Статья 'Вопросы противодействия преступлениям, совершаемым с использованием IT-технологий' - журнал 'Юридические исследования' - NotaBene.ru
по
Journal Menu
> Issues > Rubrics > About journal > Authors > About the Journal > Requirements for publication > Council of editors > Redaction > Peer-review process > Policy of publication. Aims & Scope. > Article retraction > Ethics > Online First Pre-Publication > Copyright & Licensing Policy > Digital archiving policy > Open Access Policy > Article Processing Charge > Article Identification Policy > Plagiarism check policy
Journals in science databases
About the Journal

MAIN PAGE > Back to contents
Legal Studies
Reference:

Issues of countering crimes committed using IT technologies

Aliev Timur Firudinovich

ORCID: 0000-0002-0645-931X

Junior Police Lieutenant, Faculty of Law Enforcement, East Siberian Institute of the Ministry of Internal Affairs of Russia

664017, Russia, Irkutsk region, Irkutsk, Lermontova, 110

timuraliev.2018@mail.ru

DOI:

10.25136/2409-7136.2023.10.44173

EDN:

BDIKBI

Received:

29-09-2023


Published:

06-11-2023


Abstract: The subject of this study is the specifics of countering crimes committed using IT technologies. The purpose of the work is to consider and resolve certain aspects of countering IT crimes. The research methodology is based on general scientific and private scientific methods of cognition - dialectical, logical, statistical, comparative legal, formal legal. The relevance of the chosen topic has both theoretical and practical aspects of significance in modern realities. Thus, in the context of the informatization of society, it is important to protect information security from cyber threats. Unfortunately, in the modern world, information technologies are used not only by law-abiding citizens, which raises the question of ensuring national cybersecurity. To date, this type of crimes is interstate in nature due to the large number of their commission. Cybercrime is growing on a large scale, and this is confirmed by the following statistics: from 2014 to 2022, an almost fifty-fold increase in IT crimes was recorded (10 thousand against 510 thousand cybercrimes). The author of the presented article came to the conclusion that countering IT crimes should be carried out taking into account scientific and technological progress. Studying international experience, analyzing modern domestic methods of combating this category of crime, the author became convinced that it is important to use digital technologies in countering IT crimes, the use of which will help reduce both the number of commission of this kind of criminal acts and increase the percentage of detection of this category of crime. The author illustrates examples of how artificial intelligence can serve as a "faithful assistant" in the domestic practice of countering IT crimes. In addition, the priority is to improve the knowledge and skills of law enforcement officers to counteract this category of crime, at the same time it is necessary to carry out preventive measures to inform the population about the main criminal schemes of intruders.


Keywords:

cybercrime, IT technologies, counteraction, scientific and technological progress, prevention, improvement of activities, artificial intelligence, the role of a specialist, dynamic character, priority direction

This article is automatically translated. You can find original text of the article here.

 

Digitalization of the population covers many spheres of life, allowing to solve certain tasks more effectively. Information and telecommunication technologies (hereinafter referred to as ITT; IT technologies) are inextricably linked with scientific and technological progress, and in the age of digital technologies it is problematic to imagine a person who does not use a smartphone, laptop or other gadget. There is no doubt about the convenience and practicality of digital technologies, for example, in solving everyday issues using messengers or search engines.

On the other hand, the progression of IT technologies, in addition to its undeniable advantages, has a downside: the commission of fraud, extortion, hacking, drug trafficking, the spread of virus programs and other illegal actions using information technology is becoming more common [1, pp. 221-224]. It is a well-known fact: "the state of crime is a kind of reflection, an indicator of the processes taking place in society" [2, p. 99].

The development of information technologies, in particular, has affected new ways of committing cybercrimes. Thus, the computer network has become a new effective tool for doing business and a new powerful channel for the spread of criminal acts. In this regard, it seems necessary to work out the most optimal and effective forms of their counteraction [3, p. 222; 4, p. 16]. Indeed, in the age of digital technologies, the problem of cybercrime is of acute urgency, and countering it has both theoretical and practical significance.

In this study, the author uses the works of domestic scientists A. A. Balashova, A. A. Baranov, O. P. Gribunov, K. N. Evdokimov, A. A. Ostapenko, S. V. Parkhomenko, N. A. Poltoratsky, Yu. L. Solovieva, S. V. Timofeeva, E. I. Tretyakov, S. I. Usacheva, and others, many of whom are recognized scientists in the field of countering cybercrime. The works of the above researchers, we believe, correspond to the research topic, have a sign of sufficiency, contribute to the disclosure of various aspects of the stated topic. The author of the article shows various points of view on this topic and further gives his own position on the problem under study.

