High-technology Crime: Investigating Cases Involving Computers

High-technology Crime: Investigating Cases Involving Computers
ISBN-10
0964817101
ISBN-13
9780964817104
Category
Law / Forensic Science
Pages
603
Language
English
Published
1995
Publisher
KSK Publications
Author
Kenneth S. Rosenblatt

Description

This book provides law enforcement investigators, corporate investigators, prosecutors, and corporate counsel with step-by- step procedures for investigating cases that involve computers. The book uses the term "high-technology crime" to identify two types of crime associated with high technology. First, the term includes new crimes created by society's widespread use of computers; for example, the crime of breaking and entering into computers flourished after businesses began connecting computers to sophisticated telecommunications networks. High-technology crime also includes traditional crimes so transformed by computer technology that investigators handling such cases must be familiar with computers and the high-technology industry. One chapter discusses basic principles common to investigating high- technology crime, and three chapters examine the most common high-technology crimes: theft of components, computer intrusion, and theft of information. These three chapters provide readers, including those with no technical background or competence, with the necessary technical information to investigate those crimes, along with a procedure for doing so. An appendix contains a checklist for these investigations. The second part of the book examines a growing challenge facing every law enforcement agency in the United States: safely and legally obtaining evidence stored within computers. Obtaining evidence from a computer without damaging equipment or losing data is just one part of the problem; there are also substantial legal hurdles to searching and seizing computer evidence. Few courts have applied the Fourth Amendment to searches for computer evidence, which means that the law in this area remains unclear. Three chapters discuss the legal obstacles to searching and seizing computer evidence and suggest how readers can draft search warrants to surmount those obstacles. A diskette contains investigative checklists and sample search warrant language. Appended introduction to computer technology and an article on how to protect trade secrets from disclosure during a criminal prosecution, along with a sample protective order to be used for that purpose.

Similar books

  • 刑事司法精神医学与刑侦实务
    By 向静

    本技术规范主要起草人:蔡伟雄、黄富银、张钦廷、管唯、汤涛、吴家声。 1 范围本技术规范规定了刑事责任能力评定的基本原则、要求和方法。本技术规范适用于对刑事案件中犯罪嫌疑人的刑事责任能力评定,有关违法案件的受处罚能力评定亦可参照执行。

  • Learning Forensic Assessment
    By Rebecca L. Jackson

    Providing an excellent resource for forensic psychology undergraduate students, this book offers students the opportunity to learn from experts, through the collection of outstanding articles. Unlike other books in the...

  • Dead Reckoning: The New Science of Catching Killers
    By Michael M. Baden, Marion Roach

    In a forty-year career Michael Baden has conducted more than 20,000 autopsies. Considered one of the world's leading forensic pathologists, he was New York City medical examiner from 1960 to...

  • Computer Forensics: Evidence Collection and Management
    By Robert C. Newman

    Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous...

  • Criminal Investigation: Basic Perspectives
    By Charles Lushbaugh, Kenneth M. Wells, Paul B. Weston

    For an undergraduate Criminal Justice course that focuses on general investigative techniques. Anecdotal in nature, this informative and clearly written text helps students discover the art and science of criminal...

  • Police Pictures: The Photograph as Evidence
    By Carol Squiers, Mark Haworth-Booth, Sandra S. Phillips

    The mug shot, the scene of the crime, photographic evidence - all of these are predicated on the belief that the photograph shows the truth, unvarnished and indisputable. But does...

  • Policing Domestic Violence: Experiments and Dilemmas
    By Lawrence W. Sherman, Janell D. Schmidt, Dennis P. Rogan

    "Domestic conflict is the largest single cause of violence in America, yet police have traditionally been reluctant to make arrests for such assaults. In the past decade, however, that reluctance...

  • Practical Aspects of Rape Investigation: A Multidisciplinary Approach, Second Edition
    By Ann Wolbert Burgess, Robert R. Hazelwood

    This Second Edition of Practical Aspects of Rape Investigation presents the latest research findings on the FBI study of the serial rapist. It also provides new and challenging directions for...

  • Threat Assessment and Management Strategies: Identifying the Howlers and Hunters
    By Frederick S. Calhoun, J.D., Stephen W. Weston

    A crucial step in any successful threat management process is knowledge of the players involved. Some individuals truly intend violence (known as hunters), while others merely want to threaten or...

  • Wounded Innocents: The Real Victims of the War Against Child Abuse
    By Richard Wexler

    The war against child abuse has become a war against children. Every year, hundreds of children die, thousands more are forced to live with strangers, and countless American families are...