SlideShare una empresa de Scribd logo
1 de 41
Cybercrime By:- IQxplorer
 
What Is Cybercrime? ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Crimes of the Second Type
Crimes of the First Type ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
High Low 1980 1985 1990 1995 2000 password guessing self-replicating code password cracking exploiting known vulnerabilities disabling audits back doors hijacking  sessions sweepers sniffers packet spoofing GUI automated probes/scans DoS www attacks Tools Attackers Intruder Knowledge Attack Sophistication “ stealth” / advanced scanning techniques burglaries network mgmt. diagnostics Sophistication Versus Knowledge
Liability under the CFAA ,[object Object],[object Object]
Liability under the CFAA ,[object Object],[object Object],[object Object],[object Object]
Liability Under The CFAA ,[object Object]
Damage Defined ,[object Object],[object Object],[object Object],[object Object],[object Object]
United States v. Morris ,[object Object],[object Object],[object Object],[object Object]
Purpose of the Morris Worm ,[object Object],[object Object]
The Design of the Worm ,[object Object],[object Object],[object Object]
The Design of the Worm ,[object Object],[object Object],[object Object]
The Error ,[object Object],[object Object],[object Object]
The Issues ,[object Object]
The Ruling ,[object Object],[object Object],[object Object],[object Object],[object Object]
Electronic Communications Privacy Act (18 USC 121, Sec. 2701) ,[object Object],[object Object],[object Object],[object Object]
Exceptions ,[object Object],[object Object],[object Object],[object Object]
Federal Wiretap Act (18 U.S.C. §  2510, et seq . ) ,[object Object]
Exception ,[object Object]
EU Convention on Cybercrime:  Access ,[object Object],[object Object],[object Object],[object Object],[object Object]
Interception ,[object Object],[object Object],[object Object],[object Object]
Interference ,[object Object],[object Object]
Functioning  ,[object Object],[object Object]
Devices ,[object Object],[object Object]
17 USC 1201 ,[object Object],[object Object],[object Object],[object Object]
In Addition ,[object Object]
Victim Liability to Third Parties ,[object Object],[object Object],[object Object],[object Object]
Jiffy Lube Must Pay ,[object Object],[object Object],[object Object]
Compare  Maine Public Utilities Commission v. Verizon-Maine ,[object Object],[object Object],[object Object],[object Object]
Non-Contractual Cases ,[object Object],[object Object],[object Object],[object Object]
 
Outsourcing Issues ,[object Object],[object Object]
Cooperating with the Investigation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Looping Sites .edu, .com, .gov Logs Trap/Trace Monitoring Subpoena Search Warrant Victim Site Source ISP
The Traditional Three Levels of 4 th  Amendment Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Beyond the Three Levels ,[object Object],[object Object],[object Object]
Beyond the Three Levels ,[object Object],[object Object],[object Object]
Private Enforcement ,[object Object],[object Object],[object Object]
Private Detectives and Watchdog Groups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
solomon24
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
ian_oguis
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
Prashant Angadi
 

La actualidad más candente (20)

Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
 
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012
 
Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000
 
551 2006 3
551 2006 3551 2006 3
551 2006 3
 
Social netwoks freedom of speech-dps indrapuram
Social netwoks freedom of speech-dps indrapuramSocial netwoks freedom of speech-dps indrapuram
Social netwoks freedom of speech-dps indrapuram
 
Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.Cyber Ethics | IT ACT 2000 Summary | What's not right.
Cyber Ethics | IT ACT 2000 Summary | What's not right.
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanao
 
cyber law
cyber law cyber law
cyber law
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackLife is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
 
Mandatory Key Disclosure and Self Incrimination in Canada
Mandatory Key Disclosure and Self Incrimination in CanadaMandatory Key Disclosure and Self Incrimination in Canada
Mandatory Key Disclosure and Self Incrimination in Canada
 
Cyber laws of US
Cyber laws of USCyber laws of US
Cyber laws of US
 
Cyber
CyberCyber
Cyber
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 

Destacado

The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
gueste4e93e3
 
Syndicate Presentation
Syndicate PresentationSyndicate Presentation
Syndicate Presentation
bmh212
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

Destacado (17)

History of Economic Thought Revisited: Beyond Left and Right
History of Economic Thought Revisited: Beyond Left and RightHistory of Economic Thought Revisited: Beyond Left and Right
History of Economic Thought Revisited: Beyond Left and Right
 
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
 
Federal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
Federal Computer Fraud and Abuse Act & Texas Computer Hacking StatutesFederal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
Federal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
 
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)
Computer Fraud and Abuse Act CLE - Dallas Bar Ass'n (8.22.11)
 
Syndicate Presentation
Syndicate PresentationSyndicate Presentation
Syndicate Presentation
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Diversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
Diversity in Cybersecurity Education - 2016 ICT keynote - M.RosenquistDiversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
Diversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
 
The Evolving Computer Fraud and Abuse Act
The Evolving Computer Fraud and Abuse ActThe Evolving Computer Fraud and Abuse Act
The Evolving Computer Fraud and Abuse Act
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Guide to Computer Hacking Laws in Texas: Federal Computer Fraud and Abuse Act...
Guide to Computer Hacking Laws in Texas: Federal Computer Fraud and Abuse Act...Guide to Computer Hacking Laws in Texas: Federal Computer Fraud and Abuse Act...
Guide to Computer Hacking Laws in Texas: Federal Computer Fraud and Abuse Act...
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber security
Cyber securityCyber security
Cyber security
 
Web Security
Web SecurityWeb Security
Web Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 

Similar a Cybercrime

p Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfp Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdf
badangayonmgb
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
gsmonga
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
Lance Michalson
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
Asish Verma
 
Challenges in The Virtual.pptx
Challenges in The Virtual.pptxChallenges in The Virtual.pptx
Challenges in The Virtual.pptx
AneSieras
 

Similar a Cybercrime (20)

p Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfp Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdf
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber Crimes
 
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Challenges in The Virtual.pptx
Challenges in The Virtual.pptxChallenges in The Virtual.pptx
Challenges in The Virtual.pptx
 
challengesinthevirtual-221002110839-58eb5f0b.pdf
challengesinthevirtual-221002110839-58eb5f0b.pdfchallengesinthevirtual-221002110839-58eb5f0b.pdf
challengesinthevirtual-221002110839-58eb5f0b.pdf
 

Más de nayakslideshare (20)

Mips 64
Mips 64Mips 64
Mips 64
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Spyware
SpywareSpyware
Spyware
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Gis
GisGis
Gis
 
Lcd
LcdLcd
Lcd
 
Hyper Threading Technology
Hyper Threading TechnologyHyper Threading Technology
Hyper Threading Technology
 
Intro To Hacking
Intro To HackingIntro To Hacking
Intro To Hacking
 
Quantum Teleportation
Quantum TeleportationQuantum Teleportation
Quantum Teleportation
 
Biochip 1
Biochip 1Biochip 1
Biochip 1
 
Biochip
BiochipBiochip
Biochip
 
Satellite Networks
Satellite NetworksSatellite Networks
Satellite Networks
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Biochip 1
Biochip 1Biochip 1
Biochip 1
 
Touch Screens
Touch ScreensTouch Screens
Touch Screens
 
Linux Security
Linux SecurityLinux Security
Linux Security
 
Dna Fingerprinting
Dna FingerprintingDna Fingerprinting
Dna Fingerprinting
 
Thinking Critically About WWW
Thinking Critically About WWWThinking Critically About WWW
Thinking Critically About WWW
 
Remote Sensing
Remote SensingRemote Sensing
Remote Sensing
 
Teleportation
TeleportationTeleportation
Teleportation
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Cybercrime

  • 2.  
  • 3.
  • 4.
  • 5.
  • 6. High Low 1980 1985 1990 1995 2000 password guessing self-replicating code password cracking exploiting known vulnerabilities disabling audits back doors hijacking sessions sweepers sniffers packet spoofing GUI automated probes/scans DoS www attacks Tools Attackers Intruder Knowledge Attack Sophistication “ stealth” / advanced scanning techniques burglaries network mgmt. diagnostics Sophistication Versus Knowledge
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.  
  • 34.
  • 35.
  • 36. Looping Sites .edu, .com, .gov Logs Trap/Trace Monitoring Subpoena Search Warrant Victim Site Source ISP
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.