Internet Business Law Services (IBLS)
16320 Bake Parkway, Suite 100, Irvine, CA 92618 US
Phone: 9497560906 Website: www.ibls.com
150 articles found for Cyber crime

Article Search Results

From the News Portal
Title/Abstract
Test Results for Software Write Block Tools, PDBLOCK version 2.10
U.S. Department of Justice
...
Kids More Likely to Take Online Risks at Home than School, A New Study Shows
Taken from the Business Software Alliance Website
...
Internet Fraud Statistics- First Half 2005
National Fraud Information Center
...
Hacking
Asian School of Cyber Laws
...
Tools and Techniques of Cyber Crime
Asian School of Cyber Laws
...
How the Nigerian Counterfeit Check Scam can Typify Bank Fraud
Martha L. Arias, Attorney at Law; IBLS Editor
The Nigerian Counterfeit Check Scam continues to defraud people around the world despite numerous warnings. Nigerian scammers are now using cashier's and treasury checks, ...
Online Defamation: How to Unmask the Online Defamer?
Martha L. Arias, Attorney at Law; IBLS Editor
Online defamation is one of those malicious crimes that make its victims feel powerless; this is because must defamatory statements on the Internet are ...
Does the Computer Fraud and Abuse Act Apply to an Employee who Exceeds Authorized Access to the Employer’s Computer?
Martha L. Arias, Attorney at Law; IBLS Editor
The U.S. Computer Fraud and Abuse Act (CFAA) is a federal law enacted to prevent hacking of computer systems, and to address federal computer-related ...
Cyber-attack
IBLS Staff
The most recent campaign of cyber-attacks uses WhatsApp cross-platform IM app for smartphones with malware being distributed by the voicemail service. ...
Cybercrime Initiative (part 2)
Mike Redford JD, LL.M, JSD
The United States Presidents have been proactive in participating in the fight against cybercrime. ...
Cybercrime Initiative (part 3 )
Mike Redford , JD, LL.M, JSD
United States President Obama persuaded EU and other countries to stay active in fighting cybercrime. One of such global effort has yielded bill S.3155 ...
Cybercrime Initiative (part 4)
Mike Redford, JD, LL.M, JSD
Is United States Congress’s focus on domestic cybercrime solutions sufficient enough to address cybercrimes committed from outside the United States? Are US citizens ...
Privacy and Cybercrime (Part 5)
Mike Redford, JD, LL.M, JSD ,PhD
There are many of the cybercrime laws that have reached out to the common law, particularly frequent reliance on the case laws. The concern ...
Cybercrime Initiative(Part 6)
Mike Redford JD, LL.M, JSD
Communication laws use for cybercrime There are many adopted laws to operate in cyber world based on the linguistics in Table 3. The emerging cyber ...
Cybercrime Initiative (Part 7)
Mike Redford, JD, LL.M, JSD
Cyber Legislation Protecting Students and Children Cyber legislation protecting students has yet to gain attention in Washington. The bill H.R.780 promotes the safe use of ...
Primary Cybercrime Sources in the US (Part 8)
Mike Redford, JD, LL.M, JSD
Primary Crime Sources in the US There are two primary Internet crime sources in the United States. They are hacking and identity theft. Many use ...
Primary Cyber Crime Sources in the US (Part 9)
Mike Redford JD, LL.M, JSD
Primary Cyber-Crime Sources in the US a. Hacking Hacking is the illegal access of a computer network or information technology of another to invade the privacy ...
Criminal Justice Platform Europe: change of culture regarding the position of victims has to be achieved in the whole judicial chain
EuropaWire.eu
Criminal Justice Platform Europe: change of culture regarding the position of victims has to be achieved in the whole judicial chain ...
Minimize the risk of food fraud, adulteration, criminal or terrorist attack in the food supply chain
http://news.europawire.eu/sgs-webinar-on-january-29-2015
Minimize the risk of food fraud, adulteration, criminal or terrorist attack in the food supply chain ...
Gov.uk: New online training to their protect their clients from cyber-attacks
http://news.europawire.eu/gov-uk
Gov.uk: New online training course to help legal and accountancy professions to protect themselves and their clients from cyber-attacks New course is launched to help ...
Unique new offer to detect and react to advanced internal and external business threats
Europa Wire
Capgemini, one of the world’s foremost providers of consulting, technology and outsourcing services today announced, with Pivotal, the company at the intersection of big ...
