skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 136545 Find in a Library
Title: Forensic Science Against Computer Crime in the United Kingdom
Journal: Journal of the Forensic Science Society  Volume:32  Issue:1  Dated:(January/March 1992)  Pages:27-34
Author(s): P A Collier; B J Spaul
Date Published: 1992
Page Count: 8
Type: Report (Technical)
Format: Article
Language: English
Country: United Kingdom
Annotation: This paper outlines legislation in the United Kingdom relevant to computer crimes, the associated laws of evidence, and the techniques relevant to the reconstruction of evidence and the identification of the offender; the paper also discusses the use of information technology to present this evidence in court.
Abstract: Under the British Computer Misuse Act of 1990, unauthorized access to computer material, unauthorized access with the intent to commit or facilitate the commission of further offenses, and unauthorized modification of computer material were made criminal offenses. For an offense to be committed, it must be proven that the computer performed a function as a consequence of access being attempted or actual access; that the access was unauthorized; that the person attempting access knew that it was unauthorized; and that the access was preliminary to committing or facilitating a serious offense. It is also necessary to demonstrate that modification to computer material was or would have been caused; the modification was unauthorized; the person attempting the modification knew it was unauthorized; and the intention of the modification was to impair the computer's operation. This paper argues that the successful enforcement of the new legislation requires the development of special expertise. Such expertise includes familiarity with the legislation under which computer crime is prosecuted; a detailed knowledge of the workings of a range of operating systems, databases, applications software, and equipment configurations; and ability to use computers in the presentation of information to the court. 13 references
Main Term(s): Computer related crime
Index Term(s): Crime in foreign countries; Foreign laws; Forensic sciences; Investigative techniques
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.