skip to content
High-technology crime : investigating cases involving computers Preview this item
ClosePreview this item
Checking...

High-technology crime : investigating cases involving computers

Author: Kenneth S Rosenblatt
Publisher: San Jose, Calif. : KSK Publications, ©1995.
Edition/Format:   Print book : 3.5 in. disc : English
Database:WorldCat
Summary:
This book provides law enforcement investigators, corporate investigators, prosecutors, and corporate counsel with step-by- step procedures for investigating cases that involve computers. The book uses the term "high-technology crime" to identify two types of crime associated with high technology. First, the term includes new crimes created by society's widespread use of computers; for example, the crime of breaking  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Document Type: Book
All Authors / Contributors: Kenneth S Rosenblatt
ISBN: 0964817101 9780964817104
OCLC Number: 34495180
Description: xxiv, 603 pages ; 23 cm + 1 computer disc (3 1/2 in.)
Contents: Using this book --
Acknowledgments --
1. Introduction --
2. Principles of high-technology crime investigation --
3. Investigating theft of components --
4. Investigating computer intrusion --
5. Investigating theft of information --
6. Searching, seizing, and analyzing computer evidence --
7. Computers and the Fourth Amendment --
8. Federal privacy laws --
9. Drafting search warrants in cases involving computers --
Appendix A. Checklists --
Appendix B. Search warrants (on disk) --
Appendix C. Protecting trade secrets during criminal prosecutions --
Appendix D. Tutorial --
Bibliography --
Table of Cases --
Index.
Responsibility: Kenneth S. Rosenblatt.

Abstract:

