Рус Eng Cn Translate this page:
Please select your language to translate the article


You can just close the window to don't translate
Library
Your profile

Back to contents

Police activity
Reference:

On the issue of interaction of operational units with banking institutions on crimes committed using information technology, including the Internet

Sidorova Ekaterina Zakarievna

ORCID: 0000-0002-3477-3816

PhD in Law

Senior police lieutenant, Deputy head of the Department of criminal law and criminology, East Siberian Institute of the Ministry of Internal Affairs of the Russian Federation

664017, Russia, Irkutsk region, Irkutsk, Lermontov str., 110

eksid38@mail.ru
Usov Evgenii Gennad'evich

ORCID: 0000-0002-5374-8346

PhD in Law

Associate Professor, Irkutsk Institute (branch) of the All-Russian State University of Justice

664011, Russia, Irkutsk region, Irkutsk, Nekrasova str., 4

eguirk38@mail.ru
Aliev Timur Firudinovich

ORCID: 0000-0002-0645-931X

Student; East Siberian Institute of the Ministry of Internal Affairs of Russia

664017, Russia, Irkutsk region, Irkutsk, Lermontov str., 110

timuraliev.2018@mail.ru
Other publications by this author
 

 

DOI:

10.7256/2454-0692.2024.4.70163

EDN:

URPFQM

Received:

19-03-2024


Published:

05-09-2024


Abstract: The subject of this study is the specifics of the interaction of operational units of internal affairs bodies with banking institutions on crimes committed using the Internet information and telecommunications network. The purpose of the work is to consider and resolve certain problematic aspects of this interaction. The relevance of the chosen topic has both theoretical and practical aspects of significance in modern realities. In the context of the dynamic growth of crimes using information technology, including the Internet, it is important to consider the issues of countering this type of crime. In the modern world, this category of crime has a topical character in the context of its disclosure and investigation. In 2023, the Ministry of Internal Affairs of the Russian Federation registered 677 thousand crimes using information and telecommunication technologies, and in 2019 this figure was 294 thousand 409 crimes. Thus, we are talking about a twofold increase in the commission of such crimes over the past five years. The research methodology is based on general scientific and private scientific methods of cognition – dialectical, logical, statistical, comparative legal, formal legal, legal forecasting. The authors of the presented article came to the conclusion that this category of crime comes to the fore due to the dynamic growth of its commission and variations in its manifestations. In this regard, it is important to consider the issue of regulating at the legislative level the timing of providing operationally relevant information from banking institutions to operational units within the framework of operational investigative measures for crimes committed using the Internet information and telecommunications network. At the initial stage, the collection of the necessary information also depends on the time interval for providing responses from banking institutions to requests from operational units. To a certain extent, this may affect both the timeliness and effectiveness of the disclosure of these crimes and those involved in them.


Keywords:

Internet, crime, fraud, interaction issues, banking institutions, requests, deadlines for submission, legislative consolidation, efficiency, opposition

This article is automatically translated. You can find original text of the article here.

In modern realities, information technologies, including the Internet information and telecommunications network (hereinafter referred to as the Internet), are actively being introduced into human life and help him to implement many tasks, for example, e-learning, communication on social networks, an appointment with a doctor through the reference and information Internet portal "Public Services", purchases in online stores, searching for the necessary information in browsers — all this and much more is made possible thanks to scientific and technological progress.

In this study, the author studied the works, including monographs of Russian scientists R. I. Dremlyug [1], A. P. Agapova [2], V. V. Buryak [3], S.P. Butko [4], O. A. Samsonova [5] and others, many of whom are recognized scientists in the field of countering crimes committed using information and telecommunication technologies (hereinafter referred to as — ITT). The methodology of this research is based on general scientific and private scientific methods of cognition — dialectical, logical, statistical, comparative legal, formal legal, legal forecasting. The authors of the article, summarizing the various points of view on the stated topic, further present their own position on the issue under study.

The development of information technologies, in particular, has affected new ways of committing cybercrimes [6, p. 101]. Unfortunately, it should be noted that digital technologies, significantly improving the life of a modern person, also carry a potential danger for him, since the number and variability of crimes in the field of information technology (hereinafter referred to as IT crimes) increase almost annually. As V.B. correctly noted. Milestones and P. S. Pastukhov, "the use of ITT by criminals as a means of committing crimes is becoming widespread, leading to the emergence of new ways of committing crimes" [7, p. 131].

We consider the position of the President of the Russian Federation worthy of attention, who at the annual expanded meeting of the Board of the Ministry of Internal Affairs of the Russian Federation (hereinafter — the Ministry of Internal Affairs of Russia) stressed that "one of the unconditional priorities of your work is the fight against crime using information technology. By the end of 2022, the number of such crimes exceeded half a million and amounted to a quarter of all criminal offenses." Indeed, countering crimes using ITT is becoming almost a top priority for law enforcement agencies in their daily activities.

Investigation of the criminal situation in the The Russian Federation shows that the number of crimes related to ITT tends to increase [8, p. 193], and this is confirmed by the following statistical data:

1. In 2023, the Ministry of Internal Affairs Russia has registered 677 thousand IT crimes in the country, which has become an all-time record level, as the Izvestia newspaper notes with reference to the department's database.

