Научная статья на тему 'DIGITAL IDENTIFICATION METHODS FOR COMBATING CRIMES AGAINST SEXUAL INTEGRITY AND SEXUAL FREEDOM OF MINORS'

DIGITAL IDENTIFICATION METHODS FOR COMBATING CRIMES AGAINST SEXUAL INTEGRITY AND SEXUAL FREEDOM OF MINORS Текст научной статьи по специальности «СМИ (медиа) и массовые коммуникации»

CC BY
52
7
i Надоели баннеры? Вы всегда можете отключить рекламу.
Ключевые слова
digital identity / Deep Web / sexual integrity / sexual assault / minors / цифровая идентичность / глубокий интернет / половая неприкосновенность / сексуальное насилие / несовершеннолетние

Аннотация научной статьи по СМИ (медиа) и массовым коммуникациям, автор научной работы — Швец Сергей Владимирович, Меретуков Гайса Мосович, Грицаев Сергей Иванович, Степаненко Сергей Григорьевич

The possibilities of application of digital identification by using video surveillance in real time to identify and identify minors who have been subjected to sexual violence are reviewed in the article. It is proposed to supplement the Federal Bank of Criminal Information with search records of “images of minors subjected to violent acts of a sexual nature”, which will be replenished in the process of identification of illegal content in information and telecommunication networks. Such a technological solution will make it possible to carry out automatic identification of the victims, followed by operational-search measures and investigative actions aimed at establishing the identity of the suspects and their involvement in the commission of these crimes. The authors note the problem of use of anonymizer programs and the anonymous TOR network in illegal activities in the field of distribution of child pornography and other prohibited content in information and telecommunication networks. It is proposed to classify such networks as a “potentially criminogenic information technology” that poses a threat to the security of society and the state, as well as to other persons. The authors propose to introduce a number of amendments to the legislation that would allow for the successful implementation of digital identification of persons subjected to violence and the subsequent identification of persons involved in the commission of crimes against sexual integrity and sexual freedom of minors.

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Методы цифровой идентификации в расследовании преступлений против половой неприкосновенности и половой свободы несовершеннолетних

В статье рассматриваются возможности применения цифровой идентификации с использованием видеонаблюдения в режиме реального времени для выявления несовершеннолетних, подвергшихся сексуальному насилию. Предлагается дополнить Федеральный банк криминальной информации поисковыми записями “изображений несовершеннолетних, подвергшихся насильственным действиям сексуального характера”, которые будут пополняться в процессе выявления противоправного контента в информационно-телекоммуникационных сетях. Такое технологическое решение позволит осуществлять автоматическую идентификацию потерпевших с последующим проведением оперативно-розыскных мероприятий и следственных действий, направленных на установление личностей подозреваемых и их причастности к совершению этих преступлений. Авторы отмечают проблему использования программ-анонимайзеров и анонимной сети TOR в противоправной деятельности в сфере распространения детской порнографии и другого запрещенного контента в информационно-телекоммуникационных сетях. Предлагается классифицировать такие сети как «потенциально криминогенную информационную технологию», представляющую угрозу безопасности общества и государства, а также другим лицам. Авторы предлагают внести ряд поправок в законодательство, которые позволили бы успешно внедрять цифровую идентификацию лиц, подвергшихся насилию, и последующую идентификацию лиц, причастных к совершению преступлений против половой неприкосновенности и сексуальной свободы несовершеннолетних.

Текст научной работы на тему «DIGITAL IDENTIFICATION METHODS FOR COMBATING CRIMES AGAINST SEXUAL INTEGRITY AND SEXUAL FREEDOM OF MINORS»

Методы цифровой идентификации в расследовании преступлений против половой неприкосновенности и половой свободы несовершеннолетних

Швец Сергей Владимирович,

доктор юридических наук, доцент, профессор кафедры криминалистики, ФГБОУ ВО «Кубанский государственный аграрный университет имени И.Т. Трубилина» E-mail: [email protected]

Меретуков Гайса Мосович,

доктор юридических наук, профессор, заведующий кафедрой криминалистики, ФГБОУ ВО «Кубанский государственный аграрный университет имени И.Т. Трубилина» E-mail: [email protected]

