Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Criminal Law

CyberCrime

Articles 1 - 18 of 18

Full-Text Articles in Law

Cyber And Tria: Expanding The Definition Of An "Act Of Terrorism" To Include Cyber Attacks, Nehal Patel Feb 2021

Cyber And Tria: Expanding The Definition Of An "Act Of Terrorism" To Include Cyber Attacks, Nehal Patel

Duke Law & Technology Review

The 9/11 terrorist attacks brought on financial losses that caused insurers and Congress to reevaluate how the United States approaches terrorism risk coverage. Congress quelled concerns of insurers evading coverage of future terrorist attacks by enacting the Terrorism Risk Insurance Act in 2002. This Note considers the difficulties presented by the out-of-date language employed by Congress in 2002 and proposes amendments so that the Act more clearly covers acts of cyberterrorism, which are ever-growing in their destructive potential.


Disloyal Computer Use And The Computer Fraud And Abuse Act: Narrowing The Scope, Greg Pollaro Aug 2010

Disloyal Computer Use And The Computer Fraud And Abuse Act: Narrowing The Scope, Greg Pollaro

Duke Law & Technology Review

Congress drafted the Computer Fraud and Abuse Act (CFAA) to protect government interest computers from malicious attacks by hackers. As computer use has expanded in the years since its enactment, the CFAA has similarly expanded to cover a number of computer-related activities. This iBrief discusses the extension of the CFAA into the employer/employee context, suggests that this goes beyond the Act's express purpose, compares the different approaches taken by the circuit courts in applying the CFAA to disloyal computer use by employees, and argues that the more recent approach taken by the Ninth Circuit provides a better model for determining …


Substantially Justified? The U.S. Government’S Use Of Name-Check Technologies In Naturalization Procedures, H. Jin Cho Jun 2010

Substantially Justified? The U.S. Government’S Use Of Name-Check Technologies In Naturalization Procedures, H. Jin Cho

Duke Law & Technology Review

The U.S. Citizenship and Immigration Services relies upon the Federal Bureau of Investigation to administer the National Name Check Program, which conducts background checks on applicants for naturalization. Backlogs have led to long delays for aspiring citizens and significant legal problems for the government.

This iBrief examines the First Circuit’s ruling in Aronov v. Napolitano that an eighteen-month delay in adjudicating a naturalization application was substantially justified. While the government’s inefficiency can be explained partly by an understaffed bureaucracy, overwhelming evidence suggests that these problems are exacerbated by a technological infrastructure that is ill-equipped to handle the scope of the …


Cyber Warfare And The Crime Of Aggression: The Need For Individual Accountability On Tomorrow’S Battlefield, Jonathan A. Ophardt Feb 2010

Cyber Warfare And The Crime Of Aggression: The Need For Individual Accountability On Tomorrow’S Battlefield, Jonathan A. Ophardt

Duke Law & Technology Review

As cyberspace matures, the international system faces a new challenge in confronting the use of force. Non-State actors continue to grow in importance, gaining the skill and the expertise necessary to wage asymmetric warfare using non-traditional weaponry that can create devastating real-world consequences. The international legal system must adapt to this battleground and provide workable mechanisms to hold aggressive actors accountable for their actions. The International Criminal Court--the only criminal tribunal in the world with global reach--holds significant promise in addressing this threat. The Assembly of State Parties should construct the definition of aggression to include these emerging challenges. By …


New Jersey’S Adult Internet Luring Statute: An Appropriate Next Step?, John W. Lomas Jr. Jun 2005

New Jersey’S Adult Internet Luring Statute: An Appropriate Next Step?, John W. Lomas Jr.

