Prior Publisher
The Association of Digital Forensics, Security and Law (ADFSL)
Abstract
This paper examines the current state of the statutes in the United States as they relate to cyber-harassment in the context of "revenge porn". Revenge porn refers to websites which cater to those wishing to exploit, harass, or otherwise antagonize their ex partners using pornographic images and videos which were obtained during their relationships. The paper provide examples and illustrations as well as a summary of current statute in the United States. The paper additionally explores some of the various legal remedies available to victims of revenge pornography.
References
1. Aspinwall, N. (2014). Forensic Acquisition of Websites (FAW) Tool Review. Manuscript, The Patrick Leahy Center for Digital Investigation, Champlain College, Burlington, Vt.
2. "Key Statistics from the National Survey of Family Growth - D Listing." Centers for Disease Control and Prevention. Centers for Disease Control and Prevention, 20 Mar. 2012. Web. 23 May 2016. Jackson, C. L., & Cohen, R. (2012). Childhood victimization: Modeling the relation between classroom victimization, cyber victimization, and psychosocial functioning. Psychology of Popular Media Culture, 1(4), 254-269. doi:10.1037/a0029482
3. Research and Documentation Online. (2014). Retrieved on July 27 from http://bcs.bedfordstmartins.com/resdoc 5e/RES5e_ch09_s1-0001.html
4. The National Intimate Partner and Sexual Violence Survey. (2010, January 1). Retrieved May 24, 2016, from http://www.cdc.gov/violenceprevention /nisvs/index.html
5. Cyber Civil Rights Initiative - Speak Up! (n.d.). Retrieved May 24, 2016, from http://www.cybercivilrights.org
6. Social Media Discovery - WebPreserver.com. (n.d.). Retrieved May 24, 2016, from https://webpreserver.com/
7. (2014). Retrieved May 24, 2016, from https://www.page-vault.com/
8. 5, § 17 U.S.C. 101-102 (2012).
9. 5, § 17 U.S.C. 512 (c)(3) (2012).
10. 5 § 17 U.S.C. 512 (c)(3)(f)(a) (2012).
11. 5, § 17 U.S.C. 512 (k)(1)(a)(b) (2012).
12. Legal Removal Requests. (n.d.). Retrieved May 24, 2016, from support.google.com/legal/troubleshoote r
13. 47, U.S.C., § 230 (1996). See also. Title V of The Telecommunications Act of 1996
14. 17, U.S.C., § 5-501(a).
15. 17, U.S.C., § 106 (1) (3) (5) (2012).
16. 17, U.S.C., § 504 and § 505.
17. 18, U.S.C., § (g) (8).
18. 19, F.R.E., § 901 (a).
19. 19, F.R. E. § 901 (b) (4).
20. Alaska Gen. Law 11.16.120.
21. Arkansas Gen. Law 5-26-314.
22. Florida Ge. Law XLVI-784.049.
23. Katz v. United States (U.S. S.Ct., 1967).
24. Texas Gen. Law 5-21-16.
25. Nevada Gen. Law NRS 200.604.
26. Lonardo, T., White, D., & Rea, A. (2008). To License or Not to License: An Examination of State Statutes Regarding Private Investigators and Digital Examiners. Journal of Digital Forensics, Security, and Law, 3(3), 61- 80.
27. Welcome to Magnet Forensics - Magnet Forensics Inc. (n.d.). Retrieved October 10, 2016, from https://www.magnetforensics.com
28. Internet Archive: Wayback Machine. (n.d.). Retrieved October 10, 2016, from https://archive.org/web/
29. (n.d.). Five internet trolls a day convicted in UK as figures show tenfold increase. Retrieved October 10, 2016, from http://www.telegraph.co.uk/news/ukne ws/law-and-order/11627180/Five-internet-trolls-a-day-convicted-in-UKas- figures-show-ten-fold-increase.html
30. A project of the National Network to End Domestic Violence, providing legal information and support to victims of domestic violence and sexual assault. (n.d.). Retrieved October 10, 2016, from http://womenslaw.org/
31. United States v. Safavian, 435 F. Supp. 2d 36, 41 (D.D.C.), 2006.
32. Forensic Examination of Digital Evidence: A Guide for Law Enforcement. (n.d.). Retrieved October 10, 2016 from https://www,ncjrs,gov/pdffiles1/nij/19 9408.pdf
33. Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition. (n.d.) Retrieved October 10, 2016 from https://www.mcjrs,gov/pdffiles1/nij/21 9941.pdf
34. Best Practices for Seizing Electronic Evidence. (n.d.) Retrieved October 10, 2016 from http://www.forwardedge2.usss.gov/pdf /bestPractices.pdf
Recommended Citation
Lonardo, Thomas; Martland, Tricia; and White, Doug
(2016)
"A Legal Examination of Revenge Pornography and Cyber-Harassment,"
Journal of Digital Forensics, Security and Law: Vol. 11
, Article 8.
DOI: https://doi.org/10.15394/jdfsl.2016.1412
Available at:
https://commons.erau.edu/jdfsl/vol11/iss3/8
Included in
Computer Engineering Commons, Computer Law Commons, Electrical and Computer Engineering Commons, Forensic Science and Technology Commons, Information Security Commons