Crime Classification Manual Part II Chapter 10 B 28
Crime Classification Manual Part II Chapter 10 B 28
A STANDARD SYSTEM FOR INVESTIGATING AND
CLASSIFYING VIOLENT CRIMES SECOND EDITION
Investigative
Considerations
The targeted
computer should have its hard drive removed and analyzed by special computer
software not only to determine the changed data but to search for possible
Trojan horse software that tests for data checks and then destroys the
corrupted data before they can be analyzed. All computer logs should be analyzed
for suspicious activities, and all Internet activity should be searched for
illegal access and messages.
Comments
Post a Comment