03.03.2013 Views

Issues in Computer Forensics

Issues in Computer Forensics

Issues in Computer Forensics

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

31 Michael A Caloyannides. <strong>Computer</strong> <strong>Forensics</strong> and Privacy. Artech House, Boston 2001. pgs. 58-64<br />

32 Eric N. Newburger, “Current Population Reports: Home <strong>Computer</strong>s and Internet Use <strong>in</strong> the United<br />

States: August 2000.” U.S. Census Bureau. September 2001, [cited May 21, 2003]; available from<br />

www.census.gov/prod/2001pubs/p23-207.pdf23<br />

33 The Constitution of the United States. (Philadelphia: National Constitution Center, 1997), 22.<br />

34 <strong>Computer</strong> Crime and Intellectual Property Section, Crim<strong>in</strong>al Division, United States Department of<br />

Justice, “Search<strong>in</strong>g and Seiz<strong>in</strong>g <strong>Computer</strong>s and Obta<strong>in</strong><strong>in</strong>g Electronic Evidence <strong>in</strong> Crim<strong>in</strong>al Investigations.”<br />

July 2002, [cited May 21, 2003], p. 9 available from www.cybercrime.gov/s&smanual2002.htm<br />

35<br />

F<strong>in</strong>dLaw Cases and Codes. “United States vs. Grimes” March 7, 2001, [cited May 21, 2003], available<br />

from http://laws.lp.f<strong>in</strong>dlaw.com/getcase/5th/case/0040495cr0&exact=1<br />

36 Ibid.<br />

37 <strong>Computer</strong> Crime, 14.<br />

38 Ibid, 12.<br />

39 Ibid, 19.<br />

40 Ibid, 19.<br />

41 Ibid, 37.<br />

42 Ibid, 54.<br />

43<br />

Electronic Communications Privacy Act of 1986, 18 U.S.C 2703. October 21, 1986. [cited May 21,<br />

2003]; available at www.cpsr.org/cpsr/privacy/wiretap/ecpa86.html<br />

44 <strong>Computer</strong> Crime, 70.<br />

45 Chapter 119 - Wire and Electronic Communications Interception and Interception of Oral<br />

Communications. United States Code Annotated, Title 18. Crimes and Crim<strong>in</strong>al Procedure, Part 1 –<br />

Crimes. [cited May 21, 2003]; available at www.cybercrime.gov/wiretap2510_2522.htm<br />

46<br />

David L. Sobel, “Will Carnivore Devour Onl<strong>in</strong>e Privacy?” IEEE <strong>Computer</strong> V. 34, No. 5 (May 2001), 87-<br />

88.<br />

47 Kev<strong>in</strong> DiGregory, Statement Before the Subcommittee on the Judiciary on “Carnivore” and the Fourth<br />

Amendment. July 24, 2000. [cited May 21, 2003]; available at www.cybercrime.gov/carnivore.htm<br />

48 Sobel, 87.<br />

49<br />

“Why Carnivore is bad for you (reason #1)” StopCarnivore.org, 2000 [cited May 21, 2003]; available at<br />

http://stopcarnivore.org/whyitsbad/reason1.htm<br />

50 Carrie Davis, “Kiss Your Privacy Goodbye: Onl<strong>in</strong>e Anonymity Post-9/11” The Internet Law Journal.<br />

January 21, 2003. [cited May 21, 2003]; available at www.tilj.com/content/ecomarticle01210302.htm, 4.<br />

34

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!