2. In 2022, more than 522 thousand crimes committed using ITT were identified, which accounted for 22% of the total number of illegal acts.

3. In previous years, the situation looked like this: in 2021, 706 thousand 7 crimes using ITT or in the field of computer information were registered, in 2020 — 510 thousand 4 crimes; in 2019. — 294 thousand 409 crimes

According to N. V. Viryasova and A. N. Zemlyanova, the reasons for such an abnormal increase in crimes in this area are a rapid decrease in income and, accordingly, a low standard of living for citizens; a decrease in the prestige of work; the lack of knowledge among the majority of the population about compliance with safety measures at work and the purchase of goods on the Internet; technical errors and imperfections Internet banking systems; low level of training of law enforcement officers in the field of disclosure and investigation of remote crimes; lack of proper interaction of employees of internal affairs bodies (hereinafter — ATS) with Internet service providers, mobile network operators and bank security services [9, p. 49].

Today, the issue of embezzlement of funds from the account of the bank card holder by committing fraudulent actions against him is becoming more and more urgent. Undoubtedly, the non-cash type of payments is becoming more and more in demand for society, but at the same time it is necessary to say about the various ways of acquiring non-cash funds. These methods are continuously being improved, developed and updated, and completely new ones appear [10]. So, the method of stealing non-cash money using card scrimming consists in copying the data of the magnetic tape of the bank card, and then creating a copy of it in order to further receive funds (removing them from a copy of the bank card). Another method is phishing attacks, the essence of which is to replace the official website of the bank with its exact copy, while you can only notice the difference by a small typo in the website address. Another way is contactless readers, which are used to read bank card data at a short distance. It is enough to bring such a reader closer to the card by 5-10 cm, and the necessary information will pass to the attackers, who will be able to make a copy of it and will write off small amounts at high speed [11, p. 190].

From a criminal legal point of view, it must be said that crimes using ITT, including the Internet, can be qualified under various articles of the Criminal Code of the Russian Federation (hereinafter referred to as the Criminal Code of the Russian Federation), for example:

1. organization of activities aimed at inducing suicide, involving the use of information and telecommunication networks (including the Internet) (Part 2 of Article 110.2 of the Criminal Code of the Russian Federation);

2. inducement to commit suicide or assistance in committing suicide committed in information and telecommunication networks (including the Internet) (paragraph "d" of Part 3 of Article 1101 of the Criminal Code of the Russian Federation);

3. defamation committed in public using information and telecommunication networks (including the Internet) (Part 2 of Article 128.1 of the Criminal Code of the Russian Federation);

4. violent acts of a sexual nature committed using the Internet against a person under the age of fourteen (paragraph "b" of Part 4 of Article 132 of the Criminal Code of the Russian Federation);

5. indecent acts committed using information and telecommunication networks (including the Internet) (Article 135 of the Criminal Code of the Russian Federation);

6. violation of copyright and related rights associated with unlawful access to computer information and (or) creation, use of malicious computer programs (Article 146 of the Criminal Code of the Russian Federation in conjunction with Article 272 of the Criminal Code of the Russian Federation and (or) Article 273 of the Criminal Code of the Russian Federation);

7. fraud involving the use of electronic means of payment, involving unlawful access to computer information and (or) the creation, use and distribution of malicious computer programs (art. 159.1 of the Criminal Code of the Russian Federation in conjunction with art. 272 of the Criminal Code of the Russian Federation and (or) Article 273 of the Criminal Code of the Russian Federation);

8. theft involving unlawful access to computer information and (or) the creation and use of malicious computer programs (Article 159.1 of the Criminal Code of the Russian Federation in conjunction with art. 272 of the Criminal Code of the Russian Federation and (or) Article 273 of the Criminal Code of the Russian Federation);

9. fraud in the field of computer information (Article 159.6 of the Criminal Code of the Russian Federation);

10. production and trafficking of materials or objects with pornographic images of minors committed using information and telecommunication networks (including the Internet) (paragraph "d" of Part 2 of Article 2421 of the Criminal Code of the Russian Federation), etc.

It is worth saying that fraud using ITT, including the Internet, has the following variations of manifestations:

1) fraud committed through ad sites (the "scammer — seller" scheme);

2) fraud, also committed through ad sites (the "fraudster — buyer" scheme);

3) fraud with hacking of social media pages;

4) fraud using Internet sites;

5) fraud committed under the pretext of ordering a banquet;

6) fraud committed under the pretext of bank card transactions;

7) fraud committed under the pretext of helping a relative in trouble;

8) fraud committed under the pretext of compensation for previously purchased dietary supplements;

9) fraud committed using malware on the Android operating system;

10) fraud committed using social networks (online store on the VKontakte social network), etc.

In this regard, it is worth focusing on the point of view of S. A. Noldt, who noted that the timely conduct of a full-fledged complex of operational investigative measures (hereinafter referred to as the ORM) at the initial stage of the investigation makes it possible to document the mechanism of criminal activity in a short time, identify the persons involved in its commission and obtain reliable evidence. At the same time, it is important to highlight the list of actions of the operative officer for initial and subsequent actions in the framework of detecting and solving a crime [12, p. 70].

