Translate this page:
Please select your language to translate the article


You can just close the window to don't translate
Library
Your profile

Back to contents

Police and Investigative Activity
Reference:

The Use of Information Technology in Investigation: Directions, Problems and Prospects

Frolov Vyacheslav Vladimirovich

Lecturer of the Department of Criminology, Kuban State Agrarian University named after I.T. Trubilin

350044, Russia, Krasnodar Territory, Krasnodar, Kalinina str., 13, room 030

Slava.Frolov.84@mail.ru
Other publications by this author
 

 

DOI:

10.25136/2409-7810.2023.2.40032

EDN:

AOLZLH

Received:

23-03-2023


Published:

31-03-2023


Abstract: A high-quality investigation of a crime is impossible without the use of technical means and achievements in the field of information technology. The object of the research of this scientific article is the use of information technologies in the investigation and disclosure of crimes, the subject is the patterns of this activity. The purpose of the scientific article is to determine the directions of the use of information technologies in the investigation of crimes, their characteristics, as well as to establish the reasons that slow down this process and identify priority tasks, the solution of which will eliminate these obstacles. When determining the directions of using information technologies in the investigation, the author was guided by the components (aspects) of crime investigation activities (cognitive, certifying, organizational). It is noted that the process of integrating information technologies into the investigation of crimes is a complex construction of a digital system of criminal justice, which will optimize the activities of the investigator by increasing the efficiency of working with information. The methodology of the conducted research is determined by its purpose and objectives. It is based on a systematic approach to the study of the use of information technology in the investigation and disclosure of crimes. The research methodology used when writing a scientific article was implemented using the following methods: structural and substantive analysis of scientific papers devoted to the topic of this study; logical (when presenting all the material, formulating conclusions, suggestions and recommendations); comparative legal (criminal procedure legislation, regulatory legal acts) and other research methods.


Keywords:

Information technology, investigation, forensic records, interaction, organization, planning, electronic criminal case, technique, tactics, information

This article is automatically translated.

According to Article 2 of Federal Law No. 149-FZ of 27.07.2006 (as amended on 05.12.2022) "On Information, Information technologies and Information Protection", information technologies (hereinafter referred to as IT) – processes, methods of searching, collecting, storing, processing, providing, distributing information and ways of implementing such processes and methods [1]. IT is now widely used when working with information in various fields of activity (economy, education, energy, etc.).

A high-quality investigation of a crime is impossible without the use of technical means and achievements in the field of IT [2]. IT in the investigation of crimes is a set of techniques and methods for collecting, processing, storing, presenting and using criminally significant information, using special means (computers, laptops, smartphones, software, computer networks, etc. [3]) aimed at making organizational, tactical and methodological decisions by the investigator with their subsequent implementation ensuring the achievement of the objectives of the investigation.

At the present stage of society's development, there is an intensive introduction of IT (basic and applied) in various fields of activity, including in the activities of crime detection and investigation, and there are not individual acts of IT implementation, but "complex construction of a digital system nationwide" [4, p. 25]. IT allows you to optimize crime investigation activities by increasing the efficiency of working with information (its search, collection, storage, processing, provision and use).

There are different points of view among scientists on the main directions of using IT in the investigation of crimes. The authors of the textbook "Digital Criminalistics" indicate the following areas of IT use in law enforcement agencies: 1) automated data processing systems; 2) automated information retrieval systems; 3) automated information and reference systems; 4) automated workstations; 5) automated control systems; 6) expert (information-analytical and recommending) systems [4, p. 26]. I.N. Yakovenko identifies six areas the use of computer technology in the investigation and disclosure of crimes: 1) automated control systems and automated workstations; 2) information and reference systems; 3) expert consulting systems; 4) calculation and analytical systems; 5) information training systems; 6) image processing programs [5, p. 32]. It should be noted the correlation of concepts: "computer technologies", "information technologies" and "digital technologies".  Digital technologies are technologies for collecting, storing, processing, searching, transmitting and presenting data in electronic form. Computer technology, as well as Information Technology (IT), is a generalized name for technologies responsible for storing, transmitting, processing, protecting and reproducing information using computers. Accordingly, these concepts are identical.

