<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Would you Steal me a Like? Undercover Operations in Digital Environments within the Peruvian National Police</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Carlos Aliaga</string-name>
          <email>caliagaa1820@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alexis Ravello</string-name>
          <email>aravellojoo@yahoo.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Darlys Sares</string-name>
          <email>darlyssares@hotmail.com</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marcelo Leon</string-name>
          <email>marceloleon11@hotmail.com</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>PCWrEooUrckResehdoinpgs ISSNc1e6u1r-3w-0s0.o7r3g</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Centro de Altos Estudios Nacionales</institution>
          ,
          <addr-line>Lima</addr-line>
          ,
          <country country="PE">Peru</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Escuela de Posgrado de la Policia Nacional del Peru</institution>
          ,
          <addr-line>Lima</addr-line>
          ,
          <country country="PE">Peru</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Universidad Ecotec</institution>
          ,
          <addr-line>Samborondon</addr-line>
          ,
          <country country="EC">Ecuador</country>
        </aff>
      </contrib-group>
      <fpage>156</fpage>
      <lpage>164</lpage>
      <abstract>
        <p>The study analyzed how undercover police operations are carried out within digital environments in the fight against organized crime in the city of Metropolitan Lima. The approach used was qualitative and the hermeneutical phenomenological method. Data saturation was achieved with 16 participants, including active police oficers and experts in digital evidence analysis in organized crime investigations. The study employed interviews and documentary analysis as data collection techniques. The data were analyzed using discursive analysis and the technological tool ATLAS.ti. Undercover police operations in digital environments involve oficers adopting ifctitious digital identities and fabricated personas to infiltrate criminal organizations. "Based on the results, we conclude that undercover police operations in digital environments are efective in combating organized crime tools, such as specialized hardware and software, are pillars in the efectiveness of operations; the police profile personnel assigned to operations must integrate values, advanced cybersecurity skills, digital infiltration techniques and in- depth knowledge of the regulatory framework; the legal framework that regulates operations must be permanently updated, under agile management perspective; it es necessary to work with standardized processes to deliver valid evidence in criminal proceedings; The creation of the Police specialty Computer Engineering es urgent, to have oficers professionally prepared for combat organized Crime in a digital world that es updated quickly and relentlessly.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Undercover police operations</kwd>
        <kwd>Digital environments</kwd>
        <kwd>Organized crime</kwd>
        <kwd>Special investigation techniques</kwd>
        <kwd>Digital evidence</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Criminal organizations (COs) increasingly and eficiently use technology and digital environments
[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. In addition to their enormous availability of technological resources and scarce bureaucracy, COs
have been achieving high degrees of impunity and capillarity, both at the global [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], regional, and local
levels. In response, the signatory states of the United Nations Convention against Organized Crime,
United Nations [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] have incorporated the so-called special investigation techniques into their legislation.
Undercover operations in digital environments, hereinafter (OED), are one of those that require the
greatest resources due to the constant growth of cybercrime [
        <xref ref-type="bibr" rid="ref4 ref5 ref6">4, 5, 6</xref>
        ].
      </p>
      <p>
        In the fight against COs, Law enforcement oficials face challenges in gathering evidence that can be
used as admissible proof in criminal proceedings [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. This problem becomes more complex when it comes
to crimes in digital environments, because their attacks are covert, anonymous, and compartmentalized,
which makes the work of law enforcement dificult [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>
        According to the General Ofice of Planning and Budget of the Ministry of the Interior of Peru [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], in
2022, cybercrimes were the most frequent and showed an alarming increase of 277% compared to 2019,
as shown in table 1
      </p>
      <p>Considering the problem described, the present study has the following objectives: (i) to describe
how undercover operations are carried out in digital environments in the fight against organized crime
in the city of Metropolitan Lima; (ii) to identify the contribution of undercover operations within digital
environments in the fight against organized crime; (iii) to describe the digital environments, platforms
and computer applications used by organized crime; (iv) to describe the tools in virtual media that
police personnel use in OEDs; (v) to describe the legal framework that regulates the use of OEDs; (vi) to
determine the profile that police personnel must have to execute OEDs; and based on the findings (vii)
to propose improvements to this special investigation technique, in addition to serving as a background
for future scientific research and proposals to improve police action.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Methodology</title>
      <p>
        This study employed a qualitative approach using the hermeneutic phenomenological method [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
Data saturation was achieved with 16 participants [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], all of whom were active police oficers.
