Sunday, March 21, 2010
FBI to Create International Cyber-Law Enforcement Agency
Source from http://mashable.com/2008/03/20/fbi-cyberlaw/
One of the beauties, if you can call it that, of organized crime is that while the criminal organizations of the world respect none of the boundaries that we call jurisdictions and countries, and by definition, the rule of law must respect those boundaries. These criminals, whether they be the traditional mob that we all know and love or the terrorist organizations bent on the destruction of civilization as we know it, have for more than a decade or two have known about and exploited this fact.
In fact, during the last decade and a half, organized crime has collaborated amongst the various sects (Italian, Russian, Columbian, etc) according to their various specialties across international jurisdictions and boundaries, much to the consternation of law enforcement of all nationalities. What’s even worse is the explosion of digital crimes that take place on a grand scale (as ‘inconsequential’ as spamming or bot-nets or as significant as money laundering) thanks to advances in the Internet and communication technology.
Technovelgy today is reporting that the FBI has finally had enough of this problem, and is hosting a gathering of the world’s intelligence organizations this May for a three day conference. Invited to participate is, aside from the FBI, the Royal Canadian Mounted Police, Australian Federal Police, New Zealand Police and the UK’s Serious Organised Crime Agency.
Amongst other goals of the conference, the most interesting is to set up a special area on Law Enforcement Online, the FBI’s secure Internet portal, to share intelligence internationally and create a bulletin system that will make member agencies more aware of accidental leaks that occur from thefts or accidentally dropping classified documents into your porn thumb drive or shared folder on your P2P client.
On the one hand, it does seem a bit like an issue of “What, you’re just now getting around to this?”. On the other, though, it does seem like this sort of international collaboration can lead to the circumvention of legal hurdles that we’ve constitutionally created preventing international spy agencies from becoming domestic spy agencies, and vice versa (separation of powers). Unfortunately, I’m not up on my domestic spying laws and regulations, so smarter policy wonks than I should be tackling this issue soon, but it is a significant development in terms of online law enforcement, and worthy of note.
The Obstacles Facing Cyber Law Enforcement
Controlling of Online Crimes Through Cyber Law Enforcement Practices
Link to us: http://snipurl.com/uz44g
***
source from http//www.online-law.co.uk/127
Organizations like Cyber Crime Law Enforcement Organization, Cybercrime Coordinate Unit, Cybertip.ca, INHOPE, Cyber Crime Control Unit, Internet Crime Complaint Center, Internet Fraud Complaint Center, etc. are some of the most important units that stop cyber crime to expand in rapid succession, across the globe. For instance, cyber law enforcement organization is an international panel that tracks down the different pockets of crime that goes on throughout the internet. There are proper vigilance processes that go over cyberlaws, investigative processes and techniques as well as locations of interactions that keep going on online. There are processes of cyberstalking along provisions of online education and spreading of knowledge regarding the different forms of cyber crimes that keep on going. There are spreading support groups that locally function near you in order to lodge and assess your complaints regarding anything that bothers you online. Pedophile activities, pornography, fraudulent processes, etc. all can be tracked down through these media. Even hacking and virus attack can be protected and addressed when understanding or taking help from cyber crime control units.
International units of varying degrees and order bring forth standardization of relations and communications between the crime control department and the local police. The Internet Service Providers can also be tracked down through IP address and the root of the crime can be spotted this way. There are worldwide groups extended to check on the varied pockets of cyber crime. There are law groups that support victims and bring advocacy groups together in order to help legal justice to prevail. When complained of any harassment or reported deals with cyber crime, there can be complete tracking down of the root of the problem through proper investigation. Support groups and online counseling are even provided for the victims so that they can rise up against the emergency of such problems. Cybertip.ca, for instance, is Canada’s international tipline for reaching for help in any cyber related problems. From online sexual exploitation to abuse and misuse of children’s photos to any form of harassment or non paid services, all issues can be addressed with hope at this point.
There are varied degrees of cyber crime reports including extremes of racism, unlawful acts or abuse within communities and forums, any form of threat or misuse of information and so on. Misuse of animals, any form of humanity related issues and even spreading of viruses or spam through email can be complained against through complain. Any form of repeated abuse source is in fact easy to track down as the cyber police have their own ways to track down these sites and their owners.
