Washington, D.C. : U.S. Dept. of Justice, Office of Justice Programs, 2007.
139 pages : illustrations ; 28 cm.
NIJ special report.
Formatted Contents Note
Foreword Technical Working Group for the Investigation of High Technology Crimes Ch. 1. Introduction and investigative issues ch. 2. Tracing an Internet address to a source ch. 3. Investigations involving e-mail ch. 4. Investigations involving web sites ch. 5. Investigations involving instant message services, chat rooms, and IRC ch. 6. Investigations involving file sharing networks ch. 7. Investigations of network intrusion/denial of service ch. 8. Investigations involving bulletin boards, message boards, listservs, and newsgroups ch. 9. Legal issues Appx. A. Glossary Appx. B. Domain name extensions Appx. C. Accessing detailed headers in e-mail messages Appx. D. File sharing investigative suggested checklist Appx. E. Simple subpoenas and reports Appx. F. Examples of potential sources of evidence in network investigations Appx. G. Sample language for preservation request letters unde 18 U.S.C. 2703 (f) Appx. H. Sample language for 2703(d) court order and application Appx. I. Technical resource list Appx. J. Legal resource list Appx. K. List of organizations.
"Jan. 2007." "NCJ 210798." "Prepared under Interagency Agreement #2003-IJ-R-029 between the National Institute of Justice and the National Institute of Standards and Technology, Office of Law Enforcement Standards." -- Verso of t.p. "Report was developed by the Technical Working Group for the Investigation of High Technology Crimes and is intended to be a resource for individuals responsible for investigations involving the Internet and other computer networks." -- Foreword.
Also available via the Internet: Address as of 1/29/07: http://www.ncjrs.gov/pdffiles1/nij/210798.pdf.