THE REASONABLENESS OF WARRANTLESS SEIZURES OF DIGITAL DEVICES 204

1. Warrantless Seizures 204

Commonwealth v. Charles Hinds, Jr. 204

Commonwealth v. Harold Kaupp 205

2. Delays to Obtain a Warrant after a Warrantless Seizure 206

United States v. Peter J. Mitchell 206

People v. Yoshiaki Shinohara 209

Notes 210

Chapter 10 SEARCHES AT THE INTERNATIONAL BORDER 213

10.1 OVERVIEW OF THE INTERNATIONAL BORDER DOCTRINE 213

10.2 LETTERS AS TARGETS 216

10.3 DATA AS TARGETS 218

United States v. Michael Timothy Arnold 219

Notes and Questions 221

10.4 DEFINING THE BORDER 222

Chapter 11 FOURTH AMENDMENT APPLICABILITY TO NETWORKS AND THE INTERNET 225

11.1 INTRODUCTION—"OUTSIDE THE BOX" 225

11.2 VOLUNTARY EXPOSURE/ASSUMPTION OF RISK 225

1. Peer-to-Peer Distribution Schemes 225

United States v. Charles A. Borowy 226

Notes 228

2. Email Received and Chatroom Communications 229

Commonwealth v. Robert D. Proetto 229

Notes 231

People v. David Gariano 231

Notes 233

11.3 INTERNET SURVEILLANCE: TYPES OF INFORMATIONSOUGHT 233

1. Background Principles 233

Michael Lee Smith v. State 233

2. Types of Information Available: Content vs. Non-Content 239

United States v. Mark Stephen Forrester 246

3. An Alternative View—Independent State Grounds 248

State v. Shirley Reid 248

Notes 253

11.4 INFORMATION OBTAINED FROM THIRD PARTIES AND FROM THE CLOUD 253

Notes and Questions 255

Chapter 12 STATUTORY REGULATION OF OBTAINING DATA 257

12.1 INTRODUCTION 257

12.2 THE PEN/TRAP STATUTE, 18 U.S.C. 3121-3127 258

1. Application for Internet Communications 259

In the Matter of Application of the United States of America for an Order Authorizing the Installation and Use of a Pen Register and a Trap & Trace Device on E-mail Account 259

2. "Post-Cut-Through Dialed Digits" 260

In the Matter of Applications of the United States of America for Orders (1) Authorizing the Use of Pen Registers and Trap and Trace Devices 260

3. Content Related to Internet Activity 261

In Re Application of the United States of America for an Order Authorizing the Use of a Pen Register and Trap On [xxx] Internet Service Account/user Name 261

4. Remedies under the Pen Register Statute 262

United States v. Mark Stephen Forrester 262

Notes 263

12.3 THE WIRETAP STATUTE, 18 U.S.C. 2510-22 264

1. Definitions 264

2. Wiretap Orders 18 U.S.C. 2518 266

Notes 267

3. Remedies for Violations of the Wiretap Statute 267

4. Exceptions to the general prohibition against wiretapping include: 268

12.4 STORED COMMUNICATIONS ACT 18 U.S.C. 2701-12 269

1. Overview 270

In the Matter of the Application of the United States of America for a Search Warrant for Contents of Electronic Mail and for an Order Directing a Provider of Electronic Communication Services to Not Disclose the Existence of the Search Warrant 270

