Browse Books

Go to Digital Evidence and Computer Crime

Digital Evidence and Computer Crime, Third Edition provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. The widely-adopted first and second editions introduced thousands of students to this field and helped them deal with digital evidence. This completely updated edition provides the introductory materials that new students require, and also expands on the material presented in previous editions to help students develop these skills. The textbook teaches how computer networks function, how they can be involved in crimes, and how they can be used as a source of evidence. Additionally, this third edition includes updated chapters dedicated to networked Windows, Unix, and Macintosh computers, and Personal Digital Assistants. Ancillary materials include an Instructor's Manual and PowerPoint slides. * Provides a thorough explanation of how computers & networks function, how they can be involved in crimes, and how they can be used as evidence * Features coverage of the abuse of computer networks and privacy and security issues on computer networks

References

  1. ASCLD. (2003). Proposed revisions to 2001 accreditation manual. Available from http://www .ascld-lab.org/pdf/aslabrevisions.pdf. Google Scholar
  2. Blanton, T. (1995). The top-secret computer messages the Reagan/Bush White House tried to destroy. National Security Archive. Available from http://www.gwu.edu/~nsarchiv/white_ house_email/. Google Scholar
  3. Carrier, B. (2003). Defining digital forensic examination and analysis tool using abstraction layers. International Journal of Digital Evidence, 1(4), Syracuse, NY. Available from http://www.ijde.org/docs/02_winter_art2.pdf. Google Scholar
  4. Carrier, B. (2006). A hypothesis-based approach to digital forensic investigations. CERIAS Tech Report 2006-06. Available from https://www.cerias.purdue.edu/assets/pdf/bibtex_ archive/2006-06.pdf. Google Scholar
  5. Casey, E. (2000). Digital evidence and computer crime (1st ed.). London: Academic Press. Google Scholar
  6. Casey, E. (2011). Cyberpatterns: Criminal behavior on the Internet. In B. Turvey (Ed.), Criminal profiling: An introduction to behavioral evidence analysis (4th ed.). London: Academic Press. Google Scholar
  7. Chisum, J. W. (1999). Crime reconstruction and evidence dynamics. Presented at the Academy of Behavioral Profiling Annual Meeting. Monterey, CA. Google Scholar
  8. Henseler, J. (2000). Computer crime and computer forensics. In The encyclopedia of forensic science. London: Academic Press. Google Scholar
  9. Johnson, T. (2000). Man searched web for way to kill wife, lawyers say. Seattle Post-Intelligencer, June 21, 2000. Available from http://seattlepi.nwsource.com/local/murd21.shtml. Google Scholar
  10. Lee, H., Palmbach, T., Miller, M. (2001). Henry Lee's crime scene handbook. London: Academic Press. McClintock, D. (2001). Fatal bondage, Vanity Fair, June. Google Scholar
  11. McCullagh, D. (2002). Electronic evidence anchors porn case. Available from http://news.cnet .com/2100-1023-955961.html. Google Scholar
  12. Reed, C. (1990-91). 2 CLSR 13-16 as quoted in Sommer, P. Downloads, logs and captures: Evidence from Cyberspace Journal of Financial Crime, October, 1997, 5JFC2 138-152. Google Scholar
  13. Saferstein, R. (1998) Criminalistics: An introduction to forensic science, 6th Ed., Upper Saddle River, NJ: Prentice Hall. Google Scholar
  14. Sullivan, B. (2003). Pair who hacked court get 9 years. MSNBC, February 7, 2003. Google Scholar
  15. Venema, W., & Farmer, D. (2000). Forensic computer analysis: an introduction. Doctor Dobb's Journal. Available from http://www.ddj.com/documents/s=881/ddj 0009f/0009f.htm. Google Scholar
  16. Yamaguchi, M. (2008). Angry online divorcee "kills" virtual ex-hubby. Associated Press, October 23, 2008. Google Scholar
  17. Zetter, K. (2010). TJX hacker gets 20 years in prison. Wired Magazine, March 25, 2010. Available from http://www.wired.com/threatlevel/2010/03/tjx-sentencing/. Google Scholar
  18. Carrier, B., Spafford, E. H. (2003). Getting physical with the digital investigation process. International Journal of Digital Evidence, 2(2). Available from http://www.ijde.org/docs/03_fall_carrier_ Spa.pdf. Google Scholar
  19. Carter, D. L. (1995). Computer crime categories, how techno-criminals operate. FBI Law Enforcement Bulletin, July. Google Scholar
  20. Hollinger, R. C. (1997). Crime, deviance and the computer. Brookfield, VT: Dartmouth Publishing Company. Google Scholar
  21. Hoover, T. W. (2002). An introduction to the DoJ's manual on searching and seizing computers (Vol. 11, No. 1). Federal public defender report. March, 2002. Google Scholar
  22. Parker, D. (1976). Crime by computer. New York, NY: Charles Scribner's Sons. Google Scholar
  23. Parker, D. (1983). Fighting computer crime. New York, NY: Charles Scribner's Sons. Google Scholar
  24. Parker, D. (1998). Fighting computer crime: A new framework for protecting information. New York, NY: John Wiley & Sons. Google Scholar
  25. U. S. Department of Justice. (1994). Federal guidelines for searching and seizing computers. Google Scholar
  26. U. S. Department of Justice. (1998). Supplement to federal guidelines for searching and seizing computers. Google Scholar
  27. U. S. Department of Justice. (2002). Searching and seizing computers and obtaining electronic evidence in criminal investigations. Google Scholar
  28. U. S. Department of Justice. (2009). Searching and seizing computers and obtaining electronic evidence in criminal investigations. Available from http://www.justice.gov/criminal/cybercrime/ssmanual/ssmanual2009.pdf. Google Scholar
  29. Carrier, B. (2002). Open Source Digital Forensics Tools: The Legal Argument. Available from http://www.atstake.com/research/reports/acrobat/atstake_opensource_forensics.pdf. Google Scholar
  30. Casey, E. (2002). Error, uncertainty and loss in digital evidence. International Journal of Digital Evidence, 1(2). Available from http://www.ijde.org/archives/docs/02_summer_art1.pdf. Google Scholar
  31. Castell, S. (1990). Evidence and authorisation: Is EDI (electronic data interchange) legally reliable? Computer Law and security report 2, 6(5). Google Scholar
  32. Gross, H. (1924). Criminal Investigation. London: Sweet & Maxwell. Google Scholar
  33. Guidance Software (2001-2002). EnCase legal journal (2nd ed.). Available from http://www .guidancesoftware.com/support/downloads/LegalJournal.pdf. Google Scholar
