Computer Crime Investigation and Prosecution: Organizing for Computer Crime
Provides an overview of existing approaches law enforcement agencies are using to handle computer-related crime cases, illustrative case examples of crimes investigated by state and local personnel, and recommendations for effective investigation and prosecution of computer crime.
What people are saying - Write a review
We haven't found any reviews in the usual places.
affiant Appendix Arizona Association Attorney General's office Avenue Baltimore County Bequai bulletin board bulletin board systems charged Colorado communications Computer Crime Investigators Computer Crime Laws Computer Crime Units computer evidence computer fraud Computer Security computer system computer-related crime investigation computer-related investigations computer-related offenses computer-related prosecution crime scene criminal justice developing disks Economic Crime Unit electronic employee enforcement and prosecutors expertise experts Hacker handle computer-related crimes Institute of Justice investigate computer-related crimes investigation and prosecution investigation of computer-related jurisdiction Lakewood law enforcement law enforcement agencies law enforcement officers Maricopa County Maryland modem National Institute Ohio P.O. Box personal computer Philadelphia Philadelphia Police Department Pikesville Program prosecuting computer-related crimes prosecution of computer-related prosecutors puter related crimes School of Law search warrants SRI International Stat Street technical Technology telecommunications fraud telephone theft tion U.S. Department U.S. Secret Service vestigators victims Washington
Page 94 - University of Pittsburgh School of Law 3900 Forbes Avenue Pittsburgh, PA 15260 412-624-6200 45.
Page 91 - The American University Washington College of Law 4400 Massachusetts Avenue, NW Washington, DC 20016 202-885-2606 3.
Page 94 - University of Tennessee College of Law 1505 West Cumberland Avenue Knoxville, TN 37996-1800 615-974-4131 50.
Page 82 - ... internal and peripheral storage devices (such as fixed disks, external hard disks, floppy disk drives and diskettes, tape drives and tapes, optical storage devices...
Page 81 - You are hereby commanded to search forthwith the (place) named for the property specified, serving this warrant and making the search (at any time in the day or night1) and if the property be found there to seize it, leaving a copy of this warrant and a receipt for the property taken, and prepare a written inventory of the property seized and return this warrant and bring the property before me within ten days of this date, as required by law.
Page 94 - William Mitchell College of Law 875 Summit Avenue St. Paul, MN 55105...
Page 6 - Computer abuse encompasses a broad range of intentional acts that may or may not be specifically prohibited by criminal statutes. Any intentional act involving knowledge of computer use or technology is computer abuse if one or more perpetrators made or could have made gain and/or one or more victims suffered or could have suffered loss.
Page 86 - Crimes (IAFCI) 385 Bel Marin Keys Blvd., Ste. H Novato, CA 94949-5636 Contact: Renee Willlard Ph: (415)897-8800 Fax: (415)898-0798 Staff: 4. Descr: Special agents, investigators, and investigation supervisors who investigate criminal violations of credit card laws and prosecute offenders; law enforcement officers, prosecutors, or related officials who investigate, apprehend, and prosecute credit card offenders; employees of card issuing institutions who are responsible for credit card security and...