When considering the problem of cybercrime, it must be said that cybercrime originates from the last century. As O. P. Gribunov and A. A. Baranov note, with each appearance of new systems, programs capable of hacking and receiving data from various devices were developed. In the future, computer crimes began to manifest themselves in the form of damage to computer systems: the arrival of such a concept as "piracy" into the information environment and the creation of unofficial software products, which entailed the possibility of unauthorized access to computer data. As a result, the adoption of various kinds of official documents became obvious. For example, in November 2001, in Budapest (Hungary), the Council of Europe signed the Convention on Crime in the Field of Computer Information ETS No. 185 [5], which reflected the general principles of international cooperation and the main directions aimed at protecting society from crime in the field of computer information [6, p. 56]. These data are confirmation that cybercrime is constantly developing in the variability of its commission and, unfortunately, this happens with the advent of new computer innovations.

Studying the current state of crimes in the IT sphere, we note that over the past decade there has been a jump in so-called cybercrimes, the counteraction of which in modern realities is a priority. As the representative of the forensic center of the Investigative Committee T. Y. Salikhov points out, from 2014 to 2022, an almost fifty-fold increase in IT crimes was recorded (10 thousand against 510 thousand). Also, according to the above-named, attackers use artificial intelligence to create phishing sites or generate text that in the original version looks like the material of a certain organization [7].

Continuing to cite statistical indicators, we note that in March of this year, President of the Russian Federation Vladimir Putin at an expanded meeting of the Ministry of Internal Affairs of the Russian Federation (hereinafter — the Ministry of Internal Affairs Russia) reported that the cybercrime rate was a quarter of the total number of criminal cases. According to the head of the Russian state, the fight against this type of crime is one of the priorities of the activities of the Ministry of Internal Affairs of Russia.

It is worth adding that the head of the ITT Crimes Investigation Department of the central office of the Investigative Committee of Russia, K. P. Komarda, said that the level of this category of crimes has increased 20 times over the past seven years, also noting that law enforcement officers should take into account all the specificity of these crimes, interact with specialists in this field [8].

So, in order to conduct research on computer equipment and information, it is necessary to attract competent specialists whose knowledge can help, for example, find ways to decrypt information hidden on electronic media. An important form of application of special knowledge is participation in investigative actions, for example, when a suspect is detained red-handed, an inspection with working equipment can be carried out. The data seized on an electronic data carrier is subjected to direct examination by a specialist [9, p. 885; 10, p. 13; 11, p. 67; 12, p. 216]. Based on this, it should be noted that the seizure, research and fixation of computer information require the involvement of competent specialists, since the seized information can be a source of evidence.

High technologies in modern realities are an integral part of the life of society. Taking into account all the specifics of crimes in the field of ITT, it is important for police officers to "be one step ahead" of cybercriminals, improve their abilities and knowledge in solving and investigating this category of crimes. As it was noted, cybercrime is growing every year, and this is an acute problem for Russian police officers. [13, p. 79].

Thus, when considering the issue of countering this category of crime, it is necessary to say about the importance of training and technical equipment of law enforcement officers. It should be emphasized that over the past few years, the State has been taking measures to intensify the fight against cybercrime. So, in 2020, units for combating cybercrime began to be formed in the structure of the Ministry of Internal Affairs of Russia. The Minister of Internal Affairs of the Russian Federation, Police General V. A. Kolokoltsev stated that, "given the scale of the spread of cybercrimes, the variety of schemes and methods of their commission, the absence of a single disclosure algorithm, it is impossible to achieve a radical improvement, since new units must be provided not only with personnel, but also with modern technologies" [14].

Due to the fact that new ways of committing cybercrimes are emerging, police officers must develop new methods of combating them, because the old ones are becoming ineffective. As a result, it is necessary to work on the talion principle, i.e. to fight cybercrimes absolutely "mirror" — using information technology.

So, the development of artificial intelligence is not standing still, which, in addition to its application in human life (for example, the chat bot ChatGPT, which has recently been widely discussed by society), can also help in combating crime. It should be understood that artificial intelligence is a neural network capable of working and performing human—like actions in accordance with an algorithm given to it. It's no secret that police officers have quite a lot of work not only in terms of drafting procedural documents, but also in carrying out individual actions (for example, operational search activities or investigative actions). As a result of the above, artificial intelligence can help law enforcement officers in their activities, and in particular in the fight against cybercrime. The advantage of artificial intelligence is the ability to select the necessary information from the initial large array of information.

