U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Handbook of Computer Crime Investigation: Forensic Tools and Technology

NCJ Number
195111
Editor(s)
Eoghan Casey
Date Published
2002
Length
462 pages
Annotation
This book is designed to serve as a resource for forensic examiners who investigate crimes involving networked computers, wireless devices, or embedded systems.
Abstract
The authors of this book have attempted to fill a gap in knowledge concerning how to best investigate crimes involving networked computers, wireless devices, and embedded systems. The 14 chapters of this book provide the specialized technical knowledge and investigative experience of many experts. The result is a unique guide for forensic scientists, attorneys, law enforcement, and computer professionals who must sort through and make sense of digital evidence of any kind. There are three themes in this book: tools, technology, and case examples. The tools section, comprising chapters three through six, introduce a variety of tools that may be used by professionals when investigating computer crimes. Case examples are presented that demonstrate their usefulness. The technology section, which includes chapters 7 through 11, provides detailed technical descriptions of digital evidence analysis that may be used in commonly encountered situations. This section begins with computer evidence analysis, moves on to network analysis, and culminates with how to best investigate embedded systems. Also contained in this section on technology is a demonstration of how forensic science is applied in different technological settings, providing forensic experts with technical information and guidance. In the final section on case examples, which spans chapters 12 through 14, case studies are presented by experienced investigators and examiners to give readers a sense of the technical, legal, and practical challenges that arise during the course of computer crime investigations. appendixes, index