Font Size: a A A

Study Of Computer-related Crime Investigation

Posted on:2009-10-29Degree:MasterType:Thesis
Country:ChinaCandidate:L YangFull Text:PDF
GTID:2206360248951226Subject:Investigation
Abstract/Summary:PDF Full Text Request
Computer technology and Internet technology are popularizing gradually, make the information moment share possible. All-round information society arrival also stirred up a new crime hotbed. The crime that involves the computer is continuing without end, expressing complications diverse, the means renews increasingly, the opposition between its virtual conjecture and the reality of the tradition crime, make the current entity law and the procedure law related be kept constantly on reply. As for the definition issue that involves the computer- crime hasn't been stopping yet, the definition of the related criminal accusation and concept has been controversial focus, and law enforcement in reality feels also gradually legally nothing to follow. How to break the several of difficult position, make the criminal be subjected to the punishment that should have, and attain to separate the invasion for the reality society of this kind of crime while defending the visual world security is a problem worthy of investigating deeply. The author tries from the point of view of the investigation, has a systematic discussion on the computer-related crime.In addition to the foreword and concluding remarks, the full text is divided into three parts totally:Part I is the summary of computer-related crime.First from the angle of the history and the reality of development trend of the computer-related crime to define this kind of crime, make sure the concept foundation of this paper, that is, adopt computer-related crime this certain definition to discuss in the whole paper. This paper shed lights on it.Second, by the introduction of the characteristic and the performance of the computer-related crime to establish the crime target of this kind of crime is digital information, then establishing a invariable coordinate in the numerous and complicated phenomenon of the computer-related crime, and provide a beneficial support factor for the investigation. Third, compare the concept between computer security event and computer-related crime, as well provide another beneficial theories support for investigation being beset with difficulties in reality.Part II discuss the investigate measure of computer-related crime systematically, which is divided into four points.First, discuss the crime scene investigation of computer-related crime. Although the investigation of this kind of crime needs higher digital forensic technology, and obtain the evidence is more difficult, it is an important step should not be ignored. The more not easy to discover relevance evidence, the more calmly and meticulously to use traditional investigation measure to look for the existent doubtful point. It is proved that this is very effective. Traditional investigate measure, such as the crime scene confirmation, the crime scene protection and investigation interviews, all of them can search the clues of crime from different angle.Second, the crime reconstruction of special aimed at computer-related crime, is take the foundation of crime scene investigation. Apply investigate supposition theories to make the rational reasoning, such as how the criminal invade or attack the target computer, then can get the right conclusion to carry on the investigation followed, acquire the evidence that can prove the crime facts. This is also an investigate method that combine the traditional investigate measure to technology. This paper shed lights on it.Third, discuss the digital forensics. The evidence and the evidence rule of this kind of crime have its own characteristics. Although the current legislation didn't establish a legal position for it in our country, the prove ability of this kind evidence cannot be neglected. Because of the particularity, need to use the special technique means and tools. It divided into according to the single machine digital forensics and network forensics. After this needs to analysis the evidence, build up a reasonable evidence chain, to provide a basis for arresting criminal.Fourth, during the investigate process there are some problems. One is the police who will face, another is the victims to face and that may also possibly bring about certain block to the police's work.Part III discuss the prevention of the computer-related crime and anti-hacker intrusion countermeasure research.First is on the foundation of investigation of this kind crime which discussed in part II. Using the criminological of the crime prevention theories carries on a prevention research to this kind of crime. This paper shed lights on it. Computer-related crime appears according to various not only the leak of calculator and but also the network the management leak of the factitiousness. As long as improving the related law system, build up the consciousness that preventing trouble before it happens, and to make up measure which consummate manage leak and the computer safety technique leak, can make the valid prevention of the computer-related crime. It also should be noticed that some related prevention and management measures toward this kind of crime in other countries.Second, discuss the countermeasure research about anti-hacker intrusion. In this section, there are three points. The one is, any crime has the crime motivation. As long as the investigator find out the crime motivation, it will be advantageous to the investigation, the computer-related crime is also no exception. Any attack of the hacker irruptive behaviors all exist certain crime motivation. There are certain acts of criminal motives, or simply the desire to incitement mental state of play the joy purely, or the treachery mental state of the technique challenge, or a simple sense of justice, or to the commercial interests of the greedy, etc. Thus, it is clear that the morals standard in the reality can't tie their madness up in the virtual world. Another one is, hackers have their own special tool for crime, but it can be categorized by the performance of various types of the crime. Here is laying particular emphasis on the techniques and tools of how hackers carry on invade and attack, which is different with the digital forensics techniques and tools in the second part. It is not difficult to see the similarities between them, and which reflect that the technology and tools of hackers can be allowed under the premise of the law. The last one, by the analysis of the hackers' crime motivation and means, the author put forward the technology is not the only means of resolving the problem hackers. Increasingly, law enforcement have find that the benefits of the alliance with the "experts". Let the "good" hackers be against with the "evil" hackers perhaps is a good solution. At the same time, we should see the infinitude of the technical development; initiative prevention is the best solution.Through three part study, the authors hope to understand the computer-related crime problems fully, and put forward feasibility based on it, and provide some reference for the investigation practice.
Keywords/Search Tags:computer-related crime, investigate measure, prevention, hackers
PDF Full Text Request
Related items