OPERATIONAL INVESTIGATIVE CHARACTERISTICS OF CRIMES COMMITTED USING INFORMATION AND TELECOMMUNICATION TECHNOLOGIES OR IN THE FIELD OF COMPUTER INFORMATION (USING THE EXAMPLE OF LAW ENFORCEMENT PRACTICE IN THE VOLGOGRAD REGION)
Abstract and keywords
Abstract (English):
Introduction. The article defines the need to use both public and secret forces of means and methods of operational investigative activities. The methods of countering crimes committed using information and telecommunication technologies or in the field of computer information in modern conditions are disclosed. The most significant elements of the operational investigative characteristics associated with this type of criminal encroachments are considered, including: the current state of crime in the field of information and telecommunication technologies; the crime scene; operationally significant data on the identity of the cybercriminal and the victims; methods of committing a crime and operational investigative prevention. Research methods. The work used a general scientific dialectical method of cognition of the surrounding reality, which involves a complete and comprehensive study of phenomena, consideration of connections and contradictions between them. In addition, the method of description was used; the method of logical comprehension. The analysis of statistical data characterizing the current state of countering IT crimes, as well as the identity of cybercriminals, is carried out. Results. The most detailed coverage is given not only to the existing methods of committing crimes of the considered orientation, but also to the measures of counteraction provided to employees of operational units in modern conditions. The foreign practice of countering the crimes in question is given. As conclusions, amendments to the legislation regulating operational investigative activities in this area of public relations are proposed.

Keywords:
information and telecommunication technologies, computer information, operational investigative activities, operational investigative measures, cybercriminal, computer virus
Login or Create
* Forgot password?