Ðóñ Eng Cn Translate this page:
Please select your language to translate the article


You can just close the window to don't translate
Library
Your profile

Back to contents

Legal Studies
Reference:

The possibility of identifying signs of a person's personality by his digital identity

Budilina Ekaterina Ivanovna

Associate Professor; Department of Criminology; Krasnodar University of the Ministry of Internal Affairs of Russia

350005, Russia, Krasnodar Territory, Krasnodar, Alexander Pokryshkin str., 4/9, sq. 342

budylinakeit@yandex.ru

DOI:

10.25136/2409-7136.2024.8.71508

EDN:

SSBFDG

Received:

17-08-2024


Published:

04-09-2024


Abstract: In this article, the term "digital personality", "digital double", which is new for forensic science, is put forward and the definition of these terms is given. The possibilities of identifying a user by his digital identity in the virtual space are considered. A proposal is put forward to develop methodological recommendations for identifying signs of a person's personality based on his digital identity. The algorithm of actions of law enforcement officers in identifying signs of a digital identity on the Internet is also explained. The expert examinations that are subject to mandatory appointment in the investigation of such types of crimes have been identified. In the course of scientific study of the problem of the possibilities of identifying signs of a user's identity by his digital identity, a step-by-step algorithm of actions of law enforcement officers for an effective process of investigation and disclosure of such crimes is proposed. Methods of analysis, synthesis, deduction and induction were used. The research materials are normative legal acts of the Russian Federation and materials of criminal cases related to crimes committed on the Internet. In our opinion, the scientific novelty lies in the fact that we propose the development and application of a forensic technique for detecting human signs using "digital personality doubles" in the Internet space, as this issue is becoming more relevant today. The method of searching for a "digital personality" is a complex and multifaceted process that requires certain knowledge and skills, as well as the joint work of law enforcement agencies and moderators of various services on the Internet. Even more difficult is the conduct of scientific research aimed at establishing the digital identity of the human physical body. Currently, most crimes are committed using digital technologies, therefore, such a technique is becoming necessary for law enforcement agencies and cybersecurity specialists. Given these conditions, the question arises about the forensic aspects of establishing a "digital identity". The method of identifying signs of a person's identity based on his digital identity is a comprehensive approach that includes the development of an algorithm for the investigator's actions, conducting user data checks, creating a database and organizing cooperation with Internet service providers. Its purpose is to accurately build an algorithm for the investigator's actions to effectively investigate and solve crimes and protect users from potential crimes.


Keywords:

digital identity, digital twin, the algorithm of actions, identification, Internet service provider, interaction with moderators, online dating, appointment of examinations, services, The Internet

This article is automatically translated. You can find original text of the article here.

In today's world, where more and more information about people's lives and their preferences is online, digital identity is becoming one of the key aspects of a person. A digital personality is a concept that describes a digital version of the physical human body or its individual aspects. It assumes that information about our personality, health status, and other physiological parameters can be collected and used using various digital technologies. In the digital world, digital duplicates of people can be created that can be used for virtual reality and for criminal purposes. [1] Digital identity also includes the data that people leave about themselves on the Internet, including social media, online purchases, search queries, etc.

In our opinion, it is necessary to develop and apply a forensic technique for detecting human signs using "digital personality doubles" in the Internet space, since this issue is becoming more relevant today. The method of searching for a "digital identity" is a complex and multifaceted process that requires certain knowledge and skills, as well as the joint work of law enforcement agencies and moderators of various services on the Internet. Even more difficult is the conduct of scientific research aimed at establishing the digital identity of the human physical body. Currently, most crimes are committed using digital technologies, therefore, such a technique is becoming necessary for law enforcement agencies and cybersecurity specialists. Given these conditions, the question arises about the forensic aspects of establishing a "digital identity". The emergence of such concepts as "digital personality" and "digital double", as well as the identification of signs of a person's personality by his digital identity is currently a little-studied issue. But we note that such authors as Orekh E.A., Sergeeva O.V., Ivanov V.V., Zuev D.I., Vasilyevich I.V., in their works mentioned that the problem of the appearance of digital personalities and digital doubles arose in the virtual space, and also that this fact poses a threat to cyberspace and in turn people. But their work does not give an accurate understanding of the terms and does not propose the development of an algorithm aimed at identifying signs of a person's personality by his digital identity, which prompted us to clarify and develop this recommendation.