Грицаев Сергей Иванович,

кандидат юридических наук, доцент, доцент кафедры криминалистики, ФГБОУ ВО «Кубанский государственный аграрный университет имени И.Т. Трубилина» E-mail: [email protected]

Степаненко Сергей Григорьевич,

кандидат исторических наук, старший преподаватель кафедры социологии, правоведения и работы с персоналом, ФГБОУ ВО «Кубанский государственный аграрный университет имени И.Т. Трубилина» E-mail: [email protected]

В статье рассматриваются возможности применения цифровой идентификации с использованием видеонаблюдения в режиме реального времени для выявления несовершеннолетних, подвергшихся сексуальному насилию. Предлагается дополнить Федеральный банк криминальной информации поисковыми записями "изображений несовершеннолетних, подвергшихся насильственным действиям сексуального характера", которые будут пополняться в процессе выявления противоправного контента в информационно-телекоммуникационных сетях. Такое технологическое решение позволит осуществлять автоматическую идентификацию потерпевших с последующим проведением оперативно-розыскных мероприятий и следственных действий, направленных на установление личностей подозреваемых и их причастности к совершению этих преступлений. Авторы отмечают проблему использования программ-анонимайзеров и анонимной сети TOR в противоправной деятельности в сфере распространения детской порнографии и другого запрещенного контента в информационно-телекоммуникационных сетях. Предлагается классифицировать такие сети как «потенциально криминогенную информационную технологию», представляющую угрозу безопасности общества и государства, а также другим лицам. Авторы предлагают внести ряд поправок в законодательство, которые позволили бы успешно внедрять цифровую идентификацию лиц, подвергшихся насилию, и последующую идентификацию лиц, причастных к совершению преступлений против половой неприкосновенности и сексуальной свободы несовершеннолетних.

Ключевые слова: цифровая идентичность, глубокий интернет, половая неприкосновенность, сексуальное насилие, несовершеннолетние.

см о см

Introduction

The development of information and communication technologies at the beginning of the XXI century is characterized by new illegal manifestations in the electronic digital sphere or with its use. At the same time, there is a tendency towards an increase in the criminalization of a number of acts in the emerging information society.

Studies in Europe have shown that one out of five children is a victim of sexual violence. And taking into account the high latency of these crimes, in our opinion this is far from complete picture of sexual crimes committed against children. Over the past decade, there has been a significant decrease in such crimes in the Russian Federation. First of all, this is due to the change in the direction of toughening criminal punishment for such crimes, as well as preventive measures taken by the state and society. However, problems of a social nature, which include the demoralization of society, a decrease in social control, the spread of deviant deviations both in the adult environment and among minors, still remain [1].

Problem statement

Today, the illegal actions committed on the Internet, which have a cross-border nature, are of great concern. In its'turn it presents difficulties in identifying victims and carrying out preliminary investigations of criminal cases

[2]. There has also been an increase in the number of content containing child pornography. Violence is often accompanied by photo and video filming, which are uploaded in encrypted form to file sharing services, and links to them are given in closed chats and websites.

According to some researchers, in up to 80 percent of cases, the child knows and trusts the person who commits the above illegal acts. From this it follows that, having found the victim of a crime, it becomes possible to identify the persons who committed these crimes. Modern digital technologies today can provide significant assistance in finding both the victims of such crimes and the persons who committed them.

Research questions

Modern information and communication technologies are characterized by a decentralized structure and cross-border nature, and the use of anonymizing programs, the Darknet network, etc. by attackers, greatly complicates the identification of its owner.

Nevertheless, the more an attacker is confident in his anonymity and impunity, the more material he provides for the study of evidence of his criminal activity

[3]. Currently, there are still no effective technical solu-

tions that would make it possible to find the owners of sites and distributors of child pornography, as well as persons who commit crimes against the sexual inviolability of minors [4]. Significant efforts are being made in this direction by both the state and society, in particular, it includes the created and successfully operating website "League of the Safe Internet", where any individual can report dangerous content. On February 1st., 2021, the Federal Law of December 30th, 2020 No. 530-FZ "On Amendments to the Federal Law" On Information, Information Technologies and Information Protection "came into force, which obliges social networks to independently identify and block prohibited content, including child pornography. Refusal of website owners, including social networks and video hosting sites, to delete illegal information is subject to penalties (Federal Law No. 511-FZ dated 30.12.2020 "On Amendments to the Code of Administrative Offences of the Russian Federation").

