skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 158372 Find in a Library
Title: High-Technology Crime: Investigating Cases Involving Computers
Author(s): K S Rosenblatt
Date Published: 1995
Page Count: 627
Sponsoring Agency: KSK Publications
San Jose, CA 95108
Publication Number: ISBN 0-9648171-0-1
Sale Source: KSK Publications
P.O. Box 934
San Jose, CA 95108
United States of America
Type: Training (Aid/Material)
Language: English
Country: United States of America
Annotation: This book provides law enforcement investigators, corporate investigators, prosecutors, and corporate counsel with step-by- step procedures for investigating cases that involve computers.
Abstract: This book uses the term "high-technology crime" to identify two types of crime associated with high technology. First, the term includes new crimes created by society's widespread use of computers. Second, it includes traditional crimes so transformed by computer technology that investigators in such cases must be familiar with computers and the high-technology industry. One chapter discusses basic principles common to investigating high- technology crime, and three chapters examine the most common high-technology crimes: theft of components, computer intrusion, and theft of information. These three chapters provide readers, including those with no technical background or competence, with the necessary technical information to investigate those crimes, along with a procedure for doing so. An appendix includes checklists for these investigations. The second part of the book examines how to obtain safely and legally evidence stored in computers. Three chapters discuss the legal obstacles to searching and seizing computer evidence and suggest how to draft search warrants to surmount those obstacles. One appendix discusses how to protect trade secrets during criminal prosecution, and another provides an introduction to computers and the high-technology industry. A computer diskette accompanies the book and contains investigative checklists and sample search warrant language. A 25-item bibliography and a subject index
Main Term(s): Computer crime investigative Training
Index Term(s): Computer related crime; Evidence collection; Investigative techniques; Search and seizure training
Note: *This document is currently unavailable from NCJRS.
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=158372

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.