Using Social Media Evidence in the Criminal Procedure ______

Total Page:16

File Type:pdf, Size:1020Kb

Using Social Media Evidence in the Criminal Procedure ______ Alma Mater Studiorum – Università di Bologna In collaborazione con LAST-JD consortium: Università degli studi di Torino Universitat Autonoma de Barcelona Mykolas Romeris University Tilburg University DOTTORATO DI RICERCA IN Erasmus Mundus Joint International Doctoral Degree in Law, Science and Technology Ciclo 29 – A.Y. 2013/2014 Settore Concorsuale di afferenza: 12H3 Settore Scientifico disciplinare: IUS20 TITOLO TESI Knowledge Production from Social Network Sites - Using Social Media Evidence in the Criminal Procedure _______________________________ Presentata da: Chih-Ping Chang Coordinatore Relatore Prof. Giovanni Sartor Prof. Dr. Alberto Artosi CIRSFID, University of Bologna, Italy Co- Relatore Prof. Dr. Giovanni Ziccardi University of Milan, Italy Esame finale anno 2018 Alma Mater Studiorum – Università di Bologna in partnership with LAST-JD Consoritum Università degli studi di Torino Universitat Autonoma de Barcelona Mykolas Romeris University Tilburg University PhD Programme in Erasmus Mundus Joint International Doctoral Degree in Law, Science and Technology Cycle 29 – a.y. 2013/14 Settore Concorsuale di afferenza: 12H3 Settore Scientifico disciplinare: IUS20 (Title of the Thesis) Knowledge Production from Social Network Sites - Using Social Media Evidence in the Criminal Procedure Submitted by: Chih-Ping Chang The PhD Programme Coordinator Supervisor (s) Prof. Giovanni Sartor Prof. Dr. Alberto Artosi CIRSFID, University of Bologna, Italy Prof. Dr. Giovanni Ziccardi University of Milan, Italy Year 2018 Abstract This thesis focuses on the interaction between social network sites (SNS) and the legal system, trying to answer a specific question, that is, through introducing social media evidence, whether there is a change of finding facts and identifying the truth in criminal proceedings. To achieve the research objectives, three sub-topics should be discussed in turn; first, how can we transform information on social network sites to valuable evidence in court? In this part, the research will explore the proceedings of extracting information on SNS, such as posts, photos, check-in on Facebook etc., in order to use as evidence in the courtroom from the perspectives of law and internet forensic. Second, considering characteristics of these social media evidence, e.g. easy to be copied, deleted, tampered and transmitted, is it necessary to separate from evidence obtained through other technology or forensic science? Should the legal system need a new set of regulation on social media evidence? Third, how can we conquer challenges to core values in legal system, such as the privilege against self-incrimination or expectation of innocent in this digital era? As the positive contribution, this research tries to answer whether social network sites are a convenient tool for criminal prosecution, and whether internet forensics is useful to assist the investigational authority accusing the crime and finding the truth more accurately, to achieve the ultimate goal of the criminal procedure? Table of Contents INTRODUCTION ...................................................................................................... ‐ 11 ‐ RESEARCH MOTIVATIONS ............................................................................................ ‐ 11 ‐ 1. A START FROM A SIMPLE CASE, WHICH MIGHT HAPPEN DAILY ............................ - 11 - 2. PRIVACY CRISIS? ........................................................................................................ - 14 - 3. INTERACTIONS BETWEEN THE LAW AND SCIENCE ................................................... - 19 - 3.1 Negligence in Forensic Process ................................................................................. ‐ 20 ‐ 3.2 Paradigm Shift and New Objectivity ........................................................................ ‐ 23 ‐ RESEARCH QUESTIONS ................................................................................................ ‐ 27 ‐ METHODOLOGY ........................................................................................................... ‐ 29 ‐ STRUCTURE OF THIS THESIS ........................................................................................ ‐ 31 ‐ CHAPTER 1 SOCIAL MEDIA EVIDENCE ............................................................. ‐ 38 ‐ 1. DEFINITION ................................................................................................................. - 38 - 1.1 Social Network Sites .................................................................................................. ‐ 39 ‐ 1.1.1 Structure of Social Network Sites ........................................................................... ‐ 41 ‐ 1.1.2 Characteristics ......................................................................................................... ‐ 42 ‐ 1.2 Social Media .............................................................................................................. ‐ 44 ‐ 1.3 Social Media Evidence ............................................................................................... ‐ 45 ‐ 2. TYPES AND FORMATS OF SOCIAL MEDIA EVIDENCE ................................................ - 46 - 3. ACQUISITIONS (HOW TO GET IT?) ............................................................................ - 47 - 3.1 Computer Forensics ................................................................................................... ‐ 48 ‐ 3.2 Digital Forensics ........................................................................................................ ‐ 48 ‐ 3.3 Network/ Internet Forensics ....................................................................................... ‐ 49 ‐ 4. TYPES OF EVIDENCE IN LEGAL SYSTEMS ................................................................. - 50 - 4.1 Digital Evidence ......................................................................................................... ‐ 51 ‐ 4.2 Scientific Evidence .................................................................................................... ‐ 52 ‐ 4.3 Social Media Evidence ............................................................................................... ‐ 54 ‐ 5. OTHER SIMILAR CHARACTERISTICS WITH DIGITAL EVIDENCE ............................. - 54 - 5.1 Vulnerable to Tampering ............................................................................................ ‐ 55 ‐ 5.2 Possible to Recovery .................................................................................................. ‐ 55 ‐ 5.3 Unlimited to Copy ...................................................................................................... ‐ 56 ‐ 5.4 Hard to Identify .......................................................................................................... ‐ 57 ‐ 5.5 Cannot directly to Sense or Understand by Human ................................................... ‐ 58 ‐ ‐ 1 ‐ 5.6 Difficult to Collect ..................................................................................................... ‐ 59 ‐ 5.7 Dependence on the Environment ............................................................................... ‐ 59 ‐ 6. SUMMARY .................................................................................................................... - 60 - CHAPTER 2 SOCIAL MEDIA EVIDENCE IN CRIMINAL PROCEDURE ........... ‐ 64 ‐ SECTION 1 DIFFERENCE BETWEEN TAIWAN AND AMERICAN LEGAL SYSTEM .............. ‐ 64 ‐ 1. RULE OF EVIDENCE IN AMERICA ............................................................................... - 65 - 2. RULE OF EVIDENCE IN TAIWAN ................................................................................. - 66 - SECTION 2 AMERICAN LAW .......................................................................................... ‐ 67 ‐ 3. DISCOVERABILITY OF EVIDENCE .............................................................................. - 70 - 3.1 Rules for Search and Seizure ..................................................................................... ‐ 72 ‐ 3.1.1 The Standard: Reasonable Expectation of Privacy ................................................. ‐ 72 ‐ 3.1.2 Operation Rules of Search on Social Network Sites ............................................... ‐ 73 ‐ 3.2 Obtain Evidence from Public Domain ....................................................................... ‐ 76 ‐ 3.3 Search with a Warrant ................................................................................................ ‐ 78 ‐ 3.3.1 Probable Cause ........................................................................................................ ‐ 78 ‐ 3.3.2 Requirement of Particularity ................................................................................... ‐ 79 ‐ 3.4 Exceptions for the Search without Warrant ................................................................ ‐ 82 ‐ 3.4.1 Search with Subject’s Consent ................................................................................ ‐ 82 ‐ 3.4.1.1 Consent ................................................................................................................. ‐ 83 ‐ 3.4.1.2 Scope of Consent ................................................................................................. ‐ 84 ‐ 3.4.1.3 The Third Party Consent ...................................................................................... ‐ 85 ‐ 3.4.2 Exigent Circumstances ...........................................................................................
