Modern means of committing computer crimes and patterns of their execution
https://doi.org/10.17803/1729-5920.2019.148.3.087-099
Abstract
The paper notes that the integration of modern information technologies in all spheres of human activity has led to the informatization and computerization of crime, when it is possible to commit almost any crime by means of computer tools and systems. There is a commonality of some elements of the mechanism of computer crimes, including information about the methods of these crimes.
Means of committing computer crimes are considered from the standpoint of a new private theory of information and computer support of forensic activities, the subject of which are the laws of occurrence, movement, collection and study of computer information in the investigation of crimes. The objects are computer tools and systems, especially forensic technologies of collection (detection, fixation, seizure) and research of these objects to obtain evidence and guidance information. From the modern point of view, the method of crime is determined by personality, subject and circumstances of the criminal attack, the system of actions of the subject, aimed at achieving the criminal goal and united by a single criminal plan. The means of a crime commitment are divided into fully structured, including preparation, commission and concealment, and incomplete, when one or two elements are absent. The formation of the means of a crime is influenced by objective and subjective factors, which determines the determinism and repeatability of the means of the crime.
The main means of computer crimes are considered: aimed at hiding unauthorized access to computer tools and systems; the use of Trojans for various purposes; infection of computer systems with viruses; the use of hardware and software systems for mass campaigns of malicious software distribution to mobile devices; computer attacks on local corporate networks, etc.
It is established that the criminalistic regularity of the formation and implementation of computer crimes is a mandatory stage of preparation for the crime, which at the same time includes actions to conceal the traces of the crime, i.e. the methods of computer crimes are fully structured
Keywords
About the Authors
E. R. RossinskayaRussian Federation
Doctor of Law, Professor, Director of the Forensic Examination Institute, Head of the Department of Forensic Examination, Honored Scientist of the Russian Federation, Honorary Worker of Higher Professional Education of the Russian Federation,
125993, Moscow, ul. Sadovaya-Kudrinskaya, d. 9
I. A. Ryadovskiy
Russian Federation
Head of Department of Investigation of Computer Incidents, Honorary Worker of Prosecutor’s Office of the Russian Federation,
125212, Moscow, Leningradskoe shosse, d. 39a, stroenie 3
References
1. Averyanova T.V., Belkin R.S., Korukhov Yu.G., Rossinskaya E.R. Kriminalistika: uchebnik dlya vuzov [Criminalistics: A Textbook for Universities]. 4th edition, rev. and suppl. Moscow: Norma Publ.: Infra-M, 2014. 928 p.
2. Belkin R.R. Kurs kriminalistiki [Course of Criminalistics]. 3 ed., suppl. Moscow: Yuniti-Dana Publ., Zakon i Pravo, 2001. 837 p.
3. Zuykov G.G. «Modus operandi», kibernetika, poisk [“Modus operandi”, Cybernetics, Search]. Kibernetika i pravo [Cybernetics and law]. 1970. Pp. 46—56.
4. Zuykov G.G. Kriminalisticheskoe uchenie o sposobe soversheniya prestupleniya: avtoref. dis. … d-ra yurid. nauk [Forensic doctrine of the method of committing a crime : Abstract of the Doctoral Degree Thesis. Moscow: Higher School of the USSR Interior Ministry, 1970. 31 p.
5. Zuykov G.G. Kriminalisticheskoe uchenie o sposobe soversheniya prestupleniya [Forensic doctrine of the method of committing a crime]. Glava 6. Kriminalistika [Ch. 6. Criminology]. Edited by R.S. Belkin, I.M. Luzgin. Moscow: The Academy of the USSR Interior Ministry, 1978. Vol. 1. 384 p.
6. Zuykov G.G. Osnovy kriminalisticheskogo ucheniya o sposobe soversheniya i sokrytiya prestupleniya [Fundamentals of forensic doctrine of the method of commission and concealment of the crime]. Glava 3. Kriminalistika: uchebnik dlya yuridicheskikh vuzov MVD SSSR [Chapter 3. Forensic Science : A Textbook for Law Schools of the USSR Interior Ministry. Edited by R.S. Belkin, V.P. Lavrov, I.M. Luzgin. Moscow: The Academy of the USSR Interior Ministry, 1987. Vol. 1. 340 p.
