skip navigation

CrimeSolutions.gov

Add your conference to our Justice Events calendar

PUBLICATIONS

NCJRS Abstract

The document referenced below is part of the NCJRS Library collection.
To conduct further searches of the collection, visit the NCJRS Abstracts Database.

How to Obtain Documents
 
NCJ Number: NCJ 210798   Add to Shopping cart   Find in a Library
Title: Investigations Involving the Internet and Computer Networks
Corporate Author: National Institute of Standards and Technology (NIST)
United States of America
Date Published: 2007
Page Count: 137
Sponsoring Agency: National Institute of Justice
US Department of Justice
Office of Justice Programs
United States of America
Grant Number: 2003-IJ-R-029
Sale Source: National Institute of Justice/NCJRS
Box 6000
Rockville, MD 20849
United States of America

NCJRS Photocopy Services
Box 6000
Rockville, MD 20849-6000
United States of America
Document: PDF 
Type: Handbook
Language: English
Country: United States of America
Annotation: This report provides information for investigators responsible for probing Internet or other computer-related crimes.
Abstract: The report offers information on the investigation process from the first responder to the courtroom. Specific topics addressed include: (1) electronic crime scene investigation by first responders; (2) forensic examination of digital evidence; (3) internet and network investigations; (4) investigative uses of technology; (5) courtroom presentation of digital evidence; and (6) development of a digital evidence forensic unit. Chapter 1 introduces the main issues facing investigators of computer-related and Internet crimes. Sources of information are identified as well as the major issues investigators should be concerned with, such as the fragility of digital evidence and rules governing the chain-of-custody and other legal processes. Chapter 2 offers information on tracing an Internet address to a source, which is a key component of investigations involving the Internet and computer networks. Chapter 3 focuses on investigations involving e-mail, which are now easily exchanged using cell phones, personal digital assistants, and pagers. Chapter 4 offers methods and practices for investigations involving Web sites and suggests the use of an undercover computer and Internet Service Provider (ISP) account or other covert methods to disguise the efforts of investigators. Chapter 5 moves along to investigations involving instant messengers (IM), chat rooms, and Internet Relay Chat (IRC), which allow real-time communications. File sharing networks are increasingly being exploited for criminal activities; chapter 6 offers tips for investigations involving file sharing networks, which may encompass child pornography, copyrighting, intellectual property, financial, or personal identification offenses. Chapter 7 presents information regarding the investigation of network intrusion/denial of service offenses. These investigations, which may involve the use of viruses, Trojans, or worms, can be complex and the assistance of outside expertise may be required. Chapter 8 addresses investigations involving bulletin boards, message boards, listservs, and newsgroups while chapter 9 focuses on the legal issues governing investigations of computer-related crimes. Appendixes
Main Term(s): Computer crime investigative Training
Index Term(s): Child abuse investigations ; Computer aided investigations ; Criminal investigation overview
Note: NIJ Special Report; downloaded February, 2, 2007.
   
  To cite this abstract, use the following link:
https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=210798

* A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's web site is provided.