Рус Eng Cn Translate this page:
Please select your language to translate the article


You can just close the window to don't translate
Library
Your profile

Back to contents

Legal Studies
Reference:

Material and electronic-digital traces as an element of the forensic characteristics of frauds committed in the way "Your relative got into trouble"

Revenko Natal'ya Ivanovna

PhD in Law

Associate Professor; Department of Criminal Procedure and Criminalistics; Omsk State University named after F.M. Dostoevsky

644099, Russia, Omsk region, Omsk, Krasina str., 2, sq. 40

revenko.ni@mail.ru
Other publications by this author
 

 

DOI:

10.25136/2409-7136.2024.8.71604

EDN:

RZJBHD

Received:

25-08-2024


Published:

01-09-2024


Abstract: The subject of the study is the material and electronic-digital traces formed during the commission of fraud in the way "Your relative got into trouble". Despite the fact that the fraudster communicates with the victim by phone remotely, when committing fraud, there remains a certain set of material traces, the detection and investigation of which will allow to identify the fraudster courier and prove the event of the crime. The separation of electronic and digital traces into a separate group is associated with the use of information technology by fraudsters. During the investigation, the investigator seizes and examines such an electronic digital trace as a video recording from the victim's place of residence, from the location of the ATM used to transfer money stolen from the victim. Also, this group of traces includes information contained in the cell phones of the victim and the suspect, which confirm the latter's involvement in the crimes committed as part of a criminal group.  The study was conducted using general scientific methods of cognition: analysis, synthesis, deduction, induction, analogy; empirical methods: description, comparison, as well as private scientific methods: legal, sociological, formal legal. The novelty of the study, the conclusions. The analysis of criminal cases made it possible to establish that when committing this type of fraud, there are material traces that allow identifying the fraudulent courier, as well as proving the fact of committing a crime. Depending on the method used, specific traces remain, called in criminology as electronic-digital, which include video recordings from surveillance cameras of a fraudster courier at the moment when he came to the victim for money and transferred them to the account indicated to him through an ATM. The author's position is expressed that with the participation of a suspect during the inspection of video recordings, his testimony should be recorded in the interrogation protocol, and not in the protocol of inspection of objects. A large set of traces is contained in the memory of a cell phone seized from a fraudulent courier.


Keywords:

fraud, cheater, the victim, material traces, digital footprints, forensic characteristics, Information technology, telephone, video recording, the mechanism of trace formation

This article is automatically translated. You can find original text of the article here.

Recently, cases of fraud against the elderly in the way "Your relative is in trouble" have become more frequent throughout the country. Despite the fact that law enforcement agencies are actively engaged in information activities related to explaining the mechanisms of fraud and the behavior of citizens in these cases, the level of this type of crime is not decreasing. Fraudsters, using old, proven schemes, introduce new techniques into them that allow them to take possession of other people's property [1, p. 94]. In modern conditions, scammers, implementing the "Your relative is in trouble" method, call elderly victims on a landline phone, knowing that they do not answer calls coming to a cell phone from unfamiliar numbers. Also, due to the fact that elderly people, as a rule, do not use a mobile bank and cannot transfer money to the account specified by the criminal, fraudsters began to involve a courier in their criminal group, to whom the victims transfer money allegedly to help their close relative or acquaintance. The fraudulent courier transfers the money received from the victims to the account indicated to him, keeping 5-10% for himself.

As a rule, this type of fraud is committed by a criminal group using information technology. In a short period of time, they manage to deceive a large number of victims living in different cities. So, in Tomsk, S. was detained, who from May to June 2023, as part of a criminal group, on the instructions of curators, came to specific addresses in Tomsk and Novosibirsk and took money from the deceived victims. During this period of time, 14 crimes were committed [Verdict of the Kirovsky District Court of Tomsk dated 12/29/2023 in case no. 1-104/2023 // Judicial and regulatory acts of the Russian Federation. – URL: https://sudact.ru/regular/doc/c08euDEapBN0 /, The verdict of the Pervomaisky District Court of the Novosibirsk region dated 06.06.2023 in case no. 1-343/2023// Pervomaisky district Court of Novosibirsk. – URL: https://pervomaisky--nsk.sudrf.ru/modules.php?name=sud_delo].

As practice shows, only the courier is brought to criminal responsibility, in relation to the organizers and perpetrators of fraud, whose identity is not established, criminal cases are separated into separate proceedings. Difficulties in identifying the organizers and perpetrators of crimes are associated with their use of information technology, which currently does not allow them to establish their location.

