Difference between revisions of "Internet Crime"

From Conservapedia
Jump to: navigation, search
(Criminal Statutes Governing the Internet: update)
Line 27: Line 27:
*18 USC § 2701, prohibits access to information stored on a computer
*18 USC § 2701, prohibits access to information stored on a computer
Most states also have their own laws criminalizing improper internet activity, which are often stronger and more easily enforced than the federal law:
Most states also have their own laws making it a crime to access a computer or network with the permission of the owner. 
Line 37: Line 37:
*ORC §2913.04 ("Unauthorized use of computer or telecommunication property")  
*ORC §2913.04 ("Unauthorized use of computer or telecommunication property")  
*ORC §2917.21 ("Telecommuncation harassment")
*ORC §2917.21 ("Telecommuncation harassment")
Other states that have similar laws, and where arrests have been made, include:
== Successful prosecutions ==
== Successful prosecutions ==

Revision as of 19:52, 17 May 2008

Internet Crime is really a group of online related crimes, most of them particular or unique to the Internet. Some of them are variations on older schemes of a non-Internet nature, adapted for use on the Net.


Criminal Statutes Governing the Internet

Here are federal laws criminalizing wrongful internet activity:

  • 15 USC §§ 7701-7713, Controlling Assault of Non-Solicited Pornography and Marketings Act of 2003 (CAN-SPAM Act)
  • 18 USC § 1029, prohibits fraud and related activity using access devices
  • 18 USC § 1030, prohibits destructive activity, punishable by up to 10 years in jail ("Computer Fraud and Abuse Act")
  • 18 USC § 1030(a)(5)(A) Knowingly transmitting a program, script, or code that would cause damage to a protected computer
  • 18 USC § 1343, prohibits wire fraud
  • 18 USC § 1361-2, prohibits malicious mischief
  • 18 USC § 1470, prohibits unwanted obscenity, punishable by up to 10 years in jail
  • 18 USC § 1951, prohibits interfering with commerce by threats or violence
  • 18 USC § 2314, prohibits interstate transport of improperly obtained materials[1]
  • 18 USC § 2510-11, prohibits interception of electronic communications ("Electronic Communications Privacy Act", "ECPA")
  • 18 USC § 2701, prohibits access to information stored on a computer

Most states also have their own laws making it a crime to access a computer or network with the permission of the owner.


  • 752.795 Prohibited conduct. (Unauthorized Use of Computer Access)[2][3]


  • ORC §2913.04 ("Unauthorized use of computer or telecommunication property")
  • ORC §2917.21 ("Telecommuncation harassment")

Other states that have similar laws, and where arrests have been made, include:

  • Alaska
  • Florida
  • Illinois
  • Texas
  • Washington

Successful prosecutions

  • Up to "a total of 60 years in prison and fines of $1.75 million" face botnet user John Schiefer, convicted of 4 felonies for "accessing protected computers, disclosing illegally intercepted electronic communications, wire fraud and bank fraud." Some of his accomplices were teenagers.[4]
  • "A federal jury in Phoenix, Arizona convicted Jeffrey Kilbride, 41, of Venice, California and James Schaffer, 41 of Paradise Valley, Arizona of eight counts, including conspiracy, fraud, money laundering, and transportation of obscene materials. ... They face up to five years in jail for each spam and obscenity offense and a fine of up to $500,000 and up to 20 years for money laundering. They will be sentenced in September" 2007.[5]
  • Robert Morris was a graduate student in computer science at Cornell University who released his worm on the internet on Nov. 2, 1988. In 1990, Morris was convicted of violating 18 USC § 1030. He appealed, and his conviction was affirmed in U.S. v. Morris, 928 F.2d 504 (2d Cir. 1991). He petitioned the Supreme Court but it had better things to do, and it denied cert. in 502 U.S. 817 (1991).

Pending Charges

A 19-year-old resident of the State of Washington named Randy Travis, who used an online name of "fireismyplaymate" was charged "with five felonies after using a computer hacking-scheme to falsely report a homicide in California." If convicted, he faces up to 18 years in jail. [6]

Two college students face a $250,000 fine and 20 years in jail for their "unauthorized computer access, identity theft, conspiracy, and wire fraud" in misusing the school computer. They changed their grades in the school computer. [7]

Other rules

Most schools, employers and internet service providers (ISPs) prohibit misuse of their computers, and disciplinary action can be expected by those who harassing others or vandalize websites using someone else's property. For example, the University of Cincinnati has a strict policy against misuse of its system.[8]


Publication of false information that is injurious to the reputation of another is called libel and can be the basis of a lawsuit for damages. Internet communications (web pages and postings to newsgroups or mailing lists) are considered publications.


