communications, remote control and management of
devices, the implementation of high-tech products
and services in order to develop a smart city and a
smart home (home automation), security solutions,
monitoring of transport and environmental
conditions, digitalization of manufacturing industries,
work of state institutions and organizations); housing
and communal services (management of energy
resources, elevators, maintenance of buildings);
transport complex (geolocation systems,
development of communication along the roads,
improvement of vehicles by embedding in GSM-
modules, smart alarms with remote control units,
insurance telematics trackers, video recorders,
monitoring of commercial vehicles and fuel
consumption, a system for collecting payments from
heavy vehicles (Platon project)); trade (on-line
retailers are already competing with traditional stores
by offering unique and personalized services to
customers).
In addition, wearable devices (smartphones,
tablets, smartwatches, fitness trackers), which are
available to almost every person, are an example of
everyday use of the Internet of Things. Their design
features, having built-in electronics, software, means,
and sensors that provide communication, allow them
to exchange information with other devices, including
in automatic mode, without human intervention.
Like any progressive technical innovation, the
Internet of Things is fraught with serious threats,
creates additional risk zones, giving rise to special
types of criminal behavior and new forms of crime
(cybercrime), making its users more and more
vulnerable from external cyber threats (Afanasyeva,
2020; Dechamp, 2005).
In this regard, criminological information on the
state and trends of cybercrime is essential for targeted
and timely prevention (Smushkin, 2020).
2 STUDY METHODOLOGY
The research is based on the general scientific
dialectical method of cognition. Furthermore, a set of
research methods that had been multiply proven in
criminological science were used, including analysis,
synthesis, deduction, induction, systemic structural
(when studying the results of criminological research,
the cyber fraud rate and methods, identifying their
tendencies), statistical (when studying statistical data
characterizing the number of registered cyber frauds
and the persons who committed them, as well as
victims of such crimes), formal-logical (when
formulating proposals to improve countering cyber
fraud), differentiation, integration, etc., which
allowed the research group to achieve the set
objective.
3 STUDY RESULTS
According to the statistics of the Federal State
Institution “GIAC of the Ministry of Internal Affairs
of Russia”, a significant increase in cybercrimes is
recorded annually (Table 1).
Table 1: Dynamics of cybercrimes in the Russian
Federation in 2018-2020.
This situation is typical not only for Russia, but
also for foreign countries. Thus, in 2020, 791,790
cybercrime allegations were registered in the United
States (+ 69% compared to 2019) (Figure 1).
Figure 1: Trends in the number of reported cybercrime
allegations and the amount of damage caused by
cybercrimes in the United States in 2016-2020.
The virtual nature, anonymity, and the variety of
possible criminal actions are most attractive for the
implementation of all kinds of fraudulent schemes
that are impossible in the real world (Goncharova,
2017; Shiyan, 2010; Wagen W. van der, 2015). It is
about cyber fraud, i.e. the embezzlement or the
acquisition of the right to another person's property
by deception or abuse of trust, committed with the use
or application of information and telecommunication
technologies. This is confirmed by the fact that frauds
occupy the most significant share in the structure of
cybercrimes (total: 237,074; 46.45%) (Figure 2).
Cyber Fraud as a Relevant Internet of Things Security Threat
123