CYBER LAW EMAGIZINE
Zykeria Stroud April 28, 2014 This is used to give you an idea of that cyber law is and how it affects people in their everyday lives.
Table of Contents Who was Ryan Halligan?...................…………………………..1 What is Comuter Forinsics and how is it defined?…………………………………………………………..1-2 Cyber law casts its net wide!.........................…………………………………………....2-5 Cyber Law Word Search………………………………………….6 Trivia and Answers…………………………………………….7-10 Advice on Identity theft…………………………………………..11
Who was Ryan Halligan? Ryan Halligan was a 13-year-old student who had attended Middle School and resided in Essex Junction, Vermont. While enrolled within school, reports state that Ryan Halligan was the target of merciless bullying, which occurred both on school grounds, as well as through the facilitation of the Internet. Accounts detailing the abuse and harassment suffered by Ryan Halligan include verbal abuse undertaking attacks on his alleged homosexuality, as well as the learning disorder from which he suffered. The nature and frequency of the bullying suffered by Ryan Halligan are considered to be the reasons behind his suicide. The suicide of Ryan Halligan is considered to be the first reported case of suicide resulting from Cyber-Bullying in the United States of America.
What is Computer Forensics and how is it defined? Computer forensics is a sub-category of digital forensic science. Computer forensics, in a specific sense, pertains to legal evidence latent in computer systems and digital storage media units. The goal of this field is to examine digital media and files in a sound matter with the aim of recovering, preserving, analyzing, and ultimately identifying facts concerning the underlying legal matter or situation. The field of computer forensics is most often connected with the investigation of a wide variety of computer crimes. In an investigatory sense, the discipline of computer forensics will incorporate similar techniques and principles found in data recovery. However, the field of computer forensics will
attach additional practices and guidelines which are implemented to create a legal audit trial. The evidence gathered from a computer forensics investigation is typically subjected to the same protocol and practices of other digital evidence. The use of digital evidence, gathered from computer forensics, has been used in a number of high profile cases. As a result of the accuracy and the pertinent details it reveals, the use of computer forensics is quickly becoming a reputable and reliable source within European and American court systems.
Cyber law casts its net wide! MUMBAI: The country's cyber law has finally caught up with cyber criminals. Eight months after it received presidential assent, the amended Information Technology Act of 2008 came into force on October 27. The amended Act has spread its net to tackle more offences, including cyber terrorism, Wi-Fi hacking, sending and viewing child pornography, video voyeurism, identity theft and even spam. But at the same time, it allows the government to intercept information and snoop on its citizens. The original Act had effectively just one criminal Section 66 for cyber-crime and it was widely worded, but vague. The new Act covers a range of crimes that attracts punishment from a three-year jail term to a life sentence. Section 66F is the cyber terrorism and life sentence section. It applies in cases where Wi-Fi is misused to send terror mail. Any electronic activity that goes against the nation falls under this section. Online child pornography or child abuse is a strict no-no under Section 67B, and would attract a prison term of five years for the first offence. Data theft is a criminal offence as well, and
cyber law experts say punishing it would increase India's standing across the globe. The IT Act of 2000, the first big step to regulate cyber transactions, e-commerce and prevent computer based crimes, was modified after much delay in December 2008, and received Presidential go-ahead in February 2009. Known as The Information Technology (Amendment) Act, 2008, it harmonises various e-services, strengthens laws on cyber terrorism, recognizes phishing as a crime, and for the first time, identifies child porn as a separate offence. With the virtual world shrinking, protection of data security and privacy assumed importance, as did protection of critical information infrastructure for national security. These areas were vulnerable under the old Act, said experts. Critics say the flip side is that it gives unfettered power to the government to monitor all e-traffic. The information could be misused, say cyber activists. The central government, though, says safeguards have been put in place to check misuse. Welcoming the Act, cyber expert Vijay Mukhi said it was long overdue. "Now, many people who earlier shied away from going to court or the police will feel emboldened to file cases or complain.'' The other crimes under the Act include sending offensive emails and multimedia messages, publishing sexually explicit material, breach of confidentiality and leakage of data by intermediary, ecommerce frauds such as cheating by personation, commonly known as phishing, and frauds on online auction sites.