Agreeing with the indicated directions of using IT in the investigation, we will try to streamline and concretize them. As A.A. Rudykh rightly notes, "the task of digital technologies used in the activities of law enforcement agencies for the detection and investigation of crimes is to adapt existing basic algorithms for working with information to solve problems of criminalistic activity" [6, p. 61]. Therefore, in our proposed classification, we will take as a basis the components (aspects) of crime investigation activities (cognitive, certifying, organizational):

1) the use of IT for the search, detection, seizure and fixation of criminally significant information in the course of investigative actions and its preliminary investigation:

– digital technical means of finding traces of a crime. It should be noted here that the process of scientific and technological development has made it possible to increase the productivity and efficiency of traditional technical means (endoscope, GPR, gas analyzer, etc.) by upgrading them: a) equipping these devices with a screen (display), which allows you to visually monitor the implementation of search activities online; b) the availability of software, allowing you to adjust the settings of the technical means depending on the characteristics of the investigated situation, as well as to measure the detected traces (size, distance between objects, mass, etc.); c) immediate input of the detected data into a computer, smartphone, etc.;

– public IT technologies for finding orienting information about a person in open Internet resources;

– IT search for digital information (digital traces). These may include software and hardware-software technical means aimed at identifying and extracting this information from mobile phones, smartphones, handheld personal computers, personal computers, cloud services, etc. while overcoming their means of protection [7, 8]. For this purpose, hardware and software complexes are used: Cellebrite UFED, "MOBILE CRIMINALIST EXPERT PLUS", "MOBILE CRIMINALIST DESKTOP", etc.;

– currently, digital photo and video recording, as well as sound recording are most widely used to record traces and detected information, as well as the course of investigative actions;

– the use of speech-to-text conversion programs or transcribers (devices that significantly speed up the documentation of sound recordings and video recordings);

– adaptation and subsequent widespread use of "other technologies" for fixing investigative actions, operational investigative measures and expert research in the production process. Thus, the practice of investigation gradually includes the use of drones (UAVs) applicable for photographing the scene of some types of crimes [9], and the use of not only flying drones is noted, but also the possibility of using underwater drones in necessary situations [10]. Another promising direction is the means of three-dimensional shooting used to create three-dimensional panoramas and models of the scene of the incident, and are also used in expert activities [11, 12]

2) the use of IT for the search, detection, seizure and fixation of criminalistically significant information of operational investigative measures and its preliminary investigation during production. The quality of the investigation of a crime depends on its operational support. The use of IT in operational investigative activities will also be one of the promising areas. The IT listed above, used in the production of investigative actions for the search, detection, seizure and fixation of traces of a crime, are used as part of operational search activities for the purpose of searching, detecting and fixing orienting information.

3) the use of IT for the registration and search of criminally significant objects (international — records of the International Criminal Police Organization "Interpol" [13], federal [14], regional (service area of the republic, region, region), local (service area of the city and district (municipal) level):

– automated statistical, operational-reference, investigative, forensic, forensic accounting;

– multifunctional automated systems that have the function of registering and searching for criminally significant objects (hardware and software complex "Stream"; stationary hardware and software complex for automatic recognition of state registration plates of vehicles and fixing traffic violations "AvtoUragan VSM2"; hardware and software complex "Safe City", etc.);

– records that are not directly related to the investigation and disclosure of crimes, because they do not have the function of registering and searching for criminally significant objects). Such AIPS are used by various organizations and institutions for the qualitative implementation of their activities.

4) the use of IT to ensure departmental and interdepartmental interaction of law enforcement agencies, as well as remote production of investigative actions (interrogation, confrontation, identification). In 2012, the Concept of creating a unified system of information and analytical support for the activities of the Ministry of Internal Affairs of Russia was approved (ISOD - a set of automated information processing systems used in the Ministry of Internal Affairs of Russia, software and hardware complexes and complexes of software and hardware, communication and data transmission systems necessary for effective support of activities). The implementation of this project is carried out in stages, to date most of the work has been completed, plans for 2022-2023 are being implemented. In 2015, as part of the execution of the State Contract dated 03.12.2013 No. 0410/123, the Ministry of Communications and Mass Communications of the Russian Federation began creating a unified information and analytical system of the Investigative Committee of the Russian Federation (analogous to the ISOD of the Ministry of Internal Affairs of Russia).

