skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 66083 Add to Shopping cart Find in a Library
Title: INVESTIGATION OF COMPUTER CRIME--AN OPERATIONAL GUIDE TO WHITE COLLAR CRIME ENFORCEMENT
Author(s): J J BECKER
Corporate Author: Battelle Human Affairs Research Ctrs
National Ctr on White-Collar Crime
United States of America
Project Director: H EDELHERTZ
Date Published: 1980
Page Count: 77
Sponsoring Agency: Battelle Human Affairs Research Ctrs
Seattle, WA 98105
National Institute of Justice/
Rockville, MD 20849
Superintendent of Documents, GPO
Washington, DC 20402
US Dept of Justice
Washington, DC 20531
Grant Number: 77-TA-99-0008
Sale Source: Superintendent of Documents, GPO
Washington, DC 20402
United States of America

National Institute of Justice/
NCJRS paper reproduction
Box 6000, Dept F
Rockville, MD 20849
United States of America
Document: PDF
Language: English
Country: United States of America
Annotation: FOR INVESTIGATORS OF COMPUTER-ASSISTED CRIME, THIS OPERATIONAL GUIDE DISCUSSES VARIOUS APPROACHES TO THE INVESTIGATION, EVIDENCE COLLECTION, AND POSSIBLE LEGAL PROBLEMS IMPEDING THE INVESTIGATION.
Abstract: BECAUSE ONLY 15 PERCENT OF ALL COMPUTER CRIME IS REPORTED TO LAW ENFORCEMENT AUTHORITIES, THE COMPUTER CRIME INVESTIGATOR MUST DEVELOP CONTACTS AMONG THOSE PEOPLE LIKELY TO REPORT SUCH CRIMES. SEVERAL STEPS ARE REQUIRED IN ORDER TO ANALYZE POTENTIAL COMPUTER CRIME, SUCH AS HAVING A GENERAL FAMILIARITY WITH THE COMMON TYPES OF COMPUTER CRIME AND THE LAWS THAT APPLY TO THESE CRIMES, CONTACTING EXPERT ASSISTANCE, AND DEVELOPING A WORKING KNOWLEDGE OF THE VULNERABLE POINTS OF A COMPUTER SYSTEM (INPUT, PROGRAMMING, SOFTWARE, OPERATING SYSTEM, DATA BASE, OUTPUT, HARDWARE, AND COMMUNICATIONS). THE INVESTIGATOR MUST ALSO KNOW THE TYPICAL THREATS OF VULNERABILITY AT EACH POINT, THE TYPES OF RECORDS TO LOOK FOR, AND THE PERTINENT PERSONNEL WITH WHOM TO TALK. PPROBLEMS IN GATHERING EVIDENCE ARE DETAILED, INCLUDING THE NATURE OF THE SYSTEM AND LEGAL DIFFICULTIES, AND POSSIBLE SOLUTIONS TO BOTH TECHNICAL AND LEGAL PROBLEMS ARE REVIEWED. ONCE THE EVIDENCE IS OBTAINED, OTHER CONSIDERATIONS ARISE, SUCH AS THE POSSIBILITY THAT THE EVIDENCE CANNOT BE MOVED, MAINTENANCE REQUIREMENTS OF THE EVIDENCE, VOLUME, VISUAL FUNGIBILITY, AND LEGAL REQUIREMENTS. IN PRESENTING THE EVIDENCE, THE INVESTIGATOR MUST BE CONCERNED THAT THE CASE WILL NOT BE THROWN OUT OF COURT DUE TO FAULTY EVIDENCE. LEGAL REQUIREMENTS FOR COMPUTER MEDIA TO BE ACCEPTED AS EVIDENCE ARE DISCUSSED, AS WELL AS POSSIBLE SOLUTIONS TO ENSURE THAT THE EVIDENCE WILL BE ACCEPTED. ENDNOTES, AN ANNOTATED BIBLIOGRAPHY, AND APPENDIXES OF RELATED ARTICLES AND CHECKLISTS ARE PROVIDED. (PRG)
Index Term(s): Computer aided operations; Computer hardware systems; Computer privacy and security; Computer related crime; Computer software; Crimes against businesses; Criminal investigation; Embezzlement; Evidence collection; Laws and Statutes; Procedure manuals; Rules of evidence; Unreported crimes; White collar crime
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=66083

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.