Malware in the activities of operational units to combat crimes committed with the use of information and telecommunication technologies and against computer information
Автор: Khamidullin Salavat Ayratovich, Lebedeva Alfiya Vasilyevna
Журнал: Вестник Казанского юридического института МВД России @vestnik-kui-mvd
Рубрика: Уголовный процесс, ОРД и криминалистика
Статья в выпуске: 3 (49) т.13, 2022 года.
Бесплатный доступ
Introduction: the authors study applied usage of malicious software in operating units in IT crime prevention. Materials and Methods: the materials of the study were scientific articles, statistical data of the Prosecutor General's Office of the Russian Federation for the period from 2017 to 2021, the Main Information and Analytical Center of MIA of Russia, Internet sources. The work used a set of general scientific and special scientific methods: descriptive, method of logical and generalization, analysis, synthesis, systematic approach, statistical method. Literature review: special attention is paid to the works of M.M. Dolgiyeva, A.L. Mukhin, S.M. Shukhin, raising the issue of existing anonymous services in the information and telecommunications network of the Internet. Studies by I.N. Arkhiptsev and A.V. Sarychev highlight the problem of training specialists in departmental educational institutions of the Russian Ministry of Internal Affairs to counteract IT crimes. In the work of R.A. Arkhiptsev, it is pointed out that modern methods of combating crimes in the information and telecommunications network of the Internet are imperfect. Results: it is noted that the existing ways and means of anonymization of malefactors' activity in the information and telecommunication network Internet are the serious obstacle for disclosure of crimes in the information environment. Such methods of traffic anonymization as TOR-browser are described in detail. Attention is drawn to the possibility of using malware as a way to identify the client machine and the identity of the attackers. Discussion and Conclusions: the article concludes that the use of malware as part of operational and technical activities will allow timely de-anonymization of the identity of offenders who commit crimes using the information and telecommunications network of the Internet. It is suggested to pay special attention to the formation of competences necessary for counteraction to crimes, committed with the use of information-telecommunication technologies, when developing training curricula in specialized higher educational institutions of law-enforcement system.
Противодействие it-преступлениям
Короткий адрес: https://sciup.org/142235485
IDR: 142235485 | DOI: 10.37973/KUI.2022.86.64.017