Crimes’ forensic characteristics features in the computer information field
- Authors: KISELEV A.S.1,2, GORBUNOVA K.A.1
-
Affiliations:
- State University of Education
- Financial University under the Government of the Russian Federation
- Issue: Vol 7, No 3 (2023)
- Pages: 370-378
- Section: General Theory and History of Law and the State
- URL: https://journal-vniispk.ru/2587-9340/article/view/303505
- ID: 303505
Cite item
Full Text
Abstract
The purpose of the research is to identify the main crimes’ forensic characteristics features in the computer information field, inasmuch it makes a great importance in the modern world, as computer crimes are becoming more widespread and threaten the information security, critical infrastructure, personal life and citizens’ finances, organizations and the entire state. The terminological apparatus is analyzed, the classifications of modern cybercriminals are studied, the main approaches to the commission of crimes in the field of computer information are determined. The following methods are used in the research: analysis and synthesis, induction and deduction, system method, dialectical and materialistic methods, formal legal method. The study and analysis of the forensic characteristics allows us to determine the most common ways of committing such crimes, to develop effective counteraction measures. It is established that the main difficulty in the investigation of these crimes is the complex technological nature and the order of their commission. Many criminals are constantly improving their skills, the most qualified of them try to be careful, develop their own countermeasures against law enforcement agencies, using ciphers, special remote access programs to make it as difficult as possible to collect evidence and search activities. Among other things, the difficulty of cybercriminals holding liable is complicated if intruders are located in another state, and unfortunately, one cannot count on international cooperation in the field of law and order and public security with many Western countries today.
About the authors
Alexander S. KISELEV
State University of Education; Financial University under the Government of the Russian Federation
Author for correspondence.
Email: alskiselev@fa.ru
ORCID iD: 0000-0002-5044-4721
PhD (Law), Associate Professor of Civil Law Department; Senior Research Scholar of Research and Expertise Center
Russian Federation, 10A Radio St., Moscow, 105005, Russian Federation; 49 Leningradsky Ave., Moscow, 125993, Russian FederationKsenia A. GORBUNOVA
State University of Education
Email: gorbynya.rambler.ru@yandex.ru
ORCID iD: 0009-0007-7475-6096
Filing Clerk of Entrepreneurial Law Department, Management and Law
Russian Federation, 10A Radio St., Moscow, 105005, Russian FederationReferences
- Richet J.L. (2022). How Cybercriminal Communities Grow and Change: A study of communities Engaged in advertising fraud. Technological Forecasting and Social Change, vol. 174. https://doi.org/10.1016/j.techfore.2021.121282
- Chang L.Y.C., Grabosky P. (2014). Cybercrime and Establishing a Secure Cyberworld. The Handbook of Security. London, Palgrave Macmillan Publ., pp. 321-339. https://doi.org/10.1007/978-1-349-67284-4_15
- Ishchenko E.P. (2021). About artificial intelligence technology in criminology. In: Zelenskii V.D. (ed.). Sbornik nauchnykh trudov po materialam Vserossiiskoi nauchno-prakticheskoi konferentsii s mezhdunarodnym uchastiem «30 let yuridicheskoi nauki KubGAU» [Collection of Scientific Papers based on Proceedings of the All-Russian Scientific and Practical Conference with International Participation “30 Years of Kuban State Agrarian University Legal Science”]. Krasnodar, Kuban State Agrarian University Publ., pp. 375-380. (In Russ.) https://elibrary.ru/xgjggm
- Henthorne T. (2011). William Gibson: A Literary Companion. Jefferson, McFarland & Company Publ., 176 p.
- Faizullina A.A. (2017). K voprosu o sootnoshenii ponyatii «kriminalisticheskaya kharakteristika prestuplenii» i «sledstvennaya situatsiya» [On the question of the relationship between the concepts of “criminalistic characteristics of crimes” and “investigative situation”]. Innovatsionnaya nauka = Innovation Science, no. 2-2, pp. 140-142. (In Russ.) https://elibrary.ru/xvsiqn
- Grigoryan S.A. (2022). Osobennosti lichnosti sovremennogo «kiberprestupnika» [Personality features of a modern “cybercriminal”]. Nauka i obrazovanie: khozyaistvo i ekonomika; predprinimatel’stvo; pravo i upravlenie [Science and Education: Economy and Economics; Entrepreneurship; Law and Management], no. 8 (147), pp. 103-106. (In Russ.) https://elibrary.ru/seyfyc
- Belevitina Yu.V. (2022). Criminological portrait of the personality of a cybercriminal in modern Russia. Innovatsionnaya nauka = Innovation Science, no. 12-2, pp. 61-64. (In Russ.) https://elibrary.ru/xcfqlv
- Martynova N.V. (2022). Nekotorye aspekty kriminologicheskoi kharakteristiki lichnosti kiberprestupnika [Some aspects of criminological characteristics of a cybercriminal's personality]. Studencheskii vestnik [Student Bulletin], no. 17-5 (209), pp. 7-10. (In Russ.) https://elibrary.ru/jgqysk
- Suleimanov R.T., Atik Kh.B. (2021). Obshchaya kharakteristika lichnosti kiberprestupnika [General characteristics of the cybercriminal’s personality]. Nauchnyi elektronnyi zhurnal Meridian [Scientific Electronic Journal Meridian], no. 4 (57), pp. 114-116. (In Russ.) https://elibrary.ru/dbwcer
- Zhizhina M.V., Zav’yalova D.V. (2023). Rassledovanie prestuplenii v sfere komp’yuternoi informatsii v Rossiiskoi Federatsii i zarubezhnykh stranakh [Investigation of Crimes in the Field of Computer Information in the Russian Federation and Foreign Countries]. Moscow, Prospekt Publ., 136 p. (In Russ.) https://elibrary.ru/oimenm
- Popova S.V., Agafonova M.S., Mashin A.A. (2020). Threats to economic security in the sixth generation wars concept. Tsifrovaya i otraslevaya ekonomika = Digital and Industry Economy, no. 4 (21), pp. 55-63. (In Russ.) https://elibrary.ru/seuuiy
- Mogunova M.M. (2020). Technology of implementation and legal regulation of illegal possession of personal banking data (phishing). Vestnik Saratovskoi gosudarstvennoi yuridicheskoi akademii = Bulletin of Saratov State Law Academy, no. 4 (135), pp. 135-141. (In Russ.) https://doi.org/10.24411/2227-7315-2020-10110, https://elibrary.ru/hfbjrg
- Vekhov V.B. (1996). Komp’yuternye prestupleniya. Sposoby soversheniya, metodiki rassledovaniya [Computer Crimes. Ways of Commission, Methods of Investigation]. Moscow, Law and Legislation Publ., 182 p. (In Russ.) https://elibrary.ru/yqclwu
- Klebanov L.R., Polubinskaya S.V. (2020). Computer technologies for committing sabotage and terrorism. Vestnik Rossiiskogo universiteta druzhby narodov. Seriya: Yuridicheskie nauki = RUDN Journal of Law, vol. 24, no. 3, pp. 717-734. (In Russ.) https://doi.org/10.22363/2313-2337-2020-24-3-717-734, https://elibrary.ru/isbbpl
- Polyakov V.V. (2013). The situation of crime in the computer information sphere as a part of criminalistic characteristic. Izvestiya Altaiskogo gosudarstvennogo universiteta = Izvestiya of Altai State University, no. 2-1 (78), pp. 114-116. (In Russ.) https://elibrary.ru/rapmrx
Supplementary files