  34. Hoey, A. (1996). Analysis of the police and criminal evidence act, s.69--computer generated evidence. Web Journal of Current Legal Issues, in association with Blackstone Press Ltd. Google Scholar
  35. Irish Law Reform Commission. (2009). Documentary and electronic evidence (LRC CP 57-2009). Google Scholar
  36. Law Commission. (1997). Evidence in criminal proceedings: hearsay and related topics. Law Commission Report 245. Available from http://www.lawcom.gov.uk/231.htm#lcr245. Google Scholar
  37. Mattel, M., Blawie, J. F., & Russell, A. (2000). Connecticut law enforcement guidelines for computer systems and data search and seizure. State of Connecticut Department of Public Safety and Division of Criminal Justice. Google Scholar
  38. National Center for Forensic Science. (2003). Digital evidence in the courtroom: a guide for preparing digital evidence for courtroom presentation. Washington, DC: Mater Draft Document, U. S. Department of Justice, National Institute of Justice. Available from http://www.ncfs.org/DE_courtroomdraft. pdf. Google Scholar
  39. Specter, M. (2002). Do fingerprints lie?: The gold standard of forensic evidence is now being challenged. The New Yorker, May 27, 2002. Available from http://www.newyorker.com/printable/?fact/020527fa_FACT. Google Scholar
  40. Strong, J. W. (1992). McCormick on Evidence. 4th edition, West Group. Google Scholar
  41. Thornton, J. I. (1997). The general assumptions and rationale of forensic identification. In D. L. Faigman, D. H. Kaye, M. J. Saks, & J. Sanders (Eds.), Modern scientific evidence: the law and science of expert testimony (Vol. 2). St. Paul, MN: West Publishing Company. Google Scholar
  42. UK Law Commission. (2009). The admissibility of expert evidence in criminal proceedings in England and Wales: a new approach to the determination of evidentiary reliability. Consultation Paper No. 190. Google Scholar
  43. United States Department of Justice. (2002). Searching and seizing computers and obtaining electronic evidence in criminal investigations. Available from http://www.usdoj.gov/criminal/cybercrime/s&smanual2002.htm. Google Scholar
  44. Archbold (2009). Criminal pleading, evidence and practice. London: Sweet & Maxwell Thomson Reuters. Google Scholar
  45. Blackstone's (2009). Criminal practice. Oxford: Oxford University Press. Google Scholar
  46. Brenner, S. W. (2006). The next step: Prioritizing jurisdiction. In B.-J. Koops & S. W. Brenner (Eds.), Cybercrime and jurisdiction. A global survey (pp. 327-349). The Hague: TMC Asser. Google Scholar
  47. Brenner, S., & Koops, B. J. (2004). Approaches to cybercrime jurisdiction. Journal of High-Technology Law, 4(1), 1-46. Google Scholar
  48. Cuijpers, C. M. K. C. (2007). Employer and employee power dynamics. The division of power between employer and employee in case of Internet and e-mail monitoring and positioning of employees. The John Marshall Journal of Computer & Information Law, 25, 37. Google Scholar
  49. De Hert, P., González Fuster, G., & Koops, B. J. (2006). Fighting cybercrime in the two Europes. The added value of the EU framework decision and the council of Europe convention. International Review of Penal Law, 77, 503-524. Google Scholar
  50. Gillespie, A. (2003). Sentences for offenses involving child pornography. Criminal Law Review, 81, February 2003. Google Scholar
  51. Gillespie, A. (2005). Tackling child grooming on the Internet: The UK approach. Bar Review, 1, 4. Google Scholar
  52. Gringas, C. (2002). The laws of the Internet. London: Butterworths. Google Scholar
  53. Hoekman, J., & Dirkzwager, C. (2009). Virtuele diefstal: Hoe gegevens toch weer goederen werden. Computerrecht, 26, 158. Google Scholar
  54. Kelleher, D., & Murray, K. (2007). Information technology law in Ireland. London: Tottel Publishing. Google Scholar
  55. Koops, B. J. (Ed.). (2007). Strafrecht en ICT (2nd ed.). The Hague: Sdu uitgevers. Google Scholar
  56. Koops, B. J. (2010). Cybercrime legislation in the Netherlands. Country report for the 18th International Congress on Comparative Law. Available from http://ssrn.com/abstract=1633958. Google Scholar
  57. McIntyre, T. J. (2005). Computer crime in Ireland: A critical assessment of the substantive law. Irish Criminal Law Journal, 15, 1. Google Scholar
  58. NCCRI. (2001). Prohibition of Incitement to Hatred Act 1989: A review, submission by the National Consultative Committee on Racism and Interculturalism. August. Google Scholar
  59. O'Malley, T. (2006). Sentencing law and practice (2nd ed.). Dublin: Thomson Round Hall. Google Scholar
  60. Ormerod, D. (2008). Smith and Hogan criminal law (12th ed.). Oxford: Oxford University. Google Scholar
  61. Parker, D. B. (1973). Computer Abuse. Palo Alto: SRI International. Google Scholar
  62. Beebe, N. L., & Clark, J. G. (2005). A hierarchical, objectives-based framework for the digital investigations process. Digital Investigation, 2(2), 146-166. Google ScholarDigital Library
  63. Carrier, B. (2003). Defining digital forensic examination and analysis tools using abstraction layers. International Journal of Digital Evidence, 1(4). Google Scholar
  64. Carrier, B. D. (2006). A hypothesis-based approach to digital forensic investigations. Ph. D. Dissertation, Purdue University. Google Scholar
  65. Carrier, B. D., & Spafford, E. H. (2003). Getting physical with the digital investigation process. International Journal of Digital Evidence, 2(2). Google Scholar
  66. Casey, E. (1997). Digital evidence and computer crime (1st ed.). London: Academic Press. Google Scholar
  67. Casey, E. (2002). Error, uncertainty and loss in digital evidence. International Journal of Digital Evidence, 1(2). Google Scholar
  68. Casey, E. (2007). Digital evidence maps--A sign of the times. Journal of Digital Investigation, 4(2). Google ScholarDigital Library
  69. Casey, E., Ferraro, M., & Nguyen, L. (2009). Investigation delayed is justice denied: Proposals for expediting forensic examinations of digital evidence. Journal of Forensic Science, 54(6). November 2009. Google ScholarCross Ref
  70. Cohen, F. (2009). Digital forensic evidence examination. Fred Cohen & Associates. Google Scholar
  71. Ieong, R. S. C. (2006). FORZA--Digital forensics investigation framework that incorporate legal issues. Proceedings of DFRWS2008. Available from http://www.dfrws.org/2006/proceedings/4- Ieong.pdf. Google ScholarDigital Library
  72. Madia, K., Prosise, C., & Pepe, M. (2003). Incident response & computer forensics. USA: McGraw. Google Scholar
  73. McKemmish, R. (1999). What is forensic computing? Trends and issues in crime and criminal justice (Vol. 118). Canberra: Australian Institute of Criminology. Google Scholar
