Law Enforcement on the Internet Law Enforcement Involvement in Investigating

2011 ◽  
pp. 164-183
Author(s):  
Aleksey V. Kutuzov

The article substantiates the need to use Internet monitoring as a priority source of information in countering extremism. Various approaches to understanding the defi nition of the category of «operational search», «law enforcement» monitoring of the Internet are analysed, the theoretical development of the implementation of this category in the science of operational search is investigated. The goals and subjects of law enforcement monitoring are identifi ed. The main attention is paid to the legal basis for the use of Internet monitoring in the detection and investigation of extremist crimes. In the course of the study hermeneutic, formal-logical, logical-legal and comparative-legal methods were employed, which were used both individually and collectively in the analysis of legal norms, achievements of science and practice, and development of proposals to refi ne the conduct of operational-search measures on the Internet when solving extremist crimes. The author’s defi nition of «operational-search monitoring» of the Internet is provided. Proposals have been made to improve the activities of police units when conducting monitoring of the Internet in the context of the search for relevant information to the disclosure and investigation of crimes of that category.


2021 ◽  
Vol 4 (1) ◽  
pp. 36-48
Author(s):  
Uyan Wiryadi

The purpose of this study: 1) To find out copyright violations in the field of music in the form of a cover song by recording through social media connected with Law Number 28 of 2014 concerning Copyright. 2) To find out the factors that influence copyright violations in the music field in the form of cover songs by recording through social media. The writing of this thesis uses a statute approach, by reviewing amendments to Law Number 28 of 2014 concerning Copyright and its implications for copyright and its implementation by state institutions and the Republic of Indonesia Law No. 19 of 2016 concerning Amendment of Law Number 11 Year 2008 Regarding Information and Electronic Transactions. Results of research conducted by the author: When someone does a cover song through social media without permission from the creator, both for the purpose not for commercial or commercial purposes, it is an infringement of copyright. Factors that influence the occurrence of violations of copyright in Indonesia include: 1) Weak law enforcement against violators. 2) Works on the internet can easily be duplicated and disseminated globally in a short period of time and in large quantities. 3) There is no limit on the place of the offender because a domain name or website can be accessed by anyone globally. 4) Procedures for events between countries in dealing with violations of copyright on the internet, such as to determine who the perpetrators are and when they occur and determine the jurisdiction of violations still vary.  


Author(s):  
Stephanie Do ◽  
Dan Nathan-Roberts

Although online sex work has become more accessible to people of all socio-economic statuses, labor practices and work safety have not improved since the widespread use of the internet. One way that we can help empower sex workers is to understand their motivations and experiences when using the internet. In a survey conducted by Sanders et al. (2017), the highest crime that 56.2% sex workers experienced was being threatened or harassed through texts, calls, and emails. Because there is no theory application to date on this marginalized group, three theories were proposed. This literature review highlights the need to explore why sex workers, as end-users, should be included in the user cybersecurity defense conversation, such as the cybercrimes that they face, their relationship with law enforcement, and what other factors affect their safety.


2020 ◽  
Vol 10 (1) ◽  
Author(s):  
Marina Gorbatiuc

E-voting is the next step of the Republic of Moldova evolution. The article presents advantages of e-voting, all steps of using it, and its many types. Electronic voting refers to elections using electronic means. E-voting can be managed by phones, the Internet, private computer networks or special kiosks. Reasons for accepting this kind of voting are provided. The analyzed in the article OSCE/ODIHR’s (Office for Democratic Institutions and Human Rights) activities which are related to tolerance and non-discrimination are focus on the following areas: legislation; law enforcement training; monitoring, reporting on, and following up on responses to hate-motivated crimes and incidents; as well as educational activities to promote tolerance, respect, and mutual understanding. Conclusions from all ODIHR activities which are carried out in close co-ordination and co-operation with OSCE participating States, OSCE institutions and field operations, as well as with other international organizations are given.


Author(s):  
Bradley J. Martineau

 Law reviews and legal journals have been part of the legal academic world for more than a century. [1] These legal publications are unique because they are completely run by students. However, over the last few decades, law reviews and legal journals have been highly criticized, and some critics even predict their demise. [2] If law reviews and legal journals expect to survive and remain valuable academic resources, then certain changes need to be made, and these changes are the responsibility of the student editors. Although some legal publications are making changes for the better, such as publishing online, more can be done to improve these student-run publications. By taking advantage of technological advances, especially the Internet, law reviews and legal journals can reduce the time it takes to publish an issue. In addition, these technological advances allow legal publications to offer many new features and services for both the authors and the readers. However, updating a publication with these new technological advances can be expensive. Thus, law reviews and legal journals need to generate more income from other sources than just subscriptions.


First Monday ◽  
2021 ◽  
Author(s):  
Polina Kolozaridi ◽  
Dmitry Muravyov

In reference to Russia, the concept of “Internet sovereignty” is commonly used to evoke the state’s efforts to tighten its control over the Internet in order to consolidate a non-democratic political regime. Many scholars have discussed Russia’s “sovereign Internet law,” adopted in 2019, yet the precise meaning of both “sovereign” and “Internet” in this context has largely been overlooked. In this article, we attempt to problematize the use of both concepts by drawing on the history of the Internet in Russia to accentuate the structural asymmetries of power in “global” Internet governance. We argue that Russia’s Internet sovereignty claims, grasped in the context of these asymmetries, can be seen as an expression of counter-hegemonic tendencies. Moreover, a historical account of the Internet’s transformation in Russia problematizes a conception of “Internet sovereignty” as unitary and unchanging.


2019 ◽  
pp. 590-613
Author(s):  
David Omand

This chapter examines digital intelligence and international views on its future regulation and reform. The chapter summarizes the lead up to the Snowden revelations in terms of how digital intelligence grew in response to changing demands and was enabled by private sector innovation and mediated through legal, Parliamentary and executive regulation. A common set of ethical principles based on human rights considerations to govern modern intelligence activity (both domestic and external) is proposed in the chapter. A three-layer model of security activity on the Internet is used: securing the use of the Internet for everyday economic and social life and for political and military affairs; the activity of law enforcement attempting to manage criminal threats on the Internet; and the work of secret intelligence and security agencies exploiting the Internet to gain information on their targets, including in support of law enforcement.


Author(s):  
Amin Ibrahim

The sexual exploitation of children remains a very serious problem and is rapidly increasing globally through the use of the Internet. This chapter focuses on the child pornography and IT, and the various methods to combat this problem. The ease of acquiring IT and digital equipments, the global reach of Internet and freely available peer-to-peer services have made child pornography a very complex issue to undertake. The borderless nature of the Internet and the lack of unified criminal code among nations further escalated the complexity of law enforcement against child pornography.


Sign in / Sign up

Export Citation Format

Share Document