| At present,the network society has entered the era of big data and cloud computing,and the network crime has evolved to the stage of data stealing and integrated processing in the technical dimension.Data mining,integration and transaction become more and more convenient,and the data society based on personal information is gradually forming.In the use value of personal information,its output at all levels does bring convenience to users’ lives.However,it is undeniable that with the increasing number of data and the increasing concentration of industrial chains,data security in the whole social environment has also brought new threats,and data has increasingly become one of the most important targets of attack [Yu Zhigang,Li Yuanzi: the idea of sanctions for crimes based on algebra in big data,published in China Social Sciences,2014,issue 10.]。 At present,some criminals begin to aim at countless personal information scattered in the network terminals,which seems to have no obvious value on the surface.These personal information is not only easy to become the target of criminals,but also may become the tool of criminals.In practice,the crime of infringing personal information of citizens is not always an independent crime,but is mostly based on the crime of destroying public telecommunication,the crime of hindering credit card management,the crime of telecommunication fraud and other crimes,which greatly improves the social harmfulness of the crime of infringing personal information of citizens,and based on the lag of legislation,for some acts infringing personal information of citizens,the legislation has not been made clear The boundary between the true crime and the non crime.Therefore,it is necessary to carry out a forward-looking investigation of the crime of infringing upon citizens’ personal information.The first chapter,mainly from the infringement of citizens’ personal information crime connotation,legislative evolution,crime characteristics,harm and crime means three aspects are summarized.First of all,from different disciplines to carry out the interpretation of personal information,to understand the definition of laws and regulations around the world,so as to clarify the basic connotation of personal information.Secondly,from the legislative level,this paper expounds the deductive process of the crime of infringing upon citizens’ personal information at the criminal legal level,explores the research background of the crime of infringing upon citizens’ personal information,and the urgent needs of the development of the times.Thirdly,from the three levels of the state,society and individuals,it analyzes the harmfulness of the crime of infringing personal information of citizens.Finally,it mainly discusses the means of infringing citizens’ personal information crime.This is mainly based on the Internet era as the analysis background,from the citizen personal information collection stage,personal information processing link and personal information output link,three links are analyzed.The second chapter discusses the difficulties in the investigation of the crime of infringing the personal information of citizens.First of all,this kind of crime has the characteristics of difficult to start investigation,which is mainly reflected in the difficulty in determining the nature of the case and the limited use of investigation measures.Secondly,it is difficult to investigate and collect evidence,which shows that the criminal subject has special knowledge and skills,it is difficult to detect,and the criminal evidence is easy to be tampered with.In this kind of crime,the criminals often use false website or false IP address when committing crimes,which further increases the difficulty of developing criminal clues.Thirdly,the investigation cooperation is not smooth,on the one hand,the external investigation cooperation is not smooth,on the other hand,the internal investigation cooperation of public security organs is not smooth.Finally,it is difficult to identify and seize the suspects,and the suspects are widely distributed.In terms of the domain name of the website where the crime is committed,the actual registrant,telephone number and the real name of the bank card cannot be verified,and the whole crime is carried out on the network,and the criminal does not participate in the crime in the physical link,so even if the investigators find out who is selling and selling the personal information of citizens,it is only a virtual identity at the network level,Still can’t know the real identity of the real criminal.The third chapter is the core content of this paper,that is,the way to improve the investigation countermeasures of the crime of infringing the personal information of citizens.First of all,the investigation of this kind of crime from the perspective of expanding the collection of clues,through the establishment of information sharing system,improve the collection efficiency of clues,deepen the police practice mode,strengthen the research and judgment of criminal clues,establish the concept of information sharing,and break the data barriers.Secondly,from the perspective of investigation and evidence collection,establish digital monitoring system and intelligent command and dispatching center,realize the integrated dispatching of information resources,build a diversified social governance platform,and unblock the path of public reporting;establish a visual intelligence system,study and judge the law of crime.Thirdly,from the perspective of investigation cooperation,strengthen external investigation cooperation and internal investigation cooperation.Secondly,from the perspective of improving investigation methods,we should carry out investigation based on the assumption of dangerous field,big data mining technology,and be good at using a variety of investigation methods to carry out investigation flexibly.At the level of evidence collection,through data search and collision analysis,we can find the evidence involved in the case,conduct online computer exploration and extract the evidence involved in the case.Finally,at the level of investigation approach,we can find the key suspects by searching Mac and IP addresses;use network investigation software to monitor and monitor the key suspect areas in real time;and use comprehensive post analysis heuristic method to break through the situation of investigation deadlock. |