Sitemap
Digital Evidence and Computer Crime - Forensic Science, Computers and the Internet, Second Edition
Reliability of Digital Evidence
Chapter 1: Digital Evidence and Computer Crime
1.2 Increasing Awareness of Digital Evidence
1.3 Challenging Aspects of Digital Evidence
1.5 Challenging Aspects of the Cybertrail
1.6 Forensic Science and Digital Evidence
Chapter 2: History and Terminology of Computer Crime Investigation
2.1 Brief History of Computer Crime Investigation
2.2 Evolution of Investigative Tools
2.3 Language of Computer Crime Investigation
Part A Technology and Law - A Us Perspective
3A.2 Pornography and Obscenity
3A.4 Copyrights and the " Theft " of Digital Intellectual Property
Part B Computer Misuse in America
Part C Technology and Criminal Law - A European Perspective
3C.1 Overview of Criminal Offenses
3C.3 Jurisdiction and Extradition
United States Perspective Bibliography
European Perspective Bibliography/Suggested Further Reading
Chapter 4: The Investigative Process
4.1 The Role of Digital Evidence
Chapter 5: Investigative Reconstruction with Digital Evidence
5.1 Equivocal Forensic Analysis
5.3 Crime Scene Characteristics
5.4 Evidence Dynamics and the Introduction of Error
Chapter 6: Modus Operandi, Motive, and Technology
6.1 Axes to Pathological Criminals, and Other Unintended Consequences
6.3 Technology and Modus Operandi
Chapter 7: Digital Evidence in the Courtroom
7.2 Authenticity and Reliability
7.5 Direct versus Circumstantial Evidence
7.8 Presenting Digital Evidence
Chapter 8: Computer Basics for Digital Investigators
8.2 Basic Operation of Computers
8.4 Storage Media and Data Hiding
8.5 File Systems and Location of Data
Chapter 9: Applying Forensic Science to Computers
9.1 Authorization and Preparation
9.4 Collection and Preservation
Chapter 10: Forensic Examination of Windows Systems
10.1 Windows Evidence Acquisition Boot Disk
10.3 Overview of Digital Evidence Processing Tools
Chapter 11: Forensic Examination of Unix Systems
11.1 Unix Evidence Acquisition Boot Disk
11.3 Overview of Digital Evidence Processing Tools
Chapter 12: Forensic Examination of Macintosh Systems
12.2 Overview of Digital Evidence Processing Tools
Chapter 13: Forensic Examination of Handheld Devices
13.1 Overview of Handheld Devices
13.2 Collection and Examination of Handheld Devices
13.3 Dealing with Password Protection and Encryption
13.4 Related Sources of Digital Evidence
Chapter 14: Network Basics for Digital Investigators
14.1 A Brief History of Computer Networks
14.2 Technical Overview of Networks
14.4 Connecting Networks using Internet Protocols
Chapter 15: Applying Forensic Science to Networks
15.1 Preparation and Authorization
15.3 Documentation, Collection, and Preservation
15.4 Filtering and Data Reduction
15.5 Class/Individual Characteristics and Evaluation of Source
15.7 Investigative Reconstruction
Chapter 16: Digital Evidence on Physical and Data-Link Layers
16.2 Linking the Data-Link and Network Layers - Encapsulation
16.3 Ethernet versus ATM Networks
16.4 Documentation, Collection, and Preservation
16.5 Analysis Tools and Techniques
Chapter 17: Digital Evidence at the Network and Transport Layers
17.3 TCP/IP Related Digital Evidence
Chapter 18: Digital Evidence on the Internet
18.1 Role of the Internet in Criminal Investigations
18.2 Internet Services: Legitimate versus Criminal Uses
18.3 Using the Internet as an Investigative Tool
18.4 Online Anonymity and Self-Protection
18.5 E-Mail Forgery and Tracking
18.6 Usenet Forgery and Tracking
18.7 Searching and Tracking on IRC
Part 4: Investigating Computer Crime
Chapter 19: Investigating Computer Intrusions
19.1 How Computer Intruders Operate
19.3 Investigative Reconstruction
Chapter 20: Sex Offenders on the Internet
20.3 Identifying and Processing Digital Evidence
20.4 Investigating Online Sexual Offenders
20.5 Investigative Reconstruction
21.1 How Cyberstalkers Operate
21.2 Investigating Cyberstalking
21.3 Cyberstalking Case Example
Chapter 22: Digital Evidence as Alibi
Chapter 23: Digital Evidence Handling Guidelines
23.1 Identification or Seizure
Chapter 24: Digital Evidence Examination Guidelines
24.3 Identify and Process Special Files