  74. Ó Ciardhuáin, S. (2004). An extended model of cybercrime investigations. International Journal of Digital Evidence, 3(1). Google Scholar
  75. Reith, M., Carr, C., & Gunsch, G. (2002). An examination of digital forensic models. International Journal of Digital Evidence, 1(3). Google Scholar
  76. Ferraro, M. M., & Casey, E. (2004). Investigating child exploitation and pornography: The Internet, law and forensic science, Academic Press. Google Scholar
  77. Lee, H., Palmbach, T., & Miller, M. (2001). Henry Lee's crime scene handbook. London: Academic Press. Google Scholar
  78. Mattei, M., Blawie, J. F., and Russell, A. (2000). Connecticut Law Enforcement Guidelines for Computer Systems and Data Search and Seizure, State of Connecticut Department of Public Safety and Division of Criminal Justice. Google Scholar
  79. McLean, J. J. (2001). Homicide case study. In E. Casey (Ed.), Handbook of computer crime investigation: forensic tools and technology. London: Academic Press. Google Scholar
  80. Flusche, K. J. (2001). Computer forensic case study: Espionage, part 1. Information Systems Security, March-April 2001, Auerbach. Google Scholar
  81. Geberth, V. (1996). Practical homicide investigation (3rd ed). New York, NY: CRC Press. Google Scholar
  82. Horvath, F., & Meesig, R. (1996). The criminal investigation process and the role of forensic evidence: A review of empirical findings. Journal of Forensic Sciences. 41(6), 963-969. Google ScholarCross Ref
  83. Holmes, R. (1996). Profiling violent crimes: An investigative tool (2nd ed). Sage Publications. Google Scholar
  84. Petherick, W., & Turvey, B. (2008). Forensic victimology. San Diego: Academic Press. Google Scholar
  85. Scott, D., & Conner, M. (1997). In D. Haglund & H. Sorg (Eds.). Forensic taphonomy: The postmortem fate of human remains (Chapter 2). Boca Raton, FL: CRC Press. Google Scholar
  86. Turvey, B. (2008). Criminal profiling: An introduction to behavioral evidence analysis (3rd ed). London: Academic Press. Google Scholar
  87. Associated Press. (1997a). Wife's Internet friendship may have led to her death. January 23. Google Scholar
  88. Associated Press. (1997b). High-tech "stalking" of Canadian family linked to teen-aged son. April 20. Google Scholar
  89. Bryan, B. (2002). Letter writer is serial killer, concludes criminal profiler. St. Louis Post Dispatch, May 28. Google Scholar
  90. Burgess, A., Burgess, A., Douglas, J., & Ressler, R. (1997). Crime classification manual. San Francisco, CA: Jossey-Bass, Inc. Google Scholar
  91. Burgess, A., Hazelwood, R. (Eds.), (1995). Practical aspects of rape investigation: A multidisciplinary approach. (2nd ed.). New York, NY: CRC Press. Google Scholar
  92. Clubb, S. (2002). Police explain suspect's suicide. The Illinois River Bend Telegraph, June 12. Available from http://www.zwire.com/site/news.cfm?newsid=4412382&BRD=1719&PAG=46 1&dept_id=25271&rfi=8. Google Scholar
  93. Durfee, D. (1996). Man pleads no contest in stalking case. The Detroit News, January 25. Google Scholar
  94. Groth, A. N. (1979). Men who rape: The psychology of the offender. New York, NY: Plenum. Google Scholar
  95. Hazelwood, R., Reboussin, R., Warren, J. I., & Wright, J. A. (1991). Prediction of rapist type and violence from verbal, physical, and sexual scales. Journal of Interpersonal Violence, 6(1), 55-67. Google ScholarCross Ref
  96. Jarvis, C. (1998). Teen again linked to e-mail affair. The News Observer, North Carolina, November 28. Google Scholar
  97. McPherson, T. (2003). Sherlock Holmes' modern followers. The Advertiser, May 31. Google Scholar
  98. Meloy, J. R. (Ed.), (1998). The psychology of stalking: Clinical and forensic perspectives. San Diego, CA: Academic Press. Google Scholar
  99. Piper, E. (1998). Russian cybercrime flourishes: Deteriorating economic conditions have brought pirating and cracking mainstream. Reuters, December 30. Google Scholar
  100. Reuters Information Service. (1997). Swiss couple charged in U. S. child pornography sting. August 22. Google Scholar
  101. Robinson, B. (2002). Taking a byte out of cybercrime. ABC News, July 15. Google Scholar
  102. Shamburg, R. (1999). A tortured case. Net Life, April 7. Google Scholar
  103. Turvey, B. (2008). Criminal profiling: An introduction to behavioral evidence analysis (3rd ed.). San Diego: Academic Press. Google Scholar
  104. Wired News. (1998). Cops "lured" into net sex. February 16. Google Scholar
  105. Grace, T. (2009). George Ford Jr. gets 25 years to life in prison. The Daily Star, June 12, 2009. Available online at http://thedailystar.com/local/x112916207/George-Ford-Jr-gets-25-years-tolife-in-prison. Google Scholar
  106. Walker, P. (2010). Phone video of attack shown in trial of brothers for assault in Edlington. Gaurdian .co.uk. Available from http://www.guardian.co.uk/society/2010/jan/20/doncaster-attackbrothers-trial-doncaster. January 20, 2010. Google Scholar
  107. Zapotosky, M. (2010). Officials: "Serial killer" indicted. Washington Post, July 27, 2010. Google Scholar
  108. Juarez, V. (2009, November 19). Facebook status update provides alibi. CNN. Google Scholar
  109. Purpura, P. (2009, January 23). Vince Marinello sentenced to life in prison. The Times-Picayune. Google Scholar
  110. Amar, V. D. (2003, May 16). Regarding child pornography extends the Supreme Court's Federalism Cases. Findlaw's Write. Available from http://writ.corporate.findlaw.com/amar/20030516 .html. Google Scholar
  111. Ananova. (2001, August). Chatroom man wanted someone to rape and torture his wife. Available from http://www.ananova.com/news/story/sm_379058.html. Google Scholar
  112. Associated Press. (1998, February 10). FBI: Man posted sex pictures with daughter on Internet. Google Scholar
  113. Associated Press. (1999, September 2). Child participates in sex sting. Google Scholar
  114. Associated Press. (2001, November 21). Teen placed in jail cell with sex offender. Google Scholar
  115. Associated Press. (2002, December 6). Man convicted in Internet kidnap, rape of teen. Google Scholar
  116. Associated Press. (2003, March 18). Federal judge rules hacker covered by informant laws. Available from http://www.usatoday.com/tech/news/techpolicy/2003-03-18-hacker-informant_x.htm. Google Scholar
  117. Associated Press. (2010, February 6). Wyoming cops: Man set up ex-girlfriend for "rape fantasy." Available from http://cbs11tv.com/national/rape.fantasy.attack.2.1475992.html. Google Scholar
  118. Associated Press. (2010, May 27). Feds bust child porn "social networking" site. Available from http://www.foxnews.com/us/2010/05/27/feds-bust-child-porn-social-networking-site/. Google Scholar