The internet can be a scary place without understanding the protecting and governing forces of cyber laws but then there have been proper establishment of laws that are there to control all these illegal processes. In terms of any unlawful entry, one should not hesitate to complain at any of the centers. There are plenty of legal aid support and protection areas that bring positive results in terms of cyber crime increase.
Investigation and assessment of any root of crime is always promised through the local team that deals with cyber law assistance.
Saturday, March 20, 2010
CyberLawTimes.com
- Newsletter
- Forums
- Resources
- Consultancy
- FAQs
- Contact
Group Offers Alternative to Cyber Regulations
The Internet Security Alliance, an industry group affiliated with Carnegie Mellon's cybersecurity laboratory, issued a report Thursday that argues that giving businesses incentives and not regulating them will better safeguard the nation's IT systems.
- Enact a Cyber Safety Act, patterned after the Safety Act that spurred physical development after the 9/11 attacks, by providing marketing and insurance benefits for companies that design, develop and implement of cybersecurity technology, standards and practices.
- Tie federal monies - grants, Small Business Administration loans and stimulus and bailout money - to adoption of designated effective cybersecurity standards and best practices.
- Leverage purchasing power of the federal government. Government could increase the value of security in the contracts it awards to the private sector, thereby encouraging broader inclusion of the level of security provided to government, which in turn could facilitate broad improvement of the cybersecurity posture among the owners and operators of the national critical IT infrastructure.
- Streamline regulations and reduce complexity. Regulatory and legislative mandates and compliance frameworks that address information security, such as Sarbanes-Oxley, Gramm-Leach-Bliley, the Health Insurance Portability and Accountability Act, along with state regimes, could be analyzed to create a unified compliance mode for similar actions and to eliminate any wasteful overlaps.
- Tax incentives for the development of and compliance with cybersecurity standards practices and use of technology. Tax credits can be made contingent upon compliance with established and pre-identified cybersecurity practices. Such incentives could encourage small and midsize businesses to implement cyber protections.
- Provide grants and/or direct funding of cybersecurity research and development to companies that are developing and implementing cybersecurity technologies or best practices. Alternatively, R&D could be run through one or more of the federally funded R&D centers.
- Limit liability for good actors. The government could create limited liability protections for certified products and processes or those certified against recognized industry best practices.
- Create a national award for excellence in cybersecurity, akin to the Commerce Department's Malcolm Baldridge Award. Organizations may strive to receive the award as a means of differentiating themselves in marketing, particularly in a marketplace in which security concerns continue to increase.
- Promote cyber insurance. Cyber insurance, if more broadly employed, could provide a set of uniform and constantly improving standards for corporations to adopt and to be measured against, all while simultaneously transferring a portion of risk that the federal government might face in the case of a major cyber event.
- Besides incentives, the report also suggests ways to craft a new, practical model for information sharing; create an enterprise education program to properly structure industry; address the technical and legal disconnect created by digital systems; manage the global IT supply chain; and address the international nature of cybersecurity issues.
Friday, March 19, 2010
The Cyber Appellate Tribunal
- summoning and examination of witnesses
- requiring production of documents
- receiving evidence
- issuing commissions and
- reviewing its decisions.
- application of Private International Law (including the issue of "conflict of laws") in case the parties to the dispute belong to different nationalities;
- issues regarding jurisdiction; and
- application and interpretation of complex contractual, intellectual property and penal laws
In The Uinted States Internet Crimes Will Not Remain Unreported Anymore
***
- the Federal Bureau of Investigation (FBI),
- the United States Secret Service,
- the United States Immigration and Customs Enforcement (ICE),
- the United States Postal Inspection Service, and
- the Bureau of Alcohol, Tobacco and Firearms (ATF)
- For Computer intrusion (i.e. hacking) one should report to FBI local office, U.S. Secret Service or Internet Crime Complaint Center.
- For password trafficking the reporting authorities are FBI local offices, U.S. Secret Service and the Internet Crime Complaint Center.
- For counterfeiting of currency report to U.S. Secret Service.
