LabMice.net - The Windows 2000\XP\.NET Resource Index
Home | About Us | Search

Last Updated December 16, 2003

Windows 2000
Windows XP
BackOffice
Book Reviews
Career Tools
Device Drivers
Hardware Guides
MCSE Toolkit
Networking
Service Packs
Scripting
Security
  Anti-Virus
  Articles & Whitepapers
  Books on Security
  Cryptography
  Disaster Recovery
  FAQ's & Tutorials
  Firewalls
  Hacking
  Intrusion Detection
  Kerberos
  Legal Resources
  Online Seminars
  Password Security
  Security Links
  Securing Networks
  Vulnerabilities
Utilities
Cybercheese


   

   


    

 

 

 

 

 

 

 

 

Legal and CyberCrime Resources

Although Hackers have been around for decades, they really haven't gotten the full attention of Congress until recently. As a result, few lawyers specialize in CyberCrime, not every State has a Computer Crime Squad, Computer Crime Laws vary from State to State, and Federal laws are still being tested in courts around the country. The Internet also complicates legal issues as your intruder may not even be in your State or Country.  Hope these links help sort things out.
Main Resource Links
CIPS  
The Computer Crime and Intellectual Property Section of the Department of Justice's web site. Lots of Info and Policy resources

Computer Crime Research Resources 
An exceptional resource from Florida State University's School of Library and Information Studies.

Computer Crime  
Original articles, cases and laws relating to Computer and High Technology Crimes.

CPSR's Computer Crime Directory
A collection of resources from the Computing Professionals for Social Responsibility

Cybercrimes.net 
From the University of Dayton School of Law offers an online Seminar taught by Susan Brenner. Requires a username and password to enter, although there is a limited public area..

Cyberlaw Encyclopedia 
A huge and well done resource by Alan Gahtan

FBI National Computer Crime Squad
The FBI's National Computer Crime Squad (NCCS) investigates violations of the Federal Computer Fraud and Abuse Act of 1986. These crimes cross multiple state or international boundaries. Violations of the Computer Fraud and Abuse Act include intrusions into government, financial, most medical, and Federal interest computers.

FindLaw.com - Cyberspace Law 
A search engine for Lawyers similar to Yahoo.

IACS- Computer Forensics  
The International Association of Computer Investigative Specialists

Law and Crime Statistics  
Cool collection of links and stats by George Guillory

Legal Sites on the Web  
A huge collection of Links. If it's not here, you don't need it.

NAAG.org 
National Association of Attorneys General. The place to find out who the AG is in your area and what your local computer crime legislation is.

National Fraud Information Center  
Geared for consumers, but still has some great resources. Check out the Internet Fraud Watch

National Infrastructure Protection Center
The National Infrastructure Protection Center (NIPC) serves as a national critical infrastructure threat assessment, warning, vulnerability, and law enforcement investigation and response entity. The NIPC provides timely warnings of international threats, comprehensive analysis and law enforcement investigation and response.

Prosecuting Attorney, District Attorneys, Attorneys General & U.S. Attorneys  
Another great resource to find out who the state and federal prosecutors are. (Useful for finding local CyberCrime investigations units).l

SGR MacMillan Computer Crime Resources  
A great collection of links from a lawyer in Canada.

US Secret Service Electronic Crimes Branch
The Secret Service investigates crimes associated with financial institutions. Today, this jurisdiction includes bank fraud, access device fraud involving credit and debit cards, telecommunications and computer crimes, fraudulent identification, fraudulent government and commercial securities, and electronic funds transfer fraud.

Articles and Whitepapers
Computer Crime Categories: How Techno-criminals operate  
An FBI Law Enforcement Bulletin by Dr. David L. Carter, a professor in the School of Criminal Justice, Michigan State University, East Lansing, Michigan.

Computer Crime Laws by State

Computer Crime Sentencing Guidelines (Revised)

Computer Fraud and Abuse Statute of 1986

Computer Security and the Law  
By Gary Morris. A must read for Administrators.

Computer Security Act of 1987

Federal Guidelines for Searching and Seizing Computers
A must read guide from the Department of Justice

Investigating and Prosecuting Computer Crime  
From your friends at the Department of Justice Computer Crime and Intellectual Properties section.

How to report Internet related Crime  
From your friends at the Department of Justice Computer Crime and Intellectual Properties section.

Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations
This publication provides a comprehensive guide to the legal issues that arise when federal law enforcement agents search and seize computers and obtain electronic evidence in criminal investigations. The topics covered include the application of the Fourth Amendment to computers and the Internet, the Electronic Communications Privacy Act, workplace privacy, the law of electronic surveillance, and evidentiary issues. This updated version includes discussion of significant changes to relevant Federal law arising from the USA PATRIOT Act of 2001. Source: Department of Justice, Computer Crime and Intellectual Property Section (CCIPS) (July 2001)

United Nations Manual on the prevention and control of computer-related crime
A long and interesting read. Warning: Don't print this unless you have a LOT of paper in your printer, or unless you need a doorstop.

U.S. Information Security Law, Part One
This is the first article in a four-part series exploring the law of information security in the United States. This article addresses the legal framework for protection of information systems and the role of information security professionals in the creation of trade secret interests, one type of intellectual property. Source: SecurityFocus.com (March 2003)

Entire contents
© 1999-2003 LabMice.net and TechTarget
All rights reserved

This site and its contents are Copyright 1999-2003 by LabMice.net. Microsoft, NT, BackOffice, MCSE, and Windows are registered trademarks of Microsoft Corporation. Microsoft Corporation in no way endorses or is affiliated with LabMice.net. The products referenced in this site are provided by parties other than LabMice.net. LabMice.net makes no representations regarding either the products or any information about the products. Any questions, complaints, or claims regarding the products must be directed to the appropriate manufacturer or vendor.