<!DOCTYPE article
PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20190208//EN"
       "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.4" xml:lang="en">
 <front>
  <journal-meta>
   <journal-id journal-id-type="publisher-id">Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia</journal-id>
   <journal-title-group>
    <journal-title xml:lang="en">Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia</journal-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Вестник Санкт-Петербургского университета МВД России</trans-title>
    </trans-title-group>
   </journal-title-group>
   <issn publication-format="print">2071-8284</issn>
   <issn publication-format="online">2949-1150</issn>
  </journal-meta>
  <article-meta>
   <article-id pub-id-type="publisher-id">101297</article-id>
   <article-categories>
    <subj-group subj-group-type="toc-heading" xml:lang="ru">
     <subject>УГОЛОВНО-ПРАВОВЫЕ НАУКИ</subject>
    </subj-group>
    <subj-group subj-group-type="toc-heading" xml:lang="en">
     <subject>CRIMINAL LAW SCIENCES</subject>
    </subj-group>
    <subj-group>
     <subject>УГОЛОВНО-ПРАВОВЫЕ НАУКИ</subject>
    </subj-group>
   </article-categories>
   <title-group>
    <article-title xml:lang="en">Criminological and criminal-legal aspects of remote fraud involving deepfake technologies and social engineering</article-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Криминологические и уголовно-правовые аспекты дистанционного мошенничества с применением deepfake-технологий и социальной инженерии</trans-title>
    </trans-title-group>
   </title-group>
   <contrib-group content-type="authors">
    <contrib contrib-type="author">
     <contrib-id contrib-id-type="orcid">https://orcid.org/0009-0006-0590-4561</contrib-id>
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Палий</surname>
       <given-names>Екатерина Сергеевна</given-names>
      </name>
      <name xml:lang="en">
       <surname>Paliy</surname>
       <given-names>Ekaterina Sergeevna</given-names>
      </name>
     </name-alternatives>
     <email>alibi-2013@mail.ru</email>
     <xref ref-type="aff" rid="aff-1"/>
    </contrib>
   </contrib-group>
   <aff-alternatives id="aff-1">
    <aff>
     <institution xml:lang="ru">Московский университет МВД России имени В.Я. Кикотя</institution>
     <city>Москва</city>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">Moscow University of the Ministry of Internal Affairs of Russia named after V.Ya. Kikotya</institution>
     <city>Moscow</city>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <pub-date publication-format="print" date-type="pub" iso-8601-date="2025-12-30T00:00:00+03:00">
    <day>30</day>
    <month>12</month>
    <year>2025</year>
   </pub-date>
   <pub-date publication-format="electronic" date-type="pub" iso-8601-date="2025-12-30T00:00:00+03:00">
    <day>30</day>
    <month>12</month>
    <year>2025</year>
   </pub-date>
   <volume>2025</volume>
   <issue>4</issue>
   <fpage>149</fpage>
   <lpage>157</lpage>
   <history>
    <date date-type="received" iso-8601-date="2025-07-11T00:00:00+03:00">
     <day>11</day>
     <month>07</month>
     <year>2025</year>
    </date>
    <date date-type="accepted" iso-8601-date="2025-12-25T00:00:00+03:00">
     <day>25</day>
     <month>12</month>
     <year>2025</year>
    </date>
   </history>
   <self-uri xlink:href="https://vestnikspbmvd.ru/en/nauka/article/101297/view">https://vestnikspbmvd.ru/en/nauka/article/101297/view</self-uri>
   <abstract xml:lang="ru">
    <p>Введение. Статья посвящена актуальной проблеме дистанционного мошенничества в условиях цифровой трансформации общества, с особым упором на использование преступниками искусственного интеллекта (ИИ).&#13;
Методы. Автором проведен комплексный виктимологический анализ современных мошеннических схем, основанных на технологиях глубокого обучения, генерации текстов, аудио и видеоподделок (deepfake).&#13;
Результаты. Подчеркивается, что доступность и развитие технологий ИИ существенно усиливают возможности мошенников по созданию персонализированных атак и автоматизированных схем социальной инженерии. Рассматриваются виктимологические последствия данного феномена, включая рост уязвимости широких слоев населения и снижение эффективности традиционных мер защиты. Исследование опирается на зарубежную научную традицию, отражающую передовые подходы к пониманию социальных и технических аспектов цифровой виктимизации. Выявлены ключевые направления противодействия мошенничеству, включая развитие антифрод-систем, многоуровневую аутентификацию, интеграцию обучающих материалов в популярные онлайн-платформы и совершенствование международного правового регулирования.&#13;
