<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Computer crime forms and mechanism for security and protection</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Snezana</forename><surname>Savoska</surname></persName>
							<email>snezana.savoska@fikt.edu.mk</email>
							<affiliation key="aff0">
								<orgName type="department">Faculty of Information and Communication Technologies</orgName>
								<orgName type="institution">University &quot;St.Kliment Ohridski&quot; -Bitola</orgName>
								<address>
									<postCode>7000</postCode>
									<country>R. Of Macedonia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Vesna</forename><surname>Tozievska</surname></persName>
							<email>vesnaprculovska@hotmail.com</email>
							<affiliation key="aff0">
								<orgName type="department">Faculty of Information and Communication Technologies</orgName>
								<orgName type="institution">University &quot;St.Kliment Ohridski&quot; -Bitola</orgName>
								<address>
									<postCode>7000</postCode>
									<country>R. Of Macedonia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Computer crime forms and mechanism for security and protection</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">EE6001D04B37CBA9EDC5467107E3AC31</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T06:41+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Cybercrime</term>
					<term>Cyberterrorism</term>
					<term>Cybercrime authorities in the R. of Macedonia</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The constant technology development in the past seven decades has made the computers necessary in all areas of modern life, for which also influence the decreasing of the technology's today's price, especially of computers as a big part that now can be found in almost every home and in every human being hands. As a tool that speeds up every work and facilitates access to information, it's hard to imagine modern life without the use of a computer. Unfortunately, the emergence of computers and the further development of technology have led to the emergence of new forms of criminal offenses and new ways of their execution. The way the computer is used is suitable for knowledge of the workings with a computer of the average person, so that potential perpetrator of crimes can be anyone, and the global use of the Internet allows such works to be made everywhere in the world. Criminals exploit the enormous speed, simplicity and, above all, the "anonymity" offered by modern technology aiming to carry out various crimes. In this paper, the most common forms of cybercrime is mentioned as attacks on computer systems and networks, identity theft and data from other persons, distribution of pornographic content from children, fraud, piracy in the field of computer software and other computer products, etc. The forms of software tools for fighting cybercrime are mentioned.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Today, all the world is at technological change and innovation, which leads to changes in all parts of modern life and establishment of the so-called. information society. Moving toward this paradigm of advanced information society, R. Macedonia has to analyze number of issues as cybercrime and cyberterrorism. Information society development in the state has to deal with a great number of challenges in the fighting against cybercrime and computer terrorism as a new patterns of threats in the 21st century. The more information technology becomes sophisticated, the more complex methods and tools are used to fight with criminal activities, especially with computer terrorism <ref type="bibr">[23]</ref>.</p><p>The Republic of Macedonia is not an exception from the developed countries that constantly and to a large extent face this sophisticated type of organized crime. The goal is to be part of a global security network in the fight against money laundering, organized crime, the financing of terrorism, and the entry of "dirty money" into the economy. The country is making efforts to protect itself from various criminal activities such as theft of personal data, high security secrets, military plans and fraudulent activities such as "stealing money" from credit / debit cards, and more. Computer or cyber terrorism and criminal activities have a visible adverse impact on the country, ie its economy, citizens' safety, public life and human rights and freedoms. For all of the above reasons, this new form of organized crime should be prevented from further spreading not only on our territory, but also around the world.</p><p>This paper take into consideration the forms and shapes of cybercrime and their characteristics. Also, as part of the survey, the types of cybercrimes that appear in the R.of Macedonia over the past years are reviewed and an analysis has been made of the forms that appear. For all these actions, a forensic tool is used as a collection of evidence for cybercrime and tools for intrusion detection that are not the subject of this paper.</p><p>The first part of the paper take into consideration related works about definitions, concepts and laws that connect the whole concept of cybercrime, the international activities that are undertaken for cybercrime sanctioning and securing according to its characteristics, information and data that are subject to the law on protection of private information. The second chapter describes the authorities in the Republic of Macedonia who are committed to dealing with cybercrime. The third chapter provides an overview of crimes related to cybercrime in the R.of Macedonia. Next chapter describes the course of investigation and use of software tools by sectors that are fighting cybercrime. Concluding observations summarize the perceptions of paper and summarize how the R. of Macedonia handles cybercrime and cyberterrorism.