Geometry.Net - the online learning center
Home  - Basic_E - Electronic Evidence Criminal Investigation
e99.com Bookstore
  
Images 
Newsgroups
Page 5     81-91 of 91    Back | 1  | 2  | 3  | 4  | 5 
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Electronic Evidence Criminal Investigation:     more detail
  1. Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations by Computer Crime and Intellectual Property Section - Criminal Division, 2002
  2. Searching and seizing computers and obtaining electronic evidence in criminal investigations (SuDoc J 1.8/2:2001011797) by Orin S. Kerr, 2001
  3. Electronic crime scene investigation : a guide for first responders (SuDoc J 28.8/3:EL 1) by U.S. Dept of Justice, 2001
  4. Advances in Digital Forensics III (IFIP International Federation for Information Processing) (IFIP International Federation for Information Processing)
  5. Advances in Digital Forensics: IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13-16, ... Federation for Information Processing)
  6. Wiretaps by Anthony Alberti, 2002-01-30
  7. Voiceprint identification: Its forensic application by Fausto Poza, 1974
  8. The family lawyer by Will Bernard, 1966
  9. Seventh Circuit holds that Foreign Intelligence Surveillance Act permits use of wiretap evidence obtained in international investigation for domestic criminal ... An article from: International Law Update by Gale Reference Team, 2006-12-01
  10. Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors by Anthony Reyes, Richard Brittson, et all 2007-02-26
  11. Digital forensics in the twenty-first century.: An article from: The Forensic Examiner by Gavin W. Manes, 2007-12-22
  12. Search and Surveillance by Sybil Sharpe, De Montfort University, UK Sybil Sharpe, 2000-09

81. Electronic Crime Scene Investigation A Guide For Law Enforcement
investigation A Guide for First. RespondersWritten and Approved by the. Technical Working Group for Working Group for. electronic Crime Scene investigationJuly 2001U.S. or fraud, electronic
http://www.ncjrs.org/pdffiles1/nij/187736.pdf

82. E-Evidence Information Center - Forensic Links
The electronic evidence Information Center. Home. About This Site. Kudos. What's New. Digital Forensics BIBLIO. OS Specific Articles. ALL. Other Resources. Links to Links. DIGITAL FORENSIC PAGES "LINKS TO LINKS"
http://www.e-evidence.info/links.html
The Electronic Evidence Information Center Home About This Site Kudos What's New ... Links to Links DIGITAL FORENSIC PAGES: "LINKS TO LINKS" 4Law's Cyber Crime Links Page (Israel) Alexander Geschonneck's Forensic / Incident Response Links Asian School of Cyber Laws (ASCL) Online Cyber Law Library Index Blackhat.com's Media Archives CERIAS Digital Forensics Resources Computer Crime Research Center Computer Forensic Inc.'s Resource Center Computer Forensics and Cyber Crime Resources Computerworld's Computer forensics resources (links to tools) Cyber Criminals Most Wanted

83. Windows Security: Legal And CyberCrime Resources
Searching and Seizing Computers and Obtaining electronic evidence in CriminalInvestigations This publication provides a comprehensive guide to the legal
http://labmice.techtarget.com/security/securitylegal.htm
Home About Us Search Last Updated December 16, 2003 Windows 2000
Windows XP

BackOffice

Best of the Web
...
Cybercheese

Legal and CyberCrime Resources Although Hackers have been around for decades, they really haven't gotten the full attention of Congress until recently. As a result, few lawyers specialize in CyberCrime, not every State has a Computer Crime Squad, Computer Crime Laws vary from State to State, and Federal laws are still being tested in courts around the country. The Internet also complicates legal issues as your intruder may not even be in your State or Country. Hope these links help sort things out. Main Resource Links CIPS

The Computer Crime and Intellectual Property Section of the Department of Justice's web site. Lots of Info and Policy resources Computer Crime Research Resources
An exceptional resource from Florida State University's School of Library and Information Studies. Computer Crime
Original articles, cases and laws relating to Computer and High Technology Crimes. CPSR's Computer Crime Directory
A collection of resources from the Computing Professionals for Social Responsibility Cybercrimes.net

84. CIAETP Overview Page
course is to introduce criminal investigators to the seizing and searching computerevidence; recovering erased hard drives and other electronic media; using
http://www.fletc.gov/ffi/CIAETP_Ovr.htm
FINANCIAL FRAUD INSTITUTE MENU FFI Home Welcome to FFI Mission Statement History of FFI ... CRIMINAL INVESTIGATIONS IN AN AUTOMATED ENVIRONMENT (CIAETP) The CIAETP program is an intense course that requires substantial computer aptitude. Successful completion of a graded practical exercise is required for graduation. At the conclusion of the training program, the participants will be able to successfully assist a SCERS qualified investigator with the seizure and search of a computer. This knowledge will be demonstrated through the completion of several classroom practical exercises, a written computer examination report, and the recovery of hidden/erased/ disguised data from diskettes and hard drives on personal computer systems. It is recommended that you attend this course before attending the Seized Computer Evidence Recovery Specialist (SCERS) training program. SCERS students are required to possess all of the skills and technical information presented in this course before they attend the SCERS training program.
PROGRAM ADMINISTRATION
Length of Program
The training program encompasses 2 weeks (76 Hours), beginning on a Monday and ending on the second Friday, with the graduation scheduled at approximately 11:00 to 11:30 a.m. Travel days are Sunday and Friday after 12pm.