  119. AZCentral.com. (2009, June 2). Woman raped live on the Internet; suspect in custody. Available from http://www.azcentral.com/news/articles/2009/06/02/20090602abrk-webassault0602 .html. Google Scholar
  120. Backus, L. (2010, April 21). Police pose as minor, arrest man for online sex show. New Britain Herald. Available from http://www.newbritainherald.com/articles/2010/04/21/news/doc4bcfaf95f2d5c559933707.txt. Google Scholar
  121. BBC News. (2009, June 10). Woman charged with sexual assault. Available from: http://news.bbc .co.uk/2/hi/uk_news/england/devon/8093490.stm. Google Scholar
  122. Beckford, M., & Stokes, P. (2010, March 10). Human rights laws stopped Home Office tracking sex offenders' emails. Telegraph. Available from http://www.telegraph.co.uk/news/uknews/law-andorder/7406462/Human-rights-laws-stopped-Home-Office-tracking-sex-offenders-emails.html. Google Scholar
  123. Burney, M. (1997, August 22). Cyber affair with teen-age girl leads to five years in prison. The Associated Press. Available from http://www.nando.net/newsroom/ntn/info/082297/info10_3348_noframes.html. Google Scholar
  124. Casey, E. (1999). Cyberpatterns: Criminal behavior on the Internet. In T. Brent (Ed.), Criminal profiling. (1st ed.). San Diego: Academic Press. Google Scholar
  125. Chen, D. W. (2000, October 5). Teacher is accused of duping boy to make a sexual video. New York Times, Late Edition--Final, Section B, Page 5, Column 5. Google Scholar
  126. Click Orlando. (2010, February 17). Cops: Woman met teen on video game, had sex. Available from http://www.clickorlando.com/news/22596993/detail.html. Google Scholar
  127. Coker, R. (2010, April 27). Vaughn Robert Biby, 9-time sex offender alleged to have kiddie porn, torture and murder pics--and Chuck E. Cheese Tokens. OC Weekly. Available from http://blogs.ocweekly.com/navel-gazing/crime-sex/vaughn-robert-biby-child-porn/. Google Scholar
  128. Diskant, T. (2002, February 22). After sentencing, Lasaga, Yale face civil suit. Yale Herald. Available from http://www.yaleherald.com/article.php?Article=359. Google Scholar
  129. Durkin, K. F., & Bryant, C. D. (1995). Log on to sex: Some notes on the carnal computer and erotic cyberspace as an emerging research frontier. Deviant Behavior: An Interdisciplinary Journal, 16, 179-200. Google ScholarCross Ref
  130. Egan, N. E. (2007, April 16). Five years ago Alicia Kozakiewicz was taken away and tortured by a man she met on the Internet: Now she tries to save other teens. People Magazine, 67(15). Available from http://www.people.com/people/archive/article/0,,20061919,00.html. Google Scholar
  131. Frith, M. (2003, October 10). Internet Paedophile "groomed" 70 girls in just 5 months. The Independent. Available from http://www.independent.co.uk/news/uk/crime/internet-paedophilegroomed- 70-girls-in-just-five-months-758201.html. Google Scholar
  132. Fujimoto, L. (2008, August 8). Man meant to meet teen but gets prison. The Maui News. Available from http://www.mauinews.com/page/content.detail/id/506936.html?nav=10. Google Scholar
  133. Fuoco, M. (2002, January 5). Missing teen found safe but tied up in Virginia townhouse. Post-Gazette .com. Available from http://www.post-gazette.com/regionstate/20020105missingp1.asp. Google Scholar
  134. Guardian Unlimited. (2001, August 2). Man convicted of internet-conspired rape. Available from http://www.guardian.co.uk/japan/story/0,7369,531343,00.html. Google Scholar
  135. Gutman, M. (2010, February 4). Super Bowl Furor: Pete Townshend Defends Halftime Act Amid Child Porn Accusations. ABC News. Available from http://abcnews.go.com/Entertainment/pete-townshend-defends-super-bowl-act-amid-child/story?id=9751000. Google Scholar
  136. Henry, J. (1985). Testimony before the Permanent Subcommittee on Governmental Affairs before the United States Senate, Ninety-Ninth Congress. Available from http://www.nostatusquo .com/ACLU/NudistHallof-Shame/Henry.html. Google Scholar
  137. Hernandez, A. E. (2000, November 17). Self-reported contact sexual crimes of federal inmates convicted of child pornography offenses. In: Presented at the 19th Annual Conference Research and Treatment Conference of the Association for the Treatment of Sexual Abusers, San Diego, CA. Google Scholar
  138. Hines, N. (2010, March 8). Serial sex offender Peter Chapman killed teenager groomed on Facebook. Times Online. Available from http://www.timesonline.co.uk/tol/news/uk/crime/article7054001.ece. Google Scholar
  139. Hughes, M. (2010, May 29). Postman admits Internet grooming. The Independent. Available from http://www.independent.co.uk/news/uk/crime/postman-admits-internet-grooming-1986199 .html. Google Scholar
  140. Kalson, S. (2002, January 9). Alicia's websites pose a very disturbing question. Post-Gazette.com. Available from http://www.postgazette.com/columnists/20020109sally0109p3.asp. Google Scholar
  141. Lanning, K. V (2001). Child molesters and cyber Pedophiles--A behavioral perspective. In Hazelwood R. R. & Burgess, A. W. (Eds.), Practical aspects of rape investigation: A multidisciplinary approach (3rd ed., pp. 199-232). Boca Raton, FL: CRC Press. Google Scholar
  142. LexisNexis. (2010a). Killer rapist lured victim on Facebook. AllBusiness.com. Available from http://www.allbusiness.com/crime-law-enforcement-corrections/criminal-offenses-sex/140798900-1 .html. Google Scholar
  143. LexisNexis. (2010b). Serial sex offender raped and killed girl he lured on Facebook. AllBusiness .com. Available from http://www.allbusiness.com/crime-law-enforcement-corrections/criminaloffensessex/14080634-1.html. Google Scholar
  144. Lynch, T. (2009, July 22). Over-criminalization of conduct/over-criminalization of Federal Law. Testimony before the Subcommittee on Crime, Terrorism, and Homeland Security, Judiciary Committee, United States House of Representatives. Available from http://www.cato.org/testimony/ct-tl-20090722.html. Google Scholar
  145. Mail Online. (2007, February 5). Men jailed in Internet schoolgirl rape plot. Available from http://www.dailymail.co.uk/news/article-433968/Men-jailed-internet-schoolgirl-rape-plot .html. Google Scholar
  146. McAullife, W. (2000, October 24). Net paedophile gets five years. ZDNet. Available from http://news.zdnet.co.uk/story/0,,s2082159,00.html. Google Scholar
  147. McCabe, G. (2010, February 12). Prolific Paedophile convicted of abusing 19 victims after grooming victims online. News. Scotsman.com. Available from http://news.scotsman.com/paedophilia/Prolific-paedophile-is-convicted-of.6066597.jp. Google Scholar
