Abstract
The subject of the study is the tactics of interrogation as a key element of the investigation of crimes in the field of computer information. The purpose of the article is to find and choose the right interrogation tactics in the investigation of crimes in the field of computer information, which allows you to effectively collect and analyze data, obtain evidence necessary for the investigation, protect the rights of all participants in the process and save time during the investigation. Methodology. In the course of the work, the following methods of scientific research were used: analysis and synthesis, induction and deduction, dialectical, comparative and formal logical methods. The results of the study. The tactical actions necessary for the effective investigation of crimes in the field of computer information have been identified. It has been established that a particularly important factor in the investigation is the availability of sufficient skills and knowledge of the investigator in the field of information and telecommunications technologies, which allows the most productive way to obtain the necessary information for the investigation. During the interrogation of the suspect, it should be clarified how he gained access to the information and telecommunications system, what specific actions he committed, whether he worked independently or was a member of a group. Scope of application of the results: the results of this work can be applied in the educational process, as well as by investigative authorities in the investigation of crimes in the field of computer information, these materials can be especially useful for novice investigators. The novelty of the study lies in the fact that special attention is paid to the technical component when constructing interrogation tactics. Conclusions. It is concluded that it is technical training that is the key feature of interrogation tactics in the investigation of crimes in the field of computer information, since without this component, in some situations, investigative actions are ineffective.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have