First of all, the operative needs to get an explanation from the person against whom this category of crime has been committed or is being committed, and find out the following information of an operationally significant nature: the attacker's phone number; information about the Internet source (for example, if we are talking about an ad on Avito, VKontakte, etc.); address the criminal's e-mail address (for example, if the correspondence was carried out in this way or he provided information about it); information about the attacker (as he presented himself to the applicant); the content of SMS messages (if any information is available), etc.

Continuing to develop the idea of the activities of operatives in uncovering the category of crime we are investigating, it is necessary to note the list of operational and technical measures carried out. Taking into account the fact that the Internet provides the possibility of data transmission through various communication channels, the operative conducts the following ORMs:

- ORM "Removal of information from technical communication channels" is carried out on the basis of a judicial permit and its essence lies in the possibility of obtaining, converting and fixing all possible types of communications (except telephone communication), scanning them and subsequently establishing the location of the event objects (intruders) and determining their subscriber numbers;

- ORM "Listening to telephone conversations" — the essence of this event is listening to acoustic information transmitted through telephone communication channels. This event can be used when listening to phone calls (including WhatsApp, Viber, etc. messengers), telex and fax messages, transmitted photographic materials, video information, etc.;

- ORM "Obtaining computer information" — the essence of this event consists in copying and removing information stored in a specialized information system or in obtaining information contained on computer media in which embedded computer devices and (or) software components, etc. were introduced in advance.

It is also necessary to note the ORM "Inspection of buildings, structures, terrain, vehicles and land plots" — the essence of which consists in openly or tacitly entering residential or non-residential premises in order to detect, physically seize objects that may be involved in the commission of crimes. For example, if there is information that the fraudster has a computer at his place of residence, from which fraudulent actions were carried out, the operative removes them in the order of the ORM "Collection of samples for comparative research" for their further study during the ORM "Examination of objects and documents".

According to Y. V. Biryukova, if we are talking about theft committed using cellular communications (when a person voluntarily provided the attacker with information about their accounts, card number, passwords from SMS messages, etc.), then the operative should conduct an OPM "Survey" and clarify the following operationally significant information [13, p. 140]:

1) details of telephone connections during the period of communication between the victim and the suspect;

2) an extended statement of cash flow on the victim's account, as well as information about the presence or absence of the connected mobile banking service, indicating subscriber numbers; all checks, receipts, online correspondence, bank account statements, bank card from which funds were stolen, a screenshot of the correspondence with the fraudster, preserved by the victim;

3) clarify with the victim which bank the funds were transferred to.

Taking into account this information, it seems advisable to obtain information about fraudulent actions of the following nature from banking institutions during the conduct of the ORM "Making inquiries":

first, information about the owner of the bank card: surname, first name, patronymic (hereinafter — Full name), date of birth, address of residence (residence permit), place of work (study), if possible, a photo with the image of the person in whose name the transfer was sent to the victims. This information is necessary to establish the identity and further "work out" the involvement of the suspect in the commission of a crime.

secondly, information about the place and time of transactions at the time of the transfer of funds by the applicant (victim), in order to study possible routes and places of use of funds transferred to the account of a potential fraudster;

thirdly, data on previous account transactions in order to determine patterns of behavior and possible preliminary actions of a potential fraudster;

fourth, information about regularly paid subscriber numbers (personal number, number of relatives or friends);

fifth, information about the subscriber numbers linked to this bank card by the mobile banking service, where and how they were connected;

Sixth, information about the address of the bank's office where the bank card was opened;

Seventh, other information that will help solve the crime: IP addresses; mobile devices used for operations; e-mail addresses, etc.

For example, when receiving information about transactions or previous transactions on the accounts of a potential fraudster, it is possible to conduct various ORMs depending on the specific situation:

1) by conducting a personal investigation (a complex of ORMs conducted personally by an operative) to "work out" the places where banking transactions were carried out (for example, grocery stores). In this situation, an operational officer visits such locations, looks at the appropriate video camera request to establish the image of the attacker, then conducts an ORM "Survey" with respect to store employees, their owners, visitors on whether they have seen this person, how often they see him, what special signs they can identify, related and other connections, possible routes, what additional information about the person being studied can be provided, etc.;

2) with the availability of specific information, the operative officer checks the possible routes of a potential fraudster by conducting an ORM "Surveillance": in which direction he went (when watching video recordings), which grocery stores are nearby; also, by means of an ORM "Survey", it is worth contacting local residents, with the so-called elders of the house, to clarify operationally relevant information about this person, whether he lived or lives and how long ago, how often he appears, with whom he lives, contact details of the person, etc.;

3) if there is information about the full name, it is possible to conduct a legendary survey in relation to specific persons. For example, if there is no clear image on the video camera recording of a person at the site of previously completed banking transactions, it is possible to scout information by conducting an OPM "Survey", while not giving away the purpose of the event conducted by an operational officer. The objects of this survey may be: relatives of a potential fraudster, friends, former convicts, etc. ORM is carried out with the motive of covertly collecting operationally relevant information without disclosing its specific purpose;

4) if there is information about the lifestyle of a person, for example, if he (the person) is dependent on alcoholic products and systematically consumes it, it is worth finding out the "local collection points" of persons who periodically gather in these places to drink alcohol; "work out" shops with alcoholic products in the nearest location (for example, Bristol, "Vinograd", draught beer store), etc.