This book provides law enforcement investigators, corporate investigators, prosecutors, and corporate counsel with step-by- step procedures for investigating cases that involve computers. The book uses the term "high-technology crime" to identify two types of crime associated with high technology. First, the term includes new crimes created by society's widespread use of computers; for example, the crime of breaking and entering into computers flourished after businesses began connecting computers to sophisticated telecommunications networks. High-technology crime also includes traditional crimes so transformed by computer technology that investigators handling such cases must be familiar with computers and the high-technology industry. One chapter discusses basic principles common to investigating high- technology crime, and three chapters examine the most common high-technology crimes: theft of components, computer intrusion, and theft of information. These three chapters provide readers, including those with no technical background or competence, with the necessary technical information to investigate those crimes, along with a procedure for doing so. An appendix contains a checklist for these investigations. The second part of the book examines a growing challenge facing every law enforcement agency in the United States: safely and legally obtaining evidence stored within computers. Obtaining evidence from a computer without damaging equipment or losing data is just one part of the problem; there are also substantial legal hurdles to searching and seizing computer evidence. Few courts have applied the Fourth Amendment to searches for computer evidence, which means that the law in this area remains unclear. Three chapters discuss the legal obstacles to searching and seizing computer evidence and suggest how readers can draft search warrants to surmount those obstacles. A diskette contains investigative checklists and sample search warrant language. Appended introduction to computer technology and an article on how to protect trade secrets from disclosure during a criminal prosecution, along with a sample protective order to be used for that purpose.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/34495180> # High-technology crime : investigating cases involving computers
    a schema:Book, schema:CreativeWork ;
   library:oclcnum "34495180" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/cau> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/40598958#Place/san_jose_calif> ; # San Jose, Calif.
   schema:about <http://dewey.info/class/363.25968/e20/> ;
   schema:about <http://id.worldcat.org/fast/872065> ; # Computer crimes--Investigation
   schema:about <http://experiment.worldcat.org/entity/work/data/40598958#Topic/computer_crimes_investigation_united_states> ; # Computer crimes--Investigation--United States
   schema:about <http://id.worldcat.org/fast/1204155> ; # United States.
   schema:bookFormat bgn:PrintBook ;
   schema:copyrightYear "1995" ;
   schema:creator <http://viaf.org/viaf/60808796> ; # Kenneth S. Rosenblatt
   schema:datePublished "1995" ;
   schema:description "This book provides law enforcement investigators, corporate investigators, prosecutors, and corporate counsel with step-by- step procedures for investigating cases that involve computers. The book uses the term "high-technology crime" to identify two types of crime associated with high technology. First, the term includes new crimes created by society's widespread use of computers; for example, the crime of breaking and entering into computers flourished after businesses began connecting computers to sophisticated telecommunications networks. High-technology crime also includes traditional crimes so transformed by computer technology that investigators handling such cases must be familiar with computers and the high-technology industry. One chapter discusses basic principles common to investigating high- technology crime, and three chapters examine the most common high-technology crimes: theft of components, computer intrusion, and theft of information. These three chapters provide readers, including those with no technical background or competence, with the necessary technical information to investigate those crimes, along with a procedure for doing so. An appendix contains a checklist for these investigations. The second part of the book examines a growing challenge facing every law enforcement agency in the United States: safely and legally obtaining evidence stored within computers. Obtaining evidence from a computer without damaging equipment or losing data is just one part of the problem; there are also substantial legal hurdles to searching and seizing computer evidence. Few courts have applied the Fourth Amendment to searches for computer evidence, which means that the law in this area remains unclear. Three chapters discuss the legal obstacles to searching and seizing computer evidence and suggest how readers can draft search warrants to surmount those obstacles. A diskette contains investigative checklists and sample search warrant language. Appended introduction to computer technology and an article on how to protect trade secrets from disclosure during a criminal prosecution, along with a sample protective order to be used for that purpose."@en ;
   schema:description "Using this book -- Acknowledgments -- 1. Introduction -- 2. Principles of high-technology crime investigation -- 3. Investigating theft of components -- 4. Investigating computer intrusion -- 5. Investigating theft of information -- 6. Searching, seizing, and analyzing computer evidence -- 7. Computers and the Fourth Amendment -- 8. Federal privacy laws -- 9. Drafting search warrants in cases involving computers -- Appendix A. Checklists -- Appendix B. Search warrants (on disk) -- Appendix C. Protecting trade secrets during criminal prosecutions -- Appendix D. Tutorial -- Bibliography -- Table of Cases -- Index."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/40598958> ;
   schema:inLanguage "en" ;
   schema:name "High-technology crime : investigating cases involving computers"@en ;
   schema:productID "34495180" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/34495180#PublicationEvent/san_jose_calif_ksk_publications_1995> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/40598958#Agent/ksk_publications> ; # KSK Publications
   schema:workExample <http://worldcat.org/isbn/9780964817104> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/34495180> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/40598958#Agent/ksk_publications> # KSK Publications
    a bgn:Agent ;
   schema:name "KSK Publications" ;
    .

<http://experiment.worldcat.org/entity/work/data/40598958#Place/san_jose_calif> # San Jose, Calif.
    a schema:Place ;
   schema:name "San Jose, Calif." ;
    .

<http://experiment.worldcat.org/entity/work/data/40598958#Topic/computer_crimes_investigation_united_states> # Computer crimes--Investigation--United States
    a schema:Intangible ;
   schema:hasPart <http://id.loc.gov/authorities/subjects/sh85029493> ;
   schema:name "Computer crimes--Investigation--United States"@en ;
    .

<http://id.worldcat.org/fast/1204155> # United States.
    a schema:Place ;
   schema:name "United States." ;
    .

<http://id.worldcat.org/fast/872065> # Computer crimes--Investigation
    a schema:Intangible ;
   schema:name "Computer crimes--Investigation"@en ;
    .

<http://viaf.org/viaf/60808796> # Kenneth S. Rosenblatt
    a schema:Person ;
   schema:familyName "Rosenblatt" ;
   schema:givenName "Kenneth S." ;
   schema:name "Kenneth S. Rosenblatt" ;
    .

<http://worldcat.org/isbn/9780964817104>
    a schema:ProductModel ;
   schema:isbn "0964817101" ;
   schema:isbn "9780964817104" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.