The subsequent use of IT in the interdepartmental interaction of law enforcement agencies determines the unification of departmental information and analytical systems on a single information platform, as this is dictated by the goals and objectives of the activities of these bodies, which will significantly increase the quality of their work.

In addition, in accordance with Article 189.1 of the Code of Criminal Procedure of the Russian Federation (introduced by Federal Law No. 501-FZ of 30.12.2021), an investigator has the right to conduct an interrogation, confrontation, identification by using video conferencing systems of state bodies conducting a preliminary investigation, if technically possible, i.e. the possibility of remote investigative actions is allowed, and accordingly, the use of information and telecommunication technologies.

5) the use of IT in forensic expertise; IT has been used in forensic expertise for more than 50 years [15, 48-49]. It is carried out in the following directions:

– IT used to automate the collection and processing of experimental data obtained during physico-chemical, soil science, biological and other studies by chromatography, mass spectrometry, ultraviolet, infrared spectroscopy, X-ray spectral, X-ray diffraction, atomic spectral and other types of analysis;

– creation of data banks and automated information retrieval systems (AIPS) for specific objects of expertise, using IT to accumulate, process large amounts of information and issue relevant data upon request; 

– IT, applied image analysis when conducting expert studies of handwriting, fingerprinting, tracological, ballistic, portrait to solve identification and diagnostic tasks;

– the use of IT in conducting examinations (fire-technical, explosive, automotive, etc.) to perform calculations according to formulas for modeling the conditions of the phenomenon under study;

– the use of IT decision support in the judicial system not only to automate research, but also expert opinion.

As scientists rightly point out, the digitalization processes in forensic activities have given a new impetus to the development of directions for the use of artificial intelligence IT systems (software complexes for automated solutions of expert tasks) [1].

6) the use of IT in the organization and planning of investigations, organizational and tactical support for the production of investigative actions and in the methods of investigation of certain types and groups of crimes. A.P. Syrovov and A.M. Larin in the 1970s. a network method of investigation planning was developed and proposed for use. In practice, this method was practically not dreamed of, because the process of its implementation was complicated, took a lot of time. At the same time, a program of actions of the investigative team was developed and applied, traveling to the scene of various types of crimes [16, p. 48]. In the future, L.G. Vidonov, N.A. Selivanov, L.A. Soy-Serko, A.A. Eisman and many other forensic scientists were engaged in programming the activities of the crime investigator, its automation through the use of computer technology. So, N.A. Selivanov conducted an analysis and generalization of investigative practice in the investigation of murders, conducted coding of the result obtained. The result of the work done was the publication of the conducted research in the collections "Investigative Practice". Using this information, investigators were able to find forensic recommendations on the murders they were investigating, finding a similar investigative situation in the handbook, i.e. practitioners "received factual justification for making a decision in the form of experience of a similar investigation" (IT decision support) [17]. In fact, the conducted research has established that the main elements of the organization, planning and methodology of crime investigation can be typified and presented in the form of programs and algorithms.

The development of information technologies and their integration into the investigator's activities, as well as the research of forensic scientists, allow us to take a step from the information and reference software package "Automated workplace of the investigator" (ARM "Pre-trial proceedings"), which optimized the investigator's activities for documenting, recording information during the investigation of crimes, to the creation and active use of AIS in the form of automated methods of investigation of certain types of crimes [18], including: up-to-date information about the elements of the criminalistic characteristics of the crime (a typical computer model of the crime); a list of circumstances to be established during the investigation of this type or group of crimes; typical investigative situations of the initial stage of the investigation; standard investigative versions; algorithms of investigative, verification, organizational and preparatory procedural and other actions carried out in specific investigative situations for their resolution, etc.) and representing automated information systems to support the investigator's decision-making: on the organization and planning of the investigation as a whole, as well as investigative actions and tactical operations carried out within the framework of this investigation; on the tactics of investigative actions; investigation methodology. AIS data can be implemented on the basis of stationary hardware and software complexes, as well as on smartphones and applications.       