Deutsche Telekom: T-Systems and FireEye form partnership specializing in defending against complex cyber attacks in Europe
europawire.eu/deutsche-telekom-t-systems
Deutsche Telekom: T-Systems and FireEye form partnership specializing in defending against complex cyber attacks in Europe ...
NAAG Initiatives: Computer Crime Point-of-Contact List
National Association of Attorneys General -NAAG
...
Extortionists are Using BBB Name to Scam Online Buyers
Better Business Bureau- BBB
...
Creating a Safer Information Society by Improving the Security of Information Infrastructures and Combating Computer-related Crimes
Commission of the European Communities
...
Technical Trends in Phishing Attacks
Jason Milletary, US Cert.
...
Not all Identity Theft is Cyberspaced; Incidents more Likely to Be
The Better Business Bureau- BBB
...
Hacking and the Indian Law
Asian School of Cyber Laws
...
War Declared Against Cyber Crime in S. Korea
Taken from www.english.people.com.cn
...
Small businesses urged to report online credit card fraud
Senator the Hon Chris Ellison, Minister of Justice and Customs
...
India: Cyber Crimes Adjudication Issues
Taken from asialaws.com
...
What Laws Apply to Intellectual Property Cybercrimes?
IBLS Editorial Staff
Intellectual Property (IP) Cybercrime is a growing phenomenon that may have catastrophic financial consequences. It is necessary to know what laws apply to ...
Ireland Discovered on Cybercrime
IBLS Editorial Department
Interestingly, Ireland recently discovered, through the publication of the Irish Cyber Crime Survey 2006, that ninety percent of their company businesses are suffering from ...
FBI Warns Public of E-mail Scams
Federal Bureau of Investigations, www.fbi.gov
The FBI today warned the public against three separate Internet scams that continue to flourish through spam e-mails. The warning comes after the FBI's ...
Tough New German Anti—Hacking Law Threatens 10 Years in Prison
IBLS Editorial Department
Hackers in Germany should be very careful to cover their tracks after the Bundestag passed a law in May 2007 that makes such computer ...
Japan Nabs Web 'Crime Mates'
Japan- CNN.com
Three men who met on an Internet site that matches up criminals were arrested after battering a woman to death and abandoning her body ...
Internet Obscenity is not a Constitutionally Protected Speech or Press

A United States federal statute prohibits individuals from reviewing or downloading obscene material from the Internet. 18 U.S.C.S. § 1462. People indicted under ...
Computer Hacking: A global Problem that Requires a Global Solution
Martha L. Arias, Attorney at Law; IBLS Editor
Computer hacking is a cybercrime that transcends boundaries; therefore, an international legal solution is to come. The DNSChanger virus is an example of this ...
Sweden Passes Wiretap Law Amid Widespread Protests
Kelly O'Connell, IBLS Editor
A new electronic surveillance law described as "the most far-reaching eavesdropping plan in Europe,” was recently passed by the Swedish Parliament. The new statute ...
Governor Palin's Email Hack: Federal Statutory Law
Kelly O'Connell, IBLS Editor
In the midst of an FBI investigation and convening of a grand jury, it is still not clear if there will be a prosecution ...
Phishing – Becoming a Major Threat in United States
IBLS Editorial Staff
In United States, phishing is becoming one of the fastest evolving classes of identity theft scams on the Internet, causing both short-term losses and ...
The State of Global Cybersquatting in 2007
IBLS Editorial Staff
The World Intellectual Property Organization (WIPO) reports Internet cybersquatting is exploding globally, up 25% in 2006 over the previous year, as even software colossus ...
How to Use Statistics in your Awareness Program: A Look at the 2004 CSI/FBI Computer Crime and Security Survey
US Computer Security Institute
...
Turkish Ministry of Justice announced the 'Bill on Cybercrimes and Regulation of IT Network Services”
Ali Osman Ozdilek, Esq., from Guvener & Can Law Firm, Istanbul, Turkey, ALIOSMAN.OZDILEK@digiturk.com.tr
The New Bill covers responsibilities of content providers, hosting providers, access providers, IT network service providers and collective usage facilities providers as well as ...
Japan’s National Police Agency Reported a 11.8% Increase in Cybercrime
Martha L. Arias, IBLS Director.
