SEARCH AND SEIZURE OF DEVICES IN RELATION TO THE AUTOMATIC PROCESSION OF DATA

Authors

  • Zvonimir Ivanović Criminal Police University, Zemun
  • Oliver Lajić Criminal Police University, Zemun

Keywords:

high-tech crime, computer search, seizure of items, police conduct, criminal forensics

Abstract

The authors of the paper show the status of search and seizure of objects in relation to automatic data processing devices and their carriers. They do this by illustrating various measures and actions that are similar in nature and meaning to those described, but also through the status and conditions prescribed by the legislator for these actions. In this sense, the authors point out the illogicalities encountered in this presentation. The above mentioned actions are also being represented in the light of research conducted within the archives of the Special Prosecution Office for High-Tech Crime of the Republic of Serbia, with an analysis of seized objects in cases of criminal offenses under Article 185 of the RS Criminal Code.

Downloads

Download data is not yet available.

References

J. T. Gardner, M. T. Anderson(2004), Criminal Evidence, Principles and Cases, 5th edition, Thomson/Wadsworth, Wadsworth.

L. Komlen-Nikolić; R. Gvozdenović; S. Radulović; A. Milosavljević; R. Jeković,; V. Živković,; S. Živanović; M. Reljanović; I. Aleksić (2010): „Suzbijanje visokotehnološkog kriminala“, MUP RS, Beograd.

M. Pisarić (2015), Pretresanje računara radi pronalaska digitalnih dokaza (str. 215–238) Zbornik radova Pravnog fakulteta u Novom Sadu, 1/2015,

Obavezna instrukcija o prikupljanju i obezbeđenju elektronskih dokaza MUP RS (2013) od 26.02.2013.god.,

Vodič najbolje prakse postupanja sa elektronskim dokazima - Association of Chief Police Officers’ (ACPO) publication - Good Practice Guide for Computer-Based Electronic Evidence - Official release () version, dostupno na: https://www.cps.gov.uk/legal/assets/uploads/files/ACPO_guidelines_computer_evidence%5B1%5D.pdf

Broadhurst, R., Chang, Lennon Y.C. (2013). Cybercrime in Asia: trends and challenges", in B. Hebenton, SY Shou, & J. Liu (eds). Asian Handbook of Criminology (pp. 49–64). New York: Springer.

Chang, Lennon, Y.C., & Grabosky, P. (2014). Cybercrime and establishing a secure cyber world. In M. Gill (ed) Handbook of Security (pp. 321–339). NY: Palgrave.

Cherry, S. with Ralph Langner (2010). How Stuxnet Is Rewriting the Cyberterrorism Playbook. IEEE Spectrum.

Downloads

Published

2020-03-08

How to Cite

Ivanović, Z., & Lajić, O. (2020). SEARCH AND SEIZURE OF DEVICES IN RELATION TO THE AUTOMATIC PROCESSION OF DATA. KULTURA POLISA, 17(41), 323–342. Retrieved from https://kpolisa.com/index.php/kp/article/view/132

Issue

Section

Review Article

Categories

Metrics