The Role of Computer Technologies in Structuring Evidence Gathering in Cybercrime Investigations: A Qualitative Analysis

In recent decades, law enforcement agencies have increasingly prioritized cybercrime investigations, as evinced by the growing adoption of specialized cybercrime units and personnel. A burgeoning literature has emerged which examines cybercrime units and investigators. Yet, little attention has been...

Ausführliche Beschreibung

Gespeichert in:  
Bibliographische Detailangaben
1. VerfasserIn: Steinmetz, Kevin F. (VerfasserIn)
Beteiligte: Schaefer, Brian P. ; Brewer, Christopher G. ; Kurtz, Don L.
Medienart: Elektronisch Aufsatz
Sprache:Englisch
Veröffentlicht: 2025
In: Criminal justice review
Jahr: 2025, Band: 50, Heft: 1, Seiten: 67-84
Online-Zugang: Volltext (lizenzpflichtig)
Journals Online & Print:
Lade...
Verfügbarkeit prüfen: HBZ Gateway
Schlagwörter:
Beschreibung
Zusammenfassung:In recent decades, law enforcement agencies have increasingly prioritized cybercrime investigations, as evinced by the growing adoption of specialized cybercrime units and personnel. A burgeoning literature has emerged which examines cybercrime units and investigators. Yet, little attention has been given to the role of computers in shaping these investigations. This study addresses this gap through an analysis of qualitative interviews with 47 cybercrime investigative personnel including sworn detectives, civilian analysts, and unit administrators. This analysis confirms and extends prior research by exploring challenges presented by computers to cybercrime investigations including issues surrounding anonymization, encryption, jurisdiction, caseloads, backlogs, data volume, eliciting data from electronic service providers, and the ever-changing technological landscape. Also considered are the advantages offered by such technologies for cybercrime investigations. Computer and network technologies facilitate undercover investigations, provide easy access to global networks and databases, and supply large quantities of evidence to help secure convictions. Finally, this study considers elements of cybercrime investigations not supplanted by computer databases, automation, or network systems. Directions for future research and policy implications are considered.
ISSN:1556-3839
DOI:10.1177/07340168231161091