Cybercrime: Diversity and criminal prosecution

Father

Professional
Messages
2,605
Reputation
4
Reaction score
589
Points
113
Over the past 10 years, criminals have been actively moving online, using the information benefits of humanity for personal gain at someone else's expense. Despite the fact that the Internet appeared back in 1969, and the debut crime in the information environment occurred 20 years later, but in no less distant 1989, it is still not always possible to identify cybercrime. So far, there is no classification of IT crimes in the legal field.

Every year, there are more and more ways and areas of crimes committed in the information space. Cybercrime is not only the banal hacking of devices or the introduction of malicious software, but also the dissemination of certain illegal information, as well as, for example, extortion committed using a computer program. But at the same time, as amended by the Criminal Code of the Russian Federation, the code does not contain a separate article and penalties for theft of personal information.

The consequences of cybercrime can be quite different from a short-term failure of the site, to inciting ethnic hatred or losing a fortune.

In this article, we will tell you how the legislation on IT crimes works today, what cybercrimes that at first glance are not related to IT, and why there are so many names for illegal actions in the field of information technology.

Statistics​

Cybercrime statistics are growing every year, because information technologies are constantly developing. New types of cybercrime and cyber fraud are striking in their ingenuity and force peaceful people to think ahead about protecting their personal data and the company.

Cybercrime statistics for 2022 show that in 95% of cases, an attacker manages to achieve his goal due to the human factor, carelessness and gullibility of people.

In May of this year, Temirlan Salikhov, a representative of the criminalistics center of the Investigative Committee of Russia (TFR), reported that 510 thousand crimes involving information technology occurred in 2022, which is 50 times more than in 2014, when their number was 10 thousand.

Criminal Code and cybercrime​

At the moment, the Criminal Code of the Russian Federation uses a single wording "crimes in the field of computer information", which covers all offenses related to high technologies. This sector is regulated by Chapter 28 of the Criminal Code of the Russian Federation, which is included in the structure of title IX "Crimes against public safety and public order".

Chapter 28 of the Criminal Code of the Russian Federation "Crimes in the field of computer information", contains four elements of crimes:
  • Article 272 of the Criminal Code of the Russian Federation. Unauthorized access to computer information;
  • Article 273 of the Criminal Code of the Russian Federation. Creating, using, and distributing malicious computer programs;
  • Article 274 of the Criminal Code of the Russian Federation. Violation of the rules of operation of means of storing, processing or transmitting computer information and information and telecommunication networks;
  • Article 274.1 of the Criminal Code of the Russian Federation. Undue influence on the critical information infrastructure of the Russian Federation.

In addition to these articles, there are others related to cybercrime. For example, such articles as fraud with the use of communications (Article 159.6 of the Criminal Code), unauthorized access to computer information (Article 272 of the Criminal Code) or sabotage using information technologies (Article 281 of the Criminal Code).

Igor Baranov
Lawyer, AIS teacher, leading expert on inspections by law enforcement agencies of business entities

The steady growth of cybercrime in Russia is associated with the widespread digitalization of public relations, when the state and law enforcement agencies are often late in regulating and controlling new areas of activity. The lack of inevitability of punishment for Internet criminals creates the ground for an increase in the number of IT crimes.

Today, cybercriminals are most often held under Article 28 of the Criminal Code of the Russian Federation together with other articles, depending on what kind of crime was committed. Their main purpose is to make a profit, so the first place among the types of such crimes are criminal acts of economic orientation:
  • Article 159 of the RF Criminal Code "Fraud";
  • Article 163 of the RF Criminal Code "Extortion";
  • 183 of the Criminal Code of the Russian Federation "Illegal receipt and disclosure of information constituting a commercial, tax or bank secret".

In the second place in terms of prevalence are crimes aimed at obtaining information of value, as well as personal data of citizens.

In the third place, it is worth noting crimes aimed at disrupting the normal operation of computer networks, servers, and computer programs, both as a result of external influences (hacking, attacks, etc.), and intentional violation of the rules for operating computer programs and equipment in order to create vulnerabilities.

Igor Baranov
Lawyer, AIS teacher, leading expert on inspections by law enforcement agencies of business entities

According to statistics from the Supreme Court of the Russian Federation, over the past three years, the number of people convicted of cybercrime has tripled: if in 2020 there were only 137 of them, then in 2022 – already 424.

Such a small number of criminal cases in the field of IT that reach the court is due to the difficulty of detecting cybercrime, the difficulty in collecting evidence, identifying the perpetrators of the crime, finding criminals outside of Russia, and the lack of technical equipment of law enforcement agencies.

Speaking about the main economic crimes (Articles 159, 160, 163 of the Criminal Code of the Russian Federation) committed using Internet technologies or equipment, today they make up every fourth crime that comes to court, which is more than 120 thousand cases.

It turns out that far from 100% of cybercrimes reach the court. The main reason is the difficulty of identifying criminals in cyberspace. However, some types of cybercrime are still subject to prosecution, especially if they have caused serious damage or violated the law.