It is worth saying that this information can be "worked out" only with the initial establishment of information about a potential fraudster, where an important role is assigned to banking institutions, because the process of solving crimes and identifying those involved in them depends to a certain extent on the timeliness of their responses to requests from operational staff.

We also agree with the opinion of E. I. Tretyakova and A. I. Belkova said that one of the most important issues in optimizing the investigation of remote fraud is determining the timing of the provision of bank data [14, p. 141].

In this regard, taking into account the positions of D. G. Shashin, it is worth dwelling in more detail on obtaining information of an operationally significant nature from banking institutions. An employee of the operational unit, when verifying the information received, sends appropriate requests to banks and other credit organizations as part of the "Inquiry" ORM, but these institutions often refuse to respond to them, referring to Article 26 of Federal Law No. 395-1 of December 2, 1990 "On Banks and Banking Activities" (hereinafter — the law on banks and banking activities) [15, p. 79].

It should be noted that in accordance with paragraph 6 of Article 11 of the Federal Law "On Service in the Internal Affairs Bodies of the Russian Federation and Amendments to Certain Legislative Acts of the Russian Federation" dated November 30, 2011 No. 342-FZ (ed. from 08/04/2023, with changes. dated 02/26/2024), a police officer (an operational unit of the Department of Internal Affairs) has the right to access, in accordance with the established procedure, information constituting a state secret if the performance of official duties in a position is associated with the use of such information.

Taking into account the fact that the actions of employees of operational police units in sending requests to credit institutions are conditioned by the fulfillment of their duties to identify, prevent, suppress and disclose crimes, as well as the fact that these actions comply with the rights of police officers, the provision of information classified as a professional secret, at the request of the police cannot to be regarded as its disclosure.

The existing procedure for providing information containing banking secrecy does not have a clear legal regulation, as a result of which problems arise when interacting with credit institutions. According to the current legislation, banks have the right not to provide any information regarding the accounts of legal entities and individuals, their cash flows, and the structuring of non-cash funds using bank accounts, since this information is protected by the right to banking secrecy.

It is worth noting that the issue of providing banking information to operational units is being resolved at the legislative level. Thus, according to the Federal Law "On Amendments to Article 26 of the Federal Law "On Banks and Banking Activities" and Article 27 of the Federal Law "On the National Payment System" dated October 20, 2022 No. 408-FZ, the Central Bank of the Russian Federation (hereinafter — the Bank of Russia) and police officers are required to exchange data about fraudulent actions in compliance with the rules of bank secrecy. For the Bank of Russia, this is an opportunity to prevent new fraudulent transactions.

Thus, on the basis of information received from the Ministry of Internal Affairs of Russia about illegal actions committed, the Bank of Russia will provide the police with information about cases and attempts to transfer funds made without the consent of the client. For this purpose, the Ministry of Internal Affairs of Russia has been added to the users of the Bank of Russia's Automated Incident Management System FinCERT (ASOI FinCERT). Also, an agreement has been concluded between the Ministry of Internal Affairs of Russia and the Bank of Russia regulating the procedure for information exchange, the form and list of information provided. Changes in the legislation of the Russian Federation are caused by a large number of remote embezzlement of funds, including using social engineering methods. Undoubtedly, the operational interaction of the Ministry of Internal Affairs of Russia with the Bank of Russia will effectively solve the issues of prevention, suppression and disclosure of these crimes.

However, the above-mentioned law did not regulate the deadline for providing the specified information to operational units.

The above analysis shows that the main effectiveness in obtaining information of an operationally significant nature depends on the interaction of the Department of Internal Affairs with the banking sector [16, p. 152].

In this regard, it is also important to say that "virtual" criminals most often commit illegal acts not in their places of permanent residence, and often establishing their location and bringing them to legally established responsibility becomes less likely. The problem with the detection of these crimes lies in the fact that most of them are committed in a virtual environment, which does not allow timely identification of persons involved in the commission of such crimes.

We agree with the point of view of Yu. V. Gavrilin, referring to practice, that operational support for the investigation of criminal cases is carried out only at the initial stage, "in hot pursuit", before the identification of the person to be brought as an accused. In the future, the effectiveness of operational support within the framework of establishing circumstances relevant for proving a criminal case decreases [17, pp. 147-148].

In accordance with the procedure for considering reports of a crime specified in Article 144 of the Criminal Procedure Code of the Russian Federation, authorized persons must make a decision on it no later than three days, with the possibility of extension, if there are legitimate grounds, up to ten and thirty days, respectively, with the permission of the extension of the officials specified in the third part of this article. norms. Nevertheless, it is worth focusing the researcher's attention on the fact that banking institutions periodically refer to business workload and postpone responses to provide the necessary information of an operationally significant nature to operational staff.

