Browse Books
Digital Evidence and Computer Crime, Third Edition provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. The widely-adopted first and second editions introduced thousands of students to this field and helped them deal with digital evidence. This completely updated edition provides the introductory materials that new students require, and also expands on the material presented in previous editions to help students develop these skills. The textbook teaches how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. Additionally, this third edition includes updated chapters dedicated to networked Windows, Unix, and Macintosh computers, and Personal Digital Assistants. Ancillary materials include an Instructor's Manual and PowerPoint slides. * Provides a thorough explanation of how computers & networks function, how they can be involved in crimes, and how they can be used as evidence * Features coverage of the abuse of computer networks and privacy and security issues on computer networks
References
- ASCLD. (2003). Proposed revisions to 2001 accreditation manual. Available from http://www .ascld-lab.org/pdf/aslabrevisions.pdf. Google Scholar
- Blanton, T. (1995). The top-secret computer messages the Reagan/Bush White House tried to destroy. National Security Archive. Available from http://www.gwu.edu/~nsarchiv/white_ house_email/. Google Scholar
- Carrier, B. (2003). Defining digital forensic examination and analysis tool using abstraction layers. International Journal of Digital Evidence, 1(4), Syracuse, NY. Available from http://www.ijde.org/docs/02_winter_art2.pdf. Google Scholar
- Carrier, B. (2006). A hypothesis-based approach to digital forensic investigations. CERIAS Tech Report 2006-06. Available from https://www.cerias.purdue.edu/assets/pdf/bibtex_ archive/2006-06.pdf. Google Scholar
- Casey, E. (2000). Digital evidence and computer crime (1st ed.). London: Academic Press. Google Scholar
- Casey, E. (2011). Cyberpatterns: Criminal behavior on the Internet. In B. Turvey (Ed.), Criminal profiling: An introduction to behavioral evidence analysis (4th ed.). London: Academic Press. Google Scholar
- Chisum, J. W. (1999). Crime reconstruction and evidence dynamics. Presented at the Academy of Behavioral Profiling Annual Meeting. Monterey, CA. Google Scholar
- Henseler, J. (2000). Computer crime and computer forensics. In The encyclopedia of forensic science. London: Academic Press. Google Scholar
- Johnson, T. (2000). Man searched web for way to kill wife, lawyers say. Seattle Post-Intelligencer, June 21, 2000. Available from http://seattlepi.nwsource.com/local/murd21.shtml. Google Scholar
- Lee, H., Palmbach, T., Miller, M. (2001). Henry Lee's crime scene handbook. London: Academic Press. McClintock, D. (2001). Fatal bondage, Vanity Fair, June. Google Scholar
- McCullagh, D. (2002). Electronic evidence anchors porn case. Available from http://news.cnet .com/2100-1023-955961.html. Google Scholar
- Reed, C. (1990-91). 2 CLSR 13-16 as quoted in Sommer, P. Downloads, logs and captures: Evidence from Cyberspace Journal of Financial Crime, October, 1997, 5JFC2 138-152. Google Scholar
- Saferstein, R. (1998) Criminalistics: An introduction to forensic science, 6th Ed., Upper Saddle River, NJ: Prentice Hall. Google Scholar
- Sullivan, B. (2003). Pair who hacked court get 9 years. MSNBC, February 7, 2003. Google Scholar
- Venema, W., & Farmer, D. (2000). Forensic computer analysis: an introduction. Doctor Dobb's Journal. Available from http://www.ddj.com/documents/s=881/ddj 0009f/0009f.htm. Google Scholar
- Yamaguchi, M. (2008). Angry online divorcee "kills" virtual ex-hubby. Associated Press, October 23, 2008. Google Scholar
- Zetter, K. (2010). TJX hacker gets 20 years in prison. Wired Magazine, March 25, 2010. Available from http://www.wired.com/threatlevel/2010/03/tjx-sentencing/. Google Scholar
- Carrier, B., Spafford, E. H. (2003). Getting physical with the digital investigation process. International Journal of Digital Evidence, 2(2). Available from http://www.ijde.org/docs/03_fall_carrier_ Spa.pdf. Google Scholar
- Carter, D. L. (1995). Computer crime categories, how techno-criminals operate. FBI Law Enforcement Bulletin, July. Google Scholar
- Hollinger, R. C. (1997). Crime, deviance and the computer. Brookfield, VT: Dartmouth Publishing Company. Google Scholar
- Hoover, T. W. (2002). An introduction to the DoJ's manual on searching and seizing computers (Vol. 11, No. 1). Federal public defender report. March, 2002. Google Scholar
- Parker, D. (1976). Crime by computer. New York, NY: Charles Scribner's Sons. Google Scholar
- Parker, D. (1983). Fighting computer crime. New York, NY: Charles Scribner's Sons. Google Scholar
- Parker, D. (1998). Fighting computer crime: A new framework for protecting information. New York, NY: John Wiley & Sons. Google Scholar
- U. S. Department of Justice. (1994). Federal guidelines for searching and seizing computers. Google Scholar
- U. S. Department of Justice. (1998). Supplement to federal guidelines for searching and seizing computers. Google Scholar
- U. S. Department of Justice. (2002). Searching and seizing computers and obtaining electronic evidence in criminal investigations. Google Scholar
- U. S. Department of Justice. (2009). Searching and seizing computers and obtaining electronic evidence in criminal investigations. Available from http://www.justice.gov/criminal/cybercrime/ssmanual/ssmanual2009.pdf. Google Scholar
- Carrier, B. (2002). Open Source Digital Forensics Tools: The Legal Argument. Available from http://www.atstake.com/research/reports/acrobat/atstake_opensource_forensics.pdf. Google Scholar
- Casey, E. (2002). Error, uncertainty and loss in digital evidence. International Journal of Digital Evidence, 1(2). Available from http://www.ijde.org/archives/docs/02_summer_art1.pdf. Google Scholar
- Castell, S. (1990). Evidence and authorisation: Is EDI (electronic data interchange) legally reliable? Computer Law and security report 2, 6(5). Google Scholar
- Gross, H. (1924). Criminal Investigation. London: Sweet & Maxwell. Google Scholar
- Guidance Software (2001-2002). EnCase legal journal (2nd ed.). Available from http://www .guidancesoftware.com/support/downloads/LegalJournal.pdf. Google Scholar
- Hoey, A. (1996). Analysis of the police and criminal evidence act, s.69--computer generated evidence. Web Journal of Current Legal Issues, in association with Blackstone Press Ltd. Google Scholar
- Irish Law Reform Commission. (2009). Documentary and electronic evidence (LRC CP 57-2009). Google Scholar
