Chapter 20 resources for the Cyberlaw book
By John Bandler
This page has resources specific for this chapter.
Looking to navigate to another place?
- Cyberlaw Book Resources (main resources page)
- Cyberlaw main book page
- Udemy course on cyberlaw
- Previous chapter
- Next chapter
Chapter 20 Substantive cybercrime laws
Chapter references, resources, and additional reading
- Chapter 20 resources, https://johnbandler.com/cyberlawbook-resources-ch20/ (this page)
- Criminal cyberlaw, https://johnbandler.com/criminal-cyberlaw/
- Substantive criminal cyberlaw, https://johnbandler.com/criminal-cyberlaw-substantive/
- U.S. v. Gilberto Valle, the "cannibal cop" case, https://johnbandler.com/us-v-valle-cannibal-cop-case/
- U.S. Department of Justice, Prosecuting Computer Crimes (2010 estimated), https://www.justice.gov/criminal/file/442156/dl
- Cybercrime Investigations (2020 book), Chapter 6, Cybercrime Defined: The Criminal Statutes Outlawing Criminal Conduct Online
- Spend X minutes reading each of these statutes
- NY PL 156.05, Unauthorized use of a computer, 156.10, Computer Trespass, https://ypdcrime.com/penal.law/article156.php
- NY PL 155.00, Larceny and definitions, Petit Larceny, Grand Larceny in the Fourth Degree, https://ypdcrime.com/penal.law/article155.php
- Computer Fraud and Abuse Act (CFAA), 18 U.S. Code § 1030 - Fraud and related activity in connection with computers, https://www.law.cornell.edu/uscode/text/18/1030
- Electronic Communications Privacy Act (ECPA),
- Title I: Wiretap Act 18 U.S.C. §§ 2510–2523, https://www.law.cornell.edu/uscode/text/18/part-I/chapter-119
- Title II: Stored Communications Act (SCA) 18 U.S.C. §§ 2701–2713, https://www.law.cornell.edu/uscode/text/18/2713
- Title III: Pen Registers and trap and trace devices 18 U.S.C. §§ 3121–3127, https://www.law.cornell.edu/uscode/text/18/part-II/chapter-206
Chapter questions
- Name the main federal cybercrime statute and provide the citation (hint starts with “Computer”).
- Name the federal law (and provide the statute citation) that has provisions that can be charged substantively, but also provisions to allow law evidence to obtain evidence lawfully.
- Why should prosecutors consider the full range of criminal statutes (both “traditional” and “cyber”) to charge a cybercriminal with?
- Since most cybercrime is about theft and stealing, what traditional crimes should prosecutors consider charging?
- Since successful cybercriminals “earn” a lot of money, what traditional crime should prosecutors consider charging?
Links and information
- The book: Cyberlaw: Law for Digital Spaces and Information Systems, by John Bandler
- Cyberlaw Book Resources (main resources page)
- Cyberlaw book FAQ
- Cyberlaw main book page
- Amazon - John's Author page
- Udemy online course on cyberlaw (other online courses too)
- Services
This page is hosted at https://johnbandler.com/cyberlawbook-resources-ch20, copyright John Bandler, all rights reserved.
Originally posted 11/20/2024. Updated 11/23/2024.