Bibliography


TEXTS AND ARTICLES

Amar V. D. (2003) "Regarding Child Pornography Extends the Supreme Court's Federalism Cases", Findlaw's Write, May 16, 2003 (Available online at http://writ.corporate.findlaw.com/amar/20030516.html).

Ananova (2001) "Chatroom man 'wanted someone to rape and torture his wife'", August, 2001 (Available online at http://www.ananova.com/news/story/sm_379058.html).

ASCLD (2003) "Proposed Revisions to 2001 Accreditation Manual" (Available online at http://www.ascld-lab.org/pdf/aslabrevisions.pdf).

Associated Press (1997) "Wife's Internet friendship may have led to her death", January 23, 1997.

Associated Press (1997) "High-tech 'stalking' of Canadian family linked to teen-aged son", April 20, 1997.

Associated Press (1997) "As online harassment grows, calls for new laws follow" April 1, 1997.

Associated Press (1998) "FBI: Man posted sex pictures with daughter on Internet", February 10, 1998.

Associated Press (1999) "Child Participates in Sex Sting", September 2, 1999.

Associated Press (2001) "Teen placed in jail cell with sex offender", November 21, 2001.

Associated Press (2002) "Man Convicted In Internet Kidnap, Rape Of Teen", December 6, 2002.

Associated Press (2003) "Federal judge rules hacker covered by informant laws", March 18, 2003 (Available online at http://www.usatoday.com/tech/news/techpolicy/2003-03-18-hacker-informant_x.htm).

Baker R. (2000) "Harold Shipman's Medical Practice 1974–1998", Department of Health Audit Report, (Available online at http://www.doh.gov.uk/hshipmanpractice/shipman.pdf).

Baran P. (1964) Introduction to Distributed Communications Networks, RM-3420-PR. Santa Barbara, CA: The Rand Corporation (Available online at http://www.rand.org/publications/RM/RM3420/).

Bates J. (1999) "Judicial Review relating to Search Warrants - Discussion Paper", International Journal of Forensic Computing (Available online at http://www.forensiccomputing.com/archives/judicial.html).

Bellovin S. "Security Problems in the TCP/IP Protocol Suite," Computer Communications Review 19, No. 2 (April 1989) pp. 32-48.

Blanton T. (1995) "The Top-Secret Computer Messages the Reagan/Bush White House Tried to Destroy", National Security Archive (Available online at http://www.gwu.edu/~nsarchiv/white_house_email/).

Breyer S. (2000) "Reference Manual on Scientific Evidence", 2nd Ed., Federal Judicial Center (Available online at http://www.fjc.gov/public/pdf.nsf/lookup/sciman00.pdf).

Brown L. N. and Kennedy T. (2000) "The Court of Justice of the European Communities", London: Sweet & Maxwell.

Bryan B. (2002) "Letter writer is serial killer, concludes criminal profiler", St. Louis Post-Dispatch, May 28, 2002.

Buckeye B. and Liston K. (2002) "Recovering Deleted Files in Linux", February 2002, Sysadmin Magazine. (Available online at http://www.samag.com/documents/s=7033/sam0204g/sam0204g.htm).

Burgess A.,Burgess A.,Douglas J., and Ressler R. (1997) Crime Classification Manual, San Francisco: Jossey-Bass, Inc.

Burgess A. and Hazelwood R., Eds. (1995) Practical Aspects of Rape Investigation: A Multidisciplinary Approach, 2nd Ed., New York: CRC Press.

Burnette M. (2002) Forensic Examination of a RIM (BlackBerry) Wireless Device. (Available online at http://www.rh-law.com/ediscovery/Blackberry.pdf).

Burney M. (1997) "Cyber affair with teen-age girl leads to five years in prison", The Associated Press, August 22, 1997. (Available online at: http://www.nando.net/newsroom/ntn/info/082297/info10_3348_noframes.html).

Cairns G. (1996) "Snuffsex", Australian Broadcasting Corporation's NewsRadio Network.

Carrier B. (2002) "Open Source Digital Forensics Tools: The Legal Argument", @stake Research Report (Available online at http://www.atstake.com/research/reports/acrobat/atstake_opensource_forensics.pdf).

