Telephone/Computer Crimes Flashcards
(40 cards)
Venue for Computer Crimes (Where can the case be tried?)
- Where any act was performed
- Where the owner has their principal place of business
- Where the offender has control/possession of proceeds
- Where access was made
- Where the offender resides
- Where the computer used was located at the time of the offense
Venue for Telephone Crimes (Where can the case be tried?)
Where the call was placed
OR where the call was received
Crime: Computer Fraud
Using a computer without authority (or exceeding authority) to:
* Obtain property or services by false pretenses
* Embezzle or commit larceny
* Convert the property of another .
Requires using the computer as a computer (not just as a physical object). Ex: Logging into someone’s account to transfer money
Definition: “Person” (Computer Crimes)
Individual, partnership, association, corporation, or joint venture.
Definition: “Computer” (Computer Crimes)
A device that accepts digital/similar info and manipulates it based on instructions. Includes phones, gaming systems, smart devices. Excludes: simple calculators, typewriters, fax machines, highly specialized single-task devices.
Definition: “Property” (Computer Fraud)
Includes real property, computer services, and computer systems.
Transmission of Unsolicited Commercial Electronic Mail (SPAM
Using a computer with intent to falsify or forge email transmission info (e.g., false routing, concealing identity) OR selling software for that purpose.
Key elements:
* Must be commercial/business related (intent to profit).
* Must involve deceit about the origin/sender.
* Doesn’t apply if there’s an existing business/personal relationship (e.g., emails after signing up).
Computer Trespass (Hacking Statute)
Requires malicious intent or intentional deception to unlawfully:
* Remove, disable, erase, or alter computer data/programs.
* Cause a computer to malfunction.
* Cause physical injury to property via computer.
* Make unauthorized copies.
* Track keystrokes.
* Install software to take control or disrupt data sharing.
Computer Invasion of Privacy (“Nosey Nelly” Statute)
Intentionally using a computer to examine without authority specific types of personal information: employment, financial, medical, or identifying info (SSN, DL#, bank acct#, CC#, passwords).
“Examines” means reviewing info after knowing you lack authority. Common Ex: Snooping in official databases like VCIN or eMag
Using a Computer to Gather Identifying Information
A non-law enforcement officer using trickery or deception via computer specifically to obtain identifying information about someone. Focus is on the acquisition of info through deceit.
Theft of Computer Services
Willfully obtaining computer services without authority. Classic Ex: Using a neighbor’s unsecured WiFi network.
Personal Trespass by Computer
Using a computer to cause physical injury to a person. Ex: Hacking a medical device like a pacemaker or hospital equipment.
Harassment By Computer
- Using a computer to communicate:
- Obscene, vulgar, profane, lewd language.
- Suggestions/proposals of an obscene nature.
- Threats of any illegal or immoral act.
Focus is on obscenity (high bar) or threat of an illegal act. Distinguish threats from mere insults (see notes for examples).
Obscenity/Threat By Telephone (18.2-427)
Using a telephone to communicate:
* Obscene, vulgar, profane, lewd language.
* Suggestions/proposals of an obscene nature.
* Threats of any illegal or immoral act. Focus is on obscenity (high bar) or threat of an illegal act. Similar language to Harassment by Computer.
Giving False Information to Another by Telephone (18.2-428)
Maliciously advising or informing someone about the death, accident, injury, illness, or disappearance of a third person, knowing the information is false.
- Must be about a person, not property or a pet.
- Requires malicious intent (not an honest mistake).
Intent to Annoy/Harass by Telephone (18.2-429)
Causing a telephone, pager, or other device to ring or signal with the specific intent to annoy.
- Intent is key; repeated calls can establish intent.
- Allowing use of one’s phone knowing it’s for this purpose also violates.
- Not a violation if calling for legitimate help (e.g., 911) as intent is not to annoy.
- Enhanced penalty (jailable) for harassing emergency personnel (e.g., repeated false 911 calls).
False Caller ID (Number Spoofing)
Displaying false caller ID information with the intent to defraud, intimidate, or harass.
- Must prove who made the call (voice ID, etc.), not just rely on the spoofed number.
- Simply blocking a number is NOT a violation.
Exceptions exist for law enforcement, federal agencies, etc.
Threats in Writing (18.2-60) - General
Knowingly communicating in writing a threat to kill or do bodily harm to a specific person or their family, placing them in reasonable apprehension of death or bodily injury.
- Threat must be specific to kill/harm, not just any crime or insult.
- Doesn’t require direct communication (e.g., a public post can count if it communicates the threat to the victim).
- Victim must reasonably fear the threat.
Threats in Writing (18.2-60) - Act of Terrorism Enhancement
Enhanced penalty if the written threat is an act of violence intended to:
- Intimidate the civilian population at large, OR
- Influence government conduct/activities through intimidation. Ex: Written threat to shoot up a courthouse.
Threats in Writing (18.2-60) - School Grounds Enhancement
Enhanced penalty if an adult (18+) makes a written threat (to kill/harm) intended to intimidate civilians, influence government, or compel evacuation, related to school grounds or school activities.
Oral Threats on School Grounds / Against Health Care Provider
- A school employee while on school property or at a school-sponsored activity.
- A health care provider engaged in their duties. (Note: This addresses oral threats in specific contexts, distinct from the general written threat statute 18.2-60).
“Knowingly Exceeded Authority” (Computer Fraud)
A key element in Computer Fraud. This applies when a person has some level of legitimate access to a computer or system, but intentionally goes beyond that authorized level to commit fraud, embezzle, or convert property. (Think: An employee using their work login to access files they aren’t permitted to see and transferring funds, not just an outside hacker)
Distinction: Computer Fraud vs. Computer Trespass
Computer Fraud: Focus is on the outcome of dishonestly obtaining property or services using a computer (false pretenses, embezzlement, conversion).
Computer Trespass (Hacking): Focus is on the act of maliciously interfering with a computer, program, or data (deleting, altering, causing malfunction, unauthorized copying, installing malware, etc.), regardless of whether property was obtained.
Distinction: Specificity of Threats Required
Threats in Writing (18.2-60): Requires a specific threat to KILL or DO BODILY HARM. Focus is narrow, on serious physical violence.
Harassment by Computer / Obscenity/Threat by Telephone: Prohibit broader threats of ANY ILLEGAL OR IMMORAL ACT. Can include threats beyond physical violence.