Since June 2005, when a Japanese young boy bombed a classroom in Japan claiming he had learned how to do this on the Internet, ...
The EU Modifies Europol’s Legal Framework to Fight Cybercrime
Editor, Maricelle Ruiz, IBLS Director -- Europe
The European Union is transforming Europol to facilitate international police cooperation in the fight against organized crime, terrorism and cybercrime. To accomplish this task, ...
Cybercrime Statistics in Australia
Martha L. Arias, IBLS Director.
AusCERT, Australian High Tech Crime Centre, and various state, territory and federal police agencies provided the most recent report on cybercrime in Asustralia. ...
Europe Roots out Cyberstalking
Maricelle Ruiz- IBLS Director for Europe
As Internet users increase in Europe, the prevalence of cyberstalking is escalating as well. Law enforcement and company executives are taking no chances and ...
Information Document Concerning the Cybercrime Convention Committee (T-CY)
Council of Europe
...
Protection of Children Against Abuse Through New Technologies - Cybercrime Convention Committee
Council of Europe
...
Implementation of the Convention on Cybercrime in Germany
Council of Europe
...
Child Abuse in Relation to Trafficking of Human Beings
EUROPOL
...
Council of Europe releases organised crime assessment
Council of Europe
...
Convention on Cybercrime
Council of Europe
...
Additional Protocol to the Convention on cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems
Council of Europe
...
Be Suspicious About Wiring Money Back After Cashing a Check
U.S. Federal Trade Commission
...
Intellectual Property (IP) Crime
Interpol
...
Russia: Authorities Warn Of Cybercrime Epidemic
RFE/RL
...
Cybercrime Convention now penalizes illegal, pornographic content distributed through phones and PDAs
Editor, Maricelle Ruiz, IBLS Director -- Europe
The Committee charged with updating the Convention on Cybercrime wants to keep criminals from using the latest technology to exchange pornographic content involving minors. ...
Are Online Dating Sites Regulated by Federal Law?
Martha L. Arias, IBLS Director.
Online dating sites are booming among all ages. Successful online dating sites such as eHarmony, Yahoo Personals, Match.com, among others, are excellent examples ...
Between Einstein's and Mueller's Plan, Will the FBI Monitor the Cyber-highways?
Martha L. Arias, Immigration and Internet Law Attorney, Miami; IBLS Director
The current FBI Director, Robert Mueller, is suggesting an Internet surveillance plan that would allow the FBI to monitor Federal-government networks and private-sector networks. ...
Kenya, Uganda and Tanzania adopt cyber laws
Editor, Maricelle Ruiz, IBLS Director -- Africa
Kenya, Uganda and Tanzania are in the process of adopting harmonized cyber laws to enable the establishment of e-government and e-commerce programs, according to ...
What Laws Apply to Intellectual Property Cybercrimes?
IBLS Editorial Staff
The recent actuality involving software piracy and the distribution of bootleg musical recordings and movies over the Internet is a clear sign that law ...
Germany Convicts Non-Resident Blogger for Inciting Hatred by Denying Holocaust
Kelly O'Connell, IBLS Editor
Claiming the Holocaust is a hoax is illegal in Germany, even online, and a non-resident alien man who denied the veracity of the Third ...
Spain sends hackers to prison
Editor, Maricelle Ruiz, IBLS Director – Europe
Spain could soon begin sentencing hackers to prison even if these individuals don’t misuse the data accessed when breaking into information systems. Bill 119-1 ...
INTERPOL Urges Integrated Global Cyber-crime Investigation Network to Combat Online Threat
Interpol, www.interpol.int
INTERPOL Secretary General Ronald K. Noble today, Wednesday, urged law enforcement agencies to establish integrated National Central Reference Points (NCRPs) to facilitate the prevention, ...
Trends in Identity Theft, From 2007 into 2008
Kelly O'Connell, IBLS Editor
While certain new developments have characterized Identity Theft in 2007, others are believed to be on the cusp for 2008. The analysts at the ...
Are the United States Federal and State Governments ready to Prosecute Phishing Attacks?
IBLS Editorial Staff
Ever since 1998, Federal law and state laws in almost all of the states in United States have enacted explicit criminal legislation related to ...