85. Criminal Investigations Bureau
the Internet, email or other electronic means. scientific tests on suspects and/orevidence as needed. tests given to recruits, employees, or criminal suspects
http://brgov.com/dept/brpd/criminal.htm

BRPD Home

Chief of Police

News and Press Releases

Crime Stoppers
...
Safety Tips

Email Public Information for questions on the City Parish Government.
Email the Webmaster to submit problems, suggestions or comments about this web site. Criminal Investigations Criminal Investigations offers some limited first-line response to the public, but is primarily responsible for follow-up investigations of major crimes. The commander of the Criminal Investigations Bureau is LT. Michael Morris . Divisions within the Criminal Investigations Bureau include:
  • Crimes Against Persons
  • Property Crimes
  • Investigative Support
  • Special Operations
Crimes Against Persons include the following divisions: Homicide, Robbery, Juvenile/Sex Crimes, Major Assaults/Missing Persons, Computer Crimes The Homicide division is responsible for investigating all criminal calls where a death or life threatening injury has occurred, any officer-involved shooting or the attempted murder of a police officer. The Armed Robbery division is responsible for investigating all criminal calls involving all degrees of robbery. The Juvenile/Sex Crimes division is responsible for maintaining juvenile investigation records, cases of child abuse, and all types of sex crimes.

86. Index2
States Federal Bureau of investigation Training Catalog Searching and Seizing ElectronicEvidence. International criminal Compliance Within Internet Boundaries
http://www.apectelwg.org/apec/comple/clecb/c_clecb.htm
Cybercrime Legislation and Enforcement Capacity Building
International Agreements
  • APEC Cybersecurity Strategy (2002). (Word Document) (html)
  • APEC Leaders' Statement on Fighting Terrorism and Promoting Growth (2002). (Word Document) (html)
  • United Nations General Assembly Resolution 55-63: Combating the Criminal Misuse of Information Technologies (2000). (Chinese pdf) (English pdf) (French pdf) (Japanese pdf) ... (Vietnamese pdf)
  • Permanent Council of the Organization of American States Final Report on the Meetings of Government Experts on Cyber Crime (1999). (pdf)
  • Council of Europe Convention on Cybercrime (2001). (Word Document) (html)
  • Explanation of the Council of Europe Convention on Cybercrime (2001). (html)
  • G8 Communiqu? Statement of Principles, and Action Plan (1997). (pdf) (Word Document)
  • APEC Economy Surveys
  • APEC Telecommunications and Information Working Group Report on Economy Implementations of the Ten Measures included in United Nations General Assembly Resolution 55-63 [Responses to 2002 Questionnaire]. (pdf) (Word Document)
  • Explanation of 2003 APEC Cybercrime Survey. (Word Document) (html)
    Survey Responses Organized By Economy
  • Nine Economy Summary Chart.
  • 87. Digital Forensics LLR; V1.2
    1999. 2 Searching and Seizing Computers and Obtaining electronic evidence inCriminal Investigations , Computer Crime and Intellectual Property Section
    http://www.grabpage.org/~lessons/Forensics/
    This site is best viewed using Warren Harrison A Prototype Repository Searching and Seizing Computers Best Practices for Seizing Electronic Evidence ... A Lessons Learned Repository for Computer Forensics , paper presented at the 2nd Digital Forensics Research Workshop (PDF) A Lessons Learned Repository for Computer Forensics , presentation at the 2nd Digital Forensics Research Workshop (PPT) NIJ JustNet National White Collar Crime Center The use of computers to store evidence by criminals has become more prevalent as our society has become increasingly computerized. It is now routine to find calendars, e-mails among co-conspirators, financial account information, detailed plans of crimes, telephone numbers and other artifacts that can be used as evidence in a criminal case stored on a hard drive, PDA or cell phone. However, every new computerized device or new software upgrade poses additional challenges to computer forensics experts who are already thinly stretched as case loads mount. There is little opportunity for innovation and research, and no slack to allow the luxury of reinventing the wheel for similar cases. A "Lesson Learned" is defined as: "A good work practice or innovative approach that is captured and shared to promote repeat application, or an adverse work practice or experience that is captured and shared to avoid recurrence[1]." In order to facilitate sharing information on computer forensics, we are developing a web-based Lessons-Learned Repository (LLR) to facilitate both the contribution and retrieval of Lessons.

