Welcome to the second issue of Computer Forensics Online™. This online web magazine concerns itself with the technical aspects of computer law. We believe that the articles presented will be of interest to attorneys and experts in this field as well as computer programmers and the general public. The response to the last issue was unexpected. Many law enforcement officials registered with the site and sent email. As the magazine continues, we hope to integrate their interests into the content of this publication.

In this issue, we are dealing with the following pertinent issues:

  • Apprehending the Hacker: The Collection and Use of Evidence
  • Evidence Collection for Year 2000 Litigation
  • Self-Help in 2000: How a Business Can Do Its Own Y2K Compliance Without Violating Copyright Laws
  • The Year 2000 Malpractice Bug: Waiting to Trap the Unwary Attorney
  • Presentation of Technical Evidence by Experts in Computer Related Intellectual Property Litigation
  • Basis of Intellectual Property Protection For Software Under U.S. Law Valuation of Software Assets
  • The Use of Technical Experts in Performance Litigation

The feature article in this issue concerns computer hacking. The article discusses the real and perceived issues with regard to hackers as well as the use of technical evidence for their apprehension, prosecution and defense. Several case studies are presented. This is the second article in the area of computer crime. The first article on internet crime, “Infojacking the Information Superhighway” by Marc Friedman, appeared in the last issue. This article has been updated, and the new version will appear in the next issue. From your email, you indicated that you wanted to see more articles about computer crime. To that end, we shall regularly address this issue in future issues.

Once again, Computer Forensics Online™ addresses the Year 2000 issue. We feel that the Millennium Bug will have the most impact on computers and therefore on the civilized world. It is important enough to include three articles on this subject.

In the last issue, there appeared an article by Marc Friedman, Pauline Wen and me entitled: “Technical Experts in Computer-Related Intellectual Property Litigation.” Among the topics discussed in that article was how an expert can determine whether or not software piracy has occurred. The current article, “Presentation of Technical Evidence by Experts in Computer Related Intellectual Property Litigation,” is a continuation of that article. It discusses the technical aspects of presenting such evidence at trial.

It is ten months since the publication of the first issue of Computer Forensics Online™. At the time of publication, we intended that this should be a bi-monthly web magazine. The first issue had a number of articles written by different authors. Thereafter, many of the authors who wrote for the first issue were too busy to submit additional articles. It is very difficult (and probably not too useful) to develop a magazine that has only one author. This is especially true in the area of computer forensics and computer law. We hope that this publication delay will not occur again in the future. Therefore, we need your help. We would appreciate your submission of articles to us that would be suitable for publication. Remember, the articles should look at the technical aspects of computer law.

Thank you for your help and your continued interest in Computer Forensics Online™.

Sincerely,

Stanley H. Kremen,
President DPLC, Inc. & Editor CFO