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related works with Cybercrime and Related International Activities</head><p>There is an understanding in criminological literature that cybercrime is a part of economic crime, but also it is a crime closest to the field of property protection. The most widespread definition in criminology defines cybercrime as a set of all kinds of delinquent behavior by which data processing devices are used as a means of committing offenses or as a direct target for punishable offenses <ref type="bibr" target="#b2">[1]</ref>.</p><p>The Commission of the European Union in a Communication given in 2001 defined cybercrime in the widest possible sense, so that cybercrime means any crime that in any way involves the use of information technology <ref type="bibr">[2]</ref>.</p><p>From the former Yugoslavia area, the definition that paid attention is of course the one given by prof. Dr. Ignjatovic <ref type="bibr" target="#b3">[3]</ref>, according to which cybercrime is a special form of incriminating behavior in which the computer system appears as a means of execution or as a subject of a crime, or if that work in a different way, or on other object, or it cannot be performed or it would have completely different characteristics.</p><p>One of the most widely and commonly used definitions is that cybercrime is a socially dangerous phenomenon, for which the perpetrator uses knowledge of computer technology, such as a computer system understood in the broadest sense of the word, used as a means or as a subject of a criminal attack or both and the other <ref type="bibr" target="#b4">[4]</ref>.</p><p>From all definitions it can be noticed that the scope of criminal activities is wide and that the term cybercrime covers every crime that has been done with the help of computers, computer networks and programs. In addition to activities that aimes at obtaining illegal property benefits, computer crime also has activities that were made from other motives, such as creating and distributing viruses and malware, publishing confidential personal and business data on the Internet, etc <ref type="bibr" target="#b5">[5]</ref>.</p><p>Prof. Vodinelic defines cybercrime in narrower and broader term, so in a narrow sense it covers computer fraud, sabotage and espionage, and in a wider sense refers to the abuse of computers and its components from theft , embezzlement and so on. <ref type="bibr" target="#b6">[6]</ref> According to prof. Spasic, cybercrime, is a crime that takes place in the digital environment and represents a specific form of unlawful action in which the computer network appears as a tool, a target, or evidence for committing a crime <ref type="bibr" target="#b7">[7]</ref>.</p><p>So, taking into consideration all these definitions and facts that computer crime is emerging threat in every computer activity, the most significant and numerous international acts have been adopted within the European Union: <ref type="bibr" target="#b8">[8]</ref> -1998 a special study entitled "Legal Aspects of Computer-related Crime in the Information Society" (COMCRIME study) was developed by professor Uhrlich Ziber, University of Wiesbourg, that explores the basics of cybercrime as a special form <ref type="bibr" target="#b9">[9]</ref>. The study combined with other documents derived from the Lisbon Council of Europe of 2000, presents the guidelines for activities related to cybercrime.</p><p>-Europe Action Plan from the same year, also is relates to activities to ensure the network security and establish cooperation of the members states and their common approach to cybercrime. The same year, a Council Proposal for a legal framework for decision-making related to attacks on information systems was adopted (the Proposal for a Council Framework Decision on attacks against the information system). After one year, the document is complemented by unauthorized access to information systems and unauthorized interference with systems and data.</p><p>-In 2000, the Directive on electronic commerce was adopted, in which special attention was paid to the problem of abuse <ref type="bibr">[10]</ref>. Also, the same year, various documents related to the legal regulation of cybercrime are adopted: Decision of the Council for prevention of child pornography on the Internet, Convention on Mutual Assistance in Criminal Matters, Recommendation for the Strategy in the new Millennium for the Protection and Control of Computer Crime. The next document that should provide a secure information society through a secure information infrastructure and combating computer-related crime is improving the Security of Information Infrastructures and Combating Computer-related Crime <ref type="bibr" target="#b10">[11]</ref>. This year is of historical importance, since a number of documents are being adopted that regulate the legal framework for combating cybercrime or also known as high-tech crime.