Recommended publications
  • Digital Investigation and Trojan Defense.Pdf
    Digital Investigation and the Trojan Defense, Revisited Golden G. Richard III Professor of Computer Science and University Research Professor Director, Greater New Orleans Center for Information Assurance (GNOCIA) University of New Orleans GIAC-certified Digital Forensics Investigator Founder, Arcane Alloy, LLC [email protected] / [email protected] / @nolaforensix http://www.cs.uno.edu/~golden 2 Who? Professor of Computer Science and University Research Professor, Director, Greater New Orleans Center for Information Assurance (GNOCIA), University of New Orleans http://www.cs.uno.edu/~golden Digital forensics, OS internals, reverse engineering, offensive computing, pushing students to the brink of destruction, et al. Founder, Arcane Alloy, LLC. http://www.arcanealloy.com Digital forensics, reverse engineering, malware analysis, security research, tool development, training. Co-Founder, Partner / Photographer, High ISO Music, LLC. http://www.highisomusic.com Music. Rock stars. Earplugs. Copyright 2015 by Golden G. Richard III (@nolaforensix) 3 Digital Forensics “Tools and techniques to recover, preserve, and examine digital evidence stored on or transmitted by digital devices.” Computers, PDAs, cellular phones, videogame consoles, digital cameras, copy machines, printers, digital voice recorders… 4 What That Really Means • Data. “You only think it’s gone.” • Sensitive data tenaciously clings to life. • The vast majority of users—and lots of technical people, too— have no idea what’s really stored on their digital devices… • …and no ability to properly “clean up” even if they do suspect what’s there Copyright 2015 by Golden G. Richard III (@nolaforensix) 5 Where’s the Evidence? Files and Filesystem Application Windows Deleted Files metadata metadata registry Print spool Hibernation Temp files Log files files files Browser Network Slack space Swap files caches traces RAM: OS and app data Volatile Evidence structures Copyright 2015 by Golden G.
    [Show full text]
  • Copyright 2013 Shawn Patrick Gilmore
    Copyright 2013 Shawn Patrick Gilmore THE INVENTION OF THE GRAPHIC NOVEL: UNDERGROUND COMIX AND CORPORATE AESTHETICS BY SHAWN PATRICK GILMORE DISSERTATION Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in English in the Graduate College of the University of Illinois at Urbana-Champaign, 2013 Urbana, Illinois Doctoral Committee: Professor Michael Rothberg, Chair Professor Cary Nelson Associate Professor James Hansen Associate Professor Stephanie Foote ii Abstract This dissertation explores what I term the invention of the graphic novel, or more specifically, the process by which stories told in comics (or graphic narratives) form became longer, more complex, concerned with deeper themes and symbolism, and formally more coherent, ultimately requiring a new publication format, which came to be known as the graphic novel. This format was invented in fits and starts throughout the twentieth century, and I argue throughout this dissertation that only by examining the nuances of the publishing history of twentieth-century comics can we fully understand the process by which the graphic novel emerged. In particular, I show that previous studies of the history of comics tend to focus on one of two broad genealogies: 1) corporate, commercially-oriented, typically superhero-focused comic books, produced by teams of artists; 2) individually-produced, counter-cultural, typically autobiographical underground comix and their subsequent progeny. In this dissertation, I bring these two genealogies together, demonstrating that we can only truly understand the evolution of comics toward the graphic novel format by considering the movement of artists between these two camps and the works that they produced along the way.