- Law Commission. (1997). Evidence in criminal proceedings: hearsay and related topics. Law Commission Report 245. Available from http://www.lawcom.gov.uk/231.htm#lcr245. Google Scholar
- Mattel, M., Blawie, J. F., & Russell, A. (2000). Connecticut law enforcement guidelines for computer systems and data search and seizure. State of Connecticut Department of Public Safety and Division of Criminal Justice. Google Scholar
- National Center for Forensic Science. (2003). Digital evidence in the courtroom: a guide for preparing digital evidence for courtroom presentation. Washington, DC: Mater Draft Document, U. S. Department of Justice, National Institute of Justice. Available from http://www.ncfs.org/DE_courtroomdraft. pdf. Google Scholar
- Specter, M. (2002). Do fingerprints lie?: The gold standard of forensic evidence is now being challenged. The New Yorker, May 27, 2002. Available from http://www.newyorker.com/printable/?fact/020527fa_FACT. Google Scholar
- Strong, J. W. (1992). McCormick on Evidence. 4th edition, West Group. Google Scholar
- Thornton, J. I. (1997). The general assumptions and rationale of forensic identification. In D. L. Faigman, D. H. Kaye, M. J. Saks, & J. Sanders (Eds.), Modern scientific evidence: the law and science of expert testimony (Vol. 2). St. Paul, MN: West Publishing Company. Google Scholar
- UK Law Commission. (2009). The admissibility of expert evidence in criminal proceedings in England and Wales: a new approach to the determination of evidentiary reliability. Consultation Paper No. 190. Google Scholar
- United States Department of Justice. (2002). Searching and seizing computers and obtaining electronic evidence in criminal investigations. Available from http://www.usdoj.gov/criminal/cybercrime/s&smanual2002.htm. Google Scholar
- Archbold (2009). Criminal pleading, evidence and practice. London: Sweet & Maxwell Thomson Reuters. Google Scholar
- Blackstone's (2009). Criminal practice. Oxford: Oxford University Press. Google Scholar
- Brenner, S. W. (2006). The next step: Prioritizing jurisdiction. In B.-J. Koops & S. W. Brenner (Eds.), Cybercrime and jurisdiction. A global survey (pp. 327-349). The Hague: TMC Asser. Google Scholar
- Brenner, S., & Koops, B. J. (2004). Approaches to cybercrime jurisdiction. Journal of High-Technology Law, 4(1), 1-46. Google Scholar
- Cuijpers, C. M. K. C. (2007). Employer and employee power dynamics. The division of power between employer and employee in case of Internet and e-mail monitoring and positioning of employees. The John Marshall Journal of Computer & Information Law, 25, 37. Google Scholar
- De Hert, P., González Fuster, G., & Koops, B. J. (2006). Fighting cybercrime in the two Europes. The added value of the EU framework decision and the council of Europe convention. International Review of Penal Law, 77, 503-524. Google Scholar
- Gillespie, A. (2003). Sentences for offenses involving child pornography. Criminal Law Review, 81, February 2003. Google Scholar
- Gillespie, A. (2005). Tackling child grooming on the Internet: The UK approach. Bar Review, 1, 4. Google Scholar
- Gringas, C. (2002). The laws of the Internet. London: Butterworths. Google Scholar
- Hoekman, J., & Dirkzwager, C. (2009). Virtuele diefstal: Hoe gegevens toch weer goederen werden. Computerrecht, 26, 158. Google Scholar
- Kelleher, D., & Murray, K. (2007). Information technology law in Ireland. London: Tottel Publishing. Google Scholar
- Koops, B. J. (Ed.). (2007). Strafrecht en ICT (2nd ed.). The Hague: Sdu uitgevers. Google Scholar
- Koops, B. J. (2010). Cybercrime legislation in the Netherlands. Country report for the 18th International Congress on Comparative Law. Available from http://ssrn.com/abstract=1633958. Google Scholar
- McIntyre, T. J. (2005). Computer crime in Ireland: A critical assessment of the substantive law. Irish Criminal Law Journal, 15, 1. Google Scholar
- NCCRI. (2001). Prohibition of Incitement to Hatred Act 1989: A review, submission by the National Consultative Committee on Racism and Interculturalism. August. Google Scholar
- O'Malley, T. (2006). Sentencing law and practice (2nd ed.). Dublin: Thomson Round Hall. Google Scholar
- Ormerod, D. (2008). Smith and Hogan criminal law (12th ed.). Oxford: Oxford University. Google Scholar
- Parker, D. B. (1973). Computer Abuse. Palo Alto: SRI International. Google Scholar
- Beebe, N. L., & Clark, J. G. (2005). A hierarchical, objectives-based framework for the digital investigations process. Digital Investigation, 2(2), 146-166. Google ScholarDigital Library
- Carrier, B. (2003). Defining digital forensic examination and analysis tools using abstraction layers. International Journal of Digital Evidence, 1(4). Google Scholar
- Carrier, B. D. (2006). A hypothesis-based approach to digital forensic investigations. Ph. D. Dissertation, Purdue University. Google Scholar
- Carrier, B. D., & Spafford, E. H. (2003). Getting physical with the digital investigation process. International Journal of Digital Evidence, 2(2). Google Scholar
- Casey, E. (1997). Digital evidence and computer crime (1st ed.). London: Academic Press. Google Scholar
- Casey, E. (2002). Error, uncertainty and loss in digital evidence. International Journal of Digital Evidence, 1(2). Google Scholar
- Casey, E. (2007). Digital evidence maps--A sign of the times. Journal of Digital Investigation, 4(2). Google ScholarDigital Library
- Casey, E., Ferraro, M., & Nguyen, L. (2009). Investigation delayed is justice denied: Proposals for expediting forensic examinations of digital evidence. Journal of Forensic Science, 54(6). November 2009. Google ScholarCross Ref
- Cohen, F. (2009). Digital forensic evidence examination. Fred Cohen & Associates. Google Scholar
- Ieong, R. S. C. (2006). FORZA--Digital forensics investigation framework that incorporate legal issues. Proceedings of DFRWS2008. Available from http://www.dfrws.org/2006/proceedings/4- Ieong.pdf. Google ScholarDigital Library
- Madia, K., Prosise, C., & Pepe, M. (2003). Incident response & computer forensics. USA: McGraw. Google Scholar
- McKemmish, R. (1999). What is forensic computing? Trends and issues in crime and criminal justice (Vol. 118). Canberra: Australian Institute of Criminology. Google Scholar
- Ó Ciardhuáin, S. (2004). An extended model of cybercrime investigations. International Journal of Digital Evidence, 3(1). Google Scholar
- Reith, M., Carr, C., & Gunsch, G. (2002). An examination of digital forensic models. International Journal of Digital Evidence, 1(3). Google Scholar
- Ferraro, M. M., & Casey, E. (2004). Investigating child exploitation and pornography: The Internet, law and forensic science, Academic Press. Google Scholar