</p><p>In 1983, within the Organization for Economic Cooperation and Development (OECD), a Study on the International Application and Harmonization of Criminal Law related to the problems of cybercrime and abuse was adopted, and three years later, in the frame of Computer related crime, the list: analysis and legal policy was published. The 1999 year is marked as a year when a set of information security systems manuals are established, set that establish rules and take appropriate measures to achieve security. At the end of 1998, the Council of Europe began preparations for the adoption of the Convention on Cybercrime starting public debate in 2000. The convention today is one of the most important documents that besides the European countries have been accepted by Japan, USA, Canada and South Africa. The Convention which came into force in July 2004 is accompanied by a number of documents adopted within the Council. In the G8 group framework in 1997, the action plan for dealing with cybercrime was proposed and then adopted in 1998. It was proposed by the expert group for cooperation in the area of justice and internal affairs. The ministers of justice and internal affairs have on several occasions discussed on the principles of that struggle, for the needs of international cooperation in investigations and apprehending</p><p>The Cybercrime sector and digital phorensic collaborate with Interpol and Evropol. There is not specialized institutions dealing and investigation cyber terrorism. This is because in Macedonia cyber terrorism is not legally defined, regulated and accepted.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Review of criminal offenses related to cybercrime in the R. of Macedonia</head><p>Table <ref type="table" target="#tab_1">1</ref> gives an overview of crimes that enter into computer crime on the territory of the R. of Macedonia. In the period 2009-2014, on the territory of the R.of Macedonia, there are no criminal acts "making and entering computer viruses", Article 251 a of the Criminal Code, while in the period 2015 -2017, other forms of cybercrime have been registered in the table 2.   <ref type="table" target="#tab_2">2</ref>. From the picture it can be noted that of these other criminal acts, the most occurrence is shown in the display of pornographic child material and production and distribution of child pornography in 2016. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Course of investigation and use of software tools by sectors that fight cybercrime</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Qualification of the crime</head><p>The qualification of the crime, that is, the determination of the criminal offense is of great importance for starting and managing cases in the area of cybercrime.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Receiving an application from the damaged party</head><p>One of the most common ways of finding out about any crime, as well as criminal offenses in the field of cybercrime, is certainly the application from the damaged party. In this sense, the term impaired can be physical and legal entities, state bodies and institutions. For example, when professionals who maintain and administer information systems will notice that unauthorized entry into the system they maintain from outside and that some damage has occurred in terms of loss of data or the overall operation of the system, this unauthorized penetration they should report it to an appropriate state body that is competent to act further in order to find and sanction the perpetrator. The competent authorized persons of this body will assess the type and extent of the damage incurred and will take further actions.</p><p>When submitting an application for a committed criminal act, the damaged party besides the explanation, it is necessary to provide evidence that a crime has been committed, because certain evidence, if they are not provided immediately for a certain period of time, may be unavailable (deleted). In doing so, the injured party needs to provide the following information: to provide clarification about the committed crime, with a detailed description of what happened, to provide information on the circumstances whether it sustained pecuniary damage and the amount of the damage and Submit other evidence confirming the offense committed.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Operational checks for determining the perpetrator</head><p>In order to determine the place from which the criminal offense was committed, and hence further to the perpetrator thereof, after obtaining the knowledge, information or application from the damaged party, additional operational checks are carried out in order to determine the place from which the crime was committed the crime (IP address), the time and date when the crime was committed, and so on. This is done by analyzing the supplied evidence such as logs from a server, email headers and the like. After this, checks are carried out on who owns the IP address (provider). Information about which Internet service provider is the owner of a particular IP address are public and available on the Internet on the web site www.ripe.net, after this with a prior order issued by the Court or a request by the Public Prosecutor, checks are made by the provider who used the specified IP address in the given day, hour and hour zone.