Міжвідомчий Науково-методичний збірник
"Криміналістика і судова експертиза"
ISSN: 2786-7072 (Online); ISSN: 2786-7080 (Print)
PDF 19 Завантажень: 163, розмiр: 267.9 KB

M. Shcherbakovskyi; V. Korshenko


The extraction of information from backhaul telecommunication networks is one of the most effective ways of obtaining information exchanged by persons related to a crime. This secret investigative (search) action in which it is possible to single out procedural, organizational, tactical and technical aspects consists of a combination of search and cognitive, technical and certifying techniques. There are several typical investigative situations that cause the need to extract information from backhaul telecommunication networks: the suspect can contact his accomplices, other persons; the victim can receive messages from the criminal; unauthorized interference in victim computer is possible; the wanted suspect can contact with a certain persons (relatives, acquaintances, accomplices in the crime); the phone number, e-mail or other parameters of the addressee are known, but the person using the communication channel is unidentified. To conduct an investigative action, it is necessary to identify the observation subscriber, the transport telecommunications network, the final equipment, on which interference into private communication can be effected. An effective technique is the investigator’s ability to periodically get acquainted with the information received during the period of validity of the permission to conduct silent investigative (search) actions. This allows to obtain guidance information that helps to take measures immediately to counter a crime committed or preparing, to conduct other vowel or silent investigative (search) actions. In certain cases, during the examination of information, it is advisable to involve a specialist in the field, the content of which is accessible only to informed persons.

The information extracted from backhaul telecommunication networks allows obtaining reliable data not only about the persons involved in the committed crime, but also about possible witnesses, victims, places of concealment means, items and documents containing information on the course of criminal actions, unrelated communications of suspects etc. After conducting the investigative action, analog and digital media can be investigated to establish other evidence using specialized knowledge in the form of forensic examination.