- Lee, H., Palmbach, T., & Miller, M. (2001). Henry Lee's crime scene handbook. London: Academic Press. Google Scholar
- Mattei, M., Blawie, J. F., and Russell, A. (2000). Connecticut Law Enforcement Guidelines for Computer Systems and Data Search and Seizure, State of Connecticut Department of Public Safety and Division of Criminal Justice. Google Scholar
- McLean, J. J. (2001). Homicide case study. In E. Casey (Ed.), Handbook of computer crime investigation: forensic tools and technology. London: Academic Press. Google Scholar
- Flusche, K. J. (2001). Computer forensic case study: Espionage, part 1. Information Systems Security, March-April 2001, Auerbach. Google Scholar
- Geberth, V. (1996). Practical homicide investigation (3rd ed). New York, NY: CRC Press. Google Scholar
- Horvath, F., & Meesig, R. (1996). The criminal investigation process and the role of forensic evidence: A review of empirical findings. Journal of Forensic Sciences. 41(6), 963-969. Google ScholarCross Ref
- Holmes, R. (1996). Profiling violent crimes: An investigative tool (2nd ed). Sage Publications. Google Scholar
- Petherick, W., & Turvey, B. (2008). Forensic victimology. San Diego: Academic Press. Google Scholar
- Scott, D., & Conner, M. (1997). In D. Haglund & H. Sorg (Eds.). Forensic taphonomy: The postmortem fate of human remains (Chapter 2). Boca Raton, FL: CRC Press. Google Scholar
- Turvey, B. (2008). Criminal profiling: An introduction to behavioral evidence analysis (3rd ed). London: Academic Press. Google Scholar
- Associated Press. (1997a). Wife's Internet friendship may have led to her death. January 23. Google Scholar
- Associated Press. (1997b). High-tech "stalking" of Canadian family linked to teen-aged son. April 20. Google Scholar
- Bryan, B. (2002). Letter writer is serial killer, concludes criminal profiler. St. Louis Post Dispatch, May 28. Google Scholar
- Burgess, A., Burgess, A., Douglas, J., & Ressler, R. (1997). Crime classification manual. San Francisco, CA: Jossey-Bass, Inc. Google Scholar
- Burgess, A., Hazelwood, R. (Eds.), (1995). Practical aspects of rape investigation: A multidisciplinary approach. (2nd ed.). New York, NY: CRC Press. Google Scholar
- Clubb, S. (2002). Police explain suspect's suicide. The Illinois River Bend Telegraph, June 12. Available from http://www.zwire.com/site/news.cfm?newsid=4412382&BRD=1719&PAG=46 1&dept_id=25271&rfi=8. Google Scholar
- Durfee, D. (1996). Man pleads no contest in stalking case. The Detroit News, January 25. Google Scholar
- Groth, A. N. (1979). Men who rape: The psychology of the offender. New York, NY: Plenum. Google Scholar
- Hazelwood, R., Reboussin, R., Warren, J. I., & Wright, J. A. (1991). Prediction of rapist type and violence from verbal, physical, and sexual scales. Journal of Interpersonal Violence, 6(1), 55-67. Google ScholarCross Ref
- Jarvis, C. (1998). Teen again linked to e-mail affair. The News Observer, North Carolina, November 28. Google Scholar
- McPherson, T. (2003). Sherlock Holmes' modern followers. The Advertiser, May 31. Google Scholar
- Meloy, J. R. (Ed.), (1998). The psychology of stalking: Clinical and forensic perspectives. San Diego, CA: Academic Press. Google Scholar
- Piper, E. (1998). Russian cybercrime flourishes: Deteriorating economic conditions have brought pirating and cracking mainstream. Reuters, December 30. Google Scholar
- Reuters Information Service. (1997). Swiss couple charged in U. S. child pornography sting. August 22. Google Scholar
- Robinson, B. (2002). Taking a byte out of cybercrime. ABC News, July 15. Google Scholar
- Shamburg, R. (1999). A tortured case. Net Life, April 7. Google Scholar
- Turvey, B. (2008). Criminal profiling: An introduction to behavioral evidence analysis (3rd ed.). San Diego: Academic Press. Google Scholar
- Wired News. (1998). Cops "lured" into net sex. February 16. Google Scholar
- Grace, T. (2009). George Ford Jr. gets 25 years to life in prison. The Daily Star, June 12, 2009. Available online at http://thedailystar.com/local/x112916207/George-Ford-Jr-gets-25-years-tolife-in-prison. Google Scholar
- Walker, P. (2010). Phone video of attack shown in trial of brothers for assault in Edlington. Gaurdian .co.uk. Available from http://www.guardian.co.uk/society/2010/jan/20/doncaster-attackbrothers-trial-doncaster. January 20, 2010. Google Scholar
- Zapotosky, M. (2010). Officials: "Serial killer" indicted. Washington Post, July 27, 2010. Google Scholar
- Juarez, V. (2009, November 19). Facebook status update provides alibi. CNN. Google Scholar
- Purpura, P. (2009, January 23). Vince Marinello sentenced to life in prison. The Times-Picayune. Google Scholar
- Amar, V. D. (2003, May 16). Regarding child pornography extends the Supreme Court's Federalism Cases. Findlaw's Write. Available from http://writ.corporate.findlaw.com/amar/20030516 .html. Google Scholar
- Ananova. (2001, August). Chatroom man wanted someone to rape and torture his wife. Available from http://www.ananova.com/news/story/sm_379058.html. Google Scholar
- Associated Press. (1998, February 10). FBI: Man posted sex pictures with daughter on Internet. Google Scholar
- Associated Press. (1999, September 2). Child participates in sex sting. Google Scholar
- Associated Press. (2001, November 21). Teen placed in jail cell with sex offender. Google Scholar
- Associated Press. (2002, December 6). Man convicted in Internet kidnap, rape of teen. Google Scholar
- Associated Press. (2003, March 18). Federal judge rules hacker covered by informant laws. Available from http://www.usatoday.com/tech/news/techpolicy/2003-03-18-hacker-informant_x.htm. Google Scholar
- Associated Press. (2010, February 6). Wyoming cops: Man set up ex-girlfriend for "rape fantasy." Available from http://cbs11tv.com/national/rape.fantasy.attack.2.1475992.html. Google Scholar
- Associated Press. (2010, May 27). Feds bust child porn "social networking" site. Available from http://www.foxnews.com/us/2010/05/27/feds-bust-child-porn-social-networking-site/. Google Scholar
- AZCentral.com. (2009, June 2). Woman raped live on the Internet; suspect in custody. Available from http://www.azcentral.com/news/articles/2009/06/02/20090602abrk-webassault0602 .html. Google Scholar
- Backus, L. (2010, April 21). Police pose as minor, arrest man for online sex show. New Britain Herald. Available from http://www.newbritainherald.com/articles/2010/04/21/news/doc4bcfaf95f2d5c559933707.txt. Google Scholar
- BBC News. (2009, June 10). Woman charged with sexual assault. Available from: http://news.bbc .co.uk/2/hi/uk_news/england/devon/8093490.stm. Google Scholar