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Operational checks for the perpetrator's profile and identification of possible places from which the crime was committed</head><p>After determining the IP address of the user, operational checks are performed in order to determine the profile of the possible perpetrator of the offense. This is done through checks in the permanent database of the Ministry, using open sources of information (Internet) or through on-the-spot checks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Search perpetrator's home and other premises</head><p>After determining the possible perpetrator, as well as the exact address from which the crime was committed, a search of the home and other premises of the possible perpetrator of the crime is performed with a preliminary court order. The search of the home and other premises is regulated according to Art.181 to Art.204, where according to Art.181 "Searching home of the defendant and other persons can be undertaken when it is probable that the defendant wanted for arresting or traces of the criminal act or objects important for the criminal procedure will be found. "The purpose of the search is to provide digital evidence that will be evidence in the criminal procedure. Certain digital evidence will be seized on the spot, depending on whether the provision of digital e Kazi suffers a delay or not, and according to Article 184 of the LCP, while the remaining digital evidence will be provided in such a way that all suitable digital evidence carriers (USB, Hard Drives, CDs and DVDs and other memeor devices), then digital evidence will be provided in laboratory conditions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Analysis of confiscated computer equipment</head><p>The expertise of computer equipment is carried out in accordance with Article 236 of the low of criminal low procedure (CLP), according to which the expert report shall be determined with a written order, that in the preliminary procedure is adopted by the Public Prosecutor. The order shall state in relation to which facts an expert's report is performed and to whom it is entrusted.</p><p>Depending on the type of criminal offense, and in order to find all electronic evidence, different requests for expert examination of confiscated computer equipment can be made. The identification of the criteria for the search have to be be closely related to the information that the authorized officials obtained from the investigation, from the interviews with the injured parties, the suspects and witnesses. All information that the inspectors deem appreciated to be useful in the analysis of computer equipment need to be included in the expertise requirements in order to help them find the electronic.</p><p>There are general data that need to be stated in all requests for expertise regardless of the type of crime, which are: the name and surname of the suspect, name and surname of damaged, name and surname of the person from whom the computer equipment was seized, location from where computer equipment is taken away and the condition in which it was found. If the computer equipment was found to be included, indicate the date and time when it was turned off, the date when the seizure of computer equipment was carried out and detailed description of the confiscated computer equipment (brand, model and serial number).</p><p>Researchers of this type of crime sometimes use the original application program, and sometimes special software analysis and research tools. Researchers have found ways to collect traces from a remote computer to which they do not have immediate physical access, by accessing a telephone line or network connection. It is even possible to monitor the activities of a computer network over the Internet. These procedures form part of what is called computer forensics. Computer forensics is proof that the computer that needs to be sustained, convincing and sufficient for the court to accept it. In forensic-information procedures, no matter how careful people aiming to steal electronic information, they leave traces of their activities. Just when the perpetrators try to destroy the evidence that is on the computer they leave traces behind them. In both cases it can be shown that these traces can be traced and presented to the court. Computer forensic specialists do more than switching on the computer and listening to folders and searching for files. They should be able to perform complex "evidence recovery procedures" with skill and expertise that will keep the credibility of electronic evidence in court. Basically these procedures include: copying data, seeking evidence from e-mail and other Internet communication, data recovery, searching for documents and other data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Initiating and filing criminal charges</head><p>After the checks and evidence provided for the perpetrator of the criminal act, as well as for the crime itself, criminal charges are filed by SCDF, then the crime convection is pursuant according Article 280 of the Criminal Procedure Law.