Cooperation of Law Enforcement Agencies with Other Departments in the Fight Against Criminal Offences at Critical Infrastructure Facilities of Ukraine
DOI:
https://doi.org/10.56294/sctconf20251581Keywords:
criminal offences, critical infrastructure, law enforcement collaboration, cybersecurity, national securityAbstract
Introduction: This study focuses on the collaborative efforts between law enforcement agencies and other governmental bodies in Ukraine to combat criminal offences targeting critical infrastructure. The research evaluates how such cooperation influences crime prevention and response effectiveness, particularly from legal and institutional perspectives.
Methods: The study utilizes a combination of qualitative and quantitative methodologies, including content analysis, network analysis, simulation modeling, and interviews with key agency representatives. This multi-method approach ensures a comprehensive assessment of interagency collaboration and its impact on infrastructure security.
Results: The findings reveal significant challenges in communication between institutions, which hinder effective responses to threats like terrorism and cyberattacks. However, instances of successful collaboration through joint working groups and data-sharing initiatives highlight the potential for improved outcomes. The study underscores the necessity of enhancing legal frameworks and institutional mechanisms to facilitate better coordination.
Conclusions: Future research should explore the integration of advanced technologies, such as artificial intelligence and data analytics, to enhance coordination efficiency. Additionally, further analysis of international legal frameworks and cross-border collaboration is essential for strengthening Ukraine's capacity to protect critical infrastructure and develop robust security strategies.
References
1. Herasymenko OM, Melnyk DS. The Security Service of Ukraine’s counteraction to criminal offences at critical infrastructure facilities: organisational aspect. Bull. Kharkiv Nat. Univ. Int. Affairs. 2024;106(3):128-142. https://doi.org/10.32631/v.2024.3.11.
2. Leheza Y, Liudvik V, Filipp A. Interaction of law enforcement bodies of Ukraine in disclosure of offenses and crimes. Dixi. 2023;25(2):1-15. https://doi.org/10.16925/2357-5891.2023.02.06.
3. McNicholas ER, Faircloth FE. Cybersecurity laws and regulations USA 2025 [Internet]. 2024. [cited 2025 Feb 27]. Available from: https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/usa.
4. Yefimenko I, Atamanchuk V, Svoboda I. Illegal privatization of critical infrastructure facilities: Problematic aspects and ways to solve them. Ûridičnij Časopis Nacìonalʹnoï Akademìï Vnutrìšnìh Sprav. 2023;13(4):50-61. https://doi.org/10.56215/naia-chasopis/4.2023.50.
5. Buletsa S, Drozd O, Yunin O, Mohilevskyi L. Medical error: Civil and legal aspect. Georgian Med. News. 2018;276:161-166.
6. Svintsytskyi AV. The system of cybersecurity bodies in Ukraine. Revista Científica General José María Córdova. 2022;20(38):287-305. https://doi.org/10.21830/19006586.903.
7. Chanysheva GI, Yunin OS, Milovska NV, Pozhodzhuk RV, Mazur VV. Civil liability of police officers in Ukraine and Germany: Legal aspects and problematic issues. J. Legal Ethical and Regulatory Iss. [Internet] 2019 [cited 2025 Feb 27];22(4):1-9. Available from: https://www.abacademies.org/articles/Civil-liability-of-Police-Officers-in-Ukraine-and-Germany-legal-aspects-1544-0044-22-4-396.pdf.
8. Lazor O, Lazor O, Zubar I, Zabolotnyi A, Yunyk I. The impact of digital technologies on ensuring transparency and minimising corruption risks among public authorities. Pakistan J. Criminol. 2024;16(2):357-374. https://doi.org/10.62271/pjc.16.2.357.374.
9. Oderiy O, Orobets K, Brynzanska O, Veklych V, Shpiliarevych V. The impact of EU criminal law policy on the prevention of transnational environmental crime. Pakistan J. Criminol. 2024;16(3):1155-1172. https://doi.org/10.62271/pjc.16.3.1155.1172.
10. Kruhlov V, Bobos O, Hnylianska O, Rossikhin V, Kolomiiets Y. The role of using artificial intelligence for improving the public service provision and fraud prevention. Pakistan J. Criminol. 2024;16(2):913-928. https://doi.org/10.62271/pjc.16.2.913.928.
11. Pettoello-Mantovani C. Cybercrimes: An emerging category of offenses within the frame of the International Criminal Court Jurisdiction. Int. J. Law and Politics Stud. 2024;6(2):6-11. https://doi.org/10.32996/ijlps.2024.6.2.2.
12. Sari EA, Hamsir N. Sociological legal review of gambling crimes in Bulukumba regency. Alauddin Law Develop. J. 2023;5(2):212-221. https://doi.org/10.24252/aldev.v5i2.21324.