Despite the use of modern technologies by criminals in committing this type of fraud, the investigator's knowledge of the mechanism of trace formation in cases of this category will help to establish its mechanism, prove the event and the guilt of the persons involved in it. The mechanism of trace formation in criminology is traditionally recognized as one of the elements of the criminalistic characteristics of a crime [2, p. 43]. Currently, in cases of this category in criminology, there are three groups of traces: ideal, material and electronic-digital.

The investigator discovers and fixes the ideal traces displayed in the minds of individuals by conducting interrogations of victims, witnesses, suspects, accused, experts, specialists. During interrogations, the investigator, in accordance with Part 1 of Article 74 of the Code of Criminal Procedure of the Russian Federation, receives such type of evidence as testimony. Ideal traces in cases of this type of fraud at the initial stage of the investigation are of great importance for establishing the mechanism of committing a crime and detaining fraudsters [3, p. 45].

Any changes in the material world that occur during the commission of a crime can be attributed to material traces.

There is no consensus in the legal literature on the name of the third group of footprints, in particular E. A. Pidusov, V. A. Mashlyakevich [4], designate them as electronic digital footprints. The authors believe that this group includes "... information stored in the mobile phones of the victim, the fraudster and (or) the trusted person of the criminal; recordings from surveillance cameras" [5, p. 86].

The works of G. M. Selyuzhitskaya [6], I. V. Suvorova [7], A.V. Sycheva [8] consider certain issues related to the methodology of investigation of remote frauds, however, they do not focus on the criminalistic characteristics of material and electronic digital traces formed during the commission of the considered type of fraud.

Due to the fact that the victim communicated with the scammers by phone while at home and transferred money to the fraudster courier there, the situation in which the crime occurred acts as material traces. To capture the crime scene, an investigative action is carried out to inspect the scene of the incident, during which the actions of the investigator should be aimed at fixing the situation, detecting and removing traces that allow identifying the fraudulent courier. These can be a variety of display marks, such as finger marks, shoe marks, as well as microparticles and fat traces.

An analysis of the practice of investigating this category of cases showed that the inspection of the scene of the incident – the victim's apartment – was carried out in all the studied cases, however, in most cases the investigator recorded only the surrounding environment, no traces were found and seized. G. M. Hovsepyan, D. V. Kuzmenko, assessing the inspection of the scene of the incident in cases of this category, characterize it as tactically superficial and inconclusive [9, p. 100]. Despite this characteristic, investigations of a series of frauds in Tomsk can be cited as a positive example. Of the eight episodes in which S. was brought to criminal responsibility for committing fraud as part of a group against elderly victims, two of them, during an inspection of the scene, finger marks were removed on the door handle from the outside of the apartment door and on the entrance door, which, according to the conclusion of a fingerprint examination, belonged to S. [Verdict Kirovsky District Court of Tomsk dated 12/29/2023 in case No. 1-104/2023].

A. V. Sycheva, characterizing the tactical techniques of examining the scene of the incident, notes that in cases of this category "it is advisable to involve the victim in conducting an investigative action, since he can explain in detail the circumstances of the event" [10, p. 315]. As practice shows, the investigator conducts an inspection of the scene of the incident – the apartment and the landing – with the participation of the victim, who during the inspection gives explanations about the location of the fraudulent courier and his behavior at the time of transferring money to him.

During this inspection, the investigator, as a rule, withdraws a statement written by the victim at the dictation of fraudsters. During communication, fraudsters, in order to convince the victim of the need to transfer money to help loved ones, inform him of the need to write a statement in triplicate addressed to the head of the Department of Internal Affairs. In the statement, the victim asks not to initiate criminal proceedings against his relatives in connection with reconciliation with the victim and compensation for damage to him, indicating a specific amount. The victim puts two copies of the statement in a bag with money and passes it to the courier.

In our opinion, writing this statement to the victims is also necessary for fraudsters so that they can keep the victim in touch while the courier gets to his place of residence. Before the courier arrives, the fraudster alternately calls the victim on a landline phone, then on a cell phone, whose number he learns from him. The statement seized during the inspection of the scene of the incident is further examined by the investigator separately, a protocol of inspection of documents is drawn up and attached as material evidence.

The facts of finding a fraudulent courier in the victim's apartment and transferring money to him are also confirmed by video surveillance cameras seized either from residents of the house who own the video camera, or from representatives of a management company or a real estate owners association. In practice, there are examples when video cameras are not installed in the house, and the investigator, having found out from the taxi driver that the fraudulent courier entered the store on his way to or from the crime scene, seizes the video from the store administration.