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Software tool for Cybercrime detection</head><p>While conducting cybercrime investigations and providing evidence, several software tools are used, which in most cases are free software tools and can be found online (FTK Imager, Process Explorer, process monitor, etc.). Sometime, are used tools contained within the operating system itself (Windows CMD or Terminal with Linix), and many online tools (for example online tools for analyzing email headers and the like). Also, open sources of information, such as databases on the Internet are used. In addition, licensed softwares as Encase portable for live data forensic are used. Licensed softwares such as Encase, FTK (forensic tool kit), Paraben, Paladin, Internet Evidece Finder and others are used in the analysis of computer equipment in the digital forensic laboratory. In the case of analyzing mobile devices in the digital forensic laboratory, licensed software such as X-Ray and Cellebrite are used. In the recent years, new applications and technologies in the cryptocoins (as BitCoin) have been used. Also, various web pages on the Internet network are used to collect a growing number of information and evidence as blockchain.info, blockexplorer.com and blockseer.com. Techniques to provide evidence for court trial such as Transaction, Hash and Bitcoin Address are also used, as well as software such as Bitcoin Core -wallet v0.15.0.1 and Armory application, as very important within the investigation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusion</head><p>The Republic of Macedonia is not excepted from the countries that are increasingly facing cybercrime. The purpose is to be part of the global security network in the fight against money laundering, organized crime, the financing of terrorism and the entry of "dirty money" into the economy. Our country take steps to protect itself from various criminal activities such as theft of personal data, high security secrets, military plans and fraudulent activities as "stealing money" from credit / debit cards. Cybercrime and cyberterrorism as well as criminal activities have a visible adverse impact on the country, ie its economy, citizens' safety, public life and human rights and freedoms. Because of all of the above reasons, this new form of organized crime should be prevented from further spreading not only on our territory but also around the world.</p><p>Computer forensics is used as a proof of a computer that needs to be sustained, convincing and sufficient for the court to accept it. In forensic-information procedures, no matter how careful people aiming to steal electronic information, they leave traces of their activities. Just when the perpetrators try to destroy the evidence that is on the computer they leave traces behind them. In both cases it can be shown that these traces can be traced and presented to the court. Computer forensic specialists do more than switching on the computer and listening to folders and searching for files. They should be able to perform complex "evidence recovery procedures" with the skill and expertise that will hold the credibility of electronic evidence for court.</p><p>The use of scientifically derived and proven methods for the preservation, collection, validation, identification, analysis, interpretation, documentation and presentation of digital evidence obtained from digital sources in order to facilitate or continue the reconstruction of criminal events, or helping to predict unauthorized actions that turned out to be unacceptable for the planned operations representing digital forensic operations.</p><p>The working process in digital forensics involves creating a disk image (copies of the original original disk), hashing or confirming the integrity of the image on the disk, writing block disk image (read-only setting to verify the integrity of the disk disk image), and analysis of the drive and its contents.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 Fig. 2 Fig. 3</head><label>123</label><figDesc>Fig. 1 Total number of crimes in the period 2009 -2017 The total number of perpetrators in the period 2009-2017 is shown in the Fig.2. The highest value of perpetrators has 2009 and the lowest number is in 2013.Fig.3shows the distribution of crimes in the period 2009 -2017. It can be noted that the biggest number is the crime of damaging and unauthorized entry into a</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 3</head><label>3</label><figDesc>Fig. 3 Overview of others crimes in the period 2015-2017</figDesc><graphic coords="9,82.07,96.25,289.46,257.06" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="8,97.79,288.73,286.10,285.62" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 1 . Overview of crimes that consist computer crimes in the period of time 2009-2014</head><label>1</label><figDesc></figDesc><table><row><cell>Year</cell><cell>crimes and</cell><cell>Damage and</cell><cell>Computer</cell><cell>Issue a</cell><cell>Creating</cell><cell>Computer</cell><cell>Total</cell></row><row><cell></cell><cell>perpetrators</cell><cell>unauthorized</cell><cell>fraud</cell><cell>check</cell><cell>and using</cell><cell>Forgery</cell><cell></cell></row><row><cell></cell><cell></cell><cell>entry into the</cell><cell></cell><cell>without</cell><cell>a fake</cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell>computer</cell><cell></cell><cell>cover and</cell><cell>payment</cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell>system</cell><cell></cell><cell>abuse of a</cell><cell>card</cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell>payment</cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell>card</cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell>Art.251</cell><cell>Art.251 б</cell><cell>Art.274</cell><cell>Art.274 