skip navigation

Justinfo Subscribe to Stay Informed

CrimeSolutions.gov

Add your conference to our Justice Events calendar

LIBRARY

Abstract Database

Document Details

JUSTINFO

Subscribe to Stay Informed
Want to be in the know? JUSTINFO is a biweekly e-newsletter containing information about new publications, events, training, funding opportunities, and Web-based resources available from the NCJRS Federal sponsors. Sign up to get JUSTINFO in your inbox.

How to Obtain Documents

To download this abstract, check the box next to the NCJ number then click the "Back To Search Results" link. Click the "Download" button on the Search Results page.

 

NCJ Number: 175264 Find in a Library
Title: High-Technology Crime: Investigating Cases Involving Computers
Author(s): K S Rosenblatt
Date Published: 1995
Page Count: 627
Sponsoring Agency: KSK Publications
San Jose, CA 95108
Publication Number: ISBN 0-9648171-0-1
Sale Source: KSK Publications
P.O. Box 934
San Jose, CA 95108
United States of America
Language: English
Country: United States of America
Annotation: This book provides law enforcement investigators, corporate investigators, prosecutors, and corporate counsel with step-by- step procedures for investigating cases that involve computers.
Abstract: This book uses the term "high-technology crime" to identify two types of crime associated with high technology. First, the term includes new crimes created by society's widespread use of computers; for example, the crime of breaking and entering into computers flourished after businesses began connecting computers to sophisticated telecommunications networks. High-technology crime also includes traditional crimes so transformed by computer technology that investigators handling such cases must be familiar with computers and the high-technology industry. One chapter discusses basic principles common to investigating high- technology crime, and three chapters examine the most common high-technology crimes: theft of components, computer intrusion, and theft of information. These three chapters provide readers, including those with no technical background or competence, with the necessary technical information to investigate those crimes, along with a procedure for doing so. An appendix contains a checklist for these investigations. The second part of the book examines a growing challenge facing every law enforcement agency in the United States: safely and legally obtaining evidence stored within computers. Obtaining evidence from a computer without damaging equipment or losing data is just one part of the problem; there are also substantial legal hurdles to searching and seizing computer evidence. Few courts have applied the Fourth Amendment to searches for computer evidence, which means that the law in this area remains unclear. Three chapters discuss the legal obstacles to searching and seizing computer evidence and suggest how readers can draft search warrants to surmount those obstacles. A diskette contains investigative checklists and sample search warrant language. Appended introduction to computer technology and an article on how to protect trade secrets from disclosure during a criminal prosecution, along with a sample protective order to be used for that purpose
Main Term(s): Computer related crime
Index Term(s): Computer crime investigative Training; Evidence collection; Investigative techniques
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=175264

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's Web site is provided.
Tell us how you use the Library and the Abstracts Database. Send us your Feedback.