•  
  •  
 

Prior Publisher

The Association of Digital Forensics, Security and Law (ADFSL)

Abstract

This paper examines the current state of the statutes in the United States as they relate to cyber-harassment in the context of "revenge porn". Revenge porn refers to websites which cater to those wishing to exploit, harass, or otherwise antagonize their ex partners using pornographic images and videos which were obtained during their relationships. The paper provide examples and illustrations as well as a summary of current statute in the United States. The paper additionally explores some of the various legal remedies available to victims of revenge pornography.

References

1. Aspinwall, N. (2014). Forensic Acquisition of Websites (FAW) Tool Review. Manuscript, The Patrick Leahy Center for Digital Investigation, Champlain College, Burlington, Vt.

2. "Key Statistics from the National Survey of Family Growth - D Listing." Centers for Disease Control and Prevention. Centers for Disease Control and Prevention, 20 Mar. 2012. Web. 23 May 2016. Jackson, C. L., & Cohen, R. (2012). Childhood victimization: Modeling the relation between classroom victimization, cyber victimization, and psychosocial functioning. Psychology of Popular Media Culture, 1(4), 254-269. doi:10.1037/a0029482

3. Research and Documentation Online. (2014). Retrieved on July 27 from http://bcs.bedfordstmartins.com/resdoc 5e/RES5e_ch09_s1-0001.html

4. The National Intimate Partner and Sexual Violence Survey. (2010, January 1). Retrieved May 24, 2016, from http://www.cdc.gov/violenceprevention /nisvs/index.html

5. Cyber Civil Rights Initiative - Speak Up! (n.d.). Retrieved May 24, 2016, from http://www.cybercivilrights.org

6. Social Media Discovery - WebPreserver.com. (n.d.). Retrieved May 24, 2016, from https://webpreserver.com/

7. (2014). Retrieved May 24, 2016, from https://www.page-vault.com/

8. 5, § 17 U.S.C. 101-102 (2012).

9. 5, § 17 U.S.C. 512 (c)(3) (2012).

10. 5 § 17 U.S.C. 512 (c)(3)(f)(a) (2012).

11. 5, § 17 U.S.C. 512 (k)(1)(a)(b) (2012).

12. Legal Removal Requests. (n.d.). Retrieved May 24, 2016, from support.google.com/legal/troubleshoote r

13. 47, U.S.C., § 230 (1996). See also. Title V of The Telecommunications Act of 1996

14. 17, U.S.C., § 5-501(a).

15. 17, U.S.C., § 106 (1) (3) (5) (2012).

16. 17, U.S.C., § 504 and § 505.

17. 18, U.S.C., § (g) (8).

18. 19, F.R.E., § 901 (a).

19. 19, F.R. E. § 901 (b) (4).

20. Alaska Gen. Law 11.16.120.

21. Arkansas Gen. Law 5-26-314.

22. Florida Ge. Law XLVI-784.049.

23. Katz v. United States (U.S. S.Ct., 1967).

24. Texas Gen. Law 5-21-16.

25. Nevada Gen. Law NRS 200.604.

26. Lonardo, T., White, D., & Rea, A. (2008). To License or Not to License: An Examination of State Statutes Regarding Private Investigators and Digital Examiners. Journal of Digital Forensics, Security, and Law, 3(3), 61- 80.

27. Welcome to Magnet Forensics - Magnet Forensics Inc. (n.d.). Retrieved October 10, 2016, from https://www.magnetforensics.com

28. Internet Archive: Wayback Machine. (n.d.). Retrieved October 10, 2016, from https://archive.org/web/

29. (n.d.). Five internet trolls a day convicted in UK as figures show tenfold increase. Retrieved October 10, 2016, from http://www.telegraph.co.uk/news/ukne ws/law-and-order/11627180/Five-internet-trolls-a-day-convicted-in-UKas- figures-show-ten-fold-increase.html

30. A project of the National Network to End Domestic Violence, providing legal information and support to victims of domestic violence and sexual assault. (n.d.). Retrieved October 10, 2016, from http://womenslaw.org/

31. United States v. Safavian, 435 F. Supp. 2d 36, 41 (D.D.C.), 2006.

32. Forensic Examination of Digital Evidence: A Guide for Law Enforcement. (n.d.). Retrieved October 10, 2016 from https://www,ncjrs,gov/pdffiles1/nij/19 9408.pdf

33. Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition. (n.d.) Retrieved October 10, 2016 from https://www.mcjrs,gov/pdffiles1/nij/21 9941.pdf

34. Best Practices for Seizing Electronic Evidence. (n.d.) Retrieved October 10, 2016 from http://www.forwardedge2.usss.gov/pdf /bestPractices.pdf

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.