Overcoming Obstacles: Preparing for Computer-Related Crime

By Groover, Richard S. | The FBI Law Enforcement Bulletin, August 1996 | Go to article overview

Overcoming Obstacles: Preparing for Computer-Related Crime


Groover, Richard S., The FBI Law Enforcement Bulletin


The computer, a jewel of technology, could become the worst enemy of law enforcement agencies across the country. On a daily basis, local law enforcement must deal with a wide assortment of crime situations that, more and more often, involve computers. Local agencies must stay abreast of technology, but in the area of white-collar crime investigations, the computer makes this task difficult.

As explored in the July 1995 FBI Law Enforcement Bulletin article titled "Computer Crime Categories, How Techno-Criminals Operate," computers can intersect with crime in a number of ways. But whether computers are the targets of crime, the instruments of crime incidental to criminal acts, or associated with new versions of traditional crime,(1) the day has come when law enforcement must deal with their presence.

Obstacles

When asked about computer-related crime, most local agency heads say publicly that they do not have such problems in their jurisdictions. But the director of the National White Collar Crime Center asserts that agencies across the country might have very serious problems without realizing it. In fact, it might take years for law enforcement to become proficient in dealing with computer-related crime.(2)

Computer technology has become a significant tool for criminals, just as it has for legitimate private businesses. The head of the Department of Justice's Computer Crime Section predicted a marked increase in the number of computer-literate criminals. In the past, fewer than 10 percent of criminals possessed computer skills; by the year 2000, nearly 90 percent will be computer literate.(3) Such a future presents police and sheriff's departments with serious problems if their investigative staffs are not equipped to handle the technologies used by criminals.

Document trails have been replaced by data trails.(4) A lack of training and proficiency in the use of computer hardware and software handicaps investigators. Even the most basic computer use in a crime or in support of criminal activity can become an obstacle to the investigative process if detectives cannot navigate the computer maze.

Significant evidence might even remain undiscovered without full investigation of computers found at the scene of a crime or at the disposal of the criminal. If an investigator does not enter the system carefully or properly, data (evidence) can be lost.

Law enforcement administrators historically have encountered significant problems finding individuals who possess technical expertise as well as investigative training. There are experienced investigators and there are knowledgeable computer specialists, but rarely does one person command both sets of skills. In fact, one expert estimates that only 25 to 40 people nationwide fit the bill and could manage an investigative unit.(5)

The absence of properly trained investigators represents only one major element of this problem. Computer companies introduce thousands of new products annually, making it a herculean task to stay knowledgeable about computers and the vast world of software. No one can know how to operate every system.

Moreover, no organization, not even a federal agency, could serve as the repository for all the instructions on all software or hardware; the volume simply would be overwhelming. For law enforcement, even iran agency attempted to be prepared by learning how to navigate the more popular programs, how could it predict which products criminals would use? There are just too many popular programs from which to choose.

Where would local agencies go for help in dealing with unfamiliar computer products? Often, they look to the state police for assistance. Several states have established computer crime support units, but these have not developed sufficiently to make a significant dent in the problem. High costs make it virtually impossible to establish a full support capability.(6)

Nor will rescue come from the federal government.

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Overcoming Obstacles: Preparing for Computer-Related Crime
Settings

Settings

Typeface
Text size Smaller Larger
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Full screen

matching results for page

Cited passage

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited passage

Welcome to the new Questia Reader

The Questia Reader has been updated to provide you with an even better online reading experience.  It is now 100% Responsive, which means you can read our books and articles on any sized device you wish.  All of your favorite tools like notes, highlights, and citations are still here, but the way you select text has been updated to be easier to use, especially on touchscreen devices.  Here's how:

1. Click or tap the first word you want to select.
2. Click or tap the last word you want to select.

OK, got it!

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.