    [Show full text]
  • Protecting the Children: Challenges That Result In, and Consequences Resulting From, Inconsistent Prosecution of Child Pornography Cases in a Technical World, 16 Rich
    Richmond Journal of Law and Technology Volume 16 | Issue 3 Article 5 2010 Protecting The hiC ldren: Challenges That Result In, And Consequences Resulting From, Inconsistent Prosecution Of Child Pornography Cases In A Technical World Francis S. Monterosso Follow this and additional works at: http://scholarship.richmond.edu/jolt Part of the Computer Law Commons, and the Internet Law Commons Recommended Citation Francis S. Monterosso, Protecting The Children: Challenges That Result In, And Consequences Resulting From, Inconsistent Prosecution Of Child Pornography Cases In A Technical World, 16 Rich. J.L. & Tech 11 (2010). Available at: http://scholarship.richmond.edu/jolt/vol16/iss3/5 This Article is brought to you for free and open access by UR Scholarship Repository. It has been accepted for inclusion in Richmond Journal of Law and Technology by an authorized administrator of UR Scholarship Repository. For more information, please contact [email protected]. Richmond Journal of Law & Technology Volume XVI, Issue 3 PROTECTING THE CHILDREN : CHALLENGES THAT RESULT IN, AND CONSEQUENCES RESULTING FROM , INCONSISTENT PROSECUTION OF CHILD PORNOGRAPHY CASES IN A TECHNICAL WORLD By Francis S. Monterosso * Cite as: Francis S. Monterosso, Note: Protecting the Children: Challenges that Result In, and Consequences Resulting From, Inconsistent Prosecution of Child Pornography Cases in a Technical World , XVI Rich. J.L. & Tech. 11 (2010), http://jolt.richmond.edu/v16i3/ article11.pdf. INTRODUCTION Of all the sinister things that Internet viruses do, this might be the worst: They can make you an unsuspecting collector of child pornography. Heinous pictures and videos can be deposited on computers by viruses—the malicious programs better known for swiping your credit card numbers.
    [Show full text]
  • 1 in the UNITED STATES DISTRICT COURT for the EASTERN DISTRICT of PENNSYLVANIA WARREN PUBLISHING COMPANY and : JAMES WARREN
    IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA WARREN PUBLISHING COMPANY and : JAMES WARREN, : Plaintiffs, : CIVIL ACTION : v. : : No. 08-3399 J. DAVID SPURLOCK d/b/a : VANGUARD PRODUCTIONS, : Defendant. : MEMORANDUM RE: DEFENDANT’S MOTION FOR ATTORNEY FEES Baylson, J. March 3, 2010 I. Introduction Plaintiffs James Warren and the Warren Publishing Company, of which James Warren is president and sole shareholder (collectively, “Plaintiffs”), commenced this copyright infringement action against Defendant J. David Spurlock, sole proprietor of publishing company Vanguard Productions. On August 4, 2009, the Court granted summary judgment in favor of Spurlock on the basis of fair use. Warren Publ’g Co. v. Spurlock , 645 F. Supp. 2d 402, 405 (E.D. Pa. 2009). Presently pending before the Court is Spurlock’s Motion for Attorney’s fees Pursuant to 17 U.S.C. § 505. (Docket No. 80.) For the reasons that follow, the Court will grant in part and deny in part the Motion, entitling Spurlock to a partial award of attorney’s fees. II. Factual and Procedural Background The Court’s Memorandum and Order granting Spurlock summary judgment detailed the facts and procedural background relating to the underlying action. See 645 F. Supp. 2d at 405- 10. The background relevant to the pending Motion is briefly summarized below. 1 Beginning in 1958, Plaintiffs printed and published several magazines and comic books in the horror and monster film genre, including Famous Monsters of Filmland (“ Famous Monsters ”), Creepy , and Eerie , and commissioned several artists, including Basil Gogos (“Gogos”) to design cover art for the magazines.