Theft, misuse or illegal use of information technology such as computer hardware or software, electronic mail or information, voice mail, telephone, fax, including but not limited to:

1) Unauthorized entry into a file to use, read or change the contents, or for any other purpose.

2) Unauthorized transfer or distribution of a file.

3) Unauthorized use of another individual’s identification and password.

4) Use of information technology to interfere with the work of another student, faculty member, or University official or with normal operations of the University.

5) Use of information technology for unauthorized posting of copyrighted materials or obscenities"

Computer Crime & Intellectual Property Section United States Department of Justice

Reporting Computer Hacking, Fraud and Other Internet-Related Crime:
The primary federal law enforcement agencies that investigate domestic crime on the Internet include: the Federal Bureau of Investigation (FBI), the United States Secret Service, the United States Immigration and Customs Enforcement (ICE) , the United States Postal Inspection Service, and the Bureau of Alcohol, Tobacco and Firearms (ATF) . Each of these agencies has offices conveniently located in every state to which crimes may be reported. Contact information regarding these local offices may be found in local telephone directories. In general, federal crime may be reported to the local office of an appropriate law enforcement agency by a telephone call and by requesting the "Duty Complaint Agent."

Each law enforcement agency also has a headquarters (HQ) in Washington, D.C., which has agents who specialize in particular areas. For example, the FBI and the U.S. Secret Service both have headquarters-based specialists in computer intrusion (i.e., computer hacker) cases. [9]

The Internet Crime Complaint Center

The Internet Crime Complaint Center (IC3) was established as a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C) to serve as a means to receive Internet related criminal complaints and to further research, develop, and refer the criminal complaints to federal, state, local, or international law enforcement and/or regulatory agencies for any investigation they deem to be appropriate. The IC3 was intended, and continues to emphasize, serving the broader law enforcement community to include federal, as well as state, local, and international agencies, which are combating Internet crime and, in many cases, participating in Cyber Crime Task Forces.

Since its inception, the IC3 has received complaints crossing the spectrum of cyber crime matters, to include online fraud in its many forms including Intellectual Property Rights (IPR) matters, Computer Intrusions (hacking), Economic Espionage (Theft of Trade Secrets), Online Extortion, International Money Laundering, Identity Theft, and a growing list of Internet facilitated crimes. Since June 2000, it has become increasingly evident that, regardless of the label placed on a cyber crime matter, the potential for it to overlap with another referred matter is substantial. Therefore, the IC3, formerly known as the Internet Fraud Complaint Center (IFCC), was renamed in October 2003 to better reflect the broad character of such matters having an Internet, or cyber, nexus referred to the IC3, and to minimize the need for one to distinguish "Internet Fraud" from other potentially overlapping cyber crimes.

IC3 Mission Statement

  • IC3's mission is to serve as a vehicle to receive, develop, and refer criminal complaints regarding the rapidly expanding arena of cyber crime. The IC3 gives the victims of cyber crime a convenient and easy-to-use reporting mechanism that alerts authorities of suspected criminal or civil violations. For law enforcement and regulatory agencies at the federal, state, local, and international level, IC3 provides a central referral mechanism for complaints involving Internet related crimes.
  • Significant and supplemental to partnering with law enforcement and regulatory agencies, it will remain a priority objective of the IC3 to establish effective alliances with industry. Such alliances will enable the IC3 to leverage both intelligence and subject matter expert resources, pivotal in identifying and in crafting an aggressive, proactive approach to combating cyber crime. [10]

See Also

Chinese Cyberterrorism


  1. This applies to computer data files U.S. v. Riggs, 739 F.Supp. 414 (N.D.Ill 1990).
  2. http://www.legislature.mi.gov/(S(vjums4ac12pjz555m2jvvk55))/mileg.aspx?page=getObject&objectName=mcl-752-795
  3. http://news.com.com/8301-10784_3-9722006-7.html
  4. [1]
  5. http://www.theregister.co.uk/2007/06/26/can_spam_convictions/
  6. [2]
  7. [3]
  8. http://www.uc.edu/ucit/ITpolicydefs.asp#fedlaw
  9. http://www.usdoj.gov/criminal/cybercrime/reporting.htm
  10. http://www.ic3.gov/about/