Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

Longer titles found: Computer Fraud and Abuse Act (view)

searching for Computer fraud 91 found (268 total)

alternate case: computer fraud

Operation: Bot Roast (338 words) [view diff] exact match in snippet view article find links to article

Panama City Florida, pleaded guilty to charges of computer fraud and conspiracy to commit computer fraud for using botnets to install advertising software
Selmedica (217 words) [view diff] exact match in snippet view article find links to article
March 24, 2008, Selmedica CEO Perry Belcher was arrested on charges of computer fraud over $10,000, imitating a licensed professional, and deceptive business
List of cybercriminals (2,167 words) [view diff] case mismatch in snippet view article find links to article
on 26 July 2024. Retrieved 2024-09-01. "Jury Convicts Texas Man of Computer Fraud, Aggravated Identity Theft". www.justice.gov. 2019-11-12. Retrieved
Kevin Mitnick (3,176 words) [view diff] exact match in snippet view article find links to article
pleaded guilty in 1999 to four counts of wire fraud, two counts of computer fraud, and one count of illegally intercepting a wire communication. U.S.
United States v. Manning (5,544 words) [view diff] case mismatch in snippet view article find links to article
Espionage Act of 1917, stealing U.S. government property, charges under the Computer Fraud and Abuse Act of 1986 and charges related to the failure to obey lawful
Darknet (1,483 words) [view diff] case mismatch in snippet view article find links to article
March 2020. Mansfield-Devine, Steve (1 December 2009). "Darknets". Computer Fraud & Security. 2009 (12): 4–6. doi:10.1016/S1361-3723(09)70150-2. Pradhan
Audit trail (843 words) [view diff] exact match in snippet view article find links to article
"Chapter 2: Related Research in Insider Computer Fraud and Information Security Controls". Insider computer fraud: an in-depth framework for detecting and
Operation Cybersnare (776 words) [view diff] exact match in snippet view article find links to article
individuals involved in unauthorized computer intrusion and all aspects of computer fraud, including cellular telephone fraud." In September 1995, Individuals
United States Secret Service (9,750 words) [view diff] exact match in snippet view article find links to article
extended the Secret Service's jurisdiction over credit card fraud and computer fraud. In 1990, the Secret Service initiated Operation Sundevil, which they
Internet police (1,012 words) [view diff] case mismatch in snippet view article find links to article
States Computer Emergency Readiness Team (US-CERT) US Secret Service Computer Fraud On Guard OnGuardOnline.gov provides practical tips from the federal
Citadel (malware) (204 words) [view diff] exact match in snippet view article
Russian computer science professional Mark Vartanyan pleaded guilty to a computer fraud charge for his part in developing the Control Panel for Citadel. In
Taher Elgamal (1,423 words) [view diff] case mismatch in snippet view article find links to article
 396–402. T. Elgamal, "The new predicaments of security practitioners", Computer Fraud & Security, vol. 2009, no. 11, pp. 12–14, Nov. 2009. The spellings El
Bride scam (991 words) [view diff] exact match in snippet view article find links to article
disappearing upon entry to the United States. There are laws concerning computer fraud and they can be "separated into two categories: 1) crimes facilitated
Cyber insurance (1,825 words) [view diff] case mismatch in snippet view article find links to article
Cyberinsurance". Cyberinsurance Policy: Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks. MIT Press. pp. 27–62. doi:10.7551/mitpress/13665
JSTOR (3,010 words) [view diff] exact match in snippet view article find links to article
Swartz with several data theft–related crimes, including wire fraud, computer fraud, unlawfully obtaining information from a protected computer, and recklessly
OpenFeint (598 words) [view diff] exact match in snippet view article find links to article
OpenFeint was party to a class action suit with allegations including computer fraud, invasion of privacy, breach of contract, bad faith and seven other
Clan Forsyth (1,262 words) [view diff] no match in snippet view article find links to article
Multi-million Con http://www.thefreelibrary.com/Downfall+of+clan+heir+jailed+over+a+multi-million+con;+Computer+fraud...-a0131369574[permanent dead link]
Google hacking (838 words) [view diff] case mismatch in snippet view article find links to article
used to carry out cybercrime and frequently leads to violations of the Computer Fraud and Abuse Act. Her research has highlighted the legal and ethical implications
