Forensic features of methods of committing theft using methods of social engineering and information and telecommunication technologies

Authors

  • Nina I. Starostenko Krasnodar University of the Ministry of Internal Affairs of Russia

DOI:

https://doi.org/10.21638/spbu14.2024.110

Abstract

Many online media have recently been focusing on the topic of social engineering fraud. Business leaders, computer security experts, and lawyers, in particular, law enforcement officers, however, do not fully understand the kinds of frauds that can be conducted through or with the aid of the Internet and mobile communication, or the ramifications of such frauds for the future of e-commerce. The article will present a forensic characteristic of the system of actions for the preparation, commission and concealment of fraud using social engineering methods and information and telecommunications technologies.

This paper has three principal goals. First, it will identify the principal types of social engineering frauds that law enforcement and regulatory authorities are observing. Second, it will explain the major psychological influence techniques that criminals use in conducting such frauds. Third, it will identify the patterns of preparation, commission and concealment of fraud of this type. The paper will begin by presenting a typology of the criminal and the forensic characteristics of his illegal activity. Also, will explore the principal psychological features of social engineering fraud. In conclusion, the features of the methods of committing fraud of the analyzed category of crimes will be summarized and its characteristic features will be revealed.

Keywords:

criminalistics, social engineering, methods of social engineering, methods of committing fraud, information and telecommunications technologies.

Downloads

Download data is not yet available.
 

References

Библиография

Аверьянова, Татьяна В., Рафаил С. Белкин, Юрий Г. Корухов, Елена Р. Россинская. 2000. Криминалистика. М.: Норма.

Драпкин, Леонид Я., Валерий Н. Карагодин. 2011. Криминалистика. М.: Проспект.

Комиссарова, Ярослава В. 2016. Криминалистическое изучение личности. М.: Проспект.

Кравец, Евгений Г., Николай В. Шувалов. 2020. «Комплекс специальных знаний, необходимых при расследовании хищений, совершаемых с использованием вредоносных компьютерных программ». Юридическая наука и правоохранительная практика 3 (53): 119–126.

Кравченко, Александр В. 2019. «Психологические механизмы социальной инженерии при совершении преступлений». Психология и педагогика служебной деятельности 1: 46–50.

Крылов, Павел. 2019. «Удаленка по собственному желанию» . Group IB. Дата обращения 1 февраля, 2024. https://blog.group-ib.ru/teamviewerfraud.

Лебедева, Антонина К. 2020. «Проблемы производства судебной фоноскопической экспертизы в свете развития цифровых технологий». Вестник Университета имени О. Е. Кутафина 6 (70): 62–71.

Лихтер, Павел Л. 2020. «Технологии астротурфинга с точки зрения права». Legal Concept 4: 131–136.

Макаров, Роман А., Александр А. Кузнецов. 2020. «Следственная профилактика хищений с банковских карт, совершаемых дистанционно с использованием средств сотовой связи». Алтайский юридический вестник 4 (32): 144–150.

Овчинский, Владимир С. 2016. Мафия. Новые мировые тенденции Коллекция изборского клуба. М.: Книжный мир.

Рачева, Нелли В., Федор В. Балеевских, Вячеслав В. Котов. 2021 «Современные способы совершения мошенничества в отношении имущества физических лиц с использованием интернет-ресурсов и технологий социальной инженерии». Юридическая наука 2: 101–105.

Ревенков, Павел В., Александр А. Бердюгин. 2017. «Социальная инженерия как источник рисков в условиях дистанционного банковского обслуживания». Национальные интересы: приоритеты и безопасность 9 (354): 1747–1760.

Резник, Юрий М. 1994. «Социальная инженерия: предметная область и границы применения». Социологические исследования 2: 87–96.

Старостенко, Нина И. 2023. «Первоначальный этап расследования хищений, совершенных с применением методов социальной инженерии и информационно-телекоммуникационных технологий» . Дис. … канд. юрид. наук, Краснодарский университет МВД России.

Blommaert, Jan, Tope Omoniyi. 2006. “E-mail fraud: Language, technology, and the indexicals of globalization”. Social Semiotics 16: 573–605.

Huang, Wilson, Atkins Brockman. 2011. “Social engineering exploitations in online communications: Examining persuasions used in fraudulent e-mails”. Crime online: Correlates, causes, and context. Ed. By Thomas Holt, 87–111. Durham: Carolina Academic Press.

King, Adam, Thomas, Jim. 2009. “You can’t cheat an honest man: Making sense of the Nigerian e-mail scams”. Crimes of the Internet. Eds Frank Schmallegar, John Pittaro, 206–224. Saddle River: Pearson Education.

Mann, Ian 2008. “Hacking the human: Social engineering techniques and security measures. Burlington” . London Routledge: Gower Publishing Company.

Ross, Derek. 2009. “ARS dictaminis perverted: The personal solicitation e-mail as a genre”. Journal of Technical Writing and Communication 39 (1): 25–41.

