On Strengthening Responsibility for Drug Propaganda on the Internet

2021 ◽  
pp. 35-39
Author(s):  
E. V. Shul'gina

The article contains the analyses of the current situation in the field of drug use propaganda carried out using the Internet, and also the study of the amendments adopted by legislators providing for increased responsibility for this type of illegal activity. A content analysis of a specialized segment of the information virtual network, a comparative analysis of the researched problem with the data of 2019, a review of official statistics of law enforcement agencies were carried out. The conclusions about the results of the analysis.


2021 ◽  
Vol 10 (38) ◽  
pp. 113-122
Author(s):  
Viktoria Babanina ◽  
Iryna Tkachenko ◽  
Olena Matiushenko ◽  
Mykola Krutevych

The article examines the history of the emergence and development of cybercrime, the specifics of the current situation in society, which contributes to an increase in the number of cybercrimes and ways of countering cybercrime. It has been established that cybercrime first appeared in the middle of the last century. This was due to the emergence and subsequent intensive growth in the number of computers, and then smartphones. However, cybercrime that exists today is significantly different from what it was in its early days. Today, the number of devices and services provided via the Internet is growing, the number of users is growing, and, accordingly, the number of cybercrimes and the level of their organization is growing. In the course of the study, the differences between the concepts of "cybercrime" and "computer crimes" were identified, as well as the main features of cybercrimes. The problems that law enforcement agencies face in the investigation and fight against cybercrimes were revealed. The factors contributing to the growth of cybercrime were also analyzed. Based on the analysis, the main directions of combating cybercrime and preventing the growth of the number of cybercrimes in society were developed.



Author(s):  
Vitaliy V. Pavlyukov

This article highlights the possibilities of practical use of the potential of the operational search event «Obtaining computer information». Based on the analysis of judicial practice, the mechanism for fixing the results of such an operational search event is described. The expediency of a clearer legislative consolidation of procedural and procedural aspects of obtaining computer information in order to counter computer crime is proved. The scientific novelty of the article also lies in the justification of the need to empower law enforcement officials to demand from the owners of the Internet resources or individual applications data about the user of a particular account on the Internet in order to authorise it. It is proposed to oblige providers and Telecom operators to block access to the account or the entire Internet resource of the corresponding user, should the law enforcement agencies contact them with such a recommendation. The recommendation should indicate the facts of illegal activity of the user, which should be confirmed by a screenshot of the computer screen, mobile phone or relevant materials of the operational search event.



2021 ◽  
Vol 8 (1) ◽  
Author(s):  
Garen J. Wintemute

AbstractOff-the-books, untraceable “ghost guns” can now be manufactured at home, easily, and in large numbers; they contribute ever more frequently to firearm violence, including hate violence and domestic terrorism. The Bureau of Alcohol, Tobacco, Firearms and Explosives estimates that in 2019 alone, law enforcement agencies recovered more than 10,000 ghost guns. The manuscript describes the current situation and suggests specific actions that state and federal governments can take to avert disaster.



2021 ◽  
Vol 18 ◽  
pp. 606-618
Author(s):  
Olena Kozynets ◽  
Alla Nitchenko ◽  
Andrii Kholostenko ◽  
Petro Zhovtan ◽  
Larysa Luhosh

The global transformations of the economy through the system of information technologies have led to the spread of new manifestations of crime, mainly in the areas of money transfer, foreign exchange transactions, international logistics schemes. Consequently, there is a need to develop highly effective tools and methods of law enforcement agencies in the sphere of economic law infringements. The purpose of the research is to investigate modern tools and methods used in the activities of law enforcement agencies in order to prevent economic law infringements. The research methods are as follows: systematization, generalization, analysis of the regulatory framework, the method of comparative analysis; system and logical analysis, method of information synthesis; quantitative method. Results. The means and methods of work of law enforcement agencies in the field of economic law infringements have been analyzed in the academic paper. A comparative analysis of the application of tools and methods of law enforcement agencies in the field of economic law infringements in European countries has been conducted. It has been noted that they have been experiencing significant structural and technological changes, which makes it possible to more effectively identify economic violations of the law and prevent their implementation in various spheres of economic activity. The necessity of introducing modern information and technological methods of work of law enforcement agencies in order to overcome the growing number of economic law infringements has been proved. The concept of modern tools and methods of counteraction to economic law infringements has been considered and the further development of system of means and methods of counteraction to economic law infringements has been offered. The results of the research can be used to study trends in the development of tools and methods of law enforcement agencies in the field of economic violations of the law.



