Tsvetkova A.D. —
Certain problems in the appointment and production of unusual forensic examinations
// Security Issues. – 2024. – ¹ 2.
– P. 51 - 66.
DOI: 10.25136/2409-7543.2024.2.69947
URL: https://en.e-notabene.ru/nb/article_69947.html
Read the article
Abstract: The aspects of determining the list of traditional and "non-traditional" expert examinations, normative fixation of the lists of forensic examinations, training of personnel with appropriate qualifications, familiarization of investigators, inquirers and judges with new expert areas are subjected to a detailed study. The author also focuses separately on the justification of the possibility of recognizing as a non-traditional research of keyboard handwriting expertise and its introduction into the practice of detection and investigation of computer crimes. The author concludes that it is necessary to comprehensively resolve all the problems discussed. It is proposed: to develop a unified approach to determining the criteria of non-traditional forensic investigations; to approve a unified list of traditional expert areas for all departments; to strengthen the scientific development of new potential genera and types of forensic examinations; to organize on the basis of state universities courses of additional education in new forensic areas; to educate the subjects of forensic activity in the part of non-traditional forensic experts. In contrast to previous works on this topic, the present study proposes criteria that can be used to distinguish between traditional and non-traditional forensic activities, as well as to distinguish them from parascientific knowledge; proposes a systemic algorithm for solving all the identified problems and project modeling of this algorithm on the phenomenon of keyboard handwriting, insufficiently researched in the legal sphere, the research of which can become an effective mechanism for increasing the efficiency of forensic activities; and proposes a systemic algorithm for solving all the identified problems and project modeling of this algorithm on the phenomenon of keystroke dynamics, the research of which can become an effective mechanism for increasing the efficiency of forensic activities.
Tsvetkova A.D. —
Information about computer handwriting: The challenges of finding a balance between individual liberty and state security
// Security Issues. – 2023. – ¹ 3.
– P. 71 - 83.
DOI: 10.25136/2409-7543.2023.3.43749
URL: https://en.e-notabene.ru/nb/article_43749.html
Read the article
Abstract: The present study is devoted to the introduction of biometric identification systems in law enforcement. The author pays special attention to the phenomenon of computer handwriting, examining in detail the constitutional and legal aspects of the use of knowledge about it. For this purpose a wide methodological apparatus is used: comparative-legal method, method of analogy, deduction, method of modelling and others. The Russian practice and potential for further development are compared with the experience of foreign countries both in the regulation of general issues of biometric personal data and in situations of legal regulation of computer handwriting data. The author investigates how to simultaneously solve the problems of detection and investigation of offences in which printed texts act as evidentiary materials, and at the same time preserve human rights to privacy, personal and family secrecy, anonymity on the Internet. It is noted that computer handwriting is a rather young phenomenon for legal science; there is still no in-depth study of it from the perspective of this field of knowledge. This paper is only a beginning in understanding the topic under consideration. It raises basic questions: whether it is permissible to use knowledge about computer handwriting, how it should be protected and where it should be stored, whether it is necessary to limit the existing commercial interest in its use. As a result, the author comes to the following conclusions: it is permissible and necessary to collect information on computer handwriting, as this will reduce infringements on the natural rights of man and citizen. For such collection it is necessary to use a centralised state system in which all the requirements for the security of critical information infrastructure are implemented. However, before such a system is put into operation, it is necessary to support commercial companies in relevant developments and oblige them to provide information about users' computer handwriting at the request of authorised persons.