Methods of inspection of the seized video are of interest. When studying the materials of criminal cases, two ways of examining the video were revealed. In the first method, the investigator describes what he sees on the video recording related to the event under investigation. For example: "On 07/06/2023, at 20:31 minutes 54 seconds, a girl walks towards the entrance 4 at the address Smirnov, 2, who leaves the entrance at 20:36 minutes 46 seconds, while holding a plastic bag in her left hand [Verdict of the Pervomaisky District Court of the Novosibirsk Region from 06.06.2023 in case No. 1-343/2023]. In the second method, the investigator examines the video together with the suspect courier, who during the inspection confirms that he is depicted on the video and gives an explanation of why he is in this place. For example: "05/20/2022 the video was examined with the participation of suspect S. and her defender. During the inspection, suspect S. explained that on the video she enters the entrance of a house in Tomsk to take money from an elderly woman, and then leaves the entrance of the house with the stolen funds" [Verdict of the Kirovsky District Court of Tomsk dated 12/29/2023 in case No. 1-104/2023].

The digital traces also include a video recording showing a fraudulent courier transferring stolen money using an ATM. During the inspection of this video, the suspect is also present, who confirms that he is depicted on the video.

As can be seen from the analysis of the protocols of the inspection of the scene and inspections of objects and documents, the investigator, when compiling them, records the testimony of suspects and victims taking part in these investigative actions. In our opinion, the testimony of the persons participating in the examination should be reflected in the appropriate interrogation protocol, which is recommended to be conducted after the examination. This conclusion follows from the essence of the inspection as an investigative action and the analysis of the provisions of Article 180 of the Code of Criminal Procedure of the Russian Federation, according to which only the actions of the investigator and everything found are recorded in the protocol of inspection, and in the protocol of interrogation in accordance with Article 190 of the Code of Criminal Procedure of the Russian Federation, the testimony of the interrogated persons is recorded.

A certain set of trace information is contained in cell phones belonging to both the victim and the suspected courier. S. A. Yanin believes that the results of the inspection of objects (namely cellular communications), as a rule, are extremely important for exposing the criminal and securing evidence of his guilt [11, p. 144].

In most cases, fraudulent couriers take a conflict-free position during the investigation and inform the investigator of information that allows him to detect a set of electronic and digital traces in the phone confirming the courier's communication with the organizers of the crime for each episode of criminal activity. So, in the Yandex-Maps application, you can record the suspect's requests about the location of: hotels in cities where he arrived at the direction of curators; ATMs through which he transferred the stolen money, and the route to them.

By examining the e-mail, you can find saved incoming letters confirming the facts of purchasing a train ticket to the settlements where the crimes were committed and booking hotels there. The application for calling a taxi may contain information about calling a taxi to the place of residence of the victims or SMS messages about the time, route and data of the car and driver.

Also, when examining the cell phone of a fraudulent courier, you can find screenshots confirming the transfer of money to the organizers of the fraud, correspondence with them, a video recording in which he, showing his passport, says that he is ready to commit crimes. This video is made at the direction of the organizers during the period of the courier's involvement in the criminal group and is sent to them.

Thus, when committing fraud in the "Your relative is in trouble" way, a certain set of traces remains. As the analysis of criminal cases on this type of fraud has shown, a small number of material traces remain. Among them are those that allow you to identify the fraudster courier, in particular, the traces left by the fraudster in the apartment or on the landing at the place of residence of the victim at the time of the transfer of money. These may be finger marks, shoe marks, microparticles, and grease marks. Other material traces confirming the event of the crime are also important: the situation of the place where it was committed; the victim's statement addressed to the head of the Department of Internal Affairs; details of the victim's telephone connections, etc.

Due to the fact that the totality of the traces formed depends on the method of committing a crime, electronic digital traces are also distinguished in this category of criminal cases, which can be detected when examining the phone of a fraudster courier, video recordings from CCTV cameras at the victim's place of residence and the location of the ATM.

The investigator's knowledge of the entire list of possible material and electronic digital traces, as well as the mechanism of their formation for this type of fraud, is an important condition for establishing and proving the event of a crime and the guilt of the perpetrators.

