Reconstructing the crime

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search

Reconstructing the crime

It may be valuable to attempt a re-enactment of the computer crime as the prosecution believes it took place. If the crime cannot be duplicated in the manner suggested by the police reports, the defense position is strengthened. Where the identity of the perpetrator of the computer crime is at issue, counsel should look for evidence of perpetrators other than the defendant, especially if the manner and time of the crime are narrowed. Therefore, it is important to be able to learn how the terminal operator can override programs being processed, the relation between different jobs being processed, and the records kept of personnel working with or in the computer.