The fi ght against cybercrime requires effective and rapid solutions for the collection of digital evidence at the international level. An example of such an instrument is the European Investigation Order, which introduces a comprehensive system for obtaining evidence in cross-border cases. The legislation on this solution is contained in directive 2014/41/EU of the European Parliament and of the Council of 3 April 2014 on the European Investigation Order in criminal matters. The above regulations have been implemented into the Polish national law by the Act of 10 January 2018 amending the Act — The Code of Criminal Procedure and certain other acts. The European Investigation Order was presumably fi rst used by Polish law enforcement authorities in a case involving cybercrimes committed by a person using the aliases Thomas and Armaged0n. The use of this investigation measure made it possible to apprehend the offender many years after the fi rst offence was committed and the offender was identifi ed49. Despite this success, further changes to the European Investigation Order in national legislation are needed to improve the effectiveness of the fi ght against cybercrime. It should be proposed to modify the Prosecution Services’ Rules of Procedure as regards the authorities competent to issue European Investigation Orders. Currently, the authorities executing the European Investigation Order in Poland at the stage of preparatory proceedings are district prosecutor’s offi ces, whereas such powers should be vested in every prosecutor conducting preparatory proceedings.
The Police Academy in Szczytno has been carrying out a research project entitled "Development of a database and tools for semantic search for information and knowledge management in the area of missing persons and search for persons”, financed from the funds of the National Centre for Research and Development for national defence and security. The objective of the conducted research project is to prepare a database and a tool for semantic search for information and knowledge management in the area of missing persons and search for persons, as well as to equip the Polish Police with a technologically advanced tool for semantic and contextual search for information on standards, rules, good practices and specific patterns of behaviour in the area of searching for missing persons. The final effect of the mentioned research project is the eSPOZ system of searching for missing persons, which is described in the article.
Kryminalistyka to nauka prawna, wobec której istnieją wysokie oczekiwania społeczne dotyczące walki z przestępczością. Chociaż nauka ta odniosła wiele sukcesów w walce z przestępczością, wciąż boryka się z wieloma problemami związanymi z informatyzacją na świecie. Rzeczywiście cyberprzestrzeń stała się nowym obszarem aktywności społecznej, która zachęca do rozwoju działalności przestępczej. Cyberprzestrzeń tworzy fałszywe poczucie anonimowości, ale każda aktywność w Internecie pozostawia ślady. Technologia zapisuje dane tworzone i przetwarzane przez użytkowników cyberprzestrzeni na różne nośniki. Użytkownicy cyberprzestrzeni tworzą i przetwarzają dane. Przetwarzanie ogromnych ilości informacji cyfrowych jest znakiem współczesności. Wzrost ilości danych na świecie przyczynił się do rozwoju nauki o danych, która umożliwia uzyskanie cennej wiedzy w postaci wzorców i istniejących relacji między analizowanymi informacjami. Głównym celem artykułu jest przedstawienie aktualnego stanu kryminalistyki jako nauki i omówienie możliwości wykorzystania nauki o danych do złagodzenia kryzysu w tej dyscypliny naukowej. Eksploracja kryminalistycznych baz danych przy użyciu odpowiednich metod i technik dla nauki o danych może przyczynić się do odkrycia nowej istotnej wiedzywobec kryzysu medycyny sądowej.
The issues of remote access by law enforcement authorities to data in remote IT systems are extremely difficult and controversial. The literature stresses that such activities threaten the right to privacy of the parties involved in the proceedings and the right to a fair trial. However, on the other hand, the dynamic development of new technologies and the need to combat cybercrime effectively require that law enforcement and judicial authorities make use of adequate legal and technical solutions. One such a solution may be a remote search of an IT system, which exists in many European countries, including Belgium, Romania and Germany. In the case of Poland, a search of an IT system as a procedural activity is only allowed in respect of a system in which the person concerned is a dispatcher or user. The Polish legislator has not implemented procedural provisions enabling remote searches via the Internet. In case of the necessity of a system remote search, it will be necessary to conduct a parallel search. Another way of obtaining remote access to data and IT systems may be new methods of covert surveillance, which have been introduced into the Police Act. The new regulations generate a lot of interest among Polish police officers, but at the same time they provoke a lot of discussion. The diversity of the existing approach leads to the development of a uniform interpretation of the introduced regulations, which has been adopted as the subject of this study.
The purpose of this work is to present users of EnCase Forensic programming language syntax, EnScript, to create their ownsoftware solutions, as well as to provide the possibility of its use in forensic research of digital storage media. In order to understand above described elements, description elements above, practical programming examples are given. Examples in this paper allow you to understand the existing code, scripts, contained, among others, in the EnCase API documentation. This documentation is the best source to get detailed information about the above classes of the above mentioned programming language, its components and functions. In addition to the aforementioned document, there are a number of applications created by EnScript programming language enthusiasts on Internet, which make it easy to write your own scripts, and represent a valuable source of information and inspiration. The advantage of knowing the above mentioned programming language is the ability to create ones own software solutions, allowing for the automation of tasks carried out within the context of investigative analysis, which is a very important element in the work of investigative science.
There is a lack of consensus among national law enforcement and judicial authorities as to which procedural acts are relevant for obtaining data contained in devices or information systems for evidentiary purposes. It is easy to fi nd supporters of the search of the information system as well as those who consider it appropriate to carry out inspections. However, regardless of many examples and arguments of various persons, it may seem that the compromise in this respect should be the position of the National Public Prosecutor’s Offi ce on the procedural practice related to obtaining data contained in IT equipment or systems for evidentiary purposes. However, the opinion of the National Prosecutor’s Offi ce does not take into account legally protected data, and in particular, legal aspects related to obtaining access to the content of telecommunications, including text messages protected by telecommunications secrecy. The article is a summary of the previous considerations regarding the possibility of obtaining data located in IT equipment or systems. The article also contains the author’s conclusions, based on, inter alia, methodology for securing digital footprints, intended for all representatives of national law enforcement and judicial authorities.
Działania wielu sprawców współczesnych oszustw oparte są na wykorzystaniu internetowych portali sprzedażowych. Szczegółowy sposób działania sprawców jest zróżnicowany w zależności od funkcjonalności konkretnych platform oraz docelowej grupy osób pokrzywdzonych. Wspólne elementy modus operandi sprawców takich czynów mają bezpośredni wpływ na skuteczność procesów wykrywczych. W niniejszym opracowaniu zaprezentowany został opis współczesnego modus operandi sprawców typowych oszustw popełnianych za pośrednictwem internetowych portali sprzedażowych, ze wskazaniem potencjalnych problemów w pracy wykrywczej i dowodowej oraz z podaniem sposobów ich rozwiązywania. Opis ten uzupełniony jest aktualnymi danymi na temat skali występowania tego rodzaju czynów pochodzącymi z analizy danych statystycznych oraz przeprowadzonych badań aktowych.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.