According to statistics, in January - March 2023 alone, 152.4 thousand crimes committed using information and telecommunications technologies or in the field of computer information were registered, which is 22.7% more than in the same period last year. In the total number of registered crimes, their share increased from 25.7% in January - March 2022 to 31.5%. Almost all such crimes (98.8%) are detected by the internal affairs bodies. More than half of such crimes (53.7%) belong to the categories of grave and especially grave (81.9 thousand; + 22.0%), three quarters (75.6%) are committed using the Internet (115.3 thousand; + 28.8%), almost half (43.3%) – mobile communications (66.1 thousand; + 34.1%).

One of the problems of such indicators is the increase in crimes committed on specialized Internet dating services such as Tinder, Badu, Mamba, which have been banned in Russia since 2022. But, to date, no less popular platforms developed already in Russia are: «LovePlanet», «DateSecret», «Deamoure», «AnnaDates», «Love&Kiss», «Pure». Unfortunately, with the growing popularity of online dating services and the use of these sites for criminal purposes, the problem of investigating and solving such crimes has arisen

Speaking about the task of scientific research of the digital personality of a person, it is worth noting the study of Vasilyevich I.V., in which the author focuses on the fact that "today modern neural networks allow you to create the appearance of non-existent people, as a result of which a digital personality can be invented from beginning to end. A digital personality can be quite realistic, accurately reflect all information about a particular person, but at the same time be unscrupulous, that is, created specifically so that another person can act in the Internet space under a false name." [2] Of course, the author correctly notes the fact that neural networks today provide the opportunity to completely change their appearance, voice and parameters in virtual space. Which, in turn, cannot leave the criminal world indifferent and allows you to realize your selfish intent with the help of the latest technologies from anywhere in the world. And when using a VPN application, the search for the person who committed the crime becomes much more complicated.

A person's digital identity can be used for criminal purposes and this fact confirms the presence of the following types of personality on the Internet, namely: a) conscientious personalities are virtual personalities that match the real one; b) unscrupulous ones are virtual personalities that do not match the real one; c) anonymous ones are digital a person who has no or unknown prototype. [3] In order to effectively identify a person using a certain digital form or digital double, it is necessary to adhere to a scientifically based algorithm of actions.

In our opinion, the first step is to send a request by law enforcement officers to providers or the administration of a certain Internet service in order to obtain an IP address. In turn, providers or administrators will have to send an electronic response letter to law enforcement officers in the form of a table, which will additionally help in identifying the perpetrator, as well as allow access to information about the user's location and activity using this IP address. This request is executed on the basis of a court order.

It should be noted that in accordance with Part 4, Article 21 of the Criminal Procedure Code (hereinafter referred to as the Criminal Code of the Russian Federation), a reasoned investigator's request to a certain institution, organization, enterprise or provider company providing Internet access services is subject to mandatory execution. [4] The response of the management company must contain information about the names of the providers with whom contracts for providing access to Internet services were concluded at the address specified in the request. Further, law enforcement officers should send requests to the addresses of established provider organizations to provide data to the investigator. [5] Such data include: a) the complete data that the person indicated in the concluded service agreement (last name, first name, patronymic, address, phone number, copy of passport); b) the IP addresses that the person used for a certain period of time (the exact time period is indicated by the investigator); c) a specific type of IP address (dynamic or statistical); d) the exact address of the location of the receiving and transmitting equipment, with which access to the Internet was carried out through the specified IP addresses; e) MCA addresses that were used in a specific period of time.

