On the Forensic Characterization of the Identity of the Subjects of Crimes in the Field of High Technologies
Abstract
The relevance of the study is due to the fact that timely prevention of negative manifestations of cybercrime, and even more so the identification of the perpetrators, is one of the main and most important tasks of law enforcement services of all civilized states, since measures to prevent, detect, uncover and investigate such crimes cannot be effective only at the national level because of the transnational and transbondary nature of the Internet. The article reveals the possibilities of applying the features of the blockchain technology in the investigation of criminal cases. A possible mockup of an electronic criminal case using blockchain technology has been compiled. Methods for digitization of criminal cases investigation are proposed, as well as the possibility of using the non-traditional branch of the forensic technology (psycho-physiological portrait).
References
[2]. Bondaletov, A.A. 2015. Evolution of self-organization ideas. Sotsiologiche skieIssledovaniya 3: 132-139.
[3]. Evdokimov, K.N. 2018. Criminological portrait of the personality of a criminal committing computer-related crimes in the Russian Federation. Academy of the Prosecutor General's Office of the Russian Federation.
[4]. Frolova, Y.V., Medvedeva, N.V., Senicheva, L.V., Bondaletov, V.V. 2015. The security of citizens against criminal offences in modern Russia: Key tendencies and determinants. Criminology Journal of Baikal National University of Economics and Law 9(3): 525-537.
[5]. Gaykovich, V., Pershin, A. 1993. Security of electronic banking systems. Yedinaya Evropa.
[6]. Krylov, V.V. 2008. Investigation of crimes in the field of information. Gorodets.
[7]. Kuznetsov, A.V. 2017. Internal imbalances of large developing states and the specifics of their interaction with neighboring countries. IMEMO RAS.
[8]. Nyssanbekova, L.B., et al. 2015. Analysis of the concept of ‘natural person’ in public law and private law relations. Mediterranean Journal of Social Sciences 6(5): 83-87.
[9]. Potapov, S.A. 2016. Improving the investigation and disclosure of crimes in the field of computer information. Socio-Economic Phenomena and Processes 11(10): 2-9.
[10]. Rogozin, V.Yu. 1998. Features of the investigation and prevention of crimes in the field of computer information. Nauka.
[11]. Urzha, O.A. 2017. Social engineering as methodology of management activity. Sotsiologiche skieIssledovaniia 10: 87-96.
[12]. Vedernikov, N.T. 2003. Place and role of the person accused in the subject of proof in a criminal case. Stateand Law 6: 45-49.
[13]. Vekhov, V.V. 2016. Computer crimes. Ways of making, methods of investigation. Pravoizakon.
[14]. Vvedenskaya, O.Yu. 2015. Features of tracing in crimes committed via the Internet. Legal Science and Law Enforcement Practice 4(34): 209-216.
[15]. Yerjanov, T.K., et al. 2017. Legal issues related to combating cybercrime: Experience of Kazakhstan. Journal of Advanced Research in Law and Economics 8(7): 2286-2301.
The Copyright Transfer Form to ASERS Publishing (The Publisher)
This form refers to the manuscript, which an author(s) was accepted for publication and was signed by all the authors.
The undersigned Author(s) of the above-mentioned Paper here transfer any and all copyright-rights in and to The Paper to The Publisher. The Author(s) warrants that The Paper is based on their original work and that the undersigned has the power and authority to make and execute this assignment. It is the author's responsibility to obtain written permission to quote material that has been previously published in any form. The Publisher recognizes the retained rights noted below and grants to the above authors and employers for whom the work performed royalty-free permission to reuse their materials below. Authors may reuse all or portions of the above Paper in other works, excepting the publication of the paper in the same form. Authors may reproduce or authorize others to reproduce the above Paper for the Author's personal use or for internal company use, provided that the source and The Publisher copyright notice are mentioned, that the copies are not used in any way that implies The Publisher endorsement of a product or service of an employer, and that the copies are not offered for sale as such. Authors are permitted to grant third party requests for reprinting, republishing or other types of reuse. The Authors may make limited distribution of all or portions of the above Paper prior to publication if they inform The Publisher of the nature and extent of such limited distribution prior there to. Authors retain all proprietary rights in any process, procedure, or article of manufacture described in The Paper. This agreement becomes null and void if and only if the above paper is not accepted and published by The Publisher, or is with drawn by the author(s) before acceptance by the Publisher.