Criminological profile of a perpetrator of a high treason

  • Vadym Polovnikov Department of Operational and Investigative Activity Management of Bohdan Khmelnytskyi National Academy of State Border Guard Service of Ukraine. https://orcid.org/0000-0002-8054-909X
  • Viacheslav Biletskyi Department of Special Disciplines of Bohdan Khmelnytskyi National Academy of State Border Guard Service of Ukraine. https://orcid.org/0000-0003-0290-097X
  • Viktor Tyshchuk Department of Operational and Investigative Activity Management of Bohdan Khmelnytskyi National Academy of State Border Guard Service of Ukraine. https://orcid.org/0000-0001-5811-5909
  • Yurii Overchenko Department of Special Disciplines of Bohdan Khmelnytskyi National Academy of State Border Guard Service of Ukraine. https://orcid.org/0000-0001-6307-3459
Keywords: identity of an offender; high treason; criminological profile; elements of a criminal; National security.

Abstract

The article presents the analysis of specific criminological features of the persons who have committed high treason in order to know their typical criminological profile. For the purpose of that, 39 court decisions of the Unified State Register of Judgments (hereinafter: USRJ) of Ukraine, which were made against persons who committed this type of crime, were examined. Socio-demographic (gender, age, education, nationality) and criminal-law (motivation of the criminal behavior, single or group criminal character of criminal activity, duration of criminal activity, presence or absence of criminal record, etc.) were estimated in investigation. Generalization and interpretation of the results of court decisions made it possible to simulate a typical criminological profile of the perpetrator of the state treason and to identify certain specific characteristics of the subjects of this crime. It is concluded that knowledge of the criminological profile of the state traitor is of great importance for the profile of criminals by law enforcement agencies, which are empowered to prevent crime in the field of national security.

Downloads

Download data is not yet available.

Author Biographies

Vadym Polovnikov, Department of Operational and Investigative Activity Management of Bohdan Khmelnytskyi National Academy of State Border Guard Service of Ukraine.

Candidate of Juridical Science, Associate Professor, Head of Department of Operational and Investigative Activity Management of Bohdan Khmelnytskyi National Academy of State Border Guard Service of Ukraine.

Viacheslav Biletskyi, Department of Special Disciplines of Bohdan Khmelnytskyi National Academy of State Border Guard Service of Ukraine.

Candidate of Sciences in Public Administration, Professor of Department of Special Disciplines of Bohdan Khmelnytskyi National Academy of State Border Guard Service of Ukraine.

Viktor Tyshchuk, Department of Operational and Investigative Activity Management of Bohdan Khmelnytskyi National Academy of State Border Guard Service of Ukraine.

Senior Lecturer of Department of Operational and Investigative Activity Management of Bohdan Khmelnytskyi National Academy of State Border Guard Service of Ukraine.

Yurii Overchenko, Department of Special Disciplines of Bohdan Khmelnytskyi National Academy of State Border Guard Service of Ukraine.

Senior Lecturer of Department of Special Disciplines of Bohdan Khmelnytskyi National Academy of State Border Guard Service of Ukraine.

References

Khalymon, S., Polovnikov, V., & Volynets, P. (2020). Socio-psychological Profile of a Person Who Confidentially Provides Assistance to the Operational Unit. Anuario de Psicología Jurídica, 30, 13 20. https://doi.org/10.5093/apj2019a10.

No authors, (2012). Preface to the Fourth Edition Criminal Profiling: The Imperatives of Scientific Methodology and a Behavioral Science Education. Criminal Profiling (Fourth Edition)An Introduction to Behavioral Evidence Analysis, xv-xix. https://doi.org/10.1016/B978-0-12-385243-4.00033-2.

Morton, R. J., &Lord, W. D., (2005). Criminal Profilfng, Encyclopedia of Forensic and Legal Medicine, 51-55. https://doi.org/10.1016/B0-12-369399-3/00086-0.

Douglas, J. E., Ressler, R. K., Burgess, A. W., & Hartman, C. R. (1986). Criminal profiling from crime scene analysis. Behavioral Sciences & the Law, 4 (4), 401–421. https://doi.org/10.1002/bsl.2370040405.

Petherick, W. A., &Turvey, B. E. (2012). Chapter 3 Alternative Methods of Criminal Profiling. Criminal Profiling (Fourth Edition)An Introduction to Behavioral Evidence Analysis, 67-99. https://doi.org/10.1016/B978-0-12-385243-4.00003-4.

