Crime Classification Manual Part II Chapter 10 B 28

 


Crime Classification Manual Part II Chapter 10 B 28

A STANDARD SYSTEM FOR INVESTIGATING AND CLASSIFYING VIOLENT CRIMES SECOND EDITION

 

Investigative Considerations

The targeted computer should have its hard drive removed and analyzed by special computer software not only to determine the changed data but to search for possible Trojan horse software that tests for data checks and then destroys the corrupted data before they can be analyzed. All computer logs should be analyzed for suspicious activities, and all Internet activity should be searched for illegal access and messages.

Comments

Popular posts from this blog

ll.Crime Classification Manual Part II Chapter 6 B 20

rime Classification Manual Part II Chapter 9 B 46

Is the role of deviant sexual fantasy related to the types of sexual offence committed by Ted Bundy? (9)