The next step is to identify the Internet services that a person or his digital counterpart visited. To establish this fact, it is also necessary to cooperate with providers, since it is the Internet provider that can track the user's actions on the Internet. Therefore, in order to carry out these actions, the investigator must send a request to the Internet provider of the service specifically of interest with the requirement to provide data and provide them in electronic form. These data include: a) the data that was specified by the person during registration (last name, first name, patronymic, email address, phone number or other information); b) the intensity of the site visit and IP address, in a certain period of time. It should be noted that in order to obtain these data, a court order is required to authorize the receipt of such information, in accordance with Article 7 of the Federal Law "On Personal Data". [6] So, having received all the above information, it is necessary to find out the name of the provider in whose network the established IP address is registered and its specific location. In this case, such Internet resources as "WHOIS", "2IP", "RIPE" and others that have information about IP addresses can help to establish this information. These sites may provide information about the country, city, and name of the provider.

After information about a person's digital identity is established, a forensic psychological analysis of the individual should be carried out, as well as methods of interaction, communication style, messaging and the possible presence of hints or threatening statements. This analysis includes an assessment of the personal characteristics of the person, his motivation, psychological state and possible causes of the disorder or deviation. The results of the analysis will allow the investigator to conduct an effective interrogation in the future. Also, the investigator needs to appoint examinations that allow him to accurately identify the personality traits of a real person. If there are phonograms of the voice, it is necessary to appoint a phonoscopic examination, which will allow to find out the identity of the speaker, the fact of making changes to the phonogram, the conditions for creating the recording and other circumstances. The next examination, which is subject to mandatory appointment, in this case is phototechnical, this examination allows you to establish the authenticity or forgery of a photographic image, as well as establishing the facts of its creation and processing. Further, a computer-technical examination is assigned to determine the status of the device as a computer tool, which allows you to access the information contained in this device and its media in order to comprehensively investigate them in the future. [7] I would like to note that today in Russia they have learned to identify a person by the so-called keyboard handwriting and gait. This development was made by representatives of the Kuban State Technological University. Identification of a person by keyboard handwriting is based on an intelligent analysis of the time of holding objects on the screen, that is, how exactly a person types text. Everyone knows that human typing is unique and varies depending on psychophysiological characteristics. As for the gait, the system studies the change of the smartphone in space. [8] Therefore, this development will be an auxiliary element in the investigation of crimes committed with the help of information and telecommunication technologies.

If the digital identity used online wallets or credit cards as payment, then this information is stored on the network. In this case, it is necessary to interact not only with Internet service providers, but also with the bank. It is necessary to send a request to the bank, according to the results of which the investigator will have access to information on the flow of funds on accounts and cards, that is, full details of the transactions performed and the specific location of the person in a certain period of time. The specified request is allowed to be sent only with the permission of the court, since this type of request affects the conditions of bank secrecy in accordance with Article 26 of Federal Law No. 395-1 "On Banks and Banking Activities". [9] All previously listed requests, methods and tools must be used in accordance with the law and taking into account the protection of users' personal data. At the same time, it is important to combine the efforts of all stakeholders, including service providers, in order to create a trusting and secure environment for Internet users.

After analyzing the work of research scientists, we note the opinion of R.S. Atamanov, who focuses on the importance of creating a comprehensive methodology for searching for potential criminals on the Internet: "Improving methods of combating crime in the field of high technology in general and Internet fraud, in particular, requires law enforcement agencies to use science and technology more closely in their practice Therefore, it is preferable to conduct a comprehensive examination (in addition to computer-technical), the most important principles of which are: a) a versatile approach to the subject and phenomenon under study; b) prompt solution of several tasks of expert research at the same time; c) effective use of modern scientific and technical achievements." [10] However, it must be emphasized that users who create a "digital identity" for criminal purposes are constantly being improved, due to the constant development of digital technologies and ways of using them in criminal activities. This requires information and telecommunication technology specialists to constantly train and improve their skills in this area in order to be one step ahead of criminals and protect public safety and State sovereignty.