Thus, the main directions of using IT in the investigation and disclosure of crimes are:

4) the use of IT for the search, detection, seizure and fixation of criminally significant information in the course of investigative actions and its preliminary investigation;

5) the use of IT for the search, detection, seizure and fixation of criminalistically significant information of operational investigative measures and its preliminary investigation during production;

6) the use of IT for the registration and search of criminalistically significant objects (automated statistical, operational-reference, investigative, forensic, expert-forensic records; multifunctional automated systems that have the function of registration and search of criminalistically significant objects; records that are not directly related to the investigation and disclosure of crimes, because in they lack the function of registration and search of criminally significant objects);

7) the use of IT to ensure departmental and interdepartmental interaction of law enforcement agencies, as well as remote production of investigative actions (interrogation, confrontation, identification);

8) the use of IT in forensic activities;

9) the use of IT in the organization and planning of investigations, organizational and tactical support for the production of investigative actions and in the methods of investigation of certain types and groups of crimes.   

It should be stated that there is a wide range of IT applications in the investigation and disclosure of crimes, while it is necessary to note the obstacles (legal, organizational, technical, etc.) that slow down this process:

– insufficient equipment of the territorial divisions of law enforcement agencies with appropriate equipment (the level of penetration of digital technologies into jurisprudence is no more than 30%, and the share of available online legal services does not exceed 4-5%; mobile automated control systems are not widely used in practice, official publications of the internal affairs bodies do not contain information about their widespread introduction [19]); the surveys conducted by the author of the investigators of the investigative bodies of the Krasnodar Territory showed that more than 50% of their personal computers are not equipped with specialized software);

– a small number of studies on the applied use of IT in investigative activities (most scientific papers relate to the use of IT in forensic activities [6]);

– insufficient regulation of the use of IT in the Criminal Procedure Code of the Russian Federation within the framework of the investigation, as well as insufficient development of issues of organization and methodology of their application (a small amount of scientific and practical recommendations on the effective use of IT by the subjects of the investigation);

Taking into account the fact that the process of IT development will continue at a rapid pace, the following tasks will need to be carried out:

– to unify the conceptual apparatus in this field of knowledge;

– to formalize the use of IT in working with evidentiary information during its search, detection, seizure, fixation and research [21];

– implementation of professional training of lawyers, taking into account their active use in their professional activities, including investigative, IT and scientific and technical means. A modern law enforcement officer should fully know the conceptual apparatus of this area, as well as have the ability to apply IT in their professional activities;

– development of an "Electronic criminal case" (transition to recording investigative actions, drawing up other documents in electronic form; development of a convenient and reliable method of certifying electronic documents; ensuring the possibility of remote movement of criminal case materials between the investigative body, the body of inquiry, the prosecutor's office and the court within the framework and scope of the preliminary investigation; implementation of the possibility of remote access to materials of the criminal case of other participants in the investigation (victim, suspect, etc.) within the framework and scope provided for by the Code of Criminal Procedure of the Russian Federation). For example, we are developing a hardware and software complex that allows for detection, inspection, preliminary investigation, fixation of traces and the situation of a traffic accident during an inspection of the scene of the accident, as well as other investigative actions. The basis of the software and hardware complex (central unit) of a PC (laptop or tablet computer) contains software for processing information coming from forensic equipment attached to it: a digital camera, compass, high-precision positioning device, rangefinder, electron microscope and electronic magnifier, UV emitter, temperature measuring device, endoscope, etc. The central device itself contains a hardware and software unit: a program for the formation of a protocol for the inspection of the scene of incidents and other investigative actions, as well as the creation of other documents (protocols, resolutions, requests, etc.); a program for drawing up a schematic diagram of the scene; programs to ensure the operation of the attached forensic equipment; reference legal systems; automated information and logical system for the organization, planning and methods of investigation of road accidents; a program for compiling a subjective photo-composite portrait, etc.; it is also planned to implement the possibility of prompt access to forensic records (operational reference, search, reference and auxiliary) through telecommunication technologies. The following method of certification of familiarization with the protocol of inspection of the scene is proposed. The generated file "Protocol of inspection of the scene of the incident" is signed by all participants of this investigative action through specialized software for drafting procedural documents, including the function of a word processor, with the augmented function "Signature". The signature function is carried out in combination with photo, video, audio fixation and the use of a stylus (digital pen). When the "Signature" function is pressed, the participant of the inspection of the scene must bring his face to the camera to give his full name (microphone recording works) and sign with a stylus. Thus, triple authentication takes place (image, voice, signature with a stylus). The adoption of this method of certifying familiarization with the protocol of the investigative action, as indicated above, will require making appropriate changes to the Code of Criminal Procedure of the Russian Federation.

