Book Review: Computer Crime, Investigation, and the Law

Published date01 March 2012
DOI10.1177/0734016811405286
AuthorReza Barmaki
Date01 March 2012
Subject MatterBook Reviews
grammar issues do affect readability, the study is organized well and adds substantially to
knowledge on cybercrime, how it is currently being combated, and the c hanges that are needed
to make methods of fighting cybercrime more effective.
C. Easttom and J. Taylor
Computer Crime, Investigation, and the Law. Boston, MA: Course Technology PTR, 2011. xvii, 499 pp., $49.99.
ISBN 978-1-4354-5532-0
Reviewed by: Reza Barmaki, University of Toronto (Mississauga), Ontario, Canada
DOI: 10.1177/0734016811405286
By depicting finger prints, a laptop computer, the binary numeral system (0, 1), and rays of light, the
colorful cover of Computer Crime, Investigation, and the Law means to give its content an aura of
‘‘scientific’’ validity. The content, however, does not live up to the image and only promises the reader
‘‘asolid working knowledge of computer crimes and investigations’’ (p. xvii). It is written by two non-
academic experts. One is Chuck Easttom, a computer expert with 16þyears experience in the field.
The other, Jeffrey Taylor, is a police detective with about 30 years of experience. This collaboration
has allowed for a combination of a detailed knowledge of the intricacies of the computer world and a
first-hand knowledge of complexities of law enforcement that delivers on the promise.
Looking at the title of the book, I expected it to be nothing but a massive jumble of computer and
legal jargon requiring expert knowledge of these fields to unravel. This was not so. The authors have
been able to produce a highly accessible work for the average reader with some basic knowledge of
computers, law, and law enforcement. The language of the book is simple enough to keep the reader
interested throughout the book. Technical jargons are minimal, and when used, they are clearly
explained.
The book contains five parts, each covering a specific topic and subdivided to a number of chap-
ters (a total of 18 chapters). Part one is composed of six chapters. Chapter 1 introduces the reader to
various forms of computer crimes, such as identity theft, data piracy, hate crimes, cyberterrorism,
and fraudulent investment offers. Chapter 2 provides a history of computer crime in the United
States that began with ‘‘pranks played on computer systems at universities by bright inquisitive stu-
dents’’ (p. 33). Chapters 3 and 4 cover the history of the computer-crime–related legislation in the
United States. Chapter 5 provides a discussion on some of the techniques used by computer crim-
inals such us data piracy, hacking, and identity-theft methods. Chapter 6 covers cyberterrorism and
online-organized crime (e.g., identity theft, trafficking in stolen goods, and prostitution). Ample
examples, and some visual aids, are provided in all chapters in order to guide the reader through.
The four chapters (7, 8, 9, and 10) of Part two (entitled ‘‘Computer Forensics’’) discuss various
methods of collection of electronic evidence by law enforcement agents. They cover methods of
collecting evidence from a computer’s hardware, operating system, and other sources such as routers,
e-mails, fire walls, and the computer’s security software. They also discuss the importance of proce-
dural and jurisdictional issues that law enforcement agents must follow during their investigations.
The three chapters (11, 12, and 13) of Part three discuss the use of computer experts in criminal
and civil legal proceedings, depositions, and trials related to computer crimes. Chapter 11 discusses
the criteria that the police or lawyers use when it comes to choosing someone as an expert witness or
collaborator in a legal case or police investigation. It discusses matters such as the candidates’ tech-
nical knowledge, certification, personality, and credibility. Chapter 12 discusses matters related to
depositions and trials: examining evidence, preparing for trial, and conducting a trial. Chapter 13 dis-
cusses the advantages, disadvantages, and processes related to pursing a computer-crime–related
case in a civil court rather than a criminal one.
132 Criminal Justice Review 37(1)

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT