skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 68780 Add to Shopping cart Find in a Library
Title: PROSECUTOR'S MANUAL ON COMPUTER CRIMES
Author(s): G H MILLER
Corporate Author: Georgia Prosecuting Attorney's Council
United States of America
Date Published: 1978
Page Count: 92
Grant Number: 77A-20-010; 78A-12-001
Format: Document
Language: English
Country: United States of America
Annotation: THIS MANUAL IS A GUIDE FOR GEORGIA PROSECUTORS ON THE BASICS OF HANDLING A COMPUTER CRIME CASE. IT INCLUDES INFORMATION ON INVESTIGATORY AND SEARCH AND SEIZURE ISSUES, AND TRIAL TECHNIQUES.
Abstract: THE DIGITAL COMPUTER'S METHOD OF OPERATION USING A BINARY NUMERICAL SYSTEM IS EXPLAINED. ALSO DISCUSSED ARE BOOLEAN ALGEBRA, LOGIC GATES, METHODS OF INPUT, PROGRAMMING, THE CENTRAL PROCESSING UNIT, STORAGE IN MEMORY UNITS, THE OUTPUT STAGE, THE COMMUNICATION PROCESS, AND HEURISTIC PROGRAMS. THE COMMON TYPES OF COMPUTER CRIMES ARE DELINEATED, INCLUDING THOSE INVOLVING PHYSICAL ATTACKS ON COMPUTERS; THE USE OF THE COMPUTER TO INTIMIDATE OR DEFRAUD; ITS USE TO STEAL MONEY, BONDS, NEGOTIABLE INSTRUMENTS, OR PROPERTY; THEFTS OF COMPUTER DATA; AND ILLEGAL USE OF COMPUTER TIME BY EMPLOYEES. A COMPOSITE PROFILE OF A COMPUTER ABUSER AND THE MOTIVATIONS BEHIND THE CRIME ARE EXPLORED. PROBLEMS APPARENT IN THE PROSECUTION OF COMPUTER CRIMINALS ARE DISCUSSED, WITH SPECIFIC REFERENCE TO THE EASE WITH WHICH COMPUTER EVIDENCE MAY BE ERASED, THE FREQUENT LACK OF ASSISTANCE BY THE COMPANIES INVOLVED, THE LACK OF AN AUDIT TRIAL, PROBLEMS SURROUNDING THE ADMISSIBILITY OF COMPUTER EVIDENCE AND SEARCH AND SEIZURE. TRIAL PREPARATION AND TECHNIQUES ARE DESCRIBED; THE USE OF CLEAR, NONTECHNICAL LANGUAGE IS RECOMMENDED. SUGGESTIONS ARE ALSO MADE FOR COMPUTER SECURITY. INCLUDE ARE 160 FOOTNOTES, A GLOSSARY OF COMPUTER TERMS, AND BIBLIOGRAPHY WITH OTHER 30 REFERENCES. A WARRANT AND AN EVIDENCE FORM ARE APPENDED. (TAG)
Index Term(s): Behavior patterns; Computer abuse; Computer related crime; Computer software; Criminal methods; Georgia (USA); Investigative powers; Prosecution; Search and seizure; Trial preparation; Trial procedures
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=68780

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.