{"title":"为刑事诉讼目的而使用黑客技术","authors":"M. Pisarić","doi":"10.47152/rkkp.61.1.3","DOIUrl":null,"url":null,"abstract":"Since certain trends in information technologies significantly hinder criminal investigation, there is an evident need for the creation of an appropriate criminal procedure mechanism to overcome these obstacles. One of the options is to enable the law enforcement agencies to use hacking techniques in order to gain access to protected computer systems, networks and data, even remotely, in order to identify suspects, to monitor their activities and communications, and to collect evidence. In this paper the author is considering the possibilities, advantages and risks of using hacking techniques for the purposes of criminal proceedings. After pointing out the risks of malware use by the competent authorities, the normative framework for overcoming those risks was considered through regulating the authorized access to a protected computer system or network, as a special investigative action, so the data obtained through such actions could be used as evidence in the court of law.","PeriodicalId":85724,"journal":{"name":"The Journal of criminal law, criminology, and police science","volume":"66 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"THE USE OF HACKING TECHNIQUES FOR THE PURPOSE OF CRIMINAL PROCEDURE\",\"authors\":\"M. Pisarić\",\"doi\":\"10.47152/rkkp.61.1.3\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Since certain trends in information technologies significantly hinder criminal investigation, there is an evident need for the creation of an appropriate criminal procedure mechanism to overcome these obstacles. One of the options is to enable the law enforcement agencies to use hacking techniques in order to gain access to protected computer systems, networks and data, even remotely, in order to identify suspects, to monitor their activities and communications, and to collect evidence. In this paper the author is considering the possibilities, advantages and risks of using hacking techniques for the purposes of criminal proceedings. After pointing out the risks of malware use by the competent authorities, the normative framework for overcoming those risks was considered through regulating the authorized access to a protected computer system or network, as a special investigative action, so the data obtained through such actions could be used as evidence in the court of law.\",\"PeriodicalId\":85724,\"journal\":{\"name\":\"The Journal of criminal law, criminology, and police science\",\"volume\":\"66 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The Journal of criminal law, criminology, and police science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47152/rkkp.61.1.3\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Journal of criminal law, criminology, and police science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47152/rkkp.61.1.3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
THE USE OF HACKING TECHNIQUES FOR THE PURPOSE OF CRIMINAL PROCEDURE
Since certain trends in information technologies significantly hinder criminal investigation, there is an evident need for the creation of an appropriate criminal procedure mechanism to overcome these obstacles. One of the options is to enable the law enforcement agencies to use hacking techniques in order to gain access to protected computer systems, networks and data, even remotely, in order to identify suspects, to monitor their activities and communications, and to collect evidence. In this paper the author is considering the possibilities, advantages and risks of using hacking techniques for the purposes of criminal proceedings. After pointing out the risks of malware use by the competent authorities, the normative framework for overcoming those risks was considered through regulating the authorized access to a protected computer system or network, as a special investigative action, so the data obtained through such actions could be used as evidence in the court of law.