首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 171 毫秒
1.
邢娜 《中国检察官》2008,(12):42-44
长期以来,侦查机关的非法取证问题一直是困扰司法实践的一大顽疾。《最高人民检察院刑事诉讼规则》确立了对侦查机关法定非法取得言词证据的具体的法律监督方式,但这一司法解释自其颁布以来,一直没有充分的发挥其应有功能。由于检察机关对非法取证行为的程序控制的观念没有确立,加之法律规定不协调,刑事司法机制运行不畅等多方面原因导致检察机关在非法证据程序方面的监督缺失。对侦查机关法定非法取证行为的法律监督是检察机关履行法律监督职能的重要体现。  相似文献   

2.
民事检察证据运用的法理与实践   总被引:1,自引:0,他引:1       下载免费PDF全文
在民事审判监督中 ,检察机关是否具有司法取证权以及如何运用依职权取得的证据 ,现有法律尚未明确规定 ,一直是各方争议较大的问题。本文通过对民事检察证据的作用、来源及民事举证责任等方面的分析 ,不仅从维护司法公正 ,再审程序的作用 ,司法取证权的特征及检法两家应当平等适用民诉法基本原则等多角度论述了检察机关享有司法取证权 ,而且结合民事检察工作实际 ,对检察机关依法运用依职权取得的证据提出了自己的建议  相似文献   

3.
论网络监控取证的法律规制   总被引:1,自引:0,他引:1  
网络监控是当前司法实践中一种全新的取证措施,在世界范围内得到了广泛运用,同时也引发了一系列的法律障碍。对网络监控取证进行法律规制,首先需要明确相应的程序,这种取证措施应当至少包含“授权”、“证据收集”、“证据分析与提交报告”三个阶段。其次,网络监控取证需要重点解决以下四个法律问题:明确审批主体与审批标准、合理界定监控的范围、厘清所获证据的证据能力、实现与隐私权保护的价值平衡。  相似文献   

4.
柳杨 《政法学刊》2023,(6):5-11
在当前办理跨境电信网络诈骗犯罪案件过程中,我国提取境外证据主要通过刑事司法协助途径进行委托取证,这种方式正面临我国可能与请求国没有签订刑事司法协助条约或协助条约中关于证据提取的规定不具体、请求取证程序繁琐而延误侦查时机和提取的证据不符合我国法律规定的证明标准等困境,而司法协助途径的各种替代性措施如执法机关自行取证、对第三方平台施加数据披露机制,以及通过国际组织取证等也存在各自的问题。仍应当在坚持通过刑事司法协助途径委托取证的基础上,对司法协助条约关于证据特别是电子数据提取的内容予以细化,并建立多元化的取证模式,实现对跨境电信网络诈骗犯罪的有效治理。  相似文献   

5.
褚福民 《证据科学》2023,(4):389-404
电子数据的合法性规则体系包括取证合法性规则、违法取证的法律后果规则和合法性审查规则。通过分析我国现行法律规定可以发现,取证合法性规则体现在取证主体、取证程序和审批要求方面,技术规则不应纳入取证合法性的范畴,取证合法性规则的权利基础模糊、特殊性问题没有得到规定,与技术规则的衔接需要完善。违法取证的法律后果,目前立法中仅有瑕疵电子数据排除规则,暴露出完整性、科学性、开放性方面的诸多不足。合法性审查规则体现在审查对象和审查程序方面,存在对应性、系统性和功能定位等方面的缺陷。电子数据合规性规则体系的完善,既需要解决规则体系本身的课题,也要关注改革的基础性课题。  相似文献   

6.
伴随互联网技术的发展,数字化生活于司法领域导入相应数字形态诉讼证据,传统证据体系之逻辑规则无疑受到新介质载体的极大挑战,本文拟以司法实务为索引,以TSA(可信时间戳)技术在司法取证中的应用方案为基础,针对电子证据保全与开示程序中出现的证据真实性问题,提出相关证据采集系统建构的设想与论证,以期提出技术视野下解决司法实践问题的新思路。  相似文献   

