You are on page 1of 2

Answers/Hints to Week 2 Tutorial Questions

Tutorial Questions
1. What is the definition of “cybercrime”?
Answer: the crime which occurs in a networked environment (such as the
Internet) and which is peculiar to these environments

2. From the European Convention on Cybercrime, what is described by the


term: “Search and seizure of stored computer data” and “Real-time collection
of computer data”?
Answer: refer to its Section 2 – Procedural law: Article 19&20

3. What is the relationship between “intelligence” and “evidence”?


Hint: read through Investigating Digital Crime by Robin Bryant: Chapter 3

4. Identify a specific type of digital crime. Analyse the nature of the crime in
terms of the motive, opportunity and method (MOM) involved.
Hint: there are case studies in Investigating Digital Crime by Robin Bryant:
Chapter 3
Workshop Tasks
1. Find the official Web site for “Regulation of Investigatory Powers Act 2000
” and download the document. Read briefly through it, trying to find anything
relevant to Computer Forensics.
http://www.opsi.gov.uk/acts/acts2000/ukpga_20000023_en_1

2. Find and read briefly through the document for “Police and Criminal Evidence
Act 1984”. Does it deal with computer forensic evidence?
http://police.homeoffice.gov.uk/operational-policing/powers-pace-
codes/pace-code-intro/

3. Search through the “ACPO” Web site, find the “ACPO eCrime Strategy
(August 2009)”. Discuss with your colleagues on the following topics:
 Definition of e-Crime
 The e-Crime problem
 Law enforcement challenges of e-Crime
http://www.acpo.police.uk/asp/policies/Data/Ecrime%20Strategy%20Websit
e%20Version.pdf

4. Background reading through the article titled “Cyber crime: An evolutionary


arms race” at:
http://www.bcs.org/content/conWebDoc/56595?utm_source=British%20Com
puter%20Society&utm_medium=email&utm_campaign=7572464_BCS%20N
ewsletter%2028%20September

You might also like