Add to Book Shelf
Flag as Inappropriate
Email this Book

Electronic Crime Needs Assessment for State and Local Law Enforcement

By Beaupre, David S.

Click here to view

Book Id: WPLBN0000662108
Format Type: PDF eBook:
File Size: 0.4 MB
Reproduction Date: 2005

Title: Electronic Crime Needs Assessment for State and Local Law Enforcement  
Author: Beaupre, David S.
Volume:
Language: English
Subject: Law., Law & economy, Litigation and arbitration
Collections: Law Library Collection
Historic
Publication Date:
Publisher: Department of Justice

Citation

APA MLA Chicago

S. Beaupr, B. D. (n.d.). Electronic Crime Needs Assessment for State and Local Law Enforcement. Retrieved from http://gutenberg.cc/


Description
Legal Reference Publication

Excerpt
Preface: Just as the Industrial Revolution brought unprecedented opportunity two centuries ago, so too has the Information Age. But the astronomical rate at which global technology has grown has opened new windows of opportunity for crime as well as economic progress. In 1996, the U.S. Department of Justice said: Whether [technology] benefits us or injures us depends almost entirely on the fingers on the keyboard. So while the Information Age holds great promise, it falls, in part, upon law enforcement to ensure that users of networks do not become victims of New Age crime. The rapid proliferation of computer systems, telecommunications networks, and other related technologies that we rely on daily has created complex and far-reaching interdependencies as well as concomitant, widespread vulnerabilities. Media reports of cyberthreats, whether perpetrated by hobbyist hackers, international terrorist organizations, or trusted employees, are increasing. According to a report released in 1998 by the Center for Strategic and International Studies.

Table of Contents
Contents Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Study Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Organization of the Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Research Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Validity, Reliability, and Expertise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Selection Criteria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Facilitators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Structuring the Interviews and Group Discussions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Findings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 State and Local Perspectives on Electronic Crime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Profile of Types of Electronic Crimes and Investigation Needs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 System Vulnerability, Critical Infrastructure, and Cyberterrorism . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Forensic Evidence Collection and Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Legal Issues and Prosecution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Training . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Commentary and the Critical Ten . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 The Critical Ten . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Appendixes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Appendix A: Participating State and Local Agencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Appendix B: Glossary of Terms and Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Appendix C: Contact Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

 
 



Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.