Significant Elements of the Criminalistic Characteristics of Fraud on the Internet

Cover Page

Cite item

Full Text

Open Access Open Access
Restricted Access Access granted
Restricted Access Subscription Access

Abstract

This article examines such significant elements of the criminalistic characteristics of fraud on the Internet as traces; the place of fraud; the persons who committed the crime; individual technical characteristics of the crime instrument; the focus of the actions performed; difficulties in identifying the location of the completion of the crime; lack of direct contact between the victim and the perpetrator; features of the transfer of the stolen.

The author notes computer and traditional traces as typical traces of modern Internet fraud, defines the place (location) of fraudulent actions on the Internet, provides possible locations, characterizes the personality of the criminal, including, based on the analysis of criminal case materials, typical characteristics of the attacker’s personality when he implements fraudulent actions are noted.

The author touches upon the issues of increasing the effectiveness of the investigation of the investigated category of criminal acts, and gives recommendations on the rational organization of the investigator’s actions.

Full Text

Restricted Access

About the authors

Vadim V. Koliev

North Caucasus Institute for Advanced Studies (branch) of the Krasnodar University of the Ministry of Internal Affairs of Russia

Author for correspondence.
Email: vadim.koliev@yandex.ru
SPIN-code: 3585-5280

Cand.Sci. (Law), Associate Professor, Police Colonel, Deputy Head

Russian Federation, Nalchik

References

  1. Aksenova L.Y. Methods of investigation of crimes related to attacks on organizations that carry out monetary settlements with the population. Omsk. 2004. 206 p.
  2. Ekimtsev S.V. Features of the operational search event «obtaining computer information» // Scientific Bulletin of the Orel Law Institute of the Ministry of Internal Affairs of Russia. Lukyanova V.V. 2019. N 2. pp. 26-30.
  3. Meretskiy N.E. Organization of verification of reports on illegal access to computer information // Materials of the All-Russian Scientific and Practical Conference: Academy of Management of the Ministry of Internal Affairs of Russia, 2012. p. 142.
  4. Polyakov V.V. Regional peculiarities of criminalistic characteristics of crimes in the field of computer information // Bulletin of criminalistics. 2016. N 2. pp. 45-53.
  5. Reshnyak O.A., Kovalev S.A. Organization of investigation of frauds committed using the Internet at the initial and subsequent stages // Bulletin of the Volgograd Academy of the Ministry of Internal Affairs of Russia. 2020. N 2. pp. 105-110.
  6. Solyannikova I.N. Legal features of fraud investigation stages // Bulletin of Science and Education. 2018. N 6. pp. 99 - 103.

Supplementary files

Supplementary Files
Action
1. JATS XML

Copyright (c) 2024 Yur-VAK

License URL: https://www.urvak.ru/contacts/