Table of contents (expand)
- The concept, subject and tasks of forensic science
- Forensic system
- The concept and system of forensic technology
- The concept and scientific basis of forensic identification
- Forensic diagnostics
- Forms of using special knowledge in criminal proceedings
- Technical and forensic tools and methods for detecting, recording and removing traces
- Concept, meaning and system of forensic photography, filming, video recording and sound recording
- Forensic photography. Its concept, meaning and types
- Forensic application of filming, video and sound recording and their procedural design
- Subject, system and tasks of traceology. Scientific foundations of traceology
- Classification of traces in traceology
- Hand marks. Properties and types of papillary patterns
- Fingerprint examination
- Footprints. Methods of their fixation and withdrawal. footprint path
- Traces of teeth, lips, nails and other parts of the body
- Traces of blood, semen and other secretions. traces of smoking and dust, their forensic meanings
- Traces of vehicles, their types and meaning
- Traces of hacking tools, their meaning and types
- Odorology. methods for removing and fixing odor traces
- Forensic investigation of materials, substances and products (KIMVI)
- Forensic Habitoscopy
- Classification of human appearance features. rules for describing a person’s appearance using the verbal portrait method. Classification of signs of human appearance
- Forensic phonoscopy
- Forensic weapons. Doing. concept and classification of weapons
- Forensic ballistics. The concept and classification of firearms and ammunition
- Identification of weapons by bullets and cartridges. Establishing the distance and direction of the shot, the location of the shooter
- Forensic investigation of explosive devices, explosives and explosion traces
- The concept and classification of edged weapons
- Forensic research of edged weapons
- Forensic examination of documents
- Forensic study of the letter. Signs of writing and their classification
- Handwriting expertise
- Signs of written speech
- Technical and forensic examination of documents
- General provisions for document inspection. Rules for handling documents - material evidence
- Concept and classification of micro-objects. Rules for detection, seizure and fixation of micro-objects
- Operational and reference accounting
- Forensic records of internal affairs bodies
- General provisions for organizing the disclosure and investigation of crimes
- The concept and types of forensic versions
- Building and checking versions. Deriving Consequences from Versions
- Theoretical foundations of tactical operations and tactical combinations
- Classification and structure of tactical operations
- Crime investigation planning
- The concept, meaning and types of interaction of the investigator with other law enforcement agencies and the public
- Operational-investigative activity as a form of interaction
- The concept and system of forensic tactics
- The concept and types of inspection
- Preparing for production inspection. Inspection tactics
- The concept, types and tasks of interrogation. Preparation for interrogation
- Interrogation of the suspect and the accused
- Interrogation of the witness and the victim
- The concept and types of search. Preparing and conducting a search
- Recording the progress and results of the search and seizure
- The concept, types and tasks of an investigative experiment
- Concept and types of presentation for identification. Preparation for presentation for identification
- The concept and tactics of checking testimony on the spot
- The concept and classification of forensic examinations
- Detention Tactics
- Tactical methods of confrontation
- Tactics for conducting an examination
- The concept and structure of forensic methodology
- The concept and classification of private methods of investigation
- The concept and significance of the forensic characteristics of crimes
- Forensic characterization of murders
- The initial stage of the murder investigation. Identification of an unidentified corpse
- The next stage of the murder investigation. Features of investigative actions
- Features of the investigation of certain types of murders (domestic, serial, contract)
- Forensic characteristics of rape. Methods for exposing staged rape
- Typical investigative versions and situations in the investigation of rape
- Forensic characteristics of theft
- Forensic characteristics of thefts
- Forensic characteristics of robberies and assaults
- Methodology for investigating robberies and robberies
- Forensic characteristics of misappropriation and embezzlement
- Forensic characteristics of fraud
- Extortion Investigation Methodology
- Forensic characteristics of crimes related to illicit drug trafficking
- Forensic characteristics of bribery. Correlation between bribery and corruption
- Features of bribery investigation
- Forensic characteristics of crimes committed by organized criminal groups
- Forensic characteristics of arson
- Forensic characteristics of environmental crimes
- Forensic characteristics of computer crimes
- Forensic characteristics of road traffic crimes
- Forensic characteristics of criminal violations of labor protection and safety regulations
- Features of the investigation of crimes committed by minors
- Features of the investigation of crimes committed by persons with mental abnormalities
- Features of the investigation of unsolved crimes of past years
85. FORENSIC DESCRIPTION OF COMPUTER CRIMES
Computer crimes are very difficult to solve due to a number of reasons:
1) special knowledge is required;
2) a small amount of investigative practice;
3) a wide range of software used by the criminal, including data encryption tools, malware, etc.
Criminals in the field of computer crimes can be divided into several groups:
1) persons who combine professionalism in programming with elements of fanaticism and ingenuity. The reason for committing crimes by this group of criminals is sports passion;
2) persons suffering from a new type of mental illness - information diseases or computer phobias. These diseases are caused by a systematic violation of the information regime: information hunger, information overload, etc. Usually a crime is committed without criminal intent;
3) professional computer criminals. Crimes by this group of criminals are committed for selfish purposes. The criminals of this group are most often part of some criminal formations, usually such formations are hacker groups. This group of criminals can be divided into two types:
a) internal users (persons with direct access to computer information);
b) external users (they use network technologies or intermediary services to obtain the necessary information).
In most cases, the victims are legal entities, while specially hired employees monitor the state of computers. The testimony of these employees is of great importance, as they have special knowledge in the field of computer technology and their duties include monitoring the normal operation of computers in the organization. Usually it is these employees who are the first to find out and report to management about the fact of a crime.
