Information-computer forensic models of computer crimes as the elements of forensic techniques (using the example of “cyber blackmail”)

IF 0.1 Q4 LAW
E. Rossinskaya, Anastasia I. Semikalenova
{"title":"Information-computer forensic models of computer crimes as the elements of forensic techniques (using the example of “cyber blackmail”)","authors":"E. Rossinskaya, Anastasia I. Semikalenova","doi":"10.17223/22253513/42/5","DOIUrl":null,"url":null,"abstract":"Traditionally, one of the key components of any methodology is the forensic character of the type of crime, often considered as a typical information model. The basis of this definition is, in our opinion, the need to model this type of crime by generalizing based on the study of large arrays of criminal cases, information about the criminally significant signs of the type of crime, and their natural connections. In the era of digitalization, new opportunities are opening up for the study and generalization of large arrays of forensically significant information using BigData technology. The use of information computer technologies in criminal activities makes it possible to commit different crimes (crimes against the person in economics, economic activities, public security and others) using the same methods. Therefore, the traditional unification of information models by types of crimes does not give necessary results. The article deals with the problems of formation and application of the foundations of a new doctrine of information-computer forensic models of computer crimes as part of the theory of information and computer support of the forensic activity. The subject of this teaching is the general laws for building information-computer models of computer crimes based on correlation ties. These are the ties of combinations of IT technologies and computer systems for implementing various methods of computer crimes, regardless of their type, with a traced picture as digital traces and with competencies in information computer technologies of the criminal and the injured party. The object of the study is forensically significant computer information about the used combinations of IT technologies and computer tools and systems. This is information about various methods of computer crimes, digital traces, including traces of the impact of ransomware, counterfeit information and computer products, characteristics of criminals and victims from the point of view of the degree of their proficiency in IT technologies. Information-computer models of computer crimes in the generalization of large arrays of information can serve as one of the key elements of private forensic methods of investigation. This approach is considered on the example of the investigation of extortion using the Internet - “cyber blackmail”. Options of “cyber blackmail” of individuals and organizations are considered and information and computer models are built for them. The authors determine the features of correlation of methods of crimes, the used computer tools and systems, objects of encroachment with the competencies of criminals (organized criminal groups) and victims in IT technologies.","PeriodicalId":41435,"journal":{"name":"Vestnik Tomskogo Gosudarstvennogo Universiteta-Pravo-Tomsk State University Journal of Law","volume":"4 1","pages":""},"PeriodicalIF":0.1000,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Vestnik Tomskogo Gosudarstvennogo Universiteta-Pravo-Tomsk State University Journal of Law","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17223/22253513/42/5","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"LAW","Score":null,"Total":0}
引用次数: 0

Abstract

Traditionally, one of the key components of any methodology is the forensic character of the type of crime, often considered as a typical information model. The basis of this definition is, in our opinion, the need to model this type of crime by generalizing based on the study of large arrays of criminal cases, information about the criminally significant signs of the type of crime, and their natural connections. In the era of digitalization, new opportunities are opening up for the study and generalization of large arrays of forensically significant information using BigData technology. The use of information computer technologies in criminal activities makes it possible to commit different crimes (crimes against the person in economics, economic activities, public security and others) using the same methods. Therefore, the traditional unification of information models by types of crimes does not give necessary results. The article deals with the problems of formation and application of the foundations of a new doctrine of information-computer forensic models of computer crimes as part of the theory of information and computer support of the forensic activity. The subject of this teaching is the general laws for building information-computer models of computer crimes based on correlation ties. These are the ties of combinations of IT technologies and computer systems for implementing various methods of computer crimes, regardless of their type, with a traced picture as digital traces and with competencies in information computer technologies of the criminal and the injured party. The object of the study is forensically significant computer information about the used combinations of IT technologies and computer tools and systems. This is information about various methods of computer crimes, digital traces, including traces of the impact of ransomware, counterfeit information and computer products, characteristics of criminals and victims from the point of view of the degree of their proficiency in IT technologies. Information-computer models of computer crimes in the generalization of large arrays of information can serve as one of the key elements of private forensic methods of investigation. This approach is considered on the example of the investigation of extortion using the Internet - “cyber blackmail”. Options of “cyber blackmail” of individuals and organizations are considered and information and computer models are built for them. The authors determine the features of correlation of methods of crimes, the used computer tools and systems, objects of encroachment with the competencies of criminals (organized criminal groups) and victims in IT technologies.
作为取证技术要素的计算机犯罪的信息-计算机取证模型(以“网络勒索”为例)
传统上,任何方法的关键组成部分之一是犯罪类型的法医特征,通常被认为是典型的信息模型。我们认为,这一定义的基础是,需要根据对大量刑事案件的研究、关于这类犯罪的重大犯罪迹象的信息以及它们之间的自然联系,对这类犯罪进行概括,从而建立模型。在数字化时代,利用大数据技术研究和推广大量具有法医意义的信息提供了新的机会。信息计算机技术在犯罪活动中的应用,使得使用相同的方法实施不同的犯罪(经济、经济活动、公共安全等方面的犯罪)成为可能。因此,传统的按犯罪类型统一信息模型并不能得到必要的结果。作为信息与计算机支持法医活动理论的一部分,本文探讨了计算机犯罪的计算机法医模型的形成和应用的新信息理论基础问题。本课程的教学主题是建立基于关联关系的计算机犯罪信息计算机模型的一般规律。这些是资讯科技和电脑系统的结合,以实施各种电脑犯罪的方法,不论其类型,以追踪图像作为数字痕迹,以及罪犯和受害方在资讯电脑技术方面的能力。该研究的对象是关于IT技术和计算机工具和系统的使用组合的法医重要计算机信息。这是关于各种计算机犯罪方法的信息,数字痕迹,包括勒索软件,假冒信息和计算机产品的影响痕迹,罪犯和受害者的特征,从他们对IT技术的熟练程度的角度来看。计算机犯罪的信息-计算机模型在大量信息的概括中可以作为私人法医调查方法的关键要素之一。以调查利用互联网的敲诈勒索为例,即“网络敲诈勒索”,考虑了这种方法。考虑个人和组织的“网络勒索”选项,并为他们建立信息和计算机模型。作者确定了犯罪方法、使用的计算机工具和系统、侵犯对象与罪犯(有组织犯罪集团)和受害者在信息技术方面的能力之间的相关性特征。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信