NCJ Number
198421
Date Published
February 2002
Length
113 pages
Annotation
This report is designed to reduce the "skill distance" between what computer criminals have learned that enables them to commit their crimes through the use of a computer and what law enforcement personnel need to know to bring these offenders to justice.
Abstract
The report notes that computer crime, in general, results from situations in which offenders capitalize on perceived opportunities to invade computer systems to achieve criminal ends or use computers as instruments of crime, confident that law enforcement officials do not have the means or knowledge to prevent or detect such criminal acts. This report presents up-to-date information on computer crime commission and investigation to help the reader understand how offenders use technology to commit their crimes (i.e., the most popular and effective methods); what enforcers must know to effectively detect/investigate these offenses; and in which areas offenders are still exceeding the skills of law enforcement. The tools being used by offenders are logically grouped and categorized by function (e.g., scanning tools, wardialing programs, and password crackers). The investigative tools described address the investigative needs, such as evidence source identification, evidence preservation, evidence extraction, and evidence analysis. These tools are grouped into the general categories of evidence collection and preservation tools, evidence extraction tools, evidence examination tools, evidence organization tools, network forensic tools, attack analysis tools, multipurpose forensic tools and toolkits, and trusted time stamping. These tools are further separated by function into subcategories. The body of this report presents general descriptions of the investigative tools, accompanied by directions on where more specific information on the tools can be found.
Date Published: February 1, 2002
Downloads
Similar Publications
- The Effects of Community-infused Problem-oriented Policing in Crime Hot Spots Based on Police Data: A Randomized Controlled Trial
- IS2aR, a Computational Tool to Transform Voxelized Reference Phantoms into Patient-specific Whole-body Virtual CTs for Peripheral Dose Estimation
- Exposure to Child Sexual Abuse Material among Law Enforcement Investigators: Exploring Trauma and Resilience Profiles