Undoubtedly, banking institutions perform important tasks for lending and other services to individuals and legal entities, conducting cash settlements and cash customer service, issuing, buying, selling payment documents and securities (accounting for bills of exchange and transactions with them; securities transactions; managing clients' property by proxy), etc. Nevertheless, it is worth focusing on providing answers to the requests of operational units, primarily for more timely counteraction to the category of crimes under consideration.

Thus, information technologies, including the Internet, in addition to their obvious advantages for humans in the context of their application in order to carry out their daily, professional and other tasks, are used by intruders to carry out illegal acts. Investigating the criminal situation, we came to the conclusion that the number of IT crimes committed tends to increase. For example, their number from 2019 (294 thousand 409 crimes) to 2023 (677 thousand crimes) increased by more than 2 times.

Taking into account the above initial and subsequent MPas conducted by employees of operational units of the territorial bodies of the Ministry of Internal Affairs of Russia, first of all, the operational officer needs to receive an explanation from the person against whom this category of crime has been committed or is being committed. At this stage, it is important to collect operationally relevant information for further activities (including operational and technical measures, for example, such as "Wiretapping", "Removing information from technical communication channels", "Obtaining computer information"). So, the operative clarifies the following operationally significant information: the method of committing the crime (through Avito, VKontakte, WhatsApp, etc.); to which bank account the funds were deposited; the attacker's phone number and information about him (as he presented himself to the applicant); the content of SMS messages (if any information is available), etc.

Subsequently, measures are being taken to identify a potential criminal, establish his location, conduct further ORM and investigative actions against him, as well as to bring him to responsibility established by law (if there are legitimate grounds). At the same time, operational support for the investigation of criminal cases is carried out only at the initial stage, "in hot pursuit", in the future, the effectiveness for establishing all the circumstances relevant to proving a criminal case decreases.

Undoubtedly, this category of crime requires police officers to develop measures to intensify their counteraction. It should be noted that virtual attackers regularly develop new schemes for committing their criminal acts and constantly change their locations, which generally complicates the disclosure of the studied category of crime. In this regard, taking into account the mobility of IT criminals, it is important to carry out measures to establish their location as soon as possible. As noted earlier, the effectiveness of the disclosure of this category of crime depends on the interaction of operational units with banking institutions, including the timing of the latest responses to requests within the framework of the ORM "Making inquiries".

It seems that in order to timely and more effectively disclose, investigate and prevent IT crimes, including the Internet, as well as identify those involved in them, it is important to work out at the legislative level the issue of specifying the timing of providing information to operational staff from banking institutions.

Taking into account the above and taking into account the lack of legislative consolidation of the deadlines for providing operationally significant information from banking institutions, the authors of the article consider it advisable to supplement Article 8 of the Federal Law "On Operational Investigative Activities" dated August 12, 1995 No. 144-FZ with the following content:

"As part of the operational search event "Making inquiries" on crimes committed using information technology, including the Internet, operational units, upon requests sent to banking institutions, make a note of the need to provide a response within 72 hours in order to timely identify and disclose this category of crimes and identify those involved in them persons, including their location."

Undoubtedly, operational units as carriers of professional information, i.e. not subject to disclosure, and, in addition, in order to more effectively and timely identify and disclose crimes committed using the Internet, it seems important to consolidate at the legislative level the deadlines for providing information to operational staff from banking institutions.

References
1. Dremlyuga, R. I. (2022). Criminal law protection of the digital economy and information society from cybercrime attacks: doctrine, law, law enforcement.
2. Agapov, P. V. P. V., Borisov, S. V., Vagurin, D.V., Korenyuk, A.L., Merkuryev, V.V., Pobegailo, A.E. & Khaliullin, A. I. Countering cybercrime in the aspect of ensuring national security. Moscow: Unity.
3. Buryak, V. V. (2019). Digital economy, hacktivism and cybersecurity. Simferopol: IP Zueva T.V.
4. Butko, S. P. (2022). Interaction of law enforcement agencies with banking institutions. Economic Research and Development, 38-43.
5. Samsonova, O. A. (2003). Receipt by the bodies of preliminary investigation and the court of information constituting a banking secret: abstract. diss.... cand. Jurid. Sciences: spec. 12.00.09 "Criminal procedure, criminalistics and forensic examination, operational investigative activities". Irkutsk, 22.
6. Aliev, T.F. (2023). Issues of countering crimes committed using IT technologies. Legal Studies, 10, 100-114. doi:10.25136/2409-7136.2023.10.44173 Retrieved from http://en.e-notabene.ru/lr/article_44173.html
7. Vekhov, V. B. & Pastukhov, P. S. (2019). Formation of crime investigation strategies based on the provisions of electronic forensics. Ex jure, 4, 129-141.
8. Kostenko, N. S. Semenenko, G. M. & Pshenichkin, A. A. (2020). The main problems of solving and investigating crimes committed using information and telecommunication technologies at the present stage. Bulletin of the Voronezh Institute of the Ministry of Internal Affairs of Russia, 4, 192-196.
9. Viryasova, N.V. & Zemlyanova, A.N. (2021). Problems of detection and investigation of certain types of crimes committed using information and telecommunication technologies. Modern scientific thought, 48-51.
10. Wolfel, C. J. (2003). Encyclopedia of Banking and Finance. CJSC Corporation Fedorov. Samara.
11. Rudenko, M. B. & Serebrennikov, I. N. (2019). Fraud in remote banking systems. Scientific Digest of the East Siberian Institute of the Ministry of Internal Affairs of Russia, 3, 189-193.
12. Noldt, S. A. (2023). Organization of planning the production of investigative actions and operational investigative measures in a criminal case. The Art of Law, 2(6), 67.
13. Biryukova, Yu. V. (2021). Problems arising during the investigation of thefts committed using computer and telecommunication technologies, and ways to solve them. Bulletin of the Moscow University of the Ministry of Internal Affairs of Russia, 4, 137-142.
14. Tretyakova, E. I. & Belkov, A. I. (2023). Prospective directions for the development of technical and forensic support for the investigation of fraud committed using information and telecommunication technologies. Current problems of criminology and forensic examination. Collection of materials of the international scientific and practical conference, 139-143. Irkutsk.
15. Shashin, D. G. (2019). On the problem of obtaining information from credit institutions by operational units of internal affairs bodies when identifying, preventing, suppressing and solving crimes related to drug trafficking. Bulletin of the Siberian Legal Institute of the Ministry of Internal Affairs of Russia, 2(35), 77-82.
16. Kalashnikov, K. V. (2019). Interaction of economic security and anti-corruption units of internal affairs bodies with the Bank of Russia in the course of operational servicing of the credit sector: problems and solutions. Agrarian and Land Law, 11(179), 152-155.
17. Gavrilin, Yu. V. (2018). Practice of organizing interaction during the investigation of crimes committed using information and communication technologies. Proceedings of the Academy of Management of the Ministry of Internal Affairs of Russia, 4(48), 145-150.