Bird of Prey (TV serial) (339 words) [view diff] exact match in snippet view article
statistics and writing reports on computer fraud, suddenly finds himself with the threads of an international computer fraud in his hands. Forced to flee his
The Dark Overlord (hacker group) (755 words) [view diff] exact match in snippet view article
on a charge of "conspiring to commit aggravated identity theft and computer fraud" and was ordered to pay almost $1.5 million in restitution. Stone, Jeff
South Miami Senior High School (487 words) [view diff] exact match in snippet view article find links to article
equestrian show horse champion Albert Gonzalez – hacker, convicted of computer fraud Damian Harrell – Former Arena Football League wide receiver/defensive
Zeus (malware) (1,142 words) [view diff] exact match in snippet view article
ZeuS botnets. He was charged with several counts of wire fraud and computer fraud and abuse. Court papers allege that from 2009 to 2011 Bendelladj and
Fidelity bond (967 words) [view diff] case mismatch in snippet view article find links to article
no Coverage for Social Engineering Fraud Loss under Crime Policy's Computer Fraud Insuring Agreement". FCL FIDELITY BLOG. 2017-08-10. Retrieved 2017-10-06
Kymberly Pine (4,289 words) [view diff] exact match in snippet view article find links to article
the severity of computer fraud and unauthorized computer access offenses. Notably, the bill creates the new offense of Computer Fraud in the Third Degree
Browsewrap (972 words) [view diff] exact match in snippet view article find links to article
software and then were later sued for violations of federal privacy and computer fraud statutes arising from the use of the software.: 23–25  The Second Circuit
Trojan horse defense (3,336 words) [view diff] case mismatch in snippet view article find links to article
Hernandez-Castro, J., "The first 10 years of the Trojan Horse defence", Computer Fraud & Security, January 2015, Vol.2015(1), pp.5-13, page 5 Steel, C.M.S
Computer Misuse Act 1990 (3,638 words) [view diff] exact match in snippet view article find links to article
"Cyber security experts say they are being prevented from stopping computer fraud".[verification needed] In July 2020, the Intelligence and Security Committee
History of information technology auditing (990 words) [view diff] case mismatch in snippet view article find links to article
Auditability and Control-A History History of the Privacy Act of 1974 Computer Fraud Abuse Act Electronic the Institute of Internal Auditors Systems Auditability
Data loss prevention software (1,443 words) [view diff] case mismatch in snippet view article find links to article
2012 Phua, C., Protecting organisations from personal data breaches, Computer Fraud and Security, 1:13-18, 2009 BlogPoster (2021-05-13). "Standard vs Advanced
RSA Conference (1,564 words) [view diff] case mismatch in snippet view article find links to article
crypto-process developments: Highlights from the 1997 RSA conference". Computer Fraud & Security. 1997 (3). Elsevier BV: 10–11. doi:10.1016/s1361-3723(97)83577-4
Shiny object syndrome (391 words) [view diff] case mismatch in snippet view article find links to article
Harrison, Henry (2019-03-01). "Headline hype disguises security failings". Computer Fraud & Security. 2019 (3): 6–8. doi:10.1016/S1361-3723(19)30027-2. ISSN 1361-3723
Federal Correctional Institution, Milan (1,127 words) [view diff] exact match in snippet view article find links to article
Activist and computer hacker; sentenced 10 years in federal prison for computer fraud in 2013 for hacking the private intelligence firm Stratfor. Oliver Schmidt
Bank statement (1,025 words) [view diff] exact match in snippet view article find links to article
electronic statement can be easier to obtain than a physical one through computer fraud, data interception, and/or theft of storage media. A bank deposit account
Elwood, Indiana (1,965 words) [view diff] case mismatch in snippet view article find links to article
Places. National Park Service. July 9, 2010. "Elwood Youth Charged with Computer Fraud". The Call-Leader from Elwood. May 31, 1990. Archived from the original
Thomas John (medium) (1,013 words) [view diff] exact match in snippet view article
bereavement. In 2009, John was arrested and pleaded guilty to theft and computer fraud for posting fake apartment ads on Craigslist and stealing the security
Peter Silverman (679 words) [view diff] exact match in snippet view article find links to article
honoured by the Toronto Police with a citation for his work in revealing a computer fraud case. Silverman received RTNDA's Edward R Murrow Award in 2005. He was
Fairlight (group) (911 words) [view diff] case mismatch in snippet view article