    [Show full text]
  • Ethical Hacking
    Ethical Hacking Alana Maurushat University of Ottawa Press ETHICAL HACKING ETHICAL HACKING Alana Maurushat University of Ottawa Press 2019 The University of Ottawa Press (UOP) is proud to be the oldest of the francophone university presses in Canada and the only bilingual university publisher in North America. Since 1936, UOP has been “enriching intellectual and cultural discourse” by producing peer-reviewed and award-winning books in the humanities and social sciences, in French or in English. Library and Archives Canada Cataloguing in Publication Title: Ethical hacking / Alana Maurushat. Names: Maurushat, Alana, author. Description: Includes bibliographical references. Identifiers: Canadiana (print) 20190087447 | Canadiana (ebook) 2019008748X | ISBN 9780776627915 (softcover) | ISBN 9780776627922 (PDF) | ISBN 9780776627939 (EPUB) | ISBN 9780776627946 (Kindle) Subjects: LCSH: Hacking—Moral and ethical aspects—Case studies. | LCGFT: Case studies. Classification: LCC HV6773 .M38 2019 | DDC 364.16/8—dc23 Legal Deposit: First Quarter 2019 Library and Archives Canada © Alana Maurushat, 2019, under Creative Commons License Attribution— NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/ Printed and bound in Canada by Gauvin Press Copy editing Robbie McCaw Proofreading Robert Ferguson Typesetting CS Cover design Édiscript enr. and Elizabeth Schwaiger Cover image Fragmented Memory by Phillip David Stearns, n.d., Personal Data, Software, Jacquard Woven Cotton. Image © Phillip David Stearns, reproduced with kind permission from the artist. The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Ontario Arts Council, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program, and by the University of Ottawa.
    [Show full text]
  • Science Fiction/San Francisco the Twice-Monthly News Zine for the San Francisco Bay Area
    Science Fiction/San Francisco The twice-monthly news zine for the San Francisco Bay Area. Issue 11 November 2, 2005 Editors: Jean Martin, Chris Garcia, Jack Avery email: [email protected] Copy Editor David Moyce TOC eLOCs .........................................................Jean Martin................................................................................................................2-6 Editorial.......................................................Chris Garcia ................................................................................................................. 7 National Novel Writing Month....................Chris Garcia ..............................................................................................................7-8 Le Bal de Vampires preview..........................Chris Garcia ..............................................................................................................8-9 Anime Destiny preview ................................Jack Avery..................................................................................................................... 9 Once More With Feeling Cancelled .............Jack Avery..................................................................................................................... 9 Alan Lee Signs..............................................Diane Rooney........................... Photography Diane Rooney.................................10-12 Elevator to the Stars .....................................Jean Martin..............................
    [Show full text]
  • Investigating and Prosecuting Cyber Crime: Forensic Dependencies and Barriers to Justice
    International Journal of Cyber Criminology Vol 9 Issue 1 January – June 2015 Copyright © 2015 International Journal of Cyber Criminology (IJCC) – Publisher & Editor-in-Chief – K. Jaishankar ISSN: 0973-5089 - January – June 2015. Vol. 9 (1): 55–119. DOI: 10.5281/zenodo.22387 This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-ShareAlikeHTU 4.0 International (CC-BY-NC-SA 4.0) License,UTH whichT permits unrestricted non-commercial use,T distribution, and reproduction in any medium, provided the original work is properly cited. ThisT license does not permit commercial exploitation or the creation of derivative works without specific permission. Investigating and Prosecuting Cyber Crime: Forensic Dependencies and Barriers to Justice Cameron S. D. Brown1 Australian National University, Australia Abstract The primary goal of this paper is to raise awareness regarding legal loopholes and enabling technologies, which facilitate acts of cyber crime. In perusing these avenues of inquiry, the author seeks to identify systemic impediments which obstruct police investigations, prosecutions, and digital forensics interrogations. Existing academic research on this topic has tended to highlight theoretical perspectives when attempting to explain technology aided crime, rather than presenting practical insights from those actually tasked with working cyber crime cases. The author offers a grounded, pragmatic approach based on the in-depth experience gained serving with police task-forces, government agencies, private sector, and international organizations. The secondary objective of this research encourages policy makers to reevaluate strategies for combating the ubiquitous and evolving threat posed by cyber- criminality. Research in this paper has been guided by the firsthand global accounts (via the author’s core involvement in the preparation of the Comprehensive Study on Cybercrime (United Nations Office on Drugs and Crime, 2013) and is keenly focused on core issues of concern, as voiced by the international community.
