skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 167592 Find in a Library
Title: Downloading: Using Computer Software as an Investigative Tool
Journal: FBI Law Enforcement Bulletin  Volume:65  Issue:6  Dated:(June 1996)  Pages:1-6
Author(s): A L Bowker; L N Drinkard
Date Published: 1996
Page Count: 6
Sponsoring Agency: NCJRS Photocopy Services
Rockville, MD 20849-6000
Sale Source: NCJRS Photocopy Services
Box 6000
Rockville, MD 20849-6000
United States of America
Document: HTML
Type: Report (Technical Assistance)
Format: Article
Language: English
Country: United States of America
Annotation: Downloading is a technique by which police agencies can use their computer software as an investigative tool to solve computer manipulation crimes quickly and easily.
Abstract: Law enforcement officers who are investigating computer manipulation crimes can download the victim's computer financial records to a disk, return to their office, and use their agency's software to reorganize the data into a format that enables them to detect falsifications. They can sort, select, and organize entries in whatever manner the investigation demands. Investigators should try downloading on a small scale to gain confidence and become familiar with the functions and limitations of the agency's application software. They should also secure the victim's system to prevent unauthorized access and determine the victim's software package. To prevent computer manipulation crime, business owners should institute several security procedures. Reference notes and checklists
Main Term(s): Computer related crime
Index Term(s): Computer crime investigative Training; Computer software; Investigative techniques; Police equipment
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.