WASHINGTON, Feb. 2, 2012 â€“ The threat to U.S.-based computer networks is one of the countryâ€™s most pressing security
problems, and Congress needs to act on it soon, the director of national intelligence told a congressional panel today. James R. Clapper Jr. said he and all of the U.S. intelligence leadership agree the United States is in a type of cyber Cold War, losing some $300 billion annually to cyber-based corporate espionage, and sustaining daily intrusions against public systems controlling everything from major defense weapons systems and public air traffic to electricity and banking. Clapper was joined by CIA Director David H. Petraeus, Defense Intelligence Agency Director Army Lt. Gen. Ronald L. Burgess Jr. and FBI Director Robert S. Mueller for a House Select Intelligence Committee hearing on worldwide threats. He urged lawmakers to pass a bill that forces intelligence sharing between the government and the private sector, such as the Defense Industrial Base pilot program that then-Deputy Defense Secretary William J. Lynn III launched last year. “It’s clear from all that we’ve said – and I hope predications about mass attacks don’t become a self-fulfilling prophesy – but we all recognize we need to do something,” he said. Clapper also urged Congress to reauthorize the Foreign Intelligence Surveillance Act, which he called crucial to intelligence gathering. It expires this year. The director said he foresees a cyber-environment in which technologies continue to be fielded before effective security can be put in place. Among the greatest challenges in cyber security, he added, are knowing the perpetrator of a cyber-attack in real time and capabilities gaps in the cyber supply chain – the entire set of key actors involved in the cyber infrastructure. Mueller noted that the National Cyber Task Force includes 20 U.S. agencies, “so when a major intrusion happens, we’re all at the table.” The “breaking down of stovepipes” and sharing information in cyber security “is as important now as it was before 9/11,” he added.
The FBI director told the panel that 47 states have different reporting requirements for cyber-attacks, and the private sector doesn’t have to report them at all. “If they’re not reported, we can’t prevent the next one from happening,” he said. Mueller said the cyber threat is growing and is important to address. “I do believe cyber threats will equal or surpass the threat from terrorism in the near future,” he said. Clapper agreed. “We all recognize this as a profound threat to this country, to its future, to its economy, to its very being,” he said. “We all recognize it, and we are committed to doing our best in defending the country.”
Cyber Law Word Search KZQPJUCTENNRUVW CYBERTERRORISMY BAUHGEAHBIMCXDM RUUROFVZTTYEPBS CYBERVANDALISMD TKSAPBXPBMRMVTP XHWJYACWOAVXZYV NMEQGTELPFYPTLP GNIFOOPSREBYCFB YYYYTITNEDIZFDN LIAMKCALBREBYCD GNIYLLUBREBYCEA RYCARIPREBYCPNE AJMREGREBYCYZRI RFSEKQFWZCXGFAB
CYBERBLACKMAIL CYBERBULLYING CYBERDEFAMATION CYBERGERM CYBERPIRACY CYBERSPOOFING CYBERTERRORISM CYBERVANDALISM IDENTITY THEFT WARFARE
Advice on Identity Theft You have the right to get a free copy of your credit report every 12 months from each of the 3 nationwide credit reporting companies. Your credit report may show the first signs that someone has misused your information, so it’s important to check your report a few times a year. Ordering 1 free report every 4 months lets you monitor your file and spot errors early. Check your credit score. Your credit report may show the first signs that someone has misused your information, so it’s important to check your report a few times a year. Don’t carry your social security number on any documents in your purse or Make sure your mail is in a secure place. When in the mailbox, make sure it isn't easy to access it Shred your trash with a cross cut shredder. Be careful what you say in public, especially when you’re on your cell phone. You can protect your computer with a fire-wall, anti-virus software, or a program that removes spyware.
With your help we can help fight identity theft. All we need is your support today.