Anders Lotsson. Archived from the original on 2012-04-21. "In brief". Computer Fraud & Security. 2004 (5): 3. 2004. doi:10.1016/S1361-3723(04)00061-2. Basamanowicz
Women in Prison (TV series) (356 words) [view diff] exact match in snippet view article
access, was Pam (Sperber), who was, not surprisingly, in prison for computer fraud. They all had to contend with guard Meg Bando (Dillon), who didn't like
Bitcoin (9,248 words) [view diff] case mismatch in snippet view article find links to article
2017. Bradbury, Danny (November 2013). "The problem with Bitcoin". Computer Fraud & Security. 2013 (11): 5–8. doi:10.1016/S1361-3723(13)70101-5. ISSN 1361-3723
Section summary of Title II of the Patriot Act (7,830 words) [view diff] exact match in snippet view article find links to article
communications relating to computer fraud and abuse offenses, and amended the United States Code to include computer fraud and abuse in the list of reasons
Exploit kit (804 words) [view diff] case mismatch in snippet view article find links to article
Florian (June 2013). "Defending your business from exploit kits". Computer Fraud & Security. 2013 (6): 19–20. doi:10.1016/S1361-3723(13)70056-3. "exploit
Data diddling (170 words) [view diff] exact match in snippet view article find links to article
complex and make an entire system unusable. Romney, Marshall (1995). "Computer fraud--what can be done about it?". CPA Journal. 65: 30. "The 12 types of
Desert View High School (600 words) [view diff] case mismatch in snippet view article find links to article
Retrieved November 12, 2024. Wells, Joseph T. (January 23, 2009). Computer Fraud Casebook: The Bytes that Bite. John Wiley & Sons. ISBN 978-0-470-48892-8
DarkMatter Group (3,597 words) [view diff] exact match in snippet view article find links to article
had each been indicted for violations of United States laws involving computer fraud and improper exporting of technology. They agreed to deferred prosecution
Controversial invocations of the Patriot Act (2,909 words) [view diff] exact match in snippet view article find links to article
television show Stargate SG-1, was charged with copyright infringement and computer fraud. During the investigation, the FBI invoked a provision of the Act to
Medidata Solutions (1,404 words) [view diff] case mismatch in snippet view article find links to article
Business, July 25, 2017. Jeff Sistrunk, "Medidata Covered For $4.8M Computer Fraud, Judge Rules," Law 360, July 21, 2017. John Lande, "Maybe you have cyber-insurance
Common Computing Security Standards Forum (269 words) [view diff] case mismatch in snippet view article find links to article
com. Archived from the original on 2012-11-05. Retrieved 2012-11-08. "Computer Fraud & Security" (PDF). Comodo.com. Retrieved 2012-11-08. "Common Computing
Man of the Year (2006 film) (1,664 words) [view diff] exact match in snippet view article
overturn the 2020 United States presidential election due to alleged computer fraud. Pat Paulsen, comedian who ran for president. Vermin Supreme, comedian
Karrie Karahalios (583 words) [view diff] case mismatch in snippet view article find links to article
United States, challenging "the constitutionality of a provision of the Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030 et seq., a federal statute
LinkedIn (12,788 words) [view diff] case mismatch in snippet view article find links to article
"scraping" data from LinkedIn's servers, claiming violations of the CFAA (Computer Fraud and Abuse Act) and the DMCA (Digital Millennium Copyright Act). In response
Fiona Mont (646 words) [view diff] exact match in snippet view article find links to article
as wanted for questioning in relation to allegations of £300,000 of computer fraud, which she denied. She later appeared the same year in an ITV production
Flame (malware) (2,747 words) [view diff] case mismatch in snippet view article
2012). "Deconstructing Flame: the limitations of traditional defences". Computer Fraud & Security. 2012 (10): 8–11. doi:10.1016/S1361-3723(12)70102-1. ISSN 1361-3723
Shoulder surfing (computer security) (2,075 words) [view diff] case mismatch in snippet view article
(November 2011). "Look behind you: The dangers of shoulder surfing". Computer Fraud & Security. 2011 (11): 17–20. doi:10.1016/s1361-3723(11)70116-6. Eiband
Disappearance of Morgan Nick (1,102 words) [view diff] exact match in snippet view article find links to article
and James Monhart, two previously convicted felons, were arrested for computer fraud after attempting to assume the identity of Morgan Nick. In February
Computer network (11,593 words) [view diff] case mismatch in snippet view article find links to article
on 2005-01-15. Mansfield-Devine, Steve (December 2009). "Darknets". Computer Fraud & Security. 2009 (12): 4–6. doi:10.1016/S1361-3723(09)70150-2. Wood
