Ostrovskii O.A. —
Algorithm of measures on analyzing the situation in suspicion of cybercrime with consideration of the specifics of the sources of the information data
// Law and Politics. – 2018. – ¹ 10.
– P. 32 - 37.
DOI: 10.7256/2454-0706.2018.10.22879
URL: https://en.e-notabene.ru/lpmag/article_22879.html
Read the article
Abstract: This article presents the classification of computer information that identifies the means of how it was obtained, provides an algorithm for measure in investigating crimes in the area of cyberspace, as well as proposes the category of information traces of possible cybercrimes. The author carefully examines such aspects as use of information traces and conducts research on analysis of cybercrime investigation. The object of this research is cybercrime reflected in information traces, as well as tactical and technical actions aimed at discovery, storage and confiscation of information traces. The subject of this research is the regularities of crime that produces information traces, as well as regularities in the law enforcement activity in detecting, recording and using such traces in criminal investigation. Identification and analysis of cybercrimes is a difficult task in practice due to widening spectrum of crimes committed in cyberspace and constant development of means of storing and transferring information. Its solution requires not only special tactics in investigation and organizational measures, but also special knowledge in the area of computer technology. In this work, the author offers a structural schematic for the necessary measure for analysis in suspicion of cybercrime, as well as the sources of this information.
Ostrovskii O.A. —
Object decomposition principle in systematization of ID codes characterizing cybercrimes
// Police activity. – 2017. – ¹ 3.
– P. 10 - 18.
DOI: 10.7256/2454-0692.2017.3.21869
URL: https://en.e-notabene.ru/pdmag/article_21869.html
Read the article
Abstract: The author considers such aspects as the use of information tracks for the investigation of cybercrimes; proposes a well-elaborated system of interaction and presentation of the information in a flow graph for further classification of cybercrimes. The research object is cybercrime, which can be seen in information tracks, and tactical and technical mechanisms of detection, storage and subtraction of information tracks. The research subject is the cybercrime patterns leaving information marks, and the activities of law enforcement agencies aimed at the detection, fixation and use of such tracks for investigation of crimes. Special attention is given to the new principle of systematization of codes characterizing cybercrimes on the basis of object decomposition. The author uses the principles of object decomposition for the systematization of ID codes characterizing cybercrimes. The research methodology has the following peculiarities: investigative activities aimed at the acquisition of primary information; typification of investigatory situations; detection of circumstances; development of investigatory programs; organization of preventive activities of investigators; tactics of investigatory and other actions. The author concludes that analysis, identification and classification of cybercrimes are among the main and the most difficult tasks due to the extending range of such crimes and constant development of the means of transmission and storage of information. It requires not only a special tactics of investigatory and organizational activities, but, first and utmost, special knowledge in the sphere of information technologies. All the codes, characterizing cybercrimes, have an identifier starting with “Q”. For the identification of crimes, codes in descending order of gravity of a crime can be used. The author proposes the object decomposition principle, based on ID codes decoding, the system of interaction, and the presentation of information in a flow graph for further visualization. It will help an expert to classify the committed cybercrime quickly and accurately and assign to it a certain code.