Carrier B. (2003) "Defining Digital Forensic Examination and Analysis Tool Using Abstraction Layers" International Journal of Digital Evidence, Volume 1, Issue 4, Syracuse, NY (Available online at http://www.ijde.org/docs/02_winter_art2.pdf).

Carrier B. (2003) "Splitting The Disk - Part 1", Sleuth Kit Informer, Issue 2, March 15, 2003 (Available online at http://www.sleuthkit.org/informer/sleuthkit-informer-2.html).

Carrier B. (2003) "Splitting The Disk - Part 2", Sleuth Kit Informer, Issue 5, July 15, 2003 (Available online at http://www.sleuthkit.org/informer/sleuthkit-informer-5.html).

Carrier B. and Spafford E. H. (2003) "Getting Physical with the Digital Investigation Process", International Journal of Digital Evidence, Volume 2, Issue 2 (Available online at http://www.ijde.org/docs/03_fall_carrier_Spa.pdf).

Carter D. L. (1995) "Computer Crime Categories, How Techno-Criminals Operate". FBI Law Enforcement Bulletin (July).

Casey E. (2000) Digital Evidence and Computer Crime, 1st Edn., London: Academic Press.

Casey E.,Larson T., and Long, H. M. (2002) "Network Analysis", Casey, E. (editor) Handbook of Computer Crime Investigation, pp. 225–228, London: Academic Press.

Casey E. (2002) "Cyberpatterns: Criminal Behavior on the Internet", Turvey, B. Criminal Profiling: An Introduction to Behavioral Evidence Analysis, 2nd Edn., London: Academic Press.

Casey E. (2002) "Error, Uncertainty and Loss in Digital Evidence", International Journal of Digital Evidence, Volume 1, Issue 2, 2002 (Available online at http://www.ijde.org/archives/docs/02_summer_art1.pdf).

Casey E. (2002) "Practical Approaches to Recovering Encrypted Digital Evidence", International Journal of Digital Evidence, Volume 1, Issue 3 (Available online at http://www.ijde.org/02_fall_art4.html).

CBS News (2002) "Daniel Pearl Killers Appeal", July 17, 2002 (Available online at http://www.cbsnews.com/stories/2002/05/31/attack/main510651.shtml).

CERT (2002) "Trojaned OpenSSH Distribution" (Available online at http://www.cert.org/advisories/CA-2002-24.html).

Chen D. W. (2000) "Teacher Is Accused of Duping Boy to Make a Sexual Video", New York Times, Late Edition - Final, Section B , Page 5, Column 5, October 5th, 2000.

Clark F. and Diliberto K. (1996) Investigating Computer Crime, New York: CRC Press.

Clark D. F. and Gibbs K. E. (2001) "Wireless Network Analysis", Casey, E. (editor) Handbook of Computer Crime Investigation, London: Academic Press.

Clubb S. (2002) "Police explain suspect's suicide", The Illinois River Bend Telegraph, June 12, 2002 (Available online at http://www.zwire.com/site/news.cfm?newsid=4412382&BRD=1719&PAG=461&dept_id=25271&rfi=8).

Comer D. E. (1995) Internetworking with TCP/IP Volume I: Principles, Protocols, and Architecture, 3rd Edn., New Jersey: Prentice Hall.

Convery S. (2002) "Hacking Layer 2: Fun with Ethernet Switches" BlackHat Briefing. (Available online at http://www.blackhat.com/presentations/bh-usa-02/bh-us-02-convery-switches.pdf).

Cowen R. (2003) "Real IRA trial told of 750,000 spy payment", The Guardian, June 19, 2003.

CSI/FBI (2003) Computer Crime and Security Survey, San Francisco: Computer Security Institute.

DAWN group (2002) "Defence disputes video's validity: Daniel Pearl case", 17 May 2002, (Available online at http://www.dawn.com/2002/05/17/top2.htm).

Digital Discovery & e-Evidence, May 2001, New Rules on Cell Phone Monitoring Systems Fuel Interest in Embedded Systems.

Diskant T. (2002) "After sentencing, Lasaga, Yale face civil suit", February 22, 2002, Yale Herald (Available online at http://www.yaleherald.com/article.php?Article=359).

Dunne R.,Long H. M., and Casey E. (2000) "Internet Crime" in the Encyclopedia of Forensic Science, London: Academic Press.

