NCJ Number
136545
Journal
Journal of the Forensic Science Society Volume: 32 Issue: 1 Dated: (January/March 1992) Pages: 27-34
Date Published
1992
Length
8 pages
Annotation
This paper outlines legislation in the United Kingdom relevant to computer crimes, the associated laws of evidence, and the techniques relevant to the reconstruction of evidence and the identification of the offender; the paper also discusses the use of information technology to present this evidence in court.
Abstract
Under the British Computer Misuse Act of 1990, unauthorized access to computer material, unauthorized access with the intent to commit or facilitate the commission of further offenses, and unauthorized modification of computer material were made criminal offenses. For an offense to be committed, it must be proven that the computer performed a function as a consequence of access being attempted or actual access; that the access was unauthorized; that the person attempting access knew that it was unauthorized; and that the access was preliminary to committing or facilitating a serious offense. It is also necessary to demonstrate that modification to computer material was or would have been caused; the modification was unauthorized; the person attempting the modification knew it was unauthorized; and the intention of the modification was to impair the computer's operation. This paper argues that the successful enforcement of the new legislation requires the development of special expertise. Such expertise includes familiarity with the legislation under which computer crime is prosecuted; a detailed knowledge of the workings of a range of operating systems, databases, applications software, and equipment configurations; and ability to use computers in the presentation of information to the court. 13 references