It is necessary to understand that a digital personality cannot be considered as a subject of a crime, since it does not have an independent will, but acts as a tool with which a person interacts in the Internet space and with which a crime is realized. Also, in order to bring a person to justice for committing a crime on the Internet services, it is not enough to identify the account from which the crime was committed. [11] A specific person who committed a crime from this profile is subject to identification. Thus, the method of identifying signs of a person's identity based on his digital identity is a comprehensive approach that includes the development of an algorithm for the investigator's actions, conducting user data checks, creating a database and organizing cooperation with Internet service providers. Its purpose is to accurately build an algorithm of investigator's actions for effective investigation and disclosure of crimes, protect users from potential crimes and ensure the safety of people in the virtual space of the Internet.

Summing up the above, it should be concluded that in forensic science there is no precise understanding of the term "digital personality" and an accurate algorithm for detecting signs of a person by his digital personality. In our work, we have tried to clarify this term and from this it should be understood that a "digital personality" is an artificially created virtual likeness of a person, as well as a complete falsification of his account on various Internet services. We have also developed an algorithm of actions for law enforcement agencies in identifying signs of a person by his digital identity for effective crime detection. And the examinations that are subject to mandatory appointment in the investigation and disclosure of crimes related to the identification of signs of a person by his digital identity are explained. After analyzing judicial practice, it was concluded that currently criminals have begun to use a digital identity to commit crimes most often on online dating platforms. These include crimes provided for in Article 163 of the Criminal Code of the Russian Federation (hereinafter – the Criminal Code of the Russian Federation), p "g", Part 3., Article 158 of the Criminal Code of the Russian Federation, Article 159 of the Criminal Code of the Russian Federation. The use of specialized Internet dating services by criminals significantly complicates the practice of investigating such crimes.

References
1. Allen, J. (2011). The soft weeping of desire's loss: phenomenality, recognition, and the one who is dead in Kierkegaard's Works of Love. Kierkegaard and Death. Ed. P. Stokes, A. Buben. Pp. 233-252. Bloomington, IN: Indiana University Press.
2. Steinhart, E. C. (2014). Your digital afterlives: Computational theories of life after death. Palgrave Macmillan.
3. Mitchell, L. M. (2012). Stephenson P. H., Cadell S., Macdonald M. E. Death and grief on-line: Virtual memorialization and changing concepts of childhood death and parental bereavement on the Internet. Health Sociology Review. Vol. 21, Issue. P. 413-431.
4. Öhman, C., & Floridi, L. (2017). The Political Economy of Death in the Age of Information: A Critical Approach to the Digital Afterlife Industry. Minds and Machines. Vol. 27. P. 639-662.
5. Stokes, P. (2015). Deletion as second death: The moral status of digital remains. Ethics and Information Technology. Vol. 17, Issue 4. P. 237-248.
6. Stokes, P. (2011) Duties to the dead? Earnest imagination and remembrance. Kierkegaard and Death. Ed. P. Stokes, A. Buben. Pp. 253-273. Bloomington, IN: Indiana University Press.
7. Jorna, P. (2016). Australian Institute of Criminology. Australasian Consumer Fraud Taskforce: Results of the 2014 online consumer fraud survey [online]. Canberra, ACT: Australian Institute of Criminology.
8. Chidambaram, V. (2012). The Profile of a Cyber Criminal. PC Advisor.
9. Freiburger, Ò., & Jeffrey, S. (2011). Crane. The Internet as a Terrorist’s Tool. Cyber Criminology: Exploring Internet Crimes and Criminal Behavior.
10. Vikhman, V.V., & Romm, M.V. (2021). «Digital twins» in education: prospects and reality. Higher Education in Russia, 2, 22-32.

First Peer Review

Peer reviewers' evaluations remain confidential and are not disclosed to the public. Only external reviews, authorized for publication by the article's author(s), are made public. Typically, these final reviews are conducted after the manuscript's revision. Adhering to our double-blind review policy, the reviewer's identity is kept confidential.
The list of publisher reviewers can be found here.