- Beckford, M., & Stokes, P. (2010, March 10). Human rights laws stopped Home Office tracking sex offenders' emails. Telegraph. Available from http://www.telegraph.co.uk/news/uknews/law-andorder/7406462/Human-rights-laws-stopped-Home-Office-tracking-sex-offenders-emails.html. Google Scholar
- Burney, M. (1997, August 22). Cyber affair with teen-age girl leads to five years in prison. The Associated Press. Available from http://www.nando.net/newsroom/ntn/info/082297/info10_3348_noframes.html. Google Scholar
- Casey, E. (1999). Cyberpatterns: Criminal behavior on the Internet. In T. Brent (Ed.), Criminal profiling. (1st ed.). San Diego: Academic Press. Google Scholar
- Chen, D. W. (2000, October 5). Teacher is accused of duping boy to make a sexual video. New York Times, Late Edition--Final, Section B, Page 5, Column 5. Google Scholar
- Click Orlando. (2010, February 17). Cops: Woman met teen on video game, had sex. Available from http://www.clickorlando.com/news/22596993/detail.html. Google Scholar
- Coker, R. (2010, April 27). Vaughn Robert Biby, 9-time sex offender alleged to have kiddie porn, torture and murder pics--and Chuck E. Cheese Tokens. OC Weekly. Available from http://blogs.ocweekly.com/navel-gazing/crime-sex/vaughn-robert-biby-child-porn/. Google Scholar
- Diskant, T. (2002, February 22). After sentencing, Lasaga, Yale face civil suit. Yale Herald. Available from http://www.yaleherald.com/article.php?Article=359. Google Scholar
- Durkin, K. F., & Bryant, C. D. (1995). Log on to sex: Some notes on the carnal computer and erotic cyberspace as an emerging research frontier. Deviant Behavior: An Interdisciplinary Journal, 16, 179-200. Google ScholarCross Ref
- Egan, N. E. (2007, April 16). Five years ago Alicia Kozakiewicz was taken away and tortured by a man she met on the Internet: Now she tries to save other teens. People Magazine, 67(15). Available from http://www.people.com/people/archive/article/0,,20061919,00.html. Google Scholar
- Frith, M. (2003, October 10). Internet Paedophile "groomed" 70 girls in just 5 months. The Independent. Available from http://www.independent.co.uk/news/uk/crime/internet-paedophilegroomed- 70-girls-in-just-five-months-758201.html. Google Scholar
- Fujimoto, L. (2008, August 8). Man meant to meet teen but gets prison. The Maui News. Available from http://www.mauinews.com/page/content.detail/id/506936.html?nav=10. Google Scholar
- Fuoco, M. (2002, January 5). Missing teen found safe but tied up in Virginia townhouse. Post-Gazette .com. Available from http://www.post-gazette.com/regionstate/20020105missingp1.asp. Google Scholar
- Guardian Unlimited. (2001, August 2). Man convicted of internet-conspired rape. Available from http://www.guardian.co.uk/japan/story/0,7369,531343,00.html. Google Scholar
- Gutman, M. (2010, February 4). Super Bowl Furor: Pete Townshend Defends Halftime Act Amid Child Porn Accusations. ABC News. Available from http://abcnews.go.com/Entertainment/pete-townshend-defends-super-bowl-act-amid-child/story?id=9751000. Google Scholar
- Henry, J. (1985). Testimony before the Permanent Subcommittee on Governmental Affairs before the United States Senate, Ninety-Ninth Congress. Available from http://www.nostatusquo .com/ACLU/NudistHallof-Shame/Henry.html. Google Scholar
- Hernandez, A. E. (2000, November 17). Self-reported contact sexual crimes of federal inmates convicted of child pornography offenses. In: Presented at the 19th Annual Conference Research and Treatment Conference of the Association for the Treatment of Sexual Abusers, San Diego, CA. Google Scholar
- Hines, N. (2010, March 8). Serial sex offender Peter Chapman killed teenager groomed on Facebook. Times Online. Available from http://www.timesonline.co.uk/tol/news/uk/crime/article7054001.ece. Google Scholar
- Hughes, M. (2010, May 29). Postman admits Internet grooming. The Independent. Available from http://www.independent.co.uk/news/uk/crime/postman-admits-internet-grooming-1986199 .html. Google Scholar
- Kalson, S. (2002, January 9). Alicia's websites pose a very disturbing question. Post-Gazette.com. Available from http://www.postgazette.com/columnists/20020109sally0109p3.asp. Google Scholar
- Lanning, K. V (2001). Child molesters and cyber Pedophiles--A behavioral perspective. In Hazelwood R. R. & Burgess, A. W. (Eds.), Practical aspects of rape investigation: A multidisciplinary approach (3rd ed., pp. 199-232). Boca Raton, FL: CRC Press. Google Scholar
- LexisNexis. (2010a). Killer rapist lured victim on Facebook. AllBusiness.com. Available from http://www.allbusiness.com/crime-law-enforcement-corrections/criminal-offenses-sex/140798900-1 .html. Google Scholar
- LexisNexis. (2010b). Serial sex offender raped and killed girl he lured on Facebook. AllBusiness .com. Available from http://www.allbusiness.com/crime-law-enforcement-corrections/criminaloffensessex/14080634-1.html. Google Scholar
- Lynch, T. (2009, July 22). Over-criminalization of conduct/over-criminalization of Federal Law. Testimony before the Subcommittee on Crime, Terrorism, and Homeland Security, Judiciary Committee, United States House of Representatives. Available from http://www.cato.org/testimony/ct-tl-20090722.html. Google Scholar
- Mail Online. (2007, February 5). Men jailed in Internet schoolgirl rape plot. Available from http://www.dailymail.co.uk/news/article-433968/Men-jailed-internet-schoolgirl-rape-plot .html. Google Scholar
- McAullife, W. (2000, October 24). Net paedophile gets five years. ZDNet. Available from http://news.zdnet.co.uk/story/0,,s2082159,00.html. Google Scholar
- McCabe, G. (2010, February 12). Prolific Paedophile convicted of abusing 19 victims after grooming victims online. News. Scotsman.com. Available from http://news.scotsman.com/paedophilia/Prolific-paedophile-is-convicted-of.6066597.jp. Google Scholar
- McClintock, D. (2001, June). Fatal bondage. Vanity Fair. Google Scholar
- McGrath, M. G., & Casey, E. (2002). Forensic psychiatry and the Internet: Practical perspectives on sexual predators and obsessional harassers in cyberspace. Journal of American Academy of Psychiatry and Law, 30, 81-94. Google Scholar
- Miller, J. R. (2009, June 15). Maine mom nabbed in child porn sting. Fox News. Available from http://www.foxnews.com/story/0,2933,526462,00.html. Google Scholar
- New York Lawyer. (2003, April 16). NY law professor pleads guilty to possessing child porn. Available from http://www.nylawyer.com/news/03/04/041603d.html. Google Scholar
- O'Hanlon, S. (2003, January 11). Porn curiosity brings scrutiny against "Who's" Townsend. http://reuters.com/newsArticle.jhtml? Type = internetNews&storyID = 2028595. Google Scholar
