This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. You can access the new platform at https://opencasebook.org. Thank you.
Purpose: This chapter is designed to provide an understanding of cybercrime, i.e. crime that involves a computer network. Basically anything that can be a “real-space” crime can also be done in some way using a computer network. Examples include fraudulent misrepresentation via email or the network distribution of child pornography. In addition, some crimes (such as data theft, or disruption of network) necessarily involve computers, computer software, or computer networks . In this chapter we discuss both types of cybercrime. We limit our focus to the international dimension – i.e. to crimes committed be people in one jurisdiction (or in an unknown jurisdiction) involving computers or networks in another jurisdiction. Finally, both national governments and non-state actors can commit international cybercrimes. For example, the Chinese hack of Google violated U.S. criminal law. Because national governments are not even in theory subject to domestic criminal process, we will focus on crimes committed by non-state actors.
Concepts Covered: This chapter divides into three parts. Part 4.1 explores examples of cybercrime and how cyber-criminals operate. Part 4.2 examines the limitations of domestic criminal law to address cybercrime. Part 4.3 looks at international efforts to regulate cybercrime, and the limits of those efforts.EDIT PLAYLIST INFORMATION DELETE PLAYLIST
Edit playlist item notes below to have a mix of public & private notes, or:MAKE ALL NOTES PUBLIC (3/3 playlist item notes are public) MAKE ALL NOTES PRIVATE (0/3 playlist item notes are private)
|1||Show/Hide More||4.1 How Cybercrime Works|
|1.1||Show/Hide More||4.1.1 Case Studies|
|1.2||Show/Hide More||Tyler Moore, et al., The Economics of Online Crime, Journal of Economic Perspectives, Vol 23, No 3, 2009|
|1.3||Show/Hide More||Group IB, State and Trends of the Russian Digital Crime Market, 2011|
|1.4||Show/Hide More||Knafo, Anonymous And The War Over The Internet, Part I, 30 January 2012|
|1.5||Show/Hide More||Knafo, Anonymous And The War Over The Internet, Part II, 31 January 2012|
|2||Show/Hide More||4.2 The Limitations of Domestic Criminal Law|
|2.1||Show/Hide More||4.2.1 Jurisdiction and Sovereignty|
|2.2||Show/Hide More||National Research Council, Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities, Chapter 5, 2009|
|3||Show/Hide More||4.3 International Efforts To Regulate Cybercrime|
|3.1||Show/Hide More||The Council of Europe Convention on Cybercrime|
|3.2||Show/Hide More||Ratifications of Council on Europe Convention on Cybercrime|
|3.3||Show/Hide More||Michael Vatis, The Council of Europe Convention on Cybercrime, Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U.S. Policy, 2010|
|3.4||Show/Hide More||Jack Goldsmith, Cybersecurity Treaties: A Skeptical View, Future Challenges in National Security and Law, February 2011|
May 21, 2013
Jack Goldsmith and a Berkman Center Cybersecurity Team
This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. If you would like access to the new version of the H2O platform and have not already been contacted by a member of our team, please contact us at firstname.lastname@example.org. Thank you.