4+Crime,+Privacy+&+Law

=Crime, Privacy & the Law=

__Course Objectives__:

1) Define computer crime and provide examples 2) Discuss and provide examples of how computer technology can encroach on an individual’s privacy and identify legislation that has been or has been proposed to prevent such encroachment

Cyber Basics
US-CERT United States Computer Emergency Readiness Team (n.d.) Virus Basics Retrieved from []

US-CERT United States Computer Emergency Readiness Team (n.d.) Cyber Threats to Mobile Devices Retrieved from []

media type="youtube" key="_4sFZgUWhB4?version=3" height="315" width="560" align="center"

Cyber Crime
Bureau of Justice Assistance U.S. Department of Justice (2011) Internet Crime Complaint Center (IC3) Internet Crime Report Retrieved from http://www.ic3.gov/media/annualreport/2011_IC3Report.pdf

Bussewitz, C. (2012) Sellers beware: Check the check Retrieved from []

FBI (2009) Online Auction Fraud Retrieved from http://www.fbi.gov/news/stories/2009/june/auctionfraud_063009

FBI (2009) High Tech Heist 2,100 ATMs Worldwide Hit at Once Retrieved August 8, 2011 from @http://www.fbi.gov/news/stories/2009/november/atm_111609

Stone, B. (2009) 3 Indicted in Theft of 130 Million Card Numbers Retrieved from http://www.nytimes.com/2009/08/18/technology/18card.html

media type="youtube" key="gIqbQBkxC_I?version=3" height="315" width="420" align="center"

Cyber Espionage and Cyber Warfare
Alperovitch, D. (2011) Revealed: Operation Shady Rat MacAfee White Paper Retrieved from http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf

Haddick, R. (2011) This Week at War: Lessons from Cyber war I Retrieved from []

Hodge, N. and Entous, A. (2011) Oil Firms Hit by Hackers from China, Report says Retrieved from http://online.wsj.com/article/SB10001424052748703716904576134661111518864.html

Masters, J. (2011) Confronting the Cyber Threat Retrieved August 21, 2011 from @http://www.cfr.org/technology-and-foreign-policy/confronting-cyber-threat/p15577

The New York Times (2012) Cyber attacks on Iran - Stuxnet and Flame Retrieved from []

media type="youtube" key="7-TUv6iHmZM?version=3" height="315" width="560" align="center"

media type="youtube" key="6WmaZYJwJng?version=3" height="315" width="560" align="center"

Legislation
PBS Frontline (2012) Computer Crime Laws Retrieved from http://www.pbs.org/wgbh/pages/frontline/shows/hackers/blame/crimelaws.html

Shiels, M. (2010) US tech coalition calls for new online privacy law BBC News Retrieved from http://news.bbc.co.uk/2/hi/technology/8595775.stm

media type="youtube" key="AYYjr3XNaGs?version=3" height="315" width="560" align="center"

Privacy
CBS News (2011) Did the Internet Kill Privacy? Retrieved from http://www.cbsnews.com/8301-3445_162-7323148.html

Privacy Rights Clearing House (2011) Fact Sheet 7: WorkPlace Privacy and Employee Monitoring. Retrieved July 14, 2011 from []

Savage, David G. (2010) High Court Rejects Workers' Text Privacy. Retrived July 14, 2011 from []

Smith, Catherine and Craig Kanalley. (2011) Fired Over Facebook: 13 Posts That Got People CANNED. Retrieved July 14, 2011 from [|http://www.huffingtonpost.com/2010/07/26/fired-over-facebook-posts_n_659170.html#s115707&title=Swiss_Woman_Caught]

Zeider, Rita. (2007) Hr Magazine: How Deep Can You Probe? Retreived July 18, 2011 from []

media type="youtube" key="0UFW_v0G45M" height="349" width="425" align="center"

media type="youtube" key="azIW1xjSTCo" height="344" width="432" align="center"