PlayStation 3 system software (4,588 words) [view diff] case mismatch in snippet view article find links to article
and amend the case and the other claims that the removal violated the Computer Fraud and Abuse act were allowed to go forward. In March 2011, the plaintiffs
Australian High Tech Crime Centre (2,274 words) [view diff] exact match in snippet view article find links to article
the current cybercrime policies in Australia, do not acknowledge ‘computer fraud’ as a criminal offence under the commonwealth law.  ‘Given the borderless
William J. Hughes (5,600 words) [view diff] case mismatch in snippet view article find links to article
Act[permanent dead link], the Antiterrorism Act[permanent dead link], the Computer Fraud and Abuse Act, the Federal Anti-Tampering Act[permanent dead link] which
Glensheen murders (1,054 words) [view diff] exact match in snippet view article find links to article
About three years after her release from prison, she was arrested for computer fraud and several other counts. She pleaded guilty to fraud and removing money
Konnect Entertainment (3,567 words) [view diff] exact match in snippet view article find links to article
trust, infringement on information and communications network, and computer fraud. The major shareholder reportedly used Kang's name and company seal
Maksim Yakubets (700 words) [view diff] exact match in snippet view article find links to article
conspiracy to participate in racketeering activity, conspiracy to commit computer fraud and identity theft, aggravated identity theft, and multiple counts of
Malvertising (2,429 words) [view diff] case mismatch in snippet view article find links to article
Richard (April 2011). "Malvertising - exploiting web advertising" (PDF). Computer Fraud and Security: 11–16. ISSN 1361-3723. Retrieved September 11, 2019. Finley
InfraGard (1,802 words) [view diff] case mismatch in snippet view article find links to article
emerge of NSA and FBI involvement in domestic US computer security". Computer Fraud & Security. 1999 (1): 10–11. doi:10.1016/S1361-3723(00)86979-1. Joh
Privacy law (14,883 words) [view diff] case mismatch in snippet view article find links to article
provisions for common carriers, cable operators, and satellite carriers. Computer Fraud and Abuse Act: prohibits the unauthorized access of protected computers
Bishop Sycamore High School scandal (4,542 words) [view diff] exact match in snippet view article find links to article
regarding use of counterfeit currency, credit and debit card fraud, computer fraud, and other crimes. It was shut down after just one season and became
King County Sheriff's Office (2,093 words) [view diff] exact match in snippet view article find links to article
Specifically, it investigates crimes including homicide, domestic violence, computer fraud, forgery, sexual assault, and more. CID also addresses child support
Michael Patryn (625 words) [view diff] exact match in snippet view article find links to article
conspiring in separate criminal cases for burglary, grand larceny, and computer fraud. He was arrested as a part of a sting operation on ShadowCrew by the
Ticketmaster, LLC v. RMG Technologies, Inc. (285 words) [view diff] case mismatch in snippet view article find links to article
Doyle, Charles (April 1, 2011). Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws. DIANE Publishing
Robert Siciliano (1,209 words) [view diff] exact match in snippet view article find links to article
stolen : your guide to protecting yourself from identity theft and computer fraud. The 99 Series 2011. 2011-10-01. p. 201. ISBN 978-0983212294. Lacey
Content Threat Removal (615 words) [view diff] case mismatch in snippet view article find links to article
Simon (September 2017). "Content security through transformation". Computer Fraud and Security. 2017 (9). Elsevier: 5–10. doi:10.1016/S1361-3723(17)30097-0
Internet Security Awareness Training (2,392 words) [view diff] case mismatch in snippet view article find links to article
industry after Brexit: Making security awareness training work". In Computer Fraud & Security. 7: 9–12. doi:10.1016/S1361-3723(16)30052-5. Cooper, Michael
Cyberwarfare by Russia (8,124 words) [view diff] exact match in snippet view article find links to article
were associated with spear-phishing schemes, with conspiracy to commit computer fraud: both individuals were sanctioned by the governments of the United Kingdom
Internet security awareness (2,772 words) [view diff] case mismatch in snippet view article find links to article
Grayson (2019-08-01). "Improving employees' cyber security awareness". Computer Fraud & Security. 2019 (8): 11–14. doi:10.1016/S1361-3723(19)30085-5. ISSN 1361-3723
Life Is Strange: True Colors (4,746 words) [view diff] exact match in snippet view article find links to article
