CONTEMPORARY CHALLENGES AND PREVENTIVE MECHANISMS FOR COUNTERING CYBERCRIME IN THE CONTEXT OF DIGITAL TRANSFORMATION
DOI:
https://doi.org/10.52026/2788-5291_2026_81_1_277Keywords:
cybercrime, Darknet, TOR, digital security, de-anonymization, artificial intelligence, information technology, prevention, operational-search activities, digital investigationAbstract
The article is devoted to analyzing the current state and prospects of combating cybercrime, with a focus on crimes committed in hidden segments of the Internet (Darknet). The subject of the study is the organizational, legal, and technological aspects of combating high-tech crimes. The aim of the work is to develop a scientifically sound approach to the development of an offensive strategy for ensuring digital security. The study uses methods of system analysis, comparative law, criminological diagnostics, and content analysis of empirical data. Particular attention is paid to the analysis of the Darknet infrastructure, including the features of routing using TOR technology and methods of concealing digital traces. Modern technologies for de-anonymizing participants are considered, including the methods of “honeypot,” “moving target defense,” and “two-sided deception.” Examples of successful operations to suppress criminal activity on the Darknet are given, including the RapTor and Serengeti operations, with specific results and seized digital evidence.
The conclusions presented in the study emphasize the relevance of transforming the existing paradigm of combating cybercrime: from a predominantly reactive approach to a proactive prevention strategy. Such a strategy requires the comprehensive application of intelligent digital technologies, including machine learning algorithms, methods for processing and interpreting unstructured data arrays, and the improvement of operational and investigative mechanisms in the digital environment. The paper substantiates the need to modernize the system of professional training for cybersecurity specialists authorized to implement measures to detect, localize, and neutralize criminal activity in the information and telecommunications space. The scope of application of the scientific article's findings includes improving the regulatory framework, developing departmental methodological recommendations, and introducing technological solutions into the activities of cybersecurity entities. The authors have made a well-founded conclusion about the need for a systematic, interdisciplinary approach to ensuring digital security in the context of the rapid transformation of criminal practices in the field of information technology.