The subject of the research in the article submitted for review is, as its name implies, the possibility of identifying signs of a person's personality by his digital identity. The stated boundaries of the study are observed by the author. The methodology of the research is not disclosed in the text of the article. The relevance of the research topic chosen by the author is beyond doubt and is justified by him as follows: "In today's world, where more and more information about people's lives and their preferences is online, digital identity is becoming one of the key aspects of a person. A digital personality is a concept that describes a digital version of the physical human body or its individual aspects. It assumes that information about our personality, health status, and other physiological parameters can be collected and used using various digital technologies. In the digital world, digital duplicates of people can be created that can be used for virtual reality and for criminal purposes. [1] Digital identity also includes the data that people leave about themselves on the Internet, including social media, online purchases, search queries, etc." In addition, the scientist needs to list the names of leading experts who have studied the problems raised in the article, as well as disclose the degree of their knowledge. The scientific novelty of the work is manifested in a number of conclusions of the author: "In our opinion, it is necessary to develop and apply a forensic technique for detecting human signs using "digital personality doubles" in the Internet space, as this issue is becoming more relevant today. The method of searching for a "digital identity" is a complex and multifaceted process that requires certain knowledge and skills, as well as the joint work of law enforcement agencies and moderators of various services on the Internet. Even more difficult is the conduct of scientific research aimed at establishing the digital identity of the human physical body. Currently, most crimes are committed using digital technologies, therefore, such a technique is becoming necessary for law enforcement agencies and cybersecurity specialists. Given these conditions, the question arises about the forensic aspects of establishing a "digital identity"; "In our opinion, the first step is to send a request by law enforcement officers to providers or the administration of a certain Internet service in order to obtain an IP address. In turn, providers or administrators will have to send an electronic response letter to law enforcement officers in the form of a table, which will additionally help in identifying the perpetrator, as well as allow access to information about the user's location and activity using this IP address. This request is executed on the basis of a court order"; "The next step is to identify the Internet services that the person or his digital counterpart visited. To establish this fact, it is also necessary to cooperate with providers, since it is the Internet provider that can track the user's actions on the Internet. Therefore, in order to carry out these actions, the investigator must send a request to the Internet provider of the service specifically of interest with the requirement to provide data and provide them in electronic form. These data include: a) the data that was specified by the person during registration (last name, first name, patronymic, e-mail address, phone number or other information); b) the intensity of site visits and IP addresses, during a certain period of time," etc. Thus, the article makes a definite contribution to the development of domestic legal science and, of course, deserves the attention of potential readers. The scientific style of the research is fully sustained by the author. The structure of the work is logical. In the introductory part of the article, the scientist substantiates the relevance of his chosen research topic. In the main part of the work, the author examines the potential possibilities of identifying signs of a person's personality based on his digital identity and gives appropriate practical recommendations. The final part of the article contains conclusions based on the results of the study. The content of the article corresponds to its title, but is not devoid of shortcomings of a formal nature. The scientist notes: "In today's world, where more and more information about people's lives and their preferences turns out to be online, the digital personality is becoming one of the key aspects of a person." The researcher indicates: "As a result of our analysis of specialized services, we found out that popular Russian dating sites" - the text was omitted. The author writes: "Summing up the above, it should be concluded that in forensic science there is no precise understanding of the term "digital personality" and an accurate algorithm for identifying signs of a person by his digital personality" - "understanding". Thus, the article needs additional proofreading - there are many typos, spelling, punctuation and stylistic errors in it (the list of typos and errors given in the review is not exhaustive!). In the text of the article, the initials of the scientist are placed before his surname (see: "Vasilyevich I.V."). The bibliography of the study is presented by 10 sources (scientific articles, textbook, textbook). From a formal and factual point of view, this is enough. The author managed to reveal the research topic with the necessary completeness and depth. There is an appeal to the opponents, but it is general in nature due to the focus of the study. The scientific discussion is conducted by the author correctly, the provisions of the work are justified to the appropriate extent. Conclusions based on the results of the conducted research are available ("Summing up the above, it should be concluded that in forensic science there is no precise understanding of the term "digital personality" and an accurate algorithm for identifying signs of a person by his digital personality. In our work, we tried to clarify this term and from this it should be understood that a "digital personality" is an artificially created virtual likeness of a person, his account on various Internet services. After analyzing judicial practice, it was concluded that currently criminals have begun to use a digital identity to commit crimes, most often on online dating sites, as provided for in Article 163 of the Criminal Code of the Russian Federation (hereinafter referred to as the Criminal Code of the Russian Federation), p "g", Part 3., Article 158 of the Criminal Code of the Russian Federation, Article 159 OF the Criminal Code of the Russian Federation. The use of specialized Internet dating services by criminals significantly complicates the practice of investigating such crimes"), however, they are general in nature and do not reflect all the scientific achievements of the author. Thus, they need to be specified. The interest of the readership in the article submitted for review can be shown primarily by specialists in the field of criminal procedure and criminology, provided that it is finalized: disclosure of the research methodology, additional justification of the relevance of its topic (within the framework of the comment made), concretization of conclusions based on the results of the study, elimination of violations in the design of the work.

