Objective B:
Without the use of the course text or class notes, the student will identify specialized investigative aspects for computer and communications technology.
The introduction of computers into society has created both investigative assistance and new opportunity for criminal activity.
Specialized Investigative Aspects for Computer and Communications Technology
Computers in Criminal Investigations
- Computers in Criminal Investigations
- Computer Related Crime
- Computer Criminal Traits
Types of Computers
mainframe -
- mainframe
- personal computer (PC)
A high level computer designed for intensive computational tasks. Microsoft Encarta (1994) Microsoft Corporation
Mainframes are computer systems used to maintain large data bases. They are often shared by multiple users connected to the computer via (dumb) terminals.
personal computer (also known as micro computers) -
A computer designed for use by one person at a time.
Personal computers do not need to share the processing, disk, and printer resources of another computer (although they can at the user's option).
Personal computers can be linked together in local area networks (LANs) where data storage, software and other options can be shared.
Types of information that can stored in in computer data bases
Computer Related Crime
- criminal history information
- historical police report information
- moniker database
- method of operation file
- business locator index (night call)
- case file management
- employee skill index
- intelligence files
Computer related crimes can be perpetrated by the suspect using mainframes, personal computers, or LANs.
A computer crime can only be perpetrated when the suspect has access to the computer he/she is targeting.
Access to a computer system is normally gained through
Types of computer crimes
- internal terminal access
- dial-up access
- internet/intranet access
embezzlement -
- embezzlement
- misappropriation of computer time
- theft of computer programs
- telecommunications fraud
- computer hacking
- records tampering
- enterprise criminality
- sabatoge
- terrorism
Electronically misappropriating funds or deleting records of fraudualent transactions.
misappropriation of computer time -
Unauthorized use of a company's computer for personal amusement or personal gain.
theft of computer programs -
Taking computer programs for unauthorized use or sale.
telecommunications fraud -
Using telephones to defraud telecommunications companies, or other companies that operate over telephone lines.
computer hacking -
The unlawful entering of a computer system.
records tampering -
The unlawful entering of a computer system to change records.
enterprise criminality -
The use of computer to keep records by organized criminal groups.
sabatoge -
Intentional disruption of a computer or system by another person.
Osterburg describes a variety of computer sabotage methods on page 598.
terrorism -
Use of computers to deliver electronic "attacks" on computers and things operated by computers.
Computer Criminal Traits
- 15-45 years of age
- male
- wide range of computer expertise
- no criminal record
- targets activities against government and business
- bright, motivated, and ready to accept technical challenges
- fears exposure
- works alone
- deviates little from accepted norms of society
- holds a position of trust within a company with easy access to computers
- is "on guard"
- justifies act as "just a game"
Continue to Goal #7 - Objective C.
Return to Course Learning Goals Page