However, "neutralization" of dangerous content is only an obstacle in its distribution. The next task should be the investigation of the crime and the search for persons involved in these crimes. The Criminal Code of the Russian Federation classifies a number of crimes in relation to minors as especially grave. Thus, persons aged under 12 years are excluded from the number of victims of crimes under Art. 134 and 135 of the Criminal Code of the Russian Federation; encroachments on their sexual integrity, the law now prescribes in any case to qualify as rape or violent acts of a sexual nature with an over-qualifying feature (clause "b" part 4 of article 131 or clause "b" of part 4 of article 132 of the Criminal Code of the Russian Federation), presuming the finding of such persons in a helpless state [5].

Materials and methods

Taking into account the adopted amendments (Federal Law 479-FZ dated 29.12.2020 and Federal Law No. 149-FZ dated 27.07.2006 (as amended on 09.03.2021) "On information, information technology and information protection" (as amended and supplemented, entered into force on 20.03.2021), Article 14.1. "The use of information technologies for the identification of individuals"), it can be said that opportunities for digital identification today allow us to talk about the creation in the Russian Federation of a unified biometric system, enshrined in law, as well as about the emergence of a powerful tool in the ability to identify and authenticate individuals.

The authors of the publication Frolov A.A., Sil-nov D.S., having conducted an experiment to search for illegal content on one of the sites in the Darknet and have provided a sad statistics: "The total number of users on the site is 882381. Among them there are 8408 users who posted prohibited content on the forum. 43 126 users were active in the form of writing comments on this content. The total number of topics on the forum is 34485. 15850 topics out of 34485 contain prohibited content and 311 topics provide content where children under 3 years old are shown" [6].

In 2009, Microsoft created PhotoDNA technology for the National Centre for Missing and Exploited Chil-

dren, which searches for missing children and collects data on abused children [12]. Microsoft is now creating PhotoDNA technology for Video, which will find and block illegal videos [7]. Since 2011, the social network Facebook has been using this technology to track illegal content.

Such programs are capable of working in the field of mass content consumer. As for the Deep Web, Dark Web, they are ineffective here, since file sharing is mainly used, and photo and video materials are archived and protected with a password. A secure network with its onion routing system today attracts many users and is considered a stronghold of anonymity, which allows us to speak about an established ecosystem that contributes to the spread of child pornography, the sale of drugs, weapons, databases and other illegal information.

Results

In the Federal Law No. 276-FZ dated 29.07.2017 "On Amendments to the Federal Law" On Information, Information Technologies and Information Protection "", restrictions are only partially formed regarding the use of anonymizers, which make it possible to hide data about the user, his location and data about its software and hardware. But as practice shows, the problem of the distribution of prohibited content on the Darknet has not yet been resolved, since it allows person to hide information about sites and users using the Tor network. It seems that such a network is malicious (destructive) in its' essence, it allows us to speak of a new concept -"potentially criminogenic information technology", which poses a direct threat to the security of both society and the state, and other individuals. Although "foreign partners" declare that they "promote human rights and freedoms - create and distribute technologies to ensure anonymity and privacy with open source, support their unlimited availability, promote their scientific and popular understanding", which in fact means the destruction of moral foundations, mental health, and sometimes life, especially of the younger generation.

According to experts from the Safe Internet League, 43 million Russians are members of destructive social media communities (cybberbullying, suicide propaganda, drug sales, extremist-terrorist communities, groups about serial killers and maniacs, shock content, trash streams), about 8 million of them are children [8].

The steps taken to counter the spread of illegal content, the identification of persons involved in such crimes, as well as the identification of victims, to date do not sufficiently contribute to neutralize the current crime situation. Identification, investigation and exposure of those responsible for their commission is one of the most important functions of law enforcement agencies [9].

