Crime, Privacy & the Law


Course Objectives:

1) Define computer crime and provide examples
2) Discuss and provide examples of how computer technology can encroach on an individual’s privacy and identify legislation that has been or has been proposed to prevent such encroachment

Cyber Basics


US-CERT United States Computer Emergency Readiness Team (n.d.) Virus Basics Retrieved from
http://www.us-cert.gov/reading_room/virus.html

US-CERT United States Computer Emergency Readiness Team (n.d.) Cyber Threats to Mobile Devices Retrieved from
http://www.us-cert.gov/reading_room/TIP10-105-01.pdf



Cyber Crime


Bureau of Justice Assistance U.S. Department of Justice (2011) Internet Crime Complaint Center (IC3) Internet Crime Report Retrieved from
http://www.ic3.gov/media/annualreport/2011_IC3Report.pdf

Bussewitz, C. (2012) Sellers beware: Check the check Retrieved from
http://www.pressdemocrat.com/article/20120608/ARTICLES/206081028?p=1&tc=pg

FBI (2009) Online Auction Fraud Retrieved from
http://www.fbi.gov/news/stories/2009/june/auctionfraud_063009

FBI (2009) High Tech Heist 2,100 ATMs Worldwide Hit at Once Retrieved August 8, 2011 from
http://www.fbi.gov/news/stories/2009/november/atm_111609

Stone, B. (2009) 3 Indicted in Theft of 130 Million Card Numbers Retrieved from
http://www.nytimes.com/2009/08/18/technology/18card.html



Cyber Espionage and Cyber Warfare


Alperovitch, D. (2011) Revealed: Operation Shady Rat MacAfee White Paper Retrieved from
http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf

Haddick, R. (2011) This Week at War: Lessons from Cyber war I Retrieved from
http://www.foreignpolicy.com/articles/2011/01/28/this_week_at_war_lessons_from_cyberwar_i

Hodge, N. and Entous, A. (2011) Oil Firms Hit by Hackers from China, Report says Retrieved from
http://online.wsj.com/article/SB10001424052748703716904576134661111518864.html

Masters, J. (2011) Confronting the Cyber Threat Retrieved August 21, 2011 from
http://www.cfr.org/technology-and-foreign-policy/confronting-cyber-threat/p15577

The New York Times (2012) Cyber attacks on Iran - Stuxnet and Flame Retrieved from
http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_malware/stuxnet/index.html






Legislation


PBS Frontline (2012) Computer Crime Laws Retrieved from
http://www.pbs.org/wgbh/pages/frontline/shows/hackers/blame/crimelaws.html

Shiels, M. (2010) US tech coalition calls for new online privacy law BBC News Retrieved from
http://news.bbc.co.uk/2/hi/technology/8595775.stm



Privacy


CBS News (2011) Did the Internet Kill Privacy? Retrieved from
http://www.cbsnews.com/8301-3445_162-7323148.html

Privacy Rights Clearing House (2011) Fact Sheet 7: WorkPlace Privacy and Employee Monitoring. Retrieved July 14, 2011 from
https://www.privacyrights.org/fs/fs7-work.htm

Savage, David G. (2010) High Court Rejects Workers' Text Privacy. Retrived July 14, 2011 from
http://seattletimes.nwsource.com/html/nationworld/2012145845_scotus18.html

Smith, Catherine and Craig Kanalley. (2011) Fired Over Facebook: 13 Posts That Got People CANNED. Retrieved July 14, 2011 from
http://www.huffingtonpost.com/2010/07/26/fired-over-facebook-posts_n_659170.html#s115707&title=Swiss_Woman_Caught

Zeider, Rita. (2007) Hr Magazine: How Deep Can You Probe? Retreived July 18, 2011 from
http://www.shrm.org/Publications/hrmagazine/EditorialContent/Pages/1007sr-zeidner.aspx