Internet fraud: technologies of performance, ways of counteraction and prevention

Authors

DOI:

https://doi.org/10.15587/2523-4153.2021.235769

Keywords:

prevention, means, Internet, false information, counteraction, investigation, method, technology, fraud

Abstract

The article proves that the separation of technologies for committing fraud on the Internet allows you to determine the causal complexes. As a result, it is possible to effectively influence the prevention and counteraction of the corresponding type of crime. The author concludes that it is necessary to introduce into the practice of law enforcement and other government agencies effective tools for preventing and combating Internet fraud. He sees such a tool as outreach activities and modes of action that will block the determinants of criminal behavior in cyberspace. In order to concretize the specified means of prevention, it also deepens the theoretical basis regarding the system for preventing Internet fraud. So, the author comes to the conclusion that counteraction is a system of measures and methods of activity not only of law enforcement agencies, but also of other state and non-state bodies, while among these measures there are measures to prevent certain types of crimes.

The article indicates that in the process of implementing a certain type of cybercrimes by criminals, they talk about the technologies of criminal activity as complexes of interrelated crimes, united by a single criminal purpose. For the commission of Internet fraud in the technology of criminal activity, there are typically ways of committing crimes in the use of computers, systems and computer networks and telecommunication networks (provided for in Section XVI of the Criminal Code of Ukraine) and Art. 200 of the Criminal Code of Ukraine. As a result of the analysis of the materials of the forensic practice of investigating fraud on the Internet, two main technologies have been identified: 1) the seizure of funds using phishing sites (the methods of reporting false information from the victim and its content have been updated) 2) the seizure of funds using a bank payment card and / or ATM (the variability of the method of manipulating information has been updated)

Author Biographies

Olena Samoilenko, Interdepartmental Research Center for Combating Organized Crime under the National Security and Defense Council of Ukraine

Doctor of Laws, Associate Professor

Research Department for Combating Cybercrime and Information Security Threats

Kateryna Titunina, Interdepartmental Research Center for Combating Organized Crime under the National Security and Defense Council of Ukraine

PhD

Research Department for Combating Cybercrime and Information Security Threats

References

  1. U 2020 rotsi do kiberpolitsii nadiishlo ponad 30 tysiach zvernen shchodo shakhraistva v Interneti (2021). Available at: https://cyberpolice.gov.ua/news/u--roczi-do-kiberpolicziyi-nadijshlo-ponad--tysyach-zvernen-shhodo-shaxrajstva-v-interneti-8412/
  2. Pro zapobihannia ta protydiiu lehalizatsii (vidmyvanniu) dokhodiv, oderzhanykh zlochynnym shliakhom, finansuvanniu teroryzmu ta finansuvanniu rozpovsiudzhennia zbroi masovoho znyshchennia (2019). Zakon Ukrainy No. 361-IX. 06.12.2019. Available at: https://zakon.rada.gov.ua/laws/show/361-20#Text
  3. Pro zatverdzhennia Polozhennia pro Departament kiberpolitsii NP Ukrainy (2015). Nakaz Natsionalnoi politsii Ukrainy No. 85. 10.11.2015. Available at: https://cyberpolice.gov.ua/normatyvno-pravovi-akty-yaki-rehlamentuiut-diialnist-politseiskoi-komisii/
  4. Orlov, P. I., Volobuiev, A. F., Osyka, I. M. ta in. (2004). Protydiia ekonomichnii zlochynnosti. Kharkiv: Nats. un-t vnutr. sprav, 568.
  5. Butuzov, V. M., Pavlovskyi, V. D., Skalozub, L. P. ta in.; Romaniuk, B. V., Skulysh, Ye. D. (Ed.) (2011). Orhanizatsiino-pravovi ta taktychni osnovy protydii zlochynnosti u sferi vysokykh informatsiinykh tekhnolohii. Kyiv, 404.
  6. Kosenkova, N. A., Sirodan, T. O. (2014). Protydiia kiberzlochynnosti. Kyiv, 48.
  7. Samoilenko, O. A.; Volobuiev, A. F. (Ed.) (2020). Osnovy metodyky rozsliduvannia zlochyniv, vchynenykh u kiberprostori. Odessa: TES, 372.
  8. Wi-Fi-zlodii: sposoby zakhystu. Nezalezhna asotsiatsiia bankiv Ukrainy. Available at: http://anticyber.com.ua/article_detail.php?language=ua&id=108
  9. Samoilov, S. V. (2014). Rozsliduvannia shakhraistv, uchynenykh iz vykorystanniam merezhi Internet. Donetsk, 226.
  10. Samoilenko, O. A. (2018). Kharakterystyka tekhnolohii vchynennia zlochyniv u kiberprostori. Sudova ta slidcha praktyka v Ukraini, 7, 64–71.
  11. Sidel, R. (2015). Theft of debit card data from ATMs soars. The Wall Street Journal. Available at: https://www.wsj.com/articles/theft-of-debit-card-data-from-atms-soars-1432078912
  12. HSBC UK pilot of new, industry-first technology reduces ATM “cash-trapping” fraud losses by 50 % (2015). HSBC Holdings plc. Available at: https://www.atmia.com/news/hsbc-uk-pilot-of-new-industry-first-technology-reduces-atm-cash-trapping-fraud-losses-by-50/9188/

Published

2021-06-30

How to Cite

Samoilenko, O., & Titunina, K. (2021). Internet fraud: technologies of performance, ways of counteraction and prevention. ScienceRise: Juridical Science, (2(16), 65–70. https://doi.org/10.15587/2523-4153.2021.235769

Issue

Section

Juridical Science