Abstract
Policy actions against various cyberspace crimes should respond both systematically and specifically to the nature of each crime and its accompanying evidence. Voice phishing as an emerging internet fraud practice has already victimized many unsuspecting consumers and hit the headlines frequently; cyber prostitution, pornography, illegal duplication of software, and online gambling have also become routine problems. Anonymity and facelessness in cyberspace distort one’s sense of guilt and allow for rapid collection, modification, and distribution of illegal and harmful information that disrupts social order and public safety. The purpose of this research is to examine the concept and type of cyber crime and to trace its trend in the Republic of Korea in the recent years. Due to its informational, national, global, and networking properties, cyber crime often puts serious restraints on conventional criminal justice procedures that cannot compromise such legal issues as individual safety and protection of privacy. If made accessible, information stored in private computers has potential to serve as decisive evidence in many criminal litigations. The Korean criminal procedure law promulgated on July 18, 2011 and enforced since January 1, 2012 contains an express provision permitting the search and seizure of digital evidence. But this partial code does not explicitly define the admissibility of digital evidence and acceptable methods of examining it. Hence, it is one of the goals of this research to identify problems pertaining to this law and suggest ways to improve it.
References
Kwak, K.J., Lee, K.W., Won, D.H.: Proposed ways to improve digital forensics legal system. The Korean Institute of Communications and Information Sciences. In: 2012 Winter Academic Publication, Seminar, p. 454 (2012)
Yang, K.W.: A study on the digital forensics and legal issues. Criminol. Rev. (The Korean Association of Criminology) 17(25), 246–247 (2006)
Kang, D.W.: A study on the Revisionist Bills of Criminal Procedure Act about the collecting of digital evidence. Law Rev. (Korean Law Association) 18(3), 189–191 (2010)
Kwon, Y.S.: Problems of digital evidence collection and ways to improve through research on the actual condition. Law Rev. (Korean Law Association) 49, 388–389 (2013)
Kwon, Y.S.: Establishing legal system of digital forensics. Law Rev. (Korean Law Association) 35, 357 (2009)
Hass, P., Vigna, G., Kemmerer, R.A.: Using a virtual security testbed for digital forensic reconstruction. J. Comput. Virogy Hacking Tech. 2(4), 275–289 (2007)
Broucek, V., Turner, P.: Technical, legal and ethical dilemmas: distinguishing risks arsing from malware and cyber attacks tool in the ‘cloud’ a forensic computing perspective. J. Comput. Virogy Hacking Tech. 9(1), 27–33 (2013)
NCFS (The National Center for Forensic Science), digital evidence in the Courtroom : a guide for preparing digital evidence for Courtroom presentation (2003)
CCIPS (Computer Crime and Intellectual Property Section, US. D.O.J.) Searching and seizing computers and obtaining electronic evidence in criminal investigations (2002)
NIJ: Forensic examination of digital evidence: a guide for law enforcement, U.S. Department of Justice (2004)
Carrier, B.: An event based digital forensic investigation framework. In: Digital forensic research workshop (2004)
Author information
Authors and Affiliations
Corresponding author
Additional information
This paper is a contribution to the special issue on Mobile Communication Systems selected topic from the SDPM and it is coordinated by Sangyeob Oh, K. Chung, Supratip Ghose.
Rights and permissions
About this article
Cite this article
Kim, S.G., Park, J.S. Legal limits of search and seizure for digital forensic in Korea. J Comput Virol Hack Tech 10, 157–163 (2014). https://doi.org/10.1007/s11416-014-0212-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11416-014-0212-0