MARC

LEADER 00000nab a2200000uu 4500
001 230364912
003 UK-CbPIL
022 |a 0164-0364 
022 |a 0271-4574 
022 |a 0002-8118 
035 |a 230364912 
045 2 |b d20070401  |b d20070630 
084 |a 23243  |2 nlm 
100 1 |a Huang, Xiaomin 
245 1 |a COMPUTER CRIMES 
260 |b Georgetown University Law Center  |c Spring 2007 
513 |a Feature 
520 3 |a 4 To combat these new criminal behaviors, Congress passed specialized legislation.5 Experts have had difficulty calculating the damage caused by computer crimes due to (i) the difficulty in adequately defining what is a computer crime,6 (ii) victims' reluctance to report incidents for fear of losing customer confidence,7 (iii) the dual system of prosecution,8 and (iv) the lack of detection.9 In 2006, the Department of Justice's Bureau of Justice Statistics and the Department of Homeland security's National Cyber security Division began a joint effort to estimate the number of cyber attacks and the number of incidents of fraud and theft of information.10 B. Types of Computer-Related Offenses DOJ divides computer-related crimes into three categories according to the computer's role in the particular crime.11 First, a computer may be the object of a crime.12 This category primarily refers to theft of computer hardware or software.13 Second, a computer may be the subject of a crime.14 In this category, the computer is akin to the pedestrian who is mugged or the house that is robbed - it is the subject of the attack and the site of any damage caused. [...] the United States and thirty-three other countries have signed the Council of Europe's Treaty on Cybercrime.394 The Treaty on Cybercrime requires parties to: (i) establish substantive laws against cybercrime; (ii) ensure that their law enforcement officials have the necessary procedural authorities to investigate and prosecute cybercrime effectively; and (iii) provide international cooperation to other parties in the fight against computer-related crime.395 While the United States has already signed the treaty, the Senate still must ratify the treaty in order to give it effect in the United States.396 Second, the United States participates actively in the Subgroup on High-tech Crime at G-8's Lyon Group.397 One accomplishment of the Subgroup includes the development of a network that allows law enforcement authorities of member nations to contact each other for rapid assistance in investigating computer crime and preserving electronic evidence.398 In addition to increased multinational governmental cooperation, international organizations and private corporations are also working to combat international computer crimes by contributing to the drive to harmonize national legislation.399 For example, in 1992 the Business Software Alliance, a software industry trade group, launched an international copyright enforcement program involving national software trade associations and law enforcement agencies that began by focusing on distribution of counterfeit software.400 Nonetheless, international efforts have been mixed. 
653 |a Legislation 
653 |a International organizations 
653 |a Wire fraud 
653 |a States 
653 |a Search & seizure 
653 |a First Amendment-US 
653 |a Federal government 
653 |a Criminal law 
653 |a Identity theft 
653 |a Software industry 
653 |a Websites 
653 |a Cybercrime 
653 |a Internet service providers 
653 |a Interstate commerce 
653 |a Cybersecurity 
653 |a International trade 
653 |a Software 
653 |a Theft 
653 |a White collar crime 
653 |a National security 
653 |a Housing authorities 
653 |a Victims 
653 |a Criminality 
653 |a Computers 
653 |a Treaties 
653 |a Pedestrians 
653 |a Trade associations 
653 |a Law enforcement agencies 
653 |a Criminal justice 
653 |a Law enforcement 
653 |a Legislatures 
653 |a Police 
653 |a Internet 
653 |a International cooperation 
653 |a Fraud 
653 |a Crime 
653 |a Procedural justice 
653 |a Cooperation 
653 |a Closely held corporations 
653 |a Fear of crime 
653 |a Classification 
653 |a Counterfeiting 
653 |a Offenses 
653 |a Statistics 
700 1 |a Radkowski, Peter, III 
700 1 |a Roman, Peter 
773 0 |t The American Criminal Law Review  |g vol. 44, no. 2 (Spring 2007), p. 285-335 
786 0 |d ProQuest  |t Criminal Justice Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/230364912/abstract/embedded/H09TXR3UUZB2ISDL?source=fedsrch 
856 4 0 |3 Full Text  |u https://www.proquest.com/docview/230364912/fulltext/embedded/H09TXR3UUZB2ISDL?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/230364912/fulltextPDF/embedded/H09TXR3UUZB2ISDL?source=fedsrch