NCJ Number
101576
Date Published
1980
Length
364 pages
Annotation
This manual provides a complete reference handbook to the investigation and prosecution of computer crime, with a focus on actual investigative processes and procedures.
Abstract
Chapters 1 through 3 examine the role of computers in business and society, the impact of computer crime, and threat evaluation. They also provide a review of data processing concepts, methods, hardware, and software. Chapters 4 through 11 cover each phase of computer crime investigation in detail by phase: investigative planning, information gathering and analysis (data sources, surveillance techniques, crime scene search, and handling of physical evidence), interviewing and interrogation issues and methods, technical data system review to discover the more sophisticated types of computer crime, forensic testing, and case presentation and evidentiary rules. Chapter 12 amplifies these sections on evidence gathering and analysis by describing auditing techniques that can be used to determine if a program or system has been adequately tested and if audit controls are adequate and functioning properly. The final chapter examines pending legislation and State and Federal law pertaining to computer privacy, security, and crime. Tabular data, graphs, checklists, list of information resources, chapter references, and index.