- Osher, C. (2002, January 31). Classmates recall Tyree as "a loner." Tribune-Review. Available from http://www.pittsburghlive.com/x/pittsburghtrib/s_15038.html. Google Scholar
- Pendlebury, F. (2001, July 17). Jail for net rapist. Dorsett Echo. Available from http://www.thisisdorset .net/dorset/archive/2001/07/17/BOURN_NEWS_NEWS10ZM.html. Google Scholar
- Psychiatric News. (2000, May 5). Protect children from predators on Internet, parents tell Congress. Available from http://www.psych.org/pnews/00-05-05/protect.html. Google Scholar
- Pulkkinen, L. (2008, February 27). Rape Victim, 16, Identifies Suspects via MySpace. Seattle, PI. Available from http://www.seattlepi.com/local/352965_bellevue28.html. Google Scholar
- Reagan, B. (2006). Computer forensics: The new fingerprinting. Available from http://www .popularmechanics.com/technology/how-to/computer-security/2672751. Google Scholar
- Reuters. (2001, March 26). Russia lacks laws to fight child porn explosion. Google Scholar
- Rizzo, T. (2001, March 2). Judge rules Robinson must stand trial in 3 deaths. Kansas City Star. Available from http://www.kcstar.com/standing/robinson/case.html. Google Scholar
- Roddy, D. B., & Schmitz, J. (2002, January 5). Suspect Scott Tyree: A classic long-haired computer guy. Post-Gazette.com. Available from http://www.post-gazette.com/regionstate/20020105tyreep2.asp. Google Scholar
- Shannon, E. (1998, September 14). Main street monsters. Time Magazine, 152(11). Google Scholar
- Soh-jung, Y. (2001, July 7). Rising number of sexual assault cases linked to Internet. The Korea Herald. Available from http://www.vachss.com/help_text/archive/sa_korea.html. Google Scholar
- States News Service. (1998, December 2). Woman jailed for sex with boy. Available from http://www.fathermag.com/news/rape/portland02.shtml. Google Scholar
- States News Service. (1999, January, 13). Cyber-sex seducer gets jail time. Available from http://www.father-mag.com/news/rape/morganton.shtml. Google Scholar
- Stokes, P. (2010, March 8). Peter Chapman targeted thousands of young girls. Telegraph. Available from http://www.telegraph.co.uk/news/uknews/crime/7397894/Peter-Chapman-targeted-thousandsof-young-girls.html. Google Scholar
- Taylor, M., Quayle, E., & Holland, G. (2001). Child pornography, the Internet and offending. ISUMA, 2(2). Available from http://www.isuma.net/v02n02/taylor/taylor_e.shtml. Google Scholar
- Telegraph Media Group, LTD. (2010, March 8). Sex offender admits kidnap and murder of teen he ensnared on Facebook. Google Scholar
- The Age. (2002, December 26). Japanese police to regulate Internet dating services. Available from http://www.theage.com.au/articles/2002/12/26/1040511126218.html. Google Scholar
- Thomson, S. (2002, November 26). Charges dropped against two men in sex-slave case. The Columbian. Google Scholar
- Times Online. (2010, March 8). Serial sex offender peter Chapman killed teenager groomed on Facebook. Available from http://www.timesonline.co.uk/tol/news/uk/crime/article7054001.ece. Google Scholar
- United States Code. (2010). Title 18, Section 3509m. Google Scholar
- United States Department of Justice. (2000, March 17). Former high-tech executive pleads guilty to charge of traveling to have sex with minor he met on Internet. Available from http://www .usdoj.gov/usao/cac/pr/pr2000/050.htm. Google Scholar
- United States Department of Justice. (2002a). Abingdon man sentenced to 41 months for child pornography. Available from http://www.usdoj.gov/usao/md/press_releases/press02/wyattrelease.htm. Google Scholar
- United States Department of Justice. (2002b). Parkville man receives 10 year prison sentence for exploiting child to produce child pornography. Available from http://www.usdoj.gov/usao/md/press_releases/press02/adam_thomas_valleau_sentenced.htm. Google Scholar
- United States Department of Justice. (2002c). Man sentenced to 27 months in prison for possessing child pornography. Available from http://www.usdoj.gov/usao/txs/releases/April%20 2002/020417-magargee.htm. Google Scholar
- United States Department of Justice. (2003). Fact Sheet, PROTECT Act. Available from http://www .usdoj.gov/opa/pr/2003/April/03_ag_266.htm. Google Scholar
- United States Department of Justice. (2009). Man who posed as a teen-aged girl online pleads guilty to transportation of child pornography. Available from http://baltimore.fbi.gov/dojpressrel/pressrel09/ba102009.htm. Google Scholar
- United States Immigration and Customs Enforcement. (2010, January 29). ICE arrest Puerto Rican predator for sexually enticing minors and production of child porn. Available from http://www.ice.gov/pi/nr/1001/100129sanjuan.htm. Google Scholar
- Wiley, J. K. (2007, October 19). Father accused of videotaping sex attack on daughter is arraigned. KATU.com. Available from http://www.katu.com/news/local/10676781.html. Google Scholar
- Wood, H. (2009, April 5). Husband "used Internet to recruit man to rape his wife." Mirror.co.uk News. Available from http://www.mirror.co.uk/news/top-stories/2009/06/04/husband-usedinternet-to-recruit-man-to-rape-his-wife-115875-21414917/. Google Scholar
- Halderman, J. A., Schoen, S. D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J. A., Feldman, A. J., Appelbaum, J., Felten, W. W. (2008). Lest we remember: Cold boot attacks on encryption keys, Proc. 2008 USENIX Security Symposium.Google Scholar
- PCWorld, 2010 http://www.pcworld.com/article/191019/fdic_hackers_took_more_than_120m_ in_three_ months.html. Google Scholar
- Foote, D. (February 8, 1999). You could get raped. Newsweek. Google Scholar
- Associated Press. (1997, April 1). As online harassment grows, calls for new laws follow. Google Scholar
- Harmon, R., Rosner, R., & Owens, H. (1998). Sex and violence in a forensic population of obsessional harassers' psychology, public policy, and law. American Psychological Association, 4(1/2), 236-249. Google Scholar
- Meloy, J. R. (1998). The psychology of stalking. In J. R. Meloy (Ed.), The psychology of stalking: Clinical and forensic perspectives (1-23). New York: Academic Press. Google Scholar
- Meloy, J. R. (1999). Stalking: An old behavior, a new crime. Psychiatric Clinics of North America. National Center for Victims of Crime, Safety. Available from http://www.ncvc.org/infolink/svsafety.htm. Google Scholar
- Pathe, M., & Mullen, P. E. (1997). The impact of stalkers on their victims. British Journal of Psychiatry, 170, 12-17 Google ScholarCross Ref
- Casey, E. (2001). Practical approaches to recovering encrypted evidence. International Journal of Digital Forensics. Google Scholar
