This book comprises an international study of the manner in which cyber criminals are currently handled by the judicial system. As computer-related crime becomes more important globally, both scholarly and journalistic accounts tend to focus on the ways in which the crime has been committed and how it could have been prevented. Very little has been written about the capture, possible extradition, prosecution, sentencing and incarceration of the cyber criminal--until now.
Author(s): Russell G. Smith, Peter Grabosky, Gregor Urbas
Publisher: Cambridge University Press
Year: 2004
Language: English
Commentary: 62608
Pages: 263
City: Cambridge; New York
Cover......Page 1
Half-Title......Page 3
Title......Page 5
Copyright......Page 6
Foreword......Page 7
Contents......Page 9
Figures and Tables......Page 10
Acknowledgments......Page 12
Preface......Page 14
Hong Kong......Page 17
US Federal Courts......Page 18
Currency exchange rates......Page 19
CHAPTER ONE Introduction......Page 21
Structure and Plan......Page 22
Conclusion......Page 24
Cyber Crime Not Cybercrime......Page 25
Causal Connection......Page 27
Cyber Crime and Economic Crime......Page 29
Cyber Crime and White Collar Crime......Page 30
Cyber Crime and Intellectual Property Infringement......Page 31
Cyber Crime and Civil Wrongs......Page 32
Surveying Cyber Crime......Page 33
Organisational Victimisation Surveys......Page 34
Intellectual Property Loss Surveys......Page 37
Consumer Victimisation Surveys......Page 38
United States......Page 40
Canada......Page 41
United Kingdom......Page 43
Australia......Page 44
Impediments to Prosecution and Punishment......Page 45
Conclusion......Page 49
Prosecuting Cyber Crime......Page 51
Deciding whether to prosecute......Page 52
Civil Remedies or Criminal Prosecution......Page 56
Prosecutorial Priorities......Page 58
Framing the Charge......Page 60
Prosecuting Juveniles......Page 64
Cross-national comparisons......Page 66
Introduction......Page 68
Jurisdiction......Page 69
Where was the Crime?......Page 71
Foreign Prosecution......Page 73
Practicalities......Page 78
Conclusions......Page 80
Determining the Identity of the Offender......Page 81
Challenging the Admissibility of the Evidence......Page 82
Managing Large Volumes of Evidence......Page 84
Managing Encrypted Evidence......Page 85
Control......Page 87
Knowledge......Page 89
Challenging Private Involvement in Criminal Investigation......Page 91
Accident......Page 94
Legitimate Research......Page 95
Fantasy......Page 96
Addiction......Page 98
Therapy......Page 99
Covert Facilitation and Entrapment......Page 100
Challenges to the Integrity of Evidence......Page 101
Standard Forensic Procedures......Page 102
Conclusion......Page 103
The United States versus common law countries......Page 104
The Need for Adequate Cyber Crime Laws......Page 106
Crimes against the Person......Page 107
Crimes against Property......Page 108
Crimes against Morality......Page 109
Crimes against the Administration of Justice and Crimes against the State......Page 110
Privacy......Page 111
Economic Crime......Page 112
Intellectual Property Protection......Page 114
Illegal and Harmful Content......Page 115
National Harmonisation......Page 116
Australia’s Model Criminal Code Project......Page 117
The OECD......Page 118
The Council of Europe......Page 119
The United Nations......Page 120
The Council of Europe’s Convention on Cybercrime......Page 121
Title 2 – Computer-related offences......Page 122
Title 5 – Ancillary liability and sanctions......Page 123
Title 5 – Real-time collection of computer data......Page 124
Conclusion......Page 125
The Definition of Judicial Punishment......Page 126
Proportionality......Page 127
Denunciation......Page 129
Incapacitation......Page 130
Deterrence......Page 132
Rehabilitation......Page 133
Restitution......Page 134
The Choice of Appropriate Punishment......Page 135
Capital Punishment......Page 137
Forfeiture of Computer Equipment......Page 138
Restricted Access to Computers......Page 139
Home Confinement/Tagging......Page 141
Conclusions......Page 142
Introduction......Page 144
The Use of Individual Sentences......Page 145
Aggravating Factors......Page 148
United States Sentencing Commission Guidelines......Page 152
Aggravating Factors Found in Surveyed Cases......Page 153
Financial Loss......Page 154
Breaching Government Agency’s Systems......Page 155
Effects on Victims......Page 156
Sophistication, Planning and Expertise......Page 157
Previous Good Character and Absence of Prior Convictions......Page 158
Absence of Harm to Victims......Page 159
Mental Health Problems Including Computer / Internet Addiction......Page 160
Youth......Page 161
The Effect of Computer Involvement on Sentence......Page 162
Conclusions......Page 167
Does Cyber Crime Raise Unique Problems?......Page 170
Are Cyber Crimes Treated More Seriously Than Conventional Crimes?......Page 171
Policy Implications......Page 172
Improved Knowledge Base......Page 173
Further Investigation of Cases......Page 174
Global Cooperative Action......Page 175
References......Page 177
[Case No. 2]......Page 188
[Case No. 5]......Page 189
[Case No. 9]......Page 190
[Case No. 11]......Page 191
[Case No. 14]......Page 192
[Case No. 17]......Page 193
[Case No. 19]......Page 194
[Case No. 22]......Page 195
[Case No. 24]......Page 196
[Case No. 26]......Page 197
[Case No. 29]......Page 198
[Case No. 32]......Page 199
[Case No. 35]......Page 200
[Case No. 38]......Page 201
[Case No. 39]......Page 202
[Case No. 42]......Page 203
[Case No. 45]......Page 204
[Case No. 48]......Page 205
[Case No. 50]......Page 206
[Case No. 54]......Page 207
[Case No. 56]......Page 208
[Case No. 60]......Page 209
[Case No. 62]......Page 210
[Case No. 65]......Page 211
[Case No. 67]......Page 212
[Case No. 70]......Page 213
[Case No. 73]......Page 214
[Case No. 76]......Page 215
[Case No. 78]......Page 216
[Case No. 81]......Page 217
[Case No. 84]......Page 218
[Case No. 87]......Page 219
[Case No. 89]......Page 220
[Case No. 91]......Page 221
[Case No. 94]......Page 222
[Case No. 97]......Page 223
[Case No. 99]......Page 224
[Case No. 102]......Page 225
[Case No. 106]......Page 226
[Case No. 108]......Page 227
[Case No. 111]......Page 228
[Case No. 114]......Page 229
[Case No. 116]......Page 230
[Case No. 119]......Page 231
[Case No. 121]......Page 232
[Case No. 123]......Page 233
[Case No. 126]......Page 234
[Case No. 128]......Page 235
[Case No. 131]......Page 236
[Case No. 135]......Page 237
[Case No. 137]......Page 238
[Case No. 140]......Page 239
[Case No. 142]......Page 240
[Case No. 145]......Page 241
[Case No. 147]......Page 242
[Case No. 150]......Page 243
[Case No. 153]......Page 244
[Case No. 156]......Page 245
[Case No. 159]......Page 246
[Case No. 161]......Page 247
[Case No. 163]......Page 248
[Case No. 164]......Page 249
APPENDIX B Selected Legislative Summaries......Page 250
Index......Page 257