      </p>
      <p>
        Oficers involved in organized crime investigations in Metropolitan Lima over the past two years. To
collect the data, the following techniques and instruments were used: the interview with its instrument,
the semi-structured interview guide [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]; documentary analysis with its instrument, the data sheet
[
        <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
        ]; and a survey to collect the opinion of police investigators about specific aspects of the research
phenomenon. To protect personal data, individual codes were used, in addition, informed consent was
explained and given. For data processing, discursive analysis, and the software ATLAS.ti.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Results</title>
      <p>Regarding the first objective, the findings reveal that EOs are gaining relevance because criminals
have moved a significant part of their activities to the virtual space, taking advantage of digital platforms,
social networks, and instant messaging systems to plan, coordinate, and execute illicit actions. To
counteract these attacks, law enforcement agencies, in particular the Peruvian National Police (PNP),
have been adapting, using new technologies and investigation methods that allow them to infiltrate
criminal networks to obtain and collect relevant information.</p>
      <p>Respondents noted that EOIs are considered an efective technique in the fight against COs. The
analysis revealed that, where EOIs were properly developed, they were instrumental in dismantling
criminal networks, especially in cases involving extortion, computer fraud, and online sexual crimes.
However, they also mentioned that the use of EOIs is still limited.</p>
      <p>Efective undercover operations require a combination of strong ethical principles, advanced technical
skills, and a deep understanding of the legal framework governing digital crime investigations. In this
sense, police oficers create identities and adopt fictitious digital personality profiles to infiltrate the
depths of the digital networks of COs. The fictitious digital identity is a key tool that allows direct
interaction with criminals, who are unaware that they are dealing with an undercover police oficer.</p>
      <p>An updated and agile legal framework is another essential component in the development of these
operations. Peruvian regulations establish the bases for the implementation of special investigation
techniques in digital environments, in order to ensure that digital evidence collected during undercover
operations is admissible in a judicial process. Law 30077 against organized crime and Article 341-A of
the criminal procedure code are the legal framework for the development of undercover operations in
digital environments.</p>
      <p>The interviewees mentioned that technology plays a fundamental role in this type of operation.
Computer tools such as monitoring software, digital search, and real-time data analysis are used by
digital agents to track criminals’ communications, obtain digital evidence, and ensure the integrity of
the evidence obtained. It is worth mentioning that COs also make use of the same technologies and
even more advanced tools, such as encryption systems, to hinder access to their information and protect
their illicit operations. COs have shown a remarkable ability to quickly adapt to new technologies and
digital environments, using platforms such as the Deep Web, social networks, and encrypted messaging
systems to carry out crimes such as extortion, computer fraud, online sexual crimes, crimes against
sexual freedom, virtual kidnapping, and money laundering, among others.</p>
      <p>The interviews revealed that agents involved in undercover operations within digital environments
require a high degree of values and ethics, specialization in cybersecurity; management of digital
platforms; knowledge of the most advanced computer tools; use of social networks; knowledge of the
English language; knowledge of the legislation that regulates the special technique; and the ability to
interpret the profile of the acquired fictitious identity. In this sense, continuous specialized training is
key to the success of these operations.</p>
      <p>Figure 1 shows how covert operations are implemented and fictitious digital identities are created.</p>
      <p>Note: The flowchart shows the coordination between the special investigation teams with OC
investigation functions and the Specialized Prosecutor’s Ofices Against Organized Crime (FECOR).</p>
      <p>Regarding the second objective, the interviewees pointed out that EOs make an important contribution
to the fight against criminal structures because they allow justice operators to infiltrate criminal networks
that operate on digital platforms. The ability to access these environments through fictitious identities,
avatars, and profiles facilitates obtaining crucial evidence to dismantle OCs.</p>
      <p>The use of digital tools in EOIs has made it possible to trace illegal communications and transactions
that were previously inaccessible through traditional methods. However, to ensure the efectiveness of