References
1. On Information, Information Technologies and Information Protection: Federal Law No. 149-FZ of 27.07.2006 (as amended on 05.12.2022) [Electronic resource]. Access mode: https://www.consultant.ru/document/cons_doc_LAW_61798/c5051782233acca771e9adb35b47d3fb82c9ff1c/
2. Stepanenko D.A., Bakhteev D.V., Evstratova Yu.A. The use of artificial intelligence systems in law enforcement // All-Russian Journal of Criminology. 2020. Vol. 14. No. 2. C. 206-214.
3. On the federal target program "National Technological Base" for 2007-2011 (with amendments and additions): Resolution of the Government of the Russian Federation No. 54 of January 29, 2007 [Electronic resource]. – Access mode: https://base .garant.ru/190626/
4. Digital criminalistics: textbook for universities / V.B. Vekhov [et al.]; edited by V.B. Vekhov, S.V. Zuev. M.: Yurayt Publishing House, 2021.
5. Yakovenko I.N. The current state and prospects of the use of information technologies in the disclosure and investigation of crimes: dis. ... cand. jurid. sciences. M., 2005.
6. Rudykh A.A. Information and technological support of criminalistic activities for the investigation of crimes in the field of information technologies: dis. ... cand. jurid. sciences'. Rostov N./D., 2020.
7. Kalyuzhny A.N. Some aspects of the use of special forensic technology in the detection of crimes // Criminalistics in the context of the development of the information society (59th annual forensic readings): collection of articles of the International scientific and practical conference. Moscow: Academy of Management of the Ministry of Internal Affairs of Russia, 2018. pp. 109-114.
8. Rogova I.A., Burtseva E.V. The practice of using UFED – a universal device for forensic investigation of mobile devices // Eurasian Union of Scientists. 2015. No. 7 (16). pp. 97-100
9. Kuznetsov S.E. Types, techniques and methods of forensic aerial photography // Criminalistics – past, present, future: achievements and prospects of development: materials of the international scientific and practical conference (Moscow, October 17, 2019) / under the general editorship of A.M. Bagmet. M.: Moscow Academy of the Investigative Committee of the Russian Federation, 2019. pp. 327-321.
10. Shvets S.V. Inspection of the accident site using underwater drones // Results of research work for 2021: materials of the Jubilee scientific and practical conference dedicated to the 100th anniversary of the Kuban State Agrarian University / Otv. for the issue of A.G. Koshchaev. Krasnodar, 2022. pp. 784-785.
11. Ovsyannikov V.V. Prospects of using 3D scanning in expert practice // Law and the State: theory and practice. 2020. No. 12(192). pp. 234-236.
12. Report of the Chairman of the Investigative Committee of the Russian Federation Bastrykin A.I. at the International Scientific and Practical Conference at the Academy of the Investigative Committee of the Russian Federation on the topic "Disclosure and investigation of serial and past crimes // https://proza.ru/2018/04/02/1456
13. Order of the Ministry of Internal Affairs of the Russian Federation No. 786, Ministry of Justice of the Russian Federation No. 310, FSB of the Russian Federation No. 470, FSO of the Russian Federation No. 454, FSKN of the Russian Federation No. 333, FCS of the Russian Federation No. 971 dated 06.10.2006 "On approval of the Instructions for organizing information support for cooperation through Interpol" // https://mvd.consultant.ru/documents/4375
14. Agreement on the relationship of the Ministries of Internal Affairs in the field of information exchange (Cholpon-Ata, August 3, 1992) of the Ministry of Internal Affairs of the Republic of Armenia, the Republic of Belarus, the Republic of Georgia, the Republic of Kazakhstan, the Republic of Kyrgyzstan, the Republic of Moldova, the Russian Federation, the Republic of Tajikistan, the Republic of Uzbekistan, Ukraine // https://docs.cntd.ru/document/1901967
15. Rossinskaya E. R., Galyashina E. I., Zinin A.M. Theory of forensic examination (Forensic expert science): textbook / edited by E. R. Rossinskaya. M.: Norm; Infra-M, 2020.
16. Gritsaev S.I. Organizational functions of the investigator: criminalistic aspect: monograph. Krasnodar: KubGAU, 2016.
17. Gritsaev S.I., Pomazanov V.V., Zabolotnyaya Yu.A. Computerization of target determination and investigation planning // Polythematic network electronic scientific journal of Kuban State Agrarian University [Electronic resource]. Krasnodar: KubGAU, 2015. – ¹ 04(108). Access mode: http://ej.kubagro.ru/2015/04/pdf/36.pdf
18. Vekhov V.B. Automated methods of crime investigation as a new direction in forensic technology // Izvestiya Tula State University. Economic and legal sciences. 2016. No. 3-2. pp. 8-11.
19. Mirzoev G.B. Reflections on the future of the legal profession in the context of digital innovations // Scientific Proceedings of the Russian Academy of Advocacy and Notariate. 2020. No. 3 (58). pp. 5-8.
20. Gritsaev S.I., Pomazanov V.V. Automated workplace of the investigator during the investigation: possibilities and application // Russian investigator. 2019. No. 2. pp. 10-14.
21. Grib V.G., Tyunis I.O. Criminalistics and digital technologies // A Russian investigator. 2019. No. 4. pp. 9-12.

