Internet and Communications Surveillance
Two interesting articles defining to some extent the use of technological techniques and tools that are deployed.
http//
http//
Imagine you are asked to do a case and provide a quote where the engaging instructions state Can you identify the location of the perpetrator in this cybercrime matter? Imagine all the possibilities? Cybercrime doesn't even start to identify the real technological investigation, but it is clear for appropriate identification purposes the title "cybercrime" doesn't do anymore than create a blur as to what it is actually referring.
Moreover, a concern might be whether cybercrime actually might just be used to produce an output evidence with the reduction or removal of the technical understanding of what is behind it or a mere passing reference to where the suggested evidence came from. That being so the evidence simply may become the product of someone writing down a car number plate in the dust on the road. The later maybe evidence, but it is technology from many disciplines ( http//