Criminal regulations

10Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In the 1980s, an entirely new type of criminal began to surface on law enforcement's radar screen. Unlike a traditional criminal who would engage in wanton destruction of life and property, this criminal, often male, was technologically-savvy and had discovered that he could gain information, wealth, and power through the use of computers and networks. Often he would act alone but, at other times, he would organize groups with cryptic names including 414s, the telephone area code for the city of Milwaukee; Legion of Doom; and the Chaos Computer Club [1, 2]. These individuals would use their technological knowledge and skills to primarily break into computers and networks to either steal proprietary information or fraudulently obtain telecommunications services at no cost. This new group of cybercriminals challenged our legal system and forced Congress and state governments to enact new laws to fight them. This chapter analyzes the substantive and procedural laws that Congress had to enact to combat crimes involving the use of technology and computers. It looks examines the challenges posed by cybercrimes, in particular the difficulties encountered by law enforcement in investigating and prosecuting cybercrimes. © 2011 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Herrera-Flanigan, J. R., & Ghosh, S. (2010). Criminal regulations. In Cybercrimes: A Multidisciplinary Analysis (pp. 265–308). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-13547-7_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free