Forensic Analysis of Crimes in the Sphere of Information Technologies

Authors

  • Valery Kolesnyk

Abstract

The article deals with the issues of forensic support for preventing commission of crimes in the field of information technology. It is called to attention that although introduction of modern information processes in various spheres of government activities, production and public relations has brought positive results, it has also led to an increase in the cases of committing cyber crimes. Cyber crimes are a new phenomenon in general crime, therefore, the development of advanced techniques to combat them is required. In this process, the forensic science plays an important role, first of all, for the preparation of recommendations on methods for investigating cyber crimes. Forensic analysis of information technology crimes which are called cyber crimes indicates that their investigation is different from the investigation of other crimes. This is largely due to the fact that computer objects can be both means of committing such crimes and objects of criminal encroachment. Information stored on computer media can be perceived and evaluated solely by using computer equipment and digital technology. Without this, it is impossible to identify persons involved in committing a crime and obtain the evidence necessary to solve the crime. To study and evaluate them as sources of evidence, one needs to resort to the help of specialists, computer equipment and sophisticated software. It distinguishes computer objects from other material objects that is why it is necessary to put computer objects into a separate category of sources of evidence in forensic science and criminal procedure.

Key words: information technologies, cybercrimes, forensic science, pre-trial investigation, computer objects, proofs.

Published

2022-06-29

How to Cite

Kolesnyk, V. (2022). Forensic Analysis of Crimes in the Sphere of Information Technologies. Information Security of the Person, Society and State, (1-3 (31–33), 124–136. Retrieved from https://journals.uran.ua/ispss/article/view/260277