References
1. Revenko, N. I., & Vorobyova, P. V. (2023). Methods of committing fraud using information and telecommunication technologies. In Science and Technology – 2023: Collection of articles of the III International Scientific and Practical Conference (pp. 94-99). Petrozavodsk: ICNP NEW SCIENCE.
2. Sergeev, A. A. (1971). The essence and significance of the criminalistic characteristics of crimes. In Handbook for investigators (P. 43). Moscow.
3. Revenko, N.I. (2024). Ideal traces as an element of the forensic characteristics of "Your relative got into trouble" frauds. Law and Politics, 8, 45-56. doi:10.7256/2454-0706.2024.8.71447 Retrieved from http://en.e-notabene.ru/lpmag/article_71447.html
4. Mashlyakevich, V. A. (2017). On the issue of electronic digital traces formed during the commission of frauds using means of telephone communication. In Materials of forensic readings edited by O. V. Kruglikova (pp. 62-63). Barnaul : Barnaul Law Institute of the Ministry of Internal Affairs of Russia.
5. Pidusov, E. A. (2018). The trace pattern in the commission of fraudulent actions using mobile cellular communications. Crime in the field of information and telecommunication technologies: problems of prevention, disclosure and investigation of crimes, 1, 82-87.
6. Selyuzhitskaya, G. M. (2023). Methods of investigation of frauds committed against the elderly: abstract. ... cand. Jurid. Sciences: 5.1.4. Moscow.
7. Suvorova, I. V. (2022). The initial stage of the investigation of fraud committed remotely. In. Criminalistics: science, practice, experience: collection of scientific papers of the All-Russian Scientific and practical conference (pp. 330-335). Moscow.
8. Sycheva, A. V. (2022). Some questions of the criminalistic characteristics of "remote" frauds committed against the elderly. Bulletin of the Volgograd Academy of the Ministry of Internal Affairs of Russia, 60(1), 135-140.
9. Hovsepyan, G.M., & Kuzmenko, D. V. (2023). Inspection of the scene of the incident in cases of fraud committed against socially vulnerable categories of citizens: tactical modernization. Problems in Russian legislation, 1, 99-103.
10. Sycheva, A.V. (2014). Tactics of conducting separate investigative actions in cases of fraud committed against socially vulnerable categories of citizens. Theory and practice of social development, 3, 314-317.
11. Yanin, S. A. (2018). On the issue of the specifics of the inspection of cellular communication facilities in the investigation of fraud committed with their use. Legal science and law enforcement practice, 4(46), 142-149.

Peer Review

Peer reviewers' evaluations remain confidential and are not disclosed to the public. Only external reviews, authorized for publication by the article's author(s), are made public. Typically, these final reviews are conducted after the manuscript's revision. Adhering to our double-blind review policy, the reviewer's identity is kept confidential.
The list of publisher reviewers can be found here.

