With the acceptance of computers in our everyday life, a new line of crime has emerged revolving around the computer. Just as computers make daily transactions more efficient, they have also made many crimes more efficient. This trend is likely to continue, and for that reason alone police investigators should make themselves better prepared for computer-related crime investigations. Divided into four sections, this book proposes theoretical and practical information, interventions, directives, and ideas. Section I ...
Read More
With the acceptance of computers in our everyday life, a new line of crime has emerged revolving around the computer. Just as computers make daily transactions more efficient, they have also made many crimes more efficient. This trend is likely to continue, and for that reason alone police investigators should make themselves better prepared for computer-related crime investigations. Divided into four sections, this book proposes theoretical and practical information, interventions, directives, and ideas. Section I establishes standards for computer crime investigation, the computer crime investigation team, the computer system in criminal enterprise, the computer crime lab, expert assistance, and what the experts can do for your investigation. Section 2 deals with hardware and software crimes, theft of information, cyberstalking, identity theft, and exemplary federal cases. Section 3 focuses on the computer crime investigation, initial assessment and response, applying forensic science techniques, the basics of tracking the offender, and basic network systems. Section 4 deals with search, seizure, digital evidence, the Fourth Amendment principles and computer searches, general rules of consent, informants, undercover operatives, and the application of direct and circumstantial evidence. The appendices contain a wealth of information on identifying the computer components, understanding software, networks and communication systems, and a computer seizure checklist. This text will be a useful resource for law enforcement professionals, criminal justice students, security professionals, and private business.
Read Less