For example, the police of London's New Scotland Yard use artificial intelligence in crime investigations, where large amounts of data need to be processed in a short period of time. Previously, the team could spend whole months studying them, but now, without exaggeration, it takes a few hours. The degree of tension is quite high, because the police have to find the necessary evidence in a limited time, which is allotted for the detention of the suspect. During one of the investigations, a team of New Scotland Yard employees needed to view about 70 thousand messages in the messenger. It could have taken three months of constant work of a laboratory of 150 people. And if we take into account that investigators are working on several cases at the same time, then the search time could increase significantly [15].

Let's consider how information technologies are used to counter cybercrime based on foreign experience. Thus, in the criminal process of the United States, the use of the latest developments is very active, which allow optimizing procedural actions leading to a successful investigation of crimes in the area studied by the author of the article. For example, a face recognition system is actively used, which is undoubtedly practical and convenient in terms of identifying a person and reducing time for law enforcement agencies.

In the UK, genomic databases based on STR-DNA polymorphism (STR — Short Tandem Repeats) are used. Technical capabilities help to identify a person by his biological materials [16, p.162].

In Canada, the filing and online registration of procedural documents is actively used, and with the help of the web interface, participants in the proceedings can get acquainted in detail with the materials of the criminal case [17, p.25].

It should be emphasized that it is important to develop and apply new technologies in the investigation of crimes, which will have an effective impact both on countering them and in the future on their prevention (prevention). We believe it is necessary to mention that the use of these technologies will reduce the time for conducting operational search and investigative measures, which will allow for other procedural actions. In particular, when working with a large amount of information, it is advisable to use artificial intelligence, which performs the so-called sampling on a certain algorithmization, i.e. searches for the necessary information. For example, if an investigator needs to analyze a large amount of information (read about 100 thousand messages on the seized computer of a suspect and find information of a criminal nature), then a considerable amount of time will be spent on this. In this case, artificial intelligence can become a significant help for the investigator in finding the necessary information. Persons who commit IT crimes may have accomplices, so the analysis of all messages can provide the necessary information for the investigation of a criminal case.

When talking about artificial intelligence, we note that it can also be used for facial recognition — based on its biometric data; voice analysis — its tone, the presence of defects, etc. (especially relevant for online scammers, when, for example, operational staff can receive the results of an operational search event "Wiretapping" and with the help of artificial intelligence to analyze its compliance with the detained criminal); construction of investigative versions and, accordingly, investigative actions on them; analysis of human behavior (for example, during interrogation). Note that artificial intelligence can also be used as an interpreter during interrogation for a person who does not speak the state language.

The specifics of the investigation of cybercrimes lies in the fact that when conducting certain investigative or procedural actions, it is necessary to obtain a court decision. For example, in accordance with Article 186.1 of the Criminal Procedure Code of the Russian Federation, the investigator receives permission from the court to obtain information about cellular communications. In this regard, it is necessary to say about the mobility of cybercriminals, i.e. their ability to commit illegal actions in one place and immediately after their implementation to change their location. With regard to this, it can be noted that the criminal has the opportunity to hide from law enforcement officers and thereby evade responsibility. In this case, it would be advisable to consider obtaining a court decision more quickly, which in general will have an effective effect on the investigation of cybercrimes [18, pp. 78-79].

We consider it reasonable to focus on the category of "user" of the Internet space. This may be any person who has an appropriate access to the Internet information and telecommunications network. It will be beneficial for an attacker if a "new" user, i.e. a short time using a gadget or gullible by himself, thereby easily amenable to manipulation. People of any age can become victims of cybercriminals. This may be a teenager who has recently started using a smartphone, or an elderly person who, having received an "interesting offer" from an attacker, may succumb to his criminal manipulations. It is also appropriate to recall the same bank fraud, when an attacker calls and introduces himself as a bank employee, after which he tries to carry out fraudulent actions.

Indisputable, as the author sees it, is the point of view of S. V. Parkhomenko and K. N. Evdokimova that "prevention of computer crimes is one of the main activities of law enforcement agencies to ensure the information security of Russian society" [19, p. 266]. As a result, the rule "forewarned means armed" works.

Taking into account the above, it is definitely important to carry out preventive measures, and the initiators of such measures may be not only police officers, but also representatives of cellular companies or cyber friends (persons assisting law enforcement officers). Undoubtedly, with the development of information technologies, cybercriminals are able to think through new methods of committing illegal actions, but from the point of view of their prevention, premature awareness of the population will be an important key to countering this category of crimes.