Second Peer Review

Peer reviewers' evaluations remain confidential and are not disclosed to the public. Only external reviews, authorized for publication by the article's author(s), are made public. Typically, these final reviews are conducted after the manuscript's revision. Adhering to our double-blind review policy, the reviewer's identity is kept confidential.
The list of publisher reviewers can be found here.

A REVIEW of an article on the topic "The possibility of identifying signs of a person's personality by his digital identity." The subject of the study. The article proposed for review is devoted to topical issues of identifying signs of a person's personality based on his digital identity. Based on various empirical data, as well as the study of scientific literature, the author draws conclusions about what "an algorithm of actions for law enforcement agencies should be when identifying signs of a person by his digital identity for effective crime detection." The specific subject of the study was primarily empirical data, as well as the opinions of scientists. Research methodology. The purpose of the study is not stated directly in the article. At the same time, it can be clearly understood from the title and content of the work. The goal can be designated as the consideration and resolution of certain problematic aspects of the issue of identifying signs of a person's personality by his digital identity. Based on the set goals and objectives, the author has chosen the methodological basis of the study. In particular, the author uses a set of general scientific methods of cognition: analysis, synthesis, analogy, deduction, induction, and others. In particular, the methods of analysis and synthesis made it possible to generalize and separate the conclusions of various scientific approaches to the proposed topic, as well as to draw specific conclusions from empirical data. The most important role was played by special legal methods. In particular, the author actively applied the formal legal method, which made it possible to analyze and interpret the norms of current legislation. For example, the following conclusion of the author: "in accordance with Part 4, Article 21 of the Code of Criminal Procedure (hereinafter referred to as the Criminal Code of the Russian Federation), a reasoned request from an investigator to a certain institution, organization, enterprise or provider company providing Internet access services is subject to mandatory execution. [4] The response of the management company must contain information about the names of the providers with whom contracts for providing access to Internet services were concluded at the address specified in the request. Further, law enforcement officers should send requests to the addresses of established provider organizations to provide data to the investigator. [5] Such data include: a) the complete data that the person indicated in the concluded service agreement (surname, first name, patronymic, address, phone number, copy of passport); b) the IP addresses that the person used for a certain period of time (the exact time period is indicated by the investigator); c) a specific type of IP address (dynamic or statistical); d) the exact address of the location of the receiving and transmitting equipment, with which access to the Internet was carried out through the specified IP addresses; e) MCA addresses that were used in a specific period of time." It is also worth positively evaluating the author's study of empirical data. We note the following important arguments in the context of the purpose of the study: "According to statistics, only in January - March 2023, 152.4 thousand crimes committed using information and telecommunications technologies or in the field of computer information were registered, which is 22.7% more than in the same period last year. In the total number of registered crimes, their share increased from 25.7% in January - March 2022 to 31.5%. Almost all such crimes (98.8%) are detected by the internal affairs bodies. More than half of such crimes (53.7%) belong to the categories of grave and especially grave (81.9 thousand; + 22.0%), three quarters (75.6%) are committed using the Internet (115.3 thousand; + 28.8%), almost half (43.3%) – mobile communications (66.1 thousand; + 34.1%)". Thus, the methodology chosen by the author is fully adequate to the purpose of the study, allows you to study all aspects of the topic in its entirety. Relevance. The relevance of the stated issues is beyond doubt. There are both theoretical and practical aspects of the significance of the