Menu English Ukrainian russian Home

Free technical library for hobbyists and professionals Free technical library


Lecture notes, cheat sheets
Free library / Directory / Lecture notes, cheat sheets

Криминалистика. Криминалистическая характеристика компьютерных преступлений (самое важное)

Lecture notes, cheat sheets

Directory / Lecture notes, cheat sheets

Comments on the article Comments on the article

Table of contents (expand)

85. FORENSIC DESCRIPTION OF COMPUTER CRIMES

Computer crimes are very difficult to solve due to a number of reasons:

1) special knowledge is required;

2) a small amount of investigative practice;

3) a wide range of software used by the criminal, including data encryption tools, malware, etc.

Criminals in the field of computer crimes can be divided into several groups:

1) persons who combine professionalism in programming with elements of fanaticism and ingenuity. The reason for committing crimes by this group of criminals is sports passion;

2) persons suffering from a new type of mental illness - information diseases or computer phobias. These diseases are caused by a systematic violation of the information regime: information hunger, information overload, etc. Usually a crime is committed without criminal intent;

3) professional computer criminals. Crimes by this group of criminals are committed for selfish purposes. The criminals of this group are most often part of some criminal formations, usually such formations are hacker groups. This group of criminals can be divided into two types:

a) internal users (persons with direct access to computer information);

b) external users (they use network technologies or intermediary services to obtain the necessary information).

In most cases, the victims are legal entities, while specially hired employees monitor the state of computers. The testimony of these employees is of great importance, as they have special knowledge in the field of computer technology and their duties include monitoring the normal operation of computers in the organization. Usually it is these employees who are the first to find out and report to management about the fact of a crime.

According to the method used by a criminal to access information, computer crimes can be divided into the following groups:

1) seizure of equipment;

2) interception of information:

a) direct interception;

b) electronic interception;

c) audio interception;

d) video interception;

e) garbage collection - unlawful possession by a criminal of waste from a technological process. Forms of garbage collection - physical and electronic;

3) actions of a criminal aimed at obtaining unauthorized access to computer equipment;

4) methods of data manipulation and control commands of computer equipment.

Since the investigation of computer crimes requires special knowledge, they are usually dealt with by special units of investigative authorities. When carrying out investigative actions, the participation of specialists is required. During a search of the premises of a suspect or accused, his computer, which is the weapon of the crime, is confiscated. Before removal, the computer must be sealed in such a way that it is impossible to open it or connect input/output devices and other peripherals to it.

Authors: Aleinikov A.G., Salova E.E.

<< Back: Forensic characteristics of environmental crimes

>> Forward: Forensic characteristics of road traffic crimes

We recommend interesting articles Section Lecture notes, cheat sheets:

Tax law. Lecture notes

Teria of the organization. Crib

Financial right. Crib

See other articles Section Lecture notes, cheat sheets.

Read and write useful comments on this article.

<< Back

Latest news of science and technology, new electronics:

The existence of an entropy rule for quantum entanglement has been proven 09.05.2024

Quantum mechanics continues to amaze us with its mysterious phenomena and unexpected discoveries. Recently, Bartosz Regula from the RIKEN Center for Quantum Computing and Ludovico Lamy from the University of Amsterdam presented a new discovery that concerns quantum entanglement and its relation to entropy. Quantum entanglement plays an important role in modern quantum information science and technology. However, the complexity of its structure makes understanding and managing it challenging. Regulus and Lamy's discovery shows that quantum entanglement follows an entropy rule similar to that for classical systems. This discovery opens new perspectives in the field of quantum information science and technology, deepening our understanding of quantum entanglement and its connection to thermodynamics. The results of the study indicate the possibility of reversibility of entanglement transformations, which could greatly simplify their use in various quantum technologies. Opening a new rule ... >>

Mini air conditioner Sony Reon Pocket 5 09.05.2024

Summer is a time for relaxation and travel, but often the heat can turn this time into an unbearable torment. Meet a new product from Sony - the Reon Pocket 5 mini-air conditioner, which promises to make summer more comfortable for its users. Sony has introduced a unique device - the Reon Pocket 5 mini-conditioner, which provides body cooling on hot days. With it, users can enjoy coolness anytime, anywhere by simply wearing it around their neck. This mini air conditioner is equipped with automatic adjustment of operating modes, as well as temperature and humidity sensors. Thanks to innovative technologies, Reon Pocket 5 adjusts its operation depending on the user's activity and environmental conditions. Users can easily adjust the temperature using a dedicated mobile app connected via Bluetooth. Additionally, specially designed T-shirts and shorts are available for convenience, to which a mini air conditioner can be attached. The device can oh ... >>

Energy from space for Starship 08.05.2024

Producing solar energy in space is becoming more feasible with the advent of new technologies and the development of space programs. The head of the startup Virtus Solis shared his vision of using SpaceX's Starship to create orbital power plants capable of powering the Earth. Startup Virtus Solis has unveiled an ambitious project to create orbital power plants using SpaceX's Starship. This idea could significantly change the field of solar energy production, making it more accessible and cheaper. The core of the startup's plan is to reduce the cost of launching satellites into space using Starship. This technological breakthrough is expected to make solar energy production in space more competitive with traditional energy sources. Virtual Solis plans to build large photovoltaic panels in orbit, using Starship to deliver the necessary equipment. However, one of the key challenges ... >>

Random news from the Archive

Packaging for living cells 19.12.2011

For the storage and transport of blood or living cells, specialists from the Institute for Coating and Surface Technology in Braunschweig (Germany) offer plastic bags treated with plasma from the inside.

The bag is filled with a special mixture of gases at slightly above atmospheric pressure, sealed, and a high voltage is applied. Inside for a short time there is a plasma - a luminous ionized gas. The surface of the plastic is sterilized, liquids and cells can be injected with a sterile syringe by piercing the wall of the bag.

The plasma imparts properties to the surface of the plastic that make it easier for the tissue culture to adhere to the plastic.

Other interesting news:

▪ The physical standard of the kilogram will be replaced by the quantum formula

▪ Relativistic contraction of the electric field

▪ ViewSonic VX2462-2K-MHDU, VX2762-2K-MHDU and VX2762-4K-MHDU monitors

▪ Microplastics end up in food

▪ Mathematicians have developed the perfect espresso coffee

News feed of science and technology, new electronics

 

Interesting materials of the Free Technical Library:

▪ site section Lighting. Article selection

▪ article Chaplygin Sergei. Biography of a scientist

▪ article Is the sense of smell stereoscopic? Detailed answer

▪ Kigelia's article. Legends, cultivation, methods of application

▪ article Antenna amplifier of the range of 2 meters. Encyclopedia of radio electronics and electrical engineering

▪ article Converter from 50 MHz to 24 MHz. Encyclopedia of radio electronics and electrical engineering

Leave your comment on this article:

Name:


Email (optional):


A comment:





All languages ​​of this page

Home page | Library | Articles | Website map | Site Reviews

www.diagram.com.ua

www.diagram.com.ua
2000-2024