Выводы. Автор заключает, что для эффективного снижения виктимности в условиях использования ИИ необходимы комплексный подход, объединяющий технологические инновации, повышение цифровой грамотности и развитие правовых механизмов защиты.</p>
   </abstract>
   <trans-abstract xml:lang="en">
    <p>Introduction. The article is dedicated to the actual problem of remote fraud in the context of digital transformation of society, with a particular focus on the use of artificial intelligence (AI) by criminals.&#13;
Methods. The author carried out a comprehensive victimological analysis of modern fraud schemes based on deep learning technologies, text generation, and audio and video forgeries (deepfakes).&#13;
Results. The author emphasises that the accessibility and development of AI technologies significantly increase the possibilities for fraudsters to create personalised attacks and automated social engineering schemes. The victimological consequences of such a phenomenon are considered, including the increased vulnerability of broad segments of the population and the reduced effectiveness of traditional protective measures. The research is based on foreign scientific traditions reflecting advanced approaches to understanding the social and technical aspects of digital victimisation. Key areas for counteracting fraud are identified, including the development of anti-fraud systems, multi-level authentication, integration of educational materials into popular online platforms, and improvement of international legal regulation.&#13;
Conclusions. The author concludes that in order to effectively reduce victimisation in the context of AI use, a comprehensive approach integrating technological innovation, increased digital literacy and development of legal protection mechanisms is required.</p>
   </trans-abstract>
   <kwd-group xml:lang="ru">
    <kwd>дистанционное мошенничество</kwd>
    <kwd>искусственный интеллект</kwd>
    <kwd>виктимологический анализ</kwd>
    <kwd>цифровая виктимизация</kwd>
    <kwd>deepfake</kwd>
    <kwd>социальная инженерия</kwd>
    <kwd>антифродсистемы</kwd>
    <kwd>машинное обучение</kwd>
    <kwd>персонализированные атаки</kwd>
    <kwd>цифровая безопасность</kwd>
    <kwd>международное сотрудничество</kwd>
    <kwd>киберпреступность</kwd>
   </kwd-group>
   <kwd-group xml:lang="en">
    <kwd>remote fraud</kwd>
    <kwd>artificial intelligence</kwd>
    <kwd>victimological analysis</kwd>
    <kwd>digital victimisation</kwd>
    <kwd>deepfake</kwd>
    <kwd>social engineering</kwd>
    <kwd>anti-fraud systems</kwd>
    <kwd>machine learning</kwd>
    <kwd>personalised attacks</kwd>
    <kwd>digital security</kwd>
    <kwd>international cooperation</kwd>
    <kwd>cybercrime</kwd>
   </kwd-group>
  </article-meta>
 </front>
 <body>
  <p></p>
 </body>
 <back>
  <ref-list>
   <ref id="B1">
    <label>1.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Jagielski M., Carlini N., Berthelot D., Kurakin A., Papernot N. High Accuracy and High Fidelity Extraction of Neural Networks / Proceedings of the 29th USENIX Security Symposium (USENIX Security ’20). 2020. P. 1345–1362. https://doi.org/10.48550/arXiv.1909.01838</mixed-citation>
     <mixed-citation xml:lang="en">Jagielski M., Carlini N., Berthelot D., Kurakin A., Papernot N. High Accuracy and High Fidelity Extraction of Neural Networks / Proceedings of the 29th USENIX Security Symposium (USENIX Security ’20). 2020. P. 1345–1362. https://doi.org/10.48550/arXiv.1909.01838</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B2">
    <label>2.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Chawki M. Navigating legal challenges of deepfakes in the American context: a call to action // Cogent Engineering. 2024. Vol. 11. No. 1. P. 2320971. https://doi.org/10.1080/23311916.2024.2320971</mixed-citation>
     <mixed-citation xml:lang="en">Chawki M. Navigating legal challenges of deepfakes in the American context: a call to action // Cogent Engineering. 2024. Vol. 11. No. 1. P. 2320971. https://doi.org/10.1080/23311916.2024.2320971</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B3">
    <label>3.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Tolosana R., Fierrez J., Vera-Rodriguez R., Morales A. DeepFakes and Beyond: A Survey of Face Manipulation and Fake Detection. 2020. 23 p. https://doi.org/10.48550/arXiv.2001.00179</mixed-citation>
