메뉴 건너뛰기




Volumn 23, Issue 1-2, 2009, Pages 99-108

Agents, Trojans and tags: The next generation of investigators

Author keywords

Digital evidence; Regulation; Remote searching

Indexed keywords


EID: 67849089096     PISSN: 13600869     EISSN: 13646885     Source Type: Journal    
DOI: 10.1080/13600860902836869     Document Type: Conference Paper
Times cited : (6)

References (36)
  • 1
    • 67849100827 scopus 로고    scopus 로고
    • Council of the European Union, Council Conclusions on a ConcertedWork Strategy and Prac- tical Measures Against Cybercrime, 2987th Justice and Home Affairs Council meeting, 27-28 November, available at
    • Council of the European Union, 'Council Conclusions on a ConcertedWork Strategy and Prac- tical Measures Against Cybercrime', 2987th Justice and Home Affairs Council meeting, 27-28 November 2008, available at http://www.ue2008.fr/webdav/site/PFUE/shared/import/ 1127_JAI/ Conclusions/JHA_Council_conclusions_Cybercrime_EN.pdf
    • (2008)
  • 3
    • 67849116523 scopus 로고    scopus 로고
    • D. Leppard, 'Police Set to Step up Hacking of Home PCs', Timesonline 4 January 2009, available at http://www.timesonline.co.uk/tol/news/politics/article5439604.ece
    • D. Leppard, 'Police Set to Step up Hacking of Home PCs', Timesonline 4 January 2009, available at http://www.timesonline.co.uk/tol/news/politics/article5439604.ece
  • 5
    • 67849108086 scopus 로고    scopus 로고
    • Die "Online-Durchsuchung" - Technischer Hintergrund des verdeckten hoheitlichen Zugriffs auf Computersysteme
    • U. Buermeyer, 'Die "Online-Durchsuchung" - Technischer Hintergrund des verdeckten hoheitlichen Zugriffs auf Computersysteme', Onlinezeitschrft für Höshstrichterliche Rechtsprechung zum Strafrecht 4 (2007): 154.
    • (2007) Onlinezeitschrft für Höshstrichterliche Rechtsprechung zum Strafrecht , vol.4 , pp. 154
    • Buermeyer, U.1
  • 7
    • 67849109614 scopus 로고    scopus 로고
    • Ermächtigungsgrundlage für die "Onlinedurchsuchung"?
    • G. Hornung, 'Ermächtigungsgrundlage für die "Onlinedurchsuchung"?', Datenschutz und Datensicherheit 31 (2007): 575-580.
    • (2007) Datenschutz und Datensicherheit , vol.31 , pp. 575-580
    • Hornung, G.1
  • 8
    • 67849106206 scopus 로고    scopus 로고
    • BGH, NJW 2007, 930
    • BGH, NJW 2007, 930.
  • 10
    • 67849098906 scopus 로고    scopus 로고
    • BVerfG, see note 2
    • BVerfG, see note 2.
  • 12
    • 67849132224 scopus 로고    scopus 로고
    • New Powers for Police to Hack your PC
    • 5 January 2009, available at
    • N. Morris, 'New Powers for Police to Hack your PC', The Independent 5 January 2009, available at http://www.independent.co.uk/news/uk/home-news/ new-powers-for-police-to-hack-your-pc-1225802.html
    • The Independent
    • Morris, N.1
  • 14
    • 67849118419 scopus 로고    scopus 로고
    • BVerfG, NJW 2006, 976
    • BVerfG, NJW 2006, 976
  • 15
  • 16
    • 67849116521 scopus 로고    scopus 로고
    • BGH, NStZ 2003, 670
    • BGH, NStZ 2003, 670.
  • 18
    • 67849096982 scopus 로고    scopus 로고
    • BGH, see note 7
    • BGH, see note 7.
  • 19
    • 67849098905 scopus 로고    scopus 로고
    • The interception of email traffic data could be subsumed under this article if it is a live intercep- tion; hence a dataflow exists between the suspect and the recipient. Due to their design however, RFS tools are most likely to search emails stored on the computer of the suspect. Also, a live interception of email traffic is technically still very difficult, if not impossible (G. Hornung, Ein neues Grundrecht, Computer und Recht 5 2008, 299
    • The interception of email traffic data could be subsumed under this article if it is a live intercep- tion; hence a dataflow exists between the suspect and the recipient. Due to their design however, RFS tools are most likely to search emails stored on the computer of the suspect. Also, a live interception of email traffic is technically still very difficult, if not impossible (G. Hornung, 'Ein neues Grundrecht', Computer und Recht 5 (2008): 299).
  • 20
    • 67849132225 scopus 로고    scopus 로고
    • BGH, see note 7
    • BGH, see note 7.
  • 21
    • 67849093930 scopus 로고    scopus 로고
    • The Taming of the Sleuth-Problems and Potential of Autonomous Agents in Crime Investigation and Prosecution