The Child Exploitation Section of United States Immigration and Customs Enforcement is Resolute to Apprehend Internet Child Pornographers
IBLS Editorial Staff
The United States Immigration and Customs Enforcement’s (ICE) Cyber Crimes Center has achieved vast success in identifying and apprehending Internet child pornographers over the ...
Argentina Modifies its Criminal Code to Include Information Technology Crimes
IBLS Editorial Department
Argentina approved law 26388 (2008) that updates its criminal code and sanctions information technology crimes. On June 4th, and after numerous debates, Argentinean “Camara ...
Missouri Governor Signs Cyber-Bullying Bill into Law
IBLS Editor
On June 30th, Missouri governor, Matt Blunt, signed a bill updating state laws against harassment by removing the requirement in the legislation requiring that ...
EU Agency Responding to the European Commission’s Call for Action against Cyber Threats in Europe
IBLS Contributor: ENISA- www.enisa.europa.eu
EU Agency responding to the European Commission’s call for action against cyber threats in Europe The European Network and Information Security Agency, i.e. the EU ...
Are Government Peer-to-Peer Software Searches Constitutional?
Martha L. Arias, IBLS Director
Cybercrime is rising and so are government computer searches. This is because when cybercriminals find new ways to conduct their activities, governments have to ...
Should We Go To War Over A Massive Cyber-Attack?
Editor, Maricelle Ruiz, IBLS Director – Europe
Estonia is doing it again. The tiny Eastern European nation – holder of the first Internet election – is pushing the boundaries to set ...
Some Cybercrimes against Minors may not Require that the Actual Victim be a Minor
Martha L. Arias, Immigration and Internet Law Attorney, Miami; IBLS Director
One of the most aberrant types of cybercrime is the one that targets minors. Online communications make it easier for predators, and, for this ...
Global Manhunt Coordinated on the Internet
Editor, Maricelle Ruiz, IBLS Director – Europe
The Internet has become a key tool in the fight against child abductions. It spreads kidnapping information and victims’ pictures in a flash worldwide. ...
Legal and Ethical Implications of Computer Misuse by Attorneys
IBLS Editorial Department- Staff Attorney
As a greater percentage of lawyers become computer savvy, there is a marked increase in ethical violations committed via computers. These violations can lead ...
What Conducts Does the European Convention on Cybercrime Criminalize?
IBLS Editorial Department
The European Union (EU) member states signed the European Convention on Cybercrime (Cybercrime Convention) in 2001. It goal is to combat cybercrime among ...
An Explosion in Cyber crime Sets off Alarms in Europe
Editor, Maricelle Ruiz, IBLS Director – Europe
A video circulates on the Internet linking several individuals accused of the largest terrorist attack in Europe, the 2004 Madrid train bombings, to the ...
European Convention on Human Rights v. Privacy Violations and Data Held by Internet Service Providers
Martha L. Arias, IBLS Director
European citizens claiming violation of privacy have looked for legal remedy on articles 8 and 13 of the European Convention on Human Rights when ...
Ponzi Scheme on the Internet
Martha L. Arias, Immigration and Internet Law Attorney, Miami; IBLS Director
Ponzi schemes are flourishing in the world; as a manifestation of the inexhaustible money and power ambition that drives the 21st -century society. ...
Spam King Robert Soloway Arrested for Sending Billions of Illegal Messages a Day
IBLS Editorial Staff
On May 30, 2007 Robert Alan Soloway, voted one of the ten biggest spam artists in the world, was arrested in Seattle, a week ...
Examples of the Intentional Computer Damage Crime
Martha L. Arias, IBLS Director
Computer fraud, with its multiple ramifications, is among the ever increasing criminal conducts in this information era. The United States Code § 1030 penalizes ...
The European Union’s Work Strategies and Practical Measures against Cybercrime
Martha L. Arias, Immigration & Internet Law Attorney, Miami; IBLS Director
The steady increase of cybercrime with transnational implications concerns the European Union member states. For this reason, the European Council concerted some work strategies ...
Offenses related to Computer Crimes and the Protection of Information and Data
IBLS Legal Contributor: Isabella Gandini, Andrés Isaza, Alejandro Delgado, Parra, Rodriguez & Cavalier, Alejandro.Delgado@prc-laws.com
On January 5, 2009, Colombia's Congress enacted Act 1273 that amends the Criminal Code and creates a new legally protected interest called information and ...