- Casey, E., & Stellatos, G. J. (2008). The impact of full disk encryption on digital forensics. Operating Systems Review, 42(3), 93-98. Google ScholarDigital Library
- Gupta, M. R., Hoeschele, M. D., & Rogers, M. K. (2006). Hidden disk areas: HPA and DCO. International Journal of Digital Evidence, 5(1). Google Scholar
- Hollinger, R. C. (1997). Crime, deviance and the computer. Brookfield, VT: Dartmouth Publishing Company. Google Scholar
- Sammes, T., & Jenkinson, B. (2000). Forensic computing: A practitioner's guide. London: Springer. Google Scholar
- Singh, S. (2000). The code book: The science of secrecy from ancient Egypt to quantum cryptography. New York: Anchor Books. Google Scholar
- Baker, R. (2000). Harold Shipman's medical practice 1974-1998. Department of Health Audit Report. Available from http://www.doh.gov.uk/hshipmanpractice/shipman.pdf. Google Scholar
- Bates, J. (1999). Judicial review relating to search warrants--Discussion paper. International Journal of Forensic Computing. Available from http://www.forensiccomputing.com/archives/judicial .html. Google Scholar
- Byers, D., & Shahmehri, N. (2008). Contagious errors: Understanding and avoiding issues with imaging drives containing faulty sectors. Digital Investigation, 5(1-2), 29-33. Google ScholarDigital Library
- Flusche, K. J. (2001). Computer forensic case study: Espionage, part 1 just finding the file is not enough! Information Systems Security, March/April 2001, Auerbach. Google Scholar
- Meighan, C. W. (1966). Archaeology: An introduction. San Francisco: Chandler Publishing Company, p. 18. Google Scholar
- Thornton, J. I. (1997). The general assumptions and rationale of forensic identification. In D. Faigman, Google Scholar
- D. Kaye, M. Saks, J. Sanders (Eds.), Modern scientific evidence: The law and science of expert testimony (Vol. 2). St. Paul, MN: West Publishing Company. Google Scholar
- United States Department of Justice. (2001). Electronic crime scene investigation: A guide for first responders. National Institute of Justice, NCJ 187736. Available from http://www.ncjrs.org/pdffiles1/nij/187736.pdf. Google Scholar
- Casey, E. (2009). Deeply embedded metadata. Blog entry. Available from http://blog.cmdlabs .com/2009/05/27/deeply-embedded-metadata/. Accessed 05/27/2009. Google Scholar
- Casey, E. (2010). The pitfalls of file initialization for forensic analysts. Available from http://blog.cmdlabs .com/2010/03/17/the-pitfalls-of-file-initialization-for-forensic-analysts/. Accessed 03/17/2010. Google Scholar
- Microsoft. (1999). Back up the recovery agent encrypting file system private key in Windows 2000. Microsoft KB Q241201. Available from http://support.microsoft.com/default .aspx?scid=kb;[LN];Q241201. Google Scholar
- Microsoft. (2001a). Detailed explanation of FAT boot sector. MS KB140418. Available from http://support.microsoft.com/default.aspx?scid=KB;en-us;q140418. Google Scholar
- Microsoft. (2001b). General information about Microsoft Office XP encryption. Microsoft KB Article Q290112. Available from http://support.microsoft.com/default.aspx?scid=kb;en-us; Q290112. Google Scholar
- Microsoft. (2001c). Maximum partition size using FAT16 file system. Available from http://support.microsoft.com/default.aspx?scid=kb;EN-US;118335. Google Scholar
- Microsoft. (2002a). Description of the FAT32 file system. Available from http://support.microsoft .com/default.aspx?scid=kb;EN-US;154997. Google Scholar
- Microsoft. (2002b). Limitations of FAT32 file system. Available from http://support.microsoft .com/default.aspx?scid=KB;en-us;q184006. Google Scholar
- Pereira, M. T. (2009, March). Forensic analysis of the Firefox 3 Internet history and recovery of deleted SQLite records. Digital Investigation, 5(3-4): 93-103. Google ScholarDigital Library
- Pittman, R., & Shaver, D. (2009). Windows forensic analysis. In E. Casey (Ed.), Handbook of digital forensics and investigation. London: Academic Press. Google Scholar
- Sammes, T., & Jenkinson, B. (2000). Forensic computing: a practitioner's guide. London: Springer. Google Scholar
- Usborne, D. (2002). Has an old computer revealed that Reid toured world searching out new targets for al-Qa'ida? UK Independent. Available from http://www.independent.co.uk/story .jsp?story=114885. Google Scholar
- Buckeye, B., & Liston, K. (2002, February). Recovering deleted files in Linux. Sysadmin Magazine. Available from http://www.samag.com/documents/s=7033/sam0204g/sam0204g.htm. Google Scholar
- Carrier, B. (2003a, March 15). Splitting the disk--Part 1. Sleuth Kit Informer, (2). Available from http://www.sleuthkit.org/informer/sleuthkit-informer-2.html. Google Scholar
- Carrier, B. (2003b). Splitting the disk--Part 2. Sleuth Kit Informer, (5). Available from http://www .sleuthkit.org/informer/sleuthkit-informer-5.html. Google Scholar
- Peek, J., O'Reilly, T., & Loukides, M. (1997). UNIX powertools. California: O'Reilly Google Scholar
- Seglem, K., Luque, M. E., & Murphy, S. E. (2001). Forensic analysis of UNIX systems. In E. Casey (Ed.), Handbook of computer crime investigation. London: Academic Press. Google Scholar
- Widdowson, L., & Ferlito, J. (2001, January). Tales from the Abyss: UNIX file recovery. SysAdmin Magazine. Available from http://www.samag.com/documents/s=1441/sam0111b/0111b.htm. Google Scholar
- Baran, P. (1964). Introduction to distributed communications networks, RM-3420-PR. Santa Barbara, CA: The Rand Corporation. Available from http://www.rand.org/publications/RM/RM3420/. Google Scholar
- Casey, E. (2004). Network traffic as a source of evidence. Journal of Digital Investigation. Google ScholarDigital Library
- Convery, S. (2002). Hacking layer 2: fun with Ethernet switches. BlackHat Briefing. Available from http://www.blackhat.com/presentations/bh-usa-02/bh-us-02-convery-switches.pdf. Google Scholar
- Gauis (2000). Things to do in Ciscoland when you're dead. Phrack 56. Available from http://www .phrack.com/show.php?p=56&a=10. Google Scholar
- Snipe, S. (2000). Why your switched network isn't secure. Available from http://www.sans.org/resources/idfaq/switched_network.php. Google Scholar
- Fyodor. (1998). Remote OS detection via TCP/IP stack fingerprinting. Available from http://www .insecure.org/nmap/nmap-fingerprinting-article.txt. Google Scholar
- Romig, S. (2001). Incident response tools. In E. Casey (Ed.), Handbook of computer crime investigation. London: Academic Press. Google Scholar
- Sommer, P. (1997, October). Downloads, logs and captures: Evidence from cyberspace. Journal of Financial Crime, 5JFC2, 138-152. Available from http://www1.bcs.org.uk/DocsRepository/03900/3968/logs.htm. Google ScholarCross Ref