  148. McClintock, D. (2001, June). Fatal bondage. Vanity Fair. Google Scholar
  149. McGrath, M. G., & Casey, E. (2002). Forensic psychiatry and the Internet: Practical perspectives on sexual predators and obsessional harassers in cyberspace. Journal of American Academy of Psychiatry and Law, 30, 81-94. Google Scholar
  150. Miller, J. R. (2009, June 15). Maine mom nabbed in child porn sting. Fox News. Available from http://www.foxnews.com/story/0,2933,526462,00.html. Google Scholar
  151. New York Lawyer. (2003, April 16). NY law professor pleads guilty to possessing child porn. Available from http://www.nylawyer.com/news/03/04/041603d.html. Google Scholar
  152. O'Hanlon, S. (2003, January 11). Porn curiosity brings scrutiny against "Who's" Townsend. http://reuters.com/newsArticle.jhtml? Type = internetNews&storyID = 2028595. Google Scholar
  153. Osher, C. (2002, January 31). Classmates recall Tyree as "a loner." Tribune-Review. Available from http://www.pittsburghlive.com/x/pittsburghtrib/s_15038.html. Google Scholar
  154. Pendlebury, F. (2001, July 17). Jail for net rapist. Dorsett Echo. Available from http://www.thisisdorset .net/dorset/archive/2001/07/17/BOURN_NEWS_NEWS10ZM.html. Google Scholar
  155. Psychiatric News. (2000, May 5). Protect children from predators on Internet, parents tell Congress. Available from http://www.psych.org/pnews/00-05-05/protect.html. Google Scholar
  156. Pulkkinen, L. (2008, February 27). Rape Victim, 16, Identifies Suspects via MySpace. Seattle, PI. Available from http://www.seattlepi.com/local/352965_bellevue28.html. Google Scholar
  157. Reagan, B. (2006). Computer forensics: The new fingerprinting. Available from http://www .popularmechanics.com/technology/how-to/computer-security/2672751. Google Scholar
  158. Reuters. (2001, March 26). Russia lacks laws to fight child porn explosion. Google Scholar
  159. Rizzo, T. (2001, March 2). Judge rules Robinson must stand trial in 3 deaths. Kansas City Star. Available from http://www.kcstar.com/standing/robinson/case.html. Google Scholar
  160. Roddy, D. B., & Schmitz, J. (2002, January 5). Suspect Scott Tyree: A classic long-haired computer guy. Post-Gazette.com. Available from http://www.post-gazette.com/regionstate/20020105tyreep2.asp. Google Scholar
  161. Shannon, E. (1998, September 14). Main street monsters. Time Magazine, 152(11). Google Scholar
  162. Soh-jung, Y. (2001, July 7). Rising number of sexual assault cases linked to Internet. The Korea Herald. Available from http://www.vachss.com/help_text/archive/sa_korea.html. Google Scholar
  163. States News Service. (1998, December 2). Woman jailed for sex with boy. Available from http://www.fathermag.com/news/rape/portland02.shtml. Google Scholar
  164. States News Service. (1999, January, 13). Cyber-sex seducer gets jail time. Available from http://www.father-mag.com/news/rape/morganton.shtml. Google Scholar
  165. Stokes, P. (2010, March 8). Peter Chapman targeted thousands of young girls. Telegraph. Available from http://www.telegraph.co.uk/news/uknews/crime/7397894/Peter-Chapman-targeted-thousandsof-young-girls.html. Google Scholar
  166. Taylor, M., Quayle, E., & Holland, G. (2001). Child pornography, the Internet and offending. ISUMA, 2(2). Available from http://www.isuma.net/v02n02/taylor/taylor_e.shtml. Google Scholar
  167. Telegraph Media Group, LTD. (2010, March 8). Sex offender admits kidnap and murder of teen he ensnared on Facebook. Google Scholar
  168. The Age. (2002, December 26). Japanese police to regulate Internet dating services. Available from http://www.theage.com.au/articles/2002/12/26/1040511126218.html. Google Scholar
  169. Thomson, S. (2002, November 26). Charges dropped against two men in sex-slave case. The Columbian. Google Scholar
  170. Times Online. (2010, March 8). Serial sex offender peter Chapman killed teenager groomed on Facebook. Available from http://www.timesonline.co.uk/tol/news/uk/crime/article7054001.ece. Google Scholar
  171. United States Code. (2010). Title 18, Section 3509m. Google Scholar
  172. United States Department of Justice. (2000, March 17). Former high-tech executive pleads guilty to charge of traveling to have sex with minor he met on Internet. Available from http://www .usdoj.gov/usao/cac/pr/pr2000/050.htm. Google Scholar
  173. United States Department of Justice. (2002a). Abingdon man sentenced to 41 months for child pornography. Available from http://www.usdoj.gov/usao/md/press_releases/press02/wyattrelease.htm. Google Scholar
  174. United States Department of Justice. (2002b). Parkville man receives 10 year prison sentence for exploiting child to produce child pornography. Available from http://www.usdoj.gov/usao/md/press_releases/press02/adam_thomas_valleau_sentenced.htm. Google Scholar
  175. United States Department of Justice. (2002c). Man sentenced to 27 months in prison for possessing child pornography. Available from http://www.usdoj.gov/usao/txs/releases/April%20 2002/020417-magargee.htm. Google Scholar
  176. United States Department of Justice. (2003). Fact Sheet, PROTECT Act. Available from http://www .usdoj.gov/opa/pr/2003/April/03_ag_266.htm. Google Scholar
  177. United States Department of Justice. (2009). Man who posed as a teen-aged girl online pleads guilty to transportation of child pornography. Available from http://baltimore.fbi.gov/dojpressrel/pressrel09/ba102009.htm. Google Scholar
  178. United States Immigration and Customs Enforcement. (2010, January 29). ICE arrest Puerto Rican predator for sexually enticing minors and production of child porn. Available from http://www.ice.gov/pi/nr/1001/100129sanjuan.htm. Google Scholar
  179. Wiley, J. K. (2007, October 19). Father accused of videotaping sex attack on daughter is arraigned. KATU.com. Available from http://www.katu.com/news/local/10676781.html. Google Scholar
  180. Wood, H. (2009, April 5). Husband "used Internet to recruit man to rape his wife." Mirror.co.uk News. Available from http://www.mirror.co.uk/news/top-stories/2009/06/04/husband-usedinternet-to-recruit-man-to-rape-his-wife-115875-21414917/. Google Scholar
  181. Halderman, J. A., Schoen, S. D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J. A., Feldman, A. J., Appelbaum, J., Felten, W. W. (2008). Lest we remember: Cold boot attacks on encryption keys, Proc. 2008 USENIX Security Symposium.Google Scholar
  182. PCWorld, 2010 http://www.pcworld.com/article/191019/fdic_hackers_took_more_than_120m_ in_three_ months.html. Google Scholar
  183. Foote, D. (February 8, 1999). You could get raped. Newsweek. Google Scholar