7. Kriminalistika: uchebnik dlya vuzov [Criminalistics : A Textbook for universities]. Edited by A.G. Filippov. 4th ed., rev. and suppl. Moscow: Vysshee obrazovanie Publ., 2017. 835 p.
8. Kriminalistika: uchebnik dlya vuzov [Criminalistics : A Textbook for students]. Edited by V.P. Lavrov. 2nd ed., rev. and suppl. Moscow: Yuniti-Dana Publ.: Law and Rights, 2008. 943 p.
9. Kurouz, D., Ross K. Kompyuternye seti: niskhodyashchiy podkhod [Computer network: top-down approach]. 6th ed. Moscow : E Publ., 2016. 912 p.
10. Rossinskaya E.R. Kontseptsiya chastnoy kriminalisticheskoy teorii «informatsionno-kompyuternoe obespechenie kriminalisticheskoy deyatelnosti» [Concept of private criminalistic theory “information and computer support of criminalistic activity”]. Deyatelnost pravookhranitelnykh organov v sovremennykh usloviyakh: Sbornik materialov xxiii mezhdunarodnoy nauchno-prakticheskoy konferentsii [Activity of law enforcement agencies in modern conditions : Proc. of the 23 International Scientific and Practical Conference : in 2 vols. Irkutsk: East Siberian Institute of the RF Ministry of Internal Affairs, 2018. Pp. 113—118.
11. Rossinskaya E.R. Kriminalistika: uchebnik dlya vuzov [Criminalistics: A Textbook for universities]. Moscow: Norma Publ.: Infra-M, 2016. 464 p.
12. Torichko R.S., Klishina N.E. Nekotorye voprosy sovershenstvovaniya deystvuyushchego zakonodatelstva, reglamentiruyushchego rassledovanie kiberprestupleniy [Some issues of improvement of the current legislation regulating the investigation of cybercrime]. Vestnik ekonomicheskoy bezopasnosti [Vestnik of Economic Security]. 2018. No. 3. Pp. 179—184.
13. Chekunov I.G., Ryadovskiy I.A., Ivanov M.A. [et al.]. Metodicheskie rekomendatsii po rassledovaniyu prestupleniy v sfere kompyuternoy informatsii: uchebnoe posobie [Guidelines for the investigation of crimes in the field of computer information : A Study Guide]. Edited by G.I. Chekunov. Moscow: Moscow University of the the Ministry of the Interior of Russia named after V. J. Kikot, 2018. 106 p.
14. Chekunov I.G. Sovremennye kiberugrozy. Ugolovnopravovaya i kriminologicheskaya klassifikatsiya i kvalifikatsiya kiberprestupleniy [Modern cyber threats. Criminal law and criminological classification of cybercrime]. Pravo i kiberbezopasnost [Law and cybersecurity]. 2012. No. 1. Pp. 9—22.
15. Chulakhov V. N. Kriminalisticheskoe uchenie o navykakh i privychkakh cheloveka: monograph [Criminalistic doctrine on the skills and habits of the person: the monograph]. Edited by E.R. Rossinskaya. Moscow: Yurlitinform Publ. 284 p.
16. Ligh M., Adair S., Hartstein B., Richard M. Malware Analyst’s Cookbook and DVD: Tools and Techniques for Fighting Malicious Code. Indianapolis: Wiley Publishing, Inc., 2010. 716 p.
17. Matrosov A., Rodionov E., Bratus S. Rootkits and Bootkits: Reversing Modern Malware and Next Generation threads. No Starch Press, 2015. - 504 p.
Review
For citations:
Rossinskaya E.R., Ryadovskiy I.A. Modern means of committing computer crimes and patterns of their execution. Lex Russica. 2019;(3):87-99. (In Russ.) https://doi.org/10.17803/1729-5920.2019.148.3.087-099