skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 51999 Find in a Library
Title: INVESTIGATION OF COMPUTER CRIME - OPERATIONAL GUIDE TO WHITE-COLLAR CRIME ENFORCEMENT - A REPORT OF THE NATIONAL CENTER ON WHITE-COLLAR CRIME
Author(s): JAY BECKER
Corporate Author: Battelle Human Affairs Research Ctrs
Law and Justice Study Ctr
United States of America
Date Published: 1978
Page Count: 44
Sponsoring Agency: Battelle Human Affairs Research Ctrs
Seattle, WA 98105
National Institute of Justice/
Rockville, MD 20849
US Dept of Justice
Washington, DC 20531
Grant Number: 77-TA-99-0008
Sale Source: National Institute of Justice/
NCJRS paper reproduction
Box 6000, Dept F
Rockville, MD 20849
United States of America
Document: PDF
Language: English
Country: United States of America
Annotation: THIS INVESTIGATION GUIDE DISCUSSES THE UNIQUE PROBLEMS OF COMPUTER CRIME REPORTING, EVIDENCE COLLECTION, PRESERVATION, AND PRESENTATION. IT OFFERS PRACTICAL METHODS OF DEALING WITH THESE PROBLEMS.
Abstract: IT IS ESTIMATED THAT 15 PERCENT OF ALL COMPUTER CRIME IS REPORTED, AND THAT THESE REPORTS COME FROM DIFFERENT SOURCES INCLUDING SYSTEMS ANALYSTS, AUDITORS, AND PROGRAMMERS. EVIDENCE COLLECTION IS COMPLICATED BY THE HUGE VOLUME OF DATA INVOLVED, THE INABILITY OF INVESTIGATORS TO REACH DATA WITHOUT SHUTTING DOWN BUSINESS OPERATIONS OF THE VICTIM COMPANY, AND LEGAL CONFLICTS ARISING FROM RIGHT TO PRIVACY, SEARCH WARRANT, AND CONSENT TO SEARCH ISSUES. INFORMATION THAT CAN BE USED AS EVIDENCE CANNOT BE MARKED IN CONVENTIONAL MANNERS AND IT IS DIFFICULT TO PRESERVE THE ORIGINAL CONDITION OF COMPUTERIZED EVIDENCE. THE LACK OF COMPUTER KNOWLEDGE AMONG JUDGES AND JURY MEMBERS MAKES EVIDENCE PRESERVATION DIFFICULT. IF IT CANNOT BE PROVEN THAT THE EVIDENCE WAS ACQUIRED WITHIN THE ORDINARY COURSE OF BUSINESS AND WITHIN A REASONABLE TIME AFTER THE CRIME WAS COMMITTED, THE EVIDENCE CAN BE DISQUALIFIED. PROSECUTORS MUST ALSO BE ABLE TO PROVE THE RELIABILITY OF THE EVIDENCE. INVESTIGATORS ARE ADVISED TO ACQUAINT THEMSELVES WITH THE MECHANISMS OF COMPUTER PROGRAMMING, INTERNAL WORKINGS OF THE MACHINE, AND METHODS BY WHICH THE COMPUTER IS CONNECTED TO REMOTE INPUT OR OUTPUT DEVICES. PROSECUTORS AND INVESTIGATORS SHOULD UNDERSTAND BUSINESS AND LEGAL PROBLEMS INVOLVED IN INVESTIGATING COMPUTER CRIME AND SHOULD EMPLOY THE SERVICES OF A COMPUTER EXPERT. A WRITTEN INVESTIGATION PLAN SHOULD BE FORMULATED BEFORE THE ACTUAL INVESTIGATION AND THE VICTIM-COMPANY DIRECTORS AND ADMINISTRATORS SHOULD BE CONSULTED PRIOR TO INVESTIGATION. A LIST OF GROUPS INTERESTED IN COMPUTER CRIME IS APPENDED AS WELL AS A CHECKLIST OF CHARACTERISTICS AND RESPONSIBILITIES OF ELECTRONIC DATA PROCESSING FUNCTIONS, SPECIMEN CHECKLISTS FOR AUDITORS, AND A SEARCH WARRANT SAMPLE. A BIBLIOGRAPHY IS INCLUDED.
Index Term(s): Computer abuse; Computers; Criminal investigation; Evidence collection; Evidence identification; Evidence preservation; White collar crime
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=51999

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.