Thus, based on the analysis of the current state of cybercrime, it can be argued that it is necessary to improve methods of countering it, taking into account scientific and technological progress, in parallel with which attackers are constantly developing new criminal schemes. As it was noted, it is necessary to "be one step ahead" of cybercriminals, and this is achievable as a priority by developing the necessary knowledge and skills of law enforcement officers to counter crimes committed using IT technologies. Taking into account the dynamic development and use of information technologies in many spheres of life, we believe that their use in the activities of police officers is very appropriate, such as, for example, the use of artificial intelligence of police officers of London New Scotland Yard. Also, for the purpose of prevention, it seems rational to raise awareness of the population on the safe use of digital technologies, notifying about the "typical" machinations of cybercriminals.

The emergence of new computer programs, methods, methods and tools in the field of detection and investigation of crimes is of great practical importance for more successful counteraction to crimes in the field of information technology. Now law enforcement officers can more quickly identify traces of crimes, simulate images of criminals, collect evidence, etc. In the future, the introduction of new information technologies will help reduce the number of IT crimes committed, as well as increase the percentage of their detection. Thus, the author of the article reported on the practical possibility of using artificial intelligence in the disclosure and investigation of IT crimes.

In the age of information technology, there is also an improvement in the methods and types of committing crimes, and in particular in the field of information technology, therefore, one of the main tasks of successful law enforcement agencies in terms of detecting and investigating crimes is the need to introduce and successfully use IT technologies in the fight against criminal acts.

Thus, of course, it is necessary to further create and implement information technologies in the daily activities of law enforcement agencies of the Russian Federation.

References
1. Kosyrev, A.S. & Loshkarev, A.V. (2019). Cybercrime: a legal aspect. Modern science, 5(1), 221-227. doi:10.22394/2686-7834-2022-1-83-88
2. Andrienko, Yu.A. (2018) Certain aspects of the use of information technologies and work with electronic media in proving criminal cases. Bulletin of the Siberian Law Institute of the Ministry of Internal Affairs of Russia, 3(32), 99-105. Retrieved from https://cyberleninka.ru/article/n/otdelnye-aspekty-ispolzovaniya-informatsionnyh-tehnologiy-i-raboty-s-elektronnymi-nositelyami-informatsii-v-dokazyvanii-po-ugolovnym
3. Timofeev, S.V. & Porokhovoy, E.Y. (2021). Detection and prevention of crimes on the Internet: problems and solutions.Bulletin of the East Siberian Institute of the Ministry of Internal Affairs of Russia, 4, 220-229. Retrieved from https://cyberleninka.ru/article/n/vyyavlenie-i-preduprezhdenie-prestupleniy-v-seti-internet-problemy-i-puti-ih-resheniya. doi:10.24412/2312-3184-2021-4-220-229
4Bulletin of the Student Scientific Society of the State Educational Institution of Higher Education "DONNU". – Donetsk: DONNU, 2022. – Issue 14, volume 4: Jurisprudence, part 2, 247.
5Convention on Computer Information Crime ETS N 185 (Budapest, November 23, 2001).
6. Grybunov O. P. & Baranov A. A. (2020). Some aspects of countering IT crimes. The activity of law enforcement agencies in modern conditions, 55-61. doi:10.55001/2587-9820.2022.82.45.014
7The number of cybercrimes in Russia. (2023). www.tadviser.ru. Retrieved from https://www.tadviser.ru/index.php
8. Furseev, I. (2021). Putin explained the increase in the number of crimes in IT. www.rbc.ru. with the words "we are not in time". Retrieved from https://www.rbc.ru/politics/03/03/2021/603f6ae59a7947b29b0e9b18.
9. Lantukh, E.V., Ishigeev, V.S. & Gribunov, O.P. (2020). The use of special knowledge in the investigation of crimes in the field of computer information. All-Russian Journal of Criminology, 6, 882-890. Retrieved from https://cyberleninka.ru/article/n/ispolzovanie-spetsialnyh-znaniy-pri-rassledovanii-prestupleniy-v-sfere-kompyuternoy-informatsii. doi:10.17150/2500-4255.2020.14(6).882-890
10. Balashova, A. A. (2020). Electronic media and their use in criminal procedural proof. PhD thesis. Moscow.
11Problems of combating crime in the context of digitalization. (2021). A collection of articles of the XIX International Scientific and Practical Conference "Criminal Procedural and criminalistic readings in Altai", dedicated to the memory of Veniamin Konstantinovich Gavlo. Issue XVII. Ed. by S.I. Davydov, V.V. Polyakov. Barnaul: Publishing house of Alt. un-ta.
12. Tretyakova, E. I., Solovyova, Y. L., Poltoratsky, N. A. & Ostapenko, A. A. (2020). The value of digital information in the investigation of crimes .Scientific Digest of the East Siberian Institute of the Ministry of Internal Affairs of Russia, 6(9), 214-219.
13. Malykhina, T. A., (2021) Some features of modern crime trends in Russia. The activity of law enforcement agencies in modern conditions, 79-83.
14The number of IT crimes in Russia has increased by 75.2% since the beginning of the year. ria.ru. Retrieved from https://ria.ru/20200228/1565305566.html
15You are protected by a neural network: how artificial intelligence helps to search for criminals. Retrieved from https://fisher.rbc.ru/article.html?utm_source=rbc&utm_medium=main&utm_campaign=more23w-a-df-m&from=column_15
16. D.V. Kim. (2020). Modern trends in the development of forensic techniques and technologies in criminal proceedings. Krasnoyarsk: Sib. feder. Univ.
17. Edited by S. V. Zuev. (2020). Information technologies in criminal proceedings of foreign countries. Collective of authors. Moscow.
18. Aliev T.F. & Usachev S.I. (2023). Cybercrime: the current state and current problems. Art of Jurisprudence. The art of law, 1(5), 92.
19. Parkhomenko S.V. & Evdokimov K.N. (2015). Prevention of computer crime in the Russian Federation: integrative and complex approaches. All-Russian Journal of Criminology, 2, 265-276. Retrieved from https://cyberleninka.ru/article/n/preduprezhdenie-kompyuternoy-pr doi:10.17150/1996-7756.2015.9(2).265-276