Bullying and Cyber-Bullying Prohibited under Florida Law
Martha L. Arias, Immigration and Internet Law Attorney, Miami; IBLS Director
Bullying and, in particular, cyber-bullying is becoming a frequent practice among the American youth. Incidents are reaching such daunting results that state legislatures ...
Finding the “Anonymous Dogs” on the Internet: Court-Authorized Investigations of Anonymous Illegal Conduct
By David J. Goldstone, partner, Goodwin Procter
A well-known New Yorker cartoon with two dogs at a computer ran with the caption, "On the Internet, nobody knows you're a dog.” The ...
Prohibition from Accessing the Internet as Defendant’s Condition of Supervised Release
Martha L. Arias, Immigration and Internet Law Attorney, Miami; IBLS Director
Defendants in criminal proceedings are imposed conditions or restrictions when granted supervised release. Now with Internet crimes on the rise, United States (U.S.) courts ...
Mobile Porno, How to Protect Yourself in Cyberspace
IBLS Cybercrime Diploma Graduate, Marjorie S. Rieskin
Internet is a global connection of networks and, therefore, it is difficult to exercise control over the Internet. Yet, control is necessary. To exercise ...
Finding the “Anonymous Dogs” on the Internet: Court-Authorized Investigations of Anonymous Illegal Conduct
By David J. Goldstone, partner, Goodwin Procter
A well-known New Yorker cartoon with two dogs at a computer ran with the caption, "On the Internet, nobody knows you're a dog.” The ...
The Qualifying Immunity Doctrine in Internet Video Enforcement Cases
Martha L. Arias, Immigration and Internet Law Attorney, Miami; IBLS Director
Internet videos are a new form of expression used by all sectors of society including, government officials, corporations, and individuals. In the United ...
Transmission of a Malicious Program under the Computer Fraud and Abuse Act and Circumstantial Evidence
Martha L. Arias, IBLS Director
The Computer Fraud and Abuse Act- CFAC, 18 USC § 1030, regulates fraud and related activities in connection with computers. This United States ...
Cybersquatters Threaten Consumers and Harm Businesses
International Trademark Association
INTA joins the fight against Internet practices that defraud consumers and target organizations conducting business online. The International Trademark Association (INTA) today issued a warning ...
Russian Company Outed as Mother of all Cybercrime
Kelly O'Connell, IBLS Editor
A Russian company named the Russian Business Network, or RBN has been identified as a "Conduit for Cybercrime” by the Washington Post and blasted ...
Chinese Web Spies Steal Rolls Royce & Shell Oil Secrets
Kelly O'Connell, IBLS Editor
Long-term industrial espionage spying missions conducted over the Internet and on situs by Chinese Government operatives have targeted Shell Oil and Rolls Royce. This ...
Cyber Fraud and Online Bullying Affect 44% of Small Irish Businesses
Kelly O'Connell, IBLS Editor
An Irish study reveals that cyber crimes such as bullying and fraud are a significant problem for island commerce and take away vitality and ...
In Rem Jurisdiction in Anticybersquatting Cases: Good Solution against Foreign Cybersquatters
Martha L. Arias, Immigration and Internet Law Attorney, Miami; IBLS Director
A recent decision by the United States District Court for the District of Virginia held it had 'In Rem Jurisdiction' over domain name registrants ...
Pakistan's Prevention of Electronic Crimes Ordinance, 2007
IBLS Editor, Kelly O´connell
Pakistan has finally passed an IT crimes bill meant to generally regulate the Internet sector and also punish those using the web for terrorism. ...
Cyber Crimes Tool Kits for Sale on Internet with 70,000 Versions
Kelly O'Connell, IBLS Editor
Tech gear used for years by savvy cyber criminals has been mainstreamed and packaged for wide dispersion across the Internet at inexpensive price. ...
Popular Website Craigslist.org Misused by Cyber-Criminals, Woman’s Murder now Tied to Free Site
Kelly O'Connell, IBLS Editor
Grim details of the chilling murder of an attractive and intellectually accomplished young female nanny has lifted the lid on a wave of crime ...
Cellphones a Bigger Threat from Identity Theft than Internet, $50 Billion Stolen in 2006
Kelly O'Connell, IBLS Editor
Hard as it may be to believe, the Internet is not the hotbed of Identity theft many suggest, or at least as popular myth ...
