SOME ASPECTS OF CRIMINAL CHARACTERISTICS OF CYBER CRIMES
Author (s): Haryha М.M., Verhun L.O., Kuznetsov О.O.
Work place:
Haryha-Hrykhno M. M.,
Forensic expert, Leading professional of Research organization of the Department of Activity Ensuring,
Chernihiv Region Scientific Research Forensic Centre of the Ministry of Internal Affairs of Ukraine
ORCID: 0000-0003-2397-6383
Verhun L.О.,
founder and leader of ІТ agency WellDigital,
Kyiv, Ukraine
Kuznetsov O.,
Senior Lecturer of the Department of Tactical and Special Training,
Academy of the State Penitentiary Service, Chernihiv, Ukraine
ORCID: 0000-0002-1064-9116
Language: Ukrainian
Scientific Herald of Sivershchyna. Series: Law 2020 No 3(11): 89–99
https://doi.org/10.32755/sjlaw.2020.03.089
The article analyzes the dynamics of crimes in the use of computers, systems, computer networks and telecommunications networks for 2019-2020, and focuses on the high “adaptive” ability of this criminal segment as well as the need to improve existing and create new effective mechanisms to combat relevant criminal acts. One of the conditions for the existence of such mechanisms is the presence of thorough forensic characteristics of this group of crimes, which allows identifying and understanding the training, commission and concealment of the group of illegal acts. The research describes the main approaches to determining the mandatory and optional features of the crime in the use of computers, systems and computer networks. The article also provides a brief forensic description of cybercrime in accordance with the generally accepted system, which contains the following elements: the identity of the offender, methods of preparation for the crime; the victim, the subject of the offense; the circumstances of the crime, the consequences of any changes caused by the crime in the physical material damage reflected in the material situation of the crime. To determine the scope of the investigated illegal actions, a list is given to be solved by specialists of the Cyber Police Department of the National Police of Ukraine. Additionally, the main methods of hacking websites are described, including: SQL injection, Cross-site scripting, Phishing, Shared hosting, Cross-Site Scripting, Cross-Site Request, ForgeryCookie Faking, Man-In-The-Middle , Clickjacking, Brute-Force, Zero Day, Backdoor. An approximate list of tasks that may be assigned to forensic experts in the case of their participation in the investigation of crimes in the use of electronic computers, systems and computer networks.
Key words: cybercrime, cyber crime actions, crime statistics, computer crimes.
References
- Statistical information for 2011–2020, Office of the Prosecutor General: official web-site, available at: https://old.gp.gov.ua/ua/ statinfo.html (last accessed at: 01.07.2020).
- Сriminalistics (2004) / in Shepitka, V. Yu. (Ed.), Vol. 2, Concern Publishing House “In Jure”, Kyiv, available at: https://buklib.net/books/21972/ (last accessed at: 01.07.2020).
- Ukraine (2017), On the Basic Principles of Cybersecurity in Ukraine: Law of Ukraine dated 05.10.2017: The Verkhovna Rada of Ukraine, available at: https://zakon.rada.gov.ua/laws/show/2163-19#Text (last accessed at: 10.07.2020).
- Khahanovskyi, V. G. (2011), “Features of forensic characteristics of cybercrimes”, Legal Journal of the National Academy of Internal Affairs, № 1 (1), pp. 89–93, available at: http://nbuv.gov.ua/UJRN /aymvs_2011_1(1)__13 (last accessed at: 06.07.2020).
- Investigation of illegal access to computer information (1999) / in Shurukhnova, N.G. (Ed.), Shchit-М, Moscow.
- Dovzhenko, О. Yu. (2019), “Classification of cybercrimes in criminology”, South Ukrainian Law Journal, (1), available at: http://www.sulj.oduvs.od.ua /archive/2019/1/7.pdf (last accessed at: 01.07.2020).
- Avakov, А. (2015), Cyberpolice (reform step), available at: https://www.facebook.com/arsen.avakov.1/posts/916452195111554 (last accessed at: 01.07.2020).
- Tiurin, A. (2013), “In search of loopholes: guide to DOM Based XSS // Hacker”, Magazine, № 172, pp. 80–85.
- Fogie, S., Grossman, J., Hansen, R., Rager, A., Petkov, D.(2007), XSS Attacks: Cross Site Scripting Exploits and Defense, Syngress.https://doi.org/10.1016/B978-159749154-9/50005-6
- Stewart, J. M.(2015), CISSP: Certified Information Systems Security Professional Study Guide, John Wiley & Sons, Inc., Canada.