    • B. Schafer, 'The Taming of the Sleuth-Problems and Potential of Autonomous Agents in Crime Investigation and Prosecution', International Review of Law, Computers & Technology 20, nos. 1&2 (2006): 63.
    • (2006) International Review of Law, Computers & Technology , vol.20 , Issue.1-2 , pp. 63
    • Schafer, B.1
  • 22
    • 67849092097 scopus 로고    scopus 로고
    • See for example in
    • See for example in Germany, BVerfG, NJW 1990, 563.
    • , vol.1990 , Issue.563
    • Germany, B.1    NJW2
  • 23
    • 67849086519 scopus 로고    scopus 로고
    • BVerfG, see note 2
    • BVerfG, see note 2.
  • 24
    • 67849118418 scopus 로고    scopus 로고
    • German case law in the area developed subtle distinctions between a non-negotiable core of privacy and an 'outer layer' or privacy interest that can be balanced against other rights
    • German case law in the area developed subtle distinctions between a non-negotiable core of privacy and an 'outer layer' or privacy interest that can be balanced against other rights.
  • 25
    • 67849134850 scopus 로고    scopus 로고
    • BVerfG, see note 2
    • BVerfG, see note 2.
  • 27
    • 67849126478 scopus 로고    scopus 로고
    • A serious crime is defined as any offence attracting a jail sentence of three years or more
    • A serious crime is defined as any offence attracting a jail sentence of three years or more.
  • 28
    • 67849132978 scopus 로고    scopus 로고
    • See for example the case where a family was put under surveillance for 'suspected fraudulent school place applications' under provisions of RIPA, BBC, 'Council admits spying on family', April 2008, available at http://news.bbc.co.uk/1/hi/england/dorset/7341179.stm
    • See for example the case where a family was put under surveillance for 'suspected fraudulent school place applications' under provisions of RIPA, BBC, 'Council admits spying on family', April 2008, available at http://news.bbc.co.uk/1/hi/england/dorset/7341179.stm
  • 30
    • 67849132977 scopus 로고    scopus 로고
    • Confluence of Digital Evidence and the Law: On the Forensic Soundness of Live-Remote Digital Evidence Collection
    • E.E.Kenneally, 'Confluence of Digital Evidence and the Law: On the Forensic Soundness of Live-Remote Digital Evidence Collection', UCLA Journal of Law and Technology 9, no. 2 (2005): 3.
    • (2005) UCLA Journal of Law and Technology , vol.9 , Issue.2 , pp. 3
    • Kenneally, E.E.1
  • 32
    • 33745174196 scopus 로고    scopus 로고
    • Improving Evidence Acquisition from Live Network Sources
    • B.J. Nikkel, 'Improving Evidence Acquisition from Live Network Sources', Digital Investi-gation 3 (2006): 89.
    • (2006) Digital Investi-gation , vol.3 , pp. 89
    • Nikkel, B.J.1
  • 33
    • 10644254384 scopus 로고    scopus 로고
    • Tool Review - Remote Forensic Preservation and Examination Tools
    • E. Casey and A. Stanley, 'Tool Review - Remote Forensic Preservation and Examination Tools', Digital Examination 1 (2004): 284.
    • (2004) Digital Examination , vol.1 , pp. 284
    • Casey, E.1    Stanley, A.2
  • 34
    • 67849096981 scopus 로고    scopus 로고
    • UK Computer Misuse Act - The Trojan Virus Defence Regina v Aaron Caffrey, Southwark Crown Court, 17 October 2003
    • E. George, 'UK Computer Misuse Act - The Trojan Virus Defence Regina v Aaron Caffrey, Southwark Crown Court, 17 October 2003', Digital Investigation 1, no. 2 (2004): 89.
    • (2004) Digital Investigation , vol.1 , Issue.2 , pp. 89
    • George, E.1
  • 35
    • 67849108091 scopus 로고    scopus 로고
    • Big Browser Manning the Thin Blue Line - Computational Legal Theory Meets Law Enforcement
    • For the purpose of this article the focus will be on the crossing of borders between nation states. For a detailed analysis of the problem of borders in relation to the use of RFS tools see
    • For the purpose of this article the focus will be on the crossing of borders between nation states. For a detailed analysis of the problem of borders in relation to the use of RFS tools see W. Abel and B. Schafer, 'Big Browser Manning the Thin Blue Line - Computational Legal Theory Meets Law Enforcement', Problema 2 (2008): 51.
    • (2008) Problema , vol.2 , pp. 51
    • Abel, W.1    Schafer, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.