THE USE OF HACKING TECHNIQUES FOR THE PURPOSE OF CRIMINAL PROCEDURE
Since certain trends in information technologies significantly hinder criminal investigation, there is an evident need for the creation of an appropriate criminal procedure mechanism to overcome these obstacles. One of the options is to enable the law enforcement agencies to use hacking tec...
Saved in:
| Main Author: | |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Serbian Association for Criminal Law Theory and Practice and Institute of Criminological and Sociological Research
2023-06-01
|
| Series: | Revija za kriminologiju i krivično pravo |
| Online Access: | https://rkkp.org.rs/storage/works/GTkXD4ebWhsIaCC4G8ZuRI6oHUwsbsYNpXq3VvKZ.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1846150520729763840 |
|---|---|
| author | Milana Pisarić |
| author_facet | Milana Pisarić |
| author_sort | Milana Pisarić |
| collection | DOAJ |
| description | Since certain trends in information technologies significantly hinder criminal investigation, there is an evident need for the creation of an appropriate criminal procedure mechanism to overcome these obstacles. One of the options is to enable the law enforcement agencies to use hacking techniques in order to gain access to protected computer systems, networks and data, even remotely, in order to identify suspects, to monitor their activities and communications, and to collect evidence. In this paper the author is considering the possibilities, advantages and risks of using hacking techniques for the purposes of criminal proceedings. After pointing out the risks of malware use by the competent authorities, the normative framework for overcoming those risks was considered through regulating the authorized access to a protected computer system or network, as a special investigative action, so the data obtained through such actions could be used as evidence in the court of law. |
| format | Article |
| id | doaj-art-323e06d39e7d4bfb99f3e69b9d66414d |
| institution | Kabale University |
| issn | 1820-2969 2956-2198 |
| language | English |
| publishDate | 2023-06-01 |
| publisher | Serbian Association for Criminal Law Theory and Practice and Institute of Criminological and Sociological Research |
| record_format | Article |
| series | Revija za kriminologiju i krivično pravo |
| spelling | doaj-art-323e06d39e7d4bfb99f3e69b9d66414d2024-11-28T13:28:25ZengSerbian Association for Criminal Law Theory and Practice and Institute of Criminological and Sociological ResearchRevija za kriminologiju i krivično pravo1820-29692956-21982023-06-01611516610.47152/rkkp.61.1.3THE USE OF HACKING TECHNIQUES FOR THE PURPOSE OF CRIMINAL PROCEDUREMilana Pisarić Since certain trends in information technologies significantly hinder criminal investigation, there is an evident need for the creation of an appropriate criminal procedure mechanism to overcome these obstacles. One of the options is to enable the law enforcement agencies to use hacking techniques in order to gain access to protected computer systems, networks and data, even remotely, in order to identify suspects, to monitor their activities and communications, and to collect evidence. In this paper the author is considering the possibilities, advantages and risks of using hacking techniques for the purposes of criminal proceedings. After pointing out the risks of malware use by the competent authorities, the normative framework for overcoming those risks was considered through regulating the authorized access to a protected computer system or network, as a special investigative action, so the data obtained through such actions could be used as evidence in the court of law.https://rkkp.org.rs/storage/works/GTkXD4ebWhsIaCC4G8ZuRI6oHUwsbsYNpXq3VvKZ.pdf |
| spellingShingle | Milana Pisarić THE USE OF HACKING TECHNIQUES FOR THE PURPOSE OF CRIMINAL PROCEDURE Revija za kriminologiju i krivično pravo |
| title | THE USE OF HACKING TECHNIQUES FOR THE PURPOSE OF CRIMINAL PROCEDURE |
| title_full | THE USE OF HACKING TECHNIQUES FOR THE PURPOSE OF CRIMINAL PROCEDURE |
| title_fullStr | THE USE OF HACKING TECHNIQUES FOR THE PURPOSE OF CRIMINAL PROCEDURE |
| title_full_unstemmed | THE USE OF HACKING TECHNIQUES FOR THE PURPOSE OF CRIMINAL PROCEDURE |
| title_short | THE USE OF HACKING TECHNIQUES FOR THE PURPOSE OF CRIMINAL PROCEDURE |
| title_sort | use of hacking techniques for the purpose of criminal procedure |
| url | https://rkkp.org.rs/storage/works/GTkXD4ebWhsIaCC4G8ZuRI6oHUwsbsYNpXq3VvKZ.pdf |
| work_keys_str_mv | AT milanapisaric theuseofhackingtechniquesforthepurposeofcriminalprocedure AT milanapisaric useofhackingtechniquesforthepurposeofcriminalprocedure |