Return to Article Details Technical and legal lessons from historic cyber crime cases Download Download PDF