Who controls cross-border cybercrime?

Source: Internet
Author: User
Keywords Cybercrime Electronic Forensics Criminal Cases Crimes Criminal Facts
Tags agency application compared cross cross-border cross-regional electronic evidence electronic forensics

According to Xinhua News Agency cross-regional cybercrime by the jurisdiction? Electronic forensics how to implement? In recent years, the increasing incidence of cybercrime has seriously damaged the normal order of the Internet. This reporter has learned that the Supreme People's Court and the Supreme People's Procuratorate have issued opinions recently on the application of criminal procedure in cybercrime cases, and the above problems are expected to be solved.

Compared with the traditional crime, cybercrime transgresses through the Internet and does not have a specific target. It is fictitious and concealed. Under the existing criminal procedure, since the number of people involved in cybercrime is usually large and scattered, it is difficult to define the jurisdiction of the case on the one hand, and it is easy to see cases of mutual promotion or dispute over the other. On the other hand, , The amount of funds involved as a conviction and sentencing standards crime cases, the public security organ is difficult to collect evidence one by one, easily lead to criminal suspects guilty of improper.

Opinions on the focus of controversial cybercrime controversy, evidence collection and other issues to make provisions. As for the criminal identification, the opinion is to avoid the ambiguity by amending the current formulation of "the location of the web server where the criminal acts occurred" to "the location of the web server used to commit the criminal acts". In view of the large number of cybercrimes involved and the inability to collect the relevant testimonial evidence one by one, the opinion states that on the basis of a careful examination of the accused's defenses and their defenders' defense opinions and relevant evidences, the evidence of the entire case, the electronic evidence, And other evidence records, identify the number of victims, the number of computer information systems infringed, the amount of funds involved and other criminal facts.

In addition, although electronic evidence is of great significance for the identification of cybercrime, in practice, there is a lack of norms in the procedures for the collection, extraction and transfer of electronic evidence, which is likely to cause controversy. This reporter has learned that the views of a clear e-forensic procedures and requirements of electronic data evidence that the need to collect the principle of the original storage medium, the extraction process by two or more relevant professional knowledge of the investigators to implement, conditional, relevant activities should be carried out Video

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.