In the early 1990s, professionals began to question how to address offender computer use while on supervision, but in the past ten years, tools emerged that were specifically developed for triage and field forensics. As these were rapidly embraced, it was still unclear what professionals could look for, how to look for it, and how to interpret what they found. This unique book resolves those issues. The book provides a clear outline of what can and should be done regarding the management of offender computer use. Not only does the text help community corrections professionals understand how to monitor computer use, but it helps realize how information gained during monitoring can assist in overall case management. The book takes the reader through all the paces of managing offender cyber-risk and is meant specifically for pretrial, probation, parole, and community sanction officers. The chapters are organized by major areas, such as community corrections and cyberspace, understanding the options, condition legality, operational legality, accessing cyber-risk, computer education, principles of effective computer monitoring, search and seizure, deploying monitoring software, and online investigations. Additionally, numerous appendices provide a wealth of information regarding model forms, questionnaires, and worksheets. This book moves the reader toward a more informed use of the technology that is now readily available to effectively manage offendersa digital behavior.Some operating systems, starting with Windows XP, also have a feature that appears to wipe out the installation of ... has failed a polygraph due to obtaining a computer and Internet access have disposed of a hard drive or laptop in a river.
|Title||:||THE CYBERCRIME HANDBOOK FOR COMMUNITY CORRECTIONS|
|Publisher||:||Charles C Thomas Publisher - 2012-03-01|