Issc351 Essay

1513 Words Aug 4th, 2015 7 Pages
Computer Related Crimes

Michael Dill

American Military University

ISSC351 Computer Forensics

Dr. Kevin Harris

June 21, 2015


I. Introduction

A. Computer related crimes 1. What are computer related crimes 2. Types of computer related offenses 3. The increase in computer related crimes

II. Computer related crimes

A. What are computer related crimes 1. Legal definitions 2. Perceived definitions

B. Types of computer related offenses 1. Object of the Crime 2. Subject of the crime 3. Instrument

III. Process for Investigating the Crime

A. Evidence 1. Collecting 2. Seizing 3. Chain of Custody 4. Protecting
…show more content…
Subject refers to the computer being the physical site of the crime. Viruses would fall into this category. “A computer may be an “instrument” used as a means of committing traditional crimes such as theft, fraud, embezzlement, or trespass albeit in a more complex manner” (Carroll & Schrader, 2015). Object and instrument are usually found together as a computer is used as an instrument to attack another computer (or person) and is considered the object of the attack. Computers are used every day and most households have at least one computer in their home. Computer crimes have seen an increase due to this fact. With this increase in computer related crimes there is a need for more investigators that are skilled in the art of investigating these computer related crimes (Dalakov, 2015). When investigating any crime there are certain rules or procedures that must be followed when seizing, collecting and moving evidence. There are several ways evidence can be seized. A search warrant can be secured which will allow law enforcement or other agents of the law to look for evidence. Consent can be granted by the owner allowing for a search of the property. Evidence in plain sight can be seized without the need of consent or a search warrant. When seizing electronic evidence (computers, laptops, tablets, PDAs or smart phones) there are more steps that have to be followed to ensure the integrity of the evidence (Staff, Legal

Related Documents