Well examine:
Definition of Cybercrime Georgia Law on Computer Issues Federal Laws on Computer Issues Forensic Issues Case Studies Sexual Predator Cyber Stalking Computer Theft
Definition of Cybercrime
any illegal act involving a computer, its systems, or its applications Must be intentional not accidental Types or categories of cybercrime- 3 Ts
Tool
of the crime traditional crime w/ a computer Target of the crime Hacking Tangential to the crime drug records
Computer Trespass
Any person who uses a computer or computer network with knowledge that such use is without authority and with the intention of: (1) Deleting or in any way removing, either temporarily or permanently, any computer program or data from a computer or computer network;
Computer Trespass
(2) Obstructing, interrupting, or in any way interfering with the use of a computer program or data; or (3) Altering, damaging, or in any way causing the malfunction of a computer, computer network, or computer program, regardless of how long the alteration, damage, or malfunction persists
Computer Trespass
... shall be guilty of Computer Trespass.
Computer Forgery
Any person who creates, alters, or deletes any data contained in any computer or computer network, who, if such person had created, altered, or deleted a tangible document or instrument would have committed forgery under Article 1 of this chapter, shall be guilty of the crime of computer forgery.
Computer Forgery
The absence of a tangible writing directly created or altered by the offender shall not be a defense to the crime of computer forgery if a creation, alteration, or deletion of data was involved in lieu of a tangible document or instrument.
Confidentiality
Intercepting Communications
O.C.G.A. Sec. 16-11-62 It shall be unlawful for (4) Any person intentionally and secretly to intercept by the use of any device, instrument, or apparatus the contents of a message sent by telephone, telegraph, letter, or by any other means of private communication;
Intercepting Communications
But, what if the police seize a computer and discover a conversation where a crime is discussed. That conversation, if by telephone or telegraph, would have been protected. Not the case with a computer. Courts have ruled that you should know that a computer makes a printed record, so its okay for police to use it.
Intercepting Communications
Okay, but what was a telegraph anyway?
Anonymity Opportunity
In the old days, sexual perversion was certainly present, but the desire to not be caught diminished the opportunities to accomplish the crime. Hanging around the neighbor park was too risky, especially for bank presidents, stockbrokers, management types, and such.
Anonymity Opportunity
Today, a sexual pervert can hang around in teenage chat rooms and find suitable victims with little risk of detection. Kids are naturally curious anyway, but teenagers are looking for someone who listens to them, a need which chat rooms seem to fill.
Anonymity Opportunity
After awhile, the friendship will develop to the point that the predator can talk about sex. Again, teenagers are naturally curious, so this is not seen as dangerous to the teenager.
Anonymity Opportunity
Once the predator has established a trusting relationship, he/she will seek to make a physical encounter. Usually, this encounter will be solely about sex for the predator. There is too much danger in these encounters to make friendly contacts.
Anonymity Opportunity
The child usually seeks to get out of the situation once she/he realizes that this friend is not what was portrayed on the Internet. However, in many instances, it is too late to back out or stop the assault. If the child will tell about it, capture is not difficult as the paper trail is fairly easy to follow.
Winding Down
Cyber Stalking
A different twist on an old crime, Cyber Stalking. Stalking has been going on for centuries, having grown more sophisticated as technology has advanced. What is stalking?
Cyber Stalking
OCGA 16-5-90. (a) A person commits the offense of stalking when he or she follows, places under surveillance, or contacts another person at or about a place or places without the consent of the other person for the purpose of harassing and intimidating the other person.
Cyber Stalking
For the purposes of this article, the term "harassing and intimidating" means a knowing and willful course of conduct directed at a specific person which causes emotional distress by placing such person in reasonable fear for such person's safety or a family members safety
Cyber Stalking
by establishing a pattern of harassing and intimidating behavior, and which serves no legitimate purpose. This Code section shall not be construed to require that an overt threat of death or bodily injury has been made.
Cyber Stalking
So, pretty obvious how someone could commit cyber stalking. Identity and jurisdiction becomes an issue, however.
Cyber Stalking
Where in the World is Carmen Sandiego is a popular game. Finding a Cyber Stalker is no game, however.
Final points
You may see this material on an exam!
Floods the server with data, prevents access Makes a copy of email for law enforcement
Money laundering transfer of money from illegal operations to legal ones - $1M weighs 30- 50 lbs!
In Closing
Cyber Crime Is Still Crime Computers Offer Widespread Havoc Computers Have Detection Issues, Good and Bad Forensic Computer Specialists Are Vital To Crime Fighting Efforts