First Peer Review

Peer reviewers' evaluations remain confidential and are not disclosed to the public. Only external reviews, authorized for publication by the article's author(s), are made public. Typically, these final reviews are conducted after the manuscript's revision. Adhering to our double-blind review policy, the reviewer's identity is kept confidential.
The list of publisher reviewers can be found here.

The paper submitted for review on the topic: "The use of information technology in investigation: directions, problems and prospects" was prepared by the author on an urgent topic. According to the researcher, a high-quality investigation of crimes is impossible without the use of technical means and information technology, and it is difficult to disagree with his opinion. In the article, the author cites and reveals the concept of the use of information technology in the investigation of crimes, by which the researcher means a set of techniques and methods for collecting, processing, storing, presenting and using criminally significant information, using special tools (computers, laptops, smartphones, software, computer networks, etc.) aimed at making the investigator organizational, tactical and methodological solutions with their subsequent implementation, ensuring the achievement of the objectives of the investigation. In addition, the author reasonably analyzes the research of other scientists in the field under consideration, identifies areas of use of information technology in law enforcement. At the same time, in our opinion, the author's research does not fully present problematic issues related to the use of information technology in the investigation of crimes, despite the fact that they were stated in the title of the article. Further, the author proposes a certain classification as the basis or components (aspects) of crime investigation activities (cognitive, certifying and organizational), but further in the text these areas are not explored and are not disclosed, which the author wanted to tell us can only guess. At the end of the study, the author outlined in the form of theses the directions that, in his opinion, "are some obstacles hindering the process of solving crimes." In our opinion, the style of presentation, the structure of the work and the content require additional processing of the material. The paper should identify problematic issues, law enforcement practice, empirical material from official sources that the researcher should refer to. At the end of the work, it is necessary to identify ways to solve the problematic issues raised on the topic aimed at improving legislation and law enforcement practice. In addition, the author analyzes two normative legal acts regulating the use of information technology in the investigation of crimes, but this is not enough for this work. It is advisable to add additional empirical material to this study, which makes it possible to representatively identify problematic issues and outline ways to solve them using statistical data on the use of new information technologies both in the activities of investigative bodies and employees of operational units and other law enforcement agencies of internal affairs. In general, the work is of some interest to the readership studying the use of information technology in the investigation of crimes, but needs to be finalized taking into account the comments made.

Second Peer Review

Peer reviewers' evaluations remain confidential and are not disclosed to the public. Only external reviews, authorized for publication by the article's author(s), are made public. Typically, these final reviews are conducted after the manuscript's revision. Adhering to our double-blind review policy, the reviewer's identity is kept confidential.
The list of publisher reviewers can be found here.