7.
数字取证涉及法学、刑事侦查学和计算机科学等学科,因而要从这些不同学科的角度及其互相关系等方面进行研究。数字取证研究的内容包括数字取证技术、数字取证程序及规范、数字取证法律。本文介绍了数字取证的概念及特点,分析了数字取证的现状,并对数字取证技术进行了重点描述,最后总结了数字取证的发展趋势。  相似文献   

8.
跨国网络犯罪的增加使得跨境电子取证的实际需求日益旺盛,我国在2018年颁布了《国际刑事司法协助法》,目的之一是加强国际合作打击跨国犯罪,为我国履行国际条约义务提供法律依据。但在司法实践中,我国的跨境电子取证面临着理论困境和实践困境。网络主权、司法管辖权理论使得单边取证存在着非法性可能。传统跨境电子取证因数据本地化存储和"倒U型"取证结构而效率不高。现有的国际司法协助程序繁杂、时间冗长,无法满足打击跨境犯罪和电子证据取证的现实需求。因此跨境电子取证的简易程序构建具有必要性和紧迫性,对现有司法协助程序进行适当简化,遵循合法性原则和效率性原则,构建境内外双方执法者直接合作方式合法化、派员调查取证方式、建立个案电子取证协助机制三种途径。  相似文献   

9.
在一国两制三法域的框架下,我国内地与港澳地区跨法域的调查取证及其规范性问题一直面临不少困难,内地司法机关派员在港澳地区直接取证更是受到非议。本文从涉港澳案件内地司法机关调取证据现象出发,以一国两制确定的港澳地区与内地关系形变实不变为原则,评析直接取证现象的现实需要以及所面临的法律困惑,提出解决和规范直接证据合法性问题的路径。直接取证制度应得到恰当、适时的肯定与发展,但必须以国际条约、国际惯例或司法协助协议互惠安排为参考,进行区际直接取证有益探索,建立直接取证程序规范。  相似文献   

10.
近年来,随着宽严相济刑事政策在各级司法实务部门的逐步贯彻适用,司法机关开始在实践中自发探索与宽严相济政策相配套的刑事证据制度,具体包括:针对严重刑事犯罪,容忍特殊的取证方式;构建特殊的证明标准;设定特殊的推定规则;采用特殊的认证规则;区分不同犯罪,建立不同的证据调查程序,等等。实践中推行的上述改革虽然在总体效果上差强人意,但客观地讲,也存在着改革的形式合法性与实质合理性问题。目前我国司法实践中为贯彻落实宽严相济刑事政策而对证据制度作出的调整和改革有两个大的宏观方向问题,应当重点予以思考和关注:一是实践改革的底限问题。为贯彻落实宽严相济刑事政策,确有必要对现行的诸多制度进行改革,这无可厚非,但问题在于,这种改革应当有一个度,尤其是不能突破法治国家刑事诉讼程序的基本原理与框架,诸如认可犯意引诱取证的合法性、通过类司法解释建立法律推定规范等改革举措,均因为突  相似文献   

11.
In this paper we present an approach to digital forensics specification based on forensic policy definition. Our methodology borrows from computer security policy specification, which has accumulated a significant body of research over the past 30 years. We first define the process of specifying forensics properties through a forensics policy and then present an example application of the process. This approach lends itself to formal policy specification and verification, which would allow for more clarity and less ambiguity in the specification process.  相似文献   

12.
Today’s Golden Age of computer forensics is quickly coming to an end. Without a clear strategy for enabling research efforts that build upon one another, forensic research will fall behind the market, tools will become increasingly obsolete, and law enforcement, military and other users of computer forensics products will be unable to rely on the results of forensic analysis. This article summarizes current forensic research directions and argues that to move forward the community needs to adopt standardized, modular approaches for data representation and forensic processing.  相似文献   