б</cell><cell>Art.379а</cell><cell></cell></row><row><cell></cell><cell>Crimes</cell><cell>63</cell><cell>5</cell><cell>5</cell><cell>/</cell><cell>1</cell><cell>74</cell></row><row><cell>2009</cell><cell>Perpetrators</cell><cell>73</cell><cell>2</cell><cell>6</cell><cell>/</cell><cell>11</cell><cell>92</cell></row><row><cell></cell><cell>Crimes</cell><cell>36</cell><cell>5</cell><cell>10</cell><cell>/</cell><cell>1</cell><cell>52</cell></row><row><cell>2010</cell><cell>Perpetrators</cell><cell>43</cell><cell>6</cell><cell>17</cell><cell>/</cell><cell>1</cell><cell>67</cell></row><row><cell></cell><cell>Crimes</cell><cell>47</cell><cell>1</cell><cell>/</cell><cell>13</cell><cell>/</cell><cell>61</cell></row><row><cell>2011</cell><cell>Perpetrators</cell><cell>29</cell><cell>2</cell><cell>/</cell><cell>23</cell><cell>/</cell><cell>54</cell></row><row><cell></cell><cell>Crimes</cell><cell>31</cell><cell>7</cell><cell>2</cell><cell>10</cell><cell>1</cell><cell>51</cell></row><row><cell>2012</cell><cell>Perpetrators</cell><cell>14</cell><cell>5</cell><cell>/</cell><cell>28</cell><cell>1</cell><cell>48</cell></row><row><cell></cell><cell>Crimes</cell><cell>74</cell><cell>4</cell><cell>2</cell><cell>13</cell><cell>1</cell><cell>94</cell></row><row><cell>2013</cell><cell>Perpetrators</cell><cell>15</cell><cell>1</cell><cell>1</cell><cell>24</cell><cell>/</cell><cell>41</cell></row><row><cell></cell><cell>Crimes</cell><cell>76</cell><cell>4</cell><cell>4</cell><cell>18</cell><cell>1</cell><cell>103</cell></row><row><cell>2014</cell><cell>Perpetrators</cell><cell>22</cell><cell>5</cell><cell>/</cell><cell>20</cell><cell>/</cell><cell>47</cell></row><row><cell></cell><cell>Crimes</cell><cell>40</cell><cell>8</cell><cell></cell><cell>9</cell><cell></cell><cell>71</cell></row><row><cell>2015</cell><cell>Perpetrators</cell><cell>33</cell><cell>3</cell><cell></cell><cell>6</cell><cell></cell><cell>55</cell></row><row><cell></cell><cell>Crimes</cell><cell>70</cell><cell>12</cell><cell></cell><cell>13</cell><cell></cell><cell>116</cell></row><row><cell>2016</cell><cell>Perpetrators</cell><cell>40</cell><cell>3</cell><cell></cell><cell>25</cell><cell></cell><cell>82</cell></row><row><cell>2017</cell><cell>Crimes</cell><cell>43</cell><cell>13</cell><cell></cell><cell>12</cell><cell></cell><cell>81</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 2 . Overview of others crimes in the period 2015-2017</head><label>2</label><figDesc>The total number of the crimes in the period 2009-2017 is shown on Fig.1. Most of the crimes are made in 2016 and the lowest number is in 2012.</figDesc><table><row><cell cols="3">Years and forms of cybercrime</cell><cell>2015</cell><cell></cell><cell>2016</cell><cell></cell><cell>2017</cell></row><row><cell></cell><cell></cell><cell></cell><cell>Crimes</cell><cell>Perpetra</cell><cell>Crimes</cell><cell>Perpetra</cell><cell>Crimes</cell><cell>Perpet</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell>tors</cell><cell></cell><cell>tors</cell><cell>rators</cell></row><row><cell cols="3">Endangering safety Article</cell><cell>3</cell><cell>2</cell><cell>3</cell><cell>1</cell><cell>5</cell><cell>2</cell></row><row><cell>144/4</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="3">Abuse of personal data Article</cell><cell></cell><cell></cell><cell>1</cell><cell>1</cell><cell>1</cell><cell>1</cell></row><row><cell>149/2</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="3">Violation of the distributor's</cell><cell>1</cell><cell>1</cell><cell></cell><cell></cell></row><row><cell cols="3">right to a technically separate,</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="3">secure satellite transmission</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Article 155 a</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="3">Showing pornographic material</cell><cell>3</cell><cell>3</cell><cell>8</cell><cell>5</cell></row><row><cell cols="2">to a child Art. 193</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="3">Production and distribution of</cell><cell>7</cell><cell>7</cell><cell>7</cell><cell>5</cell><cell>4</cell><cell>6</cell></row><row><cell cols="3">child pornography Article 193 a</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Obstruction</cell><cell>of</cell><cell>sexual</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>2</cell><cell>2</cell></row><row><cell cols="3">intercourse or other sexual</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="3">activity of a child who has not</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="3">reached 14 years of age. 193 b</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="3">Making, acquiring or disposing</cell><cell></cell><cell></cell><cell>2</cell><cell>2</cell><cell>1</cell><cell>1</cell></row><row><cell cols="3">of means of counterfeiting</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Article 271/3</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Cybercrime authorities in the R. of Macedonia</head><note type="other">Cybercrime</note><p>Control Authority in the Republic of Macedonia is the Sector for Cybercrime and Digital Forensics (SCDF). The beginnings of the Sector for Cybercrime and Digital Forensics was in February 2005 when, for the first time, a Unit for Cybercrime and Counterfeits was established within the Sector for Financial Crime of the Department of Organized Crime. In October 2008, the Unit became a Unit for Cybercrime within the Department for Organized and Serious Crime. In November 2014, the Unit set aside the Department of Organized Crime and grew into a Computer Crime and Digital Forensic Department within the Central Police Services. In doing so, the