Taking into account the high latency of crimes against sexual integrity and sexual freedom of the in- 5 dividual, the task of finding ways and methods that s are designed to increase the effectiveness of the fight H against such crimes has a particular relevance [10]. K

To solve these problems, it is necessary to make ef- g forts to improve legislation and introduce modern infor- A mation and telecommunication technologies, as well as A

CM

o

CM

develop new methods for investigation of these crimes. The intensive development of innovative activities generates new technical solutions that have novelty and a number of specific features.

The material for the investigation of such crimes can be the Federal Bank of Criminal Information, which is proposed to be supplemented with search records of "images of minors subjected to violent acts of a sexual nature", which will be replenished in the process of identification of illegal content in information and telecommunication networks.

Findings

Today, an automated face recognition system is essentially artificial intelligence that can independently learn, collect and analyse large amounts of data using ultra-precise neural networks that do not require expensive equipment and can be easily integrated into existing processes.

Currently, the Russian market is experiencing a large growth in software and hardware for biomet-ric identification, one of the areas of which is the face recognition system [11]. The leaders of this area are NtechLab, the Speech Technology Center Group of Companies, Vocord, "PAPILLON" JSC and others. These technologies are already being used in large cities of Russia.

Thus, the NtechLab company has created the Find-Face Security product, which allows analysing the video stream based on face recognition, i.e. the technology in real time detects faces in the video stream, checks against the monitoring lists and sends notifications when a match is found.

The Papillon face image identification system operating in real time can recognize people in a stream in fractions of a second with a minimum error not exceeding 1%.

On the basis of such technologies, it becomes possible to search in real time not only for criminals, but also for persons subjected to violent actions who, for one reason or another, could not report a crime to law enforcement agencies.

It is not always possible to establish the IP address of a paedophile by technical means. In such cases, one of the most effective methods of investigation and disclosure of crimes against sexual integrity and sexual freedom of the person against minors can be an automated identification system based on images or video recordings of a person from illegal content, i.e. search and identification of persons who have been subjected to violence or other sexual acts, based on automatic identification (confirmation) of their identity in real time, in conjunction with the "surfing" of social networks and other content, as well as created or used databases. Due to the fear of being recognized, the victims may not be on social networks, or not publish their photos.

Discussion

Verification of the data of persons should be carried out against the databases of law enforcement agen-

cies. This requires to carry out the formation of such data bases on the basis of legislation. In particular, such a mean could be a law that would oblige parents to change the birth certificate of a child that are reached the age of 7 with a new one with a biometric photo that will be used until receiving of a passport. Another option is a use of digital technologies of school education, which can be organically linked with the unified identification and authentication system to create a portfolio (electronic biography). There is no doubt that in the future the digital dossier (portfolio) will ultimately be "tied" to the personal number of the citizen ("pass-through identifier"), which will become the key to personal data (personal information) in the Unified Information System and the Unified Biometric System (UBS) [12].

The transfer of this array by the operator of their processing to the subject of the criminal intelligence and surveillance operations in an impersonal form, replacing names, surnames or other personal data with a set of numbers or signs will allow to eliminate the contradictions associated with a possible violation of constitutional rights while accessing computer information (an array of personal data of minors). And upon confirmation of matches, personal data can be obtained in accordance with the legislation [13,14]. The formation of such database will make it possible to carry out very quick and efficient identification of the victims of crime.

We see the mechanism for further actions to organize the investigation in the following procedures. If the system has established (confirmed) the identity of the victim, then on this basis it is advisable to automatically issue a statement about the crime. This provision is not provided for by law and will require appropriate changes. Thus, at the moment, another algorithm of action is possible: an authorized person - the "operator" can send the material to "study objects and documents" in accordance with paragraph 4 of Part 1 of Art. 6 of the Federal Law "On Operational Investigative Activities" and on the basis of the response received, act in accordance with Art. 143 of the Criminal Procedure Code of the Russian Federation (Report on the detection of signs of a crime). A message about a committed or impending crime, received from sources other than those specified in paragraphs 1, 2 and 4 of the first part of Article 140 of the Code of Criminal Procedure of the Russian Federation, is accepted by the person who received this message. A report on the detection of signs of a crime is drawn up based on this message.

