1. NIST Special Publication 800-61 Rev. 2, Computer Security Incident Handling Guide.
Section 3.3.3, Reporting to External Organizations: This guide explicitly states, "If an incident involves criminal activity, such as a threat from an attacker, the organization should report the incident to law enforcement. The organization should also consult its legal department regarding the incident." This directly supports the requirement to refer criminal acts to law enforcement.
2. Nelson, B., Phillips, A., & Steuart, C. (2019). Guide to Computer Forensics and Investigations (6th ed.). Cengage Learning. (A standard textbook in university computer forensics courses).
Chapter 1, Understanding the Digital Forensics Profession and Investigations, Section: "Private-Sector Investigations" (pp. 11-12): The text distinguishes between the two types of investigations, stating, "In private-sector investigations, you must follow company policy and guidelines... However, if your investigation uncovers evidence that a crime was committed, you must stop your investigation to make sure you don’t violate the rights of the suspect... At this point, your employer’s legal department and management should decide whether to involve law enforcement." This confirms the transition and referral process.
3. NIST Special Publication 800-86, Guide to Integrating Forensic Techniques into Incident Response.
Section 2.3, Interaction with Other Teams: This document discusses the necessary coordination between an incident response team and other entities, including law enforcement. It notes, "If it is possible that a crime has been committed, the organization should contact law enforcement... Law enforcement may then take over the investigation or provide guidance to the organization’s investigators." This reinforces that the discovery of a crime necessitates involving and often deferring to law enforcement, effectively making it a public-sector concern.