these techniques, it is essential that investigators are trained in the use of advanced technologies and
understand the modus operandi of criminals in cyberspace.</p>
      <p>Undercover operations have made it possible to identify and track OC leaders. According to those
interviewed, the OEDs contribute significantly to the fight against OCs because they contribute to the
theory of the case; provide evidence in the process; and allow for an eventual conviction, thus achieving
the objective of dismantling the OCs. The results of a survey applied to 30 agents of the highly complex
crimes division revealed that 87% of those surveyed considered that these operations are efective in the
ifght against organized crime.</p>
      <p>Regarding the third objective, the findings indicate that, in Peru, OCs have adopted digital
environments as part of their modus operandi, using platforms such as Facebook, WhatsApp, Instagram,
Telegram and anonymous networks such as the Dark Web to coordinate and execute their illicit
activities. These tools allow criminal groups to operate eficiently and anonymously, making it dificult for
authorities to intervene through techniques such as encryption and data deletion, which complicates
the detection and tracking of their activities.</p>
      <p>Digital environments ofer a key infrastructure for COs, where the use of specialized software,
such as encryption tools and malware, allows criminals to protect their communications and hide
evidence. These platforms, especially encrypted messaging platforms, create barriers to accessing
critical information in investigations, highlighting the need for the PNP to update its tools with
advanced technology. To counter CO activities, data preservation methods, such as HASH codes, are
required, which strengthen the ability of law enforcement to dismantle these criminal networks. Table
three shows the digital places where COs operate, according to what was indicated by the interviewees.</p>
      <p>Note: Malware software infects computer equipment and Spies even allow cloning of telephone and
computer equipment.</p>
      <p>Regarding the fourth objective, police personnel use a variety of tools in virtual media to carry out
undercover operations against organized crime, taking advantage of technological tools that allow
tracking, collecting and preserving digital evidence. However, the same technology or more current
versions are used by COs to carry out their illicit activities. Table 4 presents a summary of the opinion
of 48 specialized police oficers surveyed in this study.</p>
      <p>As can be seen, the majority of respondents, 86%, indicated that the OCs quickly update their
computer tools, while only one third, 34%, considered that the PNP updates as quickly. The OCs,
from the perspective of PNP oficers, are technologically ahead, which would give them an important
advantage over law enforcement. The computer tools used by the authorities include programs that
allow the creation of mirror copies of digital devices, guaranteeing the preservation of evidence without
altering it, and using preservation mechanisms by creating forensic images with HASH codes. However,
the lack of adequate technological resources and insuficient training of police personnel in the use
of these tools have been identified as important deficiencies. The lack of updating and renewal of the
technological tools used by the PNP also delays the progress of investigations, especially when the OCs
use more advanced technology.</p>
      <p>Regarding the fifth objective, the legal framework that regulates the use of undercover operations in
the fight against OC in digital environments, the documentary analysis and the interviewees pointed
out that, at the core of these laws, are Law 30077 against Organized Crime, and article 341-A of the
criminal procedure code. Both norms provide the bases for the specialized units of the PNP to carry
out undercover operations, with the objective of combating serious crimes such as extortion, computer
fraud, online sexual crimes, crimes against sexual freedom, virtual kidnapping, money laundering,
illegal mining, among others.</p>
      <p>Law 30077 defines the guidelines for intervention in organized crime activities, allowing the PNP
and other justice operators to act against these criminal networks. For its part, Article 341-A of the
Criminal Procedure Code establishes the legal framework for the execution of OEDs.</p>
      <p>However, despite this framework, those interviewed pointed out that the regulations lack the
speciifcity and agility necessary for the execution of police operations and make it dificult for the digital
evidence collected to be admissible in criminal courts. Another barrier is the inadequate coordination
between the entities in charge of the administration of justice. Another key element to consider is
the protection of individual rights and the protection of the data of people not related to crimes who
interact with the OCs during the OEDs, which imposes additional limitations on the authorities.</p>
      <p>Regarding the sixth objective, the interviewees pointed out that the profile of the agents who carry
out OEDs is one of the most complex in the police field. Because it requires a fusion of solid moral
