Prior to the 1970s, crimes involving computers were dealt with using existing laws. The first
computer crimes were recognized in the 1978 Florida Computer Crimes Act, which included legislation against the unauthorized modification or deletion of data on a computer system.
1980s–1990s: Growth of the field The growth in computer crime during the 1980s and 1990s caused
law enforcement agencies to begin establishing specialized groups, usually at the national level, to handle the technical aspects of investigations. For example, in 1984, the
FBI launched a
Computer Analysis and Response Team and the following year a computer crime department was set up within the British
Metropolitan Police fraud squad. As well as being law enforcement professionals, many of the early members of these groups were also computer hobbyists and became responsible for the field's initial research and direction.
Development of forensic tools During the 1980s, very few specialized digital forensic tools existed. Consequently, investigators often performed
live analysis on media, examining computers from within the operating system using existing
sysadmin tools to extract evidence. This practice carried the risk of modifying data on the disk, either inadvertently or otherwise, which led to claims of evidence tampering. A number of tools were created during the early 1990s to address the problem. The need for such software was first recognized in 1989 at the
Federal Law Enforcement Training Center, resulting in the creation of IMDUMP (by Michael White) and in 1990, SafeBack (developed by Sydex). Similar software was developed in other countries; DIBS (a hardware and software solution) was released commercially in the UK in 1991, and Rob McKemmish released
Fixed Disk Image free to Australian law enforcement. ==Forensic process==