Due to the rise of organized crime and the rapid development of surveillance technologies, such technologies are increasingly used for the purpose of criminal investigation. However, the proliferation of such highly intrusive measures can jeopardize the individual right to privacy and the constitutionally protected secrecy of private telecommunication. It is therefore necessary to devise a legal framework that balances the need for efficient law enforcement with individuals’ privacy rights. In this study, the author discusses the laws on covert surveillance as an investigative measure in the criminal process of the United States, Germany, and the P.R. China from theoretical and empirical perspectives. The author then provides a horizontal c...
Electronic surveillance is an important tool for law enforcement and may contribute to counter-terro...
This article is about undercover surveillance which is regulated by criminal procedure c...
The thesis deals with wiretapping and recording of telecommunication traffic which is an indispensab...
Due to the rise of organized crime and the rapid development of surveillance technologies, such tech...
In this chapter, the author discusses the three types of criminal surveillance and the subsequent da...
In this paper, we study the evolution of telecommunications technology and its impact on law enforc...
This Working Paper is based on two research reports that were the outcome of the research carried ou...
The use of technical supervision as a probation process in the criminal trial is a topical issue, gi...
Session 13: Investigating Legal Change in Divorce Law, Contract Law and Privacy ProtectionSince 2009...
The legal mandate for taking secret interception measures has increased. Law enforcement agencies ca...
Currently, across the globe and on different levels, serious debates are held on the possibilities o...
Access to telecommunication data is an essential and powerful investigative tool in criminal justice...
Electronic Surveillance , the mechanical technique to monitor private communications of the suspect ...
Today's challenges dictate the need to strengthen the national and international legal mechanisms fo...
The use of contemporary technological achievements in combating and preventing criminality, especia...
Electronic surveillance is an important tool for law enforcement and may contribute to counter-terro...
This article is about undercover surveillance which is regulated by criminal procedure c...
The thesis deals with wiretapping and recording of telecommunication traffic which is an indispensab...
Due to the rise of organized crime and the rapid development of surveillance technologies, such tech...
In this chapter, the author discusses the three types of criminal surveillance and the subsequent da...
In this paper, we study the evolution of telecommunications technology and its impact on law enforc...
This Working Paper is based on two research reports that were the outcome of the research carried ou...
The use of technical supervision as a probation process in the criminal trial is a topical issue, gi...
Session 13: Investigating Legal Change in Divorce Law, Contract Law and Privacy ProtectionSince 2009...
The legal mandate for taking secret interception measures has increased. Law enforcement agencies ca...
Currently, across the globe and on different levels, serious debates are held on the possibilities o...
Access to telecommunication data is an essential and powerful investigative tool in criminal justice...
Electronic Surveillance , the mechanical technique to monitor private communications of the suspect ...
Today's challenges dictate the need to strengthen the national and international legal mechanisms fo...
The use of contemporary technological achievements in combating and preventing criminality, especia...
Electronic surveillance is an important tool for law enforcement and may contribute to counter-terro...
This article is about undercover surveillance which is regulated by criminal procedure c...
The thesis deals with wiretapping and recording of telecommunication traffic which is an indispensab...