- United States Department of Justice. (2002). Searching and seizing computers and obtaining electronic evidence in criminal investigations. Available from http://www.cybercrime.gov/searchmanual.htm. Google Scholar
- Cairns, G. (1996). Snuffsex, Australian Broadcasting Corporation's NewsRadio Network. Google Scholar
- CBS News (2002). Daniel Pearl killers appeal. July 17, 2002. Available online at http://www .cbsnews.com/stories/2002/05/31/attack/main510651.shtml. Google Scholar
- CERT (2002). Trojaned OpenSSH distribution. Available online at http://www.cert.org/advisories/CA-2002-24.html. Google Scholar
- Clark, F., & Diliberto, K. (1996). Investigating computer crime. FL, Boca Raton: CRC Press. Google Scholar
- DAWN Group. (2002). Defence disputes video's validity: Daniel Pearl case, 17 May 2002. Google Scholar
- Durkin, K. F., & Bryant, C. D. (1999). Propagandizing pederasty: A thematic analysis of the on-line exculpatory accounts of unrepentant pedophiles. Deviant Behavior: An Interdisciplinary Journal, 20, 103-127 Google ScholarCross Ref
- Mann, D., & Sutton, M. (1998). Netcrime: More change in the organization of thieving. British Journal of Criminology, 38(2), 201-229. Google ScholarCross Ref
- National News. (2002). Text of Daniel Pearl case verdict, July 17, 2002. Google Scholar
- Palisade Systems. (2003). Porn tops file sharing usage. Google Scholar
- United States Department of Justice. (1999). Man convicted of threatening federal judges by Internet e-mail. Available online at http://www.usdoj.gov/criminal/cybercrime/johnson.htm. Google Scholar
- United States Postal Service. (2001). Multimillion-dollar child pornography enterprise dismantled. Google Scholar
- Garfinkel, S. (2002). Network forensics: tapping the Internet. O'Reilly Network. Available from http://www.oreillynet.com/pub/a/network/2002/04/26/nettap.html. Google Scholar
- Graham, R. (2000). Sniffing (network wiretap, sniffer) FAQ. Available from http://www.robertgraham .com/pubs/sniffing-faq.html. Google Scholar
- Casey, E., Daywalt, C., Johnston, A., Maguire, T. (2009). Network investigations. Digital forensics and investigation. Boston: Elsevier. Google Scholar
- Comer, D. E. (1995). Internetworking with TCP/IP volume I: Principles, protocols, and architecture (3rd ed.). Upper Saddle River, NJ: Prentice Hall Google Scholar
- Henry, P., & De Libero, G. (1996). Strategic networking: From LAN and WAN to information superhighways. Massachusetts: International Thomson Publishing Company. Google Scholar
- Microsoft. (2000). Interpreting IAS-formatted log files. In Microsoft Windows 2000 server documentation. Available from http://www.microsoft.com/windows2000/en/server/help/sag_ias_log1a.htm. Google Scholar
- Morris, R. T. (1995). A weakness in the 4.2BSD UNIX TCP/IP software. Bell Labs Computer Science Technical Report 117 (February 25, 1985). Available from http://www.eecs.harvard.edu/~rtm/papers.html. Google Scholar
- Route, D. (1997). Juggernaut. In Phrack 50. Available from http://www.phrack.com/show.php? p=50&a=6. Google Scholar
- Shimomura, T., & Markoff, J. (1996). Takedown: The pursuit of Kevin Mitnick, America's most wanted computer outlaw--By the man who did it. New York: Hyperion. Google Scholar
- Shinkle, P. (2002). Serial killer caught by his own Internet footprint. St. Louis Post-Dispatch, June 17, 2002. Google Scholar
- Stevens, W. R. (1994). TCP/IP illustrated (Vol. 1). Boston: Addison Wesley. Google Scholar
- Tribune News Services. (2000). Black student charged with racist e-mail threats at college. April 21, 2000. Google Scholar
- Casey, E., Daywalt, C., Johnston, A., Maguire, T. (2009). Network investigations. Digital forensics and investigation. Boston: Elsevier. Google Scholar
- Comer, D. E. (1995). Internetworking with TCP/IP volume I: Principles, protocols, and architecture (3rd ed.). Upper Saddle River, NJ: Prentice Hall Google Scholar
- Henry, P., & De Libero, G. (1996). Strategic networking: From LAN and WAN to information superhighways. Massachusetts: International Thomson Publishing Company. Google Scholar
- Microsoft. (2000). Interpreting IAS-formatted log files. In Microsoft Windows 2000 server documentation. Available from http://www.microsoft.com/windows2000/en/server/help/sag_ias_log1a.htm. Google Scholar
- Morris, R. T. (1995). A weakness in the 4.2BSD UNIX TCP/IP software. Bell Labs Computer Science Technical Report 117 (February 25, 1985). Available from http://www.eecs.harvard.edu/~rtm/papers.html. Google Scholar
- Route, D. (1997). Juggernaut. In Phrack 50. Available from http://www.phrack.com/show.php? p=50&a=6. Google Scholar
- Shimomura, T., & Markoff, J. (1996). Takedown: The pursuit of Kevin Mitnick, America's most wanted computer outlaw--By the man who did it. New York: Hyperion. Google Scholar
- Shinkle, P. (2002). Serial killer caught by his own Internet footprint. St. Louis Post-Dispatch, June 17, 2002. Google Scholar
- Stevens, W. R. (1994). TCP/IP illustrated(Vol. 1). Boston: Addison Wesley. Google Scholar
- Tribune News Services. (2000). Black student charged with racist e-mail threats at college. April 21, 2000. Google Scholar
Cited By
Arce D, Woods D and Böhme R (2024). Economics of incident response panels in cyber insurance, Computers and Security , 140 :C , Online publication date: 1-May-2024 .
Ottmann J, Breitinger F and Freiling F (2023). An Experimental Assessment of Inconsistencies in Memory Forensics, ACM Transactions on Privacy and Security , 27 :1 , (1-29), Online publication date: 29-Feb-2024 .
Studiawan H, Grispos G and Choo K (2023). Unmanned Aerial Vehicle (UAV) Forensics, Computers and Security , 132 :C , Online publication date: 1-Sep-2023 .
Yamada H and Nemoto J (2022). Scalar DL, Proceedings of the VLDB Endowment , 15 :7 , (1324-1336), Online publication date: 1-Mar-2022 .
Akremi A An Adaptative and Compliant Forensics Admissibility Metrics Generation Methodology The 23rd International Conference on Information Integration and Web Intelligence, (495-503)
Amato F, Cozzolino G, Moscato V and Moscato F (2022). Analyse digital forensic evidences through a semantic-based methodology and NLP techniques, Future Generation Computer Systems , 98 :C , (297-307), Online publication date: 1-Sep-2019 .
Du X and Scanlon M Methodology for the Automated Metadata-Based Classification of Incriminating Digital Forensic Artefacts Proceedings of the 14th International Conference on Availability, Reliability and Security, (1-8)
Costantini S, Gasperis G and Olivieri R (2019). Digital forensics and investigations meet artificial intelligence, Annals of Mathematics and Artificial Intelligence , 86 :1-3 , (193-229), Online publication date: 1-Jul-2019 .
