Topical questions of crime prevention in the Darknet

The article considers the topical issue of a significant growth of crimes in the field of information technologies most of which are committed in the dark and hidden web. The research object is social relations in the sphere of Internet crime prevention. The research subject is the methods and mecha...

Full description

Saved in:
Bibliographic Details
Published inПолицейская и следственная деятельность no. 1; pp. 26 - 34
Main Authors Gonov, Shamil Khasanovich, Milovanov, Anton Vladimirovich
Format Journal Article
LanguageEnglish
Published 01.01.2021
Online AccessGet full text
ISSN2409-7810
2409-7810
DOI10.25136/2409-7810.2021.1.34560

Cover

More Information
Summary:The article considers the topical issue of a significant growth of crimes in the field of information technologies most of which are committed in the dark and hidden web. The research object is social relations in the sphere of Internet crime prevention. The research subject is the methods and mechanisms of crimes using information systems, and the technologies of information safety provision and deanonymization. The main task of the research is to develop the scientifically-grounded ideas aimed at the enhancement of the technique of analysis and assessment of crimes committed via information and telecommunication systems. The scientific novelty of the research consists in the fact that the authors systematize, generalize and analyze the standard mechanisms of committing crimes using information technologies. Based on this analysis, the authors formulate suggestions and recommendations. The article considers the main methods and mechanisms of information safety provision (anonymity on the Internet, and some promising technologies of deanonymization which can be used in the process of crime detection and investigation. The authors formulate a basic model of an offender which can be used for a primary profiling of a criminal. They also formulate an approach to the assessment of his potential which takes into account the peculiarities of using computer equipment in criminal activities in information and telecommunication networks.
ISSN:2409-7810
2409-7810
DOI:10.25136/2409-7810.2021.1.34560