Duke Law & Technology Review

New Jersey recently enacted legislation prohibiting the use of the Internet to lure or entice someone to a location with the purpose of committing a crime with or against that person or some other person. Most states have similar laws pertaining to pedophiles, but this is the first adult Internet luring statute. State measures to regulate the Internet, even in the context of criminal justice, will likely face constitutional challenge since the Internet has become such a critical vehicle for both protected speech and interstate commerce. Furthermore, while the use of the Internet in the commission of crimes against other …


The Dormant Commerce Clause And State Regulation Of The Internet: Are Laws Protecting Minors From Sexual Predators Constitutionally Different Than Those Protecting Minors From Sexually Explicit Materials?, Chin Pann Mar 2005

The Dormant Commerce Clause And State Regulation Of The Internet: Are Laws Protecting Minors From Sexual Predators Constitutionally Different Than Those Protecting Minors From Sexually Explicit Materials?, Chin Pann

Duke Law & Technology Review

Several states have enacted statutes to protect minors from harmful or obscene materials disseminated over the Internet, as well as from pedophiles seeking to use the Internet to lure them into sexual conduct. State and federal courts have diverged in their analysis of the Dormant Commerce Clause's impact on state regulation in these areas. While state courts have held that the Dormant Commerce Clause does not invalidate state luring statutes, federal courts have been consistent in finding state dissemination statutes unconstitutional. This iBrief summarizes recent state and federal jurisprudence in this area and concludes that state courts have not been …


Plugging The “Phishing” Hole: Legislation Versus Technology, Robert Louis B. Stevenson Mar 2005

Plugging The “Phishing” Hole: Legislation Versus Technology, Robert Louis B. Stevenson

Duke Law & Technology Review

This iBrief analyzes the Anti-Phishing Act of 2005, legislation aimed at curbing the problem of "phishing." Phishing is the sending of fraudulent emails which appear to be from legitimate businesses and thereby fooling the recipients into divulging personal information such as credit card numbers. While this legislation may provide some assistance in the fight against phishing, it is limited by the global nature of the Internet and the ease with which phishers can hide and avoid judgments. This iBrief therefore concludes that although the Anti-Phishing Act can play a supporting role in the battle, technological solutions are the most effective …


Is I-Voting I-Llegal?, Brett Stohs May 2003

Is I-Voting I-Llegal?, Brett Stohs

Duke Law & Technology Review

The Voting Rights Act was passed to prevent racial discrimination in all voting booths. Does the existence of a racial digital divide make Internet elections for public office merely a computer geek's pipe dream? Or can i-voting withstand scrutiny under the current state of the law? This i-Brief will consider the current state of the law, and whether disproportionate benefits will be enough to stop this extension of technology dead in its tracks.


Vigilantes V. Pirates: The Rumble Over Peer-To-Peer Technology Hits The House Floor, Christopher Fazekas Oct 2002

Vigilantes V. Pirates: The Rumble Over Peer-To-Peer Technology Hits The House Floor, Christopher Fazekas

Duke Law & Technology Review

Content providers are using the digital rights management technology contained in this product to protect the integrity of their content ("Secure Content") so that their intellectual property, including copyright, in such content is not misappropriated... if you elect to download a license from the Internet which enables your use of Secure Content, Microsoft may, in conjunction with such license, also download onto your computer such security updates that a secure content owner has requested that Microsoft distribute.


Protecting The Homeland By Exemption: Why The Critical Infrastructure Information Act Of 2002 Will Degrade The Freedom Of Information Act, Brett Stohs Sep 2002

Protecting The Homeland By Exemption: Why The Critical Infrastructure Information Act Of 2002 Will Degrade The Freedom Of Information Act, Brett Stohs

Duke Law & Technology Review

To protect against "cyberterror," the House version of the Homeland Security Act exempts information related to the nation's critical infrastructure from the Freedom of Information Act disclosure requirements. The proposed exemption unnecessarily threatens public access to vital information about health and safety information; information the Freedom of Information Act was designed to guarantee.


