PROBLEMS OF CYBERCRIME INVESTIGATION IN UZBEKISTAN
Keywords:
Key words: cybercrime; open-source intelligence; mobile forensics; digital forensics; cyber investigations problems.Abstract
Annotation: As technology has become pivotal a part of life, it has also become
a part of criminal life. Criminals use new technology developments to commit crimes,
and investigators must adapt to these changes. Many people have, and will become,
victims of cybercrime, making it even more important for investigators to understand
current methods used in cyber investigations. The two general categories of cyber
investigations are digital forensics and open-source intelligence. Cyber investigations
are affecting more than just the investigators. They must determine what tools they
need to use based on the information that the tools provide and how effectively the
tools and methods work. Tools are any application or device used by investigators,
while methods are the process or technique of using a tool. This survey compares the
most common methods available to investigators to determine what kind of evidence
the methods provide, and which of them are the most effective. To accomplish this, the
survey establishes criteria for comparison and conducts an analysis of the tools in both
mobile digital forensic and open-source intelligence investigations. We found that
there is no single tool or method that can gather all the evidence that investigators
require. Many of the tools must be combined to be most effective. However, there are
some tools that are more useful than others. Out of all the methods used in mobile
digital forensics, logical extraction and hex dumps are the most effective and least
likely to cause damage to the data. Among those tools used in open-source intelligence,
natural language processing has more applications and uses than any of the other
options.