NCJ Number
173012
Journal
Police Chief Volume: 64 Issue: 8 Dated: August 1997 Pages: 26-28-43
Date Published
1997
Length
11 pages
Annotation
After describing various types of computer-related crime that has occurred, this article discusses the investigation and prosecution of computer-related crime, as well as the use of specialized units.
Abstract
Types of computer-related crime include the sale, theft, or alteration of proprietary data; extortion; gambling; drug trafficking; fraud; disinformation; pornography; software piracy; and computer viruses. Most experts believe computer-related crime is a global problem and that it will increase in the years ahead. Law enforcement agencies should establish special investigation units to address computer-related crime. Personnel for such a unit should be recruited on the basis of their interest, rather than on the basis of background or training. Training in-house personnel in computer crime investigations is especially important; the most experienced investigators recommend the classes offered by the Federal Law Enforcement Training Center in Glynco, Ga. Some agencies have obtained new recruits from the computer science departments of local high schools, universities, and community colleges. Personnel should not be continuously transferred. Establishing a regional investigative unit may be the most cost-effective alternative to implementing an in-house high-tech crimes division. Some guidelines for computer-related crime investigations are provided. A list of 35 Internet websites for resources and a source list for computer software