skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 212409 Find in a Library
Title: Cyber Crime Fighting II Digital Evidence Search, Seizure, and Preservation
Corporate Author: National White Collar Crime Ctr
Training and Research Institute
United States of America
Date Published: 2005
Page Count: 0
Sponsoring Agency: Bureau of Justice Assistance
Washington, DC 20531
National White Collar Crime Ctr
Morgantown, WV 26505
Sale Source: National White Collar Crime Ctr
Training and Research Institute
11 Commerce Drive
Suite 26505
Morgantown, WV 26505
United States of America
Type: Instructional Material
Format: Film
Language: English
Country: United States of America
Annotation: This DVD provides instruction for law enforcement officers on how computers are used in various crimes, the types of digital evidence that may be contained in computers, the preservation of digital evidence, and techniques for retrieving digital evidence from suspects' computers.
Abstract: The instruction is divided into four parts. The first part is primarily for first responders to a crime scene. It provides instruction on how computers may be used by criminals to commit crimes; the nature of digital evidence and where it may be found; the securing of the crime scene so that digital evidence is not erased or compromised; and procedures for identifying, handling, and transporting digital evidence. Part II is primarily for investigators involved in computer-related cases. It instructs them in the various methods that criminals use to hide, disguise, or eliminate computer evidence of their crimes. It also suggests investigative techniques that can link computer evidence to a suspect, including techniques for conducting interviews with suspects. Part III is primarily for forensics experts who will examine digital information for evidence. Among the topics addressed are documentation, copying and examining the suspect's computer drives, and techniques for obtaining evidence from corrupted drives. Part IV presents eight case files in which computer evidence played a part in identifying suspects and gaining convictions. The types of crimes involved are the poisoning of a woman, a woman shot to death, a child murdered, a woman beaten to death, identity theft, fraudulent Internet purchases, mystery e-mails, and Internet auction fraud. The format for presenting the instructional material consists of lectures by the host instructor, a listing of learning points after each instructional segment, comments by investigators from across the country who have been involved in computer-related cases, and video footage from actual cases.
Main Term(s): Police computer training
Index Term(s): Computer aided operations; Computer crime investigative Training; Computer crime prevention measures; Computer evidence; Computer related crime; Computer training
Note: DVD, approximately 4 hours for all modules
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.