First Peer Review

Peer reviewers' evaluations remain confidential and are not disclosed to the public. Only external reviews, authorized for publication by the article's author(s), are made public. Typically, these final reviews are conducted after the manuscript's revision. Adhering to our double-blind review policy, the reviewer's identity is kept confidential.
The list of publisher reviewers can be found here.

A REVIEW of an article on the topic "Issues of countering crimes committed using IT technologies". The subject of the study. The article proposed for review is devoted to topical issues of countering crimes committed using IT technologies. The author examines the actual declared topics, foreign experience, as well as some practical aspects of the topic. The subject of the study was empirical data, norms of Russian law, and foreign experience. Research methodology. The purpose of the study is not stated directly in the article. At the same time, it can be clearly understood from the title and content of the work. The goal can be designated as the consideration and resolution of certain problematic aspects of the issue of countering crimes committed using IT technologies. Based on the set goals and objectives, the author has chosen the methodological basis of the study. In particular, the author uses a set of general scientific methods of cognition: analysis, synthesis, analogy, deduction, induction, and others. In particular, the methods of analysis and synthesis made it possible to summarize and separate the conclusions of various scientific approaches to the proposed topic, as well as to draw specific conclusions from empirical data. In particular, the possibilities of the empirical research method should be positively assessed, thanks to which, in particular, it was possible to clarify the relevance and significance of the topic. In particular, we note the following author's conclusion on the study: "Studying the current state of crimes in the IT sphere, we note that over the past decade there has been a jump in so-called cybercrimes, the counteraction of which in modern realities is a priority. As the representative of the forensic center of the Investigative Committee Temirlan Salikhov points out, from 2014 to 2022, an almost 50-fold increase in IT crimes was recorded (10 thousand against 510 thousand cybercrimes). Also, according to the representative, attackers use artificial intelligence to create phishing sites or generate text, which in the original version looks like the material of a certain organization or faction [7]. Continuing to cite statistical indicators, we note that in March of this year, the President of the Russian Federation (hereinafter referred to as the Russian Federation), Vladimir Putin, at an expanded meeting of the Ministry of Internal Affairs of the Russian Federation (hereinafter referred to as the Ministry of Internal Affairs of the Russian Federation), announced that the cybercrime index amounted to a quarter of the total number of crimes. According to the head of state, the fight against this type of crime is one of the priorities of the Ministry of Internal Affairs of the Russian Federation." The author also uses the experience of foreign countries on the problems stated in the article. For example, the following is noted: "In the UK, when investigating crimes in the field of information technology, electronic devices are used to detect traces of crime and perform investigative actions. Due to the use of these electronic devices, the evidence base is fixed, which is later used in court. In Canada, the filing and registration of online procedural documents is actively used, and with the help of the Web interface, participants in the proceedings can get acquainted in detail with the materials of the criminal case." Thus, the methodology chosen by the author is fully adequate to the purpose of the study, allows you to study all aspects of the topic in its entirety. Relevance. The relevance of the stated issues is beyond doubt. There are both theoretical and practical aspects of the significance of the proposed topic. From the point of view of theory, the topic of countering crimes committed using IT technologies is complex and ambiguous. Indeed, in the modern world, technology is used not only by law-abiding entities. In this regard, the issue of ensuring national cybersecurity arises. It is difficult to argue with the author of the article that "The development of information technology, in particular, has affected new ways of committing cybercrimes. Thus, the computer network has become a new effective business tool and a new powerful channel