Durfee D. (1996) "Man pleads no contest in stalking case", The Detroit News, January 25, 1996.

Durkin K. F. and Bryant C. D. (1995) "Log on to sex: some notes on the carnal computer and erotic cyberspace as an emerging research frontier", Deviant Behavior: An Interdisciplinary Journal, 16:179–200.

Durkin K. F. and Bryant C. D. (1999) "Propagandizing pederasty: a thematic analysis of the on-line exculpatory accounts of unrepentant pedophiles". Deviant Behavior: An Interdisciplinary Journal, 20:103–127, 1999.

ENFSI Forensic Information Technology Working Group (2003) Draft Guidelines for Best Practice in the Forensic Examination of Digital Technology (Available online at http://www.enfsi.org/docs/FITWG-BPM-001-003.pdf).

Flusche K. J. (2001) "Computer Forensic Case Study: Espionage, Part 1 Just Finding the File is Not Enough!", Information Systems Security, March/April 2001, Auerbach.

Foote D. (1999) 'You Could Get Raped' Newsweek February 8, 1999.

Fyodor (1998) "Remote OS detection via TCP/IP Stack FingerPrinting", (Available online at http://www.insecure.org/nmap/nmap-fingerprinting-article.txt).

Garfinkel S. and Spafford E. H. (1996) Practical Unix and Internet Security, 2nd Edn., Cambridge, MA: O'Reilly & Associates, Inc.

Garfinkel S. (2002) "Network Forensics: Tapping the Internet", O'Reilly Network (Available online at http://www.oreillynet.com/pub/a/network/2002/04/26/nettap.html).

Gaudin S. (2000) "Case Study of Insider Sabotage: The Tim Lloyd/Omega Case", Number 3, 2000, Computer Security Journal, Volume XVI.

Gauis (2000) "Things to do in Ciscoland when you're dead" Phrack 56 (Available online at http://www.phrack.com/show.php?p=56&a=10).

Gaurdian Unlimited (2001) "Man convicted of internet-conspired rape", August 2, 2001 (Available online at http://www.guardian.co.uk/japan/story/0,7369,531343,00.html).

Gahtan A. (1999) "Electronic Evidence", Ontario: Carswell Legal Publications.

Geberth V. (1996) Practical Homicide Investigation, 3rd Edn., New York: CRC Press.

Gillespie A. A. (2003) "Sentences for Offences Involving Child Pornography" Crim.L.R. 81.

Gindin S. E. (1998) "As the Cyber-World Turns" (Available online at http://www.info-law.com/eupriv.html).

Gindin S. E. (1997) "Lost and Found in Cyberspace: Informational Privacy in the Age of the Internet" (Available online at http://www.info-law.com/lost.html, 1997).

Graham R. (2000) "Sniffing (network wiretap, sniffer) FAQ", (Available online at http://www.robertgraham.com/pubs/sniffing-faq.html).

Grand J. (2001) Published by the Forum of Incident Response and Security Teams in the Proceedings of the 14th Annual Computer Security Incident Handling Conference, Waikoloa, Hawaii, June 24–28, 2002. (Available online at http://www.mindspring.com/~jgrand/pdd/pdd-palm-forensics.pdfand http://www.atstake.com/research/reports/acrobat/pdd_palm_forensics.pdf).

Gringas C. (2002) "The Laws of the Internet", London: Butterworths.

Gross H. (1924) Criminal Investigation, London: Sweet & Maxwell.

Gruber J. S. (1995) Electronic Evidence, Eagan, MN: Thomas Legal Publishing.

Guidance Software (2001–2002) "EnCase Legal Journal" 2nd Ed. (Available online at http://www.guidancesoftware.com/support/downloads/LegalJournal.pdf).

Harding C. (2000) "Exploring the intersection of European law and national criminal law", 25 E.L.Rev. 374.

Harmon R.,Rosner R., and Owens H. (1998) "Sex and Violence in a Forensic Population of Obsessional Harassers Psychology", Public Policy, and Law, 1998, Vol. 4, No. 1/2, 236–249, 1998 American Psychological Association.

Hazelwood R.,Reboussin R.,Warren J. I., and Wright J. A. (1991) "Prediction of Rapist Type and Violence from Verbal, Physical, and Sexual Scales," Journal of Interpersonal Violence, Vol. 6, No. 1, March 1991, pp. 55–67.