Western Intelligence Claim: November Electronic Jihad Ordered as Al Qaeda Reels in Decline
Kelly O'Connell, IBLS Editor
Intercepted messages in Arabic recently decoded on Middle Eastern and Western sites purportedly indicate that an "Electronic Jihad" was called for on Monday, October ...
Dancing Skeletons Help Create Zombie Botnet Army, Millions of Computers may be Infected
Kelly O'Connell, IBLS Editor
Seasonal messages arriving just in time for Halloween promised a world-class dancing skeleton, but when the ad was clicked upon, it brought users to ...
The State of Global Cybersquatting in 2007
IBLS Editorial Department
The World Intellectual Property Organization (WIPO) reports Internet cybersquatting is exploding globally, up 25% in 2006 over the previous year, as even software colossus ...
Cyber Criminals Hacking Mortgage Database to Steal Property
Kelly O'Connell, IBLS Editor
Mortified users of the English "Land Registry” system that records ownership of real property discovered that criminals were accessing the site to get documents ...
Supergroup 'Rock Phish” not a Heavy Metal Band, but Russian Cyber-Mobsters Scoring $100 Million a Year
Kelly O'Connell, IBLS Editor
Identity theft on the Internet through an activity called “phishing” has grown so quickly and to such gargantuan proportions that the mighty Federal Bureau ...
Texas Attorney General Feasts upon Cyber Predators, Wins Award; Sees Financial Crimes as Next Big Thing
Kelly O'Connell, IBLS Editor
Pictured in the wheelchair he has used since his back was shattered in a 1984 accident, Gregg Abbot would not strike many as an ...
U.S. Congress: Chinese Internet Espionage Biggest Net Threat
Kelly O'Connell, IBLS Editor
Asked to examine the state of U.S. technology security, Congress reports Chinese espionage is the "single greatest risk" to the American technology sector, according ...
98% Of British Emails Fake As Global Spam Doubles From 2006
Kelly O'Connell, IBLS Editor
Top Internet security firm Ironport Systems has just published a study stating 98% of British emails are now composed of spurious messages and that ...
Popstar's Website Hacked to Spread Virus to Fans, Showing ID Phishers Focusing on Social Networking Sites
Kelly O'Connell, IBLS Editor
Rhythm and Blues recording artist Alicia Keys had her MySpace website hacked into by ID theft criminals who made available a free "song" that ...
New Internet Study Reveals Large Chinese Fraud Web
Kelly O'Connell, IBLS Editor
Gangs of online criminals nicknamed Blackhats have turned up in a study of the Chinese Internet whose presence is a current threat and fast-growing ...
Benazir Bhutto Assassination Websites Used to Spread Computer Viruses
Kelly O'Connell, IBLS Editor
Many websites apparently meant to mourn Pakistani Prime Minister Benazir Bhutto's murder by assassin were really designed to help spread malware for fraud and ...
'Cyber Cold War' Has Been Launched
Kelly O'Connell, IBLS Editor
When IT security colossus McAfee launched a deep study to discover what or who was behind the many recent breaches of Western government and ...
CIA Report: Cyber Extortionists Attacked Foreign Power Grid, Disrupting Delivery
Kelly O'Connell, IBLS Editor
In an unusually bold statement detailing another incursion of the Net battle targeting government sites, the CIA admitted web hackers penetrated overseas power grids, ...
New U.K. Extreme Obscenity Ban Passed
Kelly O'Connell, IBLS Editor
A new law criminalizing possession of extremely graphic images has been passed in U.K. as part of the latest Criminal Justice and Immigration Bill, ...
FBI: In 2007 Internet Crime Netted $240 Million
Kelly O'Connell, IBLS Editor
In 2007 there were over 200,000 claims of Internet-related crime reported to the FBI's Internet Crime Complaint Center (IC3), with 90,000 referred to ...
Islamic Terrorist Software Released to Cloak Jihadist Internet Communications
Kelly O'Connell, IBLS Editor
Software designed specifically to aid Muslim terrorists hide their identities and location while online has been released in an updated version, according to security ...
online security, online churches, Internet attacks, hacking, scientologists, Youtube video, church web sites, denial of service attack, website attack, blocking websites
Kelly O'Connell, IBLS Editor
In a war rivaling the plot-line of science fiction writer and founder L. Ron Hubbard's novel Battlestar Earth, Scientologists are bracing for an assault ...