  184. Associated Press. (1997, April 1). As online harassment grows, calls for new laws follow. Google Scholar
  185. Harmon, R., Rosner, R., & Owens, H. (1998). Sex and violence in a forensic population of obsessional harassers' psychology, public policy, and law. American Psychological Association, 4(1/2), 236-249. Google Scholar
  186. Meloy, J. R. (1998). The psychology of stalking. In J. R. Meloy (Ed.), The psychology of stalking: Clinical and forensic perspectives (1-23). New York: Academic Press. Google Scholar
  187. Meloy, J. R. (1999). Stalking: An old behavior, a new crime. Psychiatric Clinics of North America. National Center for Victims of Crime, Safety. Available from http://www.ncvc.org/infolink/svsafety.htm. Google Scholar
  188. Pathe, M., & Mullen, P. E. (1997). The impact of stalkers on their victims. British Journal of Psychiatry, 170, 12-17 Google ScholarCross Ref
  189. Casey, E. (2001). Practical approaches to recovering encrypted evidence. International Journal of Digital Forensics. Google Scholar
  190. Casey, E., & Stellatos, G. J. (2008). The impact of full disk encryption on digital forensics. Operating Systems Review, 42(3), 93-98. Google ScholarDigital Library
  191. Gupta, M. R., Hoeschele, M. D., & Rogers, M. K. (2006). Hidden disk areas: HPA and DCO. International Journal of Digital Evidence, 5(1). Google Scholar
  192. Hollinger, R. C. (1997). Crime, deviance and the computer. Brookfield, VT: Dartmouth Publishing Company. Google Scholar
  193. Sammes, T., & Jenkinson, B. (2000). Forensic computing: A practitioner's guide. London: Springer. Google Scholar
  194. Singh, S. (2000). The code book: The science of secrecy from ancient Egypt to quantum cryptography. New York: Anchor Books. Google Scholar
  195. Baker, R. (2000). Harold Shipman's medical practice 1974-1998. Department of Health Audit Report. Available from http://www.doh.gov.uk/hshipmanpractice/shipman.pdf. Google Scholar
  196. Bates, J. (1999). Judicial review relating to search warrants--Discussion paper. International Journal of Forensic Computing. Available from http://www.forensiccomputing.com/archives/judicial .html. Google Scholar
  197. Byers, D., & Shahmehri, N. (2008). Contagious errors: Understanding and avoiding issues with imaging drives containing faulty sectors. Digital Investigation, 5(1-2), 29-33. Google ScholarDigital Library
  198. Flusche, K. J. (2001). Computer forensic case study: Espionage, part 1 just finding the file is not enough! Information Systems Security, March/April 2001, Auerbach. Google Scholar
  199. Meighan, C. W. (1966). Archaeology: An introduction. San Francisco: Chandler Publishing Company, p. 18. Google Scholar
  200. Thornton, J. I. (1997). The general assumptions and rationale of forensic identification. In D. Faigman, Google Scholar
  201. D. Kaye, M. Saks, J. Sanders (Eds.), Modern scientific evidence: The law and science of expert testimony (Vol. 2). St. Paul, MN: West Publishing Company. Google Scholar
  202. United States Department of Justice. (2001). Electronic crime scene investigation: A guide for first responders. National Institute of Justice, NCJ 187736. Available from http://www.ncjrs.org/pdffiles1/nij/187736.pdf. Google Scholar
  203. Casey, E. (2009). Deeply embedded metadata. Blog entry. Available from http://blog.cmdlabs .com/2009/05/27/deeply-embedded-metadata/. Accessed 05/27/2009. Google Scholar
  204. Casey, E. (2010). The pitfalls of file initialization for forensic analysts. Available from http://blog.cmdlabs .com/2010/03/17/the-pitfalls-of-file-initialization-for-forensic-analysts/. Accessed 03/17/2010. Google Scholar
  205. Microsoft. (1999). Back up the recovery agent encrypting file system private key in Windows 2000. Microsoft KB Q241201. Available from http://support.microsoft.com/default .aspx?scid=kb;[LN];Q241201. Google Scholar
  206. Microsoft. (2001a). Detailed explanation of FAT boot sector. MS KB140418. Available from http://support.microsoft.com/default.aspx?scid=KB;en-us;q140418. Google Scholar
  207. Microsoft. (2001b). General information about Microsoft Office XP encryption. Microsoft KB Article Q290112. Available from http://support.microsoft.com/default.aspx?scid=kb;en-us; Q290112. Google Scholar
  208. Microsoft. (2001c). Maximum partition size using FAT16 file system. Available from http://support.microsoft.com/default.aspx?scid=kb;EN-US;118335. Google Scholar
  209. Microsoft. (2002a). Description of the FAT32 file system. Available from http://support.microsoft .com/default.aspx?scid=kb;EN-US;154997. Google Scholar
  210. Microsoft. (2002b). Limitations of FAT32 file system. Available from http://support.microsoft .com/default.aspx?scid=KB;en-us;q184006. Google Scholar
  211. Pereira, M. T. (2009, March). Forensic analysis of the Firefox 3 Internet history and recovery of deleted SQLite records. Digital Investigation, 5(3-4): 93-103. Google ScholarDigital Library
  212. Pittman, R., & Shaver, D. (2009). Windows forensic analysis. In E. Casey (Ed.), Handbook of digital forensics and investigation. London: Academic Press. Google Scholar
  213. Sammes, T., & Jenkinson, B. (2000). Forensic computing: a practitioner's guide. London: Springer. Google Scholar
  214. Usborne, D. (2002). Has an old computer revealed that Reid toured world searching out new targets for al-Qa'ida? UK Independent. Available from http://www.independent.co.uk/story .jsp?story=114885. Google Scholar
  215. Buckeye, B., & Liston, K. (2002, February). Recovering deleted files in Linux. Sysadmin Magazine. Available from http://www.samag.com/documents/s=7033/sam0204g/sam0204g.htm. Google Scholar
  216. Carrier, B. (2003a, March 15). Splitting the disk--Part 1. Sleuth Kit Informer, (2). Available from http://www.sleuthkit.org/informer/sleuthkit-informer-2.html. Google Scholar
  217. Carrier, B. (2003b). Splitting the disk--Part 2. Sleuth Kit Informer, (5). Available from http://www .sleuthkit.org/informer/sleuthkit-informer-5.html. Google Scholar
  218. Peek, J., O'Reilly, T., & Loukides, M. (1997). UNIX powertools. California: O'Reilly Google Scholar
  219. Seglem, K., Luque, M. E., & Murphy, S. E. (2001). Forensic analysis of UNIX systems. In E. Casey (Ed.), Handbook of computer crime investigation. London: Academic Press. Google Scholar
  220. Widdowson, L., & Ferlito, J. (2001, January). Tales from the Abyss: UNIX file recovery. SysAdmin Magazine. Available from http://www.samag.com/documents/s=1441/sam0111b/0111b.htm. Google Scholar
