List of Case Examples

Chapter 1: Digital Evidence and Computer Crime

CASE EXAMPLE (CALIFORNIA 2003):
CASE EXAMPLE (COWEN 2003):
CASE EXAMPLE (MARYLAND 1996):
CASE EXAMPLE (BLANTON 1995):
CASE EXAMPLE (UNITED STATES v. GRANT 2000):
CASE EXAMPLE (AUCTION FRAUD 2000):

Chapter 3: Technology and Law

CASE EXAMPLE (UNITED STATES v. MORRIS 1991):
CASE EXAMPLE (UNITED STATES v. RIGGS 1990):
CASE EXAMPLE (R. v. FELLOWS 1997):
CASE EXAMPLE (R. v. BOWDEN 2000):
CASE EXAMPLE (D.P.P. v. BIGNELL 1998):
CASE EXAMPLE (R. v. BOW STREET MAGISTRATE - ALLISON 1997):
CASE EXAMPLE (R. v. WHITELEY 1991):
CASE EXAMPLE (R. v. GOVERNOR OF BRIXTON PRISON, ex parte LEVIN 1997):
CASE EXAMPLE

Chapter 4: The Investigative Process

CASE EXAMPLE (UNITED STATES v. HILTON 1997):
CASE EXAMPLE (LISER v. SMITH 2003):

Chapter 5: Investigative Reconstruction with Digital Evidence

CASE EXAMPLE (CALIFORNIA v. WESTERFIELD 2002):
CASE EXAMPLE
CASE EXAMPLE (UNITED STATES v. BENEDICT):

Chapter 6: Modus Operandi, Motive, and Technology

CASE EXAMPLE 1 (REUTERS 1997):
CASE EXAMPLE 2 (WIRED NEWS 1998):
CASE EXAMPLE (DURFEE 1996):
CASE EXAMPLE (ASSOCIATED PRESS 1997b):
CASE EXAMPLE (ASSOCIATED PRESS 1997a):
CASE EXAMPLE (PIPER 1998):

Chapter 7: Digital Evidence in the Courtroom

CASE EXAMPLE (UNITED STATES v. TURNER 1999):
CASE EXAMPLE (UNITED STATES v. GRAY 1999):
CASE EXAMPLE (WISCONSIN v. SCHROEDER):
CASE EXAMPLE (MICHIGAN v. MILLER 2002):
CASE EXAMPLE (UNITED STATES v. TANK):
CASE EXAMPLE (R. v. COCHRANE 1993, UNITED KINGDOM):
CASE EXAMPLE (REGINA v PECCIARICH):

Chapter 8: Computer Basics for Digital Investigators

CASE EXAMPLE (UNITED STATES v. ZACARIAS MOUSSAOUI 2003):

Chapter 9: Applying Forensic Science to Computers

CASE EXAMPLE (UNITED STATES v. CAREY 1998):
CASE EXAMPLE
CASE EXAMPLE (STEVE JACKSON GAMES, 1990):
CASE EXAMPLE
CASE EXAMPLE
CASE EXAMPLE (GREATER MANCHESTER 1974–1998):
CASE EXAMPLE
CASE EXAMPLE (GERMANY 1989):
CASE EXAMPLE
CASE EXAMPLE
CASE EXAMPLE

Chapter 10: Forensic Examination of Windows Systems

CASE EXAMPLE
CASE EXAMPLE

Chapter 11: Forensic Examination of Unix Systems

CASE EXAMPLE

Chapter 12: Forensic Examination of Macintosh Systems

CASE EXAMPLE

Chapter 13: Forensic Examination of Handheld Devices

CASE EXAMPLE (UNITED STATES v. RANDOLPH 2002):

Chapter 14: Network Basics for Digital Investigators

CASE EXAMPLE
CASE EXAMPLE
CASE EXAMPLE (UNITED STATES v. ROMERO 1999):

Chapter 15: Applying Forensic Science to Networks

CASE EXAMPLE
CASE EXAMPLE
CASE EXAMPLE (SEATTLE 2000):
CASE EXAMPLE (BACH v. MINNESOTA 2002):
CASE EXAMPLE
CASE EXAMPLE (UNITED STATES v. HILTON):
CASE EXAMPLE
CASE EXAMPLE
CASE EXAMPLE
CASE EXAMPLE
CASE EXAMPLE
CASE EXAMPLE
CASE EXAMPLE
CASE EXAMPLE
CASE EXAMPLE

Chapter 16: Digital Evidence on Physical and Data-Link Layers

CASE EXAMPLE
CASE EXAMPLE

Chapter 17: Digital Evidence at the Network and Transport Layers

CASE EXAMPLE
CASE EXAMPLE
CASE EXAMPLE
CASE EXAMPLE (SHINKLE 2002):
CASE EXAMPLE
CASE EXAMPLE
CASE EXAMPLE
CASE EXAMPLE
CASE EXAMPLE

Chapter 18: Digital Evidence on the Internet

CASE EXAMPLE (KANSAS v. ROBINSON 2001):
CASE EXAMPLE (NORTH DAKOTA v FROISTAD 1998):
CASE EXAMPLE (CARNEGIE MELLON UNIVERSITY 1995):
CASE EXAMPLE (UNITED STATES v. REEDY 2000):
CASE EXAMPLE (CBS 2001):
CASE EXAMPLE
CASE EXAMPLE (ORCHID CLUB/OPERATION CATHEDRAL):
CASE EXAMPLE (USDOJ 1999):
CASE EXAMPLE
CASE EXAMPLE

Chapter 19: Investigating Computer Intrusions

CASE EXAMPLE
CASE EXAMPLE
CASE EXAMPLE
CASE EXAMPLE
CASE EXAMPLE (LONDON 2002):
CASE EXAMPLE (NEW JERSEY 1996):
CASE EXAMPLE
CASE EXAMPLE
CASE EXAMPLE

Chapter 20: Sex Offenders on the Internet

CASE EXAMPLE (MARYLAND 1999):
CASE EXAMPLE (BURNEY 1997):
CASE EXAMPLE (CALIFORNIA 1996):
CASE EXAMPLE (TEXAS 2002):
CASE EXAMPLE (NEW YORK 2003):
CASE EXAMPLE (CONNECTICUT 1998):
CASE EXAMPLE (WISCONSIN v. MICHAEL L. MORRIS 2002):
CASE EXAMPLE (CONNECTICUT 2003):
CASE EXAMPLE (UNITED STATES v. PEREZ 2003):
CASE EXAMPLE (WISCONSIN v. KOENCK 2001):
CASE EXAMPLE (CANADA 2001):
CASE EXAMPLE (FLORIDA 1999):
CASE EXAMPLE (Investigators posing as a fictitious victim, Wisconsin v. Kenney 2002):
CASE EXAMPLE (Investigators taking on the identity of a victim who has already been contacted):
CASE EXAMPLE (ADAPTED FROM CASEY 1999):
CASE EXAMPLE (ARIZONA v. BASS 2001):
CASE EXAMPLE (UNITED STATES v. HERSH 2001):

Chapter 21: Cyberstalking

CASE EXAMPLE (ASSOCIATED PRESS 1997):
CASE EXAMPLE
CASE EXAMPLE

Chapter 22: Digital Evidence as Alibi

CASE EXAMPLE



Digital Evidence and Computer Crime
Digital Evidence and Computer Crime, Second Edition
ISBN: 0121631044
EAN: 2147483647
Year: 2003
Pages: 279

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net