Font Size: a A A

Computer Network Crime Investigation And Legal Supervision

Posted on:2017-05-31Degree:MasterType:Thesis
Country:ChinaCandidate:Y WuFull Text:PDF
GTID:2296330503959115Subject:Litigation law
Abstract/Summary:PDF Full Text Request
In recent years, Computer network has become an indispensable part of people’s life, Especially the development of wireless Internet access and mobile Internet access and other functions, which takes people and the Internet are linked together. Internet is not only to facilitate people’s lives but also to become a number of criminals committing the crime, and even the object of crime, making the state and citizens of the property and interests, and even commercial, national security has suffered a serious threat. Since the United States in 1966, the first computer network crimes cases investigated, the growth rate of computer network crime on staggering. Since the first discovery of cyber crime in China in 1986, in just less than 30 years time, the number of cyber crime, behavior and the impact of the impact will have to make people begin to pay attention to computer network crime.Computer network crime, it’s not some specific offenses, such as traffic accident crime, nor is it certain types of crime, such as crimes against public security, which is an upgraded version of the traditional criminal means, it is developed to a certain stage of human technology generated a highly intelligent crime. Therefore, in order to protect state property and people, as well as commercial interests and national security, Investigators conducted a computer network crimes reported from others either report, phishing complaints or through its own means of surveillance, special attack, or implicated in criminal information from existing information in the case was found, almost every use of electronic surveillance technology, There may even be a virtual investigation to the investigation of the case, and finally through electronic forensics technology to fix their own results of the investigation, so as to stop the investigation of their activities.The purpose of the investigation is to obtain information and evidence of the case through the investigation of behavior, so as to maximize the case to restore the truth, so that the suspects to justice. Therefore, the evidence obtained by the investigation is an important purpose of investigation behavior. However, due to the existence of certain flaws in the evidence of the investigation behavior of the investigators, the defects of these evidence are discussed and improved, which is conducive to the promotion of the investigation personnel to carry out the investigation.Investigation activities is of course important, but the rights of citizens cannot be ignored, in order to find out the facts of the case, to catch the criminal suspect, investigation power tend to abuse by investigators, then in order to effectively prevent the investigation power abuse, investigating behavior of the related were legal supervision is very necessary.This article is written down to this line of thought:The first chapter of the article is mainly on the status quo and development trend of computer network crimes have been studied, but for different types of crime, it will have some different methods of investigation, Furthermore, analysis of computer network crime characteristics, current situation and development trend, there will be conducive to the conduct of computer network crime investigation following discussion.The second chapter of the article is a computer network crime investigation done research, Through the case to understand the investigation is how to open, through the study of computer forensic technology, virtual investigation and detection technology to realize computer network crime investigation means. In addition to the principle of investigation and analysis of the status quo of foreign investigation, to further clarify the problem of our country’s investigation, For the following monitoring and improvement foreshadowed.The third chapter of the article is an analysis of the main problems of the evidence obtained by the investigation carried out. The process of investigation is to find the facts of the case, the process of collecting evidence, and therefore because of the investigation process, the evidence procedure and other reasons will make the obtained evidence exists some problems. By analyzing the problems of the evidence confirms, and investigation and evidence collection, We can Find out the problems from the opposite side.The fourth chapter of the article is to put forward my own point of view of the legal supervision and improvement. Investigation personnel both from another report, report, Internet fraud complaint or their by means of monitoring and special combat, and from the existing criminal information implicated in the information found in the case of, thereby opening the computer network crime investigation, almost all use of electronic surveillance technologies. There may even be a virtual investigation to the investigation of the case, and finally through electronic forensics technology to fix their own results of the investigation, so as to stop the investigation of their activities. However, in order to find out the truth of the case, the arrest of the suspect, the power of investigation will often be abused by investigators, So in order to effectively prevent the abuse of the power of investigation, it is necessary to conduct legal supervision on the relevant investigation. Similarly, in the process of legal supervision, found a legal loophole, and then improve the legal loopholes, Is also within the authority of legal supervision, in order to better conduct legal supervision. Therefore, this chapter mainly discusses the legal supervision and improvement.
Keywords/Search Tags:Computer network crime, Computer network crime investigation, Evidence flaw, legal supervision, perfection of the legal mechanisms
PDF Full Text Request
Related items