审问涉嫌网络诈骗人士的战术特点(以网络钓鱼为例)

Ainura Sabyrbayeva
{"title":"审问涉嫌网络诈骗人士的战术特点(以网络钓鱼为例)","authors":"Ainura Sabyrbayeva","doi":"10.51788/tsul.rols.2022.6.3./gjwj7576","DOIUrl":null,"url":null,"abstract":"The article discusses the tactical features of the interrogation of suspects in the commission of cyber fraud, and also developed an approximate list of questions that should be asked to suspects in phishing attacks. The article describes the types of phishing attacks as well as the most dangerous ways to commit them. One of the types of cyber fraud using the Oson Credit application is described, which is aimed at capturing confidential user data, such as bank card data, gaining access to accounts in social messengers, video, photo files and documents located on a telephone device to which the attackers gained access. The article considers the most common mistakes in forensic investigative practice made by investigators due to ignorance of special terminology, and features of the investigation of new types of fraudulent encroachments - cyber fraud. The study of trends in the development of crimes in the economic sphere suggests the need to develop new effective and efficient methods for investigating cyber fraud. Considering the analysis of cybercrime statistics over the past few years, it can be concluded that it is necessary to strengthen counteraction to new types of cybercrime, such as cyberfraud, phishing, smishing, carding, etc.","PeriodicalId":102464,"journal":{"name":"Review of Law Sciences","volume":"467 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"TACTICAL FEATURES OF THE INTERROGATION OF PERSONS SUSPECTED OF COMMITTING CYBERFRAUD (USING THE EXAMPLE OF PHISHING)\",\"authors\":\"Ainura Sabyrbayeva\",\"doi\":\"10.51788/tsul.rols.2022.6.3./gjwj7576\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article discusses the tactical features of the interrogation of suspects in the commission of cyber fraud, and also developed an approximate list of questions that should be asked to suspects in phishing attacks. The article describes the types of phishing attacks as well as the most dangerous ways to commit them. One of the types of cyber fraud using the Oson Credit application is described, which is aimed at capturing confidential user data, such as bank card data, gaining access to accounts in social messengers, video, photo files and documents located on a telephone device to which the attackers gained access. The article considers the most common mistakes in forensic investigative practice made by investigators due to ignorance of special terminology, and features of the investigation of new types of fraudulent encroachments - cyber fraud. The study of trends in the development of crimes in the economic sphere suggests the need to develop new effective and efficient methods for investigating cyber fraud. Considering the analysis of cybercrime statistics over the past few years, it can be concluded that it is necessary to strengthen counteraction to new types of cybercrime, such as cyberfraud, phishing, smishing, carding, etc.\",\"PeriodicalId\":102464,\"journal\":{\"name\":\"Review of Law Sciences\",\"volume\":\"467 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Review of Law Sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.51788/tsul.rols.2022.6.3./gjwj7576\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Review of Law Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.51788/tsul.rols.2022.6.3./gjwj7576","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

本文讨论了网络诈骗嫌疑人讯问的战术特点,并提出了网络钓鱼攻击嫌疑人应问的问题的大致清单。本文介绍了网络钓鱼攻击的类型以及最危险的实施方式。描述了使用Oson Credit应用程序的一种类型的网络欺诈,其目的是捕获机密用户数据,例如银行卡数据,获取攻击者获得访问权限的社交信使帐户,视频,照片文件和位于电话设备上的文档。本文分析了侦查人员在司法侦查实践中由于对专业术语的不了解而容易犯的错误,以及侦查新型欺诈侵害行为——网络欺诈的特点。对经济领域犯罪发展趋势的研究表明,需要开发新的有效和高效的方法来调查网络欺诈。通过对过去几年网络犯罪统计数据的分析,可以得出结论,有必要加强对网络欺诈、网络钓鱼、诈骗、诈骗等新型网络犯罪的打击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
TACTICAL FEATURES OF THE INTERROGATION OF PERSONS SUSPECTED OF COMMITTING CYBERFRAUD (USING THE EXAMPLE OF PHISHING)
The article discusses the tactical features of the interrogation of suspects in the commission of cyber fraud, and also developed an approximate list of questions that should be asked to suspects in phishing attacks. The article describes the types of phishing attacks as well as the most dangerous ways to commit them. One of the types of cyber fraud using the Oson Credit application is described, which is aimed at capturing confidential user data, such as bank card data, gaining access to accounts in social messengers, video, photo files and documents located on a telephone device to which the attackers gained access. The article considers the most common mistakes in forensic investigative practice made by investigators due to ignorance of special terminology, and features of the investigation of new types of fraudulent encroachments - cyber fraud. The study of trends in the development of crimes in the economic sphere suggests the need to develop new effective and efficient methods for investigating cyber fraud. Considering the analysis of cybercrime statistics over the past few years, it can be concluded that it is necessary to strengthen counteraction to new types of cybercrime, such as cyberfraud, phishing, smishing, carding, etc.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信