for the spread of criminal acts. In this regard, it is necessary to work out the most optimal and effective forms of their counteraction." Thus, scientific research in the proposed field should only be welcomed. Scientific novelty. The scientific novelty of the proposed article requires clarification. First, it can be expressed in the author's specific conclusions. Among them, for example, is the following conclusion: "having analyzed the current state of cybercrime, it is necessary to improve methods of countering it, taking into account scientific and technological progress, in parallel with which attackers are constantly developing new criminal schemes. As it was noted, it is necessary to "be one step ahead" of cybercriminals, and this is achieved as a priority by developing the necessary knowledge and skills among law enforcement officers to counter crimes committed using IT technologies. Taking into account the dynamic development and use of information technologies in many spheres of life, it is advisable to use them in the activities of police officers, such as, for example, the use of artificial intelligence by police officers of London Scotland Yard. Also, for the purpose of prevention, it is rational to raise public awareness on the safe use of digital technologies, notifying about the "typical" criminal frauds of cybercriminals." At the same time, this conclusion does not have scientific novelty, it represents the conclusions of other authors or a generalization of the experience of foreign jurisdictions. In this regard, it is worth clarifying the author's position for the presence of scientific novelty in it. Secondly, the author suggests some generalizations, for example, of foreign practice, but does not always give the author's original commentary on them. In particular, it would be possible to compare Russian and foreign experience, identify certain trends, etc. Thus, the materials of the article may be of particular interest to the scientific community in terms of developing a contribution to the development of science, but only after clarifying the author's contribution, the scientific novelty of the article. Style, structure, content. The subject of the article corresponds to the specialization of the journal "Legal Studies", as it is devoted to legal problems related to the investigation of crimes. The content of the article fully corresponds to the title, as the author has considered the stated problems, and has generally achieved the purpose of the study. The quality of the presentation of the study and its results should be recognized as fully positive. The subject, objectives, methodology and main results of the study follow directly from the text of the article. The design of the work generally meets the requirements for this kind of work. No significant violations of these requirements were found. Bibliography. The quality of the literature used should be highly appreciated. The author actively uses the literature presented by authors from Russia (Aliyev T.F., Usachev S.I., Parkhomenko S.V., Evdokimov K.N., Tretyakova E.I., Solovyova Y.L., Poltoratsky N.A., Ostapenko A.A. and others). Many of the cited scientists are recognized scientists in the field of cybercrime investigation. Thus, the works of the above authors correspond to the research topic, have a sign of sufficiency, and contribute to the disclosure of various aspects of the topic. Appeal to opponents. The author conducted a serious analysis of the current state of the problem under study. All quotes from scientists are accompanied by author's comments. That is, the author shows different points of view on the problem and tries to argue for a more correct one in his opinion. Conclusions, the interest of the readership. The conclusions are fully logical, as they are obtained using a generally accepted methodology. The article may be of interest to the readership in terms of the presence in it of the author's systematic positions in relation to the issues of countering crimes committed using IT technologies, but only after clarifying the scientific novelty of the article. Based on the above, summarizing all the positive and negative sides of the article, "I recommend sending it for revision"

Second Peer Review

Peer reviewers' evaluations remain confidential and are not disclosed to the public. Only external reviews, authorized for publication by the article's author(s), are made public. Typically, these final reviews are conducted after the manuscript's revision. Adhering to our double-blind review policy, the reviewer's identity is kept confidential.
The list of publisher reviewers can be found here.