and proceed as planned. Alex is later arrested by Pike for theft and computer fraud but is released after either signing an affidavit to drop her investigation
Controversies of the 2006 United States Senate election in Maryland (1,572 words) [view diff] exact match in snippet view article find links to article
United States Attorney. Weiner pleaded guilty to a misdemeanor charge of computer fraud and will do 150 hours of community service. Barge resigned from the
Information security awareness (1,566 words) [view diff] case mismatch in snippet view article find links to article
"End-user security culture: A lesson that will never be learnt?". Computer Fraud & Security. 2008 (4): 6–9. doi:10.1016/S1361-3723(08)70064-2. scadahacker
July 12, 2007, Baghdad airstrike (10,413 words) [view diff] exact match in snippet view article find links to article
counts, she was also found guilty of five theft specifications, two computer fraud specifications and multiple military infractions. On August 21, 2013
Matthew E. Yarbrough (891 words) [view diff] exact match in snippet view article find links to article
the creation of the Texas Internet Bureau— whose mission is fighting computer fraud, data breach, telecommunications fraud and property crimes. In 1998
Murray Riley (2,440 words) [view diff] exact match in snippet view article find links to article
conspiring to defraud British Aerospace PLC of £40,000,000 by way of computer fraud. In July 1991, they were both convicted of conspiracy to defraud and
Grady O'Malley (1,233 words) [view diff] exact match in snippet view article find links to article
co-chaired the trial of Roger Duronio, who was convicted of securities and computer fraud after a six-week trial. Duronio was a disgruntled mid-level computer
America Online, Inc. v. IMS (1,711 words) [view diff] case mismatch in snippet view article find links to article
trademarks and service marks under the Lanham Act; 3) violation of the Computer Fraud and Abuse Act; 4) violation of the Virginia Computer Crimes Act; and
Internet in Thailand (3,259 words) [view diff] case mismatch in snippet view article find links to article
internet laws in the world, bits of the UK's Snooper's Charter, America's Computer Fraud and Abuse Act, and the dregs of many other failed laws." Thai officials
Elliott Gunton (749 words) [view diff] exact match in snippet view article find links to article
Retrieved 1 September 2024. "TalkTalk hacker Elliott Gunton accused of computer fraud in US". BBC. 24 September 2019. Retrieved 1 September 2024. Stevens
Cyberwarfare and the United States (7,065 words) [view diff] case mismatch in snippet view article find links to article
information security research in the United States is governed by 1986 Computer Fraud and Abuse Act, which was derided to be "poorly drafted and arbitrarily
List of L.A. Law episodes (2,863 words) [view diff] no match in snippet view article find links to article
Grace and his colleagues. Victor represents a teenager who is a whiz at computer-fraud. 15 15 "The Douglas Fur Ball" Donald Petrie William M. Finkelstein January 15
Threatening government officials of the United States (4,738 words) [view diff] case mismatch in snippet view article find links to article
counts of Making Public Restricted Personal Information, one count of Computer Fraud, one count of Witness Tampering, and one count of Obstruction of Justice
International cybercrime (3,502 words) [view diff] case mismatch in snippet view article find links to article
are provided here. The first federal computer crime statute was the Computer Fraud and Abuse Act of 1984 (CFAA). In 1986, Electronic Communications Privacy
Intellectual property protection in consumer electronics industry (701 words) [view diff] case mismatch in snippet view article find links to article
1, 2010). "A new strategy for the protection of intellectual property". Computer Fraud & Security. 2010 (2): 8–10. doi:10.1016/S1361-3723(10)70009-9.
List of fictional presidents of the United States (A–B) (9,262 words) [view diff] exact match in snippet view article
efforts resolve a Constitutional crisis due to an election stolen by computer fraud. Leaves office under the provisions of the 25th Amendment as soon as
Controlled Substances Penalties Amendments Act of 1984 (3,604 words) [view diff] case mismatch in snippet view article find links to article
Comprehensive Forfeiture Act of 1984 Counterfeit Access Device and Computer Fraud and Abuse Act of 1984 Credit Card Fraud Act of 1984 Criminal Justice
Hieu Minh Ngo (6,722 words) [view diff] exact match in snippet view article find links to article
(2) identity fraud, (3) access device fraud, and (4) four counts of computer fraud and abuse. Hieu had been facing more than 42 years in federal prison