Barmpatsalou K, Cruz T, Monteiro E and Simoes P (2018). Current and Future Trends in Mobile Device Forensics, ACM Computing Surveys , 51 :3 , (1-31), Online publication date: 31-May-2019 .
Bahjat A and Jones J (2019). Deleted file fragment dating by analysis of allocated neighbors, Digital Investigation: The International Journal of Digital Forensics & Incident Response , 28 :S , (S60-S67), Online publication date: 1-Apr-2019 .
Horsman G (2019). Tool testing and reliability issues in the field of digital forensics, Digital Investigation: The International Journal of Digital Forensics & Incident Response , 28 :C , (163-175), Online publication date: 1-Mar-2019 .
(2019). A road map for digital forensics research, International Journal of Electronic Security and Digital Forensics , 11 :2 , (194-224), Online publication date: 1-Jan-2019 .
(2019). Evaluation of smartphone data using a reference architecture, International Journal of Electronic Security and Digital Forensics , 11 :2 , (160-182), Online publication date: 1-Jan-2019 .
Mohammed H, Clarke N and Li F Evidence Identification in Heterogeneous Data Using Clustering Proceedings of the 13th International Conference on Availability, Reliability and Security, (1-8)
Villena S, Vega M, Mateos J, Rosenberg D, Murtagh F, Molina R and Katsaggelos A (2018). Image super-resolution for outdoor digital forensics. Usability and legal aspects, Computers in Industry , 98 :C , (34-47), Online publication date: 1-Jun-2018 .
Galbraith C and Smyth P (2017). Analyzing user-event data using score-based likelihood ratios with marked point processes, Digital Investigation: The International Journal of Digital Forensics & Incident Response , 22 :S , (S106-S114), Online publication date: 1-Aug-2017 .
Grispos G, Glisson W and Choo K Medical cyber-physical systems development Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies, (108-114)
al-Khateeb H, Epiphaniou G, Alhaboby Z, Barnes J and Short E (2017). Cyberstalking, Telematics and Informatics , 34 :4 , (339-349), Online publication date: 1-Jul-2017 .
Liao R, Balasinorwala S and Raghav Rao H (2017). Computer assisted frauds, Information Systems Frontiers , 19 :3 , (443-455), Online publication date: 1-Jun-2017 .
Ma J, Xue B and Zhang M A Profile-Based Authorship Attribution Approach to Forensic Identification in Chinese Online Messages Proceedings of the 11th Pacific Asia Workshop on Intelligence and Security Informatics - Volume 9650, (33-52)
Gelernter N, Grinstein Y and Herzberg A Cross-Site Framing Attacks Proceedings of the 31st Annual Computer Security Applications Conference, (161-170)
Greengard S (2012). On the digital trail, Communications of the ACM , 55 :11 , (19-21), Online publication date: 1-Nov-2012 .
Pan Y, Mishra S, Yuan B, Stackpole B and Schwartz D Game-based forensics course for first year students Proceedings of the 13th annual conference on Information technology education, (13-18)
Save to Binder
University of Lausanne
- Publication Years 2000 - 2019
- Publication counts 68
- Citation count 212
- Available for Download 3
- Downloads (cumulative) 13,549
- Downloads (12 months) 1,788
- Downloads (6 weeks) 315
- Average Downloads per Article 4,516
- Average Citation per Article 3
Index Terms
Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet
Reviews
Reviewer: Cecilia G. Manrique
This hefty book on forensic evidence obtained from computers dispels the myths propagated by popular television series. It starts from the premise that very few people are well versed in the technical, evidential, and legal issues concerning digital evidence. Oftentimes, the useful evidence that may be found in various digital media is overlooked, collected incorrectly, or analyzed ineffectively. It is the goal of the team of contributors to equip readers with the necessary knowledge and skills to be able to make use of digital evidence correctly and effectively. This third edition covers the various topics of criminal profiling, victimology, and crime reconstruction, very specifically geared toward computer crime and the concomitant gathering of digital evidence for the investigation, whether the computer is used as a tool, an object, or a subject of a crime. Just as investigators have the technology to help them, the same technologies are available to criminals, which makes the development of published guidelines to secure a crime scene as well as having established steps for giving testimony quite important to the process. It is also interesting to note that the scientific method is applied to digital investigations. It is quite obvious that the various authors draw from several fields, such as forensic science, computer science, political science, criminal justice, the law, and behavioral analysis; as such, it is multi- and inter-disciplinary. More specifically, the authors tackle the specific crimes of cyber bullying, cyber stalking, identity theft, online sex offenders, fraudsters, and cyber threats. There is extensive use of boxed stories, legal cases, practitioner's tips, tables, the discussion of legislation, flow charts, treaties and journals, as well as figures, diagrams, pictures, and computer screen shots. The book is comparative in nature: it covers not only cyber law in the US, but also case law in the UK, Ireland, and the Netherlands. Given the ubiquity of the computer and the crimes that it can generate, learning about how other nations handle these issues helps in the formation of our own methods for dealing with crimes domestically, as well as those that cross national boundaries. Because the book was put together by a team of contributors, there are differences, redundancies, and inconsistencies that cannot be avoided. Most chapters have summaries, but there are some that do not. Most chapters have references and case listings, but they are not consistent in terms of number: some have many references, but a few chapters have either no references or less than five. It is quite helpful that the book has separate case, name, and subject indexes for easy referencing. Some authors go back to the very basics of explaining the history of the Internet or the very basics of what constitutes a network, which is good for beginning users but may be of little use for advanced users. That could be part of the reason why the book is so physically large and heavy, making it difficult to even hold it for an extended period of time. Putting the entire book online would alleviate that situation, taking a cue from one of the chapters that is totally online (chapter 20, "Digital Evidence on Mobile Devices"). An e-book version with greater coverage of how the science is being used in social networking and virtual worlds would be a welcome feature of the next edition. Online Computing Reviews Service
Access critical reviews of Computing literature here
Become a reviewer for Computing Reviews.
Recommendations
Computer Forensics and Cyber Crime: An Introduction (2nd Edition)
Computer Crime, Investigation, and the Law
Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet with Cdrom
Export Citations
Footer
Categories
About
- About ACM Digital Library
- ACM Digital Library Board
- Subscription Information
- Author Guidelines
- Using ACM Digital Library
- All Holdings within the ACM Digital Library
- ACM Computing Classification System
- Accessibility Statement
Join
- Join ACM
- Join SIGs
- Subscribe to Publications
- Institutions and Libraries
Connect
- Contact us via email
- ACM on Facebook
- ACM DL on X
- ACM on LinkedinRSS
- Send Feedback
- Submit a Bug Report
The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2024 ACM, Inc.
- Terms of Usage
- Privacy Policy
- Code of Ethics
Your Search Results Download Request
We are preparing your search results for download .
We will inform you here when the file is ready.
Your Search Results Download Request
Your file of search results citations is now ready.
Your Search Results Download Request
Your search export query has expired. Please try again.