Illegal actions in the network. How are they caught?

Illegal actions in the network. How are they caught?

Participants in criminal networks (groups) have different roles in a particular category of cases. Depending on the role of the person being developed, law enforcement officers use a different set of operational and investigative measures (ORS) and different organizational and tactical methods of work.

The moment of detention plays an important role in implementing operational information. If there are no special questions in the questions of detention of couriers, robbers, carriers and other persons whose activities are taking place in the real world, i.e., in order to consolidate the evidence it is necessary to detain them at the moment of committing a crime, then in the questions of detention of persons whose criminal activities are unfolding in the Internet there are certain subtleties and details, which we will consider below.


If a person is engaged in criminal activity in the earl, he feels constantly in danger and in tension, a vivid example of this is a bookmark courier, as soon as you go out with your weight, you feel the danger and tension. If you work as a courier or carrier, you usually have control over what is happening around you all the time. Only a fool is not afraid.

As for those who work exclusively in the network, do not keep the staff in their hands and at home, their situation is a little different, the feeling of danger can leave them, they can relax and feel quite impunity, however, this is very wrong, because they need to be on the lookout also around the clock.

Let us skip the moments when the law enforcement agencies calculate those who work in the network. And let’s move on to the model in which operational officers know that the person is engaged in sales (for example) using the Internet.



What is the algorithm of law enforcement officers’ actions in this simulated situation?

Intelligence officers receive information that a particular person has organized the sale of narcotic drugs and psychotropic substances using the Internet, and they also know that the person is not directly related to the storage, transportation, manufacturing, that is, all criminal activity is only online.

Employees do not know which device the person is using, whether he or she is using the means to encrypt the device, whether he or she stores all the information on external drives and/or on a computer hard drive, and how the connection between the person being developed and the counterfeiters is organized. But they need all this information. Simply detaining such a person on the street to bring him to the department and start begging for information will most likely not bring the desired result for the investigation.

That is why in the question of apprehension of a person whose criminal activity is unfolding in the network the key point is always to apprehend the person being developed while working with the computer turned on.

For this purpose, the process of apprehension is prepared very carefully, the preparation is carried out long before the apprehension and a wide range of operatively-search measures and their various combinations are used in the process of preparation.

In order to detain a person under development in the process of working with a computer, depending on the role of the person in a criminal group, the following complex of detentions is used in different combinations.

Let’s look at some of their actions:.

Survey – Interviews are held for the purpose of collecting and checking the information of operational interest with the persons who have or may have the information necessary for solving the tasks. The results can be made out as a reference or not at all. It can be carried out either in public or in secret, court permission is not required.

Controlled delivery – consists in tacit control over movement of material objects (objects, instruments and means of crime, etc.), including those, free realization of which is prohibited or the turnover is limited.

It is also very difficult in terms of organization and tactics of conducting ORM, often in the organization of such ORM is used imitation received from the implemented agents, the supplier and the customer do not know that the bodies conducting operational and investigative activities (ORD) conduct ORM with respect to the delivery. This ORM is also of international importance, for example, the Russian Federation allows the transit of drugs through its territory, provided a controlled delivery.

A controlled delivery can also be an example:

The ORD authorities became aware of the location of an interregional warehouse of one large store. It was decided to carry out a controlled delivery with the aim of detecting the retail distribution network. This action will be recorded, the result of successful implementation of such PDM will be simultaneous detention of the entire retail network of the store together with warehouses and other participants.


Operative implementation – one of the most difficult in terms of organization and tactics of ORM, is the legendary introduction and establishment of trust between the employees of the operative search services and representatives of the criminal environment.

Keep in mind that the operative services can create legal enterprises, organizations and institutions, which would be attractive for a certain category of criminals and would arouse their interest. (example, torchsnaba, selling reagents for designers). For the purposes of conspiracy, cover-up documents are used, the identity of the employee being introduced is encrypted. ORM can be carried out for a long time, and the implemented agent is used to detect and solve crimes for a very long time.


Tapping of telephone conversations – consists of tacit interception, control, recording of telephone conversations of the persons who prepare/perform/perform or are related to these persons, or are in contact with wanted persons. It is allowed only with the permission of the court. It may be heard for a maximum of six months from the date of the order. In some cases, this period may also be extended by court order. This DRM is implemented by special technical divisions. Results are made out by the report of the special technical service employee and are transferred together with the audio recording medium.

The law on ORD has the wording “Interception of telephone and other conversations”, here, if not to go deeper into the legal subtleties, it is not only audio interception, but also SMS, fax, telegraph.

ORM can be conducted without court permission, only by order of the head of the body, but with mandatory notification to the court within 24 hours from the start of the tapping. Further, the court must recognize the actions as legal or illegal.


WARNING! All links in the articles may lead to malicious sites or contain viruses. Follow them at your own risk. Those who purposely visit the article know what they are doing. Do not click on everything thoughtlessly.


0 0 vote
Article Rating
Notify of
Inline Feedbacks
View all comments

Do NOT follow this link or you will be banned from the site!
Would love your thoughts, please comment.x

Spelling error report

The following text will be sent to our editors: