Cybercrime

Click link to view PDF (opens in new window)


Jessica Herndon, Who's Watching the Kids?--The Use of Peer-to-Peer Programs to Cyberstalk Children, 1 OKLA. J.L. & TECH. 12 (2004)

Jessica Herndon is currently pursuing a J.D. at the University of Pittsburgh School of Law. In this work, Ms. Herndon sheds critical light on how Internet software is used to cyberstalk children; an issue that has not been adequately addressed by the federal government. If this type of activity were officially deemed as targeting children, Congress may be able to use the Children’s Online Privacy Protection Act (“COPPA”) to regulate Peer-to-Peer (“P2P”) programs, such as KaZaA.


Scott Griner, FBI's Carnivore: Under the Fourth Amendment and the USA Patriot Act, 1 OKLA. J.L. & TECH. 2 (2003)

Scott Griner, a 2003 University of Oklahoma Law School graduate introduces us to the FBI's email monitoring system, Carnivore. After a brief description of Carnivore and its use in criminal investigations, Mr. Griner analyzes Carnivore under the Fourth Amendment. Finally, Mr. Griner examines The USA PATRIOT Act's impact on the FBI's use of Carnivore and the future of electronic surveillance and searches.