Combating Illegal Drugs Trafficking Using the Internet by Means of the Profiling Method
Abstract
The paper actualizes the issues of combating drug trafficking using the Internet on the example of Ukraine. Given the significant difference in the approach to this issue among Ukrainian and foreign scientists, this allowed to carry out a multifaceted analysis. The purpose of the article is to conduct a comprehensive study (criminological and forensic) on the use of the Internet in the commission of crimes related to drug trafficking, on the example of Ukraine. Profiling was used as the main method. The novelty of this work is the extrapolation of the method of profiling cybercriminals to persons who commit illicit drug distribution using the Internet in Ukraine as a special category of cybercriminals. The specific objectives of the study are: to study the characteristics of an offender who commits crimes related to drug trafficking via the Internet using the method of profiling; study of typical investigative situations that arise when committing crimes related to drug trafficking on the Internet; development of comprehensive recommendations for combating this group of crimes, taking into account both the identity of an offender and investigative situations that most often arise in practice. Based on the study, the article conducted (using secondary data) profiling of people who distribute drugs using the Internet in Ukraine. The profiling also includes a comprehensive portrait of such a criminal, which includes both socio-demographic and psychological characteristics of this category of criminals, studied their motivation, conducted a study of the victimological aspect and features of the study of evidence in this category of crimes.
References
[2] Bonn, S.A. 2012. Criminal profiling: the original mind hunters. https://www.psychologytoday.com/us/blog/wicked-deeds/201712/criminal-profiling-the-original-mind-hunter.
[3] Cilli, C. 2020. Deep & Darknet: The origins of threats. https://www.researchgate.net/publication/340183299.
[4] Creswell, J. 2014. Research design: qualitative, quantitative and mixed methods approaches. SAGE Publications.
[5] Drago, I., et al. 2019. Are darknets all the same? On darknet visibility for security monitoring. In:Proceedings of the IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN), 1-6. IEEE.
[6] Gao, H. 2013. Drug Abuse and drug trafficking in Asia. In: J. Liu, B. Hebenton, J. Susyan (Eds.), Handbook of Asian Criminology, 115-127. Springer New York.
[7] Kassa, H.S., and Rosen, J.D. 2019. Organized crime and drug trafficking in the Americas: trends and challenges. In: Illicit Markets, Organized Crime, and Global Security, 63-85. Palgrave Macmillan.
[8] Kipane, A. 2019. Meaning of profiling of cybercriminals in the security context. SHS Web Conference 68: art. No. 01009.
[9] Kirwan, G., and Power, A. 2013. Cybercrime: the psychology of online offenders. Cambridge University Press.
[10] Kostyuchenko, O.E., Kolesnik, T.V., Bilous, Z.V., and Tavolzhanskyi, О.V. 2019. Robotization of manufacturing process: economic and social problems and legal ways of their solution. Financial and Credit Activity: Problems of Theory and Practice 3(30): 454-462.
[11] Kravtsova, M. 2016. Cybercrime: criminological characteristics and security of police in Ukraine. Kharkiv National University of Internal Affairs.
[12] Li, X. 2017. A review of motivations of illegal cyber activities. Criminology & Social Integration Journal 25(1): 110-126.
[13] Lykhova, S., Semchuk, N., and Rybikova, H. 2019. Psychological well-being of prisoners as a factor in penitentiary reform. International Journal of Applied Exercise Physiology 8(1): 341-351.
[14] Malkina-Pykh, I. 2011. Victimology. Psychology of victim behavior. MSTU.
[15] Petherick, W., Turvey, B.E., and Ferguson, C.E. 2010. Forensic criminology. Elsevier Academic Press.
[16] Rosen, J.D, and Kassa, H.S. 2019. Trends in drug trafficking and organized crime. In: Drugs, Gangs, and Violence (pp. 57-89). Springer International Publishing.
[17] Saroha, R. 2014. Profiling a cyber criminal. International Journal of Information and Computation Technology 4(3): 253-258.
[18] Shinder, D. 2010. Profiling and categorizing cybercriminals. https://www.techrepublic.com/blog/it-security/profiling-and-categorizing-cybercriminals/.
[19] Turney, B.E. (Ed.). 2012. Criminal profiling: an introduction to behavior evidence analysis. Elsevier Academic Press.
[20] Yuxno, O.O. 2018. Methodological recommendations ‘Features of investigation of crimes related to illicit trafficking in narcotic drugs or psychotropic substances with use modern telecommunication and other technologies’. Kharkiv National University of Internal Affairs.
[21] Zuhri, F.A. 2017. Profiling cybercriminals. http://digitalforensicsmagazine.com/blogs/wp-content/uploads/2017/05/The-Profile-of-Cybercriminal.pdf.
The Copyright Transfer Form to ASERS Publishing (The Publisher)
This form refers to the manuscript, which an author(s) was accepted for publication and was signed by all the authors.
The undersigned Author(s) of the above-mentioned Paper here transfer any and all copyright-rights in and to The Paper to The Publisher. The Author(s) warrants that The Paper is based on their original work and that the undersigned has the power and authority to make and execute this assignment. It is the author's responsibility to obtain written permission to quote material that has been previously published in any form. The Publisher recognizes the retained rights noted below and grants to the above authors and employers for whom the work performed royalty-free permission to reuse their materials below. Authors may reuse all or portions of the above Paper in other works, excepting the publication of the paper in the same form. Authors may reproduce or authorize others to reproduce the above Paper for the Author's personal use or for internal company use, provided that the source and The Publisher copyright notice are mentioned, that the copies are not used in any way that implies The Publisher endorsement of a product or service of an employer, and that the copies are not offered for sale as such. Authors are permitted to grant third party requests for reprinting, republishing or other types of reuse. The Authors may make limited distribution of all or portions of the above Paper prior to publication if they inform The Publisher of the nature and extent of such limited distribution prior there to. Authors retain all proprietary rights in any process, procedure, or article of manufacture described in The Paper. This agreement becomes null and void if and only if the above paper is not accepted and published by The Publisher, or is with drawn by the author(s) before acceptance by the Publisher.