Please ensure you are using the correct version of the Manual and Q&A for the exam you will be sitting. Find out more.
Dismiss
Show Summary Details
Covert Investigation

Covert Investigation

Clive Harfield and Karen Harfield
Page of

date: 13 December 2024

p. 1469 Covert Investigation Involving Computerslocked

p. 1469 Covert Investigation Involving Computerslocked

  • Clive Harfield
  • , and Karen Harfield

Abstract

This chapter explores how computers can be the scene of a crime, the means by which a crime is planned or committed, a means of communication when facilitating a conspiracy, and a means of investigating crime. It discusses covert investigation which engages computers both as the object under investigation and as a tool used by investigators. It also emphasizes the importance of precision in the drafting of applications and authorities relating to computers, noting the multiple roles of the computer within covert investigation. The chapter illustrates the covert examination of computers involving some form of interference with the target computer, constituting an offence under the Computer Misuse Act 1990. It includes the equipment interference warrant, which allows a range of methods or conduct to be used to obtain communications, equipment data, or other information.

You do not currently have access to this chapter

Sign in

Please sign in to access the full content.

Subscribe

Access to the full content requires a subscription