Accordingly, there is a reason for conducting a pre-investigation check and other investigative actions that will subsequently help in the investigation and disclosure of the crime.

Conclusion

The creation of a search register for "images of minors subjected to sexual assault" in the Federal Bank of Criminal Information and the use of modern digital face recognition technologies will significantly increase the efficiency of detecting, disclosing and investigating

crimes against sexual integrity and sexual freedom of minors. The transfer of an array of personal data of minors in an impersonal form for their processing to the subject of the criminal intelligence and surveillance operations will eliminate contradictions associated with a possible violation of constitutional rights while accessing computer information by replacing names, surnames or other personal data with a set of numbers or signs. And upon confirmation of matches, personal data can be obtained in accordance with the Russian Federation legislation. The use of achievements in the field of digital identification and other innovations in the field of IT technologies in the forensic methods of investigating crimes can increase the efficiency of identifying the perpetrators of this crime.

Литература

1. Абашидзе А.Х., Кебурия К.О., Солнцев А.М. Борьба с использованием новых технологий в целях торговли детьми и их сексуальной эксплуатации // Евразийский юридический журнал. - 2017.- № 11. С.342-345.

2. Живодрова Н.А., Толоконникова А.С. Интернет-пространство как средство совершения преступлений против половой неприкосновенности несовершеннолетних / Электронное издание сетевого распространения. Уголовный закон Российской Федерации: проблемы правоприменения и перспективы совершенствования: межвузовской научно-практической конференции (28 апреля 2020 г.) // гл. ред. О.П. Трибунов, отв. ред. Е.Н. Бархатова. - Иркутск: ФГ-КОУ ВО ВСИ МВД России,- 2020. - 164 с.

3. Кадырова Н.Н. Криминологические аспекты преступлений против половой неприкосновенности несовершеннолетних / Н.Н. Кадырова // Вестник Челябинского государственного университета. Серия: право. - 2012. - № 1 (256). -С.69-70.

4. Кебурия К.О., Солнцев А.М. Борьба с детской порнографией в Интернете: пример Франции // Вопросы российского и международного права. - 2018. - Том 8. - № 12А. С. 163-169.

5. Kostomarov, K.V. (2019). Possibilities of using neural networks in the investigation of crimes. J. Sib. Fed. Univ. Humanit. Soc. Sci., 12(11), 2023-2030. DOI: 10.17516/1997-370-0509.

6. Осипенко А.Л. Новое оперативно-розыскное мероприятие «получение компьютерной информации»: содержание и основы осуществления //Вестник Воронежского института МВД России. - 2016. - № 3 - С. 83-90.

7. Сидорова К.С. Способы установления IP-адреса и сведений о нем при расследовании уголовных дел/ К.С. Сидорова // Вестник Сибирского института бизнеса и информационных технологий. - 2018. - № 2 (26). - С. 88-92.

8. Степаненко С.Г., Помазанов В.В. Цифровиза-ция образования как процесс глобализации экономики //Электронный сетевой политема-

тический журнал «Научные труды КубГТУ». -2020. - № 3. С. 829-839.

9. Фролов А.А. Исследование механизмов распространения запрещенного содержимого в Darknet / А.А. Фролов, Д.С. Сильнов // -2017. - Т. 13. № 4. - С. 216-224.

10. Ховавко С.М. Выявление половых преступлений с учетом их оперативно-розыскной характеристики / С.М. Ховавко // Юридические исследования. - 2019. - № 7. - С. 80-89. DOI: 10.25136/2409-7136.2019.7.30300

11. John Smith. TOR: a Dark Net Journey on How to Be Anonymous Online (TOR, Dark Net, DarkNet, Deep web, cyber security Book 1). - 2017. - 50 p.

DIGITAL IDENTIFICATION METHODS FOR COMBATING CRIMES AGAINST SEXUAL INTEGRITY AND SEXUAL FREEDOM OF MINORS

Shvets S.V., Meretukov G.M., Gritsaev S.I., Stepanenko S.G.

