This book fully defines computer-related crime and the legal issues involved in its investigation. It provides a framework for the development of a computer crime unit. This book is the only comprehensive examination of computer-related crime and its investigation on the market. It includes an exhaustive discussion of legal and social issues, fully defines computer crime, and provides specific examples of criminal activities involving computers, while discussing the phenomenon in the context of the criminal justice system. Computer Forensics and Cyber Crime provides a comprehensive analysis of current case law, constitutional challenges, and government legislation. For computer crime investigators, police chiefs, sheriffs, district attorneys, public defenders, and defense attorneys.
Dr. Marjie T. Britz is a professor of criminal justice at Clemson University. She holds a bachelors of science in forensic science from Jacksonville State University, a masters of science in police administration, and a doctorate of philosophy in criminal justice from Michigan State University. She has published extensively in the areas of computer crime, organized crime, and the police subculture. She has acted as a consultant to a variety of organizations and provided training to an assortment of law enforcement agencies. In addition, she has served on editorial and supervisory boards in both academic and practitioner venues.
Cyberspace and Criminal Behavior. Clarification of Terms. Traditional Problems Associated with Computer Crime. Extent of the Problem. Conclusions.
2. Computer Terminology and History.
Computer Language. Network Language. A Brief History of Computers. Realms of the Cyberworld. A Brief History of the Internet. Categorizing Internet Communication. Future Issues and Conclusions.
3. History of Crime and Computer Crime.
Introduction. Traditional Problems. Recognizing and Defining Computer Crime. Three Incidents. Contemporary Crimes. Categorizing Computer Crime. Conclusions.
4. Computers As Targets.
Computers As Targets. Contaminants and Destruction of Data. Conclusions.
5. Avenues for Prosecution and Government Efforts.
Introduction. Traditional Statutes. Evolution of Computer-Specific Statutes. Evolving Child Pornography Statutes. Government Incentives. Law Enforcement Initiatives. International Efforts. Conclusions.
6. Applying the First Amendment to Computer-Related Crime.
Introduction and General Principles. Obscenity in General. Traditional Notions of Obscenity. Emerging Statutes and the Availability of Obscene Material to Children. Defining Child Pornography. Applying Case Law to Child Pornography Statutes. Technology-Specific Legislation. Conclusions.
7. The Fourth Amendment.
History of the Fourth Amendment. The Expectation of Privacy andElectronic Surveillence. Private vs. Public Searches. Application of Ortega to E-Mail. ECPA and PPA. Conclusions.
8. Computer Forensic Terminology and Computer Investigations.
Forensic Computer Science-An Emerging Discipline. Traditional Problems in Computer Investigations. Computer Forensic Science and Disk Structure. Conclusions.
Warrant Preparation and Application. Plan Preparation and Personnel Gathering. Preparing a Toolkit. Conclusions.
11. On-Scene Activities.
Approaching and Securing the Crime Scene. Determining the Need for Additional Assistance. Scene Processing.
12. Data Analysis.
Document. Establish Forensically-Sterile Conditions. Ensure Legitimacy and Validity of Analysis Tools. Physical Examination. Creation and Verification of Image. Passwords. Logical Examination. Restoration of Files. Listing of Files. Examination of Unallocated Space. Unlocking Files. Examination of User Data Files. Piping of Evidence. Examination of Executable Programs. Returning Equipment. A Word about DOS.
13. Conclusions and Future Issues.
Traditional Problems and Recommendations. Future Trends and Emerging Concerns. Conclusions.