- For Internet fraud and SPAM person may contact to FBI local office, the U.S. Secret Service (Financial Crimes Division), and the Federal Trade Commission (online complaint). If the cyber crime involves securities fraud or investment-related SPAM e-mails, then one should approach the Securities and Exchange Commission (online complaint) and the Internet Crime Complaint Center.
- For Internet harassment, the FBI local office is the reporting authority.
- Internet bomb threats must be reported to the FBI local office and ATF local office.
- For Internet trafficking in explosive or incendiary devices or firearms over, reports should be filed before the FBI local office and ATF local office.
- The Internet Crime Complaint Center (IC3): It is a partnership between the FBI and the National White Collar Crime Center (NW3C). Its mission is to serve as a vehicle to receive, develop, and refer criminal complaints pertaining to cyber crime.
- Incidents relating to national security and infrastructure issues are to be reported before the Department of Homeland Security's National Infrastructure Coordinating Center.
- The U.S. Computer Emergency Readiness Team (U.S. CERT) is the appropriate reporting authority for online technicians.
Thursday, March 18, 2010
Divining the Future of Law and Technology
Top 5 Pending Cases
- Brian W. Carver - Assistant Professor at UC Berkeley’s School of Information
- Joseph C. Gratz - Partner at Durie Tangri LLP
- Aaron K. Perzanowski - Assistant Professor at Wayne State University Law School
- December 14 – Supplemental Notice commences.
- January 28 – Class member Opt outs are due.
- February 4 – DOJ comment on settlement is due.
- February 11 – Plaintiffs’ motion for final settlement approval is due.
- February 18 – Final fairness hearing occurs in S.D.N.Y.
- Jewel v. National Security Agency (N.D. Cal.).
- In re National Sec. Agency Telecom. Records Litig., (N.D. Cal. Jun. 3, 2009).
- Hepting v. AT&T Corp. (N.D. Cal.).
- No. 08-04373
- No. M:06-01791
- No. 06-0672
- In N.D. Cal. awaiting opinion on Defendants’ Motion to Dismiss and for Summary Judgment.
- Some consolidated cases on appeal to 9th Cir., others briefing summary judgment motions in N.D. Cal.
- Judgment entered in favor of Defendants in N.D. Cal. on Jul. 21, 2009 and on appeal to the 9th Cir. as No. 09-16676 with expected briefing schedule as follows: Opening brief Dec. 8, 2009, Opposition Feb. 10, 2010, and Reply Mar. 25, 2010.
Case 3
- Viacom Int’l Inc. v. YouTube, Inc. (S.D.N.Y.).
- The Football Ass’n Premier League Ltd. v. YouTube, Inc., (S.D.N.Y.)
- No. 07-2103
- No. 07-03582
- WC Docket No. 07-52
- FCC 08-183
Wednesday, March 17, 2010
Cyber Law Enforcement Organization
***
Source from http://www.cyberlawenforcement.org/
- To unite police officers worldwide and educate them on cyber crime, cyber law, investigative techniques and how they interact.
- To provide investigative assistance to police departments when requested.
- To provide online help and education for victims of cyber stalking, cyber harassment, pedophiles, hacking, and virus attacks, as well as access to support groups and online counseling.
- To standardize relations and communications between police departments, Internet Service Providers, Legal system contacts and victim advocacy groups worldwide.
- The steps for CLEO volunteer application:
- Download and print your preferred format of the application.
- Complete the application and mail it to the CLEO address on the application. Be sure to attach the appropriate authorization by your Agency Head or Designee on official agency letterhead. Failure to do this will result in delays in your application process.
- As soon as we receive your application, we will contact you by email with further instructions and let you know your status!
- Via E-mail
- Via Postal Mail
Tuesday, March 16, 2010
Internet Lawyers – The 21st century internet service
***
Source from http://www.traverselegal.com/
- Internet Law, Cyber Law
- Trademark, Infringement, Registration
- Domain Disputes, Cyber squatting
- Copyright, Media Law, free speech
- E-commerce Law
- Trade Secret, Idea Protection
- Governance, Fiduciary issues
- General Counsel Service
- Law is a service business
- Value-Based Billing
- Technology Advantage Leveraging leading edge technology
- Experience and Expertise