Collecting Electronic Evidence During the Investigation of Crimes Related to the Distribution of Synthetic Drugs

Authors

  • Veselin Vuchkov New Bulgarian University, South-West University “Neofit Rilski” and the Academy of the Ministry of Interior
  • Daniel Delchev Academy of the Ministry of Interior

DOI:

https://doi.org/10.33919/ljnbu.24.2.1

Keywords:

synthetic drugs, electronic evidence, investigation, crimes, distribution, illegal markets

Abstract

Electronic evidence is increasingly used in the investigation of crimes in contemporary times. The dynamics of development of modern society and the technological “boom”, as well as the application of technologies in every aspect of our daily life, contribute to the fact that an increasing number of illegal acts leave an “electronic mark”. The distribution of synthetic drugs is no exception. This publication examines the main aspects of crimes related to the distribution of synthetic narcotic substances, the specifics associated with their investigation, the possibilities of using electronic evidence, and examples of practices that could be actively implemented to prevent and reduce crimes in this area.

References

Вучков В. (2023). Електронните доказателства по наказателни дела и техните източници – необходими разсъждения. Юридическо списание на Нов български университет, бр. 2, 16.

Вучков В. (2023). Наказателен процес в схеми, таблици, определения. София: Сиби.

Маринова Г. (2002). Електронните доказателства. Списание Правна мисъл, бр. 3.

Casabona C.M.R. (2017). “Anonymization and Pseudonymization: The Legal Framework at a European level”. The Data Protection Directive and Medical Research Across Europe. Taylor & Francis.

Goldschlag D.M., Reed M.G., Syverson P.F. (1996). “Hiding routing information, International Workshop on Information Hiding”. Springer.

Gutpa. A., Anand А. (2017). Ethical hacking and hacking attacks. International Journal of Engineering and Computer Science. Volume 6, Issue 4.

Karthikeyan R., Geetha D. T., Vijayalakshmi S., Sumitha R. (2017). “Honeypots for network security”. International journal for Research & Development in Technology, vol. 7, no. 2.

Mairh A., Barik D., Verma K., and Jena D. (2011), “Honeypot in network security: a survey,” in Proceedings of the 2011 international conference on communication, computing & security.

Schmeh K. (2003). “Cryptography and Public Key Infrastructure on the Internet”. John Wiley & Sons Inc.. New York.

Yuan R., Strayer W.T. (2001). “Virtual Private Networks: Technologies and Solutions”. Addison-Wesley Professional, Boston.

Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2018). “Blockchain challenges and opportunities: A survey”. International Journal of Web and Grid Services, 14(4).

Downloads

Published

30.12.2024

How to Cite

Vuchkov, V., & Delchev, D. (2024). Collecting Electronic Evidence During the Investigation of Crimes Related to the Distribution of Synthetic Drugs. Law Journal of New Bulgarian University, 20(2), 12–22. https://doi.org/10.33919/ljnbu.24.2.1