z-logo
open-access-imgOpen Access
Criminalistics analysis of cyber tools for committing crimes
Author(s) -
К.В. Латиш
Publication year - 2021
Publication title -
problemi zakonnostì
Language(s) - English
Resource type - Journals
eISSN - 2414-990X
pISSN - 2224-9281
DOI - 10.21564/2414-990x.153.230429
Subject(s) - cybercrime , hacker , law enforcement , government (linguistics) , complicity , computer security , criminology , internet privacy , public relations , law , computer science , business , political science , sociology , the internet , linguistics , philosophy , world wide web
The article is devoted to the problems of the information and communication technologies which are used as cyber tools for committing crimes. Due to the coronavirus and the widespread lockdown, crimes have also moved to online space. The empirical base of cybercrime is analyzed taking into consideration the latest trends caused by the ongoing pandemic. Mostly this category of crimes is latent and quite difficult to investigate. Especially due to the lack of knowledge in the field of informatics, which is constantly being transformed (changed), by investigators and other participants of the pre-trial investigation. Modern scientific and technical tools are needed to detect, collect and fixed electronic traces of cybercrimes. It should be enhance the technical capabilities of forensic laboratories that specialize in the investigation of cybercrimes related to the use of information technology. But there is a problem because of lack of financial support and needness quite expensive equipment for conducting new computer expertise. This requires significant additional funding, which is not fully provided to the police station by the government. Cybercrime is a transnational crime that has no borders. Criminals from different countries can unite and detect such complicity in a timely manner is quite difficult. So it is necessary international cooperation with FBI, Interpol and other organizations, law-enforcement bodies. During the investigation it should be reconstruct the stages of the hacker's growth and return to his the very beginning, when he was not a such professional, but only gaining experience. The complication of identifying criminals is also that they use traditional tools such as Wi-Fi routers and non-traditional ones such as "boto-farms" which are used as cybertools for committing the crime.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here