The Investigator's Guide to Computer Crime

Front Cover
Charles C Thomas Publisher, 2006 - Law - 312 pages
0 Reviews

With the acceptance of computers in our everyday life, a new line of crime has emerged revolving around the computer. Just as computers make daily transactions more efficient, they have also made many crimes more efficient. This trend is likely to continue, and for that reason alone police investigators should make themselves better prepared for computer-related crime investigations. Divided into four sections, this book proposes theoretical and practical information, interventions, directives, and ideas. Section I establishes standards for computer crime investigation, the computer crime investigation team, the computer system in criminal enterprise, the computer crime lab, expert assistance, and what the experts can do for your investigation. Section 2 deals with hardware and software crimes, theft of information, cyberstalking, identity theft, and exemplary federal cases. Section 3 focuses on the computer crime investigation, initial assessment and response, applying forensic science techniques, the basics of tracking the offender, and basic network systems. Section 4 deals with search, seizure, digital evidence, the Fourth Amendment principles and computer searches, general rules of consent, informants, undercover operatives, and the application of direct and circumstantial evidence. The appendices contain a wealth of information on identifying the computer components, understanding software, networks and communication systems, and a computer seizure checklist. This text will be a useful resource for law enforcement professionals, criminal justice students, security professionals, and private business.

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Chapter 1 THE GROWING TRENDOF COMPUTER CRIME
5
Chapter 2 THE COMPUTER CRIME INVESTIGATION TEAM
17
Chapter 3 THE COMPUTER SYSTEM IN THE CRIMINAL ENTERPRISE
30
Chapter 4 THE COMPUTER CRIME LAB
43
Chapter 5 EXPERT ASSISTANCE
66
Section 2 SPECIFIC COMPUTER CRIMES
77
Chapter 6 HARDWARE AND SOFTWARE CRIMES
79
Chapter 7 THEFT OF INFORMATION
96
Chapter 12 TRACKING THE OFFENDER
168
Section 4 SEARCH SEIZURE AND DIGITAL EVIDENCE
187
Chapter 13 COMPUTERRELATED EVIDENCE
189
Chapter 14 FOURTH AMENDMENT PRINCIPLES AND COMPUTER SEARCHES
203
APPENDICES
231
Appendix A
233
Appendix B
261
Appendix C
277

Chapter 8 CYBERSTALKING
110
Chapter 9 IDENTITY THEFT
129
Section 3 THE COMPUTER CRIME INVESTIGATION
145
Chapter 10 INITIAL ASSESSMENT AND RESPONSETO THE COMPUTER CRIME
147
Chapter 11 APPLYING FORENSIC SCIENCE TO COMPUTERS
157
Appendix D
302
GLOSSARY
305
INDEX
309
Copyright

Other editions - View all

Common terms and phrases

About the author (2006)

Author and herpetologist " Carl J. Franklin " is the curator of the Amphibian and " "Reptile " "Diversity " "Research " "Center " " at the " "University " of "Texas " " at " "Arlington " ." His writings on turtles and other herpetological subjects have appeared in both popular and technical publications. A boundless enthusiast, Carl spends an inordinate amount of time in the field collecting specimens from the " "United States " ," " "Mexico " ," and Central and "South America ." He lives in " "Grand Prairie ," "Texas

Bibliographic information