Net Crimes & Misdemeanors


Book Description

Cyber crime expert Hitchcock helps individuals and business users of the Web protect themselves, their children, and their employees against online cheats and predators. Hitchcock details a broad range of abusive practices, shares victims' stories, and offers advice on how to handle junk e-mail, "flaming," privacy invasion, financial scams, cyberstalking, and identity theft.







Punishment Without Crime


Book Description

A revelatory account of the misdemeanor machine that unjustly brands millions of Americans as criminals. Punishment Without Crime offers an urgent new interpretation of inequality and injustice in America by examining the paradigmatic American offense: the lowly misdemeanor. Based on extensive original research, legal scholar Alexandra Natapoff reveals the inner workings of a massive petty offense system that produces over 13 million cases each year. People arrested for minor crimes are swept through courts where defendants often lack lawyers, judges process cases in mere minutes, and nearly everyone pleads guilty. This misdemeanor machine starts punishing people long before they are convicted; it punishes the innocent; and it punishes conduct that never should have been a crime. As a result, vast numbers of Americans -- most of them poor and people of color -- are stigmatized as criminals, impoverished through fines and fees, and stripped of drivers' licenses, jobs, and housing. For too long, misdemeanors have been ignored. But they are crucial to understanding our punitive criminal system and our widening economic and racial divides. A Publishers Weekly Best Book of 2018




Cybercrime


Book Description

The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law which protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This report provides a brief sketch of Section 1030 and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act, P.L. 110-326. Extensive appendices. This is a print on demand publication.




True Crime Online


Book Description

Revealing many of the most extreme and horrifying examples of modern cybercrime, acclaimed investigator J. A. Hitchcock seeks to educate the millions of YouTube, Twitter, and Facebook users about the various hazards posed by new media. Covering the identity theft and subsequent murder of Amy Boyer in 1999, avoiding sexual predators, defending bank accounts against fraudulent phishing scams, and the rise of online bullying, Hitchcock provides a compelling, broad-ranging collection of case studies from which consumers can learn to defend themselves and their families against online criminals. Guaranteed to shock and surprise, this book will forever change the way users experience the internet.




Computer Crime


Book Description




Violence Goes to the Internet


Book Description

Violence Goes to the Internet provides the reader with a thorough understanding of the Internet and the potential dangers lying therein. The book identifies all of the different types of interpersonal violence and crime that may be encountered on the Internet, so that it can then be examined and placed in the context of how that violence manifests itself in the physical world. Readers will then be able to recognize and detect interpersonal violence and crime on the Internet and take the necessary steps to insulate and defend oneself from would-be cyber predators. A new approach to assessing violence and crime on the Internet is introduced, combining the technologies of criminal profiling, threat assessment, and risk assessments. This new approach, known as the Behavioral Risk Analysis of Violence Online (B.R.A.V.O.), is a behaviorally driven approach that can assess both known and unknown perpetrators across both physical and virtual landscapes, providing authorities with violence and crime risk levels, disruption levels, recommended target action, and investigative direction. The book also classifies crime and violence on the Internet into types and strains, allowing people to understand the motivation and behaviors of online perpetrators and to help detect and interpret behavior they observe online. This section of the book will also familiarize readers with general violence prevention and intervention principles, as well as safety and survival strategies. The second part of the book will familiarize readers with the different mediums and interfaces involved with the Internet and exemplify how those with violent or criminal intentions can exploit these mediums. In great detail, readers will be exposed to the major types of Internet violence and crime and will be given real-world examples of how violence and crime truly work on the Internet, hopefully expanding their detection and awareness abilities. The final section of the book highlights some of the difficulties faced by organizations, schools, colleges, business, law enforcement, and lawmakers in combating Internet violence and crime. In this section of the book, comprehensive steps are outlined for staying safe on the Internet.







Reporting Intellectual Property Crime


Book Description

Although individuals or companies can pursue civil remedies to address violations of their intellectual property rights, criminal sanctions are often warranted to ensure sufficient punishment and deterrence of wrongful activity. Congress has continually expanded and strengthened criminal laws for violations of intellectual property rights to protect innovation, to keep pace with evolving technology and, significantly, to ensure that egregious or persistent intellectual property violations do not merely become a standard cost of doing business for defendants.




Internet Predators


Book Description

Provides an overview of issues related to criminal and antisocial activity that occurs online, including history, terminology, biographical information on important individuals, and a complete annotated bibliography.