Henseler J. (2000) "Computer Crime and Computer Forensics" in the Encyclopedia of Forensic Science, London: Academic Press.

Henry J. (1985) Testimony before the Permanent Subcommittee on Governmental Affairs before the United States Senate, Ninety-Ninth Congress. (Available online at http://www.nostatusquo.com/ACLU/NudistHallofShame/Henry.html).

Henry P. H. and DeLibero G. (1996) Strategic Networking: From LAN and WAN to Information Superhighways. Massachusetts: International Thomson Publishing Company.

Hernandez A. E. (2000) "Self-reported contact sexual crimes of federal inmates convicted of child pornography offenses", Presented at the 19th Annual Conference Research and Treatment Conference of the Association for the Treatment of Sexual Abusers, San Diego, CA, November 2000.

Hoey A. (1996) "Analysis of The Police and Criminal Evidence Act, s.69 - Computer Generated Evidence", Web Journal of Current Legal Issues, in association with Blackstone Press Ltd.

Hollinger R. C. and Lanza-Kaduce L. (1988) "The Process of Criminalization: The Case of Computer Crime Law", Criminology, Vol. 26, No. 1, p. 104.

Hollinger R. C. (1997) Crime, Deviance and the Computer. Brookfield, VT: Dartmouth Publishing Company.

Holmes R. (1996) Profiling Violent Crimes: An Investigative Tool, 2nd Edn., Sage Publications.

Hoover T. W. (2002) "An Introduction to the DoJ's Manual on Searching and Seizing Computers", Federal Public Defender Report, Vol. 11, No 1, March, 2002.

Horvath F. and Meesig R. (1996) "The Criminal Investigation Process and the Role of Forensic Evidence: A Review of Empirical Findings", Journal of Forensic Sciences 1996; 41 (6): 963–969.

Hunt C. (1998) TCP/IP Network Administration, 2nd Edn., California: O'Reilly.

Jarvis C. (1998) "Teen again linked to e-mail affair", The News Observer, North Carolina, November 28, 1998.

Johnson T. (2000) "Man searched Web for way to kill wife, lawyers say", Seattle Post-Intelligencer, June 21, 2000 (Available online at http://seattlepi.nwsource.com/local/murd21.shtml).

Kirk P. (1974) Crime Investigation, 2nd Edn., Wiley & Sons.

Kelleher D. and Murray K. (1999) "IT Law in the European Union", London: Sweet & Maxwell.

Kelleher D. (2000) "The Council of Europe's Draft Convention on Cyber-Crime" Technology and Law Journal 12.

Korn H. (1966) "Law, Fact, and Science in the Courts", 66 Columbia Law Review 1080, 1093–94.

Lanning K. V. (2001) Child Molesters and Cyber Pedophiles - A Behavioral Perspective, in Hazelwood, Robert R. and Burgess, Ann W., Eds., Practical Aspects of Rape Investigation: A multidisciplinary Approach, 3rd Edn., pp. 199-232, Boca Raton, FL: CRC Press.

Larson T. (2001) "The Other Side of Civil Discovery", Casey, E. (editor) Handbook of Computer Crime Investigation: Forensic Tools and Technology, London: Academic Press.

Larson T. (2002) "Evidence Acquisition Boot Disk" (Available online at http://www.disclosedigital.com/eabd.html).

Law Commission (1997) Evidence in Criminal Proceedings: Hearsay and Related Topics, Law Commission Report 245 (Available online at http://www.lawcom.gov.uk/231.htm#lcr245).

Lee H.,Palmbach T., and Miller M. (2001) Henry Lee's Crime Scene Handbook, London: Academic Press.

Mandia K.,Prosise C., and Pepe M. (2003) Incident Response and Computer Forensics, 2nd Edn., New York: Osborne.

Mann D. and Sutton M. (1998) "Netcrime: More Change in the Organization of Thieving", British Journal of Criminology, Vol. 38, No. 2.

Mattei M.,Blawie J. F., and Russell A. (2000) "Connecticut Law Enforcement Guidelines for Computer Systems and Data Search and Seizure", State of Connecticut Department of Public Safety and Division of Criminal Justice.