Kuban State Agrarian University named after I.T. Trubilin

The possibilities of application of digital identification by using video surveillance in real time to identify and identify minors who have been subjected to sexual violence are reviewed in the article. It is proposed to supplement the Federal Bank of Criminal Information with search records of "images of minors subjected to violent acts of a sexual nature", which will be replenished in the process of identification of illegal content in information and telecommunication networks. Such a technological solution will make it possible to carry out automatic identification of the victims, followed by operational-search measures and investigative actions aimed at establishing the identity of the suspects and their involvement in the commission of these crimes. The authors note the problem of use of anonymizer programs and the anonymous TOR network in illegal activities in the field of distribution of child pornography and other prohibited content in information and telecommunication networks. It is proposed to classify such networks as a "potentially criminogenic information technology" that poses a threat to the security of society and the state, as well as to other persons. The authors propose to introduce a number of amendments to the legislation that would allow for the successful implementation of digital identification of persons subjected to violence and the subsequent identification of persons involved in the commission of crimes against sexual integrity and sexual freedom of minors.

Keywords: digital identity, Deep Web, sexual integrity, sexual assault, minors.

References

1. Abashidze A. Kh., Keburia K.O., Solntsev A.M. Combating the use of new technologies for the purposes of child trafficking and sexual exploitation // Eurasian Legal Journal. - 2017. - No. 11. P. 342-345.

2. Zhivodrova N.A., Tolokonnikova A.S. Internet space as a means of committing crimes against the sexual integrity of minors / Electronic publication of network distribution. Criminal law of the Russian Federation: problems of law enforcement and prospects for improvement: interuniversity scientific and practical conference (April 28, 2020) // Ch. ed. O.P. Gribunov, resp. ed. E.N. Barkhatova. - Irkutsk: FGKOU VO VSI Ministry of Internal Affairs of Russia,- 2020. - 164 p.

3. Kadyrova N.N. Criminological aspects of crimes against sexual integrity of minors / N.N. Kadyrova // Bulletin of the Chelyabinsk State University. Series: law. - 2012. - No. 1 (256). - pp. 69-70. 5

4. Keburia K.O., Solntsev A.M. Combating child pornography on И the Internet: the example of France // Issues of Russian and in- И ternational law. - 2018. - Volume 8. - No. 12A. pp. 163-169. е

5. Kostomarov, K.V. (2019). Possibilities of using neural networks К in the investigation of crimes. J. Sib. Fed. Univ. Humanit. Soc. Я Sci., 12(11), 2023-2030. DOI: 10.17516/1997-370-0509. а

6. Osipenko A.L. New operational-search activity "obtaining com- К puter information": content and basis for implementation // Bul- >

letin of the Voronezh Institute of the Ministry of Internal Affairs of Russia. - 2016. - No. 3 - pp. 83-90.

7. Sidorova K.S. Methods of establishing an IP address and information about it during the investigation of criminal cases / K.S. Sidorova // Bulletin of the Siberian Institute of Business and Information Technologies. - 2018. - No. 2 (26). - pp. 88-92.

8. Stepanenko S.G., Pomazanov V.V. Digitalization of education as a process of globalization of the economy //Electronic network polythematic journal "Scientific works of KubSTU". -2020. - No. 3. P. 829-839.

9. Frolov A.A. Study of the mechanisms of distribution of prohibited content on Darknet / A.A. Frolov, D.S. Silnov // - 2017. -T.13. No. 4. - pp. 216-224.

10. Khovavko S.M. Identification of sexual crimes taking into account their operational investigative characteristics / S.M. Khovavko // Legal studies. - 2019. - No. 7. - P. 80-89. DOI: 10.25136/2409-7136.2019.7.30300

11. John Smith. TOR: a Dark Net Journey on How to Be Anonymous Online (TOR, Dark Net, DarkNet, Deep web, cyber security Book 1). - 2017. - 50 p.

CM

o

CM

i Надоели баннеры? Вы всегда можете отключить рекламу.