Criminalistics specifics of methods of committing computer crimes and peculiarities of their prevention
The article develops a new approach to computer crime, which consists in the forensic differentiation of methods of committing computer crimes by their complexity and danger level. We revealed the characteristic features of different types of computer crimes and classified the means and receptions of hi-tech ways of committing computer crimes, namely cyberterrorism, cyber-extremism and illegal influence on state critical information infrastructure. A new methodology for the forensic prevention of computer crimes has been proposed, based on the application of Honeypot technology. The results of the work allow to develop the modern criminalistic theory of crimes in the sphere of computer information, while data obtained during the research can be used as a scientific basis for conducting investigations of computer crimes.
Broadhurst, R. Grabosky, P., Alazab, M. & Chon, S. (2014). Organizations and Cyber crime: An Analysis of the Nature of Groups engaged in Cyber Crime International Journal of Cyber Criminology, 8(1), 1-20.
Cameron, S. D. (2015). Brown. Investigating and Prosecuting Cyber Crime: Forensic Dependencies and Barriers to Justice // International Journal of Cyber Criminology. Vol. 9 (1): 55–119. DOI: 10.5281/zenodo.22387
Conradt C. (2012). Online Auction Fraud and Criminological Theories: The Adrian Ghighina Case. International Journal of Cyber Criminology (IJCC), 6(1), 912-923.
Diamon, B., Bachmann, M. (2015). Out of the Beta Phase: Obstacles, Challenges, and Promising Paths in the Study of Cyber Criminology. International Journal of Cyber Criminology, 9(1), 24–34. DOI: 10.5281/zenodo.22196.
Garmaev, Y.P., Popova, E.I. (2016). The Organization of Anticriminal and Antiterrorist Education in the Crimean Federal District. Criminology Journal of Baikal National University of Economics and Law, 2016, 10(2), 270-279.
Holt, Th.J., Strumsky, D., Smirnova, O., Kilger, M. (2012). Examining the Social Networks of Malware Writers and Hackers. International Journal of Cyber Criminology, 6(1), 891-903.
Howell, C.J., Maimon, D., Cochran, J.K., Jones, H.M., Powers, R.A. (2017). System Trespasser Behavior after Exposure to Warning Messages at a Chinese Computer Network: An Examination. International Journal of Cyber Criminology, 11(1), 63–77. DOI: 10.5281/zenodo.495772.
Meshcheryakov, V.A. (2004). Electronic Digital Objects in Criminal Proceedings and Forensics. Voronezh Forensic Readings: Research Collected Works, 5, 153-169.
Osipenko, A.L. (2010). Operative-search activity in cyberspace: answers to new challenges. Scientific Bulletin of the Omsk Academy of the Russian Ministry of Internal Affairs, 2(37), 38-43.
Parkhomenko, S.V. Evdokimov, K.N. (2015). Computer Crime Prevention in the Russian Federation: Integrative and Integrated Approaches / S.V. Parkhomenko, K.N. Evdokimov. Criminological Journal of Baikal State University of Economics and Law, 2, 265-276.
Pastukhov, P.S., Losavio, M. (2017). Ispol’zovanie informatsionnykh tekhnologiy dlya obespecheniya bezopasnosti lichnosti, obshchestva I gosudarstva [Use of Information Technology to Ensure Security of the Individual, Society and State]. Vestnik Permskogo Universiteta. Juridicheskie Nauki - Perm University Herald. Juridical Sciences, 36, 231–236. DOI:10.17072/1995-4190-2017-36-231-236.
Polyakov, V.V. (2016). Forensic analysis of relatively simple ways of committing computer crimes. South Ural Forensic Readings: Collection of Reports of All-Russian Scientific-Practical Conference. Ufa: RIC BashGU.
Polyakov, V.V. (2016). Prevention of extremism and terrorism through the Internet. Izvestia of Altai State University, 3(91), 142-144.
Polyakov, V.V. (2017). The honeypot system as an information gathering tool to combat cybercrime. Forensic science library, 1(30), 250-254.
Polyakov, V.V., Kurakin, A.V. (2018). Investigation situations of the initial stage of investigation of computer crimes committed remotely. Problems of legal and technical protection of information, 6, 113-119.
Polyakov, V.V., Lapin, S.A. (2014). Means of committing computer crimes. Reports of the Tomsk State University of Control Systems and Radioelectronics, 2(32), 162-166.
Raed, S. A. Faqir (2013). Cyber Crimes in Jordan: A Legal Assessment on the Effectiveness of Information System Crimes Law No.30 of 2010. International Journal of Cyber Criminology, 7(1), 81-90.
Semenov, A.Yu. (2004). Some Aspects of Detection, Seizure and Investigation of Traces of Computer-related Information Crime. Siberian Legal Gazette, 1.
Stratton, G., Powell, A. and Cameron, R (2017). Crime and Justice in Digital Society: Towards a ‘Digital Criminology’? International Journal for Crime, Justice and Social Democracy, 6(2), 17-33. DOI: 10.5204/ijcjsd.v6i2/355.
Sunami, A.N. (2013). Youth Extremism, Xenophobia, Intolerant Behavior: Conflict Analysis of the Russian Internet. Conflictology, 1, 178-185.