First Peer Review

Peer reviewers' evaluations remain confidential and are not disclosed to the public. Only external reviews, authorized for publication by the article's author(s), are made public. Typically, these final reviews are conducted after the manuscript's revision. Adhering to our double-blind review policy, the reviewer's identity is kept confidential.
The list of publisher reviewers can be found here.

Review of the article "On the issue of interaction of operational units with banking institutions on crimes committed using information technology, including the Internet" The scientific article submitted for review was prepared by the author on an urgent topic. The relevance of scientific research is determined by the circumstances of a theoretical and practical nature. The author rightly notes that at present the authorities have to deal with the difficulties and problems that arise during the implementation of the information space in financial transactions. This led to the emergence of a new kind of crimes that contributed to the commission of remote thefts from bank accounts by using new technological and information capabilities. This situation has prompted the creation of new communication and digital degrees of protection, the introduction of specialists into the staff of the Ministry of Internal Affairs, the creation of departments and departments dealing with cybercrimes, the development in this direction of interaction with the security services of banks in order to combat the new threat. However, in the course of such interactions, a number of obstacles arose, primarily the lack of a well-established methodology of interaction and the presence of one-sidedness in the relationship between the security services of banks and the Ministry of Internal Affairs of the Russian Federation in detecting crimes related to money laundering and cashing out. The subject of the study is the legal relations arising in the process of interaction of operational units with banking institutions on crimes committed using information technology. In the study of the problems raised, the author relies on the works of some Russian scientists, and the bibliographic list contains links mainly to articles published by the authors based on the materials of scientific and practical conferences. Unfortunately, there are no fundamental works in this area of research in the author's work, which causes some confusion. Monographs and textbooks are devoted to the study of problematic issues of interaction between operational units and banking institutions on crimes committed using information technology. The use of monographic works by other authors would allow for a more in-depth study of the topic of the scientific article. Further, in the text, the author reveals the dispositions of the norms of criminal legislation on crimes committed through the use of information and telecommunication technologies, pointing only to theft and fraud, although the topic of the study is stated more broadly and should cover other elements of the crime. Further, the author's transition from consideration of criminal law characteristics to operational investigative characteristics also has some inaccuracies that arise from the peculiarities of operational investigative legislation. Thus, the author suggests that at the initial stage of solving the crime, an explanation of the person against whom the crime was committed should be obtained. However, Article 6 of the Federal Law "On Operational investigative activities" provides for a list of operational investigative measures that an operative of the criminal investigation department is authorized to carry out. So, after accepting a statement from the victim about the committed crime, a complex of ORM can be conducted, including an ORM – "Survey", during which operationally significant information is recorded, as well as other, including technical measures provided for by the Federal Law "On ORD". Unfortunately, these events were not reflected in the author's research. Further, the author points to the above analysis of operational investigative and investigative practice, scientific and special sources, however, these directions were not adequately reflected in scientific research. Therefore, this issue requires additional study. In addition, the author did not fully take into account the amendments to the Federal Law "On Amendments to Article 26 of the Federal Law "On Banks and Banking Activities" and Article 27 of the Federal Law "On the National Payment System" in terms of improving information interaction between the Ministry of Internal Affairs of Russia and the Bank of Russia on countering fraud with payment cards and ensuring information security security. According to the Federal Law, on the basis of information received from the Ministry of Internal Affairs of Russia about illegal actions committed, the Bank of Russia will provide the Ministry with information about cases and attempts of money transfers made without the consent of the client. For this purpose, the Ministry of Internal Affairs of Russia has been added to the users of the Bank of Russia's Automated Incident Management System FinCERT (ASOI FinCERT). Also, an agreement has been concluded between the Ministry of Internal Affairs of Russia and the Bank of Russia regulating the procedure for information exchange, the form and list of information provided. Changes in the legislation of the Russian Federation are caused by a large number of remote embezzlement of funds, including using social engineering methods. Previously, the time frame for consideration by credit institutions of law enforcement appeals on the facts of this type of fraud reached 30 days, which made it difficult to carry out urgent operational investigative measures and investigative actions. Now, the operational interaction of the Ministry of Internal Affairs of Russia with the Bank of Russia will effectively solve the issues of prevention, suppression and disclosure of these crimes. When preparing a scientific study, the author worked out nine sources from the bibliographic list, which, in our opinion, is insufficient for conducting a representative study. Taking into account the expressed wishes, the work needs significant processing.