13.
Nordic police cooperation concerning cybercrimes has been developed during the last few years, e.g. through the Nordic Computer Forensics Investigators (NCFI) and Nordplus training programmes. More empirical research is needed in order to enhance cybercrime investigation and address the training needs of police officers. There is a knowledge gap concerning organizational models for the police’s cybercrime investigation: How the function is organized, what the professional characteristics of the staff are and how to combine computer forensics with crime investigation? The purpose of this paper was to study the organization of cybercrime investigation in Finland. Data were collected by a questionnaire from all 11 local police districts and the National Bureau of Investigation in July–August 2014. In addition, six thematic interviews of cybercrime investigators were conducted in 2014. Three investigation models of computer integrity crimes were found: (1) Computer forensic investigators conduct the entire pre-trial examination, (2) Computer forensic investigators conduct only the computer forensics, and tactical investigation is done by an occasional investigator, (3) Computer forensic investigators conduct only the computer forensics and tactical investigation is centralized to designated investigators. The recognition of various organizational models and educational backgrounds of investigators will help to develop cybercrime investigation training.  相似文献   

14.
The use of computer forensics was previously limited mainly to law enforcement agencies. However, UK organisations are increasingly undertaking computer forensics activities for incidents such as fraud, money laundering, accessing or distributing indecent images, harassment, industrial spying and identity theft amongst others. In this paper we examine the legal aspects of UK corporate computer forensic investigations.  相似文献   

15.
《Science & justice》2023,63(4):451-455
Forensic investigations require a vast variety of knowledge and expertise of each specialist involved. With the increase in digitization and advanced technical possibilities, the traditional use of a computer with a screen for visualization and a mouse and keyboard for interactions has limitations, especially when visualizing the content in relation to the real world. Augmented reality (AR) can be used in such instances to support investigators in various tasks at the scene as well as later in the investigation process. In this article, we present current applications of AR in forensics and forensic medicine, the technological basics of AR, and the advantages that AR brings for forensic investigations. Furthermore, we will have a brief look at other fields of application and at future developments of AR in forensics.  相似文献   

16.
杜威  彭建新  杨奕琦 《政法学刊》2011,28(6):113-116
随着网络技术的发展,计算机网络犯罪现象日趋严重。为了有效地打击网络犯罪行为,完善网络电子证据立法基础,取证技术专家不仅要研究网络取证相关技术,同时还必须对网络反取证技术充分进行研究。通过研究反取证技术来促进取证技术的提高,这样才能在网络取证过程中拓宽思路,提高获取有效证据的效率。  相似文献   

17.
Progress in computer forensics research has been limited by the lack of a standardized data sets—corpora—that are available for research purposes. We explain why corpora are needed to further forensic research, present a taxonomy for describing corpora, and announce the availability of several forensic data sets.  相似文献   

18.
Since its inception, over a decade ago, the field of digital forensics has faced numerous challenges. Despite different researchers and digital forensic practitioners having studied and analysed various known digital forensic challenges, as of 2013, there still exists a need for a formal classification of these challenges. This article therefore reviews existing research literature and highlights the various challenges that digital forensics has faced for the last 10 years. In conducting this research study, however, it was difficult for the authors to review all the existing research literature in the digital forensic domain; hence, sampling and randomization techniques were employed to facilitate the review of the gathered literature. Taxonomy of the various challenges is subsequently proposed in this paper based on our review of the literature. The taxonomy classifies the large number of digital forensic challenges into four well‐defined and easily understood categories. The proposed taxonomy can be useful, for example, in future developments of automated digital forensic tools by explicitly describing processes and procedures that focus on addressing specific challenges identified in this paper. However, it should also be noted that the purpose of this paper was not to propose any solutions to the individual challenges that digital forensics face, but to serve as a survey of the state of the art of the research area.  相似文献   

19.
《Science & justice》2020,60(5):399-402
Whilst the field of digital forensics is now well established, its research community can be considered relatively emerging in comparison to the associated areas of traditional forensic and computer sciences. As a result, this comment article takes a quick look at the demographics of digital forensics research over the last 20 years, with metadata from 6589 articles being extracted and analysed from Scopus in order to provide a brief insight into this field’s research activity.  相似文献   

20.
Network forensics is an investigation technique looking at the network traffic generated by a system. PyFlag is a general purpose, open source, forensic package which merges disk forensics, memory forensics and network forensics.This paper describes the PyFlag architecture and in particular how that is used in the network forensics context. The novel processing of HTML pages is described and the PyFlag page rendering is demonstrated. PyFlag's novel processing of complex web applications such as Gmail and other web applications is described. Finally PyFlag's report generation capabilities are demonstrated.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号