  221. Baran, P. (1964). Introduction to distributed communications networks, RM-3420-PR. Santa Barbara, CA: The Rand Corporation. Available from http://www.rand.org/publications/RM/RM3420/. Google Scholar
  222. Casey, E. (2004). Network traffic as a source of evidence. Journal of Digital Investigation. Google ScholarDigital Library
  223. Convery, S. (2002). Hacking layer 2: fun with Ethernet switches. BlackHat Briefing. Available from http://www.blackhat.com/presentations/bh-usa-02/bh-us-02-convery-switches.pdf. Google Scholar
  224. Gauis (2000). Things to do in Ciscoland when you're dead. Phrack 56. Available from http://www .phrack.com/show.php?p=56&a=10. Google Scholar
  225. Snipe, S. (2000). Why your switched network isn't secure. Available from http://www.sans.org/resources/idfaq/switched_network.php. Google Scholar
  226. Fyodor. (1998). Remote OS detection via TCP/IP stack fingerprinting. Available from http://www .insecure.org/nmap/nmap-fingerprinting-article.txt. Google Scholar
  227. Romig, S. (2001). Incident response tools. In E. Casey (Ed.), Handbook of computer crime investigation. London: Academic Press. Google Scholar
  228. Sommer, P. (1997, October). Downloads, logs and captures: Evidence from cyberspace. Journal of Financial Crime, 5JFC2, 138-152. Available from http://www1.bcs.org.uk/DocsRepository/03900/3968/logs.htm. Google ScholarCross Ref
  229. United States Department of Justice. (2002). Searching and seizing computers and obtaining electronic evidence in criminal investigations. Available from http://www.cybercrime.gov/searchmanual.htm. Google Scholar
  230. Cairns, G. (1996). Snuffsex, Australian Broadcasting Corporation's NewsRadio Network. Google Scholar
  231. CBS News (2002). Daniel Pearl killers appeal. July 17, 2002. Available online at http://www .cbsnews.com/stories/2002/05/31/attack/main510651.shtml. Google Scholar
  232. CERT (2002). Trojaned OpenSSH distribution. Available online at http://www.cert.org/advisories/CA-2002-24.html. Google Scholar
  233. Clark, F., & Diliberto, K. (1996). Investigating computer crime. FL, Boca Raton: CRC Press. Google Scholar
  234. DAWN Group. (2002). Defence disputes video's validity: Daniel Pearl case, 17 May 2002. Google Scholar
  235. Durkin, K. F., & Bryant, C. D. (1999). Propagandizing pederasty: A thematic analysis of the on-line exculpatory accounts of unrepentant pedophiles. Deviant Behavior: An Interdisciplinary Journal, 20, 103-127 Google ScholarCross Ref
  236. Mann, D., & Sutton, M. (1998). Netcrime: More change in the organization of thieving. British Journal of Criminology, 38(2), 201-229. Google ScholarCross Ref
  237. National News. (2002). Text of Daniel Pearl case verdict, July 17, 2002. Google Scholar
  238. Palisade Systems. (2003). Porn tops file sharing usage. Google Scholar
  239. United States Department of Justice. (1999). Man convicted of threatening federal judges by Internet e-mail. Available online at http://www.usdoj.gov/criminal/cybercrime/johnson.htm. Google Scholar
  240. United States Postal Service. (2001). Multimillion-dollar child pornography enterprise dismantled. Google Scholar
  241. Garfinkel, S. (2002). Network forensics: tapping the Internet. O'Reilly Network. Available from http://www.oreillynet.com/pub/a/network/2002/04/26/nettap.html. Google Scholar
  242. Graham, R. (2000). Sniffing (network wiretap, sniffer) FAQ. Available from http://www.robertgraham .com/pubs/sniffing-faq.html. Google Scholar
  243. Casey, E., Daywalt, C., Johnston, A., Maguire, T. (2009). Network investigations. Digital forensics and investigation. Boston: Elsevier. Google Scholar
  244. Comer, D. E. (1995). Internetworking with TCP/IP volume I: Principles, protocols, and architecture (3rd ed.). Upper Saddle River, NJ: Prentice Hall Google Scholar
  245. Henry, P., & De Libero, G. (1996). Strategic networking: From LAN and WAN to information superhighways. Massachusetts: International Thomson Publishing Company. Google Scholar
  246. Microsoft. (2000). Interpreting IAS-formatted log files. In Microsoft Windows 2000 server documentation. Available from http://www.microsoft.com/windows2000/en/server/help/sag_ias_log1a.htm. Google Scholar
  247. Morris, R. T. (1995). A weakness in the 4.2BSD UNIX TCP/IP software. Bell Labs Computer Science Technical Report 117 (February 25, 1985). Available from http://www.eecs.harvard.edu/~rtm/papers.html. Google Scholar
  248. Route, D. (1997). Juggernaut. In Phrack 50. Available from http://www.phrack.com/show.php? p=50&a=6. Google Scholar
  249. Shimomura, T., & Markoff, J. (1996). Takedown: The pursuit of Kevin Mitnick, America's most wanted computer outlaw--By the man who did it. New York: Hyperion. Google Scholar
  250. Shinkle, P. (2002). Serial killer caught by his own Internet footprint. St. Louis Post-Dispatch, June 17, 2002. Google Scholar
  251. Stevens, W. R. (1994). TCP/IP illustrated (Vol. 1). Boston: Addison Wesley. Google Scholar
  252. Tribune News Services. (2000). Black student charged with racist e-mail threats at college. April 21, 2000. Google Scholar
  253. Casey, E., Daywalt, C., Johnston, A., Maguire, T. (2009). Network investigations. Digital forensics and investigation. Boston: Elsevier. Google Scholar
  254. Comer, D. E. (1995). Internetworking with TCP/IP volume I: Principles, protocols, and architecture (3rd ed.). Upper Saddle River, NJ: Prentice Hall Google Scholar
  255. Henry, P., & De Libero, G. (1996). Strategic networking: From LAN and WAN to information superhighways. Massachusetts: International Thomson Publishing Company. Google Scholar
  256. Microsoft. (2000). Interpreting IAS-formatted log files. In Microsoft Windows 2000 server documentation. Available from http://www.microsoft.com/windows2000/en/server/help/sag_ias_log1a.htm. Google Scholar
  257. Morris, R. T. (1995). A weakness in the 4.2BSD UNIX TCP/IP software. Bell Labs Computer Science Technical Report 117 (February 25, 1985). Available from http://www.eecs.harvard.edu/~rtm/papers.html. Google Scholar
  258. Route, D. (1997). Juggernaut. In Phrack 50. Available from http://www.phrack.com/show.php? p=50&a=6. Google Scholar
  259. Shimomura, T., & Markoff, J. (1996). Takedown: The pursuit of Kevin Mitnick, America's most wanted computer outlaw--By the man who did it. New York: Hyperion. Google Scholar
  260. Shinkle, P. (2002). Serial killer caught by his own Internet footprint. St. Louis Post-Dispatch, June 17, 2002. Google Scholar
  261. Stevens, W. R. (1994). TCP/IP illustrated(Vol. 1). Boston: Addison Wesley. Google Scholar
  262. Tribune News Services. (2000). Black student charged with racist e-mail threats at college. April 21, 2000. Google Scholar

