skip navigation

CrimeSolutions.gov

Add your conference to our Justice Events calendar

PUBLICATIONS

NCJRS Abstract

The document referenced below is part of the NCJRS Library collection.
To conduct further searches of the collection, visit the NCJRS Abstracts Database.

How to Obtain Documents
 
NCJ Number: NCJ 198421   Add to Shopping cart   Find in a Library
Title: Assessing Technology, Methods, and Information for Committing and Combating Cyber Crime
Author(s): Gary R. Gordon ; Chet D. Hosmer ; Christine Siedsma ; Don Rebovich
Corporate Author: The Computer Forensics Research & Development Ctr (CFRDC)
United States of America

WetStone Technologies, Inc
United States of America
Date Published: 02/2002
Page Count: 113
Sponsoring Agency: National Institute of Justice
US Department of Justice
Office of Justice Programs
United States of America
Grant Number: 2000-LT-BX-K002; 2000-9614-NY-IJ
Sale Source: NCJRS Photocopy Services
Box 6000
Rockville, MD 20849-6000
United States of America

The Computer Forensics Research & Development Ctr (CFRDC)
Utica College
Utica, NY 13502
United States of America
Document: PDF 
Type: Instructional Material
Language: English
Country: United States of America
Annotation: This report is designed to reduce the "skill distance" between what computer criminals have learned that enables them to commit their crimes through the use of a computer and what law enforcement personnel need to know to bring these offenders to justice.
Abstract: The report notes that computer crime, in general, results from situations in which offenders capitalize on perceived opportunities to invade computer systems to achieve criminal ends or use computers as instruments of crime, confident that law enforcement officials do not have the means or knowledge to prevent or detect such criminal acts. This report presents up-to-date information on computer crime commission and investigation to help the reader understand how offenders use technology to commit their crimes (i.e., the most popular and effective methods); what enforcers must know to effectively detect/investigate these offenses; and in which areas offenders are still exceeding the skills of law enforcement. The tools being used by offenders are logically grouped and categorized by function (e.g., scanning tools, wardialing programs, and password crackers). The investigative tools described address the investigative needs, such as evidence source identification, evidence preservation, evidence extraction, and evidence analysis. These tools are grouped into the general categories of evidence collection and preservation tools, evidence extraction tools, evidence examination tools, evidence organization tools, network forensic tools, attack analysis tools, multipurpose forensic tools and toolkits, and trusted time stamping. These tools are further separated by function into subcategories. The body of this report presents general descriptions of the investigative tools, accompanied by directions on where more specific information on the tools can be found.
Main Term(s): Police computer training
Index Term(s): Criminal methods ; Computer related crime ; Investigative techniques ; Computer training ; Computer crime investigative Training ; Computer evidence ; NIJ grant-related documents
   
  To cite this abstract, use the following link:
https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=198421

* A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's web site is provided.