    [Show full text]
  • “The Rook” Information Guide
    The Return of “The Rook” Information Guide There is a clear void in today’s American pop culture that is The Rook. It all began in the early 1960’s. Bill, or his adventure hero alter-identity “Billy De” began working in comics before he grew his first whisker. His fascination with comic books was shared by his partner in crime Marty Arbunich. Together they created some of the very first comic book fanzines; Fantasy Hero, Fantasy Illustrated, Yancy Street Journal and Voice of Comicdom, starting at the ripe age of 14. Bill and Marty worked tirelessly to meet self-imposed deadlines as if their loyal fans relied on their publications. On one occasion Bill even snuck into Sacred Heart High School’s art room and used the Dot printer to mass produce their fanzine. Before Comic Con became the premier pop-culture comic event, there was the World Science Fiction Convention (now known as WorldCon) and in 1964 it was in Oakland. Although only 523 were in attendance, this show would have resounding impacts on Bill’s career in comics. Also in attendance was maybe the greatest science fiction fan of all time Forrest J. Ackerman, who contributed to the first science fiction fanzine, The Time Traveler. In the same year, The Time Travelers, a science fiction film, would go into production. The cast included Forry Ackerman. The Rook’s return to comics is nearly 50 years to the date of the event that would inspire Bill’s creative direction. Forrest Ackerman would later go on to create the highly popular alternative comic character Vampirella in 1969.
    [Show full text]
  • The Trojan Horse Defense in Cybercrime Cases, 21 Santa Clara High Tech
    Santa Clara High Technology Law Journal Volume 21 | Issue 1 Article 1 2004 The rT ojan Horse Defense in Cybercrime Cases Susan W. Brenner Brian Carrier Jef Henninger Follow this and additional works at: http://digitalcommons.law.scu.edu/chtlj Part of the Law Commons Recommended Citation Susan W. Brenner, Brian Carrier, and Jef Henninger, The Trojan Horse Defense in Cybercrime Cases, 21 Santa Clara High Tech. L.J. 1 (2004). Available at: http://digitalcommons.law.scu.edu/chtlj/vol21/iss1/1 This Article is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara High Technology Law Journal by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. ARTICLES THE TROJAN HORSE DEFENSE IN CYBERCRIME CASES Susan W. Brennert & Brian Carrier with Jef Henninger* TABLE OF CONTENTS I. INTRODUCTION ............................................................. 3 II. LEGAL ISSUES ............................................................ 14 A. How the Trojan Horse Defense Is Used ...................... 16 1. Raise Reasonable Doubt ............................................ 16 2. Negate Mens Rea ..................................................... 18 3. Establishing the Defense .......................................... 18 B. How Can the Prosecution Respond? ............. .......... 21 1. Establish Defendant's Computer Expertise .............. 22 2. "Character" Evidence ..............................................
    [Show full text]
  • Juan Giménez: Cómic Y Animación. De As De Pique a Heavy Metal
    Fecha recepción: 29/03/2016 Fecha revisión: 29/04/2016 Fecha preprint: 30/04/2016 Fecha de publicación: 02/05/2016 Juan Giménez: cómic y animación. De As de Pique a Heavy Metal (1981, Gerald Potterton) Diego Mollá Furió| [email protected] MHCJ nº 7 | Año 2016 Artículo nº 5 (77) Universidad de Valencia Páginas 115 a 138 mhjournal.org ________________________________________________________________________________ Resumen Palabras clave La relación entre el cómic y la animación se inició a comienzos del siglo XX. Juan Giménez, Heavy Metal (1981), El cómic ha suministrado historias a la industria de la animación, que ha animación. adaptado en largometrajes y series para televisión. Nuestro trabajo pretende Sumario analizar esta relación a partir de la figura del guionista y dibujante argentino 1. Introducción 2. Metodología. 2.1. Comic Juan Giménez, con una amplia producción de cómics y colaborador en el y animación. Los inicios. 2.2. Televisión. largometraje de animación Heavy Metal (1981, Gerald Potterton). Filmation n y el público infantil. 2.3. Ralph Bakshi e Ivan Reitman. Animación para Analizaremos la irrupción del cómic en la cinematografía y, posteriormente, adultos. 2.4. Juan Giménez. Formación y en la programación televisiva; cómo y qué personajes se adaptaron según el primeros trabajos. 2.5. El cómic bélico. El presupuesto destinado a su realización y a las necesidades de emisión y detallismo técnico. 2.6. La ciencia ficción y el diseño de dispositivos tecnológicos. 3. exhibición; la evolución de la animación desde registros infantiles y juveniles Resultados. 3.1. Heavy Metal (1981, Gerald hasta la irrupción de Ralph Baskhi y la introducción de temáticas adultas.