and personal characteristics, advanced technical skills, and a solid legal knowledge, allowing them to
develop the OEDs efectively and in accordance with the law. In this sense, a key element for success in
infiltration tasks is ethics or integrity, due to the need to blend in with the psychological profiles of
the members of the OCs. As revealed in the interviews, staying on the right side during and after the
digital interaction with criminals (in a thin border of anonymous interrelation) is crucial for undercover
operations to translate into successful criminal proceedings that end in the conviction and dismantling
of the OCs.</p>
      <p>Undercover digital investigators must undergo extensive training in computer technology to
counteract the sophisticated methods used by criminals. However, experts stressed that the level of training
of personnel does not cover the technical computer gaps compared to the technological prowess of the
COs, which limits the PNP’s ability to obtain and preserve digital evidence.</p>
      <p>Table 5 below describes the ideal profile of the digital researcher.</p>
      <p>Finally, based on the results of the study, we propose, as an improvement to the special investigation
technique, the standardization of the main procedures for the execution of the OED through an
easyto-use guide in simple language, thinking about police operational work (see Appendix I, where the
developed guide can be found).</p>
      <sec id="sec-3-1">
        <title>3.1. Emerging Category: Protective Measures</title>
        <p>
          A procedural protection measure is a legal action implemented within a criminal process to safeguard the
rights and security of the persons involved, especially in investigations of organized crime or complex
crimes. These measures are intended to protect victims, witnesses, and agents involved in obtaining
and presenting evidence, guaranteeing their physical, psychological, and legal integrity during the
development of the judicial procedure and after it [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ].
        </p>
        <p>It is urgent to include undercover agents, revealing agents, witnesses, and digital collaborators in
procedural protection measures to reduce the risks of violent reprisals by COs. This action would
General Aspects
Sex: Male or female
Age: 20 – 40 years
Police rank: Indistinct
allow investigations to be conducted under strict security and confidentiality standards, ensuring the
fulfillment of justice. Such measures may include mechanisms to preserve identity and the use of secure
protocols in the management of information and custody of digital evidence.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Discussion</title>
        <p>
          Our results confirm that Peru and Latin America are not immune to the significant increase in cybercrime,
largely as a result of the new criminal modalities adopted by the OC during the COVID-19 pandemic
[
          <xref ref-type="bibr" rid="ref16 ref17 ref18">16, 17, 18</xref>
          ].
        </p>
        <p>
          In contrast to international studies, the use of digital undercover operations in Peru is still limited,
which negatively afects the fight against OC, especially in the increasing number of crimes that are
carried out or committed in digital environments. The low number of PNP personnel who have the
appropriate profile to use digital tools or execute special investigation techniques, such as undercover
operations and video surveillance, reflects a weakness in the implementation of efective strategies
against OC. In this regard, De Paoli et al. [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ], in their study carried out in Europe and Canada, pointed
out that traditional police skills are inadequate for the digital environment, which is why the hiring
of civilian specialists was required to cover these deficiencies. Naturally, Peruvian police culture is
influenced by national culture and its state bureaucracy. It is worth mentioning that Peruvian culture is
characterized by traditional values, Ravello and Llaque, [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ], that are far from those of digital culture,
which would make it dificult for the PNP to adopt values, strategies, techniques, and tools of digital
culture [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ].
        </p>
        <p>
          According to the findings of related international research, COs, compared to police forces, are more
agile in adopting new technologies [
          <xref ref-type="bibr" rid="ref21 ref22">21, 22</xref>
          ]. This situation is critical in Peru, because 18.3% of the
economy comes from informal sources; 58.7% of jobs are informal [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ]; and there are complex COs
dedicated to crimes with high monetary returns. Such as informal mining and drug traficking that
have the capacity to infiltrate and corrupt the diferent levels of power and the depth of the social fabric.
It is important to highlight that the large profits of these COs would allow them to acquire cutting-edge
technological resources and professional operators.
