FSU

CIS 4385, Sprint 2015: Introduction to Digital Forensics and Cybercrime

Introduction to Digital Forensics and Cybercrime

Digital Forensics

But what does a dictionary say? Here's Merriam-Webster's take on the word "forensics":

forensic, noun
Definition of FORENSIC
1 an argumentative exercise
2 plural but sing or plural in constr : the art or study of argumentative discourse
3 plural but sing or plural in constr : the application of scientific knowledge to legal problems; especially : scientific analysis of physical evidence (as from a crime scene)

Here's what vocabulary.com has to offer:

Forensics (noun), 1 scientific tests or techniques used in the investigation of crimes

Digital Forensics

In 2013, Florida adopted the Daubert standard in its statutes on the rules of evidence; in particular, look at sections 702 and 704.

Some of the important points about using the Daubert standard:

Cybercrime

Computer Science and the Idea of "State"

Digital Evidence can be Transitory and Evanescent

Digital Evidence can be Transitory and Evanescent

Digital Evidence can be Transitory and Evanescent

Digital Evidence is Often Indirect and Only Circumstantial

Digital Evidence is Often Indirect and Only Circumstantial

Categories of Cybercrimes: Physical Crimes

Categories of Cybercrimes: Physical Crimes



A good general reference noted for its characterizations and categorizations of computer crime is Donn Parker's book Fighting Computer Crime, which I abbreviate FCC. In particular, for fundamental characterizations, see pp. 16-18 of FCC.

The four crime categories that FCC establishes are (1) object of a crime (2) subject of a crime (3) tool for criminal activity (4) symbolic, used for intimidation or deception. DECC adds a fifth category, computers as a source of digital evidence, noting in particular the email correspondence between President Clinton and Monica Lewinsky strongly suggesting that Clinton had perjured himself.

Categories of Cybercrimes: Illegal Access and Use

Categories of Cybercrimes: Illegal Access and Use

Categories of Cybercrimes: Illegal Access and Use

Categories of Cybercrimes: Illegal Access and Use

Categories of Cybercrimes: Illegal Access and Use

Categories of Cybercrimes: Computers as a Simple Tool

Big Computer Crimes

Big Computer Crimes

Big Computer Crimes

  • Computers also played a part in the fall of Barings Bank, when Nick Leeson used his overly wide access to both front and back office information to hide massive trading losses. (See Nick Leeson's autobiography Rogue Trader.)
  • References

    DECC
    Digital Evidence and Computer Crime, 2nd edition, by Eoghan Casey. Academic Press, 2004. ISBN 0-12-163104-4.
    FCC
    Fighting Computer Crime, by Donn Parker. Wiley, 1998. ISBN 0-471-16378-3.
    CFCLE
    Computer Forensics: Cybercriminals, Laws, and Evidence, by Marie-Helen Maras. Jones & Bartlett, 2012. ISBN 978-1-4496-0072-3.