U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Changing Face of Computer Crime

NCJ Number
172490
Journal
Police Chief Volume: 65 Issue: 5 Dated: (May 1998) Pages: 38-39,42,45
Author(s)
H Schmidt
Date Published
1998
Length
4 pages
Annotation
After profiling the nature of and methods used in computer crime, this article provides guidelines for law enforcement agencies in addressing this type of crime.
Abstract
Once thought to be limited to hackers breaking into computer systems, stealing money by computer, and destroying credit reports, computer crime now encompasses any crime in which a computer is used either in its commission or as a repository of evidence. As with other types of evidence, protocols have been established for proper seizure and processing of computer evidence. It is imperative that the preservation of computer evidence and the recovery of computer data follow strict procedural guidelines to ensure its accuracy. The forensic processing of a computer system requires special training. Since computer data cannot be seen, special language must be included in search warrants and affidavits to allow the seizure of computer equipment and peripherals that might contain evidence. Further, given that computers can be used to store evidence in all types of crimes, all law enforcement officers should be skilled in proper methods to seize computer systems, including diskettes and other forms of magnetic media. Officers selected for investigations that involve computer evidence should have a good understanding of network operating systems, telecommunications, and various types of computer hardware and software. In addition, they must receive training in the use of special software programs that have been developed for law enforcement, as well as in legal issues specific to computer evidence. As technology changes, these officers will require additional training. Not only must law enforcement be able to investigate and prosecute computer crimes, it must have the knowledge base necessary to protect both its constituents and its own systems from unauthorized access, destruction of data, compromise of investigative information, and confidentiality of citizen information.