The subject of the research in the article submitted for review is, as its name implies, the issues of countering crimes committed using IT technologies. The stated boundaries of the study are observed by the author. The methodology of the research is not disclosed in the text of the article, but it is obvious that the scientists used universal dialectical, logical, statistical, comparative legal, formal legal research methods. The relevance of the research topic chosen by the author is justified as follows: "... the progress of IT technologies, in addition to its undeniable advantages, has the reverse side of the coin: fraud, extortion, hacking, drug trafficking, the spread of virus programs and other illegal actions using information technology are becoming more common [1, pp. 221-224]. Everyone knows the fact: "the state of crime is a kind of reflection, an indicator of the processes taking place in society" [2, p. 99]. The development of information technology, in particular, has affected new ways of committing cybercrimes. Thus, the computer network has become a new effective business tool and a new powerful channel for the spread of criminal acts. In this regard, it is necessary to work out the most optimal and effective forms of their counteraction [3, p. 222; 4, p. 16]." Additionally, the scientist needs to list the names of the leading experts who have been engaged in the study of the problems raised in the article, as well as reveal the degree of their study. The scientific novelty of the work is manifested in a number of suggestions by the author: "... it is important to carry out preventive measures, and their initiators can be not only police officers, but also representatives of cellular companies or cyber friends (persons assisting law enforcement officers). Undoubtedly, with the development of information technologies, cybercriminals can think of new methods of committing illegal actions, but from the point of view of their prevention, premature awareness of the population will be an important key to countering this category of crime"; "Taking into account the dynamic development and use of information technologies in many spheres of life, it is advisable to use them in the activities of police officers, such as, for example, the use of artificial intelligence ..."; "... improvement through the emergence of new computer programs, methods, methods and tools in the field of crime detection and investigation is of great practical importance for more successful counteraction to crimes in the field of information technology. Now law enforcement officers can more quickly identify traces of crimes, simulate images of criminals, collect evidence, etc. In the future, the introduction of new information technologies will help reduce the number of IT crimes committed, as well as increase the percentage of their detection," etc. Thus, the article makes a certain contribution to the development of domestic legal science and deserves the attention of the readership, but some of its provisions need to be clarified and specified. The scientific style of the research is fully sustained by the author. The structure of the work is quite logical. In the introductory part of the article, the author substantiates the relevance of his chosen research topic. In the main part of the article, the scientist examines a number of measures to counteract crimes committed using IT technologies, analyzes the relevant positive foreign experience, and makes recommendations on improving measures to combat the category of crimes under study. The final part of the article contains conclusions based on the results of the study. The content of the article corresponds to its title, but is not without some drawbacks. So, the author writes: "Let's look at how information technologies are used in countering cybercrime based on foreign experience. "So, the US criminal process is very actively using the latest developments that allow us to optimize procedural actions leading to a successful investigation of crimes in the area we are investigating." The author does not say what specific developments in the United States are in question. Obviously, part of the text is missing. The scientist notes: "In the UK, when investigating crimes in the field of information technology, electronic devices are used to detect traces of crime and perform investigative actions." What kind of electronic devices are we talking about? The bibliography of the study is presented by 18 sources (an international document, a monograph, scientific articles, analytical and statistical data). From a formal point of view, this is enough; from a factual point of view, some provisions of the article need to be clarified. There is no appeal to opponents as such, which is unacceptable for a scientific article. The author refers to a number of theoretical works solely to confirm his judgments or to illustrate certain provisions of the article. There are conclusions based on the results of the study ("... it is important to develop and apply new technologies in the investigation of crimes, which is effective both in countering them and in the long term in their prevention (prevention). It should also be said that their use will reduce the time for conducting operational search and investigative measures, which will allow for other procedural actions. In particular, when working with a large amount of information, it is advisable to use artificial intelligence, which performs the so-called "sampling" on a certain algorithmization, that is, searches for the necessary information. For example, if an investigator needs to analyze a large amount of information: read about 100 thousand messages on the seized computer of a suspect and find information of a criminal nature, then this will take a very long time. In this case, artificial intelligence can become a faithful assistant to the investigator to find the necessary information. Persons who commit IT crimes may have accomplices, therefore, the analysis of all messages can provide the necessary information for the investigation of a criminal case. Considering artificial intelligence, we note that it can also be used for face recognition – based on its biometric data; voice analysis – its tone, the presence of defects, etc. (especially important for online scammers, when, for example, operational staff can receive the results of an operational search event "Wiretapping" and using artificial intelligence to analyze its correspondence with the detained criminal); building investigative versions and, accordingly, investigative actions to them; analyzing human behavior (for example, during interrogation). Note that artificial intelligence can also be used as an interpreter during interrogation for a person who does not speak Russian. In the age of information technology, there is also an improvement in the methods and types of committing crimes, and in particular in the field of information technology, therefore, one of the main tasks of successful law enforcement agencies in terms of detecting and investigating crimes is the need to introduce and successfully use IT technologies in the fight against criminal acts. Thus, the further creation and implementation of information technologies in the work of law enforcement agencies"), however, need to be finalized. Conclusions should be concise, clear and specific. Examples illustrating certain provisions of the work should be given in the main part of the article. The article should not contain conclusions that have not been discussed in detail in the main part of the study. Finally, a part of the text is missing in the last sentence. The article needs additional proofreading with the involvement of a philologist. There are typos, spelling, punctuation, syntactic, and stylistic errors in it, which obscures the meaning of the text and makes it difficult to read it.
The interest of the readership in the article submitted for review can be shown primarily by specialists in the field of criminal law and criminology, provided that it is finalized: disclosure of the research methodology, additional justification of the relevance of its topic, introduction of additional elements of discussion, clarification of certain provisions of the work, formulation of clear and specific conclusions based on the results of the study, elimination of violations in the design of the work.