Closed Circuit Television For Inside Your Head: Blanket Traffic Data Retention And The Emergency Anti-Terrorism Legislation, Caspar Bowden Apr 2002

Closed Circuit Television For Inside Your Head: Blanket Traffic Data Retention And The Emergency Anti-Terrorism Legislation, Caspar Bowden

Duke Law & Technology Review

Caspar Bowden, Director of the Foundation for Information Policy Research (FIPR), explains the technical and legal context of unprecedented new surveillance capabilities, with particular reference to the UK's Regulation of Investigatory Powers (RIP) Act 2000. He discusses why these powers are unlikely to be effective in detecting or disrupting the communications of terrorist cells or organized crime, but present significant new threats to the security, privacy, and freedom of expression of the law-abiding.


Cracking The Code To Privacy: How Far Can The Fbi Go?, Angela Murphy Jan 2002

Cracking The Code To Privacy: How Far Can The Fbi Go?, Angela Murphy

Duke Law & Technology Review

As the Nation continues to deal with the fallout of the events of September 11th, it must continue to decide what limits on privacy will be sacrificed in order to allow the government to tighten its security efforts. Who would have guessed that in this crazy post-September 11th world, the latest champion of Constitutional freedoms would be a reputed mobster?


Policing Online Pharmacies: Bioterrorism Meets The War On Drugs, Mark Sweet Nov 2001

Policing Online Pharmacies: Bioterrorism Meets The War On Drugs, Mark Sweet

Duke Law & Technology Review

In light of the recent terrorists attacks and the increasing threat of bioterrorism, many U.S. citizens have turned to the Internet in an attempt to gather the supplies needed to protect them and their loved ones. Central to the effort is the increased purchasing of prescription drugs over the Internet. This iBrief explores the benefits and risks to consumers from buying drugs online, and examines recent initiatives to police the online pharmacy industry.


Liberty For Security, Morgan Streetman Oct 2001

Liberty For Security, Morgan Streetman

Duke Law & Technology Review

On 11 September 2001, we collectively endured the worst tragedy to touch American soil since the Civil War. In the wake of this horrible event, a national hysteria erupted. People are anxious to restore the lost security; but at what cost? Many Americans seem not to care about the costs, and national polls show that now, more than ever, Americans are willing to trade their precious civil liberties in an attempt to restore security. As the ACLU has stated these are difficult days. Not only are they difficult, they will define the future of America. This iBrief explores the reactions …


Carnivore: Will It Devour Your Privacy?, Joseph Goodman, Angela Murphy, Morgan Streetman, Mark Sweet Aug 2001

Carnivore: Will It Devour Your Privacy?, Joseph Goodman, Angela Murphy, Morgan Streetman, Mark Sweet

Duke Law & Technology Review

Perhaps you have written an e-mail that looks something like this:


Virtual Las Vegas: Regulate Or Prohibit?, Cara Franklin Jun 2001

Virtual Las Vegas: Regulate Or Prohibit?, Cara Franklin

Duke Law & Technology Review

With online gambling becoming increasingly accessible and popular, state and federal politicians are asking themselves how to make the prohibition on online gambling effective. Nevertheless, questions still linger as to whether outright prohibition is truly the right answer.


Can You Yahoo!? The Internet’S Digital Fences, Brendon Fowler, Cara Franklin, Bob Hyde Mar 2001

Can You Yahoo!? The Internet’S Digital Fences, Brendon Fowler, Cara Franklin, Bob Hyde

Duke Law & Technology Review

The Yahoo! auction case illustrates the problems inherent in the lack of a common Internet jurisdictional structure. This iBrief argues that the application of local law allowed France to win a victory against domestic hate groups, but dealt a blow to free speech everywhere.


Internet Securities Fraud: Old Trick, New Medium, Brendon Fowler, Cara Franklin, Robert Hyde Feb 2001

Internet Securities Fraud: Old Trick, New Medium, Brendon Fowler, Cara Franklin, Robert Hyde

Duke Law & Technology Review

Billions of securities are traded every day in public and private markets around the world. This practice is hundreds of years old and as long as securities have been traded, someone has tried to defraud the system to make a quick buck. With the advent of the Internet, new securities fraud schemes have appeared.