McAullife W. (2000) "Net paedophile gets five years", ZDNet, 24 October, 2000 (Available online at http://news.zdnet.co.uk/story/0,,s2082159,00.html).

McClintock D. (2001) "Fatal Bondage", Vanity Fair, June.

McGrath M. G. and Casey E. (2002) "Forensic psychiatry and the Internet: Practical perspectives on sexual predators and obsessional harassers in cyberspace", Journal of American Academy of Pychiatry and Law, 30:81–94, 2002.

McPherson T. (2003) "Sherlock Holmes' modern followers", The Advertiser, May 31, 2003.

Meighan C. W. (1966) Archaeology: an Introduction, p. 18, San Francisco: Chandler Publishing Company.

Meloy J. R., Ed. (1998) The Psychology of Stalking: Clinical and Forensic Perspectives, San Diego: Academic Press.

Meloy J. R. (1999) "Stalking: An Old Behavior, A New Crime", In Psychiatric Clinics of North America.

Microsoft (1999) "Back Up the Recovery Agent Encrypting File System Private Key in Windows 2000", Microsoft KB Q241201 (Available online at http://support.microsoft.com/default.aspx?scid=kb;[LN];Q241201).

Microsoft (2000) "FAT32 File System Specification" (Available online at http://www.microsoft.com/hwdev/hardware/fatgen.asp).

Microsoft (2001) "Detailed Explanation of FAT Boot Sector", MS KB140418 (Available online at http://support.microsoft.com/default.aspx?scid=KB;en-us;q140418).

Microsoft (2001) "General Information about Microsoft Office XP Encryption", Microsoft KB Article Q290112 (Available online at http://support.microsoft.com/default.aspx?scid=kb;en-us;Q290112).

Microsoft (2001) "Maximum Partition Size Using FAT16 File System" (Available online at http://support.microsoft.com/default.aspx?scid=kb;EN-US;118335).

Microsoft (2002) "Description of the FAT32 File System" (Available online at http://support.microsoft.com/default.aspx?scid=kb;EN-US;154997).

Microsoft (2002) "Limitations of FAT32 File System" (Available online at http://support.microsoft.com/default.aspx?scid=KB;en-us;q184006).

Morris R. T. (1995) "A Weakness in the 4.2BSD UNIX TCP/IP Software", Bell Labs Computer Science Technical Report 117 (February 25, 1985) (Available online at http://www.eecs.harvard.edu/~rtm/papers.html).

National Center for Forensic Science (2003) "Digital Evidence in the Courtroom: A Guide for Preparing Digital Evidence for Courtroom Presentation", Mater Draft Document, U.S. Department of Justice, National Institute of Justice, Washington (Available online at http://www.ncfs.org/DE_courtroomdraft.pdf).

National Computer Security Association (1997) Internet Security: Professional Reference. Indiana: New Riders Publishing.

National News (2002) "Text of Daniel Pearl case verdict", July 17, 2002 (Available online at http://www.jang.com.pk/thenews/jul2002-daily/17-07-2002/national/n6.htm).

New York Lawyer (2003) "NY Law Professor Pleads Guilty To Possessing Child Porn", April 16, 2003 (Available online at http://www.nylawyer.com/news/03/04/041603d.html).

O'Hanlon S. (2003) "Porn Curiosity Brings Scrutiny Against 'Who's' Townsend", January 11, 2003 (http://reuters.com/newsArticle.jhtml?type=internetNews&storyID=2028595).

O'Hara, C. (1970), Fundamentals of Criminal Investigation, 2nd Edn., Springfield: Charles C. Thomas Publishers.

Palisade Systems (2003) "Porn Tops File Sharing Usage" (Available online at http://www.palisadesys.com/news&events/p2pstudy.pdf).

Palm OS Memory Architecture (Available online at http://oasis.palm.com/dev/kb/papers/1145.cfm).

Palm OS Memory and Database Management (Available online at http://oasis.palm.com/dev/kb/papers/2029.cfm).

Parker D. (1976) Crime by Computer. New York: Charles Scribners' and Sons.

Parker D. (1983) Fighting Computer Crime. New York: Charles Scribners' and Sons.

Parker D. (1998) Fighting Computer Crime: A new Framework for Protecting Information. New York: John Wiley & Sons.