Second Peer Review

Peer reviewers' evaluations remain confidential and are not disclosed to the public. Only external reviews, authorized for publication by the article's author(s), are made public. Typically, these final reviews are conducted after the manuscript's revision. Adhering to our double-blind review policy, the reviewer's identity is kept confidential.
The list of publisher reviewers can be found here.

The subject of the research in the article submitted for review is, as its name implies, the problem of interaction of operational units with banking institutions on crimes committed using information technology, including the Internet. The stated boundaries of the study have been observed by the authors. The methodology of the research is not disclosed in the text of the article. The relevance of the research topic chosen by the authors is undeniable and is justified by them in sufficient detail: "In modern realities, information technologies, including the Internet information and telecommunications network (hereinafter referred to as the Internet), are actively being introduced into human life and help him to implement many tasks, for example, e-learning, communication on social networks, an appointment with a doctor through the reference and information Internet portal Gosuslugi, shopping in online stores, searching for necessary information in browsers — all this and much more is made possible thanks to scientific and technological progress. In this study, the author has studied the works, including monographs by Russian scientists R. I. Dremlyug [1], A. P. Agapova [2], V. V. Buryak [3], S.P. Butko [4], O. A. Samsonova [5] and others, many of whom are recognized scientists in the field of crime prevention committed using information and telecommunication technologies (hereinafter — ITT). ... The development of information technologies, in particular, has affected new ways of committing cybercrimes [6, p. 101]. Unfortunately, it should be noted that digital technologies, while significantly improving the life of a modern person, also carry a potential danger for him, since the number and variability of crimes in the field of information technology (hereinafter referred to as IT crimes) increase almost annually. As V. B. Vekhov and P. S. Pastukhov correctly noted, "the use of ITT by criminals as a means of committing crimes is becoming widespread, leading to the emergence of new ways of committing crimes" [7, p. 131]." The scientific novelty of the work is manifested in a number of conclusions and suggestions of the authors: "... when receiving information about transactions or about previous transactions on the accounts of a potential fraudster, it is possible to conduct various ORMs depending on the specific situation: 1) first, by conducting a personal investigation (a complex of ORMs conducted personally by an operative), "work out" the places where banking transactions were carried out (for example, grocery stores). In this situation, the operations officer visiting these locations, scans with the appropriate request the camera to the establishment of the image of the attacker, then MPAS Poll in respect of the employees of the stores, their owners, visitors to determine if they saw this person how often they see it, what special features they can select, and other related communication possible way, what additional information about the target person can provide, etc; 2) second, with the presence of specific information operations officer by carrying out ORM Monitoring checks the possible routes of potential fraud: in what direction he was headed (while watching a recording cameras), some grocery shops are nearby; also by the OPM Survey is to establish contact with the local residents, with the so-called senior house to confirm quickly-important information about this person lived or lives for how long, how often, with whom he lives, contact person, etc." etc.; "Taking into account the fact the actions of the employees of operational police in the direction of the queries in a credit institution due to the performance of their duties for the detection, prevention, suppression and disclosure of crimes and the fact that these steps correspond to the rights of police officers, providing information related to professional secrecy, at the request of the police cannot be regarded as a disclosure"; "Changes to the legislation of the Russian Federation caused by a large number of remote embezzlement of funds, including using social engineering techniques. Undoubtedly, the operational interaction of the Ministry of Internal Affairs of Russia with the Bank of Russia will effectively solve the issues of prevention, suppression and disclosure of these crimes. However, at the same time, the above-mentioned law did not regulate the deadline for providing the specified information to operational units," etc. Thus, the article makes a certain contribution to the development of domestic legal science and, of course, deserves the attention of potential readers. The scientific style of the study is fully sustained by the authors. The structure of the work is quite logical. In the introductory part of the article, the scientists substantiate the relevance of their chosen research topic. In the main part of the work, the authors explore some aspects of the interaction of operational units with banking institutions on crimes committed using information technology, including the Internet, identify relevant problems and suggest ways to solve them. The final part of the article contains conclusions based on the results of the study. The content of the article corresponds to its title, but is not devoid of formal shortcomings. So, the authors write: "Undoubtedly, the non-cash type of payment is becoming more and more in demand for society, but at the same time it is necessary to say about various ways of seizing non-cash funds" - "settlements"; "non-cash funds". Scientists note: "The method of stealing non-cash money by scrimming from a card is to copy the data of the magnetic tape of a bank card, and then create a copy of it in order to withdraw money from it later" - the proposal has not been agreed. Thus, the article needs additional proofreading - there are typos and stylistic errors in it (the list of typos and errors given in the review is not exhaustive!). The bibliography of the study is presented by 17 sources (dissertation, monographs, scientific articles). From a formal and factual point of view, this is enough. The authors managed to reveal the research topic with the necessary depth and completeness. There is an appeal to the opponents, but it is general in nature due to the focus of the study. The scientific discussion is conducted by the authors correctly; the provisions of the work are justified to the appropriate extent and illustrated with examples. Conclusions based on the results of the conducted research are available ("Taking into account the above and taking into account the lack of legislative consolidation of the deadlines for providing operationally significant information from banking institutions, the authors of the article consider it advisable to supplement Article 8 of the Federal Law "On Operational Investigative Activities" dated August 12, 1995 No. 144-FZ with the following content: "Within the framework of operational investigative measures "Making inquiries" on crimes committed using information technology, including the Internet, operational units, upon requests sent to banking institutions, make a note of the need to provide a response within 72 hours in order to timely identify and disclose this category of crimes and identify persons involved in them, including among their locations." Undoubtedly, operational units as carriers of professional information, i.e. not subject to disclosure, and, in addition, in order to more effectively and timely identify and disclose crimes committed using the Internet, it is important to consolidate at the legislative level the deadlines for providing information to operational employees from banking institutions"), have the properties of reliability, validity and They certainly deserve the attention of the scientific community, but they do not reflect all the scientific achievements of the authors of the article. Therefore, they need to be clarified and specified.
The interest of the readership in the article submitted for review can be shown primarily by specialists in the field of criminal procedure and criminology, provided that it is finalized: disclosure of the research methodology, clarification and concretization of conclusions based on its results, elimination of violations in the design of the work.