     <mixed-citation xml:lang="en">Tolosana R., Fierrez J., Vera-Rodriguez R., Morales A. DeepFakes and Beyond: A Survey of Face Manipulation and Fake Detection. 2020. 23 p. https://doi.org/10.48550/arXiv.2001.00179</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B4">
    <label>4.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Verdoliva L. Media Forensics and DeepFakes: An Overview // IEEE Journal of Selected Topics in Signal Processing. 2020. Vol. 14. Is. 5. P. 910–932. https://doi.org/10.1109/JSTSP.2020.3002101</mixed-citation>
     <mixed-citation xml:lang="en">Verdoliva L. Media Forensics and DeepFakes: An Overview // IEEE Journal of Selected Topics in Signal Processing. 2020. Vol. 14. Is. 5. P. 910–932. https://doi.org/10.1109/JSTSP.2020.3002101</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B5">
    <label>5.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Hadnagy C. Social Engineering: The Science of Human Hacking. 2nd ed. USA, Indianapolis : John Wiley &amp; Sons, Inc., 2020. 322 p.</mixed-citation>
     <mixed-citation xml:lang="en">Hadnagy C. Social Engineering: The Science of Human Hacking. 2nd ed. USA, Indianapolis : John Wiley &amp; Sons, Inc., 2020. 322 p.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B6">
    <label>6.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Stajano F., Wilson P. Understanding Scam Victims: Seven Principles for Systems Security // Communications of the ACM. 2019. Vol. 62, Is. 3. P. 70–75.</mixed-citation>
     <mixed-citation xml:lang="en">Stajano F., Wilson P. Understanding Scam Victims: Seven Principles for Systems Security // Communications of the ACM. 2019. Vol. 62, Is. 3. P. 70–75.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B7">
    <label>7.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Wall D. S. How Big Data Feeds Big Crime // Current History. 2018. Vol. 795. No. 117. P. 29–34. https://doi.org/10.1525/curh.2018.117.795.29</mixed-citation>
     <mixed-citation xml:lang="en">Wall D. S. How Big Data Feeds Big Crime // Current History. 2018. Vol. 795. No. 117. P. 29–34. https://doi.org/10.1525/curh.2018.117.795.29</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B8">
    <label>8.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Макаров В. В., Блатова Т. А., Ворошилова Е. Ю. Ускоренное развитие информационных технологий в период пандемии // Экономика и качество систем связи. 2021. № 2 (20). С. 12–19.</mixed-citation>
     <mixed-citation xml:lang="en">Makarov V. V., Blatova T. A., Voroshilova E. Yu. Uskorennoe razvitie informacionnyh tehnologiy v period pandemii // Ekonomika i kachestvo sistem svyazi. 2021. № 2 (20). S. 12–19.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B9">
    <label>9.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Палий Е. С. Виктимологическая характеристика лиц пенсионного возраста: постановка проблемы // Судебная экспертиза и исследования. 2025. № 1. С. 115–123.</mixed-citation>
     <mixed-citation xml:lang="en">Paliy E. S. Viktimologicheskaya harakteristika lic pensionnogo vozrasta: postanovka problemy // Sudebnaya ekspertiza i issledovaniya. 2025. № 1. S. 115–123.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B10">
    <label>10.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Еськова Л. К., Рябчиков В. В. Новые преступные способы мошенничества в период пандемии коронавирусной инфекции // Гуманитарные, социально-экономические и общественные науки. 2020. № 12-2. С. 68–70. https: //doi.org/10.23672/c3413-0996-0433-v</mixed-citation>
     <mixed-citation xml:lang="en">Es'kova L. K., Ryabchikov V. V. Novye prestupnye sposoby moshennichestva v period pandemii koronavirusnoy infekcii // Gumanitarnye, social'no-ekonomicheskie i obschestvennye nauki. 2020. № 12-2. S. 68–70. https: //doi.org/10.23672/c3413-0996-0433-v</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B11">
    <label>11.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Иванцов С. В. Преступления, совершаемые с использованием информационно-телекоммуникационных сетей: вопросы предупреждения // Криминологический журнал. 2019. № 2. С. 35–39.</mixed-citation>
     <mixed-citation xml:lang="en">Ivancov S. V. Prestupleniya, sovershaemye s ispol'zovaniem informacionno-telekommunikacionnyh setey: voprosy preduprezhdeniya // Kriminologicheskiy zhurnal. 2019. № 2. S. 35–39.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B12">