        </p>
        <p>
          The findings show that the constant technological and computer evolution requires police personnel
trained in updated tools for the collection and preservation of the integrity and authenticity of digital
evidence, which will be part of the criminal process. This underlines the need to train police personnel
to achieve the ideal profile of digital investigators (see table 4). Our evidence reinforces the findings
of Kassem and Erken [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ] in the United Kingdom, who pointed out that inadequate training in digital
skills and advanced technologies is a major challenge for police oficers. Taking into consideration the
gap in the digital culture of the PNP, the majority traditional profile of the agents, and the growing and
urgent need for training in technology and computer science, we consider it imperative to create the
specialty of police computer engineering from police training schools. In this way, the technological
gap between the OC and the PNP could be shortened in the medium term. Additionally, the PNP would
be better prepared for the inevitable wave of crimes leveraged by new technologies and the global
disruptive Artificial Intelligence (AI).
        </p>
        <p>
          Regarding the legal framework that supports the OEDS in Peru, it is very generic and outdated.
Because it is updated under the vision of the traditional legal system, it is archaic to combat COs in
digital environments. Therefore, it is necessary to propose amendments to both Law No. 30077 against
organized crime and Article 341-A of the Criminal Procedure Code. Our results are consistent with
those of [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ], who in her study in the European Community pointed out that contemporary criminal
investigation calls into question; the law in general; the scientific validity of digital findings, because old
procedural guarantees do not adapt to processes with digital evidence; and the criminal legal system,
due to the need to update the laws, regulations and procedures for validating digital evidence to protect
all parties involved in the criminal process.
        </p>
        <p>
          Due to its complex nature, huge resources, multiple ofensive channels, evasive operation, and serious
damage to the social fabric, it is urgent to start involving more community actors in the fight against OC
in digital environments. These include hardware, software, technology services, telecommunications
providers, and local representatives of digital platforms and social networks. The eforts of traditional
law enforcement agencies, such as the prosecution, police, and judiciary, are insuficient to combat OCs
operating in digital environments. The findings of our study support what Montasari [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ] pointed out
in his research in the United States of America and the United Kingdom, who stated that collaboration
between technology companies and institutions that oversee justice is crucial to combat cyberterrorism
and improve national and citizen cybersecurity.
        </p>
        <p>Finally, the study was not free of limitations that were overcome during the research process. On
the one hand, the small number of professionals specialized in OEDD to carry out the data collection
was very challenging. The scarce academic literature on OEDD in the country convinced us of the
need to work only with international articles from journals indexed in quartiles one to two of the
Scopus database. Future research should delve deeper into the implications of the emerging category of
protection measures, the use of AI by the OC and law enforcement for OEDD, and develop actions at a
theoretical and/or practical level.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusion</title>
      <p>The EOD is an efective technique in the fight against organized crime, allowing the obtaining of
evidence for criminal proceedings and the subsequent dismantling of OCs.</p>
      <p>Tools, such as specialized hardware and software, are pillars of the efectiveness of OEDs. Constant
updating of these tools is essential to cope with the sophistication of the techniques used by OCs.</p>
      <p>It is crucial to develop standardized operating procedures that allow detectives or digital investigators
to act efectively in these environments.</p>
      <p>The professional profile of police personnel assigned to OED must integrate values, advanced skills
in cybersecurity, digital infiltration techniques, and in-depth knowledge of the applicable regulatory
framework.</p>
      <p>The legal framework that regulates EOs must be constantly updated, from a perspective of agile
management, not only from a legal perspective, due to the enormous diference in the speed of attacks
and sophistication of OCs and the reaction of justice operators.</p>
      <p>Authorization to use disguised identities and manipulate aspects of legal dealings must be strictly
regulated to protect both the integrity of the evidence and the rights of the individuals involved.</p>
      <p>There is an urgent need to create a specialty in police computer engineering at the PNP oficers’
school in order to have professionals prepared to combat OC on equal terms, in terms of updating
capabilities, hardware, and software, and at the same time, not to depend on temporary experts who do
not understand the institutional culture.</p>
    </sec>
    <sec id="sec-5">
      <title>Declaration on Generative AI</title>
      <p>The authors have not employed any Generative AI tools.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>G. A. J. Díaz</given-names>
            <surname>Samper</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. L. Molina</given-names>
            <surname>Garzón</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. E.</given-names>
            <surname>Serrador</surname>
          </string-name>
          <string-name>
            <surname>Osorio</surname>
          </string-name>
          ,
          <article-title>Approaching the cybercriminal from a perspective of social control</article-title>
          ,
