U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

COMPUTER CRIME - CRIMINAL JUSTICE RESOURCE MANUAL

NCJ Number
61550
Author(s)
ANON
Date Published
1979
Length
399 pages
Annotation
FOR PROSECUTORS AND INVESTIGATORS WITH SCANT OR EXTENSIVE KNOWLEDGE OF COMPUTER TECHNOLOGY, THIS MANUAL DESCRIBES THE HANDLING OF A COMPUTER CRIME CASE AND LAWS RELATED TO COMPUTER CRIME.
Abstract
IN A FORM COMBINING LEGAL, TECHNICAL, AND INVESTIGATIVE CONCEPTS, THE TYPICAL ORDER OF EVENTS IN HANDLING A COMPUTER-RELATED CRIMINAL CASE IS DESCRIBED. STEPS INCLUDE CLASSIFYING THE CRIME; ANALYZING THE ROLES OF EXPERTS, WITNESSES, AND SUSPECTS; DISCOVERING THE CRIME; AND MAKING THE CASE. FOLLOWING EXPLANATIONS OF 12 TECHNICAL METHODS USED TO PERPETRATE COMPUTER-RELATED CRIME; (E.G., DATA DIDDLING, TROJAN HORSES, SALAMI TECHNIQUES, SUPERZAPPING, AND PIGGYBACKING), A TABLE INDICATES POTENTIAL PERPETRATORS, METHODS OF DETECTION, AND THE KINDS OF EVIDENCE MOST LIKELY ASSOCIATED WITH EACH. CHARACTERISTICS OF KNOWN COMPUTER CRIMINALS AND AIDS FOR INTERVIEWING SUSPECTS ARE INCLUDED, AND THE FUNCTIONS OF A COMPUTER CENTER ARE DETAILED. THE DISCUSSSION OF COMPUTER EQUIPMENT OPERATION AND PHYSICAL FACILITIES PARTICULARLY EMPHASIZES SAFEGUARDS AND CONTROLS THAT MAY BE VIOLATED DURING A CRIME. DESCRIPTIONS OF 11 TYPICAL COMPUTER-GENERATED, PERIODIC REPORTS ABOUT THE OPERATION OF A COMPUTER ARE PRESENTED AS A VALUABLE SOURCE FOR DISCOVERING EVIDENCE OF A CRIME. AN OUTLINE OF COMPUTER USAGE IN SCIENCE/ENGINEERING AND BUSINESS APPLICATIONS PROVIDES A BASIS FOR THE SUBSEQUENT DESCRIPTION OF COMPUTER SYSTEM FUNCTIONAL VULNERABILITIES TAKEN FROM ACTUAL EXPERIENCE AND PHYSICAL LOCATIONS OF VULNERABILITIES. THE NATURAL FORCES (I.E., MAGNETIC FIELDS, PROJECTILES, CHEMICALS, HEAT) THAT CAN BE USED TO CAUSE SUBSTANTIAL DAMAGE TO COMPUTER SYSTEMS ARE DISCUSSED. ADDITIONAL DELIBERATION FOCUSES ON METHODS OF PRODUCING COMPUTER-GENERATED REPORTS, CARING FOR EVIDENCE, LEGAL DEFINITIONS IN COMPUTER TECHNOLOGY, PROPRIETARY RIGHTS OF COMPUTER PROGRAMS, EVIDENTIARY PROBLEMS WITH COMPUTER RECORDS, ADMISSIBILITY OF COMPUTER PRINTOUTS AS EVIDENCE, AND COMPUTER RECORDS AS THE BASIS FOR EXPERT TESTIMONY. FINALLY, AN OVERVIEW OF COMPUTER TECHNOLOGY USES NUMEROUS DIAGRAMS AND PHOTOGRAPHS TO DESCRIBE WHAT MAKES A COMPUTER WORK AND TO EXPLAIN COMPUTER PROGRAMMING TECHNIQUES, PROGRAMMING LANGUAGES, COMPUTER SYSTEMS STRUCTURE, DATA COMMUNICATIONS AND TELEPROCESSING, AND VARIOUS COMPUTER CONCEPTS. APPENDIXES CONTAIN COPIES OF COMPUTER-RELATED CRIME LAWS AND PROPOSED COMPUTER-RELATED CRIME LEGISLATION, AS WELL AS EXTENSIVE SUPPORTING MATERIAL. REFERENCES ARE PROVIDED. (WJR)