wp26a69a88.png

 

Site Contents: © Peter Sommer, 2012. Not to be reproduced without permission

PO Box 6447  London N4 4RX UK

wpab70d249.png

 

 

wpba7481ec.png
wpad665d62.png
wpac5610f1.png
wpcd892235.png

wp596f72b9.png

wp5dd9d0bc.png

wp0594afde.png

wpa538eb62.png

wp7884e242.png

wp91764798.png

wpb6c23f67.png

wpd81a5257.png

wpeae87f47.png

wp4a2d1fec.png

wpbeef4fb1.png
These articles,  PowerPoint presentations and media clips by Peter Sommer may be of interest to visitors to this site.

Please note that  they may not have  been updated since original publication and that as a result some of the information, in particular in relation to matters of law,  could be out-of-date.   In some instances the articles may be in their “pre-publication” state.  For the final versions please use the  supplied references and download from the sites of the relevant journals.

Articles
Downloads, Logs and Captures: Evidence from Cyberspace Journal of Financial Crime, October, 1997, 5JFC2 138-152;
Intrusion detection systems as evidence, Computer Networks, Volume 31, Issues 23-24, 14 December 1999, Pages 2477-2487.
Digital Footprints: Assessing Computer Evidence,  Criminal Law Review (Special Edition, December 1998, pp 61-78)
Evidence in Internet Paedophilia Cases Computer and Telecommunications Law Review, Vol 8 Issue 7; [2002] CTLR, pp 176-184 (Similar article appeared in: Evidence in Internet Paedophilia Cases; a case for the Defence in “Policing Paedophiles on the Internet” ed McVean & Spindler,  New Police Bookshop for the John Grieve Centre,  2003. )
Computer Forensics Education , Yasinac, Erbacher, Marks, Pollitt, Sommer, IEEE Security & Privacy Vol 1 No 4 p 15 , July 2003;
Two Computer Misuse Prosecutions,  Computers and Law Vol 16 issue 5, 2006
Criminalising Hacking Tools, Digital Investigation Vo 3 Issue 3 2006 68-72
Assessing the Cyber Security Threat,   Security and Defence Agenda, Round Table March 2008. (participation)
Citizen 2.o New Statesman Special Report,  August 2008  (participation)
McAfee Virtual Criminology Report, 2008  (participation)
Digital Footprints:  Emerging problems in computer forensics.  Presentation to Criminal Bar Association, 2007

Frontline Club Event  on Cyberwarfare 09/02/2011 (video)


Podcast
FIRST 2008:  Identity Management Systems: the forensic dimension

Open University

Details of course Computer forensics and investigations  M889