Pathe M. and Mullen, P. E. (1997) "The impact of stalkers on their victims", British Journal of Psychiatry, 170:12–17, January 1997.

Patzakis J. (2002) "Computer Forensics as an Integral Component of the Information Security Enterprise" (Available online at http://www.guidancesoftware.com/support/downloads/computerforensics.pdf).

Peek J.,O'Reilly T., and Loukides M. (1997) Unix Powertools, California: O'Reilly.

Phrack 59 (2002) "Defeating Forensic Analysis on Unix", July 2002 (http://www.phrack.org/show.php?p=59&a=6).

Phrack 58 (2001) "Armouring the ELF: Binary encryption on the UNIX platform", December, 2001 (http://www.phrack.org/show.php?p=58&a=5)

Pendlebury F. (2001) "Jail for Net Rapist", Dorsett Echo, July 17, 2001 (Available online at http://www.thisisdorset.net/dorset/archive/2001/07/17/BOURN_NEWS_NEWS10ZM.html).

Piper E. (1998) "Russian cybercrime flourishes: Deteriorating economic conditions have brought pirating and cracking mainstream", Reuters, December 30, 1998.

Popper K. R. (1959) Logic of Scientific Discovery, London: Hutchinson.

Prosise C.,Mandia K., and Pepe M. (2003) Incident Response: Computer Forensics, 2nd Edn., New York: McGraw-Hill Osborne Media.

Psychiatric News (2000) "Protect Children From Predators On Internet, Parents Tell Congress", May 5, 2000, (Available online at http://www.psych.org/pnews/00-05-05/protect.html).

Reed C. and Angel J., Eds. (2000) "Computer Law", London: Blackstone Press.

Reed C., (1990–91) 2 CLSR 13–16 as quoted in Sommer, P. "Downloads, Logs and Captures: Evidence from Cyberspace Journal of Financial Crime", October, 1997, 5JFC2 138–152.

Regan E., Ed. (2000) "The New Third Pillar: Cooperation Against Crime in the European Union", Dublin: Institute of European Affairs.

Reuters (1997) "Swiss couple charged in U.S. child pornography sting", August 22, 1997.

Reuters (2001) "Russia Lacks Laws to Fight Child Porn Explosion", 26 March, 2001.

Rizzo T. (2001) "Judge rules Robinson must stand trial in 3 deaths", Kansas City Star, March 2, 2001, (Available online at http://www.kcstar.com/standing/robinson/case.html).

Robinson B. (2002) "Taking a Byte Out of Cybercrime", ABC News, July 15, 2002.

Romig S. (2001) "Incident Response Tools", Casey, E. (editor) Handbook of Computer Crime Investigation, London: Academic Press.

Rosenblatt K. S. (1995) High-Technology Crime: Investigating Cases Involving Computers. San Jose, CA: KSK Publications.

Saferstein R. (1998) Criminalistics: An Introduction to Forensic Science, 6th Edn., Upper Saddle River, New Jersey: Prentice Hall.

Sammes T. and Jenkinson B. (2000) Forensic Computing: A Practitioner's Guide, London: Springer.

Schneier B. (1996) Applied Cryptography: Protocols, Algorithms, and Source Code in C. New York: John Wiley & Sons.

Scott D. and Conner, M. (1997) In Haglund & Sorg (Eds.), Forensic Taphonomy: The Postmortem Fate of Human Remains, Chapter 2, Florida: CRC Press.

Scott M. (2003), "Independent Review of Common Forensic Imaging Tools", Memphis Technology Group Report (Available at http://mtgroup.com/papers/ForensiclmagingTools.pdf).

Seaton D. (2002) "Hack attacks spook county", The Press Enterprise, June 14, 2002.

Securities and Exchange Commission (2002) "Order instituting proceedings pursuant to Section 15(b)(4) and Section 21c of the Securities Exchange Act of 1934, making findings and imposing cease-and-desist orders, penalties, and other relief: Deutsche Bank Securities, Inc., Goldman, Sachs & Co., Morgan Stanley & Co. Incorporated, Salomon Smith Barney Inc., and U.S. Bancorp Piper Jaffray Inc.", Administrative Proceeding, File No. 3–10957 (Available online at http://www.sec.gov/litigation/admin/34-46937.htm).

