U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

COMPUTER CRIME INVESTIGATION, PART 1

NCJ Number
41264
Journal
Assets Protection Volume: 2 Issue: 2 Dated: (SPRING 1977) Pages: 11-16
Author(s)
T A SCHABECK
Date Published
1977
Length
6 pages
Annotation
FOCUSING ON THE FORENSIC INVESTIGATIVE APPROACH TO SOLVING COMPUTER-RELATED CRIMES, THE AUTHOR DISCUSSES TECHNIQUES FOR EVALUATING COMPUTER INPUT AND OUTPUT DOCUMENTARY EVIDENCE.
Abstract
AFTER DEFINING COMPUTER CRIME AS THE MOST LUCRATIVE OF ALL CRIMES, THE AUTHOR ILLUSTRATES HIS QUALIFICATION WITH EXAMPLES OF COMPUTER FRAUD THAT WERE PERPETRATED BY MODIFICATION OF COMPUTER INPUT SOURCE DOCUMENTS SUCH AS VOUCHERS, CLAIM TRANSACTIONS, AND KEYPUNCH CARDS. ALSO COVERED ARE DOCUMENT AGE INDICATORS, TEXTUAL CONTENT, PHOTOCOPYING, AND WRITING MEDIA. A COMPUTER FLOW CHART ILLUSTRATES VARIOUS POINTS IN A COMPUTER ORIENTED PROCESS WHERE FALSIFICATIONS CAN BE INTRODUCED.