    [Show full text]
  • EZ-Backup Marketing Manager: Ernest P
    AMIGA Hard Disk Drives A Undwtm "AMIGA mazm Volume 4 Number 4 * COMPUTING"! US $3.95 Canada $4.95 Your Original AMIGA* Monthly Resource Installing an AMIGA Hard Disk Drive AMIGA HARD DISK DRIVES Programming: MultiSORT Arguments in AmigaBASIC SharedHi Quality Version Available on AMIGALAND.COM Libraries Snapshot: (/!&& pame, rm 'eu) &o$mn) Virus SpaceCutter World Tour Golf $ . AmiEXPO New York And More! 07447074710904 AmiEXPO Art Contest Winners Reach for the best... one W 1' reach for The Works! Platinum Edition." Tbp value for your Amiga® and true integration from a company that prides itself on excellence! The Works! Platinum Edition —5 programs with a common interface, 1 box, 1 easy-to-use manual, and 3 non-copy protected disks. And it works on any Amiga com­ puter with at least 512K RAM. Within minutes you'll be able to write a letter, balance a checkbook, call a bulletin board system, create a mailing list, and print any spreadsheet sideways. You can't top that! WORD PROCESSING MODULE Based on the most popular Amiga word processor available. It has a 104,000+ word spelling checker with scientific and technical supplements. A 470,000+ word thesaurus with definitions. Prints IFF graphics. Supports mail merge. Shows BOLD, Underline, and Italics. Clipboard compatible and MORE! SPREADSHEET MODULE Created from the fastest Amiga spreadsheet. It contains 68881 math coprocessor support. Imports Hi Quality Version Available on AMIGALAND.COMand exports Lotusr“.WKS files. 8 graph types in 8 vibrant colors hot linked to spreadsheet. Complete macro language. Displays BOLD, Underline, and Italics. Clipboard compatible and MORE! DATABASE MODULE A Flat File Manager containing exten­ sive mathematical functions.
    [Show full text]
  • Resource Materials on Technology-Enabled Crime
    Resource materials on technology-enabled crime Gregor Urbas Kim-Kwang Raymond Choo Technical and Background Paper No. 28 © Australian Institute of Criminology 2008 ISSN 1445-7261 ISBN 978 1 921185 70 0 Apart from any fair dealing for the purpose of private study, research, criticism or review, as permitted under the Copyright Act 1968 (Cth), no part of this publication may in any form or by any means (electronic, mechanical, microcopying, photocopying, recording or otherwise) be reproduced, stored in a retrieval system or transmitted without prior written permission. Inquiries should be addressed to the publisher. Project no. 0074a Published by the Australian Institute of Criminology GPO Box 2944 Canberra ACT 2601 Tel: (02) 6260 9272 Fax: (02) 6260 9299 Email: [email protected] Website: http://www.aic.gov.au Please note: minor revisions are occasionally made to publications after release. The online versions available on this website will always include any revisions. Disclaimer: The views expressed do not necessarily represent the policies of the Australian Government or AHTCC. Edited and typeset by the Australian Institute of Criminology Resource materials on technology-enabled crime Gregor Urbas Kim-Kwang Raymond Choo Technical and Background Paper No. 28 Contents Foreword and acknowledgements v Introduction 1 Background 2 Terminology and definitions 2 Brief historical background 3 Main types of technology-enabled crime 5 Future trends 6 Prevalence and costs of technology-enabled crime 6 Issues for law enforcement agencies, prosecutors
    [Show full text]