Third Peer Review

Peer reviewers' evaluations remain confidential and are not disclosed to the public. Only external reviews, authorized for publication by the article's author(s), are made public. Typically, these final reviews are conducted after the manuscript's revision. Adhering to our double-blind review policy, the reviewer's identity is kept confidential.
The list of publisher reviewers can be found here.

The subject of the study. In the peer-reviewed article "Issues of countering crimes committed using IT technologies", the subject of the study is the existing methods and techniques of combating crimes committed using information and communication technologies (IT technologies), including in a comparative legal aspect. Research methodology. According to the content of the article, it can be concluded that the author used many modern research methods, both general scientific and private. The methodological apparatus of the work consists of the following dialectical techniques and methods of scientific cognition: analysis, abstraction, induction, deduction, hypothesis, analogy, synthesis, typology, classification, systematization and generalization. The author applied such methods as: historical, theoretical and prognostic, formal legal, system-structural, legal modeling, comparative law, etc. The use of modern scientific methods (techniques and methods) made it possible to study existing approaches, views on the problem, develop an author's position and argue it. It can also be noted that the article used a combination of theoretical and empirical information. The relevance of research. The relevance of this topic is beyond doubt. Digitalization of all spheres of life not only creates certain amenities, but also provides great opportunities for committing illegal actions using information and communication technologies, so-called cybercrimes. Cybercrime is a relatively new social phenomenon (as a socially dangerous act), and accordingly, not all issues of countering it are resolved at the level of legislation and law enforcement. For this reason, any scientific developments on this issue deserve attention and may have practical significance. Scientific novelty. It cannot be said that the author of this article for the first time in Russian jurisprudence addressed the issues of countering crimes committed using IT technologies. However, his research has elements of scientific novelty, some conclusions and suggestions deserve attention (for example, "Taking into account the dynamic development and use of information technologies in many spheres of life, we believe that their use in the activities of police officers is very appropriate, such as the use of artificial intelligence... Also, for the purpose of prevention, it seems rational to raise public awareness of the safe use of digital technologies by notifying about the "typical" machinations of cybercriminals"). Style, structure, content. In general, the article is written in a scientific style, using special scientific terminology. The material is presented consistently and competently. However, the work is not without drawbacks, for example, the correctness of the phrase "digitalization of the population" is questionable or there are some stylistic errors (for example, repetitions of words in a sentence (...)...usage), etc.). However, the noted remarks are disposable and do not detract from the work done by the author. The article is logically structured. The content of the article corresponds to its title. The topic has been revealed. As a wish, the author can indicate the need to finalize the introductory and final parts of the article, since special requirements are imposed on them in scientific publications. Bibliography. The author has used a sufficient number of doctrinal sources. The references to the bibliographic sources are correct. Appeal to opponents. There is a scientific controversy in the work. All appeals to opponents are correct. Conclusions, the interest of the readership. The article "Issues of countering crimes committed using IT technologies" is recommended for publication, because it meets the requirements for scientific publications, is written on an urgent topic, is characterized by scientific novelty and may have practical significance. This article may be of interest to a wide readership, primarily for specialists in the field of criminal procedure law and criminology, as well as for teachers and students of law schools and faculties.
Link to this article

You can simply select and copy link from below text field.


Other our sites:
Official Website of NOTA BENE / Aurora Group s.r.o.