Seglem K.,Luque M. E., and Murphy S. E. (2001), "Forensic Analysis of UNIX Systems", Casey, E. (editor) Handbook of Computer Crime Investigation, London: Academic Press.

Shamburg R. (1999) "A Tortured Case", Net Life, April 7, 1999.

Shannon E. (1998) "Main Street Monsters", Time Magazine, September 14, 1998 Vol. 152, No. 11.

Sheldon T. (1997) Windows NT Security Handbook. Berkeley, CA: Osborne McGraw Hill.

Sheldon B. (2001) "Forensic Analysis of Windows Systems", Casey, E. (editor) Handbook of Computer Crime Investigation, London: Academic Press.

Shimomura T. and Markoff J. (1996) "Takedown: The Pursuit of Kevin Mitnick, America's Most Wanted Computer Outlaw - by the man who did it". New York: Hyperion.

Shinkle P. (2002) "Serial Killer Caught By His Own Internet Footprint", St. Louis Post-Dispatch, 6-17-2002.

Singh S. (2000) The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. New York: Anchor Books.

Smith G. J. H. (1999) "Internet Law and Regulation", London: Sweet & Maxwell.

Snipe S. (2000) "Why your switched network isn't secure" (Available online at http://www.sans.org/resources/idfaq/switched_network.php).

Sobel D. (1999) "Galileo's Daughter: A Drama of Science, Faith, and Love", London: Fourth Estate.

Soh-jung Y. (2001) "Rising Number of Sexual Assault Cases Linked to Internet", The Korea Herald, July 7, 2001 (Available online at http://www.vachss.com/help_text/archive/sa_korea.html).

Sommer P. (1997) Downloads, Logs and Captures: Evidence from Cyberspace", Journal of Financial Crime, October, 1997, 5JFC2 138–152 (Available online at http://www1.bcs.org.uk/DocsRepository/03900/3968/logs.htm).

Sommer P. (1998) "Digital Footprints: Assessing Computer Evidence", Criminal Law Review (Special Edition), pp. 61–78, London: Sweet & Maxwell.

Spafford G. H. (1989) "The Internet Worm: Crisis and Aftermath" Communications of the ACM, 32 (6): 678–87

Specter M. (2002) "Do Fingerprints Lie?: The gold standard of forensic evidence is now being challenged", The New Yorker Issue of 2002-05-27 (Available online at http://www.newyorker.com/printable/?fact/020527fa_FACT).

States News Service (1998) "Woman Jailed For Sex With Boy", 2 December, 1998 (Available online at http://www.fathermag.com/news/rape/portland02.shtml).

States News Service (1999) "Cyber-Sex Seducer Gets Jail Time", 13, January 1999 (Available online at http://www.fathermag.com/news/rape/morganton.shtml).

Sterling B. (1993) A Short History of the Internet. Cornwall, CT: Magazine of Fantasy and Science Fiction. (Available online at http://www.library.yale.edu/div/instruct/internet/history.htm).

Stevens W. R. (1994) TCP/IP Illtrated, Vol. 1, Boston: Addison Wesley.

Sullivan B. (2003) "Pair who hacked court get 9 years" MSNBC, February 7, 2003.

Taylor M.,Quayle E., and Holland G. (2001) "Child Pornography, the Internet and offending", ISUMA, Vol. 2, No. 2 (Available online at http://www.isuma.net/v02n02/taylor/taylor_e.shtml).

Tribune News Services (2000) "Black student charged with racist e-mail threats at college", April 21, 2000.

The Age (2002) "Japanese police to regulate Internet dating services", December 26 2002 (Available online at http://www.theage.com.au/articles/2002/12/26/1040511126218.html).

The Baltimore Sun (1998) "Woman Accused of Having Sex with Boy", (Available online at http://www.fathermag.com/news/rape/laurel.shtml).

Thomson S. (2002) "Charges Dropped Against Two Men in Sex-Slave Case, The Columbian, November 26, 2002.

Thornton J. I. (1997) "The General Assumptions and Rationale of Forensic Identification", for David L. Faigman, David H. Kaye, Michael J. Saks, & Joseph Sanders, Eds., Modern Scientific Evidence: The Law and Science of Expert Testimony, Vol. 2, St. Paul: West Publishing Company.