13. Çeku OM, Morina M, Azemi F, Ali Eren M. Importance of special investigation measures for uncovering, investigating and solving criminal offences: Key factors to the quality of a safety life. Qual. - Access to Success. 2023;24(197):48-55. https://doi.org/10.47750/qas/24.197.06.
14. Muharremi D, Ademi M. The role of the police in reducing the fear of crime in the community. Access to Justice in Eastern Eur. 2023;6(2):242-254. https://doi.org/10.33327/ajee-18-6.2-n000225.
15. Potcovaru S. The terrorist threat to critical infrastructure from the perspective of criminal risk. The Bull. “Carol I” Nat. Defence Univ. 2024;12(4):239-252. https://doi.org/10.53477/2284-9378-23-62.
16. Masudi NDJA. The importance of forensic labs in minimizing crime prevention: A study concerning KARACHI CITY. Pakistan J. Int. Affairs. 2023;6(2):1063-1074. https://doi.org/10.52337/pjia.v6i2.914.
17. Gent A. How can mobile networks protect critical infrastructure? Network Secur. 2021(1):6-8. https://doi.org/10.1016/s1353-4858(21)00006-4.
18. IBM SPSS Statistics [Internet]. Product editions. 2024 [cited 2025 Feb 27]. Available from: https://www.ibm.com/products/spss-statistics.
19. Inter-Agency collaboration effectiveness [Internet]. 2024 [cited 2025 Feb 27]. Available from: https://docs.google.com/forms/d/e/1FAIpQLSdMuD2W5708ghvZozNPN1Xk6FxirdNAzMm3OuLSMEPnSRO4mQ/viewform?usp=sharing.
20. International telecommunication union development sector [Internet]. Global Cybersecurity Index 2024; 2024 [cited 2025 Feb 27]. Available from: https://www.itu.int/en/ITU-D/Cybersecurity/Documents/GCIv5/2401416_1b_Global-Cybersecurity-Index-E.pdf.
21. SecurityScorecard [Internet]. Using metrics that matter to protect critical infrastructure; 2024. [cited 2025 Feb 27]. Available from: https://securityscorecard.com/blog/using-metrics-that-matter-to-protect-critical-infrastructure/.
22. Pal D. How to analyse a cyber attack chain: A cyber drill scenario from BGD e-GOV CIRT [Internet]. 2022 [cited 2025 Feb 27]. Available from: https://blog.apnic.net/2022/01/12/how-to-analyse-a-cyber-attack-chain-a-cyber-drill-scenario-from-bgd-e-gov-cirt/.
23. Koelemij S. The anatomy of plant design and the OT cyber-attack – Part 1 [Internet]. 2022 [cited 2025 Feb 27]. Available from: https://industrialcyber.co/expert/sinclair-koelemij/the-anatomy-of-plant-design-and-the-ot-cyber-attack-part-1/.
24. Gill NS. Latency rate vs response rate of API’s | Comprehensive Guide [Internet]. 2024 [cited 2025 Feb 27]. Available from: https://www.xenonstack.com/blog/api-latency-rate-response-rate.
25. IBM Z Performance and Capacity Analytics 3.1.0 [Internet]. Monitoring response time; 2024 [cited 2025 Feb 27]. Available from: https://www.ibm.com/docs/en/zp-and-ca/3.1.0?topic=performance-monitoring-response-time.
26. Symetris [Internet]. What response time should you expect from your digital agency; 2023 [cited 2025 Feb 27]. Available from: https://symetris.com/en/insights/strategy/what-response-time-should-you-expect-your-digital-agency.
27. Omelyanenko V, Semenets-Orlova І, Khomeriki O, Lyasota L, Medviedieva Yu. Technology transfer management culture (education-based approach). Problems Perspectives Manage. 2018;16(3):454-463. https://doi.org/10.21511/ppm.16(3).2018.36.
28. Horban O, Babenko L, Lomachinska I, Hura O, Martych R. A knowledge management culture in the European higher education system. Scient. Bull. Nat. Mining Univ. 2021;3(2021):173-177. https://doi.org/10.33271/nvngu/2021-3/173.
29. Horban O, Martych R, Soha L, Lohvyniuk T. Socio-philosophical phenomenon of the intelligentsia: The genesis of the formation of the concept. Wisdom. 2022;22(2):40-49. https://doi.org/10.24234/wisdom.v22i2.609.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Mykola Koteliukh , Viktor Koshchynets , Ihor Burian , Stanislav Merdov, Oleg Khoronovskyi (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
The article is distributed under the Creative Commons Attribution 4.0 License. Unless otherwise stated, associated published material is distributed under the same licence.