Issues in Computer Forensics
Issues in Computer Forensics
Issues in Computer Forensics
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
31 Michael A Caloyannides. <strong>Computer</strong> <strong>Forensics</strong> and Privacy. Artech House, Boston 2001. pgs. 58-64<br />
32 Eric N. Newburger, “Current Population Reports: Home <strong>Computer</strong>s and Internet Use <strong>in</strong> the United<br />
States: August 2000.” U.S. Census Bureau. September 2001, [cited May 21, 2003]; available from<br />
www.census.gov/prod/2001pubs/p23-207.pdf23<br />
33 The Constitution of the United States. (Philadelphia: National Constitution Center, 1997), 22.<br />
34 <strong>Computer</strong> Crime and Intellectual Property Section, Crim<strong>in</strong>al Division, United States Department of<br />
Justice, “Search<strong>in</strong>g and Seiz<strong>in</strong>g <strong>Computer</strong>s and Obta<strong>in</strong><strong>in</strong>g Electronic Evidence <strong>in</strong> Crim<strong>in</strong>al Investigations.”<br />
July 2002, [cited May 21, 2003], p. 9 available from www.cybercrime.gov/s&smanual2002.htm<br />
35<br />
F<strong>in</strong>dLaw Cases and Codes. “United States vs. Grimes” March 7, 2001, [cited May 21, 2003], available<br />
from http://laws.lp.f<strong>in</strong>dlaw.com/getcase/5th/case/0040495cr0&exact=1<br />
36 Ibid.<br />
37 <strong>Computer</strong> Crime, 14.<br />
38 Ibid, 12.<br />
39 Ibid, 19.<br />
40 Ibid, 19.<br />
41 Ibid, 37.<br />
42 Ibid, 54.<br />
43<br />
Electronic Communications Privacy Act of 1986, 18 U.S.C 2703. October 21, 1986. [cited May 21,<br />
2003]; available at www.cpsr.org/cpsr/privacy/wiretap/ecpa86.html<br />
44 <strong>Computer</strong> Crime, 70.<br />
45 Chapter 119 - Wire and Electronic Communications Interception and Interception of Oral<br />
Communications. United States Code Annotated, Title 18. Crimes and Crim<strong>in</strong>al Procedure, Part 1 –<br />
Crimes. [cited May 21, 2003]; available at www.cybercrime.gov/wiretap2510_2522.htm<br />
46<br />
David L. Sobel, “Will Carnivore Devour Onl<strong>in</strong>e Privacy?” IEEE <strong>Computer</strong> V. 34, No. 5 (May 2001), 87-<br />
88.<br />
47 Kev<strong>in</strong> DiGregory, Statement Before the Subcommittee on the Judiciary on “Carnivore” and the Fourth<br />
Amendment. July 24, 2000. [cited May 21, 2003]; available at www.cybercrime.gov/carnivore.htm<br />
48 Sobel, 87.<br />
49<br />
“Why Carnivore is bad for you (reason #1)” StopCarnivore.org, 2000 [cited May 21, 2003]; available at<br />
http://stopcarnivore.org/whyitsbad/reason1.htm<br />
50 Carrie Davis, “Kiss Your Privacy Goodbye: Onl<strong>in</strong>e Anonymity Post-9/11” The Internet Law Journal.<br />
January 21, 2003. [cited May 21, 2003]; available at www.tilj.com/content/ecomarticle01210302.htm, 4.<br />
34