Turvey B. (2002) "Criminal Profiling: An Introduction to Behavioral Evidence Analysis" 2nd Edn., London: Academic Press.

United Kingdom Association of Chief Police Officers (2003) "The Good Practices Guide for Computer Based Electronic Evidence", National High-tech Crime Unit (Available online at http://www.nhtcu.org/ACPOGuidev3.0.pdf).

United Nations (1995) International Review of Criminal Policy No. 43 and 44 - United Nations Manual on the Prevention and Control of Computer-Related Crime; (Available at http://www.ifs.univie.ac.at/~pr2gq1/rev4344.html#crime).

Usborne D. (2002) "Has an old computer revealed that Reid toured world searching out new targets for al-Qa'ida?", UK Independent (Available online at http://www.independent.co.uk/story.jsp?story=114885).

United States Department of Justice (2001) "Electronic Crime Scene Investigation: A Guide for First Responders", National Institute of Justice, NCJ 187736 (Available online at http://www.ncjrs.org/pdffiles1/nij/187736.pdf).

U.S. Department of Justice (1994) "Federal Guidelines for Searching and Seizing Computers" (Available online at http://www.usdoj.gov/criminal/cybercrime/search_docs/toc.htm).

U.S. Department of Justice (1998) "Supplement to Federal Guidelines for Searching and Seizing Computers" (Available online at http://www.usdoj.gov/criminal/cybercrime/supplement/ssgsup.htm).

U.S. Department of Justice (1999) "Man convicted of threatening Federal judges by Internet e-mail" (Available online at http://www.usdoj.gov/criminal/cybercrime/johnson.htm).

U.S. Department of Justice (2002) "Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations" (Available online at http://www.cybercrime.gov/searchmanual.htm).

U.S. Department of Justice (2002) "Abingdon man sentenced to 41 months for child pornography" (Available online at http://www.usdoj.gov/usao/md/press_releases/press02/wyattrelease.htm).

U.S. Department of Justice (2000) "Former high-tech executive pleads guilty to charge of traveling to have sex with minor he met on Internet", March 17, 2000 (Available online at http://www.usdoj.gov/usao/cac/pr/pr2000/050.htm).

U.S. Department of Justice (2002) "Parkville man receives 10 year prison sentence for exploiting child to produce child pornography" (Available online at http://www.usdoj.gov/usao/md/press_releases/press02/adam_thomas_valleau_sentenced.htm).

U.S. Department of Justice (2002c) "Man sentenced to 27 months in prison for possessing child Pornography" (Available online at http://www.usdoj.gov/usao/txs/releases/April%202002/020417-magargee.htm).

U.S. Department of Justice (2003) "Fact Sheet, PROTECT Act" (Available online at http://www.usdoj.gov/opa/pr/2003/April/03_ag_266.htm).

U.S. Postal Service (2001) "Multimillion-Dollar Child Pornography Enterprise Dismantled".

van der Knijff R. (2001) "Embedded System Analysis", Casey, E. (Editor) Handbook of Computer Crime Investigation: Forensic Tools and Technology, London: Academic Press.

Van den Wyngaert C. (1993) "Criminal Procedure Systems in the European Community", London: Butterworths.

Venema W. and Farmer D. (2001) "Forensic Computer Analysis: an Introduction", Dodds diary Doctor Dobb's Journal (Available online at http://www.ddj.com/documents/s=881/ddj0009f/0009f.htm).

Wacks, R. (1993) "Towards a New Legal and Conceptual Framework for the Protection of Internet Privacy" (1999 3(1) I.I.P.R. 1).

Widdowson L. and Ferlito J. (2001) "Tales from the Abyss: UNIX File Recovery", January 2001, SysAdmin Magazine (Available online at http://www.samag.com/documents/s=1441/sam0111b/0111b.htm).

Willassen S. Y. (2003) "Forensics and the GSM Mobile Telephone System" IJDE 2003 2:1 (Available online at http://www.ijde.org/docs/03_spring_art1.pdf).

Wired News (1998) "Cops 'Lured' into Net Sex", February 16, 1998.




Digital Evidence and Computer Crime
Digital Evidence and Computer Crime, Second Edition
ISBN: 0121631044
EAN: 2147483647
Year: 2003
Pages: 279

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net