A REVIEW of an article on the topic "The use of information technology in investigation: directions, problems and prospects". The subject of the study. The article proposed for review is devoted to the directions, problems and prospects of using "... information technologies in investigation ...". The author has chosen a special subject of research: the proposed issues are investigated from the point of view of information, criminal, criminal procedural law, criminalistics, while the author notes that "IT allows you to optimize crime investigation activities by increasing the efficiency of working with information (its search, collection, storage, processing, provision and use)." The NPA of Russia relevant to the purpose of the study is being studied. A large volume of Russian scientific literature on the stated issues is also studied and summarized, analysis and discussion with these opposing authors are present. At the same time, the author notes: "At the present stage of society's development, there is an intensive introduction of IT (basic and applied) in various fields of activity, including in the activities of crime detection and investigation ...". Research methodology. The purpose of the study is determined by the title and content of the work: "The subsequent use of IT in interdepartmental interaction of law enforcement agencies determines the unification of departmental information and analytical systems on a single information platform, as this is dictated by the goals and objectives of the activities of these bodies, which will significantly increase the quality of their work", "Agreeing with the indicated areas of use of IT in the investigation, we will try to streamline and to specify them." They can be designated as the consideration and resolution of certain problematic aspects related to the above-mentioned issues and the use of certain experience. Based on the set goals and objectives, the author has chosen a certain methodological basis for the study. The author uses a set of private scientific, special legal methods of cognition. In particular, the methods of analysis and synthesis made it possible to generalize approaches to the proposed topic and influenced the author's conclusions. The most important role was played by special legal methods. In particular, the author used formal legal and comparative legal methods, which made it possible to analyze and interpret the norms of acts of Russian legislation and compare various documents. In particular, the following conclusions are drawn: "The quality of the investigation of a crime depends on its operational support. The use of IT in operational investigative activities will also be one of the promising areas," etc. Thus, the methodology chosen by the author is fully adequate to the purpose of the article, allows you to study many aspects of the topic. The relevance of the stated issues is beyond doubt. This topic is important in Russia, from a legal point of view, the work proposed by the author can be considered relevant, namely, he notes "Among scientists there are different points of view on the main directions of using IT in crime investigation." And in fact, an analysis of the opponents' work should follow here, and it follows and the author shows the ability to master the material. Thus, scientific research in the proposed field is only to be welcomed. Scientific novelty. The scientific novelty of the proposed article is beyond doubt. It is expressed in the specific scientific conclusions of the author. Among them, for example, is the following: "... in our proposed classification, we will take as a basis the components (aspects) of crime investigation activities (cognitive, certifying, organizational) ..." (the classification is given). As can be seen, these and other "theoretical" conclusions can be used in further research. Thus, the materials of the article as presented may be of interest to the scientific community. Style, structure, content. The subject of the article corresponds to the specialization of the journal "Police and Investigative activities", as it is devoted to the directions, problems and prospects of using "... information technologies in investigation ...". The article contains an analysis of the opponents' scientific works, so the author notes that a question close to this topic has already been raised and the author uses their materials, discusses with opponents. The content of the article corresponds to the title, since the author considered the stated problems and achieved the goal of his research. The quality of the presentation of the study and its results should be recognized as improved. The subject, objectives, methodology, research results, and scientific novelty directly follow from the text of the article. The design of the work meets the requirements for this kind of work. No significant violations of these requirements were found, except for a typo "... the main directions of using IT in the investigation and disclosure of crimes are:" and further paragraphs 4-9, etc. (why not from 1?). The bibliography is quite complete, contains publications that the author refers to. This allows the author to correctly identify problems and put them up for discussion. The quality of the literature presented and used should be highly appreciated. The presence of scientific literature showed the validity of the author's conclusions and influenced the author's conclusions. The works of these authors correspond to the research topic, have a sign of sufficiency, and contribute to the disclosure of many aspects of the topic. Appeal to opponents. The author conducted a serious analysis of the current state of the problem under study. The author describes the opponents' different points of view on the problem, argues for a more correct position in his opinion, based on the work of opponents, and offers solutions to problems. Conclusions, the interest of the readership. The conclusions are logical, specific "... triple authentication takes place (image, voice, signature with a stylus). The adoption of this method of certifying familiarization with the protocol of the investigative action, as indicated above, will require making appropriate changes to the Code of Criminal Procedure of the Russian Federation," etc. The article in this form may be of interest to the readership in terms of the systematic positions of the author in relation to the issues stated in the article. Based on the above, summing up all the positive and negative sides of the article, I recommend publishing it.