skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 198421 Add to Shopping cart Find in a Library
Title: Assessing Technology, Methods, and Information for Committing and Combating Cyber Crime
Author(s): Gary R. Gordon; Chet D. Hosmer; Christine Siedsma; Don Rebovich
Corporate Author: The Computer Forensics Research & Development Ctr (CFRDC)
United States of America

WetStone Technologies, Inc
United States of America
Date Published: February 2002
Page Count: 113
Sponsoring Agency: National Institute of Justice (NIJ)
Washington, DC 20531
NCJRS Photocopy Services
Rockville, MD 20849-6000
The Computer Forensics Research & Development Ctr (CFRDC)
Utica, NY 13502
WetStone Technologies, Inc
Cortland, NY 13045
Grant Number: 2000-LT-BX-K002; 2000-9614-NY-IJ
Sale Source: NCJRS Photocopy Services
Box 6000
Rockville, MD 20849-6000
United States of America

The Computer Forensics Research & Development Ctr (CFRDC)
Utica College
Utica, NY 13502
United States of America
Document: PDF
Type: Instructional Material
Format: Document
Language: English
Country: United States of America
Annotation: This report is designed to reduce the "skill distance" between what computer criminals have learned that enables them to commit their crimes through the use of a computer and what law enforcement personnel need to know to bring these offenders to justice.
Abstract: The report notes that computer crime, in general, results from situations in which offenders capitalize on perceived opportunities to invade computer systems to achieve criminal ends or use computers as instruments of crime, confident that law enforcement officials do not have the means or knowledge to prevent or detect such criminal acts. This report presents up-to-date information on computer crime commission and investigation to help the reader understand how offenders use technology to commit their crimes (i.e., the most popular and effective methods); what enforcers must know to effectively detect/investigate these offenses; and in which areas offenders are still exceeding the skills of law enforcement. The tools being used by offenders are logically grouped and categorized by function (e.g., scanning tools, wardialing programs, and password crackers). The investigative tools described address the investigative needs, such as evidence source identification, evidence preservation, evidence extraction, and evidence analysis. These tools are grouped into the general categories of evidence collection and preservation tools, evidence extraction tools, evidence examination tools, evidence organization tools, network forensic tools, attack analysis tools, multipurpose forensic tools and toolkits, and trusted time stamping. These tools are further separated by function into subcategories. The body of this report presents general descriptions of the investigative tools, accompanied by directions on where more specific information on the tools can be found.
Main Term(s): Police computer training
Index Term(s): Computer crime investigative Training; Computer evidence; Computer related crime; Computer training; Criminal methods; Investigative techniques; NIJ grant-related documents
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.