Cybercrime as a global security threat
The aim of the study is to analyze in depth and further develop the existing theoretical and practical developments of domestic and foreign specialists in the field of investigation of crimes related to information technology. On the basis of studying and researching different points of view of specialists in this field, - to reveal and analyze different approaches of scientists to the formation of discussion questions. According to the purpose of the research, the article uses: dialectical, system-structural, formal-logic, statistical, comparative, as well as some sociological methods. The specificity and complexity in the investigation of such cases lies in the fact that this type of crime has no territorial or spatial limitations, and this, in turn, complicates its methods of rapid disclosure.
Bachilo, I.L. (2002). Key areas of institutional regulation for the use of global networks, including the Internet. Information law: information culture and information security. Materials of the All-Russian Scientific and Practical Conference of the St. Petersburg Humanitarian University of Trade Unions. Saint Petersburg.
Bitcoin Prices Settle After Biggest 3-Day Drop in 2 Years. (2017). Reuters. April 13, 2017. Available from: http://fortune.com/2017/03/20/bitcoin-pricesshares/.
Bohannon, J. (2016). Why criminals can’t hide behind Bitcoin. Science, 9 March. Available from: https://www.sciencemag.org/news/2016/03/why-criminals-cant-hide-behind-bitcoin/
Burgess, M. (2017). Hacking the Hackers: Everything You Need to Know about Shadow Brokers’ Attack on the NSA. Wired, 18 April 2017. Available from: www.wired.co.uk/article/nsa-hacking-tools-stolen-hackers/ .
Dean, J. (2015). Cybercrime is bigger than drugs, says police chief. The Times, 14 April. Available from: www.thetimes.co.uk/article/cybercrime-is-bigger -than-drugs-says-police-chief -vhdcrw6ms3s/.
Efremova, M.A. (2018). Criminal-legal protection of information security. Moscow. Jurlitinform.
Eliseev, S. A. (2018). Crimes against property. Tomsk: Publishing House of Tomsk State University.
Elkhannoubi, H., Belaissaoui, M. (2015). Fundamental pillars for an effective cybersecurity strategy. IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA), 1, 1-2. DOI: https://doi.ieeecomputersociety.org/10.1109/AICCSA.2015.7507241/
Estonia. Cyber Security Strategy 2014-2017. (2014). Available from: https://www.mkm.ee/en/objectives-activities/information-society/cyber-security/
Field, N.S. (1994). Computer technologies in legal activity. Moscow: BEC Publishing House.
Komarov, A.A. (2013). Internet Fraud: Problems of Determination and Prevention. Moscow. Jurlitinform.
Kostenko, N. I. (2019). International information security law. Moscow. Jurlitinform.
Lee, T. (2014). Five years of Bitcoin in one post. Washington Post, 14 January. Available from: https://www.washingtonpost.com/news/the-switch/wp/2014/01/03/five-years-of-bitcoin-in-one-post/
National Cyber Security Strategy 2016 to 2021: progress so far. (2019). Available from: https://www.gov.uk/government/publications/national-cyber-security-strategy-2016-to-2021-progress-so-far/
NATO. National Cyber Security Strategy Guidelines. (2013). CCDCOE, Editor. Tallinn, Estonia.
Novikov, D.A. (2015). Cybernetics. Moscow: LENAND.
Sharikov, P. A. (2015). Information security problems in a polycentric world. Moscow. The whole world.
The Russian military has created its own Internet. (2016). Available from: https://rg.ru/2016/10/19/rossijskie-voennye-sozdali-sobstvennyj-internet.html.
The United States accused 13 Russians of interfering in the presidential election. Who and what exactly did they do? (2018). Available from: https://meduza.io/feature/2018/02/16/ssha-obvinili-13-rossiyan-vo-vmeshatelstve-v-prezidentskie-vybory-kto-oni-i-chto-imenno-delali (Accessed 09.08.2019).
Zharova, A.K. (2002). Legal problems of information circulation on the Internet. Moscow.