A REVIEW of an article on the topic "Material and electronic digital traces as an element of the criminalistic characteristics of frauds committed in the way "Your relative got into trouble"". The subject of the study. The article proposed for review is devoted to topical issues of identifying material and electronic digital traces as an element of the criminalistic characteristics of some modern types of fraud. As the author of the article notes, "The investigator's knowledge of the entire list of possible material and electronic digital traces, as well as the mechanism of their formation for this type of fraud, is an important condition for establishing and proving the event of a crime and the guilt of the perpetrators." The specific subject of the study was primarily empirical data, as well as the opinions of scientists. Research methodology. The purpose of the study is not stated directly in the article. At the same time, it can be clearly understood from the title and content of the work. The purpose can be designated as the consideration and resolution of certain problematic aspects of the issue of identifying material and electronic digital traces as an element of the criminalistic characteristics of some modern types of fraud. Based on the set goals and objectives, the author has chosen the methodological basis of the study. In particular, the author uses a set of general scientific methods of cognition: analysis, synthesis, analogy, deduction, induction, and others. In particular, the methods of analysis and synthesis made it possible to generalize and separate the conclusions of various scientific approaches to the proposed topic, as well as to draw specific conclusions from empirical data. The most important role was played by special legal methods. In particular, the author actively applied the formal legal method, which made it possible to analyze and interpret the norms of current legislation. For example, the following conclusion of the author: "In our opinion, the testimony of the persons participating in the examination should be reflected in the appropriate interrogation protocol, which is recommended to be conducted after the examination. This conclusion follows from the essence of the inspection as an investigative action and the analysis of the provisions of Article 180 of the CPC of the Russian Federation, according to which only the actions of the investigator and everything found are recorded in the inspection protocol, and the testimony of the interrogated persons is recorded in the interrogation protocol in accordance with Article 190 of the CPC of the Russian Federation." It is also worth positively evaluating the author's study of empirical data, primarily criminal cases. So, we note the following author's reasoning: "The methods of examining the seized video are of interest. When studying the materials of criminal cases, two ways of examining the video were revealed. In the first method, the investigator describes what he sees on the video recording related to the event under investigation. For example: "On 07/06/2023, at 20:31 minutes 54 seconds, a girl walks towards the entrance 4 at the address Smirnov, 2, who leaves the entrance at 20:36 minutes 46 seconds, while holding a plastic bag in her left hand [Verdict of the Pervomaisky District Court of the Novosibirsk Region from 06.06.2023 in case No. 1-343/2023]. In the second method, the investigator examines the video together with the suspect courier, who during the inspection confirms that he is depicted on the video and gives an explanation of why he is in this place. For example: "05/20/2022 the video was examined with the participation of suspect S. and her defender. During the inspection, suspect S. explained that on the video she enters the entrance of a house in Tomsk to take money from an elderly woman, and then leaves the entrance of the house with the stolen funds" [Verdict of the Kirovsky District Court of Tomsk dated 12/29/2023 in case No. 1-104/2023]." Thus, the methodology chosen by the author is fully adequate to the purpose of the study, allows you to study all aspects of the topic in its entirety. Relevance. The relevance of the stated issues is beyond doubt. There are both theoretical and practical aspects of the significance of the proposed topic. From the point of view of theory, the topic of identifying material and electronic digital traces as an element of the forensic characteristics of some modern types of fraud is complex and ambiguous. It is difficult to argue with the author that "Recently, cases of fraud against the elderly have become more frequent throughout the country in the way of "Your relative is in trouble." Despite the fact that law enforcement agencies are actively engaged in information activities related to explaining the mechanisms of fraud and the behavior of citizens in these cases, the level of this type of crime is not decreasing. Fraudsters, using old, proven schemes, introduce new techniques into them that allow them to take possession of other people's property [1, p. 94]. In modern conditions, scammers, implementing the "Your relative is in trouble" method, call elderly victims on a landline phone, knowing that they do not answer calls coming to a cell phone from unfamiliar numbers. Also, due to the fact that elderly people, as a rule, do not use a mobile bank and cannot transfer money to the account specified by the criminal, fraudsters began to involve a courier in their criminal group, to whom the victims transfer money allegedly to help their close relative or acquaintance. The fraudulent courier transfers the money received from the victims to the account indicated to him, keeping 5-10% for himself." Thus, scientific research in the proposed field should only be welcomed. Scientific novelty. The scientific novelty of the proposed article is beyond doubt. Firstly, it is expressed in the author's specific conclusions. Among them, for example, is the following conclusion: "when committing fraud in the way "Your relative got into trouble", a certain set of traces remains. As the analysis of criminal cases on this type of fraud has shown, a small number of material traces remain. Among them are those that allow you to identify the fraudster courier, in particular, the traces left by the fraudster in the apartment or on the landing at the place of residence of the victim at the time of the transfer of money. These may be finger marks, shoe marks, microparticles, and grease marks. Other material traces confirming the event of the crime are also important: the situation of the place where it was committed; the victim's statement addressed to the head of the Department of Internal Affairs; details of the victim's telephone connections, etc." This and other theoretical conclusions can be used in further scientific research. Secondly, the author suggests ideas that are useful for practicing lawyers, primarily investigators. Thus, the materials of the article may be of particular interest to the scientific community in terms of contributing to the development of science. Style, structure, content. The subject of the article corresponds to the specialization of the journal "Legal Research", as it is devoted to legal problems related to the identification of material and electronic digital traces as an element of the criminalistic characteristics of some modern types of fraud. The content of the article fully corresponds to the title, as the author has considered the stated problems, and has generally achieved the set research goal. The quality of the presentation of the study and its results should be recognized as fully positive. The subject, objectives, methodology and main results of the study follow directly from the text of the article. The design of the work generally meets the requirements for this kind of work. No significant violations of these requirements were found. Bibliography. The quality of the literature used should be highly appreciated. The author actively uses the literature presented by authors from Russia (Revenko N.I., Vorobyova P.V., Ovsepyan G.M., Kuzmenko D.V. and others). Thus, the works of these authors correspond to the research topic, have a sign of sufficiency, and contribute to the disclosure of various aspects of the topic. Appeal to opponents. The author conducted a serious analysis of the current state of the problem under study. All quotes from scientists are accompanied by author's comments. That is, the author shows different points of view on the problem and tries to argue for a more correct one in his opinion. Conclusions, the interest of the readership.
The conclusions are fully logical, as they are obtained using a generally accepted methodology. The article may be of interest to the readership in terms of the systematic positions of the author in relation to topical issues of crime investigation. Based on the above, summing up all the positive and negative sides of the article, "I recommend publishing"