proposed topic. From the point of view of theory, the topic of identifying signs of a person's personality by his digital identity. It is difficult to argue with the author that "it is necessary to develop and apply a forensic technique for detecting human signs using "digital personality doubles" in the Internet space, since this issue is becoming more relevant today. The method of searching for a "digital personality" is a complex and multifaceted process that requires certain knowledge and skills, as well as the joint work of law enforcement agencies and moderators of various services on the Internet. It is even more difficult to conduct scientific research aimed at establishing the digital identity of the human physical body." Thus, scientific research in the proposed field should only be welcomed. Scientific novelty. The scientific novelty of the proposed article is beyond doubt. Firstly, it is expressed in the author's specific conclusions. Among them, for example, is the following conclusion: "in forensic science, there is no precise understanding of the term "digital personality" and an accurate algorithm for detecting signs of a person by his digital personality. In our work, we tried to clarify this term and from this it should be understood that a "digital personality" is an artificially created virtual likeness of a person, as well as a complete falsification of his account on various Internet services. We have also developed an algorithm of actions for law enforcement agencies in identifying signs of a person by his digital identity for effective crime detection. And the examinations that are subject to mandatory appointment in the investigation and disclosure of crimes related to the identification of signs of a person by his digital identity are explained. After analyzing judicial practice, it was concluded that currently criminals have begun to use a digital identity to commit crimes most often on online dating platforms. These include crimes provided for in Article 163 of the Criminal Code of the Russian Federation (hereinafter – the Criminal Code of the Russian Federation), p "g", Part 3., Article 158 of the Criminal Code of the Russian Federation, Article 159 of the Criminal Code of the Russian Federation. The use of specialized Internet dating services by criminals significantly complicates the practice of investigating such crimes." These and other theoretical conclusions can be used in further scientific research. Secondly, the author suggests ideas that are useful for practicing lawyers, primarily investigators. Thus, the materials of the article may be of particular interest to the scientific community in terms of contributing to the development of science. Style, structure, content. The subject of the article corresponds to the specialization of the journal "Legal Studies", as it is devoted to legal problems related to the identification of signs of a person's personality by his digital identity. The content of the article fully corresponds to the title, as the author has considered the stated problems, and has generally achieved the set research goal. The quality of the presentation of the study and its results should be recognized as fully positive. The subject, objectives, methodology and main results of the study follow directly from the text of the article. The design of the work generally meets the requirements for this kind of work. No significant violations of these requirements were found. Bibliography. The quality of the literature used should be highly appreciated. The author actively uses the literature presented by authors from Russia (Orekh E.A., Sergeeva O.V., Pershin A.N., Shipunova O.D. and others). Thus, the works of the above authors correspond to the research topic, have a sign of sufficiency, and contribute to the disclosure of various aspects of the topic. Appeal to opponents. The author conducted a serious analysis of the current state of the problem under study. All quotes from scientists are accompanied by author's comments. That is, the author shows different points of view on the problem and tries to argue for a more correct one in his opinion. Conclusions, the interest of the readership.
The conclusions are fully logical, as they are obtained using a generally accepted methodology. The article may be of interest to the readership in terms of the presence in it of the author's systematized positions in relation to topical issues of identifying signs of a person's personality by his digital identity. Based on the above, summing up all the positive and negative sides of the article, "I recommend publishing"