An Example of Interstate Cybercrime & Prosecution
IBLS Editorial Department
Most cybercrimes tried in the United States have dealt with violation of purely federal statutory law; and therefore, they have been conducted in federal ...
Modern-Age Crimes: Hate Crimes and Invasion of Privacy in Webcam Spying
Martha L. Arias, Attorney at Law; IBLS Editor
Last week, the ex-Rutgers student who used a webcam to spy on his roommate and later published the video showing the gay roommate's love ...
The European Arrest Warrant
Martha L. Arias, Immigration and Internet Law Attorney, Miami; IBLS Director
The European Council introduced the Arrest Warrant and Surrender Procedures among member states in 2002 as a mechanism to expedite extradition in the European ...
Could a Former Software Supplier Be Accused of Hacking?
Martha L. Arias, Immigration & Internet Law Attorney; IBLS Editor
One may wonder if the former software company we hired for our business may eventually get unauthorized access to our network, which holds confidential ...
Jointly Undertaken Internet Fraud is a Federal Offense
Martha L. Arias, IBLS Editor
Just as the Internet, the criminal mind does not have boundaries. In the United States, Internet shoppers were victims of an Internet fraud ...
The Writ of Habeas Corpus in Immigration Cases under the REAL ID Act
Martha L. Arias, Immigration & Internet Law Attorney, Miami; IBLS Director
Lawful permanent residents (LPR) of the United States (U.S.) are subject to removal (deportation) if convicted of an aggravated felony according to § 237(a)(2)(A)(iii) ...
Multiple Acts of Identity Theft under Illinois Criminal Law Statute
Martha L. Arias, Immigration & Internet Law Attorney, Miami; IBLS Director
Identity theft is a growing problem that has exacerbated in the Internet environment, and of which people must be aware, especially during Christmas time. ...
Is the So-Called Espionage Act Applicable to the Wikileaks Case? Part I
Martha L. Arias, Immigration & Internet Law attorney; IBLS Editor
The recent publication of government information in the Wikileaks website is still puzzling for federal prosecutors. Who is to indict here? And what are ...
The European Union Criminalizes Acts of Racism and Xenophobia Committed through Computer Systems
Martha L. Arias, Immigration & Internet Law Attorney, Miami; IBLS Editor
People have always said that old fashion trends come back; this seems applicable to racism and xenophobia as well. During the world's economic ...
The International Convention on Cybercrime: One of the Most-Needed Treaties of this Century
Martha L. Arias, Immigration & Internet Law Attorney, Miami; IBLS Director
The Convention on Cybercrime of 2004 was the first international treaty on crimes committed via the Internet and other computer networks. The Convention is ...
The European Convention on Cybercrime
Martha L. Arias, Immigration & Internet Law Attorney, Miami; IBLS Director
Some call it cybercrime; others call it computer crime. Whatever the name is, crimes committed online are becoming the main concern for law enforcement ...
International Survey about Criminal Liability of Companies
Martha L. Arias, Attorney at Law; IBLS Editor
The internet made the world smaller; this phrase carries a profound meaning from a business-standpoint. This not only means that businesses may now reach ...
Identity Theft (Part 10)
Mike Redford, JD, LL.M, JSD
Identity Theft and Assumption Deterrence Act, 18 USC 1028 The courts have consistently used Title 18, part I, chapter 47 § 1028 for dealing with ...
Cybercrime Initiative (Part 11)
Mike Redford, JD, LL.M, JSD
The United States needs a structural program for its cybercrime agenda. Most legislation has been enacted through incident management which were done on reactive ...
Ethimological Dictionary of Legal English Terms
Gaetano Paluccio
INTERFERENCE in patent law an interference is a proceeding conduct by the board of patents appeals to determine conflicting claims among competing applicants. In ...
 
From the Digital Library
Title/Abstract
INTERNET UNDER ATTACK BY ZOMBIE COMPUTERS
IBLS Editorial Board - Staff Attorney
Innocent PC users may have unknowingly contributed to massive attacks by hackers on the root servers of the Internet many times. It is believed ...
SALAMI ATTACKS
IBLS Editorial Board - Staff Attorney
Cyber crimes may be defined generally as unlawful acts wherein the computer is either a tool or a target or both. A “salami attack” ...