Third Peer Review

Peer reviewers' evaluations remain confidential and are not disclosed to the public. Only external reviews, authorized for publication by the article's author(s), are made public. Typically, these final reviews are conducted after the manuscript's revision. Adhering to our double-blind review policy, the reviewer's identity is kept confidential.
The list of publisher reviewers can be found here.

The subject of the study. In the reviewed article "On the issue of interaction of operational units with banking institutions on crimes committed using information technology, including the Internet", the subject of the study is the norms of law governing public relations in the field of interaction between law enforcement agencies and financial and credit institutions for the identification and investigation of offenses (crimes) using information and communication technologies, including through the global Internet. Research methodology. During the writing of the article, modern research methods were used: general scientific and private. The methodological apparatus consists of the following dialectical methods of scientific cognition: abstraction, induction, deduction, hypothesis, analogy, synthesis, and it is also possible to note the use of typology, classification, systematization and generalization. The relevance of research. The relevance of the topic of the article is beyond doubt, since there are legal and factual problems of detecting and investigating crimes using information and communication technologies in the banking sector, including using the Internet. The issue of interaction between banking institutions and operational units of law enforcement agencies is particularly acute. As the authors of the article correctly note, "... countering crimes using ITT is becoming almost a top priority for law enforcement agencies in their daily activities." The ambiguity and inconsistency of legal norms in this area of public relations and their official interpretation require additional doctrinal developments on this issue in order to improve modern criminal legislation and law enforcement. Scientific novelty. Without questioning the importance of previous scientific research, which served as the theoretical basis for this work, nevertheless, it can be noted that this article also contains some noteworthy provisions that have the character of scientific novelty, for example: "Undoubtedly, operational units as carriers of professional information, i.e. not subject to disclosure, and, in addition, in order to more effectively and timely identify and disclose crimes committed using the Internet, it seems important to consolidate at the legislative level the deadlines for providing information to operational staff from banking institutions." The proposals developed by the authors to improve legislation can be regarded as the practical significance of this study. Style, structure, content. The article is written in a scientific style using special legal terminology. The content of the article corresponds to its title, although in the opinion of the reviewer, the title of the article is too "cumbersome". The requirements for the volume of the article are met. The article is logically structured, but not formally divided into parts. The material is presented consistently, competently and clearly. There are no comments on the content. Bibliography. The authors have used a sufficient number of doctrinal sources, there are links to publications of recent years. References to sources are designed in compliance with the requirements of the bibliographic GOST. Appeal to opponents. The article presents a scientific controversy. Appeals to opponents are correct, decorated with links to the sources of publication. Conclusions, the interest of the readership. The article submitted for review "On the issue of interaction of operational units with banking institutions on crimes committed using information technology, including the Internet" may be recommended for publication. The article is written on an urgent topic, it is characterized by scientific novelty and practical significance. A publication on this topic could be of interest to a readership, primarily specialists in the field of criminal law, and could also be useful for teachers and students of law schools and faculties.