메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색
질문

논문 기본 정보

자료유형
학술저널
저자정보
저널정보
한국형사법무정책연구원 형사정책연구 형사정책연구 통권 제60호
발행연도
2004.12
수록면
137 - 164 (28page)

이용수

표지
📌
연구주제
📖
연구배경
🔬
연구방법
🏆
연구결과
AI에게 요청하기
추천
검색
질문

초록· 키워드

오류제보하기
In a computerized information society, criminal investigations often involve electronic surveillance in computer communications networks. Particularly, in computer crime cases, investigators may want to monitor a hacker as he breaks into a victim computer system, or to set up a “cloned" e-mail box to monitor a suspect sending or receiving crime-related informations over the Internet.
This article reviews how these electronic surveillance procedures work in criminal investigations involving computers, whether and to what extent the Protection for the Secret of Communication Act of 2002 applies to the real-time electronic surveillance in computer communications networks.
Electronic Surveillance includes real-time computer usage monitor and e-mail inspection or interception, which enable law enforcement officials to collect content information, addressing and other non-content(routing) information of electronic communications in transmission. Electronic surveillance process which captures the in-outcoming electronic or other impulses which identify the originating number or other dialing, routing, addressing, or signaling information reasonably likely to identify the source of electronic communication, but such information shall not include the contents of communication. However, the Protection for the Secret of Communication Act regulates the collection of actual content of electronic communication and the interference of transmission. For this, it is questionable whether the real-time electronic surveillance of non-content communication information can be regarded as an protective object in the sense of the Protection for the Secret of Communication Act.
In the text of Internet communication, law enforcement officers may need to trace real-time communication to a particular victim computer or an IP address. If the electronic surveillance of non-content information is not covered by the Act, electronic surveillance can create the risk of an intensive intrusion of the state into the citizen's privacy. Thus, the Act should be amended to cover the specific need of the real-time electronic surveillance for non-content information, and only so long as the information likely to be obtained is relevant to an ongoing criminal investigation, the Act should authorize a prosecutor to apply for a court order of authorizing electronic surveillance and trace.
The Protection for Communication Secrets Act of 2002 also covers e-mail inspection or interception. However it remains some debates about the legal character of the e-mail inspection. The interception of electronic communications refers only to their real-time acquisition at the time of transmission between the parties to the communications. An investigator who subsequently obtains access to a stored copy of an e-mail does not intercept the communication. Rather, the stored e-mail shoud be the subject of search and seizure.

목차

Ⅰ. 들어가는 말
Ⅱ. 컴퓨터통신망 검색 유형에 따른 감청의 허용가능성
Ⅳ. 컴퓨터 통신망 검색의 허용요건과 범위
Ⅴ. 컴퓨터통신망 검색에 있어서 감청허가서 요구의 예외
Ⅵ. 맺음말

참고문헌 (0)

참고문헌 신청

함께 읽어보면 좋을 논문

논문 유사도에 따라 DBpia 가 추천하는 논문입니다. 함께 보면 좋을 연관 논문을 확인해보세요!

이 논문의 저자 정보

이 논문과 함께 이용한 논문

최근 본 자료

전체보기

댓글(0)

0

UCI(KEPA) : I410-ECN-0101-2012-364-003956925