Content area
Full text
I. INTRODUCTION........................................ 234
A. Defining Computer Crime ............................ 234
B. Types of Computer-Related Offenses .................... 235
1. Object of Crime ................................. 235
2. Subject of Crime. ................................ 236
a. Spam ...................................... 237
b. Viruses..................................... 237
c. Worms ..................................... 237
d. Trojan Horses................................ 238
e. Logic Bombs................................. 238
f. Sniffers..................................... 238
g. Denial of Service Attacks........................ 238
h. Web Bots & Spiders. ........................... 239
3. Instrument of Crime .............................. 239
II. GENERAL ISSUES ...................................... 239
A. Constitutional Issues................................ 239
1. First Amendment ................................ 240
2. Fourth Amendment. .............................. 240
B. Other Issues ...................................... 243
III. FEDERAL APPROACHES .................................. 243
A. Sentencing Guidelines............................... 244
B. Federal Statutes ................................... 244
1. Child Pornography Statutes ........................ 245
a. Communications Decency Act of 1996 .............. 245
b. Child Pornography Prevention Act of 1996. .......... 246
2. Computer Fraud and Abuse Act ..................... 248
a. Offenses Under the Statute....................... 248
b. Jurisdiction. ................................. 250
c. Defenses.................................... 250
d. Penalties.................................... 251
3. Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 ......................... 252
4. Copyright Statutes ............................... 253
a. Criminal Copyright Infringement in the Copyright Act... 253
i. Defenses ................................. 254
ii. Penalties ................................. 255
b. Digital Millennium Copyright Act. ................. 255
5. Electronic Communications Privacy Act ............... 258
a. Stored Communications Act...................... 258
b. Title III (Wiretap Act) .......................... 259
i. Defenses ................................. 260
ii. Penalties ................................. 261
c. Statutory Issues. .............................. 261
6. Identity Theft ................................... 262
a. Penalties. ................................... 263
7. Wire Fraud Statute. .............................. 263
C. Enforcement...................................... 264
IV. STATE APPROACHES .................................... 267
A. Overview of State Criminal Codes ...................... 267
B. Jurisdiction ...................................... 269
C. Enforcement...................................... 270
V. INTERNATIONAL APPROACHES ............................. 270
A. Issues. .......................................... 271
B. Solutions ........................................ 272
I. INTRODUCTION
This Article discusses federal, state, and international developments in computerrelated criminal law. This section defines computer crimes. section Ð covers the constitutional issues concerning computer crimes. section ÐÉ describes the federal approaches used for prosecuting computer crime, and analyzes enforcement strategies. section IV examines state approaches to battling computer crime and the resulting federalism issues. Lastly, section V addresses international approaches to regulating computer crimes.
A. Defining Computer Crime
The U.S. Department of Justice ("DOP') broadly defines computer crime as "any violations of criminal law that involve a knowledge of computer technology...