Stanislav Sidorov
CEO of Pro Control

Specific cybercrimes that most often go to court include identity theft, phishing, hacking, credit card fraud, distribution of child pornography, and ransomware-related crimes. The laws and articles of the code that are used to hold you accountable may vary significantly from jurisdiction to jurisdiction, but they usually include violations of data protection laws, computer abuse, and fraud.

According to the Russian Interior Ministry, fraud accounts for about half of all cybercrimes. At the same time, the number of crimes related to bank cards continues to decrease, but those related to electronic money continue to grow. Experts explain this by the fact that the number of services that use electronic payment methods continues to increase, as does the involvement of citizens in the use of these very services.

Multi-faceted cybercrime​

Today, the information space uses an endless number of terms related to IT crimes, and many even try to classify them and find the difference between them, but in the science of criminal law, criminology and criminology, there is no single term.

The following terms can be used by IT market players themselves, lawyers, and other analysts:
  • cybercrime;
  • crimes committed using information and communication technologies;
  • information crimes;
  • IT crimes;
  • computer crimes;
  • computer-related crimes;
  • high-tech crimes;
  • information technology crime;
  • crimes in the digital space;
  • digital crimes;
  • digital crime;
  • electronic crime.

And this is not a complete list of epithets that can be used to describe cybercrime. Even if you take two professional specialists in the field of information security, it is highly likely that each of them will name the same crime differently.

Cybercrime can be divided into two broad types. In the first case, the object is the device itself that was attacked, and in the second, the attacked device acts as a springboard for committing the main crime:
  1. Attackers actions are directed at the devices themselves – they introduce viruses, malware, or perform DoS attacks.
  2. Criminals use the devices to conduct cyber stalking, steal information or online identity, and carry out phishing attacks.

Today, according to experts, phishing attacks, DDoS attacks and social engineering are the most common, as they were a few years ago.

Not obvious cybercrimes​

Known to all, traditional cybercrime is just the tip of the iceberg. Given that crimes committed with the use of information technologies include absolutely all violations of the law that were committed using electronic devices and the Internet, as well as other networks, it is difficult to present the entire list of possible crimes.

Sergey Semenov
General Director of Init

Interestingly, some crimes that at first glance have nothing to do with cyberspace, in fact, can also be classified as cybercrimes. For example, using mobile apps to spy on people, installing hidden cameras to illegally shoot videos, using social networks to distribute pornography or blackmail, and other similar actions may be considered cybercrimes.

According to experts, examples of crimes that may not seem to be related to cyberspace at first glance, but in fact be them, can be the following:
  • "Sexual fraud" or "webcam nightmares". In this case, the attacker fraudulently convinces the victim to undress in front of a webcam, and then blackmails her by threatening to post the video on the Internet.;
  • online stalking or cyber stalking, harassment or intimidation carried out through email, social media or other forms of digital communication;
  • online distribution of fake news or misinformation. This can include everything from false news that can influence an election, to intentionally spreading false medical information that can lead to public harm.

Sergey Polunin
Head of the Infrastructure IT Protection Group at Gazinformservis

In January 2023, the Ministry of Internal Affairs announced that a quarter of crimes are somehow related to information technology. I think that this is an indicator of how much IT has penetrated our lives and how our everyday life is connected with the use of the Internet, even if we are not fully aware of it. For example, such offenses as trading prohibited goods through electronic platforms are generally not directly related to IT, but without the use of appropriate technologies, it would be impossible.

Ekaterina Starostina
Head of Marketing Department at WAF-Webmonitorex

Cybersquatting is one example of crimes that at first glance are not related to cyberspace, but are classified as cybercrimes – This is the illegal use of domain names or trademarks on the Internet for the purpose of obtaining benefits or causing damage to others. For example, a person can register a domain name that looks very similar to the name of a well-known company or brand, and use it to create a fake website or sell that domain name back to the company at an inflated price.

Another example is cyberflashing. This is the distribution of obscene materials using electronic means of communication, such as mobile messaging applications or social networks. For example, a person can send an obscene photo or video to a stranger via a messaging app without their consent. This is a violation of the personal intimate sphere and can be classified as a cybercrime.

Conclusions​

Based on judicial practice and articles on the Internet, both on professional resources and in the general media, it becomes clear that nothing can be accurately stated regarding the classification of cybercrime, cyber fraud, and crimes committed using information technologies. Since all these definitions in the legislative field relate to the same thing. Even if we do not take the legal field into account, then each expert identifies and names certain types of IT crimes in his own way.

Cybercrimes are improving, integrating and developing as rapidly as information technologies themselves. This does not fully and transparently reflect the criminal situation in the IT market. The Russian Interior Ministry has already concluded this year that a quarter of all crimes are somehow committed using IT. But this is not surprising, because the information environment has become an integral part of almost every person's life. Criminals call, write using a network device, search for information on the Internet and, in any case, as in ordinary life, resort to using IT, even if the crime does not concern this area at all.
 
Top