Workman, Michael. 2009. “Wisecracker: A theory-grounded investigation of phishing and pretext social engineering threats to information security”. Journal of Personality and Social Psychology 59 (4): 662–674.

Zook, Matthew 2007. “Your urgent assistance is requested: The intersection of 419 spam and new networks of imagination”. Ethics Place and Environment 10: 65–88.

References

Aver’ianova, Tat’iana V., Rafail S. Belkin, Iurii G. Korukhov, Elena R. Rossinskaia. 2000. Forensics. Moscow, Norma Publ. (In Russian)

Blommaert, Jan, Tope Omoniyi. 2006. “E-mail fraud: Language, technology, and the indexicals of globalization”. Social Semiotics 16: 573–605.

Drapkin, Leonid Ia., Valerii N. Karagodin. 2011. Forensics. Moscow, Prospekt Publ. (In Russian)

Huang, Wilson, Atkins Brockman. 2011. “Social engineering exploitations in online communications: Examining persuasions used in fraudulent e-mails”. Crime online: Correlates, causes, and context. Ed. By Thomas Holt, 87–111. Durham, Carolina Academic Press.

Komissarova, Iaroslava V. 2016. Forensic study of personality. Moscow, Prospekt Publ. (In Russian)

Kravchenko, Aleksandr V. 2019. “Psychological mechanisms of social engineering in the commission of crimes”. Psikhologiia i pedagogika sluzhebnoi deiatel’nosti 1: 46–50. (In Russian)

Kravets, Evgenii G., Nikolai V. Shuvalov. 2020. “A set of special knowledge required when investigating thefts committed using malicious computer programs”. Iuridicheskaia nauka i pravookhranitel’naia praktika 3 (53): 119–126. (In Russian)

Krylov, Pavel. 2019. “Remote work at your own request.” Group IB. Accessed February 1, 2024. https://blog.group-ib.ru/teamviewerfraud. (In Russian)

Lebedeva, Antonina K. 2020. “Problems of forensic phonoscopic examination in the light of the development of digital technologies”. Vestnik Universiteta imeni O. E. Kutafina 6 (70): 62–71. (In Russian)

Likhter, Pavel L. 2020. “Astroturfing technologies from a legal perspective”. Legal Concept 4: 131–136. (In Russian)

Makarov, Roman A., Aleksandr A. Kuznetsov. 2020. “Investigative prevention of thefts from bank cards committed remotely using cellular communications”. Altaiskii iuridicheskii vestnik 4 (32): 144–150. (In Russian)

Mann, Ian 2008. “Hacking the human: Social engineering techniques and security measures. Burlington” . London Routledge, Gower Publishing Company.

Ovchinskii, Vladimir S. 2016. Mafia. New world trends Collection of the Izborsk club. Moscow, Knizhnyi mir Publ. (In Russian)

Racheva, Nelli V., Fedor V. Baleevskikh, Viacheslav V. Kotov. 2021 “Modern ways to increase fraud against the property of individuals using Internet resources and social engineering technologies”. Iuridicheskaia nauka 2: 101–105. (In Russian)

Revenkov, Pavel V., Aleksandr A. Berdiugin. 2017. “Social engineering as a source of risks in the conditions of remote banking services”. Natsional’nye interesy: prioritety i bezopasnost’ 9 (354): 1747–1760. (In Russian)

Reznik, Iurii M. 1994. “Social engineering: Subject area and boundaries of application”. Sotsiologicheskie issledovaniia 2: 87–96. (In Russian)

Ross, Derek. 2009. “ARS dictaminis perverted: The personal solicitation e-mail as a genre”. Journal of Technical Writing and Communication 39 (1): 25–41.

Starostenko, Nina I. 2023. “The initial stage of the investigation of thefts committed using methods of social engineering and information and telecommunication technologies” . PhD Thesis in Law, Krasnodarskii universitet MVD Rossii. (In Russian)

King, Adam, Thomas, Jim. 2009. “You can’t cheat an honest man: Making sense of the Nigerian e-mail scams”. Crimes of the internet Saddle River. Eds Frank Schmallegar, John Pittaro, 206–224. New Jersey, Pearson Education.

Workman, Michael. 2009. “Wisecracker: A theory-grounded investigation of phishing and pretext social engineering threats to information security”. Journal of Personality and Social Psychology 59 (4): 662–674.

Zook, Matthew 2007. “Your urgent assistance is requested: The intersection of 419 spam and new networks of imagination”. Ethics Place and Environment 10: 65–88.

Published

2024-03-28

How to Cite

Starostenko, N. I. (2024). Forensic features of methods of committing theft using methods of social engineering and information and telecommunication technologies. Vestnik of Saint Petersburg University. Law, 15(1), 152–170. https://doi.org/10.21638/spbu14.2024.110

Issue

Section

Criminalistics