NCJ Number
125129
Journal
State Peace Officers Journal Volume: 39 Issue: 1 Dated: (Spring 1990) Pages: 90-94
Date Published
1990
Length
5 pages
Annotation
This discussion of the investigation of computer crimes addresses the handling of the investigation, evidence collection, reliance on victims as experts, the use of inhouse personnel, and private-sector support.
Abstract
The unique challenge of computer-related crime investigation is to understand computer operations well enough to obtain necessary information and evidence from the computer. A computer-related crime investigation should obtain as much information as possible before executing a search of the crime scene so as to enhance the specificity of the search warrant. Also, investigators can avoid many delays if they know in advance what to expect at the crime scene. Evidence collection must be done without losing or changing originals. This article outlines the ways in which computers are unique sources of evidence. Evaluation of the evidence may require consultation with a range of experts to assist with the investigation. There are several drawbacks in relying on victims as experts; it is an imposition on the victim's time and resources, and the alleged victim may become a suspect. Experts in the private sector may be consulted for their computer expertise, and expert personnel from other police agencies may provide technical assistance. Other topics covered in the article are key decision points in the investigation and types of computer crime.