2017 ◽  
Vol 4 (1) ◽  
pp. 43-56
Author(s):  
Muhammad Mahmud Nasution

Gambling, which has existed since the existence of human civilization, developed along with human development. It provides insight on men that gambling seemed to be commonplace to be implemented. Lack of attention from law enforcement agencies and government as well as the absence of the intention of the community to deal with gambling as the main reason gambling still exist in people's everyday lives. Gambling harm to the livelihoods and lives of the people , nation and state. Kinds and forms of gambling are now widespread in people's everyday lives . Originally performed clandestinely but not for this current situation that has been done openly or, Even gambling nowadays has become the industry especially in the field of sports.



2018 ◽  
Vol 5 (2) ◽  
pp. 217
Author(s):  
Andri Winjaya Laksana

Cybercrime has been become a major portion for law enforcement agencies and intelligence services to both national and international matter, development of information and technology’s crime resulted in every country have a different policy of criminalization. The emphasis on cross-country has made a crime on the internet is not just a national issue, but has become an International problem. therefore it is important to have uniformity in the prevention of cybercrime that this crime can be solved. Based on the comparison of cybercrime that included the rules from various countries including the United States, Singapore, the Netherlands, the Philippines, Myanmar as a reference in the application of criminal law enforcement regulations regarding cybercrime seal the document.



Author(s):  
Dan Jerker B. Svantesson

This chapter seeks to set the scene and make some proposals for how we may make progress in the field of internet jurisdiction. For this purpose, the chapter will focus on three examples where the matter of internet jurisdiction is a major concern for internet intermediaries. The first relates to the validity of the terms of service that internet intermediaries typically impose on their users, and which typically contain important provisions regarding jurisdiction and applicable law. The second example relates to situations in which law enforcement agencies seek access to user data held by internet intermediaries. Such situations give rise to important matters of jurisdiction, not only where the requesting law enforcement agency and the internet intermediary are based in different countries, but may also—as was illustrated in the well-known Microsoft Warrant case—give rise to such issues where the requested data is stored outside the country in which both the law enforcement agency and the internet intermediary are based. The third example relates to the matter of geographical scope where an internet intermediary is required to remove, block, take down, delist, de-index, or de-reference content.



2019 ◽  
pp. 27-42
Author(s):  
Loo Seng Neo ◽  
Leevia Dillon ◽  
Priscilla Shi ◽  
Jethro Tan ◽  
Yingmin Wang ◽  
...  

Exploiting the benefits afforded by the Internet, violent extremists have created and utilised a myriad of online platforms (e.g., websites, forums, blogs, social media) that have abetted and enhanced their recruitment campaigns across the world. While the idea of countering violent extremists' online presence is a matter of considerable security interest, the paucity of research analysing the persuasiveness of their online platforms to certain target audiences impedes law enforcement agencies' capability to deal with them. There is a need to understand why their online platforms are so persuasive to certain target audiences. Focusing on these online platforms, this chapter will examine the features of these platforms that enhance the appeal of violent extremist messages.



2018 ◽  
Vol 19 ◽  
pp. 49-60
Author(s):  
Nazli Ismail Nawang ◽  
Mohd Lotpi Mohd Yusob ◽  
Aminuddin Mustaffa

Anonymity is perhaps the most valued feature of the Internet as its users are able to conceal their true identities or assume pseudonyms in the cyber world. Anonymity may be good for freedom of speech as any speakers could freely express their thoughts without the fear of being identified (though not impossible). Unfortunately, anonymity poses great challenges to law enforcement agencies as they would face difficulty in tracing cyber offenders. For that reason, the Malaysian Parliament has passed a new section 114A of the Evidence Act 1950 that has the effect of shifting the burden of proof on the alleged offenders to prove his innocence. This provision seems to be in contrast with the legal maxim of ‘semper necessitas probandi incumbit ei qui agit’ which means ‘he who asserts must prove’. This same principle has also been adopted in Islamic criminal law as the Islamic legal maxim has explicitly stated that ‘the onus of proof is upon the claimant, and the taking of an oath is upon him who denies’. As such, this paper attempts to scrutinise the approach that has been adopted by judges in interpreting and applying this new law. Further, a comparative analysis with Islamic criminal law will be made in order to ascertain whether such principle could be applied in certain cases since cyber criminals are hardly traceable or identifiable. The study is largely based on doctrinal research as it is primarily concerned with the review of relevant decided cases and statutory provisions as well as text books, journal articles and seminar papers. To sum up, it is submitted that the new law does not amount to an automatic presumption of guilt as the prosecutors are still required to prove the existence of relevant basic facts before the accused is mandated to prove his innocence.



Sign in / Sign up

Export Citation Format

Share Document