          <source>Revista Criminalidad</source>
          <volume>65</volume>
          (
          <year>2023</year>
          )
          <fpage>81</fpage>
          -
          <lpage>95</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Diaz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Rangel</surname>
          </string-name>
          ,
          <article-title>National challenges facing cybersecurity in the global scenario: an analysis for colombia</article-title>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Nations</given-names>
            <surname>United</surname>
          </string-name>
          ,
          <article-title>United nations convention against transnational organized crime and its protocols, U</article-title>
          . Nations. Palermo,
          <string-name>
            <surname>Italy</surname>
          </string-name>
          (
          <year>2000</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>De Paoli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Johnstone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Coull</surname>
          </string-name>
          , I. Ferguson, G. Sinclair,
          <string-name>
            <given-names>P.</given-names>
            <surname>Tomkins</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Brown</surname>
          </string-name>
          , R. Martin,
          <article-title>A qualitative exploratory study of the knowledge, forensic, and legal challenges from the perspective of police cybercrime specialists</article-title>
          ,
          <source>Policing: A Journal of Policy and Practice</source>
          <volume>15</volume>
          (
          <year>2021</year>
          )
          <fpage>1429</fpage>
          -
          <lpage>1445</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>O. A.</given-names>
            <surname>Fonseca-Herrera</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. E.</given-names>
            <surname>Rojas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Florez</surname>
          </string-name>
          ,
          <article-title>A model of an information security management system based on ntc-iso/iec 27001 standard, IAENG Int</article-title>
          .
          <source>J. Comput. Sci</source>
          <volume>48</volume>
          (
          <year>2021</year>
          )
          <fpage>213</fpage>
          -
          <lpage>222</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Ajagbe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. B.</given-names>
            <surname>Awotunde</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Florez</surname>
          </string-name>
          ,
          <article-title>Ensuring intrusion detection for iot services through an improved cnn</article-title>
          ,
          <source>SN Computer Science</source>
          <volume>5</volume>
          (
          <year>2023</year>
          )
          <fpage>49</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Lannier</surname>
          </string-name>
          ,
          <article-title>Infiltrating virtual worlds. the regulation of undercover agents through fundamental rights</article-title>
          ,
          <source>Revista Brasileira de Direito Processual Penal</source>
          <volume>10</volume>
          (
          <year>2024</year>
          )
          <article-title>e1066</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Ombudsman's Ofice</surname>
          </string-name>
          ,
          <source>Ombudsman's report no. 001-2023-dp/adhpd. cybercrime in peru: State strategies and challenges</source>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <article-title>General Ofice of Planning and Budget of the Ministry of the Interior, Implementation of budget program 0086 “improvement of the services of the criminal justice system</article-title>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>J. W.</given-names>
            <surname>Creswell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. L. P.</given-names>
            <surname>Clark</surname>
          </string-name>
          ,
          <article-title>Designing and conducting mixed methods research</article-title>
          , Sage publications,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S. J.</given-names>
            <surname>Gentles</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Charles</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ploeg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. A.</given-names>
            <surname>McKibbon</surname>
          </string-name>
          , et al.,
          <article-title>Sampling in qualitative research: Insights from an overview of the methods literature</article-title>
          ,
          <source>The qualitative report 20</source>
          (
          <year>2015</year>
          )
          <fpage>1772</fpage>
          -
          <lpage>1789</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M. Z.</given-names>
            <surname>Cohen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. L.</given-names>
            <surname>Kahn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. H.</given-names>
            <surname>Steeves</surname>
          </string-name>
          ,
          <article-title>Hermeneutic phenomenological research: A practical guide for nurse researchers</article-title>
          ,
          <source>Sage Publications</source>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Yin</surname>
          </string-name>
          ,
          <article-title>Case study research: design and methods (ed</article-title>
          .), Thousand
          <string-name>
            <surname>Oaks</surname>
          </string-name>
          (
          <year>2003</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Morante</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. del Pilar</given-names>
            <surname>Villamil</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Florez</surname>
          </string-name>
          ,
          <article-title>Framework for supporting the creation of marketing strategies</article-title>
          , International Information Institute (Tokyo).
