Reconstructing the crime
Jump to navigation
Jump to search
Reconstructing the crime
It may be valuable to attempt a re-enactment of the computer crime as the prosecution believes it took place. If the crime cannot be duplicated in the manner suggested by the police reports, the defense position is strengthened. Where the identity of the perpetrator of the computer crime is at issue, counsel should look for evidence of perpetrators other than the defendant, especially if the manner and time of the crime are narrowed. Therefore, it is important to be able to learn how the terminal operator can override programs being processed, the relation between different jobs being processed, and the records kept of personnel working with or in the computer.