    <label>12.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">McGuire M., Dowling S. Cyber Crime: A Review of the Evidence : Research Report 75 : Summary of key findings and implications. London : Home Office Research Report, 2013. 29 p.</mixed-citation>
     <mixed-citation xml:lang="en">McGuire M., Dowling S. Cyber Crime: A Review of the Evidence : Research Report 75 : Summary of key findings and implications. London : Home Office Research Report, 2013. 29 p.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B13">
    <label>13.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Яковлева Л. В. Современные способы совершения дистанционного мошенничества // Вестник Краснодарского университета МВД России. 2021. № 4 (54). С. 77–80.</mixed-citation>
     <mixed-citation xml:lang="en">Yakovleva L. V. Sovremennye sposoby soversheniya distancionnogo moshennichestva // Vestnik Krasnodarskogo universiteta MVD Rossii. 2021. № 4 (54). S. 77–80.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B14">
    <label>14.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Brenig C., Accorsi R., Müller G. Economic Analysis of Cryptocurrency Backed Money Laundering / European Journal of Information Systems. ECIS 2015 Completed Research Papers. Paper 20. 2015. https://doi.org/10.18151/7217279</mixed-citation>
     <mixed-citation xml:lang="en">Brenig C., Accorsi R., Müller G. Economic Analysis of Cryptocurrency Backed Money Laundering / European Journal of Information Systems. ECIS 2015 Completed Research Papers. Paper 20. 2015. https://doi.org/10.18151/7217279</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B15">
    <label>15.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Gercke M. Understanding Cybercrime: Phenomena, Challenges and Legal Response. Switzerland, Geneva : ITU: International Telecommunication Union, 2012. 356 p.</mixed-citation>
     <mixed-citation xml:lang="en">Gercke M. Understanding Cybercrime: Phenomena, Challenges and Legal Response. Switzerland, Geneva : ITU: International Telecommunication Union, 2012. 356 p.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B16">
    <label>16.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Cross C., Lee M. Exploring Fear of Crime for Those Targeted by Romance Fraud // Victims &amp; Offenders. 2022. Vol. 17. No. 5. P. 735–755. https://doi.org/10.1080/15564886.2021.2018080</mixed-citation>
     <mixed-citation xml:lang="en">Cross C., Lee M. Exploring Fear of Crime for Those Targeted by Romance Fraud // Victims &amp; Offenders. 2022. Vol. 17. No. 5. P. 735–755. https://doi.org/10.1080/15564886.2021.2018080</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B17">
    <label>17.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Baym N. K. Personal Connections in the Digital Age. 2nd ed. UK, Cambridge : Polity, 2015. 240 p.</mixed-citation>
     <mixed-citation xml:lang="en">Baym N. K. Personal Connections in the Digital Age. 2nd ed. UK, Cambridge : Polity, 2015. 240 p.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B18">
    <label>18.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Leukfeldt E. R., Roks R. Cybercrimes on the Streets of the Netherlands? An Exploration of the Intersection of Cybercrimes and Street Crimes // Deviant Behavior. 2021. Vol. 42. No. 11. P. 1458–1469. https://doi.org/10.1080/01639625.2020.1755587</mixed-citation>
     <mixed-citation xml:lang="en">Leukfeldt E. R., Roks R. Cybercrimes on the Streets of the Netherlands? An Exploration of the Intersection of Cybercrimes and Street Crimes // Deviant Behavior. 2021. Vol. 42. No. 11. P. 1458–1469. https://doi.org/10.1080/01639625.2020.1755587</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B19">
    <label>19.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Floridi L. What Is Data Ethics? // Philosophical Transactions A. 2016. Vol. 374 (2083). https://doi.org/1098/rsta.2016.0112</mixed-citation>
     <mixed-citation xml:lang="en">Floridi L. What Is Data Ethics? // Philosophical Transactions A. 2016. Vol. 374 (2083). https://doi.org/1098/rsta.2016.0112</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B20">
    <label>20.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Лустин В. И. Дистанционные мошенничества // Закон и власть. 2023. № 5. C. 67–74.</mixed-citation>
     <mixed-citation xml:lang="en">Lustin V. I. Distancionnye moshennichestva // Zakon i vlast'. 2023. № 5. C. 67–74.</mixed-citation>
    </citation-alternatives>
   </ref>
  </ref-list>
 </back>
</article>