2. Framework to analyze the SCA 272

Andersen Consulting LLP v. UOP and Bickel & Brewer 273

Jerilyn Quon v. Arch Wireless Operating Co 275

George Theofel v. Alwyn Farey-Jones 279

Ernest Flagg v. City of Detroit 282

Michael Aaron Jayne v. Sprint PCS 289

3. Compelling Disclosure 2703 291

4. SCA Process for Compelled Disclosure: Uncertain Status under the Fourth Amendment 293

Steven Warshak v. United States 293

United States v. Steven Warshak 298

5. Miscellaneous SCA Provisions 304

Notes 305

Chapter 13 OBSCENITY AND CHILD PORNOGRAPHY 307

13.1 OBSCENITY 307

1. The Miller Standard 307

Marvin Miller v. California 307

2. Community Standards 310

United States v. Robert Alan Thomas 310

United States v. Jeffrey A. Kilbride 313

13.2 EVOLUTION OF CHILD PORNOGRAPHY REGULATION AS A SEPARATE CATEGORY OF PROHIBITED SPEECH 319

New York v. Paul Ira Ferber 321

1. Possession of Child Pornography 325

Clyde Osborne v. Ohio 325

2. Virtual Child Pornography 327

John D. Ashcroft v. The Free Speech Coalition 327

3. Pandering 336

United States v. Michael Williams 336

Notes 340

4. Morphed Images 340

United States v. Dale Robert Bach 340

Notes 342

5. Obscene Cartoons Featuring Children 343

United States v. Christopher S. Handley 343

United States v. Dwight Edwin Whorley 345

13.3 ELEMENTS OF CHILD PORNOGRAPHY OFFENSES 347

1. Distribution 347

United States v. Joshua P. Navrestad 347

United States v. William Ralph Dodd 352

Notes 354

2. Possession; Access with Intent to View 354

United States v. Stuart Romm 355

United States v. Brian Bass 359

State v. Benjamin W. Mercer 362

Notes 368

13.4 PROVING AT TRIAL THAT THE IMAGE DEPICTS A REAL CHILD 368

United States v. Tom Vig 368

United States v. Anthony Marchand 370

Notes 376

13.5 COMMON SEARCH AND SEIZURE ISSUES IN CHILD PORNOGRAPHY CASES 377

1. Probable Cause to Believe a Person Possesses Child Pornography 378

a. Subscribers of Child Pornography Web Sites 379

Notes 380

b. Retention Habits of Collectors 380

c. Pedophile Profiles 381

United States v. Edward S. Macomber 381

Notes 384

d. Staleness 384

United States v. William David Burkhart 386

Notes 389

e. Locating the Computer: IP Addresses; Screen Names; Nexus Questions 389

United States v. Javier Perez 390

Notes 391

2. Sufficiency of the Descriptions of Sexual Activity in the Affidavit 393

United States v. Justin Barrett Hill 393

United States v. Richard Genin 394

Notes 400

13.6 SELF-PRODUCED CHILD PORNOGRAPHY AND SEXTING 400

Mary Graw Leary, Self-Produced Child Pornography: The Appropriate Societal Response to Juvenile Self-Sexual Exploitation 400

Maryjo Miller v. Jeff Mitchell in His Official Capacity as District Attorney of Wyoming County, Pennsylvania 404

Notes 409

Chapter 14 POLICING THE INTERNET FOR CRIMES INVOLVING EXPLOITATION OF CHILDREN 411

14.1 TRAVELER CASES 411

United States v. Erik D. Zahursky 412

14.2 USING A COMPUTER TO ENTICE A CHILD; ENTRAPMENT 418

State v. James R. Pischel 418

United States v. Mark Douglas Poehlman 423

Notes 430

14.3 LIABILITY OF SOCIAL NETWORKING SITES 431

Julie Doe Ⅱ, A Minor v. Myspace Incorporated 431

Chapter 15 PROPERTY CRIMES AND COMPUTER MISUSE 439

15.1 INTRODUCTION 439

15.2 TRADITIONAL PROPERTY CRIMES 440

1. Larceny and Theft 441

2. Applying Traditional Views 442

Charles Walter Lurid v. Commonwealth 442

State v. Michael McGraw 445

3. Expanding the Concepts of "Property" and "Taking" 447

State v. Randal Lee Schwartz 447

United States v. Bertram E. Seidlitz 450

Notes 452

Chapter 16 COMPUTER SPECIFIC CRIMES: OBTAINING CONFIDENTIAL INFORMATION, UNAUTHORIZED ACCESS. FRAUD, AND DAMAGE 453

16.1 OVERVIEW: COMPUTER FRAUD AND ABUSE ACT—18 U.S.C. 1030 453

16.2 KEY DEFINITIONS OF THE CFAA 455

1. Protected Computer 455

a. Current Version of "Protected Computer" 455

United States v. Chad A. Powers 456

b. Evolution of the Types of Computers Protected 457

Shurgard Storage Centers, Inc. v. Safeguard Self Storage, Inc. 457

2. Intentional Access 459

a. How to Restrict Access: Code-Based and Contract-Based Restrictions 459

Ef Cultural Travel BV v. Zefer Corporation 460

United States v. Lori Drew 462

United States v. Lori Drew 462

State v. Anthony A. Allen 463

State v. Joseph N. Riley 466

3. Without or in Excess of Authorization 467

a. Agency Theory To Find Lack of Authorization 469

Shurgard Storage Centers, Inc. v. Safeguard Self Storage, Inc 469

b. Rejection of Employee Breach of Duty as Basis 470

Bell Aerospace Services, Inc. v. U.S. Aero Services, Inc 471

c. Non-Intended Use as Basis 473

United States v. Dimetriace Eva-Lavon John 473

d. Websites: Terms of Use and Technical Barriers 475

Facebook, Inc. v. Power Ventures, Inc 475

United States v. Lori Drew 478

Notes 486

16.3 SPECIFIC SUB-SECTIONS OF 1030 486

1. Obtaining Confidential Information 486

Brenda Czech v. Wall Street on Demand, Inc 487

2. Trespassing into a Government Computer 18 U.S.C. 1030(a)(3) 489

3. Accessing to Defraud and Obtain Value 18 U.S.C. 1030(a)(4) 490

United States v. Richard W. Czubinski 492

4. Damaging a Computer or Information 18 U.S.C. 1030(a)(5) 494

United States v. Robert Tappan Morris 498

Notes 501

International Airport Centers v. Jacob Citrin 501

United States v. Allan Carlson 503

United States v. Nicholas Middleton 505

Notes 509

Chapter 17 INTELLECTUAL PROPERTY THEFT 511

17.1 COPYRIGHT 511

1. 17 U.S.C. 506(a) provides: 513

2. Evolution of File Sharing 515

A&M Records, Inc. v. Napster, Inc 515

Sandra Leigh King, While You Were Sleeping 524

Notes 531

3. Illegal "Warez" Organizations and Internet Piracy 531

Notes 534

17.2 THE DIGITAL MILLENIUM COPYRIGHT ACT, 17 U.S.C. 1201-05 534

United States v. Elcom Ltd 536

1. Example of Circumventing Access Controls 537

2. Example of Trafficking 537

Universal City Studios, Inc. v. Eric Corley 537

Notes 543

3. DMCA meets Video Gaming 543

Sandra Leigh King, While You Were Sleeping 543

Chapter 18 SPYWARE, ADWARE, MALWARE; PHISHING; SPAM; AND IDENTITY-RELATED CRIME 547

18.1 SPYWARE, ADWARE, MALWARE 547

People v. Direct Revenue 549

Notes 552

18.2 PHISHING 555

Facebook, Inc. v. Jeremi Fisher 555

Notes 558

18.3 SPAM 558

United States v. Jeffrey A. Kilbride 563

United States v. Michael Steven Twombly 567

Notes 569

18.4 IDENTITY-RELATED CRIME 570

United States v. Vladimir Cabrera 572

Notes 576

Chapter 19 OTHER CRIMES AGAINST PERSONS: CYBERBULLYING, THREATS, STALKING, HARASSMENT, AND DEFAMATION 577

19.1 CYBERBULLYING 578

Questions 579

Notes 583

19.2 THREATS 584

People v. Alan Munn 584

United States v. Abraham Jacob Alkhabaz 586

Notes 595

19.3 STALKING AND HARASSMENT 596

1. The Impact of Technology 596

2. Criminalization of Harassment 601

Susan W. Brenner & Megan Rehberg, "Kiddie Crime"? The Utility of Criminal Law in Controlling Cyberbullying 601

State v. Ellison 603

A.B. v. State 605

Susan W. Brenner & Megan Rehberg, "Kiddie Crime"? The Utility of Criminal Law in Controlling Cyberbullying 608

People v. Darren S. Kochanowski 611

Notes 612

19.4 DEFAMATION 613

Susan W. Brenner & Megan Rehberg, "Kiddie Crime"? The Utility of Criminal Law in Controlling Cyberbullying 613

Thomas Mink v. Susan Knox 614

Notes 620

Chapter 20 SENTENCING 623

20.1 FEDERAL SENTENCING GUIDELINES—ENHANCEMENTS 623

1. Use of Computer 624

United States v. Todd Franklin Lewis 624

2. Special Skills 626

United States v. Kent Aoki Lee 626

Notes 631

20.2 SENTENCING IN CHILD PORNOGRAPHY CASES 631

United States v. Jerry Paull 631

United States v. Justin K. Dorvee 635

20.3 RESTRICTIONS ON INTERNET USE OR USING COMPUTERS 639

United States v. Ronald Scott Paul 639

United States v. Mark Wayne Russell 640

United States v. Arthur William Heckman 643

Notes 646

返回顶部