U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

COMPUTER CRIME INVESTIGATION MANUAL

NCJ Number
57578
Author(s)
T A SCHABECK
Date Published
1979
Length
366 pages
Annotation
THIS MANUAL PROVIDES THE ATTORNEY, AUDITOR, AND INVESTIGATOR WITH A COMPLETE REFERENCE COVERING METHODS AND TECHNIQUES FOR INVESTIGATING AND PROSECUTING COMPUTER CRIMINALS.
Abstract
AN OVERVIEW OF COMPUTER CRIME AND ITS SOCIAL IMPACT, AND DATA PROCESSING CONCEPTS, METHODS, AND EQUIPMENT EXAMINES TRAINING REQUIREMENTS FOR COMPUTER CRIME INVESTIGATION AND INCLUDES A THREAT EVALUATION REFERENCE TABLE TO AID THE INVESTIGATOR. IN ADDITION, IT DESCRIBES CODING STRUCTURES, COMPUTER INPUT AND OUTPUT DEVICES, PROGRAMMING LANGUAGES, PROCESSING CONCEPTS, DATA RECORDING MEDIA, DOCUMENTATION STANDARDS, ELEMENTS OF A TELEPROCESSING SYSTEM, AND THREATS TO COMPUTER SECURITY, AND IT PROFILES TYPES OF COMPUTER CRIMINALS AND THEIR CRIMES. THE METHODOLOGY FOR COMPUTER CRIME INVESTIGATION INCLUDES PRELIMINARY LEGAL CONSIDERATIONS AND DETAILED PHASES OF INVESTIGATION (INITIAL INTERVIEW/MEETING, INVESTIGATION PLANNING, INFORMATION GATHERING AND ANALYSIS, INTERVIEWING AND INTERROGATION, TECHNICAL DATA SYSTEMS REVIEW, EVALUATION OF PHYSICAL EVIDENCE, CASE PRESENTATION). INVESTIGATIVE AUDITING IS DISCUSSED AS A METHOD OF INFORMATION GATHERING AND ANALYSIS; EMPHASIS IS ON COMPUTERS AS INVESTIGATIVE AIDS, STATISTICAL SAMPLES, INVESTIGATIVE SOFTWARE AIDS, AND ACCOUNTING BASICS. ALSO, FEDERAL AND STATE LAWS APPLICABLE TO THE PROSECUTION OF COMPUTER CRIMINALS ARE DEFINED. EACH CHAPTER CONTAINS REFERENCES, TABLES, AND ILLUSTRATIONS. RESOURCES AND AN EXTENSIVE GLOSSARY ARE APPENDED, AND FEEDBACK SHEETS ARE PROVIDED FOR MANUAL USERS WANTING TO CORRECT INACCURATE INFORMATION, SUGGEST NEW TECHNIQUES, OR SHARE IDEAS. AN INDEX IS ALSO INCLUDED. (WJR)