Criminal-procedural law Flashcards
What are the means for obtaining evidence?
The means for obtaining evidence are: Inspections, Searches, Seizures, and Interceptions of conversations or communications.
What the Digital Investigations must be capable of doing?
The Digital Investigations must be capable of guaranteeing the preservation of the original data and preventing their alteration.
What is the difference between Post Mortem Forensics and Live Forensics?
Post mortem forensics is the forensics that concerns the deactivated devices. Instead, the live forensics is the forensics that concerns the devices turned on.
What is the difference between inspection and search?
It can be said that the inspection is performed with the eyes or with technical equipment that is used to observe anyway.
Instead, the search is performed with the hands. It is an activity aimed not only at observing, but also looking for something.
What is a seizure?
The seizure consists in depriving a subject of an asset.
What is an interception?
An interception is an investigation aimed at capturing the contents of a confidential conversation or communication.
Digital investigation.
A digital investigation is an investigation aimed at searching digital evidence in order to identify the perpetrator of a crime or to prevent a crime from being committed.
The term “Digital Investigation” refers to any type of investigation that employs digital technology, regardless of the type of crime.
Pretrial Investigation
“The pretrial investigations are carried out in order to prevent crimes from taking place. It should be noted that the criminal systems currently tend to become more and more preventive systems.
The cybersecurity is perceived as a critical aspect of the state security worldwide. This because problems related to cybersecurity can evolve into serious threats to national or also global security, undermining the operation of national critical infrastructure and, more generally, the integrity of any computer system.
This fact has led various states to strengthen cyber defense also through specific training programs for state personnel. The authorities and bodies involved in cyber defense must face the effects of a continuous development of technology in an ever-changing world, where particularly invasive technological threats can appear. It should be noted that some regulatory acts specifically require investigators to work together with universities and public or private research centers. This is because an effective preventive action can be carried out by means of both interpenetration of several bodies of knowledge and cooperation between the police and other actors, e.g. scholars”.
Cyber intelligence
“Cyber investigations are characterized by a continuous increase of the field of operation of the intelligence, which is called in this area cyber intelligence (the so-called Cybint).
It is necessary to point out that, nowadays, more and more states use spy software in pretrial investigations. These systems are particularly invasive, especially in terms of privacy. In fact, they not only can capture and store any digital data contained within a computer system (computer, cloud, servers, smartphones, etc.), but also can automatically activate the webcam and microphones on the devices. In this way, they can hear everything said and film everything that happens.
The general trend of pretrial investigations is an exponential increase of the amount of collected data. The fight against terrorism has given an added impetus to this phenomenon. However, there is a serious risk that an undemocratic legislation, which could lead to new and insidious forms of totalitarianism, can also be legitimized within a democratic framework. This risk of authoritarian tendencies can only be prevented by placing clear limits to an indiscriminate collection of data and defining a clear and exhaustive list of the crimes for which the data retention is allowed.
It should also be noted that the size of extremely large data sets could be beyond the ability of commonly available tools to capture, manage, and process data within a tolerable elapsed time. This is the problem of “Big data”, whose analysis can require supercomputers and specific analysis techniques and related research work, which are prerogatives of a limited number of states”.
Reactive Investigations
“Reactive investigations are carried out after a crime has been committed and the corresponding notitia criminis has been received by the competent authority. A same type of cyber investigation can be regulated in a very different way worldwide. Moreover, some types of cyber investigation are governed by legislation in only certain States, while in others there is no a specific law”.
Pretrial investigations are carried out before a crime is reported. Instead, reactive investigations are carried out after a crime is reported
Ex officio prosecution crime
An ex officio prosecution crime is a crime that can be prosecuted regardless of whether a complaint has been filed by the aggrieved party, i.e. regardless of whether the victim has, or has not, expressed his will for suspect to be persecuted.
Crime prosecuted on complaint by the injured party
A crime prosecuted on complaint by the injured party is a crime that can be prosecuted only if the aggrieved party has expressed his will for suspect to be persecuted and has filed a complaint accordingly.
Preservation of the original data and preventing their alteration in digital investigations
In all cases where this is possible, the Digital Investigations must be capable of guaranteeing the preservation of the original data and preventing their alteration.
Characteristics of digital investigations
- Technical nature;
- Transnationality;
- Cooperation of private entities.
Most significant issues due to technical nature of digital investigations
The technical nature of digital investigations is related to the immateriality and easy alterability of digital data.
The Digital Investigations must be capable of guaranteeing the preservation of the original data and preventing their alteration
Expert evidence shall be admitted when it is necessary to perform investigations or gather data or evaluations requiring specific technical, scientific or artistic competence.
The following five categories of people cannot assume the role of expert.
1. minors, persons declared totally or partially disable and mentally- ill person;
2. person barred from public office, also temporarily, or barred or suspended from performing a profession on an art;
3. person who are subject to personal security or preventive measures:
4. persons who cannot be called as witness or have the right to abstain from testifying or have been called as witness or interpreters;
5. persons who have been appointed as technical consultants in the same proceedings or in a joined one.