The article analyzes the dynamics of crimes in the use of computers, systems, computer networks and telecommunications networks for 2019-2020, and focuses on the high “adaptive” ability of this criminal segment as well as the need to improve existing and create new effective mechanisms to combat relevant criminal acts. One of the conditions for the existence of such mechanisms is the presence of thorough forensic characteristics of this group of crimes, which allows identifying and understanding the training, commission and concealment of the group of illegal acts. The research describes the main approaches to determining the mandatory and optional features of the crime in the use of computers, systems and computer networks. The article also provides a brief forensic description of cybercrime in accordance with the generally accepted system, which contains the following elements: the identity of the offender, methods of preparation for the crime; the victim, the subject of the offense; the circumstances of the crime, the consequences of any changes caused by the crime in the physical material damage reflected in the material situation of the crime. To determine the scope of the investigated illegal actions, a list is given to be solved by specialists of the Cyber Police Department of the National Police of Ukraine. Additionally, the main methods of hacking websites are described, including: SQL injection, Cross-site scripting, Phishing, Shared hosting, Cross-Site Scripting, Cross-Site Request, ForgeryCookie Faking, Man-In-The-Middle , Clickjacking, Brute-Force, Zero Day, Backdoor. An approximate list of tasks that may be assigned to forensic experts in the case of their participation in the investigation of crimes in the use of electronic computers, systems and computer networks. Key words: cybercrime, cyber crime actions, crime statistics, computer crimes.
Read full abstract