Sector has jurisdiction to act on the entire territory of the R. of Macedonia. Now, SCDF consist of two departments: Sector for Cybercrime Investigation, which has two sections: Investigation Department of Abuse of Payment Cards and Department of Computer Incident Investigation The sector primarily deals with criminal issues in the area of cybercrime, which are provided for in the criminal law of the Republic of Macedonia as: Acting on crimes in the area of Damage and unauthorized entry into the computer system (Articles 251 and 251a) Acting on crimes in the area of sexual abuse of minors or children (Art.193, Art.193-a, Art.193-b) Acting on crimes in the area of Internet fraud (Art.247) Acting on criminal acts in the field of personal data (Article 149) Act on crimes in the field of abuse of payment cards (Art.271, Art.274-b). Sector for digital forensic, consists of two sections: Computer Hardware investigation and testing Unit and Mobile devices investigation</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">perpetrators, as well as accepting the standards defined by the Council of Europe Convention. This organization also adopted the following documents: Recommendations for Enhancing the Legal Framework to Prevent Terrorist Attacks</title>
	</analytic>
	<monogr>
		<title level="m">Recommendations on Special Investigative Techniques and other Critical Measures for Combating Organized Crime and Terrorism</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m">Recommendations for Sharing and Protecting National Security Intelligence Information in the Investigation and Prosecution of Terrorists and Those Who Commit Associated Offenses: Best Practices for Network Security, Incident Response and Reporting to Law Enforcement</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">S</forename><surname>Konstantinović-Vilić</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Nikolić-Ristanović</surname></persName>
		</author>
		<author>
			<persName><surname>Kriminologija</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="178" to="179" />
			<pubPlace>Niš</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<author>
			<persName><forename type="first">Đ</forename><surname>Ignjatović</surname></persName>
		</author>
		<title level="m">Pojmovno određenje kompjuterskog kriminala</title>
				<meeting><address><addrLine>Beograd</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1991">1991</date>
			<biblScope unit="page" from="142" to="143" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<author>
			<persName><forename type="first">B</forename><surname>Simonović</surname></persName>
		</author>
		<title level="m">Kriminalistika, Pravni fakultet u Kragujevcu</title>
				<meeting><address><addrLine>Kragujevac</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page">665</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">Z</forename><surname>Aleksić</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Škulić</surname></persName>
		</author>
		<author>
			<persName><surname>Kriminalistika</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="46" to="63" />
			<pubPlace>Beograd</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<author>
			<persName><forename type="first">N</forename><surname>Šarkić</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Prlja</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Damnjanović</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Marić</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Ţivković</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vodinelić</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Mrvić-Petrović</surname></persName>
		</author>
		<title level="m">Pravo informacionih tehnologija</title>
				<meeting><address><addrLine>Beograd</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
	<note>str.3</note>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<author>
			<persName><forename type="first">V</forename><surname>Spasić</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Aktuelna pitanja u oblasti sajber kriminala (ĉlanak)</title>
		<title level="s">Bilten sudske prakse Vrhovnog suda Republike Srbije broj</title>
		<meeting><address><addrLine>Beograd</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2006">2006</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page">107</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<author>
			<persName><forename type="first">М</forename><surname>Зврлевски</surname></persName>
		</author>
		<ptr target="http://www.osce.org/mk/skopje/121224?download=true" />
		<title level="m">Прирачник за компјутерски криминал</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<ptr target="http://www.edc.uoc.gr/~panas/PATRA/sieber.pdf" />
		<title level="m">Legal Aspects of Computer-related Crime in the Information Society -COMCRIME study</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<ptr target="http://www.justice.gov/criminal/cybercrime/intl/EUCommunication.0101.pdf" />
		<title level="m">Creating a Safer Information Society by Improving the Security of Information Infrastructures and Combating Computer-related Crime</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<ptr target="http://pubs.sciepub.com/dt/1/1/7/" />
		<title level="m">Big Data and Visualization: Methods, Challenges and Technology Progress</title>
				<imprint>
			<date type="published" when="2017-05-20">Accessed 20.5.2017</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