Cited By

Arce D, Woods D and Böhme R (2024). Economics of incident response panels in cyber insurance, Computers and Security , 140 :C , Online publication date: 1-May-2024 .

Ottmann J, Breitinger F and Freiling F (2023). An Experimental Assessment of Inconsistencies in Memory Forensics, ACM Transactions on Privacy and Security , 27 :1 , (1-29), Online publication date: 29-Feb-2024 .

Studiawan H, Grispos G and Choo K (2023). Unmanned Aerial Vehicle (UAV) Forensics, Computers and Security , 132 :C , Online publication date: 1-Sep-2023 .

Yamada H and Nemoto J (2022). Scalar DL, Proceedings of the VLDB Endowment , 15 :7 , (1324-1336), Online publication date: 1-Mar-2022 .

Akremi A An Adaptative and Compliant Forensics Admissibility Metrics Generation Methodology The 23rd International Conference on Information Integration and Web Intelligence, (495-503)

Amato F, Cozzolino G, Moscato V and Moscato F (2022). Analyse digital forensic evidences through a semantic-based methodology and NLP techniques, Future Generation Computer Systems , 98 :C , (297-307), Online publication date: 1-Sep-2019 .

Du X and Scanlon M Methodology for the Automated Metadata-Based Classification of Incriminating Digital Forensic Artefacts Proceedings of the 14th International Conference on Availability, Reliability and Security, (1-8)

Costantini S, Gasperis G and Olivieri R (2019). Digital forensics and investigations meet artificial intelligence, Annals of Mathematics and Artificial Intelligence , 86 :1-3 , (193-229), Online publication date: 1-Jul-2019 .

Barmpatsalou K, Cruz T, Monteiro E and Simoes P (2018). Current and Future Trends in Mobile Device Forensics, ACM Computing Surveys , 51 :3 , (1-31), Online publication date: 31-May-2019 .

Bahjat A and Jones J (2019). Deleted file fragment dating by analysis of allocated neighbors, Digital Investigation: The International Journal of Digital Forensics & Incident Response , 28 :S , (S60-S67), Online publication date: 1-Apr-2019 .

Horsman G (2019). Tool testing and reliability issues in the field of digital forensics, Digital Investigation: The International Journal of Digital Forensics & Incident Response , 28 :C , (163-175), Online publication date: 1-Mar-2019 .

(2019). A road map for digital forensics research, International Journal of Electronic Security and Digital Forensics , 11 :2 , (194-224), Online publication date: 1-Jan-2019 .

(2019). Evaluation of smartphone data using a reference architecture, International Journal of Electronic Security and Digital Forensics , 11 :2 , (160-182), Online publication date: 1-Jan-2019 .

Mohammed H, Clarke N and Li F Evidence Identification in Heterogeneous Data Using Clustering Proceedings of the 13th International Conference on Availability, Reliability and Security, (1-8)

Villena S, Vega M, Mateos J, Rosenberg D, Murtagh F, Molina R and Katsaggelos A (2018). Image super-resolution for outdoor digital forensics. Usability and legal aspects, Computers in Industry , 98 :C , (34-47), Online publication date: 1-Jun-2018 .

Galbraith C and Smyth P (2017). Analyzing user-event data using score-based likelihood ratios with marked point processes, Digital Investigation: The International Journal of Digital Forensics & Incident Response , 22 :S , (S106-S114), Online publication date: 1-Aug-2017 .

Grispos G, Glisson W and Choo K Medical cyber-physical systems development Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies, (108-114)

al-Khateeb H, Epiphaniou G, Alhaboby Z, Barnes J and Short E (2017). Cyberstalking, Telematics and Informatics , 34 :4 , (339-349), Online publication date: 1-Jul-2017 .

Liao R, Balasinorwala S and Raghav Rao H (2017). Computer assisted frauds, Information Systems Frontiers , 19 :3 , (443-455), Online publication date: 1-Jun-2017 .

Ma J, Xue B and Zhang M A Profile-Based Authorship Attribution Approach to Forensic Identification in Chinese Online Messages Proceedings of the 11th Pacific Asia Workshop on Intelligence and Security Informatics - Volume 9650, (33-52)

Gelernter N, Grinstein Y and Herzberg A Cross-Site Framing Attacks Proceedings of the 31st Annual Computer Security Applications Conference, (161-170)

Greengard S (2012). On the digital trail, Communications of the ACM , 55 :11 , (19-21), Online publication date: 1-Nov-2012 .

Pan Y, Mishra S, Yuan B, Stackpole B and Schwartz D Game-based forensics course for first year students Proceedings of the 13th annual conference on Information technology education, (13-18)

Save to Binder
University of Lausanne

Index Terms

Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet

Reviews

Reviewer: Cecilia G. Manrique

This hefty book on forensic evidence obtained from computers dispels the myths propagated by popular television series. It starts from the premise that very few people are well versed in the technical, evidential, and legal issues concerning digital evidence. Oftentimes, the useful evidence that may be found in various digital media is overlooked, collected incorrectly, or analyzed ineffectively. It is the goal of the team of contributors to equip readers with the necessary knowledge and skills to be able to make use of digital evidence correctly and effectively. This third edition covers the various topics of criminal profiling, victimology, and crime reconstruction, very specifically geared toward computer crime and the concomitant gathering of digital evidence for the investigation, whether the computer is used as a tool, an object, or a subject of a crime. Just as investigators have the technology to help them, the same technologies are available to criminals, which makes the development of published guidelines to secure a crime scene as well as having established steps for giving testimony quite important to the process. It is also interesting to note that the scientific method is applied to digital investigations. It is quite obvious that the various authors draw from several fields, such as forensic science, computer science, political science, criminal justice, the law, and behavioral analysis; as such, it is multi- and inter-disciplinary. More specifically, the authors tackle the specific crimes of cyber bullying, cyber stalking, identity theft, online sex offenders, fraudsters, and cyber threats. There is extensive use of boxed stories, legal cases, practitioner's tips, tables, the discussion of legislation, flow charts, treaties and journals, as well as figures, diagrams, pictures, and computer screen shots. The book is comparative in nature: it covers not only cyber law in the US, but also case law in the UK, Ireland, and the Netherlands. Given the ubiquity of the computer and the crimes that it can generate, learning about how other nations handle these issues helps in the formation of our own methods for dealing with crimes domestically, as well as those that cross national boundaries. Because the book was put together by a team of contributors, there are differences, redundancies, and inconsistencies that cannot be avoided. Most chapters have summaries, but there are some that do not. Most chapters have references and case listings, but they are not consistent in terms of number: some have many references, but a few chapters have either no references or less than five. It is quite helpful that the book has separate case, name, and subject indexes for easy referencing. Some authors go back to the very basics of explaining the history of the Internet or the very basics of what constitutes a network, which is good for beginning users but may be of little use for advanced users. That could be part of the reason why the book is so physically large and heavy, making it difficult to even hold it for an extended period of time. Putting the entire book online would alleviate that situation, taking a cue from one of the chapters that is totally online (chapter 20, "Digital Evidence on Mobile Devices"). An e-book version with greater coverage of how the science is being used in social networking and virtual worlds would be a welcome feature of the next edition. Online Computing Reviews Service

Computing Reviews logoComputing Reviews logo

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Recommendations

Computer Forensics and Cyber Crime: An Introduction (2nd Edition)

Computer Crime, Investigation, and the Law

Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet with Cdrom

Export Citations

Footer

Categories

About

Join

Connect

The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2024 ACM, Inc.

Your Search Results Download Request

We are preparing your search results for download .

We will inform you here when the file is ready.

Your Search Results Download Request

Your file of search results citations is now ready.

Your Search Results Download Request

Your search export query has expired. Please try again.