Abstract

The article states that illegal banking activity, committed by means of criminal cashing out of funds, is only a link in the chain of a number of highly organized tax crimes, fraud (criminal VAT refunds, etc.), laundering of “dirty” money, corruption criminal attacks and a number of others. Their identification and investigation is most effective in typical investigative situations that develop in the process of proactive monitoring of Internet resources by operational officers and investigators. The article reveals 5 typical investigative situations of this kind and a number of identification algorithms, and hence the subsequent exposure of the perpetrators of illegal cashing. For example, in an investigative situation, when the subscriber number of the perpetrator of the criminal cashing out of funds was obtained during the monitoring of an Internet resource, the algorithm of the work of an operative officer should include an initiative search for personal data in instant messengers, the use of photo identification applications on the Internet, establishing an account in social networks and etc. The possibilities of specialized software systems that allow searching and systematizing information from online sources are analyzed. It is summarized that the efficiency of detecting, disclosing and investigating the analyzed crimes is inextricably linked with the proactive use of modern information technologies by investigators and operatives.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.