    88. Links
    US DOJ Manual for Searching and Seizing Computers and Obtaining electronic Evidencein criminal Investigations http//www.cybercrime.gov/s smanual2002.htm.
    http://www.rcflwny.org/links.htm
    Here are a few links which will provide further information in the area of computer forensics.
    The Law Enforcement Coordinating Committee (LECC) on Information Technology - Western New York has established a general CyberCrime Website to assist all law enforcement in the investigation of computer-related crime. The Website is limited to law enforcement officials. It contains federal and state laws along with useful advice on how to proceed when Information Technology is involved in your investigation. Law Enforcement Officers should visit the website to obtain the necessary application for full access to the website and its information. Law Enforcement Coordinating Committee (LECC) on Information Technology - Western New York
    http://www.wdnytech.org
    Regional Computer Forensic Laboratory - National Program Office
    http://www.nporcfl.org/
    Regional Computer Forensics Laboratory - San Diego
    http://www.rcfl.org
    Computer Forensics Laboratory - Department of Defense
    http://www.dcfl.gov
    National Law Enforcement and Corrections Technology Center - Northeast
    http://www.nlectc.org/nlectcne/

    89. Message To The Senate Of The United States
    to have the ability to investigate computerrelated crime effectively and to obtainelectronic evidence in all types of criminal investigations and proceedings
    http://www.whitehouse.gov/news/releases/2003/11/20031117-11.html
    Issues Education Iraq National Security Economic Security ... More Issues
    News
    Current News Press Briefings Proclamations Executive Orders ... Radio News by Date March 2004 February 2004 January 2004 December 2003 ... January 2001
    Appointments Nominations Application
    Photos Photo Essays Search photos by date Federal Facts Federal Statistics West Wing History Home November 2003
    For Immediate Release
    Office of the Press Secretary
    November 17, 2003 Message to the Senate of the United States
    With a view to receiving the advice and consent of the Senate to ratification, I transmit herewith the Council of Europe Convention on Cybercrime (the "Cybercrime Convention" or the "Convention"), which was signed by the United States on November 23, 2001. In addition, for the information of the Senate, I transmit the report of the Department of State with respect to the Convention and the Convention's official Explanatory Report. The United States, in its capacity as an observer at the Council of Europe, participated actively in the elaboration of the Convention, which is the only multilateral treaty to address the problems of computer-related crime and electronic evidence gathering. An overview of the Conventions provisions is provided in the report of the Department of State. The report also sets forth proposed reservations and declarations that would be deposited by the United States with its instrument of ratification. With these reservations and declarations, the Convention would not require implementing legislation for the United States.

    90. IG Academy > Course Information > IG EERCTP

    http://www.tigta.gov/igacademy/course_igeerctp.html
    Please Select an IG Training Program Advanced Computer Crime Certification Basic Computer Crime Certification Basic Non-Criminal Investigations Editing Investigative Products Hotline Operator Training Inspector General Investigator Training Intermediate Computer Crime Certification Personal Digital Assistant Seizure Training Search Warrant Execution Transitional Training Undercover Operations document.write(lmonth + " ");document.write(date + ", " + year); Main Course Schedule Student Information Fact Sheet
    Inspector General Electronic Evidence Recognition and Collection Training Program (IG EERCTP)

    Printer Friendly Version

    Who should attend:
    The course is designed for special agents and investigative assistants who may encounter electronic evidence. This course is designed to raise awareness, impart knowledge, and provide the ability to react effectively when electronic media is used to commit a criminal or prohibited act. There are no prerequisites for this course.
    Length of Training: 3 Training Days
    Course Description:
    The IG EERCTP is a three-day, IG-specific training program designed for special agents and investigative assistants serving in a computer support role. The IG EERCTP consists of in-depth instruction in recognition of computer-based evidence, preservation of computer-based evidence, recognition of alternative electronic storage media, and administrative and legal issues. The course will cover in detail computer terminology, hardware, legal issues related to electronic evidence, roles of electronic media, and the first responders’ responsibilities.

    91. IG Academy > Course Information > Course Schedule

    http://www.tigta.gov/igacademy/course_schedule.html
    Please Select an IG Training Program Advanced Computer Crime Certification Basic Computer Crime Certification Basic Non-Criminal Investigations Editing Investigative Products Hotline Operator Training Inspector General Investigator Training Intermediate Computer Crime Certification Personal Digital Assistant Seizure Training Search Warrant Execution Transitional Training Undercover Operations document.write(lmonth + " ");document.write(date + ", " + year); Main Course Schedule Student Information Fact Sheet
    Course Schedule FY 2004

    Printer Friendly Version

    Please note: OIG employees should contact their agency training officer to schedule attendance in Academy training programs. The Academy can accept student registrations only from the designated OIG training officer.
    Dates of classes are subject to change; please contact the Academy at 912/261-3759 to confirm class dates.
    JAN
    FEB MAR APR ... TBA
    October 2003 top Begin - End Location Course Code Course Title Arlington IG PCGFTP 400 Procurement, Contract, and Grant Fraud Training Program November 2003 top Begin - End Location Course Code Course Title Arlington IG PCIITP 400 Public Corruption and Integrity Investigations Training Program Arlington IG EIPTP 400 Editing Investigative Products Training Program Glynco IG TTP 401 Transitional Training Program Arlington IG EERCTP 401 Electronic Evidence Recognition and Collection Training Program December 2003 top Begin - End Location Course Code Course Title Glynco IG BNCITP 401 Basic Non-Criminal Investigator Training Program January 2004

    A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 5     81-91 of 91    Back | 1  | 2  | 3  | 4  | 5 

    free hit counter