According to the method used by a criminal to access information, computer crimes can be divided into the following groups:
1) seizure of equipment;
2) interception of information:
a) direct interception;
b) electronic interception;
c) audio interception;
d) video interception;
e) garbage collection - unlawful possession by a criminal of waste from a technological process. Forms of garbage collection - physical and electronic;
3) actions of a criminal aimed at obtaining unauthorized access to computer equipment;
4) methods of data manipulation and control commands of computer equipment.
Since the investigation of computer crimes requires special knowledge, they are usually dealt with by special units of investigative authorities. When carrying out investigative actions, the participation of specialists is required. During a search of the premises of a suspect or accused, his computer, which is the weapon of the crime, is confiscated. Before removal, the computer must be sealed in such a way that it is impossible to open it or connect input/output devices and other peripherals to it.
Authors: Aleinikov A.G., Salova E.E.
<< Back: Forensic characteristics of environmental crimes
>> Forward: Forensic characteristics of road traffic crimes
We recommend interesting articles Section Lecture notes, cheat sheets:
▪ Tax law. Lecture notes
▪ Teria of the organization. Crib
▪ Financial right. Crib
See other articles Section Lecture notes, cheat sheets.
Read and write useful comments on this article.
<< Back
Latest news of science and technology, new electronics:
The existence of an entropy rule for quantum entanglement has been proven
09.05.2024
Quantum mechanics continues to amaze us with its mysterious phenomena and unexpected discoveries. Recently, Bartosz Regula from the RIKEN Center for Quantum Computing and Ludovico Lamy from the University of Amsterdam presented a new discovery that concerns quantum entanglement and its relation to entropy. Quantum entanglement plays an important role in modern quantum information science and technology. However, the complexity of its structure makes understanding and managing it challenging. Regulus and Lamy's discovery shows that quantum entanglement follows an entropy rule similar to that for classical systems. This discovery opens new perspectives in the field of quantum information science and technology, deepening our understanding of quantum entanglement and its connection to thermodynamics. The results of the study indicate the possibility of reversibility of entanglement transformations, which could greatly simplify their use in various quantum technologies. Opening a new rule ... >>
Mini air conditioner Sony Reon Pocket 5
09.05.2024
Summer is a time for relaxation and travel, but often the heat can turn this time into an unbearable torment. Meet a new product from Sony - the Reon Pocket 5 mini-air conditioner, which promises to make summer more comfortable for its users. Sony has introduced a unique device - the Reon Pocket 5 mini-conditioner, which provides body cooling on hot days. With it, users can enjoy coolness anytime, anywhere by simply wearing it around their neck. This mini air conditioner is equipped with automatic adjustment of operating modes, as well as temperature and humidity sensors. Thanks to innovative technologies, Reon Pocket 5 adjusts its operation depending on the user's activity and environmental conditions. Users can easily adjust the temperature using a dedicated mobile app connected via Bluetooth. Additionally, specially designed T-shirts and shorts are available for convenience, to which a mini air conditioner can be attached. The device can oh ... >>
Energy from space for Starship
08.05.2024
Producing solar energy in space is becoming more feasible with the advent of new technologies and the development of space programs. The head of the startup Virtus Solis shared his vision of using SpaceX's Starship to create orbital power plants capable of powering the Earth. Startup Virtus Solis has unveiled an ambitious project to create orbital power plants using SpaceX's Starship. This idea could significantly change the field of solar energy production, making it more accessible and cheaper. The core of the startup's plan is to reduce the cost of launching satellites into space using Starship. This technological breakthrough is expected to make solar energy production in space more competitive with traditional energy sources. Virtual Solis plans to build large photovoltaic panels in orbit, using Starship to deliver the necessary equipment. However, one of the key challenges ... >>
Random news from the Archive Packaging for living cells
19.12.2011
For the storage and transport of blood or living cells, specialists from the Institute for Coating and Surface Technology in Braunschweig (Germany) offer plastic bags treated with plasma from the inside.
The bag is filled with a special mixture of gases at slightly above atmospheric pressure, sealed, and a high voltage is applied. Inside for a short time there is a plasma - a luminous ionized gas. The surface of the plastic is sterilized, liquids and cells can be injected with a sterile syringe by piercing the wall of the bag.
The plasma imparts properties to the surface of the plastic that make it easier for the tissue culture to adhere to the plastic.
|
Other interesting news:
▪ The physical standard of the kilogram will be replaced by the quantum formula
▪ Relativistic contraction of the electric field
▪ ViewSonic VX2462-2K-MHDU, VX2762-2K-MHDU and VX2762-4K-MHDU monitors
▪ Microplastics end up in food
▪ Mathematicians have developed the perfect espresso coffee
News feed of science and technology, new electronics
Interesting materials of the Free Technical Library:
▪ site section Lighting. Article selection
▪ article Chaplygin Sergei. Biography of a scientist
▪ article Is the sense of smell stereoscopic? Detailed answer
▪ Kigelia's article. Legends, cultivation, methods of application
▪ article Antenna amplifier of the range of 2 meters. Encyclopedia of radio electronics and electrical engineering
▪ article Converter from 50 MHz to 24 MHz. Encyclopedia of radio electronics and electrical engineering
Leave your comment on this article:
All languages of this page
Home page | Library | Articles | Website map | Site Reviews
www.diagram.com.ua
2000-2024