FSU

CIS 4385, Spring 2011: Introduction to Digital Forensics and Cybercrime

Introduction to Digital Forensics and Cybercrime

Digital Forensics

Digital Forensics

Please read about issues of the admissibility of scientific and other technical testimony embodied in the Frye standard (still in use in Florida) and the newer Daubert standard. Original Supreme Court material from both can be found in this pdf. (This is the one also linked on the class page as "starred" material.)

Computer Science and the Idea of "State"

Digital Evidence can be Transitory and Evanescent

Digital Evidence can be Transitory and Evanescent

Digital Evidence can be Transitory and Evanescent

Digital Evidence is Often Indirect and Only Circumstantial

Digital Evidence is Often Indirect and Only Circumstantial

Categories of Cybercrimes: Physical Crimes

Categories of Cybercrimes: Physical Crimes



A good general reference noted for its characterizations and categorizations of computer crime is Donn Parker's book Fighting Computer Crime, which I abbreviate FCC. In particular, for fundamental characterizations, see pp. 16-18 of FCC.

The four crime categories that FCC establishes are (1) object of a crime (2) subject of a crime (3) tool for criminal activity (4) symbolic, used for intimidation or deception. DECC adds a fifth category, computers as a source of digital evidence, noting in particular the email correspondence between President Clinton and Monica Lewinsky strongly suggesting that Clinton had perjured himself.

Categories of Cybercrimes: Illegal Access and Use

Categories of Cybercrimes: Illegal Access and Use

Categories of Cybercrimes: Illegal Access and Use

Categories of Cybercrimes: Illegal Access and Use

Categories of Cybercrimes: Illegal Access and Use

Categories of Cybercrimes: Computers as a Simple Tool

Big Computer Crimes

Big Computer Crimes

  • Computers also played a part in the fall of Barings Bank, when Nick Leeson used his overly wide access to both front and back office information to hide massive trading losses. (See Nick Leeson's autobiography Rogue Trader.)
  • Reading

    References

    DECC
    Digital Evidence and Computer Crime, 2nd edition, by Eoghan Casey. Academic Press, 2004. ISBN 0-12-163104-4.
    FCC
    Fighting Computer Crime, by Donn Parker. Wiley, 1998. ISBN 0-471-16378-3.