          <source>Information</source>
          <volume>20</volume>
          (
          <year>2017</year>
          )
          <fpage>7371</fpage>
          -
          <lpage>7378</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15] Ministry of Justice, Supreme decree no. 020
          <article-title>-2001-jus. approves the regulations on protection measures for collaborators, witnesses, experts and victims, as referred to in law no</article-title>
          .
          <issue>27378</issue>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>N.</given-names>
            <surname>Aliane</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Gharbi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Semlali</surname>
          </string-name>
          ,
          <article-title>The role of artificial intelligence, digital capabilities and digital awareness on supply chain management: moderating role of organizational readiness and digital organizational culture</article-title>
          ,
          <source>Transformations in Business and Economics</source>
          <volume>22</volume>
          (
          <year>2023</year>
          )
          <fpage>832</fpage>
          -
          <lpage>852</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>T.</given-names>
            <surname>Kliestik</surname>
          </string-name>
          , E. Nica,
          <string-name>
            <given-names>P.</given-names>
            <surname>Durana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. H.</given-names>
            <surname>Popescu</surname>
          </string-name>
          ,
          <article-title>Artificial intelligence-based predictive maintenance, time-sensitive networking, and big data-driven algorithmic decision-making in the economics of industrial internet of things</article-title>
          ,
          <source>Oeconomia Copernicana</source>
          <volume>14</volume>
          (
          <year>2023</year>
          )
          <fpage>1097</fpage>
          -
          <lpage>1138</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuzior</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Tiutiunyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Zielińska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kelemen</surname>
          </string-name>
          ,
          <article-title>Cybersecurity and cybercrime: Current trends and threats</article-title>
          .,
          <source>Journal of International Studies (2071-8330) 17</source>
          (
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ravello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Llaque</surname>
          </string-name>
          ,
          <article-title>Moderation of national culture between empowerment and resilience in job performance</article-title>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20] World Economic Forum,
          <article-title>Digital culture: The driving force of digital transformation</article-title>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>L.</given-names>
            <surname>Hadlington</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Lumsden</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Black</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Ferra</surname>
          </string-name>
          ,
          <article-title>A qualitative exploration of police oficers' experiences, challenges, and perceptions of cybercrime</article-title>
          ,
          <source>Policing: A Journal of Policy and Practice</source>
          <volume>15</volume>
          (
          <year>2021</year>
          )
          <fpage>34</fpage>
          -
          <lpage>43</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kethineni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. D</given-names>
            .
            <surname>Jackson</surname>
          </string-name>
          ,
          <article-title>Cybercrime and cryptocurrency as new challenges for the police</article-title>
          , in: Exploring Contemporary Police Challenges, Routledge,
          <year>2022</year>
          , pp.
          <fpage>181</fpage>
          -
          <lpage>192</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <article-title>National Institute of Statistics and Informatics, Production and informal employment in peru. satellite account of the informal economy</article-title>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>R.</given-names>
            <surname>Kassem</surname>
          </string-name>
          ,
          <string-name>
            <surname>E. Erken,</surname>
          </string-name>
          <article-title>In their own words: Police oficers' insights on identifying and overcoming contemporary policing challenges</article-title>
          ,
          <source>International review of administrative sciences 91</source>
          (
          <year>2025</year>
          )
          <fpage>130</fpage>
          -
          <lpage>149</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>R.</given-names>
            <surname>Stoykova</surname>
          </string-name>
          ,
          <article-title>Digital evidence: Unaddressed threats to fairness and the presumption of innocence</article-title>
          ,
          <source>Computer Law &amp; Security Review</source>
          <volume>42</volume>
          (
          <year>2021</year>
          )
          <fpage>105575</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>R.</given-names>
            <surname>Montasari</surname>
          </string-name>
          ,
          <article-title>Countering cyberterrorism: The confluence of artificial intelligence, cyber forensics and digital policing in US and UK national cybersecurity</article-title>
          , volume
          <volume>101</volume>
          ,
          <string-name>
            <surname>Springer</surname>
            <given-names>Nature</given-names>
          </string-name>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>