Latency of information crime and ways to counter it
The article is devoted to the study of the problem of latency of information crimes, i.e. such acts, in the mechanism of which the use of information technologies and information and telecommunication networks plays a significant role. This type of crime is characterised by hyperlatency: only a very small proportion of committed acts are reflected in criminal statistics, and often the most ‘convenient’ for disclosure and investigation acts are registered, rather than the most dangerous ones. The author considers the latency of information offences on the example of two types of offences: ‘traditional’ computer crimes (unlawful access to computer information, use and distribution of malware) and infringement of copyright and related rights. It summarises data on the scale of cybercrime, its cross-border nature and the amount of damage associated with it. The main threats associated with these types of offences are highlighted. These include, in particular, cyber espionage, cyber sabotage, disclosure of confidential data, attacks on critical information infrastructure, including process control systems, and cyber extortion. Such reasons for their latency are characterised as the use by criminals of the latest technologies to conceal their activities, the abnormally large role of the non-govemmental sector in countering crime, the conflicting interests of victims, and deficiencies in legal regulation. The existence of mass forms of criminal activity is noted, which may involve network communities with a number of members that precludes the possibility of bringing them all to criminal responsibility. In connection with the above, measures aimed at reducing latency are proposed, in particular, increasing the competence of law enforcement agencies whose tasks include combating information crime. This could be achieved by establishing special investigative jurisdiction and jurisdiction over these offences. It may also be necessary to organise the activities of monitoring services that identify and analyse newly emerging threats to Russia's information security and transfer materials to law enforcement agencies for the initiation of criminal proceedings. It seems expedient to encourage responsible business behaviour in the field of countering common threats to information security, and to establish legal sanctions related to the concealment of information incidents. It is pointed out that it is necessary to decriminalise offences in the information sphere that do not pose a great public danger and to reorient law enforcement agencies to fight the most dangerous manifestations of information crime. The author declares no conflicts of interests.
Keywords
criminal statistics,
malware,
cyber extortionAuthors
| Grebenkov Alexander A. | Southwestern State University | grebenkov@gmail.com |
Всего: 1
References
Клейменов М.П. Нераскрытая и латентная преступность: различия и сходство // Правоприменение. 2017. № 1. С. 106-113.
Иншаков С.М. Латентная преступность как объект исследования // Криминология: вчера, сегодня, завтра. 2009. № 16. С. 107-130.
Иванова Е.О. Латентная преступность: понятие и критерии классификации // Современное право. 2015. № 5. С. 119-123.
Легостаев С.В. Прогнозирование и предупреждение латентной преступности // Человек: преступление и наказание. 2016. № 3. С. 110-114.
Иншаков С.М. Гносеологические проблема: исследования латентной преступности // Russian Journal of Economics and Law. 2010. № 1 (13). С. 136-142.
Jewkes Y., Yar M. Policing cybercrime: emerging trends and future challenges // Handbook of Policing / ed. by T. Newborn. London; New York: Routledge, 2008. P. 580-606.
Иншаков С.М. Латентная преступность как показатель эффективности уголовной политики // Российский следователь. 2008. № 14. С. 20-21.
Goodman M. Making computer crime count // FBI Law Enforcement Bulletin. 2001. Vol. 70, № 8. P. 10-17.
Гребеньков А.А. Нарушения авторского права с использованием технологии BitTorrent: проблема: уголовной ответственности // Уголовное право: стратегия развития в XXI веке: материала: Восьмой Междуна. науч.-практ. конф., 27-28 января 2011 г. М.: Проспект, 2011. С. 376-380.
Лунеев В.В. Преступность XX века: мировые, региональные и российские тенденции. М.: Волтерс Клувер, 2005. 912 с.
Квашис В.Е. Сравнительный анализ латентной преступности в России и зарубежных странах: проблема: и перспективы // Журнал законодательства и сравнительного правоведения. 2016. № 5. С. 89-93.
Hyman P. Cybercrime: it's serious, but exactly how serious? // Communications of the ACM. 2013. Vol. 56, Is. 3. P. 18-20.
Осипенко А.Л., Соловьев В.С. Основные направления развития криминологической науки и практики предупреждения преступлений в условиях цифровизации общества // Всероссийский криминологический журнал. 2021. № 6. С. 681-691.
Гребеньков А.А. Преступность в сфере высоких технологий в России: приоритеты борьбы // Известия Юго-Западного государственного университета. 2014. № 3. С. 72-77.
Ефремова И.А., Смушкин А.Б., Донченко А.Г., Матушкин П.А. Киберпространство как новая среда преступности // Вестник Томского государственного университета. 2021. № 472. С. 248-256.
Клишков В.Б., Стебенева Е.В., Яковлева М.А. Киберпреступность: понятие, признаки, основные направления противодействия // Вестник ННГУ. 2022. № 4. С. 106-114.
Карпюк И. Взлом Дворковича // Полит.Ру. 22.07.2014. URL: http://polit.ru/artide/2014/07/22/dvorkovich (дата обращения: 14.02.2023).
Bencsath B. et al. The Cousins of Stuxnet: Duqu, Flame, and Gauss // Future Internet. 2012. Vol. 4, Is. 4. P. 971-1003.
Langner R. Stuxnet: Dissecting a Cyberwarfare Weapon // IEEE Security & Privacy. 2011. Vol. 9, № 3. P. 49-51.
Piggin R. Cyber security trends: What should keep CEOs awake at night // International Journal of Critical Infrastructure Protection. 2016. Vol. 13. P. 36-38.
Chen T. M., Abu-Nimeh S. Lessons from Stuxnet // Computer. 2011. Vol. 44, Is. 4. P. 91-93.
Simmonds M. How businesses can navigate the growing tide of ransomware attacks // Computer Fraud & Security. 2017. Is. 3. P. 9-12.
Ehrenfeld J.M. WannaCry, Cybersecurity and Health Information Technology: A Time to Act // Journal of Medical Systems. 2017. Vol. 41, № 7. P. 104.
Condra J., Costello J., Chu S. Linguistic Analysis of WannaCry Ransomware Messages Suggests Chinese-Speaking Authors // Flashpoint. URL: https://www.flashpoint-intel.com/blog/linguistic-analysis-wannacry-ransomware/(accessed: 14.02.2023).
Urquhart L., McAuley D. Cybersecurity Implications of the Industrial Internet of Things // TILTing Perspectives 2017: Regulating a Connected World. Tilburg, 2017.
Hiller J.S. Civil Cyberconflict: Microsoft, Cybercrime, and Botnets / J. S. Hiller // Santa Clara High Technology Law Journal. 2015. Vol. 31, Is. 2. P. 163-214.
Осипенко А.Л. Информационное пространство глобальных компьютерных сетей как объект криминологического изучения // Современное право. 2009. №" 5. С. 110-114.