Chapter 20 resources for the Cyberlaw book
By John Bandler
This page has resources specific for this chapter.
Looking to navigate to another place?
- Cyberlaw Book Resources (main resources page)
- Cyberlaw main book page
- Udemy course on cyberlaw
- Previous chapter
- Next chapter
Chapter 20 Substantive cybercrime laws
Chapter references, resources, and additional reading
- Chapter 20 resources, https://johnbandler.com/cyberlawbook-resources-ch20/ (this page)
- Criminal cyberlaw, https://johnbandler.com/criminal-cyberlaw/
- Substantive criminal cyberlaw, https://johnbandler.com/criminal-cyberlaw-substantive/
- U.S. v. Gilberto Valle, the "cannibal cop" case, https://johnbandler.com/us-v-valle-cannibal-cop-case/
- U.S. Department of Justice, Prosecuting Computer Crimes (2010 estimated), https://www.justice.gov/criminal/file/442156/dl
- Cybercrime Investigations (2020 book), Chapter 6, Cybercrime Defined: The Criminal Statutes Outlawing Criminal Conduct Online
- Federal statutes of note
- Computer Fraud and Abuse Act (CFAA), 18 U.S. Code § 1030 - Fraud and related activity in connection with computers, https://www.law.cornell.edu/uscode/text/18/1030
- Electronic Communications Privacy Act (ECPA),
- Title I: Wiretap Act 18 U.S.C. §§ 2510–2523, https://www.law.cornell.edu/uscode/text/18/part-I/chapter-119
- Title II: Stored Communications Act (SCA) 18 U.S.C. §§ 2701–2713, https://www.law.cornell.edu/uscode/text/18/part-I/chapter-121
- Title III: Pen Registers and trap and trace devices 18 U.S.C. §§ 3121–3127, https://www.law.cornell.edu/uscode/text/18/part-II/chapter-206
- NYS PL statutes of note:
- P.L. Article 155, Larceny, https://www.nysenate.gov/legislation/laws/PEN/P3TJA155
- P.L. Article 156, Offenses Involving Computers; https://www.nysenate.gov/legislation/laws/PEN/P3TJA156
- P.L. § 156.05 Unauthorized use of a computer, https://www.nysenate.gov/legislation/laws/PEN/156.05
- P.L. § 156.10, Computer Trespass, https://www.nysenate.gov/legislation/laws/PEN/156.10
- P.L. § 156.20 Computer tampering in the fourth degree, https://www.nysenate.gov/legislation/laws/PEN/156.20
- P.L. § 190.77, Offenses involving theft of identity; definitions, https://www.nysenate.gov/legislation/laws/PEN/190.77
- P.L. § 190.78 Identity theft in the third degree, https://www.nysenate.gov/legislation/laws/PEN/190.78
- P.L. Article 470, Money Laundering, https://www.nysenate.gov/legislation/laws/PEN/P4TXA470
- P.L. Article 460, Enterprise corruption, https://www.nysenate.gov/legislation/laws/PEN/P4TXA460
- P.L. § 460.20, Enterprise corruption, https://www.nysenate.gov/legislation/laws/PEN/460.20
Chapter questions
- Name the main federal cybercrime statute and provide the citation (hint starts with “Computer”).
- Name the federal law (and provide the statute citation) that has provisions that can be charged substantively, but also provisions to allow law evidence to obtain evidence lawfully.
- Why should prosecutors consider the full range of criminal statutes (both “traditional” and “cyber”) to charge a cybercriminal with?
- Since most cybercrime is about theft and stealing, what traditional crimes should prosecutors consider charging?
- Since successful cybercriminals “earn” a lot of money, what traditional crime should prosecutors consider charging?
Links and information
- The book: Cyberlaw: Law for Digital Spaces and Information Systems, by John Bandler
- Cyberlaw Book Resources (main resources page)
- Cyberlaw book FAQ
- Cyberlaw main book page
- Amazon - John's Author page
- Udemy online course on cyberlaw (other online courses too)
- Services
This page is hosted at https://johnbandler.com/cyberlawbook-resources-ch20, copyright John Bandler, all rights reserved.
Originally posted 11/20/2024. Updated 01/10/2025.