Book review: Computer Crimes and Digital Investigations

Would-be computer criminals be warned, the law is slowly but surely catching up with you.  In Computer Crimes and Digital Investigations, 2nd edition, Ian Walden provides an updated version of his 2007 treatise on legal aspect of computer crime.  One area of interest for IPKat readers will be discussions on online IP crime and the use of computer evidence in computer crimes.

Walden provides a comprehensive explanation of the various key terms and approaches in legal aspects of cyber crime. He classifies crime using the Council of Europe's Convention on Cybercrime categorisation, which divides crime into three areas: computer-related crime (the computer is the instrument for the crime, such as hacking), content-related crime (e.g. copyright infringement and child pornography), and computer-integrity offences (e.g. viruses).

Cat caught in the act
Amelia on a MacBook Pro, Brownpau
As we move to a more knowledge-based economy, the role of intangible assets is increasing.  One of this Kat's favourite subjects is trade secrets. Walden notes a subtle distinction in the protection of trade secret between rights, "granted to trade secret information itself and protections triggered by the means of obtaining the information." Conspiring to defraud, for example, addresses the value of the information (trade secret protection), and computer misuse deals with the means of theft (means).  Walden details the increasing trend of trade secret protection moving from civil to criminal law.

Walden devotes a section to intellectual property crimes, namely infringement of copyright [Merpel notes that trade secrets, ever the poor relation of IP, are in a separate section.] He notes that the Convention on Cybercrime only addresses copyright and related rights infringement, not other IP, details the various cases and statutes, and notes a trend for rightsholders to seek redress via communication services providers (e.g. ISPs.)

Does the evidence add up?
John Thaw by Bill Strin
A longstanding question in online copyright infringement is evidence, as detecting and proving infringement is a challenge.  Walden divides law enforcement techniques into ordinary (e.g. searching on the internet), coercive (use of police powers such as search and disclosure), and covert (interception, surveillance etc.) [Merpel has been nostalgia-watching a lot of Inspector Morse recently, and is happy to note he uses all three techniques.] He describes the chaotic development of cybercrime evidence and evidence gathering. There are number of remaining challenges, including difficulty linking virtual identity to real-world people (identity problem), associating online data to physical locations (location problems) and the amorphous nature of data (its lack of stickiness.) These problems continue to challenge evidence used in online copyright infringement cases.

I found Walden's clear approach to categorising aspects of each topic helpful.  The appendix includes nearly 75 pages of legal texts, including the Association of Chief Policy Officers Good Practice Guide for Digital Evidence. The comprehensiveness of the book makes it both a good reference, and an interesting analysis; it will appeal to legal scholars and professionals, and the odd Inspector Morse fan (not a tautology.)

Walden, Ian. Computer Crimes and Digital Investigations. Oxford, United Kingdom: Oxford University Press, 2016. ISBN: 9780198705598 Available for £95 in hardback. Rupture factor: High, a hardback with nearly 560 pages.
Book review: Computer Crimes and Digital Investigations Book review: Computer Crimes and Digital Investigations Reviewed by Nicola Searle on Thursday, September 29, 2016 Rating: 5

No comments:

All comments must be moderated by a member of the IPKat team before they appear on the blog. Comments will not be allowed if the contravene the IPKat policy that readers' comments should not be obscene or defamatory; they should not consist of ad hominem attacks on members of the blog team or other comment-posters and they should make a constructive contribution to the discussion of the post on which they purport to comment.

It is also the IPKat policy that comments should not be made completely anonymously, and users should use a consistent name or pseudonym (which should not itself be defamatory or obscene, or that of another real person), either in the "identity" field, or at the beginning of the comment. Current practice is to, however, allow a limited number of comments that contravene this policy, provided that the comment has a high degree of relevance and the comment chain does not become too difficult to follow.

Learn more here:

Powered by Blogger.