Esparza, M. A., &Turvey, B. E. (2016). Chapter 6 Mexico: Criminal Profiling and Forensic Criminology. Behavioral Evidence AnalysisInternational Forensic Practice and Protocols, 63-77. https://doi.org/10.1016/B978-0-12-800607-8.00006-9.

Kuryliuk, Y., & Khalymon, S. (2020). Criminal profile of migrants’ smuggler across the State Border of Ukraine. Amazonia Investiga, 9 (27), 195–208.

Kocsis, R. N. (2013). The Criminal Profiling Reality: What is Actually Behind the Smoke and Mirrors? Journal of Forensic Psychology Practice, 2 (13),79-91. https://doi.org/10.1080/15228932.2013.765733.

Huth, C. L., (2013). The insider threat and employee privacy: An overview of recent case law. Computer Law & Security Review, 29 (4), 368-381. https://doi.org/10.1016/j.clsr.2013.05.014.

Herrera, L. C., &Maennel, O., (2019). A comprehensive instrument for identifying critical information infrastructure services. International Journal of Critical Infrastructure Protection, 25, 50 61. https://doi.org/10.1016/j.ijcip.2019.02.001.

Brown, D. P., Buede, D., &Vermillion, S. D., (2019). Improving Insider Threat Detection Through Multi-Modelling / Data Fusion. Procedia Computer Science, 153, 100-107. https://doi.org/10.1016/j.procs.2019.05.060.

Kharytonov, E., Kharytonova, O., Tolmachevska, Y., Fasii, B., & Tkalych, M. (2019). Information Security and Means of Its Legal Support. Amazonia Investiga, 8(19), 255-265. Retrieved from https://www.amazoniainvestiga.info/index.php/amazonia/article/view/227.

Gragido, W., &Pirc, J., (2011). 10 Examples of Compromise and Presence of Subversive Multivector Threats.Cybercrime and Espionage An Analysis of Subversive Multi-Vector Threats. 177-196. https://doi.org/10.1016/B978-1-59749-613-1.00010-8.

Cole, E., &Ring, S., (2006). Chapter 4 Federal Government. Insider Threat Protecting the Enterprise from Sabotage, Spying, and Theft, 101 102. https://doi.org/10.1016/B978-159749048-1/50004-2.

Ring, T., (2015). The enemy within. Computer Fraud & Security, 12, 9 14. https://doi.org/10.1016/S1361-3723(15)30111-1.

Al tabash, K., &Happa, J., (2018). Insider-threat detection using Gaussian Mixture Models and Sensitivity Profiles. Computers & Security, 77, 838 859. https://doi.org/10.1016/j.cose.2018.03.006.

Cole, E., &Ring, S., (2006). Chapter 8 Profiles of the Insider Threat. Insider Threat Protecting the Enterprise from Sabotage, Spying, and Theft, 295 327. https://doi.org/10.1016/B978-159749048-1/50010-8.

Zaitsev O. V. Do pytannia derzhavnoi zrady u formi shpyhunstva (st. 111 KK Ukrainy): ISSN 2524-0323. Visnyk LDUVS im. E.O. Didorenka. 2017. No 3 (79). Lviv, 2017. S. 48 58. In Ukraine.

Konchuk N. S. Kryminalna vidpovidalnist za derzhavnu zradu: dys. kand. yuryd. nauk: 12.00.08. Lviv, 2019. 218 s. In Ukraine.

Makhatadze K. H. Kryminolohichna kharakterystyka osobystosti osib, yaki vchyniaiut zlochyny u vydi zalyshennia v nebezpetsi: Pravova systema: teoriia i praktyka. Pivdennoukrainskyi pravnychyi chasopys: 2-2017. Odesa 2017. S. 35-37. In Ukraine.

Khalymon S. I. Zapobihannia zlochynam sered osib, yaki perebuvaiut na obliku v kryminalno-vykonavchii inspektsii: dys. kand. yuryd. nauk: 12.00.08. Dnipropetrovsk, 2008. 255 s. In Ukraine.

Botnarenko I. A. Kryminolohichna kharakterystyka osib, yaki vchyniaiut nasylstvo v simi: Naukovyi visnyk Natsionalnoi akademii vnutrishnikh sprav: 2017 №2 (103). Kyiv, 2017. 103 s. ISSN 2410 3594. In Ukraine.
Published
2020-04-21
How to Cite
Polovnikov, V., Biletskyi, V., Tyshchuk, V., & Overchenko, Y. (2020). Criminological profile of a perpetrator of a high treason. Amazonia Investiga, 9(28), 176-189. https://doi.org/10.34069/AI/2020.28.04.21
Section
Articles
Bookmark and Share