IN THE UINTED STATES INTERNET CRIMES WILL NOT REMAIN UNREPORTED ANYMORE
IBLS Editorial Board - Staff Attorney
According to the United States Federal Bureau of Investigation (FBI), the vast majority of cyber crimes are not reported, which allows the perpetrators to ...
E-MAIL BOMBING AND LOGIC BOMBING
IBLS Editorial Board - Staff Attorney
E-mail bombing and logic bombing are among the latest trends in cyber crime. The term E-mail bombing refers to sending a large amount of ...
UNITED STATES IMMIGRATION AND CUSTOMS ENFORCEMENT (ICE) INVESTIGATES INTERNET CRIMES THROUGH ITS CYBER CRIMES CENTER
IBLS Editorial Board - Staff Attorney
Many crimes that can be committed in the "real" world can be committed using computers and the Internet. Like other countries, the United States ...
THE CHILD EXPLOITATION SECTION OF UNITED STATES IMMIGRATION AND CUSTOMS ENFORCEMENT IS RESOLUTE TO APPREHEND INTERNET CHILD PORNOGRAPHERS
IBLS Editorial Board - Staff Attorney
The United States Immigration and Customs Enforcement’s (ICE) Cyber Crimes Center has achieved vast success in identifying and apprehending Internet child pornographers over the ...
ADDITIONAL PROTOCOL TO THE CONVENTION ON CYBER CRIME, CONCERNING THE CRIMINALIZATION OF ACTS OF A RACIST AND XENOPHOBIC NATURE COMMITTED THROUGH COMPUTER SYSTEMS ((ETS NO. 189)
IBLS Editorial Board - Staff Attorney
The Council of Europe issued an additional protocol to the Convention on Cyber Crime, which was the first international treaty on crimes committed via ...
EUROPEAN UNION’S CONVENTION ON CYBER CRIME (ETS NO. 185): FIRST INTERNATIONAL TREATY ON CRIMES COMMITTED VIA THE INTERNET
IBLS Editorial Board - Staff Attorney
The Council of Europe, along with the U.S., Canada and Japan signed a convention on Cyber crime. The convention provides a legal framework for ...
Cyber Terrorists, Organized Crime And Cyber Crimes
IBLS Editorial Board - Staff Attorney
Cyber terrorism and cyber crime have become a central part of modern day organized crime. Organized crime no longer needs to use threat tactics ...
E.u. Aspects Of Cyber Crime Investigations
IBLS Editorial Board - Staff Attorney
Cybercrime is fast, borderless and anonymous, whereas criminal law systems are slow, formal and generally limited to a specific territory. Thus investigation and ...
OECD Security Guidelines, G8 Committee on High Tech Crime and other International Cyber Crime Initiatives
IBLS Editorial Board - Staff Attorney
In addition to the Council of Europe Convention on Cybercrime, which is detailed in the summary entitled “Council of Europe Convention on Cybercrime,” several ...
What Is Internet Fraud
IBLS Editorial Board - Staff Attorney
Internet fraud is one of the major cyber crimes affecting Internet users today. It accounts for a significant monetary loss to consumers and businesses. ...
Cyber Extortion
IBLS Editorial Board - Staff Attorney
Cyber extortion is a recent form of cyber crime where organizations are asked to pay for the “protection” of malicious hackers who threaten to ...
Regulation Of Offshore Criminal Activities
IBLS Editorial Board - Staff Attorney
Offshore jurisdictions provide international criminals with multiple opportunities to conduct their activities without being discovered. Offshore cyber crime (i.e.: offshore criminal activities conducted through ...
Cyber Crimes Under The Law Of India
IBLS Editorial Board - Staff Attorney
Computer crimes in India are punishable under the Information Technology Act 2000 of June 9, 2000 (the “ITA.”) The ITA is aimed at ...
Cyber Crimes Under The Law Of Malaysia
IBLS Editorial Board - Staff Attorney
Computer crimes in Malaysia are punishable under the Computer Crimes Act, which was brought into effect on June 1, 2000 (the “CCA.”) The ...
Cyber Crimes Under The Law Of Singapore
IBLS Editorial Board - Staff Attorney
Computer crimes in Singapore are punishable under the Computer Misuse Act, which was enacted in 1993 and amended in 1998 to enhance its provision ...